<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-14T04:48:12</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:200620001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-20001</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-20001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-20001" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-20001" ref_url="https://www.suse.com/security/cve/CVE-2006-20001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-February/027580.html" source="SUSE-SU"/>
    <description>
    A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.

This issue affects Apache HTTP Server 2.4.54 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2006-20001/">CVE-2006-20001 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-20001">CVE-2006-20001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207247">SUSE bug 1207247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217021">SUSE bug 1217021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805399" comment="httpd-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805400" comment="httpd-core-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805401" comment="httpd-devel-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805402" comment="httpd-filesystem-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805403" comment="httpd-manual-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805404" comment="httpd-tools-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805405" comment="mod_ldap-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805406" comment="mod_lua-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805407" comment="mod_proxy_html-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805408" comment="mod_session-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805409" comment="mod_ssl-2.4.53-7.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2007-4559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4559" source="CVE"/>
    <reference ref_id="SUSE CVE-2007-4559" ref_url="https://www.suse.com/security/cve/CVE-2007-4559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15104-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BUUKV2NV6ZQWGENZAU7WVJ22KI32V4Q/" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2007-4559/">CVE-2007-4559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2007-4559">CVE-2007-4559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203750">SUSE bug 1203750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204077">SUSE bug 1204077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810810" comment="python-unversioned-command-3.9.18-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810811" comment="python3-3.9.18-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810812" comment="python3-debug-3.9.18-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810813" comment="python3-devel-3.9.18-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810814" comment="python3-idle-3.9.18-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810815" comment="python3-libs-3.9.18-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811180" comment="python3-pip-21.2.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811181" comment="python3-pip-wheel-21.2.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810816" comment="python3-test-3.9.18-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810817" comment="python3-tkinter-3.9.18-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811083" comment="python3.11-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811084" comment="python3.11-debug-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811085" comment="python3.11-devel-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811086" comment="python3.11-idle-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811087" comment="python3.11-libs-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810780" comment="python3.11-pip-22.3.1-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810781" comment="python3.11-pip-wheel-22.3.1-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811088" comment="python3.11-test-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811089" comment="python3.11-tkinter-3.11.5-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201110007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-10007</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2011-10007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-10007" source="CVE"/>
    <reference ref_id="SUSE CVE-2011-10007" ref_url="https://www.suse.com/security/cve/CVE-2011-10007" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9517" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001702.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001704.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9740" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9741" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040468.html" source="SUSE-SU"/>
    <description>
    File::Find::Rule through 0.34 for Perl is vulnerable to Arbitrary Code Execution when `grep()` encounters a crafted filename.

A file handle is opened with the 2 argument form of `open()` allowing an attacker controlled filename to provide the MODE parameter to `open()`, turning the filename into a command to be executed.

Example:

$ mkdir /tmp/poc; echo &gt; "/tmp/poc/|id"
$ perl -MFile::Find::Rule \
      -E 'File::Find::Rule-&gt;grep("foo")-&gt;in("/tmp/poc")'
uid=1000(user) gid=1000(user) groups=1000(user),100(users)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-02"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2011-10007/">CVE-2011-10007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2011-10007">CVE-2011-10007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244148">SUSE bug 1244148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997705" comment="perl-File-Find-Rule-0.34-19.1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0340</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2013-0340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0340" source="CVE"/>
    <reference ref_id="SUSE CVE-2013-0340" ref_url="https://www.suse.com/security/cve/CVE-2013-0340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
    <description>
    expat before version 2.4.0 does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2013-0340/">CVE-2013-0340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2013-0340">CVE-2013-0340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/805236">SUSE bug 805236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053630" comment="expat-2.4.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053631" comment="expat-devel-2.4.9-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2014-1745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745" source="CVE"/>
    <reference ref_id="SUSE CVE-2014-1745" ref_url="https://www.suse.com/security/cve/CVE-2014-1745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017970.html" source="SUSE-SU"/>
    <description>
    Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger removal of an SVGFontFaceElement object, related to core/svg/SVGFontFaceElement.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-06-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2014-1745/">CVE-2014-1745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2014-1745">CVE-2014-1745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219604">SUSE bug 1219604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201520107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-20107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2015-20107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107" source="CVE"/>
    <reference ref_id="SUSE CVE-2015-20107" ref_url="https://www.suse.com/security/cve/CVE-2015-20107" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2357-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/26DEFHSQZHFG2QZLJD7AX3TDPAXVFWZR/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
    <description>
    In Python (aka CPython) up to 3.10.8, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This may allow attackers to inject shell commands into applications that call mailcap.findmatch with untrusted input (if they lack validation of user-provided filenames or arguments). The fix is also back-ported to 3.7, 3.8, 3.9
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2015-20107/">CVE-2015-20107 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2015-20107">CVE-2015-20107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198511">SUSE bug 1198511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200507">SUSE bug 1200507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201777">SUSE bug 1201777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201791">SUSE bug 1201791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205068">SUSE bug 1205068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208337">SUSE bug 1208337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805019" comment="python-unversioned-command-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805020" comment="python3-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805021" comment="python3-debug-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805022" comment="python3-devel-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805023" comment="python3-idle-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805024" comment="python3-libs-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805025" comment="python3-test-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805026" comment="python3-tkinter-3.9.14-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201717095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-17095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2017-17095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17095" source="CVE"/>
    <reference ref_id="SUSE CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4658" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2017-17095">CVE-2017-17095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811129" comment="libtiff-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811130" comment="libtiff-devel-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811131" comment="libtiff-tools-4.4.0-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201817828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-17828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-17828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17828" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20838" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-October/004779.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3314-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AB3NO6UCV5TP3C5VK5AV766YZU4N35BX/#AB3NO6UCV5TP3C5VK5AV766YZU4N35BX" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3446-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BA6PLGK6CGXYQB5JIUQQPPYUSNTEPRRE/#BA6PLGK6CGXYQB5JIUQQPPYUSNTEPRRE" source="SUSE-SU"/>
    <description>
    Directory traversal vulnerability in ZZIPlib 0.13.69 allows attackers to overwrite arbitrary files via a .. (dot dot) in a zip file, because of the function unzzip_cat in the bins/unzzipcat-mem.c file.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2025-11-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2018-17828">CVE-2018-17828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1110687">SUSE bug 1110687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025666" comment="zziplib-0.13.71-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025667" comment="zziplib-devel-0.13.71-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025668" comment="zziplib-utils-0.13.71-12.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201825032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-25032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-25032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1061-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10126-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3URMJJJ2MKM4FNDYFMSSIEJDTNENDZRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1061-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3IAWI5KYTN2PXEFZY7OU7STBINLC3H6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14656-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PA2YASY5GVVBWOWVKGZPCNZJI5WMPXEX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032">CVE-2018-25032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197893">SUSE bug 1197893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198667">SUSE bug 1198667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199104">SUSE bug 1199104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200049">SUSE bug 1200049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201732">SUSE bug 1201732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224427">SUSE bug 1224427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805055" comment="mingw32-zlib-1.2.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805056" comment="mingw32-zlib-static-1.2.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805057" comment="mingw64-zlib-1.2.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805058" comment="mingw64-zlib-static-1.2.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804224" comment="rsync-3.2.3-9.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804225" comment="rsync-daemon-3.2.3-9.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804198" comment="zlib-1.2.11-31.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804199" comment="zlib-devel-1.2.11-31.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804200" comment="zlib-static-1.2.11-31.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201912900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-12900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-12900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0733" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000787.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0925" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-January/006363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2019:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-April/006705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-February/006484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2020:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-March/006622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:14231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2004-1" ref_url="https://www.suse.com/support/update/announcement/2019/suse-su-20192004-1.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-July/005756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:2013-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-August/005823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2019:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2019-November/006180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2020:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1781-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4QO3HMQ66EQDMHR5SC3BGIUUVBMK7WYY/#4QO3HMQ66EQDMHR5SC3BGIUUVBMK7WYY" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:1918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7TTMWRHULG5RFJHAER2SONBPANE45JER/#7TTMWRHULG5RFJHAER2SONBPANE45JER" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YQU33KHD533M6YFLZCXLG4HHJWYOHRXP/#YQU33KHD533M6YFLZCXLG4HHJWYOHRXP" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2019:2597-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FTGJC4PRXW7J6W3FBYBCGEFTYIR4LIV6/#FTGJC4PRXW7J6W3FBYBCGEFTYIR4LIV6" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2268-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GAR55SQV75RXSJVDKQWD4CZNKDOYFY5P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:2276-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DHFME6EFDMW6BQBIYMTU3MBXQLVR7QTK/" source="SUSE-SU"/>
    <description>
    BZ2_decompress in decompress.c in bzip2 through 1.0.6 has an out-of-bounds write when there are many selectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2026-02-22"/>
	<severity>Moderate</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-12900">CVE-2019-12900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1139083">SUSE bug 1139083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1141513">SUSE bug 1141513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009962429" comment="bzip2-1.0.8-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962430" comment="bzip2-devel-1.0.8-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962431" comment="bzip2-libs-1.0.8-10.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201914560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-14560</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-14560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14560" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-14560" ref_url="https://www.suse.com/security/cve/CVE-2019-14560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1958-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029445.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14560/">CVE-2019-14560 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2019-14560">CVE-2019-14560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1174246">SUSE bug 1174246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811013" comment="edk2-ovmf-20230524-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811014" comment="edk2-tools-20230524-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811015" comment="edk2-tools-doc-20230524-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201925058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2019-25058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2019-25058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25058" source="CVE"/>
    <reference ref_id="SUSE CVE-2019-25058" ref_url="https://www.suse.com/security/cve/CVE-2019-25058" source="SUSE CVE"/>
    <description>
    An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25058/">CVE-2019-25058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2019-25058">CVE-2019-25058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196460">SUSE bug 1196460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805197" comment="usbguard-1.0.0-10.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805198" comment="usbguard-dbus-1.0.0-10.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805199" comment="usbguard-notifier-1.0.0-10.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805200" comment="usbguard-selinux-1.0.0-10.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805201" comment="usbguard-tools-1.0.0-10.el9_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202010735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-10735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-10735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-10735" ref_url="https://www.suse.com/security/cve/CVE-2020-10735" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCKKVK6RUGD7FMGWHAMOVXOTAX4JRA2I/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14712-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FRICMO36O3BFBLAUZVPSBFGE736KGDNK/" source="SUSE-SU"/>
    <description>
    A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10735/">CVE-2020-10735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-10735">CVE-2020-10735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203125">SUSE bug 1203125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204077">SUSE bug 1204077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204096">SUSE bug 1204096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204097">SUSE bug 1204097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205075">SUSE bug 1205075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208131">SUSE bug 1208131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804727" comment="python-unversioned-command-3.9.10-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804728" comment="python3-3.9.10-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804729" comment="python3-debug-3.9.10-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804730" comment="python3-devel-3.9.10-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804731" comment="python3-idle-3.9.10-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804732" comment="python3-libs-3.9.10-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804733" comment="python3-test-3.9.10-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804734" comment="python3-tkinter-3.9.10-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202011023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-11023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-11023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-11023" ref_url="https://www.suse.com/security/cve/CVE-2020-11023" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000881.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2437" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000882.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2438" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000885.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2444" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000894.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000888.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2446" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000895.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2613" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000899.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:2971" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001150.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000848.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1215" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000878.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1255" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001152.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000856.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1301" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000864.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000865.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000855.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1314" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000877.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1329" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000851.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000879.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000866.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1601" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028254.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1060-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VVPI65AW45TXMRAYCWJ6YJT3LF4GIMWL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1106-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4IXKYESUUIOBHBKL32YKWOWHSJKS7RN3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2020:1888-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q4QSMZXUNVYKSR2VDCHWASQTIS4WW2JC/" source="SUSE-SU"/>
    <description>
    In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing &lt;option&gt; elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-05-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-11023/">CVE-2020-11023 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1173090">SUSE bug 1173090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178434">SUSE bug 1178434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190660">SUSE bug 1190660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202012762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-12762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-12762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12762" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:31-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:32-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:36-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035416.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LS5Y2M6XDX2JOBPPLIMAXXAXRPAU65ND/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0184-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDXGYZS2VAIBN2IO5VQRKJVJGNOKHZF7/" source="SUSE-SU"/>
    <description>
    json-c through 0.14 has an integer overflow and out-of-bounds write via a large JSON file, as demonstrated by printbuf_memappend.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-12762">CVE-2020-12762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208644">SUSE bug 1208644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810791" comment="libfastjson-0.99.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810792" comment="libfastjson-devel-0.99.9-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202017049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-17049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-17049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17049" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-17049" ref_url="https://www.suse.com/security/cve/CVE-2020-17049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010209.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-17049/">CVE-2020-17049 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-17049">CVE-2020-17049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1178754">SUSE bug 1178754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178764">SUSE bug 1178764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805948" comment="krb5-devel-1.20.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805949" comment="krb5-libs-1.20.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805950" comment="krb5-pkinit-1.20.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805951" comment="krb5-server-1.20.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805952" comment="krb5-server-ldap-1.20.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805953" comment="krb5-workstation-1.20.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805954" comment="libkadm5-1.20.1-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202018770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-18770</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-18770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18770" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-18770" ref_url="https://www.suse.com/security/cve/CVE-2020-18770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018191.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in function zzip_disk_entry_to_file_header in mmapped.c in zziplib 0.13.69, which will lead to a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-18770/">CVE-2020-18770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-18770">CVE-2020-18770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214577">SUSE bug 1214577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866717" comment="zziplib-0.13.71-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866718" comment="zziplib-devel-0.13.71-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866719" comment="zziplib-utils-0.13.71-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202022219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-22219</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-22219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22219" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-22219" ref_url="https://www.suse.com/security/cve/CVE-2020-22219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031492.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22219/">CVE-2020-22219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-22219">CVE-2020-22219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214615">SUSE bug 1214615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806812" comment="flac-1.3.3-10.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806813" comment="flac-devel-1.3.3-10.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806814" comment="flac-libs-1.3.3-10.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202023903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-23903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-23903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-23903" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2021:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1538-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MVNURRS2JE5OAOZLI3BVLEQCWIGU65MY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3860-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M3JTMWLYWFOOWVMDAUX2VBB5ZULOV3LY/" source="SUSE-SU"/>
    <description>
    A Divide by Zero vulnerability in the function static int read_samples of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-23903">CVE-2020-23903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804811" comment="speex-1.2.0-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804812" comment="speex-devel-1.2.0-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202026555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-26555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-26555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26555" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-26555" ref_url="https://www.suse.com/security/cve/CVE-2020-26555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26555/">CVE-2020-26555 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2020-26555">CVE-2020-26555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215237">SUSE bug 1215237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202027827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-27827</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-27827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27827" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9158" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008270.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0239-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZBHQUGIHMXL62CWXH7ZTZ3HUSFCNG7DW/" source="SUSE-SU"/>
    <description>
    A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-27827">CVE-2020-27827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953640" comment="lldpd-1.0.18-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953641" comment="lldpd-devel-1.0.18-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28469" ref_url="https://www.suse.com/security/cve/CVE-2020-28469" source="SUSE CVE"/>
    <description>
    This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-28469/">CVE-2020-28469 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28469">CVE-2020-28469 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28851</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28851" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28851" ref_url="https://www.suse.com/security/cve/CVE-2020-28851" source="SUSE CVE"/>
    <description>
    In x/text in Go 1.15.4, an "index out of range" panic occurs in language.ParseAcceptLanguage while parsing the -u- extension. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28851/">CVE-2020-28851 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28851">CVE-2020-28851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181051">SUSE bug 1181051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202028852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-28852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-28852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28852" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-28852" ref_url="https://www.suse.com/security/cve/CVE-2020-28852" source="SUSE CVE"/>
    <description>
    In x/text in Go before v0.3.5, a "slice bounds out of range" panic occurs in language.ParseAcceptLanguage while processing a BCP 47 tag. (x/text/language is supposed to be able to parse an HTTP Accept-Language header.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28852/">CVE-2020-28852 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-28852">CVE-2020-28852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181049">SUSE bug 1181049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36516</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36516" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36516" ref_url="https://www.suse.com/security/cve/CVE-2020-36516" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36516/">CVE-2020-36516 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36516">CVE-2020-36516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196616">SUSE bug 1196616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196867">SUSE bug 1196867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204092">SUSE bug 1204092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204183">SUSE bug 1204183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202036518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-36518</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-36518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36518" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011022.html" source="SUSE-SU"/>
    <description>
    jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-36518">CVE-2020-36518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805788" comment="pki-jackson-annotations-2.14.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805789" comment="pki-jackson-core-2.14.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805790" comment="pki-jackson-databind-2.14.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805791" comment="pki-jackson-jaxrs-json-provider-2.14.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805792" comment="pki-jackson-jaxrs-providers-2.14.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805793" comment="pki-jackson-module-jaxb-annotations-2.14.1-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20207788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2020-7788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2020-7788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788" source="CVE"/>
    <reference ref_id="SUSE CVE-2020-7788" ref_url="https://www.suse.com/security/cve/CVE-2020-7788" source="SUSE CVE"/>
    <description>
    This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2020-7788/">CVE-2020-7788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2020-7788">CVE-2020-7788 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20210561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-0561</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-0561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0561" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010423.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0815-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XL4H6UZUJ7J37CDBIJWGDOHX5XDWRWL6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10252-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI4EVQJJHK52U3OVX236TQ775IVEFDQS/" source="SUSE-SU"/>
    <description>
    In append_to_verify_fifo_interleaved_ of stream_encoder.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174302683
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-0561">CVE-2021-0561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196660">SUSE bug 1196660</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804878" comment="flac-1.3.3-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804879" comment="flac-devel-1.3.3-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804880" comment="flac-libs-1.3.3-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20199" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20199" ref_url="https://www.suse.com/security/cve/CVE-2021-20199" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-20199/">CVE-2021-20199 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20199">CVE-2021-20199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1181640">SUSE bug 1181640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202120291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-20291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-20291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20291" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-20291" ref_url="https://www.suse.com/security/cve/CVE-2021-20291" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012287.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20291/">CVE-2021-20291 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-20291">CVE-2021-20291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196497">SUSE bug 1196497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804838" comment="buildah-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804839" comment="buildah-tests-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804755" comment="skopeo-1.9.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804756" comment="skopeo-tests-1.9.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202121708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-21708</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-21708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21708" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0847-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KW6LMSP5SUI42MJ5THSQEU35CZFOBTL3/" source="SUSE-SU"/>
    <description>
    In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-21708">CVE-2021-21708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196252">SUSE bug 1196252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804909" comment="php-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804910" comment="php-bcmath-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804911" comment="php-cli-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804912" comment="php-common-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804913" comment="php-dba-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804914" comment="php-dbg-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804915" comment="php-devel-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804916" comment="php-embedded-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804917" comment="php-enchant-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804918" comment="php-ffi-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804919" comment="php-fpm-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804920" comment="php-gd-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804921" comment="php-gmp-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804922" comment="php-intl-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804923" comment="php-ldap-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804924" comment="php-mbstring-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804925" comment="php-mysqlnd-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804926" comment="php-odbc-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804927" comment="php-opcache-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804928" comment="php-pdo-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804929" comment="php-pgsql-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804930" comment="php-process-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804931" comment="php-snmp-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804932" comment="php-soap-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804933" comment="php-xml-8.0.20-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202122570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-22570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-22570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22570" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1040-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1040-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0823-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WYCKEL27LS2QTHCEAYFVLKKSZP4MBBJQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIWUQWCBEUJG4GQZ33E3U56DPOPU6GGL/" source="SUSE-SU"/>
    <description>
    Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-22570">CVE-2021-22570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195258">SUSE bug 1195258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804803" comment="protobuf-3.14.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804804" comment="protobuf-compiler-3.14.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804805" comment="protobuf-devel-3.14.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804806" comment="protobuf-lite-3.14.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804807" comment="protobuf-lite-devel-3.14.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804808" comment="python3-protobuf-3.14.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202123648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-23648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-23648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23648" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-23648" ref_url="https://www.suse.com/security/cve/CVE-2021-23648" source="SUSE CVE"/>
    <description>
    The package @braintree/sanitize-url before 6.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper sanitization in sanitizeUrl function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-23648/">CVE-2021-23648 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-23648">CVE-2021-23648 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202125220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-25220</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-25220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011832.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0945-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CMT7WJZ5DRHFL7RDXL4VX4ECRDHO6Z74/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0946-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H45VCAWRRO6SPMMAFDPU45PJLVOMA44Y/" source="SUSE-SU"/>
    <description>
    BIND 9.11.0 -&gt; 9.11.36 9.12.0 -&gt; 9.16.26 9.17.0 -&gt; 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -&gt; 9.11.36-S1 9.16.8-S1 -&gt; 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-25220">CVE-2021-25220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804866" comment="bind-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804867" comment="bind-chroot-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804868" comment="bind-devel-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804869" comment="bind-dnssec-doc-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804870" comment="bind-dnssec-utils-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804871" comment="bind-doc-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804872" comment="bind-libs-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804873" comment="bind-license-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804874" comment="bind-utils-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805036" comment="dhcp-client-4.4.2-17.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805037" comment="dhcp-common-4.4.2-17.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805038" comment="dhcp-relay-4.4.2-17.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805039" comment="dhcp-server-4.4.2-17.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804875" comment="python3-bind-9.16.23-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202126341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-26341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-26341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26341" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-26341" ref_url="https://www.suse.com/security/cve/CVE-2021-26341" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26341/">CVE-2021-26341 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-26341">CVE-2021-26341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196901">SUSE bug 1196901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201050">SUSE bug 1201050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28153" ref_url="https://www.suse.com/security/cve/CVE-2021-28153" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1455-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1758-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016101.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.66.8. When g_file_replace() is used with G_FILE_CREATE_REPLACE_DESTINATION to replace a path that is a dangling symlink, it incorrectly also creates the target of the symlink as an empty file, which could conceivably have security relevance if the symlink is attacker-controlled. (If the path is a symlink to a file that already exists, then the contents of that file correctly remain unchanged.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28153/">CVE-2021-28153 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28153">CVE-2021-28153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1183533">SUSE bug 1183533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805051" comment="mingw32-glib2-2.70.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805052" comment="mingw32-glib2-static-2.70.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805053" comment="mingw64-glib2-2.70.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805054" comment="mingw64-glib2-static-2.70.1-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202128861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-28861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-28861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-28861" ref_url="https://www.suse.com/security/cve/CVE-2021-28861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3485-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCKKVK6RUGD7FMGWHAMOVXOTAX4JRA2I/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3511-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3512-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026107.html" source="SUSE-SU"/>
    <description>
    Python 3.x through 3.10 has an open redirection vulnerability in lib/http/server.py due to no protection against multiple (/) at the beginning of URI path which may leads to information disclosure. NOTE: this is disputed by a third party because the http.server.html documentation page states "Warning: http.server is not recommended for production. It only implements basic security checks."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28861/">CVE-2021-28861 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-28861">CVE-2021-28861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202624">SUSE bug 1202624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204077">SUSE bug 1204077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204801">SUSE bug 1204801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204802">SUSE bug 1204802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205068">SUSE bug 1205068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205075">SUSE bug 1205075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205467">SUSE bug 1205467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805019" comment="python-unversioned-command-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805020" comment="python3-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805021" comment="python3-debug-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805022" comment="python3-devel-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805023" comment="python3-idle-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805024" comment="python3-libs-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805025" comment="python3-test-3.9.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805026" comment="python3-tkinter-3.9.14-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202129390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-29390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-29390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29390" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-29390" ref_url="https://www.suse.com/security/cve/CVE-2021-29390" source="SUSE CVE"/>
    <description>
    libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-29390/">CVE-2021-29390 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-29390">CVE-2021-29390 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866664" comment="libjpeg-turbo-2.0.90-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866665" comment="libjpeg-turbo-devel-2.0.90-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866666" comment="libjpeg-turbo-utils-2.0.90-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866667" comment="turbojpeg-2.0.90-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866668" comment="turbojpeg-devel-2.0.90-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202132142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-32142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-32142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-32142" ref_url="https://www.suse.com/security/cve/CVE-2021-32142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013886.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-32142/">CVE-2021-32142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-32142">CVE-2021-32142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208470">SUSE bug 1208470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810783" comment="LibRaw-0.20.2-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810784" comment="LibRaw-devel-0.20.2-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33195" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGO7YQOALHD4E75OV7S4WAPP2UR3AXKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHOWUQKHNS4LEJ2GTYWY2EEAYVCKECW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUQZOWPTQG2RZGQ367S6AID56JYVM5T6/" source="SUSE-SU"/>
    <description>
    Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187443">SUSE bug 1187443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804838" comment="buildah-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804839" comment="buildah-tests-1.27.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33197" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGO7YQOALHD4E75OV7S4WAPP2UR3AXKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHOWUQKHNS4LEJ2GTYWY2EEAYVCKECW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUQZOWPTQG2RZGQ367S6AID56JYVM5T6/" source="SUSE-SU"/>
    <description>
    In Go before 1.15.13 and 1.16.x before 1.16.5, some configurations of ReverseProxy (from net/http/httputil) result in a situation where an attacker is able to drop arbitrary headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187444">SUSE bug 1187444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804838" comment="buildah-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804839" comment="buildah-tests-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33198" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10289" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009104.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0950-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGO7YQOALHD4E75OV7S4WAPP2UR3AXKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2186-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EXHOWUQKHNS4LEJ2GTYWY2EEAYVCKECW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2214-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UUQZOWPTQG2RZGQ367S6AID56JYVM5T6/" source="SUSE-SU"/>
    <description>
    In Go before 1.15.13 and 1.16.x before 1.16.5, there can be a panic for a large exponent to the math/big.Rat SetString or UnmarshalText method.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187445">SUSE bug 1187445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804838" comment="buildah-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804839" comment="buildah-tests-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804755" comment="skopeo-1.9.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804756" comment="skopeo-tests-1.9.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33502" ref_url="https://www.suse.com/security/cve/CVE-2021-33502" source="SUSE CVE"/>
    <description>
    The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-33502/">CVE-2021-33502 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33502">CVE-2021-33502 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33621</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33621" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33621" ref_url="https://www.suse.com/security/cve/CVE-2021-33621" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032354.html" source="SUSE-SU"/>
    <description>
    The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33621/">CVE-2021-33621 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33621">CVE-2021-33621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205726">SUSE bug 1205726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872248" comment="ruby-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872249" comment="ruby-bundled-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872250" comment="ruby-default-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872251" comment="ruby-devel-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872252" comment="ruby-doc-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872253" comment="ruby-libs-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872254" comment="rubygem-bigdecimal-3.1.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872255" comment="rubygem-bundler-2.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872256" comment="rubygem-io-console-0.5.11-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872257" comment="rubygem-irb-1.4.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872258" comment="rubygem-json-2.6.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872259" comment="rubygem-minitest-5.15.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872264" comment="rubygem-power_assert-2.0.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872265" comment="rubygem-psych-4.0.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872266" comment="rubygem-rake-13.0.6-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872267" comment="rubygem-rbs-2.7.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872268" comment="rubygem-rdoc-6.4.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872585" comment="rubygem-rexml-3.2.5-162.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872586" comment="rubygem-rss-0.2.9-162.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872271" comment="rubygem-test-unit-3.5.3-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872272" comment="rubygem-typeprof-0.21.3-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872273" comment="rubygems-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872274" comment="rubygems-devel-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33631" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33631" ref_url="https://www.suse.com/security/cve/CVE-2021-33631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in openEuler kernel on Linux (filesystem modules) allows Forced Integer Overflow.This issue affects openEuler kernel: from 4.19.90 before 4.19.90-2401.3, from 5.10.0-60.18.0 before 5.10.0-183.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33631/">CVE-2021-33631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33631">CVE-2021-33631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219412">SUSE bug 1219412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202133655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-33655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-33655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33655" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-33655" ref_url="https://www.suse.com/security/cve/CVE-2021-33655" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    When sending malicous data to kernel by ioctl cmd FBIOPUT_VSCREENINFO,kernel will write memory out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33655/">CVE-2021-33655 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-33655">CVE-2021-33655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201635">SUSE bug 1201635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202087">SUSE bug 1202087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212291">SUSE bug 1212291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202134558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-34558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-34558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34558" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009158.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V2VBWNYDPOVJ4NFLIRNHJGULW2GKRQ4T/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1079-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KY7UHEDTSX6MOHJLHMRNQVBUTCR2XMOB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKQH4LHYIFOWBEGMGHD7S7TTV7JL4U7W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2398-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OZJXXUXBI66VV2PXRNAWN4MCE3AOHNBA/" source="SUSE-SU"/>
    <description>
    The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188229">SUSE bug 1188229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3468</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3468" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2021:442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1493-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1494-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:0694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCPLDL2TVAMUG4CYPGSPUHQ3KJXENCPN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1845-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAJ7F7M4LLALLHLSQR7PD7HCTVHGAFMX/" source="SUSE-SU"/>
    <description>
    A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3468">CVE-2021-3468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811185" comment="avahi-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811186" comment="avahi-compat-howl-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811187" comment="avahi-compat-howl-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811188" comment="avahi-compat-libdns_sd-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811189" comment="avahi-compat-libdns_sd-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811190" comment="avahi-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811191" comment="avahi-glib-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811192" comment="avahi-glib-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811193" comment="avahi-libs-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811194" comment="avahi-tools-0.8-15.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3502" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3502" ref_url="https://www.suse.com/security/cve/CVE-2021-3502" source="SUSE CVE"/>
    <description>
    A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3502/">CVE-2021-3502 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3502">CVE-2021-3502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1184846">SUSE bug 1184846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811185" comment="avahi-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811186" comment="avahi-compat-howl-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811187" comment="avahi-compat-howl-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811188" comment="avahi-compat-libdns_sd-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811189" comment="avahi-compat-libdns_sd-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811190" comment="avahi-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811191" comment="avahi-glib-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811192" comment="avahi-glib-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811193" comment="avahi-libs-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811194" comment="avahi-tools-0.8-15.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35065</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35065" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35065" ref_url="https://www.suse.com/security/cve/CVE-2021-35065" source="SUSE CVE"/>
    <description>
    The glob-parent package before 6.0.1 for Node.js allows ReDoS (regular expression denial of service) attacks against the enclosure regular expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-35065/">CVE-2021-35065 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35065">CVE-2021-35065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805997" comment="nodejs-libs-16.19.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805998" comment="nodejs-nodemon-2.0.20-3.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3507</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3507" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3507" ref_url="https://www.suse.com/security/cve/CVE-2021-3507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0879-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029043.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3507/">CVE-2021-3507 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3507">CVE-2021-3507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1185000">SUSE bug 1185000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804778" comment="qemu-guest-agent-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804779" comment="qemu-img-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804780" comment="qemu-kvm-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804781" comment="qemu-kvm-audio-pa-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804782" comment="qemu-kvm-block-curl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804783" comment="qemu-kvm-block-rbd-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804784" comment="qemu-kvm-common-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804785" comment="qemu-kvm-core-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804786" comment="qemu-kvm-device-display-virtio-gpu-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804787" comment="qemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804788" comment="qemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804789" comment="qemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804790" comment="qemu-kvm-device-display-virtio-vga-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804791" comment="qemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804792" comment="qemu-kvm-device-usb-host-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804793" comment="qemu-kvm-device-usb-redirect-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804794" comment="qemu-kvm-docs-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804795" comment="qemu-kvm-tools-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804796" comment="qemu-kvm-ui-egl-headless-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804797" comment="qemu-kvm-ui-opengl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804798" comment="qemu-pr-helper-7.0.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35937" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35937" ref_url="https://www.suse.com/security/cve/CVE-2021-35937" source="SUSE CVE"/>
    <description>
    A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35937/">CVE-2021-35937 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35937">CVE-2021-35937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157882">SUSE bug 1157882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844503" comment="python3-rpm-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844504" comment="rpm-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844505" comment="rpm-apidocs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844506" comment="rpm-build-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844507" comment="rpm-build-libs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844508" comment="rpm-cron-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844509" comment="rpm-devel-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844510" comment="rpm-libs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844511" comment="rpm-plugin-audit-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844512" comment="rpm-plugin-fapolicyd-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844513" comment="rpm-plugin-ima-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844514" comment="rpm-plugin-selinux-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844515" comment="rpm-plugin-syslog-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844516" comment="rpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844517" comment="rpm-sign-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844518" comment="rpm-sign-libs-4.16.1.3-27.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35938" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35938" ref_url="https://www.suse.com/security/cve/CVE-2021-35938" source="SUSE CVE"/>
    <description>
    A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35938/">CVE-2021-35938 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35938">CVE-2021-35938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157880">SUSE bug 1157880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844503" comment="python3-rpm-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844504" comment="rpm-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844505" comment="rpm-apidocs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844506" comment="rpm-build-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844507" comment="rpm-build-libs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844508" comment="rpm-cron-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844509" comment="rpm-devel-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844510" comment="rpm-libs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844511" comment="rpm-plugin-audit-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844512" comment="rpm-plugin-fapolicyd-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844513" comment="rpm-plugin-ima-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844514" comment="rpm-plugin-selinux-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844515" comment="rpm-plugin-syslog-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844516" comment="rpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844517" comment="rpm-sign-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844518" comment="rpm-sign-libs-4.16.1.3-27.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202135939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-35939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-35939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35939" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-35939" ref_url="https://www.suse.com/security/cve/CVE-2021-35939" source="SUSE CVE"/>
    <description>
    It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35939/">CVE-2021-35939 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-35939">CVE-2021-35939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1157883">SUSE bug 1157883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844503" comment="python3-rpm-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844504" comment="rpm-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844505" comment="rpm-apidocs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844506" comment="rpm-build-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844507" comment="rpm-build-libs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844508" comment="rpm-cron-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844509" comment="rpm-devel-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844510" comment="rpm-libs-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844511" comment="rpm-plugin-audit-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844512" comment="rpm-plugin-fapolicyd-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844513" comment="rpm-plugin-ima-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844514" comment="rpm-plugin-selinux-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844515" comment="rpm-plugin-syslog-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844516" comment="rpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844517" comment="rpm-sign-4.16.1.3-27.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844518" comment="rpm-sign-libs-4.16.1.3-27.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3611" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020313.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1202-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7XTOHNMISPT4N5NUXQJPKV5LQNNGSMFI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ER233YMIXQ2HKJ4RY4ISGXE5VKXBEVPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2474-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LOEJDVTTKRPTW4JLAPXEN46YAGYFJMDT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:2591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W3DOLLXJN6UCIAFW2F6437T6CGXJTVQO/" source="SUSE-SU"/>
    <description>
    A stack overflow vulnerability was found in the Intel HD Audio device (intel-hda) of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition. The highest threat from this vulnerability is to system availability. This flaw affects QEMU versions prior to 7.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3611">CVE-2021-3611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193914">SUSE bug 1193914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804778" comment="qemu-guest-agent-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804779" comment="qemu-img-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804780" comment="qemu-kvm-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804781" comment="qemu-kvm-audio-pa-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804782" comment="qemu-kvm-block-curl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804783" comment="qemu-kvm-block-rbd-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804784" comment="qemu-kvm-common-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804785" comment="qemu-kvm-core-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804786" comment="qemu-kvm-device-display-virtio-gpu-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804787" comment="qemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804788" comment="qemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804789" comment="qemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804790" comment="qemu-kvm-device-display-virtio-vga-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804791" comment="qemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804792" comment="qemu-kvm-device-usb-host-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804793" comment="qemu-kvm-device-usb-redirect-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804794" comment="qemu-kvm-docs-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804795" comment="qemu-kvm-tools-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804796" comment="qemu-kvm-ui-egl-headless-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804797" comment="qemu-kvm-ui-opengl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804798" comment="qemu-pr-helper-7.0.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:37-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2021:747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:14849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-September/020289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009872.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1271-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TKO35W4C75JOXT46ZWC6Y4OFM23PXCNX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UNTKFNNFNHHX5QOW7C4SZXLANXGXQCYJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3205-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUF5M64CM26PNMNFO4R3S57DLRRNSTVG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3876-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JOIHHN3KQX7O34NG25NJOF7PFEZF2TVP/" source="SUSE-SU"/>
    <description>
    A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3640">CVE-2021-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191530">SUSE bug 1191530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196810">SUSE bug 1196810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196914">SUSE bug 1196914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3750" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3750" ref_url="https://www.suse.com/security/cve/CVE-2021-3750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A DMA reentrancy issue was found in the USB EHCI controller emulation of QEMU. EHCI does not verify if the Buffer Pointer overlaps with its MMIO region when it transfers the USB packets. Crafted content may be written to the controller's registers and trigger undesirable actions (such as reset) while the device is still transferring packets. This can ultimately lead to a use-after-free issue. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code within the context of the QEMU process on the host. This flaw affects QEMU versions before 7.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3750/">CVE-2021-3750 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3750">CVE-2021-3750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1190011">SUSE bug 1190011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190015">SUSE bug 1190015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193880">SUSE bug 1193880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804778" comment="qemu-guest-agent-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804779" comment="qemu-img-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804780" comment="qemu-kvm-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804781" comment="qemu-kvm-audio-pa-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804782" comment="qemu-kvm-block-curl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804783" comment="qemu-kvm-block-rbd-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804784" comment="qemu-kvm-common-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804785" comment="qemu-kvm-core-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804786" comment="qemu-kvm-device-display-virtio-gpu-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804787" comment="qemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804788" comment="qemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804789" comment="qemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804790" comment="qemu-kvm-device-display-virtio-vga-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804791" comment="qemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804792" comment="qemu-kvm-device-usb-host-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804793" comment="qemu-kvm-device-usb-redirect-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804794" comment="qemu-kvm-docs-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804795" comment="qemu-kvm-tools-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804796" comment="qemu-kvm-ui-egl-headless-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804797" comment="qemu-kvm-ui-opengl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804798" comment="qemu-pr-helper-7.0.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:0511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0657-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NCH4EEBMT6XZIRNVGTNBOCQCY4JVZ4IN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0704-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4BTHU2F626CTZYCXOBT5S7GWU3QXNTMZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VAM6LOV2R24IH5PPUWLXB64PALLMBOTU/" source="SUSE-SU"/>
    <description>
    ansi-regex is vulnerable to Inefficient Regular Expression Complexity
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3807">CVE-2021-3807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3826" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3826" ref_url="https://www.suse.com/security/cve/CVE-2021-3826" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013145.html" source="SUSE-SU"/>
    <description>
    Heap/stack buffer overflow in the dlang_lname function in d-demangle.c in libiberty allows attackers to potentially cause a denial of service (segmentation fault and crash) via a crafted mangled symbol.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3826/">CVE-2021-3826 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3826">CVE-2021-3826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202969">SUSE bug 1202969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810785" comment="gdb-10.2-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810786" comment="gdb-doc-10.2-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810787" comment="gdb-gdbserver-10.2-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810788" comment="gdb-headless-10.2-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810789" comment="gdb-minimal-10.2-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3839" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3839" ref_url="https://www.suse.com/security/cve/CVE-2021-3839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011406.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the vhost library in DPDK. Function vhost_user_set_inflight_fd() does not validate `msg-&gt;payload.inflight.num_queues`, possibly causing out-of-bounds memory read/write. Any software using DPDK vhost library may crash as a result of this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3839/">CVE-2021-3839 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3839">CVE-2021-3839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198963">SUSE bug 1198963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804956" comment="dpdk-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804957" comment="dpdk-devel-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804958" comment="dpdk-doc-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804959" comment="dpdk-tools-21.11.2-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202138578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-38578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-38578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38578" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-38578" ref_url="https://www.suse.com/security/cve/CVE-2021-38578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1958-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029445.html" source="SUSE-SU"/>
    <description>
    Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-38578/">CVE-2021-38578 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-38578">CVE-2021-38578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196741">SUSE bug 1196741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805695" comment="edk2-ovmf-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805696" comment="edk2-tools-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805697" comment="edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20213903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-3903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-3903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3903" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-3903" ref_url="https://www.suse.com/security/cve/CVE-2021-3903" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    vim is vulnerable to Heap-based Buffer Overflow
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3903/">CVE-2021-3903 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-3903">CVE-2021-3903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192167">SUSE bug 1192167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953751" comment="vim-X11-8.2.2637-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953752" comment="vim-common-8.2.2637-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953753" comment="vim-enhanced-8.2.2637-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953754" comment="vim-filesystem-8.2.2637-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953755" comment="vim-minimal-8.2.2637-21.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202140153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-40153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-40153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40153" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-40153" ref_url="https://www.suse.com/security/cve/CVE-2021-40153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40153/">CVE-2021-40153 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-40153">CVE-2021-40153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866722" comment="squashfs-tools-4.4-10.git1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4024" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4024" ref_url="https://www.suse.com/security/cve/CVE-2021-4024" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10289" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:23018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:23018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5BA2TLW7O5ZURGQUAQUH4HD5SQYNDDZ6/" source="SUSE-SU"/>
    <description>
    A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker can potentially use the `gvproxy` API to forward ports on the host to ports in the VM, making private services on the VM accessible to the network. This issue could be also used to interrupt the host's services by forwarding all ports to the VM.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4024/">CVE-2021-4024 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4024">CVE-2021-4024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193166">SUSE bug 1193166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41043</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41043" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41043" ref_url="https://www.suse.com/security/cve/CVE-2021-41043" source="SUSE CVE"/>
    <description>
    Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-41043/">CVE-2021-41043 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41043">CVE-2021-41043 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866521" comment="tcpdump-4.99.0-9.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202141072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-41072</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-41072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41072" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-41072" ref_url="https://www.suse.com/security/cve/CVE-2021-41072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035988.html" source="SUSE-SU"/>
    <description>
    squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-41072/">CVE-2021-41072 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-41072">CVE-2021-41072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1189936">SUSE bug 1189936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866722" comment="squashfs-tools-4.4-10.git1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20214158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-4158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-4158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4158" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-4158" ref_url="https://www.suse.com/security/cve/CVE-2021-4158" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference issue was found in the ACPI code of QEMU. A malicious, privileged user within the guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-4158/">CVE-2021-4158 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-4158">CVE-2021-4158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194063">SUSE bug 1194063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804778" comment="qemu-guest-agent-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804779" comment="qemu-img-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804780" comment="qemu-kvm-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804781" comment="qemu-kvm-audio-pa-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804782" comment="qemu-kvm-block-curl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804783" comment="qemu-kvm-block-rbd-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804784" comment="qemu-kvm-common-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804785" comment="qemu-kvm-core-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804786" comment="qemu-kvm-device-display-virtio-gpu-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804787" comment="qemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804788" comment="qemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804789" comment="qemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804790" comment="qemu-kvm-device-display-virtio-vga-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804791" comment="qemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804792" comment="qemu-kvm-device-usb-host-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804793" comment="qemu-kvm-device-usb-redirect-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804794" comment="qemu-kvm-docs-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804795" comment="qemu-kvm-tools-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804796" comment="qemu-kvm-ui-egl-headless-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804797" comment="qemu-kvm-ui-opengl-7.0.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804798" comment="qemu-pr-helper-7.0.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202142340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-42340</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-42340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42340" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-42340" ref_url="https://www.suse.com/security/cve/CVE-2021-42340" source="SUSE CVE"/>
    <description>
    The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-42340/">CVE-2021-42340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-42340">CVE-2021-42340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1191789">SUSE bug 1191789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053625" comment="pki-servlet-4.0-api-9.0.50-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053626" comment="pki-servlet-engine-9.0.50-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43519" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43519" ref_url="https://www.suse.com/security/cve/CVE-2021-43519" source="SUSE CVE"/>
    <description>
    Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43519/">CVE-2021-43519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43519">CVE-2021-43519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192613">SUSE bug 1192613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805365" comment="lua-5.4.4-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805366" comment="lua-devel-5.4.4-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805367" comment="lua-libs-5.4.4-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43612</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43612" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43612" ref_url="https://www.suse.com/security/cve/CVE-2021-43612" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9158" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000571.html" source="SUSE-SU"/>
    <description>
    In lldpd before 1.0.13, when decoding SONMP packets in the sonmp_decode function, it's possible to trigger an out-of-bounds heap read via short SONMP packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43612/">CVE-2021-43612 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43612">CVE-2021-43612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194683">SUSE bug 1194683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953640" comment="lldpd-1.0.18-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953641" comment="lldpd-devel-1.0.18-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43618" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2021:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:14-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:24-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:25-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:26-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:27-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:52-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:53-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:54-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:55-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:56-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:57-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:63-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:64-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:65-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:66-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:67-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:68-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:69-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:70-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:71-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:72-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:73-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:74-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:75-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:76-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:77-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:78-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:79-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:80-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:81-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:82-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:83-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:84-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:85-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:86-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:88-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:89-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:90-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:95-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:3946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009846.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1569-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B57NW5VYILA46TZMVY3NWIAZTPRTGTXJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:3946-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R45QGO5IGOQU6FDWBSNSZHXXXTFJHN5O/" source="SUSE-SU"/>
    <description>
    GNU Multiple Precision Arithmetic Library (GMP) through 6.2.1 has an mpz/inp_raw.c integer overflow and resultant buffer overflow via crafted input, leading to a segmentation fault on 32-bit platforms.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43618">CVE-2021-43618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811172" comment="gmp-6.2.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811173" comment="gmp-c++-6.2.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811174" comment="gmp-devel-6.2.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202143784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-43784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-43784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43784" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:2-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:28-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:29-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:3-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:30-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:49-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2021:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009902.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:1625-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XCIUJE3F5UEWI5TYYL5CQ7SCQZU5V76Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2021:4171-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6DD7LA7CG2OYZJT2SOA3MHVO7GOW3ANO/" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc, netlink is used internally as a serialization system for specifying the relevant container configuration to the `C` portion of the code (responsible for the based namespace setup of containers). In all versions of runc prior to 1.0.3, the encoder did not handle the possibility of an integer overflow in the 16-bit length field for the byte array attribute type, meaning that a large enough malicious byte array attribute could result in the length overflowing and the attribute contents being parsed as netlink messages for container configuration. This vulnerability requires the attacker to have some control over the configuration of the container and would allow the attacker to bypass the namespace restrictions of the container by simply adding their own netlink payload which disables all namespaces. The main users impacted are those who allow untrusted images with untrusted configurations to run on their machines (such as with shared cloud infrastructure). runc version 1.0.3 contains a fix for this bug. As a workaround, one may try disallowing untrusted namespace paths from your container. It should be noted that untrusted namespace paths would allow the attacker to disable namespace protections entirely even in the absence of this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2021-43784">CVE-2021-43784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1193436">SUSE bug 1193436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810790" comment="runc-1.1.9-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44269" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44269" ref_url="https://www.suse.com/security/cve/CVE-2021-44269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010546.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MA3ZHJ2SJ5F7RD4MVUADLVJ2VXDS4AOS/" source="SUSE-SU"/>
    <description>
    An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44269/">CVE-2021-44269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44269">CVE-2021-44269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197020">SUSE bug 1197020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804892" comment="wavpack-5.4.0-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804893" comment="wavpack-devel-5.4.0-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44648" ref_url="https://www.suse.com/security/cve/CVE-2021-44648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012198.html" source="SUSE-SU"/>
    <description>
    GNOME gdk-pixbuf 2.42.6 is vulnerable to a heap-buffer overflow vulnerability when decoding the lzw compressed stream of image data in GIF files with lzw minimum code size equals to 12.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44648/">CVE-2021-44648 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44648">CVE-2021-44648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194633">SUSE bug 1194633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805717" comment="gdk-pixbuf2-2.42.6-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805718" comment="gdk-pixbuf2-devel-2.42.6-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805719" comment="gdk-pixbuf2-modules-2.42.6-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44906</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011320.html" source="SUSE-SU"/>
    <description>
    Minimist &lt;=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44906">CVE-2021-44906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805203" comment="nodejs-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805204" comment="nodejs-docs-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805205" comment="nodejs-full-i18n-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805206" comment="nodejs-libs-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805207" comment="nodejs-nodemon-2.0.20-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805208" comment="npm-8.19.2-1.16.18.1.3.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202144964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-44964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-44964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44964" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-44964" ref_url="https://www.suse.com/security/cve/CVE-2021-44964" source="SUSE CVE"/>
    <description>
    Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44964/">CVE-2021-44964 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-44964">CVE-2021-44964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197165">SUSE bug 1197165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805365" comment="lua-5.4.4-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805366" comment="lua-devel-5.4.4-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805367" comment="lua-libs-5.4.4-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46195" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46195" ref_url="https://www.suse.com/security/cve/CVE-2021-46195" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013145.html" source="SUSE-SU"/>
    <description>
    GCC v12.0 was discovered to contain an uncontrolled recursion via the component libiberty/rust-demangle.c. This vulnerability allows attackers to cause a Denial of Service (DoS) by consuming excessive CPU and memory resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46195/">CVE-2021-46195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46195">CVE-2021-46195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194783">SUSE bug 1194783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805043" comment="mingw32-cpp-12.0.1-11.2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805044" comment="mingw32-gcc-12.0.1-11.2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805045" comment="mingw32-gcc-c++-12.0.1-11.2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805046" comment="mingw32-libgcc-12.0.1-11.2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805047" comment="mingw64-cpp-12.0.1-11.2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805048" comment="mingw64-gcc-12.0.1-11.2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805049" comment="mingw64-gcc-c++-12.0.1-11.2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805050" comment="mingw64-libgcc-12.0.1-11.2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46659</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46659" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46659">CVE-2021-46659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195339">SUSE bug 1195339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46661" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46661">CVE-2021-46661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46663" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46663">CVE-2021-46663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46664" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46664">CVE-2021-46664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46665</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46665" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46665">CVE-2021-46665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46668" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46668">CVE-2021-46668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46669" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46669" ref_url="https://www.suse.com/security/cve/CVE-2021-46669" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-46669/">CVE-2021-46669 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46669">CVE-2021-46669 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46784" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46784" ref_url="https://www.suse.com/security/cve/CVE-2021-46784" source="SUSE CVE"/>
		<reference ref_id="GHSA-f5cp-6rh3-284w" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-f5cp-6rh3-284w" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011655.html" source="SUSE-SU"/>
    <description>
    In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due to improper buffer management, a Denial of Service can occur when processing long Gopher server responses.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46784/">CVE-2021-46784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46784">CVE-2021-46784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200907">SUSE bug 1200907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804335" comment="squid-5.2-1.el9_0.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46790" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46790" ref_url="https://www.suse.com/security/cve/CVE-2021-46790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011934.html" source="SUSE-SU"/>
    <description>
    ntfsck in NTFS-3G through 2021.8.22 has a heap-based buffer overflow involving buffer+512*3-2. NOTE: the upstream position is that ntfsck is deprecated; however, it is shipped by some Linux distributions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-46790/">CVE-2021-46790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46790">CVE-2021-46790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199139">SUSE bug 1199139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805713" comment="libguestfs-winsupport-9.2-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46822" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46822" ref_url="https://www.suse.com/security/cve/CVE-2021-46822" source="SUSE CVE"/>
    <description>
    The PPM reader in libjpeg-turbo through 2.0.90 mishandles use of tjLoadImage for loading a 16-bit binary PPM file into a grayscale buffer and loading a 16-bit binary PGM file into an RGB buffer. This is related to a heap-based buffer overflow in the get_word_rgb_row function in rdppm.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46822/">CVE-2021-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46822">CVE-2021-46822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200720">SUSE bug 1200720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805413" comment="libjpeg-turbo-2.0.90-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805414" comment="libjpeg-turbo-devel-2.0.90-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805415" comment="libjpeg-turbo-utils-2.0.90-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805416" comment="turbojpeg-2.0.90-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805417" comment="turbojpeg-devel-2.0.90-6.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46828" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46828" ref_url="https://www.suse.com/security/cve/CVE-2021-46828" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012722.html" source="SUSE-SU"/>
    <description>
    In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46828/">CVE-2021-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46828">CVE-2021-46828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201680">SUSE bug 1201680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206259">SUSE bug 1206259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209708">SUSE bug 1209708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805041" comment="libtirpc-1.3.3-0.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805042" comment="libtirpc-devel-1.3.3-0.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46829</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46829" ref_url="https://www.suse.com/security/cve/CVE-2021-46829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012066.html" source="SUSE-SU"/>
    <description>
    GNOME GdkPixbuf (aka GDK-PixBuf) before 2.42.8 allows a heap-based buffer overflow when compositing or clearing frames in GIF files, as demonstrated by io-gif-animation.c composite_frame. This overflow is controllable and could be abused for code execution, especially on 32-bit systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46829/">CVE-2021-46829 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46829">CVE-2021-46829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201826">SUSE bug 1201826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805717" comment="gdk-pixbuf2-2.42.6-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805718" comment="gdk-pixbuf2-devel-2.42.6-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805719" comment="gdk-pixbuf2-modules-2.42.6-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202146848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-46848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-46848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-46848" ref_url="https://www.suse.com/security/cve/CVE-2021-46848" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012773.html" source="SUSE-SU"/>
    <description>
    GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46848/">CVE-2021-46848 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-46848">CVE-2021-46848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204690">SUSE bug 1204690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205081">SUSE bug 1205081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205311">SUSE bug 1205311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208025">SUSE bug 1208025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805271" comment="libtasn1-4.16.0-8.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805272" comment="libtasn1-devel-4.16.0-8.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805273" comment="libtasn1-tools-4.16.0-8.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47099" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47099" ref_url="https://www.suse.com/security/cve/CVE-2021-47099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

veth: ensure skb entering GRO are not cloned.

After commit d3256efd8e8b ("veth: allow enabling NAPI even without XDP"),
if GRO is enabled on a veth device and TSO is disabled on the peer
device, TCP skbs will go through the NAPI callback. If there is no XDP
program attached, the veth code does not perform any share check, and
shared/cloned skbs could enter the GRO engine.

Ignat reported a BUG triggered later-on due to the above condition:

[   53.970529][    C1] kernel BUG at net/core/skbuff.c:3574!
[   53.981755][    C1] invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
[   53.982634][    C1] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc5+ #25
[   53.982634][    C1] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
[   53.982634][    C1] RIP: 0010:skb_shift+0x13ef/0x23b0
[   53.982634][    C1] Code: ea 03 0f b6 04 02 48 89 fa 83 e2 07 38 d0
7f 08 84 c0 0f 85 41 0c 00 00 41 80 7f 02 00 4d 8d b5 d0 00 00 00 0f
85 74 f5 ff ff &lt;0f&gt; 0b 4d 8d 77 20 be 04 00 00 00 4c 89 44 24 78 4c 89
f7 4c 89 8c
[   53.982634][    C1] RSP: 0018:ffff8881008f7008 EFLAGS: 00010246
[   53.982634][    C1] RAX: 0000000000000000 RBX: ffff8881180b4c80 RCX: 0000000000000000
[   53.982634][    C1] RDX: 0000000000000002 RSI: ffff8881180b4d3c RDI: ffff88810bc9cac2
[   53.982634][    C1] RBP: ffff8881008f70b8 R08: ffff8881180b4cf4 R09: ffff8881180b4cf0
[   53.982634][    C1] R10: ffffed1022999e5c R11: 0000000000000002 R12: 0000000000000590
[   53.982634][    C1] R13: ffff88810f940c80 R14: ffff88810f940d50 R15: ffff88810bc9cac0
[   53.982634][    C1] FS:  0000000000000000(0000) GS:ffff888235880000(0000) knlGS:0000000000000000
[   53.982634][    C1] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   53.982634][    C1] CR2: 00007ff5f9b86680 CR3: 0000000108ce8004 CR4: 0000000000170ee0
[   53.982634][    C1] Call Trace:
[   53.982634][    C1]  &lt;TASK&gt;
[   53.982634][    C1]  tcp_sacktag_walk+0xaba/0x18e0
[   53.982634][    C1]  tcp_sacktag_write_queue+0xe7b/0x3460
[   53.982634][    C1]  tcp_ack+0x2666/0x54b0
[   53.982634][    C1]  tcp_rcv_established+0x4d9/0x20f0
[   53.982634][    C1]  tcp_v4_do_rcv+0x551/0x810
[   53.982634][    C1]  tcp_v4_rcv+0x22ed/0x2ed0
[   53.982634][    C1]  ip_protocol_deliver_rcu+0x96/0xaf0
[   53.982634][    C1]  ip_local_deliver_finish+0x1e0/0x2f0
[   53.982634][    C1]  ip_sublist_rcv_finish+0x211/0x440
[   53.982634][    C1]  ip_list_rcv_finish.constprop.0+0x424/0x660
[   53.982634][    C1]  ip_list_rcv+0x2c8/0x410
[   53.982634][    C1]  __netif_receive_skb_list_core+0x65c/0x910
[   53.982634][    C1]  netif_receive_skb_list_internal+0x5f9/0xcb0
[   53.982634][    C1]  napi_complete_done+0x188/0x6e0
[   53.982634][    C1]  gro_cell_poll+0x10c/0x1d0
[   53.982634][    C1]  __napi_poll+0xa1/0x530
[   53.982634][    C1]  net_rx_action+0x567/0x1270
[   53.982634][    C1]  __do_softirq+0x28a/0x9ba
[   53.982634][    C1]  run_ksoftirqd+0x32/0x60
[   53.982634][    C1]  smpboot_thread_fn+0x559/0x8c0
[   53.982634][    C1]  kthread+0x3b9/0x490
[   53.982634][    C1]  ret_from_fork+0x22/0x30
[   53.982634][    C1]  &lt;/TASK&gt;

Address the issue by skipping the GRO stage for shared or cloned skbs.
To reduce the chance of OoO, try to unclone the skbs before giving up.

v1 -&gt; v2:
 - use avoid skb_copy and fallback to netif_receive_skb  - Eric
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47099/">CVE-2021-47099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47099">CVE-2021-47099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220955">SUSE bug 1220955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47103</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47103" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47103" ref_url="https://www.suse.com/security/cve/CVE-2021-47103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: fully convert sk-&gt;sk_rx_dst to RCU rules

syzbot reported various issues around early demux,
one being included in this changelog [1]

sk-&gt;sk_rx_dst is using RCU protection without clearly
documenting it.

And following sequences in tcp_v4_do_rcv()/tcp_v6_do_rcv()
are not following standard RCU rules.

[a]    dst_release(dst);
[b]    sk-&gt;sk_rx_dst = NULL;

They look wrong because a delete operation of RCU protected
pointer is supposed to clear the pointer before
the call_rcu()/synchronize_rcu() guarding actual memory freeing.

In some cases indeed, dst could be freed before [b] is done.

We could cheat by clearing sk_rx_dst before calling
dst_release(), but this seems the right time to stick
to standard RCU annotations and debugging facilities.

[1]
BUG: KASAN: use-after-free in dst_check include/net/dst.h:470 [inline]
BUG: KASAN: use-after-free in tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792
Read of size 2 at addr ffff88807f1cb73a by task syz-executor.5/9204

CPU: 0 PID: 9204 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247
 __kasan_report mm/kasan/report.c:433 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:450
 dst_check include/net/dst.h:470 [inline]
 tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792
 ip_rcv_finish_core.constprop.0+0x15de/0x1e80 net/ipv4/ip_input.c:340
 ip_list_rcv_finish.constprop.0+0x1b2/0x6e0 net/ipv4/ip_input.c:583
 ip_sublist_rcv net/ipv4/ip_input.c:609 [inline]
 ip_list_rcv+0x34e/0x490 net/ipv4/ip_input.c:644
 __netif_receive_skb_list_ptype net/core/dev.c:5508 [inline]
 __netif_receive_skb_list_core+0x549/0x8e0 net/core/dev.c:5556
 __netif_receive_skb_list net/core/dev.c:5608 [inline]
 netif_receive_skb_list_internal+0x75e/0xd80 net/core/dev.c:5699
 gro_normal_list net/core/dev.c:5853 [inline]
 gro_normal_list net/core/dev.c:5849 [inline]
 napi_complete_done+0x1f1/0x880 net/core/dev.c:6590
 virtqueue_napi_complete drivers/net/virtio_net.c:339 [inline]
 virtnet_poll+0xca2/0x11b0 drivers/net/virtio_net.c:1557
 __napi_poll+0xaf/0x440 net/core/dev.c:7023
 napi_poll net/core/dev.c:7090 [inline]
 net_rx_action+0x801/0xb40 net/core/dev.c:7177
 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558
 invoke_softirq kernel/softirq.c:432 [inline]
 __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649
 common_interrupt+0x52/0xc0 arch/x86/kernel/irq.c:240
 asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629
RIP: 0033:0x7f5e972bfd57
Code: 39 d1 73 14 0f 1f 80 00 00 00 00 48 8b 50 f8 48 83 e8 08 48 39 ca 77 f3 48 39 c3 73 3e 48 89 13 48 8b 50 f8 48 89 38 49 8b 0e &lt;48&gt; 8b 3e 48 83 c3 08 48 83 c6 08 eb bc 48 39 d1 72 9e 48 39 d0 73
RSP: 002b:00007fff8a413210 EFLAGS: 00000283
RAX: 00007f5e97108990 RBX: 00007f5e97108338 RCX: ffffffff81d3aa45
RDX: ffffffff81d3aa45 RSI: 00007f5e97108340 RDI: ffffffff81d3aa45
RBP: 00007f5e97107eb8 R08: 00007f5e97108d88 R09: 0000000093c2e8d9
R10: 0000000000000000 R11: 0000000000000000 R12: 00007f5e97107eb0
R13: 00007f5e97108338 R14: 00007f5e97107ea8 R15: 0000000000000019
 &lt;/TASK&gt;

Allocated by task 13:
 kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38
 kasan_set_track mm/kasan/common.c:46 [inline]
 set_alloc_info mm/kasan/common.c:434 [inline]
 __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:467
 kasan_slab_alloc include/linux/kasan.h:259 [inline]
 slab_post_alloc_hook mm/slab.h:519 [inline]
 slab_alloc_node mm/slub.c:3234 [inline]
 slab_alloc mm/slub.c:3242 [inline]
 kmem_cache_alloc+0x202/0x3a0 mm/slub.c:3247
 dst_alloc+0x146/0x1f0 net/core/dst.c:92
 rt_dst_alloc+0x73/0x430 net/ipv4/route.c:1613
 ip_route_input_slow+0x1817/0x3a20 net/ipv4/route.c:234
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47103/">CVE-2021-47103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47103">CVE-2021-47103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221010">SUSE bug 1221010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47373" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47373" ref_url="https://www.suse.com/security/cve/CVE-2021-47373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Fix potential VPE leak on error

In its_vpe_irq_domain_alloc, when its_vpe_init() returns an error,
there is an off-by-one in the number of VPEs to be freed.

Fix it by simply passing the number of VPEs allocated, which is the
index of the loop iterating over the VPEs.

[maz: fixed commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47373/">CVE-2021-47373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47373">CVE-2021-47373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47378" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47378" ref_url="https://www.suse.com/security/cve/CVE-2021-47378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3014-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3021-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3027-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: destroy cm id before destroy qp to avoid use after free

We should always destroy cm_id before destroy qp to avoid to get cma
event after qp was destroyed, which may lead to use after free.
In RDMA connection establishment error flow, don't destroy qp in cm
event handler.Just report cm_error to upper level, qp will be destroy
in nvme_rdma_alloc_queue() after destroy cm id.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47378/">CVE-2021-47378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47378">CVE-2021-47378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225201">SUSE bug 1225201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225202">SUSE bug 1225202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47383" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47383" ref_url="https://www.suse.com/security/cve/CVE-2021-47383" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: Fix out-of-bound vmalloc access in imageblit

This issue happens when a userspace program does an ioctl
FBIOPUT_VSCREENINFO passing the fb_var_screeninfo struct
containing only the fields xres, yres, and bits_per_pixel
with values.

If this struct is the same as the previous ioctl, the
vc_resize() detects it and doesn't call the resize_screen(),
leaving the fb_var_screeninfo incomplete. And this leads to
the updatescrollmode() calculates a wrong value to
fbcon_display-&gt;vrows, which makes the real_y() return a
wrong value of y, and that value, eventually, causes
the imageblit to access an out-of-bound address value.

To solve this issue I made the resize_screen() be called
even if the screen does not need any resizing, so it will
"fix and fill" the fb_var_screeninfo independently.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-47383/">CVE-2021-47383 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47383">CVE-2021-47383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225208">SUSE bug 1225208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225211">SUSE bug 1225211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47385" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47385" ref_url="https://www.suse.com/security/cve/CVE-2021-47385" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field

If driver read val value sufficient for
(val &amp; 0x08) &amp;&amp; (!(val &amp; 0x80)) &amp;&amp; ((val &amp; 0x7) == ((val &gt;&gt; 4) &amp; 0x7))
from device then Null pointer dereference occurs.
(It is possible if tmp = 0b0xyz1xyz, where same literals mean same numbers)
Also lm75[] does not serve a purpose anymore after switching to
devm_i2c_new_dummy_device() in w83791d_detect_subclients().

The patch fixes possible NULL pointer dereference by removing lm75[].

Found by Linux Driver Verification project (linuxtesting.org).

[groeck: Dropped unnecessary continuation lines, fixed multipline alignment]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47385/">CVE-2021-47385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47385">CVE-2021-47385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225210">SUSE bug 1225210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47393" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47393" ref_url="https://www.suse.com/security/cve/CVE-2021-47393" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs

Fan speed minimum can be enforced from sysfs. For example, setting
current fan speed to 20 is used to enforce fan speed to be at 100%
speed, 19 - to be not below 90% speed, etcetera. This feature provides
ability to limit fan speed according to some system wise
considerations, like absence of some replaceable units or high system
ambient temperature.

Request for changing fan minimum speed is configuration request and can
be set only through 'sysfs' write procedure. In this situation value of
argument 'state' is above nominal fan speed maximum.

Return non-zero code in this case to avoid
thermal_cooling_device_stats_update() call, because in this case
statistics update violates thermal statistics table range.
The issues is observed in case kernel is configured with option
CONFIG_THERMAL_STATISTICS.

Here is the trace from KASAN:
[  159.506659] BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x7d/0xb0
[  159.516016] Read of size 4 at addr ffff888116163840 by task hw-management.s/7444
[  159.545625] Call Trace:
[  159.548366]  dump_stack+0x92/0xc1
[  159.552084]  ? thermal_cooling_device_stats_update+0x7d/0xb0
[  159.635869]  thermal_zone_device_update+0x345/0x780
[  159.688711]  thermal_zone_device_set_mode+0x7d/0xc0
[  159.694174]  mlxsw_thermal_modules_init+0x48f/0x590 [mlxsw_core]
[  159.700972]  ? mlxsw_thermal_set_cur_state+0x5a0/0x5a0 [mlxsw_core]
[  159.731827]  mlxsw_thermal_init+0x763/0x880 [mlxsw_core]
[  160.070233] RIP: 0033:0x7fd995909970
[  160.074239] Code: 73 01 c3 48 8b 0d 28 d5 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 99 2d 2c 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ..
[  160.095242] RSP: 002b:00007fff54f5d938 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  160.103722] RAX: ffffffffffffffda RBX: 0000000000000013 RCX: 00007fd995909970
[  160.111710] RDX: 0000000000000013 RSI: 0000000001906008 RDI: 0000000000000001
[  160.119699] RBP: 0000000001906008 R08: 00007fd995bc9760 R09: 00007fd996210700
[  160.127687] R10: 0000000000000073 R11: 0000000000000246 R12: 0000000000000013
[  160.135673] R13: 0000000000000001 R14: 00007fd995bc8600 R15: 0000000000000013
[  160.143671]
[  160.145338] Allocated by task 2924:
[  160.149242]  kasan_save_stack+0x19/0x40
[  160.153541]  __kasan_kmalloc+0x7f/0xa0
[  160.157743]  __kmalloc+0x1a2/0x2b0
[  160.161552]  thermal_cooling_device_setup_sysfs+0xf9/0x1a0
[  160.167687]  __thermal_cooling_device_register+0x1b5/0x500
[  160.173833]  devm_thermal_of_cooling_device_register+0x60/0xa0
[  160.180356]  mlxreg_fan_probe+0x474/0x5e0 [mlxreg_fan]
[  160.248140]
[  160.249807] The buggy address belongs to the object at ffff888116163400
[  160.249807]  which belongs to the cache kmalloc-1k of size 1024
[  160.263814] The buggy address is located 64 bytes to the right of
[  160.263814]  1024-byte region [ffff888116163400, ffff888116163800)
[  160.277536] The buggy address belongs to the page:
[  160.282898] page:0000000012275840 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888116167000 pfn:0x116160
[  160.294872] head:0000000012275840 order:3 compound_mapcount:0 compound_pincount:0
[  160.303251] flags: 0x200000000010200(slab|head|node=0|zone=2)
[  160.309694] raw: 0200000000010200 ffffea00046f7208 ffffea0004928208 ffff88810004dbc0
[  160.318367] raw: ffff888116167000 00000000000a0006 00000001ffffffff 0000000000000000
[  160.327033] page dumped because: kasan: bad access detected
[  160.333270]
[  160.334937] Memory state around the buggy address:
[  160.356469] &gt;ffff888116163800: fc ..
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47393/">CVE-2021-47393 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47393">CVE-2021-47393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225321">SUSE bug 1225321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47400</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47400" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47400" ref_url="https://www.suse.com/security/cve/CVE-2021-47400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: do not allow call hns3_nic_net_open repeatedly

hns3_nic_net_open() is not allowed to called repeatly, but there
is no checking for this. When doing device reset and setup tc
concurrently, there is a small oppotunity to call hns3_nic_net_open
repeatedly, and cause kernel bug by calling napi_enable twice.

The calltrace information is like below:
[ 3078.222780] ------------[ cut here ]------------
[ 3078.230255] kernel BUG at net/core/dev.c:6991!
[ 3078.236224] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[ 3078.243431] Modules linked in: hns3 hclgevf hclge hnae3 vfio_iommu_type1 vfio_pci vfio_virqfd vfio pv680_mii(O)
[ 3078.258880] CPU: 0 PID: 295 Comm: kworker/u8:5 Tainted: G           O      5.14.0-rc4+ #1
[ 3078.269102] Hardware name:  , BIOS KpxxxFPGA 1P B600 V181 08/12/2021
[ 3078.276801] Workqueue: hclge hclge_service_task [hclge]
[ 3078.288774] pstate: 60400009 (nZCv daif +PAN -UAO -TCO BTYPE=--)
[ 3078.296168] pc : napi_enable+0x80/0x84
tc qdisc sho[w  3d0e7v8 .e3t0h218 79] lr : hns3_nic_net_open+0x138/0x510 [hns3]

[ 3078.314771] sp : ffff8000108abb20
[ 3078.319099] x29: ffff8000108abb20 x28: 0000000000000000 x27: ffff0820a8490300
[ 3078.329121] x26: 0000000000000001 x25: ffff08209cfc6200 x24: 0000000000000000
[ 3078.339044] x23: ffff0820a8490300 x22: ffff08209cd76000 x21: ffff0820abfe3880
[ 3078.349018] x20: 0000000000000000 x19: ffff08209cd76900 x18: 0000000000000000
[ 3078.358620] x17: 0000000000000000 x16: ffffc816e1727a50 x15: 0000ffff8f4ff930
[ 3078.368895] x14: 0000000000000000 x13: 0000000000000000 x12: 0000259e9dbeb6b4
[ 3078.377987] x11: 0096a8f7e764eb40 x10: 634615ad28d3eab5 x9 : ffffc816ad8885b8
[ 3078.387091] x8 : ffff08209cfc6fb8 x7 : ffff0820ac0da058 x6 : ffff0820a8490344
[ 3078.396356] x5 : 0000000000000140 x4 : 0000000000000003 x3 : ffff08209cd76938
[ 3078.405365] x2 : 0000000000000000 x1 : 0000000000000010 x0 : ffff0820abfe38a0
[ 3078.414657] Call trace:
[ 3078.418517]  napi_enable+0x80/0x84
[ 3078.424626]  hns3_reset_notify_up_enet+0x78/0xd0 [hns3]
[ 3078.433469]  hns3_reset_notify+0x64/0x80 [hns3]
[ 3078.441430]  hclge_notify_client+0x68/0xb0 [hclge]
[ 3078.450511]  hclge_reset_rebuild+0x524/0x884 [hclge]
[ 3078.458879]  hclge_reset_service_task+0x3c4/0x680 [hclge]
[ 3078.467470]  hclge_service_task+0xb0/0xb54 [hclge]
[ 3078.475675]  process_one_work+0x1dc/0x48c
[ 3078.481888]  worker_thread+0x15c/0x464
[ 3078.487104]  kthread+0x160/0x170
[ 3078.492479]  ret_from_fork+0x10/0x18
[ 3078.498785] Code: c8027c81 35ffffa2 d50323bf d65f03c0 (d4210000)
[ 3078.506889] ---[ end trace 8ebe0340a1b0fb44 ]---

Once hns3_nic_net_open() is excute success, the flag
HNS3_NIC_STATE_DOWN will be cleared. So add checking for this
flag, directly return when HNS3_NIC_STATE_DOWN is no set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47400/">CVE-2021-47400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47400">CVE-2021-47400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225329">SUSE bug 1225329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47441</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47441" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47441" ref_url="https://www.suse.com/security/cve/CVE-2021-47441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: thermal: Fix out-of-bounds memory accesses

Currently, mlxsw allows cooling states to be set above the maximum
cooling state supported by the driver:

 # cat /sys/class/thermal/thermal_zone2/cdev0/type
 mlxsw_fan
 # cat /sys/class/thermal/thermal_zone2/cdev0/max_state
 10
 # echo 18 &gt; /sys/class/thermal/thermal_zone2/cdev0/cur_state
 # echo $?
 0

This results in out-of-bounds memory accesses when thermal state
transition statistics are enabled (CONFIG_THERMAL_STATISTICS=y), as the
transition table is accessed with a too large index (state) [1].

According to the thermal maintainer, it is the responsibility of the
driver to reject such operations [2].

Therefore, return an error when the state to be set exceeds the maximum
cooling state supported by the driver.

To avoid dead code, as suggested by the thermal maintainer [3],
partially revert commit a421ce088ac8 ("mlxsw: core: Extend cooling
device with cooling levels") that tried to interpret these invalid
cooling states (above the maximum) in a special way. The cooling levels
array is not removed in order to prevent the fans going below 20% PWM,
which would cause them to get stuck at 0% PWM.

[1]
BUG: KASAN: slab-out-of-bounds in thermal_cooling_device_stats_update+0x271/0x290
Read of size 4 at addr ffff8881052f7bf8 by task kworker/0:0/5

CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.15.0-rc3-custom-45935-gce1adf704b14 #122
Hardware name: Mellanox Technologies Ltd. "MSN2410-CB2FO"/"SA000874", BIOS 4.6.5 03/08/2016
Workqueue: events_freezable_power_ thermal_zone_device_check
Call Trace:
 dump_stack_lvl+0x8b/0xb3
 print_address_description.constprop.0+0x1f/0x140
 kasan_report.cold+0x7f/0x11b
 thermal_cooling_device_stats_update+0x271/0x290
 __thermal_cdev_update+0x15e/0x4e0
 thermal_cdev_update+0x9f/0xe0
 step_wise_throttle+0x770/0xee0
 thermal_zone_device_update+0x3f6/0xdf0
 process_one_work+0xa42/0x1770
 worker_thread+0x62f/0x13e0
 kthread+0x3ee/0x4e0
 ret_from_fork+0x1f/0x30

Allocated by task 1:
 kasan_save_stack+0x1b/0x40
 __kasan_kmalloc+0x7c/0x90
 thermal_cooling_device_setup_sysfs+0x153/0x2c0
 __thermal_cooling_device_register.part.0+0x25b/0x9c0
 thermal_cooling_device_register+0xb3/0x100
 mlxsw_thermal_init+0x5c5/0x7e0
 __mlxsw_core_bus_device_register+0xcb3/0x19c0
 mlxsw_core_bus_device_register+0x56/0xb0
 mlxsw_pci_probe+0x54f/0x710
 local_pci_probe+0xc6/0x170
 pci_device_probe+0x2b2/0x4d0
 really_probe+0x293/0xd10
 __driver_probe_device+0x2af/0x440
 driver_probe_device+0x51/0x1e0
 __driver_attach+0x21b/0x530
 bus_for_each_dev+0x14c/0x1d0
 bus_add_driver+0x3ac/0x650
 driver_register+0x241/0x3d0
 mlxsw_sp_module_init+0xa2/0x174
 do_one_initcall+0xee/0x5f0
 kernel_init_freeable+0x45a/0x4de
 kernel_init+0x1f/0x210
 ret_from_fork+0x1f/0x30

The buggy address belongs to the object at ffff8881052f7800
 which belongs to the cache kmalloc-1k of size 1024
The buggy address is located 1016 bytes inside of
 1024-byte region [ffff8881052f7800, ffff8881052f7c00)
The buggy address belongs to the page:
page:0000000052355272 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1052f0
head:0000000052355272 order:3 compound_mapcount:0 compound_pincount:0
flags: 0x200000000010200(slab|head|node=0|zone=2)
raw: 0200000000010200 ffffea0005034800 0000000300000003 ffff888100041dc0
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff8881052f7a80: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc
 ffff8881052f7b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff8881052f7b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                                                                ^
 ffff8881052f7c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff8881052f7c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc

[2] https://lore.kernel.org/linux-pm/9aca37cb-1629-5c67-
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47441/">CVE-2021-47441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47441">CVE-2021-47441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225224">SUSE bug 1225224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47455" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47455" ref_url="https://www.suse.com/security/cve/CVE-2021-47455" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: Fix possible memory leak in ptp_clock_register()

I got memory leak as follows when doing fault injection test:

unreferenced object 0xffff88800906c618 (size 8):
  comm "i2c-idt82p33931", pid 4421, jiffies 4294948083 (age 13.188s)
  hex dump (first 8 bytes):
    70 74 70 30 00 00 00 00                          ptp0....
  backtrace:
    [&lt;00000000312ed458&gt;] __kmalloc_track_caller+0x19f/0x3a0
    [&lt;0000000079f6e2ff&gt;] kvasprintf+0xb5/0x150
    [&lt;0000000026aae54f&gt;] kvasprintf_const+0x60/0x190
    [&lt;00000000f323a5f7&gt;] kobject_set_name_vargs+0x56/0x150
    [&lt;000000004e35abdd&gt;] dev_set_name+0xc0/0x100
    [&lt;00000000f20cfe25&gt;] ptp_clock_register+0x9f4/0xd30 [ptp]
    [&lt;000000008bb9f0de&gt;] idt82p33_probe.cold+0x8b6/0x1561 [ptp_idt82p33]

When posix_clock_register() returns an error, the name allocated
in dev_set_name() will be leaked, the put_device() should be used
to give up the device reference, then the name will be freed in
kobject_cleanup() and other memory will be freed in ptp_clock_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47455/">CVE-2021-47455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47455">CVE-2021-47455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225254">SUSE bug 1225254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47459" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47459" ref_url="https://www.suse.com/security/cve/CVE-2021-47459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv

It will trigger UAF for rx_kref of j1939_priv as following.

        cpu0                                    cpu1
j1939_sk_bind(socket0, ndev0, ...)
j1939_netdev_start
                                        j1939_sk_bind(socket1, ndev0, ...)
                                        j1939_netdev_start
j1939_priv_set
                                        j1939_priv_get_by_ndev_locked
j1939_jsk_add
.....
j1939_netdev_stop
kref_put_lock(&amp;priv-&gt;rx_kref, ...)
                                        kref_get(&amp;priv-&gt;rx_kref, ...)
                                        REFCOUNT_WARN("addition on 0;...")

====================================================
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 1 PID: 20874 at lib/refcount.c:25 refcount_warn_saturate+0x169/0x1e0
RIP: 0010:refcount_warn_saturate+0x169/0x1e0
Call Trace:
 j1939_netdev_start+0x68b/0x920
 j1939_sk_bind+0x426/0xeb0
 ? security_socket_bind+0x83/0xb0

The rx_kref's kref_get() and kref_put() should use j1939_netdev_lock to
protect.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47459/">CVE-2021-47459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47459">CVE-2021-47459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225253">SUSE bug 1225253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47515</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47515" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47515" ref_url="https://www.suse.com/security/cve/CVE-2021-47515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

seg6: fix the iif in the IPv6 socket control block

When an IPv4 packet is received, the ip_rcv_core(...) sets the receiving
interface index into the IPv4 socket control block (v5.16-rc4,
net/ipv4/ip_input.c line 510):

    IPCB(skb)-&gt;iif = skb-&gt;skb_iif;

If that IPv4 packet is meant to be encapsulated in an outer IPv6+SRH
header, the seg6_do_srh_encap(...) performs the required encapsulation.
In this case, the seg6_do_srh_encap function clears the IPv6 socket control
block (v5.16-rc4 net/ipv6/seg6_iptunnel.c line 163):

    memset(IP6CB(skb), 0, sizeof(*IP6CB(skb)));

The memset(...) was introduced in commit ef489749aae5 ("ipv6: sr: clear
IP6CB(skb) on SRH ip4ip6 encapsulation") a long time ago (2019-01-29).

Since the IPv6 socket control block and the IPv4 socket control block share
the same memory area (skb-&gt;cb), the receiving interface index info is lost
(IP6CB(skb)-&gt;iif is set to zero).

As a side effect, that condition triggers a NULL pointer dereference if
commit 0857d6f8c759 ("ipv6: When forwarding count rx stats on the orig
netdev") is applied.

To fix that issue, we set the IP6CB(skb)-&gt;iif with the index of the
receiving interface once again.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47515/">CVE-2021-47515 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47515">CVE-2021-47515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225426">SUSE bug 1225426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47548" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47548" ref_url="https://www.suse.com/security/cve/CVE-2021-47548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()

The if statement:
  if (port &gt;= DSAF_GE_NUM)
        return;

limits the value of port less than DSAF_GE_NUM (i.e., 8).
However, if the value of port is 6 or 7, an array overflow could occur:
  port_rst_off = dsaf_dev-&gt;mac_cb[port]-&gt;port_rst_off;

because the length of dsaf_dev-&gt;mac_cb is DSAF_MAX_PORT_NUM (i.e., 6).

To fix this possible array overflow, we first check port and if it is
greater than or equal to DSAF_MAX_PORT_NUM, the function returns.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47548/">CVE-2021-47548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47548">CVE-2021-47548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225506">SUSE bug 1225506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47556" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47556" ref_url="https://www.suse.com/security/cve/CVE-2021-47556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()

ethtool_set_coalesce() now uses both the .get_coalesce() and
.set_coalesce() callbacks. But the check for their availability is
buggy, so changing the coalesce settings on a device where the driver
provides only _one_ of the callbacks results in a NULL pointer
dereference instead of an -EOPNOTSUPP.

Fix the condition so that the availability of both callbacks is
ensured. This also matches the netlink code.

Note that reproducing this requires some effort - it only affects the
legacy ioctl path, and needs a specific combination of driver options:
- have .get_coalesce() and .coalesce_supported but no
 .set_coalesce(), or
- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn't
  cause the crash as it first attempts to call ethtool_get_coalesce()
  and bails out on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47556/">CVE-2021-47556 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47556">CVE-2021-47556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225383">SUSE bug 1225383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47560</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47560" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47560" ref_url="https://www.suse.com/security/cve/CVE-2021-47560" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum: Protect driver from buggy firmware

When processing port up/down events generated by the device's firmware,
the driver protects itself from events reported for non-existent local
ports, but not the CPU port (local port 0), which exists, but lacks a
netdev.

This can result in a NULL pointer dereference when calling
netif_carrier_{on,off}().

Fix this by bailing early when processing an event reported for the CPU
port. Problem was only observed when running on top of a buggy emulator.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47560/">CVE-2021-47560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47560">CVE-2021-47560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225495">SUSE bug 1225495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47572</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47572" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47572" ref_url="https://www.suse.com/security/cve/CVE-2021-47572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nexthop: fix null pointer dereference when IPv6 is not enabled

When we try to add an IPv6 nexthop and IPv6 is not enabled
(!CONFIG_IPV6) we'll hit a NULL pointer dereference[1] in the error path
of nh_create_ipv6() due to calling ipv6_stub-&gt;fib6_nh_release. The bug
has been present since the beginning of IPv6 nexthop gateway support.
Commit 1aefd3de7bc6 ("ipv6: Add fib6_nh_init and release to stubs") tells
us that only fib6_nh_init has a dummy stub because fib6_nh_release should
not be called if fib6_nh_init returns an error, but the commit below added
a call to ipv6_stub-&gt;fib6_nh_release in its error path. To fix it return
the dummy stub's -EAFNOSUPPORT error directly without calling
ipv6_stub-&gt;fib6_nh_release in nh_create_ipv6()'s error path.

[1]
 Output is a bit truncated, but it clearly shows the error.
 BUG: kernel NULL pointer dereference, address: 000000000000000000
 #PF: supervisor instruction fetch in kernel modede
 #PF: error_code(0x0010) - not-present pagege
 PGD 0 P4D 0
 Oops: 0010 [#1] PREEMPT SMP NOPTI
 CPU: 4 PID: 638 Comm: ip Kdump: loaded Not tainted 5.16.0-rc1+ #446
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
 RIP: 0010:0x0
 Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
 RSP: 0018:ffff888109f5b8f0 EFLAGS: 00010286^Ac
 RAX: 0000000000000000 RBX: ffff888109f5ba28 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881008a2860
 RBP: ffff888109f5b9d8 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff888109f5b978 R11: ffff888109f5b948 R12: 00000000ffffff9f
 R13: ffff8881008a2a80 R14: ffff8881008a2860 R15: ffff8881008a2840
 FS:  00007f98de70f100(0000) GS:ffff88822bf00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffffffffffd6 CR3: 0000000100efc000 CR4: 00000000000006e0
 Call Trace:
  &lt;TASK&gt;
  nh_create_ipv6+0xed/0x10c
  rtm_new_nexthop+0x6d7/0x13f3
  ? check_preemption_disabled+0x3d/0xf2
  ? lock_is_held_type+0xbe/0xfd
  rtnetlink_rcv_msg+0x23f/0x26a
  ? check_preemption_disabled+0x3d/0xf2
  ? rtnl_calcit.isra.0+0x147/0x147
  netlink_rcv_skb+0x61/0xb2
  netlink_unicast+0x100/0x187
  netlink_sendmsg+0x37f/0x3a0
  ? netlink_unicast+0x187/0x187
  sock_sendmsg_nosec+0x67/0x9b
  ____sys_sendmsg+0x19d/0x1f9
  ? copy_msghdr_from_user+0x4c/0x5e
  ? rcu_read_lock_any_held+0x2a/0x78
  ___sys_sendmsg+0x6c/0x8c
  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
  ? lockdep_hardirqs_on+0xd9/0x102
  ? sockfd_lookup_light+0x69/0x99
  __sys_sendmsg+0x50/0x6e
  do_syscall_64+0xcb/0xf2
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f98dea28914
 Code: 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 48 8d 05 e9 5d 0c 00 8b 00 85 c0 75 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 41 54 41 89 d4 55 48 89 f5 53
 RSP: 002b:00007fff859f5e68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e2e
 RAX: ffffffffffffffda RBX: 00000000619cb810 RCX: 00007f98dea28914
 RDX: 0000000000000000 RSI: 00007fff859f5ed0 RDI: 0000000000000003
 RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000008
 R10: fffffffffffffce6 R11: 0000000000000246 R12: 0000000000000001
 R13: 000055c0097ae520 R14: 000055c0097957fd R15: 00007fff859f63a0
 &lt;/TASK&gt;
 Modules linked in: bridge stp llc bonding virtio_net
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47572/">CVE-2021-47572 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47572">CVE-2021-47572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225389">SUSE bug 1225389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47579</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47579" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47579" ref_url="https://www.suse.com/security/cve/CVE-2021-47579" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix warning in ovl_create_real()

Syzbot triggered the following warning in ovl_workdir_create() -&gt;
ovl_create_real():

	if (!err &amp;&amp; WARN_ON(!newdentry-&gt;d_inode)) {

The reason is that the cgroup2 filesystem returns from mkdir without
instantiating the new dentry.

Weird filesystems such as this will be rejected by overlayfs at a later
stage during setup, but to prevent such a warning, call ovl_mkdir_real()
directly from ovl_workdir_create() and reject this case early.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-47579/">CVE-2021-47579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47579">CVE-2021-47579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226540">SUSE bug 1226540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47580" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47580" ref_url="https://www.suse.com/security/cve/CVE-2021-47580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_debug: Fix type in min_t to avoid stack OOB

Change min_t() to use type "u32" instead of type "int" to avoid stack out
of bounds. With min_t() type "int" the values get sign extended and the
larger value gets used causing stack out of bounds.

BUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]
BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
Read of size 127 at addr ffff888072607128 by task syz-executor.7/18707

CPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1
Hardware name: Red Hat KVM, BIOS 1.13.0-2
Call Trace:
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106
 print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189
 memcpy+0x23/0x60 mm/kasan/shadow.c:65
 memcpy include/linux/fortify-string.h:191 [inline]
 sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976
 sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000
 fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162
 fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]
 resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887
 schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478
 scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533
 scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]
 scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699
 blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639
 __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325
 blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358
 __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761
 __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838
 blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891
 blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474
 blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62
 sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836
 sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774
 sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939
 sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-47580/">CVE-2021-47580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47580">CVE-2021-47580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226550">SUSE bug 1226550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227611">SUSE bug 1227611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47592</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47592" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47592" ref_url="https://www.suse.com/security/cve/CVE-2021-47592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix tc flower deletion for VLAN priority Rx steering

To replicate the issue:-

1) Add 1 flower filter for VLAN Priority based frame steering:-
$ IFDEVNAME=eth0
$ tc qdisc add dev $IFDEVNAME ingress
$ tc qdisc add dev $IFDEVNAME root mqprio num_tc 8 \
   map 0 1 2 3 4 5 6 7 0 0 0 0 0 0 0 0 \
   queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0
$ tc filter add dev $IFDEVNAME parent ffff: protocol 802.1Q \
   flower vlan_prio 0 hw_tc 0

2) Get the 'pref' id
$ tc filter show dev $IFDEVNAME ingress

3) Delete a specific tc flower record (say pref 49151)
$ tc filter del dev $IFDEVNAME parent ffff: pref 49151

From dmesg, we will observe kernel NULL pointer ooops

[  197.170464] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  197.171367] #PF: supervisor read access in kernel mode
[  197.171367] #PF: error_code(0x0000) - not-present page
[  197.171367] PGD 0 P4D 0
[  197.171367] Oops: 0000 [#1] PREEMPT SMP NOPTI

&lt;snip&gt;

[  197.171367] RIP: 0010:tc_setup_cls+0x20b/0x4a0 [stmmac]

&lt;snip&gt;

[  197.171367] Call Trace:
[  197.171367]  &lt;TASK&gt;
[  197.171367]  ? __stmmac_disable_all_queues+0xa8/0xe0 [stmmac]
[  197.171367]  stmmac_setup_tc_block_cb+0x70/0x110 [stmmac]
[  197.171367]  tc_setup_cb_destroy+0xb3/0x180
[  197.171367]  fl_hw_destroy_filter+0x94/0xc0 [cls_flower]

The above issue is due to previous incorrect implementation of
tc_del_vlan_flow(), shown below, that uses flow_cls_offload_flow_rule()
to get struct flow_rule *rule which is no longer valid for tc filter
delete operation.

  struct flow_rule *rule = flow_cls_offload_flow_rule(cls);
  struct flow_dissector *dissector = rule-&gt;match.dissector;

So, to ensure tc_del_vlan_flow() deletes the right VLAN cls record for
earlier configured RX queue (configured by hw_tc) in tc_add_vlan_flow(),
this patch introduces stmmac_rfs_entry as driver-side flow_cls_offload
record for 'RX frame steering' tc flower, currently used for VLAN
priority. The implementation has taken consideration for future extension
to include other type RX frame steering such as EtherType based.

v2:
 - Clean up overly extensive backtrace and rewrite git message to better
   explain the kernel NULL pointer issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47592/">CVE-2021-47592 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47592">CVE-2021-47592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226572">SUSE bug 1226572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47596" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47596" ref_url="https://www.suse.com/security/cve/CVE-2021-47596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg

Currently, the hns3_remove function firstly uninstall client instance,
and then uninstall acceletion engine device. The netdevice is freed in
client instance uninstall process, but acceletion engine device uninstall
process still use it to trace runtime information. This causes a use after
free problem.

So fixes it by check the instance register state to avoid use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47596/">CVE-2021-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47596">CVE-2021-47596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226558">SUSE bug 1226558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47606</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47606" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47606" ref_url="https://www.suse.com/security/cve/CVE-2021-47606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netlink: af_netlink: Prevent empty skb by adding a check on len.

Adding a check on len parameter to avoid empty skb. This prevents a
division error in netem_enqueue function which is caused when skb-&gt;len=0
and skb-&gt;data_len=0 in the randomized corruption step as shown below.

skb-&gt;data[prandom_u32() % skb_headlen(skb)] ^= 1&lt;&lt;(prandom_u32() % 8);

Crash Report:
[  343.170349] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family
0 port 6081 - 0
[  343.216110] netem: version 1.3
[  343.235841] divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
[  343.236680] CPU: 3 PID: 4288 Comm: reproducer Not tainted 5.16.0-rc1+
[  343.237569] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS 1.11.0-2.el7 04/01/2014
[  343.238707] RIP: 0010:netem_enqueue+0x1590/0x33c0 [sch_netem]
[  343.239499] Code: 89 85 58 ff ff ff e8 5f 5d e9 d3 48 8b b5 48 ff ff
ff 8b 8d 50 ff ff ff 8b 85 58 ff ff ff 48 8b bd 70 ff ff ff 31 d2 2b 4f
74 &lt;f7&gt; f1 48 b8 00 00 00 00 00 fc ff df 49 01 d5 4c 89 e9 48 c1 e9 03
[  343.241883] RSP: 0018:ffff88800bcd7368 EFLAGS: 00010246
[  343.242589] RAX: 00000000ba7c0a9c RBX: 0000000000000001 RCX:
0000000000000000
[  343.243542] RDX: 0000000000000000 RSI: ffff88800f8edb10 RDI:
ffff88800f8eda40
[  343.244474] RBP: ffff88800bcd7458 R08: 0000000000000000 R09:
ffffffff94fb8445
[  343.245403] R10: ffffffff94fb8336 R11: ffffffff94fb8445 R12:
0000000000000000
[  343.246355] R13: ffff88800a5a7000 R14: ffff88800a5b5800 R15:
0000000000000020
[  343.247291] FS:  00007fdde2bd7700(0000) GS:ffff888109780000(0000)
knlGS:0000000000000000
[  343.248350] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  343.249120] CR2: 00000000200000c0 CR3: 000000000ef4c000 CR4:
00000000000006e0
[  343.250076] Call Trace:
[  343.250423]  &lt;TASK&gt;
[  343.250713]  ? memcpy+0x4d/0x60
[  343.251162]  ? netem_init+0xa0/0xa0 [sch_netem]
[  343.251795]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.252443]  netem_enqueue+0xe28/0x33c0 [sch_netem]
[  343.253102]  ? stack_trace_save+0x87/0xb0
[  343.253655]  ? filter_irq_stacks+0xb0/0xb0
[  343.254220]  ? netem_init+0xa0/0xa0 [sch_netem]
[  343.254837]  ? __kasan_check_write+0x14/0x20
[  343.255418]  ? _raw_spin_lock+0x88/0xd6
[  343.255953]  dev_qdisc_enqueue+0x50/0x180
[  343.256508]  __dev_queue_xmit+0x1a7e/0x3090
[  343.257083]  ? netdev_core_pick_tx+0x300/0x300
[  343.257690]  ? check_kcov_mode+0x10/0x40
[  343.258219]  ? _raw_spin_unlock_irqrestore+0x29/0x40
[  343.258899]  ? __kasan_init_slab_obj+0x24/0x30
[  343.259529]  ? setup_object.isra.71+0x23/0x90
[  343.260121]  ? new_slab+0x26e/0x4b0
[  343.260609]  ? kasan_poison+0x3a/0x50
[  343.261118]  ? kasan_unpoison+0x28/0x50
[  343.261637]  ? __kasan_slab_alloc+0x71/0x90
[  343.262214]  ? memcpy+0x4d/0x60
[  343.262674]  ? write_comp_data+0x2f/0x90
[  343.263209]  ? __kasan_check_write+0x14/0x20
[  343.263802]  ? __skb_clone+0x5d6/0x840
[  343.264329]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.264958]  dev_queue_xmit+0x1c/0x20
[  343.265470]  netlink_deliver_tap+0x652/0x9c0
[  343.266067]  netlink_unicast+0x5a0/0x7f0
[  343.266608]  ? netlink_attachskb+0x860/0x860
[  343.267183]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.267820]  ? write_comp_data+0x2f/0x90
[  343.268367]  netlink_sendmsg+0x922/0xe80
[  343.268899]  ? netlink_unicast+0x7f0/0x7f0
[  343.269472]  ? __sanitizer_cov_trace_pc+0x21/0x60
[  343.270099]  ? write_comp_data+0x2f/0x90
[  343.270644]  ? netlink_unicast+0x7f0/0x7f0
[  343.271210]  sock_sendmsg+0x155/0x190
[  343.271721]  ____sys_sendmsg+0x75f/0x8f0
[  343.272262]  ? kernel_sendmsg+0x60/0x60
[  343.272788]  ? write_comp_data+0x2f/0x90
[  343.273332]  ? write_comp_data+0x2f/0x90
[  343.273869]  ___sys_sendmsg+0x10f/0x190
[  343.274405]  ? sendmsg_copy_msghdr+0x80/0x80
[  343.274984]  ? slab_post_alloc_hook+0x70/0x230
[  343.275597]  ? futex_wait_setup+0x240/0x240
[  343.276175]  ? security_file_alloc+0x3e/0x170
[  343.276779]  ? write_comp_d
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-47606/">CVE-2021-47606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47606">CVE-2021-47606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226555">SUSE bug 1226555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47639</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47639" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47639" ref_url="https://www.suse.com/security/cve/CVE-2021-47639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU

Zap both valid and invalid roots when zapping/unmapping a gfn range, as
KVM must ensure it holds no references to the freed page after returning
from the unmap operation.  Most notably, the TDP MMU doesn't zap invalid
roots in mmu_notifier callbacks.  This leads to use-after-free and other
issues if the mmu_notifier runs to completion while an invalid root
zapper yields as KVM fails to honor the requirement that there must be
_no_ references to the page after the mmu_notifier returns.

The bug is most easily reproduced by hacking KVM to cause a collision
between set_nx_huge_pages() and kvm_mmu_notifier_release(), but the bug
exists between kvm_mmu_notifier_invalidate_range_start() and memslot
updates as well.  Invalidating a root ensures pages aren't accessible by
the guest, and KVM won't read or write page data itself, but KVM will
trigger e.g. kvm_set_pfn_dirty() when zapping SPTEs, and thus completing
a zap of an invalid root _after_ the mmu_notifier returns is fatal.

  WARNING: CPU: 24 PID: 1496 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:173 [kvm]
  RIP: 0010:kvm_is_zone_device_pfn+0x96/0xa0 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_set_pfn_dirty+0xa8/0xe0 [kvm]
   __handle_changed_spte+0x2ab/0x5e0 [kvm]
   __handle_changed_spte+0x2ab/0x5e0 [kvm]
   __handle_changed_spte+0x2ab/0x5e0 [kvm]
   zap_gfn_range+0x1f3/0x310 [kvm]
   kvm_tdp_mmu_zap_invalidated_roots+0x50/0x90 [kvm]
   kvm_mmu_zap_all_fast+0x177/0x1a0 [kvm]
   set_nx_huge_pages+0xb4/0x190 [kvm]
   param_attr_store+0x70/0x100
   module_attr_store+0x19/0x30
   kernfs_fop_write_iter+0x119/0x1b0
   new_sync_write+0x11c/0x1b0
   vfs_write+0x1cc/0x270
   ksys_write+0x5f/0xe0
   do_syscall_64+0x38/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47639/">CVE-2021-47639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47639">CVE-2021-47639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237824">SUSE bug 1237824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47646" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47646" ref_url="https://www.suse.com/security/cve/CVE-2021-47646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "Revert "block, bfq: honor already-setup queue merges""

A crash [1] happened to be triggered in conjunction with commit
2d52c58b9c9b ("block, bfq: honor already-setup queue merges"). The
latter was then reverted by commit ebc69e897e17 ("Revert "block, bfq:
honor already-setup queue merges""). Yet, the reverted commit was not
the one introducing the bug. In fact, it actually triggered a UAF
introduced by a different commit, and now fixed by commit d29bd41428cf
("block, bfq: reset last_bfqq_created on group change").

So, there is no point in keeping commit 2d52c58b9c9b ("block, bfq:
honor already-setup queue merges") out. This commit restores it.

[1] https://bugzilla.kernel.org/show_bug.cgi?id=214503
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47646/">CVE-2021-47646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47646">CVE-2021-47646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237774">SUSE bug 1237774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47649</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47649" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47649" ref_url="https://www.suse.com/security/cve/CVE-2021-47649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udmabuf: validate ubuf-&gt;pagecount

Syzbot has reported GPF in sg_alloc_append_table_from_pages(). The
problem was in ubuf-&gt;pages == ZERO_PTR.

ubuf-&gt;pagecount is calculated from arguments passed from user-space. If
user creates udmabuf with list.size == 0 then ubuf-&gt;pagecount will be
also equal to zero; it causes kmalloc_array() to return ZERO_PTR.

Fix it by validating ubuf-&gt;pagecount before passing it to
kmalloc_array().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47649/">CVE-2021-47649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47649">CVE-2021-47649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237745">SUSE bug 1237745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47657</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47657" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47657" ref_url="https://www.suse.com/security/cve/CVE-2021-47657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()

If virtio_gpu_object_shmem_init() fails (e.g. due to fault injection, as it
happened in the bug report by syzbot), virtio_gpu_array_put_free() could be
called with objs equal to NULL.

Ensure that objs is not NULL in virtio_gpu_array_put_free(), or otherwise
return from the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47657/">CVE-2021-47657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-47657">CVE-2021-47657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237837">SUSE bug 1237837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202147671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-47671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-47671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-47671" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-47671" ref_url="https://www.suse.com/security/cve/CVE-2021-47671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: etas_es58x: es58x_rx_err_msg(): fix memory leak in error path

In es58x_rx_err_msg(), if can-&gt;do_set_mode() fails, the function
directly returns without calling netif_rx(skb). This means that the
skb previously allocated by alloc_can_err_skb() is not freed. In other
terms, this is a memory leak.

This patch simply removes the return statement in the error branch and
let the function continue.

Issue was found with GCC -fanalyzer, please follow the link below for
details.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2021-47671/">CVE-2021-47671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-47671">CVE-2021-47671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241421">SUSE bug 1241421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0005" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0005" ref_url="https://www.suse.com/security/cve/CVE-2022-0005" source="SUSE CVE"/>
    <description>
    Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0005/">CVE-2022-0005 at SUSE</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0005">CVE-2022-0005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199519">SUSE bug 1199519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053632" comment="microcode_ctl-20220809-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0168" ref_url="https://www.suse.com/security/cve/CVE-2022-0168" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A denial of service (DOS) issue was found in the Linux kernel's smb2_ioctl_query_info function in the fs/cifs/smb2ops.c Common Internet File System (CIFS) due to an incorrect return from the memdup_user function. This flaw allows a local, privileged (CAP_SYS_ADMIN) attacker to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0168/">CVE-2022-0168 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0168">CVE-2022-0168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197472">SUSE bug 1197472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0396" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0396" ref_url="https://www.suse.com/security/cve/CVE-2022-0396" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011832.html" source="SUSE-SU"/>
    <description>
    BIND 9.16.11 -&gt; 9.16.26, 9.17.0 -&gt; 9.18.0 and versions 9.16.11-S1 -&gt; 9.16.26-S1 of the BIND Supported Preview Edition. Specifically crafted TCP streams can cause connections to BIND to remain in CLOSE_WAIT status for an indefinite period of time, even after the client has terminated the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0396/">CVE-2022-0396 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0396">CVE-2022-0396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197136">SUSE bug 1197136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804866" comment="bind-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804867" comment="bind-chroot-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804868" comment="bind-devel-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804869" comment="bind-dnssec-doc-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804870" comment="bind-dnssec-utils-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804871" comment="bind-doc-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804872" comment="bind-libs-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804873" comment="bind-license-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804874" comment="bind-utils-9.16.23-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804875" comment="python3-bind-9.16.23-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0480</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0480" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0480" ref_url="https://www.suse.com/security/cve/CVE-2022-0480" source="SUSE CVE"/>
    <description>
    A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0480/">CVE-2022-0480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0480">CVE-2022-0480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195487">SUSE bug 1195487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0494" ref_url="https://www.suse.com/security/cve/CVE-2022-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the Linux kernel. This flaw allows a local attacker with a special user privilege (CAP_SYS_ADMIN or CAP_SYS_RAWIO) to create issues with confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0494/">CVE-2022-0494 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0494">CVE-2022-0494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197386">SUSE bug 1197386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207783">SUSE bug 1207783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804456" comment="bpftool-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804457" comment="kernel-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804458" comment="kernel-abi-stablelists-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804459" comment="kernel-core-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804460" comment="kernel-cross-headers-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804461" comment="kernel-debug-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804462" comment="kernel-debug-core-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804465" comment="kernel-debug-modules-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804466" comment="kernel-debug-modules-extra-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804469" comment="kernel-doc-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804470" comment="kernel-headers-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804471" comment="kernel-modules-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804472" comment="kernel-modules-extra-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804473" comment="kernel-tools-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804474" comment="kernel-tools-libs-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804476" comment="perf-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804477" comment="python3-perf-5.14.0-70.22.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0554</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0554" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0554" ref_url="https://www.suse.com/security/cve/CVE-2022-0554" source="SUSE CVE"/>
    <description>
    Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0554/">CVE-2022-0554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0554">CVE-2022-0554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195846">SUSE bug 1195846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804285" comment="vim-X11-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804286" comment="vim-common-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804287" comment="vim-enhanced-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804288" comment="vim-filesystem-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804289" comment="vim-minimal-8.2.2637-16.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0561</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0561" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0561" ref_url="https://www.suse.com/security/cve/CVE-2022-0561" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    Null source pointer passed as an argument to memcpy() function within TIFFFetchStripThing() in tif_dirread.c in libtiff versions from 3.9.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, the fix is available with commit eecb0712.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0561/">CVE-2022-0561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0561">CVE-2022-0561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195964">SUSE bug 1195964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0562" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0562" ref_url="https://www.suse.com/security/cve/CVE-2022-0562" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
    <description>
    Null source pointer passed as an argument to memcpy() function within TIFFReadDirectory() in tif_dirread.c in libtiff versions from 4.0 to 4.3.0 could lead to Denial of Service via crafted TIFF file. For users that compile libtiff from sources, a fix is available with commit 561599c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0562/">CVE-2022-0562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0562">CVE-2022-0562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195965">SUSE bug 1195965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201723">SUSE bug 1201723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0617" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    A flaw null pointer dereference in the Linux kernel UDF file system functionality was found in the way user triggers udf_file_write_iter function for the malicious UDF image. A local user could use this flaw to crash the system. Actual from Linux kernel 4.2-rc1 till 5.17-rc2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0617">CVE-2022-0617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010932.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7FRPEEZ7WUHWJ2PK7C5GZJJTXRGWJB2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14965-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DVFNM75TAEBUEYENWHOXMRWTJPWBKDFT/" source="SUSE-SU"/>
    <description>
    The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-04-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0778">CVE-2022-0778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197328">SUSE bug 1197328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197340">SUSE bug 1197340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199100">SUSE bug 1199100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199254">SUSE bug 1199254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199303">SUSE bug 1199303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199339">SUSE bug 1199339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200090">SUSE bug 1200090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225670">SUSE bug 1225670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804262" comment="compat-openssl11-1.1.1k-4.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0854</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in the Linux kernel's DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0854">CVE-2022-0854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0865" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0865" ref_url="https://www.suse.com/security/cve/CVE-2022-0865" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
    <description>
    Reachable Assertion in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 5e180045.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0865/">CVE-2022-0865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0865">CVE-2022-0865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197066">SUSE bug 1197066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0891</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0891" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0891" ref_url="https://www.suse.com/security/cve/CVE-2022-0891" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow in ExtractImageSection function in tiffcrop.c in libtiff library Version 4.3.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0891/">CVE-2022-0891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0891">CVE-2022-0891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197068">SUSE bug 1197068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0897" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0897" ref_url="https://www.suse.com/security/cve/CVE-2022-0897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030161.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libvirt nwfilter driver. The virNWFilterObjListNumOfNWFilters method failed to acquire the driver-&gt;nwfilters mutex before iterating over virNWFilterObj instances. There was no protection to stop another thread from concurrently modifying the driver-&gt;nwfilters object. This flaw allows a malicious, unprivileged user to exploit this issue via libvirt's API virConnectNumOfNWFilters to crash the network filter management daemon (libvirtd/virtnwfilterd).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0897/">CVE-2022-0897 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0897">CVE-2022-0897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197636">SUSE bug 1197636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804813" comment="libvirt-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804814" comment="libvirt-client-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804815" comment="libvirt-daemon-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804816" comment="libvirt-daemon-config-network-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804817" comment="libvirt-daemon-config-nwfilter-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804818" comment="libvirt-daemon-driver-interface-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804819" comment="libvirt-daemon-driver-network-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804820" comment="libvirt-daemon-driver-nodedev-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804821" comment="libvirt-daemon-driver-nwfilter-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804822" comment="libvirt-daemon-driver-qemu-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804823" comment="libvirt-daemon-driver-secret-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804824" comment="libvirt-daemon-driver-storage-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804825" comment="libvirt-daemon-driver-storage-core-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804826" comment="libvirt-daemon-driver-storage-disk-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804827" comment="libvirt-daemon-driver-storage-iscsi-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804828" comment="libvirt-daemon-driver-storage-logical-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804829" comment="libvirt-daemon-driver-storage-mpath-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804830" comment="libvirt-daemon-driver-storage-rbd-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804831" comment="libvirt-daemon-driver-storage-scsi-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804832" comment="libvirt-daemon-kvm-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804833" comment="libvirt-devel-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804834" comment="libvirt-docs-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804835" comment="libvirt-libs-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804836" comment="libvirt-lock-sanlock-8.5.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804837" comment="libvirt-nss-8.5.0-7.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0908</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0908" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0908" ref_url="https://www.suse.com/security/cve/CVE-2022-0908" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
    <description>
    Null source pointer passed as an argument to memcpy() function within TIFFFetchNormalTag () in tif_dirread.c in libtiff versions up to 4.3.0 could lead to Denial of Service via crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0908/">CVE-2022-0908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0908">CVE-2022-0908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197074">SUSE bug 1197074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0909</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0909" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0909" ref_url="https://www.suse.com/security/cve/CVE-2022-0909" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
    <description>
    Divide By Zero error in tiffcrop in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f8d0f9aa.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0909/">CVE-2022-0909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0909">CVE-2022-0909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197072">SUSE bug 1197072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0918" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT5CGHERM6PDXKCM7Z3IJLGIYJ6V6AO/" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker with network access to the LDAP port to cause a denial of service. The denial of service is triggered by a single message sent over a TCP connection, no bind or other authentication is required. The message triggers a segmentation fault that results in slapd crashing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0918">CVE-2022-0918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804903" comment="389-ds-base-2.1.3-4.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804904" comment="389-ds-base-libs-2.1.3-4.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804905" comment="python3-lib389-2.1.3-4.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0924" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0924" ref_url="https://www.suse.com/security/cve/CVE-2022-0924" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011182.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read error in tiffcp in libtiff 4.3.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 408976c4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0924/">CVE-2022-0924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0924">CVE-2022-0924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197073">SUSE bug 1197073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010787.html" source="SUSE-SU"/>
    <description>
    A single-byte, non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq, potentially causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0934">CVE-2022-0934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804876" comment="dnsmasq-2.85-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804877" comment="dnsmasq-utils-2.85-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0943</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0943" ref_url="https://www.suse.com/security/cve/CVE-2022-0943" source="SUSE CVE"/>
    <description>
    Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-0943/">CVE-2022-0943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943">CVE-2022-0943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197225">SUSE bug 1197225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804285" comment="vim-X11-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804286" comment="vim-common-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804287" comment="vim-enhanced-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804288" comment="vim-filesystem-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804289" comment="vim-minimal-8.2.2637-16.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20220996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-0996</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-0996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0996" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUT5CGHERM6PDXKCM7Z3IJLGIYJ6V6AO/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the 389 Directory Server that allows expired passwords to access the database to cause improper authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-0996">CVE-2022-0996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804903" comment="389-ds-base-2.1.3-4.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804904" comment="389-ds-base-libs-2.1.3-4.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804905" comment="python3-lib389-2.1.3-4.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1012" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1012" ref_url="https://www.suse.com/security/cve/CVE-2022-1012" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1012/">CVE-2022-1012 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1012">CVE-2022-1012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199482">SUSE bug 1199482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199694">SUSE bug 1199694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202335">SUSE bug 1202335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804297" comment="bpftool-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804298" comment="kernel-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804299" comment="kernel-abi-stablelists-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804300" comment="kernel-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804301" comment="kernel-cross-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804302" comment="kernel-debug-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804303" comment="kernel-debug-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804306" comment="kernel-debug-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804307" comment="kernel-debug-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804310" comment="kernel-doc-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804311" comment="kernel-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804312" comment="kernel-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804313" comment="kernel-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804314" comment="kernel-tools-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804315" comment="kernel-tools-libs-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804317" comment="perf-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804318" comment="python3-perf-5.14.0-70.17.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1016">CVE-2022-1016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024056.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1048">CVE-2022-1048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197597">SUSE bug 1197597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200041">SUSE bug 1200041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212325">SUSE bug 1212325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1049" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1049" ref_url="https://www.suse.com/security/cve/CVE-2022-1049" source="SUSE CVE"/>
    <description>
    A flaw was found in the Pacemaker configuration tool (pcs). The pcs daemon was allowing expired accounts, and accounts with expired passwords to login when using PAM authentication. Therefore, unprivileged expired accounts that have been denied access could still login.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1049/">CVE-2022-1049 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1049">CVE-2022-1049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804747" comment="pcs-0.11.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804748" comment="pcs-snmp-0.11.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1055" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010859.html" source="SUSE-SU"/>
    <description>
    A use-after-free exists in the Linux Kernel in tc_new_tfilter that could allow a local attacker to gain privilege escalation. The exploit requires unprivileged user namespaces. We recommend upgrading past commit 04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1055">CVE-2022-1055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804456" comment="bpftool-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804457" comment="kernel-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804458" comment="kernel-abi-stablelists-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804459" comment="kernel-core-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804460" comment="kernel-cross-headers-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804461" comment="kernel-debug-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804462" comment="kernel-debug-core-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804465" comment="kernel-debug-modules-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804466" comment="kernel-debug-modules-extra-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804469" comment="kernel-doc-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804470" comment="kernel-headers-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804471" comment="kernel-modules-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804472" comment="kernel-modules-extra-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804473" comment="kernel-tools-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804474" comment="kernel-tools-libs-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804476" comment="perf-5.14.0-70.22.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804477" comment="python3-perf-5.14.0-70.22.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1122" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the opj2_decompress program in openjpeg2 2.4.0 in the way it handles an input directory with a large number of files. When it fails to allocate a buffer to store the filenames of the input directory, it calls free() on an uninitialized pointer, leading to a segmentation fault and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1122">CVE-2022-1122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804934" comment="openjpeg2-2.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804935" comment="openjpeg2-devel-2.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804936" comment="openjpeg2-tools-2.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1154" ref_url="https://www.suse.com/security/cve/CVE-2022-1154" source="SUSE CVE"/>
    <description>
    Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1154/">CVE-2022-1154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154">CVE-2022-1154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197813">SUSE bug 1197813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804285" comment="vim-X11-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804286" comment="vim-common-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804287" comment="vim-enhanced-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804288" comment="vim-filesystem-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804289" comment="vim-minimal-8.2.2637-16.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1158" ref_url="https://www.suse.com/security/cve/CVE-2022-1158" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
    <description>
    A flaw was found in KVM. When updating a guest's page table entry, vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes, this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1158/">CVE-2022-1158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1158">CVE-2022-1158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197660">SUSE bug 1197660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198133">SUSE bug 1198133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1184" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1184" ref_url="https://www.suse.com/security/cve/CVE-2022-1184" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel's filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1184/">CVE-2022-1184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1184">CVE-2022-1184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198577">SUSE bug 1198577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210859">SUSE bug 1210859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1215" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010797.html" source="SUSE-SU"/>
    <description>
    A format string vulnerability was found in libinput
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1215">CVE-2022-1215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198111">SUSE bug 1198111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804330" comment="libinput-1.19.3-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804331" comment="libinput-devel-1.19.3-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804332" comment="libinput-utils-1.19.3-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1263" ref_url="https://www.suse.com/security/cve/CVE-2022-1263" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1263/">CVE-2022-1263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1263">CVE-2022-1263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198189">SUSE bug 1198189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010979.html" source="SUSE-SU"/>
    <description>
    An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example, a crafted file name), this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote, low privileged attacker to force zgrep to write arbitrary files on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1271">CVE-2022-1271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198812">SUSE bug 1198812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199107">SUSE bug 1199107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199108">SUSE bug 1199108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804197" comment="gzip-1.10-9.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804263" comment="xz-5.2.5-8.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804264" comment="xz-devel-5.2.5-8.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804265" comment="xz-libs-5.2.5-8.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804266" comment="xz-lzma-compat-5.2.5-8.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1280</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1280" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1280" ref_url="https://www.suse.com/security/cve/CVE-2022-1280" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1280/">CVE-2022-1280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1280">CVE-2022-1280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198590">SUSE bug 1198590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1292</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1292" ref_url="https://www.suse.com/security/cve/CVE-2022-1292" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011468.html" source="SUSE-SU"/>
    <description>
    The c_rehash script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n). Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-15"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1292/">CVE-2022-1292 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1292">CVE-2022-1292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199166">SUSE bug 1199166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200650">SUSE bug 1200650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200758">SUSE bug 1200758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804498" comment="openssl-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804499" comment="openssl-devel-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804500" comment="openssl-libs-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804501" comment="openssl-perl-3.0.1-41.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1304" ref_url="https://www.suse.com/security/cve/CVE-2022-1304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011061.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read/write vulnerability was found in e2fsprogs 1.46.5. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1304/">CVE-2022-1304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1304">CVE-2022-1304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198446">SUSE bug 1198446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201130">SUSE bug 1201130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805027" comment="e2fsprogs-1.46.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805028" comment="e2fsprogs-devel-1.46.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805029" comment="e2fsprogs-libs-1.46.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805030" comment="libcom_err-1.46.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805031" comment="libcom_err-devel-1.46.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805032" comment="libss-1.46.5-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1328</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1328" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YAIJ2AOB7KV4ZEDS2ZHBBCKGSPYKSKDI/" source="SUSE-SU"/>
    <description>
    Buffer Overflow in uudecoder in Mutt affecting all versions starting from 0.94.13 before 2.2.3 allows read past end of input line
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1328">CVE-2022-1328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198518">SUSE bug 1198518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804942" comment="mutt-2.2.6-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1343</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1343" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1343" ref_url="https://www.suse.com/security/cve/CVE-2022-1343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
    <description>
    The function `OCSP_basic_verify` verifies the signer certificate on an OCSP response. In the case where the (non-default) flag OCSP_NOCHECKS is used then the response will be positive (meaning a successful verification) even in the case where the response signing certificate fails to verify. It is anticipated that most users of `OCSP_basic_verify` will not use the OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return a negative value (indicating a fatal error) in the case of a certificate verification failure. The normal expected return value in this case would be 0. This issue also impacts the command line OpenSSL "ocsp" application. When verifying an ocsp response with the "-no_cert_checks" option the command line application will report that the verification is successful even though it has in fact failed. In this case the incorrect successful response will also be accompanied by error messages showing the failure and contradicting the apparently successful result. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-1343/">CVE-2022-1343 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1343">CVE-2022-1343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199167">SUSE bug 1199167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804498" comment="openssl-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804499" comment="openssl-devel-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804500" comment="openssl-libs-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804501" comment="openssl-perl-3.0.1-41.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1348</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1348" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1348" ref_url="https://www.suse.com/security/cve/CVE-2022-1348" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011547.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in logrotate in how the state file is created. The state file is used to prevent parallel executions of multiple instances of logrotate by acquiring and releasing a file lock. When the state file does not exist, it is created with world-readable permission, allowing an unprivileged user to lock the state file, stopping any rotation. This flaw affects logrotate versions before 3.20.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1348/">CVE-2022-1348 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1348">CVE-2022-1348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199652">SUSE bug 1199652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805040" comment="logrotate-3.18.0-7.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1353</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1353" ref_url="https://www.suse.com/security/cve/CVE-2022-1353" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1353/">CVE-2022-1353 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1353">CVE-2022-1353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198516">SUSE bug 1198516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212293">SUSE bug 1212293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1354</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1354" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1354" ref_url="https://www.suse.com/security/cve/CVE-2022-1354" source="SUSE CVE"/>
    <description>
    A heap buffer overflow flaw was found in Libtiffs' tiffinfo.c in TIFFReadRawDataStriped() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffinfo tool, triggering a heap buffer overflow issue and causing a crash that leads to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1354/">CVE-2022-1354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1354">CVE-2022-1354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198519">SUSE bug 1198519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1355</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1355" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1355" ref_url="https://www.suse.com/security/cve/CVE-2022-1355" source="SUSE CVE"/>
    <description>
    A stack buffer overflow flaw was found in Libtiffs' tiffcp.c in main() function. This flaw allows an attacker to pass a crafted TIFF file to the tiffcp tool, triggering a stack buffer overflow issue, possibly corrupting the memory, and causing a crash that leads to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1355/">CVE-2022-1355 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1355">CVE-2022-1355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198520">SUSE bug 1198520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1420" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1420" ref_url="https://www.suse.com/security/cve/CVE-2022-1420" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1420/">CVE-2022-1420 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1420">CVE-2022-1420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198748">SUSE bug 1198748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804285" comment="vim-X11-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804286" comment="vim-common-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804287" comment="vim-enhanced-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804288" comment="vim-filesystem-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804289" comment="vim-minimal-8.2.2637-16.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1462" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1462" ref_url="https://www.suse.com/security/cve/CVE-2022-1462" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found in the Linux kernel's TeleTYpe subsystem. The issue occurs in how a user triggers a race condition using ioctls TIOCSPTLCK and TIOCGPTPEER and TIOCSTI and TCXONC with leakage of memory in the flush_to_ldisc function. This flaw allows a local user to crash the system or read unauthorized random data from memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1462/">CVE-2022-1462 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1462">CVE-2022-1462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198829">SUSE bug 1198829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1473" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1473" ref_url="https://www.suse.com/security/cve/CVE-2022-1473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
    <description>
    The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds and the process might be terminated by the operating system causing a denial of service. Also traversing the empty hash table entries will take increasingly more time. Typically such long lived processes might be TLS clients or TLS servers configured to accept client certificate authentication. The function was added in the OpenSSL 3.0 version thus older releases are not affected by the issue. Fixed in OpenSSL 3.0.3 (Affected 3.0.0,3.0.1,3.0.2).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1473/">CVE-2022-1473 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1473">CVE-2022-1473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199168">SUSE bug 1199168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199169">SUSE bug 1199169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804498" comment="openssl-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804499" comment="openssl-devel-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804500" comment="openssl-libs-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804501" comment="openssl-perl-3.0.1-41.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1520" ref_url="https://www.suse.com/security/cve/CVE-2022-1520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
    <description>
    When viewing an email message A, which contains an attached message B, where B is encrypted or digitally signed or both, Thunderbird may show an incorrect encryption or signature status. After opening and viewing the attached message B, when returning to the display of message A, the message A might be shown with the security status of message B. This vulnerability affects Thunderbird &lt; 91.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1520/">CVE-2022-1520 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1520">CVE-2022-1520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1529" ref_url="https://www.suse.com/security/cve/CVE-2022-1529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR &lt; 91.9.1, Firefox &lt; 100.0.2, Firefox for Android &lt; 100.3.0, and Thunderbird &lt; 91.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1529/">CVE-2022-1529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1529">CVE-2022-1529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804226" comment="firefox-91.9.1-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804238" comment="thunderbird-91.9.1-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1552" ref_url="https://www.suse.com/security/cve/CVE-2022-1552" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1908-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TZ5E6BLKCNZQZF3KYEYUXNMPDMMNYFCM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012016.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1552/">CVE-2022-1552 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1552">CVE-2022-1552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199475">SUSE bug 1199475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804227" comment="postgresql-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804228" comment="postgresql-contrib-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804229" comment="postgresql-plperl-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804230" comment="postgresql-plpython3-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804231" comment="postgresql-pltcl-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804232" comment="postgresql-private-devel-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804233" comment="postgresql-private-libs-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804234" comment="postgresql-server-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804235" comment="postgresql-server-devel-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804236" comment="postgresql-test-13.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804237" comment="postgresql-upgrade-13.7-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1586</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1586" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1586" ref_url="https://www.suse.com/security/cve/CVE-2022-1586" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:1883-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011510.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Y4CR4DFME33T3HFBI647RLLWYT5Q6FNN/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1586/">CVE-2022-1586 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1586">CVE-2022-1586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199232">SUSE bug 1199232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203032">SUSE bug 1203032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804322" comment="pcre2-10.37-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804323" comment="pcre2-devel-10.37-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804324" comment="pcre2-syntax-10.37-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804325" comment="pcre2-utf16-10.37-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804326" comment="pcre2-utf32-10.37-5.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1587" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1587" ref_url="https://www.suse.com/security/cve/CVE-2022-1587" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011755.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVHVSVNKKW7CC77JRUJ23MMS76WXHBBU/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1587/">CVE-2022-1587 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1587">CVE-2022-1587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199235">SUSE bug 1199235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201754">SUSE bug 1201754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203032">SUSE bug 1203032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804322" comment="pcre2-10.37-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804323" comment="pcre2-devel-10.37-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804324" comment="pcre2-syntax-10.37-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804325" comment="pcre2-utf16-10.37-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804326" comment="pcre2-utf32-10.37-5.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1615" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1615" ref_url="https://www.suse.com/security/cve/CVE-2022-1615" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012944.html" source="SUSE-SU"/>
		<reference ref_id="TID000020879" ref_url="https://www.suse.com/support/kb/doc/?id=000020879" source="SUSE-SU"/>
    <description>
    In Samba, GnuTLS gnutls_rnd() can fail and give predictable random values.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-14"/>
	<updated date="2025-05-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1615/">CVE-2022-1615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1615">CVE-2022-1615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202976">SUSE bug 1202976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009981840" comment="ctdb-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805914" comment="evolution-mapi-3.40.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805915" comment="evolution-mapi-langpacks-3.40.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805916" comment="libnetapi-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981841" comment="libnetapi-devel-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805917" comment="libsmbclient-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981842" comment="libsmbclient-devel-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805918" comment="libwbclient-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981843" comment="libwbclient-devel-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805919" comment="openchange-2.3-40.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805920" comment="python3-samba-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805921" comment="python3-samba-dc-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981844" comment="python3-samba-devel-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981845" comment="python3-samba-test-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805922" comment="samba-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805923" comment="samba-client-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805924" comment="samba-client-libs-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805925" comment="samba-common-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805926" comment="samba-common-libs-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805927" comment="samba-common-tools-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805928" comment="samba-dc-libs-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805929" comment="samba-dcerpc-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981846" comment="samba-devel-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805930" comment="samba-krb5-printing-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805931" comment="samba-ldb-ldap-modules-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805932" comment="samba-libs-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981847" comment="samba-pidl-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981848" comment="samba-test-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981849" comment="samba-test-libs-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805933" comment="samba-tools-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805934" comment="samba-usershares-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805935" comment="samba-vfs-iouring-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805936" comment="samba-winbind-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805937" comment="samba-winbind-clients-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805938" comment="samba-winbind-krb5-locator-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805939" comment="samba-winbind-modules-4.17.5-102.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805940" comment="samba-winexe-4.17.5-102.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1621</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1621" ref_url="https://www.suse.com/security/cve/CVE-2022-1621" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1621/">CVE-2022-1621 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621">CVE-2022-1621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199435">SUSE bug 1199435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804285" comment="vim-X11-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804286" comment="vim-common-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804287" comment="vim-enhanced-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804288" comment="vim-filesystem-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804289" comment="vim-minimal-8.2.2637-16.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1629" ref_url="https://www.suse.com/security/cve/CVE-2022-1629" source="SUSE CVE"/>
    <description>
    Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1629/">CVE-2022-1629 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629">CVE-2022-1629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199436">SUSE bug 1199436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804285" comment="vim-X11-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804286" comment="vim-common-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804287" comment="vim-enhanced-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804288" comment="vim-filesystem-8.2.2637-16.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804289" comment="vim-minimal-8.2.2637-16.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1650" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1650" ref_url="https://www.suse.com/security/cve/CVE-2022-1650" source="SUSE CVE"/>
    <description>
    Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository eventsource/eventsource prior to v2.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-1650/">CVE-2022-1650 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1650">CVE-2022-1650 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053614" comment="aspnetcore-runtime-6.0-6.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053615" comment="aspnetcore-targeting-pack-6.0-6.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053616" comment="dotnet-apphost-pack-6.0-6.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053617" comment="dotnet-host-6.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053618" comment="dotnet-hostfxr-6.0-6.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053619" comment="dotnet-runtime-6.0-6.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053620" comment="dotnet-sdk-6.0-6.0.107-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053622" comment="dotnet-targeting-pack-6.0-6.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053623" comment="dotnet-templates-6.0-6.0.107-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053624" comment="netstandard-targeting-pack-2.1-6.0.107-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1679" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1679" ref_url="https://www.suse.com/security/cve/CVE-2022-1679" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Atheros wireless adapter driver in the way a user forces the ath9k_htc_wait_for_target function to fail with some input messages. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1679/">CVE-2022-1679 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1679">CVE-2022-1679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199487">SUSE bug 1199487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201080">SUSE bug 1201080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201832">SUSE bug 1201832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212316">SUSE bug 1212316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1705" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1705" ref_url="https://www.suse.com/security/cve/CVE-2022-1705" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Acceptance of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http before Go 1.17.12 and Go 1.18.4 allows HTTP request smuggling if combined with an intermediate server that also improperly fails to reject the header as invalid.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1705/">CVE-2022-1705 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201434">SUSE bug 1201434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804953" comment="grafana-pcp-3.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804885" comment="toolbox-0.0.99.3-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804886" comment="toolbox-tests-0.0.99.3-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1706</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1706" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1706" ref_url="https://www.suse.com/security/cve/CVE-2022-1706" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2349-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2866-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012042.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1706/">CVE-2022-1706 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1706">CVE-2022-1706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199524">SUSE bug 1199524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804891" comment="ignition-2.14.0-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1729" ref_url="https://www.suse.com/security/cve/CVE-2022-1729" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1729/">CVE-2022-1729 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1729">CVE-2022-1729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199507">SUSE bug 1199507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199697">SUSE bug 1199697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201832">SUSE bug 1201832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804297" comment="bpftool-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804298" comment="kernel-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804299" comment="kernel-abi-stablelists-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804300" comment="kernel-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804301" comment="kernel-cross-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804302" comment="kernel-debug-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804303" comment="kernel-debug-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804306" comment="kernel-debug-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804307" comment="kernel-debug-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804310" comment="kernel-doc-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804311" comment="kernel-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804312" comment="kernel-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804313" comment="kernel-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804314" comment="kernel-tools-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804315" comment="kernel-tools-libs-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804317" comment="perf-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804318" comment="python3-perf-5.14.0-70.17.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1785</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1785" ref_url="https://www.suse.com/security/cve/CVE-2022-1785" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-1785/">CVE-2022-1785 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785">CVE-2022-1785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199745">SUSE bug 1199745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804435" comment="vim-X11-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804436" comment="vim-common-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804437" comment="vim-enhanced-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804438" comment="vim-filesystem-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804439" comment="vim-minimal-8.2.2637-16.el9_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1789" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1789" ref_url="https://www.suse.com/security/cve/CVE-2022-1789" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1789/">CVE-2022-1789 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1789">CVE-2022-1789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199674">SUSE bug 1199674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1802" ref_url="https://www.suse.com/security/cve/CVE-2022-1802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR &lt; 91.9.1, Firefox &lt; 100.0.2, Firefox for Android &lt; 100.3.0, and Thunderbird &lt; 91.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1802/">CVE-2022-1802 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1802">CVE-2022-1802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199768">SUSE bug 1199768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804226" comment="firefox-91.9.1-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804238" comment="thunderbird-91.9.1-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1834" ref_url="https://www.suse.com/security/cve/CVE-2022-1834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
    <description>
    When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker's digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker's email address was not visible. Because Thunderbird compared the invisible sender address with the signature's email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1834/">CVE-2022-1834 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1834">CVE-2022-1834 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1852" ref_url="https://www.suse.com/security/cve/CVE-2022-1852" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel's KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1852/">CVE-2022-1852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1852">CVE-2022-1852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199875">SUSE bug 1199875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1882" ref_url="https://www.suse.com/security/cve/CVE-2022-1882" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's pipes functionality in how a user performs manipulations with the pipe post_one_notification() after free_pipe_info() that is already called. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1882/">CVE-2022-1882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1882">CVE-2022-1882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199904">SUSE bug 1199904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200058">SUSE bug 1200058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1897" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1897" ref_url="https://www.suse.com/security/cve/CVE-2022-1897" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-1897/">CVE-2022-1897 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897">CVE-2022-1897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200010">SUSE bug 1200010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804435" comment="vim-X11-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804436" comment="vim-common-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804437" comment="vim-enhanced-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804438" comment="vim-filesystem-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804439" comment="vim-minimal-8.2.2637-16.el9_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1920" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1920" ref_url="https://www.suse.com/security/cve/CVE-2022-1920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
    <description>
    Integer overflow in matroskademux element in gst_matroska_demux_add_wvpk_header function which allows a heap overwrite while parsing matroska files. Potential for arbitrary code execution through heap overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1920/">CVE-2022-1920 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1920">CVE-2022-1920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201688">SUSE bug 1201688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805756" comment="gstreamer1-plugins-good-1.18.4-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805757" comment="gstreamer1-plugins-good-gtk-1.18.4-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1921" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1921" ref_url="https://www.suse.com/security/cve/CVE-2022-1921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
    <description>
    Integer overflow in avidemux element in gst_avi_demux_invert function which allows a heap overwrite while parsing avi files. Potential for arbitrary code execution through heap overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1921/">CVE-2022-1921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1921">CVE-2022-1921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201693">SUSE bug 1201693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805756" comment="gstreamer1-plugins-good-1.18.4-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805757" comment="gstreamer1-plugins-good-gtk-1.18.4-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1922" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1922" ref_url="https://www.suse.com/security/cve/CVE-2022-1922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
    <description>
    DOS / potential heap overwrite in mkv demuxing using zlib decompression. Integer overflow in matroskademux element in gst_matroska_decompress_data function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1922/">CVE-2022-1922 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1922">CVE-2022-1922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201702">SUSE bug 1201702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805756" comment="gstreamer1-plugins-good-1.18.4-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805757" comment="gstreamer1-plugins-good-gtk-1.18.4-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1923</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1923" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1923" ref_url="https://www.suse.com/security/cve/CVE-2022-1923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
    <description>
    DOS / potential heap overwrite in mkv demuxing using bzip decompression. Integer overflow in matroskademux element in bzip decompression function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1923/">CVE-2022-1923 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1923">CVE-2022-1923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201704">SUSE bug 1201704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805756" comment="gstreamer1-plugins-good-1.18.4-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805757" comment="gstreamer1-plugins-good-gtk-1.18.4-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1924" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1924" ref_url="https://www.suse.com/security/cve/CVE-2022-1924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
    <description>
    DOS / potential heap overwrite in mkv demuxing using lzo decompression. Integer overflow in matroskademux element in lzo decompression function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite. If the libc uses mmap for large chunks, and the OS supports mmap, then it is just a segfault (because the realloc before the integer overflow will use mremap to reduce the size of the chunk, and it will start to write to unmapped memory). However, if using a libc implementation that does not use mmap, or if the OS does not support mmap while using libc, then this could result in a heap overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1924/">CVE-2022-1924 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1924">CVE-2022-1924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201706">SUSE bug 1201706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805756" comment="gstreamer1-plugins-good-1.18.4-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805757" comment="gstreamer1-plugins-good-gtk-1.18.4-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1925" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1925" ref_url="https://www.suse.com/security/cve/CVE-2022-1925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
    <description>
    DOS / potential heap overwrite in mkv demuxing using HEADERSTRIP decompression. Integer overflow in matroskaparse element in gst_matroska_decompress_data function which causes a heap overflow. Due to restrictions on chunk sizes in the matroskademux element, the overflow can't be triggered, however the matroskaparse element has no size checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-1925/">CVE-2022-1925 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1925">CVE-2022-1925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201707">SUSE bug 1201707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805756" comment="gstreamer1-plugins-good-1.18.4-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805757" comment="gstreamer1-plugins-good-gtk-1.18.4-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1927" ref_url="https://www.suse.com/security/cve/CVE-2022-1927" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html" source="SUSE-SU"/>
    <description>
    Buffer Over-read in GitHub repository vim/vim prior to 8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-1927/">CVE-2022-1927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927">CVE-2022-1927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200012">SUSE bug 1200012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804435" comment="vim-X11-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804436" comment="vim-common-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804437" comment="vim-enhanced-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804438" comment="vim-filesystem-8.2.2637-16.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804439" comment="vim-minimal-8.2.2637-16.el9_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1941</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1941" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1941" ref_url="https://www.suse.com/security/cve/CVE-2022-1941" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7138" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2783-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016228.html" source="SUSE-SU"/>
    <description>
    A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input. We recommend upgrading to versions 3.18.3, 3.19.5, 3.20.2, 3.21.6 for protobuf-cpp and 3.18.3, 3.19.5, 3.20.2, 4.21.6 for protobuf-python. Versions for 3.16 and 3.17 are no longer updated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1941/">CVE-2022-1941 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1941">CVE-2022-1941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203681">SUSE bug 1203681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205141">SUSE bug 1205141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985331" comment="protobuf-3.14.0-16.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985332" comment="protobuf-compiler-3.14.0-16.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985333" comment="protobuf-devel-3.14.0-16.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985334" comment="protobuf-lite-3.14.0-16.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985335" comment="protobuf-lite-devel-3.14.0-16.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985336" comment="python3-protobuf-3.14.0-16.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1962" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1962" ref_url="https://www.suse.com/security/cve/CVE-2022-1962" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in the Parse functions in go/parser before Go 1.17.12 and Go 1.18.4 allow an attacker to cause a panic due to stack exhaustion via deeply nested types or declarations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1962/">CVE-2022-1962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1962">CVE-2022-1962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201448">SUSE bug 1201448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1966" ref_url="https://www.suse.com/security/cve/CVE-2022-1966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2173-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CWOILJAA3L3ZOAEUSAUQRV4VH2BJEGVX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-32250. Reason: This candidate is a duplicate of CVE-2022-32250. Notes: All CVE users should reference CVE-2022-32250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1966/">CVE-2022-1966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1966">CVE-2022-1966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200268">SUSE bug 1200268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200494">SUSE bug 1200494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200529">SUSE bug 1200529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804297" comment="bpftool-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804298" comment="kernel-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804299" comment="kernel-abi-stablelists-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804300" comment="kernel-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804301" comment="kernel-cross-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804302" comment="kernel-debug-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804303" comment="kernel-debug-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804306" comment="kernel-debug-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804307" comment="kernel-debug-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804310" comment="kernel-doc-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804311" comment="kernel-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804312" comment="kernel-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804313" comment="kernel-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804314" comment="kernel-tools-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804315" comment="kernel-tools-libs-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804317" comment="perf-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804318" comment="python3-perf-5.14.0-70.17.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20221998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-1998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-1998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1998" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-1998" ref_url="https://www.suse.com/security/cve/CVE-2022-1998" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
    <description>
    A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1998/">CVE-2022-1998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-1998">CVE-2022-1998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200284">SUSE bug 1200284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20141" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20141" ref_url="https://www.suse.com/security/cve/CVE-2022-20141" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    In ip_check_mc_rcu of igmp.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege when opening and closing inet sockets with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112551163References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20141/">CVE-2022-20141 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20141">CVE-2022-20141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200604">SUSE bug 1200604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200605">SUSE bug 1200605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203034">SUSE bug 1203034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20368</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20368" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20368" ref_url="https://www.suse.com/security/cve/CVE-2022-20368" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
    <description>
    Product: AndroidVersions: Android kernelAndroid ID: A-224546354References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20368/">CVE-2022-20368 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20368">CVE-2022-20368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202346">SUSE bug 1202346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212311">SUSE bug 1212311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2056" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2056" ref_url="https://www.suse.com/security/cve/CVE-2022-2056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011758.html" source="SUSE-SU"/>
    <description>
    Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2056/">CVE-2022-2056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2056">CVE-2022-2056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201176">SUSE bug 1201176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805194" comment="libtiff-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805195" comment="libtiff-devel-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805196" comment="libtiff-tools-4.4.0-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2057" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2057" ref_url="https://www.suse.com/security/cve/CVE-2022-2057" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011758.html" source="SUSE-SU"/>
    <description>
    Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2057/">CVE-2022-2057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2057">CVE-2022-2057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201175">SUSE bug 1201175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805194" comment="libtiff-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805195" comment="libtiff-devel-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805196" comment="libtiff-tools-4.4.0-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202220572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-20572</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-20572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20572" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-20572" ref_url="https://www.suse.com/security/cve/CVE-2022-20572" source="SUSE CVE"/>
    <description>
    In verity_target of dm-verity-target.c, there is a possible way to modify read-only files due to a missing permission check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-234475629References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-20572/">CVE-2022-20572 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-20572">CVE-2022-20572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210532">SUSE bug 1210532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2058" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2058" ref_url="https://www.suse.com/security/cve/CVE-2022-2058" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2647-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011758.html" source="SUSE-SU"/>
    <description>
    Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2058/">CVE-2022-2058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2058">CVE-2022-2058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201174">SUSE bug 1201174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201175">SUSE bug 1201175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201176">SUSE bug 1201176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805194" comment="libtiff-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805195" comment="libtiff-devel-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805196" comment="libtiff-tools-4.4.0-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2068" ref_url="https://www.suse.com/security/cve/CVE-2022-2068" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2251-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011468.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15136-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/J2QBML6L7L5D24KOH62TTXXD5XXJHMEM/" source="SUSE-SU"/>
    <description>
    In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the c_rehash script is considered obsolete and should be replaced by the OpenSSL rehash command line tool. Fixed in OpenSSL 3.0.4 (Affected 3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected 1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-09-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2068/">CVE-2022-2068 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2068">CVE-2022-2068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200550">SUSE bug 1200550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207568">SUSE bug 1207568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804498" comment="openssl-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804499" comment="openssl-devel-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804500" comment="openssl-libs-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804501" comment="openssl-perl-3.0.1-41.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2078" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2078" ref_url="https://www.suse.com/security/cve/CVE-2022-2078" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() function .This flaw allows an attacker to trigger a buffer overflow via nft_set_desc_concat_parse() , causing a denial of service and possibly to run code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2078/">CVE-2022-2078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2078">CVE-2022-2078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200019">SUSE bug 1200019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200522">SUSE bug 1200522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804562" comment="bpftool-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804563" comment="kernel-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804564" comment="kernel-abi-stablelists-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804565" comment="kernel-core-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804566" comment="kernel-cross-headers-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804567" comment="kernel-debug-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804568" comment="kernel-debug-core-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804571" comment="kernel-debug-modules-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804572" comment="kernel-debug-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804575" comment="kernel-doc-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804576" comment="kernel-headers-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804577" comment="kernel-modules-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804578" comment="kernel-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804579" comment="kernel-tools-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804580" comment="kernel-tools-libs-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804582" comment="perf-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804583" comment="python3-perf-5.14.0-70.26.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2097" ref_url="https://www.suse.com/security/cve/CVE-2022-2097" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011564.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2328-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YYPFZ7KMN6GQBF6OHSBFHNAHQ2AP2WBJ/" source="SUSE-SU"/>
    <description>
    AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was preexisting in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of the plaintext would be revealed. Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, they are both unaffected. Fixed in OpenSSL 3.0.5 (Affected 3.0.0-3.0.4). Fixed in OpenSSL 1.1.1q (Affected 1.1.1-1.1.1p).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2097/">CVE-2022-2097 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2097">CVE-2022-2097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201099">SUSE bug 1201099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201332">SUSE bug 1201332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804498" comment="openssl-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804499" comment="openssl-devel-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804500" comment="openssl-libs-3.0.1-41.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804501" comment="openssl-perl-3.0.1-41.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21123" ref_url="https://www.suse.com/security/cve/CVE-2022-21123" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21123/">CVE-2022-21123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21123">CVE-2022-21123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209075">SUSE bug 1209075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21125" ref_url="https://www.suse.com/security/cve/CVE-2022-21125" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21125/">CVE-2022-21125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21125">CVE-2022-21125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209074">SUSE bug 1209074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21136" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21136" ref_url="https://www.suse.com/security/cve/CVE-2022-21136" source="SUSE CVE"/>
    <description>
    Improper input validation for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21136/">CVE-2022-21136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21136">CVE-2022-21136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199632">SUSE bug 1199632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053632" comment="microcode_ctl-20220809-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21151" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21151" ref_url="https://www.suse.com/security/cve/CVE-2022-21151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011092.html" source="SUSE-SU"/>
    <description>
    Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21151/">CVE-2022-21151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21151">CVE-2022-21151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199423">SUSE bug 1199423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053632" comment="microcode_ctl-20220809-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21166" ref_url="https://www.suse.com/security/cve/CVE-2022-21166" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="TID000020669" ref_url="https://www.suse.com/support/kb/doc/?id=000020669" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21166/">CVE-2022-21166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21166">CVE-2022-21166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199650">SUSE bug 1199650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200549">SUSE bug 1200549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209073">SUSE bug 1209073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053632" comment="microcode_ctl-20220809-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21216" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21216" ref_url="https://www.suse.com/security/cve/CVE-2022-21216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013926.html" source="SUSE-SU"/>
    <description>
    Insufficient granularity of access control in out-of-band management in some Intel(R) Atom and Intel Xeon Scalable Processors may allow a privileged user to potentially enable escalation of privilege via adjacent network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-21216/">CVE-2022-21216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21216">CVE-2022-21216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208277">SUSE bug 1208277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209936">SUSE bug 1209936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211490">SUSE bug 1211490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211511">SUSE bug 1211511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213820">SUSE bug 1213820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053964" comment="microcode_ctl-20230808-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2122" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2122" ref_url="https://www.suse.com/security/cve/CVE-2022-2122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
    <description>
    DOS / potential heap overwrite in qtdemux using zlib decompression. Integer overflow in qtdemux element in qtdemux_inflate function which causes a segfault, or could cause a heap overwrite, depending on libc and OS. Depending on the libc used, and the underlying OS capabilities, it could be just a segfault or a heap overwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2122/">CVE-2022-2122 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2122">CVE-2022-2122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201708">SUSE bug 1201708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805756" comment="gstreamer1-plugins-good-1.18.4-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805757" comment="gstreamer1-plugins-good-gtk-1.18.4-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2127" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2127" ref_url="https://www.suse.com/security/cve/CVE-2022-2127" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3017-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015957.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in Samba due to insufficient length checks in winbindd_pam_auth_crap.c. When performing NTLM authentication, the client replies to cryptographic challenges back to the server. These replies have variable lengths, and Winbind fails to check the lan manager response length. When Winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in Winbind, possibly resulting in a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2127/">CVE-2022-2127 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2127">CVE-2022-2127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213174">SUSE bug 1213174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813379" comment="ctdb-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813302" comment="evolution-mapi-3.40.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813303" comment="evolution-mapi-langpacks-3.40.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813304" comment="libnetapi-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813380" comment="libnetapi-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813305" comment="libsmbclient-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813381" comment="libsmbclient-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813306" comment="libwbclient-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813382" comment="libwbclient-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813307" comment="openchange-2.3-41.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813308" comment="python3-samba-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813309" comment="python3-samba-dc-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813383" comment="python3-samba-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813384" comment="python3-samba-test-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813310" comment="samba-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813311" comment="samba-client-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813312" comment="samba-client-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813313" comment="samba-common-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813314" comment="samba-common-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813315" comment="samba-common-tools-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813316" comment="samba-dc-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813317" comment="samba-dcerpc-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813385" comment="samba-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813318" comment="samba-krb5-printing-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813319" comment="samba-ldb-ldap-modules-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813320" comment="samba-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813386" comment="samba-pidl-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813387" comment="samba-test-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813388" comment="samba-test-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813321" comment="samba-tools-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813322" comment="samba-usershares-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813323" comment="samba-vfs-iouring-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813324" comment="samba-winbind-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813325" comment="samba-winbind-clients-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813326" comment="samba-winbind-krb5-locator-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813327" comment="samba-winbind-modules-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813328" comment="samba-winexe-4.18.6-100.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2132</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2132" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2132" ref_url="https://www.suse.com/security/cve/CVE-2022-2132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017983.html" source="SUSE-SU"/>
    <description>
    A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2132/">CVE-2022-2132 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2132">CVE-2022-2132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202903">SUSE bug 1202903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804956" comment="dpdk-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804957" comment="dpdk-devel-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804958" comment="dpdk-doc-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804959" comment="dpdk-tools-21.11.2-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21412" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21412" ref_url="https://www.suse.com/security/cve/CVE-2022-21412" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21412/">CVE-2022-21412 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21412">CVE-2022-21412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21413</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21413" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21413" ref_url="https://www.suse.com/security/cve/CVE-2022-21413" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21413/">CVE-2022-21413 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21413">CVE-2022-21413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21414" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21414" ref_url="https://www.suse.com/security/cve/CVE-2022-21414" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21414/">CVE-2022-21414 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21414">CVE-2022-21414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21415" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21415" ref_url="https://www.suse.com/security/cve/CVE-2022-21415" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21415/">CVE-2022-21415 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21415">CVE-2022-21415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21417</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21417" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21417" ref_url="https://www.suse.com/security/cve/CVE-2022-21417" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21417/">CVE-2022-21417 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21417">CVE-2022-21417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21418" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21418" ref_url="https://www.suse.com/security/cve/CVE-2022-21418" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21418/">CVE-2022-21418 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21418">CVE-2022-21418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21423" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21423" ref_url="https://www.suse.com/security/cve/CVE-2022-21423" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21423/">CVE-2022-21423 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21423">CVE-2022-21423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21425" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21425" ref_url="https://www.suse.com/security/cve/CVE-2022-21425" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21425/">CVE-2022-21425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21425">CVE-2022-21425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21426</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21426">CVE-2022-21426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804180" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804181" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804182" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804183" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804184" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804185" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804186" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804187" comment="java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804188" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804189" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804190" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804191" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804193" comment="java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804194" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804195" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804196" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804134" comment="java-11-openjdk-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804135" comment="java-11-openjdk-demo-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804136" comment="java-11-openjdk-demo-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804137" comment="java-11-openjdk-demo-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804138" comment="java-11-openjdk-devel-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804139" comment="java-11-openjdk-devel-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804140" comment="java-11-openjdk-devel-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804141" comment="java-11-openjdk-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804142" comment="java-11-openjdk-headless-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804143" comment="java-11-openjdk-headless-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804144" comment="java-11-openjdk-headless-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804145" comment="java-11-openjdk-javadoc-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804146" comment="java-11-openjdk-javadoc-zip-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804147" comment="java-11-openjdk-jmods-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804148" comment="java-11-openjdk-jmods-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804149" comment="java-11-openjdk-jmods-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804150" comment="java-11-openjdk-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804151" comment="java-11-openjdk-src-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804152" comment="java-11-openjdk-src-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804153" comment="java-11-openjdk-src-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804154" comment="java-11-openjdk-static-libs-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804155" comment="java-11-openjdk-static-libs-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804156" comment="java-11-openjdk-static-libs-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804157" comment="java-17-openjdk-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804158" comment="java-17-openjdk-demo-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804159" comment="java-17-openjdk-demo-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804160" comment="java-17-openjdk-demo-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804161" comment="java-17-openjdk-devel-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804162" comment="java-17-openjdk-devel-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804163" comment="java-17-openjdk-devel-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804164" comment="java-17-openjdk-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804165" comment="java-17-openjdk-headless-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804166" comment="java-17-openjdk-headless-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804167" comment="java-17-openjdk-headless-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804168" comment="java-17-openjdk-javadoc-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804169" comment="java-17-openjdk-javadoc-zip-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804170" comment="java-17-openjdk-jmods-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804171" comment="java-17-openjdk-jmods-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804172" comment="java-17-openjdk-jmods-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804173" comment="java-17-openjdk-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804174" comment="java-17-openjdk-src-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804175" comment="java-17-openjdk-src-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804176" comment="java-17-openjdk-src-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804177" comment="java-17-openjdk-static-libs-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804178" comment="java-17-openjdk-static-libs-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804179" comment="java-17-openjdk-static-libs-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21427" ref_url="https://www.suse.com/security/cve/CVE-2022-21427" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21427/">CVE-2022-21427 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21427">CVE-2022-21427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21434">CVE-2022-21434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804180" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804181" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804182" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804183" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804184" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804185" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804186" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804187" comment="java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804188" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804189" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804190" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804191" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804193" comment="java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804194" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804195" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804196" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804134" comment="java-11-openjdk-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804135" comment="java-11-openjdk-demo-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804136" comment="java-11-openjdk-demo-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804137" comment="java-11-openjdk-demo-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804138" comment="java-11-openjdk-devel-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804139" comment="java-11-openjdk-devel-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804140" comment="java-11-openjdk-devel-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804141" comment="java-11-openjdk-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804142" comment="java-11-openjdk-headless-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804143" comment="java-11-openjdk-headless-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804144" comment="java-11-openjdk-headless-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804145" comment="java-11-openjdk-javadoc-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804146" comment="java-11-openjdk-javadoc-zip-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804147" comment="java-11-openjdk-jmods-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804148" comment="java-11-openjdk-jmods-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804149" comment="java-11-openjdk-jmods-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804150" comment="java-11-openjdk-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804151" comment="java-11-openjdk-src-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804152" comment="java-11-openjdk-src-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804153" comment="java-11-openjdk-src-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804154" comment="java-11-openjdk-static-libs-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804155" comment="java-11-openjdk-static-libs-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804156" comment="java-11-openjdk-static-libs-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804157" comment="java-17-openjdk-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804158" comment="java-17-openjdk-demo-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804159" comment="java-17-openjdk-demo-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804160" comment="java-17-openjdk-demo-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804161" comment="java-17-openjdk-devel-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804162" comment="java-17-openjdk-devel-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804163" comment="java-17-openjdk-devel-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804164" comment="java-17-openjdk-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804165" comment="java-17-openjdk-headless-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804166" comment="java-17-openjdk-headless-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804167" comment="java-17-openjdk-headless-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804168" comment="java-17-openjdk-javadoc-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804169" comment="java-17-openjdk-javadoc-zip-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804170" comment="java-17-openjdk-jmods-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804171" comment="java-17-openjdk-jmods-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804172" comment="java-17-openjdk-jmods-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804173" comment="java-17-openjdk-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804174" comment="java-17-openjdk-src-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804175" comment="java-17-openjdk-src-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804176" comment="java-17-openjdk-src-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804177" comment="java-17-openjdk-static-libs-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804178" comment="java-17-openjdk-static-libs-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804179" comment="java-17-openjdk-static-libs-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21435</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21435" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21435" ref_url="https://www.suse.com/security/cve/CVE-2022-21435" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21435/">CVE-2022-21435 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21435">CVE-2022-21435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21436" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21436" ref_url="https://www.suse.com/security/cve/CVE-2022-21436" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21436/">CVE-2022-21436 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21436">CVE-2022-21436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21437</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21437" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21437" ref_url="https://www.suse.com/security/cve/CVE-2022-21437" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21437/">CVE-2022-21437 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21437">CVE-2022-21437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21438</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21438" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21438" ref_url="https://www.suse.com/security/cve/CVE-2022-21438" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21438/">CVE-2022-21438 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21438">CVE-2022-21438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21440" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21440" ref_url="https://www.suse.com/security/cve/CVE-2022-21440" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21440/">CVE-2022-21440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21440">CVE-2022-21440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21443">CVE-2022-21443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804180" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804181" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804182" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804183" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804184" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804185" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804186" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804187" comment="java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804188" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804189" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804190" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804191" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804193" comment="java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804194" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804195" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804196" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804134" comment="java-11-openjdk-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804135" comment="java-11-openjdk-demo-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804136" comment="java-11-openjdk-demo-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804137" comment="java-11-openjdk-demo-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804138" comment="java-11-openjdk-devel-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804139" comment="java-11-openjdk-devel-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804140" comment="java-11-openjdk-devel-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804141" comment="java-11-openjdk-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804142" comment="java-11-openjdk-headless-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804143" comment="java-11-openjdk-headless-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804144" comment="java-11-openjdk-headless-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804145" comment="java-11-openjdk-javadoc-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804146" comment="java-11-openjdk-javadoc-zip-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804147" comment="java-11-openjdk-jmods-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804148" comment="java-11-openjdk-jmods-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804149" comment="java-11-openjdk-jmods-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804150" comment="java-11-openjdk-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804151" comment="java-11-openjdk-src-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804152" comment="java-11-openjdk-src-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804153" comment="java-11-openjdk-src-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804154" comment="java-11-openjdk-static-libs-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804155" comment="java-11-openjdk-static-libs-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804156" comment="java-11-openjdk-static-libs-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804157" comment="java-17-openjdk-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804158" comment="java-17-openjdk-demo-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804159" comment="java-17-openjdk-demo-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804160" comment="java-17-openjdk-demo-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804161" comment="java-17-openjdk-devel-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804162" comment="java-17-openjdk-devel-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804163" comment="java-17-openjdk-devel-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804164" comment="java-17-openjdk-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804165" comment="java-17-openjdk-headless-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804166" comment="java-17-openjdk-headless-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804167" comment="java-17-openjdk-headless-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804168" comment="java-17-openjdk-javadoc-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804169" comment="java-17-openjdk-javadoc-zip-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804170" comment="java-17-openjdk-jmods-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804171" comment="java-17-openjdk-jmods-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804172" comment="java-17-openjdk-jmods-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804173" comment="java-17-openjdk-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804174" comment="java-17-openjdk-src-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804175" comment="java-17-openjdk-src-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804176" comment="java-17-openjdk-src-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804177" comment="java-17-openjdk-static-libs-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804178" comment="java-17-openjdk-static-libs-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804179" comment="java-17-openjdk-static-libs-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21444" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21444" ref_url="https://www.suse.com/security/cve/CVE-2022-21444" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21444/">CVE-2022-21444 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21444">CVE-2022-21444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21449</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21449" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21449" ref_url="https://www.suse.com/security/cve/CVE-2022-21449" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.2 and 18; Oracle GraalVM Enterprise Edition: 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21449/">CVE-2022-21449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21449">CVE-2022-21449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198670">SUSE bug 1198670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804157" comment="java-17-openjdk-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804158" comment="java-17-openjdk-demo-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804159" comment="java-17-openjdk-demo-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804160" comment="java-17-openjdk-demo-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804161" comment="java-17-openjdk-devel-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804162" comment="java-17-openjdk-devel-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804163" comment="java-17-openjdk-devel-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804164" comment="java-17-openjdk-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804165" comment="java-17-openjdk-headless-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804166" comment="java-17-openjdk-headless-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804167" comment="java-17-openjdk-headless-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804168" comment="java-17-openjdk-javadoc-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804169" comment="java-17-openjdk-javadoc-zip-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804170" comment="java-17-openjdk-jmods-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804171" comment="java-17-openjdk-jmods-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804172" comment="java-17-openjdk-jmods-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804173" comment="java-17-openjdk-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804174" comment="java-17-openjdk-src-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804175" comment="java-17-openjdk-src-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804176" comment="java-17-openjdk-src-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804177" comment="java-17-openjdk-static-libs-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804178" comment="java-17-openjdk-static-libs-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804179" comment="java-17-openjdk-static-libs-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21451</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21451" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21451" ref_url="https://www.suse.com/security/cve/CVE-2022-21451" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21451/">CVE-2022-21451 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21451">CVE-2022-21451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21452</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21452" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21452" ref_url="https://www.suse.com/security/cve/CVE-2022-21452" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21452/">CVE-2022-21452 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21452">CVE-2022-21452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21454</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21454" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21454" ref_url="https://www.suse.com/security/cve/CVE-2022-21454" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21454/">CVE-2022-21454 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21454">CVE-2022-21454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21455" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21455" ref_url="https://www.suse.com/security/cve/CVE-2022-21455" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21455/">CVE-2022-21455 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21455">CVE-2022-21455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21457</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21457" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21457" ref_url="https://www.suse.com/security/cve/CVE-2022-21457" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PAM Auth Plugin). Supported versions that are affected are 8.0.28 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21457/">CVE-2022-21457 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21457">CVE-2022-21457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21459" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21459" ref_url="https://www.suse.com/security/cve/CVE-2022-21459" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21459/">CVE-2022-21459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21459">CVE-2022-21459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21460" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21460" ref_url="https://www.suse.com/security/cve/CVE-2022-21460" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21460/">CVE-2022-21460 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21460">CVE-2022-21460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21462" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21462" ref_url="https://www.suse.com/security/cve/CVE-2022-21462" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21462/">CVE-2022-21462 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21462">CVE-2022-21462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21476">CVE-2022-21476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804180" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804181" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804182" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804183" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804184" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804185" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804186" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804187" comment="java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804188" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804189" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804190" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804191" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804193" comment="java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804194" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804195" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804196" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804134" comment="java-11-openjdk-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804135" comment="java-11-openjdk-demo-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804136" comment="java-11-openjdk-demo-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804137" comment="java-11-openjdk-demo-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804138" comment="java-11-openjdk-devel-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804139" comment="java-11-openjdk-devel-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804140" comment="java-11-openjdk-devel-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804141" comment="java-11-openjdk-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804142" comment="java-11-openjdk-headless-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804143" comment="java-11-openjdk-headless-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804144" comment="java-11-openjdk-headless-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804145" comment="java-11-openjdk-javadoc-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804146" comment="java-11-openjdk-javadoc-zip-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804147" comment="java-11-openjdk-jmods-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804148" comment="java-11-openjdk-jmods-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804149" comment="java-11-openjdk-jmods-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804150" comment="java-11-openjdk-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804151" comment="java-11-openjdk-src-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804152" comment="java-11-openjdk-src-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804153" comment="java-11-openjdk-src-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804154" comment="java-11-openjdk-static-libs-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804155" comment="java-11-openjdk-static-libs-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804156" comment="java-11-openjdk-static-libs-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804157" comment="java-17-openjdk-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804158" comment="java-17-openjdk-demo-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804159" comment="java-17-openjdk-demo-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804160" comment="java-17-openjdk-demo-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804161" comment="java-17-openjdk-devel-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804162" comment="java-17-openjdk-devel-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804163" comment="java-17-openjdk-devel-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804164" comment="java-17-openjdk-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804165" comment="java-17-openjdk-headless-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804166" comment="java-17-openjdk-headless-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804167" comment="java-17-openjdk-headless-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804168" comment="java-17-openjdk-javadoc-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804169" comment="java-17-openjdk-javadoc-zip-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804170" comment="java-17-openjdk-jmods-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804171" comment="java-17-openjdk-jmods-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804172" comment="java-17-openjdk-jmods-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804173" comment="java-17-openjdk-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804174" comment="java-17-openjdk-src-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804175" comment="java-17-openjdk-src-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804176" comment="java-17-openjdk-src-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804177" comment="java-17-openjdk-static-libs-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804178" comment="java-17-openjdk-static-libs-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804179" comment="java-17-openjdk-static-libs-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21478" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21478" ref_url="https://www.suse.com/security/cve/CVE-2022-21478" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21478/">CVE-2022-21478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21478">CVE-2022-21478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21479" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21479" ref_url="https://www.suse.com/security/cve/CVE-2022-21479" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server and unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21479/">CVE-2022-21479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21479">CVE-2022-21479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198685">SUSE bug 1198685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21496</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21496">CVE-2022-21496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201643">SUSE bug 1201643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804180" comment="java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804181" comment="java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804182" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804183" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804184" comment="java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804185" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804186" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804187" comment="java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804188" comment="java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804189" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804190" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804191" comment="java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804192" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804193" comment="java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804194" comment="java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804195" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804196" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804134" comment="java-11-openjdk-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804135" comment="java-11-openjdk-demo-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804136" comment="java-11-openjdk-demo-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804137" comment="java-11-openjdk-demo-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804138" comment="java-11-openjdk-devel-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804139" comment="java-11-openjdk-devel-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804140" comment="java-11-openjdk-devel-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804141" comment="java-11-openjdk-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804142" comment="java-11-openjdk-headless-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804143" comment="java-11-openjdk-headless-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804144" comment="java-11-openjdk-headless-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804145" comment="java-11-openjdk-javadoc-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804146" comment="java-11-openjdk-javadoc-zip-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804147" comment="java-11-openjdk-jmods-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804148" comment="java-11-openjdk-jmods-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804149" comment="java-11-openjdk-jmods-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804150" comment="java-11-openjdk-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804151" comment="java-11-openjdk-src-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804152" comment="java-11-openjdk-src-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804153" comment="java-11-openjdk-src-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804154" comment="java-11-openjdk-static-libs-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804155" comment="java-11-openjdk-static-libs-fastdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804156" comment="java-11-openjdk-static-libs-slowdebug-11.0.15.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804157" comment="java-17-openjdk-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804158" comment="java-17-openjdk-demo-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804159" comment="java-17-openjdk-demo-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804160" comment="java-17-openjdk-demo-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804161" comment="java-17-openjdk-devel-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804162" comment="java-17-openjdk-devel-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804163" comment="java-17-openjdk-devel-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804164" comment="java-17-openjdk-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804165" comment="java-17-openjdk-headless-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804166" comment="java-17-openjdk-headless-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804167" comment="java-17-openjdk-headless-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804168" comment="java-17-openjdk-javadoc-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804169" comment="java-17-openjdk-javadoc-zip-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804170" comment="java-17-openjdk-jmods-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804171" comment="java-17-openjdk-jmods-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804172" comment="java-17-openjdk-jmods-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804173" comment="java-17-openjdk-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804174" comment="java-17-openjdk-src-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804175" comment="java-17-openjdk-src-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804176" comment="java-17-openjdk-src-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804177" comment="java-17-openjdk-static-libs-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804178" comment="java-17-openjdk-static-libs-fastdebug-17.0.3.0.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804179" comment="java-17-openjdk-static-libs-slowdebug-17.0.3.0.7-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21499" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21499" ref_url="https://www.suse.com/security/cve/CVE-2022-21499" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21499/">CVE-2022-21499 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21499">CVE-2022-21499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199426">SUSE bug 1199426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200059">SUSE bug 1200059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203034">SUSE bug 1203034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212315">SUSE bug 1212315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21505" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21505" ref_url="https://www.suse.com/security/cve/CVE-2022-21505" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
    <description>
    In the linux kernel, if IMA appraisal is used with the "ima_appraise=log" boot param, lockdown can be defeated with kexec on any machine when Secure Boot is disabled or unavailable. IMA prevents setting "ima_appraise=log" from the boot param when Secure Boot is enabled, but this does not cover cases where lockdown is used without Secure Boot. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity, Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-21505/">CVE-2022-21505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-21505">CVE-2022-21505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201458">SUSE bug 1201458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21509</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21509" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21509" ref_url="https://www.suse.com/security/cve/CVE-2022-21509" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21509/">CVE-2022-21509 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21509">CVE-2022-21509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21515</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21515" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21515" ref_url="https://www.suse.com/security/cve/CVE-2022-21515" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 5.7.38 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21515/">CVE-2022-21515 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21515">CVE-2022-21515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21517" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21517" ref_url="https://www.suse.com/security/cve/CVE-2022-21517" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21517/">CVE-2022-21517 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21517">CVE-2022-21517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21522" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21522" ref_url="https://www.suse.com/security/cve/CVE-2022-21522" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21522/">CVE-2022-21522 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21522">CVE-2022-21522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21525</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21525" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21525" ref_url="https://www.suse.com/security/cve/CVE-2022-21525" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21525/">CVE-2022-21525 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21525">CVE-2022-21525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21526" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21526" ref_url="https://www.suse.com/security/cve/CVE-2022-21526" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21526/">CVE-2022-21526 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21526">CVE-2022-21526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21527" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21527" ref_url="https://www.suse.com/security/cve/CVE-2022-21527" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21527/">CVE-2022-21527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21527">CVE-2022-21527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21528" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21528" ref_url="https://www.suse.com/security/cve/CVE-2022-21528" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21528/">CVE-2022-21528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21528">CVE-2022-21528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21529" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21529" ref_url="https://www.suse.com/security/cve/CVE-2022-21529" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21529/">CVE-2022-21529 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21529">CVE-2022-21529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2153" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2153" ref_url="https://www.suse.com/security/cve/CVE-2022-2153" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs, causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls, causing a kernel oops condition that results in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2153/">CVE-2022-2153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2153">CVE-2022-2153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200788">SUSE bug 1200788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21530" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21530" ref_url="https://www.suse.com/security/cve/CVE-2022-21530" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21530/">CVE-2022-21530 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21530">CVE-2022-21530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21531" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21531" ref_url="https://www.suse.com/security/cve/CVE-2022-21531" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21531/">CVE-2022-21531 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21531">CVE-2022-21531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21534" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21534" ref_url="https://www.suse.com/security/cve/CVE-2022-21534" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21534/">CVE-2022-21534 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21534">CVE-2022-21534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21537" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21537" ref_url="https://www.suse.com/security/cve/CVE-2022-21537" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21537/">CVE-2022-21537 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21537">CVE-2022-21537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21538" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21538" ref_url="https://www.suse.com/security/cve/CVE-2022-21538" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21538/">CVE-2022-21538 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21538">CVE-2022-21538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21539" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21539" ref_url="https://www.suse.com/security/cve/CVE-2022-21539" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 5.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21539/">CVE-2022-21539 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21539">CVE-2022-21539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21540" ref_url="https://www.suse.com/security/cve/CVE-2022-21540" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21540/">CVE-2022-21540 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21540">CVE-2022-21540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201694">SUSE bug 1201694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804359" comment="java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804360" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804361" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804362" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804363" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804364" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804365" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804366" comment="java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804367" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804368" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804369" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804370" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804371" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804372" comment="java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804373" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804374" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804375" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804336" comment="java-11-openjdk-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804337" comment="java-11-openjdk-demo-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804338" comment="java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804339" comment="java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804340" comment="java-11-openjdk-devel-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804341" comment="java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804342" comment="java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804343" comment="java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804344" comment="java-11-openjdk-headless-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804345" comment="java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804346" comment="java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804347" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804348" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804349" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804350" comment="java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804351" comment="java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804352" comment="java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804353" comment="java-11-openjdk-src-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804354" comment="java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804355" comment="java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804356" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804357" comment="java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804358" comment="java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804377" comment="java-17-openjdk-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804378" comment="java-17-openjdk-demo-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804379" comment="java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804380" comment="java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804381" comment="java-17-openjdk-devel-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804382" comment="java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804383" comment="java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804384" comment="java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804385" comment="java-17-openjdk-headless-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804386" comment="java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804387" comment="java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804388" comment="java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804389" comment="java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804390" comment="java-17-openjdk-jmods-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804391" comment="java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804392" comment="java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804393" comment="java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804394" comment="java-17-openjdk-src-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804395" comment="java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804396" comment="java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804397" comment="java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804398" comment="java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804399" comment="java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21541" ref_url="https://www.suse.com/security/cve/CVE-2022-21541" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21541/">CVE-2022-21541 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21541">CVE-2022-21541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201692">SUSE bug 1201692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804359" comment="java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804360" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804361" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804362" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804363" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804364" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804365" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804366" comment="java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804367" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804368" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804369" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804370" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804371" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804372" comment="java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804373" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804374" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804375" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804336" comment="java-11-openjdk-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804337" comment="java-11-openjdk-demo-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804338" comment="java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804339" comment="java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804340" comment="java-11-openjdk-devel-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804341" comment="java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804342" comment="java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804343" comment="java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804344" comment="java-11-openjdk-headless-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804345" comment="java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804346" comment="java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804347" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804348" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804349" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804350" comment="java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804351" comment="java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804352" comment="java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804353" comment="java-11-openjdk-src-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804354" comment="java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804355" comment="java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804356" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804357" comment="java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804358" comment="java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804377" comment="java-17-openjdk-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804378" comment="java-17-openjdk-demo-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804379" comment="java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804380" comment="java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804381" comment="java-17-openjdk-devel-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804382" comment="java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804383" comment="java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804384" comment="java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804385" comment="java-17-openjdk-headless-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804386" comment="java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804387" comment="java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804388" comment="java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804389" comment="java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804390" comment="java-17-openjdk-jmods-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804391" comment="java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804392" comment="java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804393" comment="java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804394" comment="java-17-openjdk-src-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804395" comment="java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804396" comment="java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804397" comment="java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804398" comment="java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804399" comment="java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21547" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21547" ref_url="https://www.suse.com/security/cve/CVE-2022-21547" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Federated). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21547/">CVE-2022-21547 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21547">CVE-2022-21547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21549" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21549" ref_url="https://www.suse.com/security/cve/CVE-2022-21549" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.3.1; Oracle GraalVM Enterprise Edition: 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21549/">CVE-2022-21549 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21549">CVE-2022-21549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201685">SUSE bug 1201685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804377" comment="java-17-openjdk-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804378" comment="java-17-openjdk-demo-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804379" comment="java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804380" comment="java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804381" comment="java-17-openjdk-devel-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804382" comment="java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804383" comment="java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804384" comment="java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804385" comment="java-17-openjdk-headless-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804386" comment="java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804387" comment="java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804388" comment="java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804389" comment="java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804390" comment="java-17-openjdk-jmods-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804391" comment="java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804392" comment="java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804393" comment="java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804394" comment="java-17-openjdk-src-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804395" comment="java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804396" comment="java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804397" comment="java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804398" comment="java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804399" comment="java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21553</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21553" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21553" ref_url="https://www.suse.com/security/cve/CVE-2022-21553" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21553/">CVE-2022-21553 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21553">CVE-2022-21553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21556" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21556" ref_url="https://www.suse.com/security/cve/CVE-2022-21556" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21556/">CVE-2022-21556 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21556">CVE-2022-21556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21569" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21569" ref_url="https://www.suse.com/security/cve/CVE-2022-21569" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21569/">CVE-2022-21569 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21569">CVE-2022-21569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202688">SUSE bug 1202688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21592</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21592" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21592" ref_url="https://www.suse.com/security/cve/CVE-2022-21592" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.7.39 and prior and 8.0.29 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21592/">CVE-2022-21592 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21592">CVE-2022-21592 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21594" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21594" ref_url="https://www.suse.com/security/cve/CVE-2022-21594" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21594/">CVE-2022-21594 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21594">CVE-2022-21594 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21595" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21595" ref_url="https://www.suse.com/security/cve/CVE-2022-21595" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013977.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21595/">CVE-2022-21595 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21595">CVE-2022-21595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205469">SUSE bug 1205469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21599" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21599" ref_url="https://www.suse.com/security/cve/CVE-2022-21599" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21599/">CVE-2022-21599 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21599">CVE-2022-21599 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21604" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21604" ref_url="https://www.suse.com/security/cve/CVE-2022-21604" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21604/">CVE-2022-21604 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21604">CVE-2022-21604 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21605" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21605" ref_url="https://www.suse.com/security/cve/CVE-2022-21605" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21605/">CVE-2022-21605 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21605">CVE-2022-21605 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21607</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21607" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21607" ref_url="https://www.suse.com/security/cve/CVE-2022-21607" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21607/">CVE-2022-21607 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21607">CVE-2022-21607 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21608</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21608" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21608" ref_url="https://www.suse.com/security/cve/CVE-2022-21608" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21608/">CVE-2022-21608 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21608">CVE-2022-21608 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21611" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21611" ref_url="https://www.suse.com/security/cve/CVE-2022-21611" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21611/">CVE-2022-21611 at SUSE</cve>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21611">CVE-2022-21611 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21617" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21617" ref_url="https://www.suse.com/security/cve/CVE-2022-21617" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21617/">CVE-2022-21617 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21617">CVE-2022-21617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21618" ref_url="https://www.suse.com/security/cve/CVE-2022-21618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21618/">CVE-2022-21618 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21618">CVE-2022-21618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204468">SUSE bug 1204468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804665" comment="java-11-openjdk-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804666" comment="java-11-openjdk-demo-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804667" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804668" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804669" comment="java-11-openjdk-devel-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804670" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804671" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804672" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804673" comment="java-11-openjdk-headless-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804674" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804675" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804676" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804677" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804678" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804679" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804680" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804681" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804682" comment="java-11-openjdk-src-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804683" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804684" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804685" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804686" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804687" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804625" comment="java-17-openjdk-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804626" comment="java-17-openjdk-demo-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804627" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804628" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804629" comment="java-17-openjdk-devel-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804630" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804631" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804632" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804633" comment="java-17-openjdk-headless-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804634" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804635" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804636" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804637" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804638" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804639" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804640" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804641" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804642" comment="java-17-openjdk-src-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804643" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804644" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804645" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804646" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804647" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21619</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21619" ref_url="https://www.suse.com/security/cve/CVE-2022-21619" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21619/">CVE-2022-21619 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21619">CVE-2022-21619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204473">SUSE bug 1204473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804648" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804649" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804650" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804651" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804652" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804653" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804654" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804655" comment="java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804656" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804657" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804658" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804659" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804660" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804661" comment="java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804662" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804663" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804664" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804665" comment="java-11-openjdk-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804666" comment="java-11-openjdk-demo-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804667" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804668" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804669" comment="java-11-openjdk-devel-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804670" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804671" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804672" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804673" comment="java-11-openjdk-headless-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804674" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804675" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804676" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804677" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804678" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804679" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804680" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804681" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804682" comment="java-11-openjdk-src-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804683" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804684" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804685" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804686" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804687" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804625" comment="java-17-openjdk-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804626" comment="java-17-openjdk-demo-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804627" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804628" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804629" comment="java-17-openjdk-devel-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804630" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804631" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804632" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804633" comment="java-17-openjdk-headless-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804634" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804635" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804636" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804637" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804638" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804639" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804640" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804641" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804642" comment="java-17-openjdk-src-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804643" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804644" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804645" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804646" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804647" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21624" ref_url="https://www.suse.com/security/cve/CVE-2022-21624" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21624/">CVE-2022-21624 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21624">CVE-2022-21624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204475">SUSE bug 1204475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804648" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804649" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804650" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804651" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804652" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804653" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804654" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804655" comment="java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804656" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804657" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804658" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804659" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804660" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804661" comment="java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804662" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804663" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804664" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804665" comment="java-11-openjdk-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804666" comment="java-11-openjdk-demo-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804667" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804668" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804669" comment="java-11-openjdk-devel-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804670" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804671" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804672" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804673" comment="java-11-openjdk-headless-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804674" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804675" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804676" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804677" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804678" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804679" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804680" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804681" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804682" comment="java-11-openjdk-src-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804683" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804684" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804685" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804686" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804687" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804625" comment="java-17-openjdk-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804626" comment="java-17-openjdk-demo-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804627" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804628" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804629" comment="java-17-openjdk-devel-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804630" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804631" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804632" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804633" comment="java-17-openjdk-headless-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804634" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804635" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804636" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804637" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804638" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804639" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804640" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804641" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804642" comment="java-17-openjdk-src-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804643" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804644" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804645" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804646" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804647" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21625" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21625" ref_url="https://www.suse.com/security/cve/CVE-2022-21625" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21625/">CVE-2022-21625 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21625">CVE-2022-21625 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21626" ref_url="https://www.suse.com/security/cve/CVE-2022-21626" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21626/">CVE-2022-21626 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21626">CVE-2022-21626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204471">SUSE bug 1204471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804648" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804649" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804650" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804651" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804652" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804653" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804654" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804655" comment="java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804656" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804657" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804658" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804659" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804660" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804661" comment="java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804662" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804663" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804664" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804665" comment="java-11-openjdk-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804666" comment="java-11-openjdk-demo-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804667" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804668" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804669" comment="java-11-openjdk-devel-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804670" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804671" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804672" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804673" comment="java-11-openjdk-headless-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804674" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804675" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804676" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804677" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804678" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804679" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804680" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804681" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804682" comment="java-11-openjdk-src-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804683" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804684" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804685" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804686" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804687" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804625" comment="java-17-openjdk-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804626" comment="java-17-openjdk-demo-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804627" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804628" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804629" comment="java-17-openjdk-devel-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804630" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804631" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804632" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804633" comment="java-17-openjdk-headless-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804634" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804635" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804636" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804637" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804638" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804639" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804640" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804641" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804642" comment="java-17-openjdk-src-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804643" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804644" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804645" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804646" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804647" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21628" ref_url="https://www.suse.com/security/cve/CVE-2022-21628" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013224.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21628/">CVE-2022-21628 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21628">CVE-2022-21628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204472">SUSE bug 1204472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804648" comment="java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804649" comment="java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804650" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804651" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804652" comment="java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804653" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804654" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804655" comment="java-1.8.0-openjdk-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804656" comment="java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804657" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804658" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804659" comment="java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804660" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804661" comment="java-1.8.0-openjdk-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804662" comment="java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804663" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804664" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.352.b08-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804665" comment="java-11-openjdk-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804666" comment="java-11-openjdk-demo-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804667" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804668" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804669" comment="java-11-openjdk-devel-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804670" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804671" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804672" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804673" comment="java-11-openjdk-headless-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804674" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804675" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804676" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804677" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804678" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804679" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804680" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804681" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804682" comment="java-11-openjdk-src-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804683" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804684" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804685" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804686" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804687" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804625" comment="java-17-openjdk-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804626" comment="java-17-openjdk-demo-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804627" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804628" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804629" comment="java-17-openjdk-devel-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804630" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804631" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804632" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804633" comment="java-17-openjdk-headless-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804634" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804635" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804636" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804637" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804638" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804639" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804640" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804641" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804642" comment="java-17-openjdk-src-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804643" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804644" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804645" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804646" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804647" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21632" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21632" ref_url="https://www.suse.com/security/cve/CVE-2022-21632" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21632/">CVE-2022-21632 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21632">CVE-2022-21632 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21633" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21633" ref_url="https://www.suse.com/security/cve/CVE-2022-21633" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21633/">CVE-2022-21633 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21633">CVE-2022-21633 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21635" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21635" ref_url="https://www.suse.com/security/cve/CVE-2022-21635" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21635/">CVE-2022-21635 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21635">CVE-2022-21635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21637</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21637" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21637" ref_url="https://www.suse.com/security/cve/CVE-2022-21637" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21637/">CVE-2022-21637 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21637">CVE-2022-21637 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21638" ref_url="https://www.suse.com/security/cve/CVE-2022-21638" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21638/">CVE-2022-21638 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21638">CVE-2022-21638 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21640" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21640" ref_url="https://www.suse.com/security/cve/CVE-2022-21640" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21640/">CVE-2022-21640 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21640">CVE-2022-21640 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21641" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21641" ref_url="https://www.suse.com/security/cve/CVE-2022-21641" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-21641/">CVE-2022-21641 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21641">CVE-2022-21641 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21673" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21673" ref_url="https://www.suse.com/security/cve/CVE-2022-21673" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. In affected versions when a data source has the Forward OAuth Identity feature enabled, sending a query to that datasource with an API token (and no other user credentials) will forward the OAuth Identity of the most recently logged-in user. This can allow API token holders to retrieve data for which they may not have intended access. This attack relies on the Grafana instance having data sources that support the Forward OAuth Identity feature, the Grafana instance having a data source with the Forward OAuth Identity feature toggled on, the Grafana instance having OAuth enabled, and the Grafana instance having usable API keys. This issue has been patched in versions 7.5.13 and 8.3.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21673/">CVE-2022-21673 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21673">CVE-2022-21673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194873">SUSE bug 1194873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21698" ref_url="https://www.suse.com/security/cve/CVE-2022-21698" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-June/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
    <description>
    client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling around HTTP servers and clients. In client_golang prior to version 1.11.1, HTTP server is susceptible to a Denial of Service through unbounded cardinality, and potential memory exhaustion, when handling requests with non-standard HTTP methods. In order to be affected, an instrumented software must use any of `promhttp.InstrumentHandler*` middleware except `RequestsInFlight`; not filter any specific methods (e.g GET) before middleware; pass metric with `method` label name to our middleware; and not have any firewall/LB/proxy that filters away requests with unknown `method`. client_golang version 1.11.1 contains a patch for this issue. Several workarounds are available, including removing the `method` label name from counter/gauge used in the InstrumentHandler; turning off affected promhttp handlers; adding custom middleware before promhttp handler that will sanitize the request method given by Go http.Request; and using a reverse proxy or web application firewall, configured to only allow a limited set of methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-21698/">CVE-2022-21698 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21698">CVE-2022-21698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196338">SUSE bug 1196338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248689">SUSE bug 1248689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21702" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21702" ref_url="https://www.suse.com/security/cve/CVE-2022-21702" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. In affected versions an attacker could serve HTML content thru the Grafana datasource or plugin proxy and trick a user to visit this HTML page using a specially crafted link and execute a Cross-site Scripting (XSS) attack. The attacker could either compromise an existing datasource for a specific Grafana instance or either set up its own public service and instruct anyone to set it up in their Grafana instance. To be impacted, all of the following must be applicable. For the data source proxy: A Grafana HTTP-based datasource configured with Server as Access Mode and a URL set, the attacker has to be in control of the HTTP server serving the URL of above datasource, and a specially crafted link pointing at the attacker controlled data source must be clicked on by an authenticated user. For the plugin proxy: A Grafana HTTP-based app plugin configured and enabled with a URL set, the attacker has to be in control of the HTTP server serving the URL of above app, and a specially crafted link pointing at the attacker controlled plugin must be clocked on by an authenticated user. For the backend plugin resource: An attacker must be able to navigate an authenticated user to a compromised plugin through a crafted link. Users are advised to update to a patched version. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21702/">CVE-2022-21702 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21702">CVE-2022-21702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195726">SUSE bug 1195726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21703" ref_url="https://www.suse.com/security/cve/CVE-2022-21703" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. Affected versions are subject to a cross site request forgery vulnerability which allows attackers to elevate their privileges by mounting cross-origin attacks against authenticated high-privilege Grafana users (for example, Editors or Admins). An attacker can exploit this vulnerability for privilege escalation by tricking an authenticated user into inviting the attacker as a new user with high privileges. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21703/">CVE-2022-21703 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21703">CVE-2022-21703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195727">SUSE bug 1195727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202221713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-21713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-21713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21713" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-21713" ref_url="https://www.suse.com/security/cve/CVE-2022-21713" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-April/022823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. Affected versions of Grafana expose multiple API endpoints which do not properly handle user authorization. `/teams/:teamId` will allow an authenticated attacker to view unintended data by querying for the specific team ID, `/teams/:search` will allow an authenticated attacker to search for teams and see the total number of available teams, including for those teams that the user does not have access to, and `/teams/:teamId/members` when editors_can_admin flag is enabled, an authenticated attacker can see unintended data by querying for the specific team ID. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21713/">CVE-2022-21713 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-21713">CVE-2022-21713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195728">SUSE bug 1195728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2196" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2196" ref_url="https://www.suse.com/security/cve/CVE-2022-2196" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks.  L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB  after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit  2e7eab81425a
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2196/">CVE-2022-2196 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2196">CVE-2022-2196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206992">SUSE bug 1206992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2200" ref_url="https://www.suse.com/security/cve/CVE-2022-2200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2200/">CVE-2022-2200 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2200">CVE-2022-2200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2211" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2211" ref_url="https://www.suse.com/security/cve/CVE-2022-2211" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013184.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libguestfs. This issue occurs while calculating the greatest possible number of matching keys in the get_keys() function. This flaw leads to a denial of service, either by mistake or malicious actor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2211/">CVE-2022-2211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2211">CVE-2022-2211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201064">SUSE bug 1201064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804776" comment="guestfs-tools-1.48.2-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804757" comment="libguestfs-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804758" comment="libguestfs-appliance-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804759" comment="libguestfs-bash-completion-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804760" comment="libguestfs-devel-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804761" comment="libguestfs-gobject-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804762" comment="libguestfs-gobject-devel-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804763" comment="libguestfs-inspect-icons-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804764" comment="libguestfs-man-pages-ja-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804765" comment="libguestfs-man-pages-uk-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804766" comment="libguestfs-rescue-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804767" comment="libguestfs-rsync-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804768" comment="libguestfs-xfs-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804769" comment="lua-guestfs-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804770" comment="ocaml-libguestfs-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804771" comment="ocaml-libguestfs-devel-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804772" comment="perl-Sys-Guestfs-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804773" comment="php-libguestfs-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804774" comment="python3-libguestfs-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804775" comment="ruby-libguestfs-1.48.4-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804799" comment="virt-v2v-2.0.7-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804800" comment="virt-v2v-bash-completion-2.0.7-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804801" comment="virt-v2v-man-pages-ja-2.0.7-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804802" comment="virt-v2v-man-pages-uk-2.0.7-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804777" comment="virt-win-reg-1.48.2-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2226</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2226" ref_url="https://www.suse.com/security/cve/CVE-2022-2226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    An OpenPGP digital signature includes information about the date when the signature was created. When displaying an email that contains a digital signature, the email's date will be shown. If the dates were different, then Thunderbird didn't report the email as having an invalid signature. If an attacker performed a replay attack, in which an old email with old contents are resent at a later time, it could lead the victim to believe that the statements in the email are current. Fixed versions of Thunderbird will require that the signature's date roughly matches the displayed date of the email. This vulnerability affects Thunderbird &lt; 102 and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2226/">CVE-2022-2226 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2226">CVE-2022-2226 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22576</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22576" ref_url="https://www.suse.com/security/cve/CVE-2022-22576" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011020.html" source="SUSE-SU"/>
    <description>
    An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22576/">CVE-2022-22576 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22576">CVE-2022-22576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198614">SUSE bug 1198614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804292" comment="curl-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804293" comment="curl-minimal-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804294" comment="libcurl-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804295" comment="libcurl-devel-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804296" comment="libcurl-minimal-7.76.1-14.el9_0.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, iOS 15.4 and iPadOS 15.4, tvOS 15.4, Safari 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22624">CVE-2022-22624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199111">SUSE bug 1199111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22628">CVE-2022-22628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011016.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iTunes 12.12.3 for Windows, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22629">CVE-2022-22629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22662" ref_url="https://www.suse.com/security/cve/CVE-2022-22662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011626.html" source="SUSE-SU"/>
    <description>
    A cookie management issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Big Sur 11.6.5. Processing maliciously crafted web content may disclose sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22662/">CVE-2022-22662 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22662">CVE-2022-22662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201221">SUSE bug 1201221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22719</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22719" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
    <description>
    A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22719">CVE-2022-22719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198430">SUSE bug 1198430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010491.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
    <description>
    If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22721">CVE-2022-22721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198430">SUSE bug 1198430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202222844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-22844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-22844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22844" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010261.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0480-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OF4G5SOPBRKT4CZJV5MAQLV5LXXFO62/" source="SUSE-SU"/>
    <description>
    LibTIFF 4.3.0 has an out-of-bounds read in _TIFFmemcpy in tif_unix.c in certain situations involving a custom tag and 0x0200 as the second word of the DE field.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-22844">CVE-2022-22844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804906" comment="libtiff-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804907" comment="libtiff-devel-4.4.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804908" comment="libtiff-tools-4.4.0-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2309</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2309" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2309" ref_url="https://www.suse.com/security/cve/CVE-2022-2309" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012000.html" source="SUSE-SU"/>
    <description>
    NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2309/">CVE-2022-2309 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2309">CVE-2022-2309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201253">SUSE bug 1201253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804952" comment="python3-lxml-4.6.5-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2319" ref_url="https://www.suse.com/security/cve/CVE-2022-2319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011517.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Xorg-x11-server. An out-of-bounds access issue can occur in the ProcXkbSetGeometry function due to improper validation of the request length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2319/">CVE-2022-2319 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2319">CVE-2022-2319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194179">SUSE bug 1194179</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204093">SUSE bug 1204093</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205071">SUSE bug 1205071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206243">SUSE bug 1206243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804943" comment="xorg-x11-server-Xdmx-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804944" comment="xorg-x11-server-Xephyr-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804945" comment="xorg-x11-server-Xnest-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804946" comment="xorg-x11-server-Xorg-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804947" comment="xorg-x11-server-Xvfb-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804951" comment="xorg-x11-server-Xwayland-21.1.3-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804948" comment="xorg-x11-server-common-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804949" comment="xorg-x11-server-devel-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804950" comment="xorg-x11-server-source-1.20.11-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2320</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2320" ref_url="https://www.suse.com/security/cve/CVE-2022-2320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011517.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Xorg-x11-server. The specific flaw exists within the handling of ProcXkbSetDeviceInfo requests. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. This flaw allows an attacker to escalate privileges and execute arbitrary code in the context of root.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2320/">CVE-2022-2320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2320">CVE-2022-2320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194181">SUSE bug 1194181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201793">SUSE bug 1201793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204123">SUSE bug 1204123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205071">SUSE bug 1205071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804943" comment="xorg-x11-server-Xdmx-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804944" comment="xorg-x11-server-Xephyr-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804945" comment="xorg-x11-server-Xnest-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804946" comment="xorg-x11-server-Xorg-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804947" comment="xorg-x11-server-Xvfb-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804951" comment="xorg-x11-server-Xwayland-21.1.3-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804948" comment="xorg-x11-server-common-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804949" comment="xorg-x11-server-devel-1.20.11-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804950" comment="xorg-x11-server-source-1.20.11-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23267</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23267" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23267" ref_url="https://www.suse.com/security/cve/CVE-2022-23267" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23267/">CVE-2022-23267 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23267">CVE-2022-23267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199420">SUSE bug 1199420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804203" comment="aspnetcore-runtime-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804204" comment="aspnetcore-targeting-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804205" comment="dotnet-apphost-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804206" comment="dotnet-host-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804207" comment="dotnet-hostfxr-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804208" comment="dotnet-runtime-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804209" comment="dotnet-sdk-6.0-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804210" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804211" comment="dotnet-targeting-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804212" comment="dotnet-templates-6.0-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804213" comment="netstandard-targeting-pack-2.1-6.0.105-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23521" ref_url="https://www.suse.com/security/cve/CVE-2022-23521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013486.html" source="SUSE-SU"/>
    <description>
    Git is distributed revision control system. gitattributes are a mechanism to allow defining attributes for paths. These attributes can be defined by adding a `.gitattributes` file to the repository, which contains a set of file patterns and the attributes that should be set for paths matching this pattern. When parsing gitattributes, multiple integer overflows can occur when there is a huge number of path patterns, a huge number of attributes for a single pattern, or when the declared attribute names are huge. These overflows can be triggered via a crafted `.gitattributes` file that may be part of the commit history. Git silently splits lines longer than 2KB when parsing gitattributes from a file, but not when parsing them from the index. Consequentially, the failure mode depends on whether the file exists in the working tree, the index or both. This integer overflow can result in arbitrary heap reads and writes, which may result in remote code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23521/">CVE-2022-23521 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23521">CVE-2022-23521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207032">SUSE bug 1207032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207033">SUSE bug 1207033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208650">SUSE bug 1208650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209317">SUSE bug 1209317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805278" comment="git-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805279" comment="git-all-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805280" comment="git-core-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805281" comment="git-core-doc-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805282" comment="git-credential-libsecret-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805283" comment="git-daemon-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805284" comment="git-email-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805285" comment="git-gui-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805286" comment="git-instaweb-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805287" comment="git-subtree-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805288" comment="git-svn-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805289" comment="gitk-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805290" comment="gitweb-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805291" comment="perl-Git-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805292" comment="perl-Git-SVN-2.31.1-3.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23527" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23527" ref_url="https://www.suse.com/security/cve/CVE-2022-23527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023659.html" source="SUSE-SU"/>
    <description>
    mod_auth_openidc is an OpenID Certified(tm) authentication and authorization module for the Apache 2.x HTTP server. Versions prior to 2.4.12.2 are vulnerable to Open Redirect. When providing a logout parameter to the redirect URI, the existing code in oidc_validate_redirect_url() does not properly check for URLs that start with /\t, leading to an open redirect. This issue has been patched in version 2.4.12.2. Users unable to upgrade can mitigate the issue by configuring mod_auth_openidc to only allow redirection when the destination matches a given regular expression with OIDCRedirectURLsAllowed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-12-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-23527/">CVE-2022-23527 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23527">CVE-2022-23527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206441">SUSE bug 1206441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811026" comment="mod_auth_openidc-2.4.9.4-4.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23552" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23552" ref_url="https://www.suse.com/security/cve/CVE-2022-23552" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. 

An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard.   

Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23552/">CVE-2022-23552 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23552">CVE-2022-23552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207749">SUSE bug 1207749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23645" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23645" ref_url="https://www.suse.com/security/cve/CVE-2022-23645" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010790.html" source="SUSE-SU"/>
    <description>
    swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-23645/">CVE-2022-23645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23645">CVE-2022-23645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196240">SUSE bug 1196240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804887" comment="swtpm-0.7.0-3.20211109gitb79fd91.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804888" comment="swtpm-libs-0.7.0-3.20211109gitb79fd91.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804889" comment="swtpm-tools-0.7.0-3.20211109gitb79fd91.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23816" ref_url="https://www.suse.com/security/cve/CVE-2022-23816" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23816/">CVE-2022-23816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-23816">CVE-2022-23816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201456">SUSE bug 1201456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23825" ref_url="https://www.suse.com/security/cve/CVE-2022-23825" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
    <description>
    Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-23825/">CVE-2022-23825 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23825">CVE-2022-23825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201457">SUSE bug 1201457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205209">SUSE bug 1205209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2393" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2393" ref_url="https://www.suse.com/security/cve/CVE-2022-2393" source="SUSE CVE"/>
    <description>
    A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2393/">CVE-2022-2393 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2393">CVE-2022-2393 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805776" comment="idm-jss-5.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805777" comment="idm-ldapjdk-5.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805778" comment="idm-pki-acme-11.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805779" comment="idm-pki-base-11.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805780" comment="idm-pki-ca-11.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805781" comment="idm-pki-est-11.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805782" comment="idm-pki-java-11.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805783" comment="idm-pki-kra-11.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805784" comment="idm-pki-server-11.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805785" comment="idm-pki-tools-11.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805786" comment="idm-tomcatjss-8.3.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805787" comment="python3-idm-pki-11.3.0-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202223943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-23943</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-23943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1031-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4LVBWCEX7IVK73L73JHPXASP5AT5BZGS/" source="SUSE-SU"/>
    <description>
    Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-23943">CVE-2022-23943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198430">SUSE bug 1198430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200351">SUSE bug 1200351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219585">SUSE bug 1219585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24048" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24048">CVE-2022-24048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24050" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24050">CVE-2022-24050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24051" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24051">CVE-2022-24051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24052" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0731-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDNVQ52U37ZIGEV67C6BLLSQ2OFQTPPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0726-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AHNAIZXQ7HT4J5VE4Z2HNIR2M675NUXE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WSVJFTHRT3VK44P5TR7J6I6W3UVNZEBD/" source="SUSE-SU"/>
    <description>
    MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24052">CVE-2022-24052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24070" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010905.html" source="SUSE-SU"/>
    <description>
    Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24070">CVE-2022-24070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197940">SUSE bug 1197940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804216" comment="mod_dav_svn-1.14.1-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804217" comment="python3-subversion-1.14.1-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804218" comment="subversion-1.14.1-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804219" comment="subversion-devel-1.14.1-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804220" comment="subversion-gnome-1.14.1-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804221" comment="subversion-libs-1.14.1-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804222" comment="subversion-perl-1.14.1-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804223" comment="subversion-tools-1.14.1-5.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24130" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24130" ref_url="https://www.suse.com/security/cve/CVE-2022-24130" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14075" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012901.html" source="SUSE-SU"/>
    <description>
    xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2025-08-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24130/">CVE-2022-24130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24130">CVE-2022-24130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195387">SUSE bug 1195387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015585" comment="xterm-366-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015586" comment="xterm-resize-366-12.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2414" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2414" ref_url="https://www.suse.com/security/cve/CVE-2022-2414" source="SUSE CVE"/>
    <description>
    Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2414/">CVE-2022-2414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2414">CVE-2022-2414 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804735" comment="pki-acme-11.0.6-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804736" comment="pki-base-11.0.6-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804737" comment="pki-base-java-11.0.6-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804738" comment="pki-ca-11.0.6-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804739" comment="pki-kra-11.0.6-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804740" comment="pki-server-11.0.6-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804741" comment="pki-symkey-11.0.6-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804742" comment="pki-tools-11.0.6-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804743" comment="python3-pki-11.0.6-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24448</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24448" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MWGLT5YBYSSX5MP2JBKT3N3QV2IWMC5F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YVOKHN5NCU57OGTEBU36WJRTWHRBUST7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:1039-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWMVMDEM47CT6AQ4RWZEZZJSH2G2J4CV/" source="SUSE-SU"/>
    <description>
    An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24448">CVE-2022-24448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24675" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    encoding/pem in Go before 1.17.9 and 1.18.x before 1.18.1 has a Decode stack overflow via a large amount of PEM data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198423">SUSE bug 1198423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24735" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24735" ref_url="https://www.suse.com/security/cve/CVE-2022-24735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011230.html" source="SUSE-SU"/>
    <description>
    Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. The Lua script execution environment in Redis provides some measures that prevent a script from creating side effects that persist and can affect the execution of the same, or different script, at a later time. Several weaknesses of these measures have been publicly known for a long time, but they had no security impact as the Redis security model did not endorse the concept of users or privileges. With the introduction of ACLs in Redis 6.0, these weaknesses can be exploited by a less privileged users to inject Lua code that will execute at a later time, when a privileged user executes a Lua script. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-24735/">CVE-2022-24735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24735">CVE-2022-24735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198952">SUSE bug 1198952</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804882" comment="redis-6.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804883" comment="redis-devel-6.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804884" comment="redis-doc-6.2.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24736" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24736" ref_url="https://www.suse.com/security/cve/CVE-2022-24736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011230.html" source="SUSE-SU"/>
    <description>
    Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24736/">CVE-2022-24736 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24736">CVE-2022-24736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198953">SUSE bug 1198953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804882" comment="redis-6.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804883" comment="redis-devel-6.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804884" comment="redis-doc-6.2.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24765</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012490.html" source="SUSE-SU"/>
    <description>
    Git for Windows is a fork of Git containing Windows-specific patches. This vulnerability affects users working on multi-user machines, where untrusted parties have write access to the same hard disk. Those untrusted parties could create the folder `C:\.git`, which would be picked up by Git operations run supposedly outside a repository while searching for a Git directory. Git would then respect any config in said Git directory. Git Bash users who set `GIT_PS1_SHOWDIRTYSTATE` are vulnerable as well. Users who installed posh-gitare vulnerable simply by starting a PowerShell. Users of IDEs such as Visual Studio are vulnerable: simply creating a new project would already read and respect the config specified in `C:\.git\config`. Users of the Microsoft fork of Git are vulnerable simply by starting a Git Bash. The problem has been patched in Git for Windows v2.35.2. Users unable to upgrade may create the folder `.git` on all drives where Git commands are run, and remove read/write access from those folders as a workaround. Alternatively, define or extend `GIT_CEILING_DIRECTORIES` to cover the _parent_ directory of the user profile, e.g. `C:\Users` if the user profile is located in `C:\Users\my-user-name`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24765">CVE-2022-24765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199109">SUSE bug 1199109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200119">SUSE bug 1200119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200201">SUSE bug 1200201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201431">SUSE bug 1201431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201794">SUSE bug 1201794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805794" comment="git-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805795" comment="git-all-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805796" comment="git-core-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805797" comment="git-core-doc-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805798" comment="git-credential-libsecret-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805799" comment="git-daemon-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805800" comment="git-email-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805801" comment="git-gui-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805802" comment="git-instaweb-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805803" comment="git-subtree-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805804" comment="git-svn-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805805" comment="gitk-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805806" comment="gitweb-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805807" comment="perl-Git-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805808" comment="perl-Git-SVN-2.39.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24795" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24795" ref_url="https://www.suse.com/security/cve/CVE-2022-24795" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012163.html" source="SUSE-SU"/>
    <description>
    yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf-&gt;alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available and anticipated to be part of yajl-ruby version 1.4.2. As a workaround, avoid passing large inputs to YAJL.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24795/">CVE-2022-24795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24795">CVE-2022-24795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198405">SUSE bug 1198405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804954" comment="yajl-2.1.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804955" comment="yajl-devel-2.1.0-21.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24805" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24805" ref_url="https://www.suse.com/security/cve/CVE-2022-24805" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013226.html" source="SUSE-SU"/>
    <description>
    net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of             `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24805/">CVE-2022-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24805">CVE-2022-24805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201103">SUSE bug 1201103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945003" comment="net-snmp-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945004" comment="net-snmp-agent-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945005" comment="net-snmp-devel-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945006" comment="net-snmp-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945007" comment="net-snmp-perl-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945008" comment="net-snmp-utils-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945009" comment="python3-net-snmp-5.9.1-13.el9_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24806" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24806" ref_url="https://www.suse.com/security/cve/CVE-2022-24806" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013226.html" source="SUSE-SU"/>
    <description>
    net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can exploit an Improper Input Validation vulnerability when SETing malformed OIDs in master agent and subagent simultaneously. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24806/">CVE-2022-24806 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24806">CVE-2022-24806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201103">SUSE bug 1201103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945003" comment="net-snmp-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945004" comment="net-snmp-agent-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945005" comment="net-snmp-devel-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945006" comment="net-snmp-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945007" comment="net-snmp-perl-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945008" comment="net-snmp-utils-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945009" comment="python3-net-snmp-5.9.1-13.el9_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24807" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24807" ref_url="https://www.suse.com/security/cve/CVE-2022-24807" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013226.html" source="SUSE-SU"/>
    <description>
    net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a malformed OID in a SET request to `SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable` can cause an out-of-bounds memory access. A user with read-write credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24807/">CVE-2022-24807 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24807">CVE-2022-24807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201103">SUSE bug 1201103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945003" comment="net-snmp-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945004" comment="net-snmp-agent-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945005" comment="net-snmp-devel-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945006" comment="net-snmp-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945007" comment="net-snmp-perl-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945008" comment="net-snmp-utils-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945009" comment="python3-net-snmp-5.9.1-13.el9_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24808</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24808" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24808" ref_url="https://www.suse.com/security/cve/CVE-2022-24808" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013226.html" source="SUSE-SU"/>
    <description>
    net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24808/">CVE-2022-24808 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24808">CVE-2022-24808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201103">SUSE bug 1201103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945003" comment="net-snmp-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945004" comment="net-snmp-agent-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945005" comment="net-snmp-devel-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945006" comment="net-snmp-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945007" comment="net-snmp-perl-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945008" comment="net-snmp-utils-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945009" comment="python3-net-snmp-5.9.1-13.el9_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24809" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24809" ref_url="https://www.suse.com/security/cve/CVE-2022-24809" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013226.html" source="SUSE-SU"/>
    <description>
    net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-only credentials can use a malformed OID in a `GET-NEXT` to the `nsVacmAccessTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24809/">CVE-2022-24809 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24809">CVE-2022-24809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201103">SUSE bug 1201103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945003" comment="net-snmp-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945004" comment="net-snmp-agent-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945005" comment="net-snmp-devel-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945006" comment="net-snmp-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945007" comment="net-snmp-perl-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945008" comment="net-snmp-utils-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945009" comment="python3-net-snmp-5.9.1-13.el9_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24810" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24810" ref_url="https://www.suse.com/security/cve/CVE-2022-24810" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4205-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013226.html" source="SUSE-SU"/>
    <description>
    net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a SET to the nsVacmAccessTable to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24810/">CVE-2022-24810 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24810">CVE-2022-24810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201103">SUSE bug 1201103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945003" comment="net-snmp-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945004" comment="net-snmp-agent-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945005" comment="net-snmp-devel-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945006" comment="net-snmp-libs-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945007" comment="net-snmp-perl-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945008" comment="net-snmp-utils-5.9.1-13.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945009" comment="python3-net-snmp-5.9.1-13.el9_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24834" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24834" ref_url="https://www.suse.com/security/cve/CVE-2022-24834" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0595" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000798.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016003.html" source="SUSE-SU"/>
    <description>
    Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24834/">CVE-2022-24834 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24834">CVE-2022-24834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213193">SUSE bug 1213193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961486" comment="redis-6.2.17-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961487" comment="redis-devel-6.2.17-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961488" comment="redis-doc-6.2.17-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24903" ref_url="https://www.suse.com/security/cve/CVE-2022-24903" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011484.html" source="SUSE-SU"/>
    <description>
    Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum number of octets, digits are written to a heap buffer even when the octet count is over the maximum, This can be used to overrun the memory buffer. However, once the sequence of digits stop, no additional characters can be added to the buffer. In our opinion, this makes remote exploits impossible or at least highly complex. Octet-counted framing is one of two potential framing modes. It is relatively uncommon, but enabled by default on receivers. Modules `imtcp`, `imptcp`, `imgssapi`, and `imhttp` are used for regular syslog message reception. It is best practice not to directly expose them to the public. When this practice is followed, the risk is considerably lower. Module `imdiag` is a diagnostics module primarily intended for testbench runs. We do not expect it to be present on any production installation. Octet-counted framing is not very common. Usually, it needs to be specifically enabled at senders. If users do not need it, they can turn it off for the most important modules. This will mitigate the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24903/">CVE-2022-24903 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24903">CVE-2022-24903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199061">SUSE bug 1199061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201736">SUSE bug 1201736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206201">SUSE bug 1206201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225528">SUSE bug 1225528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225631">SUSE bug 1225631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804239" comment="rsyslog-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804240" comment="rsyslog-crypto-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804241" comment="rsyslog-doc-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804242" comment="rsyslog-elasticsearch-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804243" comment="rsyslog-gnutls-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804244" comment="rsyslog-gssapi-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804245" comment="rsyslog-kafka-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804246" comment="rsyslog-logrotate-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804247" comment="rsyslog-mmaudit-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804248" comment="rsyslog-mmfields-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804249" comment="rsyslog-mmjsonparse-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804250" comment="rsyslog-mmkubernetes-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804251" comment="rsyslog-mmnormalize-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804252" comment="rsyslog-mmsnmptrapd-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804253" comment="rsyslog-mysql-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804254" comment="rsyslog-omamqp1-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804255" comment="rsyslog-openssl-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804256" comment="rsyslog-pgsql-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804257" comment="rsyslog-relp-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804258" comment="rsyslog-snmp-8.2102.0-101.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804259" comment="rsyslog-udpspoof-8.2102.0-101.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24921" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010692.html" source="SUSE-SU"/>
    <description>
    regexp.Compile in Go before 1.16.15 and 1.17.x before 1.17.8 allows stack exhaustion via a deeply nested expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202224963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-24963</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-24963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24963" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-24963" ref_url="https://www.suse.com/security/cve/CVE-2022-24963" source="SUSE CVE"/>
    <description>
    Integer Overflow or Wraparound vulnerability in apr_encode functions of Apache Portable Runtime (APR) allows an attacker to write beyond bounds of a buffer.
This issue affects Apache Portable Runtime (APR) version 1.7.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24963/">CVE-2022-24963 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-24963">CVE-2022-24963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207870">SUSE bug 1207870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816706" comment="apr-1.7.0-12.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816707" comment="apr-devel-1.7.0-12.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2503" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2503" ref_url="https://www.suse.com/security/cve/CVE-2022-2503" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
    <description>
    Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. We recommend upgrading past commit 4caae58406f8ceb741603eee460d79bacca9b1b5
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2503/">CVE-2022-2503 at SUSE</cve>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2503">CVE-2022-2503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202677">SUSE bug 1202677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2505" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2505" ref_url="https://www.suse.com/security/cve/CVE-2022-2505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.1, Firefox &lt; 103, and Thunderbird &lt; 102.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2505/">CVE-2022-2505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2505">CVE-2022-2505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804400" comment="firefox-91.12.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804401" comment="thunderbird-91.12.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2509</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2509" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2509" ref_url="https://www.suse.com/security/cve/CVE-2022-2509" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2882-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JAQLUGC23B5QJHCL4H7XZA5J2ZZWYDUP/" source="SUSE-SU"/>
    <description>
    A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2509/">CVE-2022-2509 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2509">CVE-2022-2509 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202020">SUSE bug 1202020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202593">SUSE bug 1202593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804602" comment="gnutls-3.7.6-12.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804603" comment="gnutls-c++-3.7.6-12.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804604" comment="gnutls-dane-3.7.6-12.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804605" comment="gnutls-devel-3.7.6-12.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804606" comment="gnutls-utils-3.7.6-12.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804607" comment="nettle-3.8-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804608" comment="nettle-devel-3.8-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25147" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25147" ref_url="https://www.suse.com/security/cve/CVE-2022-25147" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013744.html" source="SUSE-SU"/>
    <description>
    Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer.




This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25147/">CVE-2022-25147 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25147">CVE-2022-25147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207866">SUSE bug 1207866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209320">SUSE bug 1209320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806002" comment="apr-util-1.6.1-20.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806003" comment="apr-util-bdb-1.6.1-20.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806004" comment="apr-util-devel-1.6.1-20.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806005" comment="apr-util-ldap-1.6.1-20.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806006" comment="apr-util-mysql-1.6.1-20.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806007" comment="apr-util-odbc-1.6.1-20.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806008" comment="apr-util-openssl-1.6.1-20.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806009" comment="apr-util-pgsql-1.6.1-20.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806010" comment="apr-util-sqlite-1.6.1-20.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2519" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2519" ref_url="https://www.suse.com/security/cve/CVE-2022-2519" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2519/">CVE-2022-2519 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2519">CVE-2022-2519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202968">SUSE bug 1202968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205505">SUSE bug 1205505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805194" comment="libtiff-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805195" comment="libtiff-devel-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805196" comment="libtiff-tools-4.4.0-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2520" ref_url="https://www.suse.com/security/cve/CVE-2022-2520" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2520/">CVE-2022-2520 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2520">CVE-2022-2520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202973">SUSE bug 1202973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805194" comment="libtiff-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805195" comment="libtiff-devel-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805196" comment="libtiff-tools-4.4.0-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2521" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2521" ref_url="https://www.suse.com/security/cve/CVE-2022-2521" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012599.html" source="SUSE-SU"/>
    <description>
    It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2521/">CVE-2022-2521 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2521">CVE-2022-2521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202971">SUSE bug 1202971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205505">SUSE bug 1205505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805194" comment="libtiff-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805195" comment="libtiff-devel-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805196" comment="libtiff-tools-4.4.0-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25255</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010443.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIPE5FF5VKMSL2BZDJ46HDRCTHGR7IUG/" source="SUSE-SU"/>
    <description>
    In Qt 5.9.x through 5.15.x before 5.15.9 and 6.x before 6.2.4 on Linux and UNIX, QProcess could execute a binary from the current working directory when not found in the PATH.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25255">CVE-2022-25255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196501">SUSE bug 1196501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804842" comment="qt5-5.15.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804843" comment="qt5-devel-5.15.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804844" comment="qt5-rpm-macros-5.15.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804845" comment="qt5-srpm-macros-5.15.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25308</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25308" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25308" ref_url="https://www.suse.com/security/cve/CVE-2022-25308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011256.html" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow flaw was found in the Fribidi package. This flaw allows an attacker to pass a specially crafted file to the Fribidi application, which leads to a possible memory leak or a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25308/">CVE-2022-25308 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25308">CVE-2022-25308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196147">SUSE bug 1196147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804840" comment="fribidi-1.0.10-6.el9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804841" comment="fribidi-devel-1.0.10-6.el9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25309</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25309" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25309" ref_url="https://www.suse.com/security/cve/CVE-2022-25309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011256.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow flaw was found in the Fribidi package and affects the fribidi_cap_rtl_to_unicode() function of the fribidi-char-sets-cap-rtl.c file. This flaw allows an attacker to pass a specially crafted file to the Fribidi application with the '--caprtl' option, leading to a crash and causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-25309/">CVE-2022-25309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25309">CVE-2022-25309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196148">SUSE bug 1196148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804840" comment="fribidi-1.0.10-6.el9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804841" comment="fribidi-devel-1.0.10-6.el9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25310</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25310" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25310" ref_url="https://www.suse.com/security/cve/CVE-2022-25310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011256.html" source="SUSE-SU"/>
    <description>
    A segmentation fault (SEGV) flaw was found in the Fribidi package and affects the fribidi_remove_bidi_marks() function of the lib/fribidi.c file. This flaw allows an attacker to pass a specially crafted file to Fribidi, leading to a crash and causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25310/">CVE-2022-25310 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25310">CVE-2022-25310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196150">SUSE bug 1196150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804840" comment="fribidi-1.0.10-6.el9.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804841" comment="fribidi-devel-1.0.10-6.el9.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25313" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25313">CVE-2022-25313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804290" comment="expat-2.2.10-12.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804291" comment="expat-devel-2.2.10-12.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25314</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25314" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-March/022068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:14903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011419.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6H3EOIG3ASUYP7RIHFPOJG3PFJYN54WT/" source="SUSE-SU"/>
    <description>
    In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25314">CVE-2022-25314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197217">SUSE bug 1197217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198587">SUSE bug 1198587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199096">SUSE bug 1199096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200038">SUSE bug 1200038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200198">SUSE bug 1200198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804290" comment="expat-2.2.10-12.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804291" comment="expat-devel-2.2.10-12.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2553</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2553" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2553" ref_url="https://www.suse.com/security/cve/CVE-2022-2553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011726.html" source="SUSE-SU"/>
    <description>
    The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2553/">CVE-2022-2553 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2553">CVE-2022-2553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201946">SUSE bug 1201946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804519" comment="booth-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804520" comment="booth-arbitrator-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804521" comment="booth-core-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804522" comment="booth-site-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804523" comment="booth-test-1.0-251.3.bfb2f92.git.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2585" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2585" ref_url="https://www.suse.com/security/cve/CVE-2022-2585" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU timers would be left on a list but freed, leading to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2585/">CVE-2022-2585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2585">CVE-2022-2585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202094">SUSE bug 1202094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202163">SUSE bug 1202163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804705" comment="bpftool-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804706" comment="kernel-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804707" comment="kernel-abi-stablelists-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804708" comment="kernel-core-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804709" comment="kernel-cross-headers-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804710" comment="kernel-debug-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804711" comment="kernel-debug-core-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804714" comment="kernel-debug-modules-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804715" comment="kernel-debug-modules-extra-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804718" comment="kernel-doc-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804719" comment="kernel-headers-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804720" comment="kernel-modules-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804721" comment="kernel-modules-extra-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804722" comment="kernel-tools-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804723" comment="kernel-tools-libs-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804725" comment="perf-5.14.0-70.30.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804726" comment="python3-perf-5.14.0-70.30.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2586</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2586" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2586" ref_url="https://www.suse.com/security/cve/CVE-2022-2586" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    It was discovered that a nft object or expression could reference a nft set on a different nft table, leading to a use-after-free once that table was deleted.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2586/">CVE-2022-2586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2586">CVE-2022-2586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202095">SUSE bug 1202095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209719">SUSE bug 1209719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25881" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25881" ref_url="https://www.suse.com/security/cve/CVE-2022-25881" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1924-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
    <description>
    This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25881/">CVE-2022-25881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25881">CVE-2022-25881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208744">SUSE bug 1208744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805997" comment="nodejs-libs-16.19.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805998" comment="nodejs-nodemon-2.0.20-3.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202225883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-25883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-25883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25883" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-25883" ref_url="https://www.suse.com/security/cve/CVE-2022-25883" source="SUSE CVE"/>
    <description>
    Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-25883/">CVE-2022-25883 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-25883">CVE-2022-25883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212565">SUSE bug 1212565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806906" comment="nodejs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806907" comment="nodejs-devel-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806908" comment="nodejs-docs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806909" comment="nodejs-full-i18n-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806911" comment="npm-9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2601" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2601" ref_url="https://www.suse.com/security/cve/CVE-2022-2601" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014265.html" source="SUSE-SU"/>
		<reference ref_id="TID000021048" ref_url="https://www.suse.com/support/kb/doc/?id=000021048" source="SUSE-SU"/>
    <description>
    A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2601/">CVE-2022-2601 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601">CVE-2022-2601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205178">SUSE bug 1205178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805302" comment="grub2-common-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805303" comment="grub2-efi-x64-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805304" comment="grub2-efi-x64-cdboot-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805305" comment="grub2-efi-x64-modules-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805306" comment="grub2-pc-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805307" comment="grub2-pc-modules-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805308" comment="grub2-tools-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805309" comment="grub2-tools-efi-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805310" comment="grub2-tools-extra-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805311" comment="grub2-tools-minimal-2.06-46.el9_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26125" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26125" ref_url="https://www.suse.com/security/cve/CVE-2022-26125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010470.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:0901-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IMU2X5TQEN42TVGMLEB32I5WD3N5Z2FU/" source="SUSE-SU"/>
    <description>
    Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the input packet length in isisd/isis_tlvs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26125/">CVE-2022-26125 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26125">CVE-2022-26125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1196505">SUSE bug 1196505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804890" comment="frr-8.2.2-4.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2625" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2625" ref_url="https://www.suse.com/security/cve/CVE-2022-2625" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2989-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012228.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2625/">CVE-2022-2625 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2625">CVE-2022-2625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202368">SUSE bug 1202368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805481" comment="postgresql-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805482" comment="postgresql-contrib-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805483" comment="postgresql-docs-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805484" comment="postgresql-plperl-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805485" comment="postgresql-plpython3-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805486" comment="postgresql-pltcl-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805487" comment="postgresql-private-devel-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805488" comment="postgresql-private-libs-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805489" comment="postgresql-server-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805490" comment="postgresql-server-devel-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805491" comment="postgresql-static-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805492" comment="postgresql-test-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805493" comment="postgresql-upgrade-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805494" comment="postgresql-upgrade-devel-13.10-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26280</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26280" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26280" ref_url="https://www.suse.com/security/cve/CVE-2022-26280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011227.html" source="SUSE-SU"/>
    <description>
    Libarchive v3.6.0 was discovered to contain an out-of-bounds read via the component zipx_lzma_alone_init.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26280/">CVE-2022-26280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26280">CVE-2022-26280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197634">SUSE bug 1197634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804327" comment="bsdtar-3.5.3-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804328" comment="libarchive-3.5.3-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804329" comment="libarchive-devel-3.5.3-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26353</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26353" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26353" ref_url="https://www.suse.com/security/cve/CVE-2022-26353" source="SUSE CVE"/>
		<reference ref_id="RHSA-2022:5263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011391.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the virtio-net device of QEMU. This flaw was inadvertently introduced with the fix for CVE-2021-3748, which forgot to unmap the cached virtqueue elements on error, leading to memory leakage and other unexpected results. Affected QEMU version: 6.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-18"/>
	<updated date="2025-05-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26353/">CVE-2022-26353 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26353">CVE-2022-26353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198711">SUSE bug 1198711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009982264" comment="qemu-guest-agent-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982265" comment="qemu-img-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982266" comment="qemu-kvm-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982267" comment="qemu-kvm-audio-pa-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982268" comment="qemu-kvm-block-curl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982269" comment="qemu-kvm-block-rbd-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982270" comment="qemu-kvm-common-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982271" comment="qemu-kvm-core-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982272" comment="qemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982273" comment="qemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982274" comment="qemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982275" comment="qemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982276" comment="qemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982277" comment="qemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982278" comment="qemu-kvm-device-usb-host-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982279" comment="qemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982280" comment="qemu-kvm-docs-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982281" comment="qemu-kvm-tools-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982282" comment="qemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982283" comment="qemu-kvm-ui-opengl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982284" comment="qemu-pr-helper-6.2.0-11.el9_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26354</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26354" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26354" ref_url="https://www.suse.com/security/cve/CVE-2022-26354" source="SUSE CVE"/>
		<reference ref_id="RHSA-2022:5263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the vhost-vsock device of QEMU. In case of error, an invalid element was not detached from the virtqueue before freeing its memory, leading to memory leakage and other unexpected results. Affected QEMU versions &lt;= 6.2.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-18"/>
	<updated date="2025-05-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-26354/">CVE-2022-26354 at SUSE</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26354">CVE-2022-26354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198712">SUSE bug 1198712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009982264" comment="qemu-guest-agent-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982265" comment="qemu-img-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982266" comment="qemu-kvm-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982267" comment="qemu-kvm-audio-pa-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982268" comment="qemu-kvm-block-curl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982269" comment="qemu-kvm-block-rbd-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982270" comment="qemu-kvm-common-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982271" comment="qemu-kvm-core-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982272" comment="qemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982273" comment="qemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982274" comment="qemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982275" comment="qemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982276" comment="qemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982277" comment="qemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982278" comment="qemu-kvm-device-usb-host-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982279" comment="qemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982280" comment="qemu-kvm-docs-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982281" comment="qemu-kvm-tools-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982282" comment="qemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982283" comment="qemu-kvm-ui-opengl-6.2.0-11.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009982284" comment="qemu-pr-helper-6.2.0-11.el9_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26373" ref_url="https://www.suse.com/security/cve/CVE-2022-26373" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26373/">CVE-2022-26373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26373">CVE-2022-26373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201726">SUSE bug 1201726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209619">SUSE bug 1209619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26377</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26377" ref_url="https://www.suse.com/security/cve/CVE-2022-26377" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" source="SUSE-SU"/>
    <description>
    Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-26377/">CVE-2022-26377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26377">CVE-2022-26377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200338">SUSE bug 1200338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2639</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2639" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2639" ref_url="https://www.suse.com/security/cve/CVE-2022-2639" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An integer coercion error was found in the openvswitch kernel module. Given a sufficiently large number of actions, while copying and reserving memory for a new action of a new flow, the reserve_sfa_size() function does not return -EMSGSIZE as expected, potentially leading to an out-of-bounds write access. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-2639/">CVE-2022-2639 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2639">CVE-2022-2639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202154">SUSE bug 1202154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2663" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2663" ref_url="https://www.suse.com/security/cve/CVE-2022-2663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was found in the Linux kernel in nf_conntrack_irc where the message handling can be confused and incorrectly matches the message. A firewall may be able to be bypassed when users are using unencrypted IRC with nf_conntrack_irc configured.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-2663/">CVE-2022-2663 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2663">CVE-2022-2663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202097">SUSE bug 1202097</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212299">SUSE bug 1212299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26691" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26691" ref_url="https://www.suse.com/security/cve/CVE-2022-26691" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011166.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26691/">CVE-2022-26691 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26691">CVE-2022-26691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199474">SUSE bug 1199474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203785">SUSE bug 1203785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804267" comment="cups-2.3.3op2-13.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804268" comment="cups-client-2.3.3op2-13.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804269" comment="cups-devel-2.3.3op2-13.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804270" comment="cups-filesystem-2.3.3op2-13.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804271" comment="cups-ipptool-2.3.3op2-13.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804272" comment="cups-libs-2.3.3op2-13.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804273" comment="cups-lpd-2.3.3op2-13.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804274" comment="cups-printerapp-2.3.3op2-13.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26700" ref_url="https://www.suse.com/security/cve/CVE-2022-26700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26700/">CVE-2022-26700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26700">CVE-2022-26700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26709" ref_url="https://www.suse.com/security/cve/CVE-2022-26709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26709/">CVE-2022-26709 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26709">CVE-2022-26709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26710" ref_url="https://www.suse.com/security/cve/CVE-2022-26710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011626.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, tvOS 15.5, watchOS 8.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26710/">CVE-2022-26710 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26710">CVE-2022-26710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201221">SUSE bug 1201221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201792">SUSE bug 1201792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26716</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26716" ref_url="https://www.suse.com/security/cve/CVE-2022-26716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26716/">CVE-2022-26716 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26716">CVE-2022-26716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26717" ref_url="https://www.suse.com/security/cve/CVE-2022-26717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.5, watchOS 8.6, iOS 15.5 and iPadOS 15.5, macOS Monterey 12.4, Safari 15.5, iTunes 12.12.4 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26717/">CVE-2022-26717 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26717">CVE-2022-26717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202226719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-26719</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-26719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-26719" ref_url="https://www.suse.com/security/cve/CVE-2022-26719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in tvOS 15.5, iOS 15.5 and iPadOS 15.5, watchOS 8.6, macOS Monterey 12.4, Safari 15.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26719/">CVE-2022-26719 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-26719">CVE-2022-26719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200106">SUSE bug 1200106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27191" ref_url="https://www.suse.com/security/cve/CVE-2022-27191" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2839-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022860.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0319-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JLUFKCHWHJJ2MQ6XRREF7D4OOWB23V2/" source="SUSE-SU"/>
    <description>
    The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-10-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27191/">CVE-2022-27191 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27191">CVE-2022-27191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197284">SUSE bug 1197284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804838" comment="buildah-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804839" comment="buildah-tests-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804749" comment="podman-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804750" comment="podman-docker-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804751" comment="podman-gvproxy-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804752" comment="podman-plugins-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804753" comment="podman-remote-4.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804754" comment="podman-tests-4.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27337" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27337" ref_url="https://www.suse.com/security/cve/CVE-2022-27337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015763.html" source="SUSE-SU"/>
    <description>
    A logic error in the Hints::Hints function of Poppler v22.03.0 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-27337/">CVE-2022-27337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27337">CVE-2022-27337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199272">SUSE bug 1199272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225040">SUSE bug 1225040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804894" comment="poppler-21.01.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804895" comment="poppler-cpp-21.01.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804896" comment="poppler-cpp-devel-21.01.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804897" comment="poppler-devel-21.01.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804898" comment="poppler-glib-21.01.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804899" comment="poppler-glib-devel-21.01.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804900" comment="poppler-qt5-21.01.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804901" comment="poppler-qt5-devel-21.01.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804902" comment="poppler-utils-21.01.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2735" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2735" ref_url="https://www.suse.com/security/cve/CVE-2022-2735" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the PCS project. This issue occurs due to incorrect permissions on a Unix socket used for internal communication between PCS daemons. A privilege escalation could happen by obtaining an authentication token for a hacluster user. With the "hacluster" token, this flaw allows an attacker to have complete control over the cluster managed by PCS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-2735/">CVE-2022-2735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2735">CVE-2022-2735 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804502" comment="pcs-0.11.1-10.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804503" comment="pcs-snmp-0.11.1-10.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27376</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27376" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27376" ref_url="https://www.suse.com/security/cve/CVE-2022-27376" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27376/">CVE-2022-27376 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27376">CVE-2022-27376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198628">SUSE bug 1198628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27377</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27377" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27377" ref_url="https://www.suse.com/security/cve/CVE-2022-27377" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27377/">CVE-2022-27377 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27377">CVE-2022-27377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198603">SUSE bug 1198603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27378" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27378" ref_url="https://www.suse.com/security/cve/CVE-2022-27378" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27378/">CVE-2022-27378 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27378">CVE-2022-27378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198604">SUSE bug 1198604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27379</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27379" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27379" ref_url="https://www.suse.com/security/cve/CVE-2022-27379" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27379/">CVE-2022-27379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27379">CVE-2022-27379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198605">SUSE bug 1198605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27380</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27380" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27380" ref_url="https://www.suse.com/security/cve/CVE-2022-27380" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27380/">CVE-2022-27380 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27380">CVE-2022-27380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198606">SUSE bug 1198606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27381</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27381" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27381" ref_url="https://www.suse.com/security/cve/CVE-2022-27381" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27381/">CVE-2022-27381 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27381">CVE-2022-27381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198607">SUSE bug 1198607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27382</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27382" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27382" ref_url="https://www.suse.com/security/cve/CVE-2022-27382" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27382/">CVE-2022-27382 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27382">CVE-2022-27382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198609">SUSE bug 1198609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27383" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27383" ref_url="https://www.suse.com/security/cve/CVE-2022-27383" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27383/">CVE-2022-27383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27383">CVE-2022-27383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198610">SUSE bug 1198610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27384" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27384" ref_url="https://www.suse.com/security/cve/CVE-2022-27384" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27384/">CVE-2022-27384 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27384">CVE-2022-27384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198611">SUSE bug 1198611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27386" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27386" ref_url="https://www.suse.com/security/cve/CVE-2022-27386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27386/">CVE-2022-27386 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27386">CVE-2022-27386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198612">SUSE bug 1198612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27387" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27387" ref_url="https://www.suse.com/security/cve/CVE-2022-27387" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27387/">CVE-2022-27387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27387">CVE-2022-27387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198613">SUSE bug 1198613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27404" ref_url="https://www.suse.com/security/cve/CVE-2022-27404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021136.html" source="SUSE-SU"/>
    <description>
    FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27404/">CVE-2022-27404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27404">CVE-2022-27404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198830">SUSE bug 1198830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805017" comment="freetype-2.10.4-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805018" comment="freetype-devel-2.10.4-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27405" ref_url="https://www.suse.com/security/cve/CVE-2022-27405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021136.html" source="SUSE-SU"/>
    <description>
    FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27405/">CVE-2022-27405 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27405">CVE-2022-27405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198832">SUSE bug 1198832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805017" comment="freetype-2.10.4-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805018" comment="freetype-devel-2.10.4-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27406</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27406" ref_url="https://www.suse.com/security/cve/CVE-2022-27406" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3252-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021136.html" source="SUSE-SU"/>
    <description>
    FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27406/">CVE-2022-27406 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27406">CVE-2022-27406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198823">SUSE bug 1198823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805017" comment="freetype-2.10.4-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805018" comment="freetype-devel-2.10.4-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27444" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27444" ref_url="https://www.suse.com/security/cve/CVE-2022-27444" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27444/">CVE-2022-27444 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27444">CVE-2022-27444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198634">SUSE bug 1198634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27445</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27445" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27445" ref_url="https://www.suse.com/security/cve/CVE-2022-27445" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27445/">CVE-2022-27445 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27445">CVE-2022-27445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198629">SUSE bug 1198629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27446" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27446" ref_url="https://www.suse.com/security/cve/CVE-2022-27446" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27446/">CVE-2022-27446 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27446">CVE-2022-27446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198630">SUSE bug 1198630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/198630">SUSE bug 198630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27447</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27447" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27447" ref_url="https://www.suse.com/security/cve/CVE-2022-27447" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27447/">CVE-2022-27447 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27447">CVE-2022-27447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198631">SUSE bug 1198631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27448</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27448" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27448" ref_url="https://www.suse.com/security/cve/CVE-2022-27448" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    There is an Assertion failure in MariaDB Server v10.9 and below via 'node-&gt;pcur-&gt;rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27448/">CVE-2022-27448 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27448">CVE-2022-27448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198632">SUSE bug 1198632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27449</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27449" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27449" ref_url="https://www.suse.com/security/cve/CVE-2022-27449" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27449/">CVE-2022-27449 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27449">CVE-2022-27449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198633">SUSE bug 1198633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27451</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27451" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27451" ref_url="https://www.suse.com/security/cve/CVE-2022-27451" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27451/">CVE-2022-27451 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27451">CVE-2022-27451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198639">SUSE bug 1198639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27452</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27452" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27452" ref_url="https://www.suse.com/security/cve/CVE-2022-27452" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27452/">CVE-2022-27452 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27452">CVE-2022-27452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198640">SUSE bug 1198640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27455" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27455" ref_url="https://www.suse.com/security/cve/CVE-2022-27455" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27455/">CVE-2022-27455 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27455">CVE-2022-27455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198638">SUSE bug 1198638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27456" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27456" ref_url="https://www.suse.com/security/cve/CVE-2022-27456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27456/">CVE-2022-27456 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27456">CVE-2022-27456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198635">SUSE bug 1198635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27457</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27457" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27457" ref_url="https://www.suse.com/security/cve/CVE-2022-27457" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27457/">CVE-2022-27457 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27457">CVE-2022-27457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198636">SUSE bug 1198636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27458" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27458" ref_url="https://www.suse.com/security/cve/CVE-2022-27458" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011679.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27447. Reason: This candidate is a reservation duplicate of CVE-2022-27447. Notes: All CVE users should reference CVE-2022-27447 instead of this candidate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-27458/">CVE-2022-27458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27458">CVE-2022-27458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198637">SUSE bug 1198637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27635" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27635" ref_url="https://www.suse.com/security/cve/CVE-2022-27635" source="SUSE CVE"/>
    <description>
    Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-27635/">CVE-2022-27635 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27635">CVE-2022-27635 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811138" comment="iwl100-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811139" comment="iwl1000-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811140" comment="iwl105-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811141" comment="iwl135-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811142" comment="iwl2000-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811143" comment="iwl2030-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811144" comment="iwl3160-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811145" comment="iwl5000-firmware-8.83.5.1_1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811146" comment="iwl5150-firmware-8.24.2.2-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811147" comment="iwl6000g2a-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811148" comment="iwl6000g2b-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811149" comment="iwl6050-firmware-41.28.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811150" comment="iwl7260-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811151" comment="libertas-sd8787-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811152" comment="linux-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811153" comment="linux-firmware-whence-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811154" comment="netronome-firmware-20230814-140.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27664" ref_url="https://www.suse.com/security/cve/CVE-2022-27664" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
		<reference ref_id="TID000021647" ref_url="https://www.suse.com/support/kb/doc/?id=000021647" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JTZ2DTLVURMW7SOEALLXE6GW75RG2MM/" source="SUSE-SU"/>
    <description>
    In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-27664/">CVE-2022-27664 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27664">CVE-2022-27664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203185">SUSE bug 1203185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203293">SUSE bug 1203293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805714" comment="butane-0.16.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805209" comment="go-toolset-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805210" comment="golang-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805211" comment="golang-bin-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805212" comment="golang-docs-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805213" comment="golang-misc-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805214" comment="golang-race-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805215" comment="golang-src-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805216" comment="golang-tests-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805711" comment="grafana-9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805712" comment="grafana-pcp-5.1.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805722" comment="toolbox-0.0.99.3-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805723" comment="toolbox-tests-0.0.99.3-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27666">CVE-2022-27666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1197131">SUSE bug 1197131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804297" comment="bpftool-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804298" comment="kernel-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804299" comment="kernel-abi-stablelists-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804300" comment="kernel-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804301" comment="kernel-cross-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804302" comment="kernel-debug-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804303" comment="kernel-debug-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804306" comment="kernel-debug-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804307" comment="kernel-debug-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804310" comment="kernel-doc-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804311" comment="kernel-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804312" comment="kernel-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804313" comment="kernel-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804314" comment="kernel-tools-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804315" comment="kernel-tools-libs-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804317" comment="perf-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804318" comment="python3-perf-5.14.0-70.17.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27774</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27774" ref_url="https://www.suse.com/security/cve/CVE-2022-27774" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014912.html" source="SUSE-SU"/>
    <description>
    An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27774/">CVE-2022-27774 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27774">CVE-2022-27774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198608">SUSE bug 1198608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804292" comment="curl-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804293" comment="curl-minimal-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804294" comment="libcurl-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804295" comment="libcurl-devel-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804296" comment="libcurl-minimal-7.76.1-14.el9_0.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27775" ref_url="https://www.suse.com/security/cve/CVE-2022-27775" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010999.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-27775/">CVE-2022-27775 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27775">CVE-2022-27775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198723">SUSE bug 1198723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804984" comment="curl-7.76.1-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804985" comment="curl-minimal-7.76.1-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804986" comment="libcurl-7.76.1-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804987" comment="libcurl-devel-7.76.1-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804988" comment="libcurl-minimal-7.76.1-19.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27776" ref_url="https://www.suse.com/security/cve/CVE-2022-27776" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011020.html" source="SUSE-SU"/>
    <description>
    A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27776/">CVE-2022-27776 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27776">CVE-2022-27776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198766">SUSE bug 1198766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804292" comment="curl-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804293" comment="curl-minimal-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804294" comment="libcurl-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804295" comment="libcurl-devel-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804296" comment="libcurl-minimal-7.76.1-14.el9_0.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202227782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-27782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-27782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-27782" ref_url="https://www.suse.com/security/cve/CVE-2022-27782" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011931.html" source="SUSE-SU"/>
    <description>
    libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-27782/">CVE-2022-27782 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-27782">CVE-2022-27782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199224">SUSE bug 1199224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200694">SUSE bug 1200694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203786">SUSE bug 1203786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205070">SUSE bug 1205070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209214">SUSE bug 1209214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804292" comment="curl-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804293" comment="curl-minimal-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804294" comment="libcurl-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804295" comment="libcurl-devel-7.76.1-14.el9_0.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804296" comment="libcurl-minimal-7.76.1-14.el9_0.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2795" ref_url="https://www.suse.com/security/cve/CVE-2022-2795" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" source="SUSE-SU"/>
    <description>
    By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-2795/">CVE-2022-2795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2795">CVE-2022-2795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203614">SUSE bug 1203614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205842">SUSE bug 1205842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209913">SUSE bug 1209913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805758" comment="bind-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805759" comment="bind-chroot-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805760" comment="bind-devel-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805761" comment="bind-dnssec-doc-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805762" comment="bind-dnssec-utils-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805763" comment="bind-doc-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805764" comment="bind-libs-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805765" comment="bind-license-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805766" comment="bind-utils-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805767" comment="python3-bind-9.16.23-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28131" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28131" ref_url="https://www.suse.com/security/cve/CVE-2022-28131" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in Decoder.Skip in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a deeply nested XML document.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28131/">CVE-2022-28131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201443">SUSE bug 1201443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28199" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28199" ref_url="https://www.suse.com/security/cve/CVE-2022-28199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012405.html" source="SUSE-SU"/>
    <description>
    NVIDIA's distribution of the Data Plane Development Kit (MLNX_DPDK) contains a vulnerability in the network stack, where error recovery is not handled properly, which can allow a remote attacker to cause denial of service and some impact to data integrity and confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28199/">CVE-2022-28199 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28199">CVE-2022-28199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202956">SUSE bug 1202956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804956" comment="dpdk-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804957" comment="dpdk-devel-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804958" comment="dpdk-doc-21.11.2-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804959" comment="dpdk-tools-21.11.2-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28327</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28327" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    The generic P-256 feature in crypto/elliptic in Go before 1.17.9 and 1.18.x before 1.18.1 allows a panic via long scalar input.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198424">SUSE bug 1198424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
    <description>
    usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28388">CVE-2022-28388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
    <description>
    ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28390">CVE-2022-28390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201517">SUSE bug 1201517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207969">SUSE bug 1207969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2850</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2850" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2850" ref_url="https://www.suse.com/security/cve/CVE-2022-2850" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012268.html" source="SUSE-SU"/>
    <description>
    A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2850/">CVE-2022-2850 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2850">CVE-2022-2850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202470">SUSE bug 1202470</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804903" comment="389-ds-base-2.1.3-4.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804904" comment="389-ds-base-libs-2.1.3-4.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804905" comment="python3-lib389-2.1.3-4.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28614" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28614" ref_url="https://www.suse.com/security/cve/CVE-2022-28614" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" source="SUSE-SU"/>
    <description>
    The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28614/">CVE-2022-28614 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28614">CVE-2022-28614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200340">SUSE bug 1200340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28615" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28615" ref_url="https://www.suse.com/security/cve/CVE-2022-28615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28615/">CVE-2022-28615 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28615">CVE-2022-28615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200341">SUSE bug 1200341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28693" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28693" ref_url="https://www.suse.com/security/cve/CVE-2022-28693" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
    <description>
    Unprotected alternative channel of return branch target prediction in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28693/">CVE-2022-28693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-28693">CVE-2022-28693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201455">SUSE bug 1201455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2873" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2873" ref_url="https://www.suse.com/security/cve/CVE-2022-2873" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the Linux kernel Intel's iSMT SMBus host controller driver in the way a user triggers the I2C_SMBUS_BLOCK_DATA (with the ioctl I2C_SMBUS) with malicious input data. This flaw allows a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2873/">CVE-2022-2873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2873">CVE-2022-2873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202558">SUSE bug 1202558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805323" comment="bpftool-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805324" comment="kernel-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805325" comment="kernel-abi-stablelists-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805326" comment="kernel-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805327" comment="kernel-cross-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805328" comment="kernel-debug-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805329" comment="kernel-debug-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805332" comment="kernel-debug-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805333" comment="kernel-debug-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805336" comment="kernel-doc-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805337" comment="kernel-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805338" comment="kernel-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805339" comment="kernel-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805340" comment="kernel-tools-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805341" comment="kernel-tools-libs-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805343" comment="perf-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805344" comment="python3-perf-5.14.0-162.18.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28738" ref_url="https://www.suse.com/security/cve/CVE-2022-28738" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-28738/">CVE-2022-28738 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28738">CVE-2022-28738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198440">SUSE bug 1198440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804524" comment="ruby-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804525" comment="ruby-default-gems-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804526" comment="ruby-devel-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804527" comment="ruby-doc-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804528" comment="ruby-libs-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804529" comment="rubygem-bigdecimal-3.0.0-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804530" comment="rubygem-bundler-2.2.33-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804531" comment="rubygem-io-console-0.5.7-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804532" comment="rubygem-irb-1.3.5-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804533" comment="rubygem-json-2.5.1-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804534" comment="rubygem-minitest-5.14.2-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804535" comment="rubygem-power_assert-1.2.0-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804536" comment="rubygem-psych-3.3.2-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804537" comment="rubygem-rake-13.0.3-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804538" comment="rubygem-rbs-1.4.0-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804539" comment="rubygem-rdoc-6.3.3-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804540" comment="rubygem-rexml-3.2.5-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804541" comment="rubygem-rss-0.2.9-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804542" comment="rubygem-test-unit-3.3.7-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804543" comment="rubygem-typeprof-0.15.2-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804544" comment="rubygems-3.2.33-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804545" comment="rubygems-devel-3.2.33-160.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28739" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/010920.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28739">CVE-2022-28739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804524" comment="ruby-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804525" comment="ruby-default-gems-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804526" comment="ruby-devel-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804527" comment="ruby-doc-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804528" comment="ruby-libs-3.0.4-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804529" comment="rubygem-bigdecimal-3.0.0-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804530" comment="rubygem-bundler-2.2.33-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804531" comment="rubygem-io-console-0.5.7-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804532" comment="rubygem-irb-1.3.5-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804533" comment="rubygem-json-2.5.1-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804534" comment="rubygem-minitest-5.14.2-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804535" comment="rubygem-power_assert-1.2.0-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804536" comment="rubygem-psych-3.3.2-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804537" comment="rubygem-rake-13.0.3-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804538" comment="rubygem-rbs-1.4.0-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804539" comment="rubygem-rdoc-6.3.3-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804540" comment="rubygem-rexml-3.2.5-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804541" comment="rubygem-rss-0.2.9-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804542" comment="rubygem-test-unit-3.3.7-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804543" comment="rubygem-typeprof-0.15.2-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804544" comment="rubygems-3.2.33-160.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804545" comment="rubygems-devel-3.2.33-160.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2879" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2879" ref_url="https://www.suse.com/security/cve/CVE-2022-2879" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Reader.Read does not set a limit on the maximum size of file headers. A maliciously crafted archive could cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panics. After fix, Reader.Read limits the maximum size of header blocks to 1 MiB.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2879/">CVE-2022-2879 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2879">CVE-2022-2879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204024">SUSE bug 1204024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805209" comment="go-toolset-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805210" comment="golang-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805211" comment="golang-bin-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805212" comment="golang-docs-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805213" comment="golang-misc-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805214" comment="golang-race-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805215" comment="golang-src-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805216" comment="golang-tests-1.18.9-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2880" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2880" ref_url="https://www.suse.com/security/cve/CVE-2022-2880" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Requests forwarded by ReverseProxy include the raw query parameters from the inbound request, including unparsable parameters rejected by net/http. This could permit query parameter smuggling when a Go proxy forwards a parameter with an unparsable value. After fix, ReverseProxy sanitizes the query parameters in the forwarded query when the outbound request's Form field is set after the ReverseProxy. Director function returns, indicating that the proxy has parsed the query parameters. Proxies which do not parse query parameters continue to forward the original query parameters unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2880/">CVE-2022-2880 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2880">CVE-2022-2880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204025">SUSE bug 1204025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204076">SUSE bug 1204076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805209" comment="go-toolset-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805210" comment="golang-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805211" comment="golang-bin-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805212" comment="golang-docs-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805213" comment="golang-misc-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805214" comment="golang-race-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805215" comment="golang-src-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805216" comment="golang-tests-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805711" comment="grafana-9.0.9-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28805" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28805" ref_url="https://www.suse.com/security/cve/CVE-2022-28805" source="SUSE CVE"/>
    <description>
    singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28805/">CVE-2022-28805 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28805">CVE-2022-28805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198328">SUSE bug 1198328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805955" comment="lua-5.4.4-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805956" comment="lua-devel-5.4.4-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805957" comment="lua-libs-5.4.4-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202228893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-28893</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-28893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28893" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-28893" ref_url="https://www.suse.com/security/cve/CVE-2022-28893" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
    <description>
    The SUNRPC subsystem in the Linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28893/">CVE-2022-28893 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-28893">CVE-2022-28893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198330">SUSE bug 1198330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29117" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29117" ref_url="https://www.suse.com/security/cve/CVE-2022-29117" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29117/">CVE-2022-29117 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29117">CVE-2022-29117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199422">SUSE bug 1199422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804203" comment="aspnetcore-runtime-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804204" comment="aspnetcore-targeting-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804205" comment="dotnet-apphost-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804206" comment="dotnet-host-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804207" comment="dotnet-hostfxr-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804208" comment="dotnet-runtime-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804209" comment="dotnet-sdk-6.0-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804210" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804211" comment="dotnet-targeting-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804212" comment="dotnet-templates-6.0-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804213" comment="netstandard-targeting-pack-2.1-6.0.105-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29145" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29145" ref_url="https://www.suse.com/security/cve/CVE-2022-29145" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29145/">CVE-2022-29145 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29145">CVE-2022-29145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199421">SUSE bug 1199421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804203" comment="aspnetcore-runtime-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804204" comment="aspnetcore-targeting-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804205" comment="dotnet-apphost-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804206" comment="dotnet-host-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804207" comment="dotnet-hostfxr-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804208" comment="dotnet-runtime-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804209" comment="dotnet-sdk-6.0-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804210" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804211" comment="dotnet-targeting-pack-6.0-6.0.5-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804212" comment="dotnet-templates-6.0-6.0.105-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804213" comment="netstandard-targeting-pack-2.1-6.0.105-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29154" ref_url="https://www.suse.com/security/cve/CVE-2022-29154" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2959-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012056.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29154/">CVE-2022-29154 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29154">CVE-2022-29154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201840">SUSE bug 1201840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202970">SUSE bug 1202970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202998">SUSE bug 1202998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203401">SUSE bug 1203401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203727">SUSE bug 1203727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203789">SUSE bug 1203789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204119">SUSE bug 1204119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205072">SUSE bug 1205072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804496" comment="rsync-3.2.3-9.el9_0.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804497" comment="rsync-daemon-3.2.3-9.el9_0.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29162</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29162" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29162" ref_url="https://www.suse.com/security/cve/CVE-2022-29162" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012328.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container security sandbox as the inheritable set never contained more capabilities than were included in the container's bounding set. This bug has been fixed in runc 1.1.2. This fix changes `runc exec --cap` behavior such that the additional capabilities granted to the process being executed (as specified via `--cap` arguments) do not include inheritable capabilities. In addition, `runc spec` is changed to not set any inheritable capabilities in the created example OCI spec (`config.json`) file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29162/">CVE-2022-29162 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29162">CVE-2022-29162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199460">SUSE bug 1199460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804881" comment="runc-1.1.4-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29187</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29187" ref_url="https://www.suse.com/security/cve/CVE-2022-29187" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012490.html" source="SUSE-SU"/>
    <description>
    Git is a distributed revision control system. Git prior to versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5, is vulnerable to privilege escalation in all platforms. An unsuspecting user could still be affected by the issue reported in CVE-2022-24765, for example when navigating as root into a shared tmp directory that is owned by them, but where an attacker could create a git repository. Versions 2.37.1, 2.36.2, 2.35.4, 2.34.4, 2.33.4, 2.32.3, 2.31.4, and 2.30.5 contain a patch for this issue. The simplest way to avoid being affected by the exploit described in the example is to avoid running git as root (or an Administrator in Windows), and if needed to reduce its use to a minimum. While a generic workaround is not possible, a system could be hardened from the exploit described in the example by removing any such repository if it exists already and creating one as root to block any future attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29187/">CVE-2022-29187 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29187">CVE-2022-29187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201431">SUSE bug 1201431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201794">SUSE bug 1201794</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203448">SUSE bug 1203448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805794" comment="git-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805795" comment="git-all-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805796" comment="git-core-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805797" comment="git-core-doc-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805798" comment="git-credential-libsecret-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805799" comment="git-daemon-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805800" comment="git-email-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805801" comment="git-gui-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805802" comment="git-instaweb-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805803" comment="git-subtree-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805804" comment="git-svn-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805805" comment="gitk-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805806" comment="gitweb-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805807" comment="perl-Git-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805808" comment="perl-Git-SVN-2.39.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29244" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29244" ref_url="https://www.suse.com/security/cve/CVE-2022-29244" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025091.html" source="SUSE-SU"/>
    <description>
    npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=&lt;name&gt;`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29244/">CVE-2022-29244 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29244">CVE-2022-29244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200517">SUSE bug 1200517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2928" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2928" ref_url="https://www.suse.com/security/cve/CVE-2022-2928" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012927.html" source="SUSE-SU"/>
    <description>
    In ISC DHCP 4.4.0 -&gt; 4.4.3, ISC DHCP 4.1-ESV-R1 -&gt; 4.1-ESV-R16-P1, when the function option_code_hash_lookup() is called from add_option(), it increases the option's refcount field. However, there is not a corresponding call to option_dereference() to decrement the refcount field. The function add_option() is only used in server responses to lease query packets. Each lease query response calls this function for several options, so eventually, the reference counters could overflow and cause the server to abort.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2928/">CVE-2022-2928 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2928">CVE-2022-2928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203988">SUSE bug 1203988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805910" comment="dhcp-client-4.4.2-18.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805911" comment="dhcp-common-4.4.2-18.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805912" comment="dhcp-relay-4.4.2-18.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805913" comment="dhcp-server-4.4.2-18.b1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2929" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2929" ref_url="https://www.suse.com/security/cve/CVE-2022-2929" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012927.html" source="SUSE-SU"/>
    <description>
    In ISC DHCP 1.0 -&gt; 4.4.3, ISC DHCP 4.1-ESV-R1 -&gt; 4.1-ESV-R16-P1 a system with access to a DHCP server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually cause the server to run out of memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-2929/">CVE-2022-2929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2929">CVE-2022-2929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203989">SUSE bug 1203989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805910" comment="dhcp-client-4.4.2-18.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805911" comment="dhcp-common-4.4.2-18.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805912" comment="dhcp-relay-4.4.2-18.b1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805913" comment="dhcp-server-4.4.2-18.b1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29404" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29404" ref_url="https://www.suse.com/security/cve/CVE-2022-29404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" source="SUSE-SU"/>
    <description>
    In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29404/">CVE-2022-29404 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29404">CVE-2022-29404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200345">SUSE bug 1200345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29458" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29458" ref_url="https://www.suse.com/security/cve/CVE-2022-29458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12876" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-August/024348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2717-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2718-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011831.html" source="SUSE-SU"/>
    <description>
    ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation violation in convert_strings in tinfo/read_entry.c in the terminfo library.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-12"/>
	<updated date="2025-08-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29458/">CVE-2022-29458 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29458">CVE-2022-29458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198627">SUSE bug 1198627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013280" comment="ncurses-6.2-10.20210508.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013281" comment="ncurses-base-6.2-10.20210508.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013282" comment="ncurses-c++-libs-6.2-10.20210508.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013283" comment="ncurses-devel-6.2-10.20210508.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013284" comment="ncurses-libs-6.2-10.20210508.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013285" comment="ncurses-term-6.2-10.20210508.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29526" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29526" ref_url="https://www.suse.com/security/cve/CVE-2022-29526" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Assignment. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-29526/">CVE-2022-29526 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199413">SUSE bug 1199413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2953</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2953" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2953" ref_url="https://www.suse.com/security/cve/CVE-2022-2953" source="SUSE CVE"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in extractImageSection in tools/tiffcrop.c:6905, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 48d6ece8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-2953/">CVE-2022-2953 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2953">CVE-2022-2953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202941">SUSE bug 1202941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805194" comment="libtiff-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805195" comment="libtiff-devel-4.4.0-5.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805196" comment="libtiff-tools-4.4.0-5.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29581" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29581" ref_url="https://www.suse.com/security/cve/CVE-2022-29581" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012463.html" source="SUSE-SU"/>
    <description>
    Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29581/">CVE-2022-29581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29581">CVE-2022-29581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199665">SUSE bug 1199665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199695">SUSE bug 1199695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2959</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2959" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2959" ref_url="https://www.suse.com/security/cve/CVE-2022-2959" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2959/">CVE-2022-2959 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2959">CVE-2022-2959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202681">SUSE bug 1202681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202685">SUSE bug 1202685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805222" comment="bpftool-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805223" comment="kernel-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805224" comment="kernel-abi-stablelists-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805225" comment="kernel-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805226" comment="kernel-cross-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805227" comment="kernel-debug-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805228" comment="kernel-debug-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805231" comment="kernel-debug-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805232" comment="kernel-debug-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805235" comment="kernel-doc-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805236" comment="kernel-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805237" comment="kernel-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805238" comment="kernel-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805239" comment="kernel-tools-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805240" comment="kernel-tools-libs-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805242" comment="perf-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805243" comment="python3-perf-5.14.0-162.12.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2964" ref_url="https://www.suse.com/security/cve/CVE-2022-2964" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's driver for the ASIX AX88179_178A-based USB 2.0/3.0 Gigabit Ethernet Devices. The vulnerability contains multiple out-of-bounds reads and possible out-of-bounds writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-2964/">CVE-2022-2964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2964">CVE-2022-2964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202686">SUSE bug 1202686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203008">SUSE bug 1203008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805222" comment="bpftool-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805223" comment="kernel-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805224" comment="kernel-abi-stablelists-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805225" comment="kernel-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805226" comment="kernel-cross-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805227" comment="kernel-debug-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805228" comment="kernel-debug-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805231" comment="kernel-debug-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805232" comment="kernel-debug-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805235" comment="kernel-doc-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805236" comment="kernel-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805237" comment="kernel-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805238" comment="kernel-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805239" comment="kernel-tools-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805240" comment="kernel-tools-libs-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805242" comment="perf-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805243" comment="python3-perf-5.14.0-162.12.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29824" ref_url="https://www.suse.com/security/cve/CVE-2022-29824" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29824/">CVE-2022-29824 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824">CVE-2022-29824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199132">SUSE bug 1199132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202878">SUSE bug 1202878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204121">SUSE bug 1204121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204131">SUSE bug 1204131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205069">SUSE bug 1205069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804319" comment="libxml2-2.9.13-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804320" comment="libxml2-devel-2.9.13-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804321" comment="python3-libxml2-2.9.13-1.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2989" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2989" ref_url="https://www.suse.com/security/cve/CVE-2022-2989" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013710.html" source="SUSE-SU"/>
    <description>
    An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2989/">CVE-2022-2989 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2989">CVE-2022-2989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202809">SUSE bug 1202809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804838" comment="buildah-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804839" comment="buildah-tests-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805059" comment="podman-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805060" comment="podman-catatonit-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805061" comment="podman-docker-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805062" comment="podman-gvproxy-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805063" comment="podman-plugins-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805064" comment="podman-remote-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805065" comment="podman-tests-4.2.0-7.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20222990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-2990</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-2990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2990" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-2990" ref_url="https://www.suse.com/security/cve/CVE-2022-2990" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-October/025850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016711.html" source="SUSE-SU"/>
    <description>
    An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-2990/">CVE-2022-2990 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-2990">CVE-2022-2990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202812">SUSE bug 1202812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804838" comment="buildah-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804839" comment="buildah-tests-1.27.0-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805059" comment="podman-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805060" comment="podman-catatonit-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805061" comment="podman-docker-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805062" comment="podman-gvproxy-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805063" comment="podman-plugins-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805064" comment="podman-remote-4.2.0-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805065" comment="podman-tests-4.2.0-7.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29900" ref_url="https://www.suse.com/security/cve/CVE-2022-29900" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
		<reference ref_id="TID000021148" ref_url="https://www.suse.com/support/kb/doc/?id=000021148" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29900/">CVE-2022-29900 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29900">CVE-2022-29900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29901</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29901" ref_url="https://www.suse.com/security/cve/CVE-2022-29901" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="TID000020693" ref_url="https://www.suse.com/support/kb/doc/?id=000020693" source="SUSE-SU"/>
		<reference ref_id="TID000021148" ref_url="https://www.suse.com/support/kb/doc/?id=000021148" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29901/">CVE-2022-29901 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29901">CVE-2022-29901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199657">SUSE bug 1199657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201469">SUSE bug 1201469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207894">SUSE bug 1207894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29909</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29909" ref_url="https://www.suse.com/security/cve/CVE-2022-29909" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29909/">CVE-2022-29909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29909">CVE-2022-29909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804215" comment="firefox-91.9.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29911" ref_url="https://www.suse.com/security/cve/CVE-2022-29911" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An improper implementation of the new iframe sandbox keyword &lt;code&gt;allow-top-navigation-by-user-activation&lt;/code&gt; could lead to script execution without &lt;code&gt;allow-scripts&lt;/code&gt; being present. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29911/">CVE-2022-29911 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29911">CVE-2022-29911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804215" comment="firefox-91.9.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29912</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29912" ref_url="https://www.suse.com/security/cve/CVE-2022-29912" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29912/">CVE-2022-29912 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29912">CVE-2022-29912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804215" comment="firefox-91.9.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29913" ref_url="https://www.suse.com/security/cve/CVE-2022-29913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
    <description>
    The parent process would not properly check whether the Speech Synthesis feature is enabled, when receiving instructions from a child process. This vulnerability affects Thunderbird &lt; 91.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-29913/">CVE-2022-29913 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29913">CVE-2022-29913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29914" ref_url="https://www.suse.com/security/cve/CVE-2022-29914" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29914/">CVE-2022-29914 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29914">CVE-2022-29914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804215" comment="firefox-91.9.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29916</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29916" ref_url="https://www.suse.com/security/cve/CVE-2022-29916" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29916/">CVE-2022-29916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29916">CVE-2022-29916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804215" comment="firefox-91.9.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29917" ref_url="https://www.suse.com/security/cve/CVE-2022-29917" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2022:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-May/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 91.9, Firefox ESR &lt; 91.9, and Firefox &lt; 100.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29917/">CVE-2022-29917 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29917">CVE-2022-29917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1198970">SUSE bug 1198970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804215" comment="firefox-91.9.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804214" comment="thunderbird-91.9.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202229970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-29970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-29970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29970" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-29970" ref_url="https://www.suse.com/security/cve/CVE-2022-29970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011265.html" source="SUSE-SU"/>
    <description>
    Sinatra before 2.2.0 does not validate that the expanded path matches public_dir when serving static files.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-29970/">CVE-2022-29970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-29970">CVE-2022-29970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199138">SUSE bug 1199138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804201" comment="pcs-0.11.1-10.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804202" comment="pcs-snmp-0.11.1-10.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30067</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30067" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30067" ref_url="https://www.suse.com/security/cve/CVE-2022-30067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-May/011204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011735.html" source="SUSE-SU"/>
    <description>
    GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Through a crafted XCF file, the program will allocate for a huge amount of memory, resulting in insufficient memory or program crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30067/">CVE-2022-30067 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30067">CVE-2022-30067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199653">SUSE bug 1199653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804809" comment="gimp-2.99.8-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804810" comment="gimp-libs-2.99.8-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30184" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30184" ref_url="https://www.suse.com/security/cve/CVE-2022-30184" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-30184/">CVE-2022-30184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30184">CVE-2022-30184 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804275" comment="aspnetcore-runtime-6.0-6.0.6-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804276" comment="aspnetcore-targeting-pack-6.0-6.0.6-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804277" comment="dotnet-apphost-pack-6.0-6.0.6-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804278" comment="dotnet-host-6.0.6-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804279" comment="dotnet-hostfxr-6.0-6.0.6-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804280" comment="dotnet-runtime-6.0-6.0.6-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804281" comment="dotnet-sdk-6.0-6.0.106-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804282" comment="dotnet-targeting-pack-6.0-6.0.6-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804283" comment="dotnet-templates-6.0-6.0.106-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804284" comment="netstandard-targeting-pack-2.1-6.0.106-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3028" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3028" ref_url="https://www.suse.com/security/cve/CVE-2022-3028" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bounds read and copying it into a socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3028/">CVE-2022-3028 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3028">CVE-2022-3028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202898">SUSE bug 1202898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212296">SUSE bug 1212296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30293</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30293" ref_url="https://www.suse.com/security/cve/CVE-2022-30293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011295.html" source="SUSE-SU"/>
    <description>
    In WebKitGTK through 2.36.0 (and WPE WebKit), there is a heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30293/">CVE-2022-30293 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293">CVE-2022-30293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199287">SUSE bug 1199287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3032" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3032" ref_url="https://www.suse.com/security/cve/CVE-2022-3032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    When receiving an HTML email that contained an &lt;code&gt;iframe&lt;/code&gt; element, which used a &lt;code&gt;srcdoc&lt;/code&gt; attribute to define the inner HTML document, remote objects specified in the nested document, for example images or videos, were not blocked. Rather, the network was accessed, the objects were loaded and displayed. This vulnerability affects Thunderbird &lt; 102.2.1 and Thunderbird &lt; 91.13.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3032/">CVE-2022-3032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3032">CVE-2022-3032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3033" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3033" ref_url="https://www.suse.com/security/cve/CVE-2022-3033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    If a Thunderbird user replied to a crafted HTML email containing a &lt;code&gt;meta&lt;/code&gt; tag, with the &lt;code&gt;meta&lt;/code&gt; tag having the &lt;code&gt;http-equiv="refresh"&lt;/code&gt; attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in the document. This bug doesn't affect users who have changed the default Message Body display setting to 'simple html' or 'plain text'. This vulnerability affects Thunderbird &lt; 102.2.1 and Thunderbird &lt; 91.13.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3033/">CVE-2022-3033 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3033">CVE-2022-3033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205941">SUSE bug 1205941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3034" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3034" ref_url="https://www.suse.com/security/cve/CVE-2022-3034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    When receiving an HTML email that specified to load an &lt;code&gt;iframe&lt;/code&gt; element from a remote location, a request to the remote document was sent. However, Thunderbird didn't display the document. This vulnerability affects Thunderbird &lt; 102.2.1 and Thunderbird &lt; 91.13.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3034/">CVE-2022-3034 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3034">CVE-2022-3034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30522" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30522" ref_url="https://www.suse.com/security/cve/CVE-2022-30522" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" source="SUSE-SU"/>
    <description>
    If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30522/">CVE-2022-30522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30522">CVE-2022-30522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200352">SUSE bug 1200352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30550" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30550" ref_url="https://www.suse.com/security/cve/CVE-2022-30550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011732.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the auth component in Dovecot 2.2 and 2.3 before 2.3.20. When two passdb configuration entries exist with the same driver and args settings, incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation in certain configurations. The documentation does not advise against the use of passdb definitions that have the same driver and args settings. One such configuration would be where an administrator wishes to use the same PAM configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-30550/">CVE-2022-30550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30550">CVE-2022-30550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201267">SUSE bug 1201267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804937" comment="dovecot-2.3.16-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804938" comment="dovecot-devel-2.3.16-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804939" comment="dovecot-mysql-2.3.16-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804940" comment="dovecot-pgsql-2.3.16-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804941" comment="dovecot-pigeonhole-2.3.16-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30556" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30556" ref_url="https://www.suse.com/security/cve/CVE-2022-30556" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30556/">CVE-2022-30556 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30556">CVE-2022-30556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200350">SUSE bug 1200350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30594" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30594" ref_url="https://www.suse.com/security/cve/CVE-2022-30594" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011744.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30594/">CVE-2022-30594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30594">CVE-2022-30594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199505">SUSE bug 1199505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1199602">SUSE bug 1199602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201549">SUSE bug 1201549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805222" comment="bpftool-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805223" comment="kernel-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805224" comment="kernel-abi-stablelists-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805225" comment="kernel-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805226" comment="kernel-cross-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805227" comment="kernel-debug-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805228" comment="kernel-debug-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805231" comment="kernel-debug-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805232" comment="kernel-debug-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805235" comment="kernel-doc-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805236" comment="kernel-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805237" comment="kernel-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805238" comment="kernel-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805239" comment="kernel-tools-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805240" comment="kernel-tools-libs-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805242" comment="perf-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805243" comment="python3-perf-5.14.0-162.12.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30629" ref_url="https://www.suse.com/security/cve/CVE-2022-30629" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Non-random values for ticket_age_add in session tickets in crypto/tls before Go 1.17.11 and Go 1.18.3 allow an attacker that can observe TLS handshakes to correlate successive connections by comparing ticket ages during session resumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-30629/">CVE-2022-30629 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200135">SUSE bug 1200135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805733" comment="buildah-1.29.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805734" comment="buildah-tests-1.29.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805823" comment="containernetworking-plugins-1.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805768" comment="podman-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805769" comment="podman-docker-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805770" comment="podman-gvproxy-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805771" comment="podman-plugins-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805772" comment="podman-remote-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805773" comment="podman-tests-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805774" comment="skopeo-1.11.2-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805775" comment="skopeo-tests-1.11.2-0.1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30630" ref_url="https://www.suse.com/security/cve/CVE-2022-30630" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in Glob in io/fs before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path which contains a large number of path separators.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30630/">CVE-2022-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201447">SUSE bug 1201447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804953" comment="grafana-pcp-3.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871419" comment="runc-1.1.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804885" comment="toolbox-0.0.99.3-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804886" comment="toolbox-tests-0.0.99.3-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30631" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30631" ref_url="https://www.suse.com/security/cve/CVE-2022-30631" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in Reader.Read in compress/gzip before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via an archive containing a large number of concatenated 0-length compressed files.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30631/">CVE-2022-30631 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201437">SUSE bug 1201437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804953" comment="grafana-pcp-3.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871419" comment="runc-1.1.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804885" comment="toolbox-0.0.99.3-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804886" comment="toolbox-tests-0.0.99.3-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30632" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30632" ref_url="https://www.suse.com/security/cve/CVE-2022-30632" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in Glob in path/filepath before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a path containing a large number of path separators.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30632/">CVE-2022-30632 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201445">SUSE bug 1201445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804953" comment="grafana-pcp-3.2.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871419" comment="runc-1.1.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804885" comment="toolbox-0.0.99.3-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804886" comment="toolbox-tests-0.0.99.3-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30633" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30633" ref_url="https://www.suse.com/security/cve/CVE-2022-30633" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in Unmarshal in encoding/xml before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via unmarshalling an XML document into a Go struct which has a nested field that uses the 'any' field tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30633/">CVE-2022-30633 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201440">SUSE bug 1201440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30635" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30635" ref_url="https://www.suse.com/security/cve/CVE-2022-30635" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in Decoder.Decode in encoding/gob before Go 1.17.12 and Go 1.18.4 allows an attacker to cause a panic due to stack exhaustion via a message which contains deeply nested structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-30635/">CVE-2022-30635 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201444">SUSE bug 1201444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804953" comment="grafana-pcp-3.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30698" ref_url="https://www.suse.com/security/cve/CVE-2022-30698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
    <description>
    NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound's delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30698/">CVE-2022-30698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30698">CVE-2022-30698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202031">SUSE bug 1202031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202033">SUSE bug 1202033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804851" comment="python3-unbound-1.16.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804852" comment="unbound-1.16.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804853" comment="unbound-devel-1.16.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804854" comment="unbound-libs-1.16.2-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30699" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30699" ref_url="https://www.suse.com/security/cve/CVE-2022-30699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
    <description>
    NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a rogue domain name when the cached delegation information is about to expire. The rogue nameserver delays the response so that the cached delegation information is expired. Upon receiving the delayed answer containing the delegation information, Unbound overwrites the now expired entries. This action can be repeated when the delegation information is about to expire making the rogue delegation information ever-updating. From version 1.16.2 on, Unbound stores the start time for a query and uses that to decide if the cached delegation information can be overwritten.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-30699/">CVE-2022-30699 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30699">CVE-2022-30699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202031">SUSE bug 1202031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202033">SUSE bug 1202033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804851" comment="python3-unbound-1.16.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804852" comment="unbound-1.16.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804853" comment="unbound-devel-1.16.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804854" comment="unbound-libs-1.16.2-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3077" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3077" ref_url="https://www.suse.com/security/cve/CVE-2022-3077" source="SUSE CVE"/>
    <description>
    A buffer overflow vulnerability was found in the Linux kernel Intel's iSMT SMBus host controller driver in the way it handled the I2C_SMBUS_BLOCK_PROC_CALL case (via the ioctl I2C_SMBUS) with malicious input data. This flaw could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3077/">CVE-2022-3077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3077">CVE-2022-3077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203040">SUSE bug 1203040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805222" comment="bpftool-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805223" comment="kernel-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805224" comment="kernel-abi-stablelists-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805225" comment="kernel-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805226" comment="kernel-cross-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805227" comment="kernel-debug-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805228" comment="kernel-debug-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805231" comment="kernel-debug-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805232" comment="kernel-debug-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805235" comment="kernel-doc-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805236" comment="kernel-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805237" comment="kernel-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805238" comment="kernel-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805239" comment="kernel-tools-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805240" comment="kernel-tools-libs-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805242" comment="perf-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805243" comment="python3-perf-5.14.0-162.12.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30784" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30784" ref_url="https://www.suse.com/security/cve/CVE-2022-30784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011934.html" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value in NTFS-3G through 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30784/">CVE-2022-30784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30784">CVE-2022-30784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199978">SUSE bug 1199978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805713" comment="libguestfs-winsupport-9.2-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30786" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30786" ref_url="https://www.suse.com/security/cve/CVE-2022-30786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011934.html" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate in NTFS-3G through 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30786/">CVE-2022-30786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30786">CVE-2022-30786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199978">SUSE bug 1199978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805713" comment="libguestfs-winsupport-9.2-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30788" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30788" ref_url="https://www.suse.com/security/cve/CVE-2022-30788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011934.html" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc in NTFS-3G through 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30788/">CVE-2022-30788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30788">CVE-2022-30788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199978">SUSE bug 1199978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805713" comment="libguestfs-winsupport-9.2-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202230789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-30789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-30789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30789" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-30789" ref_url="https://www.suse.com/security/cve/CVE-2022-30789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011934.html" source="SUSE-SU"/>
    <description>
    A crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array in NTFS-3G through 2021.8.22.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-30789/">CVE-2022-30789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-30789">CVE-2022-30789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199978">SUSE bug 1199978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805713" comment="libguestfs-winsupport-9.2-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3080" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3080" ref_url="https://www.suse.com/security/cve/CVE-2022-3080" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" source="SUSE-SU"/>
    <description>
    By sending specific queries to the resolver, an attacker can cause named to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3080/">CVE-2022-3080 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3080">CVE-2022-3080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203618">SUSE bug 1203618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804590" comment="bind-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804591" comment="bind-chroot-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804592" comment="bind-devel-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804593" comment="bind-dnssec-doc-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804594" comment="bind-dnssec-utils-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804595" comment="bind-libs-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804596" comment="bind-license-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804597" comment="bind-utils-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804598" comment="python3-bind-9.16.23-1.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3094" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3094" ref_url="https://www.suse.com/security/cve/CVE-2022-3094" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013774.html" source="SUSE-SU"/>
    <description>
    Sending a flood of dynamic DNS updates may cause `named` to allocate large amounts of memory. This, in turn, may cause `named` to exit due to a lack of free memory. We are not aware of any cases where this has been exploited.

Memory is allocated prior to the checking of access permissions (ACLs) and is retained during the processing of a dynamic update from a client whose access credentials are accepted. Memory allocated to clients that are not permitted to send updates is released immediately upon rejection. The scope of this vulnerability is limited therefore to trusted clients who are permitted to make dynamic zone changes.

If a dynamic update is REFUSED, memory will be released again very quickly. Therefore it is only likely to be possible to degrade or stop `named` by sending a flood of unaccepted dynamic updates comparable in magnitude to a query flood intended to achieve the same detrimental outcome.

BIND 9.11 and earlier branches are also affected, but through exhaustion of internal resources rather than memory constraints. This may reduce performance but should not be a significant problem for most servers. Therefore we don't intend to address this for BIND versions prior to BIND 9.16.
This issue affects BIND 9 versions 9.16.0 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.8-S1 through 9.16.36-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3094/">CVE-2022-3094 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3094">CVE-2022-3094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207471">SUSE bug 1207471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805758" comment="bind-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805759" comment="bind-chroot-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805760" comment="bind-devel-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805761" comment="bind-dnssec-doc-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805762" comment="bind-dnssec-utils-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805763" comment="bind-doc-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805764" comment="bind-libs-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805765" comment="bind-license-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805766" comment="bind-utils-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805767" comment="python3-bind-9.16.23-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3107" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3107" ref_url="https://www.suse.com/security/cve/CVE-2022-3107" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3107/">CVE-2022-3107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3107">CVE-2022-3107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206395">SUSE bug 1206395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3108</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3108" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3108" ref_url="https://www.suse.com/security/cve/CVE-2022-3108" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3108/">CVE-2022-3108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3108">CVE-2022-3108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206389">SUSE bug 1206389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31107" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31107" ref_url="https://www.suse.com/security/cve/CVE-2022-31107" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. In versions 5.3 until 9.0.3, 8.5.9, 8.4.10, and 8.3.10, it is possible for a malicious user who has authorization to log into a Grafana instance via a configured OAuth IdP which provides a login name to take over the account of another user in that Grafana instance. This can occur when the malicious user is authorized to log in to Grafana via OAuth, the malicious user's external user id is not already associated with an account in Grafana, the malicious user's email address is not already associated with an account in Grafana, and the malicious user knows the Grafana username of the target user. If these conditions are met, the malicious user can set their username in the OAuth provider to that of the target user, then go through the OAuth flow to log in to Grafana. Due to the way that external and internal user accounts are linked together during login, if the conditions above are all met then the malicious user will be able to log in to the target user's Grafana account. Versions 9.0.3, 8.5.9, 8.4.10, and 8.3.10 contain a patch for this issue. As a workaround, concerned users can disable OAuth login to their Grafana instance, or ensure that all users authorized to log in via OAuth have a corresponding user account in Grafana linked to their email address.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31107/">CVE-2022-31107 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31107">CVE-2022-31107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201539">SUSE bug 1201539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804376" comment="grafana-7.5.11-5.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31123" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31123" ref_url="https://www.suse.com/security/cve/CVE-2022-31123" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open source observability and data visualization platform. Versions prior to 9.1.8 and 8.5.14 are vulnerable to a bypass in the plugin signature verification. An attacker can convince a server admin to download and successfully run a malicious plugin even though unsigned plugins are not allowed. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not install plugins downloaded from untrusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-31123/">CVE-2022-31123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31123">CVE-2022-31123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204302">SUSE bug 1204302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31130" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31130" ref_url="https://www.suse.com/security/cve/CVE-2022-31130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open source observability and data visualization platform. Versions of Grafana for endpoints prior to 9.1.8 and 8.5.14 could leak authentication tokens to some destination plugins under some conditions. The vulnerability impacts data source and plugin proxy endpoints with authentication tokens. The destination plugin could receive a user's Grafana authentication token. Versions 9.1.8 and 8.5.14 contain a patch for this issue. As a workaround, do not use API keys, JWT authentication, or any HTTP Header based authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31130/">CVE-2022-31130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31130">CVE-2022-31130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204305">SUSE bug 1204305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31197" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31197" ref_url="https://www.suse.com/security/cve/CVE-2022-31197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012639.html" source="SUSE-SU"/>
    <description>
    PostgreSQL JDBC Driver (PgJDBC for short) allows Java programs to connect to a PostgreSQL database using standard, database independent Java code. The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()` method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. `;`, could lead to SQL injection. This could lead to executing additional SQL commands as the application's JDBC user. User applications that do not invoke the `ResultSet.refreshRow()` method are not impacted. User application that do invoke that method are impacted if the underlying database that they are querying via their JDBC application may be under the control of an attacker. The attack requires the attacker to trick the user into executing SQL against a table name who's column names would contain the malicious SQL and subsequently invoke the `refreshRow()` method on the ResultSet. Note that the application's JDBC user and the schema owner need not be the same. A JDBC application that executes as a privileged user querying database schemas owned by potentially malicious less-privileged users would be vulnerable. In that situation it may be possible for the malicious user to craft a schema that causes the application to execute commands as the privileged user. Patched versions will be released as `42.2.26` and `42.4.1`. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-31197/">CVE-2022-31197 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31197">CVE-2022-31197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202170">SUSE bug 1202170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204789">SUSE bug 1204789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805202" comment="postgresql-jdbc-42.2.18-6.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31212" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31212" ref_url="https://www.suse.com/security/cve/CVE-2022-31212" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2022:10030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTBI3SDSIZY573CYLJALIS2TB3K6ZYEN/" source="SUSE-SU"/>
    <description>
    An issue was discovered in dbus-broker before 31. It depends on c-uitl/c-shquote to parse the DBus service's Exec line. c-shquote contains a stack-based buffer over-read if a malicious Exec line is supplied.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-31212/">CVE-2022-31212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31212">CVE-2022-31212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200332">SUSE bug 1200332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804561" comment="dbus-broker-28-5.1.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31213" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31213" ref_url="https://www.suse.com/security/cve/CVE-2022-31213" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2022:10030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTBI3SDSIZY573CYLJALIS2TB3K6ZYEN/" source="SUSE-SU"/>
    <description>
    An issue was discovered in dbus-broker before 31. Multiple NULL pointer dereferences can be found when supplying a malformed XML config file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31213/">CVE-2022-31213 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31213">CVE-2022-31213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200333">SUSE bug 1200333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804561" comment="dbus-broker-28-5.1.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31622" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31622" ref_url="https://www.suse.com/security/cve/CVE-2022-31622" source="SUSE CVE"/>
    <description>
    MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31622/">CVE-2022-31622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31622">CVE-2022-31622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199953">SUSE bug 1199953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31623" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31623" ref_url="https://www.suse.com/security/cve/CVE-2022-31623" source="SUSE CVE"/>
    <description>
    MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd-&gt;ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31623/">CVE-2022-31623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31623">CVE-2022-31623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1199954">SUSE bug 1199954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31625" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31625" ref_url="https://www.suse.com/security/cve/CVE-2022-31625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFDXQHXQQ3GEOXMBFW444WLDQJYAOZ2B/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31625/">CVE-2022-31625 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31625">CVE-2022-31625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200645">SUSE bug 1200645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804909" comment="php-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804910" comment="php-bcmath-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804911" comment="php-cli-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804912" comment="php-common-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804913" comment="php-dba-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804914" comment="php-dbg-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804915" comment="php-devel-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804916" comment="php-embedded-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804917" comment="php-enchant-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804918" comment="php-ffi-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804919" comment="php-fpm-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804920" comment="php-gd-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804921" comment="php-gmp-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804922" comment="php-intl-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804923" comment="php-ldap-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804924" comment="php-mbstring-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804925" comment="php-mysqlnd-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804926" comment="php-odbc-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804927" comment="php-opcache-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804928" comment="php-pdo-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804929" comment="php-pgsql-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804930" comment="php-process-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804931" comment="php-snmp-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804932" comment="php-soap-8.0.20-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804933" comment="php-xml-8.0.20-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31626" ref_url="https://www.suse.com/security/cve/CVE-2022-31626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2292-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BFDXQHXQQ3GEOXMBFW444WLDQJYAOZ2B/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
    <description>
    In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31626/">CVE-2022-31626 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31626">CVE-2022-31626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200628">SUSE bug 1200628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804410" comment="php-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804411" comment="php-bcmath-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804412" comment="php-cli-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804413" comment="php-common-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804414" comment="php-dba-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804415" comment="php-dbg-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804416" comment="php-devel-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804417" comment="php-embedded-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804418" comment="php-enchant-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804419" comment="php-ffi-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804420" comment="php-fpm-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804421" comment="php-gd-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804422" comment="php-gmp-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804423" comment="php-intl-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804424" comment="php-ldap-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804425" comment="php-mbstring-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804426" comment="php-mysqlnd-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804427" comment="php-odbc-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804428" comment="php-opcache-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804429" comment="php-pdo-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804430" comment="php-pgsql-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804431" comment="php-process-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804432" comment="php-snmp-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804433" comment="php-soap-8.0.13-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804434" comment="php-xml-8.0.13-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31628" ref_url="https://www.suse.com/security/cve/CVE-2022-31628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
    <description>
    In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-31628/">CVE-2022-31628 at SUSE</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31628">CVE-2022-31628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203867">SUSE bug 1203867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805833" comment="php-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805834" comment="php-bcmath-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805835" comment="php-cli-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805836" comment="php-common-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805837" comment="php-dba-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805838" comment="php-dbg-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805839" comment="php-devel-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805840" comment="php-embedded-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805841" comment="php-enchant-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805842" comment="php-ffi-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805843" comment="php-fpm-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805844" comment="php-gd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805845" comment="php-gmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805846" comment="php-intl-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805847" comment="php-ldap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805848" comment="php-mbstring-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805849" comment="php-mysqlnd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805850" comment="php-odbc-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805851" comment="php-opcache-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805852" comment="php-pdo-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805858" comment="php-pgsql-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805859" comment="php-process-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805860" comment="php-snmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805861" comment="php-soap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805862" comment="php-xml-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31629" ref_url="https://www.suse.com/security/cve/CVE-2022-31629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
    <description>
    In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31629/">CVE-2022-31629 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31629">CVE-2022-31629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203870">SUSE bug 1203870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222857">SUSE bug 1222857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805833" comment="php-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805834" comment="php-bcmath-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805835" comment="php-cli-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805836" comment="php-common-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805837" comment="php-dba-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805838" comment="php-dbg-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805839" comment="php-devel-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805840" comment="php-embedded-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805841" comment="php-enchant-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805842" comment="php-ffi-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805843" comment="php-fpm-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805844" comment="php-gd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805845" comment="php-gmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805846" comment="php-intl-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805847" comment="php-ldap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805848" comment="php-mbstring-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805849" comment="php-mysqlnd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805850" comment="php-odbc-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805851" comment="php-opcache-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805852" comment="php-pdo-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805858" comment="php-pgsql-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805859" comment="php-process-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805860" comment="php-snmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805861" comment="php-soap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805862" comment="php-xml-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31630" ref_url="https://www.suse.com/security/cve/CVE-2022-31630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
    <description>
    In PHP versions prior to 7.4.33, 8.0.25 and 8.1.12, when using imageloadfont() function in gd extension, it is possible to supply a specially crafted font file, such as if the loaded font is used with imagechar() function, the read outside allocated buffer will be used. This can lead to crashes or disclosure of confidential information.  
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31630/">CVE-2022-31630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31630">CVE-2022-31630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204979">SUSE bug 1204979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805833" comment="php-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805834" comment="php-bcmath-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805835" comment="php-cli-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805836" comment="php-common-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805837" comment="php-dba-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805838" comment="php-dbg-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805839" comment="php-devel-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805840" comment="php-embedded-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805841" comment="php-enchant-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805842" comment="php-ffi-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805843" comment="php-fpm-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805844" comment="php-gd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805845" comment="php-gmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805846" comment="php-intl-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805847" comment="php-ldap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805848" comment="php-mbstring-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805849" comment="php-mysqlnd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805850" comment="php-odbc-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805851" comment="php-opcache-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805852" comment="php-pdo-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805858" comment="php-pgsql-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805859" comment="php-process-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805860" comment="php-snmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805861" comment="php-soap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805862" comment="php-xml-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31631" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31631" ref_url="https://www.suse.com/security/cve/CVE-2022-31631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013867.html" source="SUSE-SU"/>
    <description>
    In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-31631/">CVE-2022-31631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-31631">CVE-2022-31631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206958">SUSE bug 1206958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805833" comment="php-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805834" comment="php-bcmath-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805835" comment="php-cli-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805836" comment="php-common-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805837" comment="php-dba-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805838" comment="php-dbg-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805839" comment="php-devel-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805840" comment="php-embedded-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805841" comment="php-enchant-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805842" comment="php-ffi-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805843" comment="php-fpm-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805844" comment="php-gd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805845" comment="php-gmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805846" comment="php-intl-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805847" comment="php-ldap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805848" comment="php-mbstring-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805849" comment="php-mysqlnd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805850" comment="php-odbc-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805851" comment="php-opcache-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805852" comment="php-pdo-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805858" comment="php-pgsql-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805859" comment="php-process-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805860" comment="php-snmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805861" comment="php-soap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805862" comment="php-xml-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3165</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3165" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3165" ref_url="https://www.suse.com/security/cve/CVE-2022-3165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013985.html" source="SUSE-SU"/>
    <description>
    An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3165/">CVE-2022-3165 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3165">CVE-2022-3165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203788">SUSE bug 1203788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805677" comment="qemu-guest-agent-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805678" comment="qemu-img-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805679" comment="qemu-kvm-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805680" comment="qemu-kvm-audio-pa-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805681" comment="qemu-kvm-block-curl-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805682" comment="qemu-kvm-block-rbd-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805683" comment="qemu-kvm-common-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805684" comment="qemu-kvm-core-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805685" comment="qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805686" comment="qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805687" comment="qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805688" comment="qemu-kvm-device-usb-host-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805689" comment="qemu-kvm-device-usb-redirect-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805690" comment="qemu-kvm-docs-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805691" comment="qemu-kvm-tools-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805692" comment="qemu-kvm-ui-egl-headless-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805693" comment="qemu-kvm-ui-opengl-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805694" comment="qemu-pr-helper-7.2.0-14.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31676</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31676" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31676" ref_url="https://www.suse.com/security/cve/CVE-2022-31676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2936-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012049.html" source="SUSE-SU"/>
    <description>
    VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31676/">CVE-2022-31676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31676">CVE-2022-31676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202657">SUSE bug 1202657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202733">SUSE bug 1202733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202834">SUSE bug 1202834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202995">SUSE bug 1202995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204044">SUSE bug 1204044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205471">SUSE bug 1205471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804504" comment="open-vm-tools-11.3.5-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804505" comment="open-vm-tools-desktop-11.3.5-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804506" comment="open-vm-tools-sdmp-11.3.5-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804507" comment="open-vm-tools-test-11.3.5-1.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31736" ref_url="https://www.suse.com/security/cve/CVE-2022-31736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31736/">CVE-2022-31736 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31736">CVE-2022-31736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804260" comment="firefox-91.10.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31737" ref_url="https://www.suse.com/security/cve/CVE-2022-31737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31737/">CVE-2022-31737 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31737">CVE-2022-31737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804260" comment="firefox-91.10.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31738" ref_url="https://www.suse.com/security/cve/CVE-2022-31738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31738/">CVE-2022-31738 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31738">CVE-2022-31738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804260" comment="firefox-91.10.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31740" ref_url="https://www.suse.com/security/cve/CVE-2022-31740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31740/">CVE-2022-31740 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31740">CVE-2022-31740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804260" comment="firefox-91.10.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31741" ref_url="https://www.suse.com/security/cve/CVE-2022-31741" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2533-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011716.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31741/">CVE-2022-31741 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31741">CVE-2022-31741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804260" comment="firefox-91.10.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31742" ref_url="https://www.suse.com/security/cve/CVE-2022-31742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-31742/">CVE-2022-31742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31742">CVE-2022-31742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804260" comment="firefox-91.10.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31744" ref_url="https://www.suse.com/security/cve/CVE-2022-31744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR &lt; 91.11, Thunderbird &lt; 102, Thunderbird &lt; 91.11, and Firefox &lt; 101.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-31744/">CVE-2022-31744 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31744">CVE-2022-31744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31747</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31747" ref_url="https://www.suse.com/security/cve/CVE-2022-31747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011274.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 91.10, Firefox &lt; 101, and Firefox ESR &lt; 91.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-31747/">CVE-2022-31747 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31747">CVE-2022-31747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200027">SUSE bug 1200027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804260" comment="firefox-91.10.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804261" comment="thunderbird-91.10.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202231813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-31813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-31813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31813" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-31813" ref_url="https://www.suse.com/security/cve/CVE-2022-31813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011488.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-31813/">CVE-2022-31813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-31813">CVE-2022-31813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200348">SUSE bug 1200348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219585">SUSE bug 1219585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225670">SUSE bug 1225670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804855" comment="httpd-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804856" comment="httpd-core-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804857" comment="httpd-devel-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804858" comment="httpd-filesystem-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804859" comment="httpd-manual-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804860" comment="httpd-tools-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804861" comment="mod_ldap-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804862" comment="mod_lua-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804863" comment="mod_proxy_html-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804864" comment="mod_session-2.4.53-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804865" comment="mod_ssl-2.4.53-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3190</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3190" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3190" ref_url="https://www.suse.com/security/cve/CVE-2022-3190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012290.html" source="SUSE-SU"/>
    <description>
    Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3190/">CVE-2022-3190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3190">CVE-2022-3190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203388">SUSE bug 1203388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805828" comment="wireshark-3.4.10-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805829" comment="wireshark-cli-3.4.10-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805830" comment="wireshark-devel-3.4.10-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3204" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3204" ref_url="https://www.suse.com/security/cve/CVE-2022-3204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
    <description>
    A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation Attack) has been discovered in various DNS resolving software. The NRDelegation Attack works by having a malicious delegation with a considerable number of non responsive nameservers. The attack starts by querying a resolver for a record that relies on those unresponsive nameservers. The attack can cause a resolver to spend a lot of time/resources resolving records under a malicious delegation point where a considerable number of unresponsive NS records reside. It can trigger high CPU usage in some resolver implementations that continually look in the cache for resolved NS records in that delegation. This can lead to degraded performance and eventually denial of service in orchestrated attacks. Unbound does not suffer from high CPU usage, but resources are still needed for resolving the malicious delegation. Unbound will keep trying to resolve the record until hard limits are reached. Based on the nature of the attack and the replies, different limits could be reached. From version 1.16.3 on, Unbound introduces fixes for better performance when under load, by cutting opportunistic queries for nameserver discovery and DNSKEY prefetching and limiting the number of times a delegation point can issue a cache lookup for missing records.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3204/">CVE-2022-3204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3204">CVE-2022-3204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203643">SUSE bug 1203643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805824" comment="python3-unbound-1.16.2-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805825" comment="unbound-1.16.2-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805826" comment="unbound-devel-1.16.2-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805827" comment="unbound-libs-1.16.2-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32081" ref_url="https://www.suse.com/security/cve/CVE-2022-32081" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32081/">CVE-2022-32081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32081">CVE-2022-32081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201161">SUSE bug 1201161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32082" ref_url="https://www.suse.com/security/cve/CVE-2022-32082" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table-&gt;get_ref_count() == 0 in dict0dict.cc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32082/">CVE-2022-32082 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32082">CVE-2022-32082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201162">SUSE bug 1201162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32083" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32083" ref_url="https://www.suse.com/security/cve/CVE-2022-32083" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32083/">CVE-2022-32083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32083">CVE-2022-32083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201163">SUSE bug 1201163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32084" ref_url="https://www.suse.com/security/cve/CVE-2022-32084" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015770.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32084/">CVE-2022-32084 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32084">CVE-2022-32084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201164">SUSE bug 1201164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32085" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32085" ref_url="https://www.suse.com/security/cve/CVE-2022-32085" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32085/">CVE-2022-32085 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32085">CVE-2022-32085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201165">SUSE bug 1201165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32086" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32086" ref_url="https://www.suse.com/security/cve/CVE-2022-32086" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32086/">CVE-2022-32086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32086">CVE-2022-32086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201166">SUSE bug 1201166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32087" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32087" ref_url="https://www.suse.com/security/cve/CVE-2022-32087" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32087/">CVE-2022-32087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32087">CVE-2022-32087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201167">SUSE bug 1201167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32088" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32088" ref_url="https://www.suse.com/security/cve/CVE-2022-32088" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32088/">CVE-2022-32088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32088">CVE-2022-32088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201168">SUSE bug 1201168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804440" comment="galera-26.4.11-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804441" comment="mariadb-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804442" comment="mariadb-backup-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804443" comment="mariadb-common-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804444" comment="mariadb-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804445" comment="mariadb-embedded-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804446" comment="mariadb-embedded-devel-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804447" comment="mariadb-errmsg-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804448" comment="mariadb-gssapi-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804449" comment="mariadb-oqgraph-engine-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804450" comment="mariadb-pam-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804451" comment="mariadb-server-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804452" comment="mariadb-server-galera-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804453" comment="mariadb-server-utils-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804454" comment="mariadb-test-10.5.16-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804455" comment="mysql-selinux-1.0.5-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32089" ref_url="https://www.suse.com/security/cve/CVE-2022-32089" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32089/">CVE-2022-32089 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32089">CVE-2022-32089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201169">SUSE bug 1201169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32091" ref_url="https://www.suse.com/security/cve/CVE-2022-32091" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
    <description>
    MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32091/">CVE-2022-32091 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32091">CVE-2022-32091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201170">SUSE bug 1201170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32148" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32148" ref_url="https://www.suse.com/security/cve/CVE-2022-32148" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Improper exposure of client IP addresses in net/http before Go 1.17.12 and Go 1.18.4 can be triggered by calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, which causes ReverseProxy to set the client IP as the value of the X-Forwarded-For header.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32148/">CVE-2022-32148 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201436">SUSE bug 1201436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804402" comment="go-toolset-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804403" comment="golang-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804404" comment="golang-bin-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804405" comment="golang-docs-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804406" comment="golang-misc-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804407" comment="golang-race-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804408" comment="golang-src-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804409" comment="golang-tests-1.17.12-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804850" comment="grafana-7.5.15-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804953" comment="grafana-pcp-3.2.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32189" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32189" ref_url="https://www.suse.com/security/cve/CVE-2022-32189" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    A too-short encoded message can cause a panic in Float.GobDecode and Rat GobDecode in math/big in Go before 1.17.13 and 1.18.5, potentially allowing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32189/">CVE-2022-32189 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202035">SUSE bug 1202035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805714" comment="butane-0.16.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805209" comment="go-toolset-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805210" comment="golang-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805211" comment="golang-bin-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805212" comment="golang-docs-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805213" comment="golang-misc-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805214" comment="golang-race-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805215" comment="golang-src-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805216" comment="golang-tests-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805722" comment="toolbox-0.0.99.3-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805723" comment="toolbox-tests-0.0.99.3-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32206" ref_url="https://www.suse.com/security/cve/CVE-2022-32206" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011931.html" source="SUSE-SU"/>
    <description>
    curl &lt; 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32206/">CVE-2022-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32206">CVE-2022-32206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200735">SUSE bug 1200735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207992">SUSE bug 1207992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804489" comment="curl-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804490" comment="curl-minimal-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804491" comment="libcurl-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804492" comment="libcurl-devel-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804493" comment="libcurl-minimal-7.76.1-14.el9_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32207" ref_url="https://www.suse.com/security/cve/CVE-2022-32207" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011426.html" source="SUSE-SU"/>
    <description>
    When curl &lt; 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32207/">CVE-2022-32207 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32207">CVE-2022-32207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200736">SUSE bug 1200736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804489" comment="curl-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804490" comment="curl-minimal-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804491" comment="libcurl-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804492" comment="libcurl-devel-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804493" comment="libcurl-minimal-7.76.1-14.el9_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32208" ref_url="https://www.suse.com/security/cve/CVE-2022-32208" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-July/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2327-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011931.html" source="SUSE-SU"/>
    <description>
    When curl &lt; 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32208/">CVE-2022-32208 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32208">CVE-2022-32208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200737">SUSE bug 1200737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804489" comment="curl-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804490" comment="curl-minimal-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804491" comment="libcurl-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804492" comment="libcurl-devel-7.76.1-14.el9_0.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804493" comment="libcurl-minimal-7.76.1-14.el9_0.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32212" ref_url="https://www.suse.com/security/cve/CVE-2022-32212" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013766.html" source="SUSE-SU"/>
    <description>
    A OS Command Injection vulnerability exists in Node.js versions &lt;14.20.0, &lt;16.20.0, &lt;18.5.0 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32212/">CVE-2022-32212 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32212">CVE-2022-32212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201328">SUSE bug 1201328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32213" ref_url="https://www.suse.com/security/cve/CVE-2022-32213" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JUWQCTN3BP2AGML5ZX2MGFCXJ47QKKT/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013766.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15095-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6JWUTJAY4MPMF2YEA67BIJHP7YUB44E4/" source="SUSE-SU"/>
    <description>
    The llhttp parser &lt;v14.20.1, &lt;v16.17.1 and &lt;v18.9.1 in the http module in Node.js does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-05-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32213/">CVE-2022-32213 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32213">CVE-2022-32213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201325">SUSE bug 1201325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32214" ref_url="https://www.suse.com/security/cve/CVE-2022-32214" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013766.html" source="SUSE-SU"/>
    <description>
    The llhttp parser &lt;v14.20.1, &lt;v16.17.1 and &lt;v18.9.1 in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32214/">CVE-2022-32214 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32214">CVE-2022-32214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201326">SUSE bug 1201326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32215" ref_url="https://www.suse.com/security/cve/CVE-2022-32215" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013766.html" source="SUSE-SU"/>
    <description>
    The llhttp parser &lt;v14.20.1, &lt;v16.17.1 and &lt;v18.9.1 in the http module in Node.js does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-32215/">CVE-2022-32215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32215">CVE-2022-32215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201327">SUSE bug 1201327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32221" ref_url="https://www.suse.com/security/cve/CVE-2022-32221" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012718.html" source="SUSE-SU"/>
    <description>
    When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32221/">CVE-2022-32221 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32221">CVE-2022-32221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204383">SUSE bug 1204383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205287">SUSE bug 1205287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205834">SUSE bug 1205834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206236">SUSE bug 1206236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208340">SUSE bug 1208340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211233">SUSE bug 1211233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805217" comment="curl-7.76.1-19.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805218" comment="curl-minimal-7.76.1-19.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805219" comment="libcurl-7.76.1-19.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805220" comment="libcurl-devel-7.76.1-19.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805221" comment="libcurl-minimal-7.76.1-19.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32250" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32250" ref_url="https://www.suse.com/security/cve/CVE-2022-32250" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-June/011374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2177-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S2QMD6CJ6PZDFYQ3RKSOGAZNRK7WC5W7/" source="SUSE-SU"/>
    <description>
    net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect NFT_STATEFUL_EXPR check leads to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32250/">CVE-2022-32250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32250">CVE-2022-32250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200015">SUSE bug 1200015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200268">SUSE bug 1200268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1200494">SUSE bug 1200494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202992">SUSE bug 1202992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202993">SUSE bug 1202993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203002">SUSE bug 1203002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804297" comment="bpftool-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804298" comment="kernel-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804299" comment="kernel-abi-stablelists-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804300" comment="kernel-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804302" comment="kernel-debug-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804303" comment="kernel-debug-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804306" comment="kernel-debug-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804307" comment="kernel-debug-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804310" comment="kernel-doc-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804311" comment="kernel-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804312" comment="kernel-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804313" comment="kernel-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804314" comment="kernel-tools-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804315" comment="kernel-tools-libs-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804317" comment="perf-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804318" comment="python3-perf-5.14.0-70.17.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32323</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32323" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32323" ref_url="https://www.suse.com/security/cve/CVE-2022-32323" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2022:10197-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BL5EXN47HTWFDUDXIE4KX7GLILJAE7FU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:10199-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WUMZT6BYF7XO3BJFTLFUUIIAHPDB3QMW/" source="SUSE-SU"/>
    <description>
    AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32323/">CVE-2022-32323 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32323">CVE-2022-32323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201529">SUSE bug 1201529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811010" comment="autotrace-0.31.1-65.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3239" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3239" ref_url="https://www.suse.com/security/cve/CVE-2022-3239" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A flaw use after free in the Linux kernel video4linux driver was found in the way user triggers em28xx_usb_probe() for the Empia 28xx based TV cards. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3239/">CVE-2022-3239 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3239">CVE-2022-3239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203552">SUSE bug 1203552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3266</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3266" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3266" ref_url="https://www.suse.com/security/cve/CVE-2022-3266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3266/">CVE-2022-3266 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3266">CVE-2022-3266 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804588" comment="firefox-102.3.0-6.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32742" ref_url="https://www.suse.com/security/cve/CVE-2022-32742" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32742/">CVE-2022-32742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32742">CVE-2022-32742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201496">SUSE bug 1201496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202815">SUSE bug 1202815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804989" comment="ctdb-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804990" comment="libsmbclient-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804991" comment="libsmbclient-devel-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804992" comment="libwbclient-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804993" comment="libwbclient-devel-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804994" comment="python3-samba-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804995" comment="samba-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804996" comment="samba-client-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804997" comment="samba-client-libs-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804998" comment="samba-common-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804999" comment="samba-common-libs-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805000" comment="samba-common-tools-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805001" comment="samba-devel-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805002" comment="samba-krb5-printing-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805003" comment="samba-libs-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805004" comment="samba-pidl-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805005" comment="samba-test-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805006" comment="samba-test-libs-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805007" comment="samba-vfs-iouring-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805008" comment="samba-winbind-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805009" comment="samba-winbind-clients-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805010" comment="samba-winbind-krb5-locator-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805011" comment="samba-winbind-modules-4.16.4-101.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805012" comment="samba-winexe-4.16.4-101.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32746" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32746" ref_url="https://www.suse.com/security/cve/CVE-2022-32746" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2586-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014245.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-32746/">CVE-2022-32746 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32746">CVE-2022-32746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201490">SUSE bug 1201490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805013" comment="ldb-tools-2.5.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805014" comment="libldb-2.5.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805015" comment="libldb-devel-2.5.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805016" comment="python3-ldb-2.5.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32792" ref_url="https://www.suse.com/security/cve/CVE-2022-32792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012003.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32792/">CVE-2022-32792 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32792">CVE-2022-32792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201980">SUSE bug 1201980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202313">SUSE bug 1202313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32816" ref_url="https://www.suse.com/security/cve/CVE-2022-32816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012003.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved UI handling. This issue is fixed in watchOS 8.7, tvOS 15.6, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5. Visiting a website that frames malicious content may lead to UI spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32816/">CVE-2022-32816 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32816">CVE-2022-32816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201980">SUSE bug 1201980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3287" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3287" ref_url="https://www.suse.com/security/cve/CVE-2022-3287" source="SUSE CVE"/>
    <description>
    When creating an OPERATOR user account on the BMC, the redfish plugin saved the auto-generated password to /etc/fwupd/redfish.conf without proper restriction, allowing any user on the system to read the same configuration file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-3287/">CVE-2022-3287 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3287">CVE-2022-3287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203852">SUSE bug 1203852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805907" comment="fwupd-1.8.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805908" comment="fwupd-devel-1.8.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805909" comment="fwupd-plugin-flashrom-1.8.10-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32885" ref_url="https://www.suse.com/security/cve/CVE-2022-32885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing maliciously crafted web content may lead to arbitrary code execution
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-32885/">CVE-2022-32885 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32885">CVE-2022-32885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32886</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32886" ref_url="https://www.suse.com/security/cve/CVE-2022-32886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 16, iOS 16, iOS 15.7 and iPadOS 15.7. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32886/">CVE-2022-32886 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32886">CVE-2022-32886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203530">SUSE bug 1203530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204100">SUSE bug 1204100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32888</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32888" ref_url="https://www.suse.com/security/cve/CVE-2022-32888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013156.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.7, macOS Ventura 13, iOS 16, iOS 15.7 and iPadOS 15.7, watchOS 9, macOS Monterey 12.6, tvOS 16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32888/">CVE-2022-32888 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32888">CVE-2022-32888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205121">SUSE bug 1205121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205839">SUSE bug 1205839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32891</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32891" ref_url="https://www.suse.com/security/cve/CVE-2022-32891" source="SUSE CVE"/>
    <description>
    The issue was addressed with improved UI handling. This issue is fixed in Safari 16, tvOS 16, watchOS 9, iOS 16. Visiting a website that frames malicious content may lead to UI spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-32891/">CVE-2022-32891 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32891">CVE-2022-32891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203530">SUSE bug 1203530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804846" comment="webkit2gtk3-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804847" comment="webkit2gtk3-devel-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804848" comment="webkit2gtk3-jsc-2.36.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804849" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32893</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32893" ref_url="https://www.suse.com/security/cve/CVE-2022-32893" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012351.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.6.1 and iPadOS 15.6.1, macOS Monterey 12.5.1, Safari 15.6.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-32893/">CVE-2022-32893 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32893">CVE-2022-32893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202807">SUSE bug 1202807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203001">SUSE bug 1203001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804584" comment="webkit2gtk3-2.36.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804585" comment="webkit2gtk3-devel-2.36.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804586" comment="webkit2gtk3-jsc-2.36.7-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804587" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32919" ref_url="https://www.suse.com/security/cve/CVE-2022-32919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017406.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved UI handling. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1. Visiting a website that frames malicious content may lead to UI spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32919/">CVE-2022-32919 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32919">CVE-2022-32919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32923</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32923" ref_url="https://www.suse.com/security/cve/CVE-2022-32923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013156.html" source="SUSE-SU"/>
    <description>
    A correctness issue in the JIT was addressed with improved checks. This issue is fixed in tvOS 16.1, iOS 15.7.1 and iPadOS 15.7.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose internal states of the app.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32923/">CVE-2022-32923 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32923">CVE-2022-32923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205122">SUSE bug 1205122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32933" ref_url="https://www.suse.com/security/cve/CVE-2022-32933" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017406.html" source="SUSE-SU"/>
    <description>
    An information disclosure issue was addressed by removing the vulnerable code. This issue is fixed in macOS Monterey 12.5. A website may be able to track the websites a user visited in Safari private browsing mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-32933/">CVE-2022-32933 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32933">CVE-2022-32933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202232990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-32990</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-32990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32990" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-32990" ref_url="https://www.suse.com/security/cve/CVE-2022-32990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012112.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UFJHBPLWAYPCEKYTYRWURM3JQUU2ZPU/" source="SUSE-SU"/>
    <description>
    An issue in gimp_layer_invalidate_boundary of GNOME GIMP 2.10.30 allows attackers to trigger an unhandled exception via a crafted XCF file, causing a Denial of Service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-32990/">CVE-2022-32990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-32990">CVE-2022-32990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201192">SUSE bug 1201192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804809" comment="gimp-2.99.8-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804810" comment="gimp-libs-2.99.8-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33065</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33065" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33065" ref_url="https://www.suse.com/security/cve/CVE-2022-33065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016967.html" source="SUSE-SU"/>
    <description>
    Multiple signed integers overflow in function au_read_header in src/au.c and in functions mat4_open and mat4_read_header in src/mat4.c in Libsndfile, allows an attacker to cause Denial of Service or other unspecified impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33065/">CVE-2022-33065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33065">CVE-2022-33065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213451">SUSE bug 1213451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217517">SUSE bug 1217517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217558">SUSE bug 1217558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217605">SUSE bug 1217605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866501" comment="libsndfile-1.0.31-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866502" comment="libsndfile-devel-1.0.31-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866503" comment="libsndfile-utils-1.0.31-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33068" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33068" ref_url="https://www.suse.com/security/cve/CVE-2022-33068" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011798.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MJ2G563AHSBZG4OGZ6WVW7U5ARNA4K5R/" source="SUSE-SU"/>
    <description>
    An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-33068/">CVE-2022-33068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200900">SUSE bug 1200900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805033" comment="harfbuzz-2.7.4-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805034" comment="harfbuzz-devel-2.7.4-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805035" comment="harfbuzz-icu-2.7.4-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804665" comment="java-11-openjdk-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804666" comment="java-11-openjdk-demo-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804667" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804668" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804669" comment="java-11-openjdk-devel-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804670" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804671" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804672" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804673" comment="java-11-openjdk-headless-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804674" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804675" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804676" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804677" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804678" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804679" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804680" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804681" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804682" comment="java-11-openjdk-src-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804683" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804684" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804685" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804686" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804687" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804625" comment="java-17-openjdk-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804626" comment="java-17-openjdk-demo-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804627" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804628" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804629" comment="java-17-openjdk-devel-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804630" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804631" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804632" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804633" comment="java-17-openjdk-headless-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804634" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804635" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804636" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804637" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804638" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804639" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804640" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804641" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804642" comment="java-17-openjdk-src-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804643" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804644" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804645" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804646" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804647" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33099" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33099" ref_url="https://www.suse.com/security/cve/CVE-2022-33099" source="SUSE CVE"/>
    <description>
    An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-33099/">CVE-2022-33099 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33099">CVE-2022-33099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201146">SUSE bug 1201146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804744" comment="lua-5.4.2-4.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804745" comment="lua-devel-5.4.2-4.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804746" comment="lua-libs-5.4.2-4.el9_0.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33196" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33196" ref_url="https://www.suse.com/security/cve/CVE-2022-33196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013926.html" source="SUSE-SU"/>
    <description>
    Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-33196/">CVE-2022-33196 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33196">CVE-2022-33196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208276">SUSE bug 1208276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209936">SUSE bug 1209936</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211490">SUSE bug 1211490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211511">SUSE bug 1211511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213820">SUSE bug 1213820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053964" comment="microcode_ctl-20230808-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3358</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3358" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3358" ref_url="https://www.suse.com/security/cve/CVE-2022-3358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012796.html" source="SUSE-SU"/>
    <description>
    OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom ciphers passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and EVP_CipherInit_ex2() functions (as well as other similarly named encryption and decryption initialisation functions). Instead of using the custom cipher directly it incorrectly tries to fetch an equivalent cipher from the available providers. An equivalent cipher is found based on the NID passed to EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a given cipher. However it is possible for an application to incorrectly pass NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef is used in this way the OpenSSL encryption/decryption initialisation function will match the NULL cipher as being equivalent and will fetch this from the available providers. This will succeed if the default provider has been loaded (or if a third party provider has been loaded that offers this cipher). Using the NULL cipher means that the plaintext is emitted as the ciphertext. Applications are only affected by this issue if they call EVP_CIPHER_meth_new() using NID_undef and subsequently use it in a call to an encryption/decryption initialisation function. Applications that only use SSL/TLS are not impacted by this issue. Fixed in OpenSSL 3.0.6 (Affected 3.0.0-3.0.5).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-3358/">CVE-2022-3358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3358">CVE-2022-3358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204226">SUSE bug 1204226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805941" comment="openssl-3.0.7-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805942" comment="openssl-devel-3.0.7-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805943" comment="openssl-libs-3.0.7-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805944" comment="openssl-perl-3.0.7-6.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33743" ref_url="https://www.suse.com/security/cve/CVE-2022-33743" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
    <description>
    network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-33743/">CVE-2022-33743 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33743">CVE-2022-33743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200763">SUSE bug 1200763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201629">SUSE bug 1201629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202233987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-33987</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-33987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-33987" ref_url="https://www.suse.com/security/cve/CVE-2022-33987" source="SUSE CVE"/>
    <description>
    The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-33987/">CVE-2022-33987 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-33987">CVE-2022-33987 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804553" comment="nodejs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804554" comment="nodejs-docs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804555" comment="nodejs-full-i18n-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804556" comment="nodejs-libs-16.16.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804557" comment="nodejs-nodemon-2.0.19-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804558" comment="npm-8.11.0-1.16.16.0.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34169" ref_url="https://www.suse.com/security/cve/CVE-2022-34169" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. Users are recommended to update to version 2.7.3 or later. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34169/">CVE-2022-34169 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34169">CVE-2022-34169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201684">SUSE bug 1201684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202427">SUSE bug 1202427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207688">SUSE bug 1207688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804359" comment="java-1.8.0-openjdk-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804360" comment="java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804361" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804362" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804363" comment="java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804364" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804365" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804366" comment="java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804367" comment="java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804368" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804369" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804370" comment="java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804371" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804372" comment="java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804373" comment="java-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804374" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804375" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804336" comment="java-11-openjdk-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804337" comment="java-11-openjdk-demo-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804338" comment="java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804339" comment="java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804340" comment="java-11-openjdk-devel-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804341" comment="java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804342" comment="java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804343" comment="java-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804344" comment="java-11-openjdk-headless-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804345" comment="java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804346" comment="java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804347" comment="java-11-openjdk-javadoc-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804348" comment="java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804349" comment="java-11-openjdk-jmods-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804350" comment="java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804351" comment="java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804352" comment="java-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804353" comment="java-11-openjdk-src-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804354" comment="java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804355" comment="java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804356" comment="java-11-openjdk-static-libs-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804357" comment="java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804358" comment="java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804377" comment="java-17-openjdk-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804378" comment="java-17-openjdk-demo-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804379" comment="java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804380" comment="java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804381" comment="java-17-openjdk-devel-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804382" comment="java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804383" comment="java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804384" comment="java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804385" comment="java-17-openjdk-headless-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804386" comment="java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804387" comment="java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804388" comment="java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804389" comment="java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804390" comment="java-17-openjdk-jmods-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804391" comment="java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804392" comment="java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804393" comment="java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804394" comment="java-17-openjdk-src-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804395" comment="java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804396" comment="java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804397" comment="java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804398" comment="java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804399" comment="java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3424</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3424" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3424" ref_url="https://www.suse.com/security/cve/CVE-2022-3424" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-06"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3424/">CVE-2022-3424 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3424">CVE-2022-3424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204166">SUSE bug 1204166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204167">SUSE bug 1204167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212309">SUSE bug 1212309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985978" comment="kernel-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985979" comment="kernel-abi-stablelists-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985980" comment="kernel-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985981" comment="kernel-cross-headers-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985982" comment="kernel-debug-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985983" comment="kernel-debug-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985986" comment="kernel-debug-modules-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985987" comment="kernel-debug-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985988" comment="kernel-debug-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985989" comment="kernel-debug-uki-virt-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985992" comment="kernel-doc-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985993" comment="kernel-headers-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985994" comment="kernel-modules-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985995" comment="kernel-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985996" comment="kernel-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985997" comment="kernel-rt-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985998" comment="kernel-rt-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985999" comment="kernel-rt-debug-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986000" comment="kernel-rt-debug-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986002" comment="kernel-rt-debug-kvm-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986003" comment="kernel-rt-debug-modules-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986004" comment="kernel-rt-debug-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986005" comment="kernel-rt-debug-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986007" comment="kernel-rt-kvm-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986008" comment="kernel-rt-modules-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986009" comment="kernel-rt-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986010" comment="kernel-rt-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986011" comment="kernel-tools-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986012" comment="kernel-tools-libs-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986014" comment="kernel-uki-virt-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986015" comment="kernel-uki-virt-addons-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986016" comment="libperf-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986017" comment="perf-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986018" comment="python3-perf-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986019" comment="rtla-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986020" comment="rv-5.14.0-570.19.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34301</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34301" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34301" ref_url="https://www.suse.com/security/cve/CVE-2022-34301" source="SUSE CVE"/>
    <description>
    A flaw was found in CryptoPro Secure Disk bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34301/">CVE-2022-34301 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34301">CVE-2022-34301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202857">SUSE bug 1202857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805907" comment="fwupd-1.8.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805908" comment="fwupd-devel-1.8.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805909" comment="fwupd-plugin-flashrom-1.8.10-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34302" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34302" ref_url="https://www.suse.com/security/cve/CVE-2022-34302" source="SUSE CVE"/>
    <description>
    A flaw was found in New Horizon Datasys bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34302/">CVE-2022-34302 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34302">CVE-2022-34302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202737">SUSE bug 1202737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805907" comment="fwupd-1.8.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805908" comment="fwupd-devel-1.8.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805909" comment="fwupd-plugin-flashrom-1.8.10-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34303</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34303" ref_url="https://www.suse.com/security/cve/CVE-2022-34303" source="SUSE CVE"/>
    <description>
    A flaw was found in Eurosoft bootloaders before 2022-06-01. An attacker may use this bootloader to bypass or tamper with Secure Boot protections. In order to load and execute arbitrary code in the pre-boot stage, an attacker simply needs to replace the existing signed bootloader currently in use with this bootloader. Access to the EFI System Partition is required for booting using external media.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34303/">CVE-2022-34303 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34303">CVE-2022-34303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202856">SUSE bug 1202856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805907" comment="fwupd-1.8.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805908" comment="fwupd-devel-1.8.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805909" comment="fwupd-plugin-flashrom-1.8.10-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3435</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3435" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3435" ref_url="https://www.suse.com/security/cve/CVE-2022-3435" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in Linux Kernel. This affects the function fib_nh_match of the file net/ipv4/fib_semantics.c of the component IPv4 Handler. The manipulation leads to out-of-bounds read. It is possible to initiate the attack remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-210357 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3435/">CVE-2022-3435 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3435">CVE-2022-3435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204171">SUSE bug 1204171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34468</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34468" ref_url="https://www.suse.com/security/cve/CVE-2022-34468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An iframe that was not permitted to run scripts could do so if the user clicked on a &lt;code&gt;javascript:&lt;/code&gt; link. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34468/">CVE-2022-34468 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34468">CVE-2022-34468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34470" ref_url="https://www.suse.com/security/cve/CVE-2022-34470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Session history navigations may have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34470/">CVE-2022-34470 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34470">CVE-2022-34470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34472" ref_url="https://www.suse.com/security/cve/CVE-2022-34472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-34472/">CVE-2022-34472 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34472">CVE-2022-34472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34479" ref_url="https://www.suse.com/security/cve/CVE-2022-34479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious website that could create a popup could have resized the popup to overlay the address bar with its own content, resulting in potential user confusion or spoofing attacks. &lt;br&gt;*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34479/">CVE-2022-34479 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34479">CVE-2022-34479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34481</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34481" ref_url="https://www.suse.com/security/cve/CVE-2022-34481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In the &lt;code&gt;nsTArray_Impl::ReplaceElementsAt()&lt;/code&gt; function, an integer overflow could have occurred when the number of elements to replace was too large for the container. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34481/">CVE-2022-34481 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34481">CVE-2022-34481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34484" ref_url="https://www.suse.com/security/cve/CVE-2022-34484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The Mozilla Fuzzing Team reported potential vulnerabilities present in Thunderbird 91.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 102, Firefox ESR &lt; 91.11, Thunderbird &lt; 102, and Thunderbird &lt; 91.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34484/">CVE-2022-34484 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34484">CVE-2022-34484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1200793">SUSE bug 1200793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804333" comment="firefox-91.11.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804334" comment="thunderbird-91.11.0-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34716</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34716" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34716" ref_url="https://www.suse.com/security/cve/CVE-2022-34716" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-34716/">CVE-2022-34716 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34716">CVE-2022-34716 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804478" comment="aspnetcore-runtime-6.0-6.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804479" comment="aspnetcore-targeting-pack-6.0-6.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804480" comment="dotnet-apphost-pack-6.0-6.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804481" comment="dotnet-host-6.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804482" comment="dotnet-hostfxr-6.0-6.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804483" comment="dotnet-runtime-6.0-6.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804484" comment="dotnet-sdk-6.0-6.0.108-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804485" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804486" comment="dotnet-targeting-pack-6.0-6.0.8-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804487" comment="dotnet-templates-6.0-6.0.108-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804488" comment="netstandard-targeting-pack-2.1-6.0.108-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34903" ref_url="https://www.suse.com/security/cve/CVE-2022-34903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2546-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UMS2EFUBD5STY4WAK6LMDRF7EQ4XP4IJ/" source="SUSE-SU"/>
    <description>
    GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-34903/">CVE-2022-34903 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34903">CVE-2022-34903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201225">SUSE bug 1201225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804559" comment="gnupg2-2.3.3-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804560" comment="gnupg2-smime-2.3.3-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202234918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-34918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-34918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34918" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-34918" ref_url="https://www.suse.com/security/cve/CVE-2022-34918" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2424-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011950.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UCV6OZAODHO3XSCOPNA6KBP5EOWSRH4L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2549-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YODNNJY6VGTGGVMUQLFLWV5FFYHIFW3C/" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug in nft_set_elem_init (leading to a buffer overflow) could be used by a local attacker to escalate privileges, a different vulnerability than CVE-2022-32250. (The attacker can obtain root access, but must start with an unprivileged user namespace to obtain CAP_NET_ADMIN access.) This can be fixed in nft_setelem_parse_data in net/netfilter/nf_tables_api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-34918/">CVE-2022-34918 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-34918">CVE-2022-34918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201171">SUSE bug 1201171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201177">SUSE bug 1201177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201222">SUSE bug 1201222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804562" comment="bpftool-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804563" comment="kernel-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804564" comment="kernel-abi-stablelists-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804565" comment="kernel-core-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804566" comment="kernel-cross-headers-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804567" comment="kernel-debug-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804568" comment="kernel-debug-core-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804571" comment="kernel-debug-modules-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804572" comment="kernel-debug-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804575" comment="kernel-doc-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804576" comment="kernel-headers-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804577" comment="kernel-modules-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804578" comment="kernel-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804579" comment="kernel-tools-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804580" comment="kernel-tools-libs-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804582" comment="perf-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804583" comment="python3-perf-5.14.0-70.26.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3500" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3500" ref_url="https://www.suse.com/security/cve/CVE-2022-3500" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013098.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in keylime. This security issue happens in some circumstances, due to some improperly handled exceptions, there exists the possibility that a rogue agent could create errors on the verifier that stopped attestation attempts for that host leaving it in an attested state but not verifying that anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3500/">CVE-2022-3500 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3500">CVE-2022-3500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204782">SUSE bug 1204782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805077" comment="keylime-6.5.1-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805078" comment="keylime-base-6.5.1-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805079" comment="keylime-registrar-6.5.1-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805080" comment="keylime-selinux-6.5.1-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805081" comment="keylime-tenant-6.5.1-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805082" comment="keylime-verifier-6.5.1-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805083" comment="python3-keylime-6.5.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3515</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3515" ref_url="https://www.suse.com/security/cve/CVE-2022-3515" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012597.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3515/">CVE-2022-3515 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3515">CVE-2022-3515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204357">SUSE bug 1204357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204806">SUSE bug 1204806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205080">SUSE bug 1205080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205592">SUSE bug 1205592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205627">SUSE bug 1205627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206244">SUSE bug 1206244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804691" comment="libksba-1.5.1-5.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804692" comment="libksba-devel-1.5.1-5.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3517" ref_url="https://www.suse.com/security/cve/CVE-2022-3517" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3517/">CVE-2022-3517 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3517">CVE-2022-3517 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805108" comment="nodejs-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805109" comment="nodejs-devel-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805110" comment="nodejs-docs-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805111" comment="nodejs-full-i18n-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805206" comment="nodejs-libs-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805207" comment="nodejs-nodemon-2.0.20-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805115" comment="npm-8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3522" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3522" ref_url="https://www.suse.com/security/cve/CVE-2022-3522" source="SUSE CVE"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3522/">CVE-2022-3522 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3522">CVE-2022-3522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204358">SUSE bug 1204358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209319">SUSE bug 1209319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3523</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3523" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3523" ref_url="https://www.suse.com/security/cve/CVE-2022-3523" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been classified as problematic. Affected is an unknown function of the file mm/memory.c of the component Driver Handler. The manipulation leads to use after free. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211020.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3523/">CVE-2022-3523 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3523">CVE-2022-3523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204363">SUSE bug 1204363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3524</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3524" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3524" ref_url="https://www.suse.com/security/cve/CVE-2022-3524" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function ipv6_renew_options of the component IPv6 Handler. The manipulation leads to memory leak. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211021 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3524/">CVE-2022-3524 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3524">CVE-2022-3524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204354">SUSE bug 1204354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212320">SUSE bug 1212320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202235252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-35252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-35252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-35252" ref_url="https://www.suse.com/security/cve/CVE-2022-35252" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012702.html" source="SUSE-SU"/>
    <description>
    When curl is used to retrieve and parse cookies from a HTTP(S) server, itaccepts cookies using control codes that when later are sent back to a HTTPserver might make the server return 400 responses. Effectively allowing a"sister site" to deny service to all siblings.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-35252/">CVE-2022-35252 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35252">CVE-2022-35252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202593">SUSE bug 1202593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805902" comment="curl-7.76.1-23.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805903" comment="curl-minimal-7.76.1-23.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805904" comment="libcurl-7.76.1-23.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805905" comment="libcurl-devel-7.76.1-23.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805906" comment="libcurl-minimal-7.76.1-23.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202235255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-35255</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-35255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35255" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-35255" ref_url="https://www.suse.com/security/cve/CVE-2022-35255" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013766.html" source="SUSE-SU"/>
    <description>
    A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-35255/">CVE-2022-35255 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35255">CVE-2022-35255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203831">SUSE bug 1203831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804620" comment="nodejs-16.17.1-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804621" comment="nodejs-docs-16.17.1-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804622" comment="nodejs-full-i18n-16.17.1-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804623" comment="nodejs-libs-16.17.1-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804624" comment="npm-8.15.0-1.16.17.1.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202235256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-35256</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-35256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-35256" ref_url="https://www.suse.com/security/cve/CVE-2022-35256" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3JUWQCTN3BP2AGML5ZX2MGFCXJ47QKKT/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013766.html" source="SUSE-SU"/>
    <description>
    The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35256/">CVE-2022-35256 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35256">CVE-2022-35256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203832">SUSE bug 1203832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805203" comment="nodejs-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805204" comment="nodejs-docs-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805205" comment="nodejs-full-i18n-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805206" comment="nodejs-libs-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805207" comment="nodejs-nodemon-2.0.20-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805208" comment="npm-8.19.2-1.16.18.1.3.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3545</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3545" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3545" ref_url="https://www.suse.com/security/cve/CVE-2022-3545" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in Linux Kernel and classified as critical. Affected by this vulnerability is the function area_cache_get of the file drivers/net/ethernet/netronome/nfp/nfpcore/nfp_cppcore.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211045 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3545/">CVE-2022-3545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3545">CVE-2022-3545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204415">SUSE bug 1204415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204424">SUSE bug 1204424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3550" ref_url="https://www.suse.com/security/cve/CVE-2022-3550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012874.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical was found in X.org Server. Affected by this vulnerability is the function _GetCountedString of the file xkb/xkb.c. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211051.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3550/">CVE-2022-3550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3550">CVE-2022-3550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204412">SUSE bug 1204412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204808">SUSE bug 1204808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205071">SUSE bug 1205071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206243">SUSE bug 1206243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208344">SUSE bug 1208344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209331">SUSE bug 1209331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3551" ref_url="https://www.suse.com/security/cve/CVE-2022-3551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012874.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, has been found in X.org Server. Affected by this issue is the function ProcXkbGetKbdByName of the file xkb/xkb.c. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211052.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3551/">CVE-2022-3551 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3551">CVE-2022-3551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204416">SUSE bug 1204416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3560</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3560" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3560" ref_url="https://www.suse.com/security/cve/CVE-2022-3560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013879.html" source="SUSE-SU"/>
    <description>
    A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3560/">CVE-2022-3560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3560">CVE-2022-3560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202933">SUSE bug 1202933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805412" comment="pesign-115-6.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3564" ref_url="https://www.suse.com/security/cve/CVE-2022-3564" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3564/">CVE-2022-3564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3564">CVE-2022-3564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206073">SUSE bug 1206073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206314">SUSE bug 1206314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805323" comment="bpftool-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805324" comment="kernel-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805325" comment="kernel-abi-stablelists-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805326" comment="kernel-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805327" comment="kernel-cross-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805328" comment="kernel-debug-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805329" comment="kernel-debug-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805332" comment="kernel-debug-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805333" comment="kernel-debug-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805336" comment="kernel-doc-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805337" comment="kernel-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805338" comment="kernel-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805339" comment="kernel-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805340" comment="kernel-tools-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805341" comment="kernel-tools-libs-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805343" comment="perf-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805344" comment="python3-perf-5.14.0-162.18.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3565</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3565" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3565" ref_url="https://www.suse.com/security/cve/CVE-2022-3565" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, has been found in Linux Kernel. Affected by this issue is the function del_timer of the file drivers/isdn/mISDN/l1oip_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211088.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3565/">CVE-2022-3565 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3565">CVE-2022-3565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204431">SUSE bug 1204431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204432">SUSE bug 1204432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212323">SUSE bug 1212323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3566" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3566" ref_url="https://www.suse.com/security/cve/CVE-2022-3566" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, was found in Linux Kernel. This affects the function tcp_getsockopt/tcp_setsockopt of the component TCP Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. The identifier VDB-211089 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3566/">CVE-2022-3566 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3566">CVE-2022-3566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204405">SUSE bug 1204405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3567" ref_url="https://www.suse.com/security/cve/CVE-2022-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function inet6_stream_ops/inet6_dgram_ops of the component IPv6 Handler. The manipulation leads to race condition. It is recommended to apply a patch to fix this issue. VDB-211090 is the identifier assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3567/">CVE-2022-3567 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3567">CVE-2022-3567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204414">SUSE bug 1204414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3570" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3570" ref_url="https://www.suse.com/security/cve/CVE-2022-3570" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013447.html" source="SUSE-SU"/>
    <description>
    Multiple heap buffer overflows in tiffcrop.c utility in libtiff library Version 4.4.0 allows attacker to trigger unsafe or out of bounds memory access via crafted TIFF image file which could result into application crash, potential information disclosure or any other context-dependent impact
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3570/">CVE-2022-3570 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3570">CVE-2022-3570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205422">SUSE bug 1205422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202235737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-35737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-35737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35737" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-35737" ref_url="https://www.suse.com/security/cve/CVE-2022-35737" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3307-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012378.html" source="SUSE-SU"/>
    <description>
    SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-35737/">CVE-2022-35737 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35737">CVE-2022-35737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201783">SUSE bug 1201783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203345">SUSE bug 1203345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211963">SUSE bug 1211963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805266" comment="sqlite-3.34.1-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805267" comment="sqlite-devel-3.34.1-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805268" comment="sqlite-libs-3.34.1-6.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3594" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3594" ref_url="https://www.suse.com/security/cve/CVE-2022-3594" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function intr_callback of the file drivers/net/usb/r8152.c of the component BPF. The manipulation leads to logging of excessive data. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211363.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3594/">CVE-2022-3594 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3594">CVE-2022-3594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204479">SUSE bug 1204479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217458">SUSE bug 1217458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202235957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-35957</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-35957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35957" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-35957" ref_url="https://www.suse.com/security/cve/CVE-2022-35957" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. Versions prior to 9.1.6 and 8.5.13 are vulnerable to an escalation from admin to server admin when auth proxy is used, allowing an admin to take over the server admin account and gain full control of the grafana instance. All installations should be upgraded as soon as possible. As a workaround deactivate auth proxy following the instructions at: https://grafana.com/docs/grafana/latest/setup-grafana/configure-security/configure-authentication/auth-proxy/
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-35957/">CVE-2022-35957 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-35957">CVE-2022-35957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203597">SUSE bug 1203597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805711" comment="grafana-9.0.9-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3597" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3597" ref_url="https://www.suse.com/security/cve/CVE-2022-3597" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-05-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3597/">CVE-2022-3597 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3597">CVE-2022-3597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204641">SUSE bug 1204641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3598" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3598" ref_url="https://www.suse.com/security/cve/CVE-2022-3598" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013447.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-03-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3598/">CVE-2022-3598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3598">CVE-2022-3598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204642">SUSE bug 1204642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3599" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3599" ref_url="https://www.suse.com/security/cve/CVE-2022-3599" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3599/">CVE-2022-3599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3599">CVE-2022-3599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204643">SUSE bug 1204643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3602" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3602" ref_url="https://www.suse.com/security/cve/CVE-2022-3602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012796.html" source="SUSE-SU"/>
		<reference ref_id="TID000020837" ref_url="https://www.suse.com/support/kb/doc/?id=000020837" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14740-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYRT4L3ZDCZCJBPH7KDKJTBG4Z4CVCQS/" source="SUSE-SU"/>
    <description>
    A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3602/">CVE-2022-3602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602">CVE-2022-3602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204714">SUSE bug 1204714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804698" comment="openssl-3.0.1-43.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804699" comment="openssl-devel-3.0.1-43.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804700" comment="openssl-libs-3.0.1-43.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804701" comment="openssl-perl-3.0.1-43.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36059" ref_url="https://www.suse.com/security/cve/CVE-2022-36059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
    <description>
    matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 19.4.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This issue has been fixed in matrix-js-sdk 19.4.0 and users are advised to upgrade. Users unable to upgrade may mitigate this issue by redacting applicable events, waiting for the sync processor to store data, and restarting the client. Alternatively, redacting the applicable events and clearing all storage will often fix most perceived issues. In some cases, no workarounds are possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36059/">CVE-2022-36059 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36059">CVE-2022-36059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203007">SUSE bug 1203007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36087" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36087" ref_url="https://www.suse.com/security/cve/CVE-2022-36087" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:15100-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NIVGGZC7NXNK2PSSZ7J6S65CPD3PJJMY/" source="SUSE-SU"/>
    <description>
    OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-05-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36087/">CVE-2022-36087 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36087">CVE-2022-36087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203333">SUSE bug 1203333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805624" comment="fence-agents-aliyun-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805625" comment="fence-agents-all-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805626" comment="fence-agents-amt-ws-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805627" comment="fence-agents-apc-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805628" comment="fence-agents-apc-snmp-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805629" comment="fence-agents-aws-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805630" comment="fence-agents-azure-arm-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805631" comment="fence-agents-bladecenter-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805632" comment="fence-agents-brocade-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805633" comment="fence-agents-cisco-mds-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805634" comment="fence-agents-cisco-ucs-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805635" comment="fence-agents-common-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805636" comment="fence-agents-compute-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805637" comment="fence-agents-drac5-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805638" comment="fence-agents-eaton-snmp-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805639" comment="fence-agents-emerson-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805640" comment="fence-agents-eps-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805641" comment="fence-agents-gce-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805642" comment="fence-agents-heuristics-ping-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805643" comment="fence-agents-hpblade-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805644" comment="fence-agents-ibm-powervs-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805645" comment="fence-agents-ibm-vpc-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805646" comment="fence-agents-ibmblade-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805647" comment="fence-agents-ifmib-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805648" comment="fence-agents-ilo-moonshot-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805649" comment="fence-agents-ilo-mp-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805650" comment="fence-agents-ilo-ssh-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805651" comment="fence-agents-ilo2-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805652" comment="fence-agents-intelmodular-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805653" comment="fence-agents-ipdu-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805654" comment="fence-agents-ipmilan-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805655" comment="fence-agents-kdump-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805656" comment="fence-agents-kubevirt-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805657" comment="fence-agents-mpath-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805658" comment="fence-agents-openstack-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805659" comment="fence-agents-redfish-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805660" comment="fence-agents-rhevm-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805661" comment="fence-agents-rsa-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805662" comment="fence-agents-rsb-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805663" comment="fence-agents-sbd-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805664" comment="fence-agents-scsi-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805665" comment="fence-agents-virsh-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805666" comment="fence-agents-vmware-rest-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805667" comment="fence-agents-vmware-soap-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805668" comment="fence-agents-wti-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805669" comment="fence-virt-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805670" comment="fence-virtd-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805671" comment="fence-virtd-cpg-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805672" comment="fence-virtd-libvirt-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805673" comment="fence-virtd-multicast-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805674" comment="fence-virtd-serial-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805675" comment="fence-virtd-tcp-4.10.0-43.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805676" comment="ha-cloud-support-4.10.0-43.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3619</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3619" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3619" ref_url="https://www.suse.com/security/cve/CVE-2022-3619" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in Linux Kernel and classified as problematic. This vulnerability affects the function l2cap_recv_acldata of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to memory leak. It is recommended to apply a patch to fix this issue. VDB-211918 is the identifier assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3619/">CVE-2022-3619 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3619">CVE-2022-3619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204569">SUSE bug 1204569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36227</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36227" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36227" ref_url="https://www.suse.com/security/cve/CVE-2022-36227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013161.html" source="SUSE-SU"/>
    <description>
    In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-36227/">CVE-2022-36227 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36227">CVE-2022-36227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205629">SUSE bug 1205629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805945" comment="bsdtar-3.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805946" comment="libarchive-3.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805947" comment="libarchive-devel-3.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3623" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3623" ref_url="https://www.suse.com/security/cve/CVE-2022-3623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been declared as problematic. Affected by this vulnerability is the function follow_page_pte of the file mm/gup.c of the component BPF. The manipulation leads to race condition. The attack can be launched remotely. It is recommended to apply a patch to fix this issue. The identifier VDB-211921 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3623/">CVE-2022-3623 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3623">CVE-2022-3623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204575">SUSE bug 1204575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3625" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3625" ref_url="https://www.suse.com/security/cve/CVE-2022-3625" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Linux Kernel. It has been classified as critical. This affects the function devlink_param_set/devlink_param_get of the file net/core/devlink.c of the component IPsec. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier VDB-211929 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3625/">CVE-2022-3625 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3625">CVE-2022-3625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204637">SUSE bug 1204637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3626" ref_url="https://www.suse.com/security/cve/CVE-2022-3626" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3626/">CVE-2022-3626 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3626">CVE-2022-3626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204644">SUSE bug 1204644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3627</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3627" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3627" ref_url="https://www.suse.com/security/cve/CVE-2022-3627" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3627/">CVE-2022-3627 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3627">CVE-2022-3627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204645">SUSE bug 1204645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206220">SUSE bug 1206220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3628" ref_url="https://www.suse.com/security/cve/CVE-2022-3628" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in the Linux kernel Broadcom Full MAC Wi-Fi driver. This issue occurs when a user connects to a malicious USB device. This can allow a local user to crash the system or escalate their privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3628/">CVE-2022-3628 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3628">CVE-2022-3628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204868">SUSE bug 1204868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36280</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36280" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36280" ref_url="https://www.suse.com/security/cve/CVE-2022-36280" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds(OOB) memory access vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_kms.c in GPU component in the Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36280/">CVE-2022-36280 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36280">CVE-2022-36280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203332">SUSE bug 1203332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36318" ref_url="https://www.suse.com/security/cve/CVE-2022-36318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR &lt; 102.1, Firefox ESR &lt; 91.12, Firefox &lt; 103, Thunderbird &lt; 102.1, and Thunderbird &lt; 91.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36318/">CVE-2022-36318 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36318">CVE-2022-36318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804400" comment="firefox-91.12.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804401" comment="thunderbird-91.12.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36319" ref_url="https://www.suse.com/security/cve/CVE-2022-36319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-July/011714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR &lt; 102.1, Firefox ESR &lt; 91.12, Firefox &lt; 103, Thunderbird &lt; 102.1, and Thunderbird &lt; 91.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-36319/">CVE-2022-36319 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36319">CVE-2022-36319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201758">SUSE bug 1201758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804400" comment="firefox-91.12.0-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804401" comment="thunderbird-91.12.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36351</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36351" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36351" ref_url="https://www.suse.com/security/cve/CVE-2022-36351" source="SUSE CVE"/>
    <description>
    Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-36351/">CVE-2022-36351 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36351">CVE-2022-36351 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811138" comment="iwl100-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811139" comment="iwl1000-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811140" comment="iwl105-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811141" comment="iwl135-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811142" comment="iwl2000-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811143" comment="iwl2030-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811144" comment="iwl3160-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811145" comment="iwl5000-firmware-8.83.5.1_1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811146" comment="iwl5150-firmware-8.24.2.2-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811147" comment="iwl6000g2a-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811148" comment="iwl6000g2b-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811149" comment="iwl6050-firmware-41.28.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811150" comment="iwl7260-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811151" comment="libertas-sd8787-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811152" comment="linux-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811153" comment="linux-firmware-whence-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811154" comment="netronome-firmware-20230814-140.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36369</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36369" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36369" ref_url="https://www.suse.com/security/cve/CVE-2022-36369" source="SUSE CVE"/>
    <description>
    Improper access control in some QATzip software maintained by Intel(R) before version 1.0.9 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-36369/">CVE-2022-36369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36369">CVE-2022-36369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208412">SUSE bug 1208412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053627" comment="qatzip-1.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053629" comment="qatzip-libs-1.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3640" ref_url="https://www.suse.com/security/cve/CVE-2022-3640" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, was found in Linux Kernel. Affected is the function l2cap_conn_del of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211944.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3640/">CVE-2022-3640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3640">CVE-2022-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204619">SUSE bug 1204619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204624">SUSE bug 1204624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36402" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36402" ref_url="https://www.suse.com/security/cve/CVE-2022-36402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
    <description>
    An integer overflow vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36402/">CVE-2022-36402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36402">CVE-2022-36402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203517">SUSE bug 1203517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36440" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36440" ref_url="https://www.suse.com/security/cve/CVE-2022-36440" source="SUSE CVE"/>
    <description>
    A reachable assertion was found in Frrouting frr-bgpd 8.3.0 in the peek_for_as4_capability function. Attackers can maliciously construct BGP open packets and send them to BGP peers running frr-bgpd, resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36440/">CVE-2022-36440 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36440">CVE-2022-36440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210132">SUSE bug 1210132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811075" comment="frr-8.3.1-11.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811076" comment="frr-selinux-8.3.1-11.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36760" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36760" ref_url="https://www.suse.com/security/cve/CVE-2022-36760" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-February/027580.html" source="SUSE-SU"/>
    <description>
    Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to.  This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-36760/">CVE-2022-36760 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36760">CVE-2022-36760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207250">SUSE bug 1207250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805399" comment="httpd-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805400" comment="httpd-core-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805401" comment="httpd-devel-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805402" comment="httpd-filesystem-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805403" comment="httpd-manual-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805404" comment="httpd-tools-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805405" comment="mod_ldap-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805406" comment="mod_lua-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805407" comment="mod_proxy_html-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805408" comment="mod_session-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805409" comment="mod_ssl-2.4.53-7.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36763</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36763" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36763" ref_url="https://www.suse.com/security/cve/CVE-2022-36763" source="SUSE CVE"/>
    <description>
    EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-08-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36763/">CVE-2022-36763 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36763">CVE-2022-36763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218678">SUSE bug 1218678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36764" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36764" ref_url="https://www.suse.com/security/cve/CVE-2022-36764" source="SUSE CVE"/>
    <description>
    EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36764/">CVE-2022-36764 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36764">CVE-2022-36764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218679">SUSE bug 1218679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36765</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36765" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36765" ref_url="https://www.suse.com/security/cve/CVE-2022-36765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024233.html" source="SUSE-SU"/>
    <description>
    EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-36765/">CVE-2022-36765 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36765">CVE-2022-36765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218680">SUSE bug 1218680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877070" comment="edk2-ovmf-20231122-6.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877071" comment="edk2-tools-20231122-6.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877072" comment="edk2-tools-doc-20231122-6.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36879" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36879" ref_url="https://www.suse.com/security/cve/CVE-2022-36879" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36879/">CVE-2022-36879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36879">CVE-2022-36879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201948">SUSE bug 1201948</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212327">SUSE bug 1212327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202236946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-36946</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-36946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36946" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-36946" ref_url="https://www.suse.com/security/cve/CVE-2022-36946" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2875-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2892-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    nfqnl_mangle in net/netfilter/nfnetlink_queue.c in the Linux kernel through 5.18.14 allows remote attackers to cause a denial of service (panic) because, in the case of an nf_queue verdict with a one-byte nfta_payload attribute, an skb_pull can encounter a negative skb-&gt;len.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-36946/">CVE-2022-36946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-36946">CVE-2022-36946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1201940">SUSE bug 1201940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1201941">SUSE bug 1201941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202312">SUSE bug 1202312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1202874">SUSE bug 1202874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203208">SUSE bug 1203208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204132">SUSE bug 1204132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212310">SUSE bug 1212310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37032" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37032" ref_url="https://www.suse.com/security/cve/CVE-2022-37032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3478-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037094.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-37032/">CVE-2022-37032 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37032">CVE-2022-37032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202023">SUSE bug 1202023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805715" comment="frr-8.3.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805716" comment="frr-selinux-8.3.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3707</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3707" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3707" ref_url="https://www.suse.com/security/cve/CVE-2022-3707" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3707/">CVE-2022-3707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3707">CVE-2022-3707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204780">SUSE bug 1204780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3715" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3715" ref_url="https://www.suse.com/security/cve/CVE-2022-3715" source="SUSE CVE"/>
    <description>
    A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-3715/">CVE-2022-3715 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3715">CVE-2022-3715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204787">SUSE bug 1204787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805269" comment="bash-5.1.8-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805270" comment="bash-devel-5.1.8-6.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3736" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3736" ref_url="https://www.suse.com/security/cve/CVE-2022-3736" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013720.html" source="SUSE-SU"/>
    <description>
    BIND 9 resolver can crash when stale cache and stale answers are enabled, option `stale-answer-client-timeout` is set to a positive integer, and the resolver receives an RRSIG query.
This issue affects BIND 9 versions 9.16.12 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.12-S1 through 9.16.36-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3736/">CVE-2022-3736 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3736">CVE-2022-3736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207473">SUSE bug 1207473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805758" comment="bind-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805759" comment="bind-chroot-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805760" comment="bind-devel-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805761" comment="bind-dnssec-doc-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805762" comment="bind-dnssec-utils-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805763" comment="bind-doc-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805764" comment="bind-libs-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805765" comment="bind-license-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805766" comment="bind-utils-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805767" comment="python3-bind-9.16.23-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37434" ref_url="https://www.suse.com/security/cve/CVE-2022-37434" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/024836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/011945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-August/012012.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2022:2947-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LMMKD42M3DCS4RHRGODUBFFD77ISKBSG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PHTZYGRNV6PDZMHUALPCK2YD6IRL3XD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M45KVAFI32X55HONDKLE2FBN6GETMIUL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14386-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PKKBG67OWZPTTVUGMVOGNMHRKFBIQJ4M/" source="SUSE-SU"/>
    <description>
    zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37434/">CVE-2022-37434 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434">CVE-2022-37434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202175">SUSE bug 1202175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203030">SUSE bug 1203030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205074">SUSE bug 1205074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205289">SUSE bug 1205289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216542">SUSE bug 1216542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225671">SUSE bug 1225671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804982" comment="rsync-3.2.3-18.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804983" comment="rsync-daemon-3.2.3-18.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804702" comment="zlib-1.2.11-32.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804703" comment="zlib-devel-1.2.11-32.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804704" comment="zlib-static-1.2.11-32.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37436" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37436" ref_url="https://www.suse.com/security/cve/CVE-2022-37436" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-February/027580.html" source="SUSE-SU"/>
    <description>
    Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-37436/">CVE-2022-37436 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37436">CVE-2022-37436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207251">SUSE bug 1207251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805399" comment="httpd-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805400" comment="httpd-core-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805401" comment="httpd-devel-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805402" comment="httpd-filesystem-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805403" comment="httpd-manual-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805404" comment="httpd-tools-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805405" comment="mod_ldap-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805406" comment="mod_lua-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805407" comment="mod_proxy_html-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805408" comment="mod_session-2.4.53-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805409" comment="mod_ssl-2.4.53-7.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202237454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-37454</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-37454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37454" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-37454" ref_url="https://www.suse.com/security/cve/CVE-2022-37454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
    <description>
    The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute arbitrary code or eliminate expected cryptographic properties. This occurs in the sponge function interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-37454/">CVE-2022-37454 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-37454">CVE-2022-37454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204577">SUSE bug 1204577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204966">SUSE bug 1204966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205836">SUSE bug 1205836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805833" comment="php-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805834" comment="php-bcmath-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805835" comment="php-cli-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805836" comment="php-common-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805837" comment="php-dba-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805838" comment="php-dbg-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805839" comment="php-devel-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805840" comment="php-embedded-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805841" comment="php-enchant-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805842" comment="php-ffi-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805843" comment="php-fpm-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805844" comment="php-gd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805845" comment="php-gmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805846" comment="php-intl-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805847" comment="php-ldap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805848" comment="php-mbstring-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805849" comment="php-mysqlnd-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805850" comment="php-odbc-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805851" comment="php-opcache-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805852" comment="php-pdo-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805858" comment="php-pgsql-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805859" comment="php-process-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805860" comment="php-snmp-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805861" comment="php-soap-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805862" comment="php-xml-8.1.14-1.module+el9.2.0+17911+b059dfc2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3775" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3775" ref_url="https://www.suse.com/security/cve/CVE-2022-3775" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014265.html" source="SUSE-SU"/>
		<reference ref_id="TID000021048" ref_url="https://www.suse.com/support/kb/doc/?id=000021048" source="SUSE-SU"/>
    <description>
    When rendering certain unicode sequences, grub2's font code doesn't proper validate if the informed glyph's width and height is constrained within bitmap size. As consequence an attacker can craft an input which will lead to a out-of-bounds write into grub2's heap, leading to memory corruption and availability issues. Although complex, arbitrary code execution could not be discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3775/">CVE-2022-3775 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775">CVE-2022-3775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205182">SUSE bug 1205182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805302" comment="grub2-common-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805303" comment="grub2-efi-x64-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805304" comment="grub2-efi-x64-cdboot-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805305" comment="grub2-efi-x64-modules-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805306" comment="grub2-pc-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805307" comment="grub2-pc-modules-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805308" comment="grub2-tools-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805309" comment="grub2-tools-efi-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805310" comment="grub2-tools-extra-2.06-46.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805311" comment="grub2-tools-minimal-2.06-46.el9_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3786" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3786" ref_url="https://www.suse.com/security/cve/CVE-2022-3786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013293.html" source="SUSE-SU"/>
		<reference ref_id="TID000020837" ref_url="https://www.suse.com/support/kb/doc/?id=000020837" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14740-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BYRT4L3ZDCZCJBPH7KDKJTBG4Z4CVCQS/" source="SUSE-SU"/>
    <description>
    A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3786/">CVE-2022-3786 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786">CVE-2022-3786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204714">SUSE bug 1204714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804698" comment="openssl-3.0.1-43.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804699" comment="openssl-devel-3.0.1-43.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804700" comment="openssl-libs-3.0.1-43.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804701" comment="openssl-perl-3.0.1-43.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3787" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3787" ref_url="https://www.suse.com/security/cve/CVE-2022-3787" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3787/">CVE-2022-3787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3787">CVE-2022-3787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209929">SUSE bug 1209929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805084" comment="device-mapper-multipath-0.8.7-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805085" comment="device-mapper-multipath-devel-0.8.7-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805086" comment="device-mapper-multipath-libs-0.8.7-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805087" comment="kpartx-0.8.7-12.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38013" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38013" ref_url="https://www.suse.com/security/cve/CVE-2022-38013" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38013/">CVE-2022-38013 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38013">CVE-2022-38013 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804508" comment="aspnetcore-runtime-6.0-6.0.9-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804509" comment="aspnetcore-targeting-pack-6.0-6.0.9-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804510" comment="dotnet-apphost-pack-6.0-6.0.9-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804511" comment="dotnet-host-6.0.9-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804512" comment="dotnet-hostfxr-6.0-6.0.9-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804513" comment="dotnet-runtime-6.0-6.0.9-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804514" comment="dotnet-sdk-6.0-6.0.109-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804515" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.109-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804516" comment="dotnet-targeting-pack-6.0-6.0.9-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804517" comment="dotnet-templates-6.0-6.0.109-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804518" comment="netstandard-targeting-pack-2.1-6.0.109-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38023" ref_url="https://www.suse.com/security/cve/CVE-2022-38023" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V3YTRBE2CLOHDFXSGJQCTU4DTNHNRTBU/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013975.html" source="SUSE-SU"/>
		<reference ref_id="TID000021140" ref_url="https://www.suse.com/support/kb/doc/?id=000021140" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38023/">CVE-2022-38023 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38023">CVE-2022-38023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206504">SUSE bug 1206504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209664">SUSE bug 1209664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213694">SUSE bug 1213694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805600" comment="ctdb-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805601" comment="libsmbclient-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805602" comment="libsmbclient-devel-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805603" comment="libwbclient-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805604" comment="libwbclient-devel-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805605" comment="python3-samba-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805606" comment="samba-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805607" comment="samba-client-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805608" comment="samba-client-libs-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805609" comment="samba-common-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805610" comment="samba-common-libs-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805611" comment="samba-common-tools-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805612" comment="samba-devel-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805613" comment="samba-krb5-printing-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805614" comment="samba-libs-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805615" comment="samba-pidl-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805616" comment="samba-test-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805617" comment="samba-test-libs-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805618" comment="samba-vfs-iouring-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805619" comment="samba-winbind-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805620" comment="samba-winbind-clients-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805621" comment="samba-winbind-krb5-locator-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805622" comment="samba-winbind-modules-4.16.4-103.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805623" comment="samba-winexe-4.16.4-103.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38076" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38076" ref_url="https://www.suse.com/security/cve/CVE-2022-38076" source="SUSE CVE"/>
    <description>
    Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38076/">CVE-2022-38076 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38076">CVE-2022-38076 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811138" comment="iwl100-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811139" comment="iwl1000-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811140" comment="iwl105-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811141" comment="iwl135-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811142" comment="iwl2000-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811143" comment="iwl2030-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811144" comment="iwl3160-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811145" comment="iwl5000-firmware-8.83.5.1_1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811146" comment="iwl5150-firmware-8.24.2.2-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811147" comment="iwl6000g2a-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811148" comment="iwl6000g2b-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811149" comment="iwl6050-firmware-41.28.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811150" comment="iwl7260-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811151" comment="libertas-sd8787-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811152" comment="linux-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811153" comment="linux-firmware-whence-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811154" comment="netronome-firmware-20230814-140.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38096" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38096" ref_url="https://www.suse.com/security/cve/CVE-2022-38096" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference vulnerability was found in vmwgfx driver in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in GPU component of Linux kernel with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38096/">CVE-2022-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38096">CVE-2022-38096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203331">SUSE bug 1203331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38177" ref_url="https://www.suse.com/security/cve/CVE-2022-38177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" source="SUSE-SU"/>
    <description>
    By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38177/">CVE-2022-38177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38177">CVE-2022-38177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203619">SUSE bug 1203619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204101">SUSE bug 1204101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205078">SUSE bug 1205078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205219">SUSE bug 1205219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804590" comment="bind-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804591" comment="bind-chroot-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804592" comment="bind-devel-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804593" comment="bind-dnssec-doc-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804594" comment="bind-dnssec-utils-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804595" comment="bind-libs-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804596" comment="bind-license-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804597" comment="bind-utils-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804598" comment="python3-bind-9.16.23-1.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38178" ref_url="https://www.suse.com/security/cve/CVE-2022-38178" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012698.html" source="SUSE-SU"/>
    <description>
    By spoofing the target resolver with responses that have a malformed EdDSA signature, an attacker can trigger a small memory leak. It is possible to gradually erode available memory to the point where named crashes for lack of resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38178/">CVE-2022-38178 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38178">CVE-2022-38178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203620">SUSE bug 1203620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804590" comment="bind-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804591" comment="bind-chroot-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804592" comment="bind-devel-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804593" comment="bind-dnssec-doc-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804594" comment="bind-dnssec-utils-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804595" comment="bind-libs-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804596" comment="bind-license-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804597" comment="bind-utils-9.16.23-1.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804598" comment="python3-bind-9.16.23-1.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3821" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3821" ref_url="https://www.suse.com/security/cve/CVE-2022-3821" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3999-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7UQBLKONTL3NZED3YWCSO3BCXRPP3DW/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024202.html" source="SUSE-SU"/>
    <description>
    An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3821/">CVE-2022-3821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3821">CVE-2022-3821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204968">SUSE bug 1204968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805251" comment="systemd-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805252" comment="systemd-container-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805253" comment="systemd-devel-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805254" comment="systemd-journal-remote-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805255" comment="systemd-libs-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805256" comment="systemd-oomd-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805257" comment="systemd-pam-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805258" comment="systemd-resolved-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805259" comment="systemd-rpm-macros-250-12.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805260" comment="systemd-udev-250-12.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38457</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38457" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38457" ref_url="https://www.suse.com/security/cve/CVE-2022-38457" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free(UAF) vulnerability was found in function 'vmw_cmd_res_check' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38457/">CVE-2022-38457 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38457">CVE-2022-38457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203330">SUSE bug 1203330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38472" ref_url="https://www.suse.com/security/cve/CVE-2022-38472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird &lt; 102.2, Thunderbird &lt; 91.13, Firefox ESR &lt; 91.13, Firefox ESR &lt; 102.2, and Firefox &lt; 104.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38472/">CVE-2022-38472 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38472">CVE-2022-38472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205832">SUSE bug 1205832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804495" comment="firefox-91.13.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804494" comment="thunderbird-91.13.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38473" ref_url="https://www.suse.com/security/cve/CVE-2022-38473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A cross-origin iframe referencing an XSLT document would inherit the parent domain's permissions (such as microphone or camera access). This vulnerability affects Thunderbird &lt; 102.2, Thunderbird &lt; 91.13, Firefox ESR &lt; 91.13, Firefox ESR &lt; 102.2, and Firefox &lt; 104.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38473/">CVE-2022-38473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38473">CVE-2022-38473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804495" comment="firefox-91.13.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804494" comment="thunderbird-91.13.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38476" ref_url="https://www.suse.com/security/cve/CVE-2022-38476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
    <description>
    A data race could occur in the &lt;code&gt;PK11_ChangePW&lt;/code&gt; function, potentially leading to a use-after-free vulnerability. In Firefox, this lock protected the data when a user changed their master password. This vulnerability affects Firefox ESR &lt; 102.2 and Thunderbird &lt; 102.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38476/">CVE-2022-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38476">CVE-2022-38476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804495" comment="firefox-91.13.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804494" comment="thunderbird-91.13.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38477" ref_url="https://www.suse.com/security/cve/CVE-2022-38477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.2, Thunderbird &lt; 102.2, and Firefox &lt; 104.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38477/">CVE-2022-38477 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38477">CVE-2022-38477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804495" comment="firefox-91.13.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804494" comment="thunderbird-91.13.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38478" ref_url="https://www.suse.com/security/cve/CVE-2022-38478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:2984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-September/025151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 102.2, Thunderbird &lt; 91.13, Firefox ESR &lt; 91.13, Firefox ESR &lt; 102.2, and Firefox &lt; 104.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38478/">CVE-2022-38478 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38478">CVE-2022-38478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202645">SUSE bug 1202645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804495" comment="firefox-91.13.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804494" comment="thunderbird-91.13.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38784" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38784" ref_url="https://www.suse.com/security/cve/CVE-2022-38784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013996.html" source="SUSE-SU"/>
    <description>
    Poppler prior to and including 22.08.0 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIGStream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2022-38171 in Xpdf.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-38784/">CVE-2022-38784 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38784">CVE-2022-38784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202692">SUSE bug 1202692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203392">SUSE bug 1203392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225040">SUSE bug 1225040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805747" comment="poppler-21.01.0-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805748" comment="poppler-cpp-21.01.0-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805749" comment="poppler-cpp-devel-21.01.0-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805750" comment="poppler-devel-21.01.0-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805751" comment="poppler-glib-21.01.0-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805752" comment="poppler-glib-devel-21.01.0-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805753" comment="poppler-qt5-21.01.0-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805754" comment="poppler-qt5-devel-21.01.0-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805755" comment="poppler-utils-21.01.0-14.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38791" ref_url="https://www.suse.com/security/cve/CVE-2022-38791" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2022:3855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013977.html" source="SUSE-SU"/>
    <description>
    In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-38791/">CVE-2022-38791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38791">CVE-2022-38791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202863">SUSE bug 1202863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202238900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-38900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-38900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38900" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-38900" ref_url="https://www.suse.com/security/cve/CVE-2022-38900" source="SUSE CVE"/>
    <description>
    decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-38900/">CVE-2022-38900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-38900">CVE-2022-38900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208096">SUSE bug 1208096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813701" comment="pcs-0.11.6-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813702" comment="pcs-snmp-0.11.6-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39188" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39188" ref_url="https://www.suse.com/security/cve/CVE-2022-39188" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in include/asm-generic/tlb.h in the Linux kernel before 5.19. Because of a race condition (unmap_mapping_range versus munmap), a device driver can free a page while it still has stale TLB entries. This only occurs in situations with VM_PFNMAP VMAs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39188/">CVE-2022-39188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39188">CVE-2022-39188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203107">SUSE bug 1203107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203116">SUSE bug 1203116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205313">SUSE bug 1205313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212326">SUSE bug 1212326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39189" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39189" ref_url="https://www.suse.com/security/cve/CVE-2022-39189" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered the x86 KVM subsystem in the Linux kernel before 5.18.17. Unprivileged guest users can compromise the guest kernel because TLB flush operations are mishandled in certain KVM_VCPU_PREEMPTED situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-39189/">CVE-2022-39189 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39189">CVE-2022-39189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203066">SUSE bug 1203066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203067">SUSE bug 1203067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39190</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39190" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39190" ref_url="https://www.suse.com/security/cve/CVE-2022-39190" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel before 5.19.6. A denial of service can occur upon binding to an already bound chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39190/">CVE-2022-39190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39190">CVE-2022-39190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203117">SUSE bug 1203117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39201" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39201" ref_url="https://www.suse.com/security/cve/CVE-2022-39201" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open source observability and data visualization platform. Starting with version 5.0.0-beta1 and prior to versions 8.5.14 and 9.1.8, Grafana could leak the authentication cookie of users to plugins. The vulnerability impacts data source and plugin proxy endpoints under certain conditions. The destination plugin could receive a user's Grafana authentication cookie. Versions 9.1.8 and 8.5.14 contain a patch for this issue. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39201/">CVE-2022-39201 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39201">CVE-2022-39201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204303">SUSE bug 1204303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39229" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39229" ref_url="https://www.suse.com/security/cve/CVE-2022-39229" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open source data visualization platform for metrics, logs, and traces. Versions prior to 9.1.8 and 8.5.14 allow one user to block another user's login attempt by registering someone else'e email address as a username. A Grafana user's username and email address are unique fields, that means no other user can have the same username or email address as another user. A user can have an email address as a username. However, the login system allows users to log in with either username or email address. Since Grafana allows a user to log in with either their username or email address, this creates an usual behavior where `user_1` can register with one email address and `user_2` can register their username as `user_1`'s email address. This prevents `user_1` logging into the application since `user_1`'s password won't match with `user_2`'s email address. Versions 9.1.8 and 8.5.14 contain a patch. There are no workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39229/">CVE-2022-39229 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39229">CVE-2022-39229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204304">SUSE bug 1204304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805711" comment="grafana-9.0.9-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39236" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39236" ref_url="https://www.suse.com/security/cve/CVE-2022-39236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Starting with version 17.1.0-rc.1, improperly formed beacon events can disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This is patched in matrix-js-sdk v19.7.0. Redacting applicable events, waiting for the sync processor to store data, and restarting the client are possible workarounds. Alternatively, redacting the applicable events and clearing all storage will fix the further perceived issues. Downgrading to an unaffected version, noting that such a version may be subject to other vulnerabilities, will additionally resolve the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39236/">CVE-2022-39236 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39236">CVE-2022-39236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3924" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3924" ref_url="https://www.suse.com/security/cve/CVE-2022-3924" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013720.html" source="SUSE-SU"/>
    <description>
    This issue can affect BIND 9 resolvers with `stale-answer-enable yes;` that also make use of the option `stale-answer-client-timeout`, configured with a value greater than zero.

If the resolver receives many queries that require recursion, there will be a corresponding increase in the number of clients that are waiting for recursion to complete. If there are sufficient clients already waiting when a new client query is received so that it is necessary to SERVFAIL the longest waiting client (see BIND 9 ARM `recursive-clients` limit and soft quota), then it is possible for a race to occur between providing a stale answer to this older client and sending an early timeout SERVFAIL, which may cause an assertion failure.
This issue affects BIND 9 versions 9.16.12 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.12-S1 through 9.16.36-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-3924/">CVE-2022-3924 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3924">CVE-2022-3924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207475">SUSE bug 1207475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212544">SUSE bug 1212544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212567">SUSE bug 1212567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805758" comment="bind-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805759" comment="bind-chroot-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805760" comment="bind-devel-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805761" comment="bind-dnssec-doc-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805762" comment="bind-dnssec-utils-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805763" comment="bind-doc-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805764" comment="bind-libs-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805765" comment="bind-license-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805766" comment="bind-utils-9.16.23-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805767" comment="python3-bind-9.16.23-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39249</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39249" ref_url="https://www.suse.com/security/cve/CVE-2022-39249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-js-sdk implementing a too permissive key forwarding strategy on the receiving end. Starting with version 19.7.0, the default policy for accepting key forwards has been made more strict in the matrix-js-sdk. matrix-js-sdk will now only accept forwarded keys in response to previously issued requests and only from own, verified devices. The SDK now sets a `trusted` flag on the decrypted message upon decryption, based on whether the key used to decrypt the message was received from a trusted source. Clients need to ensure that messages decrypted with a key with `trusted = false` are decorated appropriately, for example, by showing a warning for such messages. This attack requires coordination between a malicious homeserver and an attacker, and those who trust your homeservers do not need a workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39249/">CVE-2022-39249 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39249">CVE-2022-39249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39250" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39250" ref_url="https://www.suse.com/security/cve/CVE-2022-39250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    Matrix JavaScript SDK is the Matrix Client-Server software development kit (SDK) for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver could interfere with the verification flow between two users, injecting its own cross-signing user identity in place of one of the users' identities. This would lead to the other device trusting/verifying the user identity under the control of the homeserver instead of the intended one. The vulnerability is a bug in the matrix-js-sdk, caused by checking and signing user identities and devices in two separate steps, and inadequately fixing the keys to be signed between those steps. Even though the attack is partly made possible due to the design decision of treating cross-signing user identities as Matrix devices on the server side (with their device ID set to the public part of the user identity key), no other examined implementations were vulnerable. Starting with version 19.7.0, the matrix-js-sdk has been modified to double check that the key signed is the one that was verified instead of just referencing the key by ID. An additional check has been made to report an error when one of the device ID matches a cross-signing key. As this attack requires coordination between a malicious homeserver and an attacker, those who trust their homeservers do not need a particular workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39250/">CVE-2022-39250 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39250">CVE-2022-39250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39251" ref_url="https://www.suse.com/security/cve/CVE-2022-39251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
    <description>
    Matrix Javascript SDK is the Matrix Client-Server SDK for JavaScript. Prior to version 19.7.0, an attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a targeted attack in order to send fake to-device messages appearing to originate from another user. This can allow, for example, to inject the key backup secret during a self-verification, to make a targeted device start using a malicious key backup spoofed by the homeserver. These attacks are possible due to a protocol confusion vulnerability that accepts to-device messages encrypted with Megolm instead of Olm. Starting with version 19.7.0, matrix-js-sdk has been modified to only accept Olm-encrypted to-device messages. Out of caution, several other checks have been audited or added. This attack requires coordination between a malicious home server and an attacker, so those who trust their home servers do not need a workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39251/">CVE-2022-39251 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39251">CVE-2022-39251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204411">SUSE bug 1204411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39253</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39253" ref_url="https://www.suse.com/security/cve/CVE-2022-39253" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013768.html" source="SUSE-SU"/>
    <description>
    Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39253/">CVE-2022-39253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39253">CVE-2022-39253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204455">SUSE bug 1204455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204456">SUSE bug 1204456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208027">SUSE bug 1208027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805794" comment="git-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805795" comment="git-all-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805796" comment="git-core-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805797" comment="git-core-doc-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805798" comment="git-credential-libsecret-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805799" comment="git-daemon-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805800" comment="git-email-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805801" comment="git-gui-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805802" comment="git-instaweb-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805803" comment="git-subtree-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805804" comment="git-svn-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805805" comment="gitk-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805806" comment="gitweb-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805807" comment="perl-Git-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805808" comment="perl-Git-SVN-2.39.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39260</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39260" ref_url="https://www.suse.com/security/cve/CVE-2022-39260" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013768.html" source="SUSE-SU"/>
    <description>
    Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39260/">CVE-2022-39260 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39260">CVE-2022-39260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204456">SUSE bug 1204456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805794" comment="git-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805795" comment="git-all-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805796" comment="git-core-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805797" comment="git-core-doc-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805798" comment="git-credential-libsecret-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805799" comment="git-daemon-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805800" comment="git-email-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805801" comment="git-gui-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805802" comment="git-instaweb-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805803" comment="git-subtree-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805804" comment="git-svn-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805805" comment="gitk-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805806" comment="gitweb-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805807" comment="perl-Git-2.39.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805808" comment="perl-Git-SVN-2.39.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39282</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39282" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39282" ref_url="https://www.suse.com/security/cve/CVE-2022-39282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012922.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. FreeRDP based clients on unix systems using `/parallel` command line switch might read uninitialized data and send it to the server the client is currently connected to. FreeRDP based server implementations are not affected. Please upgrade to 2.8.1 where this issue is patched. If unable to upgrade, do not use parallel port redirection (`/parallel` command line switch) as a workaround.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39282/">CVE-2022-39282 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39282">CVE-2022-39282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204258">SUSE bug 1204258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39283" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39283" ref_url="https://www.suse.com/security/cve/CVE-2022-39283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012922.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based clients when using the `/video` command line switch might read uninitialized data, decode it as audio/video and display the result. FreeRDP based server implementations are not affected. This issue has been patched in version 2.8.1. If you cannot upgrade do not use the `/video` switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-39283/">CVE-2022-39283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39283">CVE-2022-39283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204257">SUSE bug 1204257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39306</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39306" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39306" ref_url="https://www.suse.com/security/cve/CVE-2022-39306" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. Versions prior to 9.2.4, or 8.5.15 on the 8.X branch, are subject to Improper Input Validation. Grafana admins can invite other members to the organization they are an admin for. When admins add members to the organization, non existing users get an email invite, existing members are added directly to the organization. When an invite link is sent, it allows users to sign up with whatever username/email address the user chooses and become a member of the organization. This introduces a vulnerability which can be used with malicious intent. This issue is patched in version 9.2.4, and has been backported to 8.5.15. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-39306/">CVE-2022-39306 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39306">CVE-2022-39306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205225">SUSE bug 1205225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39307</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39307" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39307" ref_url="https://www.suse.com/security/cve/CVE-2022-39307" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. When using the forget password on the login page, a POST request is made to the `/api/user/password/sent-reset-email` URL. When the username or email does not exist, a JSON response contains a “user not found” message. This leaks information to unauthenticated users and introduces a security risk. This issue has been patched in 9.2.4 and backported to 8.5.15. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39307/">CVE-2022-39307 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39307">CVE-2022-39307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205227">SUSE bug 1205227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39316</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39316" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39316" ref_url="https://www.suse.com/security/cve/CVE-2022-39316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013750.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. In affected versions there is an out of bound read in ZGFX decoder component of FreeRDP. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it likely resulting in a crash. This issue has been addressed in the 2.9.0 release. Users are advised to upgrade.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39316/">CVE-2022-39316 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39316">CVE-2022-39316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205512">SUSE bug 1205512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39317</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39317" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39317" ref_url="https://www.suse.com/security/cve/CVE-2022-39317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013750.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing a range check for input offset index in ZGFX decoder. A malicious server can trick a FreeRDP based client to read out of bound data and try to decode it. This issue has been addressed in version 2.9.0. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39317/">CVE-2022-39317 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39317">CVE-2022-39317 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39318" ref_url="https://www.suse.com/security/cve/CVE-2022-39318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013150.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input validation in `urbdrc` channel. A malicious server can trick a FreeRDP based client to crash with division by zero. This issue has been addressed in version 2.9.0. All users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39318/">CVE-2022-39318 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39318">CVE-2022-39318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205563">SUSE bug 1205563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39319" ref_url="https://www.suse.com/security/cve/CVE-2022-39319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013150.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in the `urbdrc` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39319/">CVE-2022-39319 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39319">CVE-2022-39319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205564">SUSE bug 1205564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39320</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39320" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39320" ref_url="https://www.suse.com/security/cve/CVE-2022-39320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013750.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP may attempt integer addition on too narrow types leads to allocation of a buffer too small holding the data written. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/usb` redirection switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-39320/">CVE-2022-39320 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39320">CVE-2022-39320 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39324</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39324" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39324" ref_url="https://www.suse.com/security/cve/CVE-2022-39324" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
    <description>
    Grafana is an open-source platform for monitoring and observability. Prior to versions 8.5.16 and 9.2.8, malicious user can create a snapshot and arbitrarily choose the `originalUrl` parameter by editing the query, thanks to a web proxy. When another user opens the URL of the snapshot, they will be presented with the regular web interface delivered by the trusted Grafana server. The `Open original dashboard` button no longer points to the to the real original dashboard but to the attacker's injected URL. This issue is fixed in versions 8.5.16 and 9.2.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-39324/">CVE-2022-39324 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39324">CVE-2022-39324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207750">SUSE bug 1207750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39347" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39347" ref_url="https://www.suse.com/security/cve/CVE-2022-39347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013750.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-39347/">CVE-2022-39347 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39347">CVE-2022-39347 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39377</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39377" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39377" ref_url="https://www.suse.com/security/cve/CVE-2022-39377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020063.html" source="SUSE-SU"/>
    <description>
    sysstat is a set of system performance tools for the Linux operating system. On 32 bit systems, in versions 9.1.16 and newer but prior to 12.7.1, allocate_structures contains a size_t overflow in sa_common.c. The allocate_structures function insufficiently checks bounds before arithmetic multiplication, allowing for an overflow in the size allocated for the buffer representing system activities. This issue may lead to Remote Code Execution (RCE). This issue has been patched in version 12.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-39377/">CVE-2022-39377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39377">CVE-2022-39377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205224">SUSE bug 1205224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211507">SUSE bug 1211507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805721" comment="sysstat-12.5.4-5.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39399</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39399" ref_url="https://www.suse.com/security/cve/CVE-2022-39399" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013160.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-21"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-39399/">CVE-2022-39399 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39399">CVE-2022-39399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204480">SUSE bug 1204480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205302">SUSE bug 1205302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804665" comment="java-11-openjdk-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804666" comment="java-11-openjdk-demo-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804667" comment="java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804668" comment="java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804669" comment="java-11-openjdk-devel-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804670" comment="java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804671" comment="java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804672" comment="java-11-openjdk-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804673" comment="java-11-openjdk-headless-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804674" comment="java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804675" comment="java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804676" comment="java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804677" comment="java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804678" comment="java-11-openjdk-jmods-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804679" comment="java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804680" comment="java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804681" comment="java-11-openjdk-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804682" comment="java-11-openjdk-src-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804683" comment="java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804684" comment="java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804685" comment="java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804686" comment="java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804687" comment="java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804625" comment="java-17-openjdk-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804626" comment="java-17-openjdk-demo-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804627" comment="java-17-openjdk-demo-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804628" comment="java-17-openjdk-demo-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804629" comment="java-17-openjdk-devel-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804630" comment="java-17-openjdk-devel-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804631" comment="java-17-openjdk-devel-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804632" comment="java-17-openjdk-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804633" comment="java-17-openjdk-headless-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804634" comment="java-17-openjdk-headless-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804635" comment="java-17-openjdk-headless-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804636" comment="java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804637" comment="java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804638" comment="java-17-openjdk-jmods-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804639" comment="java-17-openjdk-jmods-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804640" comment="java-17-openjdk-jmods-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804641" comment="java-17-openjdk-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804642" comment="java-17-openjdk-src-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804643" comment="java-17-openjdk-src-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804644" comment="java-17-openjdk-src-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804645" comment="java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804646" comment="java-17-openjdk-static-libs-fastdebug-17.0.5.0.8-2.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804647" comment="java-17-openjdk-static-libs-slowdebug-17.0.5.0.8-2.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39400</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39400" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39400" ref_url="https://www.suse.com/security/cve/CVE-2022-39400" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39400/">CVE-2022-39400 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39400">CVE-2022-39400 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39408" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39408" ref_url="https://www.suse.com/security/cve/CVE-2022-39408" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39408/">CVE-2022-39408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39408">CVE-2022-39408 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202239410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-39410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-39410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39410" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-39410" ref_url="https://www.suse.com/security/cve/CVE-2022-39410" source="SUSE CVE"/>
    <description>
    Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-39410/">CVE-2022-39410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-39410">CVE-2022-39410 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20223970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-3970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-3970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3970" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-3970" ref_url="https://www.suse.com/security/cve/CVE-2022-3970" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013135.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-3970/">CVE-2022-3970 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-3970">CVE-2022-3970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205392">SUSE bug 1205392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208311">SUSE bug 1208311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208312">SUSE bug 1208312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208338">SUSE bug 1208338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208655">SUSE bug 1208655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209328">SUSE bug 1209328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40023" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40023" ref_url="https://www.suse.com/security/cve/CVE-2022-40023" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012921.html" source="SUSE-SU"/>
    <description>
    Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40023/">CVE-2022-40023 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40023">CVE-2022-40023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203246">SUSE bug 1203246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805746" comment="python3-mako-1.1.4-6.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40090" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40090" ref_url="https://www.suse.com/security/cve/CVE-2022-40090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in function TIFFReadDirectory libtiff before 4.4.0 allows attackers to cause a denial of service via crafted TIFF file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40090/">CVE-2022-40090 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40090">CVE-2022-40090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214680">SUSE bug 1214680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866653" comment="libtiff-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866654" comment="libtiff-devel-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866655" comment="libtiff-tools-4.4.0-12.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40133" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40133" ref_url="https://www.suse.com/security/cve/CVE-2022-40133" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40133/">CVE-2022-40133 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40133">CVE-2022-40133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203329">SUSE bug 1203329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40284</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40284" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40284" ref_url="https://www.suse.com/security/cve/CVE-2022-40284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012808.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40284/">CVE-2022-40284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40284">CVE-2022-40284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204734">SUSE bug 1204734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811012" comment="libguestfs-winsupport-9.2-2.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40302" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40302" ref_url="https://www.suse.com/security/cve/CVE-2022-40302" source="SUSE CVE"/>
    <description>
    An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40302/">CVE-2022-40302 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40302">CVE-2022-40302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211074">SUSE bug 1211074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211075">SUSE bug 1211075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811075" comment="frr-8.3.1-11.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811076" comment="frr-selinux-8.3.1-11.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40303</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40303" ref_url="https://www.suse.com/security/cve/CVE-2022-40303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012813.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40303/">CVE-2022-40303 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40303">CVE-2022-40303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204366">SUSE bug 1204366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204807">SUSE bug 1204807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205549">SUSE bug 1205549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206241">SUSE bug 1206241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206248">SUSE bug 1206248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805263" comment="libxml2-2.9.13-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805264" comment="libxml2-devel-2.9.13-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805265" comment="python3-libxml2-2.9.13-3.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40304" ref_url="https://www.suse.com/security/cve/CVE-2022-40304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012813.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40304/">CVE-2022-40304 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40304">CVE-2022-40304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204367">SUSE bug 1204367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205069">SUSE bug 1205069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205549">SUSE bug 1205549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206241">SUSE bug 1206241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206248">SUSE bug 1206248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208343">SUSE bug 1208343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805263" comment="libxml2-2.9.13-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805264" comment="libxml2-devel-2.9.13-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805265" comment="python3-libxml2-2.9.13-3.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40318" ref_url="https://www.suse.com/security/cve/CVE-2022-40318" source="SUSE CVE"/>
    <description>
    An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgp_open_option_parse in the bgp_open.c file, a different location (with a different attack vector) relative to CVE-2022-40302.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40318/">CVE-2022-40318 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40318">CVE-2022-40318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211075">SUSE bug 1211075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811075" comment="frr-8.3.1-11.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811076" comment="frr-selinux-8.3.1-11.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40433" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40433" ref_url="https://www.suse.com/security/cve/CVE-2022-40433" source="SUSE CVE"/>
    <description>
    ** REJECT ** This CVE ID has been rejected by its CNA as it was not a security issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-40433/">CVE-2022-40433 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40433">CVE-2022-40433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215093">SUSE bug 1215093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807189" comment="java-1.8.0-openjdk-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807190" comment="java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807191" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807192" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807193" comment="java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807194" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807195" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807196" comment="java-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807197" comment="java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807198" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807199" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807200" comment="java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807201" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807202" comment="java-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807203" comment="java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807204" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807205" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4055" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4055" ref_url="https://www.suse.com/security/cve/CVE-2022-4055" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7672" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001437.html" source="SUSE-SU"/>
    <description>
    When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-06-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4055/">CVE-2022-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4055">CVE-2022-4055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205553">SUSE bug 1205553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985467" comment="xdg-utils-1.1.3-13.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40674" ref_url="https://www.suse.com/security/cve/CVE-2022-40674" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2660-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012544.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-40674/">CVE-2022-40674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40674">CVE-2022-40674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203438">SUSE bug 1203438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204099">SUSE bug 1204099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204177">SUSE bug 1204177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204509">SUSE bug 1204509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205077">SUSE bug 1205077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205285">SUSE bug 1205285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205527">SUSE bug 1205527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205598">SUSE bug 1205598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208339">SUSE bug 1208339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208753">SUSE bug 1208753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804599" comment="expat-2.2.10-12.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804600" comment="expat-devel-2.2.10-12.el9_0.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804688" comment="firefox-102.3.0-7.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804689" comment="thunderbird-102.3.0-4.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40897" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40897" ref_url="https://www.suse.com/security/cve/CVE-2022-40897" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036524.html" source="SUSE-SU"/>
    <description>
    Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40897/">CVE-2022-40897 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40897">CVE-2022-40897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206667">SUSE bug 1206667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805345" comment="python3-setuptools-53.0.0-10.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805346" comment="python3-setuptools-wheel-53.0.0-10.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40898" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40898" ref_url="https://www.suse.com/security/cve/CVE-2022-40898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013469.html" source="SUSE-SU"/>
    <description>
    An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-40898/">CVE-2022-40898 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40898">CVE-2022-40898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206670">SUSE bug 1206670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810833" comment="python3-wheel-0.36.2-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810834" comment="python3-wheel-wheel-0.36.2-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40956" ref_url="https://www.suse.com/security/cve/CVE-2022-40956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40956/">CVE-2022-40956 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40956">CVE-2022-40956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804588" comment="firefox-102.3.0-6.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40957</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40957" ref_url="https://www.suse.com/security/cve/CVE-2022-40957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash.&lt;br&gt;*This bug only affects Firefox on ARM64 platforms.*. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40957/">CVE-2022-40957 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40957">CVE-2022-40957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804588" comment="firefox-102.3.0-6.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40958" ref_url="https://www.suse.com/security/cve/CVE-2022-40958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40958/">CVE-2022-40958 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40958">CVE-2022-40958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804588" comment="firefox-102.3.0-6.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40959</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40959" ref_url="https://www.suse.com/security/cve/CVE-2022-40959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40959/">CVE-2022-40959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40959">CVE-2022-40959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804588" comment="firefox-102.3.0-6.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40960" ref_url="https://www.suse.com/security/cve/CVE-2022-40960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40960/">CVE-2022-40960 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40960">CVE-2022-40960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804588" comment="firefox-102.3.0-6.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40962" ref_url="https://www.suse.com/security/cve/CVE-2022-40962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-September/012407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012724.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.3, Thunderbird &lt; 102.3, and Firefox &lt; 105.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40962/">CVE-2022-40962 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40962">CVE-2022-40962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203477">SUSE bug 1203477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804588" comment="firefox-102.3.0-6.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804589" comment="thunderbird-102.3.0-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40964" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40964" ref_url="https://www.suse.com/security/cve/CVE-2022-40964" source="SUSE CVE"/>
    <description>
    Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-40964/">CVE-2022-40964 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40964">CVE-2022-40964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811138" comment="iwl100-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811139" comment="iwl1000-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811140" comment="iwl105-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811141" comment="iwl135-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811142" comment="iwl2000-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811143" comment="iwl2030-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811144" comment="iwl3160-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811145" comment="iwl5000-firmware-8.83.5.1_1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811146" comment="iwl5150-firmware-8.24.2.2-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811147" comment="iwl6000g2a-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811148" comment="iwl6000g2b-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811149" comment="iwl6050-firmware-41.28.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811150" comment="iwl7260-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811151" comment="libertas-sd8787-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811152" comment="linux-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811153" comment="linux-firmware-whence-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811154" comment="netronome-firmware-20230814-140.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202240982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-40982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-40982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-40982" ref_url="https://www.suse.com/security/cve/CVE-2022-40982" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="TID000021170" ref_url="https://www.suse.com/support/kb/doc/?id=000021170" source="SUSE-SU"/>
    <description>
    Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-40982/">CVE-2022-40982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-40982">CVE-2022-40982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206418">SUSE bug 1206418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41032" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41032" ref_url="https://www.suse.com/security/cve/CVE-2022-41032" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-41032/">CVE-2022-41032 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41032">CVE-2022-41032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204224">SUSE bug 1204224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804609" comment="aspnetcore-runtime-6.0-6.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805066" comment="aspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804610" comment="aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805067" comment="aspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804611" comment="dotnet-apphost-pack-6.0-6.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805068" comment="dotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805069" comment="dotnet-host-7.0.0-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804613" comment="dotnet-hostfxr-6.0-6.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805070" comment="dotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804614" comment="dotnet-runtime-6.0-6.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805071" comment="dotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804615" comment="dotnet-sdk-6.0-6.0.110-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804616" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.110-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805072" comment="dotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805073" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.100-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804617" comment="dotnet-targeting-pack-6.0-6.0.10-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805074" comment="dotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804618" comment="dotnet-templates-6.0-6.0.110-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805075" comment="dotnet-templates-7.0-7.0.100-0.5.rc2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805076" comment="netstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4122" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4122" ref_url="https://www.suse.com/security/cve/CVE-2022-4122" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000516.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in buildah. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4122/">CVE-2022-4122 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4122">CVE-2022-4122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205672">SUSE bug 1205672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953544" comment="podman-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953545" comment="podman-docker-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953546" comment="podman-plugins-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953547" comment="podman-remote-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953548" comment="podman-tests-5.2.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4128</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4128" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4128" ref_url="https://www.suse.com/security/cve/CVE-2022-4128" source="SUSE CVE"/>
    <description>
    A NULL pointer dereference issue was discovered in the Linux kernel in the MPTCP protocol when traversing the subflow list at disconnect time. A local user could use this flaw to potentially crash the system causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4128/">CVE-2022-4128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4128">CVE-2022-4128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205704">SUSE bug 1205704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4129" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4129" ref_url="https://www.suse.com/security/cve/CVE-2022-4129" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4129/">CVE-2022-4129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4129">CVE-2022-4129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205711">SUSE bug 1205711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41318" ref_url="https://www.suse.com/security/cve/CVE-2022-41318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012545.html" source="SUSE-SU"/>
    <description>
    A buffer over-read was discovered in libntlmauth in Squid 2.5 through 5.6. Due to incorrect integer-overflow protection, the SSPI and SMB authentication helpers are vulnerable to reading unintended memory locations. In some configurations, cleartext credentials from these locations are sent to a client. This is fixed in 5.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-41318/">CVE-2022-41318 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41318">CVE-2022-41318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203680">SUSE bug 1203680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804601" comment="squid-5.2-1.el9_0.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4139" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4139" ref_url="https://www.suse.com/security/cve/CVE-2022-4139" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An incorrect TLB flush issue was found in the Linux kernel's GPU i915 kernel driver, potentially leading to random memory corruption or data leaks. This flaw could allow a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4139/">CVE-2022-4139 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4139">CVE-2022-4139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205700">SUSE bug 1205700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205815">SUSE bug 1205815</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805222" comment="bpftool-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805223" comment="kernel-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805224" comment="kernel-abi-stablelists-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805225" comment="kernel-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805226" comment="kernel-cross-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805227" comment="kernel-debug-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805228" comment="kernel-debug-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805231" comment="kernel-debug-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805232" comment="kernel-debug-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805235" comment="kernel-doc-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805236" comment="kernel-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805237" comment="kernel-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805238" comment="kernel-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805239" comment="kernel-tools-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805240" comment="kernel-tools-libs-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805242" comment="perf-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805243" comment="python3-perf-5.14.0-162.12.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41674" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41674" ref_url="https://www.suse.com/security/cve/CVE-2022-41674" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 5.19.16. Attackers able to inject WLAN frames could cause a buffer overflow in the ieee80211_bss_info_update function in net/mac80211/scan.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41674/">CVE-2022-41674 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41674">CVE-2022-41674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1203770">SUSE bug 1203770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1203994">SUSE bug 1203994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41715" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41715" ref_url="https://www.suse.com/security/cve/CVE-2022-41715" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019440.html" source="SUSE-SU"/>
    <description>
    Programs which compile regular expressions from untrusted sources may be vulnerable to memory exhaustion or denial of service. The parsed regexp representation is linear in the size of the input, but in some cases the constant factor can be as high as 40,000, making relatively small regexps consume much larger amounts of memory. After fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Normal use of regular expressions is unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41715/">CVE-2022-41715 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41715">CVE-2022-41715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204023">SUSE bug 1204023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208441">SUSE bug 1208441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805209" comment="go-toolset-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805210" comment="golang-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805211" comment="golang-bin-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805212" comment="golang-docs-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811011" comment="golang-github-cpuguy83-md2man-2.0.2-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805213" comment="golang-misc-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805214" comment="golang-race-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805215" comment="golang-src-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805216" comment="golang-tests-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805711" comment="grafana-9.0.9-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41717" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41717" ref_url="https://www.suse.com/security/cve/CVE-2022-41717" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41717/">CVE-2022-41717 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41717">CVE-2022-41717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206135">SUSE bug 1206135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805733" comment="buildah-1.29.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805734" comment="buildah-tests-1.29.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805720" comment="conmon-2.1.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805823" comment="containernetworking-plugins-1.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805817" comment="git-lfs-3.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805209" comment="go-toolset-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805210" comment="golang-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805211" comment="golang-bin-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805212" comment="golang-docs-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805213" comment="golang-misc-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805214" comment="golang-race-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805215" comment="golang-src-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805216" comment="golang-tests-1.18.9-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805768" comment="podman-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805769" comment="podman-docker-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805770" comment="podman-gvproxy-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805771" comment="podman-plugins-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805772" comment="podman-remote-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805773" comment="podman-tests-4.4.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805774" comment="skopeo-1.11.2-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805775" comment="skopeo-tests-1.11.2-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805722" comment="toolbox-0.0.99.3-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805723" comment="toolbox-tests-0.0.99.3-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4172</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4172" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4172" ref_url="https://www.suse.com/security/cve/CVE-2022-4172" source="SUSE CVE"/>
    <description>
    An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4172/">CVE-2022-4172 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4172">CVE-2022-4172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205847">SUSE bug 1205847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805677" comment="qemu-guest-agent-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805678" comment="qemu-img-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805679" comment="qemu-kvm-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805680" comment="qemu-kvm-audio-pa-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805681" comment="qemu-kvm-block-curl-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805682" comment="qemu-kvm-block-rbd-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805683" comment="qemu-kvm-common-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805684" comment="qemu-kvm-core-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805685" comment="qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805686" comment="qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805687" comment="qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805688" comment="qemu-kvm-device-usb-host-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805689" comment="qemu-kvm-device-usb-redirect-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805690" comment="qemu-kvm-docs-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805691" comment="qemu-kvm-tools-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805692" comment="qemu-kvm-ui-egl-headless-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805693" comment="qemu-kvm-ui-opengl-7.2.0-14.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805694" comment="qemu-pr-helper-7.2.0-14.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41723</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41723" ref_url="https://www.suse.com/security/cve/CVE-2022-41723" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3867-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3868-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="TID000021647" ref_url="https://www.suse.com/support/kb/doc/?id=000021647" source="SUSE-SU"/>
    <description>
    A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41723/">CVE-2022-41723 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41723">CVE-2022-41723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208270">SUSE bug 1208270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215588">SUSE bug 1215588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053633" comment="delve-1.9.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053634" comment="go-toolset-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053635" comment="golang-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053636" comment="golang-bin-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053637" comment="golang-docs-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053638" comment="golang-misc-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053639" comment="golang-race-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053640" comment="golang-src-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053641" comment="golang-tests-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41724" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41724" ref_url="https://www.suse.com/security/cve/CVE-2022-41724" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    Large handshake records may cause panics in crypto/tls. Both clients and servers may send large TLS handshake records which cause servers and clients, respectively, to panic when attempting to construct responses. This affects all TLS 1.3 clients, TLS 1.2 clients which explicitly enable session resumption (by setting Config.ClientSessionCache to a non-nil value), and TLS 1.3 servers which request client certificates (by setting Config.ClientAuth &gt;= RequestClientCert).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41724/">CVE-2022-41724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41724">CVE-2022-41724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208271">SUSE bug 1208271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053633" comment="delve-1.9.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053634" comment="go-toolset-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053635" comment="golang-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053636" comment="golang-bin-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053637" comment="golang-docs-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053638" comment="golang-misc-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053639" comment="golang-race-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053640" comment="golang-src-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053641" comment="golang-tests-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810790" comment="runc-1.1.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41725" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41725" ref_url="https://www.suse.com/security/cve/CVE-2022-41725" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015005.html" source="SUSE-SU"/>
    <description>
    A denial of service is possible from excessive resource consumption in net/http and mime/multipart. Multipart form parsing with mime/multipart.Reader.ReadForm can consume largely unlimited amounts of memory and disk files. This also affects form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. ReadForm takes a maxMemory parameter, and is documented as storing "up to maxMemory bytes +10MB (reserved for non-file parts) in memory". File parts which cannot be stored in memory are stored on disk in temporary files. The unconfigurable 10MB reserved for non-file parts is excessively large and can potentially open a denial of service vector on its own. However, ReadForm did not properly account for all memory consumed by a parsed form, such as map entry overhead, part names, and MIME headers, permitting a maliciously crafted form to consume well over 10MB. In addition, ReadForm contained no limit on the number of disk files created, permitting a relatively small request body to create a large number of disk temporary files. With fix, ReadForm now properly accounts for various forms of memory overhead, and should now stay within its documented limit of 10MB + maxMemory bytes of memory consumption. Users should still be aware that this limit is high and may still be hazardous. In addition, ReadForm now creates at most one on-disk temporary file, combining multiple form parts into a single temporary file. The mime/multipart.File interface type's documentation states, "If stored on disk, the File's underlying concrete type will be an *os.File.". This is no longer the case when a form contains more than one file part, due to this coalescing of parts into a single file. The previous behavior of using distinct files for each form part may be reenabled with the environment variable GODEBUG=multipartfiles=distinct. Users should be aware that multipart.ReadForm and the http.Request methods that call it do not limit the amount of disk consumed by temporary files. Callers can limit the size of form data with http.MaxBytesReader.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41725/">CVE-2022-41725 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41725">CVE-2022-41725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208272">SUSE bug 1208272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053633" comment="delve-1.9.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053634" comment="go-toolset-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053635" comment="golang-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053636" comment="golang-bin-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053637" comment="golang-docs-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053638" comment="golang-misc-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053639" comment="golang-race-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053640" comment="golang-src-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053641" comment="golang-tests-1.19.6-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41741" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41741" ref_url="https://www.suse.com/security/cve/CVE-2022-41741" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7402" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013644.html" source="SUSE-SU"/>
    <description>
    NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41741/">CVE-2022-41741 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41741">CVE-2022-41741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204526">SUSE bug 1204526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983934" comment="nginx-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983935" comment="nginx-all-modules-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983936" comment="nginx-core-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983937" comment="nginx-filesystem-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983938" comment="nginx-mod-devel-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983939" comment="nginx-mod-http-image-filter-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983940" comment="nginx-mod-http-perl-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983941" comment="nginx-mod-http-xslt-filter-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983942" comment="nginx-mod-mail-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983943" comment="nginx-mod-stream-1.20.1-22.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41742" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41742" ref_url="https://www.suse.com/security/cve/CVE-2022-41742" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7402" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013644.html" source="SUSE-SU"/>
    <description>
    NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted audio or video file. The issue affects only NGINX products that are built with the module ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41742/">CVE-2022-41742 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41742">CVE-2022-41742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204527">SUSE bug 1204527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983934" comment="nginx-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983935" comment="nginx-all-modules-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983936" comment="nginx-core-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983937" comment="nginx-filesystem-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983938" comment="nginx-mod-devel-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983939" comment="nginx-mod-http-image-filter-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983940" comment="nginx-mod-http-perl-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983941" comment="nginx-mod-http-xslt-filter-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983942" comment="nginx-mod-mail-1.20.1-22.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983943" comment="nginx-mod-stream-1.20.1-22.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41858" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41858" ref_url="https://www.suse.com/security/cve/CVE-2022-41858" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A NULL pointer dereference may occur while a slip driver is in progress to detach in sl_tx_timeout in drivers/net/slip/slip.c. This issue could allow an attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41858/">CVE-2022-41858 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41858">CVE-2022-41858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205671">SUSE bug 1205671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211484">SUSE bug 1211484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212300">SUSE bug 1212300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41859</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41859" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41859" ref_url="https://www.suse.com/security/cve/CVE-2022-41859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013522.html" source="SUSE-SU"/>
    <description>
    In freeradius, the EAP-PWD function compute_password_element() leaks information about the password which allows an attacker to substantially reduce the size of an offline dictionary attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41859/">CVE-2022-41859 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41859">CVE-2022-41859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206204">SUSE bug 1206204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805698" comment="freeradius-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805699" comment="freeradius-devel-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805700" comment="freeradius-doc-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805701" comment="freeradius-krb5-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805702" comment="freeradius-ldap-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805703" comment="freeradius-mysql-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805704" comment="freeradius-perl-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805705" comment="freeradius-postgresql-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805706" comment="freeradius-rest-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805707" comment="freeradius-sqlite-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805708" comment="freeradius-unixODBC-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805709" comment="freeradius-utils-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805710" comment="python3-freeradius-3.0.21-37.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41860</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41860" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41860" ref_url="https://www.suse.com/security/cve/CVE-2022-41860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013522.html" source="SUSE-SU"/>
    <description>
    In freeradius, when an EAP-SIM supplicant sends an unknown SIM option, the server will try to look that option up in the internal dictionaries. This lookup will fail, but the SIM code will not check for that failure. Instead, it will dereference a NULL pointer, and cause the server to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41860/">CVE-2022-41860 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41860">CVE-2022-41860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206205">SUSE bug 1206205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805698" comment="freeradius-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805699" comment="freeradius-devel-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805700" comment="freeradius-doc-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805701" comment="freeradius-krb5-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805702" comment="freeradius-ldap-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805703" comment="freeradius-mysql-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805704" comment="freeradius-perl-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805705" comment="freeradius-postgresql-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805706" comment="freeradius-rest-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805707" comment="freeradius-sqlite-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805708" comment="freeradius-unixODBC-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805709" comment="freeradius-utils-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805710" comment="python3-freeradius-3.0.21-37.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41861" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41861" ref_url="https://www.suse.com/security/cve/CVE-2022-41861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013522.html" source="SUSE-SU"/>
    <description>
    A flaw was found in freeradius. A malicious RADIUS client or home server can send a malformed abinary attribute which can cause the server to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41861/">CVE-2022-41861 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41861">CVE-2022-41861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206206">SUSE bug 1206206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805698" comment="freeradius-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805699" comment="freeradius-devel-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805700" comment="freeradius-doc-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805701" comment="freeradius-krb5-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805702" comment="freeradius-ldap-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805703" comment="freeradius-mysql-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805704" comment="freeradius-perl-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805705" comment="freeradius-postgresql-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805706" comment="freeradius-rest-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805707" comment="freeradius-sqlite-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805708" comment="freeradius-unixODBC-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805709" comment="freeradius-utils-3.0.21-37.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805710" comment="python3-freeradius-3.0.21-37.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41862" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41862" ref_url="https://www.suse.com/security/cve/CVE-2022-41862" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014022.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
    <description>
    In PostgreSQL, a modified, unauthenticated server can send an unterminated string during the establishment of Kerberos transport encryption. In certain conditions a server can cause a libpq client to over-read and report an error message containing uninitialized bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-41862/">CVE-2022-41862 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41862">CVE-2022-41862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208102">SUSE bug 1208102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811073" comment="libpq-13.11-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811074" comment="libpq-devel-13.11-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805481" comment="postgresql-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805482" comment="postgresql-contrib-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805483" comment="postgresql-docs-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805484" comment="postgresql-plperl-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805485" comment="postgresql-plpython3-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805486" comment="postgresql-pltcl-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805487" comment="postgresql-private-devel-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805488" comment="postgresql-private-libs-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805489" comment="postgresql-server-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805490" comment="postgresql-server-devel-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805491" comment="postgresql-static-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805492" comment="postgresql-test-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805493" comment="postgresql-upgrade-13.10-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805494" comment="postgresql-upgrade-devel-13.10-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41877" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41877" ref_url="https://www.suse.com/security/cve/CVE-2022-41877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013750.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing input length validation in `drive` channel. A malicious server can trick a FreeRDP based client to read out of bound data and send it back to the server. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the drive redirection channel - command line options `/drive`, `+drives` or `+home-drive`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-41877/">CVE-2022-41877 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41877">CVE-2022-41877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805809" comment="freerdp-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805810" comment="freerdp-devel-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805811" comment="freerdp-libs-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805812" comment="libwinpr-2.4.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805813" comment="libwinpr-devel-2.4.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41903" ref_url="https://www.suse.com/security/cve/CVE-2022-41903" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013486.html" source="SUSE-SU"/>
    <description>
    Git is distributed revision control system. `git log` can display commits in an arbitrary format using its `--format` specifiers. This functionality is also exposed to `git archive` via the `export-subst` gitattribute. When processing the padding operators, there is a integer overflow in `pretty.c::format_and_pad_commit()` where a `size_t` is stored improperly as an `int`, and then added as an offset to a `memcpy()`. This overflow can be triggered directly by a user running a command which invokes the commit formatting machinery (e.g., `git log --format=...`). It may also be triggered indirectly through git archive via the export-subst mechanism, which expands format specifiers inside of files within the repository during a git archive. This integer overflow can result in arbitrary heap writes, which may result in arbitrary code execution. The problem has been patched in the versions published on 2023-01-17, going back to v2.30.7. Users are advised to upgrade. Users who are unable to upgrade should disable `git archive` in untrusted repositories. If you expose git archive via `git daemon`, disable it by running `git config --global daemon.uploadArch false`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41903/">CVE-2022-41903 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41903">CVE-2022-41903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207032">SUSE bug 1207032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207033">SUSE bug 1207033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208650">SUSE bug 1208650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805278" comment="git-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805279" comment="git-all-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805280" comment="git-core-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805281" comment="git-core-doc-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805282" comment="git-credential-libsecret-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805283" comment="git-daemon-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805284" comment="git-email-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805285" comment="git-gui-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805286" comment="git-instaweb-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805287" comment="git-subtree-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805288" comment="git-svn-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805289" comment="gitk-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805290" comment="gitweb-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805291" comment="perl-Git-2.31.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805292" comment="perl-Git-SVN-2.31.1-3.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41946</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41946" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41946" ref_url="https://www.suse.com/security/cve/CVE-2022-41946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013837.html" source="SUSE-SU"/>
    <description>
    pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-41946/">CVE-2022-41946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41946">CVE-2022-41946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206921">SUSE bug 1206921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805831" comment="postgresql-jdbc-42.2.27-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41973" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41973" ref_url="https://www.suse.com/security/cve/CVE-2022-41973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012643.html" source="SUSE-SU"/>
    <description>
    multipath-tools 0.7.7 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited in conjunction with CVE-2022-41974. Local users able to access /dev/shm can change symlinks in multipathd due to incorrect symlink handling, which could lead to controlled file writes outside of the /dev/shm directory. This could be used indirectly for local privilege escalation to root.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-41973/">CVE-2022-41973 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41973">CVE-2022-41973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202739">SUSE bug 1202739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209929">SUSE bug 1209929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805898" comment="device-mapper-multipath-0.8.7-20.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805899" comment="device-mapper-multipath-devel-0.8.7-20.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805900" comment="device-mapper-multipath-libs-0.8.7-20.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805901" comment="kpartx-0.8.7-20.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202241974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-41974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-41974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41974" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-41974" ref_url="https://www.suse.com/security/cve/CVE-2022-41974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012645.html" source="SUSE-SU"/>
    <description>
    multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-41974/">CVE-2022-41974 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-41974">CVE-2022-41974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205472">SUSE bug 1205472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804694" comment="device-mapper-multipath-0.8.7-7.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804695" comment="device-mapper-multipath-devel-0.8.7-7.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804696" comment="device-mapper-multipath-libs-0.8.7-7.el9_0.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804697" comment="kpartx-0.8.7-7.el9_0.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42010" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42010" ref_url="https://www.suse.com/security/cve/CVE-2022-42010" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013162.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42010/">CVE-2022-42010 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42010">CVE-2022-42010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204111">SUSE bug 1204111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805244" comment="dbus-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805245" comment="dbus-common-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805246" comment="dbus-daemon-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805247" comment="dbus-devel-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805248" comment="dbus-libs-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805249" comment="dbus-tools-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805250" comment="dbus-x11-1.12.20-7.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42011" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42011" ref_url="https://www.suse.com/security/cve/CVE-2022-42011" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013162.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-42011/">CVE-2022-42011 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42011">CVE-2022-42011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204112">SUSE bug 1204112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805244" comment="dbus-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805245" comment="dbus-common-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805246" comment="dbus-daemon-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805247" comment="dbus-devel-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805248" comment="dbus-libs-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805249" comment="dbus-tools-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805250" comment="dbus-x11-1.12.20-7.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42012" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42012" ref_url="https://www.suse.com/security/cve/CVE-2022-42012" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013162.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-42012/">CVE-2022-42012 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42012">CVE-2022-42012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204113">SUSE bug 1204113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221180">SUSE bug 1221180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805244" comment="dbus-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805245" comment="dbus-common-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805246" comment="dbus-daemon-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805247" comment="dbus-devel-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805248" comment="dbus-libs-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805249" comment="dbus-tools-1.12.20-7.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805250" comment="dbus-x11-1.12.20-7.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4203" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4203" ref_url="https://www.suse.com/security/cve/CVE-2022-4203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
    <description>
    A read buffer overrun can be triggered in X.509 certificate verification,
specifically in name constraint checking. Note that this occurs
after certificate chain signature verification and requires either a
CA to have signed the malicious certificate or for the application to
continue certificate verification despite failure to construct a path
to a trusted issuer.

The read buffer overrun might result in a crash which could lead to
a denial of service attack. In theory it could also result in the disclosure
of private memory contents (such as private keys, or sensitive plaintext)
although we are not aware of any working exploit leading to memory
contents disclosure as of the time of release of this advisory.

In a TLS client, this can be triggered by connecting to a malicious
server. In a TLS server, this can be triggered if the server requests
client authentication and a malicious client connects.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4203/">CVE-2022-4203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4203">CVE-2022-4203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207535">SUSE bug 1207535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42432</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42432" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42432" ref_url="https://www.suse.com/security/cve/CVE-2022-42432" source="SUSE CVE"/>
    <description>
    This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel 6.0-rc2. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the nft_osf_eval function. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-18540.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42432/">CVE-2022-42432 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42432">CVE-2022-42432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204614">SUSE bug 1204614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4269" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4269" ref_url="https://www.suse.com/security/cve/CVE-2022-4269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4269/">CVE-2022-4269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4269">CVE-2022-4269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206024">SUSE bug 1206024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805438" comment="bpftool-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805439" comment="kernel-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805440" comment="kernel-abi-stablelists-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805441" comment="kernel-core-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805442" comment="kernel-cross-headers-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805443" comment="kernel-debug-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805444" comment="kernel-debug-core-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805447" comment="kernel-debug-modules-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805448" comment="kernel-debug-modules-extra-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805451" comment="kernel-doc-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805452" comment="kernel-headers-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805453" comment="kernel-modules-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805454" comment="kernel-modules-extra-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805455" comment="kernel-tools-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805456" comment="kernel-tools-libs-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805458" comment="perf-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805459" comment="python3-perf-5.14.0-162.22.2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42703" ref_url="https://www.suse.com/security/cve/CVE-2022-42703" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf anon_vma double reuse.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42703/">CVE-2022-42703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42703">CVE-2022-42703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1202096">SUSE bug 1202096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204168">SUSE bug 1204168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204170">SUSE bug 1204170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206463">SUSE bug 1206463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208044">SUSE bug 1208044</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42720</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42720" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42720" ref_url="https://www.suse.com/security/cve/CVE-2022-42720" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    Various refcounting bugs in the multi-BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to trigger use-after-free conditions to potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42720/">CVE-2022-42720 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42720">CVE-2022-42720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204059">SUSE bug 1204059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204291">SUSE bug 1204291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42721" ref_url="https://www.suse.com/security/cve/CVE-2022-42721" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A list management bug in BSS handling in the mac80211 stack in the Linux kernel 5.1 through 5.19.x before 5.19.16 could be used by local attackers (able to inject WLAN frames) to corrupt a linked list and, in turn, potentially execute code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42721/">CVE-2022-42721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42721">CVE-2022-42721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204060">SUSE bug 1204060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204290">SUSE bug 1204290</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42722</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42722" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42722" ref_url="https://www.suse.com/security/cve/CVE-2022-42722" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel 5.8 through 5.19.x before 5.19.16, local attackers able to inject WLAN frames into the mac80211 stack could cause a NULL pointer dereference denial-of-service attack against the beacon protection of P2P devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42722/">CVE-2022-42722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42722">CVE-2022-42722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204125">SUSE bug 1204125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1204289">SUSE bug 1204289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42799</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42799" ref_url="https://www.suse.com/security/cve/CVE-2022-42799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013156.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved UI handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Visiting a malicious website may lead to user interface spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42799/">CVE-2022-42799 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42799">CVE-2022-42799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205123">SUSE bug 1205123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42823" ref_url="https://www.suse.com/security/cve/CVE-2022-42823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013156.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42823/">CVE-2022-42823 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42823">CVE-2022-42823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205120">SUSE bug 1205120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42824" ref_url="https://www.suse.com/security/cve/CVE-2022-42824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013156.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may disclose sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42824/">CVE-2022-42824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42824">CVE-2022-42824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205124">SUSE bug 1205124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42826" ref_url="https://www.suse.com/security/cve/CVE-2022-42826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028468.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42826/">CVE-2022-42826 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42826">CVE-2022-42826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207997">SUSE bug 1207997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209330">SUSE bug 1209330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4283" ref_url="https://www.suse.com/security/cve/CVE-2022-4283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4283/">CVE-2022-4283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4283">CVE-2022-4283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206017">SUSE bug 1206017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208344">SUSE bug 1208344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208653">SUSE bug 1208653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805739" comment="tigervnc-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805740" comment="tigervnc-icons-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805741" comment="tigervnc-license-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805742" comment="tigervnc-selinux-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805743" comment="tigervnc-server-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805744" comment="tigervnc-server-minimal-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805745" comment="tigervnc-server-module-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4285" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4285" ref_url="https://www.suse.com/security/cve/CVE-2022-4285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031740.html" source="SUSE-SU"/>
    <description>
    An illegal memory access flaw was found in the binutils package. Parsing an ELF file containing corrupt symbol version information may result in a denial of service. This issue is the result of an incomplete fix for CVE-2020-16599.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4285/">CVE-2022-4285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4285">CVE-2022-4285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206080">SUSE bug 1206080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811135" comment="binutils-2.35.2-42.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811136" comment="binutils-devel-2.35.2-42.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811137" comment="binutils-gold-2.35.2-42.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42852" ref_url="https://www.suse.com/security/cve/CVE-2022-42852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may result in the disclosure of process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-42852/">CVE-2022-42852 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42852">CVE-2022-42852 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42863" ref_url="https://www.suse.com/security/cve/CVE-2022-42863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42863/">CVE-2022-42863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42863">CVE-2022-42863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42867" ref_url="https://www.suse.com/security/cve/CVE-2022-42867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42867/">CVE-2022-42867 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42867">CVE-2022-42867 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42895</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42895" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42895" ref_url="https://www.suse.com/security/cve/CVE-2022-42895" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
    <description>
    There is an infoleak vulnerability in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_parse_conf_req function which can be used to leak kernel pointers remotely.
We recommend upgrading past commit   https://github.com/torvalds/linux/commit/b1a2cd50c0357f243b7435a732b4e62ba3157a2e https://www.google.com/url 


    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-42895/">CVE-2022-42895 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42895">CVE-2022-42895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205705">SUSE bug 1205705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42896</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42896" ref_url="https://www.suse.com/security/cve/CVE-2022-42896" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
    <description>
    There are use-after-free vulnerabilities in the Linux kernel's net/bluetooth/l2cap_core.c's l2cap_connect and l2cap_le_connect_req functions which may allow code execution and leaking kernel memory (respectively) remotely via Bluetooth.  A remote attacker could execute code leaking kernel memory via Bluetooth if within proximity of the victim.

We recommend upgrading past commit    https://www.google.com/url  https://github.com/torvalds/linux/commit/711f8c3fb3db61897080468586b970c87c61d9e4 https://www.google.com/url 


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-42896/">CVE-2022-42896 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42896">CVE-2022-42896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205709">SUSE bug 1205709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42898" ref_url="https://www.suse.com/security/cve/CVE-2022-42898" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WO45C5LQHPOWEJHKWCXPWLI54XMTTYQP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0020-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCW7YX6RG5EAFBRU3SLTXKN5NWVODXTH/" source="SUSE-SU"/>
    <description>
    PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-42898/">CVE-2022-42898 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42898">CVE-2022-42898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205126">SUSE bug 1205126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205667">SUSE bug 1205667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207423">SUSE bug 1207423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207690">SUSE bug 1207690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211487">SUSE bug 1211487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225675">SUSE bug 1225675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805098" comment="krb5-devel-1.19.1-24.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805099" comment="krb5-libs-1.19.1-24.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805100" comment="krb5-pkinit-1.19.1-24.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805101" comment="krb5-server-1.19.1-24.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805102" comment="krb5-server-ldap-1.19.1-24.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805103" comment="krb5-workstation-1.19.1-24.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805104" comment="libkadm5-1.19.1-24.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42919" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42919" ref_url="https://www.suse.com/security/cve/CVE-2022-42919" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
    <description>
    Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library, when used with the forkserver start method on Linux, allows pickles to be deserialized from any user in the same machine local network namespace, which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus, this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3, but users would need to make specific uncommon API calls in order to do that in CPython before 3.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42919/">CVE-2022-42919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42919">CVE-2022-42919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204886">SUSE bug 1204886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805088" comment="python-unversioned-command-3.9.14-1.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805089" comment="python3-3.9.14-1.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805090" comment="python3-debug-3.9.14-1.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805091" comment="python3-devel-3.9.14-1.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805092" comment="python3-idle-3.9.14-1.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805093" comment="python3-libs-3.9.14-1.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805094" comment="python3-test-3.9.14-1.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805095" comment="python3-tkinter-3.9.14-1.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42920" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42920" ref_url="https://www.suse.com/security/cve/CVE-2022-42920" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013192.html" source="SUSE-SU"/>
    <description>
    Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected. Update to Apache Commons BCEL 6.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42920/">CVE-2022-42920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42920">CVE-2022-42920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205125">SUSE bug 1205125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209316">SUSE bug 1209316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805118" comment="bcel-6.4.1-9.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42927" ref_url="https://www.suse.com/security/cve/CVE-2022-42927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via `performance.getEntries()`. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.4, and Thunderbird &lt; 102.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42927/">CVE-2022-42927 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42927">CVE-2022-42927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804690" comment="firefox-102.4.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42928" ref_url="https://www.suse.com/security/cve/CVE-2022-42928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.4, and Thunderbird &lt; 102.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-42928/">CVE-2022-42928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42928">CVE-2022-42928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804690" comment="firefox-102.4.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42929" ref_url="https://www.suse.com/security/cve/CVE-2022-42929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a website called `window.print()` in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.4, and Thunderbird &lt; 102.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42929/">CVE-2022-42929 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42929">CVE-2022-42929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804690" comment="firefox-102.4.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202242932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-42932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-42932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-42932" ref_url="https://www.suse.com/security/cve/CVE-2022-42932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-October/012666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105 and Firefox ESR 102.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.4, and Thunderbird &lt; 102.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-42932/">CVE-2022-42932 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-42932">CVE-2022-42932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204421">SUSE bug 1204421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804690" comment="firefox-102.4.0-1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804693" comment="thunderbird-102.4.0-1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4304" ref_url="https://www.suse.com/security/cve/CVE-2022-4304" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2622-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:29171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015773.html" source="SUSE-SU"/>
    <description>
    A timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a
Bleichenbacher style attack. To achieve a successful decryption an attacker
would have to be able to send a very large number of trial messages for
decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,
RSA-OEAP and RSASVE.

For example, in a TLS connection, RSA is commonly used by a client to send an
encrypted pre-master secret to the server. An attacker that had observed a
genuine connection between a client and a server could use this flaw to send
trial messages to the server and record the time taken to process them. After a
sufficiently large number of messages the attacker could recover the pre-master
secret used for the original connection and thus be able to decrypt the
application data sent over that connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4304/">CVE-2022-4304 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4304">CVE-2022-4304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207534">SUSE bug 1207534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210067">SUSE bug 1210067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213146">SUSE bug 1213146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213289">SUSE bug 1213289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215014">SUSE bug 1215014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805695" comment="edk2-ovmf-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805696" comment="edk2-tools-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805697" comment="edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43548" ref_url="https://www.suse.com/security/cve/CVE-2022-43548" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013766.html" source="SUSE-SU"/>
    <description>
    A OS Command Injection vulnerability exists in Node.js versions &lt;14.21.1, &lt;16.18.1, &lt;18.12.1, &lt;19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-43548/">CVE-2022-43548 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43548">CVE-2022-43548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205119">SUSE bug 1205119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805108" comment="nodejs-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805109" comment="nodejs-devel-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805110" comment="nodejs-docs-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805111" comment="nodejs-full-i18n-18.12.1-1.module+el9.1.0.z+17326+318294bb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805206" comment="nodejs-libs-16.18.1-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805207" comment="nodejs-nodemon-2.0.20-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805115" comment="npm-8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43552" ref_url="https://www.suse.com/security/cve/CVE-2022-43552" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/027005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/027006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability exists in curl &lt;7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-43552/">CVE-2022-43552 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43552">CVE-2022-43552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206309">SUSE bug 1206309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805902" comment="curl-7.76.1-23.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805903" comment="curl-minimal-7.76.1-23.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805904" comment="libcurl-7.76.1-23.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805905" comment="libcurl-devel-7.76.1-23.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805906" comment="libcurl-minimal-7.76.1-23.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43680</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43680" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43680" ref_url="https://www.suse.com/security/cve/CVE-2022-43680" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:2831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/025985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012847.html" source="SUSE-SU"/>
    <description>
    In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43680/">CVE-2022-43680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43680">CVE-2022-43680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204708">SUSE bug 1204708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205590">SUSE bug 1205590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205598">SUSE bug 1205598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208339">SUSE bug 1208339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805261" comment="expat-2.4.9-1.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805262" comment="expat-devel-2.4.9-1.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43681</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43681" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43681" ref_url="https://www.suse.com/security/cve/CVE-2022-43681" source="SUSE CVE"/>
    <description>
    An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-43681/">CVE-2022-43681 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43681">CVE-2022-43681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211076">SUSE bug 1211076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811075" comment="frr-8.3.1-11.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811076" comment="frr-selinux-8.3.1-11.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43750" ref_url="https://www.suse.com/security/cve/CVE-2022-43750" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2022:1124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-November/026621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
    <description>
    drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43750/">CVE-2022-43750 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43750">CVE-2022-43750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1204653">SUSE bug 1204653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211484">SUSE bug 1211484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4378" ref_url="https://www.suse.com/security/cve/CVE-2022-4378" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A stack overflow flaw was found in the Linux kernel's SYSCTL subsystem in how a user changes certain kernel parameters and variables. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4378/">CVE-2022-4378 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4378">CVE-2022-4378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206207">SUSE bug 1206207</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206228">SUSE bug 1206228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211118">SUSE bug 1211118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214268">SUSE bug 1214268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218483">SUSE bug 1218483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218966">SUSE bug 1218966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805323" comment="bpftool-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805324" comment="kernel-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805325" comment="kernel-abi-stablelists-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805326" comment="kernel-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805327" comment="kernel-cross-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805328" comment="kernel-debug-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805329" comment="kernel-debug-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805332" comment="kernel-debug-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805333" comment="kernel-debug-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805336" comment="kernel-doc-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805337" comment="kernel-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805338" comment="kernel-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805339" comment="kernel-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805340" comment="kernel-tools-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805341" comment="kernel-tools-libs-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805343" comment="perf-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805344" comment="python3-perf-5.14.0-162.18.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4379</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4379" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4379" ref_url="https://www.suse.com/security/cve/CVE-2022-4379" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013714.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4379/">CVE-2022-4379 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4379">CVE-2022-4379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206209">SUSE bug 1206209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206373">SUSE bug 1206373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805323" comment="bpftool-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805324" comment="kernel-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805325" comment="kernel-abi-stablelists-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805326" comment="kernel-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805327" comment="kernel-cross-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805328" comment="kernel-debug-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805329" comment="kernel-debug-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805332" comment="kernel-debug-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805333" comment="kernel-debug-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805336" comment="kernel-doc-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805337" comment="kernel-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805338" comment="kernel-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805339" comment="kernel-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805340" comment="kernel-tools-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805341" comment="kernel-tools-libs-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805343" comment="perf-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805344" comment="python3-perf-5.14.0-162.18.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202243945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-43945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-43945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43945" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-43945" ref_url="https://www.suse.com/security/cve/CVE-2022-43945" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4560-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="TID000021059" ref_url="https://www.suse.com/support/kb/doc/?id=000021059" source="SUSE-SU"/>
    <description>
    The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-43945/">CVE-2022-43945 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-43945">CVE-2022-43945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205128">SUSE bug 1205128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1205130">SUSE bug 1205130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208030">SUSE bug 1208030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208085">SUSE bug 1208085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209225">SUSE bug 1209225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210124">SUSE bug 1210124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805222" comment="bpftool-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805223" comment="kernel-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805224" comment="kernel-abi-stablelists-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805225" comment="kernel-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805226" comment="kernel-cross-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805227" comment="kernel-debug-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805228" comment="kernel-debug-core-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805231" comment="kernel-debug-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805232" comment="kernel-debug-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805235" comment="kernel-doc-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805236" comment="kernel-headers-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805237" comment="kernel-modules-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805238" comment="kernel-modules-extra-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805239" comment="kernel-tools-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805240" comment="kernel-tools-libs-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805242" comment="perf-5.14.0-162.12.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805243" comment="python3-perf-5.14.0-162.12.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4415" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4415" ref_url="https://www.suse.com/security/cve/CVE-2022-4415" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-January/027219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040371.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-4415/">CVE-2022-4415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4415">CVE-2022-4415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205000">SUSE bug 1205000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805355" comment="systemd-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805356" comment="systemd-container-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805357" comment="systemd-devel-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805358" comment="systemd-journal-remote-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805359" comment="systemd-libs-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805360" comment="systemd-oomd-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805361" comment="systemd-pam-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805362" comment="systemd-resolved-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805363" comment="systemd-rpm-macros-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805364" comment="systemd-udev-250-12.el9_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4450</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4450" ref_url="https://www.suse.com/security/cve/CVE-2022-4450" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
    <description>
    The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and
decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload data.
If the function succeeds then the "name_out", "header" and "data" arguments are
populated with pointers to buffers containing the relevant decoded data. The
caller is responsible for freeing those buffers. It is possible to construct a
PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex()
will return a failure code but will populate the header argument with a pointer
to a buffer that has already been freed. If the caller also frees this buffer
then a double free will occur. This will most likely lead to a crash. This
could be exploited by an attacker who has the ability to supply malicious PEM
files for parsing to achieve a denial of service attack.

The functions PEM_read_bio() and PEM_read() are simple wrappers around
PEM_read_bio_ex() and therefore these functions are also directly affected.

These functions are also called indirectly by a number of other OpenSSL
functions including PEM_X509_INFO_read_bio_ex() and
SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal
uses of these functions are not vulnerable because the caller does not free the
header argument if PEM_read_bio_ex() returns a failure code. These locations
include the PEM_read_bio_TYPE() functions as well as the decoders introduced in
OpenSSL 3.0.

The OpenSSL asn1parse command line application is also impacted by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4450/">CVE-2022-4450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4450">CVE-2022-4450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207538">SUSE bug 1207538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805695" comment="edk2-ovmf-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805696" comment="edk2-tools-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805697" comment="edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202244617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-44617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-44617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44617" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-44617" ref_url="https://www.suse.com/security/cve/CVE-2022-44617" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013549.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libXpm. When processing a file with width of 0 and a very large height, some parser functions will be called repeatedly and can lead to an infinite loop, resulting in a Denial of Service in the application linked to the library.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44617/">CVE-2022-44617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44617">CVE-2022-44617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207030">SUSE bug 1207030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214751">SUSE bug 1214751</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805274" comment="libXpm-3.5.13-8.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805275" comment="libXpm-devel-3.5.13-8.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202244638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-44638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-44638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-44638" ref_url="https://www.suse.com/security/cve/CVE-2022-44638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013121.html" source="SUSE-SU"/>
    <description>
    In libpixman in Pixman before 0.42.2, there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-44638/">CVE-2022-44638 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44638">CVE-2022-44638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205033">SUSE bug 1205033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208313">SUSE bug 1208313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208345">SUSE bug 1208345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211497">SUSE bug 1211497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866753" comment="mingw32-pixman-0.42.2-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866754" comment="mingw64-pixman-0.42.2-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816423" comment="pixman-0.40.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816424" comment="pixman-devel-0.40.0-6.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202244792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-44792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-44792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44792" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-44792" ref_url="https://www.suse.com/security/cve/CVE-2022-44792" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013464.html" source="SUSE-SU"/>
    <description>
    handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44792/">CVE-2022-44792 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44792">CVE-2022-44792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205150">SUSE bug 1205150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207896">SUSE bug 1207896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805863" comment="net-snmp-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805864" comment="net-snmp-agent-libs-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805865" comment="net-snmp-devel-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805866" comment="net-snmp-libs-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805867" comment="net-snmp-perl-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805868" comment="net-snmp-utils-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805869" comment="python3-net-snmp-5.9.1-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202244793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-44793</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-44793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44793" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-44793" ref_url="https://www.suse.com/security/cve/CVE-2022-44793" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013464.html" source="SUSE-SU"/>
    <description>
    handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-44793/">CVE-2022-44793 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-44793">CVE-2022-44793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205148">SUSE bug 1205148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207896">SUSE bug 1207896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805863" comment="net-snmp-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805864" comment="net-snmp-agent-libs-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805865" comment="net-snmp-devel-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805866" comment="net-snmp-libs-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805867" comment="net-snmp-perl-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805868" comment="net-snmp-utils-5.9.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805869" comment="python3-net-snmp-5.9.1-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45060" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45060" ref_url="https://www.suse.com/security/cve/CVE-2022-45060" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2022:10198-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FJFEBVAZE52U2TMYLTOEW3F7YGVD7XQL/" source="SUSE-SU"/>
    <description>
    An HTTP Request Forgery issue was discovered in Varnish Cache 5.x and 6.x before 6.0.11, 7.x before 7.1.2, and 7.2.x before 7.2.1. An attacker may introduce characters through HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the backend. This could, in turn, be used to exploit vulnerabilities in a server behind the Varnish server. Note: the 6.0.x LTS series (before 6.0.11) is affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45060/">CVE-2022-45060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45060">CVE-2022-45060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205242">SUSE bug 1205242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805105" comment="varnish-6.6.2-2.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805106" comment="varnish-devel-6.6.2-2.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805107" comment="varnish-docs-6.6.2-2.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45061</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45061" ref_url="https://www.suse.com/security/cve/CVE-2022-45061" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2022:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2022:3087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45061/">CVE-2022-45061 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45061">CVE-2022-45061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205244">SUSE bug 1205244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211488">SUSE bug 1211488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805347" comment="python-unversioned-command-3.9.14-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805348" comment="python3-3.9.14-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805349" comment="python3-debug-3.9.14-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805350" comment="python3-devel-3.9.14-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805351" comment="python3-idle-3.9.14-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805352" comment="python3-libs-3.9.14-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805353" comment="python3-test-3.9.14-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805354" comment="python3-tkinter-3.9.14-1.el9_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45063</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45063" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45063" ref_url="https://www.suse.com/security/cve/CVE-2022-45063" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7427" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013932.html" source="SUSE-SU"/>
    <description>
    xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45063/">CVE-2022-45063 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45063">CVE-2022-45063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205305">SUSE bug 1205305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211577">SUSE bug 1211577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983972" comment="xterm-366-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983973" comment="xterm-resize-366-10.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45403" ref_url="https://www.suse.com/security/cve/CVE-2022-45403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45403/">CVE-2022-45403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45403">CVE-2022-45403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45404" ref_url="https://www.suse.com/security/cve/CVE-2022-45404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through a series of popup and &lt;code&gt;window.print()&lt;/code&gt; calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45404/">CVE-2022-45404 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45404">CVE-2022-45404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45405" ref_url="https://www.suse.com/security/cve/CVE-2022-45405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Freeing arbitrary &lt;code&gt;nsIInputStream&lt;/code&gt;'s on a different thread than creation could have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45405/">CVE-2022-45405 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45405">CVE-2022-45405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45406</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45406" ref_url="https://www.suse.com/security/cve/CVE-2022-45406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45406/">CVE-2022-45406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45406">CVE-2022-45406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45408" ref_url="https://www.suse.com/security/cve/CVE-2022-45408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45408/">CVE-2022-45408 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45408">CVE-2022-45408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45409" ref_url="https://www.suse.com/security/cve/CVE-2022-45409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The garbage collector could have been aborted in several states and zones and &lt;code&gt;GCRuntime::finishCollection&lt;/code&gt; may not have been called, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45409/">CVE-2022-45409 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45409">CVE-2022-45409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45410" ref_url="https://www.suse.com/security/cve/CVE-2022-45410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a ServiceWorker intercepted a request with &lt;code&gt;FetchEvent&lt;/code&gt;, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45410/">CVE-2022-45410 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45410">CVE-2022-45410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45411</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45411" ref_url="https://www.suse.com/security/cve/CVE-2022-45411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on &lt;code&gt;fetch()&lt;/code&gt; and XMLHttpRequest; however some webservers have implemented non-standard headers such as &lt;code&gt;X-Http-Method-Override&lt;/code&gt; that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45411/">CVE-2022-45411 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45411">CVE-2022-45411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45412" ref_url="https://www.suse.com/security/cve/CVE-2022-45412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When resolving a symlink such as &lt;code&gt;file:///proc/self/fd/1&lt;/code&gt;, an error message may be produced where the symlink was resolved to a string containing unitialized memory in the buffer. &lt;br&gt;*This bug only affects Thunderbird on Unix-based operated systems (Android, Linux, MacOS). Windows is unaffected.*. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45412/">CVE-2022-45412 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45412">CVE-2022-45412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45414" ref_url="https://www.suse.com/security/cve/CVE-2022-45414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013195.html" source="SUSE-SU"/>
    <description>
    If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird &lt; 102.5.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-45414/">CVE-2022-45414 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45414">CVE-2022-45414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205941">SUSE bug 1205941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805117" comment="thunderbird-102.6.0-2.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45416" ref_url="https://www.suse.com/security/cve/CVE-2022-45416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45416/">CVE-2022-45416 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45416">CVE-2022-45416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45418" ref_url="https://www.suse.com/security/cve/CVE-2022-45418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45418/">CVE-2022-45418 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45418">CVE-2022-45418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45420" ref_url="https://www.suse.com/security/cve/CVE-2022-45420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45420/">CVE-2022-45420 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45420">CVE-2022-45420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45421" ref_url="https://www.suse.com/security/cve/CVE-2022-45421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/012993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-November/013128.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.5, Thunderbird &lt; 102.5, and Firefox &lt; 107.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-45421/">CVE-2022-45421 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45421">CVE-2022-45421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205270">SUSE bug 1205270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206343">SUSE bug 1206343</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805097" comment="firefox-102.5.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805096" comment="thunderbird-102.5.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45442</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45442" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45442" ref_url="https://www.suse.com/security/cve/CVE-2022-45442" source="SUSE CVE"/>
    <description>
    Sinatra is a domain-specific language for creating web applications in Ruby. An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. Version 2.2.3 and 3.0.4 contain patches for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-45442/">CVE-2022-45442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45442">CVE-2022-45442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205845">SUSE bug 1205845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805410" comment="pcs-0.11.3-4.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805411" comment="pcs-snmp-0.11.3-4.el9_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45869" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45869" ref_url="https://www.suse.com/security/cve/CVE-2022-45869" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
    <description>
    A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45869/">CVE-2022-45869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45869">CVE-2022-45869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205882">SUSE bug 1205882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806723" comment="bpftool-7.0.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806724" comment="kernel-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806725" comment="kernel-abi-stablelists-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806726" comment="kernel-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806727" comment="kernel-cross-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806728" comment="kernel-debug-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806729" comment="kernel-debug-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806732" comment="kernel-debug-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806733" comment="kernel-debug-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806734" comment="kernel-debug-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806735" comment="kernel-debug-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806738" comment="kernel-doc-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806739" comment="kernel-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806740" comment="kernel-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806741" comment="kernel-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806742" comment="kernel-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806743" comment="kernel-tools-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806744" comment="kernel-tools-libs-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806746" comment="kernel-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806747" comment="perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806748" comment="python3-perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806749" comment="rtla-5.14.0-284.25.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45873" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45873" ref_url="https://www.suse.com/security/cve/CVE-2022-45873" source="SUSE CVE"/>
    <description>
    systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-45873/">CVE-2022-45873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45873">CVE-2022-45873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205713">SUSE bug 1205713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805355" comment="systemd-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805356" comment="systemd-container-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805357" comment="systemd-devel-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805358" comment="systemd-journal-remote-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805359" comment="systemd-libs-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805360" comment="systemd-oomd-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805361" comment="systemd-pam-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805362" comment="systemd-resolved-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805363" comment="systemd-rpm-macros-250-12.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805364" comment="systemd-udev-250-12.el9_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45934" ref_url="https://www.suse.com/security/cve/CVE-2022-45934" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-45934/">CVE-2022-45934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45934">CVE-2022-45934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205796">SUSE bug 1205796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212292">SUSE bug 1212292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202245939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-45939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-45939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45939" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-45939" ref_url="https://www.suse.com/security/cve/CVE-2022-45939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MU2KN46JJ6TL6CR5QN3O4AZXDYE35Z7A/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013190.html" source="SUSE-SU"/>
    <description>
    GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-45939/">CVE-2022-45939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-45939">CVE-2022-45939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205822">SUSE bug 1205822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208026">SUSE bug 1208026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208348">SUSE bug 1208348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805818" comment="emacs-27.2-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805819" comment="emacs-common-27.2-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805820" comment="emacs-filesystem-27.2-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805821" comment="emacs-lucid-27.2-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805822" comment="emacs-nox-27.2-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46285" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46285" ref_url="https://www.suse.com/security/cve/CVE-2022-46285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013549.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected, leading to an infinite loop and resulting in a Denial of Service in the application linked to the library.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46285/">CVE-2022-46285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46285">CVE-2022-46285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207029">SUSE bug 1207029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214751">SUSE bug 1214751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215686">SUSE bug 1215686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805274" comment="libXpm-3.5.13-8.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805275" comment="libXpm-devel-3.5.13-8.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46329</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46329" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46329" ref_url="https://www.suse.com/security/cve/CVE-2022-46329" source="SUSE CVE"/>
    <description>
    Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46329/">CVE-2022-46329 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46329">CVE-2022-46329 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811138" comment="iwl100-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811139" comment="iwl1000-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811140" comment="iwl105-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811141" comment="iwl135-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811142" comment="iwl2000-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811143" comment="iwl2030-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811144" comment="iwl3160-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811145" comment="iwl5000-firmware-8.83.5.1_1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811146" comment="iwl5150-firmware-8.24.2.2-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811147" comment="iwl6000g2a-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811148" comment="iwl6000g2b-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811149" comment="iwl6050-firmware-41.28.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811150" comment="iwl7260-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811151" comment="libertas-sd8787-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811152" comment="linux-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811153" comment="linux-firmware-whence-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811154" comment="netronome-firmware-20230814-140.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46340</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46340" ref_url="https://www.suse.com/security/cve/CVE-2022-46340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014039.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs becuase the swap handler for the XTestFakeInput request of the XTest extension may corrupt the stack if GenericEvents with lengths larger than 32 bytes are sent through a the XTestFakeInput request. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where client and server use the same byte order.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46340/">CVE-2022-46340 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46340">CVE-2022-46340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205874">SUSE bug 1205874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206822">SUSE bug 1206822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208344">SUSE bug 1208344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208653">SUSE bug 1208653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805739" comment="tigervnc-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805740" comment="tigervnc-icons-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805741" comment="tigervnc-license-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805742" comment="tigervnc-selinux-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805743" comment="tigervnc-server-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805744" comment="tigervnc-server-minimal-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805745" comment="tigervnc-server-module-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46341" ref_url="https://www.suse.com/security/cve/CVE-2022-46341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46341/">CVE-2022-46341 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46341">CVE-2022-46341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205877">SUSE bug 1205877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208653">SUSE bug 1208653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805739" comment="tigervnc-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805740" comment="tigervnc-icons-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805741" comment="tigervnc-license-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805742" comment="tigervnc-selinux-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805743" comment="tigervnc-server-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805744" comment="tigervnc-server-minimal-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805745" comment="tigervnc-server-module-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46342</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46342" ref_url="https://www.suse.com/security/cve/CVE-2022-46342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X se
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-46342/">CVE-2022-46342 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46342">CVE-2022-46342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205879">SUSE bug 1205879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805739" comment="tigervnc-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805740" comment="tigervnc-icons-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805741" comment="tigervnc-license-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805742" comment="tigervnc-selinux-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805743" comment="tigervnc-server-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805744" comment="tigervnc-server-minimal-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805745" comment="tigervnc-server-module-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46343</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46343" ref_url="https://www.suse.com/security/cve/CVE-2022-46343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-46343/">CVE-2022-46343 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46343">CVE-2022-46343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205878">SUSE bug 1205878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805739" comment="tigervnc-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805740" comment="tigervnc-icons-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805741" comment="tigervnc-license-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805742" comment="tigervnc-selinux-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805743" comment="tigervnc-server-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805744" comment="tigervnc-server-minimal-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805745" comment="tigervnc-server-module-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46344</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46344" ref_url="https://www.suse.com/security/cve/CVE-2022-46344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-December/026895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013241.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This security flaw occurs because the handler for the XIChangeProperty request has a length-validation issues, resulting in out-of-bounds memory reads and potential information disclosure. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46344/">CVE-2022-46344 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46344">CVE-2022-46344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1205876">SUSE bug 1205876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217766">SUSE bug 1217766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805739" comment="tigervnc-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805740" comment="tigervnc-icons-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805741" comment="tigervnc-license-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805742" comment="tigervnc-selinux-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805743" comment="tigervnc-server-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805744" comment="tigervnc-server-minimal-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805745" comment="tigervnc-server-module-1.12.0-13.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4645" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4645" ref_url="https://www.suse.com/security/cve/CVE-2022-4645" source="SUSE CVE"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcp in tools/tiffcp.c:948, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-03-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4645/">CVE-2022-4645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4645">CVE-2022-4645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208956">SUSE bug 1208956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4662" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4662" ref_url="https://www.suse.com/security/cve/CVE-2022-4662" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4662/">CVE-2022-4662 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4662">CVE-2022-4662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206664">SUSE bug 1206664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46663" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46663" ref_url="https://www.suse.com/security/cve/CVE-2022-46663" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013722.html" source="SUSE-SU"/>
    <description>
    In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-46663/">CVE-2022-46663 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46663">CVE-2022-46663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207815">SUSE bug 1207815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806544" comment="less-590-2.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46691" ref_url="https://www.suse.com/security/cve/CVE-2022-46691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    A memory consumption issue was addressed with improved memory handling. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46691/">CVE-2022-46691 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46691">CVE-2022-46691 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46692" ref_url="https://www.suse.com/security/cve/CVE-2022-46692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, iOS 15.7.2 and iPadOS 15.7.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may bypass Same Origin Policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-46692/">CVE-2022-46692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46692">CVE-2022-46692 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46698" ref_url="https://www.suse.com/security/cve/CVE-2022-46698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved checks. This issue is fixed in Safari 16.2, tvOS 16.2, iCloud for Windows 14.1, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may disclose sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-46698/">CVE-2022-46698 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46698">CVE-2022-46698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46699" ref_url="https://www.suse.com/security/cve/CVE-2022-46699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46699/">CVE-2022-46699 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46699">CVE-2022-46699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46700" ref_url="https://www.suse.com/security/cve/CVE-2022-46700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved input validation. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46700/">CVE-2022-46700 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46700">CVE-2022-46700 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46705" ref_url="https://www.suse.com/security/cve/CVE-2022-46705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017406.html" source="SUSE-SU"/>
    <description>
    A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, Safari 16.2. Visiting a malicious website may lead to address bar spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46705/">CVE-2022-46705 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46705">CVE-2022-46705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46725" ref_url="https://www.suse.com/security/cve/CVE-2022-46725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017406.html" source="SUSE-SU"/>
    <description>
    A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 16.4 and iPadOS 16.4. Visiting a malicious website may lead to address bar spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-46725/">CVE-2022-46725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46725">CVE-2022-46725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46871" ref_url="https://www.suse.com/security/cve/CVE-2022-46871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox &lt; 108.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-46871/">CVE-2022-46871 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46871">CVE-2022-46871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46872</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46872" ref_url="https://www.suse.com/security/cve/CVE-2022-46872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.&lt;br&gt;*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 108, Firefox ESR &lt; 102.6, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46872/">CVE-2022-46872 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46872">CVE-2022-46872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805116" comment="firefox-102.6.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805117" comment="thunderbird-102.6.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46874</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46874" ref_url="https://www.suse.com/security/cve/CVE-2022-46874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013380.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.&lt;br/&gt;*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox &lt; 108, Thunderbird &lt; 102.6.1, Thunderbird &lt; 102.6, and Firefox ESR &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-01"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46874/">CVE-2022-46874 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46874">CVE-2022-46874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1206653">SUSE bug 1206653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805116" comment="firefox-102.6.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805117" comment="thunderbird-102.6.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46877" ref_url="https://www.suse.com/security/cve/CVE-2022-46877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox &lt; 108.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46877/">CVE-2022-46877 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46877">CVE-2022-46877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46878" ref_url="https://www.suse.com/security/cve/CVE-2022-46878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 108, Firefox ESR &lt; 102.6, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46878/">CVE-2022-46878 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46878">CVE-2022-46878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805116" comment="firefox-102.6.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805117" comment="thunderbird-102.6.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46880" ref_url="https://www.suse.com/security/cve/CVE-2022-46880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
    <description>
    A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.&lt;br /&gt;*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR &lt; 102.6, Firefox &lt; 105, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46880/">CVE-2022-46880 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46880">CVE-2022-46880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805116" comment="firefox-102.6.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805117" comment="thunderbird-102.6.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46881" ref_url="https://www.suse.com/security/cve/CVE-2022-46881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
    <description>
    An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash.
*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox &lt; 106, Firefox ESR &lt; 102.6, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46881/">CVE-2022-46881 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46881">CVE-2022-46881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805116" comment="firefox-102.6.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805117" comment="thunderbird-102.6.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202246882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-46882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-46882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-46882" ref_url="https://www.suse.com/security/cve/CVE-2022-46882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2022:4460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2022:4579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-December/013290.html" source="SUSE-SU"/>
    <description>
    A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 107, Firefox ESR &lt; 102.6, and Thunderbird &lt; 102.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-02"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-46882/">CVE-2022-46882 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-46882">CVE-2022-46882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206242">SUSE bug 1206242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805116" comment="firefox-102.6.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805117" comment="thunderbird-102.6.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47015" ref_url="https://www.suse.com/security/cve/CVE-2022-47015" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2023:3956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2478-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016257.html" source="SUSE-SU"/>
    <description>
    MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function spider_db_mbase::print_warnings to dereference a null pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47015/">CVE-2022-47015 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47015">CVE-2022-47015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207404">SUSE bug 1207404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47024" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47024" ref_url="https://www.suse.com/security/cve/CVE-2022-47024" source="SUSE CVE"/>
    <description>
    A null pointer dereference issue was discovered in function gui_x11_create_blank_mouse in gui_x11.c in vim 8.1.2269 thru 9.0.0339 allows attackers to cause denial of service or other unspecified impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-47024/">CVE-2022-47024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47024">CVE-2022-47024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207397">SUSE bug 1207397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805368" comment="vim-X11-8.2.2637-20.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805369" comment="vim-common-8.2.2637-20.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805370" comment="vim-enhanced-8.2.2637-20.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805371" comment="vim-filesystem-8.2.2637-20.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805372" comment="vim-minimal-8.2.2637-20.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4744" ref_url="https://www.suse.com/security/cve/CVE-2022-4744" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    A double-free flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user registers the device when the register_netdevice function fails (NETDEV_REGISTER notifier). This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4744/">CVE-2022-4744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4744">CVE-2022-4744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209635">SUSE bug 1209635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209672">SUSE bug 1209672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805438" comment="bpftool-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805439" comment="kernel-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805440" comment="kernel-abi-stablelists-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805441" comment="kernel-core-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805442" comment="kernel-cross-headers-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805443" comment="kernel-debug-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805444" comment="kernel-debug-core-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805447" comment="kernel-debug-modules-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805448" comment="kernel-debug-modules-extra-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805451" comment="kernel-doc-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805452" comment="kernel-headers-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805453" comment="kernel-modules-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805454" comment="kernel-modules-extra-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805455" comment="kernel-tools-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805456" comment="kernel-tools-libs-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805458" comment="perf-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805459" comment="python3-perf-5.14.0-162.22.2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47629" ref_url="https://www.suse.com/security/cve/CVE-2022-47629" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:91-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:92-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:93-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:94-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:96-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:97-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:98-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:5-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:8-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:9-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0031-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0056-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013779.html" source="SUSE-SU"/>
    <description>
    Libksba before 1.6.3 is prone to an integer overflow vulnerability in the CRL signature parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-47629/">CVE-2022-47629 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47629">CVE-2022-47629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206579">SUSE bug 1206579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805300" comment="libksba-1.5.1-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805301" comment="libksba-devel-1.5.1-6.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202247929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-47929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-47929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47929" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-47929" ref_url="https://www.suse.com/security/cve/CVE-2022-47929" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.1.6, a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-47929/">CVE-2022-47929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-47929">CVE-2022-47929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207237">SUSE bug 1207237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48281" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48281" ref_url="https://www.suse.com/security/cve/CVE-2022-48281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013719.html" source="SUSE-SU"/>
    <description>
    processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g., "WRITE of size 307203") via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48281/">CVE-2022-48281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48281">CVE-2022-48281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207413">SUSE bug 1207413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208655">SUSE bug 1208655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209328">SUSE bug 1209328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209937">SUSE bug 1209937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48303</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48303" ref_url="https://www.suse.com/security/cve/CVE-2022-48303" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:676-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013845.html" source="SUSE-SU"/>
    <description>
    GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs in from_header in list.c via a V7 archive in which mtime has approximately 11 whitespace characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-48303/">CVE-2022-48303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48303">CVE-2022-48303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207753">SUSE bug 1207753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805373" comment="tar-1.34-6.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48337" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48337" ref_url="https://www.suse.com/security/cve/CVE-2022-48337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013997.html" source="SUSE-SU"/>
    <description>
    GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48337/">CVE-2022-48337 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48337">CVE-2022-48337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208515">SUSE bug 1208515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211499">SUSE bug 1211499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211512">SUSE bug 1211512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213840">SUSE bug 1213840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805965" comment="emacs-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805966" comment="emacs-common-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805967" comment="emacs-filesystem-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805968" comment="emacs-lucid-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805969" comment="emacs-nox-27.2-8.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48338</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48338" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48338" ref_url="https://www.suse.com/security/cve/CVE-2022-48338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013956.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48338/">CVE-2022-48338 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48338">CVE-2022-48338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208514">SUSE bug 1208514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805965" comment="emacs-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805966" comment="emacs-common-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805967" comment="emacs-filesystem-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805968" comment="emacs-lucid-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805969" comment="emacs-nox-27.2-8.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48339</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48339" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48339" ref_url="https://www.suse.com/security/cve/CVE-2022-48339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013997.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48339/">CVE-2022-48339 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48339">CVE-2022-48339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208512">SUSE bug 1208512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211512">SUSE bug 1211512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805965" comment="emacs-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805966" comment="emacs-common-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805967" comment="emacs-filesystem-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805968" comment="emacs-lucid-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805969" comment="emacs-nox-27.2-8.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48468</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48468" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48468" ref_url="https://www.suse.com/security/cve/CVE-2022-48468" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029304.html" source="SUSE-SU"/>
    <description>
    protobuf-c before 1.4.1 has an unsigned integer overflow in parse_required_member.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48468/">CVE-2022-48468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48468">CVE-2022-48468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210323">SUSE bug 1210323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811164" comment="protobuf-c-1.3.3-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811165" comment="protobuf-c-compiler-1.3.3-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811166" comment="protobuf-c-devel-1.3.3-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48503" ref_url="https://www.suse.com/security/cve/CVE-2022-48503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48503/">CVE-2022-48503 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48503">CVE-2022-48503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212863">SUSE bug 1212863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48554</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48554" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48554" ref_url="https://www.suse.com/security/cve/CVE-2022-48554" source="SUSE CVE"/>
    <description>
    File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-48554/">CVE-2022-48554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48554">CVE-2022-48554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214507">SUSE bug 1214507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866748" comment="file-5.39-16.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866749" comment="file-devel-5.39-16.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866750" comment="file-libs-5.39-16.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866751" comment="python3-file-magic-5.39-16.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48622" ref_url="https://www.suse.com/security/cve/CVE-2022-48622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2077-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021112.html" source="SUSE-SU"/>
    <description>
    In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48622/">CVE-2022-48622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48622">CVE-2022-48622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219276">SUSE bug 1219276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220293">SUSE bug 1220293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009871322" comment="gdk-pixbuf2-2.42.6-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871323" comment="gdk-pixbuf2-devel-2.42.6-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871324" comment="gdk-pixbuf2-modules-2.42.6-4.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48624" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48624" ref_url="https://www.suse.com/security/cve/CVE-2022-48624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034922.html" source="SUSE-SU"/>
    <description>
    close_altfile in filename.c in less before 606 omits shell_quote calls for LESSCLOSE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48624/">CVE-2022-48624 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48624">CVE-2022-48624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219901">SUSE bug 1219901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223303">SUSE bug 1223303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224875">SUSE bug 1224875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853728" comment="less-590-3.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48627</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48627" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48627" ref_url="https://www.suse.com/security/cve/CVE-2022-48627" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt: fix memory overlapping when deleting chars in the buffer

A memory overlapping copy occurs when deleting a long line. This memory
overlapping copy can cause data corruption when scr_memcpyw is optimized
to memcpy because memcpy does not ensure its behavior if the destination
buffer overlaps with the source buffer. The line buffer is not always
broken, because the memcpy utilizes the hardware acceleration, whose
result is not deterministic.

Fix this problem by using replacing the scr_memcpyw with scr_memmovew.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-48627/">CVE-2022-48627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48627">CVE-2022-48627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220845">SUSE bug 1220845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48632" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48632" ref_url="https://www.suse.com/security/cve/CVE-2022-48632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()

memcpy() is called in a loop while 'operation-&gt;length' upper bound
is not checked and 'data_idx' also increments.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48632/">CVE-2022-48632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48632">CVE-2022-48632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223481">SUSE bug 1223481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48695" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48695" ref_url="https://www.suse.com/security/cve/CVE-2022-48695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix use-after-free warning

Fix the following use-after-free warning which is observed during
controller reset:

refcount_t: underflow; use-after-free.
WARNING: CPU: 23 PID: 5399 at lib/refcount.c:28 refcount_warn_saturate+0xa6/0xf0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48695/">CVE-2022-48695 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48695">CVE-2022-48695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223941">SUSE bug 1223941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48696" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48696" ref_url="https://www.suse.com/security/cve/CVE-2022-48696" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: spi: Reserve space for register address/padding

Currently the max_raw_read and max_raw_write limits in regmap_spi struct
do not take into account the additional size of the transmitted register
address and padding.  This may result in exceeding the maximum permitted
SPI message size, which could cause undefined behaviour, e.g. data
corruption.

Fix regmap_get_spi_bus() to properly adjust the above mentioned limits
by reserving space for the register address/padding as set in the regmap
configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48696/">CVE-2022-48696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-48696">CVE-2022-48696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223920">SUSE bug 1223920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48701</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48701" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48701" ref_url="https://www.suse.com/security/cve/CVE-2022-48701" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix an out-of-bounds bug in __snd_usb_parse_audio_interface()

There may be a bad USB audio device with a USB ID of (0x04fa, 0x4201) and
the number of it's interfaces less than 4, an out-of-bounds read bug occurs
when parsing the interface descriptor for this device.

Fix this by checking the number of interfaces.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48701/">CVE-2022-48701 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48701">CVE-2022-48701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223921">SUSE bug 1223921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48735" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48735" ref_url="https://www.suse.com/security/cve/CVE-2022-48735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix UAF of leds class devs at unbinding

The LED class devices that are created by HD-audio codec drivers are
registered via devm_led_classdev_register() and associated with the
HD-audio codec device.  Unfortunately, it turned out that the devres
release doesn't work for this case; namely, since the codec resource
release happens before the devm call chain, it triggers a NULL
dereference or a UAF for a stale set_brightness_delay callback.

For fixing the bug, this patch changes the LED class device register
and unregister in a manual manner without devres, keeping the
instances in hda_gen_spec.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48735/">CVE-2022-48735 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48735">CVE-2022-48735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226719">SUSE bug 1226719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227438">SUSE bug 1227438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48738" ref_url="https://www.suse.com/security/cve/CVE-2022-48738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()

We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48738/">CVE-2022-48738 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48738">CVE-2022-48738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226674">SUSE bug 1226674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48743" ref_url="https://www.suse.com/security/cve/CVE-2022-48743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: amd-xgbe: Fix skb data length underflow

There will be BUG_ON() triggered in include/linux/skbuff.h leading to
intermittent kernel panic, when the skb length underflow is detected.

Fix this by dropping the packet if such length underflows are seen
because of inconsistencies in the hardware descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48743/">CVE-2022-48743 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48743">CVE-2022-48743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226705">SUSE bug 1226705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48765</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48765" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48765" ref_url="https://www.suse.com/security/cve/CVE-2022-48765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: LAPIC: Also cancel preemption timer during SET_LAPIC

The below warning is splatting during guest reboot.

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 1931 at arch/x86/kvm/x86.c:10322 kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm]
  CPU: 0 PID: 1931 Comm: qemu-system-x86 Tainted: G          I       5.17.0-rc1+ #5
  RIP: 0010:kvm_arch_vcpu_ioctl_run+0x874/0x880 [kvm]
  Call Trace:
   &lt;TASK&gt;
   kvm_vcpu_ioctl+0x279/0x710 [kvm]
   __x64_sys_ioctl+0x83/0xb0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  RIP: 0033:0x7fd39797350b

This can be triggered by not exposing tsc-deadline mode and doing a reboot in
the guest. The lapic_shutdown() function which is called in sys_reboot path
will not disarm the flying timer, it just masks LVTT. lapic_shutdown() clears
APIC state w/ LVT_MASKED and timer-mode bit is 0, this can trigger timer-mode
switch between tsc-deadline and oneshot/periodic, which can result in preemption
timer be cancelled in apic_update_lvtt(). However, We can't depend on this when
not exposing tsc-deadline mode and oneshot/periodic modes emulated by preemption
timer. Qemu will synchronise states around reset, let's cancel preemption timer
under KVM_SET_LAPIC.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48765/">CVE-2022-48765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48765">CVE-2022-48765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226697">SUSE bug 1226697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48786" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48786" ref_url="https://www.suse.com/security/cve/CVE-2022-48786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: remove vsock from connected table when connect is interrupted by a signal

vsock_connect() expects that the socket could already be in the
TCP_ESTABLISHED state when the connecting task wakes up with a signal
pending. If this happens the socket will be in the connected table, and
it is not removed when the socket state is reset. In this situation it's
common for the process to retry connect(), and if the connection is
successful the socket will be added to the connected table a second
time, corrupting the list.

Prevent this by calling vsock_remove_connected() if a signal is received
while waiting for a connection. This is harmless if the socket is not in
the connected table, and if it is in the table then removing it will
prevent list corruption from a double add.

Note for backporting: this patch requires d5afa82c977e ("vsock: correct
removal of socket from the list"), which is in all current stable trees
except 4.9.y.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-48786/">CVE-2022-48786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48786">CVE-2022-48786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227996">SUSE bug 1227996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4883" ref_url="https://www.suse.com/security/cve/CVE-2022-4883" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013549.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libXpm. When processing files with .Z or .gz extensions, the library calls external programs to compress and uncompress files, relying on the PATH environment variable to find these programs, which could allow a malicious user to execute other programs by manipulating the PATH environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-4883/">CVE-2022-4883 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4883">CVE-2022-4883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207031">SUSE bug 1207031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208055">SUSE bug 1208055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208351">SUSE bug 1208351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208654">SUSE bug 1208654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209322">SUSE bug 1209322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209940">SUSE bug 1209940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805274" comment="libXpm-3.5.13-8.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805275" comment="libXpm-devel-3.5.13-8.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48830" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48830" ref_url="https://www.suse.com/security/cve/CVE-2022-48830" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: isotp: fix potential CAN frame reception race in isotp_rcv()

When receiving a CAN frame the current code logic does not consider
concurrently receiving processes which do not show up in real world
usage.

Ziyang Xuan writes:

The following syz problem is one of the scenarios. so-&gt;rx.len is
changed by isotp_rcv_ff() during isotp_rcv_cf(), so-&gt;rx.len equals
0 before alloc_skb() and equals 4096 after alloc_skb(). That will
trigger skb_over_panic() in skb_put().

=======================================================
CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 5.16.0-rc8-syzkaller #0
RIP: 0010:skb_panic+0x16c/0x16e net/core/skbuff.c:113
Call Trace:
 &lt;TASK&gt;
 skb_over_panic net/core/skbuff.c:118 [inline]
 skb_put.cold+0x24/0x24 net/core/skbuff.c:1990
 isotp_rcv_cf net/can/isotp.c:570 [inline]
 isotp_rcv+0xa38/0x1e30 net/can/isotp.c:668
 deliver net/can/af_can.c:574 [inline]
 can_rcv_filter+0x445/0x8d0 net/can/af_can.c:635
 can_receive+0x31d/0x580 net/can/af_can.c:665
 can_rcv+0x120/0x1c0 net/can/af_can.c:696
 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5465
 __netif_receive_skb+0x24/0x1b0 net/core/dev.c:5579

Therefore we make sure the state changes and data structures stay
consistent at CAN frame reception time by adding a spin_lock in
isotp_rcv(). This fixes the issue reported by syzkaller but does not
affect real world operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48830/">CVE-2022-48830 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48830">CVE-2022-48830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227982">SUSE bug 1227982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48866" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48866" ref_url="https://www.suse.com/security/cve/CVE-2022-48866" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts

Syzbot reported an slab-out-of-bounds Read in thrustmaster_probe() bug.
The root case is in missing validation check of actual number of endpoints.

Code should not blindly access usb_host_interface::endpoint array, since
it may contain less endpoints than code expects.

Fix it by adding missing validaion check and print an error if
number of endpoints do not match expected number
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48866/">CVE-2022-48866 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48866">CVE-2022-48866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228014">SUSE bug 1228014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228785">SUSE bug 1228785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48883" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48883" ref_url="https://www.suse.com/security/cve/CVE-2022-48883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: IPoIB, Block PKEY interfaces with less rx queues than parent

A user is able to configure an arbitrary number of rx queues when
creating an interface via netlink. This doesn't work for child PKEY
interfaces because the child interface uses the parent receive channels.

Although the child shares the parent's receive channels, the number of
rx queues is important for the channel_stats array: the parent's rx
channel index is used to access the child's channel_stats. So the array
has to be at least as large as the parent's rx queue size for the
counting to work correctly and to prevent out of bound accesses.

This patch checks for the mentioned scenario and returns an error when
trying to create the interface. The error is propagated to the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48883/">CVE-2022-48883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48883">CVE-2022-48883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229560">SUSE bug 1229560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229561">SUSE bug 1229561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48884" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48884" ref_url="https://www.suse.com/security/cve/CVE-2022-48884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix command stats access after free

Command may fail while driver is reloading and can't accept FW commands
till command interface is reinitialized. Such command failure is being
logged to command stats. This results in NULL pointer access as command
stats structure is being freed and reallocated during mlx5 devlink
reload (see kernel log below).

Fix it by making command stats statically allocated on driver probe.

Kernel log:
[ 2394.808802] BUG: unable to handle kernel paging request at 000000000002a9c0
[ 2394.810610] PGD 0 P4D 0
[ 2394.811811] Oops: 0002 [#1] SMP NOPTI
...
[ 2394.815482] RIP: 0010:native_queued_spin_lock_slowpath+0x183/0x1d0
...
[ 2394.829505] Call Trace:
[ 2394.830667]  _raw_spin_lock_irq+0x23/0x26
[ 2394.831858]  cmd_status_err+0x55/0x110 [mlx5_core]
[ 2394.833020]  mlx5_access_reg+0xe7/0x150 [mlx5_core]
[ 2394.834175]  mlx5_query_port_ptys+0x78/0xa0 [mlx5_core]
[ 2394.835337]  mlx5e_ethtool_get_link_ksettings+0x74/0x590 [mlx5_core]
[ 2394.836454]  ? kmem_cache_alloc_trace+0x140/0x1c0
[ 2394.837562]  __rh_call_get_link_ksettings+0x33/0x100
[ 2394.838663]  ? __rtnl_unlock+0x25/0x50
[ 2394.839755]  __ethtool_get_link_ksettings+0x72/0x150
[ 2394.840862]  duplex_show+0x6e/0xc0
[ 2394.841963]  dev_attr_show+0x1c/0x40
[ 2394.843048]  sysfs_kf_seq_show+0x9b/0x100
[ 2394.844123]  seq_read+0x153/0x410
[ 2394.845187]  vfs_read+0x91/0x140
[ 2394.846226]  ksys_read+0x4f/0xb0
[ 2394.847234]  do_syscall_64+0x5b/0x1a0
[ 2394.848228]  entry_SYSCALL_64_after_hwframe+0x65/0xca
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48884/">CVE-2022-48884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48884">CVE-2022-48884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229562">SUSE bug 1229562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229563">SUSE bug 1229563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48885" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48885" ref_url="https://www.suse.com/security/cve/CVE-2022-48885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix potential memory leak in ice_gnss_tty_write()

The ice_gnss_tty_write() return directly if the write_buf alloc failed,
leaking the cmd_buf.

Fix by free cmd_buf if write_buf alloc failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48885/">CVE-2022-48885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48885">CVE-2022-48885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229564">SUSE bug 1229564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48905" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48905" ref_url="https://www.suse.com/security/cve/CVE-2022-48905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: free reset-work-item when flushing

Fix a tiny memory leak when flushing the reset work queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-48905/">CVE-2022-48905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48905">CVE-2022-48905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229604">SUSE bug 1229604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48912</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48912" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48912" ref_url="https://www.suse.com/security/cve/CVE-2022-48912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020328.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: fix use-after-free in __nf_register_net_hook()

We must not dereference @new_hooks after nf_hook_mutex has been released,
because other threads might have freed our allocated hooks already.

BUG: KASAN: use-after-free in nf_hook_entries_get_hook_ops include/linux/netfilter.h:130 [inline]
BUG: KASAN: use-after-free in hooks_validate net/netfilter/core.c:171 [inline]
BUG: KASAN: use-after-free in __nf_register_net_hook+0x77a/0x820 net/netfilter/core.c:438
Read of size 2 at addr ffff88801c1a8000 by task syz-executor237/4430

CPU: 1 PID: 4430 Comm: syz-executor237 Not tainted 5.17.0-rc5-syzkaller-00306-g2293be58d6a1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description.constprop.0.cold+0x8d/0x336 mm/kasan/report.c:255
 __kasan_report mm/kasan/report.c:442 [inline]
 kasan_report.cold+0x83/0xdf mm/kasan/report.c:459
 nf_hook_entries_get_hook_ops include/linux/netfilter.h:130 [inline]
 hooks_validate net/netfilter/core.c:171 [inline]
 __nf_register_net_hook+0x77a/0x820 net/netfilter/core.c:438
 nf_register_net_hook+0x114/0x170 net/netfilter/core.c:571
 nf_register_net_hooks+0x59/0xc0 net/netfilter/core.c:587
 nf_synproxy_ipv6_init+0x85/0xe0 net/netfilter/nf_synproxy_core.c:1218
 synproxy_tg6_check+0x30d/0x560 net/ipv6/netfilter/ip6t_SYNPROXY.c:81
 xt_check_target+0x26c/0x9e0 net/netfilter/x_tables.c:1038
 check_target net/ipv6/netfilter/ip6_tables.c:530 [inline]
 find_check_entry.constprop.0+0x7f1/0x9e0 net/ipv6/netfilter/ip6_tables.c:573
 translate_table+0xc8b/0x1750 net/ipv6/netfilter/ip6_tables.c:735
 do_replace net/ipv6/netfilter/ip6_tables.c:1153 [inline]
 do_ip6t_set_ctl+0x56e/0xb90 net/ipv6/netfilter/ip6_tables.c:1639
 nf_setsockopt+0x83/0xe0 net/netfilter/nf_sockopt.c:101
 ipv6_setsockopt+0x122/0x180 net/ipv6/ipv6_sockglue.c:1024
 rawv6_setsockopt+0xd3/0x6a0 net/ipv6/raw.c:1084
 __sys_setsockopt+0x2db/0x610 net/socket.c:2180
 __do_sys_setsockopt net/socket.c:2191 [inline]
 __se_sys_setsockopt net/socket.c:2188 [inline]
 __x64_sys_setsockopt+0xba/0x150 net/socket.c:2188
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f65a1ace7d9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 71 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f65a1a7f308 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f65a1ace7d9
RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003
RBP: 00007f65a1b574c8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000000 R11: 0000000000000246 R12: 00007f65a1b55130
R13: 00007f65a1b574c0 R14: 00007f65a1b24090 R15: 0000000000022000
 &lt;/TASK&gt;

The buggy address belongs to the page:
page:ffffea0000706a00 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1c1a8
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 ffffea0001c1b108 ffffea000046dd08 0000000000000000
raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 2, migratetype Unmovable, gfp_mask 0x52dc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_ZERO), pid 4430, ts 1061781545818, free_ts 1061791488993
 prep_new_page mm/page_alloc.c:2434 [inline]
 get_page_from_freelist+0xa72/0x2f50 mm/page_alloc.c:4165
 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5389
 __alloc_pages_node include/linux/gfp.h:572 [inline]
 alloc_pages_node include/linux/gfp.h:595 [inline]
 kmalloc_large_node+0x62/0x130 mm/slub.c:4438
 __kmalloc_node+0x35a/0x4a0 mm/slub.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-48912/">CVE-2022-48912 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48912">CVE-2022-48912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229641">SUSE bug 1229641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229644">SUSE bug 1229644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48915</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48915" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48915" ref_url="https://www.suse.com/security/cve/CVE-2022-48915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Fix TZ_GET_TRIP NULL pointer dereference

Do not call get_trip_hyst() from thermal_genl_cmd_tz_get_trip() if
the thermal zone does not define one.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48915/">CVE-2022-48915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48915">CVE-2022-48915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229639">SUSE bug 1229639</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48918" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48918" ref_url="https://www.suse.com/security/cve/CVE-2022-48918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: mvm: check debugfs_dir ptr before use

When "debugfs=off" is used on the kernel command line, iwiwifi's
mvm module uses an invalid/unchecked debugfs_dir pointer and causes
a BUG:

 BUG: kernel NULL pointer dereference, address: 000000000000004f
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP
 CPU: 1 PID: 503 Comm: modprobe Tainted: G        W         5.17.0-rc5 #7
 Hardware name: Dell Inc. Inspiron 15 5510/076F7Y, BIOS 2.4.1 11/05/2021
 RIP: 0010:iwl_mvm_dbgfs_register+0x692/0x700 [iwlmvm]
 Code: 69 a0 be 80 01 00 00 48 c7 c7 50 73 6a a0 e8 95 cf ee e0 48 8b 83 b0 1e 00 00 48 c7 c2 54 73 6a a0 be 64 00 00 00 48 8d 7d 8c &lt;48&gt; 8b 48 50 e8 15 22 07 e1 48 8b 43 28 48 8d 55 8c 48 c7 c7 5f 73
 RSP: 0018:ffffc90000a0ba68 EFLAGS: 00010246
 RAX: ffffffffffffffff RBX: ffff88817d6e3328 RCX: ffff88817d6e3328
 RDX: ffffffffa06a7354 RSI: 0000000000000064 RDI: ffffc90000a0ba6c
 RBP: ffffc90000a0bae0 R08: ffffffff824e4880 R09: ffffffffa069d620
 R10: ffffc90000a0ba00 R11: ffffffffffffffff R12: 0000000000000000
 R13: ffffc90000a0bb28 R14: ffff88817d6e3328 R15: ffff88817d6e3320
 FS:  00007f64dd92d740(0000) GS:ffff88847f640000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000000000000004f CR3: 000000016fc79001 CR4: 0000000000770ee0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ? iwl_mvm_mac_setup_register+0xbdc/0xda0 [iwlmvm]
  iwl_mvm_start_post_nvm+0x71/0x100 [iwlmvm]
  iwl_op_mode_mvm_start+0xab8/0xb30 [iwlmvm]
  _iwl_op_mode_start+0x6f/0xd0 [iwlwifi]
  iwl_opmode_register+0x6a/0xe0 [iwlwifi]
  ? 0xffffffffa0231000
  iwl_mvm_init+0x35/0x1000 [iwlmvm]
  ? 0xffffffffa0231000
  do_one_initcall+0x5a/0x1b0
  ? kmem_cache_alloc+0x1e5/0x2f0
  ? do_init_module+0x1e/0x220
  do_init_module+0x48/0x220
  load_module+0x2602/0x2bc0
  ? __kernel_read+0x145/0x2e0
  ? kernel_read_file+0x229/0x290
  __do_sys_finit_module+0xc5/0x130
  ? __do_sys_finit_module+0xc5/0x130
  __x64_sys_finit_module+0x13/0x20
  do_syscall_64+0x38/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f64dda564dd
 Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 1b 29 0f 00 f7 d8 64 89 01 48
 RSP: 002b:00007ffdba393f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f64dda564dd
 RDX: 0000000000000000 RSI: 00005575399e2ab2 RDI: 0000000000000001
 RBP: 000055753a91c5e0 R08: 0000000000000000 R09: 0000000000000002
 R10: 0000000000000001 R11: 0000000000000246 R12: 00005575399e2ab2
 R13: 000055753a91ceb0 R14: 0000000000000000 R15: 000055753a923018
  &lt;/TASK&gt;
 Modules linked in: btintel(+) btmtk bluetooth vfat snd_hda_codec_hdmi fat snd_hda_codec_realtek snd_hda_codec_generic iwlmvm(+) snd_sof_pci_intel_tgl mac80211 snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cadence soundwire_bus snd_sof_intel_hda snd_sof_pci snd_sof snd_sof_xtensa_dsp snd_soc_hdac_hda snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core btrfs snd_compress snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec raid6_pq iwlwifi snd_hda_core snd_pcm snd_timer snd soundcore cfg80211 intel_ish_ipc(+) thunderbolt rfkill intel_ishtp ucsi_acpi wmi i2c_hid_acpi i2c_hid evdev
 CR2: 000000000000004f
 ---[ end trace 0000000000000000 ]---

Check the debugfs_dir pointer for an error before using it.

[change to make both conditional]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48918/">CVE-2022-48918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48918">CVE-2022-48918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229636">SUSE bug 1229636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48921" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48921" ref_url="https://www.suse.com/security/cve/CVE-2022-48921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Fix fault in reweight_entity

Syzbot found a GPF in reweight_entity. This has been bisected to
commit 4ef0c5c6b5ba ("kernel/sched: Fix sched_fork() access an invalid
sched_task_group")

There  is a race between sched_post_fork() and setpriority(PRIO_PGRP)
within a thread group that causes a null-ptr-deref  in
reweight_entity() in CFS. The scenario is that the main process spawns
number of new threads, which then call setpriority(PRIO_PGRP, 0, -20),
wait, and exit.  For each of the new threads the copy_process() gets
invoked, which adds the new task_struct and calls sched_post_fork()
for it.

In the above scenario there is a possibility that
setpriority(PRIO_PGRP) and set_one_prio() will be called for a thread
in the group that is just being created by copy_process(), and for
which the sched_post_fork() has not been executed yet. This will
trigger a null pointer dereference in reweight_entity(),  as it will
try to access the run queue pointer, which hasn't been set.

Before the mentioned change the cfs_rq pointer for the task  has been
set in sched_fork(), which is called much earlier in copy_process(),
before the new task is added to the thread_group.  Now it is done in
the sched_post_fork(), which is called after that.  To fix the issue
the remove the update_load param from the update_load param() function
and call reweight_task() only if the task flag doesn't have the
TASK_NEW flag set.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48921/">CVE-2022-48921 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48921">CVE-2022-48921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229635">SUSE bug 1229635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48934" ref_url="https://www.suse.com/security/cve/CVE-2022-48934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()

ida_simple_get() returns an id between min (0) and max (NFP_MAX_MAC_INDEX)
inclusive.
So NFP_MAX_MAC_INDEX (0xff) is a valid id.

In order for the error handling path to work correctly, the 'invalid'
value for 'ida_idx' should not be in the 0..NFP_MAX_MAC_INDEX range,
inclusive.

So set it to -1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48934/">CVE-2022-48934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48934">CVE-2022-48934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229620">SUSE bug 1229620</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48936" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48936" ref_url="https://www.suse.com/security/cve/CVE-2022-48936" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Not set</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-48936/">CVE-2022-48936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48936">CVE-2022-48936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229618">SUSE bug 1229618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48939" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48939" ref_url="https://www.suse.com/security/cve/CVE-2022-48939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add schedule points in batch ops

syzbot reported various soft lockups caused by bpf batch operations.

 INFO: task kworker/1:1:27 blocked for more than 140 seconds.
 INFO: task hung in rcu_barrier

Nothing prevents batch ops to process huge amount of data,
we need to add schedule points in them.

Note that maybe_wait_bpf_programs(map) calls from
generic_map_delete_batch() can be factorized by moving
the call after the loop.

This will be done later in -next tree once we get this fix merged,
unless there is strong opinion doing this optimization sooner.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48939/">CVE-2022-48939 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48939">CVE-2022-48939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229616">SUSE bug 1229616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48942</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48942" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48942" ref_url="https://www.suse.com/security/cve/CVE-2022-48942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: Handle failure to register sensor with thermal zone correctly

If an attempt is made to a sensor with a thermal zone and it fails,
the call to devm_thermal_zone_of_sensor_register() may return -ENODEV.
This may result in crashes similar to the following.

Unable to handle kernel NULL pointer dereference at virtual address 00000000000003cd
...
Internal error: Oops: 96000021 [#1] PREEMPT SMP
...
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mutex_lock+0x18/0x60
lr : thermal_zone_device_update+0x40/0x2e0
sp : ffff800014c4fc60
x29: ffff800014c4fc60 x28: ffff365ee3f6e000 x27: ffffdde218426790
x26: ffff365ee3f6e000 x25: 0000000000000000 x24: ffff365ee3f6e000
x23: ffffdde218426870 x22: ffff365ee3f6e000 x21: 00000000000003cd
x20: ffff365ee8bf3308 x19: ffffffffffffffed x18: 0000000000000000
x17: ffffdde21842689c x16: ffffdde1cb7a0b7c x15: 0000000000000040
x14: ffffdde21a4889a0 x13: 0000000000000228 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
x8 : 0000000001120000 x7 : 0000000000000001 x6 : 0000000000000000
x5 : 0068000878e20f07 x4 : 0000000000000000 x3 : 00000000000003cd
x2 : ffff365ee3f6e000 x1 : 0000000000000000 x0 : 00000000000003cd
Call trace:
 mutex_lock+0x18/0x60
 hwmon_notify_event+0xfc/0x110
 0xffffdde1cb7a0a90
 0xffffdde1cb7a0b7c
 irq_thread_fn+0x2c/0xa0
 irq_thread+0x134/0x240
 kthread+0x178/0x190
 ret_from_fork+0x10/0x20
Code: d503201f d503201f d2800001 aa0103e4 (c8e47c02)

Jon Hunter reports that the exact call sequence is:

hwmon_notify_event()
  --&gt; hwmon_thermal_notify()
    --&gt; thermal_zone_device_update()
      --&gt; update_temperature()
        --&gt; mutex_lock()

The hwmon core needs to handle all errors returned from calls
to devm_thermal_zone_of_sensor_register(). If the call fails
with -ENODEV, report that the sensor was not attached to a
thermal zone  but continue to register the hwmon device.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48942/">CVE-2022-48942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48942">CVE-2022-48942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229612">SUSE bug 1229612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48943</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48943" ref_url="https://www.suse.com/security/cve/CVE-2022-48943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: make apf token non-zero to fix bug

In current async pagefault logic, when a page is ready, KVM relies on
kvm_arch_can_dequeue_async_page_present() to determine whether to deliver
a READY event to the Guest. This function test token value of struct
kvm_vcpu_pv_apf_data, which must be reset to zero by Guest kernel when a
READY event is finished by Guest. If value is zero meaning that a READY
event is done, so the KVM can deliver another.
But the kvm_arch_setup_async_pf() may produce a valid token with zero
value, which is confused with previous mention and may lead the loss of
this READY event.

This bug may cause task blocked forever in Guest:
 INFO: task stress:7532 blocked for more than 1254 seconds.
       Not tainted 5.10.0 #16
 "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
 task:stress          state:D stack:    0 pid: 7532 ppid:  1409
 flags:0x00000080
 Call Trace:
  __schedule+0x1e7/0x650
  schedule+0x46/0xb0
  kvm_async_pf_task_wait_schedule+0xad/0xe0
  ? exit_to_user_mode_prepare+0x60/0x70
  __kvm_handle_async_pf+0x4f/0xb0
  ? asm_exc_page_fault+0x8/0x30
  exc_page_fault+0x6f/0x110
  ? asm_exc_page_fault+0x8/0x30
  asm_exc_page_fault+0x1e/0x30
 RIP: 0033:0x402d00
 RSP: 002b:00007ffd31912500 EFLAGS: 00010206
 RAX: 0000000000071000 RBX: ffffffffffffffff RCX: 00000000021a32b0
 RDX: 000000000007d011 RSI: 000000000007d000 RDI: 00000000021262b0
 RBP: 00000000021262b0 R08: 0000000000000003 R09: 0000000000000086
 R10: 00000000000000eb R11: 00007fefbdf2baa0 R12: 0000000000000000
 R13: 0000000000000002 R14: 000000000007d000 R15: 0000000000001000
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48943/">CVE-2022-48943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48943">CVE-2022-48943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229645">SUSE bug 1229645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48947</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48947" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48947" ref_url="https://www.suse.com/security/cve/CVE-2022-48947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix u8 overflow

By keep sending L2CAP_CONF_REQ packets, chan-&gt;num_conf_rsp increases
multiple times and eventually it will wrap around the maximum number
(i.e., 255).
This patch prevents this by adding a boundary check with
L2CAP_MAX_CONF_RSP

Btmon log:
Bluetooth monitor ver 5.64
= Note: Linux version 6.1.0-rc2 (x86_64)                               0.264594
= Note: Bluetooth subsystem version 2.22                               0.264636
@ MGMT Open: btmon (privileged) version 1.22                  {0x0001} 0.272191
= New Index: 00:00:00:00:00:00 (Primary,Virtual,hci0)          [hci0] 13.877604
@ RAW Open: 9496 (privileged) version 2.22                   {0x0002} 13.890741
= Open Index: 00:00:00:00:00:00                                [hci0] 13.900426
(...)
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 1033             #32 [hci0] 14.273106
        invalid packet size (12 != 1033)
        08 00 01 00 02 01 04 00 01 10 ff ff              ............
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 1547             #33 [hci0] 14.273561
        invalid packet size (14 != 1547)
        0a 00 01 00 04 01 06 00 40 00 00 00 00 00        ........@.....
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 2061             #34 [hci0] 14.274390
        invalid packet size (16 != 2061)
        0c 00 01 00 04 01 08 00 40 00 00 00 00 00 00 04  ........@.......
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 2061             #35 [hci0] 14.274932
        invalid packet size (16 != 2061)
        0c 00 01 00 04 01 08 00 40 00 00 00 07 00 03 00  ........@.......
= bluetoothd: Bluetooth daemon 5.43                                   14.401828
&gt; ACL Data RX: Handle 200 flags 0x00 dlen 1033             #36 [hci0] 14.275753
        invalid packet size (12 != 1033)
        08 00 01 00 04 01 04 00 40 00 00 00              ........@...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48947/">CVE-2022-48947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48947">CVE-2022-48947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231895">SUSE bug 1231895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48950</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48950" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48950" ref_url="https://www.suse.com/security/cve/CVE-2022-48950" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Fix perf_pending_task() UaF

Per syzbot it is possible for perf_pending_task() to run after the
event is free()'d. There are two related but distinct cases:

 - the task_work was already queued before destroying the event;
 - destroying the event itself queues the task_work.

The first cannot be solved using task_work_cancel() since
perf_release() itself might be called from a task_work (____fput),
which means the current-&gt;task_works list is already empty and
task_work_cancel() won't be able to find the perf_pending_task()
entry.

The simplest alternative is extending the perf_event lifetime to cover
the task_work.

The second is just silly, queueing a task_work while you know the
event is going away makes no sense and is easily avoided by
re-arranging how the event is marked STATE_DEAD and ensuring it goes
through STATE_OFF on the way down.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48950/">CVE-2022-48950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48950">CVE-2022-48950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231925">SUSE bug 1231925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48969" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48969" ref_url="https://www.suse.com/security/cve/CVE-2022-48969" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: Fix NULL sring after live migration

A NAPI is setup for each network sring to poll data to kernel
The sring with source host is destroyed before live migration and
new sring with target host is setup after live migration.
The NAPI for the old sring is not deleted until setup new sring
with target host after migration. With busy_poll/busy_read enabled,
the NAPI can be polled before got deleted when resume VM.

BUG: unable to handle kernel NULL pointer dereference at
0000000000000008
IP: xennet_poll+0xae/0xd20
PGD 0 P4D 0
Oops: 0000 [#1] SMP PTI
Call Trace:
 finish_task_switch+0x71/0x230
 timerqueue_del+0x1d/0x40
 hrtimer_try_to_cancel+0xb5/0x110
 xennet_alloc_rx_buffers+0x2a0/0x2a0
 napi_busy_loop+0xdb/0x270
 sock_poll+0x87/0x90
 do_sys_poll+0x26f/0x580
 tracing_map_insert+0x1d4/0x2f0
 event_hist_trigger+0x14a/0x260

 finish_task_switch+0x71/0x230
 __schedule+0x256/0x890
 recalc_sigpending+0x1b/0x50
 xen_sched_clock+0x15/0x20
 __rb_reserve_next+0x12d/0x140
 ring_buffer_lock_reserve+0x123/0x3d0
 event_triggers_call+0x87/0xb0
 trace_event_buffer_commit+0x1c4/0x210
 xen_clocksource_get_cycles+0x15/0x20
 ktime_get_ts64+0x51/0xf0
 SyS_ppoll+0x160/0x1a0
 SyS_ppoll+0x160/0x1a0
 do_syscall_64+0x73/0x130
 entry_SYSCALL_64_after_hwframe+0x41/0xa6
...
RIP: xennet_poll+0xae/0xd20 RSP: ffffb4f041933900
CR2: 0000000000000008
---[ end trace f8601785b354351c ]---

xen frontend should remove the NAPIs for the old srings before live
migration as the bond srings are destroyed

There is a tiny window between the srings are set to NULL and
the NAPIs are disabled, It is safe as the NAPI threads are still
frozen at that time
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48969/">CVE-2022-48969 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48969">CVE-2022-48969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232026">SUSE bug 1232026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48974" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48974" ref_url="https://www.suse.com/security/cve/CVE-2022-48974" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: fix using __this_cpu_add in preemptible

Currently in nf_conntrack_hash_check_insert(), when it fails in
nf_ct_ext_valid_pre/post(), NF_CT_STAT_INC() will be called in the
preemptible context, a call trace can be triggered:

   BUG: using __this_cpu_add() in preemptible [00000000] code: conntrack/1636
   caller is nf_conntrack_hash_check_insert+0x45/0x430 [nf_conntrack]
   Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl+0x33/0x46
    check_preemption_disabled+0xc3/0xf0
    nf_conntrack_hash_check_insert+0x45/0x430 [nf_conntrack]
    ctnetlink_create_conntrack+0x3cd/0x4e0 [nf_conntrack_netlink]
    ctnetlink_new_conntrack+0x1c0/0x450 [nf_conntrack_netlink]
    nfnetlink_rcv_msg+0x277/0x2f0 [nfnetlink]
    netlink_rcv_skb+0x50/0x100
    nfnetlink_rcv+0x65/0x144 [nfnetlink]
    netlink_unicast+0x1ae/0x290
    netlink_sendmsg+0x257/0x4f0
    sock_sendmsg+0x5f/0x70

This patch is to fix it by changing to use NF_CT_STAT_INC_ATOMIC() for
nf_ct_ext_valid_pre/post() check in nf_conntrack_hash_check_insert(),
as well as nf_ct_ext_valid_post() in __nf_conntrack_confirm().

Note that nf_ct_ext_valid_pre() check in __nf_conntrack_confirm() is
safe to use NF_CT_STAT_INC(), as it's under local_bh_disable().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48974/">CVE-2022-48974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48974">CVE-2022-48974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231886">SUSE bug 1231886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48975" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48975" ref_url="https://www.suse.com/security/cve/CVE-2022-48975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: fix memory leak in gpiochip_setup_dev()

Here is a backtrace report about memory leak detected in
gpiochip_setup_dev():

unreferenced object 0xffff88810b406400 (size 512):
  comm "python3", pid 1682, jiffies 4295346908 (age 24.090s)
  backtrace:
    kmalloc_trace
    device_add		device_private_init at drivers/base/core.c:3361
			(inlined by) device_add at drivers/base/core.c:3411
    cdev_device_add
    gpiolib_cdev_register
    gpiochip_setup_dev
    gpiochip_add_data_with_key

gcdev_register() &amp; gcdev_unregister() would call device_add() &amp;
device_del() (no matter CONFIG_GPIO_CDEV is enabled or not) to
register/unregister device.

However, if device_add() succeeds, some resource (like
struct device_private allocated by device_private_init())
is not released by device_del().

Therefore, after device_add() succeeds by gcdev_register(), it
needs to call put_device() to release resource in the error handle
path.

Here we move forward the register of release function, and let it
release every piece of resource by put_device() instead of kfree().

While at it, fix another subtle issue, i.e. when gc-&gt;ngpio is equal
to 0, we still call kcalloc() and, in case of further error, kfree()
on the ZERO_PTR pointer, which is not NULL. It's not a bug per se,
but rather waste of the resources and potentially wrong expectation
about contents of the gdev-&gt;descs variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48975/">CVE-2022-48975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48975">CVE-2022-48975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231885">SUSE bug 1231885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48976" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48976" ref_url="https://www.suse.com/security/cve/CVE-2022-48976" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable_offload: fix using __this_cpu_add in preemptible

flow_offload_queue_work() can be called in workqueue without
bh disabled, like the call trace showed in my act_ct testing,
calling NF_FLOW_TABLE_STAT_INC() there would cause a call
trace:

  BUG: using __this_cpu_add() in preemptible [00000000] code: kworker/u4:0/138560
  caller is flow_offload_queue_work+0xec/0x1b0 [nf_flow_table]
  Workqueue: act_ct_workqueue tcf_ct_flow_table_cleanup_work [act_ct]
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x33/0x46
   check_preemption_disabled+0xc3/0xf0
   flow_offload_queue_work+0xec/0x1b0 [nf_flow_table]
   nf_flow_table_iterate+0x138/0x170 [nf_flow_table]
   nf_flow_table_free+0x140/0x1a0 [nf_flow_table]
   tcf_ct_flow_table_cleanup_work+0x2f/0x2b0 [act_ct]
   process_one_work+0x6a3/0x1030
   worker_thread+0x8a/0xdf0

This patch fixes it by using NF_FLOW_TABLE_STAT_INC_ATOMIC()
instead in flow_offload_queue_work().

Note that for FLOW_CLS_REPLACE branch in flow_offload_queue_work(),
it may not be called in preemptible path, but it's good to use
NF_FLOW_TABLE_STAT_INC_ATOMIC() for all cases in
flow_offload_queue_work().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-48976/">CVE-2022-48976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48976">CVE-2022-48976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231884">SUSE bug 1231884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48978" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48978" ref_url="https://www.suse.com/security/cve/CVE-2022-48978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: fix shift-out-of-bounds in hid_report_raw_event

Syzbot reported shift-out-of-bounds in hid_report_raw_event.

microsoft 0003:045E:07DA.0001: hid_field_extract() called with n (128) &gt;
32! (swapper/0)
======================================================================
UBSAN: shift-out-of-bounds in drivers/hid/hid-core.c:1323:20
shift exponent 127 is too large for 32-bit type 'int'
CPU: 0 PID: 0 Comm: swapper/0 Not tainted
6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0
Hardware name: Google Compute Engine/Google Compute Engine, BIOS
Google 10/26/2022
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
 ubsan_epilogue lib/ubsan.c:151 [inline]
 __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322
 snto32 drivers/hid/hid-core.c:1323 [inline]
 hid_input_fetch_field drivers/hid/hid-core.c:1572 [inline]
 hid_process_report drivers/hid/hid-core.c:1665 [inline]
 hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998
 hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066
 hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284
 __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671
 dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988
 call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474
 expire_timers kernel/time/timer.c:1519 [inline]
 __run_timers+0x76a/0x980 kernel/time/timer.c:1790
 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803
 __do_softirq+0x277/0x75b kernel/softirq.c:571
 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107
======================================================================

If the size of the integer (unsigned n) is bigger than 32 in snto32(),
shift exponent will be too large for 32-bit type 'int', resulting in a
shift-out-of-bounds bug.
Fix this by adding a check on the size of the integer (unsigned n) in
snto32(). To add support for n greater than 32 bits, set n to 32, if n
is greater than 32.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48978/">CVE-2022-48978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48978">CVE-2022-48978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232038">SUSE bug 1232038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48988</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48988" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48988" ref_url="https://www.suse.com/security/cve/CVE-2022-48988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memcg: fix possible use-after-free in memcg_write_event_control()

memcg_write_event_control() accesses the dentry-&gt;d_name of the specified
control fd to route the write call.  As a cgroup interface file can't be
renamed, it's safe to access d_name as long as the specified file is a
regular cgroup file.  Also, as these cgroup interface files can't be
removed before the directory, it's safe to access the parent too.

Prior to 347c4a874710 ("memcg: remove cgroup_event-&gt;cft"), there was a
call to __file_cft() which verified that the specified file is a regular
cgroupfs file before further accesses.  The cftype pointer returned from
__file_cft() was no longer necessary and the commit inadvertently dropped
the file type check with it allowing any file to slip through.  With the
invarients broken, the d_name and parent accesses can now race against
renames and removals of arbitrary files and cause use-after-free's.

Fix the bug by resurrecting the file type check in __file_cft().  Now that
cgroupfs is implemented through kernfs, checking the file operations needs
to go through a layer of indirection.  Instead, let's check the superblock
and dentry type.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48988/">CVE-2022-48988 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48988">CVE-2022-48988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232069">SUSE bug 1232069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232106">SUSE bug 1232106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48989" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48989" ref_url="https://www.suse.com/security/cve/CVE-2022-48989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fscache: Fix oops due to race with cookie_lru and use_cookie

If a cookie expires from the LRU and the LRU_DISCARD flag is set, but
the state machine has not run yet, it's possible another thread can call
fscache_use_cookie and begin to use it.

When the cookie_worker finally runs, it will see the LRU_DISCARD flag
set, transition the cookie-&gt;state to LRU_DISCARDING, which will then
withdraw the cookie.  Once the cookie is withdrawn the object is removed
the below oops will occur because the object associated with the cookie
is now NULL.

Fix the oops by clearing the LRU_DISCARD bit if another thread uses the
cookie before the cookie_worker runs.

  BUG: kernel NULL pointer dereference, address: 0000000000000008
  ...
  CPU: 31 PID: 44773 Comm: kworker/u130:1 Tainted: G     E    6.0.0-5.dneg.x86_64 #1
  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
  Workqueue: events_unbound netfs_rreq_write_to_cache_work [netfs]
  RIP: 0010:cachefiles_prepare_write+0x28/0x90 [cachefiles]
  ...
  Call Trace:
    netfs_rreq_write_to_cache_work+0x11c/0x320 [netfs]
    process_one_work+0x217/0x3e0
    worker_thread+0x4a/0x3b0
    kthread+0xd6/0x100
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48989/">CVE-2022-48989 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48989">CVE-2022-48989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232027">SUSE bug 1232027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4899</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4899" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4899" ref_url="https://www.suse.com/security/cve/CVE-2022-4899" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014777.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in zstd v1.4.10, where an attacker can supply empty string as an argument to the command line tool to cause buffer overrun.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-4899/">CVE-2022-4899 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4899">CVE-2022-4899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209533">SUSE bug 1209533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48991</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48991" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48991" ref_url="https://www.suse.com/security/cve/CVE-2022-48991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/khugepaged: invoke MMU notifiers in shmem/file collapse paths

Any codepath that zaps page table entries must invoke MMU notifiers to
ensure that secondary MMUs (like KVM) don't keep accessing pages which
aren't mapped anymore.  Secondary MMUs don't hold their own references to
pages that are mirrored over, so failing to notify them can lead to page
use-after-free.

I'm marking this as addressing an issue introduced in commit f3f0e1d2150b
("khugepaged: add support of collapse for tmpfs/shmem pages"), but most of
the security impact of this only came in commit 27e1f8273113 ("khugepaged:
enable collapse pmd for pte-mapped THP"), which actually omitted flushes
for the removal of present PTEs, not just for the removal of empty page
tables.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48991/">CVE-2022-48991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48991">CVE-2022-48991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232070">SUSE bug 1232070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232372">SUSE bug 1232372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48992" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48992" ref_url="https://www.suse.com/security/cve/CVE-2022-48992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-pcm: Add NULL check in BE reparenting

Add NULL check in dpcm_be_reparent API, to handle
kernel NULL pointer dereference error.
The issue occurred in fuzzing test.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48992/">CVE-2022-48992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48992">CVE-2022-48992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232071">SUSE bug 1232071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202248997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-48997</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-48997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48997" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-48997" ref_url="https://www.suse.com/security/cve/CVE-2022-48997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: tpm: Protect tpm_pm_suspend with locks

Currently tpm transactions are executed unconditionally in
tpm_pm_suspend() function, which may lead to races with other tpm
accessors in the system.

Specifically, the hw_random tpm driver makes use of tpm_get_random(),
and this function is called in a loop from a kthread, which means it's
not frozen alongside userspace, and so can race with the work done
during system suspend:

  tpm tpm0: tpm_transmit: tpm_recv: error -52
  tpm tpm0: invalid TPM_STS.x 0xff, dumping stack for forensics
  CPU: 0 PID: 1 Comm: init Not tainted 6.1.0-rc5+ #135
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-20220807_005459-localhost 04/01/2014
  Call Trace:
   tpm_tis_status.cold+0x19/0x20
   tpm_transmit+0x13b/0x390
   tpm_transmit_cmd+0x20/0x80
   tpm1_pm_suspend+0xa6/0x110
   tpm_pm_suspend+0x53/0x80
   __pnp_bus_suspend+0x35/0xe0
   __device_suspend+0x10f/0x350

Fix this by calling tpm_try_get_ops(), which itself is a wrapper around
tpm_chip_start(), but takes the appropriate mutex.

[Jason: reworked commit message, added metadata]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-48997/">CVE-2022-48997 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-48997">CVE-2022-48997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232035">SUSE bug 1232035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49006" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49006" ref_url="https://www.suse.com/security/cve/CVE-2022-49006" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Free buffers when a used dynamic event is removed

After 65536 dynamic events have been added and removed, the "type" field
of the event then uses the first type number that is available (not
currently used by other events). A type number is the identifier of the
binary blobs in the tracing ring buffer (known as events) to map them to
logic that can parse the binary blob.

The issue is that if a dynamic event (like a kprobe event) is traced and
is in the ring buffer, and then that event is removed (because it is
dynamic, which means it can be created and destroyed), if another dynamic
event is created that has the same number that new event's logic on
parsing the binary blob will be used.

To show how this can be an issue, the following can crash the kernel:

 # cd /sys/kernel/tracing
 # for i in `seq 65536`; do
     echo 'p:kprobes/foo do_sys_openat2 $arg1:u32' &gt; kprobe_events
 # done

For every iteration of the above, the writing to the kprobe_events will
remove the old event and create a new one (with the same format) and
increase the type number to the next available on until the type number
reaches over 65535 which is the max number for the 16 bit type. After it
reaches that number, the logic to allocate a new number simply looks for
the next available number. When an dynamic event is removed, that number
is then available to be reused by the next dynamic event created. That is,
once the above reaches the max number, the number assigned to the event in
that loop will remain the same.

Now that means deleting one dynamic event and created another will reuse
the previous events type number. This is where bad things can happen.
After the above loop finishes, the kprobes/foo event which reads the
do_sys_openat2 function call's first parameter as an integer.

 # echo 1 &gt; kprobes/foo/enable
 # cat /etc/passwd &gt; /dev/null
 # cat trace
             cat-2211    [005] ....  2007.849603: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
             cat-2211    [005] ....  2007.849620: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
             cat-2211    [005] ....  2007.849838: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
             cat-2211    [005] ....  2007.849880: foo: (do_sys_openat2+0x0/0x130) arg1=4294967196
 # echo 0 &gt; kprobes/foo/enable

Now if we delete the kprobe and create a new one that reads a string:

 # echo 'p:kprobes/foo do_sys_openat2 +0($arg2):string' &gt; kprobe_events

And now we can the trace:

 # cat trace
        sendmail-1942    [002] .....   530.136320: foo: (do_sys_openat2+0x0/0x240) arg1=             cat-2046    [004] .....   530.930817: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
             cat-2046    [004] .....   530.930961: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
             cat-2046    [004] .....   530.934278: foo: (do_sys_openat2+0x0/0x240) arg1="������������������������������������������������������������������������������������������������"
             cat-2046    [004] .....   530.934563: foo: (do_sys_openat2+0x0/0x240) arg1="���������������������������������������
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49006/">CVE-2022-49006 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49006">CVE-2022-49006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232163">SUSE bug 1232163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49010" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49010" ref_url="https://www.suse.com/security/cve/CVE-2022-49010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) Check for null before removing sysfs attrs

If coretemp_add_core() gets an error then pdata-&gt;core_data[indx]
is already NULL and has been kfreed. Don't pass that to
sysfs_remove_group() as that will crash in sysfs_remove_group().

[Shortened for readability]
[91854.020159] sysfs: cannot create duplicate filename '/devices/platform/coretemp.0/hwmon/hwmon2/temp20_label'
&lt;cpu offline&gt;
[91855.126115] BUG: kernel NULL pointer dereference, address: 0000000000000188
[91855.165103] #PF: supervisor read access in kernel mode
[91855.194506] #PF: error_code(0x0000) - not-present page
[91855.224445] PGD 0 P4D 0
[91855.238508] Oops: 0000 [#1] PREEMPT SMP PTI
...
[91855.342716] RIP: 0010:sysfs_remove_group+0xc/0x80
...
[91855.796571] Call Trace:
[91855.810524]  coretemp_cpu_offline+0x12b/0x1dd [coretemp]
[91855.841738]  ? coretemp_cpu_online+0x180/0x180 [coretemp]
[91855.871107]  cpuhp_invoke_callback+0x105/0x4b0
[91855.893432]  cpuhp_thread_fun+0x8e/0x150
...

Fix this by checking for NULL first.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49010/">CVE-2022-49010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49010">CVE-2022-49010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232172">SUSE bug 1232172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49011" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49011" ref_url="https://www.suse.com/security/cve/CVE-2022-49011" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7531" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) fix pci device refcount leak in nv1a_ram_new()

As comment of pci_get_domain_bus_and_slot() says, it returns
a pci device with refcount increment, when finish using it,
the caller must decrement the reference count by calling
pci_dev_put(). So call it after using to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49011/">CVE-2022-49011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49011">CVE-2022-49011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232006">SUSE bug 1232006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49014" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49014" ref_url="https://www.suse.com/security/cve/CVE-2022-49014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tun: Fix use-after-free in tun_detach()

syzbot reported use-after-free in tun_detach() [1].  This causes call
trace like below:

==================================================================
BUG: KASAN: use-after-free in notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75
Read of size 8 at addr ffff88807324e2a8 by task syz-executor.0/3673

CPU: 0 PID: 3673 Comm: syz-executor.0 Not tainted 6.1.0-rc5-syzkaller-00044-gcc675d22e422 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd1/0x138 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x15e/0x461 mm/kasan/report.c:395
 kasan_report+0xbf/0x1f0 mm/kasan/report.c:495
 notifier_call_chain+0x1ee/0x200 kernel/notifier.c:75
 call_netdevice_notifiers_info+0x86/0x130 net/core/dev.c:1942
 call_netdevice_notifiers_extack net/core/dev.c:1983 [inline]
 call_netdevice_notifiers net/core/dev.c:1997 [inline]
 netdev_wait_allrefs_any net/core/dev.c:10237 [inline]
 netdev_run_todo+0xbc6/0x1100 net/core/dev.c:10351
 tun_detach drivers/net/tun.c:704 [inline]
 tun_chr_close+0xe4/0x190 drivers/net/tun.c:3467
 __fput+0x27c/0xa90 fs/file_table.c:320
 task_work_run+0x16f/0x270 kernel/task_work.c:179
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0xb3d/0x2a30 kernel/exit.c:820
 do_group_exit+0xd4/0x2a0 kernel/exit.c:950
 get_signal+0x21b1/0x2440 kernel/signal.c:2858
 arch_do_signal_or_restart+0x86/0x2300 arch/x86/kernel/signal.c:869
 exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
 exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203
 __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
 syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296
 do_syscall_64+0x46/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The cause of the issue is that sock_put() from __tun_detach() drops
last reference count for struct net, and then notifier_call_chain()
from netdev_state_change() accesses that struct net.

This patch fixes the issue by calling sock_put() from tun_detach()
after all necessary accesses for the struct net has done.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-49014/">CVE-2022-49014 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49014">CVE-2022-49014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231890">SUSE bug 1231890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232818">SUSE bug 1232818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49022" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49022" ref_url="https://www.suse.com/security/cve/CVE-2022-49022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac8021: fix possible oob access in ieee80211_get_rate_duration

Fix possible out-of-bound access in ieee80211_get_rate_duration routine
as reported by the following UBSAN report:

UBSAN: array-index-out-of-bounds in net/mac80211/airtime.c:455:47
index 15 is out of range for type 'u16 [12]'
CPU: 2 PID: 217 Comm: kworker/u32:10 Not tainted 6.1.0-060100rc3-generic
Hardware name: Acer Aspire TC-281/Aspire TC-281, BIOS R01-A2 07/18/2017
Workqueue: mt76 mt76u_tx_status_data [mt76_usb]
Call Trace:
 &lt;TASK&gt;
 show_stack+0x4e/0x61
 dump_stack_lvl+0x4a/0x6f
 dump_stack+0x10/0x18
 ubsan_epilogue+0x9/0x43
 __ubsan_handle_out_of_bounds.cold+0x42/0x47
ieee80211_get_rate_duration.constprop.0+0x22f/0x2a0 [mac80211]
 ? ieee80211_tx_status_ext+0x32e/0x640 [mac80211]
 ieee80211_calc_rx_airtime+0xda/0x120 [mac80211]
 ieee80211_calc_tx_airtime+0xb4/0x100 [mac80211]
 mt76x02_send_tx_status+0x266/0x480 [mt76x02_lib]
 mt76x02_tx_status_data+0x52/0x80 [mt76x02_lib]
 mt76u_tx_status_data+0x67/0xd0 [mt76_usb]
 process_one_work+0x225/0x400
 worker_thread+0x50/0x3e0
 ? process_one_work+0x400/0x400
 kthread+0xe9/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49022/">CVE-2022-49022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49022">CVE-2022-49022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231962">SUSE bug 1231962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49024" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49024" ref_url="https://www.suse.com/security/cve/CVE-2022-49024" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods

In m_can_pci_remove() and error handling path of m_can_pci_probe(),
m_can_class_free_dev() should be called to free resource allocated by
m_can_class_allocate_dev(), otherwise there will be memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49024/">CVE-2022-49024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49024">CVE-2022-49024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232001">SUSE bug 1232001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49028" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49028" ref_url="https://www.suse.com/security/cve/CVE-2022-49028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbevf: Fix resource leak in ixgbevf_init_module()

ixgbevf_init_module() won't destroy the workqueue created by
create_singlethread_workqueue() when pci_register_driver() failed. Add
destroy_workqueue() in fail path to prevent the resource leak.

Similar to the handling of u132_hcd_init in commit f276e002793c
("usb: u132-hcd: fix resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49028/">CVE-2022-49028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49028">CVE-2022-49028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231996">SUSE bug 1231996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49029" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49029" ref_url="https://www.suse.com/security/cve/CVE-2022-49029" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (ibmpex) Fix possible UAF when ibmpex_register_bmc() fails

Smatch report warning as follows:

drivers/hwmon/ibmpex.c:509 ibmpex_register_bmc() warn:
  '&amp;data-&gt;list' not removed from list

If ibmpex_find_sensors() fails in ibmpex_register_bmc(), data will
be freed, but data-&gt;list will not be removed from driver_data.bmc_data,
then list traversal may cause UAF.

Fix by removeing it from driver_data.bmc_data before free().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49029/">CVE-2022-49029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49029">CVE-2022-49029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231995">SUSE bug 1231995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20224904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-4904</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-4904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-4904" ref_url="https://www.suse.com/security/cve/CVE-2022-4904" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031179.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the c-ares package. The ares_set_sortlist is missing checks about the validity of the input string, which allows a possible arbitrary length stack overflow. This issue may cause a denial of service or a limited impact on confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2022-4904/">CVE-2022-4904 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-4904">CVE-2022-4904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208067">SUSE bug 1208067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811170" comment="c-ares-1.19.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811171" comment="c-ares-devel-1.19.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805997" comment="nodejs-libs-16.19.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805998" comment="nodejs-nodemon-2.0.20-3.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49043</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49043" ref_url="https://www.suse.com/security/cve/CVE-2022-49043" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1517" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020269.html" source="SUSE-SU"/>
    <description>
    xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-14"/>
	<updated date="2025-10-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49043/">CVE-2022-49043 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49043">CVE-2022-49043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236460">SUSE bug 1236460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963771" comment="libxml2-2.9.13-6.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963772" comment="libxml2-devel-2.9.13-6.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963773" comment="python3-libxml2-2.9.13-6.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49044" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49044" ref_url="https://www.suse.com/security/cve/CVE-2022-49044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm integrity: fix memory corruption when tag_size is less than digest size

It is possible to set up dm-integrity in such a way that the
"tag_size" parameter is less than the actual digest size. In this
situation, a part of the digest beyond tag_size is ignored.

In this case, dm-integrity would write beyond the end of the
ic-&gt;recalc_tags array and corrupt memory. The corruption happened in
integrity_recalc-&gt;integrity_sector_checksum-&gt;crypto_shash_final.

Fix this corruption by increasing the tags array so that it has enough
padding at the end to accomodate the loop in integrity_recalc() being
able to write a full digest size for the last member of the tags
array.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49044/">CVE-2022-49044 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49044">CVE-2022-49044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237840">SUSE bug 1237840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804297" comment="bpftool-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804298" comment="kernel-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804299" comment="kernel-abi-stablelists-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804300" comment="kernel-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804302" comment="kernel-debug-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804303" comment="kernel-debug-core-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804306" comment="kernel-debug-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804307" comment="kernel-debug-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804310" comment="kernel-doc-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804311" comment="kernel-headers-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804312" comment="kernel-modules-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804313" comment="kernel-modules-extra-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804314" comment="kernel-tools-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804315" comment="kernel-tools-libs-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804317" comment="perf-5.14.0-70.17.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804318" comment="python3-perf-5.14.0-70.17.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49049" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49049" ref_url="https://www.suse.com/security/cve/CVE-2022-49049" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix panic when growing a memfd_secret

When one tries to grow an existing memfd_secret with ftruncate, one gets
a panic [1].  For example, doing the following reliably induces the
panic:

    fd = memfd_secret();

    ftruncate(fd, 10);
    ptr = mmap(NULL, 10, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0);
    strcpy(ptr, "123456789");

    munmap(ptr, 10);
    ftruncate(fd, 20);

The basic reason for this is, when we grow with ftruncate, we call down
into simple_setattr, and then truncate_inode_pages_range, and eventually
we try to zero part of the memory.  The normal truncation code does this
via the direct map (i.e., it calls page_address() and hands that to
memset()).

For memfd_secret though, we specifically don't map our pages via the
direct map (i.e.  we call set_direct_map_invalid_noflush() on every
fault).  So the address returned by page_address() isn't useful, and
when we try to memset() with it we panic.

This patch avoids the panic by implementing a custom setattr for
memfd_secret, which detects resizes specifically (setting the size for
the first time works just fine, since there are no existing pages to try
to zero), and rejects them with EINVAL.

One could argue growing should be supported, but I think that will
require a significantly more lengthy change.  So, I propose a minimal
fix for the benefit of stable kernels, and then perhaps to extend
memfd_secret to support growing in a separate patch.

[1]:

  BUG: unable to handle page fault for address: ffffa0a889277028
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD afa01067 P4D afa01067 PUD 83f909067 PMD 83f8bf067 PTE 800ffffef6d88060
  Oops: 0002 [#1] PREEMPT SMP DEBUG_PAGEALLOC PTI
  CPU: 0 PID: 281 Comm: repro Not tainted 5.17.0-dbg-DEV #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:memset_erms+0x9/0x10
  Code: c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 &lt;f3&gt; aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 01
  RSP: 0018:ffffb932c09afbf0 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffffda63c4249dc0 RCX: 0000000000000fd8
  RDX: 0000000000000fd8 RSI: 0000000000000000 RDI: ffffa0a889277028
  RBP: ffffb932c09afc00 R08: 0000000000001000 R09: ffffa0a889277028
  R10: 0000000000020023 R11: 0000000000000000 R12: ffffda63c4249dc0
  R13: ffffa0a890d70d98 R14: 0000000000000028 R15: 0000000000000fd8
  FS:  00007f7294899580(0000) GS:ffffa0af9bc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffa0a889277028 CR3: 0000000107ef6006 CR4: 0000000000370ef0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   ? zero_user_segments+0x82/0x190
   truncate_inode_partial_folio+0xd4/0x2a0
   truncate_inode_pages_range+0x380/0x830
   truncate_setsize+0x63/0x80
   simple_setattr+0x37/0x60
   notify_change+0x3d8/0x4d0
   do_sys_ftruncate+0x162/0x1d0
   __x64_sys_ftruncate+0x1c/0x20
   do_syscall_64+0x44/0xa0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
  Modules linked in: xhci_pci xhci_hcd virtio_net net_failover failover virtio_blk virtio_balloon uhci_hcd ohci_pci ohci_hcd evdev ehci_pci ehci_hcd 9pnet_virtio 9p netfs 9pnet
  CR2: ffffa0a889277028

[lkp@intel.com: secretmem_iops can be static]
[axelrasmussen@google.com: return EINVAL]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49049/">CVE-2022-49049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49049">CVE-2022-49049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237883">SUSE bug 1237883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49057" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49057" ref_url="https://www.suse.com/security/cve/CVE-2022-49057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: null_blk: end timed out poll request

When poll request is timed out, it is removed from the poll list,
but not completed, so the request is leaked, and never get chance
to complete.

Fix the issue by ending it in timeout handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49057/">CVE-2022-49057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49057">CVE-2022-49057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238005">SUSE bug 1238005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49058" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49058" ref_url="https://www.suse.com/security/cve/CVE-2022-49058" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: potential buffer overflow in handling symlinks

Smatch printed a warning:
	arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error:
	__memcpy() 'dctx-&gt;buf' too small (16 vs u32max)

It's caused because Smatch marks 'link_len' as untrusted since it comes
from sscanf(). Add a check to ensure that 'link_len' is not larger than
the size of the 'link_str' buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49058/">CVE-2022-49058 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49058">CVE-2022-49058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237814">SUSE bug 1237814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49060" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49060" ref_url="https://www.suse.com/security/cve/CVE-2022-49060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()

dev_name() was called with dev.parent as argument but without to
NULL-check it before.
Solve this by checking the pointer before the call to dev_name().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49060/">CVE-2022-49060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49060">CVE-2022-49060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237845">SUSE bug 1237845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49063</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49063" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49063" ref_url="https://www.suse.com/security/cve/CVE-2022-49063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: arfs: fix use-after-free when freeing @rx_cpu_rmap

The CI testing bots triggered the following splat:

[  718.203054] BUG: KASAN: use-after-free in free_irq_cpu_rmap+0x53/0x80
[  718.206349] Read of size 4 at addr ffff8881bd127e00 by task sh/20834
[  718.212852] CPU: 28 PID: 20834 Comm: sh Kdump: loaded Tainted: G S      W IOE     5.17.0-rc8_nextqueue-devqueue-02643-g23f3121aca93 #1
[  718.219695] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0012.070720200218 07/07/2020
[  718.223418] Call Trace:
[  718.227139]
[  718.230783]  dump_stack_lvl+0x33/0x42
[  718.234431]  print_address_description.constprop.9+0x21/0x170
[  718.238177]  ? free_irq_cpu_rmap+0x53/0x80
[  718.241885]  ? free_irq_cpu_rmap+0x53/0x80
[  718.245539]  kasan_report.cold.18+0x7f/0x11b
[  718.249197]  ? free_irq_cpu_rmap+0x53/0x80
[  718.252852]  free_irq_cpu_rmap+0x53/0x80
[  718.256471]  ice_free_cpu_rx_rmap.part.11+0x37/0x50 [ice]
[  718.260174]  ice_remove_arfs+0x5f/0x70 [ice]
[  718.263810]  ice_rebuild_arfs+0x3b/0x70 [ice]
[  718.267419]  ice_rebuild+0x39c/0xb60 [ice]
[  718.270974]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[  718.274472]  ? ice_init_phy_user_cfg+0x360/0x360 [ice]
[  718.278033]  ? delay_tsc+0x4a/0xb0
[  718.281513]  ? preempt_count_sub+0x14/0xc0
[  718.284984]  ? delay_tsc+0x8f/0xb0
[  718.288463]  ice_do_reset+0x92/0xf0 [ice]
[  718.292014]  ice_pci_err_resume+0x91/0xf0 [ice]
[  718.295561]  pci_reset_function+0x53/0x80
&lt;...&gt;
[  718.393035] Allocated by task 690:
[  718.433497] Freed by task 20834:
[  718.495688] Last potentially related work creation:
[  718.568966] The buggy address belongs to the object at ffff8881bd127e00
                which belongs to the cache kmalloc-96 of size 96
[  718.574085] The buggy address is located 0 bytes inside of
                96-byte region [ffff8881bd127e00, ffff8881bd127e60)
[  718.579265] The buggy address belongs to the page:
[  718.598905] Memory state around the buggy address:
[  718.601809]  ffff8881bd127d00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[  718.604796]  ffff8881bd127d80: 00 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc
[  718.607794] &gt;ffff8881bd127e00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc
[  718.610811]                    ^
[  718.613819]  ffff8881bd127e80: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc
[  718.617107]  ffff8881bd127f00: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc

This is due to that free_irq_cpu_rmap() is always being called
*after* (devm_)free_irq() and thus it tries to work with IRQ descs
already freed. For example, on device reset the driver frees the
rmap right before allocating a new one (the splat above).
Make rmap creation and freeing function symmetrical with
{request,free}_irq() calls i.e. do that on ifup/ifdown instead
of device probe/remove/resume. These operations can be performed
independently from the actual device aRFS configuration.
Also, make sure ice_vsi_free_irq() clears IRQ affinity notifiers
only when aRFS is disabled -- otherwise, CPU rmap sets and clears
its own and they must not be touched manually.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49063/">CVE-2022-49063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49063">CVE-2022-49063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237846">SUSE bug 1237846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804562" comment="bpftool-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804563" comment="kernel-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804564" comment="kernel-abi-stablelists-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804565" comment="kernel-core-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804566" comment="kernel-cross-headers-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804567" comment="kernel-debug-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804568" comment="kernel-debug-core-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804571" comment="kernel-debug-modules-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804572" comment="kernel-debug-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804575" comment="kernel-doc-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804576" comment="kernel-headers-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804577" comment="kernel-modules-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804578" comment="kernel-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804579" comment="kernel-tools-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804580" comment="kernel-tools-libs-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804582" comment="perf-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804583" comment="python3-perf-5.14.0-70.26.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49066" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49066" ref_url="https://www.suse.com/security/cve/CVE-2022-49066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

veth: Ensure eth header is in skb's linear part

After feeding a decapsulated packet to a veth device with act_mirred,
skb_headlen() may be 0. But veth_xmit() calls __dev_forward_skb(),
which expects at least ETH_HLEN byte of linear data (as
__dev_forward_skb2() calls eth_type_trans(), which pulls ETH_HLEN bytes
unconditionally).

Use pskb_may_pull() to ensure veth_xmit() respects this constraint.

kernel BUG at include/linux/skbuff.h:2328!
RIP: 0010:eth_type_trans+0xcf/0x140
Call Trace:
 &lt;IRQ&gt;
 __dev_forward_skb2+0xe3/0x160
 veth_xmit+0x6e/0x250 [veth]
 dev_hard_start_xmit+0xc7/0x200
 __dev_queue_xmit+0x47f/0x520
 ? skb_ensure_writable+0x85/0xa0
 ? skb_mpls_pop+0x98/0x1c0
 tcf_mirred_act+0x442/0x47e [act_mirred]
 tcf_action_exec+0x86/0x140
 fl_classify+0x1d8/0x1e0 [cls_flower]
 ? dma_pte_clear_level+0x129/0x1a0
 ? dma_pte_clear_level+0x129/0x1a0
 ? prb_fill_curr_block+0x2f/0xc0
 ? skb_copy_bits+0x11a/0x220
 __tcf_classify+0x58/0x110
 tcf_classify_ingress+0x6b/0x140
 __netif_receive_skb_core.constprop.0+0x47d/0xfd0
 ? __iommu_dma_unmap_swiotlb+0x44/0x90
 __netif_receive_skb_one_core+0x3d/0xa0
 netif_receive_skb+0x116/0x170
 be_process_rx+0x22f/0x330 [be2net]
 be_poll+0x13c/0x370 [be2net]
 __napi_poll+0x2a/0x170
 net_rx_action+0x22f/0x2f0
 __do_softirq+0xca/0x2a8
 __irq_exit_rcu+0xc1/0xe0
 common_interrupt+0x83/0xa0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49066/">CVE-2022-49066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49066">CVE-2022-49066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237722">SUSE bug 1237722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49070" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49070" ref_url="https://www.suse.com/security/cve/CVE-2022-49070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix unregistering of framebuffers without device

OF framebuffers do not have an underlying device in the Linux
device hierarchy. Do a regular unregister call instead of hot
unplugging such a non-existing device. Fixes a NULL dereference.
An example error message on ppc64le is shown below.

  BUG: Kernel NULL pointer dereference on read at 0x00000060
  Faulting instruction address: 0xc00000000080dfa4
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
  [...]
  CPU: 2 PID: 139 Comm: systemd-udevd Not tainted 5.17.0-ae085d7f9365 #1
  NIP:  c00000000080dfa4 LR: c00000000080df9c CTR: c000000000797430
  REGS: c000000004132fe0 TRAP: 0300   Not tainted  (5.17.0-ae085d7f9365)
  MSR:  8000000002009033 &lt;SF,VEC,EE,ME,IR,DR,RI,LE&gt;  CR: 28228282  XER: 20000000
  CFAR: c00000000000c80c DAR: 0000000000000060 DSISR: 40000000 IRQMASK: 0
  GPR00: c00000000080df9c c000000004133280 c00000000169d200 0000000000000029
  GPR04: 00000000ffffefff c000000004132f90 c000000004132f88 0000000000000000
  GPR08: c0000000015658f8 c0000000015cd200 c0000000014f57d0 0000000048228283
  GPR12: 0000000000000000 c00000003fffe300 0000000020000000 0000000000000000
  GPR16: 0000000000000000 0000000113fc4a40 0000000000000005 0000000113fcfb80
  GPR20: 000001000f7283b0 0000000000000000 c000000000e4a588 c000000000e4a5b0
  GPR24: 0000000000000001 00000000000a0000 c008000000db0168 c0000000021f6ec0
  GPR28: c0000000016d65a8 c000000004b36460 0000000000000000 c0000000016d64b0
  NIP [c00000000080dfa4] do_remove_conflicting_framebuffers+0x184/0x1d0
  [c000000004133280] [c00000000080df9c] do_remove_conflicting_framebuffers+0x17c/0x1d0 (unreliable)
  [c000000004133350] [c00000000080e4d0] remove_conflicting_framebuffers+0x60/0x150
  [c0000000041333a0] [c00000000080e6f4] remove_conflicting_pci_framebuffers+0x134/0x1b0
  [c000000004133450] [c008000000e70438] drm_aperture_remove_conflicting_pci_framebuffers+0x90/0x100 [drm]
  [c000000004133490] [c008000000da0ce4] bochs_pci_probe+0x6c/0xa64 [bochs]
  [...]
  [c000000004133db0] [c00000000002aaa0] system_call_exception+0x170/0x2d0
  [c000000004133e10] [c00000000000c3cc] system_call_common+0xec/0x250

The bug [1] was introduced by commit 27599aacbaef ("fbdev: Hot-unplug
firmware fb devices on forced removal"). Most firmware framebuffers
have an underlying platform device, which can be hot-unplugged
before loading the native graphics driver. OF framebuffers do not
(yet) have that device. Fix the code by unregistering the framebuffer
as before without a hot unplug.

Tested with 5.17 on qemu ppc64le emulation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49070/">CVE-2022-49070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49070">CVE-2022-49070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237749">SUSE bug 1237749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49072</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49072" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49072" ref_url="https://www.suse.com/security/cve/CVE-2022-49072" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: Restrict usage of GPIO chip irq members before initialization

GPIO chip irq members are exposed before they could be completely
initialized and this leads to race conditions.

One such issue was observed for the gc-&gt;irq.domain variable which
was accessed through the I2C interface in gpiochip_to_irq() before
it could be initialized by gpiochip_add_irqchip(). This resulted in
Kernel NULL pointer dereference.

Following are the logs for reference :-

kernel: Call Trace:
kernel:  gpiod_to_irq+0x53/0x70
kernel:  acpi_dev_gpio_irq_get_by+0x113/0x1f0
kernel:  i2c_acpi_get_irq+0xc0/0xd0
kernel:  i2c_device_probe+0x28a/0x2a0
kernel:  really_probe+0xf2/0x460
kernel: RIP: 0010:gpiochip_to_irq+0x47/0xc0

To avoid such scenarios, restrict usage of GPIO chip irq members before
they are completely initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49072/">CVE-2022-49072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49072">CVE-2022-49072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238026">SUSE bug 1238026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49080" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49080" ref_url="https://www.suse.com/security/cve/CVE-2022-49080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01868-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01869-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01906-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01907-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01922-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01927-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01928-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: fix mpol_new leak in shared_policy_replace

If mpol_new is allocated but not used in restart loop, mpol_new will be
freed via mpol_put before returning to the caller.  But refcnt is not
initialized yet, so mpol_put could not do the right things and might
leak the unused mpol_new.  This would happen if mempolicy was updated on
the shared shmem file while the sp-&gt;lock has been dropped during the
memory allocation.

This issue could be triggered easily with the below code snippet if
there are many processes doing the below work at the same time:

  shmid = shmget((key_t)5566, 1024 * PAGE_SIZE, 0666|IPC_CREAT);
  shm = shmat(shmid, 0, 0);
  loop many times {
    mbind(shm, 1024 * PAGE_SIZE, MPOL_LOCAL, mask, maxnode, 0);
    mbind(shm + 128 * PAGE_SIZE, 128 * PAGE_SIZE, MPOL_DEFAULT, mask,
          maxnode, 0);
  }
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49080/">CVE-2022-49080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49080">CVE-2022-49080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238033">SUSE bug 1238033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238324">SUSE bug 1238324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49081" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49081" ref_url="https://www.suse.com/security/cve/CVE-2022-49081" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

highmem: fix checks in __kmap_local_sched_{in,out}

When CONFIG_DEBUG_KMAP_LOCAL is enabled __kmap_local_sched_{in,out} check
that even slots in the tsk-&gt;kmap_ctrl.pteval are unmapped.  The slots are
initialized with 0 value, but the check is done with pte_none.  0 pte
however does not necessarily mean that pte_none will return true.  e.g.
on xtensa it returns false, resulting in the following runtime warnings:

 WARNING: CPU: 0 PID: 101 at mm/highmem.c:627 __kmap_local_sched_out+0x51/0x108
 CPU: 0 PID: 101 Comm: touch Not tainted 5.17.0-rc7-00010-gd3a1cdde80d2-dirty #13
 Call Trace:
   dump_stack+0xc/0x40
   __warn+0x8f/0x174
   warn_slowpath_fmt+0x48/0xac
   __kmap_local_sched_out+0x51/0x108
   __schedule+0x71a/0x9c4
   preempt_schedule_irq+0xa0/0xe0
   common_exception_return+0x5c/0x93
   do_wp_page+0x30e/0x330
   handle_mm_fault+0xa70/0xc3c
   do_page_fault+0x1d8/0x3c4
   common_exception+0x7f/0x7f

 WARNING: CPU: 0 PID: 101 at mm/highmem.c:664 __kmap_local_sched_in+0x50/0xe0
 CPU: 0 PID: 101 Comm: touch Tainted: G        W         5.17.0-rc7-00010-gd3a1cdde80d2-dirty #13
 Call Trace:
   dump_stack+0xc/0x40
   __warn+0x8f/0x174
   warn_slowpath_fmt+0x48/0xac
   __kmap_local_sched_in+0x50/0xe0
   finish_task_switch$isra$0+0x1ce/0x2f8
   __schedule+0x86e/0x9c4
   preempt_schedule_irq+0xa0/0xe0
   common_exception_return+0x5c/0x93
   do_wp_page+0x30e/0x330
   handle_mm_fault+0xa70/0xc3c
   do_page_fault+0x1d8/0x3c4
   common_exception+0x7f/0x7f

Fix it by replacing !pte_none(pteval) with pte_val(pteval) != 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49081/">CVE-2022-49081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49081">CVE-2022-49081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238034">SUSE bug 1238034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49086" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49086" ref_url="https://www.suse.com/security/cve/CVE-2022-49086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix leak of nested actions

While parsing user-provided actions, openvswitch module may dynamically
allocate memory and store pointers in the internal copy of the actions.
So this memory has to be freed while destroying the actions.

Currently there are only two such actions: ct() and set().  However,
there are many actions that can hold nested lists of actions and
ovs_nla_free_flow_actions() just jumps over them leaking the memory.

For example, removal of the flow with the following actions will lead
to a leak of the memory allocated by nf_ct_tmpl_alloc():

  actions:clone(ct(commit),0)

Non-freed set() action may also leak the 'dst' structure for the
tunnel info including device references.

Under certain conditions with a high rate of flow rotation that may
cause significant memory leak problem (2MB per second in reporter's
case).  The problem is also hard to mitigate, because the user doesn't
have direct control over the datapath flows generated by OVS.

Fix that by iterating over all the nested actions and freeing
everything that needs to be freed recursively.

New build time assertion should protect us from this problem if new
actions will be added in the future.

Unfortunately, openvswitch module doesn't use NLA_F_NESTED, so all
attributes has to be explicitly checked.  sample() and clone() actions
are mixing extra attributes into the user-provided action list.  That
prevents some code generalization too.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49086/">CVE-2022-49086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49086">CVE-2022-49086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238037">SUSE bug 1238037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49087" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49087" ref_url="https://www.suse.com/security/cve/CVE-2022-49087" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: fix a race in rxrpc_exit_net()

Current code can lead to the following race:

CPU0                                                 CPU1

rxrpc_exit_net()
                                                     rxrpc_peer_keepalive_worker()
                                                       if (rxnet-&gt;live)

  rxnet-&gt;live = false;
  del_timer_sync(&amp;rxnet-&gt;peer_keepalive_timer);

                                                             timer_reduce(&amp;rxnet-&gt;peer_keepalive_timer, jiffies + delay);

  cancel_work_sync(&amp;rxnet-&gt;peer_keepalive_work);

rxrpc_exit_net() exits while peer_keepalive_timer is still armed,
leading to use-after-free.

syzbot report was:

ODEBUG: free active (active state 0) object type: timer_list hint: rxrpc_peer_keepalive_timeout+0x0/0xb0
WARNING: CPU: 0 PID: 3660 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Modules linked in:
CPU: 0 PID: 3660 Comm: kworker/u4:6 Not tainted 5.17.0-syzkaller-13993-g88e6c0207623 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:505
Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd 00 1c 26 8a 4c 89 ee 48 c7 c7 00 10 26 8a e8 b1 e7 28 05 &lt;0f&gt; 0b 83 05 15 eb c5 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3
RSP: 0018:ffffc9000353fb00 EFLAGS: 00010082
RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000
RDX: ffff888029196140 RSI: ffffffff815efad8 RDI: fffff520006a7f52
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: ffffffff815ea4ae R11: 0000000000000000 R12: ffffffff89ce23e0
R13: ffffffff8a2614e0 R14: ffffffff816628c0 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe1f2908924 CR3: 0000000043720000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 __debug_check_no_obj_freed lib/debugobjects.c:992 [inline]
 debug_check_no_obj_freed+0x301/0x420 lib/debugobjects.c:1023
 kfree+0xd6/0x310 mm/slab.c:3809
 ops_free_list.part.0+0x119/0x370 net/core/net_namespace.c:176
 ops_free_list net/core/net_namespace.c:174 [inline]
 cleanup_net+0x591/0xb00 net/core/net_namespace.c:598
 process_one_work+0x996/0x1610 kernel/workqueue.c:2289
 worker_thread+0x665/0x1080 kernel/workqueue.c:2436
 kthread+0x2e9/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49087/">CVE-2022-49087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49087">CVE-2022-49087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237731">SUSE bug 1237731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49090" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49090" ref_url="https://www.suse.com/security/cve/CVE-2022-49090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arch/arm64: Fix topology initialization for core scheduling

Arm64 systems rely on store_cpu_topology() to call update_siblings_masks()
to transfer the toplogy to the various cpu masks. This needs to be done
before the call to notify_cpu_starting() which tells the scheduler about
each cpu found, otherwise the core scheduling data structures are setup
in a way that does not match the actual topology.

With smt_mask not setup correctly we bail on `cpumask_weight(smt_mask) == 1`
for !leaders in:

 notify_cpu_starting()
   cpuhp_invoke_callback_range()
     sched_cpu_starting()
       sched_core_cpu_starting()

which leads to rq-&gt;core not being correctly set for !leader-rq's.

Without this change stress-ng (which enables core scheduling in its prctl
tests in newer versions -- i.e. with PR_SCHED_CORE support) causes a warning
and then a crash (trimmed for legibility):

[ 1853.805168] ------------[ cut here ]------------
[ 1853.809784] task_rq(b)-&gt;core != rq-&gt;core
[ 1853.809792] WARNING: CPU: 117 PID: 0 at kernel/sched/fair.c:11102 cfs_prio_less+0x1b4/0x1c4
...
[ 1854.015210] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010
...
[ 1854.231256] Call trace:
[ 1854.233689]  pick_next_task+0x3dc/0x81c
[ 1854.237512]  __schedule+0x10c/0x4cc
[ 1854.240988]  schedule_idle+0x34/0x54
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49090/">CVE-2022-49090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49090">CVE-2022-49090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238021">SUSE bug 1238021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49093" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49093" ref_url="https://www.suse.com/security/cve/CVE-2022-49093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

skbuff: fix coalescing for page_pool fragment recycling

Fix a use-after-free when using page_pool with page fragments. We
encountered this problem during normal RX in the hns3 driver:

(1) Initially we have three descriptors in the RX queue. The first one
    allocates PAGE1 through page_pool, and the other two allocate one
    half of PAGE2 each. Page references look like this:

                RX_BD1 _______ PAGE1
                RX_BD2 _______ PAGE2
                RX_BD3 _________/

(2) Handle RX on the first descriptor. Allocate SKB1, eventually added
    to the receive queue by tcp_queue_rcv().

(3) Handle RX on the second descriptor. Allocate SKB2 and pass it to
    netif_receive_skb():

    netif_receive_skb(SKB2)
      ip_rcv(SKB2)
        SKB3 = skb_clone(SKB2)

    SKB2 and SKB3 share a reference to PAGE2 through
    skb_shinfo()-&gt;dataref. The other ref to PAGE2 is still held by
    RX_BD3:

                      SKB2 ---+- PAGE2
                      SKB3 __/   /
                RX_BD3 _________/

 (3b) Now while handling TCP, coalesce SKB3 with SKB1:

      tcp_v4_rcv(SKB3)
        tcp_try_coalesce(to=SKB1, from=SKB3)    // succeeds
        kfree_skb_partial(SKB3)
          skb_release_data(SKB3)                // drops one dataref

                      SKB1 _____ PAGE1
                           \____
                      SKB2 _____ PAGE2
                                 /
                RX_BD3 _________/

    In skb_try_coalesce(), __skb_frag_ref() takes a page reference to
    PAGE2, where it should instead have increased the page_pool frag
    reference, pp_frag_count. Without coalescing, when releasing both
    SKB2 and SKB3, a single reference to PAGE2 would be dropped. Now
    when releasing SKB1 and SKB2, two references to PAGE2 will be
    dropped, resulting in underflow.

 (3c) Drop SKB2:

      af_packet_rcv(SKB2)
        consume_skb(SKB2)
          skb_release_data(SKB2)                // drops second dataref
            page_pool_return_skb_page(PAGE2)    // drops one pp_frag_count

                      SKB1 _____ PAGE1
                           \____
                                 PAGE2
                                 /
                RX_BD3 _________/

(4) Userspace calls recvmsg()
    Copies SKB1 and releases it. Since SKB3 was coalesced with SKB1, we
    release the SKB3 page as well:

    tcp_eat_recv_skb(SKB1)
      skb_release_data(SKB1)
        page_pool_return_skb_page(PAGE1)
        page_pool_return_skb_page(PAGE2)        // drops second pp_frag_count

(5) PAGE2 is freed, but the third RX descriptor was still using it!
    In our case this causes IOMMU faults, but it would silently corrupt
    memory if the IOMMU was disabled.

Change the logic that checks whether pp_recycle SKBs can be coalesced.
We still reject differing pp_recycle between 'from' and 'to' SKBs, but
in order to avoid the situation described above, we also reject
coalescing when both 'from' and 'to' are pp_recycled and 'from' is
cloned.

The new logic allows coalescing a cloned pp_recycle SKB into a page
refcounted one, because in this case the release (4) will drop the right
reference, the one taken by skb_try_coalesce().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49093/">CVE-2022-49093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49093">CVE-2022-49093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237737">SUSE bug 1237737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49097" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49097" ref_url="https://www.suse.com/security/cve/CVE-2022-49097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Avoid writeback threads getting stuck in mempool_alloc()

In a low memory situation, allow the NFS writeback code to fail without
getting stuck in infinite loops in mempool_alloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49097/">CVE-2022-49097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49097">CVE-2022-49097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237729">SUSE bug 1237729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49098" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49098" ref_url="https://www.suse.com/security/cve/CVE-2022-49098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Fix potential crash on module unload

The vmbus driver relies on the panic notifier infrastructure to perform
some operations when a panic event is detected. Since vmbus can be built
as module, it is required that the driver handles both registering and
unregistering such panic notifier callback.

After commit 74347a99e73a ("x86/Hyper-V: Unload vmbus channel in hv panic callback")
though, the panic notifier registration is done unconditionally in the module
initialization routine whereas the unregistering procedure is conditionally
guarded and executes only if HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE capability
is set.

This patch fixes that by unconditionally unregistering the panic notifier
in the module's exit routine as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49098/">CVE-2022-49098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49098">CVE-2022-49098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238079">SUSE bug 1238079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49107" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49107" ref_url="https://www.suse.com/security/cve/CVE-2022-49107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix memory leak in ceph_readdir when note_last_dentry returns error

Reset the last_readdir at the same time, and add a comment explaining
why we don't free last_readdir when dir_emit returns false.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49107/">CVE-2022-49107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49107">CVE-2022-49107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237973">SUSE bug 1237973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49109</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49109" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49109" ref_url="https://www.suse.com/security/cve/CVE-2022-49109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix inode reference leakage in ceph_get_snapdir()

The ceph_get_inode() will search for or insert a new inode into the
hash for the given vino, and return a reference to it. If new is
non-NULL, its reference is consumed.

We should release the reference when in error handing cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49109/">CVE-2022-49109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49109">CVE-2022-49109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237836">SUSE bug 1237836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49111" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49111" ref_url="https://www.suse.com/security/cve/CVE-2022-49111" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10669" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix use after free in hci_send_acl

This fixes the following trace caused by receiving
HCI_EV_DISCONN_PHY_LINK_COMPLETE which does call hci_conn_del without
first checking if conn-&gt;type is in fact AMP_LINK and in case it is
do properly cleanup upper layers with hci_disconn_cfm:

 ==================================================================
    BUG: KASAN: use-after-free in hci_send_acl+0xaba/0xc50
    Read of size 8 at addr ffff88800e404818 by task bluetoothd/142

    CPU: 0 PID: 142 Comm: bluetoothd Not tainted
    5.17.0-rc5-00006-gda4022eeac1a #7
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
    rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
    Call Trace:
     &lt;TASK&gt;
     dump_stack_lvl+0x45/0x59
     print_address_description.constprop.0+0x1f/0x150
     kasan_report.cold+0x7f/0x11b
     hci_send_acl+0xaba/0xc50
     l2cap_do_send+0x23f/0x3d0
     l2cap_chan_send+0xc06/0x2cc0
     l2cap_sock_sendmsg+0x201/0x2b0
     sock_sendmsg+0xdc/0x110
     sock_write_iter+0x20f/0x370
     do_iter_readv_writev+0x343/0x690
     do_iter_write+0x132/0x640
     vfs_writev+0x198/0x570
     do_writev+0x202/0x280
     do_syscall_64+0x38/0x90
     entry_SYSCALL_64_after_hwframe+0x44/0xae
    RSP: 002b:00007ffce8a099b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000014
    Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3
    0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 14 00 00 00 0f 05
    &lt;48&gt; 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
    RDX: 0000000000000001 RSI: 00007ffce8a099e0 RDI: 0000000000000015
    RAX: ffffffffffffffda RBX: 00007ffce8a099e0 RCX: 00007f788fc3cf77
    R10: 00007ffce8af7080 R11: 0000000000000246 R12: 000055e4ccf75580
    RBP: 0000000000000015 R08: 0000000000000002 R09: 0000000000000001
    &lt;/TASK&gt;
    R13: 000055e4ccf754a0 R14: 000055e4ccf75cd0 R15: 000055e4ccf4a6b0

    Allocated by task 45:
        kasan_save_stack+0x1e/0x40
        __kasan_kmalloc+0x81/0xa0
        hci_chan_create+0x9a/0x2f0
        l2cap_conn_add.part.0+0x1a/0xdc0
        l2cap_connect_cfm+0x236/0x1000
        le_conn_complete_evt+0x15a7/0x1db0
        hci_le_conn_complete_evt+0x226/0x2c0
        hci_le_meta_evt+0x247/0x450
        hci_event_packet+0x61b/0xe90
        hci_rx_work+0x4d5/0xc50
        process_one_work+0x8fb/0x15a0
        worker_thread+0x576/0x1240
        kthread+0x29d/0x340
        ret_from_fork+0x1f/0x30

    Freed by task 45:
        kasan_save_stack+0x1e/0x40
        kasan_set_track+0x21/0x30
        kasan_set_free_info+0x20/0x30
        __kasan_slab_free+0xfb/0x130
        kfree+0xac/0x350
        hci_conn_cleanup+0x101/0x6a0
        hci_conn_del+0x27e/0x6c0
        hci_disconn_phylink_complete_evt+0xe0/0x120
        hci_event_packet+0x812/0xe90
        hci_rx_work+0x4d5/0xc50
        process_one_work+0x8fb/0x15a0
        worker_thread+0x576/0x1240
        kthread+0x29d/0x340
        ret_from_fork+0x1f/0x30

    The buggy address belongs to the object at ffff88800c0f0500
    The buggy address is located 24 bytes inside of
    which belongs to the cache kmalloc-128 of size 128
    The buggy address belongs to the page:
    128-byte region [ffff88800c0f0500, ffff88800c0f0580)
    flags: 0x100000000000200(slab|node=0|zone=1)
    page:00000000fe45cd86 refcount:1 mapcount:0
    mapping:0000000000000000 index:0x0 pfn:0xc0f0
    raw: 0000000000000000 0000000080100010 00000001ffffffff
    0000000000000000
    raw: 0100000000000200 ffffea00003a2c80 dead000000000004
    ffff8880078418c0
    page dumped because: kasan: bad access detected
    ffff88800c0f0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc
    Memory state around the buggy address:
    &gt;ffff88800c0f0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
    ffff88800c0f0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
    ffff88800c0f0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                   
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49111/">CVE-2022-49111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49111">CVE-2022-49111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237984">SUSE bug 1237984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49114</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49114" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49114" ref_url="https://www.suse.com/security/cve/CVE-2022-49114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: libfc: Fix use after free in fc_exch_abts_resp()

fc_exch_release(ep) will decrease the ep's reference count. When the
reference count reaches zero, it is freed. But ep is still used in the
following code, which will lead to a use after free.

Return after the fc_exch_release() call to avoid use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49114/">CVE-2022-49114 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49114">CVE-2022-49114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238146">SUSE bug 1238146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49116" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49116" ref_url="https://www.suse.com/security/cve/CVE-2022-49116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: use memset avoid memory leaks

Use memset to initialize structs to prevent memory leaks
in l2cap_ecred_connect
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49116/">CVE-2022-49116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49116">CVE-2022-49116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237922">SUSE bug 1237922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49122" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49122" ref_url="https://www.suse.com/security/cve/CVE-2022-49122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm ioctl: prevent potential spectre v1 gadget

It appears like cmd could be a Spectre v1 gadget as it's supplied by a
user and used as an array index. Prevent the contents of kernel memory
from being leaked to userspace via speculative execution by using
array_index_nospec.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49122/">CVE-2022-49122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49122">CVE-2022-49122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237983">SUSE bug 1237983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49123" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49123" ref_url="https://www.suse.com/security/cve/CVE-2022-49123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath11k: Fix frames flush failure caused by deadlock

We are seeing below warnings:

kernel: [25393.301506] ath11k_pci 0000:01:00.0: failed to flush mgmt transmit queue 0
kernel: [25398.421509] ath11k_pci 0000:01:00.0: failed to flush mgmt transmit queue 0
kernel: [25398.421831] ath11k_pci 0000:01:00.0: dropping mgmt frame for vdev 0, is_started 0

this means ath11k fails to flush mgmt. frames because wmi_mgmt_tx_work
has no chance to run in 5 seconds.

By setting /proc/sys/kernel/hung_task_timeout_secs to 20 and increasing
ATH11K_FLUSH_TIMEOUT to 50 we get below warnings:

kernel: [  120.763160] INFO: task wpa_supplicant:924 blocked for more than 20 seconds.
kernel: [  120.763169]       Not tainted 5.10.90 #12
kernel: [  120.763177] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
kernel: [  120.763186] task:wpa_supplicant  state:D stack:    0 pid:  924 ppid:     1 flags:0x000043a0
kernel: [  120.763201] Call Trace:
kernel: [  120.763214]  __schedule+0x785/0x12fa
kernel: [  120.763224]  ? lockdep_hardirqs_on_prepare+0xe2/0x1bb
kernel: [  120.763242]  schedule+0x7e/0xa1
kernel: [  120.763253]  schedule_timeout+0x98/0xfe
kernel: [  120.763266]  ? run_local_timers+0x4a/0x4a
kernel: [  120.763291]  ath11k_mac_flush_tx_complete+0x197/0x2b1 [ath11k 13c3a9bf37790f4ac8103b3decf7ab4008ac314a]
kernel: [  120.763306]  ? init_wait_entry+0x2e/0x2e
kernel: [  120.763343]  __ieee80211_flush_queues+0x167/0x21f [mac80211 335da900954f1c5ea7f1613d92088ce83342042c]
kernel: [  120.763378]  __ieee80211_recalc_idle+0x105/0x125 [mac80211 335da900954f1c5ea7f1613d92088ce83342042c]
kernel: [  120.763411]  ieee80211_recalc_idle+0x14/0x27 [mac80211 335da900954f1c5ea7f1613d92088ce83342042c]
kernel: [  120.763441]  ieee80211_free_chanctx+0x77/0xa2 [mac80211 335da900954f1c5ea7f1613d92088ce83342042c]
kernel: [  120.763473]  __ieee80211_vif_release_channel+0x100/0x131 [mac80211 335da900954f1c5ea7f1613d92088ce83342042c]
kernel: [  120.763540]  ieee80211_vif_release_channel+0x66/0x81 [mac80211 335da900954f1c5ea7f1613d92088ce83342042c]
kernel: [  120.763572]  ieee80211_destroy_auth_data+0xa3/0xe6 [mac80211 335da900954f1c5ea7f1613d92088ce83342042c]
kernel: [  120.763612]  ieee80211_mgd_deauth+0x178/0x29b [mac80211 335da900954f1c5ea7f1613d92088ce83342042c]
kernel: [  120.763654]  cfg80211_mlme_deauth+0x1a8/0x22c [cfg80211 8945aa5bc2af5f6972336665d8ad6f9c191ad5be]
kernel: [  120.763697]  nl80211_deauthenticate+0xfa/0x123 [cfg80211 8945aa5bc2af5f6972336665d8ad6f9c191ad5be]
kernel: [  120.763715]  genl_rcv_msg+0x392/0x3c2
kernel: [  120.763750]  ? nl80211_associate+0x432/0x432 [cfg80211 8945aa5bc2af5f6972336665d8ad6f9c191ad5be]
kernel: [  120.763782]  ? nl80211_associate+0x432/0x432 [cfg80211 8945aa5bc2af5f6972336665d8ad6f9c191ad5be]
kernel: [  120.763802]  ? genl_rcv+0x36/0x36
kernel: [  120.763814]  netlink_rcv_skb+0x89/0xf7
kernel: [  120.763829]  genl_rcv+0x28/0x36
kernel: [  120.763840]  netlink_unicast+0x179/0x24b
kernel: [  120.763854]  netlink_sendmsg+0x393/0x401
kernel: [  120.763872]  sock_sendmsg+0x72/0x76
kernel: [  120.763886]  ____sys_sendmsg+0x170/0x1e6
kernel: [  120.763897]  ? copy_msghdr_from_user+0x7a/0xa2
kernel: [  120.763914]  ___sys_sendmsg+0x95/0xd1
kernel: [  120.763940]  __sys_sendmsg+0x85/0xbf
kernel: [  120.763956]  do_syscall_64+0x43/0x55
kernel: [  120.763966]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
kernel: [  120.763977] RIP: 0033:0x79089f3fcc83
kernel: [  120.763986] RSP: 002b:00007ffe604f0508 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
kernel: [  120.763997] RAX: ffffffffffffffda RBX: 000059b40e987690 RCX: 000079089f3fcc83
kernel: [  120.764006] RDX: 0000000000000000 RSI: 00007ffe604f0558 RDI: 0000000000000009
kernel: [  120.764014] RBP: 00007ffe604f0540 R08: 0000000000000004 R09: 0000000000400000
kernel: [  120.764023] R10: 00007ffe604f0638 R11: 0000000000000246 R12: 000059b40ea04980
kernel: [  120.764032] R13: 00007ffe604
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49123/">CVE-2022-49123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49123">CVE-2022-49123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237980">SUSE bug 1237980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49129" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49129" ref_url="https://www.suse.com/security/cve/CVE-2022-49129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7921: fix crash when startup fails.

If the nic fails to start, it is possible that the
reset_work has already been scheduled.  Ensure the
work item is canceled so we do not have use-after-free
crash in case cleanup is called before the work item
is executed.

This fixes crash on my x86_64 apu2 when mt7921k radio
fails to work.  Radio still fails, but OS does not
crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49129/">CVE-2022-49129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49129">CVE-2022-49129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237968">SUSE bug 1237968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49130" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49130" ref_url="https://www.suse.com/security/cve/CVE-2022-49130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath11k: mhi: use mhi_sync_power_up()

If amss.bin was missing ath11k would crash during 'rmmod ath11k_pci'. The
reason for that was that we were using mhi_async_power_up() which does not
check any errors. But mhi_sync_power_up() on the other hand does check for
errors so let's use that to fix the crash.

I was not able to find a reason why an async version was used.
ath11k_mhi_start() (which enables state ATH11K_MHI_POWER_ON) is called from
ath11k_hif_power_up(), which can sleep. So sync version should be safe to use
here.

[  145.569731] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC KASAN PTI
[  145.569789] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[  145.569843] CPU: 2 PID: 1628 Comm: rmmod Kdump: loaded Tainted: G        W         5.16.0-wt-ath+ #567
[  145.569898] Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021
[  145.569956] RIP: 0010:ath11k_hal_srng_access_begin+0xb5/0x2b0 [ath11k]
[  145.570028] Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 ec 01 00 00 48 8b ab a8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 &lt;0f&gt; b6 14 02 48 89 e8 83 e0 07 83 c0 03 45 85 ed 75 48 38 d0 7c 08
[  145.570089] RSP: 0018:ffffc900025d7ac0 EFLAGS: 00010246
[  145.570144] RAX: dffffc0000000000 RBX: ffff88814fca2dd8 RCX: 1ffffffff50cb455
[  145.570196] RDX: 0000000000000000 RSI: ffff88814fca2dd8 RDI: ffff88814fca2e80
[  145.570252] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffffa8659497
[  145.570329] R10: fffffbfff50cb292 R11: 0000000000000001 R12: ffff88814fca0000
[  145.570410] R13: 0000000000000000 R14: ffff88814fca2798 R15: ffff88814fca2dd8
[  145.570465] FS:  00007fa399988540(0000) GS:ffff888233e00000(0000) knlGS:0000000000000000
[  145.570519] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  145.570571] CR2: 00007fa399b51421 CR3: 0000000137898002 CR4: 00000000003706e0
[  145.570623] Call Trace:
[  145.570675]  &lt;TASK&gt;
[  145.570727]  ? ath11k_ce_tx_process_cb+0x34b/0x860 [ath11k]
[  145.570797]  ath11k_ce_tx_process_cb+0x356/0x860 [ath11k]
[  145.570864]  ? tasklet_init+0x150/0x150
[  145.570919]  ? ath11k_ce_alloc_pipes+0x280/0x280 [ath11k]
[  145.570986]  ? tasklet_clear_sched+0x42/0xe0
[  145.571042]  ? tasklet_kill+0xe9/0x1b0
[  145.571095]  ? tasklet_clear_sched+0xe0/0xe0
[  145.571148]  ? irq_has_action+0x120/0x120
[  145.571202]  ath11k_ce_cleanup_pipes+0x45a/0x580 [ath11k]
[  145.571270]  ? ath11k_pci_stop+0x10e/0x170 [ath11k_pci]
[  145.571345]  ath11k_core_stop+0x8a/0xc0 [ath11k]
[  145.571434]  ath11k_core_deinit+0x9e/0x150 [ath11k]
[  145.571499]  ath11k_pci_remove+0xd2/0x260 [ath11k_pci]
[  145.571553]  pci_device_remove+0x9a/0x1c0
[  145.571605]  __device_release_driver+0x332/0x660
[  145.571659]  driver_detach+0x1e7/0x2c0
[  145.571712]  bus_remove_driver+0xe2/0x2d0
[  145.571772]  pci_unregister_driver+0x21/0x250
[  145.571826]  __do_sys_delete_module+0x30a/0x4b0
[  145.571879]  ? free_module+0xac0/0xac0
[  145.571933]  ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370
[  145.571986]  ? syscall_enter_from_user_mode+0x1d/0x50
[  145.572039]  ? lockdep_hardirqs_on+0x79/0x100
[  145.572097]  do_syscall_64+0x3b/0x90
[  145.572153]  entry_SYSCALL_64_after_hwframe+0x44/0xae

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03003-QCAHSPSWPL_V1_V2_SILICONZ_LITE-2
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49130/">CVE-2022-49130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49130">CVE-2022-49130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237978">SUSE bug 1237978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49136" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49136" ref_url="https://www.suse.com/security/cve/CVE-2022-49136" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10669" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set

hci_cmd_sync_queue shall return an error if HCI_UNREGISTER flag has
been set as that means hci_unregister_dev has been called so it will
likely cause a uaf after the timeout as the hdev will be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49136/">CVE-2022-49136 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49136">CVE-2022-49136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238153">SUSE bug 1238153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239159">SUSE bug 1239159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49142" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49142" ref_url="https://www.suse.com/security/cve/CVE-2022-49142" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: preserve skb_end_offset() in skb_unclone_keeptruesize()

syzbot found another way to trigger the infamous WARN_ON_ONCE(delta &lt; len)
in skb_try_coalesce() [1]

I was able to root cause the issue to kfence.

When kfence is in action, the following assertion is no longer true:

int size = xxxx;
void *ptr1 = kmalloc(size, gfp);
void *ptr2 = kmalloc(size, gfp);

if (ptr1 &amp;&amp; ptr2)
	ASSERT(ksize(ptr1) == ksize(ptr2));

We attempted to fix these issues in the blamed commits, but forgot
that TCP was possibly shifting data after skb_unclone_keeptruesize()
has been used, notably from tcp_retrans_try_collapse().

So we not only need to keep same skb-&gt;truesize value,
we also need to make sure TCP wont fill new tailroom
that pskb_expand_head() was able to get from a
addr = kmalloc(...) followed by ksize(addr)

Split skb_unclone_keeptruesize() into two parts:

1) Inline skb_unclone_keeptruesize() for the common case,
   when skb is not cloned.

2) Out of line __skb_unclone_keeptruesize() for the 'slow path'.

WARNING: CPU: 1 PID: 6490 at net/core/skbuff.c:5295 skb_try_coalesce+0x1235/0x1560 net/core/skbuff.c:5295
Modules linked in:
CPU: 1 PID: 6490 Comm: syz-executor161 Not tainted 5.17.0-rc4-syzkaller-00229-g4f12b742eb2b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:skb_try_coalesce+0x1235/0x1560 net/core/skbuff.c:5295
Code: bf 01 00 00 00 0f b7 c0 89 c6 89 44 24 20 e8 62 24 4e fa 8b 44 24 20 83 e8 01 0f 85 e5 f0 ff ff e9 87 f4 ff ff e8 cb 20 4e fa &lt;0f&gt; 0b e9 06 f9 ff ff e8 af b2 95 fa e9 69 f0 ff ff e8 95 b2 95 fa
RSP: 0018:ffffc900063af268 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 00000000ffffffd5 RCX: 0000000000000000
RDX: ffff88806fc05700 RSI: ffffffff872abd55 RDI: 0000000000000003
RBP: ffff88806e675500 R08: 00000000ffffffd5 R09: 0000000000000000
R10: ffffffff872ab659 R11: 0000000000000000 R12: ffff88806dd554e8
R13: ffff88806dd9bac0 R14: ffff88806dd9a2c0 R15: 0000000000000155
FS:  00007f18014f9700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020002000 CR3: 000000006be7a000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 tcp_try_coalesce net/ipv4/tcp_input.c:4651 [inline]
 tcp_try_coalesce+0x393/0x920 net/ipv4/tcp_input.c:4630
 tcp_queue_rcv+0x8a/0x6e0 net/ipv4/tcp_input.c:4914
 tcp_data_queue+0x11fd/0x4bb0 net/ipv4/tcp_input.c:5025
 tcp_rcv_established+0x81e/0x1ff0 net/ipv4/tcp_input.c:5947
 tcp_v4_do_rcv+0x65e/0x980 net/ipv4/tcp_ipv4.c:1719
 sk_backlog_rcv include/net/sock.h:1037 [inline]
 __release_sock+0x134/0x3b0 net/core/sock.c:2779
 release_sock+0x54/0x1b0 net/core/sock.c:3311
 sk_wait_data+0x177/0x450 net/core/sock.c:2821
 tcp_recvmsg_locked+0xe28/0x1fd0 net/ipv4/tcp.c:2457
 tcp_recvmsg+0x137/0x610 net/ipv4/tcp.c:2572
 inet_recvmsg+0x11b/0x5e0 net/ipv4/af_inet.c:850
 sock_recvmsg_nosec net/socket.c:948 [inline]
 sock_recvmsg net/socket.c:966 [inline]
 sock_recvmsg net/socket.c:962 [inline]
 ____sys_recvmsg+0x2c4/0x600 net/socket.c:2632
 ___sys_recvmsg+0x127/0x200 net/socket.c:2674
 __sys_recvmsg+0xe2/0x1a0 net/socket.c:2704
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49142/">CVE-2022-49142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49142">CVE-2022-49142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238020">SUSE bug 1238020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49145" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49145" ref_url="https://www.suse.com/security/cve/CVE-2022-49145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Avoid out of bounds access when parsing _CPC data

If the NumEntries field in the _CPC return package is less than 2, do
not attempt to access the "Revision" element of that package, because
it may not be present then.

BugLink: https://lore.kernel.org/lkml/20220322143534.GC32582@xsang-OptiPlex-9020/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49145/">CVE-2022-49145 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49145">CVE-2022-49145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238162">SUSE bug 1238162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49147" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49147" ref_url="https://www.suse.com/security/cve/CVE-2022-49147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix the maximum minor value is blk_alloc_ext_minor()

ida_alloc_range(..., min, max, ...) returns values from min to max,
inclusive.

So, NR_EXT_DEVT is a valid idx returned by blk_alloc_ext_minor().

This is an issue because in device_add_disk(), this value is used in:
   ddev-&gt;devt = MKDEV(disk-&gt;major, disk-&gt;first_minor);
and NR_EXT_DEVT is '(1 &lt;&lt; MINORBITS)'.

So, should 'disk-&gt;first_minor' be NR_EXT_DEVT, it would overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49147/">CVE-2022-49147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49147">CVE-2022-49147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237960">SUSE bug 1237960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49152</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49152" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49152" ref_url="https://www.suse.com/security/cve/CVE-2022-49152" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

XArray: Fix xas_create_range() when multi-order entry present

If there is already an entry present that is of order &gt;= XA_CHUNK_SHIFT
when we call xas_create_range(), xas_create_range() will misinterpret
that entry as a node and dereference xa_node-&gt;parent, generally leading
to a crash that looks something like this:

general protection fault, probably for non-canonical address 0xdffffc0000000001:
0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 32 Comm: khugepaged Not tainted 5.17.0-rc8-syzkaller-00003-g56e337f2cf13 #0
RIP: 0010:xa_parent_locked include/linux/xarray.h:1207 [inline]
RIP: 0010:xas_create_range+0x2d9/0x6e0 lib/xarray.c:725

It's deterministically reproducable once you know what the problem is,
but producing it in a live kernel requires khugepaged to hit a race.
While the problem has been present since xas_create_range() was
introduced, I'm not aware of a way to hit it before the page cache was
converted to use multi-index entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49152/">CVE-2022-49152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49152">CVE-2022-49152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237945">SUSE bug 1237945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49153" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49153" ref_url="https://www.suse.com/security/cve/CVE-2022-49153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wireguard: socket: free skb in send6 when ipv6 is disabled

I got a memory leak report:

unreferenced object 0xffff8881191fc040 (size 232):
  comm "kworker/u17:0", pid 23193, jiffies 4295238848 (age 3464.870s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff814c3ef4&gt;] slab_post_alloc_hook+0x84/0x3b0
    [&lt;ffffffff814c8977&gt;] kmem_cache_alloc_node+0x167/0x340
    [&lt;ffffffff832974fb&gt;] __alloc_skb+0x1db/0x200
    [&lt;ffffffff82612b5d&gt;] wg_socket_send_buffer_to_peer+0x3d/0xc0
    [&lt;ffffffff8260e94a&gt;] wg_packet_send_handshake_initiation+0xfa/0x110
    [&lt;ffffffff8260ec81&gt;] wg_packet_handshake_send_worker+0x21/0x30
    [&lt;ffffffff8119c558&gt;] process_one_work+0x2e8/0x770
    [&lt;ffffffff8119ca2a&gt;] worker_thread+0x4a/0x4b0
    [&lt;ffffffff811a88e0&gt;] kthread+0x120/0x160
    [&lt;ffffffff8100242f&gt;] ret_from_fork+0x1f/0x30

In function wg_socket_send_buffer_as_reply_to_skb() or wg_socket_send_
buffer_to_peer(), the semantics of send6() is required to free skb. But
when CONFIG_IPV6 is disable, kfree_skb() is missing. This patch adds it
to fix this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49153/">CVE-2022-49153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49153">CVE-2022-49153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238166">SUSE bug 1238166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49156" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49156" ref_url="https://www.suse.com/security/cve/CVE-2022-49156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix scheduling while atomic

The driver makes a call into midlayer (fc_remote_port_delete) which can put
the thread to sleep. The thread that originates the call is in interrupt
context. The combination of the two trigger a crash. Schedule the call in
non-interrupt context where it is more safe.

kernel: BUG: scheduling while atomic: swapper/7/0/0x00010000
kernel: Call Trace:
kernel:  &lt;IRQ&gt;
kernel:  dump_stack+0x66/0x81
kernel:  __schedule_bug.cold.90+0x5/0x1d
kernel:  __schedule+0x7af/0x960
kernel:  schedule+0x28/0x80
kernel:  schedule_timeout+0x26d/0x3b0
kernel:  wait_for_completion+0xb4/0x140
kernel:  ? wake_up_q+0x70/0x70
kernel:  __wait_rcu_gp+0x12c/0x160
kernel:  ? sdev_evt_alloc+0xc0/0x180 [scsi_mod]
kernel:  synchronize_sched+0x6c/0x80
kernel:  ? call_rcu_bh+0x20/0x20
kernel:  ? __bpf_trace_rcu_invoke_callback+0x10/0x10
kernel:  sdev_evt_alloc+0xfd/0x180 [scsi_mod]
kernel:  starget_for_each_device+0x85/0xb0 [scsi_mod]
kernel:  ? scsi_init_io+0x360/0x3d0 [scsi_mod]
kernel:  scsi_init_io+0x388/0x3d0 [scsi_mod]
kernel:  device_for_each_child+0x54/0x90
kernel:  fc_remote_port_delete+0x70/0xe0 [scsi_transport_fc]
kernel:  qla2x00_schedule_rport_del+0x62/0xf0 [qla2xxx]
kernel:  qla2x00_mark_device_lost+0x9c/0xd0 [qla2xxx]
kernel:  qla24xx_handle_plogi_done_event+0x55f/0x570 [qla2xxx]
kernel:  qla2x00_async_login_sp_done+0xd2/0x100 [qla2xxx]
kernel:  qla24xx_logio_entry+0x13a/0x3c0 [qla2xxx]
kernel:  qla24xx_process_response_queue+0x306/0x400 [qla2xxx]
kernel:  qla24xx_msix_rsp_q+0x3f/0xb0 [qla2xxx]
kernel:  __handle_irq_event_percpu+0x40/0x180
kernel:  handle_irq_event_percpu+0x30/0x80
kernel:  handle_irq_event+0x36/0x60
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49156/">CVE-2022-49156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49156">CVE-2022-49156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238168">SUSE bug 1238168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49158" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49158" ref_url="https://www.suse.com/security/cve/CVE-2022-49158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix warning message due to adisc being flushed

Fix warning message due to adisc being flushed.  Linux kernel triggered a
warning message where a different error code type is not matching up with
the expected type. Add additional translation of one error code type to
another.

WARNING: CPU: 2 PID: 1131623 at drivers/scsi/qla2xxx/qla_init.c:498
qla2x00_async_adisc_sp_done+0x294/0x2b0 [qla2xxx]
CPU: 2 PID: 1131623 Comm: drmgr Not tainted 5.13.0-rc1-autotest #1
..
GPR28: c000000aaa9c8890 c0080000079ab678 c00000140a104800 c00000002bd19000
NIP [c00800000790857c] qla2x00_async_adisc_sp_done+0x294/0x2b0 [qla2xxx]
LR [c008000007908578] qla2x00_async_adisc_sp_done+0x290/0x2b0 [qla2xxx]
Call Trace:
[c00000001cdc3620] [c008000007908578] qla2x00_async_adisc_sp_done+0x290/0x2b0 [qla2xxx] (unreliable)
[c00000001cdc3710] [c0080000078f3080] __qla2x00_abort_all_cmds+0x1b8/0x580 [qla2xxx]
[c00000001cdc3840] [c0080000078f589c] qla2x00_abort_all_cmds+0x34/0xd0 [qla2xxx]
[c00000001cdc3880] [c0080000079153d8] qla2x00_abort_isp_cleanup+0x3f0/0x570 [qla2xxx]
[c00000001cdc3920] [c0080000078fb7e8] qla2x00_remove_one+0x3d0/0x480 [qla2xxx]
[c00000001cdc39b0] [c00000000071c274] pci_device_remove+0x64/0x120
[c00000001cdc39f0] [c0000000007fb818] device_release_driver_internal+0x168/0x2a0
[c00000001cdc3a30] [c00000000070e304] pci_stop_bus_device+0xb4/0x100
[c00000001cdc3a70] [c00000000070e4f0] pci_stop_and_remove_bus_device+0x20/0x40
[c00000001cdc3aa0] [c000000000073940] pci_hp_remove_devices+0x90/0x130
[c00000001cdc3b30] [c0080000070704d0] disable_slot+0x38/0x90 [rpaphp] [
c00000001cdc3b60] [c00000000073eb4c] power_write_file+0xcc/0x180
[c00000001cdc3be0] [c0000000007354bc] pci_slot_attr_store+0x3c/0x60
[c00000001cdc3c00] [c00000000055f820] sysfs_kf_write+0x60/0x80 [c00000001cdc3c20]
[c00000000055df10] kernfs_fop_write_iter+0x1a0/0x290
[c00000001cdc3c70] [c000000000447c4c] new_sync_write+0x14c/0x1d0
[c00000001cdc3d10] [c00000000044b134] vfs_write+0x224/0x330
[c00000001cdc3d60] [c00000000044b3f4] ksys_write+0x74/0x130
[c00000001cdc3db0] [c00000000002df70] system_call_exception+0x150/0x2d0
[c00000001cdc3e10] [c00000000000d45c] system_call_common+0xec/0x278
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49158/">CVE-2022-49158 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49158">CVE-2022-49158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238170">SUSE bug 1238170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49160" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49160" ref_url="https://www.suse.com/security/cve/CVE-2022-49160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix crash during module load unload test

During purex packet handling the driver was incorrectly freeing a
pre-allocated structure. Fix this by skipping that entry.

System crashed with the following stack during a module unload test.

Call Trace:
	sbitmap_init_node+0x7f/0x1e0
	sbitmap_queue_init_node+0x24/0x150
	blk_mq_init_bitmaps+0x3d/0xa0
	blk_mq_init_tags+0x68/0x90
	blk_mq_alloc_map_and_rqs+0x44/0x120
	blk_mq_alloc_set_map_and_rqs+0x63/0x150
	blk_mq_alloc_tag_set+0x11b/0x230
	scsi_add_host_with_dma.cold+0x3f/0x245
	qla2x00_probe_one+0xd5a/0x1b80 [qla2xxx]

Call Trace with slub_debug and debug kernel:
	kasan_report_invalid_free+0x50/0x80
	__kasan_slab_free+0x137/0x150
	slab_free_freelist_hook+0xc6/0x190
	kfree+0xe8/0x2e0
	qla2x00_free_device+0x3bb/0x5d0 [qla2xxx]
	qla2x00_remove_one+0x668/0xcf0 [qla2xxx]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49160/">CVE-2022-49160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49160">CVE-2022-49160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238172">SUSE bug 1238172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49175</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49175" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49175" ref_url="https://www.suse.com/security/cve/CVE-2022-49175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: core: keep irq flags in device_pm_check_callbacks()

The function device_pm_check_callbacks() can be called under the spin
lock (in the reported case it happens from genpd_add_device() -&gt;
dev_pm_domain_set(), when the genpd uses spinlocks rather than mutexes.

However this function uncoditionally uses spin_lock_irq() /
spin_unlock_irq(), thus not preserving the CPU flags. Use the
irqsave/irqrestore instead.

The backtrace for the reference:
[    2.752010] ------------[ cut here ]------------
[    2.756769] raw_local_irq_restore() called with IRQs enabled
[    2.762596] WARNING: CPU: 4 PID: 1 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x34/0x50
[    2.772338] Modules linked in:
[    2.775487] CPU: 4 PID: 1 Comm: swapper/0 Tainted: G S                5.17.0-rc6-00384-ge330d0d82eff-dirty #684
[    2.781384] Freeing initrd memory: 46024K
[    2.785839] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    2.785841] pc : warn_bogus_irq_restore+0x34/0x50
[    2.785844] lr : warn_bogus_irq_restore+0x34/0x50
[    2.785846] sp : ffff80000805b7d0
[    2.785847] x29: ffff80000805b7d0 x28: 0000000000000000 x27: 0000000000000002
[    2.785850] x26: ffffd40e80930b18 x25: ffff7ee2329192b8 x24: ffff7edfc9f60800
[    2.785853] x23: ffffd40e80930b18 x22: ffffd40e80930d30 x21: ffff7edfc0dffa00
[    2.785856] x20: ffff7edfc09e3768 x19: 0000000000000000 x18: ffffffffffffffff
[    2.845775] x17: 6572206f74206465 x16: 6c696166203a3030 x15: ffff80008805b4f7
[    2.853108] x14: 0000000000000000 x13: ffffd40e809550b0 x12: 00000000000003d8
[    2.860441] x11: 0000000000000148 x10: ffffd40e809550b0 x9 : ffffd40e809550b0
[    2.867774] x8 : 00000000ffffefff x7 : ffffd40e809ad0b0 x6 : ffffd40e809ad0b0
[    2.875107] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000
[    2.882440] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff7edfc03a8000
[    2.889774] Call trace:
[    2.892290]  warn_bogus_irq_restore+0x34/0x50
[    2.896770]  _raw_spin_unlock_irqrestore+0x94/0xa0
[    2.901690]  genpd_unlock_spin+0x20/0x30
[    2.905724]  genpd_add_device+0x100/0x2d0
[    2.909850]  __genpd_dev_pm_attach+0xa8/0x23c
[    2.914329]  genpd_dev_pm_attach_by_id+0xc4/0x190
[    2.919167]  genpd_dev_pm_attach_by_name+0x3c/0xd0
[    2.924086]  dev_pm_domain_attach_by_name+0x24/0x30
[    2.929102]  psci_dt_attach_cpu+0x24/0x90
[    2.933230]  psci_cpuidle_probe+0x2d4/0x46c
[    2.937534]  platform_probe+0x68/0xe0
[    2.941304]  really_probe.part.0+0x9c/0x2fc
[    2.945605]  __driver_probe_device+0x98/0x144
[    2.950085]  driver_probe_device+0x44/0x15c
[    2.954385]  __device_attach_driver+0xb8/0x120
[    2.958950]  bus_for_each_drv+0x78/0xd0
[    2.962896]  __device_attach+0xd8/0x180
[    2.966843]  device_initial_probe+0x14/0x20
[    2.971144]  bus_probe_device+0x9c/0xa4
[    2.975092]  device_add+0x380/0x88c
[    2.978679]  platform_device_add+0x114/0x234
[    2.983067]  platform_device_register_full+0x100/0x190
[    2.988344]  psci_idle_init+0x6c/0xb0
[    2.992113]  do_one_initcall+0x74/0x3a0
[    2.996060]  kernel_init_freeable+0x2fc/0x384
[    3.000543]  kernel_init+0x28/0x130
[    3.004132]  ret_from_fork+0x10/0x20
[    3.007817] irq event stamp: 319826
[    3.011404] hardirqs last  enabled at (319825): [&lt;ffffd40e7eda0268&gt;] __up_console_sem+0x78/0x84
[    3.020332] hardirqs last disabled at (319826): [&lt;ffffd40e7fd6d9d8&gt;] el1_dbg+0x24/0x8c
[    3.028458] softirqs last  enabled at (318312): [&lt;ffffd40e7ec90410&gt;] _stext+0x410/0x588
[    3.036678] softirqs last disabled at (318299): [&lt;ffffd40e7ed1bf68&gt;] __irq_exit_rcu+0x158/0x174
[    3.045607] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49175/">CVE-2022-49175 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49175">CVE-2022-49175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238099">SUSE bug 1238099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49179" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49179" ref_url="https://www.suse.com/security/cve/CVE-2022-49179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: don't move oom_bfqq

Our test report a UAF:

[ 2073.019181] ==================================================================
[ 2073.019188] BUG: KASAN: use-after-free in __bfq_put_async_bfqq+0xa0/0x168
[ 2073.019191] Write of size 8 at addr ffff8000ccf64128 by task rmmod/72584
[ 2073.019192]
[ 2073.019196] CPU: 0 PID: 72584 Comm: rmmod Kdump: loaded Not tainted 4.19.90-yk #5
[ 2073.019198] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
[ 2073.019200] Call trace:
[ 2073.019203]  dump_backtrace+0x0/0x310
[ 2073.019206]  show_stack+0x28/0x38
[ 2073.019210]  dump_stack+0xec/0x15c
[ 2073.019216]  print_address_description+0x68/0x2d0
[ 2073.019220]  kasan_report+0x238/0x2f0
[ 2073.019224]  __asan_store8+0x88/0xb0
[ 2073.019229]  __bfq_put_async_bfqq+0xa0/0x168
[ 2073.019233]  bfq_put_async_queues+0xbc/0x208
[ 2073.019236]  bfq_pd_offline+0x178/0x238
[ 2073.019240]  blkcg_deactivate_policy+0x1f0/0x420
[ 2073.019244]  bfq_exit_queue+0x128/0x178
[ 2073.019249]  blk_mq_exit_sched+0x12c/0x160
[ 2073.019252]  elevator_exit+0xc8/0xd0
[ 2073.019256]  blk_exit_queue+0x50/0x88
[ 2073.019259]  blk_cleanup_queue+0x228/0x3d8
[ 2073.019267]  null_del_dev+0xfc/0x1e0 [null_blk]
[ 2073.019274]  null_exit+0x90/0x114 [null_blk]
[ 2073.019278]  __arm64_sys_delete_module+0x358/0x5a0
[ 2073.019282]  el0_svc_common+0xc8/0x320
[ 2073.019287]  el0_svc_handler+0xf8/0x160
[ 2073.019290]  el0_svc+0x10/0x218
[ 2073.019291]
[ 2073.019294] Allocated by task 14163:
[ 2073.019301]  kasan_kmalloc+0xe0/0x190
[ 2073.019305]  kmem_cache_alloc_node_trace+0x1cc/0x418
[ 2073.019308]  bfq_pd_alloc+0x54/0x118
[ 2073.019313]  blkcg_activate_policy+0x250/0x460
[ 2073.019317]  bfq_create_group_hierarchy+0x38/0x110
[ 2073.019321]  bfq_init_queue+0x6d0/0x948
[ 2073.019325]  blk_mq_init_sched+0x1d8/0x390
[ 2073.019330]  elevator_switch_mq+0x88/0x170
[ 2073.019334]  elevator_switch+0x140/0x270
[ 2073.019338]  elv_iosched_store+0x1a4/0x2a0
[ 2073.019342]  queue_attr_store+0x90/0xe0
[ 2073.019348]  sysfs_kf_write+0xa8/0xe8
[ 2073.019351]  kernfs_fop_write+0x1f8/0x378
[ 2073.019359]  __vfs_write+0xe0/0x360
[ 2073.019363]  vfs_write+0xf0/0x270
[ 2073.019367]  ksys_write+0xdc/0x1b8
[ 2073.019371]  __arm64_sys_write+0x50/0x60
[ 2073.019375]  el0_svc_common+0xc8/0x320
[ 2073.019380]  el0_svc_handler+0xf8/0x160
[ 2073.019383]  el0_svc+0x10/0x218
[ 2073.019385]
[ 2073.019387] Freed by task 72584:
[ 2073.019391]  __kasan_slab_free+0x120/0x228
[ 2073.019394]  kasan_slab_free+0x10/0x18
[ 2073.019397]  kfree+0x94/0x368
[ 2073.019400]  bfqg_put+0x64/0xb0
[ 2073.019404]  bfqg_and_blkg_put+0x90/0xb0
[ 2073.019408]  bfq_put_queue+0x220/0x228
[ 2073.019413]  __bfq_put_async_bfqq+0x98/0x168
[ 2073.019416]  bfq_put_async_queues+0xbc/0x208
[ 2073.019420]  bfq_pd_offline+0x178/0x238
[ 2073.019424]  blkcg_deactivate_policy+0x1f0/0x420
[ 2073.019429]  bfq_exit_queue+0x128/0x178
[ 2073.019433]  blk_mq_exit_sched+0x12c/0x160
[ 2073.019437]  elevator_exit+0xc8/0xd0
[ 2073.019440]  blk_exit_queue+0x50/0x88
[ 2073.019443]  blk_cleanup_queue+0x228/0x3d8
[ 2073.019451]  null_del_dev+0xfc/0x1e0 [null_blk]
[ 2073.019459]  null_exit+0x90/0x114 [null_blk]
[ 2073.019462]  __arm64_sys_delete_module+0x358/0x5a0
[ 2073.019467]  el0_svc_common+0xc8/0x320
[ 2073.019471]  el0_svc_handler+0xf8/0x160
[ 2073.019474]  el0_svc+0x10/0x218
[ 2073.019475]
[ 2073.019479] The buggy address belongs to the object at ffff8000ccf63f00
 which belongs to the cache kmalloc-1024 of size 1024
[ 2073.019484] The buggy address is located 552 bytes inside of
 1024-byte region [ffff8000ccf63f00, ffff8000ccf64300)
[ 2073.019486] The buggy address belongs to the page:
[ 2073.019492] page:ffff7e000333d800 count:1 mapcount:0 mapping:ffff8000c0003a00 index:0x0 compound_mapcount: 0
[ 2073.020123] flags: 0x7ffff0000008100(slab|head)
[ 2073.020403] raw: 07ffff0000008100 ffff7e0003334c08 ffff7e00001f5a08 ffff8000c0003a00
[ 2073.020409] ra
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49179/">CVE-2022-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49179">CVE-2022-49179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238092">SUSE bug 1238092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49180" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49180" ref_url="https://www.suse.com/security/cve/CVE-2022-49180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

LSM: general protection fault in legacy_parse_param

The usual LSM hook "bail on fail" scheme doesn't work for cases where
a security module may return an error code indicating that it does not
recognize an input.  In this particular case Smack sees a mount option
that it recognizes, and returns 0. A call to a BPF hook follows, which
returns -ENOPARAM, which confuses the caller because Smack has processed
its data.

The SELinux hook incorrectly returns 1 on success. There was a time
when this was correct, however the current expectation is that it
return 0 on success. This is repaired.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49180/">CVE-2022-49180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49180">CVE-2022-49180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238110">SUSE bug 1238110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49188" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49188" ref_url="https://www.suse.com/security/cve/CVE-2022-49188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region

The device_node pointer is returned by of_parse_phandle() or
of_get_child_by_name() with refcount incremented.
We should use of_node_put() on it when done.

This function only call of_node_put(node) when of_address_to_resource
succeeds, missing error cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49188/">CVE-2022-49188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49188">CVE-2022-49188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238138">SUSE bug 1238138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49199" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49199" ref_url="https://www.suse.com/security/cve/CVE-2022-49199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()

This code checks "index" for an upper bound but it does not check for
negatives.  Change the type to unsigned to prevent underflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49199/">CVE-2022-49199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49199">CVE-2022-49199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238234">SUSE bug 1238234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49204" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49204" ref_url="https://www.suse.com/security/cve/CVE-2022-49204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix more uncharged while msg has more_data

In tcp_bpf_send_verdict(), if msg has more data after
tcp_bpf_sendmsg_redir():

tcp_bpf_send_verdict()
 tosend = msg-&gt;sg.size  //msg-&gt;sg.size = 22220
 case __SK_REDIRECT:
  sk_msg_return()  //uncharged msg-&gt;sg.size(22220) sk-&gt;sk_forward_alloc
  tcp_bpf_sendmsg_redir() //after tcp_bpf_sendmsg_redir, msg-&gt;sg.size=11000
 goto more_data;
 tosend = msg-&gt;sg.size  //msg-&gt;sg.size = 11000
 case __SK_REDIRECT:
  sk_msg_return()  //uncharged msg-&gt;sg.size(11000) to sk-&gt;sk_forward_alloc

The msg-&gt;sg.size(11000) has been uncharged twice, to fix we can charge the
remaining msg-&gt;sg.size before goto more data.

This issue can cause the following info:
WARNING: CPU: 0 PID: 9860 at net/core/stream.c:208 sk_stream_kill_queues+0xd4/0x1a0
Call Trace:
 &lt;TASK&gt;
 inet_csk_destroy_sock+0x55/0x110
 __tcp_close+0x279/0x470
 tcp_close+0x1f/0x60
 inet_release+0x3f/0x80
 __sock_release+0x3d/0xb0
 sock_close+0x11/0x20
 __fput+0x92/0x250
 task_work_run+0x6a/0xa0
 do_exit+0x33b/0xb60
 do_group_exit+0x2f/0xa0
 get_signal+0xb6/0x950
 arch_do_signal_or_restart+0xac/0x2a0
 ? vfs_write+0x237/0x290
 exit_to_user_mode_prepare+0xa9/0x200
 syscall_exit_to_user_mode+0x12/0x30
 do_syscall_64+0x46/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
 &lt;/TASK&gt;

WARNING: CPU: 0 PID: 2136 at net/ipv4/af_inet.c:155 inet_sock_destruct+0x13c/0x260
Call Trace:
 &lt;TASK&gt;
 __sk_destruct+0x24/0x1f0
 sk_psock_destroy+0x19b/0x1c0
 process_one_work+0x1b3/0x3c0
 worker_thread+0x30/0x350
 ? process_one_work+0x3c0/0x3c0
 kthread+0xe6/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49204/">CVE-2022-49204 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49204">CVE-2022-49204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238240">SUSE bug 1238240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49205" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49205" ref_url="https://www.suse.com/security/cve/CVE-2022-49205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix double uncharge the mem of sk_msg

If tcp_bpf_sendmsg is running during a tear down operation, psock may be
freed.

tcp_bpf_sendmsg()
 tcp_bpf_send_verdict()
  sk_msg_return()
  tcp_bpf_sendmsg_redir()
   unlikely(!psock))
     sk_msg_free()

The mem of msg has been uncharged in tcp_bpf_send_verdict() by
sk_msg_return(), and would be uncharged by sk_msg_free() again. When psock
is null, we can simply returning an error code, this would then trigger
the sk_msg_free_nocharge in the error path of __SK_REDIRECT and would have
the side effect of throwing an error up to user space. This would be a
slight change in behavior from user side but would look the same as an
error if the redirect on the socket threw an error.

This issue can cause the following info:
WARNING: CPU: 0 PID: 2136 at net/ipv4/af_inet.c:155 inet_sock_destruct+0x13c/0x260
Call Trace:
 &lt;TASK&gt;
 __sk_destruct+0x24/0x1f0
 sk_psock_destroy+0x19b/0x1c0
 process_one_work+0x1b3/0x3c0
 worker_thread+0x30/0x350
 ? process_one_work+0x3c0/0x3c0
 kthread+0xe6/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49205/">CVE-2022-49205 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49205">CVE-2022-49205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238335">SUSE bug 1238335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49207" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49207" ref_url="https://www.suse.com/security/cve/CVE-2022-49207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix memleak in sk_psock_queue_msg

If tcp_bpf_sendmsg is running during a tear down operation we may enqueue
data on the ingress msg queue while tear down is trying to free it.

 sk1 (redirect sk2)                         sk2
 -------------------                      ---------------
tcp_bpf_sendmsg()
 tcp_bpf_send_verdict()
  tcp_bpf_sendmsg_redir()
   bpf_tcp_ingress()
                                          sock_map_close()
                                           lock_sock()
    lock_sock() ... blocking
                                           sk_psock_stop
                                            sk_psock_clear_state(psock, SK_PSOCK_TX_ENABLED);
                                           release_sock(sk);
    lock_sock()
    sk_mem_charge()
    get_page()
    sk_psock_queue_msg()
     sk_psock_test_state(psock, SK_PSOCK_TX_ENABLED);
      drop_sk_msg()
    release_sock()

While drop_sk_msg(), the msg has charged memory form sk by sk_mem_charge
and has sg pages need to put. To fix we use sk_msg_free() and then kfee()
msg.

This issue can cause the following info:
WARNING: CPU: 0 PID: 9202 at net/core/stream.c:205 sk_stream_kill_queues+0xc8/0xe0
Call Trace:
 &lt;IRQ&gt;
 inet_csk_destroy_sock+0x55/0x110
 tcp_rcv_state_process+0xe5f/0xe90
 ? sk_filter_trim_cap+0x10d/0x230
 ? tcp_v4_do_rcv+0x161/0x250
 tcp_v4_do_rcv+0x161/0x250
 tcp_v4_rcv+0xc3a/0xce0
 ip_protocol_deliver_rcu+0x3d/0x230
 ip_local_deliver_finish+0x54/0x60
 ip_local_deliver+0xfd/0x110
 ? ip_protocol_deliver_rcu+0x230/0x230
 ip_rcv+0xd6/0x100
 ? ip_local_deliver+0x110/0x110
 __netif_receive_skb_one_core+0x85/0xa0
 process_backlog+0xa4/0x160
 __napi_poll+0x29/0x1b0
 net_rx_action+0x287/0x300
 __do_softirq+0xff/0x2fc
 do_softirq+0x79/0x90
 &lt;/IRQ&gt;

WARNING: CPU: 0 PID: 531 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x175/0x1b0
Call Trace:
 &lt;TASK&gt;
 __sk_destruct+0x24/0x1f0
 sk_psock_destroy+0x19b/0x1c0
 process_one_work+0x1b3/0x3c0
 ? process_one_work+0x3c0/0x3c0
 worker_thread+0x30/0x350
 ? process_one_work+0x3c0/0x3c0
 kthread+0xe6/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49207/">CVE-2022-49207 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49207">CVE-2022-49207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237962">SUSE bug 1237962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49214" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49214" ref_url="https://www.suse.com/security/cve/CVE-2022-49214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s: Don't use DSISR for SLB faults

Since commit 46ddcb3950a2 ("powerpc/mm: Show if a bad page fault on data
is read or write.") we use page_fault_is_write(regs-&gt;dsisr) in
__bad_page_fault() to determine if the fault is for a read or write, and
change the message printed accordingly.

But SLB faults, aka Data Segment Interrupts, don't set DSISR (Data
Storage Interrupt Status Register) to a useful value. All ISA versions
from v2.03 through v3.1 specify that the Data Segment Interrupt sets
DSISR "to an undefined value". As far as I can see there's no mention of
SLB faults setting DSISR in any BookIV content either.

This manifests as accesses that should be a read being incorrectly
reported as writes, for example, using the xmon "dump" command:

  0:mon&gt; d 0x5deadbeef0000000
  5deadbeef0000000
  [359526.415354][    C6] BUG: Unable to handle kernel data access on write at 0x5deadbeef0000000
  [359526.415611][    C6] Faulting instruction address: 0xc00000000010a300
  cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf400]
      pc: c00000000010a300: mread+0x90/0x190

If we disassemble the PC, we see a load instruction:

  0:mon&gt; di c00000000010a300
  c00000000010a300 89490000      lbz     r10,0(r9)

We can also see in exceptions-64s.S that the data_access_slb block
doesn't set IDSISR=1, which means it doesn't load DSISR into pt_regs. So
the value we're using to determine if the fault is a read/write is some
stale value in pt_regs from a previous page fault.

Rework the printing logic to separate the SLB fault case out, and only
print read/write in the cases where we can determine it.

The result looks like eg:

  0:mon&gt; d 0x5deadbeef0000000
  5deadbeef0000000
  [  721.779525][    C6] BUG: Unable to handle kernel data access at 0x5deadbeef0000000
  [  721.779697][    C6] Faulting instruction address: 0xc00000000014cbe0
  cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf390]

  0:mon&gt; d 0
  0000000000000000
  [  742.793242][    C6] BUG: Kernel NULL pointer dereference at 0x00000000
  [  742.793316][    C6] Faulting instruction address: 0xc00000000014cbe0
  cpu 0x6: Vector: 380 (Data SLB Access) at [c00000000ffbf390]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49214/">CVE-2022-49214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49214">CVE-2022-49214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238003">SUSE bug 1238003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49215" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49215" ref_url="https://www.suse.com/security/cve/CVE-2022-49215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: Fix race at socket teardown

Fix a race in the xsk socket teardown code that can lead to a NULL pointer
dereference splat. The current xsk unbind code in xsk_unbind_dev() starts by
setting xs-&gt;state to XSK_UNBOUND, sets xs-&gt;dev to NULL and then waits for any
NAPI processing to terminate using synchronize_net(). After that, the release
code starts to tear down the socket state and free allocated memory.

  BUG: kernel NULL pointer dereference, address: 00000000000000c0
  PGD 8000000932469067 P4D 8000000932469067 PUD 0
  Oops: 0000 [#1] PREEMPT SMP PTI
  CPU: 25 PID: 69132 Comm: grpcpp_sync_ser Tainted: G          I       5.16.0+ #2
  Hardware name: Dell Inc. PowerEdge R730/0599V5, BIOS 1.2.10 03/09/2015
  RIP: 0010:__xsk_sendmsg+0x2c/0x690
  [...]
  RSP: 0018:ffffa2348bd13d50 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: 0000000000000040 RCX: ffff8d5fc632d258
  RDX: 0000000000400000 RSI: ffffa2348bd13e10 RDI: ffff8d5fc5489800
  RBP: ffffa2348bd13db0 R08: 0000000000000000 R09: 00007ffffffff000
  R10: 0000000000000000 R11: 0000000000000000 R12: ffff8d5fc5489800
  R13: ffff8d5fcb0f5140 R14: ffff8d5fcb0f5140 R15: 0000000000000000
  FS:  00007f991cff9400(0000) GS:ffff8d6f1f700000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00000000000000c0 CR3: 0000000114888005 CR4: 00000000001706e0
  Call Trace:
  &lt;TASK&gt;
  ? aa_sk_perm+0x43/0x1b0
  xsk_sendmsg+0xf0/0x110
  sock_sendmsg+0x65/0x70
  __sys_sendto+0x113/0x190
  ? debug_smp_processor_id+0x17/0x20
  ? fpregs_assert_state_consistent+0x23/0x50
  ? exit_to_user_mode_prepare+0xa5/0x1d0
  __x64_sys_sendto+0x29/0x30
  do_syscall_64+0x3b/0xc0
  entry_SYSCALL_64_after_hwframe+0x44/0xae

There are two problems with the current code. First, setting xs-&gt;dev to NULL
before waiting for all users to stop using the socket is not correct. The
entry to the data plane functions xsk_poll(), xsk_sendmsg(), and xsk_recvmsg()
are all guarded by a test that xs-&gt;state is in the state XSK_BOUND and if not,
it returns right away. But one process might have passed this test but still
have not gotten to the point in which it uses xs-&gt;dev in the code. In this
interim, a second process executing xsk_unbind_dev() might have set xs-&gt;dev to
NULL which will lead to a crash for the first process. The solution here is
just to get rid of this NULL assignment since it is not used anymore. Before
commit 42fddcc7c64b ("xsk: use state member for socket synchronization"),
xs-&gt;dev was the gatekeeper to admit processes into the data plane functions,
but it was replaced with the state variable xs-&gt;state in the aforementioned
commit.

The second problem is that synchronize_net() does not wait for any process in
xsk_poll(), xsk_sendmsg(), or xsk_recvmsg() to complete, which means that the
state they rely on might be cleaned up prematurely. This can happen when the
notifier gets called (at driver unload for example) as it uses xsk_unbind_dev().
Solve this by extending the RCU critical region from just the ndo_xsk_wakeup
to the whole functions mentioned above, so that both the test of xs-&gt;state ==
XSK_BOUND and the last use of any member of xs is covered by the RCU critical
section. This will guarantee that when synchronize_net() completes, there will
be no processes left executing xsk_poll(), xsk_sendmsg(), or xsk_recvmsg() and
state can be cleaned up safely. Note that we need to drop the RCU lock for the
skb xmit path as it uses functions that might sleep. Due to this, we have to
retest the xs-&gt;state after we grab the mutex that protects the skb xmit code
from, among a number of things, an xsk_unbind_dev() being executed from the
notifier at the same time.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49215/">CVE-2022-49215 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49215">CVE-2022-49215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238329">SUSE bug 1238329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49220</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49220" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49220" ref_url="https://www.suse.com/security/cve/CVE-2022-49220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dax: make sure inodes are flushed before destroy cache

A bug can be triggered by following command

$ modprobe nd_pmem &amp;&amp; modprobe -r nd_pmem

[   10.060014] BUG dax_cache (Not tainted): Objects remaining in dax_cache on __kmem_cache_shutdown()
[   10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node)
[   10.062433] Call Trace:
[   10.062673]  dump_stack_lvl+0x34/0x44
[   10.062865]  slab_err+0x90/0xd0
[   10.063619]  __kmem_cache_shutdown+0x13b/0x2f0
[   10.063848]  kmem_cache_destroy+0x4a/0x110
[   10.064058]  __x64_sys_delete_module+0x265/0x300

This is caused by dax_fs_exit() not flushing inodes before destroy cache.
To fix this issue, call rcu_barrier() before destroy cache.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49220/">CVE-2022-49220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49220">CVE-2022-49220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237936">SUSE bug 1237936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49223</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49223" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49223" ref_url="https://www.suse.com/security/cve/CVE-2022-49223" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/port: Hold port reference until decoder release

KASAN + DEBUG_KOBJECT_RELEASE reports a potential use-after-free in
cxl_decoder_release() where it goes to reference its parent, a cxl_port,
to free its id back to port-&gt;decoder_ida.

 BUG: KASAN: use-after-free in to_cxl_port+0x18/0x90 [cxl_core]
 Read of size 8 at addr ffff888119270908 by task kworker/35:2/379

 CPU: 35 PID: 379 Comm: kworker/35:2 Tainted: G           OE     5.17.0-rc2+ #198
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
 Workqueue: events kobject_delayed_cleanup
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x59/0x73
  print_address_description.constprop.0+0x1f/0x150
  ? to_cxl_port+0x18/0x90 [cxl_core]
  kasan_report.cold+0x83/0xdf
  ? to_cxl_port+0x18/0x90 [cxl_core]
  to_cxl_port+0x18/0x90 [cxl_core]
  cxl_decoder_release+0x2a/0x60 [cxl_core]
  device_release+0x5f/0x100
  kobject_cleanup+0x80/0x1c0

The device core only guarantees parent lifetime until all children are
unregistered. If a child needs a parent to complete its -&gt;release()
callback that child needs to hold a reference to extend the lifetime of
the parent.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49223/">CVE-2022-49223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49223">CVE-2022-49223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238340">SUSE bug 1238340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49227</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49227" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49227" ref_url="https://www.suse.com/security/cve/CVE-2022-49227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: avoid kernel warning when changing RX ring parameters

Calling ethtool changing the RX ring parameters like this:

  $ ethtool -G eth0 rx 1024

on igc triggers kernel warnings like this:

[  225.198467] ------------[ cut here ]------------
[  225.198473] Missing unregister, handled but fix driver
[  225.198485] WARNING: CPU: 7 PID: 959 at net/core/xdp.c:168
xdp_rxq_info_reg+0x79/0xd0
[...]
[  225.198601] Call Trace:
[  225.198604]  &lt;TASK&gt;
[  225.198609]  igc_setup_rx_resources+0x3f/0xe0 [igc]
[  225.198617]  igc_ethtool_set_ringparam+0x30e/0x450 [igc]
[  225.198626]  ethnl_set_rings+0x18a/0x250
[  225.198631]  genl_family_rcv_msg_doit+0xca/0x110
[  225.198637]  genl_rcv_msg+0xce/0x1c0
[  225.198640]  ? rings_prepare_data+0x60/0x60
[  225.198644]  ? genl_get_cmd+0xd0/0xd0
[  225.198647]  netlink_rcv_skb+0x4e/0xf0
[  225.198652]  genl_rcv+0x24/0x40
[  225.198655]  netlink_unicast+0x20e/0x330
[  225.198659]  netlink_sendmsg+0x23f/0x480
[  225.198663]  sock_sendmsg+0x5b/0x60
[  225.198667]  __sys_sendto+0xf0/0x160
[  225.198671]  ? handle_mm_fault+0xb2/0x280
[  225.198676]  ? do_user_addr_fault+0x1eb/0x690
[  225.198680]  __x64_sys_sendto+0x20/0x30
[  225.198683]  do_syscall_64+0x38/0x90
[  225.198687]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[  225.198693] RIP: 0033:0x7f7ae38ac3aa

igc_ethtool_set_ringparam() copies the igc_ring structure but neglects to
reset the xdp_rxq_info member before calling igc_setup_rx_resources().
This in turn calls xdp_rxq_info_reg() with an already registered xdp_rxq_info.

Make sure to unregister the xdp_rxq_info structure first in
igc_setup_rx_resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49227/">CVE-2022-49227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49227">CVE-2022-49227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237786">SUSE bug 1237786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49228</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49228" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49228" ref_url="https://www.suse.com/security/cve/CVE-2022-49228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a btf decl_tag bug when tagging a function

syzbot reported a btf decl_tag bug with stack trace below:

  general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
  CPU: 0 PID: 3592 Comm: syz-executor914 Not tainted 5.16.0-syzkaller-11424-gb7892f7d5cb2 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
  RIP: 0010:btf_type_vlen include/linux/btf.h:231 [inline]
  RIP: 0010:btf_decl_tag_resolve+0x83e/0xaa0 kernel/bpf/btf.c:3910
  ...
  Call Trace:
   &lt;TASK&gt;
   btf_resolve+0x251/0x1020 kernel/bpf/btf.c:4198
   btf_check_all_types kernel/bpf/btf.c:4239 [inline]
   btf_parse_type_sec kernel/bpf/btf.c:4280 [inline]
   btf_parse kernel/bpf/btf.c:4513 [inline]
   btf_new_fd+0x19fe/0x2370 kernel/bpf/btf.c:6047
   bpf_btf_load kernel/bpf/syscall.c:4039 [inline]
   __sys_bpf+0x1cbb/0x5970 kernel/bpf/syscall.c:4679
   __do_sys_bpf kernel/bpf/syscall.c:4738 [inline]
   __se_sys_bpf kernel/bpf/syscall.c:4736 [inline]
   __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4736
   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
   do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x44/0xae

The kasan error is triggered with an illegal BTF like below:
   type 0: void
   type 1: int
   type 2: decl_tag to func type 3
   type 3: func to func_proto type 8
The total number of types is 4 and the type 3 is illegal
since its func_proto type is out of range.

Currently, the target type of decl_tag can be struct/union, var or func.
Both struct/union and var implemented their own 'resolve' callback functions
and hence handled properly in kernel.
But func type doesn't have 'resolve' callback function. When
btf_decl_tag_resolve() tries to check func type, it tries to get
vlen of its func_proto type, which triggered the above kasan error.

To fix the issue, btf_decl_tag_resolve() needs to do btf_func_check()
before trying to accessing func_proto type.
In the current implementation, func type is checked with
btf_func_check() in the main checking function btf_check_all_types().
To fix the above kasan issue, let us implement 'resolve' callback
func type properly. The 'resolve' callback will be also called
in btf_check_all_types() for func types.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49228/">CVE-2022-49228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49228">CVE-2022-49228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238344">SUSE bug 1238344</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49229" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49229" ref_url="https://www.suse.com/security/cve/CVE-2022-49229" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: unregister virtual clocks when unregistering physical clock.

When unregistering a physical clock which has some virtual clocks,
unregister the virtual clocks with it.

This fixes the following oops, which can be triggered by unloading
a driver providing a PTP clock when it has enabled virtual clocks:

BUG: unable to handle page fault for address: ffffffffc04fc4d8
Oops: 0000 [#1] PREEMPT SMP NOPTI
RIP: 0010:ptp_vclock_read+0x31/0xb0
Call Trace:
 timecounter_read+0xf/0x50
 ptp_vclock_refresh+0x2c/0x50
 ? ptp_clock_release+0x40/0x40
 ptp_aux_kworker+0x17/0x30
 kthread_worker_fn+0x9b/0x240
 ? kthread_should_park+0x30/0x30
 kthread+0xe2/0x110
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49229/">CVE-2022-49229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49229">CVE-2022-49229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238342">SUSE bug 1238342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49235" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49235" ref_url="https://www.suse.com/security/cve/CVE-2022-49235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath9k_htc: fix uninit value bugs

Syzbot reported 2 KMSAN bugs in ath9k. All of them are caused by missing
field initialization.

In htc_connect_service() svc_meta_len and pad are not initialized. Based
on code it looks like in current skb there is no service data, so simply
initialize svc_meta_len to 0.

htc_issue_send() does not initialize htc_frame_hdr::control array. Based
on firmware code, it will initialize it by itself, so simply zero whole
array to make KMSAN happy

Fail logs:

BUG: KMSAN: kernel-usb-infoleak in usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430
 usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430
 hif_usb_send_regout drivers/net/wireless/ath/ath9k/hif_usb.c:127 [inline]
 hif_usb_send+0x5f0/0x16f0 drivers/net/wireless/ath/ath9k/hif_usb.c:479
 htc_issue_send drivers/net/wireless/ath/ath9k/htc_hst.c:34 [inline]
 htc_connect_service+0x143e/0x1960 drivers/net/wireless/ath/ath9k/htc_hst.c:275
...

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:524 [inline]
 slab_alloc_node mm/slub.c:3251 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1126 [inline]
 htc_connect_service+0x1029/0x1960 drivers/net/wireless/ath/ath9k/htc_hst.c:258
...

Bytes 4-7 of 18 are uninitialized
Memory access of size 18 starts at ffff888027377e00

BUG: KMSAN: kernel-usb-infoleak in usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430
 usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430
 hif_usb_send_regout drivers/net/wireless/ath/ath9k/hif_usb.c:127 [inline]
 hif_usb_send+0x5f0/0x16f0 drivers/net/wireless/ath/ath9k/hif_usb.c:479
 htc_issue_send drivers/net/wireless/ath/ath9k/htc_hst.c:34 [inline]
 htc_connect_service+0x143e/0x1960 drivers/net/wireless/ath/ath9k/htc_hst.c:275
...

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:524 [inline]
 slab_alloc_node mm/slub.c:3251 [inline]
 __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974
 kmalloc_reserve net/core/skbuff.c:354 [inline]
 __alloc_skb+0x545/0xf90 net/core/skbuff.c:426
 alloc_skb include/linux/skbuff.h:1126 [inline]
 htc_connect_service+0x1029/0x1960 drivers/net/wireless/ath/ath9k/htc_hst.c:258
...

Bytes 16-17 of 18 are uninitialized
Memory access of size 18 starts at ffff888027377e00
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49235/">CVE-2022-49235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49235">CVE-2022-49235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238333">SUSE bug 1238333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49236" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49236" ref_url="https://www.suse.com/security/cve/CVE-2022-49236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix UAF due to race between btf_try_get_module and load_module

While working on code to populate kfunc BTF ID sets for module BTF from
its initcall, I noticed that by the time the initcall is invoked, the
module BTF can already be seen by userspace (and the BPF verifier). The
existing btf_try_get_module calls try_module_get which only fails if
mod-&gt;state == MODULE_STATE_GOING, i.e. it can increment module reference
when module initcall is happening in parallel.

Currently, BTF parsing happens from MODULE_STATE_COMING notifier
callback. At this point, the module initcalls have not been invoked.
The notifier callback parses and prepares the module BTF, allocates an
ID, which publishes it to userspace, and then adds it to the btf_modules
list allowing the kernel to invoke btf_try_get_module for the BTF.

However, at this point, the module has not been fully initialized (i.e.
its initcalls have not finished). The code in module.c can still fail
and free the module, without caring for other users. However, nothing
stops btf_try_get_module from succeeding between the state transition
from MODULE_STATE_COMING to MODULE_STATE_LIVE.

This leads to a use-after-free issue when BPF program loads
successfully in the state transition, load_module's do_init_module call
fails and frees the module, and BPF program fd on close calls module_put
for the freed module. Future patch has test case to verify we don't
regress in this area in future.

There are multiple points after prepare_coming_module (in load_module)
where failure can occur and module loading can return error. We
illustrate and test for the race using the last point where it can
practically occur (in module __init function).

An illustration of the race:

CPU 0                           CPU 1
			  load_module
			    notifier_call(MODULE_STATE_COMING)
			      btf_parse_module
			      btf_alloc_id	// Published to userspace
			      list_add(&amp;btf_mod-&gt;list, btf_modules)
			    mod-&gt;init(...)
...				^
bpf_check		        |
check_pseudo_btf_id             |
  btf_try_get_module            |
    returns true                |  ...
...                             |  module __init in progress
return prog_fd                  |  ...
...                             V
			    if (ret &lt; 0)
			      free_module(mod)
			    ...
close(prog_fd)
 ...
 bpf_prog_free_deferred
  module_put(used_btf.mod) // use-after-free

We fix this issue by setting a flag BTF_MODULE_F_LIVE, from the notifier
callback when MODULE_STATE_LIVE state is reached for the module, so that
we return NULL from btf_try_get_module for modules that are not fully
formed. Since try_module_get already checks that module is not in
MODULE_STATE_GOING state, and that is the only transition a live module
can make before being removed from btf_modules list, this is enough to
close the race and prevent the bug.

A later selftest patch crafts the race condition artifically to verify
that it has been fixed, and that verifier fails to load program (with
ENXIO).

Lastly, a couple of comments:

 1. Even if this race didn't exist, it seems more appropriate to only
    access resources (ksyms and kfuncs) of a fully formed module which
    has been initialized completely.

 2. This patch was born out of need for synchronization against module
    initcall for the next patch, so it is needed for correctness even
    without the aforementioned race condition. The BTF resources
    initialized by module initcall are set up once and then only looked
    up, so just waiting until the initcall has finished ensures correct
    behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49236/">CVE-2022-49236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49236">CVE-2022-49236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238120">SUSE bug 1238120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238121">SUSE bug 1238121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49238" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49238" ref_url="https://www.suse.com/security/cve/CVE-2022-49238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855

Commit b4a0f54156ac ("ath11k: move peer delete after vdev stop of station
for QCA6390 and WCN6855") is to fix firmware crash by changing the WMI
command sequence, but actually skip all the peer delete operation, then
it lead commit 58595c9874c6 ("ath11k: Fixing dangling pointer issue upon
peer delete failure") not take effect, and then happened a use-after-free
warning from KASAN. because the peer-&gt;sta is not set to NULL and then used
later.

Change to only skip the WMI_PEER_DELETE_CMDID for QCA6390/WCN6855.

log of user-after-free:

[  534.888665] BUG: KASAN: use-after-free in ath11k_dp_rx_update_peer_stats+0x912/0xc10 [ath11k]
[  534.888696] Read of size 8 at addr ffff8881396bb1b8 by task rtcwake/2860

[  534.888705] CPU: 4 PID: 2860 Comm: rtcwake Kdump: loaded Tainted: G        W         5.15.0-wt-ath+ #523
[  534.888712] Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021
[  534.888716] Call Trace:
[  534.888720]  &lt;IRQ&gt;
[  534.888726]  dump_stack_lvl+0x57/0x7d
[  534.888736]  print_address_description.constprop.0+0x1f/0x170
[  534.888745]  ? ath11k_dp_rx_update_peer_stats+0x912/0xc10 [ath11k]
[  534.888771]  kasan_report.cold+0x83/0xdf
[  534.888783]  ? ath11k_dp_rx_update_peer_stats+0x912/0xc10 [ath11k]
[  534.888810]  ath11k_dp_rx_update_peer_stats+0x912/0xc10 [ath11k]
[  534.888840]  ath11k_dp_rx_process_mon_status+0x529/0xa70 [ath11k]
[  534.888874]  ? ath11k_dp_rx_mon_status_bufs_replenish+0x3f0/0x3f0 [ath11k]
[  534.888897]  ? check_prev_add+0x20f0/0x20f0
[  534.888922]  ? __lock_acquire+0xb72/0x1870
[  534.888937]  ? find_held_lock+0x33/0x110
[  534.888954]  ath11k_dp_rx_process_mon_rings+0x297/0x520 [ath11k]
[  534.888981]  ? rcu_read_unlock+0x40/0x40
[  534.888990]  ? ath11k_dp_rx_pdev_alloc+0xd90/0xd90 [ath11k]
[  534.889026]  ath11k_dp_service_mon_ring+0x67/0xe0 [ath11k]
[  534.889053]  ? ath11k_dp_rx_process_mon_rings+0x520/0x520 [ath11k]
[  534.889075]  call_timer_fn+0x167/0x4a0
[  534.889084]  ? add_timer_on+0x3b0/0x3b0
[  534.889103]  ? lockdep_hardirqs_on_prepare.part.0+0x18c/0x370
[  534.889117]  __run_timers.part.0+0x539/0x8b0
[  534.889123]  ? ath11k_dp_rx_process_mon_rings+0x520/0x520 [ath11k]
[  534.889157]  ? call_timer_fn+0x4a0/0x4a0
[  534.889164]  ? mark_lock_irq+0x1c30/0x1c30
[  534.889173]  ? clockevents_program_event+0xdd/0x280
[  534.889189]  ? mark_held_locks+0xa5/0xe0
[  534.889203]  run_timer_softirq+0x97/0x180
[  534.889213]  __do_softirq+0x276/0x86a
[  534.889230]  __irq_exit_rcu+0x11c/0x180
[  534.889238]  irq_exit_rcu+0x5/0x20
[  534.889244]  sysvec_apic_timer_interrupt+0x8e/0xc0
[  534.889251]  &lt;/IRQ&gt;
[  534.889254]  &lt;TASK&gt;
[  534.889259]  asm_sysvec_apic_timer_interrupt+0x12/0x20
[  534.889265] RIP: 0010:_raw_spin_unlock_irqrestore+0x38/0x70
[  534.889271] Code: 74 24 10 e8 ea c2 bf fd 48 89 ef e8 12 53 c0 fd 81 e3 00 02 00 00 75 25 9c 58 f6 c4 02 75 2d 48 85 db 74 01 fb bf 01 00 00 00 &lt;e8&gt; 13 a7 b5 fd 65 8b 05 cc d9 9c 5e 85 c0 74 0a 5b 5d c3 e8 a0 ee
[  534.889276] RSP: 0018:ffffc90002e5f880 EFLAGS: 00000206
[  534.889284] RAX: 0000000000000006 RBX: 0000000000000200 RCX: ffffffff9f256f10
[  534.889289] RDX: 0000000000000000 RSI: ffffffffa1c6e420 RDI: 0000000000000001
[  534.889293] RBP: ffff8881095e6200 R08: 0000000000000001 R09: ffffffffa40d2b8f
[  534.889298] R10: fffffbfff481a571 R11: 0000000000000001 R12: ffff8881095e6e68
[  534.889302] R13: ffffc90002e5f908 R14: 0000000000000246 R15: 0000000000000000
[  534.889316]  ? mark_lock+0xd0/0x14a0
[  534.889332]  klist_next+0x1d4/0x450
[  534.889340]  ? dpm_wait_for_subordinate+0x2d0/0x2d0
[  534.889350]  device_for_each_child+0xa8/0x140
[  534.889360]  ? device_remove_class_symlinks+0x1b0/0x1b0
[  534.889370]  ? __lock_release+0x4bd/0x9f0
[  534.889378]  ? dpm_suspend+0x26b/0x3f0
[  534.889390]  dpm_wait_for_subordinate+
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49238/">CVE-2022-49238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49238">CVE-2022-49238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238118">SUSE bug 1238118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238119">SUSE bug 1238119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49247</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49247" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49247" ref_url="https://www.suse.com/security/cve/CVE-2022-49247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED

If the callback 'start_streaming' fails, then all
queued buffers in the driver should be returned with
state 'VB2_BUF_STATE_QUEUED'. Currently, they are
returned with 'VB2_BUF_STATE_ERROR' which is wrong.
Fix this. This also fixes the warning:

[   65.583633] WARNING: CPU: 5 PID: 593 at drivers/media/common/videobuf2/videobuf2-core.c:1612 vb2_start_streaming+0xd4/0x160 [videobuf2_common]
[   65.585027] Modules linked in: snd_usb_audio snd_hwdep snd_usbmidi_lib snd_rawmidi snd_soc_hdmi_codec dw_hdmi_i2s_audio saa7115 stk1160 videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common videodev mc crct10dif_ce panfrost snd_soc_simple_card snd_soc_audio_graph_card snd_soc_spdif_tx snd_soc_simple_card_utils gpu_sched phy_rockchip_pcie snd_soc_rockchip_i2s rockchipdrm analogix_dp dw_mipi_dsi dw_hdmi cec drm_kms_helper drm rtc_rk808 rockchip_saradc industrialio_triggered_buffer kfifo_buf rockchip_thermal pcie_rockchip_host ip_tables x_tables ipv6
[   65.589383] CPU: 5 PID: 593 Comm: v4l2src0:src Tainted: G        W         5.16.0-rc4-62408-g32447129cb30-dirty #14
[   65.590293] Hardware name: Radxa ROCK Pi 4B (DT)
[   65.590696] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   65.591304] pc : vb2_start_streaming+0xd4/0x160 [videobuf2_common]
[   65.591850] lr : vb2_start_streaming+0x6c/0x160 [videobuf2_common]
[   65.592395] sp : ffff800012bc3ad0
[   65.592685] x29: ffff800012bc3ad0 x28: 0000000000000000 x27: ffff800012bc3cd8
[   65.593312] x26: 0000000000000000 x25: ffff00000d8a7800 x24: 0000000040045612
[   65.593938] x23: ffff800011323000 x22: ffff800012bc3cd8 x21: ffff00000908a8b0
[   65.594562] x20: ffff00000908a8c8 x19: 00000000fffffff4 x18: ffffffffffffffff
[   65.595188] x17: 000000040044ffff x16: 00400034b5503510 x15: ffff800011323f78
[   65.595813] x14: ffff000013163886 x13: ffff000013163885 x12: 00000000000002ce
[   65.596439] x11: 0000000000000028 x10: 0000000000000001 x9 : 0000000000000228
[   65.597064] x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff726c5e78
[   65.597690] x5 : ffff800012bc3990 x4 : 0000000000000000 x3 : ffff000009a34880
[   65.598315] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000007cd99f0
[   65.598940] Call trace:
[   65.599155]  vb2_start_streaming+0xd4/0x160 [videobuf2_common]
[   65.599672]  vb2_core_streamon+0x17c/0x1a8 [videobuf2_common]
[   65.600179]  vb2_streamon+0x54/0x88 [videobuf2_v4l2]
[   65.600619]  vb2_ioctl_streamon+0x54/0x60 [videobuf2_v4l2]
[   65.601103]  v4l_streamon+0x3c/0x50 [videodev]
[   65.601521]  __video_do_ioctl+0x1a4/0x428 [videodev]
[   65.601977]  video_usercopy+0x320/0x828 [videodev]
[   65.602419]  video_ioctl2+0x3c/0x58 [videodev]
[   65.602830]  v4l2_ioctl+0x60/0x90 [videodev]
[   65.603227]  __arm64_sys_ioctl+0xa8/0xe0
[   65.603576]  invoke_syscall+0x54/0x118
[   65.603911]  el0_svc_common.constprop.3+0x84/0x100
[   65.604332]  do_el0_svc+0x34/0xa0
[   65.604625]  el0_svc+0x1c/0x50
[   65.604897]  el0t_64_sync_handler+0x88/0xb0
[   65.605264]  el0t_64_sync+0x16c/0x170
[   65.605587] ---[ end trace 578e0ba07742170d ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49247/">CVE-2022-49247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49247">CVE-2022-49247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237783">SUSE bug 1237783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49253</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49253" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49253" ref_url="https://www.suse.com/security/cve/CVE-2022-49253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: usb: go7007: s2250-board: fix leak in probe()

Call i2c_unregister_device(audio) on this error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49253/">CVE-2022-49253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49253">CVE-2022-49253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238420">SUSE bug 1238420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49256</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49256" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49256" ref_url="https://www.suse.com/security/cve/CVE-2022-49256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watch_queue: Actually free the watch

free_watch() does everything barring actually freeing the watch object.  Fix
this by adding the missing kfree.

kmemleak produces a report something like the following.  Note that as an
address can be seen in the first word, the watch would appear to have gone
through call_rcu().

BUG: memory leak
unreferenced object 0xffff88810ce4a200 (size 96):
  comm "syz-executor352", pid 3605, jiffies 4294947473 (age 13.720s)
  hex dump (first 32 bytes):
    e0 82 48 0d 81 88 ff ff 00 00 00 00 00 00 00 00  ..H.............
    80 a2 e4 0c 81 88 ff ff 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff8214e6cc&gt;] kmalloc include/linux/slab.h:581 [inline]
    [&lt;ffffffff8214e6cc&gt;] kzalloc include/linux/slab.h:714 [inline]
    [&lt;ffffffff8214e6cc&gt;] keyctl_watch_key+0xec/0x2e0 security/keys/keyctl.c:1800
    [&lt;ffffffff8214ec84&gt;] __do_sys_keyctl+0x3c4/0x490 security/keys/keyctl.c:2016
    [&lt;ffffffff84493a25&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff84493a25&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff84600068&gt;] entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49256/">CVE-2022-49256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49256">CVE-2022-49256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238277">SUSE bug 1238277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49257</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49257" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49257" ref_url="https://www.suse.com/security/cve/CVE-2022-49257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watch_queue: Fix NULL dereference in error cleanup

In watch_queue_set_size(), the error cleanup code doesn't take account of
the fact that __free_page() can't handle a NULL pointer when trying to free
up buffer pages that did get allocated.

Fix this by only calling __free_page() on the pages actually allocated.

Without the fix, this can lead to something like the following:

BUG: KASAN: null-ptr-deref in __free_pages+0x1f/0x1b0 mm/page_alloc.c:5473
Read of size 4 at addr 0000000000000034 by task syz-executor168/3599
...
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 __kasan_report mm/kasan/report.c:446 [inline]
 kasan_report.cold+0x66/0xdf mm/kasan/report.c:459
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0x13d/0x180 mm/kasan/generic.c:189
 instrument_atomic_read include/linux/instrumented.h:71 [inline]
 atomic_read include/linux/atomic/atomic-instrumented.h:27 [inline]
 page_ref_count include/linux/page_ref.h:67 [inline]
 put_page_testzero include/linux/mm.h:717 [inline]
 __free_pages+0x1f/0x1b0 mm/page_alloc.c:5473
 watch_queue_set_size+0x499/0x630 kernel/watch_queue.c:275
 pipe_ioctl+0xac/0x2b0 fs/pipe.c:632
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49257/">CVE-2022-49257 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49257">CVE-2022-49257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237987">SUSE bug 1237987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49259</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49259" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49259" ref_url="https://www.suse.com/security/cve/CVE-2022-49259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: don't delete queue kobject before its children

kobjects aren't supposed to be deleted before their child kobjects are
deleted.  Apparently this is usually benign; however, a WARN will be
triggered if one of the child kobjects has a named attribute group:

    sysfs group 'modes' not found for kobject 'crypto'
    WARNING: CPU: 0 PID: 1 at fs/sysfs/group.c:278 sysfs_remove_group+0x72/0x80
    ...
    Call Trace:
      sysfs_remove_groups+0x29/0x40 fs/sysfs/group.c:312
      __kobject_del+0x20/0x80 lib/kobject.c:611
      kobject_cleanup+0xa4/0x140 lib/kobject.c:696
      kobject_release lib/kobject.c:736 [inline]
      kref_put include/linux/kref.h:65 [inline]
      kobject_put+0x53/0x70 lib/kobject.c:753
      blk_crypto_sysfs_unregister+0x10/0x20 block/blk-crypto-sysfs.c:159
      blk_unregister_queue+0xb0/0x110 block/blk-sysfs.c:962
      del_gendisk+0x117/0x250 block/genhd.c:610

Fix this by moving the kobject_del() and the corresponding
kobject_uevent() to the correct place.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49259/">CVE-2022-49259 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49259">CVE-2022-49259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238413">SUSE bug 1238413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49263" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49263" ref_url="https://www.suse.com/security/cve/CVE-2022-49263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path

This avoids leaking memory if brcmf_chip_get_raminfo fails. Note that
the CLM blob is released in the device remove path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49263/">CVE-2022-49263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49263">CVE-2022-49263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238267">SUSE bug 1238267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49264</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49264" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49264" ref_url="https://www.suse.com/security/cve/CVE-2022-49264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exec: Force single empty string when argv is empty

Quoting[1] Ariadne Conill:

"In several other operating systems, it is a hard requirement that the
second argument to execve(2) be the name of a program, thus prohibiting
a scenario where argc &lt; 1. POSIX 2017 also recommends this behaviour,
but it is not an explicit requirement[2]:

    The argument arg0 should point to a filename string that is
    associated with the process being started by one of the exec
    functions.
...
Interestingly, Michael Kerrisk opened an issue about this in 2008[3],
but there was no consensus to support fixing this issue then.
Hopefully now that CVE-2021-4034 shows practical exploitative use[4]
of this bug in a shellcode, we can reconsider.

This issue is being tracked in the KSPP issue tracker[5]."

While the initial code searches[6][7] turned up what appeared to be
mostly corner case tests, trying to that just reject argv == NULL
(or an immediately terminated pointer list) quickly started tripping[8]
existing userspace programs.

The next best approach is forcing a single empty string into argv and
adjusting argc to match. The number of programs depending on argc == 0
seems a smaller set than those calling execve with a NULL argv.

Account for the additional stack space in bprm_stack_limits(). Inject an
empty string when argc == 0 (and set argc = 1). Warn about the case so
userspace has some notice about the change:

    process './argc0' launched './argc0' with NULL argv: empty string added

Additionally WARN() and reject NULL argv usage for kernel threads.

[1] https://lore.kernel.org/lkml/20220127000724.15106-1-ariadne@dereferenced.org/
[2] https://pubs.opengroup.org/onlinepubs/9699919799/functions/exec.html
[3] https://bugzilla.kernel.org/show_bug.cgi?id=8408
[4] https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
[5] https://github.com/KSPP/linux/issues/176
[6] https://codesearch.debian.net/search?q=execve%5C+*%5C%28%5B%5E%2C%5D%2B%2C+*NULL&amp;literal=0
[7] https://codesearch.debian.net/search?q=execlp%3F%5Cs*%5C%28%5B%5E%2C%5D%2B%2C%5Cs*NULL&amp;literal=0
[8] https://lore.kernel.org/lkml/20220131144352.GE16385@xsang-OptiPlex-9020/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49264/">CVE-2022-49264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49264">CVE-2022-49264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237815">SUSE bug 1237815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49265" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49265" ref_url="https://www.suse.com/security/cve/CVE-2022-49265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()

When a genpd with GENPD_FLAG_IRQ_SAFE gets removed, the following
sleep-in-atomic bug will be seen, as genpd_debug_remove() will be called
with a spinlock being held.

[    0.029183] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1460
[    0.029204] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 1, name: swapper/0
[    0.029219] preempt_count: 1, expected: 0
[    0.029230] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.17.0-rc4+ #489
[    0.029245] Hardware name: Thundercomm TurboX CM2290 (DT)
[    0.029256] Call trace:
[    0.029265]  dump_backtrace.part.0+0xbc/0xd0
[    0.029285]  show_stack+0x3c/0xa0
[    0.029298]  dump_stack_lvl+0x7c/0xa0
[    0.029311]  dump_stack+0x18/0x34
[    0.029323]  __might_resched+0x10c/0x13c
[    0.029338]  __might_sleep+0x4c/0x80
[    0.029351]  down_read+0x24/0xd0
[    0.029363]  lookup_one_len_unlocked+0x9c/0xcc
[    0.029379]  lookup_positive_unlocked+0x10/0x50
[    0.029392]  debugfs_lookup+0x68/0xac
[    0.029406]  genpd_remove.part.0+0x12c/0x1b4
[    0.029419]  of_genpd_remove_last+0xa8/0xd4
[    0.029434]  psci_cpuidle_domain_probe+0x174/0x53c
[    0.029449]  platform_probe+0x68/0xe0
[    0.029462]  really_probe+0x190/0x430
[    0.029473]  __driver_probe_device+0x90/0x18c
[    0.029485]  driver_probe_device+0x40/0xe0
[    0.029497]  __driver_attach+0xf4/0x1d0
[    0.029508]  bus_for_each_dev+0x70/0xd0
[    0.029523]  driver_attach+0x24/0x30
[    0.029534]  bus_add_driver+0x164/0x22c
[    0.029545]  driver_register+0x78/0x130
[    0.029556]  __platform_driver_register+0x28/0x34
[    0.029569]  psci_idle_init_domains+0x1c/0x28
[    0.029583]  do_one_initcall+0x50/0x1b0
[    0.029595]  kernel_init_freeable+0x214/0x280
[    0.029609]  kernel_init+0x2c/0x13c
[    0.029622]  ret_from_fork+0x10/0x20

It doesn't seem necessary to call genpd_debug_remove() with the lock, so
move it out from locking to fix the problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49265/">CVE-2022-49265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49265">CVE-2022-49265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238432">SUSE bug 1238432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49268</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49268" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49268" ref_url="https://www.suse.com/security/cve/CVE-2022-49268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM

Do not call snd_dma_free_pages() when snd_dma_alloc_pages() returns
-ENOMEM because it leads to a NULL pointer dereference bug.

The dmesg says:

  [ T1387] sof-audio-pci-intel-tgl 0000:00:1f.3: error: memory alloc failed: -12
  [ T1387] BUG: kernel NULL pointer dereference, address: 0000000000000000
  [ T1387] #PF: supervisor read access in kernel mode
  [ T1387] #PF: error_code(0x0000) - not-present page
  [ T1387] PGD 0 P4D 0
  [ T1387] Oops: 0000 [#1] PREEMPT SMP NOPTI
  [ T1387] CPU: 6 PID: 1387 Comm: alsa-sink-HDA A Tainted: G        W         5.17.0-rc4-superb-owl-00055-g80d47f5de5e3
  [ T1387] Hardware name: HP HP Laptop 14s-dq2xxx/87FD, BIOS F.15 09/15/2021
  [ T1387] RIP: 0010:dma_free_noncontiguous+0x37/0x80
  [ T1387] Code: [... snip ...]
  [ T1387] RSP: 0000:ffffc90002b87770 EFLAGS: 00010246
  [ T1387] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
  [ T1387] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888101db30d0
  [ T1387] RBP: 00000000fffffff4 R08: 0000000000000000 R09: 0000000000000000
  [ T1387] R10: 0000000000000000 R11: ffffc90002b874d0 R12: 0000000000000001
  [ T1387] R13: 0000000000058000 R14: ffff888105260c68 R15: ffff888105260828
  [ T1387] FS:  00007f42e2ffd640(0000) GS:ffff888466b80000(0000) knlGS:0000000000000000
  [ T1387] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [ T1387] CR2: 0000000000000000 CR3: 000000014acf0003 CR4: 0000000000770ee0
  [ T1387] PKRU: 55555554
  [ T1387] Call Trace:
  [ T1387]  &lt;TASK&gt;
  [ T1387]  cl_stream_prepare+0x10a/0x120 [snd_sof_intel_hda_common 146addf995b9279ae7f509621078cccbe4f875e1]
  [... snip ...]
  [ T1387]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49268/">CVE-2022-49268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49268">CVE-2022-49268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238090">SUSE bug 1238090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49269" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49269" ref_url="https://www.suse.com/security/cve/CVE-2022-49269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: isotp: sanitize CAN ID checks in isotp_bind()

Syzbot created an environment that lead to a state machine status that
can not be reached with a compliant CAN ID address configuration.
The provided address information consisted of CAN ID 0x6000001 and 0xC28001
which both boil down to 11 bit CAN IDs 0x001 in sending and receiving.

Sanitize the SFF/EFF CAN ID values before performing the address checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49269/">CVE-2022-49269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49269">CVE-2022-49269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238533">SUSE bug 1238533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49270</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49270" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49270" ref_url="https://www.suse.com/security/cve/CVE-2022-49270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix use-after-free in dm_cleanup_zoned_dev()

dm_cleanup_zoned_dev() uses queue, so it must be called
before blk_cleanup_disk() starts its killing:

blk_cleanup_disk-&gt;blk_cleanup_queue()-&gt;kobject_put()-&gt;blk_release_queue()-&gt;
-&gt;...RCU...-&gt;blk_free_queue_rcu()-&gt;kmem_cache_free()

Otherwise, RCU callback may be executed first and
dm_cleanup_zoned_dev() will touch free'd memory:

 BUG: KASAN: use-after-free in dm_cleanup_zoned_dev+0x33/0xd0
 Read of size 8 at addr ffff88805ac6e430 by task dmsetup/681

 CPU: 4 PID: 681 Comm: dmsetup Not tainted 5.17.0-rc2+ #6
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x57/0x7d
  print_address_description.constprop.0+0x1f/0x150
  ? dm_cleanup_zoned_dev+0x33/0xd0
  kasan_report.cold+0x7f/0x11b
  ? dm_cleanup_zoned_dev+0x33/0xd0
  dm_cleanup_zoned_dev+0x33/0xd0
  __dm_destroy+0x26a/0x400
  ? dm_blk_ioctl+0x230/0x230
  ? up_write+0xd8/0x270
  dev_remove+0x156/0x1d0
  ctl_ioctl+0x269/0x530
  ? table_clear+0x140/0x140
  ? lock_release+0xb2/0x750
  ? remove_all+0x40/0x40
  ? rcu_read_lock_sched_held+0x12/0x70
  ? lock_downgrade+0x3c0/0x3c0
  ? rcu_read_lock_sched_held+0x12/0x70
  dm_ctl_ioctl+0xa/0x10
  __x64_sys_ioctl+0xb9/0xf0
  do_syscall_64+0x3b/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7fb6dfa95c27
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49270/">CVE-2022-49270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49270">CVE-2022-49270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238459">SUSE bug 1238459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238460">SUSE bug 1238460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49272" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49272" ref_url="https://www.suse.com/security/cve/CVE-2022-49272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024056.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock

syzbot caught a potential deadlock between the PCM
runtime-&gt;buffer_mutex and the mm-&gt;mmap_lock.  It was brought by the
recent fix to cover the racy read/write and other ioctls, and in that
commit, I overlooked a (hopefully only) corner case that may take the
revert lock, namely, the OSS mmap.  The OSS mmap operation
exceptionally allows to re-configure the parameters inside the OSS
mmap syscall, where mm-&gt;mmap_mutex is already held.  Meanwhile, the
copy_from/to_user calls at read/write operations also take the
mm-&gt;mmap_lock internally, hence it may lead to a AB/BA deadlock.

A similar problem was already seen in the past and we fixed it with a
refcount (in commit b248371628aa).  The former fix covered only the
call paths with OSS read/write and OSS ioctls, while we need to cover
the concurrent access via both ALSA and OSS APIs now.

This patch addresses the problem above by replacing the buffer_mutex
lock in the read/write operations with a refcount similar as we've
used for OSS.  The new field, runtime-&gt;buffer_accessing, keeps the
number of concurrent read/write operations.  Unlike the former
buffer_mutex protection, this protects only around the
copy_from/to_user() calls; the other codes are basically protected by
the PCM stream lock.  The refcount can be a negative, meaning blocked
by the ioctls.  If a negative value is seen, the read/write aborts
with -EBUSY.  In the ioctl side, OTOH, they check this refcount, too,
and set to a negative value for blocking unless it's already being
accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49272/">CVE-2022-49272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49272">CVE-2022-49272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238272">SUSE bug 1238272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49273" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49273" ref_url="https://www.suse.com/security/cve/CVE-2022-49273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtc: pl031: fix rtc features null pointer dereference

When there is no interrupt line, rtc alarm feature is disabled.

The clearing of the alarm feature bit was being done prior to allocations
of ldata-&gt;rtc device, resulting in a null pointer dereference.

Clear RTC_FEATURE_ALARM after the rtc device is allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49273/">CVE-2022-49273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49273">CVE-2022-49273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238140">SUSE bug 1238140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49275" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49275" ref_url="https://www.suse.com/security/cve/CVE-2022-49275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: m_can: m_can_tx_handler(): fix use after free of skb

can_put_echo_skb() will clone skb then free the skb. Move the
can_put_echo_skb() for the m_can version 3.0.x directly before the
start of the xmit in hardware, similar to the 3.1.x branch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49275/">CVE-2022-49275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49275">CVE-2022-49275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238719">SUSE bug 1238719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238720">SUSE bug 1238720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49281" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49281" ref_url="https://www.suse.com/security/cve/CVE-2022-49281" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix handlecache and multiuser

In multiuser each individual user has their own tcon structure for the
share and thus their own handle for a cached directory.
When we umount such a share we much make sure to release the pinned down dentry
for each such tcon and not just the master tcon.

Otherwise we will get nasty warnings on umount that dentries are still in use:
[ 3459.590047] BUG: Dentry 00000000115c6f41{i=12000000019d95,n=/}  still in use\
 (2) [unmount of cifs cifs]
...
[ 3459.590492] Call Trace:
[ 3459.590500]  d_walk+0x61/0x2a0
[ 3459.590518]  ? shrink_lock_dentry.part.0+0xe0/0xe0
[ 3459.590526]  shrink_dcache_for_umount+0x49/0x110
[ 3459.590535]  generic_shutdown_super+0x1a/0x110
[ 3459.590542]  kill_anon_super+0x14/0x30
[ 3459.590549]  cifs_kill_sb+0xf5/0x104 [cifs]
[ 3459.590773]  deactivate_locked_super+0x36/0xa0
[ 3459.590782]  cleanup_mnt+0x131/0x190
[ 3459.590789]  task_work_run+0x5c/0x90
[ 3459.590798]  exit_to_user_mode_loop+0x151/0x160
[ 3459.590809]  exit_to_user_mode_prepare+0x83/0xd0
[ 3459.590818]  syscall_exit_to_user_mode+0x12/0x30
[ 3459.590828]  do_syscall_64+0x48/0x90
[ 3459.590833]  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49281/">CVE-2022-49281 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49281">CVE-2022-49281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238635">SUSE bug 1238635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49283" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49283" ref_url="https://www.suse.com/security/cve/CVE-2022-49283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: sysfb: fix platform-device leak in error path

Make sure to free the platform device also in the unlikely event that
registration fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49283/">CVE-2022-49283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49283">CVE-2022-49283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238012">SUSE bug 1238012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49287" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49287" ref_url="https://www.suse.com/security/cve/CVE-2022-49287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: fix reference counting for struct tpm_chip

The following sequence of operations results in a refcount warning:

1. Open device /dev/tpmrm.
2. Remove module tpm_tis_spi.
3. Write a TPM command to the file descriptor opened at step 1.

------------[ cut here ]------------
WARNING: CPU: 3 PID: 1161 at lib/refcount.c:25 kobject_get+0xa0/0xa4
refcount_t: addition on 0; use-after-free.
Modules linked in: tpm_tis_spi tpm_tis_core tpm mdio_bcm_unimac brcmfmac
sha256_generic libsha256 sha256_arm hci_uart btbcm bluetooth cfg80211 vc4
brcmutil ecdh_generic ecc snd_soc_core crc32_arm_ce libaes
raspberrypi_hwmon ac97_bus snd_pcm_dmaengine bcm2711_thermal snd_pcm
snd_timer genet snd phy_generic soundcore [last unloaded: spi_bcm2835]
CPU: 3 PID: 1161 Comm: hold_open Not tainted 5.10.0ls-main-dirty #2
Hardware name: BCM2711
[&lt;c0410c3c&gt;] (unwind_backtrace) from [&lt;c040b580&gt;] (show_stack+0x10/0x14)
[&lt;c040b580&gt;] (show_stack) from [&lt;c1092174&gt;] (dump_stack+0xc4/0xd8)
[&lt;c1092174&gt;] (dump_stack) from [&lt;c0445a30&gt;] (__warn+0x104/0x108)
[&lt;c0445a30&gt;] (__warn) from [&lt;c0445aa8&gt;] (warn_slowpath_fmt+0x74/0xb8)
[&lt;c0445aa8&gt;] (warn_slowpath_fmt) from [&lt;c08435d0&gt;] (kobject_get+0xa0/0xa4)
[&lt;c08435d0&gt;] (kobject_get) from [&lt;bf0a715c&gt;] (tpm_try_get_ops+0x14/0x54 [tpm])
[&lt;bf0a715c&gt;] (tpm_try_get_ops [tpm]) from [&lt;bf0a7d6c&gt;] (tpm_common_write+0x38/0x60 [tpm])
[&lt;bf0a7d6c&gt;] (tpm_common_write [tpm]) from [&lt;c05a7ac0&gt;] (vfs_write+0xc4/0x3c0)
[&lt;c05a7ac0&gt;] (vfs_write) from [&lt;c05a7ee4&gt;] (ksys_write+0x58/0xcc)
[&lt;c05a7ee4&gt;] (ksys_write) from [&lt;c04001a0&gt;] (ret_fast_syscall+0x0/0x4c)
Exception stack(0xc226bfa8 to 0xc226bff0)
bfa0:                   00000000 000105b4 00000003 beafe664 00000014 00000000
bfc0: 00000000 000105b4 000103f8 00000004 00000000 00000000 b6f9c000 beafe684
bfe0: 0000006c beafe648 0001056c b6eb6944
---[ end trace d4b8409def9b8b1f ]---

The reason for this warning is the attempt to get the chip-&gt;dev reference
in tpm_common_write() although the reference counter is already zero.

Since commit 8979b02aaf1d ("tpm: Fix reference count to main device") the
extra reference used to prevent a premature zero counter is never taken,
because the required TPM_CHIP_FLAG_TPM2 flag is never set.

Fix this by moving the TPM 2 character device handling from
tpm_chip_alloc() to tpm_add_char_device() which is called at a later point
in time when the flag has been set in case of TPM2.

Commit fdc915f7f719 ("tpm: expose spaces via a device link /dev/tpmrm&lt;n&gt;")
already introduced function tpm_devs_release() to release the extra
reference but did not implement the required put on chip-&gt;devs that results
in the call of this function.

Fix this by putting chip-&gt;devs in tpm_chip_unregister().

Finally move the new implementation for the TPM 2 handling into a new
function to avoid multiple checks for the TPM_CHIP_FLAG_TPM2 flag in the
good case and error cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49287/">CVE-2022-49287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49287">CVE-2022-49287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238276">SUSE bug 1238276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49288</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49288" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49288" ref_url="https://www.suse.com/security/cve/CVE-2022-49288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024056.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Fix races among concurrent prealloc proc writes

We have no protection against concurrent PCM buffer preallocation
changes via proc files, and it may potentially lead to UAF or some
weird problem.  This patch applies the PCM open_mutex to the proc
write operation for avoiding the racy proc writes and the PCM stream
open (and further operations).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49288/">CVE-2022-49288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49288">CVE-2022-49288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238271">SUSE bug 1238271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49290</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49290" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49290" ref_url="https://www.suse.com/security/cve/CVE-2022-49290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac80211: fix potential double free on mesh join

While commit 6a01afcf8468 ("mac80211: mesh: Free ie data when leaving
mesh") fixed a memory leak on mesh leave / teardown it introduced a
potential memory corruption caused by a double free when rejoining the
mesh:

  ieee80211_leave_mesh()
  -&gt; kfree(sdata-&gt;u.mesh.ie);
  ...
  ieee80211_join_mesh()
  -&gt; copy_mesh_setup()
     -&gt; old_ie = ifmsh-&gt;ie;
     -&gt; kfree(old_ie);

This double free / kernel panics can be reproduced by using wpa_supplicant
with an encrypted mesh (if set up without encryption via "iw" then
ifmsh-&gt;ie is always NULL, which avoids this issue). And then calling:

  $ iw dev mesh0 mesh leave
  $ iw dev mesh0 mesh join my-mesh

Note that typically these commands are not used / working when using
wpa_supplicant. And it seems that wpa_supplicant or wpa_cli are going
through a NETDEV_DOWN/NETDEV_UP cycle between a mesh leave and mesh join
where the NETDEV_UP resets the mesh.ie to NULL via a memcpy of
default_mesh_setup in cfg80211_netdev_notifier_call, which then avoids
the memory corruption, too.

The issue was first observed in an application which was not using
wpa_supplicant but "Senf" instead, which implements its own calls to
nl80211.

Fixing the issue by removing the kfree()'ing of the mesh IE in the mesh
join function and leaving it solely up to the mesh leave to free the
mesh IE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49290/">CVE-2022-49290 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49290">CVE-2022-49290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238156">SUSE bug 1238156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49291" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49291" ref_url="https://www.suse.com/security/cve/CVE-2022-49291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024056.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Fix races among concurrent hw_params and hw_free calls

Currently we have neither proper check nor protection against the
concurrent calls of PCM hw_params and hw_free ioctls, which may result
in a UAF.  Since the existing PCM stream lock can't be used for
protecting the whole ioctl operations, we need a new mutex to protect
those racy calls.

This patch introduced a new mutex, runtime-&gt;buffer_mutex, and applies
it to both hw_params and hw_free ioctl code paths.  Along with it, the
both functions are slightly modified (the mmap_count check is moved
into the state-check block) for code simplicity.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49291/">CVE-2022-49291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49291">CVE-2022-49291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238705">SUSE bug 1238705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238706">SUSE bug 1238706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49292</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49292" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49292" ref_url="https://www.suse.com/security/cve/CVE-2022-49292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: oss: Fix PCM OSS buffer allocation overflow

We've got syzbot reports hitting INT_MAX overflow at vmalloc()
allocation that is called from snd_pcm_plug_alloc().  Although we
apply the restrictions to input parameters, it's based only on the
hw_params of the underlying PCM device.  Since the PCM OSS layer
allocates a temporary buffer for the data conversion, the size may
become unexpectedly large when more channels or higher rates is given;
in the reported case, it went over INT_MAX, hence it hits WARN_ON().

This patch is an attempt to avoid such an overflow and an allocation
for too large buffers.  First off, it adds the limit of 1MB as the
upper bound for period bytes.  This must be large enough for all use
cases, and we really don't want to handle a larger temporary buffer
than this size.  The size check is performed at two places, where the
original period bytes is calculated and where the plugin buffer size
is calculated.

In addition, the driver uses array_size() and array3_size() for
multiplications to catch overflows for the converted period size and
buffer bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49292/">CVE-2022-49292 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49292">CVE-2022-49292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238625">SUSE bug 1238625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49294" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49294" ref_url="https://www.suse.com/security/cve/CVE-2022-49294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check if modulo is 0 before dividing.

[How &amp; Why]
If a value of 0 is read, then this will cause a divide-by-0 panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49294/">CVE-2022-49294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49294">CVE-2022-49294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238147">SUSE bug 1238147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49297</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49297" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49297" ref_url="https://www.suse.com/security/cve/CVE-2022-49297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: fix io hung while disconnecting device

In our tests, "qemu-nbd" triggers a io hung:

INFO: task qemu-nbd:11445 blocked for more than 368 seconds.
      Not tainted 5.18.0-rc3-next-20220422-00003-g2176915513ca #884
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:qemu-nbd        state:D stack:    0 pid:11445 ppid:     1 flags:0x00000000
Call Trace:
 &lt;TASK&gt;
 __schedule+0x480/0x1050
 ? _raw_spin_lock_irqsave+0x3e/0xb0
 schedule+0x9c/0x1b0
 blk_mq_freeze_queue_wait+0x9d/0xf0
 ? ipi_rseq+0x70/0x70
 blk_mq_freeze_queue+0x2b/0x40
 nbd_add_socket+0x6b/0x270 [nbd]
 nbd_ioctl+0x383/0x510 [nbd]
 blkdev_ioctl+0x18e/0x3e0
 __x64_sys_ioctl+0xac/0x120
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7fd8ff706577
RSP: 002b:00007fd8fcdfebf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000040000000 RCX: 00007fd8ff706577
RDX: 000000000000000d RSI: 000000000000ab00 RDI: 000000000000000f
RBP: 000000000000000f R08: 000000000000fbe8 R09: 000055fe497c62b0
R10: 00000002aff20000 R11: 0000000000000246 R12: 000000000000006d
R13: 0000000000000000 R14: 00007ffe82dc5e70 R15: 00007fd8fcdff9c0

"qemu-ndb -d" will call ioctl 'NBD_DISCONNECT' first, however, following
message was found:

block nbd0: Send disconnect failed -32

Which indicate that something is wrong with the server. Then,
"qemu-nbd -d" will call ioctl 'NBD_CLEAR_SOCK', however ioctl can't clear
requests after commit 2516ab1543fd("nbd: only clear the queue on device
teardown"). And in the meantime, request can't complete through timeout
because nbd_xmit_timeout() will always return 'BLK_EH_RESET_TIMER', which
means such request will never be completed in this situation.

Now that the flag 'NBD_CMD_INFLIGHT' can make sure requests won't
complete multiple times, switch back to call nbd_clear_sock() in
nbd_clear_sock_ioctl(), so that inflight requests can be cleared.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49297/">CVE-2022-49297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49297">CVE-2022-49297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238469">SUSE bug 1238469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49306</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49306" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49306" ref_url="https://www.suse.com/security/cve/CVE-2022-49306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: host: Stop setting the ACPI companion

It is no longer needed. The sysdev pointer is now used when
assigning the ACPI companions to the xHCI ports and USB
devices.

Assigning the ACPI companion here resulted in the
fwnode-&gt;secondary pointer to be replaced also for the parent
dwc3 device since the primary fwnode (the ACPI companion)
was shared. That was unintentional and it created potential
side effects like resource leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49306/">CVE-2022-49306 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49306">CVE-2022-49306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238658">SUSE bug 1238658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49316</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49316" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49316" ref_url="https://www.suse.com/security/cve/CVE-2022-49316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Don't hold the layoutget locks across multiple RPC calls

When doing layoutget as part of the open() compound, we have to be
careful to release the layout locks before we can call any further RPC
calls, such as setattr(). The reason is that those calls could trigger
a recall, which could deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49316/">CVE-2022-49316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49316">CVE-2022-49316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238386">SUSE bug 1238386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49319" ref_url="https://www.suse.com/security/cve/CVE-2022-49319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu-v3: check return value after calling platform_get_resource()

It will cause null-ptr-deref if platform_get_resource() returns NULL,
we need check the return value.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49319/">CVE-2022-49319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49319">CVE-2022-49319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238374">SUSE bug 1238374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49321" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49321" ref_url="https://www.suse.com/security/cve/CVE-2022-49321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xprtrdma: treat all calls not a bcall when bc_serv is NULL

When a rdma server returns a fault format reply, nfs v3 client may
treats it as a bcall when bc service is not exist.

The debug message at rpcrdma_bc_receive_call are,

[56579.837169] RPC:       rpcrdma_bc_receive_call: callback XID
00000001, length=20
[56579.837174] RPC:       rpcrdma_bc_receive_call: 00 00 00 01 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 04

After that, rpcrdma_bc_receive_call will meets NULL pointer as,

[  226.057890] BUG: unable to handle kernel NULL pointer dereference at
00000000000000c8
...
[  226.058704] RIP: 0010:_raw_spin_lock+0xc/0x20
...
[  226.059732] Call Trace:
[  226.059878]  rpcrdma_bc_receive_call+0x138/0x327 [rpcrdma]
[  226.060011]  __ib_process_cq+0x89/0x170 [ib_core]
[  226.060092]  ib_cq_poll_work+0x26/0x80 [ib_core]
[  226.060257]  process_one_work+0x1a7/0x360
[  226.060367]  ? create_worker+0x1a0/0x1a0
[  226.060440]  worker_thread+0x30/0x390
[  226.060500]  ? create_worker+0x1a0/0x1a0
[  226.060574]  kthread+0x116/0x130
[  226.060661]  ? kthread_flush_work_fn+0x10/0x10
[  226.060724]  ret_from_fork+0x35/0x40
...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49321/">CVE-2022-49321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49321">CVE-2022-49321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238373">SUSE bug 1238373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49322" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49322" ref_url="https://www.suse.com/security/cve/CVE-2022-49322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix sleeping function called from invalid context on RT kernel

When setting bootparams="trace_event=initcall:initcall_start tp_printk=1" in the
cmdline, the output_printk() was called, and the spin_lock_irqsave() was called in the
atomic and irq disable interrupt context suitation. On the PREEMPT_RT kernel,
these locks are replaced with sleepable rt-spinlock, so the stack calltrace will
be triggered.
Fix it by raw_spin_lock_irqsave when PREEMPT_RT and "trace_event=initcall:initcall_start
tp_printk=1" enabled.

 BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46
 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0
 preempt_count: 2, expected: 0
 RCU nest depth: 0, expected: 0
 Preemption disabled at:
 [&lt;ffffffff8992303e&gt;] try_to_wake_up+0x7e/0xba0
 CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.17.1-rt17+ #19 34c5812404187a875f32bee7977f7367f9679ea7
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x60/0x8c
  dump_stack+0x10/0x12
  __might_resched.cold+0x11d/0x155
  rt_spin_lock+0x40/0x70
  trace_event_buffer_commit+0x2fa/0x4c0
  ? map_vsyscall+0x93/0x93
  trace_event_raw_event_initcall_start+0xbe/0x110
  ? perf_trace_initcall_finish+0x210/0x210
  ? probe_sched_wakeup+0x34/0x40
  ? ttwu_do_wakeup+0xda/0x310
  ? trace_hardirqs_on+0x35/0x170
  ? map_vsyscall+0x93/0x93
  do_one_initcall+0x217/0x3c0
  ? trace_event_raw_event_initcall_level+0x170/0x170
  ? push_cpu_stop+0x400/0x400
  ? cblist_init_generic+0x241/0x290
  kernel_init_freeable+0x1ac/0x347
  ? _raw_spin_unlock_irq+0x65/0x80
  ? rest_init+0xf0/0xf0
  kernel_init+0x1e/0x150
  ret_from_fork+0x22/0x30
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49322/">CVE-2022-49322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49322">CVE-2022-49322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238396">SUSE bug 1238396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49323</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49323" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49323" ref_url="https://www.suse.com/security/cve/CVE-2022-49323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu: fix possible null-ptr-deref in arm_smmu_device_probe()

It will cause null-ptr-deref when using 'res', if platform_get_resource()
returns NULL, so move using 'res' after devm_ioremap_resource() that
will check it to avoid null-ptr-deref.
And use devm_platform_get_and_ioremap_resource() to simplify code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49323/">CVE-2022-49323 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49323">CVE-2022-49323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238400">SUSE bug 1238400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49325</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49325" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49325" ref_url="https://www.suse.com/security/cve/CVE-2022-49325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: add accessors to read/set tp-&gt;snd_cwnd

We had various bugs over the years with code
breaking the assumption that tp-&gt;snd_cwnd is greater
than zero.

Lately, syzbot reported the WARN_ON_ONCE(!tp-&gt;prior_cwnd) added
in commit 8b8a321ff72c ("tcp: fix zero cwnd in tcp_cwnd_reduction")
can trigger, and without a repro we would have to spend
considerable time finding the bug.

Instead of complaining too late, we want to catch where
and when tp-&gt;snd_cwnd is set to an illegal value.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49325/">CVE-2022-49325 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49325">CVE-2022-49325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238398">SUSE bug 1238398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49328</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49328" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49328" ref_url="https://www.suse.com/security/cve/CVE-2022-49328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: fix use-after-free by removing a non-RCU wcid pointer

Fixes an issue caught by KASAN about use-after-free in mt76_txq_schedule
by protecting mtxq-&gt;wcid with rcu_lock between mt76_txq_schedule and
sta_info_[alloc, free].

[18853.876689] ==================================================================
[18853.876751] BUG: KASAN: use-after-free in mt76_txq_schedule+0x204/0xaf8 [mt76]
[18853.876773] Read of size 8 at addr ffffffaf989a2138 by task mt76-tx phy0/883
[18853.876786]
[18853.876810] CPU: 5 PID: 883 Comm: mt76-tx phy0 Not tainted 5.10.100-fix-510-56778d365941-kasan #5 0b01fbbcf41a530f52043508fec2e31a4215

[18853.876840] Call trace:
[18853.876861]  dump_backtrace+0x0/0x3ec
[18853.876878]  show_stack+0x20/0x2c
[18853.876899]  dump_stack+0x11c/0x1ac
[18853.876918]  print_address_description+0x74/0x514
[18853.876934]  kasan_report+0x134/0x174
[18853.876948]  __asan_report_load8_noabort+0x44/0x50
[18853.876976]  mt76_txq_schedule+0x204/0xaf8 [mt76 074e03e4640e97fe7405ee1fab547b81c4fa45d2]
[18853.877002]  mt76_txq_schedule_all+0x2c/0x48 [mt76 074e03e4640e97fe7405ee1fab547b81c4fa45d2]
[18853.877030]  mt7921_tx_worker+0xa0/0x1cc [mt7921_common f0875ebac9d7b4754e1010549e7db50fbd90a047]
[18853.877054]  __mt76_worker_fn+0x190/0x22c [mt76 074e03e4640e97fe7405ee1fab547b81c4fa45d2]
[18853.877071]  kthread+0x2f8/0x3b8
[18853.877087]  ret_from_fork+0x10/0x30
[18853.877098]
[18853.877112] Allocated by task 941:
[18853.877131]  kasan_save_stack+0x38/0x68
[18853.877147]  __kasan_kmalloc+0xd4/0xfc
[18853.877163]  kasan_kmalloc+0x10/0x1c
[18853.877177]  __kmalloc+0x264/0x3c4
[18853.877294]  sta_info_alloc+0x460/0xf88 [mac80211]
[18853.877410]  ieee80211_prep_connection+0x204/0x1ee0 [mac80211]
[18853.877523]  ieee80211_mgd_auth+0x6c4/0xa4c [mac80211]
[18853.877635]  ieee80211_auth+0x20/0x2c [mac80211]
[18853.877733]  rdev_auth+0x7c/0x438 [cfg80211]
[18853.877826]  cfg80211_mlme_auth+0x26c/0x390 [cfg80211]
[18853.877919]  nl80211_authenticate+0x6d4/0x904 [cfg80211]
[18853.877938]  genl_rcv_msg+0x748/0x93c
[18853.877954]  netlink_rcv_skb+0x160/0x2a8
[18853.877969]  genl_rcv+0x3c/0x54
[18853.877985]  netlink_unicast_kernel+0x104/0x1ec
[18853.877999]  netlink_unicast+0x178/0x268
[18853.878015]  netlink_sendmsg+0x3cc/0x5f0
[18853.878030]  sock_sendmsg+0xb4/0xd8
[18853.878043]  ____sys_sendmsg+0x2f8/0x53c
[18853.878058]  ___sys_sendmsg+0xe8/0x150
[18853.878071]  __sys_sendmsg+0xc4/0x1f4
[18853.878087]  __arm64_compat_sys_sendmsg+0x88/0x9c
[18853.878101]  el0_svc_common+0x1b4/0x390
[18853.878115]  do_el0_svc_compat+0x8c/0xdc
[18853.878131]  el0_svc_compat+0x10/0x1c
[18853.878146]  el0_sync_compat_handler+0xa8/0xcc
[18853.878161]  el0_sync_compat+0x188/0x1c0
[18853.878171]
[18853.878183] Freed by task 10927:
[18853.878200]  kasan_save_stack+0x38/0x68
[18853.878215]  kasan_set_track+0x28/0x3c
[18853.878228]  kasan_set_free_info+0x24/0x48
[18853.878244]  __kasan_slab_free+0x11c/0x154
[18853.878259]  kasan_slab_free+0x14/0x24
[18853.878273]  slab_free_freelist_hook+0xac/0x1b0
[18853.878287]  kfree+0x104/0x390
[18853.878402]  sta_info_free+0x198/0x210 [mac80211]
[18853.878515]  __sta_info_destroy_part2+0x230/0x2d4 [mac80211]
[18853.878628]  __sta_info_flush+0x300/0x37c [mac80211]
[18853.878740]  ieee80211_set_disassoc+0x2cc/0xa7c [mac80211]
[18853.878851]  ieee80211_mgd_deauth+0x4a4/0x10a0 [mac80211]
[18853.878962]  ieee80211_deauth+0x20/0x2c [mac80211]
[18853.879057]  rdev_deauth+0x7c/0x438 [cfg80211]
[18853.879150]  cfg80211_mlme_deauth+0x274/0x414 [cfg80211]
[18853.879243]  cfg80211_mlme_down+0xe4/0x118 [cfg80211]
[18853.879335]  cfg80211_disconnect+0x218/0x2d8 [cfg80211]
[18853.879427]  __cfg80211_leave+0x17c/0x240 [cfg80211]
[18853.879519]  cfg80211_leave+0x3c/0x58 [cfg80211]
[18853.879611]  wiphy_suspend+0xdc/0x200 [cfg80211]
[18853.879628]  dpm_run_callback+0x58/0x408
[18853.879642]  __device_suspend+0x4cc/0x864
[18853.879658]  async_suspend+0x34/0xf4
[18
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49328/">CVE-2022-49328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49328">CVE-2022-49328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238391">SUSE bug 1238391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49330</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49330" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49330" ref_url="https://www.suse.com/security/cve/CVE-2022-49330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix tcp_mtup_probe_success vs wrong snd_cwnd

syzbot got a new report [1] finally pointing to a very old bug,
added in initial support for MTU probing.

tcp_mtu_probe() has checks about starting an MTU probe if
tcp_snd_cwnd(tp) &gt;= 11.

But nothing prevents tcp_snd_cwnd(tp) to be reduced later
and before the MTU probe succeeds.

This bug would lead to potential zero-divides.

Debugging added in commit 40570375356c ("tcp: add accessors
to read/set tp-&gt;snd_cwnd") has paid off :)

While we are at it, address potential overflows in this code.

[1]
WARNING: CPU: 1 PID: 14132 at include/net/tcp.h:1219 tcp_mtup_probe_success+0x366/0x570 net/ipv4/tcp_input.c:2712
Modules linked in:
CPU: 1 PID: 14132 Comm: syz-executor.2 Not tainted 5.18.0-syzkaller-07857-gbabf0bb978e3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:tcp_snd_cwnd_set include/net/tcp.h:1219 [inline]
RIP: 0010:tcp_mtup_probe_success+0x366/0x570 net/ipv4/tcp_input.c:2712
Code: 74 08 48 89 ef e8 da 80 17 f9 48 8b 45 00 65 48 ff 80 80 03 00 00 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 aa b0 c5 f8 &lt;0f&gt; 0b e9 16 fe ff ff 48 8b 4c 24 08 80 e1 07 38 c1 0f 8c c7 fc ff
RSP: 0018:ffffc900079e70f8 EFLAGS: 00010287
RAX: ffffffff88c0f7f6 RBX: ffff8880756e7a80 RCX: 0000000000040000
RDX: ffffc9000c6c4000 RSI: 0000000000031f9e RDI: 0000000000031f9f
RBP: 0000000000000000 R08: ffffffff88c0f606 R09: ffffc900079e7520
R10: ffffed101011226d R11: 1ffff1101011226c R12: 1ffff1100eadcf50
R13: ffff8880756e72c0 R14: 1ffff1100eadcf89 R15: dffffc0000000000
FS:  00007f643236e700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1ab3f1e2a0 CR3: 0000000064fe7000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 tcp_clean_rtx_queue+0x223a/0x2da0 net/ipv4/tcp_input.c:3356
 tcp_ack+0x1962/0x3c90 net/ipv4/tcp_input.c:3861
 tcp_rcv_established+0x7c8/0x1ac0 net/ipv4/tcp_input.c:5973
 tcp_v6_do_rcv+0x57b/0x1210 net/ipv6/tcp_ipv6.c:1476
 sk_backlog_rcv include/net/sock.h:1061 [inline]
 __release_sock+0x1d8/0x4c0 net/core/sock.c:2849
 release_sock+0x5d/0x1c0 net/core/sock.c:3404
 sk_stream_wait_memory+0x700/0xdc0 net/core/stream.c:145
 tcp_sendmsg_locked+0x111d/0x3fc0 net/ipv4/tcp.c:1410
 tcp_sendmsg+0x2c/0x40 net/ipv4/tcp.c:1448
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 __sys_sendto+0x439/0x5c0 net/socket.c:2119
 __do_sys_sendto net/socket.c:2131 [inline]
 __se_sys_sendto net/socket.c:2127 [inline]
 __x64_sys_sendto+0xda/0xf0 net/socket.c:2127
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f6431289109
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f643236e168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 00007f643139c100 RCX: 00007f6431289109
RDX: 00000000d0d0c2ac RSI: 0000000020000080 RDI: 000000000000000a
RBP: 00007f64312e308d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fff372533af R14: 00007f643236e300 R15: 0000000000022000
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49330/">CVE-2022-49330 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49330">CVE-2022-49330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238378">SUSE bug 1238378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49332</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49332" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49332" ref_url="https://www.suse.com/security/cve/CVE-2022-49332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Address NULL pointer dereference after starget_to_rport()

Calls to starget_to_rport() may return NULL.  Add check for NULL rport
before dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49332/">CVE-2022-49332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49332">CVE-2022-49332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238236">SUSE bug 1238236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49333</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49333" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49333" ref_url="https://www.suse.com/security/cve/CVE-2022-49333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: E-Switch, pair only capable devices

OFFLOADS paring using devcom is possible only on devices
that support LAG. Filter based on lag capabilities.

This fixes an issue where mlx5_get_next_phys_dev() was
called without holding the interface lock.

This issue was found when commit
bc4c2f2e0179 ("net/mlx5: Lag, filter non compatible devices")
added an assert that verifies the interface lock is held.

WARNING: CPU: 9 PID: 1706 at drivers/net/ethernet/mellanox/mlx5/core/dev.c:642 mlx5_get_next_phys_dev+0xd2/0x100 [mlx5_core]
Modules linked in: mlx5_vdpa vringh vhost_iotlb vdpa mlx5_ib mlx5_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_umad ib_ipoib ib_cm ib_uverbs ib_core overlay fuse [last unloaded: mlx5_core]
CPU: 9 PID: 1706 Comm: devlink Not tainted 5.18.0-rc7+ #11
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:mlx5_get_next_phys_dev+0xd2/0x100 [mlx5_core]
Code: 02 00 75 48 48 8b 85 80 04 00 00 5d c3 31 c0 5d c3 be ff ff ff ff 48 c7 c7 08 41 5b a0 e8 36 87 28 e3 85 c0 0f 85 6f ff ff ff &lt;0f&gt; 0b e9 68 ff ff ff 48 c7 c7 0c 91 cc 84 e8 cb 36 6f e1 e9 4d ff
RSP: 0018:ffff88811bf47458 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88811b398000 RCX: 0000000000000001
RDX: 0000000080000000 RSI: ffffffffa05b4108 RDI: ffff88812daaaa78
RBP: ffff88812d050380 R08: 0000000000000001 R09: ffff88811d6b3437
R10: 0000000000000001 R11: 00000000fddd3581 R12: ffff88815238c000
R13: ffff88812d050380 R14: ffff8881018aa7e0 R15: ffff88811d6b3428
FS:  00007fc82e18ae80(0000) GS:ffff88842e080000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9630d1b421 CR3: 0000000149802004 CR4: 0000000000370ea0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 mlx5_esw_offloads_devcom_event+0x99/0x3b0 [mlx5_core]
 mlx5_devcom_send_event+0x167/0x1d0 [mlx5_core]
 esw_offloads_enable+0x1153/0x1500 [mlx5_core]
 ? mlx5_esw_offloads_controller_valid+0x170/0x170 [mlx5_core]
 ? wait_for_completion_io_timeout+0x20/0x20
 ? mlx5_rescan_drivers_locked+0x318/0x810 [mlx5_core]
 mlx5_eswitch_enable_locked+0x586/0xc50 [mlx5_core]
 ? mlx5_eswitch_disable_pf_vf_vports+0x1d0/0x1d0 [mlx5_core]
 ? mlx5_esw_try_lock+0x1b/0xb0 [mlx5_core]
 ? mlx5_eswitch_enable+0x270/0x270 [mlx5_core]
 ? __debugfs_create_file+0x260/0x3e0
 mlx5_devlink_eswitch_mode_set+0x27e/0x870 [mlx5_core]
 ? mutex_lock_io_nested+0x12c0/0x12c0
 ? esw_offloads_disable+0x250/0x250 [mlx5_core]
 ? devlink_nl_cmd_trap_get_dumpit+0x470/0x470
 ? rcu_read_lock_sched_held+0x3f/0x70
 devlink_nl_cmd_eswitch_set_doit+0x217/0x620
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49333/">CVE-2022-49333 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49333">CVE-2022-49333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238401">SUSE bug 1238401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49334</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49334" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49334" ref_url="https://www.suse.com/security/cve/CVE-2022-49334" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: Fix xarray node memory leak

If xas_split_alloc() fails to allocate the necessary nodes to complete the
xarray entry split, it sets the xa_state to -ENOMEM, which xas_nomem()
then interprets as "Please allocate more memory", not as "Please free
any unnecessary memory" (which was the intended outcome).  It's confusing
to use xas_nomem() to free memory in this context, so call xas_destroy()
instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49334/">CVE-2022-49334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49334">CVE-2022-49334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238402">SUSE bug 1238402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49339</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49339" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49339" ref_url="https://www.suse.com/security/cve/CVE-2022-49339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: unexport __init-annotated seg6_hmac_init()

EXPORT_SYMBOL and __init is a bad combination because the .init.text
section is freed up after the initialization. Hence, modules cannot
use symbols annotated __init. The access to a freed symbol may end up
with kernel panic.

modpost used to detect it, but it has been broken for a decade.

Recently, I fixed modpost so it started to warn it again, then this
showed up in linux-next builds.

There are two ways to fix it:

  - Remove __init
  - Remove EXPORT_SYMBOL

I chose the latter for this case because the caller (net/ipv6/seg6.c)
and the callee (net/ipv6/seg6_hmac.c) belong to the same module.
It seems an internal function call in ipv6.ko.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49339/">CVE-2022-49339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49339">CVE-2022-49339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238388">SUSE bug 1238388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49340</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49340" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49340" ref_url="https://www.suse.com/security/cve/CVE-2022-49340" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip_gre: test csum_start instead of transport header

GRE with TUNNEL_CSUM will apply local checksum offload on
CHECKSUM_PARTIAL packets.

ipgre_xmit must validate csum_start after an optional skb_pull,
else lco_csum may trigger an overflow. The original check was

	if (csum &amp;&amp; skb_checksum_start(skb) &lt; skb-&gt;data)
		return -EINVAL;

This had false positives when skb_checksum_start is undefined:
when ip_summed is not CHECKSUM_PARTIAL. A discussed refinement
was straightforward

	if (csum &amp;&amp; skb-&gt;ip_summed == CHECKSUM_PARTIAL &amp;&amp;
	    skb_checksum_start(skb) &lt; skb-&gt;data)
		return -EINVAL;

But was eventually revised more thoroughly:
- restrict the check to the only branch where needed, in an
  uncommon GRE path that uses header_ops and calls skb_pull.
- test skb_transport_header, which is set along with csum_start
  in skb_partial_csum_set in the normal header_ops datapath.

Turns out skbs can arrive in this branch without the transport
header set, e.g., through BPF redirection.

Revise the check back to check csum_start directly, and only if
CHECKSUM_PARTIAL. Do leave the check in the updated location.
Check field regardless of whether TUNNEL_CSUM is configured.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49340/">CVE-2022-49340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49340">CVE-2022-49340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238375">SUSE bug 1238375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49343</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49343" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49343" ref_url="https://www.suse.com/security/cve/CVE-2022-49343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid cycles in directory h-tree

A maliciously corrupted filesystem can contain cycles in the h-tree
stored inside a directory. That can easily lead to the kernel corrupting
tree nodes that were already verified under its hands while doing a node
split and consequently accessing unallocated memory. Fix the problem by
verifying traversed block numbers are unique.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49343/">CVE-2022-49343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49343">CVE-2022-49343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238382">SUSE bug 1238382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49344</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49344" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49344" ref_url="https://www.suse.com/security/cve/CVE-2022-49344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix a data-race in unix_dgram_peer_wake_me().

unix_dgram_poll() calls unix_dgram_peer_wake_me() without `other`'s
lock held and check if its receive queue is full.  Here we need to
use unix_recvq_full_lockless() instead of unix_recvq_full(), otherwise
KCSAN will report a data-race.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49344/">CVE-2022-49344 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49344">CVE-2022-49344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237988">SUSE bug 1237988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49345" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49345" ref_url="https://www.suse.com/security/cve/CVE-2022-49345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: xfrm: unexport __init-annotated xfrm4_protocol_init()

EXPORT_SYMBOL and __init is a bad combination because the .init.text
section is freed up after the initialization. Hence, modules cannot
use symbols annotated __init. The access to a freed symbol may end up
with kernel panic.

modpost used to detect it, but it has been broken for a decade.

Recently, I fixed modpost so it started to warn it again, then this
showed up in linux-next builds.

There are two ways to fix it:

  - Remove __init
  - Remove EXPORT_SYMBOL

I chose the latter for this case because the only in-tree call-site,
net/ipv4/xfrm4_policy.c is never compiled as modular.
(CONFIG_XFRM is boolean)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49345/">CVE-2022-49345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49345">CVE-2022-49345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238238">SUSE bug 1238238</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49347" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49347" ref_url="https://www.suse.com/security/cve/CVE-2022-49347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug_on in ext4_writepages

we got issue as follows:
EXT4-fs error (device loop0): ext4_mb_generate_buddy:1141: group 0, block bitmap and bg descriptor inconsistent: 25 vs 31513 free cls
------------[ cut here ]------------
kernel BUG at fs/ext4/inode.c:2708!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 2 PID: 2147 Comm: rep Not tainted 5.18.0-rc2-next-20220413+ #155
RIP: 0010:ext4_writepages+0x1977/0x1c10
RSP: 0018:ffff88811d3e7880 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffff88811c098000
RDX: 0000000000000000 RSI: ffff88811c098000 RDI: 0000000000000002
RBP: ffff888128140f50 R08: ffffffffb1ff6387 R09: 0000000000000000
R10: 0000000000000007 R11: ffffed10250281ea R12: 0000000000000001
R13: 00000000000000a4 R14: ffff88811d3e7bb8 R15: ffff888128141028
FS:  00007f443aed9740(0000) GS:ffff8883aef00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020007200 CR3: 000000011c2a4000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 do_writepages+0x130/0x3a0
 filemap_fdatawrite_wbc+0x83/0xa0
 filemap_flush+0xab/0xe0
 ext4_alloc_da_blocks+0x51/0x120
 __ext4_ioctl+0x1534/0x3210
 __x64_sys_ioctl+0x12c/0x170
 do_syscall_64+0x3b/0x90

It may happen as follows:
1. write inline_data inode
vfs_write
  new_sync_write
    ext4_file_write_iter
      ext4_buffered_write_iter
        generic_perform_write
          ext4_da_write_begin
            ext4_da_write_inline_data_begin -&gt; If inline data size too
            small will allocate block to write, then mapping will has
            dirty page
                ext4_da_convert_inline_data_to_extent -&gt;clear EXT4_STATE_MAY_INLINE_DATA
2. fallocate
do_vfs_ioctl
  ioctl_preallocate
    vfs_fallocate
      ext4_fallocate
        ext4_convert_inline_data
          ext4_convert_inline_data_nolock
            ext4_map_blocks -&gt; fail will goto restore data
            ext4_restore_inline_data
              ext4_create_inline_data
              ext4_write_inline_data
              ext4_set_inode_state -&gt; set inode EXT4_STATE_MAY_INLINE_DATA
3. writepages
__ext4_ioctl
  ext4_alloc_da_blocks
    filemap_flush
      filemap_fdatawrite_wbc
        do_writepages
          ext4_writepages
            if (ext4_has_inline_data(inode))
              BUG_ON(ext4_test_inode_state(inode, EXT4_STATE_MAY_INLINE_DATA))

The root cause of this issue is we destory inline data until call
ext4_writepages under delay allocation mode.  But there maybe already
convert from inline to extent.  To solve this issue, we call
filemap_flush first..
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49347/">CVE-2022-49347 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49347">CVE-2022-49347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238393">SUSE bug 1238393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49348</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49348" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49348" ref_url="https://www.suse.com/security/cve/CVE-2022-49348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state

The EXT4_FC_REPLAY bit in sbi-&gt;s_mount_state is used to indicate that
we are in the middle of replay the fast commit journal.  This was
actually a mistake, since the sbi-&gt;s_mount_info is initialized from
es-&gt;s_state.  Arguably s_mount_state is misleadingly named, but the
name is historical --- s_mount_state and s_state dates back to ext2.

What should have been used is the ext4_{set,clear,test}_mount_flag()
inline functions, which sets EXT4_MF_* bits in sbi-&gt;s_mount_flags.

The problem with using EXT4_FC_REPLAY is that a maliciously corrupted
superblock could result in EXT4_FC_REPLAY getting set in
s_mount_state.  This bypasses some sanity checks, and this can trigger
a BUG() in ext4_es_cache_extent().  As a easy-to-backport-fix, filter
out the EXT4_FC_REPLAY bit for now.  We should eventually transition
away from EXT4_FC_REPLAY to something like EXT4_MF_REPLAY.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49348/">CVE-2022-49348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49348">CVE-2022-49348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238383">SUSE bug 1238383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49349" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49349" ref_url="https://www.suse.com/security/cve/CVE-2022-49349" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix use-after-free in ext4_rename_dir_prepare

We got issue as follows:
EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue
ext4_get_first_dir_block: bh-&gt;b_data=0xffff88810bee6000 len=34478
ext4_get_first_dir_block: *parent_de=0xffff88810beee6ae bh-&gt;b_data=0xffff88810bee6000
ext4_rename_dir_prepare: [1] parent_de=0xffff88810beee6ae
==================================================================
BUG: KASAN: use-after-free in ext4_rename_dir_prepare+0x152/0x220
Read of size 4 at addr ffff88810beee6ae by task rep/1895

CPU: 13 PID: 1895 Comm: rep Not tainted 5.10.0+ #241
Call Trace:
 dump_stack+0xbe/0xf9
 print_address_description.constprop.0+0x1e/0x220
 kasan_report.cold+0x37/0x7f
 ext4_rename_dir_prepare+0x152/0x220
 ext4_rename+0xf44/0x1ad0
 ext4_rename2+0x11c/0x170
 vfs_rename+0xa84/0x1440
 do_renameat2+0x683/0x8f0
 __x64_sys_renameat+0x53/0x60
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f45a6fc41c9
RSP: 002b:00007ffc5a470218 EFLAGS: 00000246 ORIG_RAX: 0000000000000108
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f45a6fc41c9
RDX: 0000000000000005 RSI: 0000000020000180 RDI: 0000000000000005
RBP: 00007ffc5a470240 R08: 00007ffc5a470160 R09: 0000000020000080
R10: 00000000200001c0 R11: 0000000000000246 R12: 0000000000400bb0
R13: 00007ffc5a470320 R14: 0000000000000000 R15: 0000000000000000

The buggy address belongs to the page:
page:00000000440015ce refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x10beee
flags: 0x200000000000000()
raw: 0200000000000000 ffffea00043ff4c8 ffffea0004325608 0000000000000000
raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff88810beee580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff88810beee600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
&gt;ffff88810beee680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                                  ^
 ffff88810beee700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff88810beee780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
==================================================================
Disabling lock debugging due to kernel taint
ext4_rename_dir_prepare: [2] parent_de-&gt;inode=3537895424
ext4_rename_dir_prepare: [3] dir=0xffff888124170140
ext4_rename_dir_prepare: [4] ino=2
ext4_rename_dir_prepare: ent-&gt;dir-&gt;i_ino=2 parent=-757071872

Reason is first directory entry which 'rec_len' is 34478, then will get illegal
parent entry. Now, we do not check directory entry after read directory block
in 'ext4_get_first_dir_block'.
To solve this issue, check directory entry in 'ext4_get_first_dir_block'.

[ Trigger an ext4_error() instead of just warning if the directory is
  missing a '.' or '..' entry.   Also make sure we return an error code
  if the file system is corrupted.  -TYT ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49349/">CVE-2022-49349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49349">CVE-2022-49349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238372">SUSE bug 1238372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49350</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49350" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49350" ref_url="https://www.suse.com/security/cve/CVE-2022-49350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mdio: unexport __init-annotated mdio_bus_init()

EXPORT_SYMBOL and __init is a bad combination because the .init.text
section is freed up after the initialization. Hence, modules cannot
use symbols annotated __init. The access to a freed symbol may end up
with kernel panic.

modpost used to detect it, but it has been broken for a decade.

Recently, I fixed modpost so it started to warn it again, then this
showed up in linux-next builds.

There are two ways to fix it:

  - Remove __init
  - Remove EXPORT_SYMBOL

I chose the latter for this case because the only in-tree call-site,
drivers/net/phy/phy_device.c is never compiled as modular.
(CONFIG_PHYLIB is boolean)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49350/">CVE-2022-49350 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49350">CVE-2022-49350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238387">SUSE bug 1238387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49353</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49353" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49353" ref_url="https://www.suse.com/security/cve/CVE-2022-49353" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/papr_scm: don't requests stats with '0' sized stats buffer

Sachin reported [1] that on a POWER-10 lpar he is seeing a kernel panic being
reported with vPMEM when papr_scm probe is being called. The panic is of the
form below and is observed only with following option disabled(profile) for the
said LPAR 'Enable Performance Information Collection' in the HMC:

 Kernel attempted to write user page (1c) - exploit attempt? (uid: 0)
 BUG: Kernel NULL pointer dereference on write at 0x0000001c
 Faulting instruction address: 0xc008000001b90844
 Oops: Kernel access of bad area, sig: 11 [#1]
&lt;snip&gt;
 NIP [c008000001b90844] drc_pmem_query_stats+0x5c/0x270 [papr_scm]
 LR [c008000001b92794] papr_scm_probe+0x2ac/0x6ec [papr_scm]
 Call Trace:
       0xc00000000941bca0 (unreliable)
       papr_scm_probe+0x2ac/0x6ec [papr_scm]
       platform_probe+0x98/0x150
       really_probe+0xfc/0x510
       __driver_probe_device+0x17c/0x230
&lt;snip&gt;
 ---[ end trace 0000000000000000 ]---
 Kernel panic - not syncing: Fatal exception

On investigation looks like this panic was caused due to a 'stat_buffer' of
size==0 being provided to drc_pmem_query_stats() to fetch all performance
stats-ids of an NVDIMM. However drc_pmem_query_stats() shouldn't have been called
since the vPMEM NVDIMM doesn't support and performance stat-id's. This was caused
due to missing check for 'p-&gt;stat_buffer_len' at the beginning of
papr_scm_pmu_check_events() which indicates that the NVDIMM doesn't support
performance-stats.

Fix this by introducing the check for 'p-&gt;stat_buffer_len' at the beginning of
papr_scm_pmu_check_events().

[1] https://lore.kernel.org/all/6B3A522A-6A5F-4CC9-B268-0C63AA6E07D3@linux.ibm.com
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49353/">CVE-2022-49353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49353">CVE-2022-49353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238385">SUSE bug 1238385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49356" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49356" ref_url="https://www.suse.com/security/cve/CVE-2022-49356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: Trap RDMA segment overflows

Prevent svc_rdma_build_writes() from walking off the end of a Write
chunk's segment array. Caught with KASAN.

The test that this fix replaces is invalid, and might have been left
over from an earlier prototype of the PCL work.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49356/">CVE-2022-49356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49356">CVE-2022-49356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238444">SUSE bug 1238444</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49357</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49357" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49357" ref_url="https://www.suse.com/security/cve/CVE-2022-49357" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: Do not import certificates from UEFI Secure Boot for T2 Macs

On Apple T2 Macs, when Linux attempts to read the db and dbx efi variables
at early boot to load UEFI Secure Boot certificates, a page fault occurs
in Apple firmware code and EFI runtime services are disabled with the
following logs:

[Firmware Bug]: Page fault caused by firmware at PA: 0xffffb1edc0068000
WARNING: CPU: 3 PID: 104 at arch/x86/platform/efi/quirks.c:735 efi_crash_gracefully_on_page_fault+0x50/0xf0
(Removed some logs from here)
Call Trace:
 &lt;TASK&gt;
 page_fault_oops+0x4f/0x2c0
 ? search_bpf_extables+0x6b/0x80
 ? search_module_extables+0x50/0x80
 ? search_exception_tables+0x5b/0x60
 kernelmode_fixup_or_oops+0x9e/0x110
 __bad_area_nosemaphore+0x155/0x190
 bad_area_nosemaphore+0x16/0x20
 do_kern_addr_fault+0x8c/0xa0
 exc_page_fault+0xd8/0x180
 asm_exc_page_fault+0x1e/0x30
(Removed some logs from here)
 ? __efi_call+0x28/0x30
 ? switch_mm+0x20/0x30
 ? efi_call_rts+0x19a/0x8e0
 ? process_one_work+0x222/0x3f0
 ? worker_thread+0x4a/0x3d0
 ? kthread+0x17a/0x1a0
 ? process_one_work+0x3f0/0x3f0
 ? set_kthread_struct+0x40/0x40
 ? ret_from_fork+0x22/0x30
 &lt;/TASK&gt;
---[ end trace 1f82023595a5927f ]---
efi: Froze efi_rts_wq and disabled EFI Runtime Services
integrity: Couldn't get size: 0x8000000000000015
integrity: MODSIGN: Couldn't get UEFI db list
efi: EFI Runtime Services are disabled!
integrity: Couldn't get size: 0x8000000000000015
integrity: Couldn't get UEFI dbx list
integrity: Couldn't get size: 0x8000000000000015
integrity: Couldn't get mokx list
integrity: Couldn't get size: 0x80000000

So we avoid reading these UEFI variables and thus prevent the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49357/">CVE-2022-49357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49357">CVE-2022-49357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238631">SUSE bug 1238631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49362</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49362" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49362" ref_url="https://www.suse.com/security/cve/CVE-2022-49362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix potential use-after-free in nfsd_file_put()

nfsd_file_put_noref() can free @nf, so don't dereference @nf
immediately upon return from nfsd_file_put_noref().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49362/">CVE-2022-49362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49362">CVE-2022-49362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237792">SUSE bug 1237792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49365" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49365" ref_url="https://www.suse.com/security/cve/CVE-2022-49365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Off by one in dm_dmub_outbox1_low_irq()

The &gt; ARRAY_SIZE() should be &gt;= ARRAY_SIZE() to prevent an out of bounds
access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49365/">CVE-2022-49365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49365">CVE-2022-49365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238661">SUSE bug 1238661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49371</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49371" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49371" ref_url="https://www.suse.com/security/cve/CVE-2022-49371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: fix deadlock in __device_attach

In __device_attach function, The lock holding logic is as follows:
...
__device_attach
device_lock(dev)      // get lock dev
  async_schedule_dev(__device_attach_async_helper, dev); // func
    async_schedule_node
      async_schedule_node_domain(func)
        entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);
	/* when fail or work limit, sync to execute func, but
	   __device_attach_async_helper will get lock dev as
	   well, which will lead to A-A deadlock.  */
	if (!entry || atomic_read(&amp;entry_count) &gt; MAX_WORK) {
	  func;
	else
	  queue_work_node(node, system_unbound_wq, &amp;entry-&gt;work)
  device_unlock(dev)

As shown above, when it is allowed to do async probes, because of
out of memory or work limit, async work is not allowed, to do
sync execute instead. it will lead to A-A deadlock because of
__device_attach_async_helper getting lock dev.

To fix the deadlock, move the async_schedule_dev outside device_lock,
as we can see, in async_schedule_node_domain, the parameter of
queue_work_node is system_unbound_wq, so it can accept concurrent
operations. which will also not change the code logic, and will
not lead to deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49371/">CVE-2022-49371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49371">CVE-2022-49371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238546">SUSE bug 1238546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49372</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49372" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49372" ref_url="https://www.suse.com/security/cve/CVE-2022-49372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: tcp_rtx_synack() can be called from process context

Laurent reported the enclosed report [1]

This bug triggers with following coditions:

0) Kernel built with CONFIG_DEBUG_PREEMPT=y

1) A new passive FastOpen TCP socket is created.
   This FO socket waits for an ACK coming from client to be a complete
   ESTABLISHED one.
2) A socket operation on this socket goes through lock_sock()
   release_sock() dance.
3) While the socket is owned by the user in step 2),
   a retransmit of the SYN is received and stored in socket backlog.
4) At release_sock() time, the socket backlog is processed while
   in process context.
5) A SYNACK packet is cooked in response of the SYN retransmit.
6) -&gt; tcp_rtx_synack() is called in process context.

Before blamed commit, tcp_rtx_synack() was always called from BH handler,
from a timer handler.

Fix this by using TCP_INC_STATS() &amp; NET_INC_STATS()
which do not assume caller is in non preemptible context.

[1]
BUG: using __this_cpu_add() in preemptible [00000000] code: epollpep/2180
caller is tcp_rtx_synack.part.0+0x36/0xc0
CPU: 10 PID: 2180 Comm: epollpep Tainted: G           OE     5.16.0-0.bpo.4-amd64 #1  Debian 5.16.12-1~bpo11+1
Hardware name: Supermicro SYS-5039MC-H8TRF/X11SCD-F, BIOS 1.7 11/23/2021
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x48/0x5e
 check_preemption_disabled+0xde/0xe0
 tcp_rtx_synack.part.0+0x36/0xc0
 tcp_rtx_synack+0x8d/0xa0
 ? kmem_cache_alloc+0x2e0/0x3e0
 ? apparmor_file_alloc_security+0x3b/0x1f0
 inet_rtx_syn_ack+0x16/0x30
 tcp_check_req+0x367/0x610
 tcp_rcv_state_process+0x91/0xf60
 ? get_nohz_timer_target+0x18/0x1a0
 ? lock_timer_base+0x61/0x80
 ? preempt_count_add+0x68/0xa0
 tcp_v4_do_rcv+0xbd/0x270
 __release_sock+0x6d/0xb0
 release_sock+0x2b/0x90
 sock_setsockopt+0x138/0x1140
 ? __sys_getsockname+0x7e/0xc0
 ? aa_sk_perm+0x3e/0x1a0
 __sys_setsockopt+0x198/0x1e0
 __x64_sys_setsockopt+0x21/0x30
 do_syscall_64+0x38/0xc0
 entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49372/">CVE-2022-49372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49372">CVE-2022-49372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238251">SUSE bug 1238251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49374</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49374" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49374" ref_url="https://www.suse.com/security/cve/CVE-2022-49374" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: check attribute length for bearer name

syzbot reported uninit-value:
=====================================================
BUG: KMSAN: uninit-value in string_nocheck lib/vsprintf.c:644 [inline]
BUG: KMSAN: uninit-value in string+0x4f9/0x6f0 lib/vsprintf.c:725
 string_nocheck lib/vsprintf.c:644 [inline]
 string+0x4f9/0x6f0 lib/vsprintf.c:725
 vsnprintf+0x2222/0x3650 lib/vsprintf.c:2806
 vprintk_store+0x537/0x2150 kernel/printk/printk.c:2158
 vprintk_emit+0x28b/0xab0 kernel/printk/printk.c:2256
 vprintk_default+0x86/0xa0 kernel/printk/printk.c:2283
 vprintk+0x15f/0x180 kernel/printk/printk_safe.c:50
 _printk+0x18d/0x1cf kernel/printk/printk.c:2293
 tipc_enable_bearer net/tipc/bearer.c:371 [inline]
 __tipc_nl_bearer_enable+0x2022/0x22a0 net/tipc/bearer.c:1033
 tipc_nl_bearer_enable+0x6c/0xb0 net/tipc/bearer.c:1042
 genl_family_rcv_msg_doit net/netlink/genetlink.c:731 [inline]

- Do sanity check the attribute length for TIPC_NLA_BEARER_NAME.
- Do not use 'illegal name' in printing message.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49374/">CVE-2022-49374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49374">CVE-2022-49374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238555">SUSE bug 1238555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49376</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49376" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49376" ref_url="https://www.suse.com/security/cve/CVE-2022-49376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sd: Fix potential NULL pointer dereference

If sd_probe() sees an early error before sdkp-&gt;device is initialized,
sd_zbc_release_disk() is called. This causes a NULL pointer dereference
when sd_is_zoned() is called inside that function. Avoid this by removing
the call to sd_zbc_release_disk() in sd_probe() error path.

This change is safe and does not result in zone information memory leakage
because the zone information for a zoned disk is allocated only when
sd_revalidate_disk() is called, at which point sdkp-&gt;disk_dev is fully set,
resulting in sd_disk_release() being called when needed to cleanup a disk
zone information using sd_zbc_release_disk().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49376/">CVE-2022-49376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49376">CVE-2022-49376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238103">SUSE bug 1238103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49378</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49378" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49378" ref_url="https://www.suse.com/security/cve/CVE-2022-49378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix considering that all channels have TX queues

Normally, all channels have RX and TX queues, but this is not true if
modparam efx_separate_tx_channels=1 is used. In that cases, some
channels only have RX queues and others only TX queues (or more
preciselly, they have them allocated, but not initialized).

Fix efx_channel_has_tx_queues to return the correct value for this case
too.

Messages shown at probe time before the fix:
 sfc 0000:03:00.0 ens6f0np0: MC command 0x82 inlen 544 failed rc=-22 (raw=0) arg=0
 ------------[ cut here ]------------
 netdevice: ens6f0np0: failed to initialise TXQ -1
 WARNING: CPU: 1 PID: 626 at drivers/net/ethernet/sfc/ef10.c:2393 efx_ef10_tx_init+0x201/0x300 [sfc]
 [...] stripped
 RIP: 0010:efx_ef10_tx_init+0x201/0x300 [sfc]
 [...] stripped
 Call Trace:
  efx_init_tx_queue+0xaa/0xf0 [sfc]
  efx_start_channels+0x49/0x120 [sfc]
  efx_start_all+0x1f8/0x430 [sfc]
  efx_net_open+0x5a/0xe0 [sfc]
  __dev_open+0xd0/0x190
  __dev_change_flags+0x1b3/0x220
  dev_change_flags+0x21/0x60
 [...] stripped

Messages shown at remove time before the fix:
 sfc 0000:03:00.0 ens6f0np0: failed to flush 10 queues
 sfc 0000:03:00.0 ens6f0np0: failed to flush queues
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49378/">CVE-2022-49378 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49378">CVE-2022-49378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238286">SUSE bug 1238286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49379</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49379" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49379" ref_url="https://www.suse.com/security/cve/CVE-2022-49379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: Fix wait_for_device_probe() &amp; deferred_probe_timeout interaction

Mounting NFS rootfs was timing out when deferred_probe_timeout was
non-zero [1].  This was because ip_auto_config() initcall times out
waiting for the network interfaces to show up when
deferred_probe_timeout was non-zero. While ip_auto_config() calls
wait_for_device_probe() to make sure any currently running deferred
probe work or asynchronous probe finishes, that wasn't sufficient to
account for devices being deferred until deferred_probe_timeout.

Commit 35a672363ab3 ("driver core: Ensure wait_for_device_probe() waits
until the deferred_probe_timeout fires") tried to fix that by making
sure wait_for_device_probe() waits for deferred_probe_timeout to expire
before returning.

However, if wait_for_device_probe() is called from the kernel_init()
context:

- Before deferred_probe_initcall() [2], it causes the boot process to
  hang due to a deadlock.

- After deferred_probe_initcall() [3], it blocks kernel_init() from
  continuing till deferred_probe_timeout expires and beats the point of
  deferred_probe_timeout that's trying to wait for userspace to load
  modules.

Neither of this is good. So revert the changes to
wait_for_device_probe().

[1] - https://lore.kernel.org/lkml/TYAPR01MB45443DF63B9EF29054F7C41FD8C60@TYAPR01MB4544.jpnprd01.prod.outlook.com/
[2] - https://lore.kernel.org/lkml/YowHNo4sBjr9ijZr@dev-arch.thelio-3990X/
[3] - https://lore.kernel.org/lkml/Yo3WvGnNk3LvLb7R@linutronix.de/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49379/">CVE-2022-49379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49379">CVE-2022-49379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238446">SUSE bug 1238446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49389</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49389" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49389" ref_url="https://www.suse.com/security/cve/CVE-2022-49389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: usbip: fix a refcount leak in stub_probe()

usb_get_dev() is called in stub_device_alloc(). When stub_probe() fails
after that, usb_put_dev() needs to be called to release the reference.

Fix this by moving usb_put_dev() to sdev_free error path handling.

Find this by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49389/">CVE-2022-49389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49389">CVE-2022-49389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238257">SUSE bug 1238257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49394" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49394" ref_url="https://www.suse.com/security/cve/CVE-2022-49394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-iolatency: Fix inflight count imbalances and IO hangs on offline

iolatency needs to track the number of inflight IOs per cgroup. As this
tracking can be expensive, it is disabled when no cgroup has iolatency
configured for the device. To ensure that the inflight counters stay
balanced, iolatency_set_limit() freezes the request_queue while manipulating
the enabled counter, which ensures that no IO is in flight and thus all
counters are zero.

Unfortunately, iolatency_set_limit() isn't the only place where the enabled
counter is manipulated. iolatency_pd_offline() can also dec the counter and
trigger disabling. As this disabling happens without freezing the q, this
can easily happen while some IOs are in flight and thus leak the counts.

This can be easily demonstrated by turning on iolatency on an one empty
cgroup while IOs are in flight in other cgroups and then removing the
cgroup. Note that iolatency shouldn't have been enabled elsewhere in the
system to ensure that removing the cgroup disables iolatency for the whole
device.

The following keeps flipping on and off iolatency on sda:

  echo +io &gt; /sys/fs/cgroup/cgroup.subtree_control
  while true; do
      mkdir -p /sys/fs/cgroup/test
      echo '8:0 target=100000' &gt; /sys/fs/cgroup/test/io.latency
      sleep 1
      rmdir /sys/fs/cgroup/test
      sleep 1
  done

and there's concurrent fio generating direct rand reads:

  fio --name test --filename=/dev/sda --direct=1 --rw=randread \
      --runtime=600 --time_based --iodepth=256 --numjobs=4 --bs=4k

while monitoring with the following drgn script:

  while True:
    for css in css_for_each_descendant_pre(prog['blkcg_root'].css.address_of_()):
        for pos in hlist_for_each(container_of(css, 'struct blkcg', 'css').blkg_list):
            blkg = container_of(pos, 'struct blkcg_gq', 'blkcg_node')
            pd = blkg.pd[prog['blkcg_policy_iolatency'].plid]
            if pd.value_() == 0:
                continue
            iolat = container_of(pd, 'struct iolatency_grp', 'pd')
            inflight = iolat.rq_wait.inflight.counter.value_()
            if inflight:
                print(f'inflight={inflight} {disk_name(blkg.q.disk).decode("utf-8")} '
                      f'{cgroup_path(css.cgroup).decode("utf-8")}')
    time.sleep(1)

The monitoring output looks like the following:

  inflight=1 sda /user.slice
  inflight=1 sda /user.slice
  ...
  inflight=14 sda /user.slice
  inflight=13 sda /user.slice
  inflight=17 sda /user.slice
  inflight=15 sda /user.slice
  inflight=18 sda /user.slice
  inflight=17 sda /user.slice
  inflight=20 sda /user.slice
  inflight=19 sda /user.slice &lt;- fio stopped, inflight stuck at 19
  inflight=19 sda /user.slice
  inflight=19 sda /user.slice

If a cgroup with stuck inflight ends up getting throttled, the throttled IOs
will never get issued as there's no completion event to wake it up leading
to an indefinite hang.

This patch fixes the bug by unifying enable handling into a work item which
is automatically kicked off from iolatency_set_min_lat_nsec() which is
called from both iolatency_set_limit() and iolatency_pd_offline() paths.
Punting to a work item is necessary as iolatency_pd_offline() is called
under spinlocks while freezing a request_queue requires a sleepable context.

This also simplifies the code reducing LOC sans the comments and avoids the
unnecessary freezes which were happening whenever a cgroup's latency target
is newly set or cleared.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49394/">CVE-2022-49394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49394">CVE-2022-49394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238712">SUSE bug 1238712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49398" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49398" ref_url="https://www.suse.com/security/cve/CVE-2022-49398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: gadget: Replace list_for_each_entry_safe() if using giveback

The list_for_each_entry_safe() macro saves the current item (n) and
the item after (n+1), so that n can be safely removed without
corrupting the list.  However, when traversing the list and removing
items using gadget giveback, the DWC3 lock is briefly released,
allowing other routines to execute.  There is a situation where, while
items are being removed from the cancelled_list using
dwc3_gadget_ep_cleanup_cancelled_requests(), the pullup disable
routine is running in parallel (due to UDC unbind).  As the cleanup
routine removes n, and the pullup disable removes n+1, once the
cleanup retakes the DWC3 lock, it references a request who was already
removed/handled.  With list debug enabled, this leads to a panic.
Ensure all instances of the macro are replaced where gadget giveback
is used.

Example call stack:

Thread#1:
__dwc3_gadget_ep_set_halt() - CLEAR HALT
  -&gt; dwc3_gadget_ep_cleanup_cancelled_requests()
    -&gt;list_for_each_entry_safe()
    -&gt;dwc3_gadget_giveback(n)
      -&gt;dwc3_gadget_del_and_unmap_request()- n deleted[cancelled_list]
      -&gt;spin_unlock
      -&gt;Thread#2 executes
      ...
    -&gt;dwc3_gadget_giveback(n+1)
      -&gt;Already removed!

Thread#2:
dwc3_gadget_pullup()
  -&gt;waiting for dwc3 spin_lock
  ...
  -&gt;Thread#1 released lock
  -&gt;dwc3_stop_active_transfers()
    -&gt;dwc3_remove_requests()
      -&gt;fetches n+1 item from cancelled_list (n removed by Thread#1)
      -&gt;dwc3_gadget_giveback()
        -&gt;dwc3_gadget_del_and_unmap_request()- n+1 deleted[cancelled_list]
        -&gt;spin_unlock
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49398/">CVE-2022-49398 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49398">CVE-2022-49398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238621">SUSE bug 1238621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49401</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49401" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49401" ref_url="https://www.suse.com/security/cve/CVE-2022-49401" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/page_owner: use strscpy() instead of strlcpy()

current-&gt;comm[] is not a string (no guarantee for a zero byte in it).

strlcpy(s1, s2, l) is calling strlen(s2), potentially
causing out-of-bound access, as reported by syzbot:

detected buffer overflow in __fortify_strlen
------------[ cut here ]------------
kernel BUG at lib/string_helpers.c:980!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 4087 Comm: dhcpcd-run-hooks Not tainted 5.18.0-rc3-syzkaller-01537-g20b87e7c29df #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:fortify_panic+0x18/0x1a lib/string_helpers.c:980
Code: 8c e8 c5 ba e1 fa e9 23 0f bf fa e8 0b 5d 8c f8 eb db 55 48 89 fd e8 e0 49 40 f8 48 89 ee 48 c7 c7 80 f5 26 8a e8 99 09 f1 ff &lt;0f&gt; 0b e8 ca 49 40 f8 48 8b 54 24 18 4c 89 f1 48 c7 c7 00 00 27 8a
RSP: 0018:ffffc900000074a8 EFLAGS: 00010286

RAX: 000000000000002c RBX: ffff88801226b728 RCX: 0000000000000000
RDX: ffff8880198e0000 RSI: ffffffff81600458 RDI: fffff52000000e87
RBP: ffffffff89da2aa0 R08: 000000000000002c R09: 0000000000000000
R10: ffffffff815fae2e R11: 0000000000000000 R12: ffff88801226b700
R13: ffff8880198e0830 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5876ad6ff8 CR3: 000000001a48c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
 &lt;IRQ&gt;
 __fortify_strlen include/linux/fortify-string.h:128 [inline]
 strlcpy include/linux/fortify-string.h:143 [inline]
 __set_page_owner_handle+0x2b1/0x3e0 mm/page_owner.c:171
 __set_page_owner+0x3e/0x50 mm/page_owner.c:190
 prep_new_page mm/page_alloc.c:2441 [inline]
 get_page_from_freelist+0xba2/0x3e00 mm/page_alloc.c:4182
 __alloc_pages+0x1b2/0x500 mm/page_alloc.c:5408
 alloc_pages+0x1aa/0x310 mm/mempolicy.c:2272
 alloc_slab_page mm/slub.c:1799 [inline]
 allocate_slab+0x26c/0x3c0 mm/slub.c:1944
 new_slab mm/slub.c:2004 [inline]
 ___slab_alloc+0x8df/0xf20 mm/slub.c:3005
 __slab_alloc.constprop.0+0x4d/0xa0 mm/slub.c:3092
 slab_alloc_node mm/slub.c:3183 [inline]
 slab_alloc mm/slub.c:3225 [inline]
 __kmem_cache_alloc_lru mm/slub.c:3232 [inline]
 kmem_cache_alloc+0x360/0x3b0 mm/slub.c:3242
 dst_alloc+0x146/0x1f0 net/core/dst.c:92
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49401/">CVE-2022-49401 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49401">CVE-2022-49401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238273">SUSE bug 1238273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49404" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49404" ref_url="https://www.suse.com/security/cve/CVE-2022-49404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hfi1: Fix potential integer multiplication overflow errors

When multiplying of different types, an overflow is possible even when
storing the result in a larger type. This is because the conversion is
done after the multiplication. So arithmetic overflow and thus in
incorrect value is possible.

Correct an instance of this in the inter packet delay calculation.  Fix by
ensuring one of the operands is u64 which will promote the other to u64 as
well ensuring no overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49404/">CVE-2022-49404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49404">CVE-2022-49404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238430">SUSE bug 1238430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49408" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49408" ref_url="https://www.suse.com/security/cve/CVE-2022-49408" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix memory leak in parse_apply_sb_mount_options()

If processing the on-disk mount options fails after any memory was
allocated in the ext4_fs_context, e.g. s_qf_names, then this memory is
leaked.  Fix this by calling ext4_fc_free() instead of kfree() directly.

Reproducer:

    mkfs.ext4 -F /dev/vdc
    tune2fs /dev/vdc -E mount_opts=usrjquota=file
    echo clear &gt; /sys/kernel/debug/kmemleak
    mount /dev/vdc /vdc
    echo scan &gt; /sys/kernel/debug/kmemleak
    sleep 5
    echo scan &gt; /sys/kernel/debug/kmemleak
    cat /sys/kernel/debug/kmemleak
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49408/">CVE-2022-49408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49408">CVE-2022-49408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238489">SUSE bug 1238489</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49409" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49409" ref_url="https://www.suse.com/security/cve/CVE-2022-49409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug_on in __es_tree_search

Hulk Robot reported a BUG_ON:
==================================================================
kernel BUG at fs/ext4/extents_status.c:199!
[...]
RIP: 0010:ext4_es_end fs/ext4/extents_status.c:199 [inline]
RIP: 0010:__es_tree_search+0x1e0/0x260 fs/ext4/extents_status.c:217
[...]
Call Trace:
 ext4_es_cache_extent+0x109/0x340 fs/ext4/extents_status.c:766
 ext4_cache_extents+0x239/0x2e0 fs/ext4/extents.c:561
 ext4_find_extent+0x6b7/0xa20 fs/ext4/extents.c:964
 ext4_ext_map_blocks+0x16b/0x4b70 fs/ext4/extents.c:4384
 ext4_map_blocks+0xe26/0x19f0 fs/ext4/inode.c:567
 ext4_getblk+0x320/0x4c0 fs/ext4/inode.c:980
 ext4_bread+0x2d/0x170 fs/ext4/inode.c:1031
 ext4_quota_read+0x248/0x320 fs/ext4/super.c:6257
 v2_read_header+0x78/0x110 fs/quota/quota_v2.c:63
 v2_check_quota_file+0x76/0x230 fs/quota/quota_v2.c:82
 vfs_load_quota_inode+0x5d1/0x1530 fs/quota/dquot.c:2368
 dquot_enable+0x28a/0x330 fs/quota/dquot.c:2490
 ext4_quota_enable fs/ext4/super.c:6137 [inline]
 ext4_enable_quotas+0x5d7/0x960 fs/ext4/super.c:6163
 ext4_fill_super+0xa7c9/0xdc00 fs/ext4/super.c:4754
 mount_bdev+0x2e9/0x3b0 fs/super.c:1158
 mount_fs+0x4b/0x1e4 fs/super.c:1261
[...]
==================================================================

Above issue may happen as follows:
-------------------------------------
ext4_fill_super
 ext4_enable_quotas
  ext4_quota_enable
   ext4_iget
    __ext4_iget
     ext4_ext_check_inode
      ext4_ext_check
       __ext4_ext_check
        ext4_valid_extent_entries
         Check for overlapping extents does't take effect
   dquot_enable
    vfs_load_quota_inode
     v2_check_quota_file
      v2_read_header
       ext4_quota_read
        ext4_bread
         ext4_getblk
          ext4_map_blocks
           ext4_ext_map_blocks
            ext4_find_extent
             ext4_cache_extents
              ext4_es_cache_extent
               ext4_es_cache_extent
                __es_tree_search
                 ext4_es_end
                  BUG_ON(es-&gt;es_lblk + es-&gt;es_len &lt; es-&gt;es_lblk)

The error ext4 extents is as follows:
0af3 0300 0400 0000 00000000    extent_header
00000000 0100 0000 12000000     extent1
00000000 0100 0000 18000000     extent2
02000000 0400 0000 14000000     extent3

In the ext4_valid_extent_entries function,
if prev is 0, no error is returned even if lblock&lt;=prev.
This was intended to skip the check on the first extent, but
in the error image above, prev=0+1-1=0 when checking the second extent,
so even though lblock&lt;=prev, the function does not return an error.
As a result, bug_ON occurs in __es_tree_search and the system panics.

To solve this problem, we only need to check that:
1. The lblock of the first extent is not less than 0.
2. The lblock of the next extent  is not less than
   the next block of the previous extent.
The same applies to extent_idx.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49409/">CVE-2022-49409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49409">CVE-2022-49409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238279">SUSE bug 1238279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49411</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49411" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49411" ref_url="https://www.suse.com/security/cve/CVE-2022-49411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bfq: Make sure bfqg for which we are queueing requests is online

Bios queued into BFQ IO scheduler can be associated with a cgroup that
was already offlined. This may then cause insertion of this bfq_group
into a service tree. But this bfq_group will get freed as soon as last
bio associated with it is completed leading to use after free issues for
service tree users. Fix the problem by making sure we always operate on
online bfq_group. If the bfq_group associated with the bio is not
online, we pick the first online parent.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49411/">CVE-2022-49411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49411">CVE-2022-49411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238307">SUSE bug 1238307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49412" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49412" ref_url="https://www.suse.com/security/cve/CVE-2022-49412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bfq: Avoid merging queues with different parents

It can happen that the parent of a bfqq changes between the moment we
decide two queues are worth to merge (and set bic-&gt;stable_merge_bfqq)
and the moment bfq_setup_merge() is called. This can happen e.g. because
the process submitted IO for a different cgroup and thus bfqq got
reparented. It can even happen that the bfqq we are merging with has
parent cgroup that is already offline and going to be destroyed in which
case the merge can lead to use-after-free issues such as:

BUG: KASAN: use-after-free in __bfq_deactivate_entity+0x9cb/0xa50
Read of size 8 at addr ffff88800693c0c0 by task runc:[2:INIT]/10544

CPU: 0 PID: 10544 Comm: runc:[2:INIT] Tainted: G            E     5.15.2-0.g5fb85fd-default #1 openSUSE Tumbleweed (unreleased) f1f3b891c72369aebecd2e43e4641a6358867c70
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a-rebuilt.opensuse.org 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x46/0x5a
 print_address_description.constprop.0+0x1f/0x140
 ? __bfq_deactivate_entity+0x9cb/0xa50
 kasan_report.cold+0x7f/0x11b
 ? __bfq_deactivate_entity+0x9cb/0xa50
 __bfq_deactivate_entity+0x9cb/0xa50
 ? update_curr+0x32f/0x5d0
 bfq_deactivate_entity+0xa0/0x1d0
 bfq_del_bfqq_busy+0x28a/0x420
 ? resched_curr+0x116/0x1d0
 ? bfq_requeue_bfqq+0x70/0x70
 ? check_preempt_wakeup+0x52b/0xbc0
 __bfq_bfqq_expire+0x1a2/0x270
 bfq_bfqq_expire+0xd16/0x2160
 ? try_to_wake_up+0x4ee/0x1260
 ? bfq_end_wr_async_queues+0xe0/0xe0
 ? _raw_write_unlock_bh+0x60/0x60
 ? _raw_spin_lock_irq+0x81/0xe0
 bfq_idle_slice_timer+0x109/0x280
 ? bfq_dispatch_request+0x4870/0x4870
 __hrtimer_run_queues+0x37d/0x700
 ? enqueue_hrtimer+0x1b0/0x1b0
 ? kvm_clock_get_cycles+0xd/0x10
 ? ktime_get_update_offsets_now+0x6f/0x280
 hrtimer_interrupt+0x2c8/0x740

Fix the problem by checking that the parent of the two bfqqs we are
merging in bfq_setup_merge() is the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49412/">CVE-2022-49412 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49412">CVE-2022-49412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238436">SUSE bug 1238436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49413</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49413" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49413" ref_url="https://www.suse.com/security/cve/CVE-2022-49413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bfq: Update cgroup information before merging bio

When the process is migrated to a different cgroup (or in case of
writeback just starts submitting bios associated with a different
cgroup) bfq_merge_bio() can operate with stale cgroup information in
bic. Thus the bio can be merged to a request from a different cgroup or
it can result in merging of bfqqs for different cgroups or bfqqs of
already dead cgroups and causing possible use-after-free issues. Fix the
problem by updating cgroup information in bfq_merge_bio().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49413/">CVE-2022-49413 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49413">CVE-2022-49413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238710">SUSE bug 1238710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238711">SUSE bug 1238711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49416" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49416" ref_url="https://www.suse.com/security/cve/CVE-2022-49416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix use-after-free in chanctx code

In ieee80211_vif_use_reserved_context(), when we have an
old context and the new context's replace_state is set to
IEEE80211_CHANCTX_REPLACE_NONE, we free the old context
in ieee80211_vif_use_reserved_reassign(). Therefore, we
cannot check the old_ctx anymore, so we should set it to
NULL after this point.

However, since the new_ctx replace state is clearly not
IEEE80211_CHANCTX_REPLACES_OTHER, we're not going to do
anything else in this function and can just return to
avoid accessing the freed old_ctx.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49416/">CVE-2022-49416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49416">CVE-2022-49416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238293">SUSE bug 1238293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49418" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49418" ref_url="https://www.suse.com/security/cve/CVE-2022-49418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Fix free of uninitialized nfs4_label on referral lookup.

Send along the already-allocated fattr along with nfs4_fs_locations, and
drop the memcpy of fattr.  We end up growing two more allocations, but this
fixes up a crash as:

PID: 790    TASK: ffff88811b43c000  CPU: 0   COMMAND: "ls"
 #0 [ffffc90000857920] panic at ffffffff81b9bfde
 #1 [ffffc900008579c0] do_trap at ffffffff81023a9b
 #2 [ffffc90000857a10] do_error_trap at ffffffff81023b78
 #3 [ffffc90000857a58] exc_stack_segment at ffffffff81be1f45
 #4 [ffffc90000857a80] asm_exc_stack_segment at ffffffff81c009de
 #5 [ffffc90000857b08] nfs_lookup at ffffffffa0302322 [nfs]
 #6 [ffffc90000857b70] __lookup_slow at ffffffff813a4a5f
 #7 [ffffc90000857c60] walk_component at ffffffff813a86c4
 #8 [ffffc90000857cb8] path_lookupat at ffffffff813a9553
 #9 [ffffc90000857cf0] filename_lookup at ffffffff813ab86b
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49418/">CVE-2022-49418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49418">CVE-2022-49418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238878">SUSE bug 1238878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49426</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49426" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49426" ref_url="https://www.suse.com/security/cve/CVE-2022-49426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu-v3-sva: Fix mm use-after-free

We currently call arm64_mm_context_put() without holding a reference to
the mm, which can result in use-after-free. Call mmgrab()/mmdrop() to
ensure the mm only gets freed after we unpinned the ASID.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49426/">CVE-2022-49426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49426">CVE-2022-49426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238445">SUSE bug 1238445</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49429" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49429" ref_url="https://www.suse.com/security/cve/CVE-2022-49429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hfi1: Prevent panic when SDMA is disabled

If the hfi1 module is loaded with HFI1_CAP_SDMA off, a call to
hfi1_write_iter() will dereference a NULL pointer and panic. A typical
stack frame is:

  sdma_select_user_engine [hfi1]
  hfi1_user_sdma_process_request [hfi1]
  hfi1_write_iter [hfi1]
  do_iter_readv_writev
  do_iter_write
  vfs_writev
  do_writev
  do_syscall_64

The fix is to test for SDMA in hfi1_write_iter() and fail the I/O with
EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49429/">CVE-2022-49429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49429">CVE-2022-49429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238889">SUSE bug 1238889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49432</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49432" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49432" ref_url="https://www.suse.com/security/cve/CVE-2022-49432" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/xics: fix refcount leak in icp_opal_init()

The of_find_compatible_node() function returns a node pointer with
refcount incremented, use of_node_put() on it when done.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49432/">CVE-2022-49432 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49432">CVE-2022-49432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238950">SUSE bug 1238950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49433" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49433" ref_url="https://www.suse.com/security/cve/CVE-2022-49433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hfi1: Prevent use of lock before it is initialized

If there is a failure during probe of hfi1 before the sdma_map_lock is
initialized, the call to hfi1_free_devdata() will attempt to use a lock
that has not been initialized. If the locking correctness validator is on
then an INFO message and stack trace resembling the following may be seen:

  INFO: trying to register non-static key.
  The code is fine but needs lockdep annotation, or maybe
  you didn't initialize this object before use?
  turning off the locking correctness validator.
  Call Trace:
  register_lock_class+0x11b/0x880
  __lock_acquire+0xf3/0x7930
  lock_acquire+0xff/0x2d0
  _raw_spin_lock_irq+0x46/0x60
  sdma_clean+0x42a/0x660 [hfi1]
  hfi1_free_devdata+0x3a7/0x420 [hfi1]
  init_one+0x867/0x11a0 [hfi1]
  pci_device_probe+0x40e/0x8d0

The use of sdma_map_lock in sdma_clean() is for freeing the sdma_map
memory, and sdma_map is not allocated/initialized until after
sdma_map_lock has been initialized. This code only needs to be run if
sdma_map is not NULL, and so checking for that condition will avoid trying
to use the lock before it is initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49433/">CVE-2022-49433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49433">CVE-2022-49433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238268">SUSE bug 1238268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49434" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49434" ref_url="https://www.suse.com/security/cve/CVE-2022-49434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()

The sysfs sriov_numvfs_store() path acquires the device lock before the
config space access lock:

  sriov_numvfs_store
    device_lock                 # A (1) acquire device lock
    sriov_configure
      vfio_pci_sriov_configure  # (for example)
        vfio_pci_core_sriov_configure
          pci_disable_sriov
            sriov_disable
              pci_cfg_access_lock
                pci_wait_cfg    # B (4) wait for dev-&gt;block_cfg_access == 0

Previously, pci_dev_lock() acquired the config space access lock before the
device lock:

  pci_dev_lock
    pci_cfg_access_lock
      dev-&gt;block_cfg_access = 1 # B (2) set dev-&gt;block_cfg_access = 1
    device_lock                 # A (3) wait for device lock

Any path that uses pci_dev_lock(), e.g., pci_reset_function(), may
deadlock with sriov_numvfs_store() if the operations occur in the sequence
(1) (2) (3) (4).

Avoid the deadlock by reversing the order in pci_dev_lock() so it acquires
the device lock before the config space access lock, the same as the
sriov_numvfs_store() path.

[bhelgaas: combined and adapted commit log from Jay Zhou's independent
subsequent posting:
https://lore.kernel.org/r/20220404062539.1710-1-jianjay.zhou@huawei.com]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49434/">CVE-2022-49434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49434">CVE-2022-49434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238916">SUSE bug 1238916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49437</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49437" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49437" ref_url="https://www.suse.com/security/cve/CVE-2022-49437" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/xive: Fix refcount leak in xive_spapr_init

of_find_compatible_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49437/">CVE-2022-49437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49437">CVE-2022-49437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238443">SUSE bug 1238443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49440" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49440" ref_url="https://www.suse.com/security/cve/CVE-2022-49440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/rtas: Keep MSR[RI] set when calling RTAS

RTAS runs in real mode (MSR[DR] and MSR[IR] unset) and in 32-bit big
endian mode (MSR[SF,LE] unset).

The change in MSR is done in enter_rtas() in a relatively complex way,
since the MSR value could be hardcoded.

Furthermore, a panic has been reported when hitting the watchdog interrupt
while running in RTAS, this leads to the following stack trace:

  watchdog: CPU 24 Hard LOCKUP
  watchdog: CPU 24 TB:997512652051031, last heartbeat TB:997504470175378 (15980ms ago)
  ...
  Supported: No, Unreleased kernel
  CPU: 24 PID: 87504 Comm: drmgr Kdump: loaded Tainted: G            E  X    5.14.21-150400.71.1.bz196362_2-default #1 SLE15-SP4 (unreleased) 0d821077ef4faa8dfaf370efb5fdca1fa35f4e2c
  NIP:  000000001fb41050 LR: 000000001fb4104c CTR: 0000000000000000
  REGS: c00000000fc33d60 TRAP: 0100   Tainted: G            E  X     (5.14.21-150400.71.1.bz196362_2-default)
  MSR:  8000000002981000 &lt;SF,VEC,VSX,ME&gt;  CR: 48800002  XER: 20040020
  CFAR: 000000000000011c IRQMASK: 1
  GPR00: 0000000000000003 ffffffffffffffff 0000000000000001 00000000000050dc
  GPR04: 000000001ffb6100 0000000000000020 0000000000000001 000000001fb09010
  GPR08: 0000000020000000 0000000000000000 0000000000000000 0000000000000000
  GPR12: 80040000072a40a8 c00000000ff8b680 0000000000000007 0000000000000034
  GPR16: 000000001fbf6e94 000000001fbf6d84 000000001fbd1db0 000000001fb3f008
  GPR20: 000000001fb41018 ffffffffffffffff 000000000000017f fffffffffffff68f
  GPR24: 000000001fb18fe8 000000001fb3e000 000000001fb1adc0 000000001fb1cf40
  GPR28: 000000001fb26000 000000001fb460f0 000000001fb17f18 000000001fb17000
  NIP [000000001fb41050] 0x1fb41050
  LR [000000001fb4104c] 0x1fb4104c
  Call Trace:
  Instruction dump:
  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  Oops: Unrecoverable System Reset, sig: 6 [#1]
  LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
  ...
  Supported: No, Unreleased kernel
  CPU: 24 PID: 87504 Comm: drmgr Kdump: loaded Tainted: G            E  X    5.14.21-150400.71.1.bz196362_2-default #1 SLE15-SP4 (unreleased) 0d821077ef4faa8dfaf370efb5fdca1fa35f4e2c
  NIP:  000000001fb41050 LR: 000000001fb4104c CTR: 0000000000000000
  REGS: c00000000fc33d60 TRAP: 0100   Tainted: G            E  X     (5.14.21-150400.71.1.bz196362_2-default)
  MSR:  8000000002981000 &lt;SF,VEC,VSX,ME&gt;  CR: 48800002  XER: 20040020
  CFAR: 000000000000011c IRQMASK: 1
  GPR00: 0000000000000003 ffffffffffffffff 0000000000000001 00000000000050dc
  GPR04: 000000001ffb6100 0000000000000020 0000000000000001 000000001fb09010
  GPR08: 0000000020000000 0000000000000000 0000000000000000 0000000000000000
  GPR12: 80040000072a40a8 c00000000ff8b680 0000000000000007 0000000000000034
  GPR16: 000000001fbf6e94 000000001fbf6d84 000000001fbd1db0 000000001fb3f008
  GPR20: 000000001fb41018 ffffffffffffffff 000000000000017f fffffffffffff68f
  GPR24: 000000001fb18fe8 000000001fb3e000 000000001fb1adc0 000000001fb1cf40
  GPR28: 000000001fb26000 000000001fb460f0 000000001fb17f18 000000001fb17000
  NIP [000000001fb41050] 0x1fb41050
  LR [000000001fb4104c] 0x1fb4104c
  Call Trace:
  Instruction dump:
  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  ---[ end trace 3ddec07f638c34a2 ]---

This happens because MSR[RI] is unset when entering RTAS but there is no
valid reason to not set it here.

RTAS is expected to be called with MSR[RI] as specified in PAPR+ section
"7.2.1 Machine State":

  R1-7.2.1-9. If called with MSR[RI] equal to 1, then RTAS must protect
  its own critical regions from recursion by setting the MSR[RI] bit to
  0 when in the critical regions.

Fixing this by reviewing the way MSR is compute before calling RTAS. Now a
hardcoded value meaning real 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49440/">CVE-2022-49440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49440">CVE-2022-49440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238945">SUSE bug 1238945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49442</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49442" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49442" ref_url="https://www.suse.com/security/cve/CVE-2022-49442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/base/node.c: fix compaction sysfs file leak

Compaction sysfs file is created via compaction_register_node in
register_node.  But we forgot to remove it in unregister_node.  Thus
compaction sysfs file is leaked.  Using compaction_unregister_node to fix
this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49442/">CVE-2022-49442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49442">CVE-2022-49442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238243">SUSE bug 1238243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49443" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49443" ref_url="https://www.suse.com/security/cve/CVE-2022-49443" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

list: fix a data-race around ep-&gt;rdllist

ep_poll() first calls ep_events_available() with no lock held and checks
if ep-&gt;rdllist is empty by list_empty_careful(), which reads
rdllist-&gt;prev.  Thus all accesses to it need some protection to avoid
store/load-tearing.

Note INIT_LIST_HEAD_RCU() already has the annotation for both prev
and next.

Commit bf3b9f6372c4 ("epoll: Add busy poll support to epoll with socket
fds.") added the first lockless ep_events_available(), and commit
c5a282e9635e ("fs/epoll: reduce the scope of wq lock in epoll_wait()")
made some ep_events_available() calls lockless and added single call under
a lock, finally commit e59d3c64cba6 ("epoll: eliminate unnecessary lock
for zero timeout") made the last ep_events_available() lockless.

BUG: KCSAN: data-race in do_epoll_wait / do_epoll_wait

write to 0xffff88810480c7d8 of 8 bytes by task 1802 on cpu 0:
 INIT_LIST_HEAD include/linux/list.h:38 [inline]
 list_splice_init include/linux/list.h:492 [inline]
 ep_start_scan fs/eventpoll.c:622 [inline]
 ep_send_events fs/eventpoll.c:1656 [inline]
 ep_poll fs/eventpoll.c:1806 [inline]
 do_epoll_wait+0x4eb/0xf40 fs/eventpoll.c:2234
 do_epoll_pwait fs/eventpoll.c:2268 [inline]
 __do_sys_epoll_pwait fs/eventpoll.c:2281 [inline]
 __se_sys_epoll_pwait+0x12b/0x240 fs/eventpoll.c:2275
 __x64_sys_epoll_pwait+0x74/0x80 fs/eventpoll.c:2275
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae

read to 0xffff88810480c7d8 of 8 bytes by task 1799 on cpu 1:
 list_empty_careful include/linux/list.h:329 [inline]
 ep_events_available fs/eventpoll.c:381 [inline]
 ep_poll fs/eventpoll.c:1797 [inline]
 do_epoll_wait+0x279/0xf40 fs/eventpoll.c:2234
 do_epoll_pwait fs/eventpoll.c:2268 [inline]
 __do_sys_epoll_pwait fs/eventpoll.c:2281 [inline]
 __se_sys_epoll_pwait+0x12b/0x240 fs/eventpoll.c:2275
 __x64_sys_epoll_pwait+0x74/0x80 fs/eventpoll.c:2275
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae

value changed: 0xffff88810480c7d0 -&gt; 0xffff888103c15098

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 PID: 1799 Comm: syz-fuzzer Tainted: G        W         5.17.0-rc7-syzkaller-dirty #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49443/">CVE-2022-49443 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49443">CVE-2022-49443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238434">SUSE bug 1238434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49451</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49451" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49451" ref_url="https://www.suse.com/security/cve/CVE-2022-49451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Fix list protocols enumeration in the base protocol

While enumerating protocols implemented by the SCMI platform using
BASE_DISCOVER_LIST_PROTOCOLS, the number of returned protocols is
currently validated in an improper way since the check employs a sum
between unsigned integers that could overflow and cause the check itself
to be silently bypassed if the returned value 'loop_num_ret' is big
enough.

Fix the validation avoiding the addition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49451/">CVE-2022-49451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49451">CVE-2022-49451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238177">SUSE bug 1238177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49465" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49465" ref_url="https://www.suse.com/security/cve/CVE-2022-49465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02396-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02398-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02402-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02415-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02422-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-throttle: Set BIO_THROTTLED when bio has been throttled

1.In current process, all bio will set the BIO_THROTTLED flag
after __blk_throtl_bio().

2.If bio needs to be throttled, it will start the timer and
stop submit bio directly. Bio will submit in
blk_throtl_dispatch_work_fn() when the timer expires.But in
the current process, if bio is throttled. The BIO_THROTTLED
will be set to bio after timer start. If the bio has been
completed, it may cause use-after-free blow.

BUG: KASAN: use-after-free in blk_throtl_bio+0x12f0/0x2c70
Read of size 2 at addr ffff88801b8902d4 by task fio/26380

 dump_stack+0x9b/0xce
 print_address_description.constprop.6+0x3e/0x60
 kasan_report.cold.9+0x22/0x3a
 blk_throtl_bio+0x12f0/0x2c70
 submit_bio_checks+0x701/0x1550
 submit_bio_noacct+0x83/0xc80
 submit_bio+0xa7/0x330
 mpage_readahead+0x380/0x500
 read_pages+0x1c1/0xbf0
 page_cache_ra_unbounded+0x471/0x6f0
 do_page_cache_ra+0xda/0x110
 ondemand_readahead+0x442/0xae0
 page_cache_async_ra+0x210/0x300
 generic_file_buffered_read+0x4d9/0x2130
 generic_file_read_iter+0x315/0x490
 blkdev_read_iter+0x113/0x1b0
 aio_read+0x2ad/0x450
 io_submit_one+0xc8e/0x1d60
 __se_sys_io_submit+0x125/0x350
 do_syscall_64+0x2d/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

Allocated by task 26380:
 kasan_save_stack+0x19/0x40
 __kasan_kmalloc.constprop.2+0xc1/0xd0
 kmem_cache_alloc+0x146/0x440
 mempool_alloc+0x125/0x2f0
 bio_alloc_bioset+0x353/0x590
 mpage_alloc+0x3b/0x240
 do_mpage_readpage+0xddf/0x1ef0
 mpage_readahead+0x264/0x500
 read_pages+0x1c1/0xbf0
 page_cache_ra_unbounded+0x471/0x6f0
 do_page_cache_ra+0xda/0x110
 ondemand_readahead+0x442/0xae0
 page_cache_async_ra+0x210/0x300
 generic_file_buffered_read+0x4d9/0x2130
 generic_file_read_iter+0x315/0x490
 blkdev_read_iter+0x113/0x1b0
 aio_read+0x2ad/0x450
 io_submit_one+0xc8e/0x1d60
 __se_sys_io_submit+0x125/0x350
 do_syscall_64+0x2d/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9

Freed by task 0:
 kasan_save_stack+0x19/0x40
 kasan_set_track+0x1c/0x30
 kasan_set_free_info+0x1b/0x30
 __kasan_slab_free+0x111/0x160
 kmem_cache_free+0x94/0x460
 mempool_free+0xd6/0x320
 bio_free+0xe0/0x130
 bio_put+0xab/0xe0
 bio_endio+0x3a6/0x5d0
 blk_update_request+0x590/0x1370
 scsi_end_request+0x7d/0x400
 scsi_io_completion+0x1aa/0xe50
 scsi_softirq_done+0x11b/0x240
 blk_mq_complete_request+0xd4/0x120
 scsi_mq_done+0xf0/0x200
 virtscsi_vq_done+0xbc/0x150
 vring_interrupt+0x179/0x390
 __handle_irq_event_percpu+0xf7/0x490
 handle_irq_event_percpu+0x7b/0x160
 handle_irq_event+0xcc/0x170
 handle_edge_irq+0x215/0xb20
 common_interrupt+0x60/0x120
 asm_common_interrupt+0x1e/0x40

Fix this by move BIO_THROTTLED set into the queue_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49465/">CVE-2022-49465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49465">CVE-2022-49465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238919">SUSE bug 1238919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238920">SUSE bug 1238920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49466" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49466" ref_url="https://www.suse.com/security/cve/CVE-2022-49466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: scmi: Fix refcount leak in scmi_regulator_probe

of_find_node_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49466/">CVE-2022-49466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49466">CVE-2022-49466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238287">SUSE bug 1238287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49471</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49471" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49471" ref_url="https://www.suse.com/security/cve/CVE-2022-49471" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtw89: cfo: check mac_id to avoid out-of-bounds

Somehow, hardware reports incorrect mac_id and pollute memory. Check index
before we access the array.

  UBSAN: array-index-out-of-bounds in rtw89/phy.c:2517:23
  index 188 is out of range for type 's32 [64]'
  CPU: 1 PID: 51550 Comm: irq/35-rtw89_pc Tainted: G           OE
  Call Trace:
   &lt;IRQ&gt;
   show_stack+0x52/0x58
   dump_stack_lvl+0x4c/0x63
   dump_stack+0x10/0x12
   ubsan_epilogue+0x9/0x45
   __ubsan_handle_out_of_bounds.cold+0x44/0x49
   ? __alloc_skb+0x92/0x1d0
   rtw89_phy_cfo_parse+0x44/0x7f [rtw89_core]
   rtw89_core_rx+0x261/0x871 [rtw89_core]
   ? __alloc_skb+0xee/0x1d0
   rtw89_pci_napi_poll+0x3fa/0x4ea [rtw89_pci]
   __napi_poll+0x33/0x1a0
   net_rx_action+0x126/0x260
   ? __queue_work+0x217/0x4c0
   __do_softirq+0xd9/0x315
   ? disable_irq_nosync+0x10/0x10
   do_softirq.part.0+0x6d/0x90
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   __local_bh_enable_ip+0x62/0x70
   rtw89_pci_interrupt_threadfn+0x182/0x1a6 [rtw89_pci]
   irq_thread_fn+0x28/0x60
   irq_thread+0xc8/0x190
   ? irq_thread_fn+0x60/0x60
   kthread+0x16b/0x190
   ? irq_thread_check_affinity+0xe0/0xe0
   ? set_kthread_struct+0x50/0x50
   ret_from_fork+0x22/0x30
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49471/">CVE-2022-49471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49471">CVE-2022-49471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238935">SUSE bug 1238935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49492" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49492" ref_url="https://www.suse.com/security/cve/CVE-2022-49492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags

In nvme_alloc_admin_tags, the admin_q can be set to an error (typically
-ENOMEM) if the blk_mq_init_queue call fails to set up the queue, which
is checked immediately after the call. However, when we return the error
message up the stack, to nvme_reset_work the error takes us to
nvme_remove_dead_ctrl()
  nvme_dev_disable()
   nvme_suspend_queue(&amp;dev-&gt;queues[0]).

Here, we only check that the admin_q is non-NULL, rather than not
an error or NULL, and begin quiescing a queue that never existed, leading
to bad / NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49492/">CVE-2022-49492 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49492">CVE-2022-49492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238954">SUSE bug 1238954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49504</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49504" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49504" ref_url="https://www.suse.com/security/cve/CVE-2022-49504" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Inhibit aborts if external loopback plug is inserted

After running a short external loopback test, when the external loopback is
removed and a normal cable inserted that is directly connected to a target
device, the system oops in the llpfc_set_rrq_active() routine.

When the loopback was inserted an FLOGI was transmit. As we're looped back,
we receive the FLOGI request. The FLOGI is ABTS'd as we recognize the same
wppn thus understand it's a loopback. However, as the ABTS sends address
information the port is not set to (fffffe), the ABTS is dropped on the
wire. A short 1 frame loopback test is run and completes before the ABTS
times out. The looback is unplugged and the new cable plugged in, and the
an FLOGI to the new device occurs and completes. Due to a mixup in ref
counting the completion of the new FLOGI releases the fabric ndlp. Then the
original ABTS completes and references the released ndlp generating the
oops.

Correct by no-op'ing the ABTS when in loopback mode (it will be dropped
anyway). Added a flag to track the mode to recognize when it should be
no-op'd.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49504/">CVE-2022-49504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49504">CVE-2022-49504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238835">SUSE bug 1238835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49511" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49511" ref_url="https://www.suse.com/security/cve/CVE-2022-49511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: defio: fix the pagelist corruption

Easily hit the below list corruption:
==
list_add corruption. prev-&gt;next should be next (ffffffffc0ceb090), but
was ffffec604507edc8. (prev=ffffec604507edc8).
WARNING: CPU: 65 PID: 3959 at lib/list_debug.c:26
__list_add_valid+0x53/0x80
CPU: 65 PID: 3959 Comm: fbdev Tainted: G     U
RIP: 0010:__list_add_valid+0x53/0x80
Call Trace:
 &lt;TASK&gt;
 fb_deferred_io_mkwrite+0xea/0x150
 do_page_mkwrite+0x57/0xc0
 do_wp_page+0x278/0x2f0
 __handle_mm_fault+0xdc2/0x1590
 handle_mm_fault+0xdd/0x2c0
 do_user_addr_fault+0x1d3/0x650
 exc_page_fault+0x77/0x180
 ? asm_exc_page_fault+0x8/0x30
 asm_exc_page_fault+0x1e/0x30
RIP: 0033:0x7fd98fc8fad1
==

Figure out the race happens when one process is adding &amp;page-&gt;lru into
the pagelist tail in fb_deferred_io_mkwrite(), another process is
re-initializing the same &amp;page-&gt;lru in fb_deferred_io_fault(), which is
not protected by the lock.

This fix is to init all the page lists one time during initialization,
it not only fixes the list corruption, but also avoids INIT_LIST_HEAD()
redundantly.

V2: change "int i" to "unsigned int i" (Geert Uytterhoeven)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49511/">CVE-2022-49511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49511">CVE-2022-49511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238551">SUSE bug 1238551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49513</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49513" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49513" ref_url="https://www.suse.com/security/cve/CVE-2022-49513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: governor: Use kobject release() method to free dbs_data

The struct dbs_data embeds a struct gov_attr_set and
the struct gov_attr_set embeds a kobject. Since every kobject must have
a release() method and we can't use kfree() to free it directly,
so introduce cpufreq_dbs_data_release() to release the dbs_data via
the kobject::release() method. This fixes the calltrace like below:

  ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x34
  WARNING: CPU: 12 PID: 810 at lib/debugobjects.c:505 debug_print_object+0xb8/0x100
  Modules linked in:
  CPU: 12 PID: 810 Comm: sh Not tainted 5.16.0-next-20220120-yocto-standard+ #536
  Hardware name: Marvell OcteonTX CN96XX board (DT)
  pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : debug_print_object+0xb8/0x100
  lr : debug_print_object+0xb8/0x100
  sp : ffff80001dfcf9a0
  x29: ffff80001dfcf9a0 x28: 0000000000000001 x27: ffff0001464f0000
  x26: 0000000000000000 x25: ffff8000090e3f00 x24: ffff80000af60210
  x23: ffff8000094dfb78 x22: ffff8000090e3f00 x21: ffff0001080b7118
  x20: ffff80000aeb2430 x19: ffff800009e8f5e0 x18: 0000000000000000
  x17: 0000000000000002 x16: 00004d62e58be040 x15: 013590470523aff8
  x14: ffff8000090e1828 x13: 0000000001359047 x12: 00000000f5257d14
  x11: 0000000000040591 x10: 0000000066c1ffea x9 : ffff8000080d15e0
  x8 : ffff80000a1765a8 x7 : 0000000000000000 x6 : 0000000000000001
  x5 : ffff800009e8c000 x4 : ffff800009e8c760 x3 : 0000000000000000
  x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0001474ed040
  Call trace:
   debug_print_object+0xb8/0x100
   __debug_check_no_obj_freed+0x1d0/0x25c
   debug_check_no_obj_freed+0x24/0xa0
   kfree+0x11c/0x440
   cpufreq_dbs_governor_exit+0xa8/0xac
   cpufreq_exit_governor+0x44/0x90
   cpufreq_set_policy+0x29c/0x570
   store_scaling_governor+0x110/0x154
   store+0xb0/0xe0
   sysfs_kf_write+0x58/0x84
   kernfs_fop_write_iter+0x12c/0x1c0
   new_sync_write+0xf0/0x18c
   vfs_write+0x1cc/0x220
   ksys_write+0x74/0x100
   __arm64_sys_write+0x28/0x3c
   invoke_syscall.constprop.0+0x58/0xf0
   do_el0_svc+0x70/0x170
   el0_svc+0x54/0x190
   el0t_64_sync_handler+0xa4/0x130
   el0t_64_sync+0x1a0/0x1a4
  irq event stamp: 189006
  hardirqs last  enabled at (189005): [&lt;ffff8000080849d0&gt;] finish_task_switch.isra.0+0xe0/0x2c0
  hardirqs last disabled at (189006): [&lt;ffff8000090667a4&gt;] el1_dbg+0x24/0xa0
  softirqs last  enabled at (188966): [&lt;ffff8000080106d0&gt;] __do_softirq+0x4b0/0x6a0
  softirqs last disabled at (188957): [&lt;ffff80000804a618&gt;] __irq_exit_rcu+0x108/0x1a4

[ rjw: Because can be freed by the gov_attr_set_put() in
  cpufreq_dbs_governor_exit() now, it is also necessary to put the
  invocation of the governor -&gt;exit() callback into the new
  cpufreq_dbs_data_release() function. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49513/">CVE-2022-49513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49513">CVE-2022-49513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237800">SUSE bug 1237800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49515</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49515" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49515" ref_url="https://www.suse.com/security/cve/CVE-2022-49515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: cs35l41: Fix an out-of-bounds access in otp_packed_element_t

The CS35L41_NUM_OTP_ELEM is 100, but only 99 entries are defined in
the array otp_map_1/2[CS35L41_NUM_OTP_ELEM], this will trigger UBSAN
to report a shift-out-of-bounds warning in the cs35l41_otp_unpack()
since the last entry in the array will result in GENMASK(-1, 0).

UBSAN reports this problem:
 UBSAN: shift-out-of-bounds in /home/hwang4/build/jammy/jammy/sound/soc/codecs/cs35l41-lib.c:836:8
 shift exponent 64 is too large for 64-bit type 'long unsigned int'
 CPU: 10 PID: 595 Comm: systemd-udevd Not tainted 5.15.0-23-generic #23
 Hardware name: LENOVO \x02MFG_IN_GO/\x02MFG_IN_GO, BIOS N3GET19W (1.00 ) 03/11/2022
 Call Trace:
  &lt;TASK&gt;
  show_stack+0x52/0x58
  dump_stack_lvl+0x4a/0x5f
  dump_stack+0x10/0x12
  ubsan_epilogue+0x9/0x45
  __ubsan_handle_shift_out_of_bounds.cold+0x61/0xef
  ? regmap_unlock_mutex+0xe/0x10
  cs35l41_otp_unpack.cold+0x1c6/0x2b2 [snd_soc_cs35l41_lib]
  cs35l41_hda_probe+0x24f/0x33a [snd_hda_scodec_cs35l41]
  cs35l41_hda_i2c_probe+0x65/0x90 [snd_hda_scodec_cs35l41_i2c]
  ? cs35l41_hda_i2c_remove+0x20/0x20 [snd_hda_scodec_cs35l41_i2c]
  i2c_device_probe+0x252/0x2b0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49515/">CVE-2022-49515 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49515">CVE-2022-49515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237817">SUSE bug 1237817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49519" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49519" ref_url="https://www.suse.com/security/cve/CVE-2022-49519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath10k: skip ath10k_halt during suspend for driver state RESTARTING

Double free crash is observed when FW recovery(caused by wmi
timeout/crash) is followed by immediate suspend event. The FW recovery
is triggered by ath10k_core_restart() which calls driver clean up via
ath10k_halt(). When the suspend event occurs between the FW recovery,
the restart worker thread is put into frozen state until suspend completes.
The suspend event triggers ath10k_stop() which again triggers ath10k_halt()
The double invocation of ath10k_halt() causes ath10k_htt_rx_free() to be
called twice(Note: ath10k_htt_rx_alloc was not called by restart worker
thread because of its frozen state), causing the crash.

To fix this, during the suspend flow, skip call to ath10k_halt() in
ath10k_stop() when the current driver state is ATH10K_STATE_RESTARTING.
Also, for driver state ATH10K_STATE_RESTARTING, call
ath10k_wait_for_suspend() in ath10k_stop(). This is because call to
ath10k_wait_for_suspend() is skipped later in
[ath10k_halt() &gt; ath10k_core_stop()] for the driver state
ATH10K_STATE_RESTARTING.

The frozen restart worker thread will be cancelled during resume when the
device comes out of suspend.

Below is the crash stack for reference:

[  428.469167] ------------[ cut here ]------------
[  428.469180] kernel BUG at mm/slub.c:4150!
[  428.469193] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[  428.469219] Workqueue: events_unbound async_run_entry_fn
[  428.469230] RIP: 0010:kfree+0x319/0x31b
[  428.469241] RSP: 0018:ffffa1fac015fc30 EFLAGS: 00010246
[  428.469247] RAX: ffffedb10419d108 RBX: ffff8c05262b0000
[  428.469252] RDX: ffff8c04a8c07000 RSI: 0000000000000000
[  428.469256] RBP: ffffa1fac015fc78 R08: 0000000000000000
[  428.469276] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  428.469285] Call Trace:
[  428.469295]  ? dma_free_attrs+0x5f/0x7d
[  428.469320]  ath10k_core_stop+0x5b/0x6f
[  428.469336]  ath10k_halt+0x126/0x177
[  428.469352]  ath10k_stop+0x41/0x7e
[  428.469387]  drv_stop+0x88/0x10e
[  428.469410]  __ieee80211_suspend+0x297/0x411
[  428.469441]  rdev_suspend+0x6e/0xd0
[  428.469462]  wiphy_suspend+0xb1/0x105
[  428.469483]  ? name_show+0x2d/0x2d
[  428.469490]  dpm_run_callback+0x8c/0x126
[  428.469511]  ? name_show+0x2d/0x2d
[  428.469517]  __device_suspend+0x2e7/0x41b
[  428.469523]  async_suspend+0x1f/0x93
[  428.469529]  async_run_entry_fn+0x3d/0xd1
[  428.469535]  process_one_work+0x1b1/0x329
[  428.469541]  worker_thread+0x213/0x372
[  428.469547]  kthread+0x150/0x15f
[  428.469552]  ? pr_cont_work+0x58/0x58
[  428.469558]  ? kthread_blkcg+0x31/0x31

Tested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49519/">CVE-2022-49519 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49519">CVE-2022-49519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238943">SUSE bug 1238943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49520" ref_url="https://www.suse.com/security/cve/CVE-2022-49520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall

If a compat process tries to execute an unknown system call above the
__ARM_NR_COMPAT_END number, the kernel sends a SIGILL signal to the
offending process. Information about the error is printed to dmesg in
compat_arm_syscall() -&gt; arm64_notify_die() -&gt; arm64_force_sig_fault() -&gt;
arm64_show_signal().

arm64_show_signal() interprets a non-zero value for
current-&gt;thread.fault_code as an exception syndrome and displays the
message associated with the ESR_ELx.EC field (bits 31:26).
current-&gt;thread.fault_code is set in compat_arm_syscall() -&gt;
arm64_notify_die() with the bad syscall number instead of a valid ESR_ELx
value. This means that the ESR_ELx.EC field has the value that the user set
for the syscall number and the kernel can end up printing bogus exception
messages*. For example, for the syscall number 0x68000000, which evaluates
to ESR_ELx.EC value of 0x1A (ESR_ELx_EC_FPAC) the kernel prints this error:

[   18.349161] syscall[300]: unhandled exception: ERET/ERETAA/ERETAB, ESR 0x68000000, Oops - bad compat syscall(2) in syscall[10000+50000]
[   18.350639] CPU: 2 PID: 300 Comm: syscall Not tainted 5.18.0-rc1 #79
[   18.351249] Hardware name: Pine64 RockPro64 v2.0 (DT)
[..]

which is misleading, as the bad compat syscall has nothing to do with
pointer authentication.

Stop arm64_show_signal() from printing exception syndrome information by
having compat_arm_syscall() set the ESR_ELx value to 0, as it has no
meaning for an invalid system call number. The example above now becomes:

[   19.935275] syscall[301]: unhandled exception: Oops - bad compat syscall(2) in syscall[10000+50000]
[   19.936124] CPU: 1 PID: 301 Comm: syscall Not tainted 5.18.0-rc1-00005-g7e08006d4102 #80
[   19.936894] Hardware name: Pine64 RockPro64 v2.0 (DT)
[..]

which although shows less information because the syscall number,
wrongfully advertised as the ESR value, is missing, it is better than
showing plainly wrong information. The syscall number can be easily
obtained with strace.

*A 32-bit value above or equal to 0x8000_0000 is interpreted as a negative
integer in compat_arm_syscal() and the condition scno &lt; __ARM_NR_COMPAT_END
evaluates to true; the syscall will exit to userspace in this case with the
ENOSYS error code instead of arm64_notify_die() being called.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49520/">CVE-2022-49520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49520">CVE-2022-49520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238836">SUSE bug 1238836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49531" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49531" ref_url="https://www.suse.com/security/cve/CVE-2022-49531" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

loop: implement -&gt;free_disk

Ensure that the lo_device which is stored in the gendisk private
data is valid until the gendisk is freed.  Currently the loop driver
uses a lot of effort to make sure a device is not freed when it is
still in use, but to to fix a potential deadlock this will be relaxed
a bit soon.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49531/">CVE-2022-49531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49531">CVE-2022-49531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238923">SUSE bug 1238923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49534" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49534" ref_url="https://www.suse.com/security/cve/CVE-2022-49534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Protect memory leak for NPIV ports sending PLOGI_RJT

There is a potential memory leak in lpfc_ignore_els_cmpl() and
lpfc_els_rsp_reject() that was allocated from NPIV PLOGI_RJT
(lpfc_rcv_plogi()'s login_mbox).

Check if cmdiocb-&gt;context_un.mbox was allocated in lpfc_ignore_els_cmpl(),
and then free it back to phba-&gt;mbox_mem_pool along with mbox-&gt;ctx_buf for
service parameters.

For lpfc_els_rsp_reject() failure, free both the ctx_buf for service
parameters and the login_mbox.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49534/">CVE-2022-49534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49534">CVE-2022-49534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238893">SUSE bug 1238893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49536" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49536" ref_url="https://www.suse.com/security/cve/CVE-2022-49536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock

During stress I/O tests with 500+ vports, hard LOCKUP call traces are
observed.

CPU A:
 native_queued_spin_lock_slowpath+0x192
 _raw_spin_lock_irqsave+0x32
 lpfc_handle_fcp_err+0x4c6
 lpfc_fcp_io_cmd_wqe_cmpl+0x964
 lpfc_sli4_fp_handle_cqe+0x266
 __lpfc_sli4_process_cq+0x105
 __lpfc_sli4_hba_process_cq+0x3c
 lpfc_cq_poll_hdler+0x16
 irq_poll_softirq+0x76
 __softirqentry_text_start+0xe4
 irq_exit+0xf7
 do_IRQ+0x7f

CPU B:
 native_queued_spin_lock_slowpath+0x5b
 _raw_spin_lock+0x1c
 lpfc_abort_handler+0x13e
 scmd_eh_abort_handler+0x85
 process_one_work+0x1a7
 worker_thread+0x30
 kthread+0x112
 ret_from_fork+0x1f

Diagram of lockup:

CPUA                            CPUB
----                            ----
lpfc_cmd-&gt;buf_lock
                            phba-&gt;hbalock
                            lpfc_cmd-&gt;buf_lock
phba-&gt;hbalock

Fix by reordering the taking of the lpfc_cmd-&gt;buf_lock and phba-&gt;hbalock in
lpfc_abort_handler routine so that it tries to take the lpfc_cmd-&gt;buf_lock
first before phba-&gt;hbalock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49536/">CVE-2022-49536 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49536">CVE-2022-49536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238838">SUSE bug 1238838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49537" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49537" ref_url="https://www.suse.com/security/cve/CVE-2022-49537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix call trace observed during I/O with CMF enabled

The following was seen with CMF enabled:

BUG: using smp_processor_id() in preemptible
code: systemd-udevd/31711
kernel: caller is lpfc_update_cmf_cmd+0x214/0x420  [lpfc]
kernel: CPU: 12 PID: 31711 Comm: systemd-udevd
kernel: Call Trace:
kernel: &lt;TASK&gt;
kernel: dump_stack_lvl+0x44/0x57
kernel: check_preemption_disabled+0xbf/0xe0
kernel: lpfc_update_cmf_cmd+0x214/0x420 [lpfc]
kernel: lpfc_nvme_fcp_io_submit+0x23b4/0x4df0 [lpfc]

this_cpu_ptr() calls smp_processor_id() in a preemptible context.

Fix by using per_cpu_ptr() with raw_smp_processor_id() instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49537/">CVE-2022-49537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49537">CVE-2022-49537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238930">SUSE bug 1238930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49538" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49538" ref_url="https://www.suse.com/security/cve/CVE-2022-49538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: jack: Access input_dev under mutex

It is possible when using ASoC that input_dev is unregistered while
calling snd_jack_report, which causes NULL pointer dereference.
In order to prevent this serialize access to input_dev using mutex lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49538/">CVE-2022-49538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49538">CVE-2022-49538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238843">SUSE bug 1238843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49539" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49539" ref_url="https://www.suse.com/security/cve/CVE-2022-49539" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtw89: ser: fix CAM leaks occurring in L2 reset

The CAM, meaning address CAM and bssid CAM here, will get leaks during
SER (system error recover) L2 reset process and ieee80211_restart_hw()
which is called by L2 reset process eventually.

The normal flow would be like
-&gt; add interface (acquire 1)
-&gt; enter ips (release 1)
-&gt; leave ips (acquire 1)
-&gt; connection (occupy 1) &lt;(A) 1 leak after L2 reset if non-sec connection&gt;

The ieee80211_restart_hw() flow (under connection)
-&gt; ieee80211 reconfig
-&gt; add interface (acquire 1)
-&gt; leave ips (acquire 1)
-&gt; connection (occupy (A) + 2) &lt;(B) 1 more leak&gt;

Originally, CAM is released before HW restart only if connection is under
security. Now, release CAM whatever connection it is to fix leak in (A).
OTOH, check if CAM is already valid to avoid acquiring multiple times to
fix (B).

Besides, if AP mode, release address CAM of all stations before HW restart.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49539/">CVE-2022-49539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49539">CVE-2022-49539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238842">SUSE bug 1238842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49541" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49541" ref_url="https://www.suse.com/security/cve/CVE-2022-49541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential double free during failed mount

RHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=2088799
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49541/">CVE-2022-49541 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49541">CVE-2022-49541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238727">SUSE bug 1238727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49543" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49543" ref_url="https://www.suse.com/security/cve/CVE-2022-49543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath11k: fix the warning of dev_wake in mhi_pm_disable_transition()

When test device recovery with below command, it has warning in message
as below.
echo assert &gt; /sys/kernel/debug/ath11k/wcn6855\ hw2.0/simulate_fw_crash
echo assert &gt; /sys/kernel/debug/ath11k/qca6390\ hw2.0/simulate_fw_crash

warning message:
[ 1965.642121] ath11k_pci 0000:06:00.0: simulating firmware assert crash
[ 1968.471364] ieee80211 phy0: Hardware restart was requested
[ 1968.511305] ------------[ cut here ]------------
[ 1968.511368] WARNING: CPU: 3 PID: 1546 at drivers/bus/mhi/core/pm.c:505 mhi_pm_disable_transition+0xb37/0xda0 [mhi]
[ 1968.511443] Modules linked in: ath11k_pci ath11k mac80211 libarc4 cfg80211 qmi_helpers qrtr_mhi mhi qrtr nvme nvme_core
[ 1968.511563] CPU: 3 PID: 1546 Comm: kworker/u17:0 Kdump: loaded Tainted: G        W         5.17.0-rc3-wt-ath+ #579
[ 1968.511629] Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 05/28/2021
[ 1968.511704] Workqueue: mhi_hiprio_wq mhi_pm_st_worker [mhi]
[ 1968.511787] RIP: 0010:mhi_pm_disable_transition+0xb37/0xda0 [mhi]
[ 1968.511870] Code: a9 fe ff ff 4c 89 ff 44 89 04 24 e8 03 46 f6 e5 44 8b 04 24 41 83 f8 01 0f 84 21 fe ff ff e9 4c fd ff ff 0f 0b e9 af f8 ff ff &lt;0f&gt; 0b e9 5c f8 ff ff 48 89 df e8 da 9e ee e3 e9 12 fd ff ff 4c 89
[ 1968.511923] RSP: 0018:ffffc900024efbf0 EFLAGS: 00010286
[ 1968.511969] RAX: 00000000ffffffff RBX: ffff88811d241250 RCX: ffffffffc0176922
[ 1968.512014] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888118a90a24
[ 1968.512059] RBP: ffff888118a90800 R08: 0000000000000000 R09: ffff888118a90a27
[ 1968.512102] R10: ffffed1023152144 R11: 0000000000000001 R12: ffff888118a908ac
[ 1968.512229] R13: ffff888118a90928 R14: dffffc0000000000 R15: ffff888118a90a24
[ 1968.512310] FS:  0000000000000000(0000) GS:ffff888234200000(0000) knlGS:0000000000000000
[ 1968.512405] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1968.512493] CR2: 00007f5538f443a8 CR3: 000000016dc28001 CR4: 00000000003706e0
[ 1968.512587] Call Trace:
[ 1968.512672]  &lt;TASK&gt;
[ 1968.512751]  ? _raw_spin_unlock_irq+0x1f/0x40
[ 1968.512859]  mhi_pm_st_worker+0x3ac/0x790 [mhi]
[ 1968.512959]  ? mhi_pm_mission_mode_transition.isra.0+0x7d0/0x7d0 [mhi]
[ 1968.513063]  process_one_work+0x86a/0x1400
[ 1968.513184]  ? pwq_dec_nr_in_flight+0x230/0x230
[ 1968.513312]  ? move_linked_works+0x125/0x290
[ 1968.513416]  worker_thread+0x6db/0xf60
[ 1968.513536]  ? process_one_work+0x1400/0x1400
[ 1968.513627]  kthread+0x241/0x2d0
[ 1968.513733]  ? kthread_complete_and_exit+0x20/0x20
[ 1968.513821]  ret_from_fork+0x22/0x30
[ 1968.513924]  &lt;/TASK&gt;

Reason is mhi_deassert_dev_wake() from mhi_device_put() is called
but mhi_assert_dev_wake() from __mhi_device_get_sync() is not called
in progress of recovery. Commit 8e0559921f9a ("bus: mhi: core:
Skip device wake in error or shutdown state") add check for the
pm_state of mhi in __mhi_device_get_sync(), and the pm_state is not
the normal state untill recovery is completed, so it leads the
dev_wake is not 0 and above warning print in mhi_pm_disable_transition()
while checking mhi_cntrl-&gt;dev_wake.

Add check in ath11k_pci_write32()/ath11k_pci_read32() to skip call
mhi_device_put() if mhi_device_get_sync() does not really do wake,
then the warning gone.

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03003-QCAHSPSWPL_V1_V2_SILICONZ_LITE-2
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49543/">CVE-2022-49543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49543">CVE-2022-49543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238178">SUSE bug 1238178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49545</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49545" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49545" ref_url="https://www.suse.com/security/cve/CVE-2022-49545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02138-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024056.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Cancel pending work at closing a MIDI substream

At closing a USB MIDI output substream, there might be still a pending
work, which would eventually access the rawmidi runtime object that is
being released.  For fixing the race, make sure to cancel the pending
work at closing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49545/">CVE-2022-49545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49545">CVE-2022-49545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238729">SUSE bug 1238729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238730">SUSE bug 1238730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49548" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49548" ref_url="https://www.suse.com/security/cve/CVE-2022-49548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix potential array overflow in bpf_trampoline_get_progs()

The cnt value in the 'cnt &gt;= BPF_MAX_TRAMP_PROGS' check does not
include BPF_TRAMP_MODIFY_RETURN bpf programs, so the number of
the attached BPF_TRAMP_MODIFY_RETURN bpf programs in a trampoline
can exceed BPF_MAX_TRAMP_PROGS.

When this happens, the assignment '*progs++ = aux-&gt;prog' in
bpf_trampoline_get_progs() will cause progs array overflow as the
progs field in the bpf_tramp_progs struct can only hold at most
BPF_MAX_TRAMP_PROGS bpf programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49548/">CVE-2022-49548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49548">CVE-2022-49548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238648">SUSE bug 1238648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49552" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49552" ref_url="https://www.suse.com/security/cve/CVE-2022-49552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix combination of jit blinding and pointers to bpf subprogs.

The combination of jit blinding and pointers to bpf subprogs causes:
[   36.989548] BUG: unable to handle page fault for address: 0000000100000001
[   36.990342] #PF: supervisor instruction fetch in kernel mode
[   36.990968] #PF: error_code(0x0010) - not-present page
[   36.994859] RIP: 0010:0x100000001
[   36.995209] Code: Unable to access opcode bytes at RIP 0xffffffd7.
[   37.004091] Call Trace:
[   37.004351]  &lt;TASK&gt;
[   37.004576]  ? bpf_loop+0x4d/0x70
[   37.004932]  ? bpf_prog_3899083f75e4c5de_F+0xe3/0x13b

The jit blinding logic didn't recognize that ld_imm64 with an address
of bpf subprogram is a special instruction and proceeded to randomize it.
By itself it wouldn't have been an issue, but jit_subprogs() logic
relies on two step process to JIT all subprogs and then JIT them
again when addresses of all subprogs are known.
Blinding process in the first JIT phase caused second JIT to miss
adjustment of special ld_imm64.

Fix this issue by ignoring special ld_imm64 instructions that don't have
user controlled constants and shouldn't be blinded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49552/">CVE-2022-49552 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49552">CVE-2022-49552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238649">SUSE bug 1238649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49557</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49557" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49557" ref_url="https://www.suse.com/security/cve/CVE-2022-49557" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: KVM: Set the base guest FPU uABI size to sizeof(struct kvm_xsave)

Set the starting uABI size of KVM's guest FPU to 'struct kvm_xsave',
i.e. to KVM's historical uABI size.  When saving FPU state for usersapce,
KVM (well, now the FPU) sets the FP+SSE bits in the XSAVE header even if
the host doesn't support XSAVE.  Setting the XSAVE header allows the VM
to be migrated to a host that does support XSAVE without the new host
having to handle FPU state that may or may not be compatible with XSAVE.

Setting the uABI size to the host's default size results in out-of-bounds
writes (setting the FP+SSE bits) and data corruption (that is thankfully
caught by KASAN) when running on hosts without XSAVE, e.g. on Core2 CPUs.

WARN if the default size is larger than KVM's historical uABI size; all
features that can push the FPU size beyond the historical size must be
opt-in.

  ==================================================================
  BUG: KASAN: slab-out-of-bounds in fpu_copy_uabi_to_guest_fpstate+0x86/0x130
  Read of size 8 at addr ffff888011e33a00 by task qemu-build/681
  CPU: 1 PID: 681 Comm: qemu-build Not tainted 5.18.0-rc5-KASAN-amd64 #1
  Hardware name:  /DG35EC, BIOS ECG3510M.86A.0118.2010.0113.1426 01/13/2010
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x34/0x45
   print_report.cold+0x45/0x575
   kasan_report+0x9b/0xd0
   fpu_copy_uabi_to_guest_fpstate+0x86/0x130
   kvm_arch_vcpu_ioctl+0x72a/0x1c50 [kvm]
   kvm_vcpu_ioctl+0x47f/0x7b0 [kvm]
   __x64_sys_ioctl+0x5de/0xc90
   do_syscall_64+0x31/0x50
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;
  Allocated by task 0:
  (stack is not available)
  The buggy address belongs to the object at ffff888011e33800
   which belongs to the cache kmalloc-512 of size 512
  The buggy address is located 0 bytes to the right of
   512-byte region [ffff888011e33800, ffff888011e33a00)
  The buggy address belongs to the physical page:
  page:0000000089cd4adb refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11e30
  head:0000000089cd4adb order:2 compound_mapcount:0 compound_pincount:0
  flags: 0x4000000000010200(slab|head|zone=1)
  raw: 4000000000010200 dead000000000100 dead000000000122 ffff888001041c80
  raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
  page dumped because: kasan: bad access detected
  Memory state around the buggy address:
   ffff888011e33900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   ffff888011e33980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  &gt;ffff888011e33a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                     ^
   ffff888011e33a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
   ffff888011e33b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  ==================================================================
  Disabling lock debugging due to kernel taint
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49557/">CVE-2022-49557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49557">CVE-2022-49557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238425">SUSE bug 1238425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49559" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49559" ref_url="https://www.suse.com/security/cve/CVE-2022-49559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Drop WARNs that assert a triple fault never "escapes" from L2

Remove WARNs that sanity check that KVM never lets a triple fault for L2
escape and incorrectly end up in L1.  In normal operation, the sanity
check is perfectly valid, but it incorrectly assumes that it's impossible
for userspace to induce KVM_REQ_TRIPLE_FAULT without bouncing through
KVM_RUN (which guarantees kvm_check_nested_state() will see and handle
the triple fault).

The WARN can currently be triggered if userspace injects a machine check
while L2 is active and CR4.MCE=0.  And a future fix to allow save/restore
of KVM_REQ_TRIPLE_FAULT, e.g. so that a synthesized triple fault isn't
lost on migration, will make it trivially easy for userspace to trigger
the WARN.

Clearing KVM_REQ_TRIPLE_FAULT when forcibly leaving guest mode is
tempting, but wrong, especially if/when the request is saved/restored,
e.g. if userspace restores events (including a triple fault) and then
restores nested state (which may forcibly leave guest mode).  Ignoring
the fact that KVM doesn't currently provide the necessary APIs, it's
userspace's responsibility to manage pending events during save/restore.

  ------------[ cut here ]------------
  WARNING: CPU: 7 PID: 1399 at arch/x86/kvm/vmx/nested.c:4522 nested_vmx_vmexit+0x7fe/0xd90 [kvm_intel]
  Modules linked in: kvm_intel kvm irqbypass
  CPU: 7 PID: 1399 Comm: state_test Not tainted 5.17.0-rc3+ #808
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:nested_vmx_vmexit+0x7fe/0xd90 [kvm_intel]
  Call Trace:
   &lt;TASK&gt;
   vmx_leave_nested+0x30/0x40 [kvm_intel]
   vmx_set_nested_state+0xca/0x3e0 [kvm_intel]
   kvm_arch_vcpu_ioctl+0xf49/0x13e0 [kvm]
   kvm_vcpu_ioctl+0x4b9/0x660 [kvm]
   __x64_sys_ioctl+0x83/0xb0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49559/">CVE-2022-49559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49559">CVE-2022-49559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237942">SUSE bug 1237942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49561</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49561" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49561" ref_url="https://www.suse.com/security/cve/CVE-2022-49561" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: re-fetch conntrack after insertion

In case the conntrack is clashing, insertion can free skb-&gt;_nfct and
set skb-&gt;_nfct to the already-confirmed entry.

This wasn't found before because the conntrack entry and the extension
space used to free'd after an rcu grace period, plus the race needs
events enabled to trigger.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49561/">CVE-2022-49561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49561">CVE-2022-49561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238537">SUSE bug 1238537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49562" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49562" ref_url="https://www.suse.com/security/cve/CVE-2022-49562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Use __try_cmpxchg_user() to update guest PTE A/D bits

Use the recently introduced __try_cmpxchg_user() to update guest PTE A/D
bits instead of mapping the PTE into kernel address space.  The VM_PFNMAP
path is broken as it assumes that vm_pgoff is the base pfn of the mapped
VMA range, which is conceptually wrong as vm_pgoff is the offset relative
to the file and has nothing to do with the pfn.  The horrific hack worked
for the original use case (backing guest memory with /dev/mem), but leads
to accessing "random" pfns for pretty much any other VM_PFNMAP case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49562/">CVE-2022-49562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49562">CVE-2022-49562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238309">SUSE bug 1238309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49565</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49565" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49565" ref_url="https://www.suse.com/security/cve/CVE-2022-49565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/lbr: Fix unchecked MSR access error on HSW

The fuzzer triggers the below trace.

[ 7763.384369] unchecked MSR access error: WRMSR to 0x689
(tried to write 0x1fffffff8101349e) at rIP: 0xffffffff810704a4
(native_write_msr+0x4/0x20)
[ 7763.397420] Call Trace:
[ 7763.399881]  &lt;TASK&gt;
[ 7763.401994]  intel_pmu_lbr_restore+0x9a/0x1f0
[ 7763.406363]  intel_pmu_lbr_sched_task+0x91/0x1c0
[ 7763.410992]  __perf_event_task_sched_in+0x1cd/0x240

On a machine with the LBR format LBR_FORMAT_EIP_FLAGS2, when the TSX is
disabled, a TSX quirk is required to access LBR from registers.
The lbr_from_signext_quirk_needed() is introduced to determine whether
the TSX quirk should be applied. However, the
lbr_from_signext_quirk_needed() is invoked before the
intel_pmu_lbr_init(), which parses the LBR format information. Without
the correct LBR format information, the TSX quirk never be applied.

Move the lbr_from_signext_quirk_needed() into the intel_pmu_lbr_init().
Checking x86_pmu.lbr_has_tsx in the lbr_from_signext_quirk_needed() is
not required anymore.

Both LBR_FORMAT_EIP_FLAGS2 and LBR_FORMAT_INFO have LBR_TSX flag, but
only the LBR_FORMAT_EIP_FLAGS2 requirs the quirk. Update the comments
accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49565/">CVE-2022-49565 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49565">CVE-2022-49565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238542">SUSE bug 1238542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49567" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49567" ref_url="https://www.suse.com/security/cve/CVE-2022-49567" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: fix uninit-value in mpol_rebind_policy()

mpol_set_nodemask()(mm/mempolicy.c) does not set up nodemask when
pol-&gt;mode is MPOL_LOCAL.  Check pol-&gt;mode before access
pol-&gt;w.cpuset_mems_allowed in mpol_rebind_policy()(mm/mempolicy.c).

BUG: KMSAN: uninit-value in mpol_rebind_policy mm/mempolicy.c:352 [inline]
BUG: KMSAN: uninit-value in mpol_rebind_task+0x2ac/0x2c0 mm/mempolicy.c:368
 mpol_rebind_policy mm/mempolicy.c:352 [inline]
 mpol_rebind_task+0x2ac/0x2c0 mm/mempolicy.c:368
 cpuset_change_task_nodemask kernel/cgroup/cpuset.c:1711 [inline]
 cpuset_attach+0x787/0x15e0 kernel/cgroup/cpuset.c:2278
 cgroup_migrate_execute+0x1023/0x1d20 kernel/cgroup/cgroup.c:2515
 cgroup_migrate kernel/cgroup/cgroup.c:2771 [inline]
 cgroup_attach_task+0x540/0x8b0 kernel/cgroup/cgroup.c:2804
 __cgroup1_procs_write+0x5cc/0x7a0 kernel/cgroup/cgroup-v1.c:520
 cgroup1_tasks_write+0x94/0xb0 kernel/cgroup/cgroup-v1.c:539
 cgroup_file_write+0x4c2/0x9e0 kernel/cgroup/cgroup.c:3852
 kernfs_fop_write_iter+0x66a/0x9f0 fs/kernfs/file.c:296
 call_write_iter include/linux/fs.h:2162 [inline]
 new_sync_write fs/read_write.c:503 [inline]
 vfs_write+0x1318/0x2030 fs/read_write.c:590
 ksys_write+0x28b/0x510 fs/read_write.c:643
 __do_sys_write fs/read_write.c:655 [inline]
 __se_sys_write fs/read_write.c:652 [inline]
 __x64_sys_write+0xdb/0x120 fs/read_write.c:652
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:524 [inline]
 slab_alloc_node mm/slub.c:3251 [inline]
 slab_alloc mm/slub.c:3259 [inline]
 kmem_cache_alloc+0x902/0x11c0 mm/slub.c:3264
 mpol_new mm/mempolicy.c:293 [inline]
 do_set_mempolicy+0x421/0xb70 mm/mempolicy.c:853
 kernel_set_mempolicy mm/mempolicy.c:1504 [inline]
 __do_sys_set_mempolicy mm/mempolicy.c:1510 [inline]
 __se_sys_set_mempolicy+0x44c/0xb60 mm/mempolicy.c:1507
 __x64_sys_set_mempolicy+0xd8/0x110 mm/mempolicy.c:1507
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x44/0xae

KMSAN: uninit-value in mpol_rebind_task (2)
https://syzkaller.appspot.com/bug?id=d6eb90f952c2a5de9ea718a1b873c55cb13b59dc

This patch seems to fix below bug too.
KMSAN: uninit-value in mpol_rebind_mm (2)
https://syzkaller.appspot.com/bug?id=f2fecd0d7013f54ec4162f60743a2b28df40926b

The uninit-value is pol-&gt;w.cpuset_mems_allowed in mpol_rebind_policy().
When syzkaller reproducer runs to the beginning of mpol_new(),

	    mpol_new() mm/mempolicy.c
	  do_mbind() mm/mempolicy.c
	kernel_mbind() mm/mempolicy.c

`mode` is 1(MPOL_PREFERRED), nodes_empty(*nodes) is `true` and `flags`
is 0. Then

	mode = MPOL_LOCAL;
	...
	policy-&gt;mode = mode;
	policy-&gt;flags = flags;

will be executed. So in mpol_set_nodemask(),

	    mpol_set_nodemask() mm/mempolicy.c
	  do_mbind()
	kernel_mbind()

pol-&gt;mode is 4 (MPOL_LOCAL), that `nodemask` in `pol` is not initialized,
which will be accessed in mpol_rebind_policy().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49567/">CVE-2022-49567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49567">CVE-2022-49567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238793">SUSE bug 1238793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49572</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49572" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49572" ref_url="https://www.suse.com/security/cve/CVE-2022-49572" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctl_tcp_slow_start_after_idle.

While reading sysctl_tcp_slow_start_after_idle, it can be changed
concurrently.  Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49572/">CVE-2022-49572 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49572">CVE-2022-49572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238548">SUSE bug 1238548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49573" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49573" ref_url="https://www.suse.com/security/cve/CVE-2022-49573" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix a data-race around sysctl_tcp_early_retrans.

While reading sysctl_tcp_early_retrans, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49573/">CVE-2022-49573 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49573">CVE-2022-49573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238015">SUSE bug 1238015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49574" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49574" ref_url="https://www.suse.com/security/cve/CVE-2022-49574" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctl_tcp_recovery.

While reading sysctl_tcp_recovery, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49574/">CVE-2022-49574 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49574">CVE-2022-49574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238603">SUSE bug 1238603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49575" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49575" ref_url="https://www.suse.com/security/cve/CVE-2022-49575" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix a data-race around sysctl_tcp_thin_linear_timeouts.

While reading sysctl_tcp_thin_linear_timeouts, it can be changed
concurrently.  Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49575/">CVE-2022-49575 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49575">CVE-2022-49575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238622">SUSE bug 1238622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49577" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49577" ref_url="https://www.suse.com/security/cve/CVE-2022-49577" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: Fix a data-race around sysctl_udp_l3mdev_accept.

While reading sysctl_udp_l3mdev_accept, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49577/">CVE-2022-49577 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49577">CVE-2022-49577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237793">SUSE bug 1237793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49578" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49578" ref_url="https://www.suse.com/security/cve/CVE-2022-49578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip: Fix data-races around sysctl_ip_prot_sock.

sysctl_ip_prot_sock is accessed concurrently, and there is always a chance
of data-race.  So, all readers and writers need some basic protection to
avoid load/store-tearing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49578/">CVE-2022-49578 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49578">CVE-2022-49578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238794">SUSE bug 1238794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49579</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49579" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49579" ref_url="https://www.suse.com/security/cve/CVE-2022-49579" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: Fix data-races around sysctl_fib_multipath_hash_policy.

While reading sysctl_fib_multipath_hash_policy, it can be changed
concurrently.  Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49579/">CVE-2022-49579 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49579">CVE-2022-49579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238014">SUSE bug 1238014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49580" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49580" ref_url="https://www.suse.com/security/cve/CVE-2022-49580" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: Fix a data-race around sysctl_fib_multipath_use_neigh.

While reading sysctl_fib_multipath_use_neigh, it can be changed
concurrently.  Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49580/">CVE-2022-49580 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49580">CVE-2022-49580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238001">SUSE bug 1238001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49583" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49583" ref_url="https://www.suse.com/security/cve/CVE-2022-49583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix handling of dummy receive descriptors

Fix memory leak caused by not handling dummy receive descriptor properly.
iavf_get_rx_buffer now sets the rx_buffer return value for dummy receive
descriptors. Without this patch, when the hardware writes a dummy
descriptor, iavf would not free the page allocated for the previous receive
buffer. This is an unlikely event but can still happen.

[Jesse: massaged commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49583/">CVE-2022-49583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49583">CVE-2022-49583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237818">SUSE bug 1237818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49584" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49584" ref_url="https://www.suse.com/security/cve/CVE-2022-49584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: Add locking to prevent panic when setting sriov_numvfs to zero

It is possible to disable VFs while the PF driver is processing requests
from the VF driver.  This can result in a panic.

BUG: unable to handle kernel paging request at 000000000000106c
PGD 0 P4D 0
Oops: 0000 [#1] SMP NOPTI
CPU: 8 PID: 0 Comm: swapper/8 Kdump: loaded Tainted: G I      --------- -
Hardware name: Dell Inc. PowerEdge R740/06WXJT, BIOS 2.8.2 08/27/2020
RIP: 0010:ixgbe_msg_task+0x4c8/0x1690 [ixgbe]
Code: 00 00 48 8d 04 40 48 c1 e0 05 89 7c 24 24 89 fd 48 89 44 24 10 83 ff
01 0f 84 b8 04 00 00 4c 8b 64 24 10 4d 03 a5 48 22 00 00 &lt;41&gt; 80 7c 24 4c
00 0f 84 8a 03 00 00 0f b7 c7 83 f8 08 0f 84 8f 0a
RSP: 0018:ffffb337869f8df8 EFLAGS: 00010002
RAX: 0000000000001020 RBX: 0000000000000000 RCX: 000000000000002b
RDX: 0000000000000002 RSI: 0000000000000008 RDI: 0000000000000006
RBP: 0000000000000006 R08: 0000000000000002 R09: 0000000000029780
R10: 00006957d8f42832 R11: 0000000000000000 R12: 0000000000001020
R13: ffff8a00e8978ac0 R14: 000000000000002b R15: ffff8a00e8979c80
FS:  0000000000000000(0000) GS:ffff8a07dfd00000(0000) knlGS:00000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000000106c CR3: 0000000063e10004 CR4: 00000000007726e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 ? ttwu_do_wakeup+0x19/0x140
 ? try_to_wake_up+0x1cd/0x550
 ? ixgbevf_update_xcast_mode+0x71/0xc0 [ixgbevf]
 ixgbe_msix_other+0x17e/0x310 [ixgbe]
 __handle_irq_event_percpu+0x40/0x180
 handle_irq_event_percpu+0x30/0x80
 handle_irq_event+0x36/0x53
 handle_edge_irq+0x82/0x190
 handle_irq+0x1c/0x30
 do_IRQ+0x49/0xd0
 common_interrupt+0xf/0xf

This can be eventually be reproduced with the following script:

while :
do
    echo 63 &gt; /sys/class/net/&lt;devname&gt;/device/sriov_numvfs
    sleep 1
    echo 0 &gt; /sys/class/net/&lt;devname&gt;/device/sriov_numvfs
    sleep 1
done

Add lock when disabling SR-IOV to prevent process VF mailbox communication.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49584/">CVE-2022-49584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49584">CVE-2022-49584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237933">SUSE bug 1237933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49585" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49585" ref_url="https://www.suse.com/security/cve/CVE-2022-49585" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctl_tcp_fastopen_blackhole_timeout.

While reading sysctl_tcp_fastopen_blackhole_timeout, it can be changed
concurrently.  Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49585/">CVE-2022-49585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49585">CVE-2022-49585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238225">SUSE bug 1238225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49586</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49586" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49586" ref_url="https://www.suse.com/security/cve/CVE-2022-49586" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctl_tcp_fastopen.

While reading sysctl_tcp_fastopen, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49586/">CVE-2022-49586 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49586">CVE-2022-49586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237811">SUSE bug 1237811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49587" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49587" ref_url="https://www.suse.com/security/cve/CVE-2022-49587" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix a data-race around sysctl_tcp_notsent_lowat.

While reading sysctl_tcp_notsent_lowat, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49587/">CVE-2022-49587 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49587">CVE-2022-49587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237989">SUSE bug 1237989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49588</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49588" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49588" ref_url="https://www.suse.com/security/cve/CVE-2022-49588" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctl_tcp_migrate_req.

While reading sysctl_tcp_migrate_req, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49588/">CVE-2022-49588 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49588">CVE-2022-49588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237833">SUSE bug 1237833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49589</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49589" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49589" ref_url="https://www.suse.com/security/cve/CVE-2022-49589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igmp: Fix data-races around sysctl_igmp_qrv.

While reading sysctl_igmp_qrv, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.

This test can be packed into a helper, so such changes will be in the
follow-up series after net is merged into net-next.

  qrv ?: READ_ONCE(net-&gt;ipv4.sysctl_igmp_qrv);
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49589/">CVE-2022-49589 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49589">CVE-2022-49589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238598">SUSE bug 1238598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49590</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49590" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49590" ref_url="https://www.suse.com/security/cve/CVE-2022-49590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igmp: Fix data-races around sysctl_igmp_llm_reports.

While reading sysctl_igmp_llm_reports, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.

This test can be packed into a helper, so such changes will be in the
follow-up series after net is merged into net-next.

  if (ipv4_is_local_multicast(pmc-&gt;multiaddr) &amp;&amp;
      !READ_ONCE(net-&gt;ipv4.sysctl_igmp_llm_reports))
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49590/">CVE-2022-49590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49590">CVE-2022-49590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238844">SUSE bug 1238844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49592</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49592" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49592" ref_url="https://www.suse.com/security/cve/CVE-2022-49592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix dma queue left shift overflow issue

When queue number is &gt; 4, left shift overflows due to 32 bits
integer variable. Mask calculation is wrong for MTL_RXQ_DMA_MAP1.

If CONFIG_UBSAN is enabled, kernel dumps below warning:
[   10.363842] ==================================================================
[   10.363882] UBSAN: shift-out-of-bounds in /build/linux-intel-iotg-5.15-8e6Tf4/
linux-intel-iotg-5.15-5.15.0/drivers/net/ethernet/stmicro/stmmac/dwmac4_core.c:224:12
[   10.363929] shift exponent 40 is too large for 32-bit type 'unsigned int'
[   10.363953] CPU: 1 PID: 599 Comm: NetworkManager Not tainted 5.15.0-1003-intel-iotg
[   10.363956] Hardware name: ADLINK Technology Inc. LEC-EL/LEC-EL, BIOS 0.15.11 12/22/2021
[   10.363958] Call Trace:
[   10.363960]  &lt;TASK&gt;
[   10.363963]  dump_stack_lvl+0x4a/0x5f
[   10.363971]  dump_stack+0x10/0x12
[   10.363974]  ubsan_epilogue+0x9/0x45
[   10.363976]  __ubsan_handle_shift_out_of_bounds.cold+0x61/0x10e
[   10.363979]  ? wake_up_klogd+0x4a/0x50
[   10.363983]  ? vprintk_emit+0x8f/0x240
[   10.363986]  dwmac4_map_mtl_dma.cold+0x42/0x91 [stmmac]
[   10.364001]  stmmac_mtl_configuration+0x1ce/0x7a0 [stmmac]
[   10.364009]  ? dwmac410_dma_init_channel+0x70/0x70 [stmmac]
[   10.364020]  stmmac_hw_setup.cold+0xf/0xb14 [stmmac]
[   10.364030]  ? page_pool_alloc_pages+0x4d/0x70
[   10.364034]  ? stmmac_clear_tx_descriptors+0x6e/0xe0 [stmmac]
[   10.364042]  stmmac_open+0x39e/0x920 [stmmac]
[   10.364050]  __dev_open+0xf0/0x1a0
[   10.364054]  __dev_change_flags+0x188/0x1f0
[   10.364057]  dev_change_flags+0x26/0x60
[   10.364059]  do_setlink+0x908/0xc40
[   10.364062]  ? do_setlink+0xb10/0xc40
[   10.364064]  ? __nla_validate_parse+0x4c/0x1a0
[   10.364068]  __rtnl_newlink+0x597/0xa10
[   10.364072]  ? __nla_reserve+0x41/0x50
[   10.364074]  ? __kmalloc_node_track_caller+0x1d0/0x4d0
[   10.364079]  ? pskb_expand_head+0x75/0x310
[   10.364082]  ? nla_reserve_64bit+0x21/0x40
[   10.364086]  ? skb_free_head+0x65/0x80
[   10.364089]  ? security_sock_rcv_skb+0x2c/0x50
[   10.364094]  ? __cond_resched+0x19/0x30
[   10.364097]  ? kmem_cache_alloc_trace+0x15a/0x420
[   10.364100]  rtnl_newlink+0x49/0x70

This change fixes MTL_RXQ_DMA_MAP1 mask issue and channel/queue
mapping warning.

BugLink: https://bugzilla.kernel.org/show_bug.cgi?id=216195
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49592/">CVE-2022-49592 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49592">CVE-2022-49592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238311">SUSE bug 1238311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49593" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49593" ref_url="https://www.suse.com/security/cve/CVE-2022-49593" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix a data-race around sysctl_tcp_probe_interval.

While reading sysctl_tcp_probe_interval, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49593/">CVE-2022-49593 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49593">CVE-2022-49593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238813">SUSE bug 1238813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49594" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49594" ref_url="https://www.suse.com/security/cve/CVE-2022-49594" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix a data-race around sysctl_tcp_mtu_probe_floor.

While reading sysctl_tcp_mtu_probe_floor, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49594/">CVE-2022-49594 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49594">CVE-2022-49594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238800">SUSE bug 1238800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49595" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49595" ref_url="https://www.suse.com/security/cve/CVE-2022-49595" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix a data-race around sysctl_tcp_probe_threshold.

While reading sysctl_tcp_probe_threshold, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49595/">CVE-2022-49595 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49595">CVE-2022-49595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237944">SUSE bug 1237944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49596" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49596" ref_url="https://www.suse.com/security/cve/CVE-2022-49596" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctl_tcp_min_snd_mss.

While reading sysctl_tcp_min_snd_mss, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49596/">CVE-2022-49596 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49596">CVE-2022-49596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238312">SUSE bug 1238312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49598" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49598" ref_url="https://www.suse.com/security/cve/CVE-2022-49598" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctl_tcp_mtu_probing.

While reading sysctl_tcp_mtu_probing, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49598/">CVE-2022-49598 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49598">CVE-2022-49598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238002">SUSE bug 1238002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49599" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49599" ref_url="https://www.suse.com/security/cve/CVE-2022-49599" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix data-races around sysctl_tcp_l3mdev_accept.

While reading sysctl_tcp_l3mdev_accept, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49599/">CVE-2022-49599 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49599">CVE-2022-49599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237832">SUSE bug 1237832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49600" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49600" ref_url="https://www.suse.com/security/cve/CVE-2022-49600" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip: Fix a data-race around sysctl_ip_autobind_reuse.

While reading sysctl_ip_autobind_reuse, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49600/">CVE-2022-49600 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49600">CVE-2022-49600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238824">SUSE bug 1238824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49601" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49601" ref_url="https://www.suse.com/security/cve/CVE-2022-49601" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Fix a data-race around sysctl_tcp_fwmark_accept.

While reading sysctl_tcp_fwmark_accept, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49601/">CVE-2022-49601 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49601">CVE-2022-49601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238254">SUSE bug 1238254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49602" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49602" ref_url="https://www.suse.com/security/cve/CVE-2022-49602" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip: Fix a data-race around sysctl_fwmark_reflect.

While reading sysctl_fwmark_reflect, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49602/">CVE-2022-49602 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49602">CVE-2022-49602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238227">SUSE bug 1238227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49603" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49603" ref_url="https://www.suse.com/security/cve/CVE-2022-49603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip: Fix data-races around sysctl_ip_fwd_update_priority.

While reading sysctl_ip_fwd_update_priority, it can be changed
concurrently.  Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49603/">CVE-2022-49603 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49603">CVE-2022-49603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238867">SUSE bug 1238867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49604" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49604" ref_url="https://www.suse.com/security/cve/CVE-2022-49604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip: Fix data-races around sysctl_ip_fwd_use_pmtu.

While reading sysctl_ip_fwd_use_pmtu, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49604/">CVE-2022-49604 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49604">CVE-2022-49604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238414">SUSE bug 1238414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49605" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49605" ref_url="https://www.suse.com/security/cve/CVE-2022-49605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: Reinstate IGC_REMOVED logic and implement it properly

The initially merged version of the igc driver code (via commit
146740f9abc4, "igc: Add support for PF") contained the following
IGC_REMOVED checks in the igc_rd32/wr32() MMIO accessors:

	u32 igc_rd32(struct igc_hw *hw, u32 reg)
	{
		u8 __iomem *hw_addr = READ_ONCE(hw-&gt;hw_addr);
		u32 value = 0;

		if (IGC_REMOVED(hw_addr))
			return ~value;

		value = readl(&amp;hw_addr[reg]);

		/* reads should not return all F's */
		if (!(~value) &amp;&amp; (!reg || !(~readl(hw_addr))))
			hw-&gt;hw_addr = NULL;

		return value;
	}

And:

	#define wr32(reg, val) \
	do { \
		u8 __iomem *hw_addr = READ_ONCE((hw)-&gt;hw_addr); \
		if (!IGC_REMOVED(hw_addr)) \
			writel((val), &amp;hw_addr[(reg)]); \
	} while (0)

E.g. igb has similar checks in its MMIO accessors, and has a similar
macro E1000_REMOVED, which is implemented as follows:

	#define E1000_REMOVED(h) unlikely(!(h))

These checks serve to detect and take note of an 0xffffffff MMIO read
return from the device, which can be caused by a PCIe link flap or some
other kind of PCI bus error, and to avoid performing MMIO reads and
writes from that point onwards.

However, the IGC_REMOVED macro was not originally implemented:

	#ifndef IGC_REMOVED
	#define IGC_REMOVED(a) (0)
	#endif /* IGC_REMOVED */

This led to the IGC_REMOVED logic to be removed entirely in a
subsequent commit (commit 3c215fb18e70, "igc: remove IGC_REMOVED
function"), with the rationale that such checks matter only for
virtualization and that igc does not support virtualization -- but a
PCIe device can become detached even without virtualization being in
use, and without proper checks, a PCIe bus error affecting an igc
adapter will lead to various NULL pointer dereferences, as the first
access after the error will set hw-&gt;hw_addr to NULL, and subsequent
accesses will blindly dereference this now-NULL pointer.

This patch reinstates the IGC_REMOVED checks in igc_rd32/wr32(), and
implements IGC_REMOVED the way it is done for igb, by checking for the
unlikely() case of hw_addr being NULL.  This change prevents the oopses
seen when a PCIe link flap occurs on an igc adapter.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49605/">CVE-2022-49605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49605">CVE-2022-49605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238433">SUSE bug 1238433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49606</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49606" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49606" ref_url="https://www.suse.com/security/cve/CVE-2022-49606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix sleep from invalid context BUG

Taking the qos_mutex to process RoCEv2 QP's on netdev events causes a
kernel splat.

Fix this by removing the handling for RoCEv2 in
irdma_cm_teardown_connections that uses the mutex. This handling is only
needed for iWARP to avoid having connections established while the link is
down or having connections remain functional after the IP address is
removed.

  BUG: sleeping function called from invalid context at kernel/locking/mutex.
  Call Trace:
  kernel: dump_stack+0x66/0x90
  kernel: ___might_sleep.cold.92+0x8d/0x9a
  kernel: mutex_lock+0x1c/0x40
  kernel: irdma_cm_teardown_connections+0x28e/0x4d0 [irdma]
  kernel: ? check_preempt_curr+0x7a/0x90
  kernel: ? select_idle_sibling+0x22/0x3c0
  kernel: ? select_task_rq_fair+0x94c/0xc90
  kernel: ? irdma_exec_cqp_cmd+0xc27/0x17c0 [irdma]
  kernel: ? __wake_up_common+0x7a/0x190
  kernel: irdma_if_notify+0x3cc/0x450 [irdma]
  kernel: ? sched_clock_cpu+0xc/0xb0
  kernel: irdma_inet6addr_event+0xc6/0x150 [irdma]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49606/">CVE-2022-49606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49606">CVE-2022-49606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238410">SUSE bug 1238410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49612</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49612" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49612" ref_url="https://www.suse.com/security/cve/CVE-2022-49612" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: core: Fix boundary conditions in interpolation

The functions power_supply_temp2resist_simple and power_supply_ocv2cap_simple
handle boundary conditions incorrectly.
The change was introduced in a4585ba2050f460f749bbaf2b67bd56c41e30283
("power: supply: core: Use library interpolation").
There are two issues: First, the lines "high = i - 1" and "high = i" in ocv2cap
have the wrong order compared to temp2resist. As a consequence, ocv2cap
sets high=-1 if ocv&gt;table[0].ocv, which causes an out-of-bounds read.
Second, the logic of temp2resist is also not correct.
Consider the case table[] = {{20, 100}, {10, 80}, {0, 60}}.
For temp=5, we expect a resistance of 70% by interpolation.
However, temp2resist sets high=low=2 and returns 60.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49612/">CVE-2022-49612 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49612">CVE-2022-49612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238652">SUSE bug 1238652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49615" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49615" ref_url="https://www.suse.com/security/cve/CVE-2022-49615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: rt711-sdca: fix kernel NULL pointer dereference when IO error

The initial settings will be written before the codec probe function.
But, the rt711-&gt;component doesn't be assigned yet.
If IO error happened during initial settings operations, it will cause the kernel panic.
This patch changed component-&gt;dev to slave-&gt;dev to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49615/">CVE-2022-49615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49615">CVE-2022-49615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238897">SUSE bug 1238897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49623" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49623" ref_url="https://www.suse.com/security/cve/CVE-2022-49623" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/xive/spapr: correct bitmap allocation size

kasan detects access beyond the end of the xibm-&gt;bitmap allocation:

BUG: KASAN: slab-out-of-bounds in _find_first_zero_bit+0x40/0x140
Read of size 8 at addr c00000001d1d0118 by task swapper/0/1

CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-rc2-00001-g90df023b36dd #28
Call Trace:
[c00000001d98f770] [c0000000012baab8] dump_stack_lvl+0xac/0x108 (unreliable)
[c00000001d98f7b0] [c00000000068faac] print_report+0x37c/0x710
[c00000001d98f880] [c0000000006902c0] kasan_report+0x110/0x354
[c00000001d98f950] [c000000000692324] __asan_load8+0xa4/0xe0
[c00000001d98f970] [c0000000011c6ed0] _find_first_zero_bit+0x40/0x140
[c00000001d98f9b0] [c0000000000dbfbc] xive_spapr_get_ipi+0xcc/0x260
[c00000001d98fa70] [c0000000000d6d28] xive_setup_cpu_ipi+0x1e8/0x450
[c00000001d98fb30] [c000000004032a20] pSeries_smp_probe+0x5c/0x118
[c00000001d98fb60] [c000000004018b44] smp_prepare_cpus+0x944/0x9ac
[c00000001d98fc90] [c000000004009f9c] kernel_init_freeable+0x2d4/0x640
[c00000001d98fd90] [c0000000000131e8] kernel_init+0x28/0x1d0
[c00000001d98fe10] [c00000000000cd54] ret_from_kernel_thread+0x5c/0x64

Allocated by task 0:
 kasan_save_stack+0x34/0x70
 __kasan_kmalloc+0xb4/0xf0
 __kmalloc+0x268/0x540
 xive_spapr_init+0x4d0/0x77c
 pseries_init_irq+0x40/0x27c
 init_IRQ+0x44/0x84
 start_kernel+0x2a4/0x538
 start_here_common+0x1c/0x20

The buggy address belongs to the object at c00000001d1d0118
 which belongs to the cache kmalloc-8 of size 8
The buggy address is located 0 bytes inside of
 8-byte region [c00000001d1d0118, c00000001d1d0120)

The buggy address belongs to the physical page:
page:c00c000000074740 refcount:1 mapcount:0 mapping:0000000000000000 index:0xc00000001d1d0558 pfn:0x1d1d
flags: 0x7ffff000000200(slab|node=0|zone=0|lastcpupid=0x7ffff)
raw: 007ffff000000200 c00000001d0003c8 c00000001d0003c8 c00000001d010480
raw: c00000001d1d0558 0000000001e1000a 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 c00000001d1d0000: fc 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 c00000001d1d0080: fc fc 00 fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;c00000001d1d0100: fc fc fc 02 fc fc fc fc fc fc fc fc fc fc fc fc
                            ^
 c00000001d1d0180: fc fc fc fc 04 fc fc fc fc fc fc fc fc fc fc fc
 c00000001d1d0200: fc fc fc fc fc 04 fc fc fc fc fc fc fc fc fc fc

This happens because the allocation uses the wrong unit (bits) when it
should pass (BITS_TO_LONGS(count) * sizeof(long)) or equivalent. With small
numbers of bits, the allocated object can be smaller than sizeof(long),
which results in invalid accesses.

Use bitmap_zalloc() to allocate and initialize the irq bitmap, paired with
bitmap_free() for consistency.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49623/">CVE-2022-49623 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49623">CVE-2022-49623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239040">SUSE bug 1239040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49625" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49625" ref_url="https://www.suse.com/security/cve/CVE-2022-49625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix kernel panic when creating VF

When creating VFs a kernel panic can happen when calling to
efx_ef10_try_update_nic_stats_vf.

When releasing a DMA coherent buffer, sometimes, I don't know in what
specific circumstances, it has to unmap memory with vunmap. It is
disallowed to do that in IRQ context or with BH disabled. Otherwise, we
hit this line in vunmap, causing the crash:
  BUG_ON(in_interrupt());

This patch reenables BH to release the buffer.

Log messages when the bug is hit:
 kernel BUG at mm/vmalloc.c:2727!
 invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 6 PID: 1462 Comm: NetworkManager Kdump: loaded Tainted: G          I      --------- ---  5.14.0-119.el9.x86_64 #1
 Hardware name: Dell Inc. PowerEdge R740/06WXJT, BIOS 2.8.2 08/27/2020
 RIP: 0010:vunmap+0x2e/0x30
 ...skip...
 Call Trace:
  __iommu_dma_free+0x96/0x100
  efx_nic_free_buffer+0x2b/0x40 [sfc]
  efx_ef10_try_update_nic_stats_vf+0x14a/0x1c0 [sfc]
  efx_ef10_update_stats_vf+0x18/0x40 [sfc]
  efx_start_all+0x15e/0x1d0 [sfc]
  efx_net_open+0x5a/0xe0 [sfc]
  __dev_open+0xe7/0x1a0
  __dev_change_flags+0x1d7/0x240
  dev_change_flags+0x21/0x60
  ...skip...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49625/">CVE-2022-49625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49625">CVE-2022-49625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238411">SUSE bug 1238411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49626" ref_url="https://www.suse.com/security/cve/CVE-2022-49626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix use after free when disabling sriov

Use after free is detected by kfence when disabling sriov. What was read
after being freed was vf-&gt;pci_dev: it was freed from pci_disable_sriov
and later read in efx_ef10_sriov_free_vf_vports, called from
efx_ef10_sriov_free_vf_vswitching.

Set the pointer to NULL at release time to not trying to read it later.

Reproducer and dmesg log (note that kfence doesn't detect it every time):
$ echo 1 &gt; /sys/class/net/enp65s0f0np0/device/sriov_numvfs
$ echo 0 &gt; /sys/class/net/enp65s0f0np0/device/sriov_numvfs

 BUG: KFENCE: use-after-free read in efx_ef10_sriov_free_vf_vswitching+0x82/0x170 [sfc]

 Use-after-free read at 0x00000000ff3c1ba5 (in kfence-#224):
  efx_ef10_sriov_free_vf_vswitching+0x82/0x170 [sfc]
  efx_ef10_pci_sriov_disable+0x38/0x70 [sfc]
  efx_pci_sriov_configure+0x24/0x40 [sfc]
  sriov_numvfs_store+0xfe/0x140
  kernfs_fop_write_iter+0x11c/0x1b0
  new_sync_write+0x11f/0x1b0
  vfs_write+0x1eb/0x280
  ksys_write+0x5f/0xe0
  do_syscall_64+0x5c/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 kfence-#224: 0x00000000edb8ef95-0x00000000671f5ce1, size=2792, cache=kmalloc-4k

 allocated by task 6771 on cpu 10 at 3137.860196s:
  pci_alloc_dev+0x21/0x60
  pci_iov_add_virtfn+0x2a2/0x320
  sriov_enable+0x212/0x3e0
  efx_ef10_sriov_configure+0x67/0x80 [sfc]
  efx_pci_sriov_configure+0x24/0x40 [sfc]
  sriov_numvfs_store+0xba/0x140
  kernfs_fop_write_iter+0x11c/0x1b0
  new_sync_write+0x11f/0x1b0
  vfs_write+0x1eb/0x280
  ksys_write+0x5f/0xe0
  do_syscall_64+0x5c/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae

 freed by task 6771 on cpu 12 at 3170.991309s:
  device_release+0x34/0x90
  kobject_cleanup+0x3a/0x130
  pci_iov_remove_virtfn+0xd9/0x120
  sriov_disable+0x30/0xe0
  efx_ef10_pci_sriov_disable+0x57/0x70 [sfc]
  efx_pci_sriov_configure+0x24/0x40 [sfc]
  sriov_numvfs_store+0xfe/0x140
  kernfs_fop_write_iter+0x11c/0x1b0
  new_sync_write+0x11f/0x1b0
  vfs_write+0x1eb/0x280
  ksys_write+0x5f/0xe0
  do_syscall_64+0x5c/0x80
  entry_SYSCALL_64_after_hwframe+0x44/0xae
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49626/">CVE-2022-49626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49626">CVE-2022-49626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238270">SUSE bug 1238270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49627</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49627" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49627" ref_url="https://www.suse.com/security/cve/CVE-2022-49627" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: Fix potential memory leak in ima_init_crypto()

On failure to allocate the SHA1 tfm, IMA fails to initialize and exits
without freeing the ima_algo_array. Add the missing kfree() for
ima_algo_array to avoid the potential memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49627/">CVE-2022-49627 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49627">CVE-2022-49627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237798">SUSE bug 1237798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49629" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49629" ref_url="https://www.suse.com/security/cve/CVE-2022-49629" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Fix data-races around nexthop_compat_mode.

While reading nexthop_compat_mode, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49629/">CVE-2022-49629 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49629">CVE-2022-49629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239453">SUSE bug 1239453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49630" ref_url="https://www.suse.com/security/cve/CVE-2022-49630" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix a data-race around sysctl_tcp_ecn_fallback.

While reading sysctl_tcp_ecn_fallback, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49630/">CVE-2022-49630 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49630">CVE-2022-49630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238132">SUSE bug 1238132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49631" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49631" ref_url="https://www.suse.com/security/cve/CVE-2022-49631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

raw: Fix a data-race around sysctl_raw_l3mdev_accept.

While reading sysctl_raw_l3mdev_accept, it can be changed concurrently.
Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49631/">CVE-2022-49631 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49631">CVE-2022-49631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238814">SUSE bug 1238814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49632" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49632" ref_url="https://www.suse.com/security/cve/CVE-2022-49632" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

icmp: Fix a data-race around sysctl_icmp_errors_use_inbound_ifaddr.

While reading sysctl_icmp_errors_use_inbound_ifaddr, it can be changed
concurrently.  Thus, we need to add READ_ONCE() to its reader.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49632/">CVE-2022-49632 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49632">CVE-2022-49632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238070">SUSE bug 1238070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49634" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49634" ref_url="https://www.suse.com/security/cve/CVE-2022-49634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysctl: Fix data-races in proc_dou8vec_minmax().

A sysctl variable is accessed concurrently, and there is always a chance
of data-race.  So, all readers and writers need some basic protection to
avoid load/store-tearing.

This patch changes proc_dou8vec_minmax() to use READ_ONCE() and
WRITE_ONCE() internally to fix data-races on the sysctl side.  For now,
proc_dou8vec_minmax() itself is tolerant to a data-race, but we still
need to add annotations on the other subsystem's side.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49634/">CVE-2022-49634 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49634">CVE-2022-49634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237937">SUSE bug 1237937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49636" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49636" ref_url="https://www.suse.com/security/cve/CVE-2022-49636" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vlan: fix memory leak in vlan_newlink()

Blamed commit added back a bug I fixed in commit 9bbd917e0bec
("vlan: fix memory leak in vlan_dev_set_egress_priority")

If a memory allocation fails in vlan_changelink() after other allocations
succeeded, we need to call vlan_dev_free_egress_priority()
to free all allocated memory because after a failed -&gt;newlink()
we do not call any methods like ndo_uninit() or dev-&gt;priv_destructor().

In following example, if the allocation for last element 2000:2001 fails,
we need to free eight prior allocations:

ip link add link dummy0 dummy0.100 type vlan id 100 \
	egress-qos-map 1:2 2:3 3:4 4:5 5:6 6:7 7:8 8:9 2000:2001

syzbot report was:

BUG: memory leak
unreferenced object 0xffff888117bd1060 (size 32):
comm "syz-executor408", pid 3759, jiffies 4294956555 (age 34.090s)
hex dump (first 32 bytes):
09 00 00 00 00 a0 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[&lt;ffffffff83fc60ad&gt;] kmalloc include/linux/slab.h:600 [inline]
[&lt;ffffffff83fc60ad&gt;] vlan_dev_set_egress_priority+0xed/0x170 net/8021q/vlan_dev.c:193
[&lt;ffffffff83fc6628&gt;] vlan_changelink+0x178/0x1d0 net/8021q/vlan_netlink.c:128
[&lt;ffffffff83fc67c8&gt;] vlan_newlink+0x148/0x260 net/8021q/vlan_netlink.c:185
[&lt;ffffffff838b1278&gt;] rtnl_newlink_create net/core/rtnetlink.c:3363 [inline]
[&lt;ffffffff838b1278&gt;] __rtnl_newlink+0xa58/0xdc0 net/core/rtnetlink.c:3580
[&lt;ffffffff838b1629&gt;] rtnl_newlink+0x49/0x70 net/core/rtnetlink.c:3593
[&lt;ffffffff838ac66c&gt;] rtnetlink_rcv_msg+0x21c/0x5c0 net/core/rtnetlink.c:6089
[&lt;ffffffff839f9c37&gt;] netlink_rcv_skb+0x87/0x1d0 net/netlink/af_netlink.c:2501
[&lt;ffffffff839f8da7&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
[&lt;ffffffff839f8da7&gt;] netlink_unicast+0x397/0x4c0 net/netlink/af_netlink.c:1345
[&lt;ffffffff839f9266&gt;] netlink_sendmsg+0x396/0x710 net/netlink/af_netlink.c:1921
[&lt;ffffffff8384dbf6&gt;] sock_sendmsg_nosec net/socket.c:714 [inline]
[&lt;ffffffff8384dbf6&gt;] sock_sendmsg+0x56/0x80 net/socket.c:734
[&lt;ffffffff8384e15c&gt;] ____sys_sendmsg+0x36c/0x390 net/socket.c:2488
[&lt;ffffffff838523cb&gt;] ___sys_sendmsg+0x8b/0xd0 net/socket.c:2542
[&lt;ffffffff838525b8&gt;] __sys_sendmsg net/socket.c:2571 [inline]
[&lt;ffffffff838525b8&gt;] __do_sys_sendmsg net/socket.c:2580 [inline]
[&lt;ffffffff838525b8&gt;] __se_sys_sendmsg net/socket.c:2578 [inline]
[&lt;ffffffff838525b8&gt;] __x64_sys_sendmsg+0x78/0xf0 net/socket.c:2578
[&lt;ffffffff845ad8d5&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[&lt;ffffffff845ad8d5&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
[&lt;ffffffff8460006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49636/">CVE-2022-49636 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49636">CVE-2022-49636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237801">SUSE bug 1237801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49637</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49637" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49637" ref_url="https://www.suse.com/security/cve/CVE-2022-49637" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: Fix a data-race around sysctl_fib_sync_mem.

While reading sysctl_fib_sync_mem, it can be changed concurrently.
So, we need to add READ_ONCE() to avoid a data-race.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49637/">CVE-2022-49637 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49637">CVE-2022-49637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238801">SUSE bug 1238801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49638" ref_url="https://www.suse.com/security/cve/CVE-2022-49638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

icmp: Fix data-races around sysctl.

While reading icmp sysctl variables, they can be changed concurrently.
So, we need to add READ_ONCE() to avoid data-races.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49638/">CVE-2022-49638 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49638">CVE-2022-49638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238613">SUSE bug 1238613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49639</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49639" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49639" ref_url="https://www.suse.com/security/cve/CVE-2022-49639" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cipso: Fix data-races around sysctl.

While reading cipso sysctl variables, they can be changed concurrently.
So, we need to add READ_ONCE() to avoid data-races.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49639/">CVE-2022-49639 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49639">CVE-2022-49639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237991">SUSE bug 1237991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49641" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49641" ref_url="https://www.suse.com/security/cve/CVE-2022-49641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysctl: Fix data races in proc_douintvec().

A sysctl variable is accessed concurrently, and there is always a chance
of data-race.  So, all readers and writers need some basic protection to
avoid load/store-tearing.

This patch changes proc_douintvec() to use READ_ONCE() and WRITE_ONCE()
internally to fix data-races on the sysctl side.  For now, proc_douintvec()
itself is tolerant to a data-race, but we still need to add annotations on
the other subsystem's side.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49641/">CVE-2022-49641 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49641">CVE-2022-49641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237831">SUSE bug 1237831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49642" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49642" ref_url="https://www.suse.com/security/cve/CVE-2022-49642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: dwc-qos: Disable split header for Tegra194

There is a long-standing issue with the Synopsys DWC Ethernet driver
for Tegra194 where random system crashes have been observed [0]. The
problem occurs when the split header feature is enabled in the stmmac
driver. In the bad case, a larger than expected buffer length is
received and causes the calculation of the total buffer length to
overflow. This results in a very large buffer length that causes the
kernel to crash. Why this larger buffer length is received is not clear,
however, the feedback from the NVIDIA design team is that the split
header feature is not supported for Tegra194. Therefore, disable split
header support for Tegra194 to prevent these random crashes from
occurring.

[0] https://lore.kernel.org/linux-tegra/b0b17697-f23e-8fa5-3757-604a86f3a095@nvidia.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49642/">CVE-2022-49642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49642">CVE-2022-49642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238437">SUSE bug 1238437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49643" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49643" ref_url="https://www.suse.com/security/cve/CVE-2022-49643" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: Fix a potential integer overflow in ima_appraise_measurement

When the ima-modsig is enabled, the rc passed to evm_verifyxattr() may be
negative, which may cause the integer overflow problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49643/">CVE-2022-49643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49643">CVE-2022-49643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238663">SUSE bug 1238663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49644</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49644" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49644" ref_url="https://www.suse.com/security/cve/CVE-2022-49644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: fix a possible refcount leak in intel_dp_add_mst_connector()

If drm_connector_init fails, intel_connector_free will be called to take
care of proper free. So it is necessary to drop the refcount of port
before intel_connector_free.

(cherry picked from commit cea9ed611e85d36a05db52b6457bf584b7d969e2)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49644/">CVE-2022-49644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49644">CVE-2022-49644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238235">SUSE bug 1238235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49646" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49646" ref_url="https://www.suse.com/security/cve/CVE-2022-49646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix queue selection for mesh/OCB interfaces

When using iTXQ, the code assumes that there is only one vif queue for
broadcast packets, using the BE queue. Allowing non-BE queue marking
violates that assumption and txq-&gt;ac == skb_queue_mapping is no longer
guaranteed. This can cause issues with queue handling in the driver and
also causes issues with the recent ATF change, resulting in an AQL
underflow warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49646/">CVE-2022-49646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49646">CVE-2022-49646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239001">SUSE bug 1239001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49647" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49647" ref_url="https://www.suse.com/security/cve/CVE-2022-49647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup: Use separate src/dst nodes when preloading css_sets for migration

Each cset (css_set) is pinned by its tasks. When we're moving tasks around
across csets for a migration, we need to hold the source and destination
csets to ensure that they don't go away while we're moving tasks about. This
is done by linking cset-&gt;mg_preload_node on either the
mgctx-&gt;preloaded_src_csets or mgctx-&gt;preloaded_dst_csets list. Using the
same cset-&gt;mg_preload_node for both the src and dst lists was deemed okay as
a cset can't be both the source and destination at the same time.

Unfortunately, this overloading becomes problematic when multiple tasks are
involved in a migration and some of them are identity noop migrations while
others are actually moving across cgroups. For example, this can happen with
the following sequence on cgroup1:

 #1&gt; mkdir -p /sys/fs/cgroup/misc/a/b
 #2&gt; echo $$ &gt; /sys/fs/cgroup/misc/a/cgroup.procs
 #3&gt; RUN_A_COMMAND_WHICH_CREATES_MULTIPLE_THREADS &amp;
 #4&gt; PID=$!
 #5&gt; echo $PID &gt; /sys/fs/cgroup/misc/a/b/tasks
 #6&gt; echo $PID &gt; /sys/fs/cgroup/misc/a/cgroup.procs

the process including the group leader back into a. In this final migration,
non-leader threads would be doing identity migration while the group leader
is doing an actual one.

After #3, let's say the whole process was in cset A, and that after #4, the
leader moves to cset B. Then, during #6, the following happens:

 1. cgroup_migrate_add_src() is called on B for the leader.

 2. cgroup_migrate_add_src() is called on A for the other threads.

 3. cgroup_migrate_prepare_dst() is called. It scans the src list.

 4. It notices that B wants to migrate to A, so it tries to A to the dst
    list but realizes that its -&gt;mg_preload_node is already busy.

 5. and then it notices A wants to migrate to A as it's an identity
    migration, it culls it by list_del_init()'ing its -&gt;mg_preload_node and
    putting references accordingly.

 6. The rest of migration takes place with B on the src list but nothing on
    the dst list.

This means that A isn't held while migration is in progress. If all tasks
leave A before the migration finishes and the incoming task pins it, the
cset will be destroyed leading to use-after-free.

This is caused by overloading cset-&gt;mg_preload_node for both src and dst
preload lists. We wanted to exclude the cset from the src list but ended up
inadvertently excluding it from the dst list too.

This patch fixes the issue by separating out cset-&gt;mg_preload_node into
-&gt;mg_src_preload_node and -&gt;mg_dst_preload_node, so that the src and dst
preloadings don't interfere with each other.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49647/">CVE-2022-49647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49647">CVE-2022-49647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238805">SUSE bug 1238805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49648" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49648" ref_url="https://www.suse.com/security/cve/CVE-2022-49648" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/histograms: Fix memory leak problem

This reverts commit 46bbe5c671e06f070428b9be142cc4ee5cedebac.

As commit 46bbe5c671e0 ("tracing: fix double free") said, the
"double free" problem reported by clang static analyzer is:
  &gt; In parse_var_defs() if there is a problem allocating
  &gt; var_defs.expr, the earlier var_defs.name is freed.
  &gt; This free is duplicated by free_var_defs() which frees
  &gt; the rest of the list.

However, if there is a problem allocating N-th var_defs.expr:
  + in parse_var_defs(), the freed 'earlier var_defs.name' is
    actually the N-th var_defs.name;
  + then in free_var_defs(), the names from 0th to (N-1)-th are freed;

                        IF ALLOCATING PROBLEM HAPPENED HERE!!! -+
                                                                 \
                                                                  |
          0th           1th                 (N-1)-th      N-th    V
          +-------------+-------------+-----+-------------+-----------
var_defs: | name | expr | name | expr | ... | name | expr | name | ///
          +-------------+-------------+-----+-------------+-----------

These two frees don't act on same name, so there was no "double free"
problem before. Conversely, after that commit, we get a "memory leak"
problem because the above "N-th var_defs.name" is not freed.

If enable CONFIG_DEBUG_KMEMLEAK and inject a fault at where the N-th
var_defs.expr allocated, then execute on shell like:
  $ echo 'hist:key=call_site:val=$v1,$v2:v1=bytes_req,v2=bytes_alloc' &gt; \
/sys/kernel/debug/tracing/events/kmem/kmalloc/trigger

Then kmemleak reports:
  unreferenced object 0xffff8fb100ef3518 (size 8):
    comm "bash", pid 196, jiffies 4295681690 (age 28.538s)
    hex dump (first 8 bytes):
      76 31 00 00 b1 8f ff ff                          v1......
    backtrace:
      [&lt;0000000038fe4895&gt;] kstrdup+0x2d/0x60
      [&lt;00000000c99c049a&gt;] event_hist_trigger_parse+0x206f/0x20e0
      [&lt;00000000ae70d2cc&gt;] trigger_process_regex+0xc0/0x110
      [&lt;0000000066737a4c&gt;] event_trigger_write+0x75/0xd0
      [&lt;000000007341e40c&gt;] vfs_write+0xbb/0x2a0
      [&lt;0000000087fde4c2&gt;] ksys_write+0x59/0xd0
      [&lt;00000000581e9cdf&gt;] do_syscall_64+0x3a/0x80
      [&lt;00000000cf3b065c&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49648/">CVE-2022-49648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49648">CVE-2022-49648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238278">SUSE bug 1238278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49651</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49651" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49651" ref_url="https://www.suse.com/security/cve/CVE-2022-49651" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

srcu: Tighten cleanup_srcu_struct() GP checks

Currently, cleanup_srcu_struct() checks for a grace period in progress,
but it does not check for a grace period that has not yet started but
which might start at any time.  Such a situation could result in a
use-after-free bug, so this commit adds a check for a grace period that
is needed but not yet started to cleanup_srcu_struct().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49651/">CVE-2022-49651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49651">CVE-2022-49651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238999">SUSE bug 1238999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239000">SUSE bug 1239000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49653" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49653" ref_url="https://www.suse.com/security/cve/CVE-2022-49653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: piix4: Fix a memory leak in the EFCH MMIO support

The recently added support for EFCH MMIO regions introduced a memory
leak in that code path. The leak is caused by the fact that
release_resource() merely removes the resource from the tree but does
not free its memory. We need to call release_mem_region() instead,
which does free the memory. As a nice side effect, this brings back
some symmetry between the legacy and MMIO paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49653/">CVE-2022-49653 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49653">CVE-2022-49653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238664">SUSE bug 1238664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49655" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49655" ref_url="https://www.suse.com/security/cve/CVE-2022-49655" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fscache: Fix invalidation/lookup race

If an NFS file is opened for writing and closed, fscache_invalidate() will
be asked to invalidate the file - however, if the cookie is in the
LOOKING_UP state (or the CREATING state), then request to invalidate
doesn't get recorded for fscache_cookie_state_machine() to do something
with.

Fix this by making __fscache_invalidate() set a flag if it sees the cookie
is in the LOOKING_UP state to indicate that we need to go to invalidation.
Note that this requires a count on the n_accesses counter for the state
machine, which that will release when it's done.

fscache_cookie_state_machine() then shifts to the INVALIDATING state if it
sees the flag.

Without this, an nfs file can get corrupted if it gets modified locally and
then read locally as the cache contents may not get updated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49655/">CVE-2022-49655 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49655">CVE-2022-49655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238122">SUSE bug 1238122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49657</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49657" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49657" ref_url="https://www.suse.com/security/cve/CVE-2022-49657" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: fix memory leak in error case

usbnet_write_cmd_async() mixed up which buffers
need to be freed in which error case.

v2: add Fixes tag
v3: fix uninitialized buf pointer
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49657/">CVE-2022-49657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49657">CVE-2022-49657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238269">SUSE bug 1238269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49659</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49659" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49659" ref_url="https://www.suse.com/security/cve/CVE-2022-49659" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: m_can: m_can_{read_fifo,echo_tx_event}(): shift timestamp to full 32 bits

In commit 1be37d3b0414 ("can: m_can: fix periph RX path: use
rx-offload to ensure skbs are sent from softirq context") the RX path
for peripheral devices was switched to RX-offload.

Received CAN frames are pushed to RX-offload together with a
timestamp. RX-offload is designed to handle overflows of the timestamp
correctly, if 32 bit timestamps are provided.

The timestamps of m_can core are only 16 bits wide. So this patch
shifts them to full 32 bit before passing them to RX-offload.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49659/">CVE-2022-49659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49659">CVE-2022-49659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237819">SUSE bug 1237819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49663" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49663" ref_url="https://www.suse.com/security/cve/CVE-2022-49663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tunnels: do not assume mac header is set in skb_tunnel_check_pmtu()

Recently added debug in commit f9aefd6b2aa3 ("net: warn if mac header
was not set") caught a bug in skb_tunnel_check_pmtu(), as shown
in this syzbot report [1].

In ndo_start_xmit() paths, there is really no need to use skb-&gt;mac_header,
because skb-&gt;data is supposed to point at it.

[1] WARNING: CPU: 1 PID: 8604 at include/linux/skbuff.h:2784 skb_mac_header_len include/linux/skbuff.h:2784 [inline]
WARNING: CPU: 1 PID: 8604 at include/linux/skbuff.h:2784 skb_tunnel_check_pmtu+0x5de/0x2f90 net/ipv4/ip_tunnel_core.c:413
Modules linked in:
CPU: 1 PID: 8604 Comm: syz-executor.3 Not tainted 5.19.0-rc2-syzkaller-00443-g8720bd951b8e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:skb_mac_header_len include/linux/skbuff.h:2784 [inline]
RIP: 0010:skb_tunnel_check_pmtu+0x5de/0x2f90 net/ipv4/ip_tunnel_core.c:413
Code: 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 80 3c 02 00 0f 84 b9 fe ff ff 4c 89 ff e8 7c 0f d7 f9 e9 ac fe ff ff e8 c2 13 8a f9 &lt;0f&gt; 0b e9 28 fc ff ff e8 b6 13 8a f9 48 8b 54 24 70 48 b8 00 00 00
RSP: 0018:ffffc90002e4f520 EFLAGS: 00010212
RAX: 0000000000000324 RBX: ffff88804d5fd500 RCX: ffffc90005b52000
RDX: 0000000000040000 RSI: ffffffff87f05e3e RDI: 0000000000000003
RBP: ffffc90002e4f650 R08: 0000000000000003 R09: 000000000000ffff
R10: 000000000000ffff R11: 0000000000000000 R12: 000000000000ffff
R13: 0000000000000000 R14: 000000000000ffcd R15: 000000000000001f
FS: 00007f3babba9700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000080 CR3: 0000000075319000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
geneve_xmit_skb drivers/net/geneve.c:927 [inline]
geneve_xmit+0xcf8/0x35d0 drivers/net/geneve.c:1107
__netdev_start_xmit include/linux/netdevice.h:4805 [inline]
netdev_start_xmit include/linux/netdevice.h:4819 [inline]
__dev_direct_xmit+0x500/0x730 net/core/dev.c:4309
dev_direct_xmit include/linux/netdevice.h:3007 [inline]
packet_direct_xmit+0x1b8/0x2c0 net/packet/af_packet.c:282
packet_snd net/packet/af_packet.c:3073 [inline]
packet_sendmsg+0x21f4/0x55d0 net/packet/af_packet.c:3104
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xcf/0x120 net/socket.c:734
____sys_sendmsg+0x6eb/0x810 net/socket.c:2489
___sys_sendmsg+0xf3/0x170 net/socket.c:2543
__sys_sendmsg net/socket.c:2572 [inline]
__do_sys_sendmsg net/socket.c:2581 [inline]
__se_sys_sendmsg net/socket.c:2579 [inline]
__x64_sys_sendmsg+0x132/0x220 net/socket.c:2579
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f3baaa89109
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f3babba9168 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f3baab9bf60 RCX: 00007f3baaa89109
RDX: 0000000000000000 RSI: 0000000020000a00 RDI: 0000000000000003
RBP: 00007f3baaae305d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffe74f2543f R14: 00007f3babba9300 R15: 0000000000022000
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49663/">CVE-2022-49663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49663">CVE-2022-49663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238442">SUSE bug 1238442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49664" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49664" ref_url="https://www.suse.com/security/cve/CVE-2022-49664" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: move bc link creation back to tipc_node_create

Shuang Li reported a NULL pointer dereference crash:

  [] BUG: kernel NULL pointer dereference, address: 0000000000000068
  [] RIP: 0010:tipc_link_is_up+0x5/0x10 [tipc]
  [] Call Trace:
  []  &lt;IRQ&gt;
  []  tipc_bcast_rcv+0xa2/0x190 [tipc]
  []  tipc_node_bc_rcv+0x8b/0x200 [tipc]
  []  tipc_rcv+0x3af/0x5b0 [tipc]
  []  tipc_udp_recv+0xc7/0x1e0 [tipc]

It was caused by the 'l' passed into tipc_bcast_rcv() is NULL. When it
creates a node in tipc_node_check_dest(), after inserting the new node
into hashtable in tipc_node_create(), it creates the bc link. However,
there is a gap between this insert and bc link creation, a bc packet
may come in and get the node from the hashtable then try to dereference
its bc link, which is NULL.

This patch is to fix it by moving the bc link creation before inserting
into the hashtable.

Note that for a preliminary node becoming "real", the bc link creation
should also be called before it's rehashed, as we don't create it for
preliminary nodes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49664/">CVE-2022-49664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49664">CVE-2022-49664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238237">SUSE bug 1238237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49666" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49666" ref_url="https://www.suse.com/security/cve/CVE-2022-49666" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/memhotplug: Add add_pages override for PPC

With commit ffa0b64e3be5 ("powerpc: Fix virt_addr_valid() for 64-bit Book3E &amp; 32-bit")
the kernel now validate the addr against high_memory value. This results
in the below BUG_ON with dax pfns.

[  635.798741][T26531] kernel BUG at mm/page_alloc.c:5521!
1:mon&gt; e
cpu 0x1: Vector: 700 (Program Check) at [c000000007287630]
    pc: c00000000055ed48: free_pages.part.0+0x48/0x110
    lr: c00000000053ca70: tlb_finish_mmu+0x80/0xd0
    sp: c0000000072878d0
   msr: 800000000282b033
  current = 0xc00000000afabe00
  paca    = 0xc00000037ffff300   irqmask: 0x03   irq_happened: 0x05
    pid   = 26531, comm = 50-landscape-sy
kernel BUG at :5521!
Linux version 5.19.0-rc3-14659-g4ec05be7c2e1 (kvaneesh@ltc-boston8) (gcc (Ubuntu 9.4.0-1ubuntu1~20.04.1) 9.4.0, GNU ld (GNU Binutils for Ubuntu) 2.34) #625 SMP Thu Jun 23 00:35:43 CDT 2022
1:mon&gt; t
[link register   ] c00000000053ca70 tlb_finish_mmu+0x80/0xd0
[c0000000072878d0] c00000000053ca54 tlb_finish_mmu+0x64/0xd0 (unreliable)
[c000000007287900] c000000000539424 exit_mmap+0xe4/0x2a0
[c0000000072879e0] c00000000019fc1c mmput+0xcc/0x210
[c000000007287a20] c000000000629230 begin_new_exec+0x5e0/0xf40
[c000000007287ae0] c00000000070b3cc load_elf_binary+0x3ac/0x1e00
[c000000007287c10] c000000000627af0 bprm_execve+0x3b0/0xaf0
[c000000007287cd0] c000000000628414 do_execveat_common.isra.0+0x1e4/0x310
[c000000007287d80] c00000000062858c sys_execve+0x4c/0x60
[c000000007287db0] c00000000002c1b0 system_call_exception+0x160/0x2c0
[c000000007287e10] c00000000000c53c system_call_common+0xec/0x250

The fix is to make sure we update high_memory on memory hotplug.
This is similar to what x86 does in commit 3072e413e305 ("mm/memory_hotplug: introduce add_pages")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49666/">CVE-2022-49666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49666">CVE-2022-49666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237964">SUSE bug 1237964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49669" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49669" ref_url="https://www.suse.com/security/cve/CVE-2022-49669" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix race on unaccepted mptcp sockets

When the listener socket owning the relevant request is closed,
it frees the unaccepted subflows and that causes later deletion
of the paired MPTCP sockets.

The mptcp socket's worker can run in the time interval between such delete
operations. When that happens, any access to msk-&gt;first will cause an UaF
access, as the subflow cleanup did not cleared such field in the mptcp
socket.

Address the issue explicitly traversing the listener socket accept
queue at close time and performing the needed cleanup on the pending
msk.

Note that the locking is a bit tricky, as we need to acquire the msk
socket lock, while still owning the subflow socket one.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49669/">CVE-2022-49669 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49669">CVE-2022-49669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238290">SUSE bug 1238290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49670</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49670" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49670" ref_url="https://www.suse.com/security/cve/CVE-2022-49670" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

linux/dim: Fix divide by 0 in RDMA DIM

Fix a divide 0 error in rdma_dim_stats_compare() when prev-&gt;cpe_ratio ==
0.

CallTrace:
  Hardware name: H3C R4900 G3/RS33M2C9S, BIOS 2.00.37P21 03/12/2020
  task: ffff880194b78000 task.stack: ffffc90006714000
  RIP: 0010:backport_rdma_dim+0x10e/0x240 [mlx_compat]
  RSP: 0018:ffff880c10e83ec0 EFLAGS: 00010202
  RAX: 0000000000002710 RBX: ffff88096cd7f780 RCX: 0000000000000064
  RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001
  RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000000 R12: 000000001d7c6c09
  R13: ffff88096cd7f780 R14: ffff880b174fe800 R15: 0000000000000000
  FS:  0000000000000000(0000) GS:ffff880c10e80000(0000)
  knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00000000a0965b00 CR3: 000000000200a003 CR4: 00000000007606e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   &lt;IRQ&gt;
   ib_poll_handler+0x43/0x80 [ib_core]
   irq_poll_softirq+0xae/0x110
   __do_softirq+0xd1/0x28c
   irq_exit+0xde/0xf0
   do_IRQ+0x54/0xe0
   common_interrupt+0x8f/0x8f
   &lt;/IRQ&gt;
   ? cpuidle_enter_state+0xd9/0x2a0
   ? cpuidle_enter_state+0xc7/0x2a0
   ? do_idle+0x170/0x1d0
   ? cpu_startup_entry+0x6f/0x80
   ? start_secondary+0x1b9/0x210
   ? secondary_startup_64+0xa5/0xb0
  Code: 0f 87 e1 00 00 00 8b 4c 24 14 44 8b 43 14 89 c8 4d 63 c8 44 29 c0 99 31 d0 29 d0 31 d2 48 98 48 8d 04 80 48 8d 04 80 48 c1 e0 02 &lt;49&gt; f7 f1 48 83 f8 0a 0f 86 c1 00 00 00 44 39 c1 7f 10 48 89 df
  RIP: backport_rdma_dim+0x10e/0x240 [mlx_compat] RSP: ffff880c10e83ec0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49670/">CVE-2022-49670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49670">CVE-2022-49670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238809">SUSE bug 1238809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49671" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49671" ref_url="https://www.suse.com/security/cve/CVE-2022-49671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cm: Fix memory leak in ib_cm_insert_listen

cm_alloc_id_priv() allocates resource for the cm_id_priv. When
cm_init_listen() fails it doesn't free it, leading to memory leak.

Add the missing error unwind.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49671/">CVE-2022-49671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49671">CVE-2022-49671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238823">SUSE bug 1238823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49672" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49672" ref_url="https://www.suse.com/security/cve/CVE-2022-49672" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tun: unlink NAPI from device on destruction

Syzbot found a race between tun file and device destruction.
NAPIs live in struct tun_file which can get destroyed before
the netdev so we have to del them explicitly. The current
code is missing deleting the NAPI if the queue was detached
first.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49672/">CVE-2022-49672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49672">CVE-2022-49672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238816">SUSE bug 1238816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49673" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49673" ref_url="https://www.suse.com/security/cve/CVE-2022-49673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm raid: fix KASAN warning in raid5_add_disks

There's a KASAN warning in raid5_add_disk when running the LVM testsuite.
The warning happens in the test
lvconvert-raid-reshape-linear_to_raid6-single-type.sh. We fix the warning
by verifying that rdev-&gt;saved_raid_disk is within limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49673/">CVE-2022-49673 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49673">CVE-2022-49673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238933">SUSE bug 1238933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49687</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49687" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49687" ref_url="https://www.suse.com/security/cve/CVE-2022-49687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_net: fix xdp_rxq_info bug after suspend/resume

The following sequence currently causes a driver bug warning
when using virtio_net:

  # ip link set eth0 up
  # echo mem &gt; /sys/power/state (or e.g. # rtcwake -s 10 -m mem)
  &lt;resume&gt;
  # ip link set eth0 down

  Missing register, driver bug
  WARNING: CPU: 0 PID: 375 at net/core/xdp.c:138 xdp_rxq_info_unreg+0x58/0x60
  Call trace:
   xdp_rxq_info_unreg+0x58/0x60
   virtnet_close+0x58/0xac
   __dev_close_many+0xac/0x140
   __dev_change_flags+0xd8/0x210
   dev_change_flags+0x24/0x64
   do_setlink+0x230/0xdd0
   ...

This happens because virtnet_freeze() frees the receive_queue
completely (including struct xdp_rxq_info) but does not call
xdp_rxq_info_unreg(). Similarly, virtnet_restore() sets up the
receive_queue again but does not call xdp_rxq_info_reg().

Actually, parts of virtnet_freeze_down() and virtnet_restore_up()
are almost identical to virtnet_close() and virtnet_open(): only
the calls to xdp_rxq_info_(un)reg() are missing. This means that
we can fix this easily and avoid such problems in the future by
just calling virtnet_close()/open() from the freeze/restore handlers.

Aside from adding the missing xdp_rxq_info calls the only difference
is that the refill work is only cancelled if netif_running(). However,
this should not make any functional difference since the refill work
should only be active if the network interface is actually up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49687/">CVE-2022-49687 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49687">CVE-2022-49687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238181">SUSE bug 1238181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49688" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49688" ref_url="https://www.suse.com/security/cve/CVE-2022-49688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix dynamic root getattr

The recent patch to make afs_getattr consult the server didn't account
for the pseudo-inodes employed by the dynamic root-type afs superblock
not having a volume or a server to access, and thus an oops occurs if
such a directory is stat'd.

Fix this by checking to see if the vnode-&gt;volume pointer actually points
anywhere before following it in afs_getattr().

This can be tested by stat'ing a directory in /afs.  It may be
sufficient just to do "ls /afs" and the oops looks something like:

        BUG: kernel NULL pointer dereference, address: 0000000000000020
        ...
        RIP: 0010:afs_getattr+0x8b/0x14b
        ...
        Call Trace:
         &lt;TASK&gt;
         vfs_statx+0x79/0xf5
         vfs_fstatat+0x49/0x62
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49688/">CVE-2022-49688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49688">CVE-2022-49688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238423">SUSE bug 1238423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49691" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49691" ref_url="https://www.suse.com/security/cve/CVE-2022-49691" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erspan: do not assume transport header is always set

Rewrite tests in ip6erspan_tunnel_xmit() and
erspan_fb_xmit() to not assume transport header is set.

syzbot reported:

WARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911 skb_transport_header include/linux/skbuff.h:2911 [inline]
WARNING: CPU: 0 PID: 1350 at include/linux/skbuff.h:2911 ip6erspan_tunnel_xmit+0x15af/0x2eb0 net/ipv6/ip6_gre.c:963
Modules linked in:
CPU: 0 PID: 1350 Comm: aoe_tx0 Not tainted 5.19.0-rc2-syzkaller-00160-g274295c6e53f #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
RIP: 0010:skb_transport_header include/linux/skbuff.h:2911 [inline]
RIP: 0010:ip6erspan_tunnel_xmit+0x15af/0x2eb0 net/ipv6/ip6_gre.c:963
Code: 0f 47 f0 40 88 b5 7f fe ff ff e8 8c 16 4b f9 89 de bf ff ff ff ff e8 a0 12 4b f9 66 83 fb ff 0f 85 1d f1 ff ff e8 71 16 4b f9 &lt;0f&gt; 0b e9 43 f0 ff ff e8 65 16 4b f9 48 8d 85 30 ff ff ff ba 60 00
RSP: 0018:ffffc90005daf910 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 000000000000ffff RCX: 0000000000000000
RDX: ffff88801f032100 RSI: ffffffff882e8d3f RDI: 0000000000000003
RBP: ffffc90005dafab8 R08: 0000000000000003 R09: 000000000000ffff
R10: 000000000000ffff R11: 0000000000000000 R12: ffff888024f21d40
R13: 000000000000a288 R14: 00000000000000b0 R15: ffff888025a2e000
FS: 0000000000000000(0000) GS:ffff88802c800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2e425000 CR3: 000000006d099000 CR4: 0000000000152ef0
Call Trace:
&lt;TASK&gt;
__netdev_start_xmit include/linux/netdevice.h:4805 [inline]
netdev_start_xmit include/linux/netdevice.h:4819 [inline]
xmit_one net/core/dev.c:3588 [inline]
dev_hard_start_xmit+0x188/0x880 net/core/dev.c:3604
sch_direct_xmit+0x19f/0xbe0 net/sched/sch_generic.c:342
__dev_xmit_skb net/core/dev.c:3815 [inline]
__dev_queue_xmit+0x14a1/0x3900 net/core/dev.c:4219
dev_queue_xmit include/linux/netdevice.h:2994 [inline]
tx+0x6a/0xc0 drivers/block/aoe/aoenet.c:63
kthread+0x1e7/0x3b0 drivers/block/aoe/aoecmd.c:1229
kthread+0x2e9/0x3a0 kernel/kthread.c:376
ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49691/">CVE-2022-49691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49691">CVE-2022-49691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238549">SUSE bug 1238549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49695" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49695" ref_url="https://www.suse.com/security/cve/CVE-2022-49695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: fix a use-after-free issue in igb_clean_tx_ring

Fix the following use-after-free bug in igb_clean_tx_ring routine when
the NIC is running in XDP mode. The issue can be triggered redirecting
traffic into the igb NIC and then closing the device while the traffic
is flowing.

[   73.322719] CPU: 1 PID: 487 Comm: xdp_redirect Not tainted 5.18.3-apu2 #9
[   73.330639] Hardware name: PC Engines APU2/APU2, BIOS 4.0.7 02/28/2017
[   73.337434] RIP: 0010:refcount_warn_saturate+0xa7/0xf0
[   73.362283] RSP: 0018:ffffc9000081f798 EFLAGS: 00010282
[   73.367761] RAX: 0000000000000000 RBX: ffffc90000420f80 RCX: 0000000000000000
[   73.375200] RDX: ffff88811ad22d00 RSI: ffff88811ad171e0 RDI: ffff88811ad171e0
[   73.382590] RBP: 0000000000000900 R08: ffffffff82298f28 R09: 0000000000000058
[   73.390008] R10: 0000000000000219 R11: ffffffff82280f40 R12: 0000000000000090
[   73.397356] R13: ffff888102343a40 R14: ffff88810359e0e4 R15: 0000000000000000
[   73.404806] FS:  00007ff38d31d740(0000) GS:ffff88811ad00000(0000) knlGS:0000000000000000
[   73.413129] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   73.419096] CR2: 000055cff35f13f8 CR3: 0000000106391000 CR4: 00000000000406e0
[   73.426565] Call Trace:
[   73.429087]  &lt;TASK&gt;
[   73.431314]  igb_clean_tx_ring+0x43/0x140 [igb]
[   73.436002]  igb_down+0x1d7/0x220 [igb]
[   73.439974]  __igb_close+0x3c/0x120 [igb]
[   73.444118]  igb_xdp+0x10c/0x150 [igb]
[   73.447983]  ? igb_pci_sriov_configure+0x70/0x70 [igb]
[   73.453362]  dev_xdp_install+0xda/0x110
[   73.457371]  dev_xdp_attach+0x1da/0x550
[   73.461369]  do_setlink+0xfd0/0x10f0
[   73.465166]  ? __nla_validate_parse+0x89/0xc70
[   73.469714]  rtnl_setlink+0x11a/0x1e0
[   73.473547]  rtnetlink_rcv_msg+0x145/0x3d0
[   73.477709]  ? rtnl_calcit.isra.0+0x130/0x130
[   73.482258]  netlink_rcv_skb+0x8d/0x110
[   73.486229]  netlink_unicast+0x230/0x340
[   73.490317]  netlink_sendmsg+0x215/0x470
[   73.494395]  __sys_sendto+0x179/0x190
[   73.498268]  ? move_addr_to_user+0x37/0x70
[   73.502547]  ? __sys_getsockname+0x84/0xe0
[   73.506853]  ? netlink_setsockopt+0x1c1/0x4a0
[   73.511349]  ? __sys_setsockopt+0xc8/0x1d0
[   73.515636]  __x64_sys_sendto+0x20/0x30
[   73.519603]  do_syscall_64+0x3b/0x80
[   73.523399]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[   73.528712] RIP: 0033:0x7ff38d41f20c
[   73.551866] RSP: 002b:00007fff3b945a68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[   73.559640] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff38d41f20c
[   73.567066] RDX: 0000000000000034 RSI: 00007fff3b945b30 RDI: 0000000000000003
[   73.574457] RBP: 0000000000000003 R08: 0000000000000000 R09: 0000000000000000
[   73.581852] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fff3b945ab0
[   73.589179] R13: 0000000000000000 R14: 0000000000000003 R15: 00007fff3b945b30
[   73.596545]  &lt;/TASK&gt;
[   73.598842] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49695/">CVE-2022-49695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49695">CVE-2022-49695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238556">SUSE bug 1238556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49697</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49697" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49697" ref_url="https://www.suse.com/security/cve/CVE-2022-49697" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix request_sock leak in sk lookup helpers

A customer reported a request_socket leak in a Calico cloud environment. We
found that a BPF program was doing a socket lookup with takes a refcnt on
the socket and that it was finding the request_socket but returning the parent
LISTEN socket via sk_to_full_sk() without decrementing the child request socket
1st, resulting in request_sock slab object leak. This patch retains the
existing behaviour of returning full socks to the caller but it also decrements
the child request_socket if one is present before doing so to prevent the leak.

Thanks to Curtis Taylor for all the help in diagnosing and testing this. And
thanks to Antoine Tenart for the reproducer and patch input.

v2 of this patch contains, refactor as per Daniel Borkmann's suggestions to
validate RCU flags on the listen socket so that it balances with bpf_sk_release()
and update comments as per Martin KaFai Lau's suggestion. One small change to
Daniels suggestion, put "sk = sk2" under "if (sk2 != sk)" to avoid an extra
instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49697/">CVE-2022-49697 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49697">CVE-2022-49697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238820">SUSE bug 1238820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49698" ref_url="https://www.suse.com/security/cve/CVE-2022-49698" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: use get_random_u32 instead of prandom

bh might occur while updating per-cpu rnd_state from user context,
ie. local_out path.

BUG: using smp_processor_id() in preemptible [00000000] code: nginx/2725
caller is nft_ng_random_eval+0x24/0x54 [nft_numgen]
Call Trace:
 check_preemption_disabled+0xde/0xe0
 nft_ng_random_eval+0x24/0x54 [nft_numgen]

Use the random driver instead, this also avoids need for local prandom
state. Moreover, prandom now uses the random driver since d4150779e60f
("random32: use real rng for non-deterministic randomness").

Based on earlier patch from Pablo Neira.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49698/">CVE-2022-49698 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49698">CVE-2022-49698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239348">SUSE bug 1239348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49699" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49699" ref_url="https://www.suse.com/security/cve/CVE-2022-49699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filemap: Handle sibling entries in filemap_get_read_batch()

If a read races with an invalidation followed by another read, it is
possible for a folio to be replaced with a higher-order folio.  If that
happens, we'll see a sibling entry for the new folio in the next iteration
of the loop.  This manifests as a NULL pointer dereference while holding
the RCU read lock.

Handle this by simply returning.  The next call will find the new folio
and handle it correctly.  The other ways of handling this rare race are
more complex and it's just not worth it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49699/">CVE-2022-49699 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49699">CVE-2022-49699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238248">SUSE bug 1238248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49700" ref_url="https://www.suse.com/security/cve/CVE-2022-49700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: add missing TID updates on slab deactivation

The fastpath in slab_alloc_node() assumes that c-&gt;slab is stable as long as
the TID stays the same. However, two places in __slab_alloc() currently
don't update the TID when deactivating the CPU slab.

If multiple operations race the right way, this could lead to an object
getting lost; or, in an even more unlikely situation, it could even lead to
an object being freed onto the wrong slab's freelist, messing up the
`inuse` counter and eventually causing a page to be freed to the page
allocator while it still contains slab objects.

(I haven't actually tested these cases though, this is just based on
looking at the code. Writing testcases for this stuff seems like it'd be
a pain...)

The race leading to state inconsistency is (all operations on the same CPU
and kmem_cache):

 - task A: begin do_slab_free():
    - read TID
    - read pcpu freelist (==NULL)
    - check `slab == c-&gt;slab` (true)
 - [PREEMPT A-&gt;B]
 - task B: begin slab_alloc_node():
    - fastpath fails (`c-&gt;freelist` is NULL)
    - enter __slab_alloc()
    - slub_get_cpu_ptr() (disables preemption)
    - enter ___slab_alloc()
    - take local_lock_irqsave()
    - read c-&gt;freelist as NULL
    - get_freelist() returns NULL
    - write `c-&gt;slab = NULL`
    - drop local_unlock_irqrestore()
    - goto new_slab
    - slub_percpu_partial() is NULL
    - get_partial() returns NULL
    - slub_put_cpu_ptr() (enables preemption)
 - [PREEMPT B-&gt;A]
 - task A: finish do_slab_free():
    - this_cpu_cmpxchg_double() succeeds()
    - [CORRUPT STATE: c-&gt;slab==NULL, c-&gt;freelist!=NULL]

From there, the object on c-&gt;freelist will get lost if task B is allowed to
continue from here: It will proceed to the retry_load_slab label,
set c-&gt;slab, then jump to load_freelist, which clobbers c-&gt;freelist.

But if we instead continue as follows, we get worse corruption:

 - task A: run __slab_free() on object from other struct slab:
    - CPU_PARTIAL_FREE case (slab was on no list, is now on pcpu partial)
 - task A: run slab_alloc_node() with NUMA node constraint:
    - fastpath fails (c-&gt;slab is NULL)
    - call __slab_alloc()
    - slub_get_cpu_ptr() (disables preemption)
    - enter ___slab_alloc()
    - c-&gt;slab is NULL: goto new_slab
    - slub_percpu_partial() is non-NULL
    - set c-&gt;slab to slub_percpu_partial(c)
    - [CORRUPT STATE: c-&gt;slab points to slab-1, c-&gt;freelist has objects
      from slab-2]
    - goto redo
    - node_match() fails
    - goto deactivate_slab
    - existing c-&gt;freelist is passed into deactivate_slab()
    - inuse count of slab-1 is decremented to account for object from
      slab-2

At this point, the inuse count of slab-1 is 1 lower than it should be.
This means that if we free all allocated objects in slab-1 except for one,
SLUB will think that slab-1 is completely unused, and may free its page,
leading to use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49700/">CVE-2022-49700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49700">CVE-2022-49700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238249">SUSE bug 1238249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49707</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49707" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49707" ref_url="https://www.suse.com/security/cve/CVE-2022-49707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add reserved GDT blocks check

We capture a NULL pointer issue when resizing a corrupt ext4 image which
is freshly clear resize_inode feature (not run e2fsck). It could be
simply reproduced by following steps. The problem is because of the
resize_inode feature was cleared, and it will convert the filesystem to
meta_bg mode in ext4_resize_fs(), but the es-&gt;s_reserved_gdt_blocks was
not reduced to zero, so could we mistakenly call reserve_backup_gdb()
and passing an uninitialized resize_inode to it when adding new group
descriptors.

 mkfs.ext4 /dev/sda 3G
 tune2fs -O ^resize_inode /dev/sda #forget to run requested e2fsck
 mount /dev/sda /mnt
 resize2fs /dev/sda 8G

 ========
 BUG: kernel NULL pointer dereference, address: 0000000000000028
 CPU: 19 PID: 3243 Comm: resize2fs Not tainted 5.18.0-rc7-00001-gfde086c5ebfd #748
 ...
 RIP: 0010:ext4_flex_group_add+0xe08/0x2570
 ...
 Call Trace:
  &lt;TASK&gt;
  ext4_resize_fs+0xbec/0x1660
  __ext4_ioctl+0x1749/0x24e0
  ext4_ioctl+0x12/0x20
  __x64_sys_ioctl+0xa6/0x110
  do_syscall_64+0x3b/0x90
  entry_SYSCALL_64_after_hwframe+0x44/0xae
 RIP: 0033:0x7f2dd739617b
 ========

The fix is simple, add a check in ext4_resize_begin() to make sure that
the es-&gt;s_reserved_gdt_blocks is zero when the resize_inode feature is
disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49707/">CVE-2022-49707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49707">CVE-2022-49707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239035">SUSE bug 1239035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49708</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49708" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49708" ref_url="https://www.suse.com/security/cve/CVE-2022-49708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug_on ext4_mb_use_inode_pa

Hulk Robot reported a BUG_ON:
==================================================================
kernel BUG at fs/ext4/mballoc.c:3211!
[...]
RIP: 0010:ext4_mb_mark_diskspace_used.cold+0x85/0x136f
[...]
Call Trace:
 ext4_mb_new_blocks+0x9df/0x5d30
 ext4_ext_map_blocks+0x1803/0x4d80
 ext4_map_blocks+0x3a4/0x1a10
 ext4_writepages+0x126d/0x2c30
 do_writepages+0x7f/0x1b0
 __filemap_fdatawrite_range+0x285/0x3b0
 file_write_and_wait_range+0xb1/0x140
 ext4_sync_file+0x1aa/0xca0
 vfs_fsync_range+0xfb/0x260
 do_fsync+0x48/0xa0
[...]
==================================================================

Above issue may happen as follows:
-------------------------------------
do_fsync
 vfs_fsync_range
  ext4_sync_file
   file_write_and_wait_range
    __filemap_fdatawrite_range
     do_writepages
      ext4_writepages
       mpage_map_and_submit_extent
        mpage_map_one_extent
         ext4_map_blocks
          ext4_mb_new_blocks
           ext4_mb_normalize_request
            &gt;&gt;&gt; start + size &lt;= ac-&gt;ac_o_ex.fe_logical
           ext4_mb_regular_allocator
            ext4_mb_simple_scan_group
             ext4_mb_use_best_found
              ext4_mb_new_preallocation
               ext4_mb_new_inode_pa
                ext4_mb_use_inode_pa
                 &gt;&gt;&gt; set ac-&gt;ac_b_ex.fe_len &lt;= 0
           ext4_mb_mark_diskspace_used
            &gt;&gt;&gt; BUG_ON(ac-&gt;ac_b_ex.fe_len &lt;= 0);

we can easily reproduce this problem with the following commands:
	`fallocate -l100M disk`
	`mkfs.ext4 -b 1024 -g 256 disk`
	`mount disk /mnt`
	`fsstress -d /mnt -l 0 -n 1000 -p 1`

The size must be smaller than or equal to EXT4_BLOCKS_PER_GROUP.
Therefore, "start + size &lt;= ac-&gt;ac_o_ex.fe_logical" may occur
when the size is truncated. So start should be the start position of
the group where ac_o_ex.fe_logical is located after alignment.
In addition, when the value of fe_logical or EXT4_BLOCKS_PER_GROUP
is very large, the value calculated by start_off is more accurate.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49708/">CVE-2022-49708 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49708">CVE-2022-49708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238599">SUSE bug 1238599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49710" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49710" ref_url="https://www.suse.com/security/cve/CVE-2022-49710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm mirror log: round up region bitmap size to BITS_PER_LONG

The code in dm-log rounds up bitset_size to 32 bits. It then uses
find_next_zero_bit_le on the allocated region. find_next_zero_bit_le
accesses the bitmap using unsigned long pointers. So, on 64-bit
architectures, it may access 4 bytes beyond the allocated size.

Fix this bug by rounding up bitset_size to BITS_PER_LONG.

This bug was found by running the lvm2 testsuite with kasan.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49710/">CVE-2022-49710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49710">CVE-2022-49710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238417">SUSE bug 1238417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49715" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49715" ref_url="https://www.suse.com/security/cve/CVE-2022-49715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3: Fix refcount leak in gic_populate_ppi_partitions

of_find_node_by_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49715/">CVE-2022-49715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49715">CVE-2022-49715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238818">SUSE bug 1238818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49716</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49716" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49716" ref_url="https://www.suse.com/security/cve/CVE-2022-49716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3: Fix error handling in gic_populate_ppi_partitions

of_get_child_by_name() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
When kcalloc fails, it missing of_node_put() and results in refcount
leak. Fix this by goto out_put_node label.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49716/">CVE-2022-49716 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49716">CVE-2022-49716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238288">SUSE bug 1238288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49721" ref_url="https://www.suse.com/security/cve/CVE-2022-49721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: ftrace: consistently handle PLTs.

Sometimes it is necessary to use a PLT entry to call an ftrace
trampoline. This is handled by ftrace_make_call() and ftrace_make_nop(),
with each having *almost* identical logic, but this is not handled by
ftrace_modify_call() since its introduction in commit:

  3b23e4991fb66f6d ("arm64: implement ftrace with regs")

Due to this, if we ever were to call ftrace_modify_call() for a callsite
which requires a PLT entry for a trampoline, then either:

a) If the old addr requires a trampoline, ftrace_modify_call() will use
   an out-of-range address to generate the 'old' branch instruction.
   This will result in warnings from aarch64_insn_gen_branch_imm() and
   ftrace_modify_code(), and no instructions will be modified. As
   ftrace_modify_call() will return an error, this will result in
   subsequent internal ftrace errors.

b) If the old addr does not require a trampoline, but the new addr does,
   ftrace_modify_call() will use an out-of-range address to generate the
   'new' branch instruction. This will result in warnings from
   aarch64_insn_gen_branch_imm(), and ftrace_modify_code() will replace
   the 'old' branch with a BRK. This will result in a kernel panic when
   this BRK is later executed.

Practically speaking, case (a) is vastly more likely than case (b), and
typically this will result in internal ftrace errors that don't
necessarily affect the rest of the system. This can be demonstrated with
an out-of-tree test module which triggers ftrace_modify_call(), e.g.

| # insmod test_ftrace.ko
| test_ftrace: Function test_function raw=0xffffb3749399201c, callsite=0xffffb37493992024
| branch_imm_common: offset out of range
| branch_imm_common: offset out of range
| ------------[ ftrace bug ]------------
| ftrace failed to modify
| [&lt;ffffb37493992024&gt;] test_function+0x8/0x38 [test_ftrace]
|  actual:   1d:00:00:94
| Updating ftrace call site to call a different ftrace function
| ftrace record flags: e0000002
|  (2) R
|  expected tramp: ffffb374ae42ed54
| ------------[ cut here ]------------
| WARNING: CPU: 0 PID: 165 at kernel/trace/ftrace.c:2085 ftrace_bug+0x280/0x2b0
| Modules linked in: test_ftrace(+)
| CPU: 0 PID: 165 Comm: insmod Not tainted 5.19.0-rc2-00002-g4d9ead8b45ce #13
| Hardware name: linux,dummy-virt (DT)
| pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
| pc : ftrace_bug+0x280/0x2b0
| lr : ftrace_bug+0x280/0x2b0
| sp : ffff80000839ba00
| x29: ffff80000839ba00 x28: 0000000000000000 x27: ffff80000839bcf0
| x26: ffffb37493994180 x25: ffffb374b0991c28 x24: ffffb374b0d70000
| x23: 00000000ffffffea x22: ffffb374afcc33b0 x21: ffffb374b08f9cc8
| x20: ffff572b8462c000 x19: ffffb374b08f9000 x18: ffffffffffffffff
| x17: 6c6c6163202c6331 x16: ffffb374ae5ad110 x15: ffffb374b0d51ee4
| x14: 0000000000000000 x13: 3435646532346561 x12: 3437336266666666
| x11: 203a706d61727420 x10: 6465746365707865 x9 : ffffb374ae5149e8
| x8 : 336266666666203a x7 : 706d617274206465 x6 : 00000000fffff167
| x5 : ffff572bffbc4a08 x4 : 00000000fffff167 x3 : 0000000000000000
| x2 : 0000000000000000 x1 : ffff572b84461e00 x0 : 0000000000000022
| Call trace:
|  ftrace_bug+0x280/0x2b0
|  ftrace_replace_code+0x98/0xa0
|  ftrace_modify_all_code+0xe0/0x144
|  arch_ftrace_update_code+0x14/0x20
|  ftrace_startup+0xf8/0x1b0
|  register_ftrace_function+0x38/0x90
|  test_ftrace_init+0xd0/0x1000 [test_ftrace]
|  do_one_initcall+0x50/0x2b0
|  do_init_module+0x50/0x1f0
|  load_module+0x17c8/0x1d64
|  __do_sys_finit_module+0xa8/0x100
|  __arm64_sys_finit_module+0x2c/0x3c
|  invoke_syscall+0x50/0x120
|  el0_svc_common.constprop.0+0xdc/0x100
|  do_el0_svc+0x3c/0xd0
|  el0_svc+0x34/0xb0
|  el0t_64_sync_handler+0xbc/0x140
|  el0t_64_sync+0x18c/0x190
| ---[ end trace 0000000000000000 ]---

We can solve this by consistently determining whether to use a PLT entry
for an address.

Note that since (the earlier) commit:

  f1a54ae9
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49721/">CVE-2022-49721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49721">CVE-2022-49721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237789">SUSE bug 1237789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49722</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49722" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49722" ref_url="https://www.suse.com/security/cve/CVE-2022-49722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix memory corruption in VF driver

Disable VF's RX/TX queues, when it's disabled. VF can have queues enabled,
when it requests a reset. If PF driver assumes that VF is disabled,
while VF still has queues configured, VF may unmap DMA resources.
In such scenario device still can map packets to memory, which ends up
silently corrupting it.
Previously, VF driver could experience memory corruption, which lead to
crash:
[ 5119.170157] BUG: unable to handle kernel paging request at 00001b9780003237
[ 5119.170166] PGD 0 P4D 0
[ 5119.170173] Oops: 0002 [#1] PREEMPT_RT SMP PTI
[ 5119.170181] CPU: 30 PID: 427592 Comm: kworker/u96:2 Kdump: loaded Tainted: G        W I      --------- -  - 4.18.0-372.9.1.rt7.166.el8.x86_64 #1
[ 5119.170189] Hardware name: Dell Inc. PowerEdge R740/014X06, BIOS 2.3.10 08/15/2019
[ 5119.170193] Workqueue: iavf iavf_adminq_task [iavf]
[ 5119.170219] RIP: 0010:__page_frag_cache_drain+0x5/0x30
[ 5119.170238] Code: 0f 0f b6 77 51 85 f6 74 07 31 d2 e9 05 df ff ff e9 90 fe ff ff 48 8b 05 49 db 33 01 eb b4 0f 1f 80 00 00 00 00 0f 1f 44 00 00 &lt;f0&gt; 29 77 34 74 01 c3 48 8b 07 f6 c4 80 74 0f 0f b6 77 51 85 f6 74
[ 5119.170244] RSP: 0018:ffffa43b0bdcfd78 EFLAGS: 00010282
[ 5119.170250] RAX: ffffffff896b3e40 RBX: ffff8fb282524000 RCX: 0000000000000002
[ 5119.170254] RDX: 0000000049000000 RSI: 0000000000000000 RDI: 00001b9780003203
[ 5119.170259] RBP: ffff8fb248217b00 R08: 0000000000000022 R09: 0000000000000009
[ 5119.170262] R10: 2b849d6300000000 R11: 0000000000000020 R12: 0000000000000000
[ 5119.170265] R13: 0000000000001000 R14: 0000000000000009 R15: 0000000000000000
[ 5119.170269] FS:  0000000000000000(0000) GS:ffff8fb1201c0000(0000) knlGS:0000000000000000
[ 5119.170274] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 5119.170279] CR2: 00001b9780003237 CR3: 00000008f3e1a003 CR4: 00000000007726e0
[ 5119.170283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 5119.170286] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 5119.170290] PKRU: 55555554
[ 5119.170292] Call Trace:
[ 5119.170298]  iavf_clean_rx_ring+0xad/0x110 [iavf]
[ 5119.170324]  iavf_free_rx_resources+0xe/0x50 [iavf]
[ 5119.170342]  iavf_free_all_rx_resources.part.51+0x30/0x40 [iavf]
[ 5119.170358]  iavf_virtchnl_completion+0xd8a/0x15b0 [iavf]
[ 5119.170377]  ? iavf_clean_arq_element+0x210/0x280 [iavf]
[ 5119.170397]  iavf_adminq_task+0x126/0x2e0 [iavf]
[ 5119.170416]  process_one_work+0x18f/0x420
[ 5119.170429]  worker_thread+0x30/0x370
[ 5119.170437]  ? process_one_work+0x420/0x420
[ 5119.170445]  kthread+0x151/0x170
[ 5119.170452]  ? set_kthread_struct+0x40/0x40
[ 5119.170460]  ret_from_fork+0x35/0x40
[ 5119.170477] Modules linked in: iavf sctp ip6_udp_tunnel udp_tunnel mlx4_en mlx4_core nfp tls vhost_net vhost vhost_iotlb tap tun xt_CHECKSUM ipt_MASQUERADE xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_counter nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink bridge stp llc rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache sunrpc intel_rapl_msr iTCO_wdt iTCO_vendor_support dell_smbios wmi_bmof dell_wmi_descriptor dcdbas kvm_intel kvm irqbypass intel_rapl_common isst_if_common skx_edac irdma nfit libnvdimm x86_pkg_temp_thermal i40e intel_powerclamp coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel ib_uverbs rapl ipmi_ssif intel_cstate intel_uncore mei_me pcspkr acpi_ipmi ib_core mei lpc_ich i2c_i801 ipmi_si ipmi_devintf wmi ipmi_msghandler acpi_power_meter xfs libcrc32c sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ice ahci drm libahci crc32c_intel libata tg3 megaraid_sas
[ 5119.170613]  i2c_algo_bit dm_mirror dm_region_hash dm_log dm_mod fuse [last unloaded: iavf]
[ 5119.170627] CR2: 00001b9780003237
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49722/">CVE-2022-49722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49722">CVE-2022-49722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238301">SUSE bug 1238301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804562" comment="bpftool-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804563" comment="kernel-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804564" comment="kernel-abi-stablelists-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804565" comment="kernel-core-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804567" comment="kernel-debug-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804568" comment="kernel-debug-core-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804571" comment="kernel-debug-modules-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804572" comment="kernel-debug-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804575" comment="kernel-doc-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804576" comment="kernel-headers-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804577" comment="kernel-modules-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804578" comment="kernel-modules-extra-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804579" comment="kernel-tools-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804580" comment="kernel-tools-libs-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804582" comment="perf-5.14.0-70.26.1.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804583" comment="python3-perf-5.14.0-70.26.1.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49723</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49723" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49723" ref_url="https://www.suse.com/security/cve/CVE-2022-49723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/reset: Fix error_state_read ptr + offset use

Fix our pointer offset usage in error_state_read
when there is no i915_gpu_coredump but buf offset
is non-zero.

This fixes a kernel page fault can happen when
multiple tests are running concurrently in a loop
and one is producing engine resets and consuming
the i915 error_state dump while the other is
forcing full GT resets. (takes a while to trigger).

The dmesg call trace:

[ 5590.803000] BUG: unable to handle page fault for address:
               ffffffffa0b0e000
[ 5590.803009] #PF: supervisor read access in kernel mode
[ 5590.803013] #PF: error_code(0x0000) - not-present page
[ 5590.803016] PGD 5814067 P4D 5814067 PUD 5815063 PMD 109de4067
               PTE 0
[ 5590.803022] Oops: 0000 [#1] PREEMPT SMP NOPTI
[ 5590.803026] CPU: 5 PID: 13656 Comm: i915_hangman Tainted: G U
                    5.17.0-rc5-ups69-guc-err-capt-rev6+ #136
[ 5590.803033] Hardware name: Intel Corporation Alder Lake Client
                    Platform/AlderLake-M LP4x RVP, BIOS ADLPFWI1.R00.
                    3031.A02.2201171222	01/17/2022
[ 5590.803039] RIP: 0010:memcpy_erms+0x6/0x10
[ 5590.803045] Code: fe ff ff cc eb 1e 0f 1f 00 48 89 f8 48 89 d1
                     48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3
                     66 0f 1f 44 00 00 48 89 f8 48 89 d1 &lt;f3&gt; a4
                     c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20
                     72 7e 40 38 fe
[ 5590.803054] RSP: 0018:ffffc90003a8fdf0 EFLAGS: 00010282
[ 5590.803057] RAX: ffff888107ee9000 RBX: ffff888108cb1a00
               RCX: 0000000000000f8f
[ 5590.803061] RDX: 0000000000001000 RSI: ffffffffa0b0e000
               RDI: ffff888107ee9071
[ 5590.803065] RBP: 0000000000000000 R08: 0000000000000001
               R09: 0000000000000001
[ 5590.803069] R10: 0000000000000001 R11: 0000000000000002
               R12: 0000000000000019
[ 5590.803073] R13: 0000000000174fff R14: 0000000000001000
               R15: ffff888107ee9000
[ 5590.803077] FS: 00007f62a99bee80(0000) GS:ffff88849f880000(0000)
               knlGS:0000000000000000
[ 5590.803082] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 5590.803085] CR2: ffffffffa0b0e000 CR3: 000000010a1a8004
               CR4: 0000000000770ee0
[ 5590.803089] PKRU: 55555554
[ 5590.803091] Call Trace:
[ 5590.803093] &lt;TASK&gt;
[ 5590.803096] error_state_read+0xa1/0xd0 [i915]
[ 5590.803175] kernfs_fop_read_iter+0xb2/0x1b0
[ 5590.803180] new_sync_read+0x116/0x1a0
[ 5590.803185] vfs_read+0x114/0x1b0
[ 5590.803189] ksys_read+0x63/0xe0
[ 5590.803193] do_syscall_64+0x38/0xc0
[ 5590.803197] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 5590.803201] RIP: 0033:0x7f62aaea5912
[ 5590.803204] Code: c0 e9 b2 fe ff ff 50 48 8d 3d 5a b9 0c 00 e8 05
                     19 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25
                     18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff
                     ff 77 56 c3 0f 1f 44 00 00 48 83 ec 28 48 89 54 24
[ 5590.803213] RSP: 002b:00007fff5b659ae8 EFLAGS: 00000246
               ORIG_RAX: 0000000000000000
[ 5590.803218] RAX: ffffffffffffffda RBX: 0000000000100000
               RCX: 00007f62aaea5912
[ 5590.803221] RDX: 000000000008b000 RSI: 00007f62a8c4000f
               RDI: 0000000000000006
[ 5590.803225] RBP: 00007f62a8bcb00f R08: 0000000000200010
               R09: 0000000000101000
[ 5590.803229] R10: 0000000000000001 R11: 0000000000000246
               R12: 0000000000000006
[ 5590.803233] R13: 0000000000075000 R14: 00007f62a8acb010
               R15: 0000000000200000
[ 5590.803238] &lt;/TASK&gt;
[ 5590.803240] Modules linked in: i915 ttm drm_buddy drm_dp_helper
                        drm_kms_helper syscopyarea sysfillrect sysimgblt
                        fb_sys_fops prime_numbers nfnetlink br_netfilter
                        overlay mei_pxp mei_hdcp x86_pkg_temp_thermal
                        coretemp kvm_intel snd_hda_codec_hdmi snd_hda_intel
        
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49723/">CVE-2022-49723 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49723">CVE-2022-49723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237997">SUSE bug 1237997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49726</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49726" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49726" ref_url="https://www.suse.com/security/cve/CVE-2022-49726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clocksource: hyper-v: unexport __init-annotated hv_init_clocksource()

EXPORT_SYMBOL and __init is a bad combination because the .init.text
section is freed up after the initialization. Hence, modules cannot
use symbols annotated __init. The access to a freed symbol may end up
with kernel panic.

modpost used to detect it, but it has been broken for a decade.

Recently, I fixed modpost so it started to warn it again, then this
showed up in linux-next builds.

There are two ways to fix it:

  - Remove __init
  - Remove EXPORT_SYMBOL

I chose the latter for this case because the only in-tree call-site,
arch/x86/kernel/cpu/mshyperv.c is never compiled as modular.
(CONFIG_HYPERVISOR_GUEST is boolean)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49726/">CVE-2022-49726 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49726">CVE-2022-49726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238808">SUSE bug 1238808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49731" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49731" ref_url="https://www.suse.com/security/cve/CVE-2022-49731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: libata-core: fix NULL pointer deref in ata_host_alloc_pinfo()

In an unlikely (and probably wrong?) case that the 'ppi' parameter of
ata_host_alloc_pinfo() points to an array starting with a NULL pointer,
there's going to be a kernel oops as the 'pi' local variable won't get
reassigned from the initial value of NULL. Initialize 'pi' instead to
'&amp;ata_dummy_port_info' to fix the possible kernel oops for good...

Found by Linux Verification Center (linuxtesting.org) with the SVACE static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49731/">CVE-2022-49731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49731">CVE-2022-49731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239071">SUSE bug 1239071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49732" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49732" ref_url="https://www.suse.com/security/cve/CVE-2022-49732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sock: redo the psock vs ULP protection check

Commit 8a59f9d1e3d4 ("sock: Introduce sk-&gt;sk_prot-&gt;psock_update_sk_prot()")
has moved the inet_csk_has_ulp(sk) check from sk_psock_init() to
the new tcp_bpf_update_proto() function. I'm guessing that this
was done to allow creating psocks for non-inet sockets.

Unfortunately the destruction path for psock includes the ULP
unwind, so we need to fail the sk_psock_init() itself.
Otherwise if ULP is already present we'll notice that later,
and call tcp_update_ulp() with the sk_proto of the ULP
itself, which will most likely result in the ULP looping
its callbacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49732/">CVE-2022-49732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49732">CVE-2022-49732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237928">SUSE bug 1237928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49739" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49739" ref_url="https://www.suse.com/security/cve/CVE-2022-49739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Always check inode size of inline inodes

Check if the inode size of stuffed (inline) inodes is within the allowed
range when reading inodes from disk (gfs2_dinode_in()).  This prevents
us from on-disk corruption.

The two checks in stuffed_readpage() and gfs2_unstuffer_page() that just
truncate inline data to the maximum allowed size don't actually make
sense, and they can be removed now as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49739/">CVE-2022-49739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49739">CVE-2022-49739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240207">SUSE bug 1240207</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49744" ref_url="https://www.suse.com/security/cve/CVE-2022-49744" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/uffd: fix pte marker when fork() without fork event

Patch series "mm: Fixes on pte markers".

Patch 1 resolves the syzkiller report from Pengfei.

Patch 2 further harden pte markers when used with the recent swapin error
markers.  The major case is we should persist a swapin error marker after
fork(), so child shouldn't read a corrupted page.


This patch (of 2):

When fork(), dst_vma is not guaranteed to have VM_UFFD_WP even if src may
have it and has pte marker installed.  The warning is improper along with
the comment.  The right thing is to inherit the pte marker when needed, or
keep the dst pte empty.

A vague guess is this happened by an accident when there's the prior patch
to introduce src/dst vma into this helper during the uffd-wp feature got
developed and I probably messed up in the rebase, since if we replace
dst_vma with src_vma the warning &amp; comment it all makes sense too.

Hugetlb did exactly the right here (copy_hugetlb_page_range()).  Fix the
general path.

Reproducer:

https://github.com/xupengfe/syzkaller_logs/blob/main/221208_115556_copy_page_range/repro.c

Bugzilla report: https://bugzilla.kernel.org/show_bug.cgi?id=216808
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49744/">CVE-2022-49744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49744">CVE-2022-49744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240257">SUSE bug 1240257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49746" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49746" ref_url="https://www.suse.com/security/cve/CVE-2022-49746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: imx-sdma: Fix a possible memory leak in sdma_transfer_init

If the function sdma_load_context() fails, the sdma_desc will be
freed, but the allocated desc-&gt;bd is forgot to be freed.

We already met the sdma_load_context() failure case and the log as
below:
[ 450.699064] imx-sdma 30bd0000.dma-controller: Timeout waiting for CH0 ready
...

In this case, the desc-&gt;bd will not be freed without this change.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49746/">CVE-2022-49746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49746">CVE-2022-49746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240242">SUSE bug 1240242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49747</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49747" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49747" ref_url="https://www.suse.com/security/cve/CVE-2022-49747" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs/zmap.c: Fix incorrect offset calculation

Effective offset to add to length was being incorrectly calculated,
which resulted in iomap-&gt;length being set to 0, triggering a WARN_ON
in iomap_iter_done().

Fix that, and describe it in comments.

This was reported as a crash by syzbot under an issue about a warning
encountered in iomap_iter_done(), but unrelated to erofs.

C reproducer: https://syzkaller.appspot.com/text?tag=ReproC&amp;x=1037a6b2880000
Kernel config: https://syzkaller.appspot.com/text?tag=KernelConfig&amp;x=e2021a61197ebe02
Dashboard link: https://syzkaller.appspot.com/bug?extid=a8e049cd3abd342936b6
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49747/">CVE-2022-49747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49747">CVE-2022-49747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240244">SUSE bug 1240244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49748</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49748" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49748" ref_url="https://www.suse.com/security/cve/CVE-2022-49748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/amd: fix potential integer overflow on shift of a int

The left shift of int 32 bit integer constant 1 is evaluated using 32 bit
arithmetic and then passed as a 64 bit function argument. In the case where
i is 32 or more this can lead to an overflow.  Avoid this by shifting
using the BIT_ULL macro instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49748/">CVE-2022-49748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49748">CVE-2022-49748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240256">SUSE bug 1240256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49750" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49750" ref_url="https://www.suse.com/security/cve/CVE-2022-49750" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: CPPC: Add u64 casts to avoid overflowing

The fields of the _CPC object are unsigned 32-bits values.
To avoid overflows while using _CPC's values, add 'u64' casts.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49750/">CVE-2022-49750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49750">CVE-2022-49750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240253">SUSE bug 1240253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49752" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49752" ref_url="https://www.suse.com/security/cve/CVE-2022-49752" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

device property: fix of node refcount leak in fwnode_graph_get_next_endpoint()

The 'parent' returned by fwnode_graph_get_port_parent()
with refcount incremented when 'prev' is not NULL, it
needs be put when finish using it.

Because the parent is const, introduce a new variable to
store the returned fwnode, then put it before returning
from fwnode_graph_get_next_endpoint().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49752/">CVE-2022-49752 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49752">CVE-2022-49752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240252">SUSE bug 1240252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49753" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49753" ref_url="https://www.suse.com/security/cve/CVE-2022-49753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: Fix double increment of client_count in dma_chan_get()

The first time dma_chan_get() is called for a channel the channel
client_count is incorrectly incremented twice for public channels,
first in balance_ref_count(), and again prior to returning. This
results in an incorrect client count which will lead to the
channel resources not being freed when they should be. A simple
 test of repeated module load and unload of async_tx on a Dell
 Power Edge R7425 also shows this resulting in a kref underflow
 warning.

[  124.329662] async_tx: api initialized (async)
[  129.000627] async_tx: api initialized (async)
[  130.047839] ------------[ cut here ]------------
[  130.052472] refcount_t: underflow; use-after-free.
[  130.057279] WARNING: CPU: 3 PID: 19364 at lib/refcount.c:28
refcount_warn_saturate+0xba/0x110
[  130.065811] Modules linked in: async_tx(-) rfkill intel_rapl_msr
intel_rapl_common amd64_edac edac_mce_amd ipmi_ssif kvm_amd dcdbas kvm
mgag200 drm_shmem_helper acpi_ipmi irqbypass drm_kms_helper ipmi_si
syscopyarea sysfillrect rapl pcspkr ipmi_devintf sysimgblt fb_sys_fops
k10temp i2c_piix4 ipmi_msghandler acpi_power_meter acpi_cpufreq vfat
fat drm fuse xfs libcrc32c sd_mod t10_pi sg ahci crct10dif_pclmul
libahci crc32_pclmul crc32c_intel ghash_clmulni_intel igb megaraid_sas
i40e libata i2c_algo_bit ccp sp5100_tco dca dm_mirror dm_region_hash
dm_log dm_mod [last unloaded: async_tx]
[  130.117361] CPU: 3 PID: 19364 Comm: modprobe Kdump: loaded Not
tainted 5.14.0-185.el9.x86_64 #1
[  130.126091] Hardware name: Dell Inc. PowerEdge R7425/02MJ3T, BIOS
1.18.0 01/17/2022
[  130.133806] RIP: 0010:refcount_warn_saturate+0xba/0x110
[  130.139041] Code: 01 01 e8 6d bd 55 00 0f 0b e9 72 9d 8a 00 80 3d
26 18 9c 01 00 75 85 48 c7 c7 f8 a3 03 9d c6 05 16 18 9c 01 01 e8 4a
bd 55 00 &lt;0f&gt; 0b e9 4f 9d 8a 00 80 3d 01 18 9c 01 00 0f 85 5e ff ff ff
48 c7
[  130.157807] RSP: 0018:ffffbf98898afe68 EFLAGS: 00010286
[  130.163036] RAX: 0000000000000000 RBX: ffff9da06028e598 RCX: 0000000000000000
[  130.170172] RDX: ffff9daf9de26480 RSI: ffff9daf9de198a0 RDI: ffff9daf9de198a0
[  130.177316] RBP: ffff9da7cddf3970 R08: 0000000000000000 R09: 00000000ffff7fff
[  130.184459] R10: ffffbf98898afd00 R11: ffffffff9d9e8c28 R12: ffff9da7cddf1970
[  130.191596] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[  130.198739] FS:  00007f646435c740(0000) GS:ffff9daf9de00000(0000)
knlGS:0000000000000000
[  130.206832] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  130.212586] CR2: 00007f6463b214f0 CR3: 00000008ab98c000 CR4: 00000000003506e0
[  130.219729] Call Trace:
[  130.222192]  &lt;TASK&gt;
[  130.224305]  dma_chan_put+0x10d/0x110
[  130.227988]  dmaengine_put+0x7a/0xa0
[  130.231575]  __do_sys_delete_module.constprop.0+0x178/0x280
[  130.237157]  ? syscall_trace_enter.constprop.0+0x145/0x1d0
[  130.242652]  do_syscall_64+0x5c/0x90
[  130.246240]  ? exc_page_fault+0x62/0x150
[  130.250178]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  130.255243] RIP: 0033:0x7f6463a3f5ab
[  130.258830] Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48
83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00
00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89
01 48
[  130.277591] RSP: 002b:00007fff22f972c8 EFLAGS: 00000206 ORIG_RAX:
00000000000000b0
[  130.285164] RAX: ffffffffffffffda RBX: 000055b6786edd40 RCX: 00007f6463a3f5ab
[  130.292303] RDX: 0000000000000000 RSI: 0000000000000800 RDI: 000055b6786edda8
[  130.299443] RBP: 000055b6786edd40 R08: 0000000000000000 R09: 0000000000000000
[  130.306584] R10: 00007f6463b9eac0 R11: 0000000000000206 R12: 000055b6786edda8
[  130.313731] R13: 0000000000000000 R14: 000055b6786edda8 R15: 00007fff22f995f8
[  130.320875]  &lt;/TASK&gt;
[  130.323081] ---[ end trace eff7156d56b5cf25 ]---

cat /sys/class/dma/dma0chan*/in_use would get the wrong result.
2
2
2

Test-by: Jie Hai &lt;haijie1@huawei.com&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49753/">CVE-2022-49753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49753">CVE-2022-49753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240250">SUSE bug 1240250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49754" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49754" ref_url="https://www.suse.com/security/cve/CVE-2022-49754" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix a buffer overflow in mgmt_mesh_add()

Smatch Warning:
net/bluetooth/mgmt_util.c:375 mgmt_mesh_add() error: __memcpy()
'mesh_tx-&gt;param' too small (48 vs 50)

Analysis:

'mesh_tx-&gt;param' is array of size 48. This is the destination.
u8 param[sizeof(struct mgmt_cp_mesh_send) + 29]; // 19 + 29 = 48.

But in the caller 'mesh_send' we reject only when len &gt; 50.
len &gt; (MGMT_MESH_SEND_SIZE + 31) // 19 + 31 = 50.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49754/">CVE-2022-49754 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49754">CVE-2022-49754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240255">SUSE bug 1240255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49759</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49759" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49759" ref_url="https://www.suse.com/security/cve/CVE-2022-49759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

VMCI: Use threaded irqs instead of tasklets

The vmci_dispatch_dgs() tasklet function calls vmci_read_data()
which uses wait_event() resulting in invalid sleep in an atomic
context (and therefore potentially in a deadlock).

Use threaded irqs to fix this issue and completely remove usage
of tasklets.

[   20.264639] BUG: sleeping function called from invalid context at drivers/misc/vmw_vmci/vmci_guest.c:145
[   20.264643] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 762, name: vmtoolsd
[   20.264645] preempt_count: 101, expected: 0
[   20.264646] RCU nest depth: 0, expected: 0
[   20.264647] 1 lock held by vmtoolsd/762:
[   20.264648]  #0: ffff0000874ae440 (sk_lock-AF_VSOCK){+.+.}-{0:0}, at: vsock_connect+0x60/0x330 [vsock]
[   20.264658] Preemption disabled at:
[   20.264659] [&lt;ffff80000151d7d8&gt;] vmci_send_datagram+0x44/0xa0 [vmw_vmci]
[   20.264665] CPU: 0 PID: 762 Comm: vmtoolsd Not tainted 5.19.0-0.rc8.20220727git39c3c396f813.60.fc37.aarch64 #1
[   20.264667] Hardware name: VMware, Inc. VBSA/VBSA, BIOS VEFI 12/31/2020
[   20.264668] Call trace:
[   20.264669]  dump_backtrace+0xc4/0x130
[   20.264672]  show_stack+0x24/0x80
[   20.264673]  dump_stack_lvl+0x88/0xb4
[   20.264676]  dump_stack+0x18/0x34
[   20.264677]  __might_resched+0x1a0/0x280
[   20.264679]  __might_sleep+0x58/0x90
[   20.264681]  vmci_read_data+0x74/0x120 [vmw_vmci]
[   20.264683]  vmci_dispatch_dgs+0x64/0x204 [vmw_vmci]
[   20.264686]  tasklet_action_common.constprop.0+0x13c/0x150
[   20.264688]  tasklet_action+0x40/0x50
[   20.264689]  __do_softirq+0x23c/0x6b4
[   20.264690]  __irq_exit_rcu+0x104/0x214
[   20.264691]  irq_exit_rcu+0x1c/0x50
[   20.264693]  el1_interrupt+0x38/0x6c
[   20.264695]  el1h_64_irq_handler+0x18/0x24
[   20.264696]  el1h_64_irq+0x68/0x6c
[   20.264697]  preempt_count_sub+0xa4/0xe0
[   20.264698]  _raw_spin_unlock_irqrestore+0x64/0xb0
[   20.264701]  vmci_send_datagram+0x7c/0xa0 [vmw_vmci]
[   20.264703]  vmci_datagram_dispatch+0x84/0x100 [vmw_vmci]
[   20.264706]  vmci_datagram_send+0x2c/0x40 [vmw_vmci]
[   20.264709]  vmci_transport_send_control_pkt+0xb8/0x120 [vmw_vsock_vmci_transport]
[   20.264711]  vmci_transport_connect+0x40/0x7c [vmw_vsock_vmci_transport]
[   20.264713]  vsock_connect+0x278/0x330 [vsock]
[   20.264715]  __sys_connect_file+0x8c/0xc0
[   20.264718]  __sys_connect+0x84/0xb4
[   20.264720]  __arm64_sys_connect+0x2c/0x3c
[   20.264721]  invoke_syscall+0x78/0x100
[   20.264723]  el0_svc_common.constprop.0+0x68/0x124
[   20.264724]  do_el0_svc+0x38/0x4c
[   20.264725]  el0_svc+0x60/0x180
[   20.264726]  el0t_64_sync_handler+0x11c/0x150
[   20.264728]  el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49759/">CVE-2022-49759 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49759">CVE-2022-49759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240245">SUSE bug 1240245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49760" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49760" ref_url="https://www.suse.com/security/cve/CVE-2022-49760" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix PTE marker handling in hugetlb_change_protection()

Patch series "mm/hugetlb: uffd-wp fixes for hugetlb_change_protection()".

Playing with virtio-mem and background snapshots (using uffd-wp) on
hugetlb in QEMU, I managed to trigger a VM_BUG_ON().  Looking into the
details, hugetlb_change_protection() seems to not handle uffd-wp correctly
in all cases.

Patch #1 fixes my test case.  I don't have reproducers for patch #2, as it
requires running into migration entries.

I did not yet check in detail yet if !hugetlb code requires similar care.


This patch (of 2):

There are two problematic cases when stumbling over a PTE marker in
hugetlb_change_protection():

(1) We protect an uffd-wp PTE marker a second time using uffd-wp: we will
    end up in the "!huge_pte_none(pte)" case and mess up the PTE marker.

(2) We unprotect a uffd-wp PTE marker: we will similarly end up in the
    "!huge_pte_none(pte)" case even though we cleared the PTE, because
    the "pte" variable is stale. We'll mess up the PTE marker.

For example, if we later stumble over such a "wrongly modified" PTE marker,
we'll treat it like a present PTE that maps some garbage page.

This can, for example, be triggered by mapping a memfd backed by huge
pages, registering uffd-wp, uffd-wp'ing an unmapped page and (a)
uffd-wp'ing it a second time; or (b) uffd-unprotecting it; or (c)
unregistering uffd-wp. Then, ff we trigger fallocate(FALLOC_FL_PUNCH_HOLE)
on that file range, we will run into a VM_BUG_ON:

[  195.039560] page:00000000ba1f2987 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x0
[  195.039565] flags: 0x7ffffc0001000(reserved|node=0|zone=0|lastcpupid=0x1fffff)
[  195.039568] raw: 0007ffffc0001000 ffffe742c0000008 ffffe742c0000008 0000000000000000
[  195.039569] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[  195.039569] page dumped because: VM_BUG_ON_PAGE(compound &amp;&amp; !PageHead(page))
[  195.039573] ------------[ cut here ]------------
[  195.039574] kernel BUG at mm/rmap.c:1346!
[  195.039579] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[  195.039581] CPU: 7 PID: 4777 Comm: qemu-system-x86 Not tainted 6.0.12-200.fc36.x86_64 #1
[  195.039583] Hardware name: LENOVO 20WNS1F81N/20WNS1F81N, BIOS N35ET50W (1.50 ) 09/15/2022
[  195.039584] RIP: 0010:page_remove_rmap+0x45b/0x550
[  195.039588] Code: [...]
[  195.039589] RSP: 0018:ffffbc03c3633ba8 EFLAGS: 00010292
[  195.039591] RAX: 0000000000000040 RBX: ffffe742c0000000 RCX: 0000000000000000
[  195.039592] RDX: 0000000000000002 RSI: ffffffff8e7aac1a RDI: 00000000ffffffff
[  195.039592] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffbc03c3633a08
[  195.039593] R10: 0000000000000003 R11: ffffffff8f146328 R12: ffff9b04c42754b0
[  195.039594] R13: ffffffff8fcc6328 R14: ffffbc03c3633c80 R15: ffff9b0484ab9100
[  195.039595] FS:  00007fc7aaf68640(0000) GS:ffff9b0bbf7c0000(0000) knlGS:0000000000000000
[  195.039596] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  195.039597] CR2: 000055d402c49110 CR3: 0000000159392003 CR4: 0000000000772ee0
[  195.039598] PKRU: 55555554
[  195.039599] Call Trace:
[  195.039600]  &lt;TASK&gt;
[  195.039602]  __unmap_hugepage_range+0x33b/0x7d0
[  195.039605]  unmap_hugepage_range+0x55/0x70
[  195.039608]  hugetlb_vmdelete_list+0x77/0xa0
[  195.039611]  hugetlbfs_fallocate+0x410/0x550
[  195.039612]  ? _raw_spin_unlock_irqrestore+0x23/0x40
[  195.039616]  vfs_fallocate+0x12e/0x360
[  195.039618]  __x64_sys_fallocate+0x40/0x70
[  195.039620]  do_syscall_64+0x58/0x80
[  195.039623]  ? syscall_exit_to_user_mode+0x17/0x40
[  195.039624]  ? do_syscall_64+0x67/0x80
[  195.039626]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  195.039628] RIP: 0033:0x7fc7b590651f
[  195.039653] Code: [...]
[  195.039654] RSP: 002b:00007fc7aaf66e70 EFLAGS: 00000293 ORIG_RAX: 000000000000011d
[  195.039655] RAX: ffffffffffffffda RBX: 0000558ef4b7f370 RCX: 00007fc7b590651f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49760/">CVE-2022-49760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49760">CVE-2022-49760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240249">SUSE bug 1240249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49773</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49773" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49773" ref_url="https://www.suse.com/security/cve/CVE-2022-49773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix optc2_configure warning on dcn314

[Why]
dcn314 uses optc2_configure_crc() that wraps
optc1_configure_crc() + set additional registers
not applicable to dcn314.
It's not critical but when used leads to warning like:
WARNING: drivers/gpu/drm/amd/amdgpu/../display/dc/dc_helper.c
Call Trace:
&lt;TASK&gt;
generic_reg_set_ex+0x6d/0xe0 [amdgpu]
optc2_configure_crc+0x60/0x80 [amdgpu]
dc_stream_configure_crc+0x129/0x150 [amdgpu]
amdgpu_dm_crtc_configure_crc_source+0x5d/0xe0 [amdgpu]

[How]
Use optc1_configure_crc() directly
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49773/">CVE-2022-49773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49773">CVE-2022-49773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242311">SUSE bug 1242311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49774</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49774" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49774" ref_url="https://www.suse.com/security/cve/CVE-2022-49774" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()

Should not call eventfd_ctx_put() in case of error.

[Introduce new goto target instead. - Paolo]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49774/">CVE-2022-49774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49774">CVE-2022-49774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242259">SUSE bug 1242259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49778" ref_url="https://www.suse.com/security/cve/CVE-2022-49778" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/mm: fix incorrect file_map_count for non-leaf pmd/pud

The page table check trigger BUG_ON() unexpectedly when collapse hugepage:

 ------------[ cut here ]------------
 kernel BUG at mm/page_table_check.c:82!
 Internal error: Oops - BUG: 00000000f2000800 [#1] SMP
 Dumping ftrace buffer:
    (ftrace buffer empty)
 Modules linked in:
 CPU: 6 PID: 68 Comm: khugepaged Not tainted 6.1.0-rc3+ #750
 Hardware name: linux,dummy-virt (DT)
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : page_table_check_clear.isra.0+0x258/0x3f0
 lr : page_table_check_clear.isra.0+0x240/0x3f0
[...]
 Call trace:
  page_table_check_clear.isra.0+0x258/0x3f0
  __page_table_check_pmd_clear+0xbc/0x108
  pmdp_collapse_flush+0xb0/0x160
  collapse_huge_page+0xa08/0x1080
  hpage_collapse_scan_pmd+0xf30/0x1590
  khugepaged_scan_mm_slot.constprop.0+0x52c/0xac8
  khugepaged+0x338/0x518
  kthread+0x278/0x2f8
  ret_from_fork+0x10/0x20
[...]

Since pmd_user_accessible_page() doesn't check if a pmd is leaf, it
decrease file_map_count for a non-leaf pmd comes from collapse_huge_page().
and so trigger BUG_ON() unexpectedly.

Fix this problem by using pmd_leaf() insteal of pmd_present() in
pmd_user_accessible_page(). Moreover, use pud_leaf() for
pud_user_accessible_page() too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49778/">CVE-2022-49778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49778">CVE-2022-49778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242255">SUSE bug 1242255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49788" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49788" ref_url="https://www.suse.com/security/cve/CVE-2022-49788" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc/vmw_vmci: fix an infoleak in vmci_host_do_receive_datagram()

`struct vmci_event_qp` allocated by qp_notify_peer() contains padding,
which may carry uninitialized data to the userspace, as observed by
KMSAN:

  BUG: KMSAN: kernel-infoleak in instrument_copy_to_user ./include/linux/instrumented.h:121
   instrument_copy_to_user ./include/linux/instrumented.h:121
   _copy_to_user+0x5f/0xb0 lib/usercopy.c:33
   copy_to_user ./include/linux/uaccess.h:169
   vmci_host_do_receive_datagram drivers/misc/vmw_vmci/vmci_host.c:431
   vmci_host_unlocked_ioctl+0x33d/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:925
   vfs_ioctl fs/ioctl.c:51
  ...

  Uninit was stored to memory at:
   kmemdup+0x74/0xb0 mm/util.c:131
   dg_dispatch_as_host drivers/misc/vmw_vmci/vmci_datagram.c:271
   vmci_datagram_dispatch+0x4f8/0xfc0 drivers/misc/vmw_vmci/vmci_datagram.c:339
   qp_notify_peer+0x19a/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1479
   qp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662
   qp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750
   vmci_qp_broker_alloc+0x96/0xd0 drivers/misc/vmw_vmci/vmci_queue_pair.c:1940
   vmci_host_do_alloc_queuepair drivers/misc/vmw_vmci/vmci_host.c:488
   vmci_host_unlocked_ioctl+0x24fd/0x43d0 drivers/misc/vmw_vmci/vmci_host.c:927
  ...

  Local variable ev created at:
   qp_notify_peer+0x54/0x290 drivers/misc/vmw_vmci/vmci_queue_pair.c:1456
   qp_broker_attach drivers/misc/vmw_vmci/vmci_queue_pair.c:1662
   qp_broker_alloc+0x2977/0x2f30 drivers/misc/vmw_vmci/vmci_queue_pair.c:1750

  Bytes 28-31 of 48 are uninitialized
  Memory access of size 48 starts at ffff888035155e00
  Data copied to user address 0000000020000100

Use memset() to prevent the infoleaks.

Also speculatively fix qp_notify_peer_local(), which may suffer from the
same problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49788/">CVE-2022-49788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49788">CVE-2022-49788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242353">SUSE bug 1242353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49795" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49795" ref_url="https://www.suse.com/security/cve/CVE-2022-49795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rethook: fix a potential memleak in rethook_alloc()

In rethook_alloc(), the variable rh is not freed or passed out
if handler is NULL, which could lead to a memleak, fix it.

[Masami: Add "rethook:" tag to the title.]

Acke-by: Masami Hiramatsu (Google) &lt;mhiramat@kernel.org&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49795/">CVE-2022-49795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49795">CVE-2022-49795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242298">SUSE bug 1242298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49804" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49804" ref_url="https://www.suse.com/security/cve/CVE-2022-49804" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390: avoid using global register for current_stack_pointer

Commit 30de14b1884b ("s390: current_stack_pointer shouldn't be a
function") made current_stack_pointer a global register variable like
on many other architectures. Unfortunately on s390 it uncovers old
gcc bug which is fixed only since gcc-9.1 [gcc commit 3ad7fed1cc87
("S/390: Fix PR89775. Stackpointer save/restore instructions removed")]
and backported to gcc-8.4 and later. Due to this bug gcc versions prior
to 8.4 generate broken code which leads to stack corruptions.

Current minimal gcc version required to build the kernel is declared
as 5.1. It is not possible to fix all old gcc versions, so work
around this problem by avoiding using global register variable for
current_stack_pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49804/">CVE-2022-49804 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49804">CVE-2022-49804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242339">SUSE bug 1242339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49811" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49811" ref_url="https://www.suse.com/security/cve/CVE-2022-49811" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drbd: use after free in drbd_create_device()

The drbd_destroy_connection() frees the "connection" so use the _safe()
iterator to prevent a use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<cve href="https://www.suse.com/security/cve/CVE-2022-49811/">CVE-2022-49811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-49811">CVE-2022-49811 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49815" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49815" ref_url="https://www.suse.com/security/cve/CVE-2022-49815" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix missing xas_retry() in fscache mode

The xarray iteration only holds the RCU read lock and thus may encounter
XA_RETRY_ENTRY if there's process modifying the xarray concurrently.
This will cause oops when referring to the invalid entry.

Fix this by adding the missing xas_retry(), which will make the
iteration wind back to the root node if XA_RETRY_ENTRY is encountered.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49815/">CVE-2022-49815 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49815">CVE-2022-49815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242499">SUSE bug 1242499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49827</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49827" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49827" ref_url="https://www.suse.com/security/cve/CVE-2022-49827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: Fix potential null-ptr-deref in drm_vblank_destroy_worker()

drm_vblank_init() call drmm_add_action_or_reset() with
drm_vblank_init_release() as action. If __drmm_add_action() failed, will
directly call drm_vblank_init_release() with the vblank whose worker is
NULL. As the resule, a null-ptr-deref will happen in
kthread_destroy_worker(). Add the NULL check before calling
drm_vblank_destroy_worker().

BUG: null-ptr-deref
KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f]
CPU: 5 PID: 961 Comm: modprobe Not tainted 6.0.0-11331-gd465bff130bf-dirty
RIP: 0010:kthread_destroy_worker+0x25/0xb0
  Call Trace:
    &lt;TASK&gt;
    drm_vblank_init_release+0x124/0x220 [drm]
    ? drm_crtc_vblank_restore+0x8b0/0x8b0 [drm]
    __drmm_add_action_or_reset+0x41/0x50 [drm]
    drm_vblank_init+0x282/0x310 [drm]
    vkms_init+0x35f/0x1000 [vkms]
    ? 0xffffffffc4508000
    ? lock_is_held_type+0xd7/0x130
    ? __kmem_cache_alloc_node+0x1c2/0x2b0
    ? lock_is_held_type+0xd7/0x130
    ? 0xffffffffc4508000
    do_one_initcall+0xd0/0x4f0
    ...
    do_syscall_64+0x35/0x80
    entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49827/">CVE-2022-49827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49827">CVE-2022-49827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242689">SUSE bug 1242689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49837</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49837" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49837" ref_url="https://www.suse.com/security/cve/CVE-2022-49837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix memory leaks in __check_func_call

kmemleak reports this issue:

unreferenced object 0xffff88817139d000 (size 2048):
  comm "test_progs", pid 33246, jiffies 4307381979 (age 45851.820s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;0000000045f075f0&gt;] kmalloc_trace+0x27/0xa0
    [&lt;0000000098b7c90a&gt;] __check_func_call+0x316/0x1230
    [&lt;00000000b4c3c403&gt;] check_helper_call+0x172e/0x4700
    [&lt;00000000aa3875b7&gt;] do_check+0x21d8/0x45e0
    [&lt;000000001147357b&gt;] do_check_common+0x767/0xaf0
    [&lt;00000000b5a595b4&gt;] bpf_check+0x43e3/0x5bc0
    [&lt;0000000011e391b1&gt;] bpf_prog_load+0xf26/0x1940
    [&lt;0000000007f765c0&gt;] __sys_bpf+0xd2c/0x3650
    [&lt;00000000839815d6&gt;] __x64_sys_bpf+0x75/0xc0
    [&lt;00000000946ee250&gt;] do_syscall_64+0x3b/0x90
    [&lt;0000000000506b7f&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

The root case here is: In function prepare_func_exit(), the callee is
not released in the abnormal scenario after "state-&gt;curframe--;". To
fix, move "state-&gt;curframe--;" to the very bottom of the function,
right when we free callee and reset frame[] pointer to NULL, as Andrii
suggested.

In addition, function __check_func_call() has a similar problem. In
the abnormal scenario before "state-&gt;curframe++;", the callee also
should be released by free_func_state().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49837/">CVE-2022-49837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49837">CVE-2022-49837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242160">SUSE bug 1242160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49839" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49839" ref_url="https://www.suse.com/security/cve/CVE-2022-49839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_transport_sas: Fix error handling in sas_phy_add()

If transport_add_device() fails in sas_phy_add(), the kernel will crash
trying to delete the device in transport_remove_device() called from
sas_remove_host().

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000108
CPU: 61 PID: 42829 Comm: rmmod Kdump: loaded Tainted: G        W          6.1.0-rc1+ #173
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : device_del+0x54/0x3d0
lr : device_del+0x37c/0x3d0
Call trace:
 device_del+0x54/0x3d0
 attribute_container_class_device_del+0x28/0x38
 transport_remove_classdev+0x6c/0x80
 attribute_container_device_trigger+0x108/0x110
 transport_remove_device+0x28/0x38
 sas_phy_delete+0x30/0x60 [scsi_transport_sas]
 do_sas_phy_delete+0x6c/0x80 [scsi_transport_sas]
 device_for_each_child+0x68/0xb0
 sas_remove_children+0x40/0x50 [scsi_transport_sas]
 sas_remove_host+0x20/0x38 [scsi_transport_sas]
 hisi_sas_remove+0x40/0x68 [hisi_sas_main]
 hisi_sas_v2_remove+0x20/0x30 [hisi_sas_v2_hw]
 platform_remove+0x2c/0x60

Fix this by checking and handling return value of transport_add_device()
in sas_phy_add().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49839/">CVE-2022-49839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49839">CVE-2022-49839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242443">SUSE bug 1242443</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49845</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49845" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49845" ref_url="https://www.suse.com/security/cve/CVE-2022-49845" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_send_one(): fix missing CAN header initialization

The read access to struct canxl_frame::len inside of a j1939 created
skbuff revealed a missing initialization of reserved and later filled
elements in struct can_frame.

This patch initializes the 8 byte CAN header with zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49845/">CVE-2022-49845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49845">CVE-2022-49845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243133">SUSE bug 1243133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49846</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49846" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49846" ref_url="https://www.suse.com/security/cve/CVE-2022-49846" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10379" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001765.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10669" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: Fix a slab-out-of-bounds write bug in udf_find_entry()

Syzbot reported a slab-out-of-bounds Write bug:

loop0: detected capacity change from 0 to 2048
==================================================================
BUG: KASAN: slab-out-of-bounds in udf_find_entry+0x8a5/0x14f0
fs/udf/namei.c:253
Write of size 105 at addr ffff8880123ff896 by task syz-executor323/3610

CPU: 0 PID: 3610 Comm: syz-executor323 Not tainted
6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0
Hardware name: Google Compute Engine/Google Compute Engine, BIOS
Google 10/11/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x1b1/0x28e lib/dump_stack.c:106
 print_address_description+0x74/0x340 mm/kasan/report.c:284
 print_report+0x107/0x1f0 mm/kasan/report.c:395
 kasan_report+0xcd/0x100 mm/kasan/report.c:495
 kasan_check_range+0x2a7/0x2e0 mm/kasan/generic.c:189
 memcpy+0x3c/0x60 mm/kasan/shadow.c:66
 udf_find_entry+0x8a5/0x14f0 fs/udf/namei.c:253
 udf_lookup+0xef/0x340 fs/udf/namei.c:309
 lookup_open fs/namei.c:3391 [inline]
 open_last_lookups fs/namei.c:3481 [inline]
 path_openat+0x10e6/0x2df0 fs/namei.c:3710
 do_filp_open+0x264/0x4f0 fs/namei.c:3740
 do_sys_openat2+0x124/0x4e0 fs/open.c:1310
 do_sys_open fs/open.c:1326 [inline]
 __do_sys_creat fs/open.c:1402 [inline]
 __se_sys_creat fs/open.c:1396 [inline]
 __x64_sys_creat+0x11f/0x160 fs/open.c:1396
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7ffab0d164d9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89
f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01
f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffe1a7e6bb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000055
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffab0d164d9
RDX: 00007ffab0d164d9 RSI: 0000000000000000 RDI: 0000000020000180
RBP: 00007ffab0cd5a10 R08: 0000000000000000 R09: 0000000000000000
R10: 00005555573552c0 R11: 0000000000000246 R12: 00007ffab0cd5aa0
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Allocated by task 3610:
 kasan_save_stack mm/kasan/common.c:45 [inline]
 kasan_set_track+0x3d/0x60 mm/kasan/common.c:52
 ____kasan_kmalloc mm/kasan/common.c:371 [inline]
 __kasan_kmalloc+0x97/0xb0 mm/kasan/common.c:380
 kmalloc include/linux/slab.h:576 [inline]
 udf_find_entry+0x7b6/0x14f0 fs/udf/namei.c:243
 udf_lookup+0xef/0x340 fs/udf/namei.c:309
 lookup_open fs/namei.c:3391 [inline]
 open_last_lookups fs/namei.c:3481 [inline]
 path_openat+0x10e6/0x2df0 fs/namei.c:3710
 do_filp_open+0x264/0x4f0 fs/namei.c:3740
 do_sys_openat2+0x124/0x4e0 fs/open.c:1310
 do_sys_open fs/open.c:1326 [inline]
 __do_sys_creat fs/open.c:1402 [inline]
 __se_sys_creat fs/open.c:1396 [inline]
 __x64_sys_creat+0x11f/0x160 fs/open.c:1396
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

The buggy address belongs to the object at ffff8880123ff800
 which belongs to the cache kmalloc-256 of size 256
The buggy address is located 150 bytes inside of
 256-byte region [ffff8880123ff800, ffff8880123ff900)

The buggy address belongs to the physical page:
page:ffffea000048ff80 refcount:1 mapcount:0 mapping:0000000000000000
index:0x0 pfn:0x123fe
head:ffffea000048ff80 order:1 compound_mapcount:0 compound_pincount:0
flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000010200 ffffea00004b8500 dead000000000003 ffff888012041b40
raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 0, migratetype Unmovable, gfp_mask 0x0(),
pid 1, tgid 1 (swapper/0), ts 1841222404, free_ts 0
 create_dummy_stack mm/page_owner.c:
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49846/">CVE-2022-49846 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49846">CVE-2022-49846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242716">SUSE bug 1242716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999183" comment="kernel-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999184" comment="kernel-abi-stablelists-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999185" comment="kernel-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999186" comment="kernel-cross-headers-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999187" comment="kernel-debug-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999188" comment="kernel-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999191" comment="kernel-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999192" comment="kernel-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999193" comment="kernel-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999194" comment="kernel-debug-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999197" comment="kernel-doc-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999198" comment="kernel-headers-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999199" comment="kernel-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999200" comment="kernel-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999201" comment="kernel-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999202" comment="kernel-rt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999203" comment="kernel-rt-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999204" comment="kernel-rt-debug-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999205" comment="kernel-rt-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999207" comment="kernel-rt-debug-kvm-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999208" comment="kernel-rt-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999209" comment="kernel-rt-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999210" comment="kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999212" comment="kernel-rt-kvm-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999213" comment="kernel-rt-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999214" comment="kernel-rt-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999215" comment="kernel-rt-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999216" comment="kernel-tools-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999217" comment="kernel-tools-libs-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999219" comment="kernel-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999220" comment="kernel-uki-virt-addons-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999221" comment="libperf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999222" comment="perf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999223" comment="python3-perf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999224" comment="rtla-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999225" comment="rv-5.14.0-570.25.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49848" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49848" ref_url="https://www.suse.com/security/cve/CVE-2022-49848" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: qcom-qmp-combo: fix NULL-deref on runtime resume

Commit fc64623637da ("phy: qcom-qmp-combo,usb: add support for separate
PCS_USB region") started treating the PCS_USB registers as potentially
separate from the PCS registers but used the wrong base when no PCS_USB
offset has been provided.

Fix the PCS_USB base used at runtime resume to prevent dereferencing a
NULL pointer on platforms that do not provide a PCS_USB offset (e.g.
SC7180).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49848/">CVE-2022-49848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49848">CVE-2022-49848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242341">SUSE bug 1242341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49853" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49853" ref_url="https://www.suse.com/security/cve/CVE-2022-49853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macvlan: fix memory leaks of macvlan_common_newlink

kmemleak reports memory leaks in macvlan_common_newlink, as follows:

 ip link add link eth0 name .. type macvlan mode source macaddr add
 &lt;MAC-ADDR&gt;

kmemleak reports:

unreferenced object 0xffff8880109bb140 (size 64):
  comm "ip", pid 284, jiffies 4294986150 (age 430.108s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b8 aa 5a 12 80 88 ff ff  ..........Z.....
    80 1b fa 0d 80 88 ff ff 1e ff ac af c7 c1 6b 6b  ..............kk
  backtrace:
    [&lt;ffffffff813e06a7&gt;] kmem_cache_alloc_trace+0x1c7/0x300
    [&lt;ffffffff81b66025&gt;] macvlan_hash_add_source+0x45/0xc0
    [&lt;ffffffff81b66a67&gt;] macvlan_changelink_sources+0xd7/0x170
    [&lt;ffffffff81b6775c&gt;] macvlan_common_newlink+0x38c/0x5a0
    [&lt;ffffffff81b6797e&gt;] macvlan_newlink+0xe/0x20
    [&lt;ffffffff81d97f8f&gt;] __rtnl_newlink+0x7af/0xa50
    [&lt;ffffffff81d98278&gt;] rtnl_newlink+0x48/0x70
    ...

In the scenario where the macvlan mode is configured as 'source',
macvlan_changelink_sources() will be execured to reconfigure list of
remote source mac addresses, at the same time, if register_netdevice()
return an error, the resource generated by macvlan_changelink_sources()
is not cleaned up.

Using this patch, in the case of an error, it will execute
macvlan_flush_sources() to ensure that the resource is cleaned up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49853/">CVE-2022-49853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49853">CVE-2022-49853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242688">SUSE bug 1242688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49855" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49855" ref_url="https://www.suse.com/security/cve/CVE-2022-49855" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: iosm: fix memory leak in ipc_pcie_read_bios_cfg

ipc_pcie_read_bios_cfg() is using the acpi_evaluate_dsm() to
obtain the wwan power state configuration from BIOS but is
not freeing the acpi_object. The acpi_evaluate_dsm() returned
acpi_object to be freed.

Free the acpi_object after use.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49855/">CVE-2022-49855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49855">CVE-2022-49855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242581">SUSE bug 1242581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49862" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49862" ref_url="https://www.suse.com/security/cve/CVE-2022-49862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix the msg-&gt;req tlv len check in tipc_nl_compat_name_table_dump_header

This is a follow-up for commit 974cb0e3e7c9 ("tipc: fix uninit-value
in tipc_nl_compat_name_table_dump") where it should have type casted
sizeof(..) to int to work when TLV_GET_DATA_LEN() returns a negative
value.

syzbot reported a call trace because of it:

  BUG: KMSAN: uninit-value in ...
   tipc_nl_compat_name_table_dump+0x841/0xea0 net/tipc/netlink_compat.c:934
   __tipc_nl_compat_dumpit+0xab2/0x1320 net/tipc/netlink_compat.c:238
   tipc_nl_compat_dumpit+0x991/0xb50 net/tipc/netlink_compat.c:321
   tipc_nl_compat_recv+0xb6e/0x1640 net/tipc/netlink_compat.c:1324
   genl_family_rcv_msg_doit net/netlink/genetlink.c:731 [inline]
   genl_family_rcv_msg net/netlink/genetlink.c:775 [inline]
   genl_rcv_msg+0x103f/0x1260 net/netlink/genetlink.c:792
   netlink_rcv_skb+0x3a5/0x6c0 net/netlink/af_netlink.c:2501
   genl_rcv+0x3c/0x50 net/netlink/genetlink.c:803
   netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
   netlink_unicast+0xf3b/0x1270 net/netlink/af_netlink.c:1345
   netlink_sendmsg+0x1288/0x1440 net/netlink/af_netlink.c:1921
   sock_sendmsg_nosec net/socket.c:714 [inline]
   sock_sendmsg net/socket.c:734 [inline]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49862/">CVE-2022-49862 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49862">CVE-2022-49862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242755">SUSE bug 1242755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49864" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49864" ref_url="https://www.suse.com/security/cve/CVE-2022-49864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix NULL pointer dereference in svm_migrate_to_ram()

./drivers/gpu/drm/amd/amdkfd/kfd_migrate.c:985:58-62: ERROR: p is NULL but dereferenced.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49864/">CVE-2022-49864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49864">CVE-2022-49864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242685">SUSE bug 1242685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49872</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49872" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49872" ref_url="https://www.suse.com/security/cve/CVE-2022-49872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: gso: fix panic on frag_list with mixed head alloc types

Since commit 3dcbdb134f32 ("net: gso: Fix skb_segment splat when
splitting gso_size mangled skb having linear-headed frag_list"), it is
allowed to change gso_size of a GRO packet. However, that commit assumes
that "checking the first list_skb member suffices; i.e if either of the
list_skb members have non head_frag head, then the first one has too".

It turns out this assumption does not hold. We've seen BUG_ON being hit
in skb_segment when skbs on the frag_list had differing head_frag with
the vmxnet3 driver. This happens because __netdev_alloc_skb and
__napi_alloc_skb can return a skb that is page backed or kmalloced
depending on the requested size. As the result, the last small skb in
the GRO packet can be kmalloced.

There are three different locations where this can be fixed:

(1) We could check head_frag in GRO and not allow GROing skbs with
    different head_frag. However, that would lead to performance
    regression on normal forward paths with unmodified gso_size, where
    !head_frag in the last packet is not a problem.

(2) Set a flag in bpf_skb_net_grow and bpf_skb_net_shrink indicating
    that NETIF_F_SG is undesirable. That would need to eat a bit in
    sk_buff. Furthermore, that flag can be unset when all skbs on the
    frag_list are page backed. To retain good performance,
    bpf_skb_net_grow/shrink would have to walk the frag_list.

(3) Walk the frag_list in skb_segment when determining whether
    NETIF_F_SG should be cleared. This of course slows things down.

This patch implements (3). To limit the performance impact in
skb_segment, the list is walked only for skbs with SKB_GSO_DODGY set
that have gso_size changed. Normal paths thus will not hit it.

We could check only the last skb but since we need to walk the whole
list anyway, let's stay on the safe side.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49872/">CVE-2022-49872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49872">CVE-2022-49872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242594">SUSE bug 1242594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49873" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49873" ref_url="https://www.suse.com/security/cve/CVE-2022-49873" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix wrong reg type conversion in release_reference()

Some helper functions will allocate memory. To avoid memory leaks, the
verifier requires the eBPF program to release these memories by calling
the corresponding helper functions.

When a resource is released, all pointer registers corresponding to the
resource should be invalidated. The verifier use release_references() to
do this job, by apply  __mark_reg_unknown() to each relevant register.

It will give these registers the type of SCALAR_VALUE. A register that
will contain a pointer value at runtime, but of type SCALAR_VALUE, which
may allow the unprivileged user to get a kernel pointer by storing this
register into a map.

Using __mark_reg_not_init() while NOT allow_ptr_leaks can mitigate this
problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49873/">CVE-2022-49873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49873">CVE-2022-49873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242576">SUSE bug 1242576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49875</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49875" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49875" ref_url="https://www.suse.com/security/cve/CVE-2022-49875" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE

When using bpftool to pin {PROG, MAP, LINK} without FILE,
segmentation fault will occur. The reson is that the lack
of FILE will cause strlen to trigger NULL pointer dereference.
The corresponding stacktrace is shown below:

do_pin
  do_pin_any
    do_pin_fd
      mount_bpffs_for_pin
        strlen(name) &lt;- NULL pointer dereference

Fix it by adding validation to the common process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49875/">CVE-2022-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49875">CVE-2022-49875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242479">SUSE bug 1242479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49878" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49878" ref_url="https://www.suse.com/security/cve/CVE-2022-49878" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, verifier: Fix memory leak in array reallocation for stack state

If an error (NULL) is returned by krealloc(), callers of realloc_array()
were setting their allocation pointers to NULL, but on error krealloc()
does not touch the original allocation. This would result in a memory
resource leak. Instead, free the old allocation on the error handling
path.

The memory leak information is as follows as also reported by Zhengchao:

  unreferenced object 0xffff888019801800 (size 256):
  comm "bpf_repo", pid 6490, jiffies 4294959200 (age 17.170s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000b211474b&gt;] __kmalloc_node_track_caller+0x45/0xc0
    [&lt;0000000086712a0b&gt;] krealloc+0x83/0xd0
    [&lt;00000000139aab02&gt;] realloc_array+0x82/0xe2
    [&lt;00000000b1ca41d1&gt;] grow_stack_state+0xfb/0x186
    [&lt;00000000cd6f36d2&gt;] check_mem_access.cold+0x141/0x1341
    [&lt;0000000081780455&gt;] do_check_common+0x5358/0xb350
    [&lt;0000000015f6b091&gt;] bpf_check.cold+0xc3/0x29d
    [&lt;000000002973c690&gt;] bpf_prog_load+0x13db/0x2240
    [&lt;00000000028d1644&gt;] __sys_bpf+0x1605/0x4ce0
    [&lt;00000000053f29bd&gt;] __x64_sys_bpf+0x75/0xb0
    [&lt;0000000056fedaf5&gt;] do_syscall_64+0x35/0x80
    [&lt;000000002bd58261&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49878/">CVE-2022-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49878">CVE-2022-49878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242475">SUSE bug 1242475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49882" ref_url="https://www.suse.com/security/cve/CVE-2022-49882" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Reject attempts to consume or refresh inactive gfn_to_pfn_cache

Reject kvm_gpc_check() and kvm_gpc_refresh() if the cache is inactive.
Not checking the active flag during refresh is particularly egregious, as
KVM can end up with a valid, inactive cache, which can lead to a variety
of use-after-free bugs, e.g. consuming a NULL kernel pointer or missing
an mmu_notifier invalidation due to the cache not being on the list of
gfns to invalidate.

Note, "active" needs to be set if and only if the cache is on the list
of caches, i.e. is reachable via mmu_notifier events.  If a relevant
mmu_notifier event occurs while the cache is "active" but not on the
list, KVM will not acquire the cache's lock and so will not serailize
the mmu_notifier event with active users and/or kvm_gpc_refresh().

A race between KVM_XEN_ATTR_TYPE_SHARED_INFO and KVM_XEN_HVM_EVTCHN_SEND
can be exploited to trigger the bug.

1. Deactivate shinfo cache:

kvm_xen_hvm_set_attr
case KVM_XEN_ATTR_TYPE_SHARED_INFO
 kvm_gpc_deactivate
  kvm_gpc_unmap
   gpc-&gt;valid = false
   gpc-&gt;khva = NULL
  gpc-&gt;active = false

Result: active = false, valid = false

2. Cause cache refresh:

kvm_arch_vm_ioctl
case KVM_XEN_HVM_EVTCHN_SEND
 kvm_xen_hvm_evtchn_send
  kvm_xen_set_evtchn
   kvm_xen_set_evtchn_fast
    kvm_gpc_check
    return -EWOULDBLOCK because !gpc-&gt;valid
   kvm_xen_set_evtchn_fast
    return -EWOULDBLOCK
   kvm_gpc_refresh
    hva_to_pfn_retry
     gpc-&gt;valid = true
     gpc-&gt;khva = not NULL

Result: active = false, valid = true

3. Race ioctl KVM_XEN_HVM_EVTCHN_SEND against ioctl
KVM_XEN_ATTR_TYPE_SHARED_INFO:

kvm_arch_vm_ioctl
case KVM_XEN_HVM_EVTCHN_SEND
 kvm_xen_hvm_evtchn_send
  kvm_xen_set_evtchn
   kvm_xen_set_evtchn_fast
    read_lock gpc-&gt;lock
                                          kvm_xen_hvm_set_attr case
                                          KVM_XEN_ATTR_TYPE_SHARED_INFO
                                           mutex_lock kvm-&gt;lock
                                           kvm_xen_shared_info_init
                                            kvm_gpc_activate
                                             gpc-&gt;khva = NULL
    kvm_gpc_check
     [ Check passes because gpc-&gt;valid is
       still true, even though gpc-&gt;khva
       is already NULL. ]
    shinfo = gpc-&gt;khva
    pending_bits = shinfo-&gt;evtchn_pending
    CRASH: test_and_set_bit(..., pending_bits)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49882/">CVE-2022-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49882">CVE-2022-49882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242477">SUSE bug 1242477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49885" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49885" ref_url="https://www.suse.com/security/cve/CVE-2022-49885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: APEI: Fix integer overflow in ghes_estatus_pool_init()

Change num_ghes from int to unsigned int, preventing an overflow
and causing subsequent vmalloc() to fail.

The overflow happens in ghes_estatus_pool_init() when calculating
len during execution of the statement below as both multiplication
operands here are signed int:

len += (num_ghes * GHES_ESOURCE_PREALLOC_MAX_SIZE);

The following call trace is observed because of this bug:

[    9.317108] swapper/0: vmalloc error: size 18446744071562596352, exceeds total pages, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0-1
[    9.317131] Call Trace:
[    9.317134]  &lt;TASK&gt;
[    9.317137]  dump_stack_lvl+0x49/0x5f
[    9.317145]  dump_stack+0x10/0x12
[    9.317146]  warn_alloc.cold+0x7b/0xdf
[    9.317150]  ? __device_attach+0x16a/0x1b0
[    9.317155]  __vmalloc_node_range+0x702/0x740
[    9.317160]  ? device_add+0x17f/0x920
[    9.317164]  ? dev_set_name+0x53/0x70
[    9.317166]  ? platform_device_add+0xf9/0x240
[    9.317168]  __vmalloc_node+0x49/0x50
[    9.317170]  ? ghes_estatus_pool_init+0x43/0xa0
[    9.317176]  vmalloc+0x21/0x30
[    9.317177]  ghes_estatus_pool_init+0x43/0xa0
[    9.317179]  acpi_hest_init+0x129/0x19c
[    9.317185]  acpi_init+0x434/0x4a4
[    9.317188]  ? acpi_sleep_proc_init+0x2a/0x2a
[    9.317190]  do_one_initcall+0x48/0x200
[    9.317195]  kernel_init_freeable+0x221/0x284
[    9.317200]  ? rest_init+0xe0/0xe0
[    9.317204]  kernel_init+0x1a/0x130
[    9.317205]  ret_from_fork+0x22/0x30
[    9.317208]  &lt;/TASK&gt;

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49885/">CVE-2022-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49885">CVE-2022-49885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242735">SUSE bug 1242735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49902</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49902" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49902" ref_url="https://www.suse.com/security/cve/CVE-2022-49902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: Fix possible memory leak for rq_wb on add_disk failure

kmemleak reported memory leaks in device_add_disk():

kmemleak: 3 new suspected memory leaks

unreferenced object 0xffff88800f420800 (size 512):
  comm "modprobe", pid 4275, jiffies 4295639067 (age 223.512s)
  hex dump (first 32 bytes):
    04 00 00 00 08 00 00 00 01 00 00 00 00 00 00 00  ................
    00 e1 f5 05 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000d3662699&gt;] kmalloc_trace+0x26/0x60
    [&lt;00000000edc7aadc&gt;] wbt_init+0x50/0x6f0
    [&lt;0000000069601d16&gt;] wbt_enable_default+0x157/0x1c0
    [&lt;0000000028fc393f&gt;] blk_register_queue+0x2a4/0x420
    [&lt;000000007345a042&gt;] device_add_disk+0x6fd/0xe40
    [&lt;0000000060e6aab0&gt;] nbd_dev_add+0x828/0xbf0 [nbd]
    ...

It is because the memory allocated in wbt_enable_default() is not
released in device_add_disk() error path.
Normally, these memory are freed in:

del_gendisk()
  rq_qos_exit()
    rqos-&gt;ops-&gt;exit(rqos);
      wbt_exit()

So rq_qos_exit() is called to free the rq_wb memory for wbt_init().
However in the error path of device_add_disk(), only
blk_unregister_queue() is called and make rq_wb memory leaked.

Add rq_qos_exit() to the error path to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49902/">CVE-2022-49902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49902">CVE-2022-49902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242465">SUSE bug 1242465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49903" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49903" ref_url="https://www.suse.com/security/cve/CVE-2022-49903" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix WARNING in ip6_route_net_exit_late()

During the initialization of ip6_route_net_init_late(), if file
ipv6_route or rt6_stats fails to be created, the initialization is
successful by default. Therefore, the ipv6_route or rt6_stats file
doesn't be found during the remove in ip6_route_net_exit_late(). It
will cause WRNING.

The following is the stack information:
name 'rt6_stats'
WARNING: CPU: 0 PID: 9 at fs/proc/generic.c:712 remove_proc_entry+0x389/0x460
Modules linked in:
Workqueue: netns cleanup_net
RIP: 0010:remove_proc_entry+0x389/0x460
PKRU: 55555554
Call Trace:
&lt;TASK&gt;
ops_exit_list+0xb0/0x170
cleanup_net+0x4ea/0xb00
process_one_work+0x9bf/0x1710
worker_thread+0x665/0x1080
kthread+0x2e4/0x3a0
ret_from_fork+0x1f/0x30
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49903/">CVE-2022-49903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49903">CVE-2022-49903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242461">SUSE bug 1242461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49908</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49908" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49908" ref_url="https://www.suse.com/security/cve/CVE-2022-49908" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix memory leak in vhci_write

Syzkaller reports a memory leak as follows:
====================================
BUG: memory leak
unreferenced object 0xffff88810d81ac00 (size 240):
  [...]
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff838733d9&gt;] __alloc_skb+0x1f9/0x270 net/core/skbuff.c:418
    [&lt;ffffffff833f742f&gt;] alloc_skb include/linux/skbuff.h:1257 [inline]
    [&lt;ffffffff833f742f&gt;] bt_skb_alloc include/net/bluetooth/bluetooth.h:469 [inline]
    [&lt;ffffffff833f742f&gt;] vhci_get_user drivers/bluetooth/hci_vhci.c:391 [inline]
    [&lt;ffffffff833f742f&gt;] vhci_write+0x5f/0x230 drivers/bluetooth/hci_vhci.c:511
    [&lt;ffffffff815e398d&gt;] call_write_iter include/linux/fs.h:2192 [inline]
    [&lt;ffffffff815e398d&gt;] new_sync_write fs/read_write.c:491 [inline]
    [&lt;ffffffff815e398d&gt;] vfs_write+0x42d/0x540 fs/read_write.c:578
    [&lt;ffffffff815e3cdd&gt;] ksys_write+0x9d/0x160 fs/read_write.c:631
    [&lt;ffffffff845e0645&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff845e0645&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff84600087&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
====================================

HCI core will uses hci_rx_work() to process frame, which is queued to
the hdev-&gt;rx_q tail in hci_recv_frame() by HCI driver.

Yet the problem is that, HCI core may not free the skb after handling
ACL data packets. To be more specific, when start fragment does not
contain the L2CAP length, HCI core just copies skb into conn-&gt;rx_skb and
finishes frame process in l2cap_recv_acldata(), without freeing the skb,
which triggers the above memory leak.

This patch solves it by releasing the relative skb, after processing
the above case in l2cap_recv_acldata().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49908/">CVE-2022-49908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49908">CVE-2022-49908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242157">SUSE bug 1242157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49911" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49911" ref_url="https://www.suse.com/security/cve/CVE-2022-49911" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: enforce documented limit to prevent allocating huge memory

Daniel Xu reported that the hash:net,iface type of the ipset subsystem does
not limit adding the same network with different interfaces to a set, which
can lead to huge memory usage or allocation failure.

The quick reproducer is

$ ipset create ACL.IN.ALL_PERMIT hash:net,iface hashsize 1048576 timeout 0
$ for i in $(seq 0 100); do /sbin/ipset add ACL.IN.ALL_PERMIT 0.0.0.0/0,kaf_$i timeout 0 -exist; done

The backtrace when vmalloc fails:

        [Tue Oct 25 00:13:08 2022] ipset: vmalloc error: size 1073741848, exceeds total pages
        &lt;...&gt;
        [Tue Oct 25 00:13:08 2022] Call Trace:
        [Tue Oct 25 00:13:08 2022]  &lt;TASK&gt;
        [Tue Oct 25 00:13:08 2022]  dump_stack_lvl+0x48/0x60
        [Tue Oct 25 00:13:08 2022]  warn_alloc+0x155/0x180
        [Tue Oct 25 00:13:08 2022]  __vmalloc_node_range+0x72a/0x760
        [Tue Oct 25 00:13:08 2022]  ? hash_netiface4_add+0x7c0/0xb20
        [Tue Oct 25 00:13:08 2022]  ? __kmalloc_large_node+0x4a/0x90
        [Tue Oct 25 00:13:08 2022]  kvmalloc_node+0xa6/0xd0
        [Tue Oct 25 00:13:08 2022]  ? hash_netiface4_resize+0x99/0x710
        &lt;...&gt;

The fix is to enforce the limit documented in the ipset(8) manpage:

&gt;  The internal restriction of the hash:net,iface set type is that the same
&gt;  network prefix cannot be stored with more than 64 different interfaces
&gt;  in a single set.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49911/">CVE-2022-49911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49911">CVE-2022-49911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242471">SUSE bug 1242471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49920" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49920" ref_url="https://www.suse.com/security/cve/CVE-2022-49920" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: netlink notifier might race to release objects

commit release path is invoked via call_rcu and it runs lockless to
release the objects after rcu grace period. The netlink notifier handler
might win race to remove objects that the transaction context is still
referencing from the commit release path.

Call rcu_barrier() to ensure pending rcu callbacks run to completion
if the list of transactions to be destroyed is not empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49920/">CVE-2022-49920 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49920">CVE-2022-49920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242413">SUSE bug 1242413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49925" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49925" ref_url="https://www.suse.com/security/cve/CVE-2022-49925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Fix null-ptr-deref in ib_core_cleanup()

KASAN reported a null-ptr-deref error:

  KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]
  CPU: 1 PID: 379
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
  RIP: 0010:destroy_workqueue+0x2f/0x740
  RSP: 0018:ffff888016137df8 EFLAGS: 00000202
  ...
  Call Trace:
   ib_core_cleanup+0xa/0xa1 [ib_core]
   __do_sys_delete_module.constprop.0+0x34f/0x5b0
   do_syscall_64+0x3a/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
  RIP: 0033:0x7fa1a0d221b7
  ...

It is because the fail of roce_gid_mgmt_init() is ignored:

 ib_core_init()
   roce_gid_mgmt_init()
     gid_cache_wq = alloc_ordered_workqueue # fail
 ...
 ib_core_cleanup()
   roce_gid_mgmt_cleanup()
     destroy_workqueue(gid_cache_wq)
     # destroy an unallocated wq

Fix this by catching the fail of roce_gid_mgmt_init() in ib_core_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49925/">CVE-2022-49925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49925">CVE-2022-49925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242371">SUSE bug 1242371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49934" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49934" ref_url="https://www.suse.com/security/cve/CVE-2022-49934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Fix UAF in ieee80211_scan_rx()

ieee80211_scan_rx() tries to access scan_req-&gt;flags after a
null check, but a UAF is observed when the scan is completed
and __ieee80211_scan_completed() executes, which then calls
cfg80211_scan_done() leading to the freeing of scan_req.

Since scan_req is rcu_dereference()'d, prevent the racing in
__ieee80211_scan_completed() by ensuring that from mac80211's
POV it is no longer accessed from an RCU read critical section
before we call cfg80211_scan_done().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49934/">CVE-2022-49934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49934">CVE-2022-49934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245051">SUSE bug 1245051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49935" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49935" ref_url="https://www.suse.com/security/cve/CVE-2022-49935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf/dma-resv: check if the new fence is really later

Previously when we added a fence to a dma_resv object we always
assumed the the newer than all the existing fences.

With Jason's work to add an UAPI to explicit export/import that's not
necessary the case any more. So without this check we would allow
userspace to force the kernel into an use after free error.

Since the change is very small and defensive it's probably a good
idea to backport this to stable kernels as well just in case others
are using the dma_resv object in the same way.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49935/">CVE-2022-49935 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49935">CVE-2022-49935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245052">SUSE bug 1245052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49936" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49936" ref_url="https://www.suse.com/security/cve/CVE-2022-49936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: core: Prevent nested device-reset calls

Automatic kernel fuzzing revealed a recursive locking violation in
usb-storage:

============================================
WARNING: possible recursive locking detected
5.18.0 #3 Not tainted
--------------------------------------------
kworker/1:3/1205 is trying to acquire lock:
ffff888018638db8 (&amp;us_interface_key[i]){+.+.}-{3:3}, at:
usb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230

but task is already holding lock:
ffff888018638db8 (&amp;us_interface_key[i]){+.+.}-{3:3}, at:
usb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230

...

stack backtrace:
CPU: 1 PID: 1205 Comm: kworker/1:3 Not tainted 5.18.0 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.13.0-1ubuntu1.1 04/01/2014
Workqueue: usb_hub_wq hub_event
Call Trace:
&lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_deadlock_bug kernel/locking/lockdep.c:2988 [inline]
check_deadlock kernel/locking/lockdep.c:3031 [inline]
validate_chain kernel/locking/lockdep.c:3816 [inline]
__lock_acquire.cold+0x152/0x3ca kernel/locking/lockdep.c:5053
lock_acquire kernel/locking/lockdep.c:5665 [inline]
lock_acquire+0x1ab/0x520 kernel/locking/lockdep.c:5630
__mutex_lock_common kernel/locking/mutex.c:603 [inline]
__mutex_lock+0x14f/0x1610 kernel/locking/mutex.c:747
usb_stor_pre_reset+0x35/0x40 drivers/usb/storage/usb.c:230
usb_reset_device+0x37d/0x9a0 drivers/usb/core/hub.c:6109
r871xu_dev_remove+0x21a/0x270 drivers/staging/rtl8712/usb_intf.c:622
usb_unbind_interface+0x1bd/0x890 drivers/usb/core/driver.c:458
device_remove drivers/base/dd.c:545 [inline]
device_remove+0x11f/0x170 drivers/base/dd.c:537
__device_release_driver drivers/base/dd.c:1222 [inline]
device_release_driver_internal+0x1a7/0x2f0 drivers/base/dd.c:1248
usb_driver_release_interface+0x102/0x180 drivers/usb/core/driver.c:627
usb_forced_unbind_intf+0x4d/0xa0 drivers/usb/core/driver.c:1118
usb_reset_device+0x39b/0x9a0 drivers/usb/core/hub.c:6114

This turned out not to be an error in usb-storage but rather a nested
device reset attempt.  That is, as the rtl8712 driver was being
unbound from a composite device in preparation for an unrelated USB
reset (that driver does not have pre_reset or post_reset callbacks),
its -&gt;remove routine called usb_reset_device() -- thus nesting one
reset call within another.

Performing a reset as part of disconnect processing is a questionable
practice at best.  However, the bug report points out that the USB
core does not have any protection against nested resets.  Adding a
reset_in_progress flag and testing it will prevent such errors in the
future.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49936/">CVE-2022-49936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49936">CVE-2022-49936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244984">SUSE bug 1244984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49938" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49938" ref_url="https://www.suse.com/security/cve/CVE-2022-49938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix small mempool leak in SMB2_negotiate()

In some cases of failure (dialect mismatches) in SMB2_negotiate(), after
the request is sent, the checks would return -EIO when they should be
rather setting rc = -EIO and jumping to neg_exit to free the response
buffer from mempool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49938/">CVE-2022-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49938">CVE-2022-49938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244820">SUSE bug 1244820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49940</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49940" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49940" ref_url="https://www.suse.com/security/cve/CVE-2022-49940" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: add sanity check for gsm-&gt;receive in gsm_receive_buf()

A null pointer dereference can happen when attempting to access the
"gsm-&gt;receive()" function in gsmld_receive_buf(). Currently, the code
assumes that gsm-&gt;recieve is only called after MUX activation.
Since the gsmld_receive_buf() function can be accessed without the need to
initialize the MUX, the gsm-&gt;receive() function will not be set and a
NULL pointer dereference will occur.

Fix this by avoiding the call to "gsm-&gt;receive()" in case the function is
not initialized by adding a sanity check.

Call Trace:
 &lt;TASK&gt;
 gsmld_receive_buf+0x1c2/0x2f0 drivers/tty/n_gsm.c:2861
 tiocsti drivers/tty/tty_io.c:2293 [inline]
 tty_ioctl+0xa75/0x15d0 drivers/tty/tty_io.c:2692
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:870 [inline]
 __se_sys_ioctl fs/ioctl.c:856 [inline]
 __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:856
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49940/">CVE-2022-49940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49940">CVE-2022-49940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244866">SUSE bug 1244866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49942</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49942" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49942" ref_url="https://www.suse.com/security/cve/CVE-2022-49942" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Don't finalize CSA in IBSS mode if state is disconnected

When we are not connected to a channel, sending channel "switch"
announcement doesn't make any sense.

The BSS list is empty in that case. This causes the for loop in
cfg80211_get_bss() to be bypassed, so the function returns NULL
(check line 1424 of net/wireless/scan.c), causing the WARN_ON()
in ieee80211_ibss_csa_beacon() to get triggered (check line 500
of net/mac80211/ibss.c), which was consequently reported on the
syzkaller dashboard.

Thus, check if we have an existing connection before generating
the CSA beacon in ieee80211_ibss_finish_csa().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49942/">CVE-2022-49942 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49942">CVE-2022-49942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244881">SUSE bug 1244881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49943</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49943" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49943" ref_url="https://www.suse.com/security/cve/CVE-2022-49943" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: gadget: Fix obscure lockdep violation for udc_mutex

A recent commit expanding the scope of the udc_lock mutex in the
gadget core managed to cause an obscure and slightly bizarre lockdep
violation.  In abbreviated form:

======================================================
WARNING: possible circular locking dependency detected
5.19.0-rc7+ #12510 Not tainted
------------------------------------------------------
udevadm/312 is trying to acquire lock:
ffff80000aae1058 (udc_lock){+.+.}-{3:3}, at: usb_udc_uevent+0x54/0xe0

but task is already holding lock:
ffff000002277548 (kn-&gt;active#4){++++}-{0:0}, at: kernfs_seq_start+0x34/0xe0

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #3 (kn-&gt;active#4){++++}-{0:0}:
              lock_acquire+0x68/0x84
              __kernfs_remove+0x268/0x380
              kernfs_remove_by_name_ns+0x58/0xac
              sysfs_remove_file_ns+0x18/0x24
              device_del+0x15c/0x440

-&gt; #2 (device_links_lock){+.+.}-{3:3}:
              lock_acquire+0x68/0x84
              __mutex_lock+0x9c/0x430
              mutex_lock_nested+0x38/0x64
              device_link_remove+0x3c/0xa0
              _regulator_put.part.0+0x168/0x190
              regulator_put+0x3c/0x54
              devm_regulator_release+0x14/0x20

-&gt; #1 (regulator_list_mutex){+.+.}-{3:3}:
              lock_acquire+0x68/0x84
              __mutex_lock+0x9c/0x430
              mutex_lock_nested+0x38/0x64
              regulator_lock_dependent+0x54/0x284
              regulator_enable+0x34/0x80
              phy_power_on+0x24/0x130
              __dwc2_lowlevel_hw_enable+0x100/0x130
              dwc2_lowlevel_hw_enable+0x18/0x40
              dwc2_hsotg_udc_start+0x6c/0x2f0
              gadget_bind_driver+0x124/0x1f4

-&gt; #0 (udc_lock){+.+.}-{3:3}:
              __lock_acquire+0x1298/0x20cc
              lock_acquire.part.0+0xe0/0x230
              lock_acquire+0x68/0x84
              __mutex_lock+0x9c/0x430
              mutex_lock_nested+0x38/0x64
              usb_udc_uevent+0x54/0xe0

Evidently this was caused by the scope of udc_mutex being too large.
The mutex is only meant to protect udc-&gt;driver along with a few other
things.  As far as I can tell, there's no reason for the mutex to be
held while the gadget core calls a gadget driver's -&gt;bind or -&gt;unbind
routine, or while a UDC is being started or stopped.  (This accounts
for link #1 in the chain above, where the mutex is held while the
dwc2_hsotg_udc is started as part of driver probing.)

Gadget drivers' -&gt;disconnect callbacks are problematic.  Even though
usb_gadget_disconnect() will now acquire the udc_mutex, there's a
window in usb_gadget_bind_driver() between the times when the mutex is
released and the -&gt;bind callback is invoked.  If a disconnect occurred
during that window, we could call the driver's -&gt;disconnect routine
before its -&gt;bind routine.  To prevent this from happening, it will be
necessary to prevent a UDC from connecting while it has no gadget
driver.  This should be done already but it doesn't seem to be;
currently usb_gadget_connect() has no check for this.  Such a check
will have to be added later.

Some degree of mutual exclusion is required in soft_connect_store(),
which can dereference udc-&gt;driver at arbitrary times since it is a
sysfs callback.  The solution here is to acquire the gadget's device
lock rather than the udc_mutex.  Since the driver core guarantees that
the device lock is always held during driver binding and unbinding,
this will make the accesses in soft_connect_store() mutually exclusive
with any changes to udc-&gt;driver.

Lastly, it turns out there is one place which should hold the
udc_mutex but currently does not: The function_show() routine needs
protection while it dereferences udc-&gt;driver.  The missing lock and
unlock calls are added.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49943/">CVE-2022-49943 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49943">CVE-2022-49943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244904">SUSE bug 1244904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49944</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49944" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49944" ref_url="https://www.suse.com/security/cve/CVE-2022-49944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "usb: typec: ucsi: add a common function ucsi_unregister_connectors()"

The recent commit 87d0e2f41b8c ("usb: typec: ucsi: add a common
function ucsi_unregister_connectors()") introduced a regression that
caused NULL dereference at reading the power supply sysfs.  It's a
stale sysfs entry that should have been removed but remains with NULL
ops.  The commit changed the error handling to skip the entries after
a NULL con-&gt;wq, and this leaves the power device unreleased.

For addressing the regression, the straight revert is applied here.
Further code improvements can be done from the scratch again.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49944/">CVE-2022-49944 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49944">CVE-2022-49944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244905">SUSE bug 1244905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49951</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49951" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49951" ref_url="https://www.suse.com/security/cve/CVE-2022-49951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware_loader: Fix use-after-free during unregister

In the following code within firmware_upload_unregister(), the call to
device_unregister() could result in the dev_release function freeing the
fw_upload_priv structure before it is dereferenced for the call to
module_put(). This bug was found by the kernel test robot using
CONFIG_KASAN while running the firmware selftests.

  device_unregister(&amp;fw_sysfs-&gt;dev);
  module_put(fw_upload_priv-&gt;module);

The problem is fixed by copying fw_upload_priv-&gt;module to a local variable
for use when calling device_unregister().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49951/">CVE-2022-49951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49951">CVE-2022-49951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244940">SUSE bug 1244940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49958" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49958" ref_url="https://www.suse.com/security/cve/CVE-2022-49958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: fix netdevice reference leaks in attach_default_qdiscs()

In attach_default_qdiscs(), if a dev has multiple queues and queue 0 fails
to attach qdisc because there is no memory in attach_one_default_qdisc().
Then dev-&gt;qdisc will be noop_qdisc by default. But the other queues may be
able to successfully attach to default qdisc.

In this case, the fallback to noqueue process will be triggered. If the
original attached qdisc is not released and a new one is directly
attached, this will cause netdevice reference leaks.

The following is the bug log:

veth0: default qdisc (fq_codel) fail, fallback to noqueue
unregister_netdevice: waiting for veth0 to become free. Usage count = 32
leaked reference.
 qdisc_alloc+0x12e/0x210
 qdisc_create_dflt+0x62/0x140
 attach_one_default_qdisc.constprop.41+0x44/0x70
 dev_activate+0x128/0x290
 __dev_open+0x12a/0x190
 __dev_change_flags+0x1a2/0x1f0
 dev_change_flags+0x23/0x60
 do_setlink+0x332/0x1150
 __rtnl_newlink+0x52f/0x8e0
 rtnl_newlink+0x43/0x70
 rtnetlink_rcv_msg+0x140/0x3b0
 netlink_rcv_skb+0x50/0x100
 netlink_unicast+0x1bb/0x290
 netlink_sendmsg+0x37c/0x4e0
 sock_sendmsg+0x5f/0x70
 ____sys_sendmsg+0x208/0x280

Fix this bug by clearing any non-noop qdiscs that may have been assigned
before trying to re-attach.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49958/">CVE-2022-49958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49958">CVE-2022-49958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244974">SUSE bug 1244974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49959</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49959" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49959" ref_url="https://www.suse.com/security/cve/CVE-2022-49959" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

openvswitch: fix memory leak at failed datapath creation

ovs_dp_cmd_new()-&gt;ovs_dp_change()-&gt;ovs_dp_set_upcall_portids()
allocates array via kmalloc.
If for some reason new_vport() fails during ovs_dp_cmd_new()
dp-&gt;upcall_portids must be freed.
Add missing kfree.

Kmemleak example:
unreferenced object 0xffff88800c382500 (size 64):
  comm "dump_state", pid 323, jiffies 4294955418 (age 104.347s)
  hex dump (first 32 bytes):
    5e c2 79 e4 1f 7a 38 c7 09 21 38 0c 80 88 ff ff  ^.y..z8..!8.....
    03 00 00 00 0a 00 00 00 14 00 00 00 28 00 00 00  ............(...
  backtrace:
    [&lt;0000000071bebc9f&gt;] ovs_dp_set_upcall_portids+0x38/0xa0
    [&lt;000000000187d8bd&gt;] ovs_dp_change+0x63/0xe0
    [&lt;000000002397e446&gt;] ovs_dp_cmd_new+0x1f0/0x380
    [&lt;00000000aa06f36e&gt;] genl_family_rcv_msg_doit+0xea/0x150
    [&lt;000000008f583bc4&gt;] genl_rcv_msg+0xdc/0x1e0
    [&lt;00000000fa10e377&gt;] netlink_rcv_skb+0x50/0x100
    [&lt;000000004959cece&gt;] genl_rcv+0x24/0x40
    [&lt;000000004699ac7f&gt;] netlink_unicast+0x23e/0x360
    [&lt;00000000c153573e&gt;] netlink_sendmsg+0x24e/0x4b0
    [&lt;000000006f4aa380&gt;] sock_sendmsg+0x62/0x70
    [&lt;00000000d0068654&gt;] ____sys_sendmsg+0x230/0x270
    [&lt;0000000012dacf7d&gt;] ___sys_sendmsg+0x88/0xd0
    [&lt;0000000011776020&gt;] __sys_sendmsg+0x59/0xa0
    [&lt;000000002e8f2dc1&gt;] do_syscall_64+0x3b/0x90
    [&lt;000000003243e7cb&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49959/">CVE-2022-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49959">CVE-2022-49959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244910">SUSE bug 1244910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49960" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49960" ref_url="https://www.suse.com/security/cve/CVE-2022-49960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: fix null pointer dereference

Asus chromebook CX550 crashes during boot on v5.17-rc1 kernel.
The root cause is null pointer defeference of bi_next
in tgl_get_bw_info() in drivers/gpu/drm/i915/display/intel_bw.c.

BUG: kernel NULL pointer dereference, address: 000000000000002e
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 1 Comm: swapper/0 Tainted: G     U            5.17.0-rc1
Hardware name: Google Delbin/Delbin, BIOS Google_Delbin.13672.156.3 05/14/2021
RIP: 0010:tgl_get_bw_info+0x2de/0x510
...
[    2.554467] Call Trace:
[    2.554467]  &lt;TASK&gt;
[    2.554467]  intel_bw_init_hw+0x14a/0x434
[    2.554467]  ? _printk+0x59/0x73
[    2.554467]  ? _dev_err+0x77/0x91
[    2.554467]  i915_driver_hw_probe+0x329/0x33e
[    2.554467]  i915_driver_probe+0x4c8/0x638
[    2.554467]  i915_pci_probe+0xf8/0x14e
[    2.554467]  ? _raw_spin_unlock_irqrestore+0x12/0x2c
[    2.554467]  pci_device_probe+0xaa/0x142
[    2.554467]  really_probe+0x13f/0x2f4
[    2.554467]  __driver_probe_device+0x9e/0xd3
[    2.554467]  driver_probe_device+0x24/0x7c
[    2.554467]  __driver_attach+0xba/0xcf
[    2.554467]  ? driver_attach+0x1f/0x1f
[    2.554467]  bus_for_each_dev+0x8c/0xc0
[    2.554467]  bus_add_driver+0x11b/0x1f7
[    2.554467]  driver_register+0x60/0xea
[    2.554467]  ? mipi_dsi_bus_init+0x16/0x16
[    2.554467]  i915_init+0x2c/0xb9
[    2.554467]  ? mipi_dsi_bus_init+0x16/0x16
[    2.554467]  do_one_initcall+0x12e/0x2b3
[    2.554467]  do_initcall_level+0xd6/0xf3
[    2.554467]  do_initcalls+0x4e/0x79
[    2.554467]  kernel_init_freeable+0xed/0x14d
[    2.554467]  ? rest_init+0xc1/0xc1
[    2.554467]  kernel_init+0x1a/0x120
[    2.554467]  ret_from_fork+0x1f/0x30
[    2.554467]  &lt;/TASK&gt;
...
Kernel panic - not syncing: Fatal exception

(cherry picked from commit c247cd03898c4c43c3bce6d4014730403bc13032)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49960/">CVE-2022-49960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49960">CVE-2022-49960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244911">SUSE bug 1244911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49961" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49961" ref_url="https://www.suse.com/security/cve/CVE-2022-49961" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Do mark_chain_precision for ARG_CONST_ALLOC_SIZE_OR_ZERO

Precision markers need to be propagated whenever we have an ARG_CONST_*
style argument, as the verifier cannot consider imprecise scalars to be
equivalent for the purposes of states_equal check when such arguments
refine the return value (in this case, set mem_size for PTR_TO_MEM). The
resultant mem_size for the R0 is derived from the constant value, and if
the verifier incorrectly prunes states considering them equivalent where
such arguments exist (by seeing that both registers have reg-&gt;precise as
false in regsafe), we can end up with invalid programs passing the
verifier which can do access beyond what should have been the correct
mem_size in that explored state.

To show a concrete example of the problem:

0000000000000000 &lt;prog&gt;:
       0:       r2 = *(u32 *)(r1 + 80)
       1:       r1 = *(u32 *)(r1 + 76)
       2:       r3 = r1
       3:       r3 += 4
       4:       if r3 &gt; r2 goto +18 &lt;LBB5_5&gt;
       5:       w2 = 0
       6:       *(u32 *)(r1 + 0) = r2
       7:       r1 = *(u32 *)(r1 + 0)
       8:       r2 = 1
       9:       if w1 == 0 goto +1 &lt;LBB5_3&gt;
      10:       r2 = -1

0000000000000058 &lt;LBB5_3&gt;:
      11:       r1 = 0 ll
      13:       r3 = 0
      14:       call bpf_ringbuf_reserve
      15:       if r0 == 0 goto +7 &lt;LBB5_5&gt;
      16:       r1 = r0
      17:       r1 += 16777215
      18:       w2 = 0
      19:       *(u8 *)(r1 + 0) = r2
      20:       r1 = r0
      21:       r2 = 0
      22:       call bpf_ringbuf_submit

00000000000000b8 &lt;LBB5_5&gt;:
      23:       w0 = 0
      24:       exit

For the first case, the single line execution's exploration will prune
the search at insn 14 for the branch insn 9's second leg as it will be
verified first using r2 = -1 (UINT_MAX), while as w1 at insn 9 will
always be 0 so at runtime we don't get error for being greater than
UINT_MAX/4 from bpf_ringbuf_reserve. The verifier during regsafe just
sees reg-&gt;precise as false for both r2 registers in both states, hence
considers them equal for purposes of states_equal.

If we propagated precise markers using the backtracking support, we
would use the precise marking to then ensure that old r2 (UINT_MAX) was
within the new r2 (1) and this would never be true, so the verification
would rightfully fail.

The end result is that the out of bounds access at instruction 19 would
be permitted without this fix.

Note that reg-&gt;precise is always set to true when user does not have
CAP_BPF (or when subprog count is greater than 1 (i.e. use of any static
or global functions)), hence this is only a problem when precision marks
need to be explicitly propagated (i.e. privileged users with CAP_BPF).

A simplified test case has been included in the next patch to prevent
future regressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49961/">CVE-2022-49961 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49961">CVE-2022-49961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244913">SUSE bug 1244913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49962" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49962" ref_url="https://www.suse.com/security/cve/CVE-2022-49962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Fix null pointer dereference in remove if xHC has only one roothub

The remove path in xhci platform driver tries to remove and put both main
and shared hcds even if only a main hcd exists (one roothub)

This causes a null pointer dereference in reboot for those controllers.

Check that the shared_hcd exists before trying to remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49962/">CVE-2022-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49962">CVE-2022-49962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244912">SUSE bug 1244912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49964" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49964" ref_url="https://www.suse.com/security/cve/CVE-2022-49964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: cacheinfo: Fix incorrect assignment of signed error value to unsigned fw_level

Though acpi_find_last_cache_level() always returned signed value and the
document states it will return any errors caused by lack of a PPTT table,
it never returned negative values before.

Commit 0c80f9e165f8 ("ACPI: PPTT: Leave the table mapped for the runtime usage")
however changed it by returning -ENOENT if no PPTT was found. The value
returned from acpi_find_last_cache_level() is then assigned to unsigned
fw_level.

It will result in the number of cache leaves calculated incorrectly as
a huge value which will then cause the following warning from __alloc_pages
as the order would be great than MAX_ORDER because of incorrect and huge
cache leaves value.

  |  WARNING: CPU: 0 PID: 1 at mm/page_alloc.c:5407 __alloc_pages+0x74/0x314
  |  Modules linked in:
  |  CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-10393-g7c2a8d3ac4c0 #73
  |  pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  |  pc : __alloc_pages+0x74/0x314
  |  lr : alloc_pages+0xe8/0x318
  |  Call trace:
  |   __alloc_pages+0x74/0x314
  |   alloc_pages+0xe8/0x318
  |   kmalloc_order_trace+0x68/0x1dc
  |   __kmalloc+0x240/0x338
  |   detect_cache_attributes+0xe0/0x56c
  |   update_siblings_masks+0x38/0x284
  |   store_cpu_topology+0x78/0x84
  |   smp_prepare_cpus+0x48/0x134
  |   kernel_init_freeable+0xc4/0x14c
  |   kernel_init+0x2c/0x1b4
  |   ret_from_fork+0x10/0x20

Fix the same by changing fw_level to be signed integer and return the
error from init_cache_level() early in case of error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49964/">CVE-2022-49964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49964">CVE-2022-49964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245064">SUSE bug 1245064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49965" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49965" ref_url="https://www.suse.com/security/cve/CVE-2022-49965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: add missing -&gt;fini_xxxx interfaces for some SMU13 asics

Without these, potential memory leak may be induced.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49965/">CVE-2022-49965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49965">CVE-2022-49965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245063">SUSE bug 1245063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49966" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49966" ref_url="https://www.suse.com/security/cve/CVE-2022-49966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: add missing -&gt;fini_microcode interface for Sienna Cichlid

To avoid any potential memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49966/">CVE-2022-49966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49966">CVE-2022-49966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245062">SUSE bug 1245062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49967" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49967" ref_url="https://www.suse.com/security/cve/CVE-2022-49967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix a data-race around bpf_jit_limit.

While reading bpf_jit_limit, it can be changed concurrently via sysctl,
WRITE_ONCE() in __do_proc_doulongvec_minmax(). The size of bpf_jit_limit
is long, so we need to add a paired READ_ONCE() to avoid load-tearing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49967/">CVE-2022-49967 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49967">CVE-2022-49967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244964">SUSE bug 1244964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49969" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49969" ref_url="https://www.suse.com/security/cve/CVE-2022-49969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: clear optc underflow before turn off odm clock

[Why]
After ODM clock off, optc underflow bit will be kept there always and clear not work.
We need to clear that before clock off.

[How]
Clear that if have when clock off.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49969/">CVE-2022-49969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49969">CVE-2022-49969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245060">SUSE bug 1245060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49970" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49970" ref_url="https://www.suse.com/security/cve/CVE-2022-49970" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, cgroup: Fix kernel BUG in purge_effective_progs

Syzkaller reported a triggered kernel BUG as follows:

  ------------[ cut here ]------------
  kernel BUG at kernel/bpf/cgroup.c:925!
  invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 1 PID: 194 Comm: detach Not tainted 5.19.0-14184-g69dac8e431af #8
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
  rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
  RIP: 0010:__cgroup_bpf_detach+0x1f2/0x2a0
  Code: 00 e8 92 60 30 00 84 c0 75 d8 4c 89 e0 31 f6 85 f6 74 19 42 f6 84
  28 48 05 00 00 02 75 0e 48 8b 80 c0 00 00 00 48 85 c0 75 e5 &lt;0f&gt; 0b 48
  8b 0c5
  RSP: 0018:ffffc9000055bdb0 EFLAGS: 00000246
  RAX: 0000000000000000 RBX: ffff888100ec0800 RCX: ffffc900000f1000
  RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888100ec4578
  RBP: 0000000000000000 R08: ffff888100ec0800 R09: 0000000000000040
  R10: 0000000000000000 R11: 0000000000000000 R12: ffff888100ec4000
  R13: 000000000000000d R14: ffffc90000199000 R15: ffff888100effb00
  FS:  00007f68213d2b80(0000) GS:ffff88813bc80000(0000)
  knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000055f74a0e5850 CR3: 0000000102836000 CR4: 00000000000006e0
  Call Trace:
   &lt;TASK&gt;
   cgroup_bpf_prog_detach+0xcc/0x100
   __sys_bpf+0x2273/0x2a00
   __x64_sys_bpf+0x17/0x20
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
  RIP: 0033:0x7f68214dbcb9
  Code: 08 44 89 e0 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 48 89 f8 48 89
  f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01
  f0 ff8
  RSP: 002b:00007ffeb487db68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
  RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f68214dbcb9
  RDX: 0000000000000090 RSI: 00007ffeb487db70 RDI: 0000000000000009
  RBP: 0000000000000003 R08: 0000000000000012 R09: 0000000b00000003
  R10: 00007ffeb487db70 R11: 0000000000000246 R12: 00007ffeb487dc20
  R13: 0000000000000004 R14: 0000000000000001 R15: 000055f74a1011b0
   &lt;/TASK&gt;
  Modules linked in:
  ---[ end trace 0000000000000000 ]---

Repetition steps:

For the following cgroup tree,

  root
   |
  cg1
   |
  cg2

  1. attach prog2 to cg2, and then attach prog1 to cg1, both bpf progs
     attach type is NONE or OVERRIDE.
  2. write 1 to /proc/thread-self/fail-nth for failslab.
  3. detach prog1 for cg1, and then kernel BUG occur.

Failslab injection will cause kmalloc fail and fall back to
purge_effective_progs. The problem is that cg2 have attached another prog,
so when go through cg2 layer, iteration will add pos to 1, and subsequent
operations will be skipped by the following condition, and cg will meet
NULL in the end.

  `if (pos &amp;&amp; !(cg-&gt;bpf.flags[atype] &amp; BPF_F_ALLOW_MULTI))`

The NULL cg means no link or prog match, this is as expected, and it's not
a bug. So here just skip the no match situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49970/">CVE-2022-49970 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49970">CVE-2022-49970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244947">SUSE bug 1244947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49971" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49971" ref_url="https://www.suse.com/security/cve/CVE-2022-49971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Fix a potential gpu_metrics_table memory leak

Memory is allocated for gpu_metrics_table in
smu_v13_0_4_init_smc_tables(), but not freed in
smu_v13_0_4_fini_smc_tables(). This may cause memory leaks, fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49971/">CVE-2022-49971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49971">CVE-2022-49971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245070">SUSE bug 1245070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49973" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49973" ref_url="https://www.suse.com/security/cve/CVE-2022-49973" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

skmsg: Fix wrong last sg check in sk_msg_recvmsg()

Fix one kernel NULL pointer dereference as below:

[  224.462334] Call Trace:
[  224.462394]  __tcp_bpf_recvmsg+0xd3/0x380
[  224.462441]  ? sock_has_perm+0x78/0xa0
[  224.462463]  tcp_bpf_recvmsg+0x12e/0x220
[  224.462494]  inet_recvmsg+0x5b/0xd0
[  224.462534]  __sys_recvfrom+0xc8/0x130
[  224.462574]  ? syscall_trace_enter+0x1df/0x2e0
[  224.462606]  ? __do_page_fault+0x2de/0x500
[  224.462635]  __x64_sys_recvfrom+0x24/0x30
[  224.462660]  do_syscall_64+0x5d/0x1d0
[  224.462709]  entry_SYSCALL_64_after_hwframe+0x65/0xca

In commit 9974d37ea75f ("skmsg: Fix invalid last sg check in
sk_msg_recvmsg()"), we change last sg check to sg_is_last(),
but in sockmap redirection case (without stream_parser/stream_verdict/
skb_verdict), we did not mark the end of the scatterlist. Check the
sk_msg_alloc, sk_msg_page_add, and bpf_msg_push_data functions, they all
do not mark the end of sg. They are expected to use sg.end for end
judgment. So the judgment of '(i != msg_rx-&gt;sg.end)' is added back here.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49973/">CVE-2022-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49973">CVE-2022-49973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244954">SUSE bug 1244954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49974" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49974" ref_url="https://www.suse.com/security/cve/CVE-2022-49974" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: nintendo: fix rumble worker null pointer deref

We can dereference a null pointer trying to queue work to a destroyed
workqueue.

If the device is disconnected, nintendo_hid_remove is called, in which
the rumble_queue is destroyed. Avoid using that queue to defer rumble
work once the controller state is set to JOYCON_CTLR_STATE_REMOVED.

This eliminates the null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49974/">CVE-2022-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49974">CVE-2022-49974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244931">SUSE bug 1244931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49977" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49977" ref_url="https://www.suse.com/security/cve/CVE-2022-49977" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11850" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead

ftrace_startup does not remove ops from ftrace_ops_list when
ftrace_startup_enable fails:

register_ftrace_function
  ftrace_startup
    __register_ftrace_function
      ...
      add_ftrace_ops(&amp;ftrace_ops_list, ops)
      ...
    ...
    ftrace_startup_enable // if ftrace failed to modify, ftrace_disabled is set to 1
    ...
  return 0 // ops is in the ftrace_ops_list.

When ftrace_disabled = 1, unregister_ftrace_function simply returns without doing anything:
unregister_ftrace_function
  ftrace_shutdown
    if (unlikely(ftrace_disabled))
            return -ENODEV;  // return here, __unregister_ftrace_function is not executed,
                             // as a result, ops is still in the ftrace_ops_list
    __unregister_ftrace_function
    ...

If ops is dynamically allocated, it will be free later, in this case,
is_ftrace_trampoline accesses NULL pointer:

is_ftrace_trampoline
  ftrace_ops_trampoline
    do_for_each_ftrace_op(op, ftrace_ops_list) // OOPS! op may be NULL!

Syzkaller reports as follows:
[ 1203.506103] BUG: kernel NULL pointer dereference, address: 000000000000010b
[ 1203.508039] #PF: supervisor read access in kernel mode
[ 1203.508798] #PF: error_code(0x0000) - not-present page
[ 1203.509558] PGD 800000011660b067 P4D 800000011660b067 PUD 130fb8067 PMD 0
[ 1203.510560] Oops: 0000 [#1] SMP KASAN PTI
[ 1203.511189] CPU: 6 PID: 29532 Comm: syz-executor.2 Tainted: G    B   W         5.10.0 #8
[ 1203.512324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[ 1203.513895] RIP: 0010:is_ftrace_trampoline+0x26/0xb0
[ 1203.514644] Code: ff eb d3 90 41 55 41 54 49 89 fc 55 53 e8 f2 00 fd ff 48 8b 1d 3b 35 5d 03 e8 e6 00 fd ff 48 8d bb 90 00 00 00 e8 2a 81 26 00 &lt;48&gt; 8b ab 90 00 00 00 48 85 ed 74 1d e8 c9 00 fd ff 48 8d bb 98 00
[ 1203.518838] RSP: 0018:ffffc900012cf960 EFLAGS: 00010246
[ 1203.520092] RAX: 0000000000000000 RBX: 000000000000007b RCX: ffffffff8a331866
[ 1203.521469] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000010b
[ 1203.522583] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8df18b07
[ 1203.523550] R10: fffffbfff1be3160 R11: 0000000000000001 R12: 0000000000478399
[ 1203.524596] R13: 0000000000000000 R14: ffff888145088000 R15: 0000000000000008
[ 1203.525634] FS:  00007f429f5f4700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000
[ 1203.526801] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1203.527626] CR2: 000000000000010b CR3: 0000000170e1e001 CR4: 00000000003706e0
[ 1203.528611] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1203.529605] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400

Therefore, when ftrace_startup_enable fails, we need to rollback registration
process and remove ops from ftrace_ops_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49977/">CVE-2022-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49977">CVE-2022-49977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244936">SUSE bug 1244936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49979" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49979" ref_url="https://www.suse.com/security/cve/CVE-2022-49979" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix refcount bug in sk_psock_get (2)

Syzkaller reports refcount bug as follows:
------------[ cut here ]------------
refcount_t: saturated; leaking memory.
WARNING: CPU: 1 PID: 3605 at lib/refcount.c:19 refcount_warn_saturate+0xf4/0x1e0 lib/refcount.c:19
Modules linked in:
CPU: 1 PID: 3605 Comm: syz-executor208 Not tainted 5.18.0-syzkaller-03023-g7e062cda7d90 #0
 &lt;TASK&gt;
 __refcount_add_not_zero include/linux/refcount.h:163 [inline]
 __refcount_inc_not_zero include/linux/refcount.h:227 [inline]
 refcount_inc_not_zero include/linux/refcount.h:245 [inline]
 sk_psock_get+0x3bc/0x410 include/linux/skmsg.h:439
 tls_data_ready+0x6d/0x1b0 net/tls/tls_sw.c:2091
 tcp_data_ready+0x106/0x520 net/ipv4/tcp_input.c:4983
 tcp_data_queue+0x25f2/0x4c90 net/ipv4/tcp_input.c:5057
 tcp_rcv_state_process+0x1774/0x4e80 net/ipv4/tcp_input.c:6659
 tcp_v4_do_rcv+0x339/0x980 net/ipv4/tcp_ipv4.c:1682
 sk_backlog_rcv include/net/sock.h:1061 [inline]
 __release_sock+0x134/0x3b0 net/core/sock.c:2849
 release_sock+0x54/0x1b0 net/core/sock.c:3404
 inet_shutdown+0x1e0/0x430 net/ipv4/af_inet.c:909
 __sys_shutdown_sock net/socket.c:2331 [inline]
 __sys_shutdown_sock net/socket.c:2325 [inline]
 __sys_shutdown+0xf1/0x1b0 net/socket.c:2343
 __do_sys_shutdown net/socket.c:2351 [inline]
 __se_sys_shutdown net/socket.c:2349 [inline]
 __x64_sys_shutdown+0x50/0x70 net/socket.c:2349
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
 &lt;/TASK&gt;

During SMC fallback process in connect syscall, kernel will
replaces TCP with SMC. In order to forward wakeup
smc socket waitqueue after fallback, kernel will sets
clcsk-&gt;sk_user_data to origin smc socket in
smc_fback_replace_callbacks().

Later, in shutdown syscall, kernel will calls
sk_psock_get(), which treats the clcsk-&gt;sk_user_data
as psock type, triggering the refcnt warning.

So, the root cause is that smc and psock, both will use
sk_user_data field. So they will mismatch this field
easily.

This patch solves it by using another bit(defined as
SK_USER_DATA_PSOCK) in PTRMASK, to mark whether
sk_user_data points to a psock object or not.
This patch depends on a PTRMASK introduced in commit f1ff5ce2cd5e
("net, sk_msg: Clear sk_user_data pointer on clone if tagged").

For there will possibly be more flags in the sk_user_data field,
this patch also refactor sk_user_data flags code to be more generic
to improve its maintainability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49979/">CVE-2022-49979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49979">CVE-2022-49979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245109">SUSE bug 1245109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49980</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49980" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49980" ref_url="https://www.suse.com/security/cve/CVE-2022-49980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: gadget: Fix use-after-free Read in usb_udc_uevent()

The syzbot fuzzer found a race between uevent callbacks and gadget
driver unregistration that can cause a use-after-free bug:

---------------------------------------------------------------
BUG: KASAN: use-after-free in usb_udc_uevent+0x11f/0x130
drivers/usb/gadget/udc/core.c:1732
Read of size 8 at addr ffff888078ce2050 by task udevd/2968

CPU: 1 PID: 2968 Comm: udevd Not tainted 5.19.0-rc4-next-20220628-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google
06/29/2022
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:317 [inline]
 print_report.cold+0x2ba/0x719 mm/kasan/report.c:433
 kasan_report+0xbe/0x1f0 mm/kasan/report.c:495
 usb_udc_uevent+0x11f/0x130 drivers/usb/gadget/udc/core.c:1732
 dev_uevent+0x290/0x770 drivers/base/core.c:2424
---------------------------------------------------------------

The bug occurs because usb_udc_uevent() dereferences udc-&gt;driver but
does so without acquiring the udc_lock mutex, which protects this
field.  If the gadget driver is unbound from the udc concurrently with
uevent processing, the driver structure may be accessed after it has
been deallocated.

To prevent the race, we make sure that the routine holds the mutex
around the racing accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49980/">CVE-2022-49980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49980">CVE-2022-49980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245110">SUSE bug 1245110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245111">SUSE bug 1245111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49981" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49981" ref_url="https://www.suse.com/security/cve/CVE-2022-49981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hidraw: fix memory leak in hidraw_release()

Free the buffered reports before deleting the list entry.

BUG: memory leak
unreferenced object 0xffff88810e72f180 (size 32):
  comm "softirq", pid 0, jiffies 4294945143 (age 16.080s)
  hex dump (first 32 bytes):
    64 f3 c6 6a d1 88 07 04 00 00 00 00 00 00 00 00  d..j............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff814ac6c3&gt;] kmemdup+0x23/0x50 mm/util.c:128
    [&lt;ffffffff8357c1d2&gt;] kmemdup include/linux/fortify-string.h:440 [inline]
    [&lt;ffffffff8357c1d2&gt;] hidraw_report_event+0xa2/0x150 drivers/hid/hidraw.c:521
    [&lt;ffffffff8356ddad&gt;] hid_report_raw_event+0x27d/0x740 drivers/hid/hid-core.c:1992
    [&lt;ffffffff8356e41e&gt;] hid_input_report+0x1ae/0x270 drivers/hid/hid-core.c:2065
    [&lt;ffffffff835f0d3f&gt;] hid_irq_in+0x1ff/0x250 drivers/hid/usbhid/hid-core.c:284
    [&lt;ffffffff82d3c7f9&gt;] __usb_hcd_giveback_urb+0xf9/0x230 drivers/usb/core/hcd.c:1670
    [&lt;ffffffff82d3cc26&gt;] usb_hcd_giveback_urb+0x1b6/0x1d0 drivers/usb/core/hcd.c:1747
    [&lt;ffffffff82ef1e14&gt;] dummy_timer+0x8e4/0x14c0 drivers/usb/gadget/udc/dummy_hcd.c:1988
    [&lt;ffffffff812f50a8&gt;] call_timer_fn+0x38/0x200 kernel/time/timer.c:1474
    [&lt;ffffffff812f5586&gt;] expire_timers kernel/time/timer.c:1519 [inline]
    [&lt;ffffffff812f5586&gt;] __run_timers.part.0+0x316/0x430 kernel/time/timer.c:1790
    [&lt;ffffffff812f56e4&gt;] __run_timers kernel/time/timer.c:1768 [inline]
    [&lt;ffffffff812f56e4&gt;] run_timer_softirq+0x44/0x90 kernel/time/timer.c:1803
    [&lt;ffffffff848000e6&gt;] __do_softirq+0xe6/0x2ea kernel/softirq.c:571
    [&lt;ffffffff81246db0&gt;] invoke_softirq kernel/softirq.c:445 [inline]
    [&lt;ffffffff81246db0&gt;] __irq_exit_rcu kernel/softirq.c:650 [inline]
    [&lt;ffffffff81246db0&gt;] irq_exit_rcu+0xc0/0x110 kernel/softirq.c:662
    [&lt;ffffffff84574f02&gt;] sysvec_apic_timer_interrupt+0xa2/0xd0 arch/x86/kernel/apic/apic.c:1106
    [&lt;ffffffff84600c8b&gt;] asm_sysvec_apic_timer_interrupt+0x1b/0x20 arch/x86/include/asm/idtentry.h:649
    [&lt;ffffffff8458a070&gt;] native_safe_halt arch/x86/include/asm/irqflags.h:51 [inline]
    [&lt;ffffffff8458a070&gt;] arch_safe_halt arch/x86/include/asm/irqflags.h:89 [inline]
    [&lt;ffffffff8458a070&gt;] acpi_safe_halt drivers/acpi/processor_idle.c:111 [inline]
    [&lt;ffffffff8458a070&gt;] acpi_idle_do_entry+0xc0/0xd0 drivers/acpi/processor_idle.c:554
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49981/">CVE-2022-49981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49981">CVE-2022-49981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245072">SUSE bug 1245072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49982" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49982" ref_url="https://www.suse.com/security/cve/CVE-2022-49982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pvrusb2: fix memory leak in pvr_probe

The error handling code in pvr2_hdw_create forgets to unregister the
v4l2 device. When pvr2_hdw_create returns back to pvr2_context_create,
it calls pvr2_context_destroy to destroy context, but mp-&gt;hdw is NULL,
which leads to that pvr2_hdw_destroy directly returns.

Fix this by adding v4l2_device_unregister to decrease the refcount of
usb interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49982/">CVE-2022-49982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49982">CVE-2022-49982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245069">SUSE bug 1245069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49983" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49983" ref_url="https://www.suse.com/security/cve/CVE-2022-49983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udmabuf: Set the DMA mask for the udmabuf device (v2)

If the DMA mask is not set explicitly, the following warning occurs
when the userspace tries to access the dma-buf via the CPU as
reported by syzbot here:

WARNING: CPU: 1 PID: 3595 at kernel/dma/mapping.c:188
__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188
Modules linked in:
CPU: 0 PID: 3595 Comm: syz-executor249 Not tainted
5.17.0-rc2-syzkaller-00316-g0457e5153e0e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
RIP: 0010:__dma_map_sg_attrs+0x181/0x1f0 kernel/dma/mapping.c:188
Code: 00 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 75 71 4c 8b 3d c0
83 b5 0d e9 db fe ff ff e8 b6 0f 13 00 0f 0b e8 af 0f 13 00 &lt;0f&gt; 0b 45
   31 e4 e9 54 ff ff ff e8 a0 0f 13 00 49 8d 7f 50 48 b8 00
RSP: 0018:ffffc90002a07d68 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff88807e25e2c0 RSI: ffffffff81649e91 RDI: ffff88801b848408
RBP: ffff88801b848000 R08: 0000000000000002 R09: ffff88801d86c74f
R10: ffffffff81649d72 R11: 0000000000000001 R12: 0000000000000002
R13: ffff88801d86c680 R14: 0000000000000001 R15: 0000000000000000
FS:  0000555556e30300(0000) GS:ffff8880b9d00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200000cc CR3: 000000001d74a000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 dma_map_sgtable+0x70/0xf0 kernel/dma/mapping.c:264
 get_sg_table.isra.0+0xe0/0x160 drivers/dma-buf/udmabuf.c:72
 begin_cpu_udmabuf+0x130/0x1d0 drivers/dma-buf/udmabuf.c:126
 dma_buf_begin_cpu_access+0xfd/0x1d0 drivers/dma-buf/dma-buf.c:1164
 dma_buf_ioctl+0x259/0x2b0 drivers/dma-buf/dma-buf.c:363
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:874 [inline]
 __se_sys_ioctl fs/ioctl.c:860 [inline]
 __x64_sys_ioctl+0x193/0x200 fs/ioctl.c:860
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f62fcf530f9
Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89
f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01
f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffe3edab9b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f62fcf530f9
RDX: 0000000020000200 RSI: 0000000040086200 RDI: 0000000000000006
RBP: 00007f62fcf170e0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f62fcf17170
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

v2: Dont't forget to deregister if DMA mask setup fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49983/">CVE-2022-49983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49983">CVE-2022-49983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245092">SUSE bug 1245092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49984" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49984" ref_url="https://www.suse.com/security/cve/CVE-2022-49984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: steam: Prevent NULL pointer dereference in steam_{recv,send}_report

It is possible for a malicious device to forgo submitting a Feature
Report.  The HID Steam driver presently makes no prevision for this
and de-references the 'struct hid_report' pointer obtained from the
HID devices without first checking its validity.  Let's change that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49984/">CVE-2022-49984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49984">CVE-2022-49984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244950">SUSE bug 1244950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49985" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49985" ref_url="https://www.suse.com/security/cve/CVE-2022-49985" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15471" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Don't use tnum_range on array range checking for poke descriptors

Hsin-Wei reported a KASAN splat triggered by their BPF runtime fuzzer which
is based on a customized syzkaller:

  BUG: KASAN: slab-out-of-bounds in bpf_int_jit_compile+0x1257/0x13f0
  Read of size 8 at addr ffff888004e90b58 by task syz-executor.0/1489
  CPU: 1 PID: 1489 Comm: syz-executor.0 Not tainted 5.19.0 #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
  1.13.0-1ubuntu1.1 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x9c/0xc9
   print_address_description.constprop.0+0x1f/0x1f0
   ? bpf_int_jit_compile+0x1257/0x13f0
   kasan_report.cold+0xeb/0x197
   ? kvmalloc_node+0x170/0x200
   ? bpf_int_jit_compile+0x1257/0x13f0
   bpf_int_jit_compile+0x1257/0x13f0
   ? arch_prepare_bpf_dispatcher+0xd0/0xd0
   ? rcu_read_lock_sched_held+0x43/0x70
   bpf_prog_select_runtime+0x3e8/0x640
   ? bpf_obj_name_cpy+0x149/0x1b0
   bpf_prog_load+0x102f/0x2220
   ? __bpf_prog_put.constprop.0+0x220/0x220
   ? find_held_lock+0x2c/0x110
   ? __might_fault+0xd6/0x180
   ? lock_downgrade+0x6e0/0x6e0
   ? lock_is_held_type+0xa6/0x120
   ? __might_fault+0x147/0x180
   __sys_bpf+0x137b/0x6070
   ? bpf_perf_link_attach+0x530/0x530
   ? new_sync_read+0x600/0x600
   ? __fget_files+0x255/0x450
   ? lock_downgrade+0x6e0/0x6e0
   ? fput+0x30/0x1a0
   ? ksys_write+0x1a8/0x260
   __x64_sys_bpf+0x7a/0xc0
   ? syscall_enter_from_user_mode+0x21/0x70
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
  RIP: 0033:0x7f917c4e2c2d

The problem here is that a range of tnum_range(0, map-&gt;max_entries - 1) has
limited ability to represent the concrete tight range with the tnum as the
set of resulting states from value + mask can result in a superset of the
actual intended range, and as such a tnum_in(range, reg-&gt;var_off) check may
yield true when it shouldn't, for example tnum_range(0, 2) would result in
00XX -&gt; v = 0000, m = 0011 such that the intended set of {0, 1, 2} is here
represented by a less precise superset of {0, 1, 2, 3}. As the register is
known const scalar, really just use the concrete reg-&gt;var_off.value for the
upper index check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49985/">CVE-2022-49985 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49985">CVE-2022-49985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244956">SUSE bug 1244956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49986</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49986" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49986" ref_url="https://www.suse.com/security/cve/CVE-2022-49986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: storvsc: Remove WQ_MEM_RECLAIM from storvsc_error_wq

storvsc_error_wq workqueue should not be marked as WQ_MEM_RECLAIM as it
doesn't need to make forward progress under memory pressure.  Marking this
workqueue as WQ_MEM_RECLAIM may cause deadlock while flushing a
non-WQ_MEM_RECLAIM workqueue.  In the current state it causes the following
warning:

[   14.506347] ------------[ cut here ]------------
[   14.506354] workqueue: WQ_MEM_RECLAIM storvsc_error_wq_0:storvsc_remove_lun is flushing !WQ_MEM_RECLAIM events_freezable_power_:disk_events_workfn
[   14.506360] WARNING: CPU: 0 PID: 8 at &lt;-snip-&gt;kernel/workqueue.c:2623 check_flush_dependency+0xb5/0x130
[   14.506390] CPU: 0 PID: 8 Comm: kworker/u4:0 Not tainted 5.4.0-1086-azure #91~18.04.1-Ubuntu
[   14.506391] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022
[   14.506393] Workqueue: storvsc_error_wq_0 storvsc_remove_lun
[   14.506395] RIP: 0010:check_flush_dependency+0xb5/0x130
		&lt;-snip-&gt;
[   14.506408] Call Trace:
[   14.506412]  __flush_work+0xf1/0x1c0
[   14.506414]  __cancel_work_timer+0x12f/0x1b0
[   14.506417]  ? kernfs_put+0xf0/0x190
[   14.506418]  cancel_delayed_work_sync+0x13/0x20
[   14.506420]  disk_block_events+0x78/0x80
[   14.506421]  del_gendisk+0x3d/0x2f0
[   14.506423]  sr_remove+0x28/0x70
[   14.506427]  device_release_driver_internal+0xef/0x1c0
[   14.506428]  device_release_driver+0x12/0x20
[   14.506429]  bus_remove_device+0xe1/0x150
[   14.506431]  device_del+0x167/0x380
[   14.506432]  __scsi_remove_device+0x11d/0x150
[   14.506433]  scsi_remove_device+0x26/0x40
[   14.506434]  storvsc_remove_lun+0x40/0x60
[   14.506436]  process_one_work+0x209/0x400
[   14.506437]  worker_thread+0x34/0x400
[   14.506439]  kthread+0x121/0x140
[   14.506440]  ? process_one_work+0x400/0x400
[   14.506441]  ? kthread_park+0x90/0x90
[   14.506443]  ret_from_fork+0x35/0x40
[   14.506445] ---[ end trace 2d9633159fdc6ee7 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49986/">CVE-2022-49986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49986">CVE-2022-49986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244948">SUSE bug 1244948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49990</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49990" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49990" ref_url="https://www.suse.com/security/cve/CVE-2022-49990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390: fix double free of GS and RI CBs on fork() failure

The pointers for guarded storage and runtime instrumentation control
blocks are stored in the thread_struct of the associated task. These
pointers are initially copied on fork() via arch_dup_task_struct()
and then cleared via copy_thread() before fork() returns. If fork()
happens to fail after the initial task dup and before copy_thread(),
the newly allocated task and associated thread_struct memory are
freed via free_task() -&gt; arch_release_task_struct(). This results in
a double free of the guarded storage and runtime info structs
because the fields in the failed task still refer to memory
associated with the source task.

This problem can manifest as a BUG_ON() in set_freepointer() (with
CONFIG_SLAB_FREELIST_HARDENED enabled) or KASAN splat (if enabled)
when running trinity syscall fuzz tests on s390x. To avoid this
problem, clear the associated pointer fields in
arch_dup_task_struct() immediately after the new task is copied.
Note that the RI flag is still cleared in copy_thread() because it
resides in thread stack memory and that is where stack info is
copied.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49990/">CVE-2022-49990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49990">CVE-2022-49990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245006">SUSE bug 1245006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49991</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49991" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49991" ref_url="https://www.suse.com/security/cve/CVE-2022-49991" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: avoid corrupting page-&gt;mapping in hugetlb_mcopy_atomic_pte

In MCOPY_ATOMIC_CONTINUE case with a non-shared VMA, pages in the page
cache are installed in the ptes.  But hugepage_add_new_anon_rmap is called
for them mistakenly because they're not vm_shared.  This will corrupt the
page-&gt;mapping used by page cache code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49991/">CVE-2022-49991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49991">CVE-2022-49991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245022">SUSE bug 1245022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49992" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49992" ref_url="https://www.suse.com/security/cve/CVE-2022-49992" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mprotect: only reference swap pfn page if type match

Yu Zhao reported a bug after the commit "mm/swap: Add swp_offset_pfn() to
fetch PFN from swap entry" added a check in swp_offset_pfn() for swap type [1]:

  kernel BUG at include/linux/swapops.h:117!
  CPU: 46 PID: 5245 Comm: EventManager_De Tainted: G S         O L 6.0.0-dbg-DEV #2
  RIP: 0010:pfn_swap_entry_to_page+0x72/0xf0
  Code: c6 48 8b 36 48 83 fe ff 74 53 48 01 d1 48 83 c1 08 48 8b 09 f6
  c1 01 75 7b 66 90 48 89 c1 48 8b 09 f6 c1 01 74 74 5d c3 eb 9e &lt;0f&gt; 0b
  48 ba ff ff ff ff 03 00 00 00 eb ae a9 ff 0f 00 00 75 13 48
  RSP: 0018:ffffa59e73fabb80 EFLAGS: 00010282
  RAX: 00000000ffffffe8 RBX: 0c00000000000000 RCX: ffffcd5440000000
  RDX: 1ffffffffff7a80a RSI: 0000000000000000 RDI: 0c0000000000042b
  RBP: ffffa59e73fabb80 R08: ffff9965ca6e8bb8 R09: 0000000000000000
  R10: ffffffffa5a2f62d R11: 0000030b372e9fff R12: ffff997b79db5738
  R13: 000000000000042b R14: 0c0000000000042b R15: 1ffffffffff7a80a
  FS:  00007f549d1bb700(0000) GS:ffff99d3cf680000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000440d035b3180 CR3: 0000002243176004 CR4: 00000000003706e0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   &lt;TASK&gt;
   change_pte_range+0x36e/0x880
   change_p4d_range+0x2e8/0x670
   change_protection_range+0x14e/0x2c0
   mprotect_fixup+0x1ee/0x330
   do_mprotect_pkey+0x34c/0x440
   __x64_sys_mprotect+0x1d/0x30

It triggers because pfn_swap_entry_to_page() could be called upon e.g. a
genuine swap entry.

Fix it by only calling it when it's a write migration entry where the page*
is used.

[1] https://lore.kernel.org/lkml/CAOUHufaVC2Za-p8m0aiHw6YkheDcrO-C3wRGixwDS32VTS+k1w@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49992/">CVE-2022-49992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49992">CVE-2022-49992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245020">SUSE bug 1245020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49993" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49993" ref_url="https://www.suse.com/security/cve/CVE-2022-49993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

loop: Check for overflow while configuring loop

The userspace can configure a loop using an ioctl call, wherein
a configuration of type loop_config is passed (see lo_ioctl()'s
case on line 1550 of drivers/block/loop.c). This proceeds to call
loop_configure() which in turn calls loop_set_status_from_info()
(see line 1050 of loop.c), passing &amp;config-&gt;info which is of type
loop_info64*. This function then sets the appropriate values, like
the offset.

loop_device has lo_offset of type loff_t (see line 52 of loop.c),
which is typdef-chained to long long, whereas loop_info64 has
lo_offset of type __u64 (see line 56 of include/uapi/linux/loop.h).

The function directly copies offset from info to the device as
follows (See line 980 of loop.c):
	lo-&gt;lo_offset = info-&gt;lo_offset;

This results in an overflow, which triggers a warning in iomap_iter()
due to a call to iomap_iter_done() which has:
	WARN_ON_ONCE(iter-&gt;iomap.offset &gt; iter-&gt;pos);

Thus, check for negative value during loop_set_status_from_info().

Bug report: https://syzkaller.appspot.com/bug?id=c620fe14aac810396d3c3edc9ad73848bf69a29e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-49993/">CVE-2022-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49993">CVE-2022-49993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245121">SUSE bug 1245121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49994" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49994" ref_url="https://www.suse.com/security/cve/CVE-2022-49994" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bootmem: remove the vmemmap pages from kmemleak in put_page_bootmem

The vmemmap pages is marked by kmemleak when allocated from memblock. 
Remove it from kmemleak when freeing the page.  Otherwise, when we reuse
the page, kmemleak may report such an error and then stop working.

 kmemleak: Cannot insert 0xffff98fb6eab3d40 into the object search tree (overlaps existing)
 kmemleak: Kernel memory leak detector disabled
 kmemleak: Object 0xffff98fb6be00000 (size 335544320):
 kmemleak:   comm "swapper", pid 0, jiffies 4294892296
 kmemleak:   min_count = 0
 kmemleak:   count = 0
 kmemleak:   flags = 0x1
 kmemleak:   checksum = 0
 kmemleak:   backtrace:
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49994/">CVE-2022-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49994">CVE-2022-49994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245013">SUSE bug 1245013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49995</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49995" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49995" ref_url="https://www.suse.com/security/cve/CVE-2022-49995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

writeback: avoid use-after-free after removing device

When a disk is removed, bdi_unregister gets called to stop further
writeback and wait for associated delayed work to complete.  However,
wb_inode_writeback_end() may schedule bandwidth estimation dwork after
this has completed, which can result in the timer attempting to access the
just freed bdi_writeback.

Fix this by checking if the bdi_writeback is alive, similar to when
scheduling writeback work.

Since this requires wb-&gt;work_lock, and wb_inode_writeback_end() may get
called from interrupt, switch wb-&gt;work_lock to an irqsafe lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49995/">CVE-2022-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49995">CVE-2022-49995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245012">SUSE bug 1245012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202249998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-49998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-49998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49998" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-49998" ref_url="https://www.suse.com/security/cve/CVE-2022-49998" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix locking in rxrpc's sendmsg

Fix three bugs in the rxrpc's sendmsg implementation:

 (1) rxrpc_new_client_call() should release the socket lock when returning
     an error from rxrpc_get_call_slot().

 (2) rxrpc_wait_for_tx_window_intr() will return without the call mutex
     held in the event that we're interrupted by a signal whilst waiting
     for tx space on the socket or relocking the call mutex afterwards.

     Fix this by: (a) moving the unlock/lock of the call mutex up to
     rxrpc_send_data() such that the lock is not held around all of
     rxrpc_wait_for_tx_window*() and (b) indicating to higher callers
     whether we're return with the lock dropped.  Note that this means
     recvmsg() will not block on this call whilst we're waiting.

 (3) After dropping and regaining the call mutex, rxrpc_send_data() needs
     to go and recheck the state of the tx_pending buffer and the
     tx_total_len check in case we raced with another sendmsg() on the same
     call.

Thinking on this some more, it might make sense to have different locks for
sendmsg() and recvmsg().  There's probably no need to make recvmsg() wait
for sendmsg().  It does mean that recvmsg() can return MSG_EOR indicating
that a call is dead before a sendmsg() to that call returns - but that can
currently happen anyway.

Without fix (2), something like the following can be induced:

	WARNING: bad unlock balance detected!
	5.16.0-rc6-syzkaller #0 Not tainted
	-------------------------------------
	syz-executor011/3597 is trying to release lock (&amp;call-&gt;user_mutex) at:
	[&lt;ffffffff885163a3&gt;] rxrpc_do_sendmsg+0xc13/0x1350 net/rxrpc/sendmsg.c:748
	but there are no more locks to release!

	other info that might help us debug this:
	no locks held by syz-executor011/3597.
	...
	Call Trace:
	 &lt;TASK&gt;
	 __dump_stack lib/dump_stack.c:88 [inline]
	 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
	 print_unlock_imbalance_bug include/trace/events/lock.h:58 [inline]
	 __lock_release kernel/locking/lockdep.c:5306 [inline]
	 lock_release.cold+0x49/0x4e kernel/locking/lockdep.c:5657
	 __mutex_unlock_slowpath+0x99/0x5e0 kernel/locking/mutex.c:900
	 rxrpc_do_sendmsg+0xc13/0x1350 net/rxrpc/sendmsg.c:748
	 rxrpc_sendmsg+0x420/0x630 net/rxrpc/af_rxrpc.c:561
	 sock_sendmsg_nosec net/socket.c:704 [inline]
	 sock_sendmsg+0xcf/0x120 net/socket.c:724
	 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409
	 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463
	 __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492
	 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
	 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
	 entry_SYSCALL_64_after_hwframe+0x44/0xae

[Thanks to Hawkins Jiawei and Khalid Masum for their attempts to fix this]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-49998/">CVE-2022-49998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-49998">CVE-2022-49998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245017">SUSE bug 1245017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50000</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50000" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50000" ref_url="https://www.suse.com/security/cve/CVE-2022-50000" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: fix stuck flows on cleanup due to pending work

To clear the flow table on flow table free, the following sequence
normally happens in order:

  1) gc_step work is stopped to disable any further stats/del requests.
  2) All flow table entries are set to teardown state.
  3) Run gc_step which will queue HW del work for each flow table entry.
  4) Waiting for the above del work to finish (flush).
  5) Run gc_step again, deleting all entries from the flow table.
  6) Flow table is freed.

But if a flow table entry already has pending HW stats or HW add work
step 3 will not queue HW del work (it will be skipped), step 4 will wait
for the pending add/stats to finish, and step 5 will queue HW del work
which might execute after freeing of the flow table.

To fix the above, this patch flushes the pending work, then it sets the
teardown flag to all flows in the flowtable and it forces a garbage
collector run to queue work to remove the flows from hardware, then it
flushes this new pending work and (finally) it forces another garbage
collector run to remove the entry from the software flowtable.

Stack trace:
[47773.882335] BUG: KASAN: use-after-free in down_read+0x99/0x460
[47773.883634] Write of size 8 at addr ffff888103b45aa8 by task kworker/u20:6/543704
[47773.885634] CPU: 3 PID: 543704 Comm: kworker/u20:6 Not tainted 5.12.0-rc7+ #2
[47773.886745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)
[47773.888438] Workqueue: nf_ft_offload_del flow_offload_work_handler [nf_flow_table]
[47773.889727] Call Trace:
[47773.890214]  dump_stack+0xbb/0x107
[47773.890818]  print_address_description.constprop.0+0x18/0x140
[47773.892990]  kasan_report.cold+0x7c/0xd8
[47773.894459]  kasan_check_range+0x145/0x1a0
[47773.895174]  down_read+0x99/0x460
[47773.899706]  nf_flow_offload_tuple+0x24f/0x3c0 [nf_flow_table]
[47773.907137]  flow_offload_work_handler+0x72d/0xbe0 [nf_flow_table]
[47773.913372]  process_one_work+0x8ac/0x14e0
[47773.921325]
[47773.921325] Allocated by task 592159:
[47773.922031]  kasan_save_stack+0x1b/0x40
[47773.922730]  __kasan_kmalloc+0x7a/0x90
[47773.923411]  tcf_ct_flow_table_get+0x3cb/0x1230 [act_ct]
[47773.924363]  tcf_ct_init+0x71c/0x1156 [act_ct]
[47773.925207]  tcf_action_init_1+0x45b/0x700
[47773.925987]  tcf_action_init+0x453/0x6b0
[47773.926692]  tcf_exts_validate+0x3d0/0x600
[47773.927419]  fl_change+0x757/0x4a51 [cls_flower]
[47773.928227]  tc_new_tfilter+0x89a/0x2070
[47773.936652]
[47773.936652] Freed by task 543704:
[47773.937303]  kasan_save_stack+0x1b/0x40
[47773.938039]  kasan_set_track+0x1c/0x30
[47773.938731]  kasan_set_free_info+0x20/0x30
[47773.939467]  __kasan_slab_free+0xe7/0x120
[47773.940194]  slab_free_freelist_hook+0x86/0x190
[47773.941038]  kfree+0xce/0x3a0
[47773.941644]  tcf_ct_flow_table_cleanup_work

Original patch description and stack trace by Paul Blakey.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50000/">CVE-2022-50000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50000">CVE-2022-50000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245021">SUSE bug 1245021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50001</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50001" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50001" ref_url="https://www.suse.com/security/cve/CVE-2022-50001" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_tproxy: restrict to prerouting hook

TPROXY is only allowed from prerouting, but nft_tproxy doesn't check this.
This fixes a crash (null dereference) when using tproxy from e.g. output.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50001/">CVE-2022-50001 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50001">CVE-2022-50001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245008">SUSE bug 1245008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50002" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50002" ref_url="https://www.suse.com/security/cve/CVE-2022-50002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: LAG, fix logic over MLX5_LAG_FLAG_NDEVS_READY

Only set MLX5_LAG_FLAG_NDEVS_READY if both netdevices are registered.
Doing so guarantees that both ldev-&gt;pf[MLX5_LAG_P0].dev and
ldev-&gt;pf[MLX5_LAG_P1].dev have valid pointers when
MLX5_LAG_FLAG_NDEVS_READY is set.

The core issue is asymmetry in setting MLX5_LAG_FLAG_NDEVS_READY and
clearing it. Setting it is done wrongly when both
ldev-&gt;pf[MLX5_LAG_P0].dev and ldev-&gt;pf[MLX5_LAG_P1].dev are set;
clearing it is done right when either of ldev-&gt;pf[i].netdev is cleared.

Consider the following scenario:
1. PF0 loads and sets ldev-&gt;pf[MLX5_LAG_P0].dev to a valid pointer
2. PF1 loads and sets both ldev-&gt;pf[MLX5_LAG_P1].dev and
   ldev-&gt;pf[MLX5_LAG_P1].netdev with valid pointers. This results in
   MLX5_LAG_FLAG_NDEVS_READY is set.
3. PF0 is unloaded before setting dev-&gt;pf[MLX5_LAG_P0].netdev.
   MLX5_LAG_FLAG_NDEVS_READY remains set.

Further execution of mlx5_do_bond() will result in null pointer
dereference when calling mlx5_lag_is_multipath()

This patch fixes the following call trace actually encountered:

[ 1293.475195] BUG: kernel NULL pointer dereference, address: 00000000000009a8
[ 1293.478756] #PF: supervisor read access in kernel mode
[ 1293.481320] #PF: error_code(0x0000) - not-present page
[ 1293.483686] PGD 0 P4D 0
[ 1293.484434] Oops: 0000 [#1] SMP PTI
[ 1293.485377] CPU: 1 PID: 23690 Comm: kworker/u16:2 Not tainted 5.18.0-rc5_for_upstream_min_debug_2022_05_05_10_13 #1
[ 1293.488039] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 1293.490836] Workqueue: mlx5_lag mlx5_do_bond_work [mlx5_core]
[ 1293.492448] RIP: 0010:mlx5_lag_is_multipath+0x5/0x50 [mlx5_core]
[ 1293.494044] Code: e8 70 40 ff e0 48 8b 14 24 48 83 05 5c 1a 1b 00 01 e9 19 ff ff ff 48 83 05 47 1a 1b 00 01 eb d7 0f 1f 44 00 00 0f 1f 44 00 00 &lt;48&gt; 8b 87 a8 09 00 00 48 85 c0 74 26 48 83 05 a7 1b 1b 00 01 41 b8
[ 1293.498673] RSP: 0018:ffff88811b2fbe40 EFLAGS: 00010202
[ 1293.500152] RAX: ffff88818a94e1c0 RBX: ffff888165eca6c0 RCX: 0000000000000000
[ 1293.501841] RDX: 0000000000000001 RSI: ffff88818a94e1c0 RDI: 0000000000000000
[ 1293.503585] RBP: 0000000000000000 R08: ffff888119886740 R09: ffff888165eca73c
[ 1293.505286] R10: 0000000000000018 R11: 0000000000000018 R12: ffff88818a94e1c0
[ 1293.506979] R13: ffff888112729800 R14: 0000000000000000 R15: ffff888112729858
[ 1293.508753] FS:  0000000000000000(0000) GS:ffff88852cc40000(0000) knlGS:0000000000000000
[ 1293.510782] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1293.512265] CR2: 00000000000009a8 CR3: 00000001032d4002 CR4: 0000000000370ea0
[ 1293.514001] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1293.515806] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50002/">CVE-2022-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50002">CVE-2022-50002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245023">SUSE bug 1245023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50003</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50003" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50003" ref_url="https://www.suse.com/security/cve/CVE-2022-50003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: xsk: prohibit usage of non-balanced queue id

Fix the following scenario:
1. ethtool -L $IFACE rx 8 tx 96
2. xdpsock -q 10 -t -z

Above refers to a case where user would like to attach XSK socket in
txonly mode at a queue id that does not have a corresponding Rx queue.
At this moment ice's XSK logic is tightly bound to act on a "queue pair",
e.g. both Tx and Rx queues at a given queue id are disabled/enabled and
both of them will get XSK pool assigned, which is broken for the presented
queue configuration. This results in the splat included at the bottom,
which is basically an OOB access to Rx ring array.

To fix this, allow using the ids only in scope of "combined" queues
reported by ethtool. However, logic should be rewritten to allow such
configurations later on, which would end up as a complete rewrite of the
control path, so let us go with this temporary fix.

[420160.558008] BUG: kernel NULL pointer dereference, address: 0000000000000082
[420160.566359] #PF: supervisor read access in kernel mode
[420160.572657] #PF: error_code(0x0000) - not-present page
[420160.579002] PGD 0 P4D 0
[420160.582756] Oops: 0000 [#1] PREEMPT SMP NOPTI
[420160.588396] CPU: 10 PID: 21232 Comm: xdpsock Tainted: G           OE     5.19.0-rc7+ #10
[420160.597893] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[420160.609894] RIP: 0010:ice_xsk_pool_setup+0x44/0x7d0 [ice]
[420160.616968] Code: f3 48 83 ec 40 48 8b 4f 20 48 8b 3f 65 48 8b 04 25 28 00 00 00 48 89 44 24 38 31 c0 48 8d 04 ed 00 00 00 00 48 01 c1 48 8b 11 &lt;0f&gt; b7 92 82 00 00 00 48 85 d2 0f 84 2d 75 00 00 48 8d 72 ff 48 85
[420160.639421] RSP: 0018:ffffc9002d2afd48 EFLAGS: 00010282
[420160.646650] RAX: 0000000000000050 RBX: ffff88811d8bdd00 RCX: ffff888112c14ff8
[420160.655893] RDX: 0000000000000000 RSI: ffff88811d8bdd00 RDI: ffff888109861000
[420160.665166] RBP: 000000000000000a R08: 000000000000000a R09: 0000000000000000
[420160.674493] R10: 000000000000889f R11: 0000000000000000 R12: 000000000000000a
[420160.683833] R13: 000000000000000a R14: 0000000000000000 R15: ffff888117611828
[420160.693211] FS:  00007fa869fc1f80(0000) GS:ffff8897e0880000(0000) knlGS:0000000000000000
[420160.703645] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[420160.711783] CR2: 0000000000000082 CR3: 00000001d076c001 CR4: 00000000007706e0
[420160.721399] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[420160.731045] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[420160.740707] PKRU: 55555554
[420160.745960] Call Trace:
[420160.750962]  &lt;TASK&gt;
[420160.755597]  ? kmalloc_large_node+0x79/0x90
[420160.762703]  ? __kmalloc_node+0x3f5/0x4b0
[420160.769341]  xp_assign_dev+0xfd/0x210
[420160.775661]  ? shmem_file_read_iter+0x29a/0x420
[420160.782896]  xsk_bind+0x152/0x490
[420160.788943]  __sys_bind+0xd0/0x100
[420160.795097]  ? exit_to_user_mode_prepare+0x20/0x120
[420160.802801]  __x64_sys_bind+0x16/0x20
[420160.809298]  do_syscall_64+0x38/0x90
[420160.815741]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[420160.823731] RIP: 0033:0x7fa86a0dd2fb
[420160.830264] Code: c3 66 0f 1f 44 00 00 48 8b 15 69 8b 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bc 0f 1f 44 00 00 f3 0f 1e fa b8 31 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 3d 8b 0c 00 f7 d8 64 89 01 48
[420160.855410] RSP: 002b:00007ffc1146f618 EFLAGS: 00000246 ORIG_RAX: 0000000000000031
[420160.866366] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa86a0dd2fb
[420160.876957] RDX: 0000000000000010 RSI: 00007ffc1146f680 RDI: 0000000000000003
[420160.887604] RBP: 000055d7113a0520 R08: 00007fa868fb8000 R09: 0000000080000000
[420160.898293] R10: 0000000000008001 R11: 0000000000000246 R12: 000055d7113a04e0
[420160.909038] R13: 000055d7113a0320 R14: 000000000000000a R15: 0000000000000000
[420160.919817]  &lt;/TASK&gt;
[420160.925659] Modules linked in: ice(OE) af_packet binfmt_misc
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50003/">CVE-2022-50003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50003">CVE-2022-50003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245015">SUSE bug 1245015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50004" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50004" ref_url="https://www.suse.com/security/cve/CVE-2022-50004" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: policy: fix metadata dst-&gt;dev xmit null pointer dereference

When we try to transmit an skb with metadata_dst attached (i.e. dst-&gt;dev
== NULL) through xfrm interface we can hit a null pointer dereference[1]
in xfrmi_xmit2() -&gt; xfrm_lookup_with_ifid() due to the check for a
loopback skb device when there's no policy which dereferences dst-&gt;dev
unconditionally. Not having dst-&gt;dev can be interepreted as it not being
a loopback device, so just add a check for a null dst_orig-&gt;dev.

With this fix xfrm interface's Tx error counters go up as usual.

[1] net-next calltrace captured via netconsole:
  BUG: kernel NULL pointer dereference, address: 00000000000000c0
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] PREEMPT SMP
  CPU: 1 PID: 7231 Comm: ping Kdump: loaded Not tainted 5.19.0+ #24
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.0-1.fc36 04/01/2014
  RIP: 0010:xfrm_lookup_with_ifid+0x5eb/0xa60
  Code: 8d 74 24 38 e8 26 a4 37 00 48 89 c1 e9 12 fc ff ff 49 63 ed 41 83 fd be 0f 85 be 01 00 00 41 be ff ff ff ff 45 31 ed 48 8b 03 &lt;f6&gt; 80 c0 00 00 00 08 75 0f 41 80 bc 24 19 0d 00 00 01 0f 84 1e 02
  RSP: 0018:ffffb0db82c679f0 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffffd0db7fcad430 RCX: ffffb0db82c67a10
  RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb0db82c67a80
  RBP: ffffb0db82c67a80 R08: ffffb0db82c67a14 R09: 0000000000000000
  R10: 0000000000000000 R11: ffff8fa449667dc8 R12: ffffffff966db880
  R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000000
  FS:  00007ff35c83f000(0000) GS:ffff8fa478480000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00000000000000c0 CR3: 000000001ebb7000 CR4: 0000000000350ee0
  Call Trace:
   &lt;TASK&gt;
   xfrmi_xmit+0xde/0x460
   ? tcf_bpf_act+0x13d/0x2a0
   dev_hard_start_xmit+0x72/0x1e0
   __dev_queue_xmit+0x251/0xd30
   ip_finish_output2+0x140/0x550
   ip_push_pending_frames+0x56/0x80
   raw_sendmsg+0x663/0x10a0
   ? try_charge_memcg+0x3fd/0x7a0
   ? __mod_memcg_lruvec_state+0x93/0x110
   ? sock_sendmsg+0x30/0x40
   sock_sendmsg+0x30/0x40
   __sys_sendto+0xeb/0x130
   ? handle_mm_fault+0xae/0x280
   ? do_user_addr_fault+0x1e7/0x680
   ? kvm_read_and_reset_apf_flags+0x3b/0x50
   __x64_sys_sendto+0x20/0x30
   do_syscall_64+0x34/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0
  RIP: 0033:0x7ff35cac1366
  Code: eb 0b 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 11 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 72 c3 90 55 48 83 ec 30 44 89 4c 24 2c 4c 89
  RSP: 002b:00007fff738e4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
  RAX: ffffffffffffffda RBX: 00007fff738e57b0 RCX: 00007ff35cac1366
  RDX: 0000000000000040 RSI: 0000557164e4b450 RDI: 0000000000000003
  RBP: 0000557164e4b450 R08: 00007fff738e7a2c R09: 0000000000000010
  R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000040
  R13: 00007fff738e5770 R14: 00007fff738e4030 R15: 0000001d00000001
   &lt;/TASK&gt;
  Modules linked in: netconsole veth br_netfilter bridge bonding virtio_net [last unloaded: netconsole]
  CR2: 00000000000000c0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50004/">CVE-2022-50004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50004">CVE-2022-50004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245095">SUSE bug 1245095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50005" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50005" ref_url="https://www.suse.com/security/cve/CVE-2022-50005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout

When the pn532 uart device is detaching, the pn532_uart_remove()
is called. But there are no functions in pn532_uart_remove() that
could delete the cmd_timeout timer, which will cause use-after-free
bugs. The process is shown below:

    (thread 1)                  |        (thread 2)
                                |  pn532_uart_send_frame
pn532_uart_remove               |    mod_timer(&amp;pn532-&gt;cmd_timeout,...)
  ...                           |    (wait a time)
  kfree(pn532) //FREE           |    pn532_cmd_timeout
                                |      pn532_uart_send_frame
                                |        pn532-&gt;... //USE

This patch adds del_timer_sync() in pn532_uart_remove() in order to
prevent the use-after-free bugs. What's more, the pn53x_unregister_nfc()
is well synchronized, it sets nfc_dev-&gt;shutting_down to true and there
are no syscalls could restart the cmd_timeout timer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50005/">CVE-2022-50005 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50005">CVE-2022-50005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245011">SUSE bug 1245011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50006" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50006" ref_url="https://www.suse.com/security/cve/CVE-2022-50006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4.2 fix problems with __nfs42_ssc_open

A destination server while doing a COPY shouldn't accept using the
passed in filehandle if its not a regular filehandle.

If alloc_file_pseudo() has failed, we need to decrement a reference
on the newly created inode, otherwise it leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50006/">CVE-2022-50006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50006">CVE-2022-50006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245018">SUSE bug 1245018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50007</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50007" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50007" ref_url="https://www.suse.com/security/cve/CVE-2022-50007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: fix refcount leak in __xfrm_policy_check()

The issue happens on an error path in __xfrm_policy_check(). When the
fetching process of the object `pols[1]` fails, the function simply
returns 0, forgetting to decrement the reference count of `pols[0]`,
which is incremented earlier by either xfrm_sk_policy_lookup() or
xfrm_policy_lookup(). This may result in memory leaks.

Fix it by decreasing the reference count of `pols[0]` in that path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50007/">CVE-2022-50007 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50007">CVE-2022-50007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245016">SUSE bug 1245016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50014" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50014" ref_url="https://www.suse.com/security/cve/CVE-2022-50014" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/gup: fix FOLL_FORCE COW security issue and remove FOLL_COW

Ever since the Dirty COW (CVE-2016-5195) security issue happened, we know
that FOLL_FORCE can be possibly dangerous, especially if there are races
that can be exploited by user space.

Right now, it would be sufficient to have some code that sets a PTE of a
R/O-mapped shared page dirty, in order for it to erroneously become
writable by FOLL_FORCE.  The implications of setting a write-protected PTE
dirty might not be immediately obvious to everyone.

And in fact ever since commit 9ae0f87d009c ("mm/shmem: unconditionally set
pte dirty in mfill_atomic_install_pte"), we can use UFFDIO_CONTINUE to map
a shmem page R/O while marking the pte dirty.  This can be used by
unprivileged user space to modify tmpfs/shmem file content even if the
user does not have write permissions to the file, and to bypass memfd
write sealing -- Dirty COW restricted to tmpfs/shmem (CVE-2022-2590).

To fix such security issues for good, the insight is that we really only
need that fancy retry logic (FOLL_COW) for COW mappings that are not
writable (!VM_WRITE).  And in a COW mapping, we really only broke COW if
we have an exclusive anonymous page mapped.  If we have something else
mapped, or the mapped anonymous page might be shared (!PageAnonExclusive),
we have to trigger a write fault to break COW.  If we don't find an
exclusive anonymous page when we retry, we have to trigger COW breaking
once again because something intervened.

Let's move away from this mandatory-retry + dirty handling and rely on our
PageAnonExclusive() flag for making a similar decision, to use the same
COW logic as in other kernel parts here as well.  In case we stumble over
a PTE in a COW mapping that does not map an exclusive anonymous page, COW
was not properly broken and we have to trigger a fake write-fault to break
COW.

Just like we do in can_change_pte_writable() added via commit 64fe24a3e05e
("mm/mprotect: try avoiding write faults for exclusive anonymous pages
when changing protection") and commit 76aefad628aa ("mm/mprotect: fix
soft-dirty check in can_change_pte_writable()"), take care of softdirty
and uffd-wp manually.

For example, a write() via /proc/self/mem to a uffd-wp-protected range has
to fail instead of silently granting write access and bypassing the
userspace fault handler.  Note that FOLL_FORCE is not only used for debug
access, but also triggered by applications without debug intentions, for
example, when pinning pages via RDMA.

This fixes CVE-2022-2590. Note that only x86_64 and aarch64 are
affected, because only those support CONFIG_HAVE_ARCH_USERFAULTFD_MINOR.

Fortunately, FOLL_COW is no longer required to handle FOLL_FORCE. So
let's just get rid of it.

Thanks to Nadav Amit for pointing out that the pte_dirty() check in
FOLL_FORCE code is problematic and might be exploitable.

Note 1: We don't check for the PTE being dirty because it doesn't matter
	for making a "was COWed" decision anymore, and whoever modifies the
	page has to set the page dirty either way.

Note 2: Kernels before extended uffd-wp support and before
	PageAnonExclusive (&lt; 5.19) can simply revert the problematic
	commit instead and be safe regarding UFFDIO_CONTINUE. A backport to
	v5.19 requires minor adjustments due to lack of
	vma_soft_dirty_enabled().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50014/">CVE-2022-50014 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50014">CVE-2022-50014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244963">SUSE bug 1244963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50015" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50015" ref_url="https://www.suse.com/security/cve/CVE-2022-50015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: hda-ipc: Do not process IPC reply before firmware boot

It is not yet clear, but it is possible to create a firmware so broken
that it will send a reply message before a FW_READY message (it is not
yet clear if FW_READY will arrive later).
Since the reply_data is allocated only after the FW_READY message, this
will lead to a NULL pointer dereference if not filtered out.

The issue was reported with IPC4 firmware but the same condition is present
for IPC3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50015/">CVE-2022-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50015">CVE-2022-50015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245094">SUSE bug 1245094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50016" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50016" ref_url="https://www.suse.com/security/cve/CVE-2022-50016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: cnl: Do not process IPC reply before firmware boot

It is not yet clear, but it is possible to create a firmware so broken
that it will send a reply message before a FW_READY message (it is not
yet clear if FW_READY will arrive later).
Since the reply_data is allocated only after the FW_READY message, this
will lead to a NULL pointer dereference if not filtered out.

The issue was reported with IPC4 firmware but the same condition is present
for IPC3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50016/">CVE-2022-50016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50016">CVE-2022-50016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245340">SUSE bug 1245340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50020" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50020" ref_url="https://www.suse.com/security/cve/CVE-2022-50020" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid resizing to a partial cluster size

This patch avoids an attempt to resize the filesystem to an
unaligned cluster boundary.  An online resize to a size that is not
integral to cluster size results in the last iteration attempting to
grow the fs by a negative amount, which trips a BUG_ON and leaves the fs
with a corrupted in-memory superblock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50020/">CVE-2022-50020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50020">CVE-2022-50020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245129">SUSE bug 1245129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245130">SUSE bug 1245130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50021</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50021" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50021" ref_url="https://www.suse.com/security/cve/CVE-2022-50021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: block range must be validated before use in ext4_mb_clear_bb()

Block range to free is validated in ext4_free_blocks() using
ext4_inode_block_valid() and then it's passed to ext4_mb_clear_bb().
However in some situations on bigalloc file system the range might be
adjusted after the validation in ext4_free_blocks() which can lead to
troubles on corrupted file systems such as one found by syzkaller that
resulted in the following BUG

kernel BUG at fs/ext4/ext4.h:3319!
PREEMPT SMP NOPTI
CPU: 28 PID: 4243 Comm: repro Kdump: loaded Not tainted 5.19.0-rc6+ #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1.fc35 04/01/2014
RIP: 0010:ext4_free_blocks+0x95e/0xa90
Call Trace:
 &lt;TASK&gt;
 ? lock_timer_base+0x61/0x80
 ? __es_remove_extent+0x5a/0x760
 ? __mod_timer+0x256/0x380
 ? ext4_ind_truncate_ensure_credits+0x90/0x220
 ext4_clear_blocks+0x107/0x1b0
 ext4_free_data+0x15b/0x170
 ext4_ind_truncate+0x214/0x2c0
 ? _raw_spin_unlock+0x15/0x30
 ? ext4_discard_preallocations+0x15a/0x410
 ? ext4_journal_check_start+0xe/0x90
 ? __ext4_journal_start_sb+0x2f/0x110
 ext4_truncate+0x1b5/0x460
 ? __ext4_journal_start_sb+0x2f/0x110
 ext4_evict_inode+0x2b4/0x6f0
 evict+0xd0/0x1d0
 ext4_enable_quotas+0x11f/0x1f0
 ext4_orphan_cleanup+0x3de/0x430
 ? proc_create_seq_private+0x43/0x50
 ext4_fill_super+0x295f/0x3ae0
 ? snprintf+0x39/0x40
 ? sget_fc+0x19c/0x330
 ? ext4_reconfigure+0x850/0x850
 get_tree_bdev+0x16d/0x260
 vfs_get_tree+0x25/0xb0
 path_mount+0x431/0xa70
 __x64_sys_mount+0xe2/0x120
 do_syscall_64+0x5b/0x80
 ? do_user_addr_fault+0x1e2/0x670
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7fdf4e512ace

Fix it by making sure that the block range is properly validated before
used every time it changes in ext4_free_blocks() or ext4_mb_clear_bb().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50021/">CVE-2022-50021 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50021">CVE-2022-50021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245180">SUSE bug 1245180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50022" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50022" ref_url="https://www.suse.com/security/cve/CVE-2022-50022" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers:md:fix a potential use-after-free bug

In line 2884, "raid5_release_stripe(sh);" drops the reference to sh and
may cause sh to be released. However, sh is subsequently used in lines
2886 "if (sh-&gt;batch_head &amp;&amp; sh != sh-&gt;batch_head)". This may result in an
use-after-free bug.

It can be fixed by moving "raid5_release_stripe(sh);" to the bottom of
the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50022/">CVE-2022-50022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50022">CVE-2022-50022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245131">SUSE bug 1245131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50027</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50027" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50027" ref_url="https://www.suse.com/security/cve/CVE-2022-50027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix possible memory leak when failing to issue CMF WQE

There is no corresponding free routine if lpfc_sli4_issue_wqe fails to
issue the CMF WQE in lpfc_issue_cmf_sync_wqe.

If ret_val is non-zero, then free the iocbq request structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50027/">CVE-2022-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50027">CVE-2022-50027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245073">SUSE bug 1245073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50028" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50028" ref_url="https://www.suse.com/security/cve/CVE-2022-50028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gadgetfs: ep_io - wait until IRQ finishes

after usb_ep_queue() if wait_for_completion_interruptible() is
interrupted we need to wait until IRQ gets finished.

Otherwise complete() from epio_complete() can corrupt stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50028/">CVE-2022-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50028">CVE-2022-50028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245135">SUSE bug 1245135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50029" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50029" ref_url="https://www.suse.com/security/cve/CVE-2022-50029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: qcom: ipq8074: dont disable gcc_sleep_clk_src

Once the usb sleep clocks are disabled, clock framework is trying to
disable the sleep clock source also.

However, it seems that it cannot be disabled and trying to do so produces:
[  245.436390] ------------[ cut here ]------------
[  245.441233] gcc_sleep_clk_src status stuck at 'on'
[  245.441254] WARNING: CPU: 2 PID: 223 at clk_branch_wait+0x130/0x140
[  245.450435] Modules linked in: xhci_plat_hcd xhci_hcd dwc3 dwc3_qcom leds_gpio
[  245.456601] CPU: 2 PID: 223 Comm: sh Not tainted 5.18.0-rc4 #215
[  245.463889] Hardware name: Xiaomi AX9000 (DT)
[  245.470050] pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  245.474307] pc : clk_branch_wait+0x130/0x140
[  245.481073] lr : clk_branch_wait+0x130/0x140
[  245.485588] sp : ffffffc009f2bad0
[  245.489838] x29: ffffffc009f2bad0 x28: ffffff8003e6c800 x27: 0000000000000000
[  245.493057] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800226ef20
[  245.500175] x23: ffffffc0089ff550 x22: 0000000000000000 x21: ffffffc008476ad0
[  245.507294] x20: 0000000000000000 x19: ffffffc00965ac70 x18: fffffffffffc51a7
[  245.514413] x17: 68702e3030303837 x16: 3a6d726f6674616c x15: ffffffc089f2b777
[  245.521531] x14: ffffffc0095c9d18 x13: 0000000000000129 x12: 0000000000000129
[  245.528649] x11: 00000000ffffffea x10: ffffffc009621d18 x9 : 0000000000000001
[  245.535767] x8 : 0000000000000001 x7 : 0000000000017fe8 x6 : 0000000000000001
[  245.542885] x5 : ffffff803fdca6d8 x4 : 0000000000000000 x3 : 0000000000000027
[  245.550002] x2 : 0000000000000027 x1 : 0000000000000023 x0 : 0000000000000026
[  245.557122] Call trace:
[  245.564229]  clk_branch_wait+0x130/0x140
[  245.566490]  clk_branch2_disable+0x2c/0x40
[  245.570656]  clk_core_disable+0x60/0xb0
[  245.574561]  clk_core_disable+0x68/0xb0
[  245.578293]  clk_disable+0x30/0x50
[  245.582113]  dwc3_qcom_remove+0x60/0xc0 [dwc3_qcom]
[  245.585588]  platform_remove+0x28/0x60
[  245.590361]  device_remove+0x4c/0x80
[  245.594179]  device_release_driver_internal+0x1dc/0x230
[  245.597914]  device_driver_detach+0x18/0x30
[  245.602861]  unbind_store+0xec/0x110
[  245.607027]  drv_attr_store+0x24/0x40
[  245.610847]  sysfs_kf_write+0x44/0x60
[  245.614405]  kernfs_fop_write_iter+0x128/0x1c0
[  245.618052]  new_sync_write+0xc0/0x130
[  245.622391]  vfs_write+0x1d4/0x2a0
[  245.626123]  ksys_write+0x58/0xe0
[  245.629508]  __arm64_sys_write+0x1c/0x30
[  245.632895]  invoke_syscall.constprop.0+0x5c/0x110
[  245.636890]  do_el0_svc+0xa0/0x150
[  245.641488]  el0_svc+0x18/0x60
[  245.644872]  el0t_64_sync_handler+0xa4/0x130
[  245.647914]  el0t_64_sync+0x174/0x178
[  245.652340] ---[ end trace 0000000000000000 ]---

So, add CLK_IS_CRITICAL flag to the clock so that the kernel won't try
to disable the sleep clock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50029/">CVE-2022-50029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50029">CVE-2022-50029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245146">SUSE bug 1245146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50030</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50030" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50030" ref_url="https://www.suse.com/security/cve/CVE-2022-50030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input

Malformed user input to debugfs results in buffer overflow crashes.  Adapt
input string lengths to fit within internal buffers, leaving space for NULL
terminators.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50030/">CVE-2022-50030 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50030">CVE-2022-50030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245265">SUSE bug 1245265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50032" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50032" ref_url="https://www.suse.com/security/cve/CVE-2022-50032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: renesas: Fix refcount leak bug

In usbhs_rza1_hardware_init(), of_find_node_by_name() will return
a node pointer with refcount incremented. We should use of_node_put()
when it is not used anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50032/">CVE-2022-50032 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50032">CVE-2022-50032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245103">SUSE bug 1245103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50033" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50033" ref_url="https://www.suse.com/security/cve/CVE-2022-50033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: ohci-ppc-of: Fix refcount leak bug

In ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return
a node pointer with refcount incremented. We should use of_node_put()
when it is not used anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50033/">CVE-2022-50033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50033">CVE-2022-50033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245139">SUSE bug 1245139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50034" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50034" ref_url="https://www.suse.com/security/cve/CVE-2022-50034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3 fix use-after-free at workaround 2

BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac

cdns3_wa2_remove_old_request()
{
	...
	kfree(priv_req-&gt;request.buf);
	cdns3_gadget_ep_free_request(&amp;priv_ep-&gt;endpoint, &amp;priv_req-&gt;request);
	list_del_init(&amp;priv_req-&gt;list);
	^^^ use after free
	...
}

cdns3_gadget_ep_free_request() free the space pointed by priv_req,
but priv_req is used in the following list_del_init().

This patch move list_del_init() before cdns3_gadget_ep_free_request().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50034/">CVE-2022-50034 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50034">CVE-2022-50034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245089">SUSE bug 1245089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50035</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50035" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50035" ref_url="https://www.suse.com/security/cve/CVE-2022-50035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex

If amdgpu_cs_vm_handling returns r != 0, then it will unlock the
bo_list_mutex inside the function amdgpu_cs_vm_handling and again on
amdgpu_cs_parser_fini. This problem results in the following
use-after-free problem:

[ 220.280990] ------------[ cut here ]------------
[ 220.281000] refcount_t: underflow; use-after-free.
[ 220.281019] WARNING: CPU: 1 PID: 3746 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110
[ 220.281029] ------------[ cut here ]------------
[ 220.281415] CPU: 1 PID: 3746 Comm: chrome:cs0 Tainted: G W L ------- --- 5.20.0-0.rc0.20220812git7ebfc85e2cd7.10.fc38.x86_64 #1
[ 220.281421] Hardware name: System manufacturer System Product Name/ROG STRIX X570-I GAMING, BIOS 4403 04/27/2022
[ 220.281426] RIP: 0010:refcount_warn_saturate+0xba/0x110
[ 220.281431] Code: 01 01 e8 79 4a 6f 00 0f 0b e9 42 47 a5 00 80 3d de
7e be 01 00 75 85 48 c7 c7 f8 98 8e 98 c6 05 ce 7e be 01 01 e8 56 4a
6f 00 &lt;0f&gt; 0b e9 1f 47 a5 00 80 3d b9 7e be 01 00 0f 85 5e ff ff ff 48
c7
[ 220.281437] RSP: 0018:ffffb4b0d18d7a80 EFLAGS: 00010282
[ 220.281443] RAX: 0000000000000026 RBX: 0000000000000003 RCX: 0000000000000000
[ 220.281448] RDX: 0000000000000001 RSI: ffffffff988d06dc RDI: 00000000ffffffff
[ 220.281452] RBP: 00000000ffffffff R08: 0000000000000000 R09: ffffb4b0d18d7930
[ 220.281457] R10: 0000000000000003 R11: ffffa0672e2fffe8 R12: ffffa058ca360400
[ 220.281461] R13: ffffa05846c50a18 R14: 00000000fffffe00 R15: 0000000000000003
[ 220.281465] FS: 00007f82683e06c0(0000) GS:ffffa066e2e00000(0000) knlGS:0000000000000000
[ 220.281470] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 220.281475] CR2: 00003590005cc000 CR3: 00000001fca46000 CR4: 0000000000350ee0
[ 220.281480] Call Trace:
[ 220.281485] &lt;TASK&gt;
[ 220.281490] amdgpu_cs_ioctl+0x4e2/0x2070 [amdgpu]
[ 220.281806] ? amdgpu_cs_find_mapping+0xe0/0xe0 [amdgpu]
[ 220.282028] drm_ioctl_kernel+0xa4/0x150
[ 220.282043] drm_ioctl+0x21f/0x420
[ 220.282053] ? amdgpu_cs_find_mapping+0xe0/0xe0 [amdgpu]
[ 220.282275] ? lock_release+0x14f/0x460
[ 220.282282] ? _raw_spin_unlock_irqrestore+0x30/0x60
[ 220.282290] ? _raw_spin_unlock_irqrestore+0x30/0x60
[ 220.282297] ? lockdep_hardirqs_on+0x7d/0x100
[ 220.282305] ? _raw_spin_unlock_irqrestore+0x40/0x60
[ 220.282317] amdgpu_drm_ioctl+0x4a/0x80 [amdgpu]
[ 220.282534] __x64_sys_ioctl+0x90/0xd0
[ 220.282545] do_syscall_64+0x5b/0x80
[ 220.282551] ? futex_wake+0x6c/0x150
[ 220.282568] ? lock_is_held_type+0xe8/0x140
[ 220.282580] ? do_syscall_64+0x67/0x80
[ 220.282585] ? lockdep_hardirqs_on+0x7d/0x100
[ 220.282592] ? do_syscall_64+0x67/0x80
[ 220.282597] ? do_syscall_64+0x67/0x80
[ 220.282602] ? lockdep_hardirqs_on+0x7d/0x100
[ 220.282609] entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 220.282616] RIP: 0033:0x7f8282a4f8bf
[ 220.282639] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10
00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00
0f 05 &lt;89&gt; c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00
00
[ 220.282644] RSP: 002b:00007f82683df410 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 220.282651] RAX: ffffffffffffffda RBX: 00007f82683df588 RCX: 00007f8282a4f8bf
[ 220.282655] RDX: 00007f82683df4d0 RSI: 00000000c0186444 RDI: 0000000000000018
[ 220.282659] RBP: 00007f82683df4d0 R08: 00007f82683df5e0 R09: 00007f82683df4b0
[ 220.282663] R10: 00001d04000a0600 R11: 0000000000000246 R12: 00000000c0186444
[ 220.282667] R13: 0000000000000018 R14: 00007f82683df588 R15: 0000000000000003
[ 220.282689] &lt;/TASK&gt;
[ 220.282693] irq event stamp: 6232311
[ 220.282697] hardirqs last enabled at (6232319): [&lt;ffffffff9718cd7e&gt;] __up_console_sem+0x5e/0x70
[ 220.282704] hardirqs last disabled at (6232326): [&lt;ffffffff9718cd63&gt;] __up_console_sem+0x43/0x70
[ 220.282709] softirqs last enabled at (6232072): [&lt;ffffffff970ff669&gt;] __irq_exit_rcu+0xf9/0x170
[ 220.282716] softirqs last disabled at (6232061): [&lt;ffffffff97
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50035/">CVE-2022-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50035">CVE-2022-50035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244955">SUSE bug 1244955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50037</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50037" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50037" ref_url="https://www.suse.com/security/cve/CVE-2022-50037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/ttm: don't leak the ccs state

The kernel only manages the ccs state with lmem-only objects, however
the kernel should still take care not to leak the CCS state from the
previous user.

(cherry picked from commit 353819d85f87be46aeb9c1dd929d445a006fc6ec)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50037/">CVE-2022-50037 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50037">CVE-2022-50037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244953">SUSE bug 1244953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50039" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50039" ref_url="https://www.suse.com/security/cve/CVE-2022-50039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

stmmac: intel: Add a missing clk_disable_unprepare() call in intel_eth_pci_remove()

Commit 09f012e64e4b ("stmmac: intel: Fix clock handling on error and remove
paths") removed this clk_disable_unprepare()

This was partly revert by commit ac322f86b56c ("net: stmmac: Fix clock
handling on remove path") which removed this clk_disable_unprepare()
because:
"
   While unloading the dwmac-intel driver, clk_disable_unprepare() is
   being called twice in stmmac_dvr_remove() and
   intel_eth_pci_remove(). This causes kernel panic on the second call.
"

However later on, commit 5ec55823438e8 ("net: stmmac: add clocks management
for gmac driver") has updated stmmac_dvr_remove() which do not call
clk_disable_unprepare() anymore.

So this call should now be called from intel_eth_pci_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50039/">CVE-2022-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50039">CVE-2022-50039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244942">SUSE bug 1244942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50041" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50041" ref_url="https://www.suse.com/security/cve/CVE-2022-50041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix call trace with null VSI during VF reset

During stress test with attaching and detaching VF from KVM and
simultaneously changing VFs spoofcheck and trust there was a
call trace in ice_reset_vf that VF's VSI is null.

[145237.352797] WARNING: CPU: 46 PID: 840629 at drivers/net/ethernet/intel/ice/ice_vf_lib.c:508 ice_reset_vf+0x3d6/0x410 [ice]
[145237.352851] Modules linked in: ice(E) vfio_pci vfio_pci_core vfio_virqfd vfio_iommu_type1 vfio iavf dm_mod xt_CHECKSUM xt_MASQUERADE
xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink tun
 bridge stp llc sunrpc intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm iTCO_wdt iTC
O_vendor_support irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl ipmi_si intel_cstate ipmi_devintf joydev intel_uncore m
ei_me ipmi_msghandler i2c_i801 pcspkr mei lpc_ich ioatdma i2c_smbus acpi_pad acpi_power_meter ip_tables xfs libcrc32c i2c_algo_bit drm_sh
mem_helper drm_kms_helper sd_mod t10_pi crc64_rocksoft syscopyarea crc64 sysfillrect sg sysimgblt fb_sys_fops drm i40e ixgbe ahci libahci
 libata crc32c_intel mdio dca wmi fuse [last unloaded: ice]
[145237.352917] CPU: 46 PID: 840629 Comm: kworker/46:2 Tainted: G S      W I E     5.19.0-rc6+ #24
[145237.352921] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS SE5C610.86B.01.01.0008.021120151325 02/11/2015
[145237.352923] Workqueue: ice ice_service_task [ice]
[145237.352948] RIP: 0010:ice_reset_vf+0x3d6/0x410 [ice]
[145237.352984] Code: 30 ec f3 cc e9 28 fd ff ff 0f b7 4b 50 48 c7 c2 48 19 9c c0 4c 89 ee 48 c7 c7 30 fe 9e c0 e8 d1 21 9d cc 31 c0 e9 a
9 fe ff ff &lt;0f&gt; 0b b8 ea ff ff ff e9 c1 fc ff ff 0f 0b b8 fb ff ff ff e9 91 fe
[145237.352987] RSP: 0018:ffffb453e257fdb8 EFLAGS: 00010246
[145237.352990] RAX: ffff8bd0040181c0 RBX: ffff8be68db8f800 RCX: 0000000000000000
[145237.352991] RDX: 000000000000ffff RSI: 0000000000000000 RDI: ffff8be68db8f800
[145237.352993] RBP: ffff8bd0040181c0 R08: 0000000000001000 R09: ffff8bcfd520e000
[145237.352995] R10: 0000000000000000 R11: 00008417b5ab0bc0 R12: 0000000000000005
[145237.352996] R13: ffff8bcee061c0d0 R14: ffff8bd004019640 R15: 0000000000000000
[145237.352998] FS:  0000000000000000(0000) GS:ffff8be5dfb00000(0000) knlGS:0000000000000000
[145237.353000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[145237.353002] CR2: 00007fd81f651d68 CR3: 0000001a0fe10001 CR4: 00000000001726e0
[145237.353003] Call Trace:
[145237.353008]  &lt;TASK&gt;
[145237.353011]  ice_process_vflr_event+0x8d/0xb0 [ice]
[145237.353049]  ice_service_task+0x79f/0xef0 [ice]
[145237.353074]  process_one_work+0x1c8/0x390
[145237.353081]  ? process_one_work+0x390/0x390
[145237.353084]  worker_thread+0x30/0x360
[145237.353087]  ? process_one_work+0x390/0x390
[145237.353090]  kthread+0xe8/0x110
[145237.353094]  ? kthread_complete_and_exit+0x20/0x20
[145237.353097]  ret_from_fork+0x22/0x30
[145237.353103]  &lt;/TASK&gt;

Remove WARN_ON() from check if VSI is null in ice_reset_vf.
Add "VF is already removed\n" in dev_dbg().

This WARN_ON() is unnecessary and causes call trace, despite that
call trace, driver still works. There is no need for this warn
because this piece of code is responsible for disabling VF's Tx/Rx
queues when VF is disabled, but when VF is already removed there
is no need to do reset or disable queues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50041/">CVE-2022-50041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50041">CVE-2022-50041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244957">SUSE bug 1244957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50042" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50042" ref_url="https://www.suse.com/security/cve/CVE-2022-50042" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: genl: fix error path memory leak in policy dumping

If construction of the array of policies fails when recording
non-first policy we need to unwind.

netlink_policy_dump_add_policy() itself also needs fixing as
it currently gives up on error without recording the allocated
pointer in the pstate pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50042/">CVE-2022-50042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50042">CVE-2022-50042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244951">SUSE bug 1244951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50044" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50044" ref_url="https://www.suse.com/security/cve/CVE-2022-50044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qrtr: start MHI channel after endpoit creation

MHI channel may generates event/interrupt right after enabling.
It may leads to 2 race conditions issues.

1)
Such event may be dropped by qcom_mhi_qrtr_dl_callback() at check:

	if (!qdev || mhi_res-&gt;transaction_status)
		return;

Because dev_set_drvdata(&amp;mhi_dev-&gt;dev, qdev) may be not performed at
this moment. In this situation qrtr-ns will be unable to enumerate
services in device.
---------------------------------------------------------------

2)
Such event may come at the moment after dev_set_drvdata() and
before qrtr_endpoint_register(). In this case kernel will panic with
accessing wrong pointer at qcom_mhi_qrtr_dl_callback():

	rc = qrtr_endpoint_post(&amp;qdev-&gt;ep, mhi_res-&gt;buf_addr,
				mhi_res-&gt;bytes_xferd);

Because endpoint is not created yet.
--------------------------------------------------------------
So move mhi_prepare_for_transfer_autoqueue after endpoint creation
to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50044/">CVE-2022-50044 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50044">CVE-2022-50044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244961">SUSE bug 1244961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50046" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50046" ref_url="https://www.suse.com/security/cve/CVE-2022-50046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sunrpc: fix potential memory leaks in rpc_sysfs_xprt_state_change()

The issue happens on some error handling paths. When the function
fails to grab the object `xprt`, it simply returns 0, forgetting to
decrease the reference count of another object `xps`, which is
increased by rpc_sysfs_xprt_kobj_get_xprt_switch(), causing refcount
leaks. Also, the function forgets to check whether `xps` is valid
before using it, which may result in NULL-dereferencing issues.

Fix it by adding proper error handling code when either `xprt` or
`xps` is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50046/">CVE-2022-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50046">CVE-2022-50046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244991">SUSE bug 1244991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50048" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50048" ref_url="https://www.suse.com/security/cve/CVE-2022-50048" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: possible module reference underflow in error path

dst-&gt;ops is set on when nft_expr_clone() fails, but module refcount has
not been bumped yet, therefore nft_expr_destroy() leads to module
reference underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50048/">CVE-2022-50048 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50048">CVE-2022-50048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244994">SUSE bug 1244994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50049" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50049" ref_url="https://www.suse.com/security/cve/CVE-2022-50049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: DPCM: Don't pick up BE without substream

When DPCM tries to add valid BE connections at dpcm_add_paths(), it
doesn't check whether the picked BE actually supports for the given
stream direction.  Due to that, when an asymmetric BE stream is
present, it picks up wrongly and this may result in a NULL dereference
at a later point where the code assumes the existence of a
corresponding BE substream.

This patch adds the check for the presence of the substream for the
target BE for avoiding the problem above.

Note that we have already some fix for non-existing BE substream at
commit 6246f283d5e0 ("ASoC: dpcm: skip missing substream while
applying symmetry").  But the code path we've hit recently is rather
happening before the previous fix.  So this patch tries to fix at
picking up a BE instead of parsing BE lists.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50049/">CVE-2022-50049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50049">CVE-2022-50049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244973">SUSE bug 1244973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50050" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50050" ref_url="https://www.suse.com/security/cve/CVE-2022-50050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf()

snprintf() returns the would-be-filled size when the string overflows
the given buffer size, hence using this value may result in the buffer
overflow (although it's unrealistic).

This patch replaces with a safer version, scnprintf() for papering
over such a potential issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50050/">CVE-2022-50050 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50050">CVE-2022-50050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244987">SUSE bug 1244987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50051" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50051" ref_url="https://www.suse.com/security/cve/CVE-2022-50051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: debug: Fix potential buffer overflow by snprintf()

snprintf() returns the would-be-filled size when the string overflows
the given buffer size, hence using this value may result in the buffer
overflow (although it's unrealistic).

This patch replaces with a safer version, scnprintf() for papering
over such a potential issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50051/">CVE-2022-50051 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50051">CVE-2022-50051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245041">SUSE bug 1245041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50052" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50052" ref_url="https://www.suse.com/security/cve/CVE-2022-50052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Fix potential buffer overflow by snprintf()

snprintf() returns the would-be-filled size when the string overflows
the given buffer size, hence using this value may result in a buffer
overflow (although it's unrealistic).

This patch replaces it with a safer version, scnprintf() for papering
over such a potential issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50052/">CVE-2022-50052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50052">CVE-2022-50052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245048">SUSE bug 1245048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50053" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50053" ref_url="https://www.suse.com/security/cve/CVE-2022-50053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix reset error handling

Do not call iavf_close in iavf_reset_task error handling. Doing so can
lead to double call of napi_disable, which can lead to deadlock there.
Removing VF would lead to iavf_remove task being stuck, because it
requires crit_lock, which is held by iavf_close.
Call iavf_disable_vf if reset fail, so that driver will clean up
remaining invalid resources.
During rapid VF resets, HW can fail to setup VF mailbox. Wrong
error handling can lead to iavf_remove being stuck with:
[ 5218.999087] iavf 0000:82:01.0: Failed to init adminq: -53
...
[ 5267.189211] INFO: task repro.sh:11219 blocked for more than 30 seconds.
[ 5267.189520]       Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1
[ 5267.189764] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 5267.190062] task:repro.sh        state:D stack:    0 pid:11219 ppid:  8162 flags:0x00000000
[ 5267.190347] Call Trace:
[ 5267.190647]  &lt;TASK&gt;
[ 5267.190927]  __schedule+0x460/0x9f0
[ 5267.191264]  schedule+0x44/0xb0
[ 5267.191563]  schedule_preempt_disabled+0x14/0x20
[ 5267.191890]  __mutex_lock.isra.12+0x6e3/0xac0
[ 5267.192237]  ? iavf_remove+0xf9/0x6c0 [iavf]
[ 5267.192565]  iavf_remove+0x12a/0x6c0 [iavf]
[ 5267.192911]  ? _raw_spin_unlock_irqrestore+0x1e/0x40
[ 5267.193285]  pci_device_remove+0x36/0xb0
[ 5267.193619]  device_release_driver_internal+0xc1/0x150
[ 5267.193974]  pci_stop_bus_device+0x69/0x90
[ 5267.194361]  pci_stop_and_remove_bus_device+0xe/0x20
[ 5267.194735]  pci_iov_remove_virtfn+0xba/0x120
[ 5267.195130]  sriov_disable+0x2f/0xe0
[ 5267.195506]  ice_free_vfs+0x7d/0x2f0 [ice]
[ 5267.196056]  ? pci_get_device+0x4f/0x70
[ 5267.196496]  ice_sriov_configure+0x78/0x1a0 [ice]
[ 5267.196995]  sriov_numvfs_store+0xfe/0x140
[ 5267.197466]  kernfs_fop_write_iter+0x12e/0x1c0
[ 5267.197918]  new_sync_write+0x10c/0x190
[ 5267.198404]  vfs_write+0x24e/0x2d0
[ 5267.198886]  ksys_write+0x5c/0xd0
[ 5267.199367]  do_syscall_64+0x3a/0x80
[ 5267.199827]  entry_SYSCALL_64_after_hwframe+0x46/0xb0
[ 5267.200317] RIP: 0033:0x7f5b381205c8
[ 5267.200814] RSP: 002b:00007fff8c7e8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 5267.201981] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f5b381205c8
[ 5267.202620] RDX: 0000000000000002 RSI: 00005569420ee900 RDI: 0000000000000001
[ 5267.203426] RBP: 00005569420ee900 R08: 000000000000000a R09: 00007f5b38180820
[ 5267.204327] R10: 000000000000000a R11: 0000000000000246 R12: 00007f5b383c06e0
[ 5267.205193] R13: 0000000000000002 R14: 00007f5b383bb880 R15: 0000000000000002
[ 5267.206041]  &lt;/TASK&gt;
[ 5267.206970] Kernel panic - not syncing: hung_task: blocked tasks
[ 5267.207809] CPU: 48 PID: 551 Comm: khungtaskd Kdump: loaded Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1
[ 5267.208726] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019
[ 5267.209623] Call Trace:
[ 5267.210569]  &lt;TASK&gt;
[ 5267.211480]  dump_stack_lvl+0x33/0x42
[ 5267.212472]  panic+0x107/0x294
[ 5267.213467]  watchdog.cold.8+0xc/0xbb
[ 5267.214413]  ? proc_dohung_task_timeout_secs+0x30/0x30
[ 5267.215511]  kthread+0xf4/0x120
[ 5267.216459]  ? kthread_complete_and_exit+0x20/0x20
[ 5267.217505]  ret_from_fork+0x22/0x30
[ 5267.218459]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50053/">CVE-2022-50053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50053">CVE-2022-50053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245038">SUSE bug 1245038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50054</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50054" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50054" ref_url="https://www.suse.com/security/cve/CVE-2022-50054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix NULL pointer dereference in iavf_get_link_ksettings

Fix possible NULL pointer dereference, due to freeing of adapter-&gt;vf_res
in iavf_init_get_resources. Previous commit introduced a regression,
where receiving IAVF_ERR_ADMIN_QUEUE_NO_WORK from iavf_get_vf_config
would free adapter-&gt;vf_res. However, netdev is still registered, so
ethtool_ops can be called. Calling iavf_get_link_ksettings with no vf_res,
will result with:
[ 9385.242676] BUG: kernel NULL pointer dereference, address: 0000000000000008
[ 9385.242683] #PF: supervisor read access in kernel mode
[ 9385.242686] #PF: error_code(0x0000) - not-present page
[ 9385.242690] PGD 0 P4D 0
[ 9385.242696] Oops: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC PTI
[ 9385.242701] CPU: 6 PID: 3217 Comm: pmdalinux Kdump: loaded Tainted: G S          E     5.18.0-04958-ga54ce3703613-dirty #1
[ 9385.242708] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.11.0 11/02/2019
[ 9385.242710] RIP: 0010:iavf_get_link_ksettings+0x29/0xd0 [iavf]
[ 9385.242745] Code: 00 0f 1f 44 00 00 b8 01 ef ff ff 48 c7 46 30 00 00 00 00 48 c7 46 38 00 00 00 00 c6 46 0b 00 66 89 46 08 48 8b 87 68 0e 00 00 &lt;f6&gt; 40 08 80 75 50 8b 87 5c 0e 00 00 83 f8 08 74 7a 76 1d 83 f8 20
[ 9385.242749] RSP: 0018:ffffc0560ec7fbd0 EFLAGS: 00010246
[ 9385.242755] RAX: 0000000000000000 RBX: ffffc0560ec7fc08 RCX: 0000000000000000
[ 9385.242759] RDX: ffffffffc0ad4550 RSI: ffffc0560ec7fc08 RDI: ffffa0fc66674000
[ 9385.242762] RBP: 00007ffd1fb2bf50 R08: b6a2d54b892363ee R09: ffffa101dc14fb00
[ 9385.242765] R10: 0000000000000000 R11: 0000000000000004 R12: ffffa0fc66674000
[ 9385.242768] R13: 0000000000000000 R14: ffffa0fc66674000 R15: 00000000ffffffa1
[ 9385.242771] FS:  00007f93711a2980(0000) GS:ffffa0fad72c0000(0000) knlGS:0000000000000000
[ 9385.242775] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 9385.242778] CR2: 0000000000000008 CR3: 0000000a8e61c003 CR4: 00000000003706e0
[ 9385.242781] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 9385.242784] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 9385.242787] Call Trace:
[ 9385.242791]  &lt;TASK&gt;
[ 9385.242793]  ethtool_get_settings+0x71/0x1a0
[ 9385.242814]  __dev_ethtool+0x426/0x2f40
[ 9385.242823]  ? slab_post_alloc_hook+0x4f/0x280
[ 9385.242836]  ? kmem_cache_alloc_trace+0x15d/0x2f0
[ 9385.242841]  ? dev_ethtool+0x59/0x170
[ 9385.242848]  dev_ethtool+0xa7/0x170
[ 9385.242856]  dev_ioctl+0xc3/0x520
[ 9385.242866]  sock_do_ioctl+0xa0/0xe0
[ 9385.242877]  sock_ioctl+0x22f/0x320
[ 9385.242885]  __x64_sys_ioctl+0x84/0xc0
[ 9385.242896]  do_syscall_64+0x3a/0x80
[ 9385.242904]  entry_SYSCALL_64_after_hwframe+0x46/0xb0
[ 9385.242918] RIP: 0033:0x7f93702396db
[ 9385.242923] Code: 73 01 c3 48 8b 0d ad 57 38 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 7d 57 38 00 f7 d8 64 89 01 48
[ 9385.242927] RSP: 002b:00007ffd1fb2bf18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 9385.242932] RAX: ffffffffffffffda RBX: 000055671b1d2fe0 RCX: 00007f93702396db
[ 9385.242935] RDX: 00007ffd1fb2bf20 RSI: 0000000000008946 RDI: 0000000000000007
[ 9385.242937] RBP: 00007ffd1fb2bf20 R08: 0000000000000003 R09: 0030763066307330
[ 9385.242940] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffd1fb2bf80
[ 9385.242942] R13: 0000000000000007 R14: 0000556719f6de90 R15: 00007ffd1fb2c1b0
[ 9385.242948]  &lt;/TASK&gt;
[ 9385.242949] Modules linked in: iavf(E) xt_CHECKSUM xt_MASQUERADE xt_conntrack ipt_REJECT nft_compat nf_nat_tftp nft_objref nf_conntrack_tftp bridge stp llc nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink vfat fat irdma ib_uverbs ib_core intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretem
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50054/">CVE-2022-50054 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50054">CVE-2022-50054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245040">SUSE bug 1245040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50055" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50055" ref_url="https://www.suse.com/security/cve/CVE-2022-50055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix adminq error handling

iavf_alloc_asq_bufs/iavf_alloc_arq_bufs allocates with dma_alloc_coherent
memory for VF mailbox.
Free DMA regions for both ASQ and ARQ in case error happens during
configuration of ASQ/ARQ registers.
Without this change it is possible to see when unloading interface:
74626.583369: dma_debug_device_change: device driver has pending DMA allocations while released from device [count=32]
One of leaked entries details: [device address=0x0000000b27ff9000] [size=4096 bytes] [mapped with DMA_BIDIRECTIONAL] [mapped as coherent]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50055/">CVE-2022-50055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50055">CVE-2022-50055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245039">SUSE bug 1245039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50058" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50058" ref_url="https://www.suse.com/security/cve/CVE-2022-50058" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa_sim_blk: set number of address spaces and virtqueue groups

Commit bda324fd037a ("vdpasim: control virtqueue support") added two
new fields (nas, ngroups) to vdpasim_dev_attr, but we forgot to
initialize them for vdpa_sim_blk.

When creating a new vdpa_sim_blk device this causes the kernel
to panic in this way:
      $ vdpa dev add mgmtdev vdpasim_blk name blk0
      BUG: kernel NULL pointer dereference, address: 0000000000000030
      ...
      RIP: 0010:vhost_iotlb_add_range_ctx+0x41/0x220 [vhost_iotlb]
      ...
      Call Trace:
       &lt;TASK&gt;
       vhost_iotlb_add_range+0x11/0x800 [vhost_iotlb]
       vdpasim_map_range+0x91/0xd0 [vdpa_sim]
       vdpasim_alloc_coherent+0x56/0x90 [vdpa_sim]
       ...

This happens because vdpasim-&gt;iommu[0] is not initialized when
dev_attr.nas is 0.

Let's fix this issue by initializing both (nas, ngroups) to 1 for
vdpa_sim_blk.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50058/">CVE-2022-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50058">CVE-2022-50058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245036">SUSE bug 1245036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50064" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50064" ref_url="https://www.suse.com/security/cve/CVE-2022-50064" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-blk: Avoid use-after-free on suspend/resume

hctx-&gt;user_data is set to vq in virtblk_init_hctx().  However, vq is
freed on suspend and reallocated on resume.  So, hctx-&gt;user_data is
invalid after resume, and it will cause use-after-free accessing which
will result in the kernel crash something like below:

[   22.428391] Call Trace:
[   22.428899]  &lt;TASK&gt;
[   22.429339]  virtqueue_add_split+0x3eb/0x620
[   22.430035]  ? __blk_mq_alloc_requests+0x17f/0x2d0
[   22.430789]  ? kvm_clock_get_cycles+0x14/0x30
[   22.431496]  virtqueue_add_sgs+0xad/0xd0
[   22.432108]  virtblk_add_req+0xe8/0x150
[   22.432692]  virtio_queue_rqs+0xeb/0x210
[   22.433330]  blk_mq_flush_plug_list+0x1b8/0x280
[   22.434059]  __blk_flush_plug+0xe1/0x140
[   22.434853]  blk_finish_plug+0x20/0x40
[   22.435512]  read_pages+0x20a/0x2e0
[   22.436063]  ? folio_add_lru+0x62/0xa0
[   22.436652]  page_cache_ra_unbounded+0x112/0x160
[   22.437365]  filemap_get_pages+0xe1/0x5b0
[   22.437964]  ? context_to_sid+0x70/0x100
[   22.438580]  ? sidtab_context_to_sid+0x32/0x400
[   22.439979]  filemap_read+0xcd/0x3d0
[   22.440917]  xfs_file_buffered_read+0x4a/0xc0
[   22.441984]  xfs_file_read_iter+0x65/0xd0
[   22.442970]  __kernel_read+0x160/0x2e0
[   22.443921]  bprm_execve+0x21b/0x640
[   22.444809]  do_execveat_common.isra.0+0x1a8/0x220
[   22.446008]  __x64_sys_execve+0x2d/0x40
[   22.446920]  do_syscall_64+0x37/0x90
[   22.447773]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

This patch fixes this issue by getting vq from vblk, and removes
virtblk_init_hctx().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50064/">CVE-2022-50064 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50064">CVE-2022-50064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245030">SUSE bug 1245030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50066" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50066" ref_url="https://www.suse.com/security/cve/CVE-2022-50066" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11358" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: fix aq_vec index out of range error

The final update statement of the for loop exceeds the array range, the
dereference of self-&gt;aq_vec[i] is not checked and then leads to the
index out of range error.
Also fixed this kind of coding style in other for loop.

[   97.937604] UBSAN: array-index-out-of-bounds in drivers/net/ethernet/aquantia/atlantic/aq_nic.c:1404:48
[   97.937607] index 8 is out of range for type 'aq_vec_s *[8]'
[   97.937608] CPU: 38 PID: 3767 Comm: kworker/u256:18 Not tainted 5.19.0+ #2
[   97.937610] Hardware name: Dell Inc. Precision 7865 Tower/, BIOS 1.0.0 06/12/2022
[   97.937611] Workqueue: events_unbound async_run_entry_fn
[   97.937616] Call Trace:
[   97.937617]  &lt;TASK&gt;
[   97.937619]  dump_stack_lvl+0x49/0x63
[   97.937624]  dump_stack+0x10/0x16
[   97.937626]  ubsan_epilogue+0x9/0x3f
[   97.937627]  __ubsan_handle_out_of_bounds.cold+0x44/0x49
[   97.937629]  ? __scm_send+0x348/0x440
[   97.937632]  ? aq_vec_stop+0x72/0x80 [atlantic]
[   97.937639]  aq_nic_stop+0x1b6/0x1c0 [atlantic]
[   97.937644]  aq_suspend_common+0x88/0x90 [atlantic]
[   97.937648]  aq_pm_suspend_poweroff+0xe/0x20 [atlantic]
[   97.937653]  pci_pm_suspend+0x7e/0x1a0
[   97.937655]  ? pci_pm_suspend_noirq+0x2b0/0x2b0
[   97.937657]  dpm_run_callback+0x54/0x190
[   97.937660]  __device_suspend+0x14c/0x4d0
[   97.937661]  async_suspend+0x23/0x70
[   97.937663]  async_run_entry_fn+0x33/0x120
[   97.937664]  process_one_work+0x21f/0x3f0
[   97.937666]  worker_thread+0x4a/0x3c0
[   97.937668]  ? process_one_work+0x3f0/0x3f0
[   97.937669]  kthread+0xf0/0x120
[   97.937671]  ? kthread_complete_and_exit+0x20/0x20
[   97.937672]  ret_from_fork+0x22/0x30
[   97.937676]  &lt;/TASK&gt;

v2. fixed "warning: variable 'aq_vec' set but not used"

v3. simplified a for loop
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50066/">CVE-2022-50066 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50066">CVE-2022-50066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244985">SUSE bug 1244985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50068" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50068" ref_url="https://www.suse.com/security/cve/CVE-2022-50068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Fix dummy res NULL ptr deref bug

Check the bo-&gt;resource value before accessing the resource
mem_type.

v2: Fix commit description unwrapped warning

&lt;log snip&gt;
[   40.191227][  T184] general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN PTI
[   40.192995][  T184] KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
[   40.194411][  T184] CPU: 1 PID: 184 Comm: systemd-udevd Not tainted 5.19.0-rc4-00721-gb297c22b7070 #1
[   40.196063][  T184] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014
[   40.199605][  T184] RIP: 0010:ttm_bo_validate+0x1b3/0x240 [ttm]
[   40.200754][  T184] Code: e8 72 c5 ff ff 83 f8 b8 74 d4 85 c0 75 54 49 8b 9e 58 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 10 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 04 02 84 c0 74 04 3c 03 7e 44 8b 53 10 31 c0 85 d2 0f 85 58
[   40.203685][  T184] RSP: 0018:ffffc900006df0c8 EFLAGS: 00010202
[   40.204630][  T184] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 1ffff1102f4bb71b
[   40.205864][  T184] RDX: 0000000000000002 RSI: ffffc900006df208 RDI: 0000000000000010
[   40.207102][  T184] RBP: 1ffff920000dbe1a R08: ffffc900006df208 R09: 0000000000000000
[   40.208394][  T184] R10: ffff88817a5f0000 R11: 0000000000000001 R12: ffffc900006df110
[   40.209692][  T184] R13: ffffc900006df0f0 R14: ffff88817a5db800 R15: ffffc900006df208
[   40.210862][  T184] FS:  00007f6b1d16e8c0(0000) GS:ffff88839d700000(0000) knlGS:0000000000000000
[   40.212250][  T184] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   40.213275][  T184] CR2: 000055a1001d4ff0 CR3: 00000001700f4000 CR4: 00000000000006e0
[   40.214469][  T184] Call Trace:
[   40.214974][  T184]  &lt;TASK&gt;
[   40.215438][  T184]  ? ttm_bo_bounce_temp_buffer+0x140/0x140 [ttm]
[   40.216572][  T184]  ? mutex_spin_on_owner+0x240/0x240
[   40.217456][  T184]  ? drm_vma_offset_add+0xaa/0x100 [drm]
[   40.218457][  T184]  ttm_bo_init_reserved+0x3d6/0x540 [ttm]
[   40.219410][  T184]  ? shmem_get_inode+0x744/0x980
[   40.220231][  T184]  ttm_bo_init_validate+0xb1/0x200 [ttm]
[   40.221172][  T184]  ? bo_driver_evict_flags+0x340/0x340 [drm_vram_helper]
[   40.222530][  T184]  ? ttm_bo_init_reserved+0x540/0x540 [ttm]
[   40.223643][  T184]  ? __do_sys_finit_module+0x11a/0x1c0
[   40.224654][  T184]  ? __shmem_file_setup+0x102/0x280
[   40.234764][  T184]  drm_gem_vram_create+0x305/0x480 [drm_vram_helper]
[   40.235766][  T184]  ? bo_driver_evict_flags+0x340/0x340 [drm_vram_helper]
[   40.236846][  T184]  ? __kasan_slab_free+0x108/0x180
[   40.237650][  T184]  drm_gem_vram_fill_create_dumb+0x134/0x340 [drm_vram_helper]
[   40.238864][  T184]  ? local_pci_probe+0xdf/0x180
[   40.239674][  T184]  ? drmm_vram_helper_init+0x400/0x400 [drm_vram_helper]
[   40.240826][  T184]  drm_client_framebuffer_create+0x19c/0x400 [drm]
[   40.241955][  T184]  ? drm_client_buffer_delete+0x200/0x200 [drm]
[   40.243001][  T184]  ? drm_client_pick_crtcs+0x554/0xb80 [drm]
[   40.244030][  T184]  drm_fb_helper_generic_probe+0x23f/0x940 [drm_kms_helper]
[   40.245226][  T184]  ? __cond_resched+0x1c/0xc0
[   40.245987][  T184]  ? drm_fb_helper_memory_range_to_clip+0x180/0x180 [drm_kms_helper]
[   40.247316][  T184]  ? mutex_unlock+0x80/0x100
[   40.248005][  T184]  ? __mutex_unlock_slowpath+0x2c0/0x2c0
[   40.249083][  T184]  drm_fb_helper_single_fb_probe+0x907/0xf00 [drm_kms_helper]
[   40.250314][  T184]  ? drm_fb_helper_check_var+0x1180/0x1180 [drm_kms_helper]
[   40.251540][  T184]  ? __cond_resched+0x1c/0xc0
[   40.252321][  T184]  ? mutex_lock+0x9f/0x100
[   40.253062][  T184]  __drm_fb_helper_initial_config_and_unlock+0xb9/0x2c0 [drm_kms_helper]
[   40.254394][  T184]  drm_fbdev_client_hotplug+0x56f/0x840 [drm_kms_helper]
[   40.255477][  T184]  drm_fbdev_generic_setup+0x165/0x3c0 [drm_kms_helper]
[   40.256607][  T184]  bochs_pci_probe+0x6b7/0x900 [bochs]
[   
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50068/">CVE-2022-50068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50068">CVE-2022-50068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245142">SUSE bug 1245142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50069</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50069" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50069" ref_url="https://www.suse.com/security/cve/CVE-2022-50069" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

BPF: Fix potential bad pointer dereference in bpf_sys_bpf()

The bpf_sys_bpf() helper function allows an eBPF program to load another
eBPF program from within the kernel. In this case the argument union
bpf_attr pointer (as well as the insns and license pointers inside) is a
kernel address instead of a userspace address (which is the case of a
usual bpf() syscall). To make the memory copying process in the syscall
work in both cases, bpfptr_t was introduced to wrap around the pointer
and distinguish its origin. Specifically, when copying memory contents
from a bpfptr_t, a copy_from_user() is performed in case of a userspace
address and a memcpy() is performed for a kernel address.

This can lead to problems because the in-kernel pointer is never checked
for validity. The problem happens when an eBPF syscall program tries to
call bpf_sys_bpf() to load a program but provides a bad insns pointer --
say 0xdeadbeef -- in the bpf_attr union. The helper calls __sys_bpf()
which would then call bpf_prog_load() to load the program.
bpf_prog_load() is responsible for copying the eBPF instructions to the
newly allocated memory for the program; it creates a kernel bpfptr_t for
insns and invokes copy_from_bpfptr(). Internally, all bpfptr_t
operations are backed by the corresponding sockptr_t operations, which
performs direct memcpy() on kernel pointers for copy_from/strncpy_from
operations. Therefore, the code is always happy to dereference the bad
pointer to trigger a un-handle-able page fault and in turn an oops.
However, this is not supposed to happen because at that point the eBPF
program is already verified and should not cause a memory error.

Sample KASAN trace:

[   25.685056][  T228] ==================================================================
[   25.685680][  T228] BUG: KASAN: user-memory-access in copy_from_bpfptr+0x21/0x30
[   25.686210][  T228] Read of size 80 at addr 00000000deadbeef by task poc/228
[   25.686732][  T228]
[   25.686893][  T228] CPU: 3 PID: 228 Comm: poc Not tainted 5.19.0-rc7 #7
[   25.687375][  T228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS d55cb5a 04/01/2014
[   25.687991][  T228] Call Trace:
[   25.688223][  T228]  &lt;TASK&gt;
[   25.688429][  T228]  dump_stack_lvl+0x73/0x9e
[   25.688747][  T228]  print_report+0xea/0x200
[   25.689061][  T228]  ? copy_from_bpfptr+0x21/0x30
[   25.689401][  T228]  ? _printk+0x54/0x6e
[   25.689693][  T228]  ? _raw_spin_lock_irqsave+0x70/0xd0
[   25.690071][  T228]  ? copy_from_bpfptr+0x21/0x30
[   25.690412][  T228]  kasan_report+0xb5/0xe0
[   25.690716][  T228]  ? copy_from_bpfptr+0x21/0x30
[   25.691059][  T228]  kasan_check_range+0x2bd/0x2e0
[   25.691405][  T228]  ? copy_from_bpfptr+0x21/0x30
[   25.691734][  T228]  memcpy+0x25/0x60
[   25.692000][  T228]  copy_from_bpfptr+0x21/0x30
[   25.692328][  T228]  bpf_prog_load+0x604/0x9e0
[   25.692653][  T228]  ? cap_capable+0xb4/0xe0
[   25.692956][  T228]  ? security_capable+0x4f/0x70
[   25.693324][  T228]  __sys_bpf+0x3af/0x580
[   25.693635][  T228]  bpf_sys_bpf+0x45/0x240
[   25.693937][  T228]  bpf_prog_f0ec79a5a3caca46_bpf_func1+0xa2/0xbd
[   25.694394][  T228]  bpf_prog_run_pin_on_cpu+0x2f/0xb0
[   25.694756][  T228]  bpf_prog_test_run_syscall+0x146/0x1c0
[   25.695144][  T228]  bpf_prog_test_run+0x172/0x190
[   25.695487][  T228]  __sys_bpf+0x2c5/0x580
[   25.695776][  T228]  __x64_sys_bpf+0x3a/0x50
[   25.696084][  T228]  do_syscall_64+0x60/0x90
[   25.696393][  T228]  ? fpregs_assert_state_consistent+0x50/0x60
[   25.696815][  T228]  ? exit_to_user_mode_prepare+0x36/0xa0
[   25.697202][  T228]  ? syscall_exit_to_user_mode+0x20/0x40
[   25.697586][  T228]  ? do_syscall_64+0x6e/0x90
[   25.697899][  T228]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[   25.698312][  T228] RIP: 0033:0x7f6d543fb759
[   25.698624][  T228] Code: 08 5b 89 e8 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50069/">CVE-2022-50069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50069">CVE-2022-50069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244981">SUSE bug 1244981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50070" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50070" ref_url="https://www.suse.com/security/cve/CVE-2022-50070" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: do not queue data on closed subflows

Dipanjan reported a syzbot splat at close time:

WARNING: CPU: 1 PID: 10818 at net/ipv4/af_inet.c:153
inet_sock_destruct+0x6d0/0x8e0 net/ipv4/af_inet.c:153
Modules linked in: uio_ivshmem(OE) uio(E)
CPU: 1 PID: 10818 Comm: kworker/1:16 Tainted: G           OE
5.19.0-rc6-g2eae0556bb9d #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.13.0-1ubuntu1.1 04/01/2014
Workqueue: events mptcp_worker
RIP: 0010:inet_sock_destruct+0x6d0/0x8e0 net/ipv4/af_inet.c:153
Code: 21 02 00 00 41 8b 9c 24 28 02 00 00 e9 07 ff ff ff e8 34 4d 91
f9 89 ee 4c 89 e7 e8 4a 47 60 ff e9 a6 fc ff ff e8 20 4d 91 f9 &lt;0f&gt; 0b
e9 84 fe ff ff e8 14 4d 91 f9 0f 0b e9 d4 fd ff ff e8 08 4d
RSP: 0018:ffffc9001b35fa78 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000002879d0 RCX: ffff8881326f3b00
RDX: 0000000000000000 RSI: ffff8881326f3b00 RDI: 0000000000000002
RBP: ffff888179662674 R08: ffffffff87e983a0 R09: 0000000000000000
R10: 0000000000000005 R11: 00000000000004ea R12: ffff888179662400
R13: ffff888179662428 R14: 0000000000000001 R15: ffff88817e38e258
FS:  0000000000000000(0000) GS:ffff8881f5f00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020007bc0 CR3: 0000000179592000 CR4: 0000000000150ee0
Call Trace:
 &lt;TASK&gt;
 __sk_destruct+0x4f/0x8e0 net/core/sock.c:2067
 sk_destruct+0xbd/0xe0 net/core/sock.c:2112
 __sk_free+0xef/0x3d0 net/core/sock.c:2123
 sk_free+0x78/0xa0 net/core/sock.c:2134
 sock_put include/net/sock.h:1927 [inline]
 __mptcp_close_ssk+0x50f/0x780 net/mptcp/protocol.c:2351
 __mptcp_destroy_sock+0x332/0x760 net/mptcp/protocol.c:2828
 mptcp_worker+0x5d2/0xc90 net/mptcp/protocol.c:2586
 process_one_work+0x9cc/0x1650 kernel/workqueue.c:2289
 worker_thread+0x623/0x1070 kernel/workqueue.c:2436
 kthread+0x2e9/0x3a0 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:302
 &lt;/TASK&gt;

The root cause of the problem is that an mptcp-level (re)transmit can
race with mptcp_close() and the packet scheduler checks the subflow
state before acquiring the socket lock: we can try to (re)transmit on
an already closed ssk.

Fix the issue checking again the subflow socket status under the
subflow socket lock protection. Additionally add the missing check
for the fallback-to-tcp case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50070/">CVE-2022-50070 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50070">CVE-2022-50070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244988">SUSE bug 1244988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50072</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50072" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50072" ref_url="https://www.suse.com/security/cve/CVE-2022-50072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4/pnfs: Fix a use-after-free bug in open

If someone cancels the open RPC call, then we must not try to free
either the open slot or the layoutget operation arguments, since they
are likely still in use by the hung RPC call.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50072/">CVE-2022-50072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50072">CVE-2022-50072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244979">SUSE bug 1244979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50076" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50076" ref_url="https://www.suse.com/security/cve/CVE-2022-50076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix memory leak on the deferred close

xfstests on smb21 report kmemleak as below:

  unreferenced object 0xffff8881767d6200 (size 64):
    comm "xfs_io", pid 1284, jiffies 4294777434 (age 20.789s)
    hex dump (first 32 bytes):
      80 5a d0 11 81 88 ff ff 78 8a aa 63 81 88 ff ff  .Z......x..c....
      00 71 99 76 81 88 ff ff 00 00 00 00 00 00 00 00  .q.v............
    backtrace:
      [&lt;00000000ad04e6ea&gt;] cifs_close+0x92/0x2c0
      [&lt;0000000028b93c82&gt;] __fput+0xff/0x3f0
      [&lt;00000000d8116851&gt;] task_work_run+0x85/0xc0
      [&lt;0000000027e14f9e&gt;] do_exit+0x5e5/0x1240
      [&lt;00000000fb492b95&gt;] do_group_exit+0x58/0xe0
      [&lt;00000000129a32d9&gt;] __x64_sys_exit_group+0x28/0x30
      [&lt;00000000e3f7d8e9&gt;] do_syscall_64+0x35/0x80
      [&lt;00000000102e8a0b&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

When cancel the deferred close work, we should also cleanup the struct
cifs_deferred_close.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50076/">CVE-2022-50076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50076">CVE-2022-50076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244983">SUSE bug 1244983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50079" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50079" ref_url="https://www.suse.com/security/cve/CVE-2022-50079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check correct bounds for stream encoder instances for DCN303

[Why &amp; How]
eng_id for DCN303 cannot be more than 1, since we have only two
instances of stream encoders.

Check the correct boundary condition for engine ID for DCN303 prevent
the potential out of bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50079/">CVE-2022-50079 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50079">CVE-2022-50079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244970">SUSE bug 1244970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50080" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50080" ref_url="https://www.suse.com/security/cve/CVE-2022-50080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: add overflow check in register_shm_helper()

With special lengths supplied by user space, register_shm_helper() has
an integer overflow when calculating the number of pages covered by a
supplied user space memory region.

This causes internal_get_user_pages_fast() a helper function of
pin_user_pages_fast() to do a NULL pointer dereference:

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010
  Modules linked in:
  CPU: 1 PID: 173 Comm: optee_example_a Not tainted 5.19.0 #11
  Hardware name: QEMU QEMU Virtual Machine, BIOS 0.0.0 02/06/2015
  pc : internal_get_user_pages_fast+0x474/0xa80
  Call trace:
   internal_get_user_pages_fast+0x474/0xa80
   pin_user_pages_fast+0x24/0x4c
   register_shm_helper+0x194/0x330
   tee_shm_register_user_buf+0x78/0x120
   tee_ioctl+0xd0/0x11a0
   __arm64_sys_ioctl+0xa8/0xec
   invoke_syscall+0x48/0x114

Fix this by adding an an explicit call to access_ok() in
tee_shm_register_user_buf() to catch an invalid user space address
early.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50080/">CVE-2022-50080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50080">CVE-2022-50080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244972">SUSE bug 1244972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50081" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50081" ref_url="https://www.suse.com/security/cve/CVE-2022-50081" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50081/">CVE-2022-50081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50081">CVE-2022-50081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245341">SUSE bug 1245341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50083" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50083" ref_url="https://www.suse.com/security/cve/CVE-2022-50083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50083/">CVE-2022-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50083">CVE-2022-50083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244968">SUSE bug 1244968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50084" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50084" ref_url="https://www.suse.com/security/cve/CVE-2022-50084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm raid: fix address sanitizer warning in raid_status

There is this warning when using a kernel with the address sanitizer
and running this testsuite:
https://gitlab.com/cki-project/kernel-tests/-/tree/main/storage/swraid/scsi_raid

==================================================================
BUG: KASAN: slab-out-of-bounds in raid_status+0x1747/0x2820 [dm_raid]
Read of size 4 at addr ffff888079d2c7e8 by task lvcreate/13319
CPU: 0 PID: 13319 Comm: lvcreate Not tainted 5.18.0-0.rc3.&lt;snip&gt; #1
Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x6a/0x9c
 print_address_description.constprop.0+0x1f/0x1e0
 print_report.cold+0x55/0x244
 kasan_report+0xc9/0x100
 raid_status+0x1747/0x2820 [dm_raid]
 dm_ima_measure_on_table_load+0x4b8/0xca0 [dm_mod]
 table_load+0x35c/0x630 [dm_mod]
 ctl_ioctl+0x411/0x630 [dm_mod]
 dm_ctl_ioctl+0xa/0x10 [dm_mod]
 __x64_sys_ioctl+0x12a/0x1a0
 do_syscall_64+0x5b/0x80

The warning is caused by reading conf-&gt;max_nr_stripes in raid_status. The
code in raid_status reads mddev-&gt;private, casts it to struct r5conf and
reads the entry max_nr_stripes.

However, if we have different raid type than 4/5/6, mddev-&gt;private
doesn't point to struct r5conf; it may point to struct r0conf, struct
r1conf, struct r10conf or struct mpconf. If we cast a pointer to one
of these structs to struct r5conf, we will be reading invalid memory
and KASAN warns about it.

Fix this bug by reading struct r5conf only if raid type is 4, 5 or 6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50084/">CVE-2022-50084 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50084">CVE-2022-50084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245117">SUSE bug 1245117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50085" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50085" ref_url="https://www.suse.com/security/cve/CVE-2022-50085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm raid: fix address sanitizer warning in raid_resume

There is a KASAN warning in raid_resume when running the lvm test
lvconvert-raid.sh. The reason for the warning is that mddev-&gt;raid_disks
is greater than rs-&gt;raid_disks, so the loop touches one entry beyond
the allocated length.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50085/">CVE-2022-50085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50085">CVE-2022-50085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245147">SUSE bug 1245147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50086" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50086" ref_url="https://www.suse.com/security/cve/CVE-2022-50086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: don't allow the same type rq_qos add more than once

In our test of iocost, we encountered some list add/del corruptions of
inner_walk list in ioc_timer_fn.

The reason can be described as follows:

cpu 0					cpu 1
ioc_qos_write				ioc_qos_write

ioc = q_to_ioc(queue);
if (!ioc) {
        ioc = kzalloc();
					ioc = q_to_ioc(queue);
					if (!ioc) {
						ioc = kzalloc();
						...
						rq_qos_add(q, rqos);
					}
        ...
        rq_qos_add(q, rqos);
        ...
}

When the io.cost.qos file is written by two cpus concurrently, rq_qos may
be added to one disk twice. In that case, there will be two iocs enabled
and running on one disk. They own different iocgs on their active list. In
the ioc_timer_fn function, because of the iocgs from two iocs have the
same root iocg, the root iocg's walk_list may be overwritten by each other
and this leads to list add/del corruptions in building or destroying the
inner_walk list.

And so far, the blk-rq-qos framework works in case that one instance for
one type rq_qos per queue by default. This patch make this explicit and
also fix the crash above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50086/">CVE-2022-50086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50086">CVE-2022-50086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245116">SUSE bug 1245116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50087" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50087" ref_url="https://www.suse.com/security/cve/CVE-2022-50087" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scpi: Ensure scpi_info is not assigned if the probe fails

When scpi probe fails, at any point, we need to ensure that the scpi_info
is not set and will remain NULL until the probe succeeds. If it is not
taken care, then it could result use-after-free as the value is exported
via get_scpi_ops() and could refer to a memory allocated via devm_kzalloc()
but freed when the probe fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50087/">CVE-2022-50087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50087">CVE-2022-50087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245119">SUSE bug 1245119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245294">SUSE bug 1245294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023062" comment="kernel-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023063" comment="kernel-abi-stablelists-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023064" comment="kernel-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023065" comment="kernel-cross-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023066" comment="kernel-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023067" comment="kernel-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023070" comment="kernel-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023071" comment="kernel-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023072" comment="kernel-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023073" comment="kernel-debug-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023076" comment="kernel-doc-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023077" comment="kernel-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023078" comment="kernel-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023079" comment="kernel-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023080" comment="kernel-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023081" comment="kernel-rt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023082" comment="kernel-rt-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023083" comment="kernel-rt-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023084" comment="kernel-rt-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023086" comment="kernel-rt-debug-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023087" comment="kernel-rt-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023088" comment="kernel-rt-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023089" comment="kernel-rt-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023091" comment="kernel-rt-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023092" comment="kernel-rt-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023093" comment="kernel-rt-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023094" comment="kernel-rt-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023095" comment="kernel-tools-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023096" comment="kernel-tools-libs-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023098" comment="kernel-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023099" comment="kernel-uki-virt-addons-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023100" comment="libperf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023101" comment="perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023102" comment="python3-perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023103" comment="rtla-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023104" comment="rv-5.14.0-570.55.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50088" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50088" ref_url="https://www.suse.com/security/cve/CVE-2022-50088" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/reclaim: fix potential memory leak in damon_reclaim_init()

damon_reclaim_init() allocates a memory chunk for ctx with
damon_new_ctx().  When damon_select_ops() fails, ctx is not released,
which will lead to a memory leak.

We should release the ctx with damon_destroy_ctx() when damon_select_ops()
fails to fix the memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50088/">CVE-2022-50088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50088">CVE-2022-50088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244761">SUSE bug 1244761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50091" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50091" ref_url="https://www.suse.com/security/cve/CVE-2022-50091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

locking/csd_lock: Change csdlock_debug from early_param to __setup

The csdlock_debug kernel-boot parameter is parsed by the
early_param() function csdlock_debug().  If set, csdlock_debug()
invokes static_branch_enable() to enable csd_lock_wait feature, which
triggers a panic on arm64 for kernels built with CONFIG_SPARSEMEM=y and
CONFIG_SPARSEMEM_VMEMMAP=n.

With CONFIG_SPARSEMEM_VMEMMAP=n, __nr_to_section is called in
static_key_enable() and returns NULL, resulting in a NULL dereference
because mem_section is initialized only later in sparse_init().

This is also a problem for powerpc because early_param() functions
are invoked earlier than jump_label_init(), also resulting in
static_key_enable() failures.  These failures cause the warning "static
key 'xxx' used before call to jump_label_init()".

Thus, early_param is too early for csd_lock_wait to run
static_branch_enable(), so changes it to __setup to fix these.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50091/">CVE-2022-50091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50091">CVE-2022-50091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244885">SUSE bug 1244885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50092" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50092" ref_url="https://www.suse.com/security/cve/CVE-2022-50092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm thin: fix use-after-free crash in dm_sm_register_threshold_callback

Fault inject on pool metadata device reports:
  BUG: KASAN: use-after-free in dm_pool_register_metadata_threshold+0x40/0x80
  Read of size 8 at addr ffff8881b9d50068 by task dmsetup/950

  CPU: 7 PID: 950 Comm: dmsetup Tainted: G        W         5.19.0-rc6 #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x34/0x44
   print_address_description.constprop.0.cold+0xeb/0x3f4
   kasan_report.cold+0xe6/0x147
   dm_pool_register_metadata_threshold+0x40/0x80
   pool_ctr+0xa0a/0x1150
   dm_table_add_target+0x2c8/0x640
   table_load+0x1fd/0x430
   ctl_ioctl+0x2c4/0x5a0
   dm_ctl_ioctl+0xa/0x10
   __x64_sys_ioctl+0xb3/0xd0
   do_syscall_64+0x35/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0

This can be easily reproduced using:
  echo offline &gt; /sys/block/sda/device/state
  dd if=/dev/zero of=/dev/mapper/thin bs=4k count=10
  dmsetup load pool --table "0 20971520 thin-pool /dev/sda /dev/sdb 128 0 0"

If a metadata commit fails, the transaction will be aborted and the
metadata space maps will be destroyed. If a DM table reload then
happens for this failed thin-pool, a use-after-free will occur in
dm_sm_register_threshold_callback (called from
dm_pool_register_metadata_threshold).

Fix this by in dm_pool_register_metadata_threshold() by returning the
-EINVAL error if the thin-pool is in fail mode. Also fail pool_ctr()
with a new error message: "Error registering metadata threshold".
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50092/">CVE-2022-50092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50092">CVE-2022-50092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244848">SUSE bug 1244848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50093" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50093" ref_url="https://www.suse.com/security/cve/CVE-2022-50093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: avoid invalid memory access via node_online(NUMA_NO_NODE)

KASAN reports:

[ 4.668325][ T0] BUG: KASAN: wild-memory-access in dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)
[    4.676149][    T0] Read of size 8 at addr 1fffffff85115558 by task swapper/0/0
[    4.683454][    T0]
[    4.685638][    T0] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc3-00004-g0e862838f290 #1
[    4.694331][    T0] Hardware name: Supermicro SYS-5018D-FN4T/X10SDV-8C-TLN4F, BIOS 1.1 03/02/2016
[    4.703196][    T0] Call Trace:
[    4.706334][    T0]  &lt;TASK&gt;
[ 4.709133][ T0] ? dmar_parse_one_rhsa (arch/x86/include/asm/bitops.h:214 arch/x86/include/asm/bitops.h:226 include/asm-generic/bitops/instrumented-non-atomic.h:142 include/linux/nodemask.h:415 drivers/iommu/intel/dmar.c:497)

after converting the type of the first argument (@nr, bit number)
of arch_test_bit() from `long` to `unsigned long`[0].

Under certain conditions (for example, when ACPI NUMA is disabled
via command line), pxm_to_node() can return %NUMA_NO_NODE (-1).
It is valid 'magic' number of NUMA node, but not valid bit number
to use in bitops.
node_online() eventually descends to test_bit() without checking
for the input, assuming it's on caller side (which might be good
for perf-critical tasks). There, -1 becomes %ULONG_MAX which leads
to an insane array index when calculating bit position in memory.

For now, add an explicit check for @node being not %NUMA_NO_NODE
before calling test_bit(). The actual logics didn't change here
at all.

[0] https://github.com/norov/linux/commit/0e862838f290147ea9c16db852d8d494b552d38d
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50093/">CVE-2022-50093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50093">CVE-2022-50093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244849">SUSE bug 1244849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50095" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50095" ref_url="https://www.suse.com/security/cve/CVE-2022-50095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-cpu-timers: Cleanup CPU timers before freeing them during exec

Commit 55e8c8eb2c7b ("posix-cpu-timers: Store a reference to a pid not a
task") started looking up tasks by PID when deleting a CPU timer.

When a non-leader thread calls execve, it will switch PIDs with the leader
process. Then, as it calls exit_itimers, posix_cpu_timer_del cannot find
the task because the timer still points out to the old PID.

That means that armed timers won't be disarmed, that is, they won't be
removed from the timerqueue_list. exit_itimers will still release their
memory, and when that list is later processed, it leads to a
use-after-free.

Clean up the timers from the de-threaded task before freeing them. This
prevents a reported use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50095/">CVE-2022-50095 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50095">CVE-2022-50095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244846">SUSE bug 1244846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50100" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50100" ref_url="https://www.suse.com/security/cve/CVE-2022-50100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/core: Do not requeue task on CPU excluded from cpus_mask

The following warning was triggered on a large machine early in boot on
a distribution kernel but the same problem should also affect mainline.

   WARNING: CPU: 439 PID: 10 at ../kernel/workqueue.c:2231 process_one_work+0x4d/0x440
   Call Trace:
    &lt;TASK&gt;
    rescuer_thread+0x1f6/0x360
    kthread+0x156/0x180
    ret_from_fork+0x22/0x30
    &lt;/TASK&gt;

Commit c6e7bd7afaeb ("sched/core: Optimize ttwu() spinning on p-&gt;on_cpu")
optimises ttwu by queueing a task that is descheduling on the wakelist,
but does not check if the task descheduling is still allowed to run on that CPU.

In this warning, the problematic task is a workqueue rescue thread which
checks if the rescue is for a per-cpu workqueue and running on the wrong CPU.
While this is early in boot and it should be possible to create workers,
the rescue thread may still used if the MAYDAY_INITIAL_TIMEOUT is reached
or MAYDAY_INTERVAL and on a sufficiently large machine, the rescue
thread is being used frequently.

Tracing confirmed that the task should have migrated properly using the
stopper thread to handle the migration. However, a parallel wakeup from udev
running on another CPU that does not share CPU cache observes p-&gt;on_cpu and
uses task_cpu(p), queues the task on the old CPU and triggers the warning.

Check that the wakee task that is descheduling is still allowed to run
on its current CPU and if not, wait for the descheduling to complete
and select an allowed CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50100/">CVE-2022-50100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50100">CVE-2022-50100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244843">SUSE bug 1244843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50107" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50107" ref_url="https://www.suse.com/security/cve/CVE-2022-50107" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix memory leak when using fscache

If we hit the 'index == next_cached' case, we leak a refcount on the
struct page.  Fix this by using readahead_folio() which takes care of
the refcount for you.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50107/">CVE-2022-50107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50107">CVE-2022-50107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244833">SUSE bug 1244833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50110" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50110" ref_url="https://www.suse.com/security/cve/CVE-2022-50110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

watchdog: sp5100_tco: Fix a memory leak of EFCH MMIO resource

Unlike release_mem_region(), a call to release_resource() does not
free the resource, so it has to be freed explicitly to avoid a memory
leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50110/">CVE-2022-50110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50110">CVE-2022-50110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244830">SUSE bug 1244830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50111" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50111" ref_url="https://www.suse.com/security/cve/CVE-2022-50111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mt6359: Fix refcount leak bug

In mt6359_parse_dt() and mt6359_accdet_parse_dt(), we should call
of_node_put() for the reference returned by of_get_child_by_name()
which has increased the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50111/">CVE-2022-50111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50111">CVE-2022-50111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244831">SUSE bug 1244831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50112" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50112" ref_url="https://www.suse.com/security/cve/CVE-2022-50112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpmsg: qcom_smd: Fix refcount leak in qcom_smd_parse_edge

of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50112/">CVE-2022-50112 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50112">CVE-2022-50112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244832">SUSE bug 1244832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50113" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50113" ref_url="https://www.suse.com/security/cve/CVE-2022-50113" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoc: audio-graph-card2: Fix refcount leak bug in __graph_get_type()

We should call of_node_put() for the reference before its replacement
as it returned by of_get_parent() which has increased the refcount.
Besides, we should also call of_node_put() before return.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50113/">CVE-2022-50113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50113">CVE-2022-50113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244828">SUSE bug 1244828</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50115</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50115" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50115" ref_url="https://www.suse.com/security/cve/CVE-2022-50115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: ipc3-topology: Prevent double freeing of ipc_control_data via load_bytes

We have sanity checks for byte controls and if any of the fail the locally
allocated scontrol-&gt;ipc_control_data is freed up, but not set to NULL.

On a rollback path of the error the higher level code will also try to free
the scontrol-&gt;ipc_control_data which will eventually going to lead to
memory corruption as double freeing memory is not a good thing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50115/">CVE-2022-50115 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50115">CVE-2022-50115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244827">SUSE bug 1244827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50116" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50116" ref_url="https://www.suse.com/security/cve/CVE-2022-50116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix deadlock and link starvation in outgoing data path

The current implementation queues up new control and user packets as needed
and processes this queue down to the ldisc in the same code path.
That means that the upper and the lower layer are hard coupled in the code.
Due to this deadlocks can happen as seen below while transmitting data,
especially during ldisc congestion. Furthermore, the data channels starve
the control channel on high transmission load on the ldisc.

Introduce an additional control channel data queue to prevent timeouts and
link hangups during ldisc congestion. This is being processed before the
user channel data queue in gsm_data_kick(), i.e. with the highest priority.
Put the queue to ldisc data path into a workqueue and trigger it whenever
new data has been put into the transmission queue. Change
gsm_dlci_data_sweep() accordingly to fill up the transmission queue until
TX_THRESH_HI. This solves the locking issue, keeps latency low and provides
good performance on high data load.
Note that now all packets from a DLCI are removed from the internal queue
if the associated DLCI was closed. This ensures that no data is sent by the
introduced write task to an already closed DLCI.

BUG: spinlock recursion on CPU#0, test_v24_loop/124
 lock: serial8250_ports+0x3a8/0x7500, .magic: dead4ead, .owner: test_v24_loop/124, .owner_cpu: 0
CPU: 0 PID: 124 Comm: test_v24_loop Tainted: G           O      5.18.0-rc2 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x34/0x44
 do_raw_spin_lock+0x76/0xa0
 _raw_spin_lock_irqsave+0x72/0x80
 uart_write_room+0x3b/0xc0
 gsm_data_kick+0x14b/0x240 [n_gsm]
 gsmld_write_wakeup+0x35/0x70 [n_gsm]
 tty_wakeup+0x53/0x60
 tty_port_default_wakeup+0x1b/0x30
 serial8250_tx_chars+0x12f/0x220
 serial8250_handle_irq.part.0+0xfe/0x150
 serial8250_default_handle_irq+0x48/0x80
 serial8250_interrupt+0x56/0xa0
 __handle_irq_event_percpu+0x78/0x1f0
 handle_irq_event+0x34/0x70
 handle_fasteoi_irq+0x90/0x1e0
 __common_interrupt+0x69/0x100
 common_interrupt+0x48/0xc0
 asm_common_interrupt+0x1e/0x40
RIP: 0010:__do_softirq+0x83/0x34e
Code: 2a 0a ff 0f b7 ed c7 44 24 10 0a 00 00 00 48 c7 c7 51 2a 64 82 e8 2d
e2 d5 ff 65 66 c7 05 83 af 1e 7e 00 00 fb b8 ff ff ff ff &lt;49&gt; c7 c2 40 61
80 82 0f bc c5 41 89 c4 41 83 c4 01 0f 84 e6 00 00
RSP: 0018:ffffc90000003f98 EFLAGS: 00000286
RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff82642a51 RDI: ffffffff825bb5e7
RBP: 0000000000000200 R08: 00000008de3271a8 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000030 R14: 0000000000000000 R15: 0000000000000000
 ? __do_softirq+0x73/0x34e
 irq_exit_rcu+0xb5/0x100
 common_interrupt+0xa4/0xc0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_common_interrupt+0x1e/0x40
RIP: 0010:_raw_spin_unlock_irqrestore+0x2e/0x50
Code: 00 55 48 89 fd 48 83 c7 18 53 48 89 f3 48 8b 74 24 10 e8 85 28 36 ff
48 89 ef e8 cd 58 36 ff 80 e7 02 74 01 fb bf 01 00 00 00 &lt;e8&gt; 3d 97 33 ff
65 8b 05 96 23 2b 7e 85 c0 74 03 5b 5d c3 0f 1f 44
RSP: 0018:ffffc9000020fd08 EFLAGS: 00000202
RAX: 0000000000000000 RBX: 0000000000000246 RCX: 0000000000000000
RDX: 0000000000000004 RSI: ffffffff8257fd74 RDI: 0000000000000001
RBP: ffff8880057de3a0 R08: 00000008de233000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000100 R14: 0000000000000202 R15: ffff8880057df0b8
 ? _raw_spin_unlock_irqrestore+0x23/0x50
 gsmtty_write+0x65/0x80 [n_gsm]
 n_tty_write+0x33f/0x530
 ? swake_up_all+0xe0/0xe0
 file_tty_write.constprop.0+0x1b1/0x320
 ? n_tty_flush_buffer+0xb0/0xb0
 new_sync_write+0x10c/0x190
 vfs_write+0x282/0x310
 ksys_write+0x68/0xe0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f3e5e35c15c
Code: 8b 7c 24 08 89 c5 e8 c5 ff ff ff 89 ef 89 44 24
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50116/">CVE-2022-50116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50116">CVE-2022-50116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244824">SUSE bug 1244824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50117" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50117" ref_url="https://www.suse.com/security/cve/CVE-2022-50117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio: Split migration ops from main device ops

vfio core checks whether the driver sets some migration op (e.g.
set_state/get_state) and accordingly calls its op.

However, currently mlx5 driver sets the above ops without regards to its
migration caps.

This might lead to unexpected usage/Oops if user space may call to the
above ops even if the driver doesn't support migration. As for example,
the migration state_mutex is not initialized in that case.

The cleanest way to manage that seems to split the migration ops from
the main device ops, this will let the driver setting them separately
from the main ops when it's applicable.

As part of that, validate ops construction on registration and include a
check for VFIO_MIGRATION_STOP_COPY since the uAPI claims it must be set
in migration_flags.

HISI driver was changed as well to match this scheme.

This scheme may enable down the road to come with some extra group of
ops (e.g. DMA log) that can be set without regards to the other options
based on driver caps.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50117/">CVE-2022-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50117">CVE-2022-50117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244826">SUSE bug 1244826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50120" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50120" ref_url="https://www.suse.com/security/cve/CVE-2022-50120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init

of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not needed anymore.
This function has two paths missing of_node_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50120/">CVE-2022-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50120">CVE-2022-50120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244819">SUSE bug 1244819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50121" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50121" ref_url="https://www.suse.com/security/cve/CVE-2022-50121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init

Every iteration of for_each_available_child_of_node() decrements
the reference count of the previous node.
When breaking early from a for_each_available_child_of_node() loop,
we need to explicitly call of_node_put() on the child node.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50121/">CVE-2022-50121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50121">CVE-2022-50121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244823">SUSE bug 1244823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50122" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50122" ref_url="https://www.suse.com/security/cve/CVE-2022-50122" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8173-rt5650: Fix refcount leak in mt8173_rt5650_dev_probe

of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Fix refcount leak in some error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50122/">CVE-2022-50122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50122">CVE-2022-50122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244818">SUSE bug 1244818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50123" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50123" ref_url="https://www.suse.com/security/cve/CVE-2022-50123" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8173: Fix refcount leak in mt8173_rt5650_rt5676_dev_probe

of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Fix missing of_node_put() in error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50123/">CVE-2022-50123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50123">CVE-2022-50123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244817">SUSE bug 1244817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50124" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50124" ref_url="https://www.suse.com/security/cve/CVE-2022-50124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe

of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50124/">CVE-2022-50124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50124">CVE-2022-50124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244816">SUSE bug 1244816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50125" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50125" ref_url="https://www.suse.com/security/cve/CVE-2022-50125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe

of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50125/">CVE-2022-50125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50125">CVE-2022-50125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244814">SUSE bug 1244814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50126" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50126" ref_url="https://www.suse.com/security/cve/CVE-2022-50126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: fix assertion 'jh-&gt;b_frozen_data == NULL' failure when journal aborted

Following process will fail assertion 'jh-&gt;b_frozen_data == NULL' in
jbd2_journal_dirty_metadata():

                   jbd2_journal_commit_transaction
unlink(dir/a)
 jh-&gt;b_transaction = trans1
 jh-&gt;b_jlist = BJ_Metadata
                    journal-&gt;j_running_transaction = NULL
                    trans1-&gt;t_state = T_COMMIT
unlink(dir/b)
 handle-&gt;h_trans = trans2
 do_get_write_access
  jh-&gt;b_modified = 0
  jh-&gt;b_frozen_data = frozen_buffer
  jh-&gt;b_next_transaction = trans2
 jbd2_journal_dirty_metadata
  is_handle_aborted
   is_journal_aborted // return false

           --&gt; jbd2 abort &lt;--

                     while (commit_transaction-&gt;t_buffers)
                      if (is_journal_aborted)
                       jbd2_journal_refile_buffer
                        __jbd2_journal_refile_buffer
                         WRITE_ONCE(jh-&gt;b_transaction,
						jh-&gt;b_next_transaction)
                         WRITE_ONCE(jh-&gt;b_next_transaction, NULL)
                         __jbd2_journal_file_buffer(jh, BJ_Reserved)
        J_ASSERT_JH(jh, jh-&gt;b_frozen_data == NULL) // assertion failure !

The reproducer (See detail in [Link]) reports:
 ------------[ cut here ]------------
 kernel BUG at fs/jbd2/transaction.c:1629!
 invalid opcode: 0000 [#1] PREEMPT SMP
 CPU: 2 PID: 584 Comm: unlink Tainted: G        W
 5.19.0-rc6-00115-g4a57a8400075-dirty #697
 RIP: 0010:jbd2_journal_dirty_metadata+0x3c5/0x470
 RSP: 0018:ffffc90000be7ce0 EFLAGS: 00010202
 Call Trace:
  &lt;TASK&gt;
  __ext4_handle_dirty_metadata+0xa0/0x290
  ext4_handle_dirty_dirblock+0x10c/0x1d0
  ext4_delete_entry+0x104/0x200
  __ext4_unlink+0x22b/0x360
  ext4_unlink+0x275/0x390
  vfs_unlink+0x20b/0x4c0
  do_unlinkat+0x42f/0x4c0
  __x64_sys_unlink+0x37/0x50
  do_syscall_64+0x35/0x80

After journal aborting, __jbd2_journal_refile_buffer() is executed with
holding @jh-&gt;b_state_lock, we can fix it by moving 'is_handle_aborted()'
into the area protected by @jh-&gt;b_state_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50126/">CVE-2022-50126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50126">CVE-2022-50126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244813">SUSE bug 1244813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50127" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50127" ref_url="https://www.suse.com/security/cve/CVE-2022-50127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix error unwind in rxe_create_qp()

In the function rxe_create_qp(), rxe_qp_from_init() is called to
initialize qp, internally things like the spin locks are not setup until
rxe_qp_init_req().

If an error occures before this point then the unwind will call
rxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()
which will oops when trying to access the uninitialized spinlock.

Move the spinlock initializations earlier before any failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50127/">CVE-2022-50127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50127">CVE-2022-50127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244815">SUSE bug 1244815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50129" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50129" ref_url="https://www.suse.com/security/cve/CVE-2022-50129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Fix a use-after-free

Change the LIO port members inside struct srpt_port from regular members
into pointers. Allocate the LIO port data structures from inside
srpt_make_tport() and free these from inside srpt_make_tport(). Keep
struct srpt_device as long as either an RDMA port or a LIO target port is
associated with it. This patch decouples the lifetime of struct srpt_port
(controlled by the RDMA core) and struct srpt_port_id (controlled by LIO).
This patch fixes the following KASAN complaint:

  BUG: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt]
  Read of size 8 at addr ffff888141cc34b8 by task check/5093

  Call Trace:
   &lt;TASK&gt;
   show_stack+0x4e/0x53
   dump_stack_lvl+0x51/0x66
   print_address_description.constprop.0.cold+0xea/0x41e
   print_report.cold+0x90/0x205
   kasan_report+0xb9/0xf0
   __asan_load8+0x69/0x90
   srpt_enable_tpg+0x31/0x70 [ib_srpt]
   target_fabric_tpg_base_enable_store+0xe2/0x140 [target_core_mod]
   configfs_write_iter+0x18b/0x210
   new_sync_write+0x1f2/0x2f0
   vfs_write+0x3e3/0x540
   ksys_write+0xbb/0x140
   __x64_sys_write+0x42/0x50
   do_syscall_64+0x34/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50129/">CVE-2022-50129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50129">CVE-2022-50129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244811">SUSE bug 1244811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50131" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50131" ref_url="https://www.suse.com/security/cve/CVE-2022-50131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: mcp2221: prevent a buffer overflow in mcp_smbus_write()

Smatch Warning:
drivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy()
'&amp;mcp-&gt;txbuf[5]' too small (59 vs 255)
drivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() 'buf'
too small (34 vs 255)

The 'len' variable can take a value between 0-255 as it can come from
data-&gt;block[0] and it is user data. So add an bound check to prevent a
buffer overflow in memcpy().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50131/">CVE-2022-50131 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50131">CVE-2022-50131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244807">SUSE bug 1244807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50132</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50132" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50132" ref_url="https://www.suse.com/security/cve/CVE-2022-50132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: change place of 'priv_ep' assignment in cdns3_gadget_ep_dequeue(), cdns3_gadget_ep_enable()

If 'ep' is NULL, result of ep_to_cdns3_ep(ep) is invalid pointer
and its dereference with priv_ep-&gt;cdns3_dev may cause panic.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50132/">CVE-2022-50132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50132">CVE-2022-50132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244808">SUSE bug 1244808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50133" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50133" ref_url="https://www.suse.com/security/cve/CVE-2022-50133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci_plat_remove: avoid NULL dereference

Since commit 4736ebd7fcaff1eb8481c140ba494962847d6e0a ("usb: host:
xhci-plat: omit shared hcd if either root hub has no ports")
xhci-&gt;shared_hcd can be NULL, which causes the following Oops
on reboot:

[  710.124450] systemd-shutdown[1]: Rebooting.
[  710.298861] xhci-hcd xhci-hcd.2.auto: remove, state 4
[  710.304217] usb usb3: USB disconnect, device number 1
[  710.317441] xhci-hcd xhci-hcd.2.auto: USB bus 3 deregistered
[  710.323280] xhci-hcd xhci-hcd.2.auto: remove, state 1
[  710.328401] usb usb2: USB disconnect, device number 1
[  710.333515] usb 2-3: USB disconnect, device number 2
[  710.467649] xhci-hcd xhci-hcd.2.auto: USB bus 2 deregistered
[  710.475450] Unable to handle kernel NULL pointer dereference at virtual address 00000000000003b8
[  710.484425] Mem abort info:
[  710.487265]   ESR = 0x0000000096000004
[  710.491060]   EC = 0x25: DABT (current EL), IL = 32 bits
[  710.496427]   SET = 0, FnV = 0
[  710.499525]   EA = 0, S1PTW = 0
[  710.502716]   FSC = 0x04: level 0 translation fault
[  710.507648] Data abort info:
[  710.510577]   ISV = 0, ISS = 0x00000004
[  710.514462]   CM = 0, WnR = 0
[  710.517480] user pgtable: 4k pages, 48-bit VAs, pgdp=00000008b0050000
[  710.523976] [00000000000003b8] pgd=0000000000000000, p4d=0000000000000000
[  710.530961] Internal error: Oops: 96000004 [#1] PREEMPT SMP
[  710.536551] Modules linked in: rfkill input_leds snd_soc_simple_card snd_soc_simple_card_utils snd_soc_nau8822 designware_i2s snd_soc_core dw_hdmi_ahb_audio snd_pcm_dmaengine arm_ccn panfrost ac97_bus gpu_sched snd_pcm at24 fuse configfs sdhci_of_dwcmshc sdhci_pltfm sdhci nvme led_class mmc_core nvme_core bt1_pvt polynomial tp_serio snd_seq_midi snd_seq_midi_event snd_seq snd_timer snd_rawmidi snd_seq_device snd soundcore efivarfs ipv6
[  710.575286] CPU: 7 PID: 1 Comm: systemd-shutdow Not tainted 5.19.0-rc7-00043-gfd8619f4fd54 #1
[  710.583822] Hardware name: T-Platforms TF307-MB/BM1BM1-A, BIOS 5.6 07/06/2022
[  710.590972] pstate: 40000005 (nZcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  710.597949] pc : usb_remove_hcd+0x34/0x1e4
[  710.602067] lr : xhci_plat_remove+0x74/0x140
[  710.606351] sp : ffff800009f3b7c0
[  710.609674] x29: ffff800009f3b7c0 x28: ffff000800960040 x27: 0000000000000000
[  710.616833] x26: ffff800008dc22a0 x25: 0000000000000000 x24: 0000000000000000
[  710.623992] x23: 0000000000000000 x22: ffff000805465810 x21: ffff000805465800
[  710.631149] x20: ffff000800f80000 x19: 0000000000000000 x18: ffffffffffffffff
[  710.638307] x17: ffff000805096000 x16: ffff00080633b800 x15: ffff000806537a1c
[  710.645465] x14: 0000000000000001 x13: 0000000000000000 x12: ffff00080378d6f0
[  710.652621] x11: ffff00080041a900 x10: ffff800009b204e8 x9 : ffff8000088abaa4
[  710.659779] x8 : ffff000800960040 x7 : ffff800009409000 x6 : 0000000000000001
[  710.666936] x5 : ffff800009241000 x4 : ffff800009241440 x3 : 0000000000000000
[  710.674094] x2 : ffff000800960040 x1 : ffff000800960040 x0 : 0000000000000000
[  710.681251] Call trace:
[  710.683704]  usb_remove_hcd+0x34/0x1e4
[  710.687467]  xhci_plat_remove+0x74/0x140
[  710.691400]  platform_remove+0x34/0x70
[  710.695165]  device_remove+0x54/0x90
[  710.698753]  device_release_driver_internal+0x200/0x270
[  710.703992]  device_release_driver+0x24/0x30
[  710.708273]  bus_remove_device+0xe0/0x16c
[  710.712293]  device_del+0x178/0x390
[  710.715797]  platform_device_del.part.0+0x24/0x90
[  710.720514]  platform_device_unregister+0x30/0x50
[  710.725232]  dwc3_host_exit+0x20/0x30
[  710.728907]  dwc3_remove+0x174/0x1b0
[  710.732494]  platform_remove+0x34/0x70
[  710.736254]  device_remove+0x54/0x90
[  710.739840]  device_release_driver_internal+0x200/0x270
[  710.745078]  device_release_driver+0x24/0x30
[  710.749359]  bus_remove_device+0xe0/0x16c
[  710.753380]  device_del+0x178/0x390
[  710.756881]  platform_device_del.part
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50133/">CVE-2022-50133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50133">CVE-2022-50133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244806">SUSE bug 1244806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50135" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50135" ref_url="https://www.suse.com/security/cve/CVE-2022-50135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup

The function rxe_create_qp calls rxe_qp_from_init. If some error
occurs, the error handler of function rxe_qp_from_init will set
both scq and rcq to NULL.

Then rxe_create_qp calls rxe_put to handle qp. In the end,
rxe_qp_do_cleanup is called by rxe_put. rxe_qp_do_cleanup directly
accesses scq and rcq before checking them. This will cause
null-ptr-deref error.

The call graph is as below:

rxe_create_qp {
  ...
  rxe_qp_from_init {
    ...
  err1:
    ...
    qp-&gt;rcq = NULL;  &lt;---rcq is set to NULL
    qp-&gt;scq = NULL;  &lt;---scq is set to NULL
    ...
  }

qp_init:
  rxe_put{
    ...
    rxe_qp_do_cleanup {
      ...
      atomic_dec(&amp;qp-&gt;scq-&gt;num_wq); &lt;--- scq is accessed
      ...
      atomic_dec(&amp;qp-&gt;rcq-&gt;num_wq); &lt;--- rcq is accessed
    }
}
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50135/">CVE-2022-50135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50135">CVE-2022-50135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244805">SUSE bug 1244805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50136" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50136" ref_url="https://www.suse.com/security/cve/CVE-2022-50136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix duplicated reported IW_CM_EVENT_CONNECT_REPLY event

If siw_recv_mpa_rr returns -EAGAIN, it means that the MPA reply hasn't
been received completely, and should not report IW_CM_EVENT_CONNECT_REPLY
in this case. This may trigger a call trace in iw_cm. A simple way to
trigger this:
 server: ib_send_lat
 client: ib_send_lat -R &lt;server_ip&gt;

The call trace looks like this:

 kernel BUG at drivers/infiniband/core/iwcm.c:894!
 invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
 &lt;...&gt;
 Workqueue: iw_cm_wq cm_work_handler [iw_cm]
 Call Trace:
  &lt;TASK&gt;
  cm_work_handler+0x1dd/0x370 [iw_cm]
  process_one_work+0x1e2/0x3b0
  worker_thread+0x49/0x2e0
  ? rescuer_thread+0x370/0x370
  kthread+0xe5/0x110
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50136/">CVE-2022-50136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50136">CVE-2022-50136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244804">SUSE bug 1244804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50137</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50137" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50137" ref_url="https://www.suse.com/security/cve/CVE-2022-50137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix a window for use-after-free

During a destroy CQ an interrupt may cause processing of a CQE after CQ
resources are freed by irdma_cq_free_rsrc(). Fix this by moving the call
to irdma_cq_free_rsrc() after the irdma_sc_cleanup_ceqes(), which is
called under the cq_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50137/">CVE-2022-50137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50137">CVE-2022-50137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244800">SUSE bug 1244800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50138</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50138" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50138" ref_url="https://www.suse.com/security/cve/CVE-2022-50138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/qedr: Fix potential memory leak in __qedr_alloc_mr()

__qedr_alloc_mr() allocates a memory chunk for "mr-&gt;info.pbl_table" with
init_mr_info(). When rdma_alloc_tid() and rdma_register_tid() fail, "mr"
is released while "mr-&gt;info.pbl_table" is not released, which will lead
to a memory leak.

We should release the "mr-&gt;info.pbl_table" with qedr_free_pbl() when error
occurs to fix the memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50138/">CVE-2022-50138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50138">CVE-2022-50138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244797">SUSE bug 1244797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50139</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50139" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50139" ref_url="https://www.suse.com/security/cve/CVE-2022-50139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: aspeed-vhub: Fix refcount leak bug in ast_vhub_init_desc()

We should call of_node_put() for the reference returned by
of_get_child_by_name() which has increased the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50139/">CVE-2022-50139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50139">CVE-2022-50139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244798">SUSE bug 1244798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50143</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50143" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50143" ref_url="https://www.suse.com/security/cve/CVE-2022-50143" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

intel_th: Fix a resource leak in an error handling path

If an error occurs after calling 'pci_alloc_irq_vectors()',
'pci_free_irq_vectors()' must be called as already done in the remove
function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50143/">CVE-2022-50143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50143">CVE-2022-50143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244790">SUSE bug 1244790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50146</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50146" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50146" ref_url="https://www.suse.com/security/cve/CVE-2022-50146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: dwc: Deallocate EPC memory on dw_pcie_ep_init() errors

If dw_pcie_ep_init() fails to perform any action after the EPC memory is
initialized and the MSI memory region is allocated, the latter parts won't
be undone thus causing a memory leak.  Add a cleanup-on-error path to fix
these leaks.

[bhelgaas: commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50146/">CVE-2022-50146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50146">CVE-2022-50146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244788">SUSE bug 1244788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50147" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50147" ref_url="https://www.suse.com/security/cve/CVE-2022-50147" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: fix get_nodes out of bound access

When user specified more nodes than supported, get_nodes will access nmask
array out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50147/">CVE-2022-50147 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50147">CVE-2022-50147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244882">SUSE bug 1244882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50148" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50148" ref_url="https://www.suse.com/security/cve/CVE-2022-50148" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kernfs: fix potential NULL dereference in __kernfs_remove

When lockdep is enabled, lockdep_assert_held_write would
cause potential NULL pointer dereference.

Fix the following smatch warnings:

fs/kernfs/dir.c:1353 __kernfs_remove() warn: variable dereferenced before check 'kn' (see line 1346)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50148/">CVE-2022-50148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50148">CVE-2022-50148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244880">SUSE bug 1244880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50149</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50149" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50149" ref_url="https://www.suse.com/security/cve/CVE-2022-50149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: fix potential deadlock in __driver_attach

In __driver_attach function, There are also AA deadlock problem,
like the commit b232b02bf3c2 ("driver core: fix deadlock in
__device_attach").

stack like commit b232b02bf3c2 ("driver core: fix deadlock in
__device_attach").
list below:
    In __driver_attach function, The lock holding logic is as follows:
    ...
    __driver_attach
    if (driver_allows_async_probing(drv))
      device_lock(dev)      // get lock dev
        async_schedule_dev(__driver_attach_async_helper, dev); // func
          async_schedule_node
            async_schedule_node_domain(func)
              entry = kzalloc(sizeof(struct async_entry), GFP_ATOMIC);
              /* when fail or work limit, sync to execute func, but
                 __driver_attach_async_helper will get lock dev as
                 will, which will lead to A-A deadlock.  */
              if (!entry || atomic_read(&amp;entry_count) &gt; MAX_WORK) {
                func;
              else
                queue_work_node(node, system_unbound_wq, &amp;entry-&gt;work)
      device_unlock(dev)

    As above show, when it is allowed to do async probes, because of
    out of memory or work limit, async work is not be allowed, to do
    sync execute instead. it will lead to A-A deadlock because of
    __driver_attach_async_helper getting lock dev.

Reproduce:
and it can be reproduce by make the condition
(if (!entry || atomic_read(&amp;entry_count) &gt; MAX_WORK)) untenable, like
below:

[  370.785650] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables
this message.
[  370.787154] task:swapper/0       state:D stack:    0 pid:    1 ppid:
0 flags:0x00004000
[  370.788865] Call Trace:
[  370.789374]  &lt;TASK&gt;
[  370.789841]  __schedule+0x482/0x1050
[  370.790613]  schedule+0x92/0x1a0
[  370.791290]  schedule_preempt_disabled+0x2c/0x50
[  370.792256]  __mutex_lock.isra.0+0x757/0xec0
[  370.793158]  __mutex_lock_slowpath+0x1f/0x30
[  370.794079]  mutex_lock+0x50/0x60
[  370.794795]  __device_driver_lock+0x2f/0x70
[  370.795677]  ? driver_probe_device+0xd0/0xd0
[  370.796576]  __driver_attach_async_helper+0x1d/0xd0
[  370.797318]  ? driver_probe_device+0xd0/0xd0
[  370.797957]  async_schedule_node_domain+0xa5/0xc0
[  370.798652]  async_schedule_node+0x19/0x30
[  370.799243]  __driver_attach+0x246/0x290
[  370.799828]  ? driver_allows_async_probing+0xa0/0xa0
[  370.800548]  bus_for_each_dev+0x9d/0x130
[  370.801132]  driver_attach+0x22/0x30
[  370.801666]  bus_add_driver+0x290/0x340
[  370.802246]  driver_register+0x88/0x140
[  370.802817]  ? virtio_scsi_init+0x116/0x116
[  370.803425]  scsi_register_driver+0x1a/0x30
[  370.804057]  init_sd+0x184/0x226
[  370.804533]  do_one_initcall+0x71/0x3a0
[  370.805107]  kernel_init_freeable+0x39a/0x43a
[  370.805759]  ? rest_init+0x150/0x150
[  370.806283]  kernel_init+0x26/0x230
[  370.806799]  ret_from_fork+0x1f/0x30

To fix the deadlock, move the async_schedule_dev outside device_lock,
as we can see, in async_schedule_node_domain, the parameter of
queue_work_node is system_unbound_wq, so it can accept concurrent
operations. which will also not change the code logic, and will
not lead to deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50149/">CVE-2022-50149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50149">CVE-2022-50149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244883">SUSE bug 1244883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50151" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50151" ref_url="https://www.suse.com/security/cve/CVE-2022-50151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: fix random warning message when driver load

Warning log:
[    4.141392] Unexpected gfp: 0x4 (GFP_DMA32). Fixing up to gfp: 0xa20 (GFP_ATOMIC). Fix your code!
[    4.150340] CPU: 1 PID: 175 Comm: 1-0050 Not tainted 5.15.5-00039-g2fd9ae1b568c #20
[    4.158010] Hardware name: Freescale i.MX8QXP MEK (DT)
[    4.163155] Call trace:
[    4.165600]  dump_backtrace+0x0/0x1b0
[    4.169286]  show_stack+0x18/0x68
[    4.172611]  dump_stack_lvl+0x68/0x84
[    4.176286]  dump_stack+0x18/0x34
[    4.179613]  kmalloc_fix_flags+0x60/0x88
[    4.183550]  new_slab+0x334/0x370
[    4.186878]  ___slab_alloc.part.108+0x4d4/0x748
[    4.191419]  __slab_alloc.isra.109+0x30/0x78
[    4.195702]  kmem_cache_alloc+0x40c/0x420
[    4.199725]  dma_pool_alloc+0xac/0x1f8
[    4.203486]  cdns3_allocate_trb_pool+0xb4/0xd0

pool_alloc_page(struct dma_pool *pool, gfp_t mem_flags)
{
	...
	page = kmalloc(sizeof(*page), mem_flags);
	page-&gt;vaddr = dma_alloc_coherent(pool-&gt;dev, pool-&gt;allocation,
					 &amp;page-&gt;dma, mem_flags);
	...
}

kmalloc was called with mem_flags, which is passed down in
cdns3_allocate_trb_pool() and have GFP_DMA32 flags.
kmall_fix_flags() report warning.

GFP_DMA32 is not useful at all. dma_alloc_coherent() will handle
DMA memory region correctly by pool-&gt;dev. GFP_DMA32 can be removed
safely.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50151/">CVE-2022-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50151">CVE-2022-50151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245093">SUSE bug 1245093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50152</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50152" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50152" ref_url="https://www.suse.com/security/cve/CVE-2022-50152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe

of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50152/">CVE-2022-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50152">CVE-2022-50152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244783">SUSE bug 1244783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50153" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50153" ref_url="https://www.suse.com/security/cve/CVE-2022-50153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: Fix refcount leak in ehci_hcd_ppc_of_probe

of_find_compatible_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when done.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50153/">CVE-2022-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50153">CVE-2022-50153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244786">SUSE bug 1244786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50154" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50154" ref_url="https://www.suse.com/security/cve/CVE-2022-50154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: mediatek-gen3: Fix refcount leak in mtk_pcie_init_irq_domains()

of_get_child_by_name() returns a node pointer with refcount incremented, so
we should use of_node_put() on it when we don't need it anymore.

Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50154/">CVE-2022-50154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50154">CVE-2022-50154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244784">SUSE bug 1244784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50156" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50156" ref_url="https://www.suse.com/security/cve/CVE-2022-50156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: cp2112: prevent a buffer overflow in cp2112_xfer()

Smatch warnings:
drivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy()
'data-&gt;block[1]' too small (33 vs 255)
drivers/hid/hid-cp2112.c:793 cp2112_xfer() error: __memcpy() 'buf' too
small (64 vs 255)

The 'read_length' variable is provided by 'data-&gt;block[0]' which comes
from user and it(read_length) can take a value between 0-255. Add an
upper bound to 'read_length' variable to prevent a buffer overflow in
memcpy().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50156/">CVE-2022-50156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50156">CVE-2022-50156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244782">SUSE bug 1244782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50157</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50157" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50157" ref_url="https://www.suse.com/security/cve/CVE-2022-50157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: microchip: Fix refcount leak in mc_pcie_init_irq_domains()

of_get_next_child() returns a node pointer with refcount incremented, so we
should use of_node_put() on it when we don't need it anymore.

mc_pcie_init_irq_domains() only calls of_node_put() in the normal path,
missing it in some error paths.  Add missing of_node_put() to avoid
refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50157/">CVE-2022-50157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50157">CVE-2022-50157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244780">SUSE bug 1244780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50159" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50159" ref_url="https://www.suse.com/security/cve/CVE-2022-50159" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: check previous kernel's ima-kexec-buffer against memory bounds

Presently ima_get_kexec_buffer() doesn't check if the previous kernel's
ima-kexec-buffer lies outside the addressable memory range. This can result
in a kernel panic if the new kernel is booted with 'mem=X' arg and the
ima-kexec-buffer was allocated beyond that range by the previous kernel.
The panic is usually of the form below:

$ sudo kexec --initrd initrd vmlinux --append='mem=16G'

&lt;snip&gt;
 BUG: Unable to handle kernel data access on read at 0xc000c01fff7f0000
 Faulting instruction address: 0xc000000000837974
 Oops: Kernel access of bad area, sig: 11 [#1]
&lt;snip&gt;
 NIP [c000000000837974] ima_restore_measurement_list+0x94/0x6c0
 LR [c00000000083b55c] ima_load_kexec_buffer+0xac/0x160
 Call Trace:
 [c00000000371fa80] [c00000000083b55c] ima_load_kexec_buffer+0xac/0x160
 [c00000000371fb00] [c0000000020512c4] ima_init+0x80/0x108
 [c00000000371fb70] [c0000000020514dc] init_ima+0x4c/0x120
 [c00000000371fbf0] [c000000000012240] do_one_initcall+0x60/0x2c0
 [c00000000371fcc0] [c000000002004ad0] kernel_init_freeable+0x344/0x3ec
 [c00000000371fda0] [c0000000000128a4] kernel_init+0x34/0x1b0
 [c00000000371fe10] [c00000000000ce64] ret_from_kernel_thread+0x5c/0x64
 Instruction dump:
 f92100b8 f92100c0 90e10090 910100a0 4182050c 282a0017 3bc00000 40810330
 7c0802a6 fb610198 7c9b2378 f80101d0 &lt;a1240000&gt; 2c090001 40820614 e9240010
 ---[ end trace 0000000000000000 ]---

Fix this issue by checking returned PFN range of previous kernel's
ima-kexec-buffer with page_is_ram() to ensure correct memory bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50159/">CVE-2022-50159 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50159">CVE-2022-50159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244777">SUSE bug 1244777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50164</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50164" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50164" ref_url="https://www.suse.com/security/cve/CVE-2022-50164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: fix double list_add at iwl_mvm_mac_wake_tx_queue

After successfull station association, if station queues are disabled for
some reason, the related lists are not emptied. So if some new element is
added to the list in iwl_mvm_mac_wake_tx_queue, it can match with the old
one and produce a BUG like this:

[   46.535263] list_add corruption. prev-&gt;next should be next (ffff94c1c318a360), but was 0000000000000000. (prev=ffff94c1d02d3388).
[   46.535283] ------------[ cut here ]------------
[   46.535284] kernel BUG at lib/list_debug.c:26!
[   46.535290] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[   46.585304] CPU: 0 PID: 623 Comm: wpa_supplicant Not tainted 5.19.0-rc3+ #1
[   46.592380] Hardware name: Dell Inc. Inspiron 660s/0478VN       , BIOS A07 08/24/2012
[   46.600336] RIP: 0010:__list_add_valid.cold+0x3d/0x3f
[   46.605475] Code: f2 4c 89 c1 48 89 fe 48 c7 c7 c8 40 67 93 e8 20 cc fd ff 0f 0b 48 89 d1 4c 89 c6 4c 89 ca 48 c7 c7 70 40 67 93 e8 09 cc fd ff &lt;0f&gt; 0b 48 89 fe 48 c7 c7 00 41 67 93 e8 f8 cb fd ff 0f 0b 48 89 d1
[   46.624469] RSP: 0018:ffffb20800ab76d8 EFLAGS: 00010286
[   46.629854] RAX: 0000000000000075 RBX: ffff94c1c318a0e0 RCX: 0000000000000000
[   46.637105] RDX: 0000000000000201 RSI: ffffffff9365e100 RDI: 00000000ffffffff
[   46.644356] RBP: ffff94c1c5f43370 R08: 0000000000000075 R09: 3064316334396666
[   46.651607] R10: 3364323064316334 R11: 39666666663d7665 R12: ffff94c1c5f43388
[   46.658857] R13: ffff94c1d02d3388 R14: ffff94c1c318a360 R15: ffff94c1cf2289c0
[   46.666108] FS:  00007f65634ff7c0(0000) GS:ffff94c1da200000(0000) knlGS:0000000000000000
[   46.674331] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   46.680170] CR2: 00007f7dfe984460 CR3: 000000010e894003 CR4: 00000000000606f0
[   46.687422] Call Trace:
[   46.689906]  &lt;TASK&gt;
[   46.691950]  iwl_mvm_mac_wake_tx_queue+0xec/0x15c [iwlmvm]
[   46.697601]  ieee80211_queue_skb+0x4b3/0x720 [mac80211]
[   46.702973]  ? sta_info_get+0x46/0x60 [mac80211]
[   46.707703]  ieee80211_tx+0xad/0x110 [mac80211]
[   46.712355]  __ieee80211_tx_skb_tid_band+0x71/0x90 [mac80211]
...

In order to avoid this problem, we must also remove the related lists when
station queues are disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50164/">CVE-2022-50164 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50164">CVE-2022-50164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244770">SUSE bug 1244770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50166" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50166" ref_url="https://www.suse.com/security/cve/CVE-2022-50166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: When HCI work queue is drained, only queue chained work

The HCI command, event, and data packet processing workqueue is drained
to avoid deadlock in commit
76727c02c1e1 ("Bluetooth: Call drain_workqueue() before resetting state").

There is another delayed work, which will queue command to this drained
workqueue. Which results in the following error report:

Bluetooth: hci2: command 0x040f tx timeout
WARNING: CPU: 1 PID: 18374 at kernel/workqueue.c:1438 __queue_work+0xdad/0x1140
Workqueue: events hci_cmd_timeout
RIP: 0010:__queue_work+0xdad/0x1140
RSP: 0000:ffffc90002cffc60 EFLAGS: 00010093
RAX: 0000000000000000 RBX: ffff8880b9d3ec00 RCX: 0000000000000000
RDX: ffff888024ba0000 RSI: ffffffff814e048d RDI: ffff8880b9d3ec08
RBP: 0000000000000008 R08: 0000000000000000 R09: 00000000b9d39700
R10: ffffffff814f73c6 R11: 0000000000000000 R12: ffff88807cce4c60
R13: 0000000000000000 R14: ffff8880796d8800 R15: ffff8880796d8800
FS:  0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000c0174b4000 CR3: 000000007cae9000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? queue_work_on+0xcb/0x110
 ? lockdep_hardirqs_off+0x90/0xd0
 queue_work_on+0xee/0x110
 process_one_work+0x996/0x1610
 ? pwq_dec_nr_in_flight+0x2a0/0x2a0
 ? rwlock_bug.part.0+0x90/0x90
 ? _raw_spin_lock_irq+0x41/0x50
 worker_thread+0x665/0x1080
 ? process_one_work+0x1610/0x1610
 kthread+0x2e9/0x3a0
 ? kthread_complete_and_exit+0x40/0x40
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;

To fix this, we can add a new HCI_DRAIN_WQ flag, and don't queue the
timeout workqueue while command workqueue is draining.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50166/">CVE-2022-50166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50166">CVE-2022-50166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244772">SUSE bug 1244772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50168" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50168" ref_url="https://www.suse.com/security/cve/CVE-2022-50168" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, x86: fix freeing of not-finalized bpf_prog_pack

syzbot reported a few issues with bpf_prog_pack [1], [2]. This only happens
with multiple subprogs. In jit_subprogs(), we first call bpf_int_jit_compile()
on each sub program. And then, we call it on each sub program again. jit_data
is not freed in the first call of bpf_int_jit_compile(). Similarly we don't
call bpf_jit_binary_pack_finalize() in the first call of bpf_int_jit_compile().

If bpf_int_jit_compile() failed for one sub program, we will call
bpf_jit_binary_pack_finalize() for this sub program. However, we don't have a
chance to call it for other sub programs. Then we will hit "goto out_free" in
jit_subprogs(), and call bpf_jit_free on some subprograms that haven't got
bpf_jit_binary_pack_finalize() yet.

At this point, bpf_jit_binary_pack_free() is called and the whole 2MB page is
freed erroneously.

Fix this with a custom bpf_jit_free() for x86_64, which calls
bpf_jit_binary_pack_finalize() if necessary. Also, with custom
bpf_jit_free(), bpf_prog_aux-&gt;use_bpf_prog_pack is not needed any more,
remove it.

[1] https://syzkaller.appspot.com/bug?extid=2f649ec6d2eea1495a8f
[2] https://syzkaller.appspot.com/bug?extid=87f65c75f4a72db05445
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50168/">CVE-2022-50168 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50168">CVE-2022-50168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244768">SUSE bug 1244768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50172</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50172" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50172" ref_url="https://www.suse.com/security/cve/CVE-2022-50172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt76x02u: fix possible memory leak in __mt76x02u_mcu_send_msg

Free the skb if mt76u_bulk_msg fails in __mt76x02u_mcu_send_msg routine.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50172/">CVE-2022-50172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50172">CVE-2022-50172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244764">SUSE bug 1244764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50178" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50178" ref_url="https://www.suse.com/security/cve/CVE-2022-50178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: 8852a: rfk: fix div 0 exception

The DPK is a kind of RF calibration whose algorithm is to fine tune
parameters and calibrate, and check the result. If the result isn't good
enough, it could adjust parameters and try again.

This issue is to read and show the result, but it could be a negative
calibration result that causes divisor 0 and core dump. So, fix it by
phy_div() that does division only if divisor isn't zero; otherwise,
zero is adopted.

  divide error: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 1 PID: 728 Comm: wpa_supplicant Not tainted 5.10.114-16019-g462a1661811a #1 &lt;HASH:d024 28&gt;
  RIP: 0010:rtw8852a_dpk+0x14ae/0x288f [rtw89_core]
  RSP: 0018:ffffa9bb412a7520 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: 00000000000180fc RDI: ffffa141d01023c0
  RBP: ffffa9bb412a76a0 R08: 0000000000001319 R09: 00000000ffffff92
  R10: ffffffffc0292de3 R11: ffffffffc00d2f51 R12: 0000000000000000
  R13: ffffa141d01023c0 R14: ffffffffc0290250 R15: ffffa141d0102638
  FS:  00007fa99f5c2740(0000) GS:ffffa142e5e80000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000013e8e010 CR3: 0000000110d2c000 CR4: 0000000000750ee0
  PKRU: 55555554
  Call Trace:
   rtw89_core_sta_add+0x95/0x9c [rtw89_core &lt;HASH:d239 29&gt;]
   rtw89_ops_sta_state+0x5d/0x108 [rtw89_core &lt;HASH:d239 29&gt;]
   drv_sta_state+0x115/0x66f [mac80211 &lt;HASH:81fe 30&gt;]
   sta_info_insert_rcu+0x45c/0x713 [mac80211 &lt;HASH:81fe 30&gt;]
   sta_info_insert+0xf/0x1b [mac80211 &lt;HASH:81fe 30&gt;]
   ieee80211_prep_connection+0x9d6/0xb0c [mac80211 &lt;HASH:81fe 30&gt;]
   ieee80211_mgd_auth+0x2aa/0x352 [mac80211 &lt;HASH:81fe 30&gt;]
   cfg80211_mlme_auth+0x160/0x1f6 [cfg80211 &lt;HASH:00cd 31&gt;]
   nl80211_authenticate+0x2e5/0x306 [cfg80211 &lt;HASH:00cd 31&gt;]
   genl_rcv_msg+0x371/0x3a1
   ? nl80211_stop_sched_scan+0xe5/0xe5 [cfg80211 &lt;HASH:00cd 31&gt;]
   ? genl_rcv+0x36/0x36
   netlink_rcv_skb+0x8a/0xf9
   genl_rcv+0x28/0x36
   netlink_unicast+0x27b/0x3a0
   netlink_sendmsg+0x2aa/0x469
   sock_sendmsg_nosec+0x49/0x4d
   ____sys_sendmsg+0xe5/0x213
   __sys_sendmsg+0xec/0x157
   ? syscall_enter_from_user_mode+0xd7/0x116
   do_syscall_64+0x43/0x55
   entry_SYSCALL_64_after_hwframe+0x44/0xa9
  RIP: 0033:0x7fa99f6e689b
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50178/">CVE-2022-50178 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50178">CVE-2022-50178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244900">SUSE bug 1244900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50179" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50179" ref_url="https://www.suse.com/security/cve/CVE-2022-50179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath9k: fix use-after-free in ath9k_hif_usb_rx_cb

Syzbot reported use-after-free Read in ath9k_hif_usb_rx_cb() [0]. The
problem was in incorrect htc_handle-&gt;drv_priv initialization.

Probable call trace which can trigger use-after-free:

ath9k_htc_probe_device()
  /* htc_handle-&gt;drv_priv = priv; */
  ath9k_htc_wait_for_target()      &lt;--- Failed
  ieee80211_free_hw()		   &lt;--- priv pointer is freed

&lt;IRQ&gt;
...
ath9k_hif_usb_rx_cb()
  ath9k_hif_usb_rx_stream()
   RX_STAT_INC()		&lt;--- htc_handle-&gt;drv_priv access

In order to not add fancy protection for drv_priv we can move
htc_handle-&gt;drv_priv initialization at the end of the
ath9k_htc_probe_device() and add helper macro to make
all *_STAT_* macros NULL safe, since syzbot has reported related NULL
deref in that macros [1]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50179/">CVE-2022-50179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50179">CVE-2022-50179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244886">SUSE bug 1244886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50181" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50181" ref_url="https://www.suse.com/security/cve/CVE-2022-50181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-gpu: fix a missing check to avoid NULL dereference

'cache_ent' could be set NULL inside virtio_gpu_cmd_get_capset()
and it will lead to a NULL dereference by a lately use of it
(i.e., ptr = cache_ent-&gt;caps_cache). Fix it with a NULL check.


[ kraxel: minor codestyle fixup ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50181/">CVE-2022-50181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50181">CVE-2022-50181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244901">SUSE bug 1244901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50185" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50185" ref_url="https://www.suse.com/security/cve/CVE-2022-50185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: fix potential buffer overflow in ni_set_mc_special_registers()

The last case label can write two buffers 'mc_reg_address[j]' and
'mc_data[j]' with 'j' offset equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE
since there are no checks for this value in both case labels after the
last 'j++'.

Instead of changing '&gt;' to '&gt;=' there, add the bounds check at the start
of the second 'case' (the first one already has it).

Also, remove redundant last checks for 'j' index bigger than array size.
The expression is always false. Moreover, before or after the patch
'table-&gt;last' can be equal to SMC_NISLANDS_MC_REGISTER_ARRAY_SIZE and it
seems it can be a valid value.

Detected using the static analysis tool - Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50185/">CVE-2022-50185 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50185">CVE-2022-50185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244887">SUSE bug 1244887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50187</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50187" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50187" ref_url="https://www.suse.com/security/cve/CVE-2022-50187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ath11k: fix netdev open race

Make sure to allocate resources needed before registering the device.

This specifically avoids having a racing open() trigger a BUG_ON() in
mod_timer() when ath11k_mac_op_start() is called before the
mon_reap_timer as been set up.

I did not see this issue with next-20220310, but I hit it on every probe
with next-20220511. Perhaps some timing changed in between.

Here's the backtrace:

[   51.346947] kernel BUG at kernel/time/timer.c:990!
[   51.346958] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
...
[   51.578225] Call trace:
[   51.583293]  __mod_timer+0x298/0x390
[   51.589518]  mod_timer+0x14/0x20
[   51.595368]  ath11k_mac_op_start+0x41c/0x4a0 [ath11k]
[   51.603165]  drv_start+0x38/0x60 [mac80211]
[   51.610110]  ieee80211_do_open+0x29c/0x7d0 [mac80211]
[   51.617945]  ieee80211_open+0x60/0xb0 [mac80211]
[   51.625311]  __dev_open+0x100/0x1c0
[   51.631420]  __dev_change_flags+0x194/0x210
[   51.638214]  dev_change_flags+0x24/0x70
[   51.644646]  do_setlink+0x228/0xdb0
[   51.650723]  __rtnl_newlink+0x460/0x830
[   51.657162]  rtnl_newlink+0x4c/0x80
[   51.663229]  rtnetlink_rcv_msg+0x124/0x390
[   51.669917]  netlink_rcv_skb+0x58/0x130
[   51.676314]  rtnetlink_rcv+0x18/0x30
[   51.682460]  netlink_unicast+0x250/0x310
[   51.688960]  netlink_sendmsg+0x19c/0x3e0
[   51.695458]  ____sys_sendmsg+0x220/0x290
[   51.701938]  ___sys_sendmsg+0x7c/0xc0
[   51.708148]  __sys_sendmsg+0x68/0xd0
[   51.714254]  __arm64_sys_sendmsg+0x28/0x40
[   51.720900]  invoke_syscall+0x48/0x120

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50187/">CVE-2022-50187 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50187">CVE-2022-50187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244890">SUSE bug 1244890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50189" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50189" ref_url="https://www.suse.com/security/cve/CVE-2022-50189" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tools/power turbostat: Fix file pointer leak

Currently if a fscanf fails then an early return leaks an open
file pointer. Fix this by fclosing the file before the return.
Detected using static analysis with cppcheck:

tools/power/x86/turbostat/turbostat.c:2039:3: error: Resource leak: fp [resourceLeak]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50189/">CVE-2022-50189 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50189">CVE-2022-50189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244894">SUSE bug 1244894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50190</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50190" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50190" ref_url="https://www.suse.com/security/cve/CVE-2022-50190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: Fix simplification of devm_spi_register_controller

This reverts commit 59ebbe40fb51 ("spi: simplify
devm_spi_register_controller").

If devm_add_action() fails in devm_add_action_or_reset(),
devm_spi_unregister() will be called, it decreases the
refcount of 'ctlr-&gt;dev' to 0, then it will cause uaf in
the drivers that calling spi_put_controller() in error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50190/">CVE-2022-50190 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50190">CVE-2022-50190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244895">SUSE bug 1244895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50191" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50191" ref_url="https://www.suse.com/security/cve/CVE-2022-50191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: of: Fix refcount leak bug in of_get_regulation_constraints()

We should call the of_node_put() for the reference returned by
of_get_child_by_name() which has increased the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50191/">CVE-2022-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50191">CVE-2022-50191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244899">SUSE bug 1244899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50194" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50194" ref_url="https://www.suse.com/security/cve/CVE-2022-50194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: aoss: Fix refcount leak in qmp_cooling_devices_register

Every iteration of for_each_available_child_of_node() decrements
the reference count of the previous node.
When breaking early from a for_each_available_child_of_node() loop,
we need to explicitly call of_node_put() on the child node.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50194/">CVE-2022-50194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50194">CVE-2022-50194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244878">SUSE bug 1244878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50196" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50196" ref_url="https://www.suse.com/security/cve/CVE-2022-50196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: ocmem: Fix refcount leak in of_get_ocmem

of_parse_phandle() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
of_node_put() will check NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50196/">CVE-2022-50196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50196">CVE-2022-50196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244875">SUSE bug 1244875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50200" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50200" ref_url="https://www.suse.com/security/cve/CVE-2022-50200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: Add boundary check in put_entry()

Just like next_entry(), boundary check is necessary to prevent memory
out-of-bound access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50200/">CVE-2022-50200 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50200">CVE-2022-50200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237312">SUSE bug 1237312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245149">SUSE bug 1245149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245150">SUSE bug 1245150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50201" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50201" ref_url="https://www.suse.com/security/cve/CVE-2022-50201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: fix memleak in security_read_state_kernel()

In this function, it directly returns the result of __security_read_policy
without freeing the allocated memory in *data, cause memory leak issue,
so free the memory if __security_read_policy failed.

[PM: subject line tweak]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50201/">CVE-2022-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50201">CVE-2022-50201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245197">SUSE bug 1245197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50202</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50202" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50202" ref_url="https://www.suse.com/security/cve/CVE-2022-50202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: hibernate: defer device probing when resuming from hibernation

syzbot is reporting hung task at misc_open() [1], for there is a race
window of AB-BA deadlock which involves probe_count variable. Currently
wait_for_device_probe() from snapshot_open() from misc_open() can sleep
forever with misc_mtx held if probe_count cannot become 0.

When a device is probed by hub_event() work function, probe_count is
incremented before the probe function starts, and probe_count is
decremented after the probe function completed.

There are three cases that can prevent probe_count from dropping to 0.

  (a) A device being probed stopped responding (i.e. broken/malicious
      hardware).

  (b) A process emulating a USB device using /dev/raw-gadget interface
      stopped responding for some reason.

  (c) New device probe requests keeps coming in before existing device
      probe requests complete.

The phenomenon syzbot is reporting is (b). A process which is holding
system_transition_mutex and misc_mtx is waiting for probe_count to become
0 inside wait_for_device_probe(), but the probe function which is called
 from hub_event() work function is waiting for the processes which are
blocked at mutex_lock(&amp;misc_mtx) to respond via /dev/raw-gadget interface.

This patch mitigates (b) by deferring wait_for_device_probe() from
snapshot_open() to snapshot_write() and snapshot_ioctl(). Please note that
the possibility of (b) remains as long as any thread which is emulating a
USB device via /dev/raw-gadget interface can be blocked by uninterruptible
blocking operations (e.g. mutex_lock()).

Please also note that (a) and (c) are not addressed. Regarding (c), we
should change the code to wait for only one device which contains the
image for resuming from hibernation. I don't know how to address (a), for
use of timeout for wait_for_device_probe() might result in loss of user
data in the image. Maybe we should require the userland to wait for the
image device before opening /dev/snapshot interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50202/">CVE-2022-50202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50202">CVE-2022-50202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245154">SUSE bug 1245154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50206" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50206" ref_url="https://www.suse.com/security/cve/CVE-2022-50206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: fix oops in concurrently setting insn_emulation sysctls

emulation_proc_handler() changes table-&gt;data for proc_dointvec_minmax
and can generate the following Oops if called concurrently with itself:

 | Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010
 | Internal error: Oops: 96000006 [#1] SMP
 | Call trace:
 | update_insn_emulation_mode+0xc0/0x148
 | emulation_proc_handler+0x64/0xb8
 | proc_sys_call_handler+0x9c/0xf8
 | proc_sys_write+0x18/0x20
 | __vfs_write+0x20/0x48
 | vfs_write+0xe4/0x1d0
 | ksys_write+0x70/0xf8
 | __arm64_sys_write+0x20/0x28
 | el0_svc_common.constprop.0+0x7c/0x1c0
 | el0_svc_handler+0x2c/0xa0
 | el0_svc+0x8/0x200

To fix this issue, keep the table-&gt;data as &amp;insn-&gt;current_mode and
use container_of() to retrieve the insn pointer. Another mutex is
used to protect against the current_mode update but not for retrieving
insn_emulation as table-&gt;data is no longer changing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50206/">CVE-2022-50206 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50206">CVE-2022-50206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245152">SUSE bug 1245152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50211" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50211" ref_url="https://www.suse.com/security/cve/CVE-2022-50211" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md-raid10: fix KASAN warning

There's a KASAN warning in raid10_remove_disk when running the lvm
test lvconvert-raid-reshape.sh. We fix this warning by verifying that the
value "number" is valid.

BUG: KASAN: slab-out-of-bounds in raid10_remove_disk+0x61/0x2a0 [raid10]
Read of size 8 at addr ffff889108f3d300 by task mdX_raid10/124682

CPU: 3 PID: 124682 Comm: mdX_raid10 Not tainted 5.19.0-rc6 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x34/0x44
 print_report.cold+0x45/0x57a
 ? __lock_text_start+0x18/0x18
 ? raid10_remove_disk+0x61/0x2a0 [raid10]
 kasan_report+0xa8/0xe0
 ? raid10_remove_disk+0x61/0x2a0 [raid10]
 raid10_remove_disk+0x61/0x2a0 [raid10]
Buffer I/O error on dev dm-76, logical block 15344, async page read
 ? __mutex_unlock_slowpath.constprop.0+0x1e0/0x1e0
 remove_and_add_spares+0x367/0x8a0 [md_mod]
 ? super_written+0x1c0/0x1c0 [md_mod]
 ? mutex_trylock+0xac/0x120
 ? _raw_spin_lock+0x72/0xc0
 ? _raw_spin_lock_bh+0xc0/0xc0
 md_check_recovery+0x848/0x960 [md_mod]
 raid10d+0xcf/0x3360 [raid10]
 ? sched_clock_cpu+0x185/0x1a0
 ? rb_erase+0x4d4/0x620
 ? var_wake_function+0xe0/0xe0
 ? psi_group_change+0x411/0x500
 ? preempt_count_sub+0xf/0xc0
 ? _raw_spin_lock_irqsave+0x78/0xc0
 ? __lock_text_start+0x18/0x18
 ? raid10_sync_request+0x36c0/0x36c0 [raid10]
 ? preempt_count_sub+0xf/0xc0
 ? _raw_spin_unlock_irqrestore+0x19/0x40
 ? del_timer_sync+0xa9/0x100
 ? try_to_del_timer_sync+0xc0/0xc0
 ? _raw_spin_lock_irqsave+0x78/0xc0
 ? __lock_text_start+0x18/0x18
 ? _raw_spin_unlock_irq+0x11/0x24
 ? __list_del_entry_valid+0x68/0xa0
 ? finish_wait+0xa3/0x100
 md_thread+0x161/0x260 [md_mod]
 ? unregister_md_personality+0xa0/0xa0 [md_mod]
 ? _raw_spin_lock_irqsave+0x78/0xc0
 ? prepare_to_wait_event+0x2c0/0x2c0
 ? unregister_md_personality+0xa0/0xa0 [md_mod]
 kthread+0x148/0x180
 ? kthread_complete_and_exit+0x20/0x20
 ret_from_fork+0x1f/0x30
 &lt;/TASK&gt;

Allocated by task 124495:
 kasan_save_stack+0x1e/0x40
 __kasan_kmalloc+0x80/0xa0
 setup_conf+0x140/0x5c0 [raid10]
 raid10_run+0x4cd/0x740 [raid10]
 md_run+0x6f9/0x1300 [md_mod]
 raid_ctr+0x2531/0x4ac0 [dm_raid]
 dm_table_add_target+0x2b0/0x620 [dm_mod]
 table_load+0x1c8/0x400 [dm_mod]
 ctl_ioctl+0x29e/0x560 [dm_mod]
 dm_compat_ctl_ioctl+0x7/0x20 [dm_mod]
 __do_compat_sys_ioctl+0xfa/0x160
 do_syscall_64+0x90/0xc0
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Last potentially related work creation:
 kasan_save_stack+0x1e/0x40
 __kasan_record_aux_stack+0x9e/0xc0
 kvfree_call_rcu+0x84/0x480
 timerfd_release+0x82/0x140
L __fput+0xfa/0x400
 task_work_run+0x80/0xc0
 exit_to_user_mode_prepare+0x155/0x160
 syscall_exit_to_user_mode+0x12/0x40
 do_syscall_64+0x42/0xc0
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Second to last potentially related work creation:
 kasan_save_stack+0x1e/0x40
 __kasan_record_aux_stack+0x9e/0xc0
 kvfree_call_rcu+0x84/0x480
 timerfd_release+0x82/0x140
 __fput+0xfa/0x400
 task_work_run+0x80/0xc0
 exit_to_user_mode_prepare+0x155/0x160
 syscall_exit_to_user_mode+0x12/0x40
 do_syscall_64+0x42/0xc0
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

The buggy address belongs to the object at ffff889108f3d200
 which belongs to the cache kmalloc-256 of size 256
The buggy address is located 0 bytes to the right of
 256-byte region [ffff889108f3d200, ffff889108f3d300)

The buggy address belongs to the physical page:
page:000000007ef2a34c refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1108f3c
head:000000007ef2a34c order:2 compound_mapcount:0 compound_pincount:0
flags: 0x4000000000010200(slab|head|zone=2)
raw: 4000000000010200 0000000000000000 dead000000000001 ffff889100042b40
raw: 0000000000000000 0000000080200020 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff889108f3d200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff889108f3d280: 00 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50211/">CVE-2022-50211 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50211">CVE-2022-50211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245140">SUSE bug 1245140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245141">SUSE bug 1245141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50212" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50212" ref_url="https://www.suse.com/security/cve/CVE-2022-50212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not allow CHAIN_ID to refer to another table

When doing lookups for chains on the same batch by using its ID, a chain
from a different table can be used. If a rule is added to a table but
refers to a chain in a different table, it will be linked to the chain in
table2, but would have expressions referring to objects in table1.

Then, when table1 is removed, the rule will not be removed as its linked to
a chain in table2. When expressions in the rule are processed or removed,
that will lead to a use-after-free.

When looking for chains by ID, use the table that was used for the lookup
by name, and only return chains belonging to that same table.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50212/">CVE-2022-50212 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50212">CVE-2022-50212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244869">SUSE bug 1244869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50213" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50213" ref_url="https://www.suse.com/security/cve/CVE-2022-50213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not allow SET_ID to refer to another table

When doing lookups for sets on the same batch by using its ID, a set from a
different table can be used.

Then, when the table is removed, a reference to the set may be kept after
the set is freed, leading to a potential use-after-free.

When looking for sets by ID, use the table that was used for the lookup by
name, and only return sets belonging to that same table.

This fixes CVE-2022-2586, also reported as ZDI-CAN-17470.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50213/">CVE-2022-50213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50213">CVE-2022-50213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244867">SUSE bug 1244867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50214" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50214" ref_url="https://www.suse.com/security/cve/CVE-2022-50214" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: Clear the connection field properly

coresight devices track their connections (output connections) and
hold a reference to the fwnode. When a device goes away, we walk through
the devices on the coresight bus and make sure that the references
are dropped. This happens both ways:
 a) For all output connections from the device, drop the reference to
    the target device via coresight_release_platform_data()

b) Iterate over all the devices on the coresight bus and drop the
   reference to fwnode if *this* device is the target of the output
   connection, via coresight_remove_conns()-&gt;coresight_remove_match().

However, the coresight_remove_match() doesn't clear the fwnode field,
after dropping the reference, this causes use-after-free and
additional refcount drops on the fwnode.

e.g., if we have two devices, A and B, with a connection, A -&gt; B.
If we remove B first, B would clear the reference on B, from A
via coresight_remove_match(). But when A is removed, it still has
a connection with fwnode still pointing to B. Thus it tries to  drops
the reference in coresight_release_platform_data(), raising the bells
like :

[   91.990153] ------------[ cut here ]------------
[   91.990163] refcount_t: addition on 0; use-after-free.
[   91.990212] WARNING: CPU: 0 PID: 461 at lib/refcount.c:25 refcount_warn_saturate+0xa0/0x144
[   91.990260] Modules linked in: coresight_funnel coresight_replicator coresight_etm4x(-)
 crct10dif_ce coresight ip_tables x_tables ipv6 [last unloaded: coresight_cpu_debug]
[   91.990398] CPU: 0 PID: 461 Comm: rmmod Tainted: G        W       T 5.19.0-rc2+ #53
[   91.990418] Hardware name: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform, BIOS EDK II Feb  1 2019
[   91.990434] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   91.990454] pc : refcount_warn_saturate+0xa0/0x144
[   91.990476] lr : refcount_warn_saturate+0xa0/0x144
[   91.990496] sp : ffff80000c843640
[   91.990509] x29: ffff80000c843640 x28: ffff800009957c28 x27: ffff80000c8439a8
[   91.990560] x26: ffff00097eff1990 x25: ffff8000092b6ad8 x24: ffff00097eff19a8
[   91.990610] x23: ffff80000c8439a8 x22: 0000000000000000 x21: ffff80000c8439c2
[   91.990659] x20: 0000000000000000 x19: ffff00097eff1a10 x18: ffff80000ab99c40
[   91.990708] x17: 0000000000000000 x16: 0000000000000000 x15: ffff80000abf6fa0
[   91.990756] x14: 000000000000001d x13: 0a2e656572662d72 x12: 657466612d657375
[   91.990805] x11: 203b30206e6f206e x10: 6f69746964646120 x9 : ffff8000081aba28
[   91.990854] x8 : 206e6f206e6f6974 x7 : 69646461203a745f x6 : 746e756f63666572
[   91.990903] x5 : ffff00097648ec58 x4 : 0000000000000000 x3 : 0000000000000027
[   91.990952] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00080260ba00
[   91.991000] Call trace:
[   91.991012]  refcount_warn_saturate+0xa0/0x144
[   91.991034]  kobject_get+0xac/0xb0
[   91.991055]  of_node_get+0x2c/0x40
[   91.991076]  of_fwnode_get+0x40/0x60
[   91.991094]  fwnode_handle_get+0x3c/0x60
[   91.991116]  fwnode_get_nth_parent+0xf4/0x110
[   91.991137]  fwnode_full_name_string+0x48/0xc0
[   91.991158]  device_node_string+0x41c/0x530
[   91.991178]  pointer+0x320/0x3ec
[   91.991198]  vsnprintf+0x23c/0x750
[   91.991217]  vprintk_store+0x104/0x4b0
[   91.991238]  vprintk_emit+0x8c/0x360
[   91.991257]  vprintk_default+0x44/0x50
[   91.991276]  vprintk+0xcc/0xf0
[   91.991295]  _printk+0x68/0x90
[   91.991315]  of_node_release+0x13c/0x14c
[   91.991334]  kobject_put+0x98/0x114
[   91.991354]  of_node_put+0x24/0x34
[   91.991372]  of_fwnode_put+0x40/0x5c
[   91.991390]  fwnode_handle_put+0x38/0x50
[   91.991411]  coresight_release_platform_data+0x74/0xb0 [coresight]
[   91.991472]  coresight_unregister+0x64/0xcc [coresight]
[   91.991525]  etm4_remove_dev+0x64/0x78 [coresight_etm4x]
[   91.991563]  etm4_remove_amba+0x1c/0x2c [coresight_etm4x]
[   91.991598]  amba_remove+0x3c/0x19c
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50214/">CVE-2022-50214 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50214">CVE-2022-50214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244865">SUSE bug 1244865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50215" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50215" ref_url="https://www.suse.com/security/cve/CVE-2022-50215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Allow waiting for commands to complete on removed device

When a SCSI device is removed while in active use, currently sg will
immediately return -ENODEV on any attempt to wait for active commands that
were sent before the removal.  This is problematic for commands that use
SG_FLAG_DIRECT_IO since the data buffer may still be in use by the kernel
when userspace frees or reuses it after getting ENODEV, leading to
corrupted userspace memory (in the case of READ-type commands) or corrupted
data being sent to the device (in the case of WRITE-type commands).  This
has been seen in practice when logging out of a iscsi_tcp session, where
the iSCSI driver may still be processing commands after the device has been
marked for removal.

Change the policy to allow userspace to wait for active sg commands even
when the device is being removed.  Return -ENODEV only when there are no
more responses to read.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50215/">CVE-2022-50215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50215">CVE-2022-50215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245138">SUSE bug 1245138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50219</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50219" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50219" ref_url="https://www.suse.com/security/cve/CVE-2022-50219" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix KASAN use-after-free Read in compute_effective_progs

Syzbot found a Use After Free bug in compute_effective_progs().
The reproducer creates a number of BPF links, and causes a fault
injected alloc to fail, while calling bpf_link_detach on them.
Link detach triggers the link to be freed by bpf_link_free(),
which calls __cgroup_bpf_detach() and update_effective_progs().
If the memory allocation in this function fails, the function restores
the pointer to the bpf_cgroup_link on the cgroup list, but the memory
gets freed just after it returns. After this, every subsequent call to
update_effective_progs() causes this already deallocated pointer to be
dereferenced in prog_list_length(), and triggers KASAN UAF error.

To fix this issue don't preserve the pointer to the prog or link in the
list, but remove it and replace it with a dummy prog without shrinking
the table. The subsequent call to __cgroup_bpf_detach() or
__cgroup_bpf_detach() will correct it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50219/">CVE-2022-50219 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50219">CVE-2022-50219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244863">SUSE bug 1244863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50221" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50221" ref_url="https://www.suse.com/security/cve/CVE-2022-50221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/fb-helper: Fix out-of-bounds access

Clip memory range to screen-buffer size to avoid out-of-bounds access
in fbdev deferred I/O's damage handling.

Fbdev's deferred I/O can only track pages. From the range of pages, the
damage handler computes the clipping rectangle for the display update.
If the fbdev screen buffer ends near the beginning of a page, that page
could contain more scanlines. The damage handler would then track these
non-existing scanlines as dirty and provoke an out-of-bounds access
during the screen update. Hence, clip the maximum memory range to the
size of the screen buffer.

While at it, rename the variables min/max to min_off/max_off in
drm_fb_helper_deferred_io(). This avoids confusion with the macros of
the same name.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50221/">CVE-2022-50221 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50221">CVE-2022-50221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244858">SUSE bug 1244858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50224</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50224" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50224" ref_url="https://www.suse.com/security/cve/CVE-2022-50224" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: Treat NX as a valid SPTE bit for NPT

Treat the NX bit as valid when using NPT, as KVM will set the NX bit when
the NX huge page mitigation is enabled (mindblowing) and trigger the WARN
that fires on reserved SPTE bits being set.

KVM has required NX support for SVM since commit b26a71a1a5b9 ("KVM: SVM:
Refuse to load kvm_amd if NX support is not available") for exactly this
reason, but apparently it never occurred to anyone to actually test NPT
with the mitigation enabled.

  ------------[ cut here ]------------
  spte = 0x800000018a600ee7, level = 2, rsvd bits = 0x800f0000001fe000
  WARNING: CPU: 152 PID: 15966 at arch/x86/kvm/mmu/spte.c:215 make_spte+0x327/0x340 [kvm]
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 10.48.0 01/27/2022
  RIP: 0010:make_spte+0x327/0x340 [kvm]
  Call Trace:
   &lt;TASK&gt;
   tdp_mmu_map_handle_target_level+0xc3/0x230 [kvm]
   kvm_tdp_mmu_map+0x343/0x3b0 [kvm]
   direct_page_fault+0x1ae/0x2a0 [kvm]
   kvm_tdp_page_fault+0x7d/0x90 [kvm]
   kvm_mmu_page_fault+0xfb/0x2e0 [kvm]
   npf_interception+0x55/0x90 [kvm_amd]
   svm_invoke_exit_handler+0x31/0xf0 [kvm_amd]
   svm_handle_exit+0xf6/0x1d0 [kvm_amd]
   vcpu_enter_guest+0xb6d/0xee0 [kvm]
   ? kvm_pmu_trigger_event+0x6d/0x230 [kvm]
   vcpu_run+0x65/0x2c0 [kvm]
   kvm_arch_vcpu_ioctl_run+0x355/0x610 [kvm]
   kvm_vcpu_ioctl+0x551/0x610 [kvm]
   __se_sys_ioctl+0x77/0xc0
   __x64_sys_ioctl+0x1d/0x20
   do_syscall_64+0x44/0xa0
   entry_SYSCALL_64_after_hwframe+0x46/0xb0
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50224/">CVE-2022-50224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50224">CVE-2022-50224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245144">SUSE bug 1245144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50226</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50226" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50226" ref_url="https://www.suse.com/security/cve/CVE-2022-50226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: ccp - Use kzalloc for sev ioctl interfaces to prevent kernel memory leak

For some sev ioctl interfaces, input may be passed that is less than or
equal to SEV_FW_BLOB_MAX_SIZE, but larger than the data that PSP
firmware returns. In this case, kmalloc will allocate memory that is the
size of the input rather than the size of the data. Since PSP firmware
doesn't fully overwrite the buffer, the sev ioctl interfaces with the
issue may return uninitialized slab memory.

Currently, all of the ioctl interfaces in the ccp driver are safe, but
to prevent future problems, change all ioctl interfaces that allocate
memory with kmalloc to use kzalloc and memset the data buffer to zero
in sev_ioctl_do_platform_status.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50226/">CVE-2022-50226 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50226">CVE-2022-50226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244860">SUSE bug 1244860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50227</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50227" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50227" ref_url="https://www.suse.com/security/cve/CVE-2022-50227" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/xen: Initialize Xen timer only once

Add a check for existing xen timers before initializing a new one.

Currently kvm_xen_init_timer() is called on every
KVM_XEN_VCPU_ATTR_TYPE_TIMER, which is causing the following ODEBUG
crash when vcpu-&gt;arch.xen.timer is already set.

ODEBUG: init active (active state 0)
object type: hrtimer hint: xen_timer_callbac0
RIP: 0010:debug_print_object+0x16e/0x250 lib/debugobjects.c:502
Call Trace:
__debug_object_init
debug_hrtimer_init
debug_init
hrtimer_init
kvm_xen_init_timer
kvm_xen_vcpu_set_attr
kvm_arch_vcpu_ioctl
kvm_vcpu_ioctl
vfs_ioctl
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50227/">CVE-2022-50227 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50227">CVE-2022-50227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244855">SUSE bug 1244855</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50228</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50228" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50228" ref_url="https://www.suse.com/security/cve/CVE-2022-50228" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Don't BUG if userspace injects an interrupt with GIF=0

Don't BUG/WARN on interrupt injection due to GIF being cleared,
since it's trivial for userspace to force the situation via
KVM_SET_VCPU_EVENTS (even if having at least a WARN there would be correct
for KVM internally generated injections).

  kernel BUG at arch/x86/kvm/svm/svm.c:3386!
  invalid opcode: 0000 [#1] SMP
  CPU: 15 PID: 926 Comm: smm_test Not tainted 5.17.0-rc3+ #264
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:svm_inject_irq+0xab/0xb0 [kvm_amd]
  Code: &lt;0f&gt; 0b 0f 1f 00 0f 1f 44 00 00 80 3d ac b3 01 00 00 55 48 89 f5 53
  RSP: 0018:ffffc90000b37d88 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff88810a234ac0 RCX: 0000000000000006
  RDX: 0000000000000000 RSI: ffffc90000b37df7 RDI: ffff88810a234ac0
  RBP: ffffc90000b37df7 R08: ffff88810a1fa410 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
  R13: ffff888109571000 R14: ffff88810a234ac0 R15: 0000000000000000
  FS:  0000000001821380(0000) GS:ffff88846fdc0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f74fc550008 CR3: 000000010a6fe000 CR4: 0000000000350ea0
  Call Trace:
   &lt;TASK&gt;
   inject_pending_event+0x2f7/0x4c0 [kvm]
   kvm_arch_vcpu_ioctl_run+0x791/0x17a0 [kvm]
   kvm_vcpu_ioctl+0x26d/0x650 [kvm]
   __x64_sys_ioctl+0x82/0xb0
   do_syscall_64+0x3b/0xc0
   entry_SYSCALL_64_after_hwframe+0x44/0xae
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50228/">CVE-2022-50228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50228">CVE-2022-50228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244854">SUSE bug 1244854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50229" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50229" ref_url="https://www.suse.com/security/cve/CVE-2022-50229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: bcd2000: Fix a UAF bug on the error path of probing

When the driver fails in snd_card_register() at probe time, it will free
the 'bcd2k-&gt;midi_out_urb' before killing it, which may cause a UAF bug.

The following log can reveal it:

[   50.727020] BUG: KASAN: use-after-free in bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]
[   50.727623] Read of size 8 at addr ffff88810fab0e88 by task swapper/4/0
[   50.729530] Call Trace:
[   50.732899]  bcd2000_input_complete+0x1f1/0x2e0 [snd_bcd2000]

Fix this by adding usb_kill_urb() before usb_free_urb().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50229/">CVE-2022-50229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50229">CVE-2022-50229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244856">SUSE bug 1244856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50234</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50234" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50234" ref_url="https://www.suse.com/security/cve/CVE-2022-50234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/af_unix: defer registered files gc to io_uring release

Instead of putting io_uring's registered files in unix_gc() we want it
to be done by io_uring itself. The trick here is to consider io_uring
registered files for cycle detection but not actually putting them down.
Because io_uring can't register other ring instances, this will remove
all refs to the ring file triggering the -&gt;release path and clean up
with io_ring_ctx_free().

[axboe: add kerneldoc comment to skb, fold in skb leak fix]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50234/">CVE-2022-50234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50234">CVE-2022-50234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249664">SUSE bug 1249664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50235" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50235" ref_url="https://www.suse.com/security/cve/CVE-2022-50235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Protect against send buffer overflow in NFSv2 READDIR

Restore the previous limit on the @count argument to prevent a
buffer overflow attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50235/">CVE-2022-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50235">CVE-2022-50235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249667">SUSE bug 1249667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249668">SUSE bug 1249668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50239" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50239" ref_url="https://www.suse.com/security/cve/CVE-2022-50239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: qcom: fix writes in read-only memory region

This commit fixes a kernel oops because of a write in some read-only memory:

	[    9.068287] Unable to handle kernel write to read-only memory at virtual address ffff800009240ad8
	..snip..
	[    9.138790] Internal error: Oops: 9600004f [#1] PREEMPT SMP
	..snip..
	[    9.269161] Call trace:
	[    9.276271]  __memcpy+0x5c/0x230
	[    9.278531]  snprintf+0x58/0x80
	[    9.282002]  qcom_cpufreq_msm8939_name_version+0xb4/0x190
	[    9.284869]  qcom_cpufreq_probe+0xc8/0x39c
	..snip..

The following line defines a pointer that point to a char buffer stored
in read-only memory:

	char *pvs_name = "speedXX-pvsXX-vXX";

This pointer is meant to hold a template "speedXX-pvsXX-vXX" where the
XX values get overridden by the qcom_cpufreq_krait_name_version function. Since
the template is actually stored in read-only memory, when the function
executes the following call we get an oops:

	snprintf(*pvs_name, sizeof("speedXX-pvsXX-vXX"), "speed%d-pvs%d-v%d",
		 speed, pvs, pvs_ver);

To fix this issue, we instead store the template name onto the stack by
using the following syntax:

	char pvs_name_buffer[] = "speedXX-pvsXX-vXX";

Because the `pvs_name` needs to be able to be assigned to NULL, the
template buffer is stored in the pvs_name_buffer and not under the
pvs_name variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50239/">CVE-2022-50239 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50239">CVE-2022-50239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249836">SUSE bug 1249836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249837">SUSE bug 1249837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50241" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50241" ref_url="https://www.suse.com/security/cve/CVE-2022-50241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix use-after-free on source server when doing inter-server copy

Use-after-free occurred when the laundromat tried to free expired
cpntf_state entry on the s2s_cp_stateids list after inter-server
copy completed. The sc_cp_list that the expired copy state was
inserted on was already freed.

When COPY completes, the Linux client normally sends LOCKU(lock_state x),
FREE_STATEID(lock_state x) and CLOSE(open_state y) to the source server.
The nfs4_put_stid call from nfsd4_free_stateid cleans up the copy state
from the s2s_cp_stateids list before freeing the lock state's stid.

However, sometimes the CLOSE was sent before the FREE_STATEID request.
When this happens, the nfsd4_close_open_stateid call from nfsd4_close
frees all lock states on its st_locks list without cleaning up the copy
state on the sc_cp_list list. When the time the FREE_STATEID arrives the
server returns BAD_STATEID since the lock state was freed. This causes
the use-after-free error to occur when the laundromat tries to free
the expired cpntf_state.

This patch adds a call to nfs4_free_cpntf_statelist in
nfsd4_close_open_stateid to clean up the copy state before calling
free_ol_stateid_reaplist to free the lock state's stid on the reaplist.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50241/">CVE-2022-50241 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50241">CVE-2022-50241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249691">SUSE bug 1249691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50243" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50243" ref_url="https://www.suse.com/security/cve/CVE-2022-50243" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: handle the error returned from sctp_auth_asoc_init_active_key

When it returns an error from sctp_auth_asoc_init_active_key(), the
active_key is actually not updated. The old sh_key will be freeed
while it's still used as active key in asoc. Then an use-after-free
will be triggered when sending patckets, as found by syzbot:

  sctp_auth_shkey_hold+0x22/0xa0 net/sctp/auth.c:112
  sctp_set_owner_w net/sctp/socket.c:132 [inline]
  sctp_sendmsg_to_asoc+0xbd5/0x1a20 net/sctp/socket.c:1863
  sctp_sendmsg+0x1053/0x1d50 net/sctp/socket.c:2025
  inet_sendmsg+0x99/0xe0 net/ipv4/af_inet.c:819
  sock_sendmsg_nosec net/socket.c:714 [inline]
  sock_sendmsg+0xcf/0x120 net/socket.c:734

This patch is to fix it by not replacing the sh_key when it returns
errors from sctp_auth_asoc_init_active_key() in sctp_auth_set_key().
For sctp_auth_set_active_key(), old active_key_id will be set back
to asoc-&gt;active_key_id when the same thing happens.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50243/">CVE-2022-50243 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50243">CVE-2022-50243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249839">SUSE bug 1249839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50246</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50246" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50246" ref_url="https://www.suse.com/security/cve/CVE-2022-50246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpci: fix of node refcount leak in tcpci_register_port()

I got the following report while doing device(mt6370-tcpc) load
test with CONFIG_OF_UNITTEST and CONFIG_OF_DYNAMIC enabled:

  OF: ERROR: memory leak, expected refcount 1 instead of 2,
  of_node_get()/of_node_put() unbalanced - destroy cset entry:
  attach overlay node /i2c/pmic@34/tcpc/connector

The 'fwnode' set in tcpci_parse_config() which is called
in tcpci_register_port(), its node refcount is increased
in device_get_named_child_node(). It needs be put while
exiting, so call fwnode_handle_put() in the error path of
tcpci_register_port() and in tcpci_unregister_port() to
avoid leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50246/">CVE-2022-50246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50246">CVE-2022-50246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249746">SUSE bug 1249746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249759">SUSE bug 1249759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50247</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50247" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50247" ref_url="https://www.suse.com/security/cve/CVE-2022-50247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci-mtk: fix leakage of shared hcd when fail to set wakeup irq

Can not set the @shared_hcd to NULL before decrease the usage count
by usb_put_hcd(), this will cause the shared hcd not released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50247/">CVE-2022-50247 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50247">CVE-2022-50247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249681">SUSE bug 1249681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50249</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50249" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50249" ref_url="https://www.suse.com/security/cve/CVE-2022-50249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memory: of: Fix refcount leak bug in of_get_ddr_timings()

We should add the of_node_put() when breaking out of
for_each_child_of_node() as it will automatically increase
and decrease the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50249/">CVE-2022-50249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50249">CVE-2022-50249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249747">SUSE bug 1249747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50250" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50250" ref_url="https://www.suse.com/security/cve/CVE-2022-50250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix use_count leakage when handling boot-on

I found a use_count leakage towards supply regulator of rdev with
boot-on option.

 ───────────────────┐            ───────────────────┐
|  regulator_dev A  |           |  regulator_dev B  |
|     (boot-on)     |           |     (boot-on)     |
|    use_count=0    |◀──supply──|    use_count=1    |
|                   |           |                   |
 ───────────────────┘            ───────────────────┘

In case of rdev(A) configured with `regulator-boot-on', the use_count
of supplying regulator(B) will increment inside
regulator_enable(rdev-&gt;supply).

Thus, B will acts like always-on, and further balanced
regulator_enable/disable cannot actually disable it anymore.

However, B was also configured with `regulator-boot-on', we wish it
could be disabled afterwards.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50250/">CVE-2022-50250 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50250">CVE-2022-50250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249844">SUSE bug 1249844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50258" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50258" ref_url="https://www.suse.com/security/cve/CVE-2022-50258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()

This patch fixes a stack-out-of-bounds read in brcmfmac that occurs
when 'buf' that is not null-terminated is passed as an argument of
strsep() in brcmf_c_preinit_dcmds(). This buffer is filled with a firmware
version string by memcpy() in brcmf_fil_iovar_data_get().
The patch ensures buf is null-terminated.

Found by a modified version of syzkaller.

[   47.569679][ T1897] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43236b for chip BCM43236/3
[   47.582839][ T1897] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available
[   47.601565][ T1897] ==================================================================
[   47.602574][ T1897] BUG: KASAN: stack-out-of-bounds in strsep+0x1b2/0x1f0
[   47.603447][ T1897] Read of size 1 at addr ffffc90001f6f000 by task kworker/0:2/1897
[   47.604336][ T1897]
[   47.604621][ T1897] CPU: 0 PID: 1897 Comm: kworker/0:2 Tainted: G           O      5.14.0+ #131
[   47.605617][ T1897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
[   47.606907][ T1897] Workqueue: usb_hub_wq hub_event
[   47.607453][ T1897] Call Trace:
[   47.607801][ T1897]  dump_stack_lvl+0x8e/0xd1
[   47.608295][ T1897]  print_address_description.constprop.0.cold+0xf/0x334
[   47.609009][ T1897]  ? strsep+0x1b2/0x1f0
[   47.609434][ T1897]  ? strsep+0x1b2/0x1f0
[   47.609863][ T1897]  kasan_report.cold+0x83/0xdf
[   47.610366][ T1897]  ? strsep+0x1b2/0x1f0
[   47.610882][ T1897]  strsep+0x1b2/0x1f0
[   47.611300][ T1897]  ? brcmf_fil_iovar_data_get+0x3a/0xf0
[   47.611883][ T1897]  brcmf_c_preinit_dcmds+0x995/0xc40
[   47.612434][ T1897]  ? brcmf_c_set_joinpref_default+0x100/0x100
[   47.613078][ T1897]  ? rcu_read_lock_sched_held+0xa1/0xd0
[   47.613662][ T1897]  ? rcu_read_lock_bh_held+0xb0/0xb0
[   47.614208][ T1897]  ? lock_acquire+0x19d/0x4e0
[   47.614704][ T1897]  ? find_held_lock+0x2d/0x110
[   47.615236][ T1897]  ? brcmf_usb_deq+0x1a7/0x260
[   47.615741][ T1897]  ? brcmf_usb_rx_fill_all+0x5a/0xf0
[   47.616288][ T1897]  brcmf_attach+0x246/0xd40
[   47.616758][ T1897]  ? wiphy_new_nm+0x1703/0x1dd0
[   47.617280][ T1897]  ? kmemdup+0x43/0x50
[   47.617720][ T1897]  brcmf_usb_probe+0x12de/0x1690
[   47.618244][ T1897]  ? brcmf_usbdev_qinit.constprop.0+0x470/0x470
[   47.618901][ T1897]  usb_probe_interface+0x2aa/0x760
[   47.619429][ T1897]  ? usb_probe_device+0x250/0x250
[   47.619950][ T1897]  really_probe+0x205/0xb70
[   47.620435][ T1897]  ? driver_allows_async_probing+0x130/0x130
[   47.621048][ T1897]  __driver_probe_device+0x311/0x4b0
[   47.621595][ T1897]  ? driver_allows_async_probing+0x130/0x130
[   47.622209][ T1897]  driver_probe_device+0x4e/0x150
[   47.622739][ T1897]  __device_attach_driver+0x1cc/0x2a0
[   47.623287][ T1897]  bus_for_each_drv+0x156/0x1d0
[   47.623796][ T1897]  ? bus_rescan_devices+0x30/0x30
[   47.624309][ T1897]  ? lockdep_hardirqs_on_prepare+0x273/0x3e0
[   47.624907][ T1897]  ? trace_hardirqs_on+0x46/0x160
[   47.625437][ T1897]  __device_attach+0x23f/0x3a0
[   47.625924][ T1897]  ? device_bind_driver+0xd0/0xd0
[   47.626433][ T1897]  ? kobject_uevent_env+0x287/0x14b0
[   47.627057][ T1897]  bus_probe_device+0x1da/0x290
[   47.627557][ T1897]  device_add+0xb7b/0x1eb0
[   47.628027][ T1897]  ? wait_for_completion+0x290/0x290
[   47.628593][ T1897]  ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0
[   47.629249][ T1897]  usb_set_configuration+0xf59/0x16f0
[   47.629829][ T1897]  usb_generic_driver_probe+0x82/0xa0
[   47.630385][ T1897]  usb_probe_device+0xbb/0x250
[   47.630927][ T1897]  ? usb_suspend+0x590/0x590
[   47.631397][ T1897]  really_probe+0x205/0xb70
[   47.631855][ T1897]  ? driver_allows_async_probing+0x130/0x130
[   47.632469][ T1897]  __driver_probe_device+0x311/0x4b0
[   47.633002][ 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50258/">CVE-2022-50258 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50258">CVE-2022-50258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249947">SUSE bug 1249947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249948">SUSE bug 1249948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50263" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50263" ref_url="https://www.suse.com/security/cve/CVE-2022-50263" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpasim: fix memory leak when freeing IOTLBs

After commit bda324fd037a ("vdpasim: control virtqueue support"),
vdpasim-&gt;iommu became an array of IOTLB, so we should clean the
mappings of each free one by one instead of just deleting the ranges
in the first IOTLB which may leak maps.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50263/">CVE-2022-50263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50263">CVE-2022-50263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249663">SUSE bug 1249663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50269" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50269" ref_url="https://www.suse.com/security/cve/CVE-2022-50269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vkms: Fix memory leak in vkms_init()

A memory leak was reported after the vkms module install failed.

unreferenced object 0xffff88810bc28520 (size 16):
  comm "modprobe", pid 9662, jiffies 4298009455 (age 42.590s)
  hex dump (first 16 bytes):
    01 01 00 64 81 88 ff ff 00 00 dc 0a 81 88 ff ff  ...d............
  backtrace:
    [&lt;00000000e7561ff8&gt;] kmalloc_trace+0x27/0x60
    [&lt;000000000b1954a0&gt;] 0xffffffffc45200a9
    [&lt;00000000abbf1da0&gt;] do_one_initcall+0xd0/0x4f0
    [&lt;000000001505ee87&gt;] do_init_module+0x1a4/0x680
    [&lt;00000000958079ad&gt;] load_module+0x6249/0x7110
    [&lt;00000000117e4696&gt;] __do_sys_finit_module+0x140/0x200
    [&lt;00000000f74b12d2&gt;] do_syscall_64+0x35/0x80
    [&lt;000000008fc6fcde&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

The reason is that the vkms_init() returns without checking the return
value of vkms_create(), and if the vkms_create() failed, the config
allocated at the beginning of vkms_init() is leaked.

 vkms_init()
   config = kmalloc(...) # config allocated
   ...
   return vkms_create() # vkms_create failed and config is leaked

Fix this problem by checking return value of vkms_create() and free the
config if error happened.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50269/">CVE-2022-50269 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50269">CVE-2022-50269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249777">SUSE bug 1249777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50271" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50271" ref_url="https://www.suse.com/security/cve/CVE-2022-50271" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost/vsock: Use kvmalloc/kvfree for larger packets.

When copying a large file over sftp over vsock, data size is usually 32kB,
and kmalloc seems to fail to try to allocate 32 32kB regions.

 vhost-5837: page allocation failure: order:4, mode:0x24040c0
 Call Trace:
  [&lt;ffffffffb6a0df64&gt;] dump_stack+0x97/0xdb
  [&lt;ffffffffb68d6aed&gt;] warn_alloc_failed+0x10f/0x138
  [&lt;ffffffffb68d868a&gt;] ? __alloc_pages_direct_compact+0x38/0xc8
  [&lt;ffffffffb664619f&gt;] __alloc_pages_nodemask+0x84c/0x90d
  [&lt;ffffffffb6646e56&gt;] alloc_kmem_pages+0x17/0x19
  [&lt;ffffffffb6653a26&gt;] kmalloc_order_trace+0x2b/0xdb
  [&lt;ffffffffb66682f3&gt;] __kmalloc+0x177/0x1f7
  [&lt;ffffffffb66e0d94&gt;] ? copy_from_iter+0x8d/0x31d
  [&lt;ffffffffc0689ab7&gt;] vhost_vsock_handle_tx_kick+0x1fa/0x301 [vhost_vsock]
  [&lt;ffffffffc06828d9&gt;] vhost_worker+0xf7/0x157 [vhost]
  [&lt;ffffffffb683ddce&gt;] kthread+0xfd/0x105
  [&lt;ffffffffc06827e2&gt;] ? vhost_dev_set_owner+0x22e/0x22e [vhost]
  [&lt;ffffffffb683dcd1&gt;] ? flush_kthread_worker+0xf3/0xf3
  [&lt;ffffffffb6eb332e&gt;] ret_from_fork+0x4e/0x80
  [&lt;ffffffffb683dcd1&gt;] ? flush_kthread_worker+0xf3/0xf3

Work around by doing kvmalloc instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50271/">CVE-2022-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50271">CVE-2022-50271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249740">SUSE bug 1249740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50272" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50272" ref_url="https://www.suse.com/security/cve/CVE-2022-50272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()

Wei Chen reports a kernel bug as blew:

general protection fault, probably for non-canonical address
KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
...
Call Trace:
&lt;TASK&gt;
__i2c_transfer+0x77e/0x1930 drivers/i2c/i2c-core-base.c:2109
i2c_transfer+0x1d5/0x3d0 drivers/i2c/i2c-core-base.c:2170
i2cdev_ioctl_rdwr+0x393/0x660 drivers/i2c/i2c-dev.c:297
i2cdev_ioctl+0x75d/0x9f0 drivers/i2c/i2c-dev.c:458
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:870 [inline]
__se_sys_ioctl+0xfb/0x170 fs/ioctl.c:856
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x3d/0x90 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fd834a8bded

In az6027_i2c_xfer(), if msg[i].addr is 0x99,
a null-ptr-deref will caused when accessing msg[i].buf.
For msg[i].len is 0 and msg[i].buf is null.

Fix this by checking msg[i].len in az6027_i2c_xfer().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50272/">CVE-2022-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50272">CVE-2022-50272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249808">SUSE bug 1249808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50275" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50275" ref_url="https://www.suse.com/security/cve/CVE-2022-50275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Add the missed acpi_put_table() to fix memory leak

When the radeon driver reads the bios information from ACPI
table in radeon_acpi_vfct_bios(), it misses to call acpi_put_table()
to release the ACPI memory after the init, so add acpi_put_table()
properly to fix the memory leak.

v2: fix text formatting (Alex)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50275/">CVE-2022-50275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50275">CVE-2022-50275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249705">SUSE bug 1249705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50276</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50276" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50276" ref_url="https://www.suse.com/security/cve/CVE-2022-50276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: fix null pointer dereferencing in power_supply_get_battery_info

when kmalloc() fail to allocate memory in kasprintf(), propname
will be NULL, strcmp() called by of_get_property() will cause
null pointer dereference.

So return ENOMEM if kasprintf() return NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50276/">CVE-2022-50276 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50276">CVE-2022-50276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249651">SUSE bug 1249651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50277" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50277" ref_url="https://www.suse.com/security/cve/CVE-2022-50277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: don't allow journal inode to have encrypt flag

Mounting a filesystem whose journal inode has the encrypt flag causes a
NULL dereference in fscrypt_limit_io_blocks() when the 'inlinecrypt'
mount option is used.

The problem is that when jbd2_journal_init_inode() calls bmap(), it
eventually finds its way into ext4_iomap_begin(), which calls
fscrypt_limit_io_blocks().  fscrypt_limit_io_blocks() requires that if
the inode is encrypted, then its encryption key must already be set up.
That's not the case here, since the journal inode is never "opened" like
a normal file would be.  Hence the crash.

A reproducer is:

    mkfs.ext4 -F /dev/vdb
    debugfs -w /dev/vdb -R "set_inode_field &lt;8&gt; flags 0x80808"
    mount /dev/vdb /mnt -o inlinecrypt

To fix this, make ext4 consider journal inodes with the encrypt flag to
be invalid.  (Note, maybe other flags should be rejected on the journal
inode too.  For now, this is just the minimal fix for the above issue.)

I've marked this as fixing the commit that introduced the call to
fscrypt_limit_io_blocks(), since that's what made an actual crash start
being possible.  But this fix could be applied to any version of ext4
that supports the encrypt feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50277/">CVE-2022-50277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50277">CVE-2022-50277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249750">SUSE bug 1249750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254449">SUSE bug 1254449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50279</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50279" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50279" ref_url="https://www.suse.com/security/cve/CVE-2022-50279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit()

There is a global-out-of-bounds reported by KASAN:

  BUG: KASAN: global-out-of-bounds in
  _rtl8812ae_eq_n_byte.part.0+0x3d/0x84 [rtl8821ae]
  Read of size 1 at addr ffffffffa0773c43 by task NetworkManager/411

  CPU: 6 PID: 411 Comm: NetworkManager Tainted: G      D
  6.1.0-rc8+ #144 e15588508517267d37
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009),
  Call Trace:
   &lt;TASK&gt;
   ...
   kasan_report+0xbb/0x1c0
   _rtl8812ae_eq_n_byte.part.0+0x3d/0x84 [rtl8821ae]
   rtl8821ae_phy_bb_config.cold+0x346/0x641 [rtl8821ae]
   rtl8821ae_hw_init+0x1f5e/0x79b0 [rtl8821ae]
   ...
   &lt;/TASK&gt;

The root cause of the problem is that the comparison order of
"prate_section" in _rtl8812ae_phy_set_txpower_limit() is wrong. The
_rtl8812ae_eq_n_byte() is used to compare the first n bytes of the two
strings from tail to head, which causes the problem. In the
_rtl8812ae_phy_set_txpower_limit(), it was originally intended to meet
this requirement by carefully designing the comparison order.
For example, "pregulation" and "pbandwidth" are compared in order of
length from small to large, first is 3 and last is 4. However, the
comparison order of "prate_section" dose not obey such order requirement,
therefore when "prate_section" is "HT", when comparing from tail to head,
it will lead to access out of bounds in _rtl8812ae_eq_n_byte(). As
mentioned above, the _rtl8812ae_eq_n_byte() has the same function as
strcmp(), so just strcmp() is enough.

Fix it by removing _rtl8812ae_eq_n_byte() and use strcmp() barely.
Although it can be fixed by adjusting the comparison order of
"prate_section", this may cause the value of "rate_section" to not be
from 0 to 5. In addition, commit "21e4b0726dc6" not only moved driver
from staging to regular tree, but also added setting txpower limit
function during the driver config phase, so the problem was introduced
by this commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50279/">CVE-2022-50279 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50279">CVE-2022-50279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249751">SUSE bug 1249751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249766">SUSE bug 1249766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50285" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50285" ref_url="https://www.suse.com/security/cve/CVE-2022-50285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm,hugetlb: take hugetlb_lock before decrementing h-&gt;resv_huge_pages

The h-&gt;*_huge_pages counters are protected by the hugetlb_lock, but
alloc_huge_page has a corner case where it can decrement the counter
outside of the lock.

This could lead to a corrupted value of h-&gt;resv_huge_pages, which we have
observed on our systems.

Take the hugetlb_lock before decrementing h-&gt;resv_huge_pages to avoid a
potential race.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50285/">CVE-2022-50285 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50285">CVE-2022-50285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249803">SUSE bug 1249803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50286" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50286" ref_url="https://www.suse.com/security/cve/CVE-2022-50286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline

When converting files with inline data to extents, delayed allocations
made on a file system created with both the bigalloc and inline options
can result in invalid extent status cache content, incorrect reserved
cluster counts, kernel memory leaks, and potential kernel panics.

With bigalloc, the code that determines whether a block must be
delayed allocated searches the extent tree to see if that block maps
to a previously allocated cluster.  If not, the block is delayed
allocated, and otherwise, it isn't.  However, if the inline option is
also used, and if the file containing the block is marked as able to
store data inline, there isn't a valid extent tree associated with
the file.  The current code in ext4_clu_mapped() calls
ext4_find_extent() to search the non-existent tree for a previously
allocated cluster anyway, which typically finds nothing, as desired.
However, a side effect of the search can be to cache invalid content
from the non-existent tree (garbage) in the extent status tree,
including bogus entries in the pending reservation tree.

To fix this, avoid searching the extent tree when allocating blocks
for bigalloc + inline files that are being converted from inline to
extent mapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50286/">CVE-2022-50286 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50286">CVE-2022-50286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249753">SUSE bug 1249753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50287" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50287" ref_url="https://www.suse.com/security/cve/CVE-2022-50287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/bios: fix a memory leak in generate_lfp_data_ptrs

When (size != 0 || ptrs-&gt;lvds_ entries != 3), the program tries to
free() the ptrs. However, the ptrs is not created by calling kzmalloc(),
but is obtained by pointer offset operation.
This may lead to memory leaks or undefined behavior.

Fix this by replacing the arguments of kfree() with ptrs_block.

(cherry picked from commit 7674cd0b7d28b952151c3df26bbfa7e07eb2b4ec)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50287/">CVE-2022-50287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50287">CVE-2022-50287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249757">SUSE bug 1249757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50290</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50290" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50290" ref_url="https://www.suse.com/security/cve/CVE-2022-50290" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50290/">CVE-2022-50290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50290">CVE-2022-50290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253027">SUSE bug 1253027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50295</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50295" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50295" ref_url="https://www.suse.com/security/cve/CVE-2022-50295" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/msg_ring: Fix NULL pointer dereference in io_msg_send_fd()

Syzkaller produced the below call trace:

 BUG: KASAN: null-ptr-deref in io_msg_ring+0x3cb/0x9f0
 Write of size 8 at addr 0000000000000070 by task repro/16399

 CPU: 0 PID: 16399 Comm: repro Not tainted 6.1.0-rc1 #28
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0xcd/0x134
  ? io_msg_ring+0x3cb/0x9f0
  kasan_report+0xbc/0xf0
  ? io_msg_ring+0x3cb/0x9f0
  kasan_check_range+0x140/0x190
  io_msg_ring+0x3cb/0x9f0
  ? io_msg_ring_prep+0x300/0x300
  io_issue_sqe+0x698/0xca0
  io_submit_sqes+0x92f/0x1c30
  __do_sys_io_uring_enter+0xae4/0x24b0
....
 RIP: 0033:0x7f2eaf8f8289
 RSP: 002b:00007fff40939718 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa
 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2eaf8f8289
 RDX: 0000000000000000 RSI: 0000000000006f71 RDI: 0000000000000004
 RBP: 00007fff409397a0 R08: 0000000000000000 R09: 0000000000000039
 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004006d0
 R13: 00007fff40939880 R14: 0000000000000000 R15: 0000000000000000
  &lt;/TASK&gt;
 Kernel panic - not syncing: panic_on_warn set ...

We don't have a NULL check on file_ptr in io_msg_send_fd() function,
so when file_ptr is NUL src_file is also NULL and get_file()
dereferences a NULL pointer and leads to above crash.

Add a NULL check to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50295/">CVE-2022-50295 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50295">CVE-2022-50295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249665">SUSE bug 1249665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50297</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50297" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50297" ref_url="https://www.suse.com/security/cve/CVE-2022-50297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: verify the expected usb_endpoints are present

The bug arises when a USB device claims to be an ATH9K but doesn't
have the expected endpoints. (In this case there was an interrupt
endpoint where the driver expected a bulk endpoint.) The kernel
needs to be able to handle such devices without getting an internal error.

usb 1-1: BOGUS urb xfer, pipe 3 != type 1
WARNING: CPU: 3 PID: 500 at drivers/usb/core/urb.c:493 usb_submit_urb+0xce2/0x1430 drivers/usb/core/urb.c:493
Modules linked in:
CPU: 3 PID: 500 Comm: kworker/3:2 Not tainted 5.10.135-syzkaller #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
Workqueue: events request_firmware_work_func
RIP: 0010:usb_submit_urb+0xce2/0x1430 drivers/usb/core/urb.c:493
Call Trace:
 ath9k_hif_usb_alloc_rx_urbs drivers/net/wireless/ath/ath9k/hif_usb.c:908 [inline]
 ath9k_hif_usb_alloc_urbs+0x75e/0x1010 drivers/net/wireless/ath/ath9k/hif_usb.c:1019
 ath9k_hif_usb_dev_init drivers/net/wireless/ath/ath9k/hif_usb.c:1109 [inline]
 ath9k_hif_usb_firmware_cb+0x142/0x530 drivers/net/wireless/ath/ath9k/hif_usb.c:1242
 request_firmware_work_func+0x12e/0x240 drivers/base/firmware_loader/main.c:1097
 process_one_work+0x9af/0x1600 kernel/workqueue.c:2279
 worker_thread+0x61d/0x12f0 kernel/workqueue.c:2425
 kthread+0x3b4/0x4a0 kernel/kthread.c:313
 ret_from_fork+0x22/0x30 arch/x86/entry/entry_64.S:299

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50297/">CVE-2022-50297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50297">CVE-2022-50297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250250">SUSE bug 1250250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50299</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50299" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50299" ref_url="https://www.suse.com/security/cve/CVE-2022-50299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: Replace snprintf with scnprintf

Current code produces a warning as shown below when total characters
in the constituent block device names plus the slashes exceeds 200.
snprintf() returns the number of characters generated from the given
input, which could cause the expression “200 - len” to wrap around
to a large positive number. Fix this by using scnprintf() instead,
which returns the actual number of characters written into the buffer.

[ 1513.267938] ------------[ cut here ]------------
[ 1513.267943] WARNING: CPU: 15 PID: 37247 at &lt;snip&gt;/lib/vsprintf.c:2509 vsnprintf+0x2c8/0x510
[ 1513.267944] Modules linked in:  &lt;snip&gt;
[ 1513.267969] CPU: 15 PID: 37247 Comm: mdadm Not tainted 5.4.0-1085-azure #90~18.04.1-Ubuntu
[ 1513.267969] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 05/09/2022
[ 1513.267971] RIP: 0010:vsnprintf+0x2c8/0x510
&lt;-snip-&gt;
[ 1513.267982] Call Trace:
[ 1513.267986]  snprintf+0x45/0x70
[ 1513.267990]  ? disk_name+0x71/0xa0
[ 1513.267993]  dump_zones+0x114/0x240 [raid0]
[ 1513.267996]  ? _cond_resched+0x19/0x40
[ 1513.267998]  raid0_run+0x19e/0x270 [raid0]
[ 1513.268000]  md_run+0x5e0/0xc50
[ 1513.268003]  ? security_capable+0x3f/0x60
[ 1513.268005]  do_md_run+0x19/0x110
[ 1513.268006]  md_ioctl+0x195e/0x1f90
[ 1513.268007]  blkdev_ioctl+0x91f/0x9f0
[ 1513.268010]  block_ioctl+0x3d/0x50
[ 1513.268012]  do_vfs_ioctl+0xa9/0x640
[ 1513.268014]  ? __fput+0x162/0x260
[ 1513.268016]  ksys_ioctl+0x75/0x80
[ 1513.268017]  __x64_sys_ioctl+0x1a/0x20
[ 1513.268019]  do_syscall_64+0x5e/0x200
[ 1513.268021]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50299/">CVE-2022-50299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50299">CVE-2022-50299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249734">SUSE bug 1249734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50302" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50302" ref_url="https://www.suse.com/security/cve/CVE-2022-50302" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lockd: set other missing fields when unlocking files

vfs_lock_file() expects the struct file_lock to be fully initialised by
the caller. Re-exported NFSv3 has been seen to Oops if the fl_file field
is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50302/">CVE-2022-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50302">CVE-2022-50302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249731">SUSE bug 1249731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50303</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50303" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50303" ref_url="https://www.suse.com/security/cve/CVE-2022-50303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix double release compute pasid

If kfd_process_device_init_vm returns failure after vm is converted to
compute vm and vm-&gt;pasid set to compute pasid, KFD will not take
pdd-&gt;drm_file reference. As a result, drm close file handler maybe
called to release the compute pasid before KFD process destroy worker to
release the same pasid and set vm-&gt;pasid to zero, this generates below
WARNING backtrace and NULL pointer access.

Add helper amdgpu_amdkfd_gpuvm_set_vm_pasid and call it at the last step
of kfd_process_device_init_vm, to ensure vm pasid is the original pasid
if acquiring vm failed or is the compute pasid with pdd-&gt;drm_file
reference taken to avoid double release same pasid.

 amdgpu: Failed to create process VM object
 ida_free called for id=32770 which is not allocated.
 WARNING: CPU: 57 PID: 72542 at ../lib/idr.c:522 ida_free+0x96/0x140
 RIP: 0010:ida_free+0x96/0x140
 Call Trace:
  amdgpu_pasid_free_delayed+0xe1/0x2a0 [amdgpu]
  amdgpu_driver_postclose_kms+0x2d8/0x340 [amdgpu]
  drm_file_free.part.13+0x216/0x270 [drm]
  drm_close_helper.isra.14+0x60/0x70 [drm]
  drm_release+0x6e/0xf0 [drm]
  __fput+0xcc/0x280
  ____fput+0xe/0x20
  task_work_run+0x96/0xc0
  do_exit+0x3d0/0xc10

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 RIP: 0010:ida_free+0x76/0x140
 Call Trace:
  amdgpu_pasid_free_delayed+0xe1/0x2a0 [amdgpu]
  amdgpu_driver_postclose_kms+0x2d8/0x340 [amdgpu]
  drm_file_free.part.13+0x216/0x270 [drm]
  drm_close_helper.isra.14+0x60/0x70 [drm]
  drm_release+0x6e/0xf0 [drm]
  __fput+0xcc/0x280
  ____fput+0xe/0x20
  task_work_run+0x96/0xc0
  do_exit+0x3d0/0xc10
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50303/">CVE-2022-50303 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50303">CVE-2022-50303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249884">SUSE bug 1249884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50306</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50306" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50306" ref_url="https://www.suse.com/security/cve/CVE-2022-50306" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix potential out of bound read in ext4_fc_replay_scan()

For scan loop must ensure that at least EXT4_FC_TAG_BASE_LEN space. If remain
space less than EXT4_FC_TAG_BASE_LEN which will lead to out of bound read
when mounting corrupt file system image.
ADD_RANGE/HEAD/TAIL is needed to add extra check when do journal scan, as this
three tags will read data during scan, tag length couldn't less than data length
which will read.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50306/">CVE-2022-50306 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50306">CVE-2022-50306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50308</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50308" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50308" ref_url="https://www.suse.com/security/cve/CVE-2022-50308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: Add checks for devm_kcalloc

As the devm_kcalloc may return NULL, the return value needs to be checked
to avoid NULL poineter dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50308/">CVE-2022-50308 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50308">CVE-2022-50308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249722">SUSE bug 1249722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50313" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50313" ref_url="https://www.suse.com/security/cve/CVE-2022-50313" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix order &gt;= MAX_ORDER warning due to crafted negative i_size

As syzbot reported [1], the root cause is that i_size field is a
signed type, and negative i_size is also less than EROFS_BLKSIZ.
As a consequence, it's handled as fast symlink unexpectedly.

Let's fall back to the generic path to deal with such unusual i_size.

[1] https://lore.kernel.org/r/000000000000ac8efa05e7feaa1f@google.com
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50313/">CVE-2022-50313 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50313">CVE-2022-50313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249717">SUSE bug 1249717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50317</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50317" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50317" ref_url="https://www.suse.com/security/cve/CVE-2022-50317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: megachips: Fix a null pointer dereference bug

When removing the module we will get the following warning:

[   31.911505] i2c-core: driver [stdp2690-ge-b850v3-fw] unregistered
[   31.912484] general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI
[   31.913338] KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
[   31.915280] RIP: 0010:drm_bridge_remove+0x97/0x130
[   31.921825] Call Trace:
[   31.922533]  stdp4028_ge_b850v3_fw_remove+0x34/0x60 [megachips_stdpxxxx_ge_b850v3_fw]
[   31.923139]  i2c_device_remove+0x181/0x1f0

The two bridges (stdp2690, stdp4028) do not probe at the same time, so
the driver does not call ge_b850v3_resgiter() when probing, causing the
driver to try to remove the object that has not been initialized.

Fix this by checking whether both the bridges are probed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50317/">CVE-2022-50317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50317">CVE-2022-50317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249713">SUSE bug 1249713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50318" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50318" ref_url="https://www.suse.com/security/cve/CVE-2022-50318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/uncore: Fix reference count leak in hswep_has_limit_sbox()

pci_get_device() will increase the reference count for the returned
'dev'. We need to call pci_dev_put() to decrease the reference count.
Since 'dev' is only used in pci_read_config_dword(), let's add
pci_dev_put() right after it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50318/">CVE-2022-50318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50318">CVE-2022-50318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249709">SUSE bug 1249709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50319" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50319" ref_url="https://www.suse.com/security/cve/CVE-2022-50319" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: trbe: remove cpuhp instance node before remove cpuhp state

cpuhp_state_add_instance() and cpuhp_state_remove_instance() should
be used in pairs. Or there will lead to the warn on
cpuhp_remove_multi_state() since the cpuhp_step list is not empty.

The following is the error log with 'rmmod coresight-trbe':
Error: Removing state 215 which has instances left.
Call trace:
  __cpuhp_remove_state_cpuslocked+0x144/0x160
  __cpuhp_remove_state+0xac/0x100
  arm_trbe_device_remove+0x2c/0x60 [coresight_trbe]
  platform_remove+0x34/0x70
  device_remove+0x54/0x90
  device_release_driver_internal+0x1e4/0x250
  driver_detach+0x5c/0xb0
  bus_remove_driver+0x64/0xc0
  driver_unregister+0x3c/0x70
  platform_driver_unregister+0x20/0x30
  arm_trbe_exit+0x1c/0x658 [coresight_trbe]
  __arm64_sys_delete_module+0x1ac/0x24c
  invoke_syscall+0x50/0x120
  el0_svc_common.constprop.0+0x58/0x1a0
  do_el0_svc+0x38/0xd0
  el0_svc+0x2c/0xc0
  el0t_64_sync_handler+0x1ac/0x1b0
  el0t_64_sync+0x19c/0x1a0
 ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50319/">CVE-2022-50319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50319">CVE-2022-50319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249710">SUSE bug 1249710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50322" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50322" ref_url="https://www.suse.com/security/cve/CVE-2022-50322" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtc: msc313: Fix function prototype mismatch in msc313_rtc_probe()

With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),
indirect call targets are validated against the expected function
pointer prototype to make sure the call target is valid to help mitigate
ROP attacks. If they are not identical, there is a failure at run time,
which manifests as either a kernel panic or thread getting killed.

msc313_rtc_probe() was passing clk_disable_unprepare() directly, which
did not have matching prototypes for devm_add_action_or_reset()'s
callback argument. Refactor to use devm_clk_get_enabled() instead.

This was found as a result of Clang's new -Wcast-function-type-strict
flag, which is more sensitive than the simpler -Wcast-function-type,
which only checks for type width mismatches.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50322/">CVE-2022-50322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50322">CVE-2022-50322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249789">SUSE bug 1249789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50325</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50325" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50325" ref_url="https://www.suse.com/security/cve/CVE-2022-50325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Fix potential RX buffer overflow

If an event caused firmware to return invalid RX size for
LARGE_CONFIG_GET, memcpy_fromio() could end up copying too many bytes.
Fix by utilizing min_t().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50325/">CVE-2022-50325 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50325">CVE-2022-50325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249704">SUSE bug 1249704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50326</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50326" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50326" ref_url="https://www.suse.com/security/cve/CVE-2022-50326" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: airspy: fix memory leak in airspy probe

The commit ca9dc8d06ab6 ("media: airspy: respect the DMA coherency
 rules") moves variable buf from stack to heap, however, it only frees
buf in the error handling code, missing deallocation in the success
path.

Fix this by freeing buf in the success path since this variable does not
have any references in other code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50326/">CVE-2022-50326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50326">CVE-2022-50326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249703">SUSE bug 1249703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50327</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50327" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50327" ref_url="https://www.suse.com/security/cve/CVE-2022-50327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value

The return value of acpi_fetch_acpi_dev() could be NULL, which would
cause a NULL pointer dereference to occur in acpi_device_hid().

[ rjw: Subject and changelog edits, added empty line after if () ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50327/">CVE-2022-50327 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50327">CVE-2022-50327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249859">SUSE bug 1249859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254451">SUSE bug 1254451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50329</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50329" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50329" ref_url="https://www.suse.com/security/cve/CVE-2022-50329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix uaf for bfqq in bfq_exit_icq_bfqq

Commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq-&gt;bic'")
will access 'bic-&gt;bfqq' in bic_set_bfqq(), however, bfq_exit_icq_bfqq()
can free bfqq first, and then call bic_set_bfqq(), which will cause uaf.

Fix the problem by moving bfq_exit_bfqq() behind bic_set_bfqq().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50329/">CVE-2022-50329 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50329">CVE-2022-50329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249699">SUSE bug 1249699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50341" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50341" ref_url="https://www.suse.com/security/cve/CVE-2022-50341" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix oops during encryption

When running xfstests against Azure the following oops occurred on an
arm64 system

  Unable to handle kernel write to read-only memory at virtual address
  ffff0001221cf000
  Mem abort info:
    ESR = 0x9600004f
    EC = 0x25: DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x0f: level 3 permission fault
  Data abort info:
    ISV = 0, ISS = 0x0000004f
    CM = 0, WnR = 1
  swapper pgtable: 4k pages, 48-bit VAs, pgdp=00000000294f3000
  [ffff0001221cf000] pgd=18000001ffff8003, p4d=18000001ffff8003,
  pud=18000001ff82e003, pmd=18000001ff71d003, pte=00600001221cf787
  Internal error: Oops: 9600004f [#1] PREEMPT SMP
  ...
  pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--)
  pc : __memcpy+0x40/0x230
  lr : scatterwalk_copychunks+0xe0/0x200
  sp : ffff800014e92de0
  x29: ffff800014e92de0 x28: ffff000114f9de80 x27: 0000000000000008
  x26: 0000000000000008 x25: ffff800014e92e78 x24: 0000000000000008
  x23: 0000000000000001 x22: 0000040000000000 x21: ffff000000000000
  x20: 0000000000000001 x19: ffff0001037c4488 x18: 0000000000000014
  x17: 235e1c0d6efa9661 x16: a435f9576b6edd6c x15: 0000000000000058
  x14: 0000000000000001 x13: 0000000000000008 x12: ffff000114f2e590
  x11: ffffffffffffffff x10: 0000040000000000 x9 : ffff8000105c3580
  x8 : 2e9413b10000001a x7 : 534b4410fb86b005 x6 : 534b4410fb86b005
  x5 : ffff0001221cf008 x4 : ffff0001037c4490 x3 : 0000000000000001
  x2 : 0000000000000008 x1 : ffff0001037c4488 x0 : ffff0001221cf000
  Call trace:
   __memcpy+0x40/0x230
   scatterwalk_map_and_copy+0x98/0x100
   crypto_ccm_encrypt+0x150/0x180
   crypto_aead_encrypt+0x2c/0x40
   crypt_message+0x750/0x880
   smb3_init_transform_rq+0x298/0x340
   smb_send_rqst.part.11+0xd8/0x180
   smb_send_rqst+0x3c/0x100
   compound_send_recv+0x534/0xbc0
   smb2_query_info_compound+0x32c/0x440
   smb2_set_ea+0x438/0x4c0
   cifs_xattr_set+0x5d4/0x7c0

This is because in scatterwalk_copychunks(), we attempted to write to
a buffer (@sign) that was allocated in the stack (vmalloc area) by
crypt_message() and thus accessing its remaining 8 (x2) bytes ended up
crossing a page boundary.

To simply fix it, we could just pass @sign kmalloc'd from
crypt_message() and then we're done.  Luckily, we don't seem to pass
any other vmalloc'd buffers in smb_rqst::rq_iov...

Instead, let's map the correct pages and offsets from vmalloc buffers
as well in cifs_sg_set_buf() and then avoiding such oopses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50341/">CVE-2022-50341 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50341">CVE-2022-50341 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50342</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50342" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50342" ref_url="https://www.suse.com/security/cve/CVE-2022-50342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

floppy: Fix memory leak in do_floppy_init()

A memory leak was reported when floppy_alloc_disk() failed in
do_floppy_init().

unreferenced object 0xffff888115ed25a0 (size 8):
  comm "modprobe", pid 727, jiffies 4295051278 (age 25.529s)
  hex dump (first 8 bytes):
    00 ac 67 5b 81 88 ff ff                          ..g[....
  backtrace:
    [&lt;000000007f457abb&gt;] __kmalloc_node+0x4c/0xc0
    [&lt;00000000a87bfa9e&gt;] blk_mq_realloc_tag_set_tags.part.0+0x6f/0x180
    [&lt;000000006f02e8b1&gt;] blk_mq_alloc_tag_set+0x573/0x1130
    [&lt;0000000066007fd7&gt;] 0xffffffffc06b8b08
    [&lt;0000000081f5ac40&gt;] do_one_initcall+0xd0/0x4f0
    [&lt;00000000e26d04ee&gt;] do_init_module+0x1a4/0x680
    [&lt;000000001bb22407&gt;] load_module+0x6249/0x7110
    [&lt;00000000ad31ac4d&gt;] __do_sys_finit_module+0x140/0x200
    [&lt;000000007bddca46&gt;] do_syscall_64+0x35/0x80
    [&lt;00000000b5afec39&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0
unreferenced object 0xffff88810fc30540 (size 32):
  comm "modprobe", pid 727, jiffies 4295051278 (age 25.529s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;000000007f457abb&gt;] __kmalloc_node+0x4c/0xc0
    [&lt;000000006b91eab4&gt;] blk_mq_alloc_tag_set+0x393/0x1130
    [&lt;0000000066007fd7&gt;] 0xffffffffc06b8b08
    [&lt;0000000081f5ac40&gt;] do_one_initcall+0xd0/0x4f0
    [&lt;00000000e26d04ee&gt;] do_init_module+0x1a4/0x680
    [&lt;000000001bb22407&gt;] load_module+0x6249/0x7110
    [&lt;00000000ad31ac4d&gt;] __do_sys_finit_module+0x140/0x200
    [&lt;000000007bddca46&gt;] do_syscall_64+0x35/0x80
    [&lt;00000000b5afec39&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

If the floppy_alloc_disk() failed, disks of current drive will not be set,
thus the lastest allocated set-&gt;tag cannot be freed in the error handling
path. A simple call graph shown as below:

 floppy_module_init()
   floppy_init()
     do_floppy_init()
       for (drive = 0; drive &lt; N_DRIVE; drive++)
         blk_mq_alloc_tag_set()
           blk_mq_alloc_tag_set_tags()
             blk_mq_realloc_tag_set_tags() # set-&gt;tag allocated
         floppy_alloc_disk()
           blk_mq_alloc_disk() # error occurred, disks failed to allocated

       -&gt;out_put_disk:
       for (drive = 0; drive &lt; N_DRIVE; drive++)
         if (!disks[drive][0]) # the last disks is not set and loop break
           break;
         blk_mq_free_tag_set() # the latest allocated set-&gt;tag leaked

Fix this problem by free the set-&gt;tag of current drive before jump to
error handling path.

[efremov: added stable list, changed title]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50342/">CVE-2022-50342 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50342">CVE-2022-50342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249890">SUSE bug 1249890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50344</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50344" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50344" ref_url="https://www.suse.com/security/cve/CVE-2022-50344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix null-ptr-deref in ext4_write_info

I caught a null-ptr-deref bug as follows:
==================================================================
KASAN: null-ptr-deref in range [0x0000000000000068-0x000000000000006f]
CPU: 1 PID: 1589 Comm: umount Not tainted 5.10.0-02219-dirty #339
RIP: 0010:ext4_write_info+0x53/0x1b0
[...]
Call Trace:
 dquot_writeback_dquots+0x341/0x9a0
 ext4_sync_fs+0x19e/0x800
 __sync_filesystem+0x83/0x100
 sync_filesystem+0x89/0xf0
 generic_shutdown_super+0x79/0x3e0
 kill_block_super+0xa1/0x110
 deactivate_locked_super+0xac/0x130
 deactivate_super+0xb6/0xd0
 cleanup_mnt+0x289/0x400
 __cleanup_mnt+0x16/0x20
 task_work_run+0x11c/0x1c0
 exit_to_user_mode_prepare+0x203/0x210
 syscall_exit_to_user_mode+0x5b/0x3a0
 do_syscall_64+0x59/0x70
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
 ==================================================================

Above issue may happen as follows:
-------------------------------------
exit_to_user_mode_prepare
 task_work_run
  __cleanup_mnt
   cleanup_mnt
    deactivate_super
     deactivate_locked_super
      kill_block_super
       generic_shutdown_super
        shrink_dcache_for_umount
         dentry = sb-&gt;s_root
         sb-&gt;s_root = NULL              &lt;--- Here set NULL
        sync_filesystem
         __sync_filesystem
          sb-&gt;s_op-&gt;sync_fs &gt; ext4_sync_fs
           dquot_writeback_dquots
            sb-&gt;dq_op-&gt;write_info &gt; ext4_write_info
             ext4_journal_start(d_inode(sb-&gt;s_root), EXT4_HT_QUOTA, 2)
              d_inode(sb-&gt;s_root)
               s_root-&gt;d_inode          &lt;--- Null pointer dereference

To solve this problem, we use ext4_journal_start_sb directly
to avoid s_root being used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50344/">CVE-2022-50344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50344">CVE-2022-50344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250014">SUSE bug 1250014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50348</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50348" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50348" ref_url="https://www.suse.com/security/cve/CVE-2022-50348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Fix a memory leak in an error handling path

If this memdup_user() call fails, the memory allocated in a previous call
a few lines above should be freed. Otherwise it leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50348/">CVE-2022-50348 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50348">CVE-2022-50348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249924">SUSE bug 1249924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50350</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50350" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50350" ref_url="https://www.suse.com/security/cve/CVE-2022-50350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix a race condition between login_work and the login thread

In case a malicious initiator sends some random data immediately after a
login PDU; the iscsi_target_sk_data_ready() callback will schedule the
login_work and, at the same time, the negotiation may end without clearing
the LOGIN_FLAGS_INITIAL_PDU flag (because no additional PDU exchanges are
required to complete the login).

The login has been completed but the login_work function will find the
LOGIN_FLAGS_INITIAL_PDU flag set and will never stop from rescheduling
itself; at this point, if the initiator drops the connection, the
iscsit_conn structure will be freed, login_work will dereference a released
socket structure and the kernel crashes.

BUG: kernel NULL pointer dereference, address: 0000000000000230
PF: supervisor write access in kernel mode
PF: error_code(0x0002) - not-present page
Workqueue: events iscsi_target_do_login_rx [iscsi_target_mod]
RIP: 0010:_raw_read_lock_bh+0x15/0x30
Call trace:
 iscsi_target_do_login_rx+0x75/0x3f0 [iscsi_target_mod]
 process_one_work+0x1e8/0x3c0

Fix this bug by forcing login_work to stop after the login has been
completed and the socket callbacks have been restored.

Add a comment to clearify the return values of iscsi_target_do_login()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50350/">CVE-2022-50350 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50350">CVE-2022-50350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250261">SUSE bug 1250261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50351</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50351" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50351" ref_url="https://www.suse.com/security/cve/CVE-2022-50351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix xid leak in cifs_create()

If the cifs already shutdown, we should free the xid before return,
otherwise, the xid will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50351/">CVE-2022-50351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50351">CVE-2022-50351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249925">SUSE bug 1249925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50354</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50354" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50354" ref_url="https://www.suse.com/security/cve/CVE-2022-50354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix kfd_process_device_init_vm error handling

Should only destroy the ib_mem and let process cleanup worker to free
the outstanding BOs. Reset the pointer in pdd-&gt;qpd structure, to avoid
NULL pointer access in process destroy worker.

 BUG: kernel NULL pointer dereference, address: 0000000000000010
 Call Trace:
  amdgpu_amdkfd_gpuvm_unmap_gtt_bo_from_kernel+0x46/0xb0 [amdgpu]
  kfd_process_device_destroy_cwsr_dgpu+0x40/0x70 [amdgpu]
  kfd_process_destroy_pdds+0x71/0x190 [amdgpu]
  kfd_process_wq_release+0x2a2/0x3b0 [amdgpu]
  process_one_work+0x2a1/0x600
  worker_thread+0x39/0x3d0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50354/">CVE-2022-50354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50354">CVE-2022-50354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250215">SUSE bug 1250215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50356" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50356" ref_url="https://www.suse.com/security/cve/CVE-2022-50356" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: sfb: fix null pointer access issue when sfb_init() fails

When the default qdisc is sfb, if the qdisc of dev_queue fails to be
inited during mqprio_init(), sfb_reset() is invoked to clear resources.
In this case, the q-&gt;qdisc is NULL, and it will cause gpf issue.

The process is as follows:
qdisc_create_dflt()
	sfb_init()
		tcf_block_get()          ---&gt;failed, q-&gt;qdisc is NULL
	...
	qdisc_put()
		...
		sfb_reset()
			qdisc_reset(q-&gt;qdisc)    ---&gt;q-&gt;qdisc is NULL
				ops = qdisc-&gt;ops

The following is the Call Trace information:
general protection fault, probably for non-canonical address
0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
RIP: 0010:qdisc_reset+0x2b/0x6f0
Call Trace:
&lt;TASK&gt;
sfb_reset+0x37/0xd0
qdisc_reset+0xed/0x6f0
qdisc_destroy+0x82/0x4c0
qdisc_put+0x9e/0xb0
qdisc_create_dflt+0x2c3/0x4a0
mqprio_init+0xa71/0x1760
qdisc_create+0x3eb/0x1000
tc_modify_qdisc+0x408/0x1720
rtnetlink_rcv_msg+0x38e/0xac0
netlink_rcv_skb+0x12d/0x3a0
netlink_unicast+0x4a2/0x740
netlink_sendmsg+0x826/0xcc0
sock_sendmsg+0xc5/0x100
____sys_sendmsg+0x583/0x690
___sys_sendmsg+0xe8/0x160
__sys_sendmsg+0xbf/0x160
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f2164122d04
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50356/">CVE-2022-50356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50356">CVE-2022-50356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250040">SUSE bug 1250040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50357</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50357" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50357" ref_url="https://www.suse.com/security/cve/CVE-2022-50357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: core: fix some leaks in probe

The dwc3_get_properties() function calls:

	dwc-&gt;usb_psy = power_supply_get_by_name(usb_psy_name);

so there is some additional clean up required on these error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50357/">CVE-2022-50357 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50357">CVE-2022-50357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250042">SUSE bug 1250042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50361</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50361" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50361" ref_url="https://www.suse.com/security/cve/CVE-2022-50361" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: add missing unregister_netdev() in wilc_netdev_ifc_init()

Fault injection test reports this issue:

kernel BUG at net/core/dev.c:10731!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
Call Trace:
  &lt;TASK&gt;
  wilc_netdev_ifc_init+0x19f/0x220 [wilc1000 884bf126e9e98af6a708f266a8dffd53f99e4bf5]
  wilc_cfg80211_init+0x30c/0x380 [wilc1000 884bf126e9e98af6a708f266a8dffd53f99e4bf5]
  wilc_bus_probe+0xad/0x2b0 [wilc1000_spi 1520a7539b6589cc6cde2ae826a523a33f8bacff]
  spi_probe+0xe4/0x140
  really_probe+0x17e/0x3f0
  __driver_probe_device+0xe3/0x170
  driver_probe_device+0x49/0x120

The root case here is alloc_ordered_workqueue() fails, but
cfg80211_unregister_netdevice() or unregister_netdev() not be called in
error handling path. To fix add unregister_netdev goto lable to add the
unregister operation in error handling path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50361/">CVE-2022-50361 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50361">CVE-2022-50361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250038">SUSE bug 1250038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50363" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50363" ref_url="https://www.suse.com/security/cve/CVE-2022-50363" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

skmsg: pass gfp argument to alloc_sk_msg()

syzbot found that alloc_sk_msg() could be called from a
non sleepable context. sk_psock_verdict_recv() uses
rcu_read_lock() protection.

We need the callers to pass a gfp_t argument to avoid issues.

syzbot report was:

BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 3613, name: syz-executor414
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
INFO: lockdep is turned off.
CPU: 0 PID: 3613 Comm: syz-executor414 Not tainted 6.0.0-syzkaller-09589-g55be6084c8e0 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
Call Trace:
&lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106
__might_resched+0x538/0x6a0 kernel/sched/core.c:9877
might_alloc include/linux/sched/mm.h:274 [inline]
slab_pre_alloc_hook mm/slab.h:700 [inline]
slab_alloc_node mm/slub.c:3162 [inline]
slab_alloc mm/slub.c:3256 [inline]
kmem_cache_alloc_trace+0x59/0x310 mm/slub.c:3287
kmalloc include/linux/slab.h:600 [inline]
kzalloc include/linux/slab.h:733 [inline]
alloc_sk_msg net/core/skmsg.c:507 [inline]
sk_psock_skb_ingress_self+0x5c/0x330 net/core/skmsg.c:600
sk_psock_verdict_apply+0x395/0x440 net/core/skmsg.c:1014
sk_psock_verdict_recv+0x34d/0x560 net/core/skmsg.c:1201
tcp_read_skb+0x4a1/0x790 net/ipv4/tcp.c:1770
tcp_rcv_established+0x129d/0x1a10 net/ipv4/tcp_input.c:5971
tcp_v4_do_rcv+0x479/0xac0 net/ipv4/tcp_ipv4.c:1681
sk_backlog_rcv include/net/sock.h:1109 [inline]
__release_sock+0x1d8/0x4c0 net/core/sock.c:2906
release_sock+0x5d/0x1c0 net/core/sock.c:3462
tcp_sendmsg+0x36/0x40 net/ipv4/tcp.c:1483
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg net/socket.c:734 [inline]
__sys_sendto+0x46d/0x5f0 net/socket.c:2117
__do_sys_sendto net/socket.c:2129 [inline]
__se_sys_sendto net/socket.c:2125 [inline]
__x64_sys_sendto+0xda/0xf0 net/socket.c:2125
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50363/">CVE-2022-50363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50363">CVE-2022-50363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250036">SUSE bug 1250036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50367" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50367" ref_url="https://www.suse.com/security/cve/CVE-2022-50367" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002196.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: fix UAF/GPF bug in nilfs_mdt_destroy

In alloc_inode, inode_init_always() could return -ENOMEM if
security_inode_alloc() fails, which causes inode-&gt;i_private
uninitialized. Then nilfs_is_metadata_file_inode() returns
true and nilfs_free_inode() wrongly calls nilfs_mdt_destroy(),
which frees the uninitialized inode-&gt;i_private
and leads to crashes(e.g., UAF/GPF).

Fix this by moving security_inode_alloc just prior to
this_cpu_inc(nr_inodes)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50367/">CVE-2022-50367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50367">CVE-2022-50367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250277">SUSE bug 1250277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024764" comment="kernel-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024765" comment="kernel-abi-stablelists-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024766" comment="kernel-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024767" comment="kernel-cross-headers-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024768" comment="kernel-debug-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024769" comment="kernel-debug-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024772" comment="kernel-debug-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024773" comment="kernel-debug-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024774" comment="kernel-debug-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024775" comment="kernel-debug-uki-virt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024778" comment="kernel-doc-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024779" comment="kernel-headers-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024780" comment="kernel-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024781" comment="kernel-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024782" comment="kernel-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024783" comment="kernel-rt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024784" comment="kernel-rt-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024785" comment="kernel-rt-debug-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024786" comment="kernel-rt-debug-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024788" comment="kernel-rt-debug-kvm-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024789" comment="kernel-rt-debug-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024790" comment="kernel-rt-debug-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024791" comment="kernel-rt-debug-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024793" comment="kernel-rt-kvm-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024794" comment="kernel-rt-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024795" comment="kernel-rt-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024796" comment="kernel-rt-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024797" comment="kernel-tools-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024798" comment="kernel-tools-libs-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024800" comment="kernel-uki-virt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024801" comment="kernel-uki-virt-addons-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024802" comment="libperf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024803" comment="perf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024804" comment="python3-perf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024805" comment="rtla-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024806" comment="rv-5.14.0-570.60.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50369</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50369" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50369" ref_url="https://www.suse.com/security/cve/CVE-2022-50369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vkms: Fix null-ptr-deref in vkms_release()

A null-ptr-deref is triggered when it tries to destroy the workqueue in
vkms-&gt;output.composer_workq in vkms_release().

 KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]
 CPU: 5 PID: 17193 Comm: modprobe Not tainted 6.0.0-11331-gd465bff130bf #24
 RIP: 0010:destroy_workqueue+0x2f/0x710
 ...
 Call Trace:
  &lt;TASK&gt;
  ? vkms_config_debugfs_init+0x50/0x50 [vkms]
  __devm_drm_dev_alloc+0x15a/0x1c0 [drm]
  vkms_init+0x245/0x1000 [vkms]
  do_one_initcall+0xd0/0x4f0
  do_init_module+0x1a4/0x680
  load_module+0x6249/0x7110
  __do_sys_finit_module+0x140/0x200
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x46/0xb0

The reason is that an OOM happened which triggers the destroy of the
workqueue, however, the workqueue is alloced in the later process,
thus a null-ptr-deref happened. A simple call graph is shown as below:

 vkms_init()
  vkms_create()
    devm_drm_dev_alloc()
      __devm_drm_dev_alloc()
        devm_drm_dev_init()
          devm_add_action_or_reset()
            devm_add_action() # an error happened
            devm_drm_dev_init_release()
              drm_dev_put()
                kref_put()
                  drm_dev_release()
                    vkms_release()
                      destroy_workqueue() # null-ptr-deref happened
    vkms_modeset_init()
      vkms_output_init()
        vkms_crtc_init() # where the workqueue get allocated

Fix this by checking if composer_workq is NULL before passing it to
the destroy_workqueue() in vkms_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50369/">CVE-2022-50369 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50369">CVE-2022-50369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250026">SUSE bug 1250026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50372</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50372" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50372" ref_url="https://www.suse.com/security/cve/CVE-2022-50372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix memory leak when build ntlmssp negotiate blob failed

There is a memory leak when mount cifs:
  unreferenced object 0xffff888166059600 (size 448):
    comm "mount.cifs", pid 51391, jiffies 4295596373 (age 330.596s)
    hex dump (first 32 bytes):
      fe 53 4d 42 40 00 00 00 00 00 00 00 01 00 82 00  .SMB@...........
      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    backtrace:
      [&lt;0000000060609a61&gt;] mempool_alloc+0xe1/0x260
      [&lt;00000000adfa6c63&gt;] cifs_small_buf_get+0x24/0x60
      [&lt;00000000ebb404c7&gt;] __smb2_plain_req_init+0x32/0x460
      [&lt;00000000bcf875b4&gt;] SMB2_sess_alloc_buffer+0xa4/0x3f0
      [&lt;00000000753a2987&gt;] SMB2_sess_auth_rawntlmssp_negotiate+0xf5/0x480
      [&lt;00000000f0c1f4f9&gt;] SMB2_sess_setup+0x253/0x410
      [&lt;00000000a8b83303&gt;] cifs_setup_session+0x18f/0x4c0
      [&lt;00000000854bd16d&gt;] cifs_get_smb_ses+0xae7/0x13c0
      [&lt;000000006cbc43d9&gt;] mount_get_conns+0x7a/0x730
      [&lt;000000005922d816&gt;] cifs_mount+0x103/0xd10
      [&lt;00000000e33def3b&gt;] cifs_smb3_do_mount+0x1dd/0xc90
      [&lt;0000000078034979&gt;] smb3_get_tree+0x1d5/0x300
      [&lt;000000004371f980&gt;] vfs_get_tree+0x41/0xf0
      [&lt;00000000b670d8a7&gt;] path_mount+0x9b3/0xdd0
      [&lt;000000005e839a7d&gt;] __x64_sys_mount+0x190/0x1d0
      [&lt;000000009404c3b9&gt;] do_syscall_64+0x35/0x80

When build ntlmssp negotiate blob failed, the session setup request
should be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50372/">CVE-2022-50372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50372">CVE-2022-50372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250052">SUSE bug 1250052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50374</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50374" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50374" ref_url="https://www.suse.com/security/cve/CVE-2022-50374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_{ldisc,serdev}: check percpu_init_rwsem() failure

syzbot is reporting NULL pointer dereference at hci_uart_tty_close() [1],
for rcu_sync_enter() is called without rcu_sync_init() due to
hci_uart_tty_open() ignoring percpu_init_rwsem() failure.

While we are at it, fix that hci_uart_register_device() ignores
percpu_init_rwsem() failure and hci_uart_unregister_device() does not
call percpu_free_rwsem().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50374/">CVE-2022-50374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50374">CVE-2022-50374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250060">SUSE bug 1250060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50377</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50377" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50377" ref_url="https://www.suse.com/security/cve/CVE-2022-50377" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2022-50377/">CVE-2022-50377 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50377">CVE-2022-50377 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50381</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50381" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50381" ref_url="https://www.suse.com/security/cve/CVE-2022-50381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix a crash in mempool_free

There's a crash in mempool_free when running the lvm test
shell/lvchange-rebuild-raid.sh.

The reason for the crash is this:
* super_written calls atomic_dec_and_test(&amp;mddev-&gt;pending_writes) and
  wake_up(&amp;mddev-&gt;sb_wait). Then it calls rdev_dec_pending(rdev, mddev)
  and bio_put(bio).
* so, the process that waited on sb_wait and that is woken up is racing
  with bio_put(bio).
* if the process wins the race, it calls bioset_exit before bio_put(bio)
  is executed.
* bio_put(bio) attempts to free a bio into a destroyed bio set - causing
  a crash in mempool_free.

We fix this bug by moving bio_put before atomic_dec_and_test.

We also move rdev_dec_pending before atomic_dec_and_test as suggested by
Neil Brown.

The function md_end_flush has a similar bug - we must call bio_put before
we decrement the number of in-progress bios.

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 11557f0067 P4D 11557f0067 PUD 0
 Oops: 0002 [#1] PREEMPT SMP
 CPU: 0 PID: 73 Comm: kworker/0:1 Not tainted 6.1.0-rc3 #5
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
 Workqueue: kdelayd flush_expired_bios [dm_delay]
 RIP: 0010:mempool_free+0x47/0x80
 Code: 48 89 ef 5b 5d ff e0 f3 c3 48 89 f7 e8 32 45 3f 00 48 63 53 08 48 89 c6 3b 53 04 7d 2d 48 8b 43 10 8d 4a 01 48 89 df 89 4b 08 &lt;48&gt; 89 2c d0 e8 b0 45 3f 00 48 8d 7b 30 5b 5d 31 c9 ba 01 00 00 00
 RSP: 0018:ffff88910036bda8 EFLAGS: 00010093
 RAX: 0000000000000000 RBX: ffff8891037b65d8 RCX: 0000000000000001
 RDX: 0000000000000000 RSI: 0000000000000202 RDI: ffff8891037b65d8
 RBP: ffff8891447ba240 R08: 0000000000012908 R09: 00000000003d0900
 R10: 0000000000000000 R11: 0000000000173544 R12: ffff889101a14000
 R13: ffff8891562ac300 R14: ffff889102b41440 R15: ffffe8ffffa00d05
 FS:  0000000000000000(0000) GS:ffff88942fa00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 0000001102e99000 CR4: 00000000000006b0
 Call Trace:
  &lt;TASK&gt;
  clone_endio+0xf4/0x1c0 [dm_mod]
  clone_endio+0xf4/0x1c0 [dm_mod]
  __submit_bio+0x76/0x120
  submit_bio_noacct_nocheck+0xb6/0x2a0
  flush_expired_bios+0x28/0x2f [dm_delay]
  process_one_work+0x1b4/0x300
  worker_thread+0x45/0x3e0
  ? rescuer_thread+0x380/0x380
  kthread+0xc2/0x100
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;
 Modules linked in: brd dm_delay dm_raid dm_mod af_packet uvesafb cfbfillrect cfbimgblt cn cfbcopyarea fb font fbdev tun autofs4 binfmt_misc configfs ipv6 virtio_rng virtio_balloon rng_core virtio_net pcspkr net_failover failover qemu_fw_cfg button mousedev raid10 raid456 libcrc32c async_raid6_recov async_memcpy async_pq raid6_pq async_xor xor async_tx raid1 raid0 md_mod sd_mod t10_pi crc64_rocksoft crc64 virtio_scsi scsi_mod evdev psmouse bsg scsi_common [last unloaded: brd]
 CR2: 0000000000000000
 ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50381/">CVE-2022-50381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50381">CVE-2022-50381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250257">SUSE bug 1250257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250259">SUSE bug 1250259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50385" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50385" ref_url="https://www.suse.com/security/cve/CVE-2022-50385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix an Oops in nfs_d_automount()

When mounting from a NFSv4 referral, path-&gt;dentry can end up being a
negative dentry, so derive the struct nfs_server from the dentry
itself instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50385/">CVE-2022-50385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50385">CVE-2022-50385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250131">SUSE bug 1250131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50388" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50388" ref_url="https://www.suse.com/security/cve/CVE-2022-50388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023421.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: fix multipath crash caused by flush request when blktrace is enabled

The flush request initialized by blk_kick_flush has NULL bio,
and it may be dealt with nvme_end_req during io completion.
When blktrace is enabled, nvme_trace_bio_complete with multipath
activated trying to access NULL pointer bio from flush request
results in the following crash:

[ 2517.831677] BUG: kernel NULL pointer dereference, address: 000000000000001a
[ 2517.835213] #PF: supervisor read access in kernel mode
[ 2517.838724] #PF: error_code(0x0000) - not-present page
[ 2517.842222] PGD 7b2d51067 P4D 0
[ 2517.845684] Oops: 0000 [#1] SMP NOPTI
[ 2517.849125] CPU: 2 PID: 732 Comm: kworker/2:1H Kdump: loaded Tainted: G S                5.15.67-0.cl9.x86_64 #1
[ 2517.852723] Hardware name: XFUSION 2288H V6/BC13MBSBC, BIOS 1.13 07/27/2022
[ 2517.856358] Workqueue: nvme_tcp_wq nvme_tcp_io_work [nvme_tcp]
[ 2517.859993] RIP: 0010:blk_add_trace_bio_complete+0x6/0x30
[ 2517.863628] Code: 1f 44 00 00 48 8b 46 08 31 c9 ba 04 00 10 00 48 8b 80 50 03 00 00 48 8b 78 50 e9 e5 fe ff ff 0f 1f 44 00 00 41 54 49 89 f4 55 &lt;0f&gt; b6 7a 1a 48 89 d5 e8 3e 1c 2b 00 48 89 ee 4c 89 e7 5d 89 c1 ba
[ 2517.871269] RSP: 0018:ff7f6a008d9dbcd0 EFLAGS: 00010286
[ 2517.875081] RAX: ff3d5b4be00b1d50 RBX: 0000000002040002 RCX: ff3d5b0a270f2000
[ 2517.878966] RDX: 0000000000000000 RSI: ff3d5b0b021fb9f8 RDI: 0000000000000000
[ 2517.882849] RBP: ff3d5b0b96a6fa00 R08: 0000000000000001 R09: 0000000000000000
[ 2517.886718] R10: 000000000000000c R11: 000000000000000c R12: ff3d5b0b021fb9f8
[ 2517.890575] R13: 0000000002000000 R14: ff3d5b0b021fb1b0 R15: 0000000000000018
[ 2517.894434] FS:  0000000000000000(0000) GS:ff3d5b42bfc80000(0000) knlGS:0000000000000000
[ 2517.898299] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 2517.902157] CR2: 000000000000001a CR3: 00000004f023e005 CR4: 0000000000771ee0
[ 2517.906053] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 2517.909930] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 2517.913761] PKRU: 55555554
[ 2517.917558] Call Trace:
[ 2517.921294]  &lt;TASK&gt;
[ 2517.924982]  nvme_complete_rq+0x1c3/0x1e0 [nvme_core]
[ 2517.928715]  nvme_tcp_recv_pdu+0x4d7/0x540 [nvme_tcp]
[ 2517.932442]  nvme_tcp_recv_skb+0x4f/0x240 [nvme_tcp]
[ 2517.936137]  ? nvme_tcp_recv_pdu+0x540/0x540 [nvme_tcp]
[ 2517.939830]  tcp_read_sock+0x9c/0x260
[ 2517.943486]  nvme_tcp_try_recv+0x65/0xa0 [nvme_tcp]
[ 2517.947173]  nvme_tcp_io_work+0x64/0x90 [nvme_tcp]
[ 2517.950834]  process_one_work+0x1e8/0x390
[ 2517.954473]  worker_thread+0x53/0x3c0
[ 2517.958069]  ? process_one_work+0x390/0x390
[ 2517.961655]  kthread+0x10c/0x130
[ 2517.965211]  ? set_kthread_struct+0x40/0x40
[ 2517.968760]  ret_from_fork+0x1f/0x30
[ 2517.972285]  &lt;/TASK&gt;

To avoid this situation, add a NULL check for req-&gt;bio before
calling trace_block_bio_complete.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50388/">CVE-2022-50388 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50388">CVE-2022-50388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250293">SUSE bug 1250293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250295">SUSE bug 1250295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50389</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50389" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50389" ref_url="https://www.suse.com/security/cve/CVE-2022-50389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak

In crb_acpi_add(), we get the TPM2 table to retrieve information
like start method, and then assign them to the priv data, so the
TPM2 table is not used after the init, should be freed, call
acpi_put_table() to fix the memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50389/">CVE-2022-50389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50389">CVE-2022-50389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250121">SUSE bug 1250121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50390" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50390" ref_url="https://www.suse.com/security/cve/CVE-2022-50390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: fix undefined behavior in bit shift for TTM_TT_FLAG_PRIV_POPULATED

Shifting signed 32-bit value by 31 bits is undefined, so changing
significant bit to unsigned. The UBSAN warning calltrace like below:

UBSAN: shift-out-of-bounds in ./include/drm/ttm/ttm_tt.h:122:26
left shift of 1 by 31 places cannot be represented in type 'int'
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x7d/0xa5
 dump_stack+0x15/0x1b
 ubsan_epilogue+0xe/0x4e
 __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c
 ttm_bo_move_memcpy+0x3b4/0x460 [ttm]
 bo_driver_move+0x32/0x40 [drm_vram_helper]
 ttm_bo_handle_move_mem+0x118/0x200 [ttm]
 ttm_bo_validate+0xfa/0x220 [ttm]
 drm_gem_vram_pin_locked+0x70/0x1b0 [drm_vram_helper]
 drm_gem_vram_pin+0x48/0xb0 [drm_vram_helper]
 drm_gem_vram_plane_helper_prepare_fb+0x53/0xe0 [drm_vram_helper]
 drm_gem_vram_simple_display_pipe_prepare_fb+0x26/0x30 [drm_vram_helper]
 drm_simple_kms_plane_prepare_fb+0x4d/0xe0 [drm_kms_helper]
 drm_atomic_helper_prepare_planes+0xda/0x210 [drm_kms_helper]
 drm_atomic_helper_commit+0xc3/0x1e0 [drm_kms_helper]
 drm_atomic_commit+0x9c/0x160 [drm]
 drm_client_modeset_commit_atomic+0x33a/0x380 [drm]
 drm_client_modeset_commit_locked+0x77/0x220 [drm]
 drm_client_modeset_commit+0x31/0x60 [drm]
 __drm_fb_helper_restore_fbdev_mode_unlocked+0xa7/0x170 [drm_kms_helper]
 drm_fb_helper_set_par+0x51/0x90 [drm_kms_helper]
 fbcon_init+0x316/0x790
 visual_init+0x113/0x1d0
 do_bind_con_driver+0x2a3/0x5c0
 do_take_over_console+0xa9/0x270
 do_fbcon_takeover+0xa1/0x170
 do_fb_registered+0x2a8/0x340
 fbcon_fb_registered+0x47/0xe0
 register_framebuffer+0x294/0x4a0
 __drm_fb_helper_initial_config_and_unlock+0x43c/0x880 [drm_kms_helper]
 drm_fb_helper_initial_config+0x52/0x80 [drm_kms_helper]
 drm_fbdev_client_hotplug+0x156/0x1b0 [drm_kms_helper]
 drm_fbdev_generic_setup+0xfc/0x290 [drm_kms_helper]
 bochs_pci_probe+0x6ca/0x772 [bochs]
 local_pci_probe+0x4d/0xb0
 pci_device_probe+0x119/0x320
 really_probe+0x181/0x550
 __driver_probe_device+0xc6/0x220
 driver_probe_device+0x32/0x100
 __driver_attach+0x195/0x200
 bus_for_each_dev+0xbb/0x120
 driver_attach+0x27/0x30
 bus_add_driver+0x22e/0x2f0
 driver_register+0xa9/0x190
 __pci_register_driver+0x90/0xa0
 bochs_pci_driver_init+0x52/0x1000 [bochs]
 do_one_initcall+0x76/0x430
 do_init_module+0x61/0x28a
 load_module+0x1f82/0x2e50
 __do_sys_finit_module+0xf8/0x190
 __x64_sys_finit_module+0x23/0x30
 do_syscall_64+0x58/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50390/">CVE-2022-50390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50390">CVE-2022-50390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250130">SUSE bug 1250130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50391</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50391" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50391" ref_url="https://www.suse.com/security/cve/CVE-2022-50391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: fix memory leak in set_mempolicy_home_node system call

When encountering any vma in the range with policy other than MPOL_BIND or
MPOL_PREFERRED_MANY, an error is returned without issuing a mpol_put on
the policy just allocated with mpol_dup().

This allows arbitrary users to leak kernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50391/">CVE-2022-50391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50391">CVE-2022-50391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250138">SUSE bug 1250138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50392" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50392" ref_url="https://www.suse.com/security/cve/CVE-2022-50392" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8183: fix refcount leak in mt8183_mt6358_ts3a227_max98357_dev_probe()

The node returned by of_parse_phandle() with refcount incremented,
of_node_put() needs be called when finish using it. So add it in the
error path in mt8183_mt6358_ts3a227_max98357_dev_probe().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50392/">CVE-2022-50392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50392">CVE-2022-50392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250105">SUSE bug 1250105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50393" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50393" ref_url="https://www.suse.com/security/cve/CVE-2022-50393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: SDMA update use unlocked iterator

SDMA update page table may be called from unlocked context, this
generate below warning. Use unlocked iterator to handle this case.

WARNING: CPU: 0 PID: 1475 at
drivers/dma-buf/dma-resv.c:483 dma_resv_iter_next
Call Trace:
 dma_resv_iter_first+0x43/0xa0
 amdgpu_vm_sdma_update+0x69/0x2d0 [amdgpu]
 amdgpu_vm_ptes_update+0x29c/0x870 [amdgpu]
 amdgpu_vm_update_range+0x2f6/0x6c0 [amdgpu]
 svm_range_unmap_from_gpus+0x115/0x300 [amdgpu]
 svm_range_cpu_invalidate_pagetables+0x510/0x5e0 [amdgpu]
 __mmu_notifier_invalidate_range_start+0x1d3/0x230
 unmap_vmas+0x140/0x150
 unmap_region+0xa8/0x110
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50393/">CVE-2022-50393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50393">CVE-2022-50393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250278">SUSE bug 1250278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50396" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50396" ref_url="https://www.suse.com/security/cve/CVE-2022-50396" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix memory leak in tcindex_set_parms

Syzkaller reports a memory leak as follows:
====================================
BUG: memory leak
unreferenced object 0xffff88810c287f00 (size 256):
  comm "syz-executor105", pid 3600, jiffies 4294943292 (age 12.990s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff814cf9f0&gt;] kmalloc_trace+0x20/0x90 mm/slab_common.c:1046
    [&lt;ffffffff839c9e07&gt;] kmalloc include/linux/slab.h:576 [inline]
    [&lt;ffffffff839c9e07&gt;] kmalloc_array include/linux/slab.h:627 [inline]
    [&lt;ffffffff839c9e07&gt;] kcalloc include/linux/slab.h:659 [inline]
    [&lt;ffffffff839c9e07&gt;] tcf_exts_init include/net/pkt_cls.h:250 [inline]
    [&lt;ffffffff839c9e07&gt;] tcindex_set_parms+0xa7/0xbe0 net/sched/cls_tcindex.c:342
    [&lt;ffffffff839caa1f&gt;] tcindex_change+0xdf/0x120 net/sched/cls_tcindex.c:553
    [&lt;ffffffff8394db62&gt;] tc_new_tfilter+0x4f2/0x1100 net/sched/cls_api.c:2147
    [&lt;ffffffff8389e91c&gt;] rtnetlink_rcv_msg+0x4dc/0x5d0 net/core/rtnetlink.c:6082
    [&lt;ffffffff839eba67&gt;] netlink_rcv_skb+0x87/0x1d0 net/netlink/af_netlink.c:2540
    [&lt;ffffffff839eab87&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
    [&lt;ffffffff839eab87&gt;] netlink_unicast+0x397/0x4c0 net/netlink/af_netlink.c:1345
    [&lt;ffffffff839eb046&gt;] netlink_sendmsg+0x396/0x710 net/netlink/af_netlink.c:1921
    [&lt;ffffffff8383e796&gt;] sock_sendmsg_nosec net/socket.c:714 [inline]
    [&lt;ffffffff8383e796&gt;] sock_sendmsg+0x56/0x80 net/socket.c:734
    [&lt;ffffffff8383eb08&gt;] ____sys_sendmsg+0x178/0x410 net/socket.c:2482
    [&lt;ffffffff83843678&gt;] ___sys_sendmsg+0xa8/0x110 net/socket.c:2536
    [&lt;ffffffff838439c5&gt;] __sys_sendmmsg+0x105/0x330 net/socket.c:2622
    [&lt;ffffffff83843c14&gt;] __do_sys_sendmmsg net/socket.c:2651 [inline]
    [&lt;ffffffff83843c14&gt;] __se_sys_sendmmsg net/socket.c:2648 [inline]
    [&lt;ffffffff83843c14&gt;] __x64_sys_sendmmsg+0x24/0x30 net/socket.c:2648
    [&lt;ffffffff84605fd5&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;ffffffff84605fd5&gt;] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
    [&lt;ffffffff84800087&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
====================================

Kernel uses tcindex_change() to change an existing
filter properties.

Yet the problem is that, during the process of changing,
if `old_r` is retrieved from `p-&gt;perfect`, then
kernel uses tcindex_alloc_perfect_hash() to newly
allocate filter results, uses tcindex_filter_result_init()
to clear the old filter result, without destroying
its tcf_exts structure, which triggers the above memory leak.

To be more specific, there are only two source for the `old_r`,
according to the tcindex_lookup(). `old_r` is retrieved from
`p-&gt;perfect`, or `old_r` is retrieved from `p-&gt;h`.

  * If `old_r` is retrieved from `p-&gt;perfect`, kernel uses
tcindex_alloc_perfect_hash() to newly allocate the
filter results. Then `r` is assigned with `cp-&gt;perfect + handle`,
which is newly allocated. So condition `old_r &amp;&amp; old_r != r` is
true in this situation, and kernel uses tcindex_filter_result_init()
to clear the old filter result, without destroying
its tcf_exts structure

  * If `old_r` is retrieved from `p-&gt;h`, then `p-&gt;perfect` is NULL
according to the tcindex_lookup(). Considering that `cp-&gt;h`
is directly copied from `p-&gt;h` and `p-&gt;perfect` is NULL,
`r` is assigned with `tcindex_lookup(cp, handle)`, whose value
should be the same as `old_r`, so condition `old_r &amp;&amp; old_r != r`
is false in this situation, kernel ignores using
tcindex_filter_result_init() to clear the old filter result.

So only when `old_r` is retrieved from `p-&gt;perfect` does kernel use
tcindex_filter_result_init() to clear the old filter result, which
triggers the above memory leak.

Considering that there already exists a tc_filter_wq workqueue
to destroy the old tcindex_d
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50396/">CVE-2022-50396 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50396">CVE-2022-50396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250104">SUSE bug 1250104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50402" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50402" ref_url="https://www.suse.com/security/cve/CVE-2022-50402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/md/md-bitmap: check the return value of md_bitmap_get_counter()

Check the return value of md_bitmap_get_counter() in case it returns
NULL pointer, which will result in a null pointer dereference.

v2: update the check to include other dereference
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50402/">CVE-2022-50402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50402">CVE-2022-50402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250363">SUSE bug 1250363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50403" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50403" ref_url="https://www.suse.com/security/cve/CVE-2022-50403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50403/">CVE-2022-50403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50403">CVE-2022-50403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250143">SUSE bug 1250143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50405" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50405" ref_url="https://www.suse.com/security/cve/CVE-2022-50405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tunnel: wait until all sk_user_data reader finish before releasing the sock

There is a race condition in vxlan that when deleting a vxlan device
during receiving packets, there is a possibility that the sock is
released after getting vxlan_sock vs from sk_user_data. Then in
later vxlan_ecn_decapsulate(), vxlan_get_sk_family() we will got
NULL pointer dereference. e.g.

   #0 [ffffa25ec6978a38] machine_kexec at ffffffff8c669757
   #1 [ffffa25ec6978a90] __crash_kexec at ffffffff8c7c0a4d
   #2 [ffffa25ec6978b58] crash_kexec at ffffffff8c7c1c48
   #3 [ffffa25ec6978b60] oops_end at ffffffff8c627f2b
   #4 [ffffa25ec6978b80] page_fault_oops at ffffffff8c678fcb
   #5 [ffffa25ec6978bd8] exc_page_fault at ffffffff8d109542
   #6 [ffffa25ec6978c00] asm_exc_page_fault at ffffffff8d200b62
      [exception RIP: vxlan_ecn_decapsulate+0x3b]
      RIP: ffffffffc1014e7b  RSP: ffffa25ec6978cb0  RFLAGS: 00010246
      RAX: 0000000000000008  RBX: ffff8aa000888000  RCX: 0000000000000000
      RDX: 000000000000000e  RSI: ffff8a9fc7ab803e  RDI: ffff8a9fd1168700
      RBP: ffff8a9fc7ab803e   R8: 0000000000700000   R9: 00000000000010ae
      R10: ffff8a9fcb748980  R11: 0000000000000000  R12: ffff8a9fd1168700
      R13: ffff8aa000888000  R14: 00000000002a0000  R15: 00000000000010ae
      ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
   #7 [ffffa25ec6978ce8] vxlan_rcv at ffffffffc10189cd [vxlan]
   #8 [ffffa25ec6978d90] udp_queue_rcv_one_skb at ffffffff8cfb6507
   #9 [ffffa25ec6978dc0] udp_unicast_rcv_skb at ffffffff8cfb6e45
  #10 [ffffa25ec6978dc8] __udp4_lib_rcv at ffffffff8cfb8807
  #11 [ffffa25ec6978e20] ip_protocol_deliver_rcu at ffffffff8cf76951
  #12 [ffffa25ec6978e48] ip_local_deliver at ffffffff8cf76bde
  #13 [ffffa25ec6978ea0] __netif_receive_skb_one_core at ffffffff8cecde9b
  #14 [ffffa25ec6978ec8] process_backlog at ffffffff8cece139
  #15 [ffffa25ec6978f00] __napi_poll at ffffffff8ceced1a
  #16 [ffffa25ec6978f28] net_rx_action at ffffffff8cecf1f3
  #17 [ffffa25ec6978fa0] __softirqentry_text_start at ffffffff8d4000ca
  #18 [ffffa25ec6978ff0] do_softirq at ffffffff8c6fbdc3

Reproducer: https://github.com/Mellanox/ovs-tests/blob/master/test-ovs-vxlan-remove-tunnel-during-traffic.sh

Fix this by waiting for all sk_user_data reader to finish before
releasing the sock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50405/">CVE-2022-50405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50405">CVE-2022-50405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250155">SUSE bug 1250155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50406</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50406" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50406" ref_url="https://www.suse.com/security/cve/CVE-2022-50406" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iomap: iomap: fix memory corruption when recording errors during writeback

Every now and then I see this crash on arm64:

Unable to handle kernel NULL pointer dereference at virtual address 00000000000000f8
Buffer I/O error on dev dm-0, logical block 8733687, async page read
Mem abort info:
  ESR = 0x0000000096000006
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x06: level 2 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000006
  CM = 0, WnR = 0
user pgtable: 64k pages, 42-bit VAs, pgdp=0000000139750000
[00000000000000f8] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000, pmd=0000000000000000
Internal error: Oops: 96000006 [#1] PREEMPT SMP
Buffer I/O error on dev dm-0, logical block 8733688, async page read
Dumping ftrace buffer:
Buffer I/O error on dev dm-0, logical block 8733689, async page read
   (ftrace buffer empty)
XFS (dm-0): log I/O error -5
Modules linked in: dm_thin_pool dm_persistent_data
XFS (dm-0): Metadata I/O Error (0x1) detected at xfs_trans_read_buf_map+0x1ec/0x590 [xfs] (fs/xfs/xfs_trans_buf.c:296).
 dm_bio_prison
XFS (dm-0): Please unmount the filesystem and rectify the problem(s)
XFS (dm-0): xfs_imap_lookup: xfs_ialloc_read_agi() returned error -5, agno 0
 dm_bufio dm_log_writes xfs nft_chain_nat xt_REDIRECT nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_REJECT
potentially unexpected fatal signal 6.
 nf_reject_ipv6
potentially unexpected fatal signal 6.
 ipt_REJECT nf_reject_ipv4
CPU: 1 PID: 122166 Comm: fsstress Tainted: G        W          6.0.0-rc5-djwa #rc5 3004c9f1de887ebae86015f2677638ce51ee7
 rpcsec_gss_krb5 auth_rpcgss xt_tcpudp ip_set_hash_ip ip_set_hash_net xt_set nft_compat ip_set_hash_mac ip_set nf_tables
Hardware name: QEMU KVM Virtual Machine, BIOS 1.5.1 06/16/2021
pstate: 60001000 (nZCv daif -PAN -UAO -TCO -DIT +SSBS BTYPE=--)
 ip_tables
pc : 000003fd6d7df200
 x_tables
lr : 000003fd6d7df1ec
 overlay nfsv4
CPU: 0 PID: 54031 Comm: u4:3 Tainted: G        W          6.0.0-rc5-djwa #rc5 3004c9f1de887ebae86015f2677638ce51ee7405
Hardware name: QEMU KVM Virtual Machine, BIOS 1.5.1 06/16/2021
Workqueue: writeback wb_workfn
sp : 000003ffd9522fd0
 (flush-253:0)
pstate: 60401005 (nZCv daif +PAN -UAO -TCO -DIT +SSBS BTYPE=--)
pc : errseq_set+0x1c/0x100
x29: 000003ffd9522fd0 x28: 0000000000000023 x27: 000002acefeb6780
x26: 0000000000000005 x25: 0000000000000001 x24: 0000000000000000
x23: 00000000ffffffff x22: 0000000000000005
lr : __filemap_set_wb_err+0x24/0xe0
 x21: 0000000000000006
sp : fffffe000f80f760
x29: fffffe000f80f760 x28: 0000000000000003 x27: fffffe000f80f9f8
x26: 0000000002523000 x25: 00000000fffffffb x24: fffffe000f80f868
x23: fffffe000f80fbb0 x22: fffffc0180c26a78 x21: 0000000002530000
x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000

x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000001 x13: 0000000000470af3 x12: fffffc0058f70000
x11: 0000000000000040 x10: 0000000000001b20 x9 : fffffe000836b288
x8 : fffffc00eb9fd480 x7 : 0000000000f83659 x6 : 0000000000000000
x5 : 0000000000000869 x4 : 0000000000000005 x3 : 00000000000000f8
x20: 000003fd6d740020 x19: 000000000001dd36 x18: 0000000000000001
x17: 000003fd6d78704c x16: 0000000000000001 x15: 000002acfac87668
x2 : 0000000000000ffa x1 : 00000000fffffffb x0 : 00000000000000f8
Call trace:
 errseq_set+0x1c/0x100
 __filemap_set_wb_err+0x24/0xe0
 iomap_do_writepage+0x5e4/0xd5c
 write_cache_pages+0x208/0x674
 iomap_writepages+0x34/0x60
 xfs_vm_writepages+0x8c/0xcc [xfs 7a861f39c43631f15d3a5884246ba5035d4ca78b]
x14: 0000000000000000 x13: 2064656e72757465 x12: 0000000000002180
x11: 000003fd6d8a82d0 x10: 0000000000000000 x9 : 000003fd6d8ae288
x8 : 0000000000000083 x7 : 00000000ffffffff x6 : 00000000ffffffee
x5 : 00000000fbad2887 x4 : 000003fd6d9abb58 x3 : 000003fd6d740020
x2 : 0000000000000006 x1 : 000000000001dd36 x0 : 0000000000000000
CPU: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50406/">CVE-2022-50406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50406">CVE-2022-50406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250165">SUSE bug 1250165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50408" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50408" ref_url="https://www.suse.com/security/cve/CVE-2022-50408" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()

&gt; ret = brcmf_proto_tx_queue_data(drvr, ifp-&gt;ifidx, skb);

may be schedule, and then complete before the line

&gt; ndev-&gt;stats.tx_bytes += skb-&gt;len;

[   46.912801] ==================================================================
[   46.920552] BUG: KASAN: use-after-free in brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]
[   46.928673] Read of size 4 at addr ffffff803f5882e8 by task systemd-resolve/328
[   46.935991]
[   46.937514] CPU: 1 PID: 328 Comm: systemd-resolve Tainted: G           O      5.4.199-[REDACTED] #1
[   46.947255] Hardware name: [REDACTED]
[   46.954568] Call trace:
[   46.957037]  dump_backtrace+0x0/0x2b8
[   46.960719]  show_stack+0x24/0x30
[   46.964052]  dump_stack+0x128/0x194
[   46.967557]  print_address_description.isra.0+0x64/0x380
[   46.972877]  __kasan_report+0x1d4/0x240
[   46.976723]  kasan_report+0xc/0x18
[   46.980138]  __asan_report_load4_noabort+0x18/0x20
[   46.985027]  brcmf_netdev_start_xmit+0x718/0x8c8 [brcmfmac]
[   46.990613]  dev_hard_start_xmit+0x1bc/0xda0
[   46.994894]  sch_direct_xmit+0x198/0xd08
[   46.998827]  __qdisc_run+0x37c/0x1dc0
[   47.002500]  __dev_queue_xmit+0x1528/0x21f8
[   47.006692]  dev_queue_xmit+0x24/0x30
[   47.010366]  neigh_resolve_output+0x37c/0x678
[   47.014734]  ip_finish_output2+0x598/0x2458
[   47.018927]  __ip_finish_output+0x300/0x730
[   47.023118]  ip_output+0x2e0/0x430
[   47.026530]  ip_local_out+0x90/0x140
[   47.030117]  igmpv3_sendpack+0x14c/0x228
[   47.034049]  igmpv3_send_cr+0x384/0x6b8
[   47.037895]  igmp_ifc_timer_expire+0x4c/0x118
[   47.042262]  call_timer_fn+0x1cc/0xbe8
[   47.046021]  __run_timers+0x4d8/0xb28
[   47.049693]  run_timer_softirq+0x24/0x40
[   47.053626]  __do_softirq+0x2c0/0x117c
[   47.057387]  irq_exit+0x2dc/0x388
[   47.060715]  __handle_domain_irq+0xb4/0x158
[   47.064908]  gic_handle_irq+0x58/0xb0
[   47.068581]  el0_irq_naked+0x50/0x5c
[   47.072162]
[   47.073665] Allocated by task 328:
[   47.077083]  save_stack+0x24/0xb0
[   47.080410]  __kasan_kmalloc.isra.0+0xc0/0xe0
[   47.084776]  kasan_slab_alloc+0x14/0x20
[   47.088622]  kmem_cache_alloc+0x15c/0x468
[   47.092643]  __alloc_skb+0xa4/0x498
[   47.096142]  igmpv3_newpack+0x158/0xd78
[   47.099987]  add_grhead+0x210/0x288
[   47.103485]  add_grec+0x6b0/0xb70
[   47.106811]  igmpv3_send_cr+0x2e0/0x6b8
[   47.110657]  igmp_ifc_timer_expire+0x4c/0x118
[   47.115027]  call_timer_fn+0x1cc/0xbe8
[   47.118785]  __run_timers+0x4d8/0xb28
[   47.122457]  run_timer_softirq+0x24/0x40
[   47.126389]  __do_softirq+0x2c0/0x117c
[   47.130142]
[   47.131643] Freed by task 180:
[   47.134712]  save_stack+0x24/0xb0
[   47.138041]  __kasan_slab_free+0x108/0x180
[   47.142146]  kasan_slab_free+0x10/0x18
[   47.145904]  slab_free_freelist_hook+0xa4/0x1b0
[   47.150444]  kmem_cache_free+0x8c/0x528
[   47.154292]  kfree_skbmem+0x94/0x108
[   47.157880]  consume_skb+0x10c/0x5a8
[   47.161466]  __dev_kfree_skb_any+0x88/0xa0
[   47.165598]  brcmu_pkt_buf_free_skb+0x44/0x68 [brcmutil]
[   47.171023]  brcmf_txfinalize+0xec/0x190 [brcmfmac]
[   47.176016]  brcmf_proto_bcdc_txcomplete+0x1c0/0x210 [brcmfmac]
[   47.182056]  brcmf_sdio_sendfromq+0x8dc/0x1e80 [brcmfmac]
[   47.187568]  brcmf_sdio_dpc+0xb48/0x2108 [brcmfmac]
[   47.192529]  brcmf_sdio_dataworker+0xc8/0x238 [brcmfmac]
[   47.197859]  process_one_work+0x7fc/0x1a80
[   47.201965]  worker_thread+0x31c/0xc40
[   47.205726]  kthread+0x2d8/0x370
[   47.208967]  ret_from_fork+0x10/0x18
[   47.212546]
[   47.214051] The buggy address belongs to the object at ffffff803f588280
[   47.214051]  which belongs to the cache skbuff_head_cache of size 208
[   47.227086] The buggy address is located 104 bytes inside of
[   47.227086]  208-byte region [ffffff803f588280, ffffff803f588350)
[   47.238814] The buggy address belongs to the page:
[   47.243618] page:ffffffff00dd6200 refcount:1 mapcou
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50408/">CVE-2022-50408 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50408">CVE-2022-50408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250391">SUSE bug 1250391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250419">SUSE bug 1250419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50410" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50410" ref_url="https://www.suse.com/security/cve/CVE-2022-50410" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Protect against send buffer overflow in NFSv2 READ

Since before the git era, NFSD has conserved the number of pages
held by each nfsd thread by combining the RPC receive and send
buffers into a single array of pages. This works because there are
no cases where an operation needs a large RPC Call message and a
large RPC Reply at the same time.

Once an RPC Call has been received, svc_process() updates
svc_rqst::rq_res to describe the part of rq_pages that can be
used for constructing the Reply. This means that the send buffer
(rq_res) shrinks when the received RPC record containing the RPC
Call is large.

A client can force this shrinkage on TCP by sending a correctly-
formed RPC Call header contained in an RPC record that is
excessively large. The full maximum payload size cannot be
constructed in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50410/">CVE-2022-50410 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50410">CVE-2022-50410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250187">SUSE bug 1250187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50412</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50412" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50412" ref_url="https://www.suse.com/security/cve/CVE-2022-50412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: adv7511: unregister cec i2c device after cec adapter

cec_unregister_adapter() assumes that the underlying adapter ops are
callable. For example, if the CEC adapter currently has a valid physical
address, then the unregistration procedure will invalidate the physical
address by setting it to f.f.f.f. Whence the following kernel oops
observed after removing the adv7511 module:

    Unable to handle kernel execution of user memory at virtual address 0000000000000000
    Internal error: Oops: 86000004 [#1] PREEMPT_RT SMP
    Call trace:
     0x0
     adv7511_cec_adap_log_addr+0x1ac/0x1c8 [adv7511]
     cec_adap_unconfigure+0x44/0x90 [cec]
     __cec_s_phys_addr.part.0+0x68/0x230 [cec]
     __cec_s_phys_addr+0x40/0x50 [cec]
     cec_unregister_adapter+0xb4/0x118 [cec]
     adv7511_remove+0x60/0x90 [adv7511]
     i2c_device_remove+0x34/0xe0
     device_release_driver_internal+0x114/0x1f0
     driver_detach+0x54/0xe0
     bus_remove_driver+0x60/0xd8
     driver_unregister+0x34/0x60
     i2c_del_driver+0x2c/0x68
     adv7511_exit+0x1c/0x67c [adv7511]
     __arm64_sys_delete_module+0x154/0x288
     invoke_syscall+0x48/0x100
     el0_svc_common.constprop.0+0x48/0xe8
     do_el0_svc+0x28/0x88
     el0_svc+0x1c/0x50
     el0t_64_sync_handler+0xa8/0xb0
     el0t_64_sync+0x15c/0x160
    Code: bad PC value
    ---[ end trace 0000000000000000 ]---

Protect against this scenario by unregistering i2c_cec after
unregistering the CEC adapter. Duly disable the CEC clock afterwards
too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50412/">CVE-2022-50412 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50412">CVE-2022-50412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250189">SUSE bug 1250189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50416" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50416" ref_url="https://www.suse.com/security/cve/CVE-2022-50416" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/wpcm450: Fix memory leak in wpcm450_aic_of_init()

If of_iomap() failed, 'aic' should be freed before return. Otherwise
there is a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50416/">CVE-2022-50416 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50416">CVE-2022-50416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250148">SUSE bug 1250148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50418" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50418" ref_url="https://www.suse.com/security/cve/CVE-2022-50418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register()

mhi_alloc_controller() allocates a memory space for mhi_ctrl. When gets
some error, mhi_ctrl should be freed with mhi_free_controller(). But
when ath11k_mhi_read_addr_from_dt() fails, the function returns without
calling mhi_free_controller(), which will lead to a memory leak.

We can fix it by calling mhi_free_controller() when
ath11k_mhi_read_addr_from_dt() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50418/">CVE-2022-50418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50418">CVE-2022-50418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250285">SUSE bug 1250285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50421" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50421" ref_url="https://www.suse.com/security/cve/CVE-2022-50421" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpmsg: char: Avoid double destroy of default endpoint

The rpmsg_dev_remove() in rpmsg_core is the place for releasing
this default endpoint.

So need to avoid destroying the default endpoint in
rpmsg_chrdev_eptdev_destroy(), this should be the same as
rpmsg_eptdev_release(). Otherwise there will be double destroy
issue that ept-&gt;refcount report warning:

refcount_t: underflow; use-after-free.

Call trace:
 refcount_warn_saturate+0xf8/0x150
 virtio_rpmsg_destroy_ept+0xd4/0xec
 rpmsg_dev_remove+0x60/0x70

The issue can be reproduced by stopping remoteproc before
closing the /dev/rpmsgX.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50421/">CVE-2022-50421 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50421">CVE-2022-50421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250777">SUSE bug 1250777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50423" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50423" ref_url="https://www.suse.com/security/cve/CVE-2022-50423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage()

There is an use-after-free reported by KASAN:

  BUG: KASAN: use-after-free in acpi_ut_remove_reference+0x3b/0x82
  Read of size 1 at addr ffff888112afc460 by task modprobe/2111
  CPU: 0 PID: 2111 Comm: modprobe Not tainted 6.1.0-rc7-dirty
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
  Call Trace:
   &lt;TASK&gt;
   kasan_report+0xae/0xe0
   acpi_ut_remove_reference+0x3b/0x82
   acpi_ut_copy_iobject_to_iobject+0x3be/0x3d5
   acpi_ds_store_object_to_local+0x15d/0x3a0
   acpi_ex_store+0x78d/0x7fd
   acpi_ex_opcode_1A_1T_1R+0xbe4/0xf9b
   acpi_ps_parse_aml+0x217/0x8d5
   ...
   &lt;/TASK&gt;

The root cause of the problem is that the acpi_operand_object
is freed when acpi_ut_walk_package_tree() fails in
acpi_ut_copy_ipackage_to_ipackage(), lead to repeated release in
acpi_ut_copy_iobject_to_iobject(). The problem was introduced
by "8aa5e56eeb61" commit, this commit is to fix memory leak in
acpi_ut_copy_iobject_to_iobject(), repeatedly adding remove
operation, lead to "acpi_operand_object" used after free.

Fix it by removing acpi_ut_remove_reference() in
acpi_ut_copy_ipackage_to_ipackage(). acpi_ut_copy_ipackage_to_ipackage()
is called to copy an internal package object into another internal
package object, when it fails, the memory of acpi_operand_object
should be freed by the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50423/">CVE-2022-50423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50423">CVE-2022-50423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250784">SUSE bug 1250784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250785">SUSE bug 1250785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50425" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50425" ref_url="https://www.suse.com/security/cve/CVE-2022-50425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly

When an extended state component is not present in fpstate, but in init
state, the function copies from init_fpstate via copy_feature().

But, dynamic states are not present in init_fpstate because of all-zeros
init states. Then retrieving them from init_fpstate will explode like this:

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 ...
 RIP: 0010:memcpy_erms+0x6/0x10
  ? __copy_xstate_to_uabi_buf+0x381/0x870
  fpu_copy_guest_fpstate_to_uabi+0x28/0x80
  kvm_arch_vcpu_ioctl+0x14c/0x1460 [kvm]
  ? __this_cpu_preempt_check+0x13/0x20
  ? vmx_vcpu_put+0x2e/0x260 [kvm_intel]
  kvm_vcpu_ioctl+0xea/0x6b0 [kvm]
  ? kvm_vcpu_ioctl+0xea/0x6b0 [kvm]
  ? __fget_light+0xd4/0x130
  __x64_sys_ioctl+0xe3/0x910
  ? debug_smp_processor_id+0x17/0x20
  ? fpregs_assert_state_consistent+0x27/0x50
  do_syscall_64+0x3f/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd

Adjust the 'mask' to zero out the userspace buffer for the features that
are not available both from fpstate and from init_fpstate.

The dynamic features depend on the compacted XSAVE format. Ensure it is
enabled before reading XCOMP_BV in init_fpstate.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50425/">CVE-2022-50425 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50425">CVE-2022-50425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250781">SUSE bug 1250781</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50426</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50426" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50426" ref_url="https://www.suse.com/security/cve/CVE-2022-50426" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: imx_dsp_rproc: Add mutex protection for workqueue

The workqueue may execute late even after remoteproc is stopped or
stopping, some resources (rpmsg device and endpoint) have been
released in rproc_stop_subdevices(), then rproc_vq_interrupt()
accessing these resources will cause kennel dump.

Call trace:
 virtqueue_add_split+0x1ac/0x560
 virtqueue_add_inbuf+0x4c/0x60
 rpmsg_recv_done+0x15c/0x294
 vring_interrupt+0x6c/0xa4
 rproc_vq_interrupt+0x30/0x50
 imx_dsp_rproc_vq_work+0x24/0x40 [imx_dsp_rproc]
 process_one_work+0x1d0/0x354
 worker_thread+0x13c/0x470
 kthread+0x154/0x160
 ret_from_fork+0x10/0x20

Add mutex protection in imx_dsp_rproc_vq_work(), if the state is
not running, then just skip calling rproc_vq_interrupt().

Also the flush workqueue operation can't be added in rproc stop
for the same reason. The call sequence is

rproc_shutdown
-&gt; rproc_stop
   -&gt;rproc_stop_subdevices
   -&gt;rproc-&gt;ops-&gt;stop()
     -&gt;imx_dsp_rproc_stop
       -&gt;flush_work
         -&gt; rproc_vq_interrupt

The resource needed by rproc_vq_interrupt has been released in
rproc_stop_subdevices, so flush_work is not safe to be called in
imx_dsp_rproc_stop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50426/">CVE-2022-50426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50426">CVE-2022-50426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250788">SUSE bug 1250788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50427" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50427" ref_url="https://www.suse.com/security/cve/CVE-2022-50427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ac97: fix possible memory leak in snd_ac97_dev_register()

If device_register() fails in snd_ac97_dev_register(), it should
call put_device() to give up reference, or the name allocated in
dev_set_name() is leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50427/">CVE-2022-50427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50427">CVE-2022-50427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250787">SUSE bug 1250787</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50429" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50429" ref_url="https://www.suse.com/security/cve/CVE-2022-50429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings()

We should add the of_node_put() when breaking out of
for_each_child_of_node() as it will automatically increase
and decrease the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50429/">CVE-2022-50429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50429">CVE-2022-50429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250811">SUSE bug 1250811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50431</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50431" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50431" ref_url="https://www.suse.com/security/cve/CVE-2022-50431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()

dev_set_name() in soundbus_add_one() allocates memory for name, it need be
freed when of_device_register() fails, call soundbus_dev_put() to give up
the reference that hold in device_initialize(), so that it can be freed in
kobject_cleanup() when the refcount hit to 0. And other resources are also
freed in i2sbus_release_dev(), so it can return 0 directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50431/">CVE-2022-50431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50431">CVE-2022-50431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250790">SUSE bug 1250790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50436" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50436" ref_url="https://www.suse.com/security/cve/CVE-2022-50436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: don't set up encryption key during jbd2 transaction

Commit a80f7fcf1867 ("ext4: fixup ext4_fc_track_* functions' signature")
extended the scope of the transaction in ext4_unlink() too far, making
it include the call to ext4_find_entry().  However, ext4_find_entry()
can deadlock when called from within a transaction because it may need
to set up the directory's encryption key.

Fix this by restoring the transaction to its original scope.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50436/">CVE-2022-50436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50436">CVE-2022-50436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250846">SUSE bug 1250846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50439</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50439" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50439" ref_url="https://www.suse.com/security/cve/CVE-2022-50439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8173: Enable IRQ when pdata is ready

If the device does not come straight from reset, we might receive an IRQ
before we are ready to handle it.


[    2.334737] Unable to handle kernel read from unreadable memory at virtual address 00000000000001e4
[    2.522601] Call trace:
[    2.525040]  regmap_read+0x1c/0x80
[    2.528434]  mt8173_afe_irq_handler+0x40/0xf0
...
[    2.598921]  start_kernel+0x338/0x42c
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50439/">CVE-2022-50439 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50439">CVE-2022-50439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250948">SUSE bug 1250948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50440" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50440" ref_url="https://www.suse.com/security/cve/CVE-2022-50440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Validate the box size for the snooped cursor

Invalid userspace dma surface copies could potentially overflow
the memcpy from the surface to the snooped image leading to crashes.
To fix it the dimensions of the copybox have to be validated
against the expected size of the snooped cursor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50440/">CVE-2022-50440 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50440">CVE-2022-50440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250853">SUSE bug 1250853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50444" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50444" ref_url="https://www.suse.com/security/cve/CVE-2022-50444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: tegra20: Fix refcount leak in tegra20_clock_init

of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50444/">CVE-2022-50444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50444">CVE-2022-50444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250767">SUSE bug 1250767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50447</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50447" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50447" ref_url="https://www.suse.com/security/cve/CVE-2022-50447" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_conn: Fix crash on hci_create_cis_sync

When attempting to connect multiple ISO sockets without using
DEFER_SETUP may result in the following crash:

BUG: KASAN: null-ptr-deref in hci_create_cis_sync+0x18b/0x2b0
Read of size 2 at addr 0000000000000036 by task kworker/u3:1/50

CPU: 0 PID: 50 Comm: kworker/u3:1 Not tainted
6.0.0-rc7-02243-gb84a13ff4eda #4373
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009),
BIOS 1.16.0-1.fc36 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x19/0x27
 kasan_report+0xbc/0xf0
 ? hci_create_cis_sync+0x18b/0x2b0
 hci_create_cis_sync+0x18b/0x2b0
 ? get_link_mode+0xd0/0xd0
 ? __ww_mutex_lock_slowpath+0x10/0x10
 ? mutex_lock+0xe0/0xe0
 ? get_link_mode+0xd0/0xd0
 hci_cmd_sync_work+0x111/0x190
 process_one_work+0x427/0x650
 worker_thread+0x87/0x750
 ? process_one_work+0x650/0x650
 kthread+0x14e/0x180
 ? kthread_exit+0x50/0x50
 ret_from_fork+0x22/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50447/">CVE-2022-50447 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50447">CVE-2022-50447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250771">SUSE bug 1250771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50452</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50452" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50452" ref_url="https://www.suse.com/security/cve/CVE-2022-50452" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: cake: fix null pointer access issue when cake_init() fails

When the default qdisc is cake, if the qdisc of dev_queue fails to be
inited during mqprio_init(), cake_reset() is invoked to clear
resources. In this case, the tins is NULL, and it will cause gpf issue.

The process is as follows:
qdisc_create_dflt()
	cake_init()
		q-&gt;tins = kvcalloc(...)        ---&gt;failed, q-&gt;tins is NULL
	...
	qdisc_put()
		...
		cake_reset()
			...
			cake_dequeue_one()
				b = &amp;q-&gt;tins[...]   ---&gt;q-&gt;tins is NULL

The following is the Call Trace information:
general protection fault, probably for non-canonical address
0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
RIP: 0010:cake_dequeue_one+0xc9/0x3c0
Call Trace:
&lt;TASK&gt;
cake_reset+0xb1/0x140
qdisc_reset+0xed/0x6f0
qdisc_destroy+0x82/0x4c0
qdisc_put+0x9e/0xb0
qdisc_create_dflt+0x2c3/0x4a0
mqprio_init+0xa71/0x1760
qdisc_create+0x3eb/0x1000
tc_modify_qdisc+0x408/0x1720
rtnetlink_rcv_msg+0x38e/0xac0
netlink_rcv_skb+0x12d/0x3a0
netlink_unicast+0x4a2/0x740
netlink_sendmsg+0x826/0xcc0
sock_sendmsg+0xc5/0x100
____sys_sendmsg+0x583/0x690
___sys_sendmsg+0xe8/0x160
__sys_sendmsg+0xbf/0x160
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7f89e5122d04
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50452/">CVE-2022-50452 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50452">CVE-2022-50452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250793">SUSE bug 1250793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50453</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50453" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50453" ref_url="https://www.suse.com/security/cve/CVE-2022-50453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: fix NULL-pointer dereferences

There are several places where we can crash the kernel by requesting
lines, unbinding the GPIO device, then calling any of the system calls
relevant to the GPIO character device's annonymous file descriptors:
ioctl(), read(), poll().

While I observed it with the GPIO simulator, it will also happen for any
of the GPIO devices that can be hot-unplugged - for instance any HID GPIO
expander (e.g. CP2112).

This affects both v1 and v2 uAPI.

This fixes it partially by checking if gdev-&gt;chip is not NULL but it
doesn't entirely remedy the situation as we still have a race condition
in which another thread can remove the device after the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50453/">CVE-2022-50453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50453">CVE-2022-50453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250887">SUSE bug 1250887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50458" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50458" ref_url="https://www.suse.com/security/cve/CVE-2022-50458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: tegra: Fix refcount leak in tegra210_clock_init

of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50458/">CVE-2022-50458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50458">CVE-2022-50458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250891">SUSE bug 1250891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50459" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50459" ref_url="https://www.suse.com/security/cve/CVE-2022-50459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi: iscsi_tcp: Fix null-ptr-deref while calling getpeername()

Fix a NULL pointer crash that occurs when we are freeing the socket at the
same time we access it via sysfs.

The problem is that:

 1. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() take
    the frwd_lock and do sock_hold() then drop the frwd_lock. sock_hold()
    does a get on the "struct sock".

 2. iscsi_sw_tcp_release_conn() does sockfd_put() which does the last put
    on the "struct socket" and that does __sock_release() which sets the
    sock-&gt;ops to NULL.

 3. iscsi_sw_tcp_conn_get_param() and iscsi_sw_tcp_host_get_param() then
    call kernel_getpeername() which accesses the NULL sock-&gt;ops.

Above we do a get on the "struct sock", but we needed a get on the "struct
socket". Originally, we just held the frwd_lock the entire time but in
commit bcf3a2953d36 ("scsi: iscsi: iscsi_tcp: Avoid holding spinlock while
calling getpeername()") we switched to refcount based because the network
layer changed and started taking a mutex in that path, so we could no
longer hold the frwd_lock.

Instead of trying to maintain multiple refcounts, this just has us use a
mutex for accessing the socket in the interface code paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50459/">CVE-2022-50459 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50459">CVE-2022-50459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250850">SUSE bug 1250850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50460" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50460" ref_url="https://www.suse.com/security/cve/CVE-2022-50460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix xid leak in cifs_flock()

If not flock, before return -ENOLCK, should free the xid,
otherwise, the xid will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50460/">CVE-2022-50460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50460">CVE-2022-50460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250879">SUSE bug 1250879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50464" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50464" ref_url="https://www.suse.com/security/cve/CVE-2022-50464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7915: Fix PCI device refcount leak in mt7915_pci_init_hif2()

As comment of pci_get_device() says, it returns a pci_device with its
refcount increased. We need to call pci_dev_put() to decrease the
refcount. Save the return value of pci_get_device() and call
pci_dev_put() to decrease the refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50464/">CVE-2022-50464 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50464">CVE-2022-50464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250881">SUSE bug 1250881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50465" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50465" ref_url="https://www.suse.com/security/cve/CVE-2022-50465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix leaking uninitialized memory in fast-commit journal

When space at the end of fast-commit journal blocks is unused, make sure
to zero it out so that uninitialized memory is not leaked to disk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50465/">CVE-2022-50465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50465">CVE-2022-50465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250883">SUSE bug 1250883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50467" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50467" ref_url="https://www.suse.com/security/cve/CVE-2022-50467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix null ndlp ptr dereference in abnormal exit path for GFT_ID

An error case exit from lpfc_cmpl_ct_cmd_gft_id() results in a call to
lpfc_nlp_put() with a null pointer to a nodelist structure.

Changed lpfc_cmpl_ct_cmd_gft_id() to initialize nodelist pointer upon
entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50467/">CVE-2022-50467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50467">CVE-2022-50467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250847">SUSE bug 1250847</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50470" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50470" ref_url="https://www.suse.com/security/cve/CVE-2022-50470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Remove device endpoints from bandwidth list when freeing the device

Endpoints are normally deleted from the bandwidth list when they are
dropped, before the virt device is freed.

If xHC host is dying or being removed then the endpoints aren't dropped
cleanly due to functions returning early to avoid interacting with a
non-accessible host controller.

So check and delete endpoints that are still on the bandwidth list when
freeing the virt device.

Solves a list_del corruption kernel crash when unbinding xhci-pci,
caused by xhci_mem_cleanup() when it later tried to delete already freed
endpoints from the bandwidth list.

This only affects hosts that use software bandwidth checking, which
currenty is only the xHC in intel Panther Point PCH (Ivy Bridge)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50470/">CVE-2022-50470 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50470">CVE-2022-50470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251202">SUSE bug 1251202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50472" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50472" ref_url="https://www.suse.com/security/cve/CVE-2022-50472" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/mad: Don't call to function that might sleep while in atomic context

Tracepoints are not allowed to sleep, as such the following splat is
generated due to call to ib_query_pkey() in atomic context.

WARNING: CPU: 0 PID: 1888000 at kernel/trace/ring_buffer.c:2492 rb_commit+0xc1/0x220
CPU: 0 PID: 1888000 Comm: kworker/u9:0 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-305.3.1.el8.x86_64 #1
 Hardware name: Red Hat KVM, BIOS 1.13.0-2.module_el8.3.0+555+a55c8938 04/01/2014
 Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core]
 RIP: 0010:rb_commit+0xc1/0x220
 RSP: 0000:ffffa8ac80f9bca0 EFLAGS: 00010202
 RAX: ffff8951c7c01300 RBX: ffff8951c7c14a00 RCX: 0000000000000246
 RDX: ffff8951c707c000 RSI: ffff8951c707c57c RDI: ffff8951c7c14a00
 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff8951c7c01300 R11: 0000000000000001 R12: 0000000000000246
 R13: 0000000000000000 R14: ffffffff964c70c0 R15: 0000000000000000
 FS:  0000000000000000(0000) GS:ffff8951fbc00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f20e8f39010 CR3: 000000002ca10005 CR4: 0000000000170ef0
 Call Trace:
  ring_buffer_unlock_commit+0x1d/0xa0
  trace_buffer_unlock_commit_regs+0x3b/0x1b0
  trace_event_buffer_commit+0x67/0x1d0
  trace_event_raw_event_ib_mad_recv_done_handler+0x11c/0x160 [ib_core]
  ib_mad_recv_done+0x48b/0xc10 [ib_core]
  ? trace_event_raw_event_cq_poll+0x6f/0xb0 [ib_core]
  __ib_process_cq+0x91/0x1c0 [ib_core]
  ib_cq_poll_work+0x26/0x80 [ib_core]
  process_one_work+0x1a7/0x360
  ? create_worker+0x1a0/0x1a0
  worker_thread+0x30/0x390
  ? create_worker+0x1a0/0x1a0
  kthread+0x116/0x130
  ? kthread_flush_work_fn+0x10/0x10
  ret_from_fork+0x35/0x40
 ---[ end trace 78ba8509d3830a16 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50472/">CVE-2022-50472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50472">CVE-2022-50472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251101">SUSE bug 1251101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50473" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50473" ref_url="https://www.suse.com/security/cve/CVE-2022-50473" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: Init completion before kobject_init_and_add()

In cpufreq_policy_alloc(), it will call uninitialed completion in
cpufreq_sysfs_release() when kobject_init_and_add() fails. And
that will cause a crash such as the following page fault in complete:

BUG: unable to handle page fault for address: fffffffffffffff8
[..]
RIP: 0010:complete+0x98/0x1f0
[..]
Call Trace:
 kobject_put+0x1be/0x4c0
 cpufreq_online.cold+0xee/0x1fd
 cpufreq_add_dev+0x183/0x1e0
 subsys_interface_register+0x3f5/0x4e0
 cpufreq_register_driver+0x3b7/0x670
 acpi_cpufreq_init+0x56c/0x1000 [acpi_cpufreq]
 do_one_initcall+0x13d/0x780
 do_init_module+0x1c3/0x630
 load_module+0x6e67/0x73b0
 __do_sys_finit_module+0x181/0x240
 do_syscall_64+0x35/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50473/">CVE-2022-50473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50473">CVE-2022-50473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251103">SUSE bug 1251103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50475</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50475" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50475" ref_url="https://www.suse.com/security/cve/CVE-2022-50475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Make sure "ib_port" is valid when access sysfs node

The "ib_port" structure must be set before adding the sysfs kobject,
and reset after removing it, otherwise it may crash when accessing
the sysfs node:
  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050
  Mem abort info:
    ESR = 0x96000006
    Exception class = DABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
  Data abort info:
    ISV = 0, ISS = 0x00000006
    CM = 0, WnR = 0
  user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000e85f5ba5
  [0000000000000050] pgd=0000000848fd9003, pud=000000085b387003, pmd=0000000000000000
  Internal error: Oops: 96000006 [#2] PREEMPT SMP
  Modules linked in: ib_umad(O) mlx5_ib(O) nfnetlink_cttimeout(E) nfnetlink(E) act_gact(E) cls_flower(E) sch_ingress(E) openvswitch(E) nsh(E) nf_nat_ipv6(E) nf_nat_ipv4(E) nf_conncount(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) mst_pciconf(O) ipmi_devintf(E) ipmi_msghandler(E) ipmb_dev_int(OE) mlx5_core(O) mlxfw(O) mlxdevm(O) auxiliary(O) ib_uverbs(O) ib_core(O) mlx_compat(O) psample(E) sbsa_gwdt(E) uio_pdrv_genirq(E) uio(E) mlxbf_pmc(OE) mlxbf_gige(OE) mlxbf_tmfifo(OE) gpio_mlxbf2(OE) pwr_mlxbf(OE) mlx_trio(OE) i2c_mlxbf(OE) mlx_bootctl(OE) bluefield_edac(OE) knem(O) ip_tables(E) ipv6(E) crc_ccitt(E) [last unloaded: mst_pci]
  Process grep (pid: 3372, stack limit = 0x0000000022055c92)
  CPU: 5 PID: 3372 Comm: grep Tainted: G      D    OE     4.19.161-mlnx.47.gadcd9e3 #1
  Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS BlueField:3.9.2-15-ga2403ab Sep  8 2022
  pstate: 40000005 (nZcv daif -PAN -UAO)
  pc : hw_stat_port_show+0x4c/0x80 [ib_core]
  lr : port_attr_show+0x40/0x58 [ib_core]
  sp : ffff000029f43b50
  x29: ffff000029f43b50 x28: 0000000019375000
  x27: ffff8007b821a540 x26: ffff000029f43e30
  x25: 0000000000008000 x24: ffff000000eaa958
  x23: 0000000000001000 x22: ffff8007a4ce3000
  x21: ffff8007baff8000 x20: ffff8007b9066ac0
  x19: ffff8007bae97578 x18: 0000000000000000
  x17: 0000000000000000 x16: 0000000000000000
  x15: 0000000000000000 x14: 0000000000000000
  x13: 0000000000000000 x12: 0000000000000000
  x11: 0000000000000000 x10: 0000000000000000
  x9 : 0000000000000000 x8 : ffff8007a4ce4000
  x7 : 0000000000000000 x6 : 000000000000003f
  x5 : ffff000000e6a280 x4 : ffff8007a4ce3000
  x3 : 0000000000000000 x2 : aaaaaaaaaaaaaaab
  x1 : ffff8007b9066a10 x0 : ffff8007baff8000
  Call trace:
   hw_stat_port_show+0x4c/0x80 [ib_core]
   port_attr_show+0x40/0x58 [ib_core]
   sysfs_kf_seq_show+0x8c/0x150
   kernfs_seq_show+0x44/0x50
   seq_read+0x1b4/0x45c
   kernfs_fop_read+0x148/0x1d8
   __vfs_read+0x58/0x180
   vfs_read+0x94/0x154
   ksys_read+0x68/0xd8
   __arm64_sys_read+0x28/0x34
   el0_svc_common+0x88/0x18c
   el0_svc_handler+0x78/0x94
   el0_svc+0x8/0xe8
  Code: f2955562 aa1603e4 aa1503e0 f9405683 (f9402861)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50475/">CVE-2022-50475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50475">CVE-2022-50475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251104">SUSE bug 1251104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50477" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50477" ref_url="https://www.suse.com/security/cve/CVE-2022-50477" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtc: class: Fix potential memleak in devm_rtc_allocate_device()

devm_rtc_allocate_device() will alloc a rtc_device first, and then run
dev_set_name(). If dev_set_name() failed, the rtc_device will memleak.
Move devm_add_action_or_reset() in front of dev_set_name() to prevent
memleak.

unreferenced object 0xffff888110a53000 (size 2048):
  comm "python3", pid 470, jiffies 4296078308 (age 58.882s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 08 30 a5 10 81 88 ff ff  .........0......
    08 30 a5 10 81 88 ff ff 00 00 00 00 00 00 00 00  .0..............
  backtrace:
    [&lt;000000004aac0364&gt;] kmalloc_trace+0x21/0x110
    [&lt;000000000ff02202&gt;] devm_rtc_allocate_device+0xd4/0x400
    [&lt;000000001bdf5639&gt;] devm_rtc_device_register+0x1a/0x80
    [&lt;00000000351bf81c&gt;] rx4581_probe+0xdd/0x110 [rtc_rx4581]
    [&lt;00000000f0eba0ae&gt;] spi_probe+0xde/0x130
    [&lt;00000000bff89ee8&gt;] really_probe+0x175/0x3f0
    [&lt;00000000128e8d84&gt;] __driver_probe_device+0xe6/0x170
    [&lt;00000000ee5bf913&gt;] device_driver_attach+0x32/0x80
    [&lt;00000000f3f28f92&gt;] bind_store+0x10b/0x1a0
    [&lt;000000009ff812d8&gt;] drv_attr_store+0x49/0x70
    [&lt;000000008139c323&gt;] sysfs_kf_write+0x8d/0xb0
    [&lt;00000000b6146e01&gt;] kernfs_fop_write_iter+0x214/0x2d0
    [&lt;00000000ecbe3895&gt;] vfs_write+0x61a/0x7d0
    [&lt;00000000aa2196ea&gt;] ksys_write+0xc8/0x190
    [&lt;0000000046a600f5&gt;] do_syscall_64+0x37/0x90
    [&lt;00000000541a336f&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50477/">CVE-2022-50477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50477">CVE-2022-50477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251125">SUSE bug 1251125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50479" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50479" ref_url="https://www.suse.com/security/cve/CVE-2022-50479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: fix potential memory leak

This patch fix potential memory leak (clk_src) when function run
into last return NULL.

s/free/kfree/ - Alex
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50479/">CVE-2022-50479 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50479">CVE-2022-50479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251037">SUSE bug 1251037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50482</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50482" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50482" ref_url="https://www.suse.com/security/cve/CVE-2022-50482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Clean up si_domain in the init_dmars() error path

A splat from kmem_cache_destroy() was seen with a kernel prior to
commit ee2653bbe89d ("iommu/vt-d: Remove domain and devinfo mempool")
when there was a failure in init_dmars(), because the iommu_domain
cache still had objects. While the mempool code is now gone, there
still is a leak of the si_domain memory if init_dmars() fails. So
clean up si_domain in the init_dmars() error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50482/">CVE-2022-50482 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50482">CVE-2022-50482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251133">SUSE bug 1251133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50484" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50484" ref_url="https://www.suse.com/security/cve/CVE-2022-50484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential memory leaks

When the driver hits -ENOMEM at allocating a URB or a buffer, it
aborts and goes to the error path that releases the all previously
allocated resources.  However, when -ENOMEM hits at the middle of the
sync EP URB allocation loop, the partially allocated URBs might be
left without released, because ep-&gt;nurbs is still zero at that point.

Fix it by setting ep-&gt;nurbs at first, so that the error handler loops
over the full URB list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50484/">CVE-2022-50484 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50484">CVE-2022-50484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251115">SUSE bug 1251115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50485" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50485" ref_url="https://www.suse.com/security/cve/CVE-2022-50485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode

There are many places that will get unhappy (and crash) when ext4_iget()
returns a bad inode. However, if iget the boot loader inode, allows a bad
inode to be returned, because the inode may not be initialized. This
mechanism can be used to bypass some checks and cause panic. To solve this
problem, we add a special iget flag EXT4_IGET_BAD. Only with this flag
we'd be returning bad inode from ext4_iget(), otherwise we always return
the error code if the inode is bad inode.(suggested by Jan Kara)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50485/">CVE-2022-50485 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50485">CVE-2022-50485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251197">SUSE bug 1251197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50487" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50487" ref_url="https://www.suse.com/security/cve/CVE-2022-50487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50487/">CVE-2022-50487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50487">CVE-2022-50487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251208">SUSE bug 1251208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50488</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50488" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50488" ref_url="https://www.suse.com/security/cve/CVE-2022-50488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix possible uaf for 'bfqq-&gt;bic'

Our test report a uaf for 'bfqq-&gt;bic' in 5.10:

==================================================================
BUG: KASAN: use-after-free in bfq_select_queue+0x378/0xa30

CPU: 6 PID: 2318352 Comm: fsstress Kdump: loaded Not tainted 5.10.0-60.18.0.50.h602.kasan.eulerosv2r11.x86_64 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58-20220320_160524-szxrtosci10000 04/01/2014
Call Trace:
 bfq_select_queue+0x378/0xa30
 bfq_dispatch_request+0xe8/0x130
 blk_mq_do_dispatch_sched+0x62/0xb0
 __blk_mq_sched_dispatch_requests+0x215/0x2a0
 blk_mq_sched_dispatch_requests+0x8f/0xd0
 __blk_mq_run_hw_queue+0x98/0x180
 __blk_mq_delay_run_hw_queue+0x22b/0x240
 blk_mq_run_hw_queue+0xe3/0x190
 blk_mq_sched_insert_requests+0x107/0x200
 blk_mq_flush_plug_list+0x26e/0x3c0
 blk_finish_plug+0x63/0x90
 __iomap_dio_rw+0x7b5/0x910
 iomap_dio_rw+0x36/0x80
 ext4_dio_read_iter+0x146/0x190 [ext4]
 ext4_file_read_iter+0x1e2/0x230 [ext4]
 new_sync_read+0x29f/0x400
 vfs_read+0x24e/0x2d0
 ksys_read+0xd5/0x1b0
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x61/0xc6

Commit 3bc5e683c67d ("bfq: Split shared queues on move between cgroups")
changes that move process to a new cgroup will allocate a new bfqq to
use, however, the old bfqq and new bfqq can point to the same bic:

1) Initial state, two process with io in the same cgroup.

Process 1       Process 2
 (BIC1)          (BIC2)
  |  ^            |  ^
  |  |            |  |
  V  |            V  |
  bfqq1           bfqq2

2) bfqq1 is merged to bfqq2.

Process 1       Process 2
 (BIC1)          (BIC2)
  |               |
   \-------------\|
                  V
  bfqq1           bfqq2(coop)

3) Process 1 exit, then issue new io(denoce IOA) from Process 2.

 (BIC2)
  |  ^
  |  |
  V  |
  bfqq2(coop)

4) Before IOA is completed, move Process 2 to another cgroup and issue io.

Process 2
 (BIC2)
   ^
   |\--------------\
   |                V
  bfqq2           bfqq3

Now that BIC2 points to bfqq3, while bfqq2 and bfqq3 both point to BIC2.
If all the requests are completed, and Process 2 exit, BIC2 will be
freed while there is no guarantee that bfqq2 will be freed before BIC2.

Fix the problem by clearing bfqq-&gt;bic while bfqq is detached from bic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50488/">CVE-2022-50488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50488">CVE-2022-50488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251201">SUSE bug 1251201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251204">SUSE bug 1251204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50489" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50489" ref_url="https://www.suse.com/security/cve/CVE-2022-50489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mipi-dsi: Detach devices when removing the host

Whenever the MIPI-DSI host is unregistered, the code of
mipi_dsi_host_unregister() loops over every device currently found on that
bus and will unregister it.

However, it doesn't detach it from the bus first, which leads to all kind
of resource leaks if the host wants to perform some clean up whenever a
device is detached.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50489/">CVE-2022-50489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50489">CVE-2022-50489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251169">SUSE bug 1251169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50491" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50491" ref_url="https://www.suse.com/security/cve/CVE-2022-50491" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: cti: Fix hang in cti_disable_hw()

cti_enable_hw() and cti_disable_hw() are called from an atomic context
so shouldn't use runtime PM because it can result in a sleep when
communicating with firmware.

Since commit 3c6656337852 ("Revert "firmware: arm_scmi: Add clock
management to the SCMI power domain""), this causes a hang on Juno when
running the Perf Coresight tests or running this command:

  perf record -e cs_etm//u -- ls

This was also missed until the revert commit because pm_runtime_put()
was called with the wrong device until commit 692c9a499b28 ("coresight:
cti: Correct the parameter for pm_runtime_put")

With lock and scheduler debugging enabled the following is output:

   coresight cti_sys0: cti_enable_hw -- dev:cti_sys0  parent: 20020000.cti
   BUG: sleeping function called from invalid context at drivers/base/power/runtime.c:1151
   in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 330, name: perf-exec
   preempt_count: 2, expected: 0
   RCU nest depth: 0, expected: 0
   INFO: lockdep is turned off.
   irq event stamp: 0
   hardirqs last  enabled at (0): [&lt;0000000000000000&gt;] 0x0
   hardirqs last disabled at (0): [&lt;ffff80000822b394&gt;] copy_process+0xa0c/0x1948
   softirqs last  enabled at (0): [&lt;ffff80000822b394&gt;] copy_process+0xa0c/0x1948
   softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
   CPU: 3 PID: 330 Comm: perf-exec Not tainted 6.0.0-00053-g042116d99298 #7
   Hardware name: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform, BIOS EDK II Sep 13 2022
   Call trace:
    dump_backtrace+0x134/0x140
    show_stack+0x20/0x58
    dump_stack_lvl+0x8c/0xb8
    dump_stack+0x18/0x34
    __might_resched+0x180/0x228
    __might_sleep+0x50/0x88
    __pm_runtime_resume+0xac/0xb0
    cti_enable+0x44/0x120
    coresight_control_assoc_ectdev+0xc0/0x150
    coresight_enable_path+0xb4/0x288
    etm_event_start+0x138/0x170
    etm_event_add+0x48/0x70
    event_sched_in.isra.122+0xb4/0x280
    merge_sched_in+0x1fc/0x3d0
    visit_groups_merge.constprop.137+0x16c/0x4b0
    ctx_sched_in+0x114/0x1f0
    perf_event_sched_in+0x60/0x90
    ctx_resched+0x68/0xb0
    perf_event_exec+0x138/0x508
    begin_new_exec+0x52c/0xd40
    load_elf_binary+0x6b8/0x17d0
    bprm_execve+0x360/0x7f8
    do_execveat_common.isra.47+0x218/0x238
    __arm64_sys_execve+0x48/0x60
    invoke_syscall+0x4c/0x110
    el0_svc_common.constprop.4+0xfc/0x120
    do_el0_svc+0x34/0xc0
    el0_svc+0x40/0x98
    el0t_64_sync_handler+0x98/0xc0
    el0t_64_sync+0x170/0x174

Fix the issue by removing the runtime PM calls completely. They are not
needed here because it must have already been done when building the
path for a trace.

[ Fix build warnings ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50491/">CVE-2022-50491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50491">CVE-2022-50491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251042">SUSE bug 1251042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50494" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50494" ref_url="https://www.suse.com/security/cve/CVE-2022-50494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash

When CPU 0 is offline and intel_powerclamp is used to inject
idle, it generates kernel BUG:

BUG: using smp_processor_id() in preemptible [00000000] code: bash/15687
caller is debug_smp_processor_id+0x17/0x20
CPU: 4 PID: 15687 Comm: bash Not tainted 5.19.0-rc7+ #57
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x49/0x63
dump_stack+0x10/0x16
check_preemption_disabled+0xdd/0xe0
debug_smp_processor_id+0x17/0x20
powerclamp_set_cur_state+0x7f/0xf9 [intel_powerclamp]
...
...

Here CPU 0 is the control CPU by default and changed to the current CPU,
if CPU 0 offlined. This check has to be performed under cpus_read_lock(),
hence the above warning.

Use get_cpu() instead of smp_processor_id() to avoid this BUG.

[ rjw: Subject edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50494/">CVE-2022-50494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50494">CVE-2022-50494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251173">SUSE bug 1251173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50495</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50495" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50495" ref_url="https://www.suse.com/security/cve/CVE-2022-50495" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50495/">CVE-2022-50495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50495">CVE-2022-50495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254466">SUSE bug 1254466</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50496</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50496" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50496" ref_url="https://www.suse.com/security/cve/CVE-2022-50496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: Fix UAF in destroy()

Dm_cache also has the same UAF problem when dm_resume()
and dm_destroy() are concurrent.

Therefore, cancelling timer again in destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50496/">CVE-2022-50496 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50496">CVE-2022-50496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251091">SUSE bug 1251091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50505" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50505" ref_url="https://www.suse.com/security/cve/CVE-2022-50505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Fix pci device refcount leak in ppr_notifier()

As comment of pci_get_domain_bus_and_slot() says, it returns
a pci device with refcount increment, when finish using it,
the caller must decrement the reference count by calling
pci_dev_put(). So call it before returning from ppr_notifier()
to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50505/">CVE-2022-50505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50505">CVE-2022-50505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251086">SUSE bug 1251086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50506" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50506" ref_url="https://www.suse.com/security/cve/CVE-2022-50506" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drbd: only clone bio if we have a backing device

Commit c347a787e34cb (drbd: set -&gt;bi_bdev in drbd_req_new) moved a
bio_set_dev call (which has since been removed) to "earlier", from
drbd_request_prepare to drbd_req_new.

The problem is that this accesses device-&gt;ldev-&gt;backing_bdev, which is
not NULL-checked at this point. When we don't have an ldev (i.e. when
the DRBD device is diskless), this leads to a null pointer deref.

So, only allocate the private_bio if we actually have a disk. This is
also a small optimization, since we don't clone the bio to only to
immediately free it again in the diskless case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50506/">CVE-2022-50506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50506">CVE-2022-50506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251085">SUSE bug 1251085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50510</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50510" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50510" ref_url="https://www.suse.com/security/cve/CVE-2022-50510" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()

arm_smmu_pmu_init() won't remove the callback added by
cpuhp_setup_state_multi() when platform_driver_register() failed. Remove
the callback by cpuhp_remove_multi_state() in fail path.

Similar to the handling of arm_ccn_init() in commit 26242b330093 ("bus:
arm-ccn: Prevent hotplug callback leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50510/">CVE-2022-50510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50510">CVE-2022-50510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251525">SUSE bug 1251525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50511" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50511" ref_url="https://www.suse.com/security/cve/CVE-2022-50511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/fonts: fix undefined behavior in bit shift for get_default_font

Shifting signed 32-bit value by 31 bits is undefined, so changing
significant bit to unsigned.  The UBSAN warning calltrace like below:

UBSAN: shift-out-of-bounds in lib/fonts/fonts.c:139:20
left shift of 1 by 31 places cannot be represented in type 'int'
 &lt;TASK&gt;
 dump_stack_lvl+0x7d/0xa5
 dump_stack+0x15/0x1b
 ubsan_epilogue+0xe/0x4e
 __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c
 get_default_font+0x1c7/0x1f0
 fbcon_startup+0x347/0x3a0
 do_take_over_console+0xce/0x270
 do_fbcon_takeover+0xa1/0x170
 do_fb_registered+0x2a8/0x340
 fbcon_fb_registered+0x47/0xe0
 register_framebuffer+0x294/0x4a0
 __drm_fb_helper_initial_config_and_unlock+0x43c/0x880 [drm_kms_helper]
 drm_fb_helper_initial_config+0x52/0x80 [drm_kms_helper]
 drm_fbdev_client_hotplug+0x156/0x1b0 [drm_kms_helper]
 drm_fbdev_generic_setup+0xfc/0x290 [drm_kms_helper]
 bochs_pci_probe+0x6ca/0x772 [bochs]
 local_pci_probe+0x4d/0xb0
 pci_device_probe+0x119/0x320
 really_probe+0x181/0x550
 __driver_probe_device+0xc6/0x220
 driver_probe_device+0x32/0x100
 __driver_attach+0x195/0x200
 bus_for_each_dev+0xbb/0x120
 driver_attach+0x27/0x30
 bus_add_driver+0x22e/0x2f0
 driver_register+0xa9/0x190
 __pci_register_driver+0x90/0xa0
 bochs_pci_driver_init+0x52/0x1000 [bochs]
 do_one_initcall+0x76/0x430
 do_init_module+0x61/0x28a
 load_module+0x1f82/0x2e50
 __do_sys_finit_module+0xf8/0x190
 __x64_sys_finit_module+0x23/0x30
 do_syscall_64+0x58/0x80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50511/">CVE-2022-50511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50511">CVE-2022-50511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251527">SUSE bug 1251527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50512</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50512" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50512" ref_url="https://www.suse.com/security/cve/CVE-2022-50512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix potential memory leak in ext4_fc_record_regions()

As krealloc may return NULL, in this case 'state-&gt;fc_regions' may not be
freed by krealloc, but 'state-&gt;fc_regions' already set NULL. Then will
lead to 'state-&gt;fc_regions' memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50512/">CVE-2022-50512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50512">CVE-2022-50512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251296">SUSE bug 1251296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50515</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50515" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50515" ref_url="https://www.suse.com/security/cve/CVE-2022-50515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix memory leak in hpd_rx_irq_create_workqueue()

If construction of the array of work queues to handle hpd_rx_irq offload
work fails, we need to unwind. Destroy all the created workqueues and
the allocated memory for the hpd_rx_irq_offload_work_queue struct array.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50515/">CVE-2022-50515 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50515">CVE-2022-50515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251315">SUSE bug 1251315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50516</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50516" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50516" ref_url="https://www.suse.com/security/cve/CVE-2022-50516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: dlm: fix invalid derefence of sb_lvbptr

I experience issues when putting a lkbsb on the stack and have sb_lvbptr
field to a dangled pointer while not using DLM_LKF_VALBLK. It will crash
with the following kernel message, the dangled pointer is here
0xdeadbeef as example:

[  102.749317] BUG: unable to handle page fault for address: 00000000deadbeef
[  102.749320] #PF: supervisor read access in kernel mode
[  102.749323] #PF: error_code(0x0000) - not-present page
[  102.749325] PGD 0 P4D 0
[  102.749332] Oops: 0000 [#1] PREEMPT SMP PTI
[  102.749336] CPU: 0 PID: 1567 Comm: lock_torture_wr Tainted: G        W         5.19.0-rc3+ #1565
[  102.749343] Hardware name: Red Hat KVM/RHEL-AV, BIOS 1.16.0-2.module+el8.7.0+15506+033991b0 04/01/2014
[  102.749344] RIP: 0010:memcpy_erms+0x6/0x10
[  102.749353] Code: cc cc cc cc eb 1e 0f 1f 00 48 89 f8 48 89 d1 48 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 c3 66 0f 1f 44 00 00 48 89 f8 48 89 d1 &lt;f3&gt; a4 c3 0f 1f 80 00 00 00 00 48 89 f8 48 83 fa 20 72 7e 40 38 fe
[  102.749355] RSP: 0018:ffff97a58145fd08 EFLAGS: 00010202
[  102.749358] RAX: ffff901778b77070 RBX: 0000000000000000 RCX: 0000000000000040
[  102.749360] RDX: 0000000000000040 RSI: 00000000deadbeef RDI: ffff901778b77070
[  102.749362] RBP: ffff97a58145fd10 R08: ffff901760b67a70 R09: 0000000000000001
[  102.749364] R10: ffff9017008e2cb8 R11: 0000000000000001 R12: ffff901760b67a70
[  102.749366] R13: ffff901760b78f00 R14: 0000000000000003 R15: 0000000000000001
[  102.749368] FS:  0000000000000000(0000) GS:ffff901876e00000(0000) knlGS:0000000000000000
[  102.749372] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  102.749374] CR2: 00000000deadbeef CR3: 000000017c49a004 CR4: 0000000000770ef0
[  102.749376] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  102.749378] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  102.749379] PKRU: 55555554
[  102.749381] Call Trace:
[  102.749382]  &lt;TASK&gt;
[  102.749383]  ? send_args+0xb2/0xd0
[  102.749389]  send_common+0xb7/0xd0
[  102.749395]  _unlock_lock+0x2c/0x90
[  102.749400]  unlock_lock.isra.56+0x62/0xa0
[  102.749405]  dlm_unlock+0x21e/0x330
[  102.749411]  ? lock_torture_stats+0x80/0x80 [dlm_locktorture]
[  102.749416]  torture_unlock+0x5a/0x90 [dlm_locktorture]
[  102.749419]  ? preempt_count_sub+0xba/0x100
[  102.749427]  lock_torture_writer+0xbd/0x150 [dlm_locktorture]
[  102.786186]  kthread+0x10a/0x130
[  102.786581]  ? kthread_complete_and_exit+0x20/0x20
[  102.787156]  ret_from_fork+0x22/0x30
[  102.787588]  &lt;/TASK&gt;
[  102.787855] Modules linked in: dlm_locktorture torture rpcsec_gss_krb5 intel_rapl_msr intel_rapl_common kvm_intel iTCO_wdt iTCO_vendor_support kvm vmw_vsock_virtio_transport qxl irqbypass vmw_vsock_virtio_transport_common drm_ttm_helper crc32_pclmul joydev crc32c_intel ttm vsock virtio_scsi virtio_balloon snd_pcm drm_kms_helper virtio_console snd_timer snd drm soundcore syscopyarea i2c_i801 sysfillrect sysimgblt i2c_smbus pcspkr fb_sys_fops lpc_ich serio_raw
[  102.792536] CR2: 00000000deadbeef
[  102.792930] ---[ end trace 0000000000000000 ]---

This patch fixes the issue by checking also on DLM_LKF_VALBLK on exflags
is set when copying the lvbptr array instead of if it's just null which
fixes for me the issue.

I think this patch can fix other dlm users as well, depending how they
handle the init, freeing memory handling of sb_lvbptr and don't set
DLM_LKF_VALBLK for some dlm_lock() calls. It might a there could be a
hidden issue all the time. However with checking on DLM_LKF_VALBLK the
user always need to provide a sb_lvbptr non-null value. There might be
more intelligent handling between per ls lvblen, DLM_LKF_VALBLK and
non-null to report the user the way how DLM API is used is wrong but can
be added for later, this will only fix the current behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50516/">CVE-2022-50516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50516">CVE-2022-50516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251741">SUSE bug 1251741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50520" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50520" ref_url="https://www.suse.com/security/cve/CVE-2022-50520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix PCI device refcount leak in radeon_atrm_get_bios()

As comment of pci_get_class() says, it returns a pci_device with its
refcount increased and decreased the refcount for the input parameter
@from if it is not NULL.

If we break the loop in radeon_atrm_get_bios() with 'pdev' not NULL, we
need to call pci_dev_put() to decrease the refcount. Add the missing
pci_dev_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50520/">CVE-2022-50520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50520">CVE-2022-50520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251310">SUSE bug 1251310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50527" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50527" ref_url="https://www.suse.com/security/cve/CVE-2022-50527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix size validation for non-exclusive domains (v4)

Fix amdgpu_bo_validate_size() to check whether the TTM domain manager for the
requested memory exists, else we get a kernel oops when dereferencing "man".

v2: Make the patch standalone, i.e. not dependent on local patches.
v3: Preserve old behaviour and just check that the manager pointer is not
    NULL.
v4: Complain if GTT domain requested and it is uninitialized--most likely a
    bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50527/">CVE-2022-50527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50527">CVE-2022-50527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251738">SUSE bug 1251738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50528" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50528" ref_url="https://www.suse.com/security/cve/CVE-2022-50528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix memory leakage

This patch fixes potential memory leakage and seg fault
in  _gpuvm_import_dmabuf() function
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50528/">CVE-2022-50528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50528">CVE-2022-50528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251303">SUSE bug 1251303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50530" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50530" ref_url="https://www.suse.com/security/cve/CVE-2022-50530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping()

Our syzkaller report a null pointer dereference, root cause is
following:

__blk_mq_alloc_map_and_rqs
 set-&gt;tags[hctx_idx] = blk_mq_alloc_map_and_rqs
  blk_mq_alloc_map_and_rqs
   blk_mq_alloc_rqs
    // failed due to oom
    alloc_pages_node
    // set-&gt;tags[hctx_idx] is still NULL
    blk_mq_free_rqs
     drv_tags = set-&gt;tags[hctx_idx];
     // null pointer dereference is triggered
     blk_mq_clear_rq_mapping(drv_tags, ...)

This is because commit 63064be150e4 ("blk-mq:
Add blk_mq_alloc_map_and_rqs()") merged the two steps:

1) set-&gt;tags[hctx_idx] = blk_mq_alloc_rq_map()
2) blk_mq_alloc_rqs(..., set-&gt;tags[hctx_idx])

into one step:

set-&gt;tags[hctx_idx] = blk_mq_alloc_map_and_rqs()

Since tags is not initialized yet in this case, fix the problem by
checking if tags is NULL pointer in blk_mq_clear_rq_mapping().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50530/">CVE-2022-50530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50530">CVE-2022-50530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251299">SUSE bug 1251299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50531" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50531" ref_url="https://www.suse.com/security/cve/CVE-2022-50531" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix an information leak in tipc_topsrv_kern_subscr

Use a 8-byte write to initialize sub.usr_handle in
tipc_topsrv_kern_subscr(), otherwise four bytes remain uninitialized
when issuing setsockopt(..., SOL_TIPC, ...).
This resulted in an infoleak reported by KMSAN when the packet was
received:

  =====================================================
  BUG: KMSAN: kernel-infoleak in copyout+0xbc/0x100 lib/iov_iter.c:169
   instrument_copy_to_user ./include/linux/instrumented.h:121
   copyout+0xbc/0x100 lib/iov_iter.c:169
   _copy_to_iter+0x5c0/0x20a0 lib/iov_iter.c:527
   copy_to_iter ./include/linux/uio.h:176
   simple_copy_to_iter+0x64/0xa0 net/core/datagram.c:513
   __skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:419
   skb_copy_datagram_iter+0x58/0x200 net/core/datagram.c:527
   skb_copy_datagram_msg ./include/linux/skbuff.h:3903
   packet_recvmsg+0x521/0x1e70 net/packet/af_packet.c:3469
   ____sys_recvmsg+0x2c4/0x810 net/socket.c:?
   ___sys_recvmsg+0x217/0x840 net/socket.c:2743
   __sys_recvmsg net/socket.c:2773
   __do_sys_recvmsg net/socket.c:2783
   __se_sys_recvmsg net/socket.c:2780
   __x64_sys_recvmsg+0x364/0x540 net/socket.c:2780
   do_syscall_x64 arch/x86/entry/common.c:50
   do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x63/0xcd arch/x86/entry/entry_64.S:120

  ...

  Uninit was stored to memory at:
   tipc_sub_subscribe+0x42d/0xb50 net/tipc/subscr.c:156
   tipc_conn_rcv_sub+0x246/0x620 net/tipc/topsrv.c:375
   tipc_topsrv_kern_subscr+0x2e8/0x400 net/tipc/topsrv.c:579
   tipc_group_create+0x4e7/0x7d0 net/tipc/group.c:190
   tipc_sk_join+0x2a8/0x770 net/tipc/socket.c:3084
   tipc_setsockopt+0xae5/0xe40 net/tipc/socket.c:3201
   __sys_setsockopt+0x87f/0xdc0 net/socket.c:2252
   __do_sys_setsockopt net/socket.c:2263
   __se_sys_setsockopt net/socket.c:2260
   __x64_sys_setsockopt+0xe0/0x160 net/socket.c:2260
   do_syscall_x64 arch/x86/entry/common.c:50
   do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x63/0xcd arch/x86/entry/entry_64.S:120

  Local variable sub created at:
   tipc_topsrv_kern_subscr+0x57/0x400 net/tipc/topsrv.c:562
   tipc_group_create+0x4e7/0x7d0 net/tipc/group.c:190

  Bytes 84-87 of 88 are uninitialized
  Memory access of size 88 starts at ffff88801ed57cd0
  Data copied to user address 0000000020000400
  ...
  =====================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50531/">CVE-2022-50531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50531">CVE-2022-50531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251533">SUSE bug 1251533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50532</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50532" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50532" ref_url="https://www.suse.com/security/cve/CVE-2022-50532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add()

In mpt3sas_transport_port_add(), if sas_rphy_add() returns error,
sas_rphy_free() needs be called to free the resource allocated in
sas_end_device_alloc(). Otherwise a kernel crash will happen:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000108
CPU: 45 PID: 37020 Comm: bash Kdump: loaded Tainted: G        W          6.1.0-rc1+ #189
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : device_del+0x54/0x3d0
lr : device_del+0x37c/0x3d0
Call trace:
 device_del+0x54/0x3d0
 attribute_container_class_device_del+0x28/0x38
 transport_remove_classdev+0x6c/0x80
 attribute_container_device_trigger+0x108/0x110
 transport_remove_device+0x28/0x38
 sas_rphy_remove+0x50/0x78 [scsi_transport_sas]
 sas_port_delete+0x30/0x148 [scsi_transport_sas]
 do_sas_phy_delete+0x78/0x80 [scsi_transport_sas]
 device_for_each_child+0x68/0xb0
 sas_remove_children+0x30/0x50 [scsi_transport_sas]
 sas_rphy_remove+0x38/0x78 [scsi_transport_sas]
 sas_port_delete+0x30/0x148 [scsi_transport_sas]
 do_sas_phy_delete+0x78/0x80 [scsi_transport_sas]
 device_for_each_child+0x68/0xb0
 sas_remove_children+0x30/0x50 [scsi_transport_sas]
 sas_remove_host+0x20/0x38 [scsi_transport_sas]
 scsih_remove+0xd8/0x420 [mpt3sas]

Because transport_add_device() is not called when sas_rphy_add() fails, the
device is not added. When sas_rphy_remove() is subsequently called to
remove the device in the remove() path, a NULL pointer dereference happens.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50532/">CVE-2022-50532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50532">CVE-2022-50532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251300">SUSE bug 1251300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50534" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50534" ref_url="https://www.suse.com/security/cve/CVE-2022-50534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm thin: Use last transaction's pmd-&gt;root when commit failed

Recently we found a softlock up problem in dm thin pool btree lookup
code due to corrupted metadata:

 Kernel panic - not syncing: softlockup: hung tasks
 CPU: 7 PID: 2669225 Comm: kworker/u16:3
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
 Workqueue: dm-thin do_worker [dm_thin_pool]
 Call Trace:
   &lt;IRQ&gt;
   dump_stack+0x9c/0xd3
   panic+0x35d/0x6b9
   watchdog_timer_fn.cold+0x16/0x25
   __run_hrtimer+0xa2/0x2d0
   &lt;/IRQ&gt;
   RIP: 0010:__relink_lru+0x102/0x220 [dm_bufio]
   __bufio_new+0x11f/0x4f0 [dm_bufio]
   new_read+0xa3/0x1e0 [dm_bufio]
   dm_bm_read_lock+0x33/0xd0 [dm_persistent_data]
   ro_step+0x63/0x100 [dm_persistent_data]
   btree_lookup_raw.constprop.0+0x44/0x220 [dm_persistent_data]
   dm_btree_lookup+0x16f/0x210 [dm_persistent_data]
   dm_thin_find_block+0x12c/0x210 [dm_thin_pool]
   __process_bio_read_only+0xc5/0x400 [dm_thin_pool]
   process_thin_deferred_bios+0x1a4/0x4a0 [dm_thin_pool]
   process_one_work+0x3c5/0x730

Following process may generate a broken btree mixed with fresh and
stale btree nodes, which could get dm thin trapped in an infinite loop
while looking up data block:
 Transaction 1: pmd-&gt;root = A, A-&gt;B-&gt;C   // One path in btree
                pmd-&gt;root = X, X-&gt;Y-&gt;Z   // Copy-up
 Transaction 2: X,Z is updated on disk, Y write failed.
                // Commit failed, dm thin becomes read-only.
                process_bio_read_only
		 dm_thin_find_block
		  __find_block
		   dm_btree_lookup(pmd-&gt;root)
The pmd-&gt;root points to a broken btree, Y may contain stale node
pointing to any block, for example X, which gets dm thin trapped into
a dead loop while looking up Z.

Fix this by setting pmd-&gt;root in __open_metadata(), so that dm thin
will use the last transaction's pmd-&gt;root if commit failed.

Fetch a reproducer in [Link].

Linke: https://bugzilla.kernel.org/show_bug.cgi?id=216790
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50534/">CVE-2022-50534 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50534">CVE-2022-50534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251292">SUSE bug 1251292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50535" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50535" ref_url="https://www.suse.com/security/cve/CVE-2022-50535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix potential null-deref in dm_resume

[Why]
Fixing smatch error:
dm_resume() error: we previously assumed 'aconnector-&gt;dc_link' could be null

[How]
Check if dc_link null at the beginning of the loop,
so further checks can be dropped.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50535/">CVE-2022-50535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50535">CVE-2022-50535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251331">SUSE bug 1251331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50536" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50536" ref_url="https://www.suse.com/security/cve/CVE-2022-50536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data

In tcp_bpf_send_verdict() redirection, the eval variable is assigned to
__SK_REDIRECT after the apply_bytes data is sent, if msg has more_data,
sock_put() will be called multiple times.

We should reset the eval variable to __SK_NONE every time more_data
starts.

This causes:

IPv4: Attempt to release TCP socket in state 1 00000000b4c925d7
------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 5 PID: 4482 at lib/refcount.c:25 refcount_warn_saturate+0x7d/0x110
Modules linked in:
CPU: 5 PID: 4482 Comm: sockhash_bypass Kdump: loaded Not tainted 6.0.0 #1
Hardware name: Red Hat KVM, BIOS 1.11.0-2.el7 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __tcp_transmit_skb+0xa1b/0xb90
 ? __alloc_skb+0x8c/0x1a0
 ? __kmalloc_node_track_caller+0x184/0x320
 tcp_write_xmit+0x22a/0x1110
 __tcp_push_pending_frames+0x32/0xf0
 do_tcp_sendpages+0x62d/0x640
 tcp_bpf_push+0xae/0x2c0
 tcp_bpf_sendmsg_redir+0x260/0x410
 ? preempt_count_add+0x70/0xa0
 tcp_bpf_send_verdict+0x386/0x4b0
 tcp_bpf_sendmsg+0x21b/0x3b0
 sock_sendmsg+0x58/0x70
 __sys_sendto+0xfa/0x170
 ? xfd_validate_state+0x1d/0x80
 ? switch_fpu_return+0x59/0xe0
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0x37/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50536/">CVE-2022-50536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50536">CVE-2022-50536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251293">SUSE bug 1251293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50540" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50540" ref_url="https://www.suse.com/security/cve/CVE-2022-50540" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: qcom-adm: fix wrong sizeof config in slave_config

Fix broken slave_config function that uncorrectly compare the
peripheral_size with the size of the config pointer instead of the size
of the config struct. This cause the crci value to be ignored and cause
a kernel panic on any slave that use adm driver.

To fix this, compare to the size of the struct and NOT the size of the
pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50540/">CVE-2022-50540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50540">CVE-2022-50540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251289">SUSE bug 1251289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50543" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50543" ref_url="https://www.suse.com/security/cve/CVE-2022-50543" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22801" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix mr-&gt;map double free

rxe_mr_cleanup() which tries to free mr-&gt;map again will be called when
rxe_mr_init_user() fails:

   CPU: 0 PID: 4917 Comm: rdma_flush_serv Kdump: loaded Not tainted 6.1.0-rc1-roce-flush+ #25
   Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
   Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl+0x45/0x5d
    panic+0x19e/0x349
    end_report.part.0+0x54/0x7c
    kasan_report.cold+0xa/0xf
    rxe_mr_cleanup+0x9d/0xf0 [rdma_rxe]
    __rxe_cleanup+0x10a/0x1e0 [rdma_rxe]
    rxe_reg_user_mr+0xb7/0xd0 [rdma_rxe]
    ib_uverbs_reg_mr+0x26a/0x480 [ib_uverbs]
    ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x1a2/0x250 [ib_uverbs]
    ib_uverbs_cmd_verbs+0x1397/0x15a0 [ib_uverbs]

This issue was firstly exposed since commit b18c7da63fcb ("RDMA/rxe: Fix
memory leak in error path code") and then we fixed it in commit
8ff5f5d9d8cf ("RDMA/rxe: Prevent double freeing rxe_map_set()") but this
fix was reverted together at last by commit 1e75550648da (Revert
"RDMA/rxe: Create duplicate mapping tables for FMRs")

Simply let rxe_mr_cleanup() always handle freeing the mr-&gt;map once it is
successfully allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50543/">CVE-2022-50543 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50543">CVE-2022-50543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251284">SUSE bug 1251284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50544" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50544" ref_url="https://www.suse.com/security/cve/CVE-2022-50544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: xhci: Fix potential memory leak in xhci_alloc_stream_info()

xhci_alloc_stream_info() allocates stream context array for stream_info
-&gt;stream_ctx_array with xhci_alloc_stream_ctx(). When some error occurs,
stream_info-&gt;stream_ctx_array is not released, which will lead to a
memory leak.

We can fix it by releasing the stream_info-&gt;stream_ctx_array with
xhci_free_stream_ctx() on the error path to avoid the potential memory
leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50544/">CVE-2022-50544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50544">CVE-2022-50544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251725">SUSE bug 1251725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50546" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50546" ref_url="https://www.suse.com/security/cve/CVE-2022-50546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix uninititialized value in 'ext4_evict_inode'

Syzbot found the following issue:
=====================================================
BUG: KMSAN: uninit-value in ext4_evict_inode+0xdd/0x26b0 fs/ext4/inode.c:180
 ext4_evict_inode+0xdd/0x26b0 fs/ext4/inode.c:180
 evict+0x365/0x9a0 fs/inode.c:664
 iput_final fs/inode.c:1747 [inline]
 iput+0x985/0xdd0 fs/inode.c:1773
 __ext4_new_inode+0xe54/0x7ec0 fs/ext4/ialloc.c:1361
 ext4_mknod+0x376/0x840 fs/ext4/namei.c:2844
 vfs_mknod+0x79d/0x830 fs/namei.c:3914
 do_mknodat+0x47d/0xaa0
 __do_sys_mknodat fs/namei.c:3992 [inline]
 __se_sys_mknodat fs/namei.c:3989 [inline]
 __ia32_sys_mknodat+0xeb/0x150 fs/namei.c:3989
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203
 do_SYSENTER_32+0x1b/0x20 arch/x86/entry/common.c:246
 entry_SYSENTER_compat_after_hwframe+0x70/0x82

Uninit was created at:
 __alloc_pages+0x9f1/0xe80 mm/page_alloc.c:5578
 alloc_pages+0xaae/0xd80 mm/mempolicy.c:2285
 alloc_slab_page mm/slub.c:1794 [inline]
 allocate_slab+0x1b5/0x1010 mm/slub.c:1939
 new_slab mm/slub.c:1992 [inline]
 ___slab_alloc+0x10c3/0x2d60 mm/slub.c:3180
 __slab_alloc mm/slub.c:3279 [inline]
 slab_alloc_node mm/slub.c:3364 [inline]
 slab_alloc mm/slub.c:3406 [inline]
 __kmem_cache_alloc_lru mm/slub.c:3413 [inline]
 kmem_cache_alloc_lru+0x6f3/0xb30 mm/slub.c:3429
 alloc_inode_sb include/linux/fs.h:3117 [inline]
 ext4_alloc_inode+0x5f/0x860 fs/ext4/super.c:1321
 alloc_inode+0x83/0x440 fs/inode.c:259
 new_inode_pseudo fs/inode.c:1018 [inline]
 new_inode+0x3b/0x430 fs/inode.c:1046
 __ext4_new_inode+0x2a7/0x7ec0 fs/ext4/ialloc.c:959
 ext4_mkdir+0x4d5/0x1560 fs/ext4/namei.c:2992
 vfs_mkdir+0x62a/0x870 fs/namei.c:4035
 do_mkdirat+0x466/0x7b0 fs/namei.c:4060
 __do_sys_mkdirat fs/namei.c:4075 [inline]
 __se_sys_mkdirat fs/namei.c:4073 [inline]
 __ia32_sys_mkdirat+0xc4/0x120 fs/namei.c:4073
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203
 do_SYSENTER_32+0x1b/0x20 arch/x86/entry/common.c:246
 entry_SYSENTER_compat_after_hwframe+0x70/0x82

CPU: 1 PID: 4625 Comm: syz-executor.2 Not tainted 6.1.0-rc4-syzkaller-62821-gcb231e2f67ec #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
=====================================================

Now, 'ext4_alloc_inode()' didn't init 'ei-&gt;i_flags'. If new inode failed
before set 'ei-&gt;i_flags' in '__ext4_new_inode()', then do 'iput()'. As after
6bc0d63dad7f commit will access 'ei-&gt;i_flags' in 'ext4_evict_inode()' which
will lead to access uninit-value.
To solve above issue just init 'ei-&gt;i_flags' in 'ext4_alloc_inode()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50546/">CVE-2022-50546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50546">CVE-2022-50546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251723">SUSE bug 1251723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50549" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50549" ref_url="https://www.suse.com/security/cve/CVE-2022-50549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata

Following concurrent processes:

          P1(drop cache)                P2(kworker)
drop_caches_sysctl_handler
 drop_slab
  shrink_slab
   down_read(&amp;shrinker_rwsem)  - LOCK A
   do_shrink_slab
    super_cache_scan
     prune_icache_sb
      dispose_list
       evict
        ext4_evict_inode
	 ext4_clear_inode
	  ext4_discard_preallocations
	   ext4_mb_load_buddy_gfp
	    ext4_mb_init_cache
	     ext4_read_block_bitmap_nowait
	      ext4_read_bh_nowait
	       submit_bh
	        dm_submit_bio
		                 do_worker
				  process_deferred_bios
				   commit
				    metadata_operation_failed
				     dm_pool_abort_metadata
				      down_write(&amp;pmd-&gt;root_lock) - LOCK B
		                      __destroy_persistent_data_objects
				       dm_block_manager_destroy
				        dm_bufio_client_destroy
				         unregister_shrinker
					  down_write(&amp;shrinker_rwsem)
		 thin_map                            |
		  dm_thin_find_block                 v
		   down_read(&amp;pmd-&gt;root_lock) --&gt; ABBA deadlock

, which triggers hung task:

[   76.974820] INFO: task kworker/u4:3:63 blocked for more than 15 seconds.
[   76.976019]       Not tainted 6.1.0-rc4-00011-g8f17dd350364-dirty #910
[   76.978521] task:kworker/u4:3    state:D stack:0     pid:63    ppid:2
[   76.978534] Workqueue: dm-thin do_worker
[   76.978552] Call Trace:
[   76.978564]  __schedule+0x6ba/0x10f0
[   76.978582]  schedule+0x9d/0x1e0
[   76.978588]  rwsem_down_write_slowpath+0x587/0xdf0
[   76.978600]  down_write+0xec/0x110
[   76.978607]  unregister_shrinker+0x2c/0xf0
[   76.978616]  dm_bufio_client_destroy+0x116/0x3d0
[   76.978625]  dm_block_manager_destroy+0x19/0x40
[   76.978629]  __destroy_persistent_data_objects+0x5e/0x70
[   76.978636]  dm_pool_abort_metadata+0x8e/0x100
[   76.978643]  metadata_operation_failed+0x86/0x110
[   76.978649]  commit+0x6a/0x230
[   76.978655]  do_worker+0xc6e/0xd90
[   76.978702]  process_one_work+0x269/0x630
[   76.978714]  worker_thread+0x266/0x630
[   76.978730]  kthread+0x151/0x1b0
[   76.978772] INFO: task test.sh:2646 blocked for more than 15 seconds.
[   76.979756]       Not tainted 6.1.0-rc4-00011-g8f17dd350364-dirty #910
[   76.982111] task:test.sh         state:D stack:0     pid:2646  ppid:2459
[   76.982128] Call Trace:
[   76.982139]  __schedule+0x6ba/0x10f0
[   76.982155]  schedule+0x9d/0x1e0
[   76.982159]  rwsem_down_read_slowpath+0x4f4/0x910
[   76.982173]  down_read+0x84/0x170
[   76.982177]  dm_thin_find_block+0x4c/0xd0
[   76.982183]  thin_map+0x201/0x3d0
[   76.982188]  __map_bio+0x5b/0x350
[   76.982195]  dm_submit_bio+0x2b6/0x930
[   76.982202]  __submit_bio+0x123/0x2d0
[   76.982209]  submit_bio_noacct_nocheck+0x101/0x3e0
[   76.982222]  submit_bio_noacct+0x389/0x770
[   76.982227]  submit_bio+0x50/0xc0
[   76.982232]  submit_bh_wbc+0x15e/0x230
[   76.982238]  submit_bh+0x14/0x20
[   76.982241]  ext4_read_bh_nowait+0xc5/0x130
[   76.982247]  ext4_read_block_bitmap_nowait+0x340/0xc60
[   76.982254]  ext4_mb_init_cache+0x1ce/0xdc0
[   76.982259]  ext4_mb_load_buddy_gfp+0x987/0xfa0
[   76.982263]  ext4_discard_preallocations+0x45d/0x830
[   76.982274]  ext4_clear_inode+0x48/0xf0
[   76.982280]  ext4_evict_inode+0xcf/0xc70
[   76.982285]  evict+0x119/0x2b0
[   76.982290]  dispose_list+0x43/0xa0
[   76.982294]  prune_icache_sb+0x64/0x90
[   76.982298]  super_cache_scan+0x155/0x210
[   76.982303]  do_shrink_slab+0x19e/0x4e0
[   76.982310]  shrink_slab+0x2bd/0x450
[   76.982317]  drop_slab+0xcc/0x1a0
[   76.982323]  drop_caches_sysctl_handler+0xb7/0xe0
[   76.982327]  proc_sys_call_handler+0x1bc/0x300
[   76.982331]  proc_sys_write+0x17/0x20
[   76.982334]  vfs_write+0x3d3/0x570
[   76.982342]  ksys_write+0x73/0x160
[   76.982347]  __x64_sys_write+0x1e/0x30
[   76.982352]  do_syscall_64+0x35/0x80
[   76.982357]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

Funct
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50549/">CVE-2022-50549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50549">CVE-2022-50549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251550">SUSE bug 1251550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50550" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50550" ref_url="https://www.suse.com/security/cve/CVE-2022-50550" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-iolatency: Fix memory leak on add_disk() failures

When a gendisk is successfully initialized but add_disk() fails such as when
a loop device has invalid number of minor device numbers specified,
blkcg_init_disk() is called during init and then blkcg_exit_disk() during
error handling. Unfortunately, iolatency gets initialized in the former but
doesn't get cleaned up in the latter.

This is because, in non-error cases, the cleanup is performed by
del_gendisk() calling rq_qos_exit(), the assumption being that rq_qos
policies, iolatency being one of them, can only be activated once the disk
is fully registered and visible. That assumption is true for wbt and iocost,
but not so for iolatency as it gets initialized before add_disk() is called.

It is desirable to lazy-init rq_qos policies because they are optional
features and add to hot path overhead once initialized - each IO has to walk
all the registered rq_qos policies. So, we want to switch iolatency to lazy
init too. However, that's a bigger change. As a fix for the immediate
problem, let's just add an extra call to rq_qos_exit() in blkcg_exit_disk().
This is safe because duplicate calls to rq_qos_exit() become noop's.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50550/">CVE-2022-50550 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50550">CVE-2022-50550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251727">SUSE bug 1251727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50554</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50554" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50554" ref_url="https://www.suse.com/security/cve/CVE-2022-50554" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: avoid double -&gt;queue_rq() because of early timeout

David Jeffery found one double -&gt;queue_rq() issue, so far it can
be triggered in VM use case because of long vmexit latency or preempt
latency of vCPU pthread or long page fault in vCPU pthread, then block
IO req could be timed out before queuing the request to hardware but after
calling blk_mq_start_request() during -&gt;queue_rq(), then timeout handler
may handle it by requeue, then double -&gt;queue_rq() is caused, and kernel
panic.

So far, it is driver's responsibility to cover the race between timeout
and completion, so it seems supposed to be solved in driver in theory,
given driver has enough knowledge.

But it is really one common problem, lots of driver could have similar
issue, and could be hard to fix all affected drivers, even it isn't easy
for driver to handle the race. So David suggests this patch by draining
in-progress -&gt;queue_rq() for solving this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50554/">CVE-2022-50554 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50554">CVE-2022-50554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251291">SUSE bug 1251291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50555" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50555" ref_url="https://www.suse.com/security/cve/CVE-2022-50555" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix a null-ptr-deref in tipc_topsrv_accept

syzbot found a crash in tipc_topsrv_accept:

  KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
  Workqueue: tipc_rcv tipc_topsrv_accept
  RIP: 0010:kernel_accept+0x22d/0x350 net/socket.c:3487
  Call Trace:
   &lt;TASK&gt;
   tipc_topsrv_accept+0x197/0x280 net/tipc/topsrv.c:460
   process_one_work+0x991/0x1610 kernel/workqueue.c:2289
   worker_thread+0x665/0x1080 kernel/workqueue.c:2436
   kthread+0x2e4/0x3a0 kernel/kthread.c:376
   ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306

It was caused by srv-&gt;listener that might be set to null by
tipc_topsrv_stop() in net .exit whereas it's still used in
tipc_topsrv_accept() worker.

srv-&gt;listener is protected by srv-&gt;idr_lock in tipc_topsrv_stop(), so add
a check for srv-&gt;listener under srv-&gt;idr_lock in tipc_topsrv_accept() to
avoid the null-ptr-deref. To ensure the lsock is not released during the
tipc_topsrv_accept(), move sock_release() after tipc_topsrv_work_stop()
where it's waiting until the tipc_topsrv_accept worker to be done.

Note that sk_callback_lock is used to protect sk-&gt;sk_user_data instead of
srv-&gt;listener, and it should check srv in tipc_topsrv_listener_data_ready()
instead. This also ensures that no more tipc_topsrv_accept worker will be
started after tipc_conn_close() is called in tipc_topsrv_stop() where it
sets sk-&gt;sk_user_data to null.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50555/">CVE-2022-50555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50555">CVE-2022-50555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251740">SUSE bug 1251740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50556" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50556" ref_url="https://www.suse.com/security/cve/CVE-2022-50556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: Fix potential null-ptr-deref due to drmm_mode_config_init()

drmm_mode_config_init() will call drm_mode_create_standard_properties()
and won't check the ret value. When drm_mode_create_standard_properties()
failed due to alloc, property will be a NULL pointer and may causes the
null-ptr-deref. Fix the null-ptr-deref by adding the ret value check.

Found null-ptr-deref while testing insert module bochs:
general protection fault, probably for non-canonical address
    0xdffffc000000000c: 0000 [#1] SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000060-0x0000000000000067]
CPU: 3 PID: 249 Comm: modprobe Not tainted 6.1.0-rc1+ #364
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014
RIP: 0010:drm_object_attach_property+0x73/0x3c0 [drm]
Call Trace:
 &lt;TASK&gt;
 __drm_connector_init+0xb6c/0x1100 [drm]
 bochs_pci_probe.cold.11+0x4cb/0x7fe [bochs]
 pci_device_probe+0x17d/0x340
 really_probe+0x1db/0x5d0
 __driver_probe_device+0x1e7/0x250
 driver_probe_device+0x4a/0x120
 __driver_attach+0xcd/0x2c0
 bus_for_each_dev+0x11a/0x1b0
 bus_add_driver+0x3d7/0x500
 driver_register+0x18e/0x320
 do_one_initcall+0xc4/0x3e0
 do_init_module+0x1b4/0x630
 load_module+0x5dca/0x7230
 __do_sys_finit_module+0x100/0x170
 do_syscall_64+0x3f/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7ff65af9f839
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50556/">CVE-2022-50556 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50556">CVE-2022-50556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252529">SUSE bug 1252529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50558" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50558" ref_url="https://www.suse.com/security/cve/CVE-2022-50558" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap-irq: Use the new num_config_regs property in regmap_add_irq_chip_fwnode

Commit faa87ce9196d ("regmap-irq: Introduce config registers for irq
types") added the num_config_regs, then commit 9edd4f5aee84 ("regmap-irq:
Deprecate type registers and virtual registers") suggested to replace
num_type_reg with it. However, regmap_add_irq_chip_fwnode wasn't modified
to use the new property. Later on, commit 255a03bb1bb3 ("ASoC: wcd9335:
Convert irq chip to config regs") removed the old num_type_reg property
from the WCD9335 driver's struct regmap_irq_chip, causing a null pointer
dereference in regmap_irq_set_type when it tried to index d-&gt;type_buf as
it was never allocated in regmap_add_irq_chip_fwnode:

[   39.199374] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000

[   39.200006] Call trace:
[   39.200014]  regmap_irq_set_type+0x84/0x1c0
[   39.200026]  __irq_set_trigger+0x60/0x1c0
[   39.200040]  __setup_irq+0x2f4/0x78c
[   39.200051]  request_threaded_irq+0xe8/0x1a0

Use num_config_regs in regmap_add_irq_chip_fwnode instead of num_type_reg,
and fall back to it if num_config_regs isn't defined to maintain backward
compatibility.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50558/">CVE-2022-50558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50558">CVE-2022-50558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252482">SUSE bug 1252482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50562" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50562" ref_url="https://www.suse.com/security/cve/CVE-2022-50562" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: acpi: Call acpi_put_table() to fix memory leak

The start and length of the event log area are obtained from
TPM2 or TCPA table, so we call acpi_get_table() to get the
ACPI information, but the acpi_get_table() should be coupled with
acpi_put_table() to release the ACPI memory, add the acpi_put_table()
properly to fix the memory leak.

While we are at it, remove the redundant empty line at the
end of the tpm_read_log_acpi().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50562/">CVE-2022-50562 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50562">CVE-2022-50562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252528">SUSE bug 1252528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50563</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50563" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50563" ref_url="https://www.suse.com/security/cve/CVE-2022-50563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm thin: Fix UAF in run_timer_softirq()

When dm_resume() and dm_destroy() are concurrent, it will
lead to UAF, as follows:

 BUG: KASAN: use-after-free in __run_timers+0x173/0x710
 Write of size 8 at addr ffff88816d9490f0 by task swapper/0/0
&lt;snip&gt;
 Call Trace:
  &lt;IRQ&gt;
  dump_stack_lvl+0x73/0x9f
  print_report.cold+0x132/0xaa2
  _raw_spin_lock_irqsave+0xcd/0x160
  __run_timers+0x173/0x710
  kasan_report+0xad/0x110
  __run_timers+0x173/0x710
  __asan_store8+0x9c/0x140
  __run_timers+0x173/0x710
  call_timer_fn+0x310/0x310
  pvclock_clocksource_read+0xfa/0x250
  kvm_clock_read+0x2c/0x70
  kvm_clock_get_cycles+0xd/0x20
  ktime_get+0x5c/0x110
  lapic_next_event+0x38/0x50
  clockevents_program_event+0xf1/0x1e0
  run_timer_softirq+0x49/0x90
  __do_softirq+0x16e/0x62c
  __irq_exit_rcu+0x1fa/0x270
  irq_exit_rcu+0x12/0x20
  sysvec_apic_timer_interrupt+0x8e/0xc0

One of the concurrency UAF can be shown as below:

        use                                  free
do_resume                           |
  __find_device_hash_cell           |
    dm_get                          |
      atomic_inc(&amp;md-&gt;holders)      |
                                    | dm_destroy
                                    |   __dm_destroy
                                    |     if (!dm_suspended_md(md))
                                    |     atomic_read(&amp;md-&gt;holders)
                                    |     msleep(1)
  dm_resume                         |
    __dm_resume                     |
      dm_table_resume_targets       |
        pool_resume                 |
          do_waker  #add delay work |
  dm_put                            |
    atomic_dec(&amp;md-&gt;holders)        |
                                    |     dm_table_destroy
                                    |       pool_dtr
                                    |         __pool_dec
                                    |           __pool_destroy
                                    |             destroy_workqueue
                                    |             kfree(pool) # free pool
        time out
__do_softirq
  run_timer_softirq # pool has already been freed

This can be easily reproduced using:
  1. create thin-pool
  2. dmsetup suspend pool
  3. dmsetup resume pool
  4. dmsetup remove_all # Concurrent with 3

The root cause of this UAF bug is that dm_resume() adds timer after
dm_destroy() skips cancelling the timer because of suspend status.
After timeout, it will call run_timer_softirq(), however pool has
already been freed. The concurrency UAF bug will happen.

Therefore, cancelling timer again in __pool_destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50563/">CVE-2022-50563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50563">CVE-2022-50563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252480">SUSE bug 1252480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50569" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50569" ref_url="https://www.suse.com/security/cve/CVE-2022-50569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: Update ipcomp_scratches with NULL when freed

Currently if ipcomp_alloc_scratches() fails to allocate memory
ipcomp_scratches holds obsolete address. So when we try to free the
percpu scratches using ipcomp_free_scratches() it tries to vfree non
existent vm area. Described below:

static void * __percpu *ipcomp_alloc_scratches(void)
{
        ...
        scratches = alloc_percpu(void *);
        if (!scratches)
                return NULL;
ipcomp_scratches does not know about this allocation failure.
Therefore holding the old obsolete address.
        ...
}

So when we free,

static void ipcomp_free_scratches(void)
{
        ...
        scratches = ipcomp_scratches;
Assigning obsolete address from ipcomp_scratches

        if (!scratches)
                return;

        for_each_possible_cpu(i)
               vfree(*per_cpu_ptr(scratches, i));
Trying to free non existent page, causing warning: trying to vfree
existent vm area.
        ...
}

Fix this breakage by updating ipcomp_scrtches with NULL when scratches
is freed
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50569/">CVE-2022-50569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50569">CVE-2022-50569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252640">SUSE bug 1252640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50578" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50578" ref_url="https://www.suse.com/security/cve/CVE-2022-50578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

class: fix possible memory leak in __class_register()

If class_add_groups() returns error, the 'cp-&gt;subsys' need be
unregister, and the 'cp' need be freed.

We can not call kset_unregister() here, because the 'cls' will
be freed in callback function class_release() and it's also
freed in caller's error path, it will cause double free.

So fix this by calling kobject_del() and kfree_const(name) to
cleanup kobject. Besides, call kfree() to free the 'cp'.

Fault injection test can trigger this:

unreferenced object 0xffff888102fa8190 (size 8):
  comm "modprobe", pid 502, jiffies 4294906074 (age 49.296s)
  hex dump (first 8 bytes):
    70 6b 74 63 64 76 64 00                          pktcdvd.
  backtrace:
    [&lt;00000000e7c7703d&gt;] __kmalloc_track_caller+0x1ae/0x320
    [&lt;000000005e4d70bc&gt;] kstrdup+0x3a/0x70
    [&lt;00000000c2e5e85a&gt;] kstrdup_const+0x68/0x80
    [&lt;000000000049a8c7&gt;] kvasprintf_const+0x10b/0x190
    [&lt;0000000029123163&gt;] kobject_set_name_vargs+0x56/0x150
    [&lt;00000000747219c9&gt;] kobject_set_name+0xab/0xe0
    [&lt;0000000005f1ea4e&gt;] __class_register+0x15c/0x49a

unreferenced object 0xffff888037274000 (size 1024):
  comm "modprobe", pid 502, jiffies 4294906074 (age 49.296s)
  hex dump (first 32 bytes):
    00 40 27 37 80 88 ff ff 00 40 27 37 80 88 ff ff  .@'7.....@'7....
    00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00  .....N..........
  backtrace:
    [&lt;00000000151f9600&gt;] kmem_cache_alloc_trace+0x17c/0x2f0
    [&lt;00000000ecf3dd95&gt;] __class_register+0x86/0x49a
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50578/">CVE-2022-50578 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50578">CVE-2022-50578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252519">SUSE bug 1252519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50580" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50580" ref_url="https://www.suse.com/security/cve/CVE-2022-50580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-throttle: prevent overflow while calculating wait time

There is a problem found by code review in tg_with_in_bps_limit() that
'bps_limit * jiffy_elapsed_rnd' might overflow. Fix the problem by
calling mul_u64_u64_div_u64() instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50580/">CVE-2022-50580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50580">CVE-2022-50580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252542">SUSE bug 1252542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50582" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50582" ref_url="https://www.suse.com/security/cve/CVE-2022-50582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: Prevent integer underflow

By using a ratio of delay to poll_enabled_time that is not integer
time_remaining underflows and does not exit the loop as expected.
As delay could be derived from DT and poll_enabled_time is defined
in the driver this can easily happen.

Use a signed iterator to make sure that the loop exits once
the remaining time is negative.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50582/">CVE-2022-50582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50582">CVE-2022-50582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252476">SUSE bug 1252476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50583" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50583" ref_url="https://www.suse.com/security/cve/CVE-2022-50583" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid0, raid10: Don't set discard sectors for request queue

It should use disk_stack_limits to get a proper max_discard_sectors
rather than setting a value by stack drivers.

And there is a bug. If all member disks are rotational devices,
raid0/raid10 set max_discard_sectors. So the member devices are
not ssd/nvme, but raid0/raid10 export the wrong value. It reports
warning messages in function __blkdev_issue_discard when mkfs.xfs
like this:

[ 4616.022599] ------------[ cut here ]------------
[ 4616.027779] WARNING: CPU: 4 PID: 99634 at block/blk-lib.c:50 __blkdev_issue_discard+0x16a/0x1a0
[ 4616.140663] RIP: 0010:__blkdev_issue_discard+0x16a/0x1a0
[ 4616.146601] Code: 24 4c 89 20 31 c0 e9 fe fe ff ff c1 e8 09 8d 48 ff 4c 89 f0 4c 09 e8 48 85 c1 0f 84 55 ff ff ff b8 ea ff ff ff e9 df fe ff ff &lt;0f&gt; 0b 48 8d 74 24 08 e8 ea d6 00 00 48 c7 c6 20 1e 89 ab 48 c7 c7
[ 4616.167567] RSP: 0018:ffffaab88cbffca8 EFLAGS: 00010246
[ 4616.173406] RAX: ffff9ba1f9e44678 RBX: 0000000000000000 RCX: ffff9ba1c9792080
[ 4616.181376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff9ba1c9792080
[ 4616.189345] RBP: 0000000000000cc0 R08: ffffaab88cbffd10 R09: 0000000000000000
[ 4616.197317] R10: 0000000000000012 R11: 0000000000000000 R12: 0000000000000000
[ 4616.205288] R13: 0000000000400000 R14: 0000000000000cc0 R15: ffff9ba1c9792080
[ 4616.213259] FS:  00007f9a5534e980(0000) GS:ffff9ba1b7c80000(0000) knlGS:0000000000000000
[ 4616.222298] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4616.228719] CR2: 000055a390a4c518 CR3: 0000000123e40006 CR4: 00000000001706e0
[ 4616.236689] Call Trace:
[ 4616.239428]  blkdev_issue_discard+0x52/0xb0
[ 4616.244108]  blkdev_common_ioctl+0x43c/0xa00
[ 4616.248883]  blkdev_ioctl+0x116/0x280
[ 4616.252977]  __x64_sys_ioctl+0x8a/0xc0
[ 4616.257163]  do_syscall_64+0x5c/0x90
[ 4616.261164]  ? handle_mm_fault+0xc5/0x2a0
[ 4616.265652]  ? do_user_addr_fault+0x1d8/0x690
[ 4616.270527]  ? do_syscall_64+0x69/0x90
[ 4616.274717]  ? exc_page_fault+0x62/0x150
[ 4616.279097]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 4616.284748] RIP: 0033:0x7f9a55398c6b
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-50583/">CVE-2022-50583 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50583">CVE-2022-50583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254806">SUSE bug 1254806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50614" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50614" ref_url="https://www.suse.com/security/cve/CVE-2022-50614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic

The dma_map_single() doesn't permit zero length mapping. It causes a follow
panic.

A panic was reported on arm64:

[   60.137988] ------------[ cut here ]------------
[   60.142630] kernel BUG at kernel/dma/swiotlb.c:624!
[   60.147508] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
[   60.152992] Modules linked in: dw_hdmi_cec crct10dif_ce simple_bridge rcar_fdp1 vsp1 rcar_vin videobuf2_vmalloc rcar_csi2 v4l
2_mem2mem videobuf2_dma_contig videobuf2_memops pci_endpoint_test videobuf2_v4l2 videobuf2_common rcar_fcp v4l2_fwnode v4l2_asyn
c videodev mc gpio_bd9571mwv max9611 pwm_rcar ccree at24 authenc libdes phy_rcar_gen3_usb3 usb_dmac display_connector pwm_bl
[   60.186252] CPU: 0 PID: 508 Comm: pcitest Not tainted 6.0.0-rc1rpci-dev+ #237
[   60.193387] Hardware name: Renesas Salvator-X 2nd version board based on r8a77951 (DT)
[   60.201302] pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   60.208263] pc : swiotlb_tbl_map_single+0x2c0/0x590
[   60.213149] lr : swiotlb_map+0x88/0x1f0
[   60.216982] sp : ffff80000a883bc0
[   60.220292] x29: ffff80000a883bc0 x28: 0000000000000000 x27: 0000000000000000
[   60.227430] x26: 0000000000000000 x25: ffff0004c0da20d0 x24: ffff80000a1f77c0
[   60.234567] x23: 0000000000000002 x22: 0001000040000010 x21: 000000007a000000
[   60.241703] x20: 0000000000200000 x19: 0000000000000000 x18: 0000000000000000
[   60.248840] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0006ff7b9180
[   60.255977] x14: ffff0006ff7b9180 x13: 0000000000000000 x12: 0000000000000000
[   60.263113] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[   60.270249] x8 : 0001000000000010 x7 : ffff0004c6754b20 x6 : 0000000000000000
[   60.277385] x5 : ffff0004c0da2090 x4 : 0000000000000000 x3 : 0000000000000001
[   60.284521] x2 : 0000000040000000 x1 : 0000000000000000 x0 : 0000000040000010
[   60.291658] Call trace:
[   60.294100]  swiotlb_tbl_map_single+0x2c0/0x590
[   60.298629]  swiotlb_map+0x88/0x1f0
[   60.302115]  dma_map_page_attrs+0x188/0x230
[   60.306299]  pci_endpoint_test_ioctl+0x5e4/0xd90 [pci_endpoint_test]
[   60.312660]  __arm64_sys_ioctl+0xa8/0xf0
[   60.316583]  invoke_syscall+0x44/0x108
[   60.320334]  el0_svc_common.constprop.0+0xcc/0xf0
[   60.325038]  do_el0_svc+0x2c/0xb8
[   60.328351]  el0_svc+0x2c/0x88
[   60.331406]  el0t_64_sync_handler+0xb8/0xc0
[   60.335587]  el0t_64_sync+0x18c/0x190
[   60.339251] Code: 52800013 d2e00414 35fff45c d503201f (d4210000)
[   60.345344] ---[ end trace 0000000000000000 ]---

To fix it, this patch adds a checking the payload length if it is zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50614/">CVE-2022-50614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50614">CVE-2022-50614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254578">SUSE bug 1254578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254647">SUSE bug 1254647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50615" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50615" ref_url="https://www.suse.com/security/cve/CVE-2022-50615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()

pci_get_device() will increase the reference count for the returned
pci_dev, so snr_uncore_get_mc_dev() will return a pci_dev with its
reference count increased. We need to call pci_dev_put() to decrease the
reference count. Let's add the missing pci_dev_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50615/">CVE-2022-50615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50615">CVE-2022-50615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254580">SUSE bug 1254580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50616" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50616" ref_url="https://www.suse.com/security/cve/CVE-2022-50616" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: Use different devices for resource allocation and DT lookup

Following by the below discussion, there's the potential UAF issue
between regulator and mfd.
https://lore.kernel.org/all/20221128143601.1698148-1-yangyingliang@huawei.com/

From the analysis of Yingliang

CPU A				|CPU B
mt6370_probe()			|
  devm_mfd_add_devices()	|
				|mt6370_regulator_probe()
				|  regulator_register()
				|    //allocate init_data and add it to devres
				|    regulator_of_get_init_data()
i2c_unregister_device()		|
  device_del()			|
    devres_release_all()	|
      // init_data is freed	|
      release_nodes()		|
				|  // using init_data causes UAF
				|  regulator_register()

It's common to use mfd core to create child device for the regulator.
In order to do the DT lookup for init data, the child that registered
the regulator would pass its parent as the parameter. And this causes
init data resource allocated to its parent, not itself. The issue happen
when parent device is going to release and regulator core is still doing
some operation of init data constraint for the regulator of child device.

To fix it, this patch expand 'regulator_register' API to use the
different devices for init data allocation and DT lookup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50616/">CVE-2022-50616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50616">CVE-2022-50616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254610">SUSE bug 1254610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254646">SUSE bug 1254646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50617" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50617" ref_url="https://www.suse.com/security/cve/CVE-2022-50617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/powerplay/psm: Fix memory leak in power state init

Commit 902bc65de0b3 ("drm/amdgpu/powerplay/psm: return an error in power
state init") made the power state init function return early in case of
failure to get an entry from the powerplay table, but it missed to clean up
the allocated memory for the current power state before returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50617/">CVE-2022-50617 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50617">CVE-2022-50617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254780">SUSE bug 1254780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50619</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50619" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50619" ref_url="https://www.suse.com/security/cve/CVE-2022-50619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr()

If the number of pages from the userptr BO differs from the SG BO then the
allocated memory for the SG table doesn't get freed before returning
-EINVAL, which may lead to a memory leak in some error paths. Fix this by
checking the number of pages before allocating memory for the SG table.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50619/">CVE-2022-50619 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50619">CVE-2022-50619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254789">SUSE bug 1254789</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50622" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50622" ref_url="https://www.suse.com/security/cve/CVE-2022-50622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix potential memory leak in ext4_fc_record_modified_inode()

As krealloc may return NULL, in this case 'state-&gt;fc_modified_inodes'
may not be freed by krealloc, but 'state-&gt;fc_modified_inodes' already
set NULL. Then will lead to 'state-&gt;fc_modified_inodes' memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50622/">CVE-2022-50622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50622">CVE-2022-50622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255467">SUSE bug 1255467</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50626" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50626" ref_url="https://www.suse.com/security/cve/CVE-2022-50626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb: fix memory leak in dvb_usb_adapter_init()

Syzbot reports a memory leak in "dvb_usb_adapter_init()".
The leak is due to not accounting for and freeing current iteration's
adapter-&gt;priv in case of an error. Currently if an error occurs,
it will exit before incrementing "num_adapters_initalized",
which is used as a reference counter to free all adap-&gt;priv
in "dvb_usb_adapter_exit()". There are multiple error paths that
can exit from before incrementing the counter. Including the
error handling paths for "dvb_usb_adapter_stream_init()",
"dvb_usb_adapter_dvb_init()" and "dvb_usb_adapter_frontend_init()"
within "dvb_usb_adapter_init()".

This means that in case of an error in any of these functions the
current iteration is not accounted for and the current iteration's
adap-&gt;priv is not freed.

Fix this by freeing the current iteration's adap-&gt;priv in the
"stream_init_err:" label in the error path. The rest of the
(accounted for) adap-&gt;priv objects are freed in dvb_usb_adapter_exit()
as expected using the num_adapters_initalized variable.

Syzbot report:

BUG: memory leak
unreferenced object 0xffff8881172f1a00 (size 512):
  comm "kworker/0:2", pid 139, jiffies 4294994873 (age 10.960s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
backtrace:
    [&lt;ffffffff844af012&gt;] dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:75 [inline]
    [&lt;ffffffff844af012&gt;] dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:184 [inline]
    [&lt;ffffffff844af012&gt;] dvb_usb_device_init.cold+0x4e5/0x79e drivers/media/usb/dvb-usb/dvb-usb-init.c:308
    [&lt;ffffffff830db21d&gt;] dib0700_probe+0x8d/0x1b0 drivers/media/usb/dvb-usb/dib0700_core.c:883
    [&lt;ffffffff82d3fdc7&gt;] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396
    [&lt;ffffffff8274ab37&gt;] call_driver_probe drivers/base/dd.c:542 [inline]
    [&lt;ffffffff8274ab37&gt;] really_probe.part.0+0xe7/0x310 drivers/base/dd.c:621
    [&lt;ffffffff8274ae6c&gt;] really_probe drivers/base/dd.c:583 [inline]
    [&lt;ffffffff8274ae6c&gt;] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:752
    [&lt;ffffffff8274af6a&gt;] driver_probe_device+0x2a/0x120 drivers/base/dd.c:782
    [&lt;ffffffff8274b786&gt;] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:899
    [&lt;ffffffff82747c87&gt;] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:427
    [&lt;ffffffff8274b352&gt;] __device_attach+0x122/0x260 drivers/base/dd.c:970
    [&lt;ffffffff827498f6&gt;] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:487
    [&lt;ffffffff82745cdb&gt;] device_add+0x5fb/0xdf0 drivers/base/core.c:3405
    [&lt;ffffffff82d3d202&gt;] usb_set_configuration+0x8f2/0xb80 drivers/usb/core/message.c:2170
    [&lt;ffffffff82d4dbfc&gt;] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238
    [&lt;ffffffff82d3f49c&gt;] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293
    [&lt;ffffffff8274ab37&gt;] call_driver_probe drivers/base/dd.c:542 [inline]
    [&lt;ffffffff8274ab37&gt;] really_probe.part.0+0xe7/0x310 drivers/base/dd.c:621
    [&lt;ffffffff8274ae6c&gt;] really_probe drivers/base/dd.c:583 [inline]
    [&lt;ffffffff8274ae6c&gt;] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:752
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50626/">CVE-2022-50626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50626">CVE-2022-50626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254562">SUSE bug 1254562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50627</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50627" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50627" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50627" ref_url="https://www.suse.com/security/cve/CVE-2022-50627" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix monitor mode bringup crash

When the interface is brought up in monitor mode, it leads
to NULL pointer dereference crash. This crash happens when
the packet type is extracted for a SKB. This extraction
which is present in the received msdu delivery path,is
not needed for the monitor ring packets since they are
all RAW packets. Hence appending the flags with
"RX_FLAG_ONLY_MONITOR" to skip that extraction.

Observed calltrace:

Unable to handle kernel NULL pointer dereference at virtual address
0000000000000064
Mem abort info:
  ESR = 0x0000000096000004
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x04: level 0 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000004
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=0000000048517000
[0000000000000064] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
Modules linked in: ath11k_pci ath11k qmi_helpers
CPU: 2 PID: 1781 Comm: napi/-271 Not tainted
6.1.0-rc5-wt-ath-656295-gef907406320c-dirty #6
Hardware name: Qualcomm Technologies, Inc. IPQ8074/AP-HK10-C2 (DT)
pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : ath11k_hw_qcn9074_rx_desc_get_decap_type+0x34/0x60 [ath11k]
lr : ath11k_hw_qcn9074_rx_desc_get_decap_type+0x5c/0x60 [ath11k]
sp : ffff80000ef5bb10
x29: ffff80000ef5bb10 x28: 0000000000000000 x27: ffff000007baafa0
x26: ffff000014a91ed0 x25: 0000000000000000 x24: 0000000000000000
x23: ffff800002b77378 x22: ffff000014a91ec0 x21: ffff000006c8d600
x20: 0000000000000000 x19: ffff800002b77740 x18: 0000000000000006
x17: 736564203634343a x16: 656e694c20657079 x15: 0000000000000143
x14: 00000000ffffffea x13: ffff80000ef5b8b8 x12: ffff80000ef5b8c8
x11: ffff80000a591d30 x10: ffff80000a579d40 x9 : c0000000ffffefff
x8 : 0000000000000003 x7 : 0000000000017fe8 x6 : ffff80000a579ce8
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 3a35ec12ed7f8900 x1 : 0000000000000000 x0 : 0000000000000052
Call trace:
 ath11k_hw_qcn9074_rx_desc_get_decap_type+0x34/0x60 [ath11k]
 ath11k_dp_rx_deliver_msdu.isra.42+0xa4/0x3d0 [ath11k]
 ath11k_dp_rx_mon_deliver.isra.43+0x2f8/0x458 [ath11k]
 ath11k_dp_rx_process_mon_rings+0x310/0x4c0 [ath11k]
 ath11k_dp_service_srng+0x234/0x338 [ath11k]
 ath11k_pcic_ext_grp_napi_poll+0x30/0xb8 [ath11k]
 __napi_poll+0x5c/0x190
 napi_threaded_poll+0xf0/0x118
 kthread+0xf4/0x110
 ret_from_fork+0x10/0x20

Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50627/">CVE-2022-50627 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50627">CVE-2022-50627 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254643">SUSE bug 1254643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254998">SUSE bug 1254998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50628" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50628" ref_url="https://www.suse.com/security/cve/CVE-2022-50628" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gud: Fix UBSAN warning

UBSAN complains about invalid value for bool:

[  101.165172] [drm] Initialized gud 1.0.0 20200422 for 2-3.2:1.0 on minor 1
[  101.213360] gud 2-3.2:1.0: [drm] fb1: guddrmfb frame buffer device
[  101.213426] usbcore: registered new interface driver gud
[  101.989431] ================================================================================
[  101.989441] UBSAN: invalid-load in linux/include/linux/iosys-map.h:253:9
[  101.989447] load of value 121 is not a valid value for type '_Bool'
[  101.989451] CPU: 1 PID: 455 Comm: kworker/1:6 Not tainted 5.18.0-rc5-gud-5.18-rc5 #3
[  101.989456] Hardware name: Hewlett-Packard HP EliteBook 820 G1/1991, BIOS L71 Ver. 01.44 04/12/2018
[  101.989459] Workqueue: events_long gud_flush_work [gud]
[  101.989471] Call Trace:
[  101.989474]  &lt;TASK&gt;
[  101.989479]  dump_stack_lvl+0x49/0x5f
[  101.989488]  dump_stack+0x10/0x12
[  101.989493]  ubsan_epilogue+0x9/0x3b
[  101.989498]  __ubsan_handle_load_invalid_value.cold+0x44/0x49
[  101.989504]  dma_buf_vmap.cold+0x38/0x3d
[  101.989511]  ? find_busiest_group+0x48/0x300
[  101.989520]  drm_gem_shmem_vmap+0x76/0x1b0 [drm_shmem_helper]
[  101.989528]  drm_gem_shmem_object_vmap+0x9/0xb [drm_shmem_helper]
[  101.989535]  drm_gem_vmap+0x26/0x60 [drm]
[  101.989594]  drm_gem_fb_vmap+0x47/0x150 [drm_kms_helper]
[  101.989630]  gud_prep_flush+0xc1/0x710 [gud]
[  101.989639]  ? _raw_spin_lock+0x17/0x40
[  101.989648]  gud_flush_work+0x1e0/0x430 [gud]
[  101.989653]  ? __switch_to+0x11d/0x470
[  101.989664]  process_one_work+0x21f/0x3f0
[  101.989673]  worker_thread+0x200/0x3e0
[  101.989679]  ? rescuer_thread+0x390/0x390
[  101.989684]  kthread+0xfd/0x130
[  101.989690]  ? kthread_complete_and_exit+0x20/0x20
[  101.989696]  ret_from_fork+0x22/0x30
[  101.989706]  &lt;/TASK&gt;
[  101.989708] ================================================================================

The source of this warning is in iosys_map_clear() called from
dma_buf_vmap(). It conditionally sets values based on map-&gt;is_iomem. The
iosys_map variables are allocated uninitialized on the stack leading to
-&gt;is_iomem having all kinds of values and not only 0/1.

Fix this by zeroing the iosys_map variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50628/">CVE-2022-50628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50628">CVE-2022-50628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254799">SUSE bug 1254799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50630" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50630" ref_url="https://www.suse.com/security/cve/CVE-2022-50630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: hugetlb: fix UAF in hugetlb_handle_userfault

The vma_lock and hugetlb_fault_mutex are dropped before handling userfault
and reacquire them again after handle_userfault(), but reacquire the
vma_lock could lead to UAF[1,2] due to the following race,

hugetlb_fault
  hugetlb_no_page
    /*unlock vma_lock */
    hugetlb_handle_userfault
      handle_userfault
        /* unlock mm-&gt;mmap_lock*/
                                           vm_mmap_pgoff
                                             do_mmap
                                               mmap_region
                                                 munmap_vma_range
                                                   /* clean old vma */
        /* lock vma_lock again  &lt;--- UAF */
    /* unlock vma_lock */

Since the vma_lock will unlock immediately after
hugetlb_handle_userfault(), let's drop the unneeded lock and unlock in
hugetlb_handle_userfault() to fix the issue.

[1] https://lore.kernel.org/linux-mm/000000000000d5e00a05e834962e@google.com/
[2] https://lore.kernel.org/linux-mm/20220921014457.1668-1-liuzixian4@huawei.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50630/">CVE-2022-50630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50630">CVE-2022-50630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254785">SUSE bug 1254785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50632" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50632" ref_url="https://www.suse.com/security/cve/CVE-2022-50632" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: perf: marvell_cn10k: Fix hotplug callback leak in tad_pmu_init()

tad_pmu_init() won't remove the callback added by cpuhp_setup_state_multi()
when platform_driver_register() failed. Remove the callback by
cpuhp_remove_multi_state() in fail path.

Similar to the handling of arm_ccn_init() in commit 26242b330093 ("bus:
arm-ccn: Prevent hotplug callback leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50632/">CVE-2022-50632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50632">CVE-2022-50632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254747">SUSE bug 1254747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50633" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50633" ref_url="https://www.suse.com/security/cve/CVE-2022-50633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init

of_icc_get() alloc resources for path handle, we should release it when not
need anymore. Like the release in dwc3_qcom_interconnect_exit() function.
Add icc_put() in error handling to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50633/">CVE-2022-50633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50633">CVE-2022-50633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254644">SUSE bug 1254644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50635" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50635" ref_url="https://www.suse.com/security/cve/CVE-2022-50635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe()

I found a null pointer reference in arch_prepare_kprobe():

  # echo 'p cmdline_proc_show' &gt; kprobe_events
  # echo 'p cmdline_proc_show+16' &gt;&gt; kprobe_events
  Kernel attempted to read user page (0) - exploit attempt? (uid: 0)
  BUG: Kernel NULL pointer dereference on read at 0x00000000
  Faulting instruction address: 0xc000000000050bfc
  Oops: Kernel access of bad area, sig: 11 [#1]
  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV
  Modules linked in:
  CPU: 0 PID: 122 Comm: sh Not tainted 6.0.0-rc3-00007-gdcf8e5633e2e #10
  NIP:  c000000000050bfc LR: c000000000050bec CTR: 0000000000005bdc
  REGS: c0000000348475b0 TRAP: 0300   Not tainted  (6.0.0-rc3-00007-gdcf8e5633e2e)
  MSR:  9000000000009033 &lt;SF,HV,EE,ME,IR,DR,RI,LE&gt;  CR: 88002444  XER: 20040006
  CFAR: c00000000022d100 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 0
  ...
  NIP arch_prepare_kprobe+0x10c/0x2d0
  LR  arch_prepare_kprobe+0xfc/0x2d0
  Call Trace:
    0xc0000000012f77a0 (unreliable)
    register_kprobe+0x3c0/0x7a0
    __register_trace_kprobe+0x140/0x1a0
    __trace_kprobe_create+0x794/0x1040
    trace_probe_create+0xc4/0xe0
    create_or_delete_trace_kprobe+0x2c/0x80
    trace_parse_run_command+0xf0/0x210
    probes_write+0x20/0x40
    vfs_write+0xfc/0x450
    ksys_write+0x84/0x140
    system_call_exception+0x17c/0x3a0
    system_call_vectored_common+0xe8/0x278
  --- interrupt: 3000 at 0x7fffa5682de0
  NIP:  00007fffa5682de0 LR: 0000000000000000 CTR: 0000000000000000
  REGS: c000000034847e80 TRAP: 3000   Not tainted  (6.0.0-rc3-00007-gdcf8e5633e2e)
  MSR:  900000000280f033 &lt;SF,HV,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE&gt;  CR: 44002408  XER: 00000000

The address being probed has some special:

  cmdline_proc_show: Probe based on ftrace
  cmdline_proc_show+16: Probe for the next instruction at the ftrace location

The ftrace-based kprobe does not generate kprobe::ainsn::insn, it gets
set to NULL. In arch_prepare_kprobe() it will check for:

  ...
  prev = get_kprobe(p-&gt;addr - 1);
  preempt_enable_no_resched();
  if (prev &amp;&amp; ppc_inst_prefixed(ppc_inst_read(prev-&gt;ainsn.insn))) {
  ...

If prev is based on ftrace, 'ppc_inst_read(prev-&gt;ainsn.insn)' will occur
with a null pointer reference. At this point prev-&gt;addr will not be a
prefixed instruction, so the check can be skipped.

Check if prev is ftrace-based kprobe before reading 'prev-&gt;ainsn.insn'
to fix this problem.

[mpe: Trim oops]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50635/">CVE-2022-50635 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50635">CVE-2022-50635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254592">SUSE bug 1254592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50636" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50636" ref_url="https://www.suse.com/security/cve/CVE-2022-50636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix pci_device_is_present() for VFs by checking PF

pci_device_is_present() previously didn't work for VFs because it reads the
Vendor and Device ID, which are 0xffff for VFs, which looks like they
aren't present.  Check the PF instead.

Wei Gong reported that if virtio I/O is in progress when the driver is
unbound or "0" is written to /sys/.../sriov_numvfs, the virtio I/O
operation hangs, which may result in output like this:

  task:bash state:D stack:    0 pid: 1773 ppid:  1241 flags:0x00004002
  Call Trace:
   schedule+0x4f/0xc0
   blk_mq_freeze_queue_wait+0x69/0xa0
   blk_mq_freeze_queue+0x1b/0x20
   blk_cleanup_queue+0x3d/0xd0
   virtblk_remove+0x3c/0xb0 [virtio_blk]
   virtio_dev_remove+0x4b/0x80
   ...
   device_unregister+0x1b/0x60
   unregister_virtio_device+0x18/0x30
   virtio_pci_remove+0x41/0x80
   pci_device_remove+0x3e/0xb0

This happened because pci_device_is_present(VF) returned "false" in
virtio_pci_remove(), so it called virtio_break_device().  The broken vq
meant that vring_interrupt() skipped the vq.callback() that would have
completed the virtio I/O operation via virtblk_done().

[bhelgaas: commit log, simplify to always use pci_physfn(), add stable tag]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50636/">CVE-2022-50636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50636">CVE-2022-50636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254645">SUSE bug 1254645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50637</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50637" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50637" ref_url="https://www.suse.com/security/cve/CVE-2022-50637" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: qcom-hw: Fix memory leak in qcom_cpufreq_hw_read_lut()

If "cpu_dev" fails to get opp table in qcom_cpufreq_hw_read_lut(),
the program will return, resulting in "table" resource is not released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50637/">CVE-2022-50637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50637">CVE-2022-50637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254682">SUSE bug 1254682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50638" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50638" ref_url="https://www.suse.com/security/cve/CVE-2022-50638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug_on in __es_tree_search caused by bad boot loader inode

We got a issue as fllows:
==================================================================
 kernel BUG at fs/ext4/extents_status.c:203!
 invalid opcode: 0000 [#1] PREEMPT SMP
 CPU: 1 PID: 945 Comm: cat Not tainted 6.0.0-next-20221007-dirty #349
 RIP: 0010:ext4_es_end.isra.0+0x34/0x42
 RSP: 0018:ffffc9000143b768 EFLAGS: 00010203
 RAX: 0000000000000000 RBX: ffff8881769cd0b8 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: ffffffff8fc27cf7 RDI: 00000000ffffffff
 RBP: ffff8881769cd0bc R08: 0000000000000000 R09: ffffc9000143b5f8
 R10: 0000000000000001 R11: 0000000000000001 R12: ffff8881769cd0a0
 R13: ffff8881768e5668 R14: 00000000768e52f0 R15: 0000000000000000
 FS: 00007f359f7f05c0(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f359f5a2000 CR3: 000000017130c000 CR4: 00000000000006e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  __es_tree_search.isra.0+0x6d/0xf5
  ext4_es_cache_extent+0xfa/0x230
  ext4_cache_extents+0xd2/0x110
  ext4_find_extent+0x5d5/0x8c0
  ext4_ext_map_blocks+0x9c/0x1d30
  ext4_map_blocks+0x431/0xa50
  ext4_mpage_readpages+0x48e/0xe40
  ext4_readahead+0x47/0x50
  read_pages+0x82/0x530
  page_cache_ra_unbounded+0x199/0x2a0
  do_page_cache_ra+0x47/0x70
  page_cache_ra_order+0x242/0x400
  ondemand_readahead+0x1e8/0x4b0
  page_cache_sync_ra+0xf4/0x110
  filemap_get_pages+0x131/0xb20
  filemap_read+0xda/0x4b0
  generic_file_read_iter+0x13a/0x250
  ext4_file_read_iter+0x59/0x1d0
  vfs_read+0x28f/0x460
  ksys_read+0x73/0x160
  __x64_sys_read+0x1e/0x30
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
==================================================================

In the above issue, ioctl invokes the swap_inode_boot_loader function to
swap inode&lt;5&gt; and inode&lt;12&gt;. However, inode&lt;5&gt; contain incorrect imode and
disordered extents, and i_nlink is set to 1. The extents check for inode in
the ext4_iget function can be bypassed bacause 5 is EXT4_BOOT_LOADER_INO.
While links_count is set to 1, the extents are not initialized in
swap_inode_boot_loader. After the ioctl command is executed successfully,
the extents are swapped to inode&lt;12&gt;, in this case, run the `cat` command
to view inode&lt;12&gt;. And Bug_ON is triggered due to the incorrect extents.

When the boot loader inode is not initialized, its imode can be one of the
following:
1) the imode is a bad type, which is marked as bad_inode in ext4_iget and
   set to S_IFREG.
2) the imode is good type but not S_IFREG.
3) the imode is S_IFREG.

The BUG_ON may be triggered by bypassing the check in cases 1 and 2.
Therefore, when the boot loader inode is bad_inode or its imode is not
S_IFREG, initialize the inode to avoid triggering the BUG.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50638/">CVE-2022-50638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50638">CVE-2022-50638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255469">SUSE bug 1255469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50639</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50639" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50639" ref_url="https://www.suse.com/security/cve/CVE-2022-50639" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io-wq: Fix memory leak in worker creation

If the CPU mask allocation for a node fails, then the memory allocated for
the 'io_wqe' struct of the current node doesn't get freed on the error
handling path, since it has not yet been added to the 'wqes' array.

This was spotted when fuzzing v6.1-rc1 with Syzkaller:
BUG: memory leak
unreferenced object 0xffff8880093d5000 (size 1024):
  comm "syz-executor.2", pid 7701, jiffies 4295048595 (age 13.900s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000cb463369&gt;] __kmem_cache_alloc_node+0x18e/0x720
    [&lt;00000000147a3f9c&gt;] kmalloc_node_trace+0x2a/0x130
    [&lt;000000004e107011&gt;] io_wq_create+0x7b9/0xdc0
    [&lt;00000000c38b2018&gt;] io_uring_alloc_task_context+0x31e/0x59d
    [&lt;00000000867399da&gt;] __io_uring_add_tctx_node.cold+0x19/0x1ba
    [&lt;000000007e0e7a79&gt;] io_uring_setup.cold+0x1b80/0x1dce
    [&lt;00000000b545e9f6&gt;] __x64_sys_io_uring_setup+0x5d/0x80
    [&lt;000000008a8a7508&gt;] do_syscall_64+0x5d/0x90
    [&lt;000000004ac08bec&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50639/">CVE-2022-50639 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50639">CVE-2022-50639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254675">SUSE bug 1254675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50642" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50642" ref_url="https://www.suse.com/security/cve/CVE-2022-50642" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/chrome: cros_ec_typec: zero out stale pointers

`cros_typec_get_switch_handles` allocates four pointers when obtaining
type-c switch handles. These pointers are all freed if failing to obtain
any of them; therefore, pointers in `port` become stale. The stale
pointers eventually cause use-after-free or double free in later code
paths. Zeroing out all pointer fields after freeing to eliminate these
stale pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50642/">CVE-2022-50642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50642">CVE-2022-50642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254622">SUSE bug 1254622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254630">SUSE bug 1254630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50643" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50643" ref_url="https://www.suse.com/security/cve/CVE-2022-50643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix xid leak in cifs_copy_file_range()

If the file is used by swap, before return -EOPNOTSUPP, should
free the xid, otherwise, the xid will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50643/">CVE-2022-50643 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50643">CVE-2022-50643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254631">SUSE bug 1254631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50645" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50645" ref_url="https://www.suse.com/security/cve/CVE-2022-50645" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()

As the comment of pci_get_domain_bus_and_slot() says, it returns
a PCI device with refcount incremented, so it doesn't need to
call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI
device needs to be put in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50645/">CVE-2022-50645 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50645">CVE-2022-50645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254633">SUSE bug 1254633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50650" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50650" ref_url="https://www.suse.com/security/cve/CVE-2022-50650" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix reference state management for synchronous callbacks

Currently, verifier verifies callback functions (sync and async) as if
they will be executed once, (i.e. it explores execution state as if the
function was being called once). The next insn to explore is set to
start of subprog and the exit from nested frame is handled using
curframe &gt; 0 and prepare_func_exit. In case of async callback it uses a
customized variant of push_stack simulating a kind of branch to set up
custom state and execution context for the async callback.

While this approach is simple and works when callback really will be
executed only once, it is unsafe for all of our current helpers which
are for_each style, i.e. they execute the callback multiple times.

A callback releasing acquired references of the caller may do so
multiple times, but currently verifier sees it as one call inside the
frame, which then returns to caller. Hence, it thinks it released some
reference that the cb e.g. got access through callback_ctx (register
filled inside cb from spilled typed register on stack).

Similarly, it may see that an acquire call is unpaired inside the
callback, so the caller will copy the reference state of callback and
then will have to release the register with new ref_obj_ids. But again,
the callback may execute multiple times, but the verifier will only
account for acquired references for a single symbolic execution of the
callback, which will cause leaks.

Note that for async callback case, things are different. While currently
we have bpf_timer_set_callback which only executes it once, even for
multiple executions it would be safe, as reference state is NULL and
check_reference_leak would force program to release state before
BPF_EXIT. The state is also unaffected by analysis for the caller frame.
Hence async callback is safe.

Since we want the reference state to be accessible, e.g. for pointers
loaded from stack through callback_ctx's PTR_TO_STACK, we still have to
copy caller's reference_state to callback's bpf_func_state, but we
enforce that whatever references it adds to that reference_state has
been released before it hits BPF_EXIT. This requires introducing a new
callback_ref member in the reference state to distinguish between caller
vs callee references. Hence, check_reference_leak now errors out if it
sees we are in callback_fn and we have not released callback_ref refs.
Since there can be multiple nested callbacks, like frame 0 -&gt; cb1 -&gt; cb2
etc. we need to also distinguish between whether this particular ref
belongs to this callback frame or parent, and only error for our own, so
we store state-&gt;frameno (which is always non-zero for callbacks).

In short, callbacks can read parent reference_state, but cannot mutate
it, to be able to use pointers acquired by the caller. They must only
undo their changes (by releasing their own acquired_refs before
BPF_EXIT) on top of caller reference_state before returning (at which
point the caller and callback state will match anyway, so no need to
copy it back to caller).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50650/">CVE-2022-50650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50650">CVE-2022-50650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254638">SUSE bug 1254638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50658" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50658" ref_url="https://www.suse.com/security/cve/CVE-2022-50658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: qcom: fix memory leak in error path

If for some reason the speedbin length is incorrect, then there is a
memory leak in the error path because we never free the speedbin buffer.
This commit fixes the error path to always free the speedbin buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50658/">CVE-2022-50658 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50658">CVE-2022-50658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254756">SUSE bug 1254756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50661" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50661" ref_url="https://www.suse.com/security/cve/CVE-2022-50661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

seccomp: Move copy_seccomp() to no failure path.

Our syzbot instance reported memory leaks in do_seccomp() [0], similar
to the report [1].  It shows that we miss freeing struct seccomp_filter
and some objects included in it.

We can reproduce the issue with the program below [2] which calls one
seccomp() and two clone() syscalls.

The first clone()d child exits earlier than its parent and sends a
signal to kill it during the second clone(), more precisely before the
fatal_signal_pending() test in copy_process().  When the parent receives
the signal, it has to destroy the embryonic process and return -EINTR to
user space.  In the failure path, we have to call seccomp_filter_release()
to decrement the filter's refcount.

Initially, we called it in free_task() called from the failure path, but
the commit 3a15fb6ed92c ("seccomp: release filter after task is fully
dead") moved it to release_task() to notify user space as early as possible
that the filter is no longer used.

To keep the change and current seccomp refcount semantics, let's move
copy_seccomp() just after the signal check and add a WARN_ON_ONCE() in
free_task() for future debugging.

[0]:
unreferenced object 0xffff8880063add00 (size 256):
  comm "repro_seccomp", pid 230, jiffies 4294687090 (age 9.914s)
  hex dump (first 32 bytes):
    01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00  ................
    ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff  ................
  backtrace:
    do_seccomp (./include/linux/slab.h:600 ./include/linux/slab.h:733 kernel/seccomp.c:666 kernel/seccomp.c:708 kernel/seccomp.c:1871 kernel/seccomp.c:1991)
    do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
    entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
unreferenced object 0xffffc90000035000 (size 4096):
  comm "repro_seccomp", pid 230, jiffies 4294687090 (age 9.915s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 05 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    __vmalloc_node_range (mm/vmalloc.c:3226)
    __vmalloc_node (mm/vmalloc.c:3261 (discriminator 4))
    bpf_prog_alloc_no_stats (kernel/bpf/core.c:91)
    bpf_prog_alloc (kernel/bpf/core.c:129)
    bpf_prog_create_from_user (net/core/filter.c:1414)
    do_seccomp (kernel/seccomp.c:671 kernel/seccomp.c:708 kernel/seccomp.c:1871 kernel/seccomp.c:1991)
    do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
    entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
unreferenced object 0xffff888003fa1000 (size 1024):
  comm "repro_seccomp", pid 230, jiffies 4294687090 (age 9.915s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    bpf_prog_alloc_no_stats (./include/linux/slab.h:600 ./include/linux/slab.h:733 kernel/bpf/core.c:95)
    bpf_prog_alloc (kernel/bpf/core.c:129)
    bpf_prog_create_from_user (net/core/filter.c:1414)
    do_seccomp (kernel/seccomp.c:671 kernel/seccomp.c:708 kernel/seccomp.c:1871 kernel/seccomp.c:1991)
    do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
    entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
unreferenced object 0xffff888006360240 (size 16):
  comm "repro_seccomp", pid 230, jiffies 4294687090 (age 9.915s)
  hex dump (first 16 bytes):
    01 00 37 00 76 65 72 6c e0 83 01 06 80 88 ff ff  ..7.verl........
  backtrace:
    bpf_prog_store_orig_filter (net/core/filter.c:1137)
    bpf_prog_create_from_user (net/core/filter.c:1428)
    do_seccomp (kernel/seccomp.c:671 kernel/seccomp.c:708 kernel/seccomp.c:1871 kernel/seccomp.c:1991)
    do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
    entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
unreferenced object 0xffff888
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50661/">CVE-2022-50661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50661">CVE-2022-50661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254759">SUSE bug 1254759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50667</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50667" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50667" ref_url="https://www.suse.com/security/cve/CVE-2022-50667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()

If the copy of the description string from userspace fails, then the page
for the instance descriptor doesn't get freed before returning -EFAULT,
which leads to a memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50667/">CVE-2022-50667 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50667">CVE-2022-50667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254684">SUSE bug 1254684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50668" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50668" ref_url="https://www.suse.com/security/cve/CVE-2022-50668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix deadlock due to mbcache entry corruption

When manipulating xattr blocks, we can deadlock infinitely looping
inside ext4_xattr_block_set() where we constantly keep finding xattr
block for reuse in mbcache but we are unable to reuse it because its
reference count is too big. This happens because cache entry for the
xattr block is marked as reusable (e_reusable set) although its
reference count is too big. When this inconsistency happens, this
inconsistent state is kept indefinitely and so ext4_xattr_block_set()
keeps retrying indefinitely.

The inconsistent state is caused by non-atomic update of e_reusable bit.
e_reusable is part of a bitfield and e_reusable update can race with
update of e_referenced bit in the same bitfield resulting in loss of one
of the updates. Fix the problem by using atomic bitops instead.

This bug has been around for many years, but it became *much* easier
to hit after commit 65f8b80053a1 ("ext4: fix race when reusing xattr
blocks").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50668/">CVE-2022-50668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50668">CVE-2022-50668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254763">SUSE bug 1254763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50671" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50671" ref_url="https://www.suse.com/security/cve/CVE-2022-50671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix "kernel NULL pointer dereference" error

When rxe_queue_init in the function rxe_qp_init_req fails,
both qp-&gt;req.task.func and qp-&gt;req.task.arg are not initialized.

Because of creation of qp fails, the function rxe_create_qp will
call rxe_qp_do_cleanup to handle allocated resource.

Before calling __rxe_do_task, both qp-&gt;req.task.func and
qp-&gt;req.task.arg should be checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50671/">CVE-2022-50671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50671">CVE-2022-50671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254711">SUSE bug 1254711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50673" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50673" ref_url="https://www.suse.com/security/cve/CVE-2022-50673" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix use-after-free in ext4_orphan_cleanup

I caught a issue as follows:
==================================================================
 BUG: KASAN: use-after-free in __list_add_valid+0x28/0x1a0
 Read of size 8 at addr ffff88814b13f378 by task mount/710

 CPU: 1 PID: 710 Comm: mount Not tainted 6.1.0-rc3-next #370
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x73/0x9f
  print_report+0x25d/0x759
  kasan_report+0xc0/0x120
  __asan_load8+0x99/0x140
  __list_add_valid+0x28/0x1a0
  ext4_orphan_cleanup+0x564/0x9d0 [ext4]
  __ext4_fill_super+0x48e2/0x5300 [ext4]
  ext4_fill_super+0x19f/0x3a0 [ext4]
  get_tree_bdev+0x27b/0x450
  ext4_get_tree+0x19/0x30 [ext4]
  vfs_get_tree+0x49/0x150
  path_mount+0xaae/0x1350
  do_mount+0xe2/0x110
  __x64_sys_mount+0xf0/0x190
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
 [...]
==================================================================

Above issue may happen as follows:
-------------------------------------
ext4_fill_super
  ext4_orphan_cleanup
   --- loop1: assume last_orphan is 12 ---
    list_add(&amp;EXT4_I(inode)-&gt;i_orphan, &amp;EXT4_SB(sb)-&gt;s_orphan)
    ext4_truncate --&gt; return 0
      ext4_inode_attach_jinode --&gt; return -ENOMEM
    iput(inode) --&gt; free inode&lt;12&gt;
   --- loop2: last_orphan is still 12 ---
    list_add(&amp;EXT4_I(inode)-&gt;i_orphan, &amp;EXT4_SB(sb)-&gt;s_orphan);
    // use inode&lt;12&gt; and trigger UAF

To solve this issue, we need to propagate the return value of
ext4_inode_attach_jinode() appropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50673/">CVE-2022-50673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50673">CVE-2022-50673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255521">SUSE bug 1255521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255522">SUSE bug 1255522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50675" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50675" ref_url="https://www.suse.com/security/cve/CVE-2022-50675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored

Prior to commit 69e3b846d8a7 ("arm64: mte: Sync tags for pages where PTE
is untagged"), mte_sync_tags() was only called for pte_tagged() entries
(those mapped with PROT_MTE). Therefore mte_sync_tags() could safely use
test_and_set_bit(PG_mte_tagged, &amp;page-&gt;flags) without inadvertently
setting PG_mte_tagged on an untagged page.

The above commit was required as guests may enable MTE without any
control at the stage 2 mapping, nor a PROT_MTE mapping in the VMM.
However, the side-effect was that any page with a PTE that looked like
swap (or migration) was getting PG_mte_tagged set automatically. A
subsequent page copy (e.g. migration) copied the tags to the destination
page even if the tags were owned by KASAN.

This issue was masked by the page_kasan_tag_reset() call introduced in
commit e5b8d9218951 ("arm64: mte: reset the page tag in page-&gt;flags").
When this commit was reverted (20794545c146), KASAN started reporting
access faults because the overriding tags in a page did not match the
original page-&gt;flags (with CONFIG_KASAN_HW_TAGS=y):

  BUG: KASAN: invalid-access in copy_page+0x10/0xd0 arch/arm64/lib/copy_page.S:26
  Read at addr f5ff000017f2e000 by task syz-executor.1/2218
  Pointer tag: [f5], memory tag: [f2]

Move the PG_mte_tagged bit setting from mte_sync_tags() to the actual
place where tags are cleared (mte_sync_page_tags()) or restored
(mte_restore_tags()).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50675/">CVE-2022-50675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50675">CVE-2022-50675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254664">SUSE bug 1254664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50677</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50677" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50677" ref_url="https://www.suse.com/security/cve/CVE-2022-50677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: fix use after free in _ipmi_destroy_user()

The intf_free() function frees the "intf" pointer so we cannot
dereference it again on the next line.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50677/">CVE-2022-50677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50677">CVE-2022-50677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254692">SUSE bug 1254692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50678</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50678" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50678" ref_url="https://www.suse.com/security/cve/CVE-2022-50678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix invalid address access when enabling SCAN log level

The variable i is changed when setting random MAC address and causes
invalid address access when printing the value of pi-&gt;reqs[i]-&gt;reqid.

We replace reqs index with ri to fix the issue.

[  136.726473] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000
[  136.737365] Mem abort info:
[  136.740172]   ESR = 0x96000004
[  136.743359]   Exception class = DABT (current EL), IL = 32 bits
[  136.749294]   SET = 0, FnV = 0
[  136.752481]   EA = 0, S1PTW = 0
[  136.755635] Data abort info:
[  136.758514]   ISV = 0, ISS = 0x00000004
[  136.762487]   CM = 0, WnR = 0
[  136.765522] user pgtable: 4k pages, 48-bit VAs, pgdp = 000000005c4e2577
[  136.772265] [0000000000000000] pgd=0000000000000000
[  136.777160] Internal error: Oops: 96000004 [#1] PREEMPT SMP
[  136.782732] Modules linked in: brcmfmac(O) brcmutil(O) cfg80211(O) compat(O)
[  136.789788] Process wificond (pid: 3175, stack limit = 0x00000000053048fb)
[  136.796664] CPU: 3 PID: 3175 Comm: wificond Tainted: G           O      4.19.42-00001-g531a5f5 #1
[  136.805532] Hardware name: Freescale i.MX8MQ EVK (DT)
[  136.810584] pstate: 60400005 (nZCv daif +PAN -UAO)
[  136.815429] pc : brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]
[  136.821811] lr : brcmf_pno_config_sched_scans+0x67c/0xa80 [brcmfmac]
[  136.828162] sp : ffff00000e9a3880
[  136.831475] x29: ffff00000e9a3890 x28: ffff800020543400
[  136.836786] x27: ffff8000b1008880 x26: ffff0000012bf6a0
[  136.842098] x25: ffff80002054345c x24: ffff800088d22400
[  136.847409] x23: ffff0000012bf638 x22: ffff0000012bf6d8
[  136.852721] x21: ffff8000aced8fc0 x20: ffff8000ac164400
[  136.858032] x19: ffff00000e9a3946 x18: 0000000000000000
[  136.863343] x17: 0000000000000000 x16: 0000000000000000
[  136.868655] x15: ffff0000093f3b37 x14: 0000000000000050
[  136.873966] x13: 0000000000003135 x12: 0000000000000000
[  136.879277] x11: 0000000000000000 x10: ffff000009a61888
[  136.884589] x9 : 000000000000000f x8 : 0000000000000008
[  136.889900] x7 : 303a32303d726464 x6 : ffff00000a1f957d
[  136.895211] x5 : 0000000000000000 x4 : ffff00000e9a3942
[  136.900523] x3 : 0000000000000000 x2 : ffff0000012cead8
[  136.905834] x1 : ffff0000012bf6d8 x0 : 0000000000000000
[  136.911146] Call trace:
[  136.913623]  brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]
[  136.919658]  brcmf_pno_start_sched_scan+0xa4/0x118 [brcmfmac]
[  136.925430]  brcmf_cfg80211_sched_scan_start+0x80/0xe0 [brcmfmac]
[  136.931636]  nl80211_start_sched_scan+0x140/0x308 [cfg80211]
[  136.937298]  genl_rcv_msg+0x358/0x3f4
[  136.940960]  netlink_rcv_skb+0xb4/0x118
[  136.944795]  genl_rcv+0x34/0x48
[  136.947935]  netlink_unicast+0x264/0x300
[  136.951856]  netlink_sendmsg+0x2e4/0x33c
[  136.955781]  __sys_sendto+0x120/0x19c
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50678/">CVE-2022-50678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50678">CVE-2022-50678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254902">SUSE bug 1254902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50679" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50679" ref_url="https://www.suse.com/security/cve/CVE-2022-50679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix DMA mappings leak

During reallocation of RX buffers, new DMA mappings are created for
those buffers.

steps for reproduction:
while :
do
for ((i=0; i&lt;=8160; i=i+32))
do
ethtool -G enp130s0f0 rx $i tx $i
sleep 0.5
ethtool -g enp130s0f0
done
done

This resulted in crash:
i40e 0000:01:00.1: Unable to allocate memory for the Rx descriptor ring, size=65536
Driver BUG
WARNING: CPU: 0 PID: 4300 at net/core/xdp.c:141 xdp_rxq_info_unreg+0x43/0x50
Call Trace:
i40e_free_rx_resources+0x70/0x80 [i40e]
i40e_set_ringparam+0x27c/0x800 [i40e]
ethnl_set_rings+0x1b2/0x290
genl_family_rcv_msg_doit.isra.15+0x10f/0x150
genl_family_rcv_msg+0xb3/0x160
? rings_fill_reply+0x1a0/0x1a0
genl_rcv_msg+0x47/0x90
? genl_family_rcv_msg+0x160/0x160
netlink_rcv_skb+0x4c/0x120
genl_rcv+0x24/0x40
netlink_unicast+0x196/0x230
netlink_sendmsg+0x204/0x3d0
sock_sendmsg+0x4c/0x50
__sys_sendto+0xee/0x160
? handle_mm_fault+0xbe/0x1e0
? syscall_trace_enter+0x1d3/0x2c0
__x64_sys_sendto+0x24/0x30
do_syscall_64+0x5b/0x1a0
entry_SYSCALL_64_after_hwframe+0x65/0xca
RIP: 0033:0x7f5eac8b035b
Missing register, driver bug
WARNING: CPU: 0 PID: 4300 at net/core/xdp.c:119 xdp_rxq_info_unreg_mem_model+0x69/0x140
Call Trace:
xdp_rxq_info_unreg+0x1e/0x50
i40e_free_rx_resources+0x70/0x80 [i40e]
i40e_set_ringparam+0x27c/0x800 [i40e]
ethnl_set_rings+0x1b2/0x290
genl_family_rcv_msg_doit.isra.15+0x10f/0x150
genl_family_rcv_msg+0xb3/0x160
? rings_fill_reply+0x1a0/0x1a0
genl_rcv_msg+0x47/0x90
? genl_family_rcv_msg+0x160/0x160
netlink_rcv_skb+0x4c/0x120
genl_rcv+0x24/0x40
netlink_unicast+0x196/0x230
netlink_sendmsg+0x204/0x3d0
sock_sendmsg+0x4c/0x50
__sys_sendto+0xee/0x160
? handle_mm_fault+0xbe/0x1e0
? syscall_trace_enter+0x1d3/0x2c0
__x64_sys_sendto+0x24/0x30
do_syscall_64+0x5b/0x1a0
entry_SYSCALL_64_after_hwframe+0x65/0xca
RIP: 0033:0x7f5eac8b035b

This was caused because of new buffers with different RX ring count should
substitute older ones, but those buffers were freed in
i40e_configure_rx_ring and reallocated again with i40e_alloc_rx_bi,
thus kfree on rx_bi caused leak of already mapped DMA.

Fix this by reallocating ZC with rx_bi_zc struct when BPF program loads. Additionally
reallocate back to rx_bi when BPF program unloads.

If BPF program is loaded/unloaded and XSK pools are created, reallocate
RX queues accordingly in XSP_SETUP_XSK_POOL handler.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50679/">CVE-2022-50679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50679">CVE-2022-50679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254656">SUSE bug 1254656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50698" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50698" ref_url="https://www.suse.com/security/cve/CVE-2022-50698" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: da7219: Fix an error handling path in da7219_register_dai_clks()

If clk_hw_register() fails, the corresponding clk should not be
unregistered.

To handle errors from loops, clean up partial iterations before doing the
goto.  So add a clk_hw_unregister().
Then use a while (--i &gt;= 0) loop in the unwind section.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50698/">CVE-2022-50698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50698">CVE-2022-50698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255608">SUSE bug 1255608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50699" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50699" ref_url="https://www.suse.com/security/cve/CVE-2022-50699" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: enable use of both GFP_KERNEL and GFP_ATOMIC in convert_context()

The following warning was triggered on a hardware environment:

  SELinux: Converting 162 SID table entries...
  BUG: sleeping function called from invalid context at
       __might_sleep+0x60/0x74 0x0
  in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 5943, name: tar
  CPU: 7 PID: 5943 Comm: tar Tainted: P O 5.10.0 #1
  Call trace:
   dump_backtrace+0x0/0x1c8
   show_stack+0x18/0x28
   dump_stack+0xe8/0x15c
   ___might_sleep+0x168/0x17c
   __might_sleep+0x60/0x74
   __kmalloc_track_caller+0xa0/0x7dc
   kstrdup+0x54/0xac
   convert_context+0x48/0x2e4
   sidtab_context_to_sid+0x1c4/0x36c
   security_context_to_sid_core+0x168/0x238
   security_context_to_sid_default+0x14/0x24
   inode_doinit_use_xattr+0x164/0x1e4
   inode_doinit_with_dentry+0x1c0/0x488
   selinux_d_instantiate+0x20/0x34
   security_d_instantiate+0x70/0xbc
   d_splice_alias+0x4c/0x3c0
   ext4_lookup+0x1d8/0x200 [ext4]
   __lookup_slow+0x12c/0x1e4
   walk_component+0x100/0x200
   path_lookupat+0x88/0x118
   filename_lookup+0x98/0x130
   user_path_at_empty+0x48/0x60
   vfs_statx+0x84/0x140
   vfs_fstatat+0x20/0x30
   __se_sys_newfstatat+0x30/0x74
   __arm64_sys_newfstatat+0x1c/0x2c
   el0_svc_common.constprop.0+0x100/0x184
   do_el0_svc+0x1c/0x2c
   el0_svc+0x20/0x34
   el0_sync_handler+0x80/0x17c
   el0_sync+0x13c/0x140
  SELinux: Context system_u:object_r:pssp_rsyslog_log_t:s0:c0 is
           not valid (left unmapped).

It was found that within a critical section of spin_lock_irqsave in
sidtab_context_to_sid(), convert_context() (hooked by
sidtab_convert_params.func) might cause the process to sleep via
allocating memory with GFP_KERNEL, which is problematic.

As Ondrej pointed out [1], convert_context()/sidtab_convert_params.func
has another caller sidtab_convert_tree(), which is okay with GFP_KERNEL.
Therefore, fix this problem by adding a gfp_t argument for
convert_context()/sidtab_convert_params.func and pass GFP_KERNEL/_ATOMIC
properly in individual callers.

[PM: wrap long BUG() output lines, tweak subject line]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50699/">CVE-2022-50699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50699">CVE-2022-50699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255582">SUSE bug 1255582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50700" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50700" ref_url="https://www.suse.com/security/cve/CVE-2022-50700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: Delay the unmapping of the buffer

On WCN3990, we are seeing a rare scenario where copy engine hardware is
sending a copy complete interrupt to the host driver while still
processing the buffer that the driver has sent, this is leading into an
SMMU fault triggering kernel panic. This is happening on copy engine
channel 3 (CE3) where the driver normally enqueues WMI commands to the
firmware. Upon receiving a copy complete interrupt, host driver will
immediately unmap and frees the buffer presuming that hardware has
processed the buffer. In the issue case, upon receiving copy complete
interrupt, host driver will unmap and free the buffer but since hardware
is still accessing the buffer (which in this case got unmapped in
parallel), SMMU hardware will trigger an SMMU fault resulting in a
kernel panic.

In order to avoid this, as a work around, add a delay before unmapping
the copy engine source DMA buffer. This is conditionally done for
WCN3990 and only for the CE3 channel where issue is seen.

Below is the crash signature:

wifi smmu error: kernel: [ 10.120965] arm-smmu 15000000.iommu: Unhandled
context fault: fsr=0x402, iova=0x7fdfd8ac0,
fsynr=0x500003,cbfrsynra=0xc1, cb=6 arm-smmu 15000000.iommu: Unhandled
context fault:fsr=0x402, iova=0x7fe06fdc0, fsynr=0x710003,
cbfrsynra=0xc1, cb=6 qcom-q6v5-mss 4080000.remoteproc: fatal error
received: err_qdi.c:1040:EF:wlan_process:0x1:WLAN RT:0x2091:
cmnos_thread.c:3998:Asserted in copy_engine.c:AXI_ERROR_DETECTED:2149
remoteproc remoteproc0: crash detected in
4080000.remoteproc: type fatal error &lt;3&gt; remoteproc remoteproc0:
handling crash #1 in 4080000.remoteproc

pc : __arm_lpae_unmap+0x500/0x514
lr : __arm_lpae_unmap+0x4bc/0x514
sp : ffffffc011ffb530
x29: ffffffc011ffb590 x28: 0000000000000000
x27: 0000000000000000 x26: 0000000000000004
x25: 0000000000000003 x24: ffffffc011ffb890
x23: ffffffa762ef9be0 x22: ffffffa77244ef00
x21: 0000000000000009 x20: 00000007fff7c000
x19: 0000000000000003 x18: 0000000000000000
x17: 0000000000000004 x16: ffffffd7a357d9f0
x15: 0000000000000000 x14: 00fd5d4fa7ffffff
x13: 000000000000000e x12: 0000000000000000
x11: 00000000ffffffff x10: 00000000fffffe00
x9 : 000000000000017c x8 : 000000000000000c
x7 : 0000000000000000 x6 : ffffffa762ef9000
x5 : 0000000000000003 x4 : 0000000000000004
x3 : 0000000000001000 x2 : 00000007fff7c000
x1 : ffffffc011ffb890 x0 : 0000000000000000 Call trace:
__arm_lpae_unmap+0x500/0x514
__arm_lpae_unmap+0x4bc/0x514
__arm_lpae_unmap+0x4bc/0x514
arm_lpae_unmap_pages+0x78/0xa4
arm_smmu_unmap_pages+0x78/0x104
__iommu_unmap+0xc8/0x1e4
iommu_unmap_fast+0x38/0x48
__iommu_dma_unmap+0x84/0x104
iommu_dma_free+0x34/0x50
dma_free_attrs+0xa4/0xd0
ath10k_htt_rx_free+0xc4/0xf4 [ath10k_core] ath10k_core_stop+0x64/0x7c
[ath10k_core]
ath10k_halt+0x11c/0x180 [ath10k_core]
ath10k_stop+0x54/0x94 [ath10k_core]
drv_stop+0x48/0x1c8 [mac80211]
ieee80211_do_open+0x638/0x77c [mac80211] ieee80211_open+0x48/0x5c
[mac80211]
__dev_open+0xb4/0x174
__dev_change_flags+0xc4/0x1dc
dev_change_flags+0x3c/0x7c
devinet_ioctl+0x2b4/0x580
inet_ioctl+0xb0/0x1b4
sock_do_ioctl+0x4c/0x16c
compat_ifreq_ioctl+0x1cc/0x35c
compat_sock_ioctl+0x110/0x2ac
__arm64_compat_sys_ioctl+0xf4/0x3e0
el0_svc_common+0xb4/0x17c
el0_svc_compat_handler+0x2c/0x58
el0_svc_compat+0x8/0x2c

Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50700/">CVE-2022-50700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50700">CVE-2022-50700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255576">SUSE bug 1255576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255577">SUSE bug 1255577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50701</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50701" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50701" ref_url="https://www.suse.com/security/cve/CVE-2022-50701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921s: fix slab-out-of-bounds access in sdio host

SDIO may need addtional 511 bytes to align bus operation. If the tailroom
of this skb is not big enough, we would access invalid memory region.
For low level operation, increase skb size to keep valid memory access in
SDIO host.

Error message:
[69.951] BUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0xe9/0x1a0
[69.951] Read of size 64 at addr ffff88811c9cf000 by task kworker/u16:7/451
[69.951] CPU: 4 PID: 451 Comm: kworker/u16:7 Tainted: G W  OE  6.1.0-rc5 #1
[69.951] Workqueue: kvub300c vub300_cmndwork_thread [vub300]
[69.951] Call Trace:
[69.951]  &lt;TASK&gt;
[69.952]  dump_stack_lvl+0x49/0x63
[69.952]  print_report+0x171/0x4a8
[69.952]  kasan_report+0xb4/0x130
[69.952]  kasan_check_range+0x149/0x1e0
[69.952]  memcpy+0x24/0x70
[69.952]  sg_copy_buffer+0xe9/0x1a0
[69.952]  sg_copy_to_buffer+0x12/0x20
[69.952]  __command_write_data.isra.0+0x23c/0xbf0 [vub300]
[69.952]  vub300_cmndwork_thread+0x17f3/0x58b0 [vub300]
[69.952]  process_one_work+0x7ee/0x1320
[69.952]  worker_thread+0x53c/0x1240
[69.952]  kthread+0x2b8/0x370
[69.952]  ret_from_fork+0x1f/0x30
[69.952]  &lt;/TASK&gt;

[69.952] Allocated by task 854:
[69.952]  kasan_save_stack+0x26/0x50
[69.952]  kasan_set_track+0x25/0x30
[69.952]  kasan_save_alloc_info+0x1b/0x30
[69.952]  __kasan_kmalloc+0x87/0xa0
[69.952]  __kmalloc_node_track_caller+0x63/0x150
[69.952]  kmalloc_reserve+0x31/0xd0
[69.952]  __alloc_skb+0xfc/0x2b0
[69.952]  __mt76_mcu_msg_alloc+0xbf/0x230 [mt76]
[69.952]  mt76_mcu_send_and_get_msg+0xab/0x110 [mt76]
[69.952]  __mt76_mcu_send_firmware.cold+0x94/0x15d [mt76]
[69.952]  mt76_connac_mcu_send_ram_firmware+0x415/0x54d [mt76_connac_lib]
[69.952]  mt76_connac2_load_ram.cold+0x118/0x4bc [mt76_connac_lib]
[69.952]  mt7921_run_firmware.cold+0x2e9/0x405 [mt7921_common]
[69.952]  mt7921s_mcu_init+0x45/0x80 [mt7921s]
[69.953]  mt7921_init_work+0xe1/0x2a0 [mt7921_common]
[69.953]  process_one_work+0x7ee/0x1320
[69.953]  worker_thread+0x53c/0x1240
[69.953]  kthread+0x2b8/0x370
[69.953]  ret_from_fork+0x1f/0x30
[69.953] The buggy address belongs to the object at ffff88811c9ce800
             which belongs to the cache kmalloc-2k of size 2048
[69.953] The buggy address is located 0 bytes to the right of
             2048-byte region [ffff88811c9ce800, ffff88811c9cf000)

[69.953] Memory state around the buggy address:
[69.953]  ffff88811c9cef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[69.953]  ffff88811c9cef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[69.953] &gt;ffff88811c9cf000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[69.953]                    ^
[69.953]  ffff88811c9cf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[69.953]  ffff88811c9cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50701/">CVE-2022-50701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50701">CVE-2022-50701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255635">SUSE bug 1255635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50702" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50702" ref_url="https://www.suse.com/security/cve/CVE-2022-50702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init()

Inject fault while probing module, if device_register() fails in
vdpasim_net_init() or vdpasim_blk_init(), but the refcount of kobject is
not decreased to 0, the name allocated in dev_set_name() is leaked.
Fix this by calling put_device(), so that name can be freed in
callback function kobject_cleanup().

(vdpa_sim_net)
unreferenced object 0xffff88807eebc370 (size 16):
  comm "modprobe", pid 3848, jiffies 4362982860 (age 18.153s)
  hex dump (first 16 bytes):
    76 64 70 61 73 69 6d 5f 6e 65 74 00 6b 6b 6b a5  vdpasim_net.kkk.
  backtrace:
    [&lt;ffffffff8174f19e&gt;] __kmalloc_node_track_caller+0x4e/0x150
    [&lt;ffffffff81731d53&gt;] kstrdup+0x33/0x60
    [&lt;ffffffff83a5d421&gt;] kobject_set_name_vargs+0x41/0x110
    [&lt;ffffffff82d87aab&gt;] dev_set_name+0xab/0xe0
    [&lt;ffffffff82d91a23&gt;] device_add+0xe3/0x1a80
    [&lt;ffffffffa0270013&gt;] 0xffffffffa0270013
    [&lt;ffffffff81001c27&gt;] do_one_initcall+0x87/0x2e0
    [&lt;ffffffff813739cb&gt;] do_init_module+0x1ab/0x640
    [&lt;ffffffff81379d20&gt;] load_module+0x5d00/0x77f0
    [&lt;ffffffff8137bc40&gt;] __do_sys_finit_module+0x110/0x1b0
    [&lt;ffffffff83c4d505&gt;] do_syscall_64+0x35/0x80
    [&lt;ffffffff83e0006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0

(vdpa_sim_blk)
unreferenced object 0xffff8881070c1250 (size 16):
  comm "modprobe", pid 6844, jiffies 4364069319 (age 17.572s)
  hex dump (first 16 bytes):
    76 64 70 61 73 69 6d 5f 62 6c 6b 00 6b 6b 6b a5  vdpasim_blk.kkk.
  backtrace:
    [&lt;ffffffff8174f19e&gt;] __kmalloc_node_track_caller+0x4e/0x150
    [&lt;ffffffff81731d53&gt;] kstrdup+0x33/0x60
    [&lt;ffffffff83a5d421&gt;] kobject_set_name_vargs+0x41/0x110
    [&lt;ffffffff82d87aab&gt;] dev_set_name+0xab/0xe0
    [&lt;ffffffff82d91a23&gt;] device_add+0xe3/0x1a80
    [&lt;ffffffffa0220013&gt;] 0xffffffffa0220013
    [&lt;ffffffff81001c27&gt;] do_one_initcall+0x87/0x2e0
    [&lt;ffffffff813739cb&gt;] do_init_module+0x1ab/0x640
    [&lt;ffffffff81379d20&gt;] load_module+0x5d00/0x77f0
    [&lt;ffffffff8137bc40&gt;] __do_sys_finit_module+0x110/0x1b0
    [&lt;ffffffff83c4d505&gt;] do_syscall_64+0x35/0x80
    [&lt;ffffffff83e0006a&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50702/">CVE-2022-50702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50702">CVE-2022-50702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255624">SUSE bug 1255624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50703" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50703" ref_url="https://www.suse.com/security/cve/CVE-2022-50703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()

There are two refcount leak bugs in qcom_smsm_probe():

(1) The 'local_node' is escaped out from for_each_child_of_node() as
the break of iteration, we should call of_node_put() for it in error
path or when it is not used anymore.
(2) The 'node' is escaped out from for_each_available_child_of_node()
as the 'goto', we should call of_node_put() for it in goto target.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50703/">CVE-2022-50703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50703">CVE-2022-50703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255607">SUSE bug 1255607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50704" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50704" ref_url="https://www.suse.com/security/cve/CVE-2022-50704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: gadget: Fix use-after-free during usb config switch

In the process of switching USB config from rndis to other config,
if the hardware does not support the -&gt;pullup callback, or the
hardware encounters a low probability fault, both of them may cause
the -&gt;pullup callback to fail, which will then cause a system panic
(use after free).

The gadget drivers sometimes need to be unloaded regardless of the
hardware's behavior.

Analysis as follows:
=======================================================================
(1) write /config/usb_gadget/g1/UDC "none"

gether_disconnect+0x2c/0x1f8
rndis_disable+0x4c/0x74
composite_disconnect+0x74/0xb0
configfs_composite_disconnect+0x60/0x7c
usb_gadget_disconnect+0x70/0x124
usb_gadget_unregister_driver+0xc8/0x1d8
gadget_dev_desc_UDC_store+0xec/0x1e4

(2) rm /config/usb_gadget/g1/configs/b.1/f1

rndis_deregister+0x28/0x54
rndis_free+0x44/0x7c
usb_put_function+0x14/0x1c
config_usb_cfg_unlink+0xc4/0xe0
configfs_unlink+0x124/0x1c8
vfs_unlink+0x114/0x1dc

(3) rmdir /config/usb_gadget/g1/functions/rndis.gs4

panic+0x1fc/0x3d0
do_page_fault+0xa8/0x46c
do_mem_abort+0x3c/0xac
el1_sync_handler+0x40/0x78
0xffffff801138f880
rndis_close+0x28/0x34
eth_stop+0x74/0x110
dev_close_many+0x48/0x194
rollback_registered_many+0x118/0x814
unregister_netdev+0x20/0x30
gether_cleanup+0x1c/0x38
rndis_attr_release+0xc/0x14
kref_put+0x74/0xb8
configfs_rmdir+0x314/0x374

If gadget-&gt;ops-&gt;pullup() return an error, function rndis_close() will be
called, then it will causes a use-after-free problem.
=======================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50704/">CVE-2022-50704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50704">CVE-2022-50704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255623">SUSE bug 1255623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50705" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50705" ref_url="https://www.suse.com/security/cve/CVE-2022-50705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/rw: defer fsnotify calls to task context

We can't call these off the kiocb completion as that might be off
soft/hard irq context. Defer the calls to when we process the
task_work for this request. That avoids valid complaints like:

stack backtrace:
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.0.0-rc6-syzkaller-00321-g105a36f3694e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022
Call Trace:
 &lt;IRQ&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
 print_usage_bug kernel/locking/lockdep.c:3961 [inline]
 valid_state kernel/locking/lockdep.c:3973 [inline]
 mark_lock_irq kernel/locking/lockdep.c:4176 [inline]
 mark_lock.part.0.cold+0x18/0xd8 kernel/locking/lockdep.c:4632
 mark_lock kernel/locking/lockdep.c:4596 [inline]
 mark_usage kernel/locking/lockdep.c:4527 [inline]
 __lock_acquire+0x11d9/0x56d0 kernel/locking/lockdep.c:5007
 lock_acquire kernel/locking/lockdep.c:5666 [inline]
 lock_acquire+0x1ab/0x570 kernel/locking/lockdep.c:5631
 __fs_reclaim_acquire mm/page_alloc.c:4674 [inline]
 fs_reclaim_acquire+0x115/0x160 mm/page_alloc.c:4688
 might_alloc include/linux/sched/mm.h:271 [inline]
 slab_pre_alloc_hook mm/slab.h:700 [inline]
 slab_alloc mm/slab.c:3278 [inline]
 __kmem_cache_alloc_lru mm/slab.c:3471 [inline]
 kmem_cache_alloc+0x39/0x520 mm/slab.c:3491
 fanotify_alloc_fid_event fs/notify/fanotify/fanotify.c:580 [inline]
 fanotify_alloc_event fs/notify/fanotify/fanotify.c:813 [inline]
 fanotify_handle_event+0x1130/0x3f40 fs/notify/fanotify/fanotify.c:948
 send_to_group fs/notify/fsnotify.c:360 [inline]
 fsnotify+0xafb/0x1680 fs/notify/fsnotify.c:570
 __fsnotify_parent+0x62f/0xa60 fs/notify/fsnotify.c:230
 fsnotify_parent include/linux/fsnotify.h:77 [inline]
 fsnotify_file include/linux/fsnotify.h:99 [inline]
 fsnotify_access include/linux/fsnotify.h:309 [inline]
 __io_complete_rw_common+0x485/0x720 io_uring/rw.c:195
 io_complete_rw+0x1a/0x1f0 io_uring/rw.c:228
 iomap_dio_complete_work fs/iomap/direct-io.c:144 [inline]
 iomap_dio_bio_end_io+0x438/0x5e0 fs/iomap/direct-io.c:178
 bio_endio+0x5f9/0x780 block/bio.c:1564
 req_bio_endio block/blk-mq.c:695 [inline]
 blk_update_request+0x3fc/0x1300 block/blk-mq.c:825
 scsi_end_request+0x7a/0x9a0 drivers/scsi/scsi_lib.c:541
 scsi_io_completion+0x173/0x1f70 drivers/scsi/scsi_lib.c:971
 scsi_complete+0x122/0x3b0 drivers/scsi/scsi_lib.c:1438
 blk_complete_reqs+0xad/0xe0 block/blk-mq.c:1022
 __do_softirq+0x1d3/0x9c6 kernel/softirq.c:571
 invoke_softirq kernel/softirq.c:445 [inline]
 __irq_exit_rcu+0x123/0x180 kernel/softirq.c:650
 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662
 common_interrupt+0xa9/0xc0 arch/x86/kernel/irq.c:240
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50705/">CVE-2022-50705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50705">CVE-2022-50705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255596">SUSE bug 1255596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50710" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50710" ref_url="https://www.suse.com/security/cve/CVE-2022-50710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: set tx_tstamps when creating new Tx rings via ethtool

When the user changes the number of queues via ethtool, the driver
allocates new rings. This allocation did not initialize tx_tstamps. This
results in the tx_tstamps field being zero (due to kcalloc allocation), and
would result in a NULL pointer dereference when attempting a transmit
timestamp on the new ring.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50710/">CVE-2022-50710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50710">CVE-2022-50710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255561">SUSE bug 1255561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50712" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50712" ref_url="https://www.suse.com/security/cve/CVE-2022-50712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: hold region lock when flushing snapshots

Netdevsim triggers a splat on reload, when it destroys regions
with snapshots pending:

  WARNING: CPU: 1 PID: 787 at net/core/devlink.c:6291 devlink_region_snapshot_del+0x12e/0x140
  CPU: 1 PID: 787 Comm: devlink Not tainted 6.1.0-07460-g7ae9888d6e1c #580
  RIP: 0010:devlink_region_snapshot_del+0x12e/0x140
  Call Trace:
   &lt;TASK&gt;
   devl_region_destroy+0x70/0x140
   nsim_dev_reload_down+0x2f/0x60 [netdevsim]
   devlink_reload+0x1f7/0x360
   devlink_nl_cmd_reload+0x6ce/0x860
   genl_family_rcv_msg_doit.isra.0+0x145/0x1c0

This is the locking assert in devlink_region_snapshot_del(),
we're supposed to be holding the region-&gt;snapshot_lock here.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50712/">CVE-2022-50712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50712">CVE-2022-50712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255745">SUSE bug 1255745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50714" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50714" ref_url="https://www.suse.com/security/cve/CVE-2022-50714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921e: fix rmmod crash in driver reload test

In insmod/rmmod stress test, the following crash dump shows up immediately.
The problem is caused by missing mt76_dev in mt7921_pci_remove(). We
should make sure the drvdata is ready before probe() finished.

[168.862789] ==================================================================
[168.862797] BUG: KASAN: user-memory-access in try_to_grab_pending+0x59/0x480
[168.862805] Write of size 8 at addr 0000000000006df0 by task rmmod/5361
[168.862812] CPU: 7 PID: 5361 Comm: rmmod Tainted: G           OE     5.19.0-rc6 #1
[168.862816] Hardware name: Intel(R) Client Systems NUC8i7BEH/NUC8BEB, 05/04/2020
[168.862820] Call Trace:
[168.862822]  &lt;TASK&gt;
[168.862825]  dump_stack_lvl+0x49/0x63
[168.862832]  print_report.cold+0x493/0x6b7
[168.862845]  kasan_report+0xa7/0x120
[168.862857]  kasan_check_range+0x163/0x200
[168.862861]  __kasan_check_write+0x14/0x20
[168.862866]  try_to_grab_pending+0x59/0x480
[168.862870]  __cancel_work_timer+0xbb/0x340
[168.862898]  cancel_work_sync+0x10/0x20
[168.862902]  mt7921_pci_remove+0x61/0x1c0 [mt7921e]
[168.862909]  pci_device_remove+0xa3/0x1d0
[168.862914]  device_remove+0xc4/0x170
[168.862920]  device_release_driver_internal+0x163/0x300
[168.862925]  driver_detach+0xc7/0x1a0
[168.862930]  bus_remove_driver+0xeb/0x2d0
[168.862935]  driver_unregister+0x71/0xb0
[168.862939]  pci_unregister_driver+0x30/0x230
[168.862944]  mt7921_pci_driver_exit+0x10/0x1b [mt7921e]
[168.862949]  __x64_sys_delete_module+0x2f9/0x4b0
[168.862968]  do_syscall_64+0x38/0x90
[168.862973]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

Test steps:
1. insmode
2. do not ifup
3. rmmod quickly (within 1 second)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50714/">CVE-2022-50714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50714">CVE-2022-50714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255747">SUSE bug 1255747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255748">SUSE bug 1255748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50715" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50715" ref_url="https://www.suse.com/security/cve/CVE-2022-50715" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid1: stop mdx_raid1 thread when raid1 array run failed

fail run raid1 array when we assemble array with the inactive disk only,
but the mdx_raid1 thread were not stop, Even if the associated resources
have been released. it will caused a NULL dereference when we do poweroff.

This causes the following Oops:
    [  287.587787] BUG: kernel NULL pointer dereference, address: 0000000000000070
    [  287.594762] #PF: supervisor read access in kernel mode
    [  287.599912] #PF: error_code(0x0000) - not-present page
    [  287.605061] PGD 0 P4D 0
    [  287.607612] Oops: 0000 [#1] SMP NOPTI
    [  287.611287] CPU: 3 PID: 5265 Comm: md0_raid1 Tainted: G     U            5.10.146 #0
    [  287.619029] Hardware name: xxxxxxx/To be filled by O.E.M, BIOS 5.19 06/16/2022
    [  287.626775] RIP: 0010:md_check_recovery+0x57/0x500 [md_mod]
    [  287.632357] Code: fe 01 00 00 48 83 bb 10 03 00 00 00 74 08 48 89 ......
    [  287.651118] RSP: 0018:ffffc90000433d78 EFLAGS: 00010202
    [  287.656347] RAX: 0000000000000000 RBX: ffff888105986800 RCX: 0000000000000000
    [  287.663491] RDX: ffffc90000433bb0 RSI: 00000000ffffefff RDI: ffff888105986800
    [  287.670634] RBP: ffffc90000433da0 R08: 0000000000000000 R09: c0000000ffffefff
    [  287.677771] R10: 0000000000000001 R11: ffffc90000433ba8 R12: ffff888105986800
    [  287.684907] R13: 0000000000000000 R14: fffffffffffffe00 R15: ffff888100b6b500
    [  287.692052] FS:  0000000000000000(0000) GS:ffff888277f80000(0000) knlGS:0000000000000000
    [  287.700149] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [  287.705897] CR2: 0000000000000070 CR3: 000000000320a000 CR4: 0000000000350ee0
    [  287.713033] Call Trace:
    [  287.715498]  raid1d+0x6c/0xbbb [raid1]
    [  287.719256]  ? __schedule+0x1ff/0x760
    [  287.722930]  ? schedule+0x3b/0xb0
    [  287.726260]  ? schedule_timeout+0x1ed/0x290
    [  287.730456]  ? __switch_to+0x11f/0x400
    [  287.734219]  md_thread+0xe9/0x140 [md_mod]
    [  287.738328]  ? md_thread+0xe9/0x140 [md_mod]
    [  287.742601]  ? wait_woken+0x80/0x80
    [  287.746097]  ? md_register_thread+0xe0/0xe0 [md_mod]
    [  287.751064]  kthread+0x11a/0x140
    [  287.754300]  ? kthread_park+0x90/0x90
    [  287.757974]  ret_from_fork+0x1f/0x30

In fact, when raid1 array run fail, we need to do
md_unregister_thread() before raid1_free().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50715/">CVE-2022-50715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50715">CVE-2022-50715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255749">SUSE bug 1255749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50717" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50717" ref_url="https://www.suse.com/security/cve/CVE-2022-50717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024514.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: add bounds check on Transfer Tag

ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(),
add a bounds check to avoid out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50717/">CVE-2022-50717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50717">CVE-2022-50717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255844">SUSE bug 1255844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255845">SUSE bug 1255845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50718" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50718" ref_url="https://www.suse.com/security/cve/CVE-2022-50718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix pci device refcount leak

As comment of pci_get_domain_bus_and_slot() says, it returns
a pci device with refcount increment, when finish using it,
the caller must decrement the reference count by calling
pci_dev_put().

So before returning from amdgpu_device_resume|suspend_display_audio(),
pci_dev_put() is called to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50718/">CVE-2022-50718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50718">CVE-2022-50718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255750">SUSE bug 1255750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50721" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50721" ref_url="https://www.suse.com/security/cve/CVE-2022-50721" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg

The calling convention for pre_slave_sg is to return NULL on error and
provide an error log to the system. Qcom-adm instead provide error
pointer when an error occur. This indirectly cause kernel panic for
example for the nandc driver that checks only if the pointer returned by
device_prep_slave_sg is not NULL. Returning an error pointer makes nandc
think the device_prep_slave_sg function correctly completed and makes
the kernel panics later in the code.

While nandc is the one that makes the kernel crash, it was pointed out
that the real problem is qcom-adm not following calling convention for
that function.

To fix this, drop returning error pointer and return NULL with an error
log.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50721/">CVE-2022-50721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50721">CVE-2022-50721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255870">SUSE bug 1255870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255871">SUSE bug 1255871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50723</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50723" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50723" ref_url="https://www.suse.com/security/cve/CVE-2022-50723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: fix memory leak in bnxt_nvm_test()

Free the kzalloc'ed buffer before returning in the success path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50723/">CVE-2022-50723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50723">CVE-2022-50723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255946">SUSE bug 1255946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255947">SUSE bug 1255947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50724" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50724" ref_url="https://www.suse.com/security/cve/CVE-2022-50724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix resource leak in regulator_register()

I got some resource leak reports while doing fault injection test:

  OF: ERROR: memory leak, expected refcount 1 instead of 100,
  of_node_get()/of_node_put() unbalanced - destroy cset entry:
  attach overlay node /i2c/pmic@64/regulators/buck1

unreferenced object 0xffff88810deea000 (size 512):
  comm "490-i2c-rt5190a", pid 253, jiffies 4294859840 (age 5061.046s)
  hex dump (first 32 bytes):
    00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00  .....N..........
    ff ff ff ff ff ff ff ff a0 1e 00 a1 ff ff ff ff  ................
  backtrace:
    [&lt;00000000d78541e2&gt;] kmalloc_trace+0x21/0x110
    [&lt;00000000b343d153&gt;] device_private_init+0x32/0xd0
    [&lt;00000000be1f0c70&gt;] device_add+0xb2d/0x1030
    [&lt;00000000e3e6344d&gt;] regulator_register+0xaf2/0x12a0
    [&lt;00000000e2f5e754&gt;] devm_regulator_register+0x57/0xb0
    [&lt;000000008b898197&gt;] rt5190a_probe+0x52a/0x861 [rt5190a_regulator]

unreferenced object 0xffff88810b617b80 (size 32):
  comm "490-i2c-rt5190a", pid 253, jiffies 4294859904 (age 5060.983s)
  hex dump (first 32 bytes):
    72 65 67 75 6c 61 74 6f 72 2e 32 38 36 38 2d 53  regulator.2868-S
    55 50 50 4c 59 00 ff ff 29 00 00 00 2b 00 00 00  UPPLY...)...+...
  backtrace:
    [&lt;000000009da9280d&gt;] __kmalloc_node_track_caller+0x44/0x1b0
    [&lt;0000000025c6a4e5&gt;] kstrdup+0x3a/0x70
    [&lt;00000000790efb69&gt;] create_regulator+0xc0/0x4e0
    [&lt;0000000005ed203a&gt;] regulator_resolve_supply+0x2d4/0x440
    [&lt;0000000045796214&gt;] regulator_register+0x10b3/0x12a0
    [&lt;00000000e2f5e754&gt;] devm_regulator_register+0x57/0xb0
    [&lt;000000008b898197&gt;] rt5190a_probe+0x52a/0x861 [rt5190a_regulator]

After calling regulator_resolve_supply(), the 'rdev-&gt;supply' is set
by set_supply(), after this set, in the error path, the resources
need be released, so call regulator_put() to avoid the leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50724/">CVE-2022-50724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50724">CVE-2022-50724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255950">SUSE bug 1255950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50726</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50726" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50726" ref_url="https://www.suse.com/security/cve/CVE-2022-50726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix possible use-after-free in async command interface

mlx5_cmd_cleanup_async_ctx should return only after all its callback
handlers were completed. Before this patch, the below race between
mlx5_cmd_cleanup_async_ctx and mlx5_cmd_exec_cb_handler was possible and
lead to a use-after-free:

1. mlx5_cmd_cleanup_async_ctx is called while num_inflight is 2 (i.e.
   elevated by 1, a single inflight callback).
2. mlx5_cmd_cleanup_async_ctx decreases num_inflight to 1.
3. mlx5_cmd_exec_cb_handler is called, decreases num_inflight to 0 and
   is about to call wake_up().
4. mlx5_cmd_cleanup_async_ctx calls wait_event, which returns
   immediately as the condition (num_inflight == 0) holds.
5. mlx5_cmd_cleanup_async_ctx returns.
6. The caller of mlx5_cmd_cleanup_async_ctx frees the mlx5_async_ctx
   object.
7. mlx5_cmd_exec_cb_handler goes on and calls wake_up() on the freed
   object.

Fix it by syncing using a completion object. Mark it completed when
num_inflight reaches 0.

Trace:

BUG: KASAN: use-after-free in do_raw_spin_lock+0x23d/0x270
Read of size 4 at addr ffff888139cd12f4 by task swapper/5/0

CPU: 5 PID: 0 Comm: swapper/5 Not tainted 6.0.0-rc3_for_upstream_debug_2022_08_30_13_10 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x57/0x7d
 print_report.cold+0x2d5/0x684
 ? do_raw_spin_lock+0x23d/0x270
 kasan_report+0xb1/0x1a0
 ? do_raw_spin_lock+0x23d/0x270
 do_raw_spin_lock+0x23d/0x270
 ? rwlock_bug.part.0+0x90/0x90
 ? __delete_object+0xb8/0x100
 ? lock_downgrade+0x6e0/0x6e0
 _raw_spin_lock_irqsave+0x43/0x60
 ? __wake_up_common_lock+0xb9/0x140
 __wake_up_common_lock+0xb9/0x140
 ? __wake_up_common+0x650/0x650
 ? destroy_tis_callback+0x53/0x70 [mlx5_core]
 ? kasan_set_track+0x21/0x30
 ? destroy_tis_callback+0x53/0x70 [mlx5_core]
 ? kfree+0x1ba/0x520
 ? do_raw_spin_unlock+0x54/0x220
 mlx5_cmd_exec_cb_handler+0x136/0x1a0 [mlx5_core]
 ? mlx5_cmd_cleanup_async_ctx+0x220/0x220 [mlx5_core]
 ? mlx5_cmd_cleanup_async_ctx+0x220/0x220 [mlx5_core]
 mlx5_cmd_comp_handler+0x65a/0x12b0 [mlx5_core]
 ? dump_command+0xcc0/0xcc0 [mlx5_core]
 ? lockdep_hardirqs_on_prepare+0x400/0x400
 ? cmd_comp_notifier+0x7e/0xb0 [mlx5_core]
 cmd_comp_notifier+0x7e/0xb0 [mlx5_core]
 atomic_notifier_call_chain+0xd7/0x1d0
 mlx5_eq_async_int+0x3ce/0xa20 [mlx5_core]
 atomic_notifier_call_chain+0xd7/0x1d0
 ? irq_release+0x140/0x140 [mlx5_core]
 irq_int_handler+0x19/0x30 [mlx5_core]
 __handle_irq_event_percpu+0x1f2/0x620
 handle_irq_event+0xb2/0x1d0
 handle_edge_irq+0x21e/0xb00
 __common_interrupt+0x79/0x1a0
 common_interrupt+0x78/0xa0
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_common_interrupt+0x22/0x40
RIP: 0010:default_idle+0x42/0x60
Code: c1 83 e0 07 48 c1 e9 03 83 c0 03 0f b6 14 11 38 d0 7c 04 84 d2 75 14 8b 05 eb 47 22 02 85 c0 7e 07 0f 00 2d e0 9f 48 00 fb f4 &lt;c3&gt; 48 c7 c7 80 08 7f 85 e8 d1 d3 3e fe eb de 66 66 2e 0f 1f 84 00
RSP: 0018:ffff888100dbfdf0 EFLAGS: 00000242
RAX: 0000000000000001 RBX: ffffffff84ecbd48 RCX: 1ffffffff0afe110
RDX: 0000000000000004 RSI: 0000000000000000 RDI: ffffffff835cc9bc
RBP: 0000000000000005 R08: 0000000000000001 R09: ffff88881dec4ac3
R10: ffffed1103bd8958 R11: 0000017d0ca571c9 R12: 0000000000000005
R13: ffffffff84f024e0 R14: 0000000000000000 R15: dffffc0000000000
 ? default_idle_call+0xcc/0x450
 default_idle_call+0xec/0x450
 do_idle+0x394/0x450
 ? arch_cpu_idle_exit+0x40/0x40
 ? do_idle+0x17/0x450
 cpu_startup_entry+0x19/0x20
 start_secondary+0x221/0x2b0
 ? set_cpu_sibling_map+0x2070/0x2070
 secondary_startup_64_no_verify+0xcd/0xdb
 &lt;/TASK&gt;

Allocated by task 49502:
 kasan_save_stack+0x1e/0x40
 __kasan_kmalloc+0x81/0xa0
 kvmalloc_node+0x48/0xe0
 mlx5e_bulk_async_init+0x35/0x110 [mlx5_core]
 mlx5e_tls_priv_tx_list_cleanup+0x84/0x3e0 [mlx5_core]
 mlx5e_ktls_cleanup_tx+0x38f/0x760 [mlx5_core]
 mlx5e_cleanup_nic_tx+0xa7/0x100 [mlx5_core]
 mlx5e_detach_netdev+0x1c
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50726/">CVE-2022-50726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50726">CVE-2022-50726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256040">SUSE bug 1256040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256255">SUSE bug 1256255</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50728" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50728" ref_url="https://www.suse.com/security/cve/CVE-2022-50728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/lcs: Fix return type of lcs_start_xmit()

With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),
indirect call targets are validated against the expected function
pointer prototype to make sure the call target is valid to help mitigate
ROP attacks. If they are not identical, there is a failure at run time,
which manifests as either a kernel panic or thread getting killed. A
proposed warning in clang aims to catch these at compile time, which
reveals:

  drivers/s390/net/lcs.c:2090:21: error: incompatible function pointer types initializing 'netdev_tx_t (*)(struct sk_buff *, struct net_device *)' (aka 'enum netdev_tx (*)(struct sk_buff *, struct net_device *)') with an expression of type 'int (struct sk_buff *, struct net_device *)' [-Werror,-Wincompatible-function-pointer-types-strict]
          .ndo_start_xmit         = lcs_start_xmit,
                                    ^~~~~~~~~~~~~~
  drivers/s390/net/lcs.c:2097:21: error: incompatible function pointer types initializing 'netdev_tx_t (*)(struct sk_buff *, struct net_device *)' (aka 'enum netdev_tx (*)(struct sk_buff *, struct net_device *)') with an expression of type 'int (struct sk_buff *, struct net_device *)' [-Werror,-Wincompatible-function-pointer-types-strict]
          .ndo_start_xmit         = lcs_start_xmit,
                                    ^~~~~~~~~~~~~~

-&gt;ndo_start_xmit() in 'struct net_device_ops' expects a return type of
'netdev_tx_t', not 'int'. Adjust the return type of lcs_start_xmit() to
match the prototype's to resolve the warning and potential CFI failure,
should s390 select ARCH_SUPPORTS_CFI_CLANG in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50728/">CVE-2022-50728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50728">CVE-2022-50728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256046">SUSE bug 1256046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50730" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50730" ref_url="https://www.suse.com/security/cve/CVE-2022-50730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: silence the warning when evicting inode with dioread_nolock

When evicting an inode with default dioread_nolock, it could be raced by
the unwritten extents converting kworker after writeback some new
allocated dirty blocks. It convert unwritten extents to written, the
extents could be merged to upper level and free extent blocks, so it
could mark the inode dirty again even this inode has been marked
I_FREEING. But the inode-&gt;i_io_list check and warning in
ext4_evict_inode() missing this corner case. Fortunately,
ext4_evict_inode() will wait all extents converting finished before this
check, so it will not lead to inode use-after-free problem, every thing
is OK besides this warning. The WARN_ON_ONCE was originally designed
for finding inode use-after-free issues in advance, but if we add
current dioread_nolock case in, it will become not quite useful, so fix
this warning by just remove this check.

 ======
 WARNING: CPU: 7 PID: 1092 at fs/ext4/inode.c:227
 ext4_evict_inode+0x875/0xc60
 ...
 RIP: 0010:ext4_evict_inode+0x875/0xc60
 ...
 Call Trace:
  &lt;TASK&gt;
  evict+0x11c/0x2b0
  iput+0x236/0x3a0
  do_unlinkat+0x1b4/0x490
  __x64_sys_unlinkat+0x4c/0xb0
  do_syscall_64+0x3b/0x90
  entry_SYSCALL_64_after_hwframe+0x46/0xb0
 RIP: 0033:0x7fa933c1115b
 ======

rm                          kworker
                            ext4_end_io_end()
vfs_unlink()
 ext4_unlink()
                             ext4_convert_unwritten_io_end_vec()
                              ext4_convert_unwritten_extents()
                               ext4_map_blocks()
                                ext4_ext_map_blocks()
                                 ext4_ext_try_to_merge_up()
                                  __mark_inode_dirty()
                                   check !I_FREEING
                                   locked_inode_to_wb_and_lock_list()
 iput()
  iput_final()
   evict()
    ext4_evict_inode()
     truncate_inode_pages_final() //wait release io_end
                                    inode_io_list_move_locked()
                             ext4_release_io_end()
     trigger WARN_ON_ONCE()
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50730/">CVE-2022-50730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50730">CVE-2022-50730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256048">SUSE bug 1256048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50733" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50733" ref_url="https://www.suse.com/security/cve/CVE-2022-50733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: idmouse: fix an uninit-value in idmouse_open

In idmouse_create_image, if any ftip_command fails, it will
go to the reset label. However, this leads to the data in
bulk_in_buffer[HEADER..IMGSIZE] uninitialized. And the check
for valid image incurs an uninitialized dereference.

Fix this by moving the check before reset label since this
check only be valid if the data after bulk_in_buffer[HEADER]
has concrete data.

Note that this is found by KMSAN, so only kernel compilation
is tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50733/">CVE-2022-50733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50733">CVE-2022-50733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256064">SUSE bug 1256064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50735" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50735" ref_url="https://www.suse.com/security/cve/CVE-2022-50735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: do not run mt76u_status_worker if the device is not running

Fix the following NULL pointer dereference avoiding to run
mt76u_status_worker thread if the device is not running yet.

KASAN: null-ptr-deref in range
[0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 98 Comm: kworker/u2:2 Not tainted 5.14.0+ #78 Hardware
name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
Workqueue: mt76 mt76u_tx_status_data
RIP: 0010:mt76x02_mac_fill_tx_status.isra.0+0x82c/0x9e0
Code: c5 48 b8 00 00 00 00 00 fc ff df 80 3c 02 00 0f 85 94 01 00 00
48 b8 00 00 00 00 00 fc ff df 4d 8b 34 24 4c 89 f2 48 c1 ea 03 &lt;0f&gt;
b6
04 02 84 c0 74 08 3c 03 0f 8e 89 01 00 00 41 8b 16 41 0f b7
RSP: 0018:ffffc900005af988 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffc900005afae8 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff832fc661 RDI: ffffc900005afc2a
RBP: ffffc900005afae0 R08: 0000000000000001 R09: fffff520000b5f3c
R10: 0000000000000003 R11: fffff520000b5f3b R12: ffff88810b6132d8
R13: 000000000000ffff R14: 0000000000000000 R15: ffffc900005afc28
FS:  0000000000000000(0000) GS:ffff88811aa00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa0eda6a000 CR3: 0000000118f17000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 mt76x02_send_tx_status+0x1d2/0xeb0
 mt76x02_tx_status_data+0x8e/0xd0
 mt76u_tx_status_data+0xe1/0x240
 process_one_work+0x92b/0x1460
 worker_thread+0x95/0xe00
 kthread+0x3a1/0x480
 ret_from_fork+0x1f/0x30
Modules linked in:
--[ end trace 8df5d20fc5040f65 ]--
RIP: 0010:mt76x02_mac_fill_tx_status.isra.0+0x82c/0x9e0
Code: c5 48 b8 00 00 00 00 00 fc ff df 80 3c 02 00 0f 85 94 01 00 00
48 b8 00 00 00 00 00 fc ff df 4d 8b 34 24 4c 89 f2 48 c1 ea 03 &lt;0f&gt;
b6
04 02 84 c0 74 08 3c 03 0f 8e 89 01 00 00 41 8b 16 41 0f b7
RSP: 0018:ffffc900005af988 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffc900005afae8 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff832fc661 RDI: ffffc900005afc2a
RBP: ffffc900005afae0 R08: 0000000000000001 R09: fffff520000b5f3c
R10: 0000000000000003 R11: fffff520000b5f3b R12: ffff88810b6132d8
R13: 000000000000ffff R14: 0000000000000000 R15: ffffc900005afc28
FS:  0000000000000000(0000) GS:ffff88811aa00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fa0eda6a000 CR3: 0000000118f17000 CR4: 0000000000750ef0
PKRU: 55555554

Moreover move stat_work schedule out of the for loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50735/">CVE-2022-50735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50735">CVE-2022-50735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256141">SUSE bug 1256141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50736" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50736" ref_url="https://www.suse.com/security/cve/CVE-2022-50736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix immediate work request flush to completion queue

Correctly set send queue element opcode during immediate work request
flushing in post sendqueue operation, if the QP is in ERROR state.
An undefined ocode value results in out-of-bounds access to an array
for mapping the opcode between siw internal and RDMA core representation
in work completion generation. It resulted in a KASAN BUG report
of type 'global-out-of-bounds' during NFSoRDMA testing.

This patch further fixes a potential case of a malicious user which may
write undefined values for completion queue elements status or opcode,
if the CQ is memory mapped to user land. It avoids the same out-of-bounds
access to arrays for status and opcode mapping as described above.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50736/">CVE-2022-50736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50736">CVE-2022-50736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256137">SUSE bug 1256137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256138">SUSE bug 1256138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50738" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50738" ref_url="https://www.suse.com/security/cve/CVE-2022-50738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost-vdpa: fix an iotlb memory leak

Before commit 3d5698793897 ("vhost-vdpa: introduce asid based IOTLB")
we called vhost_vdpa_iotlb_unmap(v, iotlb, 0ULL, 0ULL - 1) during
release to free all the resources allocated when processing user IOTLB
messages through vhost_vdpa_process_iotlb_update().
That commit changed the handling of IOTLB a bit, and we accidentally
removed some code called during the release.

We partially fixed this with commit 037d4305569a ("vhost-vdpa: call
vhost_vdpa_cleanup during the release") but a potential memory leak is
still there as showed by kmemleak if the application does not send
VHOST_IOTLB_INVALIDATE or crashes:

  unreferenced object 0xffff888007fbaa30 (size 16):
    comm "blkio-bench", pid 914, jiffies 4294993521 (age 885.500s)
    hex dump (first 16 bytes):
      40 73 41 07 80 88 ff ff 00 00 00 00 00 00 00 00  @sA.............
    backtrace:
      [&lt;0000000087736d2a&gt;] kmem_cache_alloc_trace+0x142/0x1c0
      [&lt;0000000060740f50&gt;] vhost_vdpa_process_iotlb_msg+0x68c/0x901 [vhost_vdpa]
      [&lt;0000000083e8e205&gt;] vhost_chr_write_iter+0xc0/0x4a0 [vhost]
      [&lt;000000008f2f414a&gt;] vhost_vdpa_chr_write_iter+0x18/0x20 [vhost_vdpa]
      [&lt;00000000de1cd4a0&gt;] vfs_write+0x216/0x4b0
      [&lt;00000000a2850200&gt;] ksys_write+0x71/0xf0
      [&lt;00000000de8e720b&gt;] __x64_sys_write+0x19/0x20
      [&lt;0000000018b12cbb&gt;] do_syscall_64+0x3f/0x90
      [&lt;00000000986ec465&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

Let's fix this calling vhost_vdpa_iotlb_unmap() on the whole range in
vhost_vdpa_remove_as(). We move that call before vhost_dev_cleanup()
since we need a valid v-&gt;vdev.mm in vhost_vdpa_pa_unmap().
vhost_iotlb_reset() call can be removed, since vhost_vdpa_iotlb_unmap()
on the whole range removes all the entries.

The kmemleak log reported was observed with a vDPA device that has `use_va`
set to true (e.g. VDUSE). This patch has been tested with both types of
devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50738/">CVE-2022-50738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50738">CVE-2022-50738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256111">SUSE bug 1256111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50740</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50740" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50740" ref_url="https://www.suse.com/security/cve/CVE-2022-50740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: hif_usb: fix memory leak of urbs in ath9k_hif_usb_dealloc_tx_urbs()

Syzkaller reports a long-known leak of urbs in
ath9k_hif_usb_dealloc_tx_urbs().

The cause of the leak is that usb_get_urb() is called but usb_free_urb()
(or usb_put_urb()) is not called inside usb_kill_urb() as urb-&gt;dev or
urb-&gt;ep fields have not been initialized and usb_kill_urb() returns
immediately.

The patch removes trying to kill urbs located in hif_dev-&gt;tx.tx_buf
because hif_dev-&gt;tx.tx_buf is not supposed to contain urbs which are in
pending state (the pending urbs are stored in hif_dev-&gt;tx.tx_pending).
The tx.tx_lock is acquired so there should not be any changes in the list.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50740/">CVE-2022-50740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50740">CVE-2022-50740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256155">SUSE bug 1256155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50743" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50743" ref_url="https://www.suse.com/security/cve/CVE-2022-50743" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: Fix pcluster memleak when its block address is zero

syzkaller reported a memleak:
https://syzkaller.appspot.com/bug?id=62f37ff612f0021641eda5b17f056f1668aa9aed

unreferenced object 0xffff88811009c7f8 (size 136):
  ...
  backtrace:
    [&lt;ffffffff821db19b&gt;] z_erofs_do_read_page+0x99b/0x1740
    [&lt;ffffffff821dee9e&gt;] z_erofs_readahead+0x24e/0x580
    [&lt;ffffffff814bc0d6&gt;] read_pages+0x86/0x3d0
    ...

syzkaller constructed a case: in z_erofs_register_pcluster(),
ztailpacking = false and map-&gt;m_pa = zero. This makes pcl-&gt;obj.index be
zero although pcl is not a inline pcluster.

Then following path adds refcount for grp, but the refcount won't be put
because pcl is inline.

z_erofs_readahead()
  z_erofs_do_read_page() # for another page
    z_erofs_collector_begin()
      erofs_find_workgroup()
        erofs_workgroup_get()

Since it's illegal for the block address of a non-inlined pcluster to
be zero, add check here to avoid registering the pcluster which would
be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50743/">CVE-2022-50743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50743">CVE-2022-50743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256169">SUSE bug 1256169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50744" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50744" ref_url="https://www.suse.com/security/cve/CVE-2022-50744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs

During I/O and simultaneous cat of /sys/kernel/debug/lpfc/fnX/rx_monitor, a
hard lockup similar to the call trace below may occur.

The spin_lock_bh in lpfc_rx_monitor_report is not protecting from timer
interrupts as expected, so change the strength of the spin lock to _irq.

Kernel panic - not syncing: Hard LOCKUP
CPU: 3 PID: 110402 Comm: cat Kdump: loaded

exception RIP: native_queued_spin_lock_slowpath+91

[IRQ stack]
 native_queued_spin_lock_slowpath at ffffffffb814e30b
 _raw_spin_lock at ffffffffb89a667a
 lpfc_rx_monitor_record at ffffffffc0a73a36 [lpfc]
 lpfc_cmf_timer at ffffffffc0abbc67 [lpfc]
 __hrtimer_run_queues at ffffffffb8184250
 hrtimer_interrupt at ffffffffb8184ab0
 smp_apic_timer_interrupt at ffffffffb8a026ba
 apic_timer_interrupt at ffffffffb8a01c4f
[End of IRQ stack]

 apic_timer_interrupt at ffffffffb8a01c4f
 lpfc_rx_monitor_report at ffffffffc0a73c80 [lpfc]
 lpfc_rx_monitor_read at ffffffffc0addde1 [lpfc]
 full_proxy_read at ffffffffb83e7fc3
 vfs_read at ffffffffb833fe71
 ksys_read at ffffffffb83402af
 do_syscall_64 at ffffffffb800430b
 entry_SYSCALL_64_after_hwframe at ffffffffb8a000ad
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50744/">CVE-2022-50744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50744">CVE-2022-50744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256165">SUSE bug 1256165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50750" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50750" ref_url="https://www.suse.com/security/cve/CVE-2022-50750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure

In case mipi_dsi_attach() fails, call drm_panel_remove() to
avoid memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50750/">CVE-2022-50750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50750">CVE-2022-50750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256188">SUSE bug 1256188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50752" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50752" ref_url="https://www.suse.com/security/cve/CVE-2022-50752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk()

When running chunk-sized reads on disks with badblocks duplicate bio
free/puts are observed:

   =============================================================================
   BUG bio-200 (Not tainted): Object already free
   -----------------------------------------------------------------------------
   Allocated in mempool_alloc_slab+0x17/0x20 age=3 cpu=2 pid=7504
    __slab_alloc.constprop.0+0x5a/0xb0
    kmem_cache_alloc+0x31e/0x330
    mempool_alloc_slab+0x17/0x20
    mempool_alloc+0x100/0x2b0
    bio_alloc_bioset+0x181/0x460
    do_mpage_readpage+0x776/0xd00
    mpage_readahead+0x166/0x320
    blkdev_readahead+0x15/0x20
    read_pages+0x13f/0x5f0
    page_cache_ra_unbounded+0x18d/0x220
    force_page_cache_ra+0x181/0x1c0
    page_cache_sync_ra+0x65/0xb0
    filemap_get_pages+0x1df/0xaf0
    filemap_read+0x1e1/0x700
    blkdev_read_iter+0x1e5/0x330
    vfs_read+0x42a/0x570
   Freed in mempool_free_slab+0x17/0x20 age=3 cpu=2 pid=7504
    kmem_cache_free+0x46d/0x490
    mempool_free_slab+0x17/0x20
    mempool_free+0x66/0x190
    bio_free+0x78/0x90
    bio_put+0x100/0x1a0
    raid5_make_request+0x2259/0x2450
    md_handle_request+0x402/0x600
    md_submit_bio+0xd9/0x120
    __submit_bio+0x11f/0x1b0
    submit_bio_noacct_nocheck+0x204/0x480
    submit_bio_noacct+0x32e/0xc70
    submit_bio+0x98/0x1a0
    mpage_readahead+0x250/0x320
    blkdev_readahead+0x15/0x20
    read_pages+0x13f/0x5f0
    page_cache_ra_unbounded+0x18d/0x220
   Slab 0xffffea000481b600 objects=21 used=0 fp=0xffff8881206d8940 flags=0x17ffffc0010201(locked|slab|head|node=0|zone=2|lastcpupid=0x1fffff)
   CPU: 0 PID: 34525 Comm: kworker/u24:2 Not tainted 6.0.0-rc2-localyes-265166-gf11c5343fa3f #143
   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-1ubuntu1.1 04/01/2014
   Workqueue: raid5wq raid5_do_work
   Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl+0x5a/0x78
    dump_stack+0x10/0x16
    print_trailer+0x158/0x165
    object_err+0x35/0x50
    free_debug_processing.cold+0xb7/0xbe
    __slab_free+0x1ae/0x330
    kmem_cache_free+0x46d/0x490
    mempool_free_slab+0x17/0x20
    mempool_free+0x66/0x190
    bio_free+0x78/0x90
    bio_put+0x100/0x1a0
    mpage_end_io+0x36/0x150
    bio_endio+0x2fd/0x360
    md_end_io_acct+0x7e/0x90
    bio_endio+0x2fd/0x360
    handle_failed_stripe+0x960/0xb80
    handle_stripe+0x1348/0x3760
    handle_active_stripes.constprop.0+0x72a/0xaf0
    raid5_do_work+0x177/0x330
    process_one_work+0x616/0xb20
    worker_thread+0x2bd/0x6f0
    kthread+0x179/0x1b0
    ret_from_fork+0x22/0x30
    &lt;/TASK&gt;

The double free is caused by an unnecessary bio_put() in the
if(is_badblock(...)) error path in raid5_read_one_chunk().

The error path was moved ahead of bio_alloc_clone() in c82aa1b76787c
("md/raid5: move checking badblock before clone bio in
raid5_read_one_chunk"). The previous code checked and freed align_bio
which required a bio_put. After the move that is no longer needed as
raid_bio is returned to the control of the common io path which
performs its own endio resulting in a double free on bad device blocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50752/">CVE-2022-50752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50752">CVE-2022-50752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256204">SUSE bug 1256204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50756" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50756" ref_url="https://www.suse.com/security/cve/CVE-2022-50756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix mempool alloc size

Convert the max size to bytes to match the units of the divisor that
calculates the worst-case number of PRP entries.

The result is used to determine how many PRP Lists are required. The
code was previously rounding this to 1 list, but we can require 2 in the
worst case. In that scenario, the driver would corrupt memory beyond the
size provided by the mempool.

While unlikely to occur (you'd need a 4MB in exactly 127 phys segments
on a queue that doesn't support SGLs), this memory corruption has been
observed by kfence.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50756/">CVE-2022-50756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50756">CVE-2022-50756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256216">SUSE bug 1256216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256217">SUSE bug 1256217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50760" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50760" ref_url="https://www.suse.com/security/cve/CVE-2022-50760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()

As comment of pci_get_class() says, it returns a pci_device with its
refcount increased and decreased the refcount for the input parameter
@from if it is not NULL.

If we break the loop in amdgpu_atrm_get_bios() with 'pdev' not NULL, we
need to call pci_dev_put() to decrease the refcount. Add the missing
pci_dev_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50760/">CVE-2022-50760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50760">CVE-2022-50760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255983">SUSE bug 1255983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50768" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50768" ref_url="https://www.suse.com/security/cve/CVE-2022-50768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Correct device removal for multi-actuator devices

Correct device count for multi-actuator drives which can cause kernel
panics.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50768/">CVE-2022-50768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50768">CVE-2022-50768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256309">SUSE bug 1256309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50771</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50771" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50771" ref_url="https://www.suse.com/security/cve/CVE-2022-50771" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state()

Running rcutorture with non-zero fqs_duration module parameter in a
kernel built with CONFIG_PREEMPTION=y results in the following splat:

BUG: using __this_cpu_read() in preemptible [00000000]
code: rcu_torture_fqs/398
caller is __this_cpu_preempt_check+0x13/0x20
CPU: 3 PID: 398 Comm: rcu_torture_fqs Not tainted 6.0.0-rc1-yoctodev-standard+
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x5b/0x86
dump_stack+0x10/0x16
check_preemption_disabled+0xe5/0xf0
__this_cpu_preempt_check+0x13/0x20
rcu_force_quiescent_state.part.0+0x1c/0x170
rcu_force_quiescent_state+0x1e/0x30
rcu_torture_fqs+0xca/0x160
? rcu_torture_boost+0x430/0x430
kthread+0x192/0x1d0
? kthread_complete_and_exit+0x30/0x30
ret_from_fork+0x22/0x30
&lt;/TASK&gt;

The problem is that rcu_force_quiescent_state() uses __this_cpu_read()
in preemptible code instead of the proper raw_cpu_read().  This commit
therefore changes __this_cpu_read() to raw_cpu_read().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50771/">CVE-2022-50771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50771">CVE-2022-50771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256322">SUSE bug 1256322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50772</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50772" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50772" ref_url="https://www.suse.com/security/cve/CVE-2022-50772" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netdevsim: fix memory leak in nsim_bus_dev_new()

If device_register() failed in nsim_bus_dev_new(), the value of reference
in nsim_bus_dev-&gt;dev is 1. obj-&gt;name in nsim_bus_dev-&gt;dev will not be
released.

unreferenced object 0xffff88810352c480 (size 16):
  comm "echo", pid 5691, jiffies 4294945921 (age 133.270s)
  hex dump (first 16 bytes):
    6e 65 74 64 65 76 73 69 6d 31 00 00 00 00 00 00  netdevsim1......
  backtrace:
    [&lt;000000005e2e5e26&gt;] __kmalloc_node_track_caller+0x3a/0xb0
    [&lt;0000000094ca4fc8&gt;] kvasprintf+0xc3/0x160
    [&lt;00000000aad09bcc&gt;] kvasprintf_const+0x55/0x180
    [&lt;000000009bac868d&gt;] kobject_set_name_vargs+0x56/0x150
    [&lt;000000007c1a5d70&gt;] dev_set_name+0xbb/0xf0
    [&lt;00000000ad0d126b&gt;] device_add+0x1f8/0x1cb0
    [&lt;00000000c222ae24&gt;] new_device_store+0x3b6/0x5e0
    [&lt;0000000043593421&gt;] bus_attr_store+0x72/0xa0
    [&lt;00000000cbb1833a&gt;] sysfs_kf_write+0x106/0x160
    [&lt;00000000d0dedb8a&gt;] kernfs_fop_write_iter+0x3a8/0x5a0
    [&lt;00000000770b66e2&gt;] vfs_write+0x8f0/0xc80
    [&lt;0000000078bb39be&gt;] ksys_write+0x106/0x210
    [&lt;00000000005e55a4&gt;] do_syscall_64+0x35/0x80
    [&lt;00000000eaa40bbc&gt;] entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50772/">CVE-2022-50772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50772">CVE-2022-50772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256278">SUSE bug 1256278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50773</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50773" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50773" ref_url="https://www.suse.com/security/cve/CVE-2022-50773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: mts64: fix possible null-ptr-defer in snd_mts64_interrupt

I got a null-ptr-defer error report when I do the following tests
on the qemu platform:

make defconfig and CONFIG_PARPORT=m, CONFIG_PARPORT_PC=m,
CONFIG_SND_MTS64=m

Then making test scripts:
cat&gt;test_mod1.sh&lt;&lt;EOF
modprobe snd-mts64
modprobe snd-mts64
EOF

Executing the script, perhaps several times, we will get a null-ptr-defer
report, as follow:

syzkaller:~# ./test_mod.sh
snd_mts64: probe of snd_mts64.0 failed with error -5
modprobe: ERROR: could not insert 'snd_mts64': No such device
 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 0 P4D 0
 Oops: 0002 [#1] PREEMPT SMP PTI
 CPU: 0 PID: 205 Comm: modprobe Not tainted 6.1.0-rc8-00588-g76dcd734eca2 #6
 Call Trace:
  &lt;IRQ&gt;
  snd_mts64_interrupt+0x24/0xa0 [snd_mts64]
  parport_irq_handler+0x37/0x50 [parport]
  __handle_irq_event_percpu+0x39/0x190
  handle_irq_event_percpu+0xa/0x30
  handle_irq_event+0x2f/0x50
  handle_edge_irq+0x99/0x1b0
  __common_interrupt+0x5d/0x100
  common_interrupt+0xa0/0xc0
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  asm_common_interrupt+0x22/0x40
 RIP: 0010:_raw_write_unlock_irqrestore+0x11/0x30
  parport_claim+0xbd/0x230 [parport]
  snd_mts64_probe+0x14a/0x465 [snd_mts64]
  platform_probe+0x3f/0xa0
  really_probe+0x129/0x2c0
  __driver_probe_device+0x6d/0xc0
  driver_probe_device+0x1a/0xa0
  __device_attach_driver+0x7a/0xb0
  bus_for_each_drv+0x62/0xb0
  __device_attach+0xe4/0x180
  bus_probe_device+0x82/0xa0
  device_add+0x550/0x920
  platform_device_add+0x106/0x220
  snd_mts64_attach+0x2e/0x80 [snd_mts64]
  port_check+0x14/0x20 [parport]
  bus_for_each_dev+0x6e/0xc0
  __parport_register_driver+0x7c/0xb0 [parport]
  snd_mts64_module_init+0x31/0x1000 [snd_mts64]
  do_one_initcall+0x3c/0x1f0
  do_init_module+0x46/0x1c6
  load_module+0x1d8d/0x1e10
  __do_sys_finit_module+0xa2/0xf0
  do_syscall_64+0x37/0x90
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
 Kernel panic - not syncing: Fatal exception in interrupt
 Rebooting in 1 seconds..

The mts wa not initialized during interrupt,  we add check for
mts to fix this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50773/">CVE-2022-50773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50773">CVE-2022-50773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256245">SUSE bug 1256245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50777" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50777" ref_url="https://www.suse.com/security/cve/CVE-2022-50777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe

of_phy_find_device() return device node with refcount incremented.
Call put_device() to relese it when not needed anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50777/">CVE-2022-50777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50777">CVE-2022-50777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256320">SUSE bug 1256320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50778" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50778" ref_url="https://www.suse.com/security/cve/CVE-2022-50778" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCAL

With CONFIG_FORTIFY=y and CONFIG_UBSAN_LOCAL_BOUNDS=y enabled, we observe
a runtime panic while running Android's Compatibility Test Suite's (CTS)
android.hardware.input.cts.tests. This is stemming from a strlen()
call in hidinput_allocate().

__compiletime_strlen() is implemented in terms of __builtin_object_size(),
then does an array access to check for NUL-termination. A quirk of
__builtin_object_size() is that for strings whose values are runtime
dependent, __builtin_object_size(str, 1 or 0) returns the maximum size
of possible values when those sizes are determinable at compile time.
Example:

  static const char *v = "FOO BAR";
  static const char *y = "FOO BA";
  unsigned long x (int z) {
      // Returns 8, which is:
      // max(__builtin_object_size(v, 1), __builtin_object_size(y, 1))
      return __builtin_object_size(z ? v : y, 1);
  }

So when FORTIFY_SOURCE is enabled, the current implementation of
__compiletime_strlen() will try to access beyond the end of y at runtime
using the size of v. Mixed with UBSAN_LOCAL_BOUNDS we get a fault.

hidinput_allocate() has a local C string whose value is control flow
dependent on a switch statement, so __builtin_object_size(str, 1)
evaluates to the maximum string length, making all other cases fault on
the last character check. hidinput_allocate() could be cleaned up to
avoid runtime calls to strlen() since the local variable can only have
literal values, so there's no benefit to trying to fortify the strlen
call site there.

Perform a __builtin_constant_p() check against index 0 earlier in the
macro to filter out the control-flow-dependant case. Add a KUnit test
for checking the expected behavioral characteristics of FORTIFY_SOURCE
internals.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50778/">CVE-2022-50778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50778">CVE-2022-50778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256304">SUSE bug 1256304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50780</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50780" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50780" ref_url="https://www.suse.com/security/cve/CVE-2022-50780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed

When the ops_init() interface is invoked to initialize the net, but
ops-&gt;init() fails, data is released. However, the ptr pointer in
net-&gt;gen is invalid. In this case, when nfqnl_nf_hook_drop() is invoked
to release the net, invalid address access occurs.

The process is as follows:
setup_net()
	ops_init()
		data = kzalloc(...)   ---&gt; alloc "data"
		net_assign_generic()  ---&gt; assign "date" to ptr in net-&gt;gen
		...
		ops-&gt;init()           ---&gt; failed
		...
		kfree(data);          ---&gt; ptr in net-&gt;gen is invalid
	...
	ops_exit_list()
		...
		nfqnl_nf_hook_drop()
			*q = nfnl_queue_pernet(net) ---&gt; q is invalid

The following is the Call Trace information:
BUG: KASAN: use-after-free in nfqnl_nf_hook_drop+0x264/0x280
Read of size 8 at addr ffff88810396b240 by task ip/15855
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x8e/0xd1
print_report+0x155/0x454
kasan_report+0xba/0x1f0
nfqnl_nf_hook_drop+0x264/0x280
nf_queue_nf_hook_drop+0x8b/0x1b0
__nf_unregister_net_hook+0x1ae/0x5a0
nf_unregister_net_hooks+0xde/0x130
ops_exit_list+0xb0/0x170
setup_net+0x7ac/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
&lt;/TASK&gt;

Allocated by task 15855:
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
__kasan_kmalloc+0xa1/0xb0
__kmalloc+0x49/0xb0
ops_init+0xe7/0x410
setup_net+0x5aa/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0

Freed by task 15855:
kasan_save_stack+0x1e/0x40
kasan_set_track+0x21/0x30
kasan_save_free_info+0x2a/0x40
____kasan_slab_free+0x155/0x1b0
slab_free_freelist_hook+0x11b/0x220
__kmem_cache_free+0xa4/0x360
ops_init+0xb9/0x410
setup_net+0x5aa/0xbd0
copy_net_ns+0x2e6/0x6b0
create_new_namespaces+0x382/0xa50
unshare_nsproxy_namespaces+0xa6/0x1c0
ksys_unshare+0x3a4/0x7e0
__x64_sys_unshare+0x2d/0x40
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50780/">CVE-2022-50780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50780">CVE-2022-50780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256305">SUSE bug 1256305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50781" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50781" ref_url="https://www.suse.com/security/cve/CVE-2022-50781" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amdgpu/pm: prevent array underflow in vega20_odn_edit_dpm_table()

In the PP_OD_EDIT_VDDC_CURVE case the "input_index" variable is capped at
2 but not checked for negative values so it results in an out of bounds
read.  This value comes from the user via sysfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50781/">CVE-2022-50781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50781">CVE-2022-50781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256306">SUSE bug 1256306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50782" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50782" ref_url="https://www.suse.com/security/cve/CVE-2022-50782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug_on in __es_tree_search caused by bad quota inode

We got a issue as fllows:
==================================================================
 kernel BUG at fs/ext4/extents_status.c:202!
 invalid opcode: 0000 [#1] PREEMPT SMP
 CPU: 1 PID: 810 Comm: mount Not tainted 6.1.0-rc1-next-g9631525255e3 #352
 RIP: 0010:__es_tree_search.isra.0+0xb8/0xe0
 RSP: 0018:ffffc90001227900 EFLAGS: 00010202
 RAX: 0000000000000000 RBX: 0000000077512a0f RCX: 0000000000000000
 RDX: 0000000000000002 RSI: 0000000000002a10 RDI: ffff8881004cd0c8
 RBP: ffff888177512ac8 R08: 47ffffffffffffff R09: 0000000000000001
 R10: 0000000000000001 R11: 00000000000679af R12: 0000000000002a10
 R13: ffff888177512d88 R14: 0000000077512a10 R15: 0000000000000000
 FS: 00007f4bd76dbc40(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00005653bf993cf8 CR3: 000000017bfdf000 CR4: 00000000000006e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  ext4_es_cache_extent+0xe2/0x210
  ext4_cache_extents+0xd2/0x110
  ext4_find_extent+0x5d5/0x8c0
  ext4_ext_map_blocks+0x9c/0x1d30
  ext4_map_blocks+0x431/0xa50
  ext4_getblk+0x82/0x340
  ext4_bread+0x14/0x110
  ext4_quota_read+0xf0/0x180
  v2_read_header+0x24/0x90
  v2_check_quota_file+0x2f/0xa0
  dquot_load_quota_sb+0x26c/0x760
  dquot_load_quota_inode+0xa5/0x190
  ext4_enable_quotas+0x14c/0x300
  __ext4_fill_super+0x31cc/0x32c0
  ext4_fill_super+0x115/0x2d0
  get_tree_bdev+0x1d2/0x360
  ext4_get_tree+0x19/0x30
  vfs_get_tree+0x26/0xe0
  path_mount+0x81d/0xfc0
  do_mount+0x8d/0xc0
  __x64_sys_mount+0xc0/0x160
  do_syscall_64+0x35/0x80
  entry_SYSCALL_64_after_hwframe+0x63/0xcd
  &lt;/TASK&gt;
==================================================================

Above issue may happen as follows:
-------------------------------------
ext4_fill_super
 ext4_orphan_cleanup
  ext4_enable_quotas
   ext4_quota_enable
    ext4_iget --&gt; get error inode &lt;5&gt;
     ext4_ext_check_inode --&gt; Wrong imode makes it escape inspection
     make_bad_inode(inode) --&gt; EXT4_BOOT_LOADER_INO set imode
    dquot_load_quota_inode
     vfs_setup_quota_inode --&gt; check pass
     dquot_load_quota_sb
      v2_check_quota_file
       v2_read_header
        ext4_quota_read
         ext4_bread
          ext4_getblk
           ext4_map_blocks
            ext4_ext_map_blocks
             ext4_find_extent
              ext4_cache_extents
               ext4_es_cache_extent
                __es_tree_search.isra.0
                 ext4_es_end --&gt; Wrong extents trigger BUG_ON

In the above issue, s_usr_quota_inum is set to 5, but inode&lt;5&gt; contains
incorrect imode and disordered extents. Because 5 is EXT4_BOOT_LOADER_INO,
the ext4_ext_check_inode check in the ext4_iget function can be bypassed,
finally, the extents that are not checked trigger the BUG_ON in the
__es_tree_search function. To solve this issue, check whether the inode is
bad_inode in vfs_setup_quota_inode().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50782/">CVE-2022-50782 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50782">CVE-2022-50782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256282">SUSE bug 1256282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50783" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50783" ref_url="https://www.suse.com/security/cve/CVE-2022-50783" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: use proper req destructor for IPv6

Before, only the destructor from TCP request sock in IPv4 was called
even if the subflow was IPv6.

It is important to use the right destructor to avoid memory leaks with
some advanced IPv6 features, e.g. when the request socks contain
specific IPv6 options.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50783/">CVE-2022-50783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50783">CVE-2022-50783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256281">SUSE bug 1256281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50784" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50784" ref_url="https://www.suse.com/security/cve/CVE-2022-50784" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone

If cloning the SKB fails, don't try to use it, but rather return
as if we should pass it.

Coverity CID: 1503456
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50784/">CVE-2022-50784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50784">CVE-2022-50784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256266">SUSE bug 1256266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50809" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50809" ref_url="https://www.suse.com/security/cve/CVE-2022-50809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: dbc: Fix memory leak in xhci_alloc_dbc()

If DbC is already in use, then the allocated memory for the xhci_dbc struct
doesn't get freed before returning NULL, which leads to a memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50809/">CVE-2022-50809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50809">CVE-2022-50809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256250">SUSE bug 1256250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50811" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50811" ref_url="https://www.suse.com/security/cve/CVE-2022-50811" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix missing unmap if z_erofs_get_extent_compressedlen() fails

Otherwise, meta buffers could be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50811/">CVE-2022-50811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50811">CVE-2022-50811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256252">SUSE bug 1256252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50816" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50816" ref_url="https://www.suse.com/security/cve/CVE-2022-50816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: ensure sane device mtu in tunnels

Another syzbot report [1] with no reproducer hints
at a bug in ip6_gre tunnel (dev:ip6gretap0)

Since ipv6 mcast code makes sure to read dev-&gt;mtu once
and applies a sanity check on it (see commit b9b312a7a451
"ipv6: mcast: better catch silly mtu values"), a remaining
possibility is that a layer is able to set dev-&gt;mtu to
an underflowed value (high order bit set).

This could happen indeed in ip6gre_tnl_link_config_route(),
ip6_tnl_link_config() and ipip6_tunnel_bind_dev()

Make sure to sanitize mtu value in a local variable before
it is written once on dev-&gt;mtu, as lockless readers could
catch wrong temporary value.

[1]
skbuff: skb_over_panic: text:ffff80000b7a2f38 len:40 put:40 head:ffff000149dcf200 data:ffff000149dcf2b0 tail:0xd8 end:0xc0 dev:ip6gretap0
------------[ cut here ]------------
kernel BUG at net/core/skbuff.c:120
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 1 PID: 10241 Comm: kworker/1:1 Not tainted 6.0.0-rc7-syzkaller-18095-gbbed346d5a96 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/30/2022
Workqueue: mld mld_ifc_work
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : skb_panic+0x4c/0x50 net/core/skbuff.c:116
lr : skb_panic+0x4c/0x50 net/core/skbuff.c:116
sp : ffff800020dd3b60
x29: ffff800020dd3b70 x28: 0000000000000000 x27: ffff00010df2a800
x26: 00000000000000c0 x25: 00000000000000b0 x24: ffff000149dcf200
x23: 00000000000000c0 x22: 00000000000000d8 x21: ffff80000b7a2f38
x20: ffff00014c2f7800 x19: 0000000000000028 x18: 00000000000001a9
x17: 0000000000000000 x16: ffff80000db49158 x15: ffff000113bf1a80
x14: 0000000000000000 x13: 00000000ffffffff x12: ffff000113bf1a80
x11: ff808000081c0d5c x10: 0000000000000000 x9 : 73f125dc5c63ba00
x8 : 73f125dc5c63ba00 x7 : ffff800008161d1c x6 : 0000000000000000
x5 : 0000000000000080 x4 : 0000000000000001 x3 : 0000000000000000
x2 : ffff0001fefddcd0 x1 : 0000000100000000 x0 : 0000000000000089
Call trace:
skb_panic+0x4c/0x50 net/core/skbuff.c:116
skb_over_panic net/core/skbuff.c:125 [inline]
skb_put+0xd4/0xdc net/core/skbuff.c:2049
ip6_mc_hdr net/ipv6/mcast.c:1714 [inline]
mld_newpack+0x14c/0x270 net/ipv6/mcast.c:1765
add_grhead net/ipv6/mcast.c:1851 [inline]
add_grec+0xa20/0xae0 net/ipv6/mcast.c:1989
mld_send_cr+0x438/0x5a8 net/ipv6/mcast.c:2115
mld_ifc_work+0x38/0x290 net/ipv6/mcast.c:2653
process_one_work+0x2d8/0x504 kernel/workqueue.c:2289
worker_thread+0x340/0x610 kernel/workqueue.c:2436
kthread+0x12c/0x158 kernel/kthread.c:376
ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:860
Code: 91011400 aa0803e1 a90027ea 94373093 (d4210000)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50816/">CVE-2022-50816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50816">CVE-2022-50816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256038">SUSE bug 1256038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50817" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50817" ref_url="https://www.suse.com/security/cve/CVE-2022-50817" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hsr: avoid possible NULL deref in skb_clone()

syzbot got a crash [1] in skb_clone(), caused by a bug
in hsr_get_untagged_frame().

When/if create_stripped_skb_hsr() returns NULL, we must
not attempt to call skb_clone().

While we are at it, replace a WARN_ONCE() by netdev_warn_once().

[1]
general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f]
CPU: 1 PID: 754 Comm: syz-executor.0 Not tainted 6.0.0-syzkaller-02734-g0326074ff465 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022
RIP: 0010:skb_clone+0x108/0x3c0 net/core/skbuff.c:1641
Code: 93 02 00 00 49 83 7c 24 28 00 0f 85 e9 00 00 00 e8 5d 4a 29 fa 4c 8d 75 7e 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea 03 &lt;0f&gt; b6 04 02 4c 89 f2 83 e2 07 38 d0 7f 08 84 c0 0f 85 9e 01 00 00
RSP: 0018:ffffc90003ccf4e0 EFLAGS: 00010207

RAX: dffffc0000000000 RBX: ffffc90003ccf5f8 RCX: ffffc9000c24b000
RDX: 000000000000000f RSI: ffffffff8751cb13 RDI: 0000000000000000
RBP: 0000000000000000 R08: 00000000000000f0 R09: 0000000000000140
R10: fffffbfff181d972 R11: 0000000000000000 R12: ffff888161fc3640
R13: 0000000000000a20 R14: 000000000000007e R15: ffffffff8dc5f620
FS: 00007feb621e4700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007feb621e3ff8 CR3: 00000001643a9000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
hsr_get_untagged_frame+0x4e/0x610 net/hsr/hsr_forward.c:164
hsr_forward_do net/hsr/hsr_forward.c:461 [inline]
hsr_forward_skb+0xcca/0x1d50 net/hsr/hsr_forward.c:623
hsr_handle_frame+0x588/0x7c0 net/hsr/hsr_slave.c:69
__netif_receive_skb_core+0x9fe/0x38f0 net/core/dev.c:5379
__netif_receive_skb_one_core+0xae/0x180 net/core/dev.c:5483
__netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5599
netif_receive_skb_internal net/core/dev.c:5685 [inline]
netif_receive_skb+0x12f/0x8d0 net/core/dev.c:5744
tun_rx_batched+0x4ab/0x7a0 drivers/net/tun.c:1544
tun_get_user+0x2686/0x3a00 drivers/net/tun.c:1995
tun_chr_write_iter+0xdb/0x200 drivers/net/tun.c:2025
call_write_iter include/linux/fs.h:2187 [inline]
new_sync_write fs/read_write.c:491 [inline]
vfs_write+0x9e9/0xdd0 fs/read_write.c:584
ksys_write+0x127/0x250 fs/read_write.c:637
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50817/">CVE-2022-50817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50817">CVE-2022-50817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256051">SUSE bug 1256051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50819" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50819" ref_url="https://www.suse.com/security/cve/CVE-2022-50819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udmabuf: Set ubuf-&gt;sg = NULL if the creation of sg table fails

When userspace tries to map the dmabuf and if for some reason
(e.g. OOM) the creation of the sg table fails, ubuf-&gt;sg needs to be
set to NULL. Otherwise, when the userspace subsequently closes the
dmabuf fd, we'd try to erroneously free the invalid sg table from
release_udmabuf resulting in the following crash reported by syzbot:

general protection fault, probably for non-canonical address
0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 3609 Comm: syz-executor487 Not tainted
5.19.0-syzkaller-13930-g7ebfc85e2cd7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 07/22/2022
RIP: 0010:dma_unmap_sgtable include/linux/dma-mapping.h:378 [inline]
RIP: 0010:put_sg_table drivers/dma-buf/udmabuf.c:89 [inline]
RIP: 0010:release_udmabuf+0xcb/0x4f0 drivers/dma-buf/udmabuf.c:114
Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 2b 04 00 00 48 8d 7d 0c 4c
8b 63 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 14
02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 e2
RSP: 0018:ffffc900037efd30 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffffffff8cb67800 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff84ad27e0 RDI: 0000000000000000
RBP: fffffffffffffff4 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 000000000008c07c R12: ffff88801fa05000
R13: ffff888073db07e8 R14: ffff888025c25440 R15: 0000000000000000
FS:  0000555555fc4300(0000) GS:ffff8880b9a00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc1c0ce06e4 CR3: 00000000715e6000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 dma_buf_release+0x157/0x2d0 drivers/dma-buf/dma-buf.c:78
 __dentry_kill+0x42b/0x640 fs/dcache.c:612
 dentry_kill fs/dcache.c:733 [inline]
 dput+0x806/0xdb0 fs/dcache.c:913
 __fput+0x39c/0x9d0 fs/file_table.c:333
 task_work_run+0xdd/0x1a0 kernel/task_work.c:177
 ptrace_notify+0x114/0x140 kernel/signal.c:2353
 ptrace_report_syscall include/linux/ptrace.h:420 [inline]
 ptrace_report_syscall_exit include/linux/ptrace.h:482 [inline]
 syscall_exit_work kernel/entry/common.c:249 [inline]
 syscall_exit_to_user_mode_prepare+0x129/0x280 kernel/entry/common.c:276
 __syscall_exit_to_user_mode_work kernel/entry/common.c:281 [inline]
 syscall_exit_to_user_mode+0x9/0x50 kernel/entry/common.c:294
 do_syscall_64+0x42/0xb0 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fc1c0c35b6b
Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24
0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00
f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44
RSP: 002b:00007ffd78a06090 EFLAGS: 00000293 ORIG_RAX: 0000000000000003
RAX: 0000000000000000 RBX: 0000000000000007 RCX: 00007fc1c0c35b6b
RDX: 0000000020000280 RSI: 0000000040086200 RDI: 0000000000000006
RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 000000000000000c
R13: 0000000000000003 R14: 00007fc1c0cfe4a0 R15: 00007ffd78a06140
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010:dma_unmap_sgtable include/linux/dma-mapping.h:378 [inline]
RIP: 0010:put_sg_table drivers/dma-buf/udmabuf.c:89 [inline]
RIP: 0010:release_udmabuf+0xcb/0x4f0 drivers/dma-buf/udmabuf.c:114
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50819/">CVE-2022-50819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50819">CVE-2022-50819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256241">SUSE bug 1256241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50820" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50820" ref_url="https://www.suse.com/security/cve/CVE-2022-50820" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/arm_dmc620: Fix hotplug callback leak in dmc620_pmu_init()

dmc620_pmu_init() won't remove the callback added by
cpuhp_setup_state_multi() when platform_driver_register() failed. Remove
the callback by cpuhp_remove_multi_state() in fail path.

Similar to the handling of arm_ccn_init() in commit 26242b330093 ("bus:
arm-ccn: Prevent hotplug callback leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50820/">CVE-2022-50820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50820">CVE-2022-50820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256261">SUSE bug 1256261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50822" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50822" ref_url="https://www.suse.com/security/cve/CVE-2022-50822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/restrack: Release MR restrack when delete

The MR restrack also needs to be released when delete it, otherwise it
cause memory leak as the task struct won't be released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50822/">CVE-2022-50822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50822">CVE-2022-50822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256260">SUSE bug 1256260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50823" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50823" ref_url="https://www.suse.com/security/cve/CVE-2022-50823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: tegra: Fix refcount leak in tegra114_clock_init

of_find_matching_node() returns a node pointer with refcount
incremented, we should use of_node_put() on it when not need anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50823/">CVE-2022-50823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50823">CVE-2022-50823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256333">SUSE bug 1256333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50824" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50824" ref_url="https://www.suse.com/security/cve/CVE-2022-50824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: tpm_tis: Add the missed acpi_put_table() to fix memory leak

In check_acpi_tpm2(), we get the TPM2 table just to make
sure the table is there, not used after the init, so the
acpi_put_table() should be added to release the ACPI memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50824/">CVE-2022-50824 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50824">CVE-2022-50824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256334">SUSE bug 1256334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50825" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50825" ref_url="https://www.suse.com/security/cve/CVE-2022-50825" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: wusb3801: fix fwnode refcount leak in wusb3801_probe()

I got the following report while doing fault injection test:

  OF: ERROR: memory leak, expected refcount 1 instead of 4,
  of_node_get()/of_node_put() unbalanced - destroy cset entry:
  attach overlay node /i2c/tcpc@60/connector

If wusb3801_hw_init() fails, fwnode_handle_put() needs be called to
avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50825/">CVE-2022-50825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50825">CVE-2022-50825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256227">SUSE bug 1256227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50829</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50829" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50829" ref_url="https://www.suse.com/security/cve/CVE-2022-50829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: hif_usb: Fix use-after-free in ath9k_hif_usb_reg_in_cb()

It is possible that skb is freed in ath9k_htc_rx_msg(), then
usb_submit_urb() fails and we try to free skb again. It causes
use-after-free bug. Moreover, if alloc_skb() fails, urb-&gt;context becomes
NULL but rx_buf is not freed and there can be a memory leak.

The patch removes unnecessary nskb and makes skb processing more clear: it
is supposed that ath9k_htc_rx_msg() either frees old skb or passes its
managing to another callback function.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-50829/">CVE-2022-50829 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50829">CVE-2022-50829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256235">SUSE bug 1256235</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50832</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50832" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50832" ref_url="https://www.suse.com/security/cve/CVE-2022-50832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: fix potential memory leak in wilc_mac_xmit()

The wilc_mac_xmit() returns NETDEV_TX_OK without freeing skb, add
dev_kfree_skb() to fix it. Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50832/">CVE-2022-50832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50832">CVE-2022-50832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256228">SUSE bug 1256228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50833</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50833" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50833" ref_url="https://www.suse.com/security/cve/CVE-2022-50833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: use hdev-&gt;workqueue when queuing hdev-&gt;{cmd,ncmd}_timer works

syzbot is reporting attempt to schedule hdev-&gt;cmd_work work from system_wq
WQ into hdev-&gt;workqueue WQ which is under draining operation [1], for
commit c8efcc2589464ac7 ("workqueue: allow chained queueing during
destruction") does not allow such operation.

The check introduced by commit 877afadad2dce8aa ("Bluetooth: When HCI work
queue is drained, only queue chained work") was incomplete.

Use hdev-&gt;workqueue WQ when queuing hdev-&gt;{cmd,ncmd}_timer works because
hci_{cmd,ncmd}_timeout() calls queue_work(hdev-&gt;workqueue). Also, protect
the queuing operation with RCU read lock in order to avoid calling
queue_delayed_work() after cancel_delayed_work() completed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50833/">CVE-2022-50833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50833">CVE-2022-50833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256218">SUSE bug 1256218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50835" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50835" ref_url="https://www.suse.com/security/cve/CVE-2022-50835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: add miss release buffer head in fc_do_one_pass()

In fc_do_one_pass() miss release buffer head after use which will lead
to reference count leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50835/">CVE-2022-50835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50835">CVE-2022-50835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256220">SUSE bug 1256220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50839" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50839" ref_url="https://www.suse.com/security/cve/CVE-2022-50839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: fix potential buffer head reference count leak

As in 'jbd2_fc_wait_bufs' if buffer isn't uptodate, will return -EIO without
update 'journal-&gt;j_fc_off'. But 'jbd2_fc_release_bufs' will release buffer head
from 'j_fc_off - 1' if 'bh' is NULL will terminal release which will lead to
buffer head buffer head reference count leak.
To solve above issue, update 'journal-&gt;j_fc_off' before return -EIO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50839/">CVE-2022-50839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50839">CVE-2022-50839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256206">SUSE bug 1256206</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50842</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50842" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50842" ref_url="https://www.suse.com/security/cve/CVE-2022-50842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/virtio: Check whether transferred 2D BO is shmem

Transferred 2D BO always must be a shmem BO. Add check for that to prevent
NULL dereference if userspace passes a VRAM BO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50842/">CVE-2022-50842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50842">CVE-2022-50842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256202">SUSE bug 1256202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50843" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50843" ref_url="https://www.suse.com/security/cve/CVE-2022-50843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm clone: Fix UAF in clone_dtr()

Dm_clone also has the same UAF problem when dm_resume()
and dm_destroy() are concurrent.

Therefore, cancelling timer again in clone_dtr().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50843/">CVE-2022-50843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50843">CVE-2022-50843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256203">SUSE bug 1256203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50844" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50844" ref_url="https://www.suse.com/security/cve/CVE-2022-50844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback

With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),
indirect call targets are validated against the expected function
pointer prototype to make sure the call target is valid to help mitigate
ROP attacks. If they are not identical, there is a failure at run time,
which manifests as either a kernel panic or thread getting killed. A
proposed warning in clang aims to catch these at compile time, which
reveals:

  drivers/gpu/drm/amd/amdgpu/../pm/swsmu/amdgpu_smu.c:3008:29: error: incompatible function pointer types initializing 'int (*)(void *, uint32_t, long *, uint32_t)' (aka 'int (*)(void *, unsigned int, long *, unsigned int)') with an expression of type 'int (void *, enum PP_OD_DPM_TABLE_COMMAND, long *, uint32_t)' (aka 'int (void *, enum PP_OD_DPM_TABLE_COMMAND, long *, unsigned int)') [-Werror,-Wincompatible-function-pointer-types-strict]
          .odn_edit_dpm_table      = smu_od_edit_dpm_table,
                                     ^~~~~~~~~~~~~~~~~~~~~
  1 error generated.

There are only two implementations of -&gt;odn_edit_dpm_table() in 'struct
amd_pm_funcs': smu_od_edit_dpm_table() and pp_odn_edit_dpm_table(). One
has a second parameter type of 'enum PP_OD_DPM_TABLE_COMMAND' and the
other uses 'u32'. Ultimately, smu_od_edit_dpm_table() calls
-&gt;od_edit_dpm_table() from 'struct pptable_funcs' and
pp_odn_edit_dpm_table() calls -&gt;odn_edit_dpm_table() from 'struct
pp_hwmgr_func', which both have a second parameter type of 'enum
PP_OD_DPM_TABLE_COMMAND'.

Update the type parameter in both the prototype in 'struct amd_pm_funcs'
and pp_odn_edit_dpm_table() to 'enum PP_OD_DPM_TABLE_COMMAND', which
cleans up the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50844/">CVE-2022-50844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50844">CVE-2022-50844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256205">SUSE bug 1256205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50845</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50845" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50845" ref_url="https://www.suse.com/security/cve/CVE-2022-50845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix inode leak in ext4_xattr_inode_create() on an error path

There is issue as follows when do setxattr with inject fault:

[localhost]# fsck.ext4  -fn  /dev/sda
e2fsck 1.46.6-rc1 (12-Sep-2022)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Unattached zero-length inode 15.  Clear? no

Unattached inode 15
Connect to /lost+found? no

Pass 5: Checking group summary information

/dev/sda: ********** WARNING: Filesystem still has errors **********

/dev/sda: 15/655360 files (0.0% non-contiguous), 66755/2621440 blocks

This occurs in 'ext4_xattr_inode_create()'. If 'ext4_mark_inode_dirty()'
fails, dropping i_nlink of the inode is needed. Or will lead to inode leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50845/">CVE-2022-50845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50845">CVE-2022-50845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256196">SUSE bug 1256196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50847</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50847" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50847" ref_url="https://www.suse.com/security/cve/CVE-2022-50847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/bridge: it6505: Initialize AUX channel in it6505_i2c_probe

During device boot, the HPD interrupt could be triggered before the DRM
subsystem registers it6505 as a DRM bridge. In such cases, the driver
tries to access AUX channel and causes NULL pointer dereference.
Initializing the AUX channel earlier to prevent such error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50847/">CVE-2022-50847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50847">CVE-2022-50847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256198">SUSE bug 1256198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50855" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50855" ref_url="https://www.suse.com/security/cve/CVE-2022-50855" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: prevent leak of lsm program after failed attach

In [0], we added the ability to bpf_prog_attach LSM programs to cgroups,
but in our validation to make sure the prog is meant to be attached to
BPF_LSM_CGROUP, we return too early if the check fails. This results in
lack of decrementing prog's refcnt (through bpf_prog_put)
leaving the LSM program alive past the point of the expected lifecycle.
This fix allows for the decrement to take place.

[0] https://lore.kernel.org/all/20220628174314.1216643-4-sdf@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50855/">CVE-2022-50855 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50855">CVE-2022-50855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256180">SUSE bug 1256180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50856" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50856" ref_url="https://www.suse.com/security/cve/CVE-2022-50856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix xid leak in cifs_ses_add_channel()

Before return, should free the xid, otherwise, the
xid will be leaked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50856/">CVE-2022-50856 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50856">CVE-2022-50856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256182">SUSE bug 1256182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50861" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50861" ref_url="https://www.suse.com/security/cve/CVE-2022-50861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Finish converting the NFSv2 GETACL result encoder

The xdr_stream conversion inadvertently left some code that set the
page_len of the send buffer. The XDR stream encoders should handle
this automatically now.

This oversight adds garbage past the end of the Reply message.
Clients typically ignore the garbage, but NFSD does not need to send
it, as it leaks stale memory contents onto the wire.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50861/">CVE-2022-50861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50861">CVE-2022-50861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256177">SUSE bug 1256177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50862" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50862" ref_url="https://www.suse.com/security/cve/CVE-2022-50862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: prevent decl_tag from being referenced in func_proto

Syzkaller was able to hit the following issue:

------------[ cut here ]------------
WARNING: CPU: 0 PID: 3609 at kernel/bpf/btf.c:1946
btf_type_id_size+0x2d5/0x9d0 kernel/bpf/btf.c:1946
Modules linked in:
CPU: 0 PID: 3609 Comm: syz-executor361 Not tainted
6.0.0-syzkaller-02734-g0326074ff465 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 09/22/2022
RIP: 0010:btf_type_id_size+0x2d5/0x9d0 kernel/bpf/btf.c:1946
Code: ef e8 7f 8e e4 ff 41 83 ff 0b 77 28 f6 44 24 10 18 75 3f e8 6d 91
e4 ff 44 89 fe bf 0e 00 00 00 e8 20 8e e4 ff e8 5b 91 e4 ff &lt;0f&gt; 0b 45
31 f6 e9 98 02 00 00 41 83 ff 12 74 18 e8 46 91 e4 ff 44
RSP: 0018:ffffc90003cefb40 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000
RDX: ffff8880259c0000 RSI: ffffffff81968415 RDI: 0000000000000005
RBP: ffff88801270ca00 R08: 0000000000000005 R09: 000000000000000e
R10: 0000000000000011 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000011 R14: ffff888026ee6424 R15: 0000000000000011
FS:  000055555641b300(0000) GS:ffff8880b9a00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000f2e258 CR3: 000000007110e000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 btf_func_proto_check kernel/bpf/btf.c:4447 [inline]
 btf_check_all_types kernel/bpf/btf.c:4723 [inline]
 btf_parse_type_sec kernel/bpf/btf.c:4752 [inline]
 btf_parse kernel/bpf/btf.c:5026 [inline]
 btf_new_fd+0x1926/0x1e70 kernel/bpf/btf.c:6892
 bpf_btf_load kernel/bpf/syscall.c:4324 [inline]
 __sys_bpf+0xb7d/0x4cf0 kernel/bpf/syscall.c:5010
 __do_sys_bpf kernel/bpf/syscall.c:5069 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5067 [inline]
 __x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:5067
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f0fbae41c69
Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89
f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01
f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc8aeb6228 EFLAGS: 00000246 ORIG_RAX: 0000000000000141
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0fbae41c69
RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012
RBP: 00007f0fbae05e10 R08: 0000000000000000 R09: 0000000000000000
R10: 00000000ffffffff R11: 0000000000000246 R12: 00007f0fbae05ea0
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Looks like it tries to create a func_proto which return type is
decl_tag. For the details, see Martin's spot on analysis in [0].

0: https://lore.kernel.org/bpf/CAKH8qBuQDLva_hHxxBuZzyAcYNO4ejhovz6TQeVSk8HY-2SO6g@mail.gmail.com/T/#mea6524b3fcd6298347432226e81b1e6155efc62c
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50862/">CVE-2022-50862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50862">CVE-2022-50862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256166">SUSE bug 1256166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50863" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50863" ref_url="https://www.suse.com/security/cve/CVE-2022-50863" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: free unused skb to prevent memory leak

This avoid potential memory leak under power saving mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50863/">CVE-2022-50863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50863">CVE-2022-50863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256339">SUSE bug 1256339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50865" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50865" ref_url="https://www.suse.com/security/cve/CVE-2022-50865" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix a signed-integer-overflow bug in tcp_add_backlog()

The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and
in tcp_add_backlog(), the variable limit is caculated by adding
sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value
of int and overflow. This patch reduces the limit budget by
halving the sndbuf to solve this issue since ACK packets are much
smaller than the payload.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50865/">CVE-2022-50865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50865">CVE-2022-50865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256168">SUSE bug 1256168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50866" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50866" ref_url="https://www.suse.com/security/cve/CVE-2022-50866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: pxa: fix null-pointer dereference in filter()

kasprintf() would return NULL pointer when kmalloc() fail to allocate.
Need to check the return pointer before calling strcmp().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50866/">CVE-2022-50866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50866">CVE-2022-50866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256162">SUSE bug 1256162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50878" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50878" ref_url="https://www.suse.com/security/cve/CVE-2022-50878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init()

A NULL check for bridge-&gt;encoder shows that it may be NULL, but it
already been dereferenced on all paths leading to the check.
812	if (!bridge-&gt;encoder) {

Dereference the pointer bridge-&gt;encoder.
810	drm_connector_attach_encoder(&amp;lt9611-&gt;connector, bridge-&gt;encoder);
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50878/">CVE-2022-50878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50878">CVE-2022-50878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256140">SUSE bug 1256140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50879" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50879" ref_url="https://www.suse.com/security/cve/CVE-2022-50879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

objtool: Fix SEGFAULT

find_insn() will return NULL in case of failure. Check insn in order
to avoid a kernel Oops for NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50879/">CVE-2022-50879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50879">CVE-2022-50879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256129">SUSE bug 1256129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50881" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50881" ref_url="https://www.suse.com/security/cve/CVE-2022-50881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()

This patch fixes a use-after-free in ath9k that occurs in
ath9k_hif_usb_disconnect() when ath9k_destroy_wmi() is trying to access
'drv_priv' that has already been freed by ieee80211_free_hw(), called by
ath9k_htc_hw_deinit(). The patch moves ath9k_destroy_wmi() before
ieee80211_free_hw(). Note that urbs from the driver should be killed
before freeing 'wmi' with ath9k_destroy_wmi() as their callbacks will
access 'wmi'.

Found by a modified version of syzkaller.

==================================================================
BUG: KASAN: use-after-free in ath9k_destroy_wmi+0x38/0x40
Read of size 8 at addr ffff8881069132a0 by task kworker/0:1/7

CPU: 0 PID: 7 Comm: kworker/0:1 Tainted: G O 5.14.0+ #131
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
Workqueue: usb_hub_wq hub_event
Call Trace:
 dump_stack_lvl+0x8e/0xd1
 print_address_description.constprop.0.cold+0x93/0x334
 ? ath9k_destroy_wmi+0x38/0x40
 ? ath9k_destroy_wmi+0x38/0x40
 kasan_report.cold+0x83/0xdf
 ? ath9k_destroy_wmi+0x38/0x40
 ath9k_destroy_wmi+0x38/0x40
 ath9k_hif_usb_disconnect+0x329/0x3f0
 ? ath9k_hif_usb_suspend+0x120/0x120
 ? usb_disable_interface+0xfc/0x180
 usb_unbind_interface+0x19b/0x7e0
 ? usb_autoresume_device+0x50/0x50
 device_release_driver_internal+0x44d/0x520
 bus_remove_device+0x2e5/0x5a0
 device_del+0x5b2/0xe30
 ? __device_link_del+0x370/0x370
 ? usb_remove_ep_devs+0x43/0x80
 ? remove_intf_ep_devs+0x112/0x1a0
 usb_disable_device+0x1e3/0x5a0
 usb_disconnect+0x267/0x870
 hub_event+0x168d/0x3950
 ? rcu_read_lock_sched_held+0xa1/0xd0
 ? hub_port_debounce+0x2e0/0x2e0
 ? check_irq_usage+0x860/0xf20
 ? drain_workqueue+0x281/0x360
 ? lock_release+0x640/0x640
 ? rcu_read_lock_sched_held+0xa1/0xd0
 ? rcu_read_lock_bh_held+0xb0/0xb0
 ? lockdep_hardirqs_on_prepare+0x273/0x3e0
 process_one_work+0x92b/0x1460
 ? pwq_dec_nr_in_flight+0x330/0x330
 ? rwlock_bug.part.0+0x90/0x90
 worker_thread+0x95/0xe00
 ? __kthread_parkme+0x115/0x1e0
 ? process_one_work+0x1460/0x1460
 kthread+0x3a1/0x480
 ? set_kthread_struct+0x120/0x120
 ret_from_fork+0x1f/0x30

The buggy address belongs to the page:
page:ffffea00041a44c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106913
flags: 0x200000000000000(node=0|zone=2)
raw: 0200000000000000 0000000000000000 dead000000000122 0000000000000000
raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 3, migratetype Unmovable, gfp_mask 0x40dc0(GFP_KERNEL|__GFP_COMP|__GFP_ZERO), pid 7, ts 38347963444, free_ts 41399957635
 prep_new_page+0x1aa/0x240
 get_page_from_freelist+0x159a/0x27c0
 __alloc_pages+0x2da/0x6a0
 alloc_pages+0xec/0x1e0
 kmalloc_order+0x39/0xf0
 kmalloc_order_trace+0x19/0x120
 __kmalloc+0x308/0x390
 wiphy_new_nm+0x6f5/0x1dd0
 ieee80211_alloc_hw_nm+0x36d/0x2230
 ath9k_htc_probe_device+0x9d/0x1e10
 ath9k_htc_hw_init+0x34/0x50
 ath9k_hif_usb_firmware_cb+0x25f/0x4e0
 request_firmware_work_func+0x131/0x240
 process_one_work+0x92b/0x1460
 worker_thread+0x95/0xe00
 kthread+0x3a1/0x480
page last free stack trace:
 free_pcp_prepare+0x3d3/0x7f0
 free_unref_page+0x1e/0x3d0
 device_release+0xa4/0x240
 kobject_put+0x186/0x4c0
 put_device+0x20/0x30
 ath9k_htc_disconnect_device+0x1cf/0x2c0
 ath9k_htc_hw_deinit+0x26/0x30
 ath9k_hif_usb_disconnect+0x2d9/0x3f0
 usb_unbind_interface+0x19b/0x7e0
 device_release_driver_internal+0x44d/0x520
 bus_remove_device+0x2e5/0x5a0
 device_del+0x5b2/0xe30
 usb_disable_device+0x1e3/0x5a0
 usb_disconnect+0x267/0x870
 hub_event+0x168d/0x3950
 process_one_work+0x92b/0x1460

Memory state around the buggy address:
 ffff888106913180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff888106913200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
&gt;ffff888
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50881/">CVE-2022-50881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50881">CVE-2022-50881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256130">SUSE bug 1256130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50882" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50882" ref_url="https://www.suse.com/security/cve/CVE-2022-50882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix memory leak in uvc_gpio_parse

Previously the unit buffer was allocated before checking the IRQ for
privacy GPIO. In case of error, the unit buffer was leaked.

Allocate the unit buffer after the IRQ to avoid it.

Addresses-Coverity-ID: 1474639 ("Resource leak")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50882/">CVE-2022-50882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50882">CVE-2022-50882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256126">SUSE bug 1256126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50883" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50883" ref_url="https://www.suse.com/security/cve/CVE-2022-50883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Prevent decl_tag from being referenced in func_proto arg

Syzkaller managed to hit another decl_tag issue:

  btf_func_proto_check kernel/bpf/btf.c:4506 [inline]
  btf_check_all_types kernel/bpf/btf.c:4734 [inline]
  btf_parse_type_sec+0x1175/0x1980 kernel/bpf/btf.c:4763
  btf_parse kernel/bpf/btf.c:5042 [inline]
  btf_new_fd+0x65a/0xb00 kernel/bpf/btf.c:6709
  bpf_btf_load+0x6f/0x90 kernel/bpf/syscall.c:4342
  __sys_bpf+0x50a/0x6c0 kernel/bpf/syscall.c:5034
  __do_sys_bpf kernel/bpf/syscall.c:5093 [inline]
  __se_sys_bpf kernel/bpf/syscall.c:5091 [inline]
  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5091
  do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48

This seems similar to commit ea68376c8bed ("bpf: prevent decl_tag from being
referenced in func_proto") but for the argument.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50883/">CVE-2022-50883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50883">CVE-2022-50883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256128">SUSE bug 1256128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50885" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50885" ref_url="https://www.suse.com/security/cve/CVE-2022-50885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when socket create failed

There is a null-ptr-deref when mount.cifs over rdma:

  BUG: KASAN: null-ptr-deref in rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]
  Read of size 8 at addr 0000000000000018 by task mount.cifs/3046

  CPU: 2 PID: 3046 Comm: mount.cifs Not tainted 6.1.0-rc5+ #62
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc3
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x34/0x44
   kasan_report+0xad/0x130
   rxe_qp_do_cleanup+0x2f3/0x360 [rdma_rxe]
   execute_in_process_context+0x25/0x90
   __rxe_cleanup+0x101/0x1d0 [rdma_rxe]
   rxe_create_qp+0x16a/0x180 [rdma_rxe]
   create_qp.part.0+0x27d/0x340
   ib_create_qp_kernel+0x73/0x160
   rdma_create_qp+0x100/0x230
   _smbd_get_connection+0x752/0x20f0
   smbd_get_connection+0x21/0x40
   cifs_get_tcp_session+0x8ef/0xda0
   mount_get_conns+0x60/0x750
   cifs_mount+0x103/0xd00
   cifs_smb3_do_mount+0x1dd/0xcb0
   smb3_get_tree+0x1d5/0x300
   vfs_get_tree+0x41/0xf0
   path_mount+0x9b3/0xdd0
   __x64_sys_mount+0x190/0x1d0
   do_syscall_64+0x35/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0

The root cause of the issue is the socket create failed in
rxe_qp_init_req().

So move the reset rxe_qp_do_cleanup() after the NULL ptr check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-50885/">CVE-2022-50885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50885">CVE-2022-50885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256122">SUSE bug 1256122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50889</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50889" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50889" ref_url="https://www.suse.com/security/cve/CVE-2022-50889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm integrity: Fix UAF in dm_integrity_dtr()

Dm_integrity also has the same UAF problem when dm_resume()
and dm_destroy() are concurrent.

Therefore, cancelling timer again in dm_integrity_dtr().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50889/">CVE-2022-50889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2022-50889">CVE-2022-50889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256056">SUSE bug 1256056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0056" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0056" ref_url="https://www.suse.com/security/cve/CVE-2023-0056" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2023:2117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2023:2119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013762.html" source="SUSE-SU"/>
    <description>
    An uncontrolled resource consumption vulnerability was discovered in HAProxy which could crash the service. This issue could allow an authenticated remote attacker to run a specially crafted malicious server in an OpenShift cluster. The biggest impact is to availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0056/">CVE-2023-0056 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0056">CVE-2023-0056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207181">SUSE bug 1207181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805495" comment="haproxy-2.4.17-3.el9_1.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0179" ref_url="https://www.suse.com/security/cve/CVE-2023-0179" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
    <description>
    A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0179/">CVE-2023-0179 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0179">CVE-2023-0179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207034">SUSE bug 1207034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207139">SUSE bug 1207139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215208">SUSE bug 1215208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805323" comment="bpftool-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805324" comment="kernel-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805325" comment="kernel-abi-stablelists-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805326" comment="kernel-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805327" comment="kernel-cross-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805328" comment="kernel-debug-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805329" comment="kernel-debug-core-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805332" comment="kernel-debug-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805333" comment="kernel-debug-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805336" comment="kernel-doc-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805337" comment="kernel-headers-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805338" comment="kernel-modules-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805339" comment="kernel-modules-extra-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805340" comment="kernel-tools-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805341" comment="kernel-tools-libs-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805343" comment="perf-5.14.0-162.18.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805344" comment="python3-perf-5.14.0-162.18.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0215" ref_url="https://www.suse.com/security/cve/CVE-2023-0215" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014009.html" source="SUSE-SU"/>
    <description>
    The public API function BIO_new_NDEF is a helper function used for streaming
ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the
SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by
end user applications.

The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter
BIO onto the front of it to form a BIO chain, and then returns the new head of
the BIO chain to the caller. Under certain conditions, for example if a CMS
recipient public key is invalid, the new filter BIO is freed and the function
returns a NULL result indicating a failure. However, in this case, the BIO chain
is not properly cleaned up and the BIO passed by the caller still retains
internal pointers to the previously freed filter BIO. If the caller then goes on
to call BIO_pop() on the BIO then a use-after-free will occur. This will most
likely result in a crash.



This scenario occurs directly in the internal function B64_write_ASN1() which
may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on
the BIO. This internal function is in turn called by the public API functions
PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,
SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7.

Other public API functions that may be impacted by this include
i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and
i2d_PKCS7_bio_stream.

The OpenSSL cms and smime command line applications are similarly affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0215/">CVE-2023-0215 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0215">CVE-2023-0215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207536">SUSE bug 1207536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213146">SUSE bug 1213146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805695" comment="edk2-ovmf-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805696" comment="edk2-tools-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805697" comment="edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0216" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0216" ref_url="https://www.suse.com/security/cve/CVE-2023-0216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
    <description>
    An invalid pointer dereference on read can be triggered when an
application tries to load malformed PKCS7 data with the
d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions.

The result of the dereference is an application crash which could
lead to a denial of service attack. The TLS implementation in OpenSSL
does not call this function however third party applications might
call these functions on untrusted data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0216/">CVE-2023-0216 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0216">CVE-2023-0216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207539">SUSE bug 1207539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0217" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0217" ref_url="https://www.suse.com/security/cve/CVE-2023-0217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
    <description>
    An invalid pointer dereference on read can be triggered when an
application tries to check a malformed DSA public key by the
EVP_PKEY_public_check() function. This will most likely lead
to an application crash. This function can be called on public
keys supplied from untrusted sources which could allow an attacker
to cause a denial of service attack.

The TLS implementation in OpenSSL does not call this function
but applications might call the function if there are additional
security requirements imposed by standards such as FIPS 140-3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0217/">CVE-2023-0217 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0217">CVE-2023-0217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207540">SUSE bug 1207540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0266</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0266" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0266" ref_url="https://www.suse.com/security/cve/CVE-2023-0266" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028530.html" source="SUSE-SU"/>
    <description>
    A use after free vulnerability exists in the ALSA PCM package in the Linux Kernel.  SNDRV_CTL_IOCTL_ELEM_{READ|WRITE}32 is missing locks that can be used in a use-after-free that can result in a priviledge escalation to gain ring0 access from the system user. We recommend upgrading past commit  56b88b50565cd8b946a2d00b0c83927b7ebb055e
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0266/">CVE-2023-0266 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0266">CVE-2023-0266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207134">SUSE bug 1207134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207190">SUSE bug 1207190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805438" comment="bpftool-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805439" comment="kernel-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805440" comment="kernel-abi-stablelists-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805441" comment="kernel-core-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805442" comment="kernel-cross-headers-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805443" comment="kernel-debug-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805444" comment="kernel-debug-core-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805447" comment="kernel-debug-modules-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805448" comment="kernel-debug-modules-extra-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805451" comment="kernel-doc-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805452" comment="kernel-headers-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805453" comment="kernel-modules-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805454" comment="kernel-modules-extra-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805455" comment="kernel-tools-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805456" comment="kernel-tools-libs-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805458" comment="perf-5.14.0-162.22.2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805459" comment="python3-perf-5.14.0-162.22.2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0286" ref_url="https://www.suse.com/security/cve/CVE-2023-0286" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7895" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001151.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7937" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0305-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014009.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14821-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RIPOSWR7VD36W5GUHTZAEDEWEJLAEQ4X/" source="SUSE-SU"/>
    <description>
    There is a type confusion vulnerability relating to X.400 address processing
inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but
the public structure definition for GENERAL_NAME incorrectly specified the type
of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by
the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an
ASN1_STRING.

When CRL checking is enabled (i.e. the application sets the
X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass
arbitrary pointers to a memcmp call, enabling them to read memory contents or
enact a denial of service. In most cases, the attack requires the attacker to
provide both the certificate chain and CRL, neither of which need to have a
valid signature. If the attacker only controls one of these inputs, the other
input must already contain an X.400 address as a CRL distribution point, which
is uncommon. As such, this vulnerability is most likely to only affect
applications which have implemented their own functionality for retrieving CRLs
over a network.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0286/">CVE-2023-0286 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0286">CVE-2023-0286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207533">SUSE bug 1207533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207569">SUSE bug 1207569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211136">SUSE bug 1211136</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211503">SUSE bug 1211503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213146">SUSE bug 1213146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214269">SUSE bug 1214269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218477">SUSE bug 1218477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218967">SUSE bug 1218967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225677">SUSE bug 1225677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984055" comment="compat-openssl11-1.1.1k-5.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805695" comment="edk2-ovmf-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805696" comment="edk2-tools-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805697" comment="edk2-tools-doc-20221207gitfff6d81270b5-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0361</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0361" ref_url="https://www.suse.com/security/cve/CVE-2023-0361" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message, the attacker would be able to decrypt the application data exchanged over that connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0361/">CVE-2023-0361 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0361">CVE-2023-0361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208143">SUSE bug 1208143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805418" comment="gnutls-3.7.6-18.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805419" comment="gnutls-c++-3.7.6-18.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805420" comment="gnutls-dane-3.7.6-18.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805421" comment="gnutls-devel-3.7.6-18.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805422" comment="gnutls-utils-3.7.6-18.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0386" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0386" ref_url="https://www.suse.com/security/cve/CVE-2023-0386" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel's OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0386/">CVE-2023-0386 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0386">CVE-2023-0386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209615">SUSE bug 1209615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210499">SUSE bug 1210499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805501" comment="bpftool-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805502" comment="kernel-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805503" comment="kernel-abi-stablelists-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805504" comment="kernel-core-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805505" comment="kernel-cross-headers-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805506" comment="kernel-debug-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805507" comment="kernel-debug-core-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805510" comment="kernel-debug-modules-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805511" comment="kernel-debug-modules-extra-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805514" comment="kernel-doc-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805515" comment="kernel-headers-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805516" comment="kernel-modules-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805517" comment="kernel-modules-extra-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805518" comment="kernel-tools-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805519" comment="kernel-tools-libs-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805521" comment="perf-5.14.0-162.23.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805522" comment="python3-perf-5.14.0-162.23.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0394" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0394" ref_url="https://www.suse.com/security/cve/CVE-2023-0394" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0394/">CVE-2023-0394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0394">CVE-2023-0394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207168">SUSE bug 1207168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0401</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0401" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0401" ref_url="https://www.suse.com/security/cve/CVE-2023-0401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013654.html" source="SUSE-SU"/>
    <description>
    A NULL pointer can be dereferenced when signatures are being
verified on PKCS7 signed or signedAndEnveloped data. In case the hash
algorithm used for the signature is known to the OpenSSL library but
the implementation of the hash algorithm is not available the digest
initialization will fail. There is a missing check for the return
value from the initialization function which later leads to invalid
usage of the digest API most likely leading to a crash.

The unavailability of an algorithm can be caused by using FIPS
enabled configuration of providers or more commonly by not loading
the legacy provider.

PKCS7 data is processed by the SMIME library calls and also by the
time stamp (TS) library calls. The TLS implementation in OpenSSL does
not call these functions however third party applications would be
affected if they call these functions to verify signatures on untrusted
data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0401/">CVE-2023-0401 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0401">CVE-2023-0401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207541">SUSE bug 1207541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210509">SUSE bug 1210509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805319" comment="openssl-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805320" comment="openssl-devel-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805321" comment="openssl-libs-3.0.1-47.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805322" comment="openssl-perl-3.0.1-47.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0430</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0430" ref_url="https://www.suse.com/security/cve/CVE-2023-0430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
    <description>
    Certificate OCSP revocation status was not checked when verifying S/Mime signatures. Mail signed with a revoked certificate would be displayed as having a valid signature. Thunderbird versions from 68 to 102.7.0 were affected by this bug. This vulnerability affects Thunderbird &lt; 102.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0430/">CVE-2023-0430 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0430">CVE-2023-0430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207858">SUSE bug 1207858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805277" comment="thunderbird-102.7.1-2.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0458" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0458" ref_url="https://www.suse.com/security/cve/CVE-2023-0458" source="SUSE CVE"/>
    <description>
    A speculative pointer dereference problem exists in the Linux Kernel on the do_prlimit() function. The resource argument value is controlled and is used in pointer arithmetic for the 'rlim' variable and can be used to leak the contents. We recommend upgrading past version 6.1.8 or commit  739790605705ddcf18f21782b9c99ad7d53a8c11
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0458/">CVE-2023-0458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0458">CVE-2023-0458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210905">SUSE bug 1210905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806723" comment="bpftool-7.0.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806724" comment="kernel-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806725" comment="kernel-abi-stablelists-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806726" comment="kernel-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806727" comment="kernel-cross-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806728" comment="kernel-debug-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806729" comment="kernel-debug-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806732" comment="kernel-debug-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806733" comment="kernel-debug-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806734" comment="kernel-debug-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806735" comment="kernel-debug-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806738" comment="kernel-doc-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806739" comment="kernel-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806740" comment="kernel-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806741" comment="kernel-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806742" comment="kernel-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806743" comment="kernel-tools-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806744" comment="kernel-tools-libs-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806746" comment="kernel-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806747" comment="perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806748" comment="python3-perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806749" comment="rtla-5.14.0-284.25.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0461" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0461" ref_url="https://www.suse.com/security/cve/CVE-2023-0461" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
    <description>
    There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS  or CONFIG_XFRM_ESPINTCP  has to be configured, but the operation does not require any privilege.

There is a use-after-free bug of icsk_ulp_data  of a struct inet_connection_sock.

When CONFIG_TLS  is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.

The setsockopt  TCP_ULP  operation does not require any privilege.

We recommend upgrading past commit  2c02d41d71f90a5168391b6a5f2954112ba2307c
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0461/">CVE-2023-0461 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0461">CVE-2023-0461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208787">SUSE bug 1208787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208911">SUSE bug 1208911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217079">SUSE bug 1217079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218514">SUSE bug 1218514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0464" ref_url="https://www.suse.com/security/cve/CVE-2023-0464" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:979-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1745-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028696.html" source="SUSE-SU"/>
    <description>
    A security vulnerability has been identified in all supported versions

of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints.  Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.

Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0464/">CVE-2023-0464 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0464">CVE-2023-0464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209624">SUSE bug 1209624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806513" comment="openssl-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806514" comment="openssl-devel-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806515" comment="openssl-libs-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806516" comment="openssl-perl-3.0.7-16.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0465" ref_url="https://www.suse.com/security/cve/CVE-2023-0465" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014557.html" source="SUSE-SU"/>
    <description>
    Applications that use a non-default option when verifying certificates may be
vulnerable to an attack from a malicious CA to circumvent certain checks.

Invalid certificate policies in leaf certificates are silently ignored by
OpenSSL and other certificate policy checks are skipped for that certificate.
A malicious CA could use this to deliberately assert invalid certificate policies
in order to circumvent policy checking on the certificate altogether.

Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-0465/">CVE-2023-0465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0465">CVE-2023-0465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209878">SUSE bug 1209878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212331">SUSE bug 1212331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215014">SUSE bug 1215014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806513" comment="openssl-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806514" comment="openssl-devel-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806515" comment="openssl-libs-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806516" comment="openssl-perl-3.0.7-16.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0466" ref_url="https://www.suse.com/security/cve/CVE-2023-0466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014520.html" source="SUSE-SU"/>
    <description>
    The function X509_VERIFY_PARAM_add0_policy() is documented to
implicitly enable the certificate policy check when doing certificate
verification. However the implementation of the function does not
enable the check which allows certificates with invalid or incorrect
policies to pass the certificate verification.

As suddenly enabling the policy check could break existing deployments it was
decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()
function.

Instead the applications that require OpenSSL to perform certificate
policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly
enable the policy check by calling X509_VERIFY_PARAM_set_flags() with
the X509_V_FLAG_POLICY_CHECK flag argument.

Certificate policy checks are disabled by default in OpenSSL and are not
commonly used by applications.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-0466/">CVE-2023-0466 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0466">CVE-2023-0466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209873">SUSE bug 1209873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806513" comment="openssl-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806514" comment="openssl-devel-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806515" comment="openssl-libs-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806516" comment="openssl-perl-3.0.7-16.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0494" ref_url="https://www.suse.com/security/cve/CVE-2023-0494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013645.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0494/">CVE-2023-0494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0494">CVE-2023-0494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207783">SUSE bug 1207783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208344">SUSE bug 1208344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209331">SUSE bug 1209331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211551">SUSE bug 1211551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805293" comment="tigervnc-1.12.0-5.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805294" comment="tigervnc-icons-1.12.0-5.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805295" comment="tigervnc-license-1.12.0-5.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805296" comment="tigervnc-selinux-1.12.0-5.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805297" comment="tigervnc-server-1.12.0-5.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805298" comment="tigervnc-server-minimal-1.12.0-5.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805299" comment="tigervnc-server-module-1.12.0-5.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805724" comment="xorg-x11-server-Xdmx-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805725" comment="xorg-x11-server-Xephyr-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805726" comment="xorg-x11-server-Xnest-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805727" comment="xorg-x11-server-Xorg-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805728" comment="xorg-x11-server-Xvfb-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805732" comment="xorg-x11-server-Xwayland-21.1.3-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805729" comment="xorg-x11-server-common-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805730" comment="xorg-x11-server-devel-1.20.11-17.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805731" comment="xorg-x11-server-source-1.20.11-17.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0547" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0547" ref_url="https://www.suse.com/security/cve/CVE-2023-0547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
    <description>
    OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0547/">CVE-2023-0547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0547">CVE-2023-0547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0567" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0567" ref_url="https://www.suse.com/security/cve/CVE-2023-0567" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013883.html" source="SUSE-SU"/>
    <description>
    In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0567/">CVE-2023-0567 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0567">CVE-2023-0567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208388">SUSE bug 1208388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844596" comment="php-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844597" comment="php-bcmath-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844598" comment="php-cli-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844599" comment="php-common-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844600" comment="php-dba-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844601" comment="php-dbg-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844602" comment="php-devel-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844603" comment="php-embedded-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844604" comment="php-enchant-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844605" comment="php-ffi-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844606" comment="php-fpm-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844607" comment="php-gd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844608" comment="php-gmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844609" comment="php-intl-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844610" comment="php-ldap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844611" comment="php-mbstring-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844612" comment="php-mysqlnd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844613" comment="php-odbc-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844614" comment="php-opcache-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844615" comment="php-pdo-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844616" comment="php-pgsql-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844617" comment="php-process-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844618" comment="php-snmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844619" comment="php-soap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844620" comment="php-xml-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0568" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0568" ref_url="https://www.suse.com/security/cve/CVE-2023-0568" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013897.html" source="SUSE-SU"/>
    <description>
    In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0568/">CVE-2023-0568 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0568">CVE-2023-0568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208366">SUSE bug 1208366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844596" comment="php-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844597" comment="php-bcmath-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844598" comment="php-cli-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844599" comment="php-common-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844600" comment="php-dba-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844601" comment="php-dbg-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844602" comment="php-devel-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844603" comment="php-embedded-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844604" comment="php-enchant-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844605" comment="php-ffi-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844606" comment="php-fpm-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844607" comment="php-gd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844608" comment="php-gmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844609" comment="php-intl-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844610" comment="php-ldap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844611" comment="php-mbstring-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844612" comment="php-mysqlnd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844613" comment="php-odbc-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844614" comment="php-opcache-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844615" comment="php-pdo-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844616" comment="php-pgsql-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844617" comment="php-process-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844618" comment="php-snmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844619" comment="php-soap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844620" comment="php-xml-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0590</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0590" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0590" ref_url="https://www.suse.com/security/cve/CVE-2023-0590" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0590/">CVE-2023-0590 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0590">CVE-2023-0590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207036">SUSE bug 1207036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207795">SUSE bug 1207795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1207822">SUSE bug 1207822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211495">SUSE bug 1211495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0597" ref_url="https://www.suse.com/security/cve/CVE-2023-0597" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0597/">CVE-2023-0597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0597">CVE-2023-0597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207845">SUSE bug 1207845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212395">SUSE bug 1212395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213271">SUSE bug 1213271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0616" ref_url="https://www.suse.com/security/cve/CVE-2023-0616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
    <description>
    If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack. This vulnerability affects Thunderbird &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-0616/">CVE-2023-0616 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0616">CVE-2023-0616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0662" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0662" ref_url="https://www.suse.com/security/cve/CVE-2023-0662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013897.html" source="SUSE-SU"/>
    <description>
    In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-0662/">CVE-2023-0662 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0662">CVE-2023-0662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208367">SUSE bug 1208367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844596" comment="php-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844597" comment="php-bcmath-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844598" comment="php-cli-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844599" comment="php-common-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844600" comment="php-dba-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844601" comment="php-dbg-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844602" comment="php-devel-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844603" comment="php-embedded-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844604" comment="php-enchant-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844605" comment="php-ffi-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844606" comment="php-fpm-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844607" comment="php-gd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844608" comment="php-gmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844609" comment="php-intl-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844610" comment="php-ldap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844611" comment="php-mbstring-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844612" comment="php-mysqlnd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844613" comment="php-odbc-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844614" comment="php-opcache-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844615" comment="php-pdo-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844616" comment="php-pgsql-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844617" comment="php-process-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844618" comment="php-snmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844619" comment="php-soap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844620" comment="php-xml-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0666" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0666" ref_url="https://www.suse.com/security/cve/CVE-2023-0666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036824.html" source="SUSE-SU"/>
    <description>
    Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0666/">CVE-2023-0666 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0666">CVE-2023-0666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211709">SUSE bug 1211709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811077" comment="wireshark-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811078" comment="wireshark-cli-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811079" comment="wireshark-devel-3.4.10-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0668" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0668" ref_url="https://www.suse.com/security/cve/CVE-2023-0668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015828.html" source="SUSE-SU"/>
    <description>
    Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0668/">CVE-2023-0668 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0668">CVE-2023-0668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211710">SUSE bug 1211710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811077" comment="wireshark-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811078" comment="wireshark-cli-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811079" comment="wireshark-devel-3.4.10-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0767" ref_url="https://www.suse.com/security/cve/CVE-2023-0767" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-February/027713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-0767/">CVE-2023-0767 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0767">CVE-2023-0767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208138">SUSE bug 1208138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213200">SUSE bug 1213200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213818">SUSE bug 1213818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214271">SUSE bug 1214271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218481">SUSE bug 1218481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218964">SUSE bug 1218964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225630">SUSE bug 1225630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805425" comment="nspr-4.34.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805426" comment="nspr-devel-4.34.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805427" comment="nss-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805428" comment="nss-devel-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805429" comment="nss-softokn-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805430" comment="nss-softokn-devel-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805431" comment="nss-softokn-freebl-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805432" comment="nss-softokn-freebl-devel-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805433" comment="nss-sysinit-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805434" comment="nss-tools-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805435" comment="nss-util-3.79.0-17.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805436" comment="nss-util-devel-3.79.0-17.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0795" ref_url="https://www.suse.com/security/cve/CVE-2023-0795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0795/">CVE-2023-0795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0795">CVE-2023-0795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208226">SUSE bug 1208226</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0796" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0796" ref_url="https://www.suse.com/security/cve/CVE-2023-0796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0796/">CVE-2023-0796 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0796">CVE-2023-0796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208227">SUSE bug 1208227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0797" ref_url="https://www.suse.com/security/cve/CVE-2023-0797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0797/">CVE-2023-0797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0797">CVE-2023-0797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208228">SUSE bug 1208228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0798" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0798" ref_url="https://www.suse.com/security/cve/CVE-2023-0798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0798/">CVE-2023-0798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0798">CVE-2023-0798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208229">SUSE bug 1208229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0799</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0799" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0799" ref_url="https://www.suse.com/security/cve/CVE-2023-0799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0799/">CVE-2023-0799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0799">CVE-2023-0799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208230">SUSE bug 1208230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0800" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0800" ref_url="https://www.suse.com/security/cve/CVE-2023-0800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0800/">CVE-2023-0800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0800">CVE-2023-0800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208231">SUSE bug 1208231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0801" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0801" ref_url="https://www.suse.com/security/cve/CVE-2023-0801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0801/">CVE-2023-0801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0801">CVE-2023-0801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208232">SUSE bug 1208232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0802" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0802" ref_url="https://www.suse.com/security/cve/CVE-2023-0802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0802/">CVE-2023-0802 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0802">CVE-2023-0802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208233">SUSE bug 1208233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0803" ref_url="https://www.suse.com/security/cve/CVE-2023-0803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0803/">CVE-2023-0803 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0803">CVE-2023-0803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208234">SUSE bug 1208234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0804" ref_url="https://www.suse.com/security/cve/CVE-2023-0804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015030.html" source="SUSE-SU"/>
    <description>
    LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 33aee127.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-0804/">CVE-2023-0804 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0804">CVE-2023-0804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208236">SUSE bug 1208236</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806470" comment="libtiff-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806471" comment="libtiff-devel-4.4.0-8.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806472" comment="libtiff-tools-4.4.0-8.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20230836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-0836</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-0836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0836" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-0836" ref_url="https://www.suse.com/security/cve/CVE-2023-0836" source="SUSE CVE"/>
    <description>
    An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 before 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitive data may be disclosed to configured FastCGI backends in an unexpected way.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-0836/">CVE-2023-0836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-0836">CVE-2023-0836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209603">SUSE bug 1209603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811090" comment="haproxy-2.4.22-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1017</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1017" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1017" ref_url="https://www.suse.com/security/cve/CVE-2023-1017" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029030.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1017/">CVE-2023-1017 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1017">CVE-2023-1017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206022">SUSE bug 1206022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805870" comment="libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1018" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1018" ref_url="https://www.suse.com/security/cve/CVE-2023-1018" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029030.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability exists in TPM2.0's Module Library allowing a 2-byte read past the end of a TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can read or access sensitive data stored in the TPM.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1018/">CVE-2023-1018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1018">CVE-2023-1018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206023">SUSE bug 1206023</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805870" comment="libtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1073</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1073" ref_url="https://www.suse.com/security/cve/CVE-2023-1073" source="SUSE CVE"/>
    <description>
    A memory corruption flaw was found in the Linux kernel's human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1073/">CVE-2023-1073 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1073">CVE-2023-1073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206784">SUSE bug 1206784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1074" ref_url="https://www.suse.com/security/cve/CVE-2023-1074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in the Linux kernel's Stream Control Transmission Protocol. This issue may occur when a user starts a malicious networking service and someone connects to this service. This could allow a local user to starve resources, causing a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1074/">CVE-2023-1074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1074">CVE-2023-1074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1206677">SUSE bug 1206677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1075" ref_url="https://www.suse.com/security/cve/CVE-2023-1075" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel. The tls_is_tx_ready() incorrectly checks for list emptiness, potentially accessing a type confused entry to the list_head, leaking the last byte of the confused field that overlaps with rec-&gt;tx_ready.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1075/">CVE-2023-1075 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1075">CVE-2023-1075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208598">SUSE bug 1208598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1076" ref_url="https://www.suse.com/security/cve/CVE-2023-1076" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1076/">CVE-2023-1076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1076">CVE-2023-1076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208599">SUSE bug 1208599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1077" ref_url="https://www.suse.com/security/cve/CVE-2023-1077" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1077/">CVE-2023-1077 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1077">CVE-2023-1077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208600">SUSE bug 1208600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208839">SUSE bug 1208839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1079" ref_url="https://www.suse.com/security/cve/CVE-2023-1079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel. A use-after-free may be triggered in asus_kbd_backlight_set when plugging/disconnecting in a malicious USB device, which advertises itself as an Asus device. Similarly to the previous known CVE-2023-25012, but in asus devices, the work_struct may be scheduled by the LED controller while the device is disconnecting, triggering a use-after-free on the struct asus_kbd_leds *led structure. A malicious USB device may exploit the issue to cause memory corruption with controlled data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1079/">CVE-2023-1079 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1079">CVE-2023-1079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208604">SUSE bug 1208604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1095" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1095" ref_url="https://www.suse.com/security/cve/CVE-2023-1095" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1095/">CVE-2023-1095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1095">CVE-2023-1095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208777">SUSE bug 1208777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1192</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1192" ref_url="https://www.suse.com/security/cve/CVE-2023-1192" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1192/">CVE-2023-1192 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1192">CVE-2023-1192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208995">SUSE bug 1208995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816058" comment="bpftool-7.2.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816059" comment="kernel-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816060" comment="kernel-abi-stablelists-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816061" comment="kernel-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816062" comment="kernel-cross-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816063" comment="kernel-debug-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816064" comment="kernel-debug-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816067" comment="kernel-debug-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816068" comment="kernel-debug-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816069" comment="kernel-debug-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816070" comment="kernel-debug-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816073" comment="kernel-doc-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816074" comment="kernel-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816075" comment="kernel-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816076" comment="kernel-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816077" comment="kernel-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816078" comment="kernel-tools-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816079" comment="kernel-tools-libs-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816081" comment="kernel-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816082" comment="libperf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816083" comment="perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816084" comment="python3-perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816085" comment="rtla-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816086" comment="rv-5.14.0-362.13.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1195" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1195" ref_url="https://www.suse.com/security/cve/CVE-2023-1195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-&gt;hostname to NULL, leading to an invalid pointer request.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1195/">CVE-2023-1195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1195">CVE-2023-1195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208971">SUSE bug 1208971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1206" ref_url="https://www.suse.com/security/cve/CVE-2023-1206" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A hash collision flaw was found in the IPv6 connection lookup table in the Linux kernel's IPv6 functionality when a user makes a new kind of SYN flood attack. A user located in the local network or with a high bandwidth connection can increase the CPU usage of the server that accepts IPV6 connections up to 95%.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1206/">CVE-2023-1206 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1206">CVE-2023-1206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212703">SUSE bug 1212703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1249</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1249" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1249" ref_url="https://www.suse.com/security/cve/CVE-2023-1249" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1249/">CVE-2023-1249 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1249">CVE-2023-1249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209039">SUSE bug 1209039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1252" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1252" ref_url="https://www.suse.com/security/cve/CVE-2023-1252" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Ext4 File System in how a user triggers several file operations simultaneously with the overlay FS usage. This flaw allows a local user to crash or potentially escalate their privileges on the system. Only if patch 9a2544037600 ("ovl: fix use after free in struct ovl_aio_req") not applied yet, the kernel could be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-1252/">CVE-2023-1252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1252">CVE-2023-1252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209045">SUSE bug 1209045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1255</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1255" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1255" ref_url="https://www.suse.com/security/cve/CVE-2023-1255" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030015.html" source="SUSE-SU"/>
    <description>
    Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM
platform contains a bug that could cause it to read past the input buffer,
leading to a crash.

Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM
platform can crash in rare circumstances. The AES-XTS algorithm is usually
used for disk encryption.

The AES-XTS cipher decryption implementation for 64 bit ARM platform will read
past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16
byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext
buffer is unmapped, this will trigger a crash which results in a denial of
service.

If an attacker can control the size and location of the ciphertext buffer
being decrypted by an application using AES-XTS on 64 bit ARM, the
application is affected. This is fairly unlikely making this issue
a Low severity one.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1255/">CVE-2023-1255 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1255">CVE-2023-1255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210714">SUSE bug 1210714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806513" comment="openssl-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806514" comment="openssl-devel-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806515" comment="openssl-libs-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806516" comment="openssl-perl-3.0.7-16.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1380</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1380" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1380" ref_url="https://www.suse.com/security/cve/CVE-2023-1380" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info-&gt;req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1380/">CVE-2023-1380 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1380">CVE-2023-1380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209287">SUSE bug 1209287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1382</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1382" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1382" ref_url="https://www.suse.com/security/cve/CVE-2023-1382" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A data race flaw was found in the Linux kernel, between where con is allocated and con-&gt;sock is set. This issue leads to a NULL pointer dereference when accessing con-&gt;sock-&gt;sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1382/">CVE-2023-1382 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1382">CVE-2023-1382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209288">SUSE bug 1209288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1393" ref_url="https://www.suse.com/security/cve/CVE-2023-1393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1716-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028536.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1393/">CVE-2023-1393 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1393">CVE-2023-1393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209543">SUSE bug 1209543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210895">SUSE bug 1210895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211551">SUSE bug 1211551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805462" comment="tigervnc-1.12.0-5.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805463" comment="tigervnc-icons-1.12.0-5.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805464" comment="tigervnc-license-1.12.0-5.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805465" comment="tigervnc-selinux-1.12.0-5.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805466" comment="tigervnc-server-1.12.0-5.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805467" comment="tigervnc-server-minimal-1.12.0-5.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805468" comment="tigervnc-server-module-1.12.0-5.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811016" comment="xorg-x11-server-Xdmx-1.20.11-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811017" comment="xorg-x11-server-Xephyr-1.20.11-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811018" comment="xorg-x11-server-Xnest-1.20.11-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811019" comment="xorg-x11-server-Xorg-1.20.11-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811020" comment="xorg-x11-server-Xvfb-1.20.11-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810782" comment="xorg-x11-server-Xwayland-22.1.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811021" comment="xorg-x11-server-common-1.20.11-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811022" comment="xorg-x11-server-devel-1.20.11-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811023" comment="xorg-x11-server-source-1.20.11-19.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1579</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1579" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1579" ref_url="https://www.suse.com/security/cve/CVE-2023-1579" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031740.html" source="SUSE-SU"/>
    <description>
    Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1579/">CVE-2023-1579 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1579">CVE-2023-1579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209642">SUSE bug 1209642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213676">SUSE bug 1213676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866683" comment="mingw-binutils-generic-2.41-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866684" comment="mingw-filesystem-base-148-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866685" comment="mingw-w64-tools-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866686" comment="mingw32-binutils-2.41-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866687" comment="mingw32-cpp-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866688" comment="mingw32-crt-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866689" comment="mingw32-filesystem-148-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866690" comment="mingw32-gcc-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866691" comment="mingw32-gcc-c++-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866692" comment="mingw32-headers-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866693" comment="mingw32-libffi-3.4.4-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866694" comment="mingw32-libgcc-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866695" comment="mingw32-libstdc++-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866696" comment="mingw32-winpthreads-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866697" comment="mingw32-winpthreads-static-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866698" comment="mingw32-zlib-1.3.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866699" comment="mingw32-zlib-static-1.3.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866700" comment="mingw64-binutils-2.41-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866701" comment="mingw64-cpp-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866702" comment="mingw64-crt-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866703" comment="mingw64-filesystem-148-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866704" comment="mingw64-gcc-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866705" comment="mingw64-gcc-c++-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866706" comment="mingw64-headers-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866707" comment="mingw64-libffi-3.4.4-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866708" comment="mingw64-libgcc-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866709" comment="mingw64-libstdc++-13.2.1-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866710" comment="mingw64-winpthreads-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866711" comment="mingw64-winpthreads-static-11.0.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866712" comment="mingw64-zlib-1.3.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866713" comment="mingw64-zlib-static-1.3.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1637</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1637" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1637" ref_url="https://www.suse.com/security/cve/CVE-2023-1637" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
    <description>
    A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-1637/">CVE-2023-1637 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1637">CVE-2023-1637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209779">SUSE bug 1209779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1652" ref_url="https://www.suse.com/security/cve/CVE-2023-1652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1652/">CVE-2023-1652 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1652">CVE-2023-1652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209788">SUSE bug 1209788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209797">SUSE bug 1209797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1667</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1667" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1667" ref_url="https://www.suse.com/security/cve/CVE-2023-1667" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1667/">CVE-2023-1667 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1667">CVE-2023-1667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211188">SUSE bug 1211188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810807" comment="libssh-0.10.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810808" comment="libssh-config-0.10.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810809" comment="libssh-devel-0.10.4-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1672" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1672" ref_url="https://www.suse.com/security/cve/CVE-2023-1672" source="SUSE CVE"/>
    <description>
    A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-1672/">CVE-2023-1672 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1672">CVE-2023-1672 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811082" comment="tang-14-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1729" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1729" ref_url="https://www.suse.com/security/cve/CVE-2023-1729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029406.html" source="SUSE-SU"/>
    <description>
    A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-1729/">CVE-2023-1729 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1729">CVE-2023-1729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210720">SUSE bug 1210720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866483" comment="LibRaw-0.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866484" comment="LibRaw-devel-0.21.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1786" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1786" ref_url="https://www.suse.com/security/cve/CVE-2023-1786" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2023:3283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041923.html" source="SUSE-SU"/>
    <description>
    Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2025-09-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1786/">CVE-2023-1786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1786">CVE-2023-1786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210277">SUSE bug 1210277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813703" comment="cloud-init-23.1.1-11.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1838</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1838" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1838" ref_url="https://www.suse.com/security/cve/CVE-2023-1838" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1838/">CVE-2023-1838 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1838">CVE-2023-1838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210203">SUSE bug 1210203</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1855" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1855" ref_url="https://www.suse.com/security/cve/CVE-2023-1855" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1855/">CVE-2023-1855 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1855">CVE-2023-1855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210202">SUSE bug 1210202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1945" ref_url="https://www.suse.com/security/cve/CVE-2023-1945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
    <description>
    Unexpected data returned from the Safe Browsing API could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 102.10 and Firefox ESR &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-1945/">CVE-2023-1945 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1945">CVE-2023-1945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1981" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1981" ref_url="https://www.suse.com/security/cve/CVE-2023-1981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1993-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1994-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028978.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call, causing the avahi daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-1981/">CVE-2023-1981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1981">CVE-2023-1981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210328">SUSE bug 1210328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811185" comment="avahi-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811186" comment="avahi-compat-howl-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811187" comment="avahi-compat-howl-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811188" comment="avahi-compat-libdns_sd-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811189" comment="avahi-compat-libdns_sd-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811190" comment="avahi-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811191" comment="avahi-glib-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811192" comment="avahi-glib-devel-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811193" comment="avahi-libs-0.8-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811194" comment="avahi-tools-0.8-15.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1989" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1989" ref_url="https://www.suse.com/security/cve/CVE-2023-1989" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in btsdio_remove in drivers\bluetooth\btsdio.c in the Linux Kernel. In this flaw, a call to btsdio_remove with an unfinished job, may cause a race problem leading to a UAF on hdev devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1989/">CVE-2023-1989 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1989">CVE-2023-1989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210336">SUSE bug 1210336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210500">SUSE bug 1210500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1998" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1998" ref_url="https://www.suse.com/security/cve/CVE-2023-1998" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line.

This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-1998/">CVE-2023-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1998">CVE-2023-1998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210506">SUSE bug 1210506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806723" comment="bpftool-7.0.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806724" comment="kernel-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806725" comment="kernel-abi-stablelists-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806726" comment="kernel-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806727" comment="kernel-cross-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806728" comment="kernel-debug-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806729" comment="kernel-debug-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806732" comment="kernel-debug-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806733" comment="kernel-debug-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806734" comment="kernel-debug-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806735" comment="kernel-debug-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806738" comment="kernel-doc-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806739" comment="kernel-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806740" comment="kernel-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806741" comment="kernel-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806742" comment="kernel-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806743" comment="kernel-tools-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806744" comment="kernel-tools-libs-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806746" comment="kernel-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806747" comment="perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806748" comment="python3-perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806749" comment="rtla-5.14.0-284.25.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20231999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-1999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-1999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-1999" ref_url="https://www.suse.com/security/cve/CVE-2023-1999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015241.html" source="SUSE-SU"/>
    <description>
    There exists a use after free/double free in libwebp. An attacker can use the  ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-1999/">CVE-2023-1999 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-1999">CVE-2023-1999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213054">SUSE bug 1213054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217159">SUSE bug 1217159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805598" comment="libwebp-1.2.0-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805599" comment="libwebp-devel-1.2.0-6.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2002" ref_url="https://www.suse.com/security/cve/CVE-2023-2002" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands, compromising the confidentiality, integrity, and availability of Bluetooth communication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2002/">CVE-2023-2002 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2002">CVE-2023-2002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210533">SUSE bug 1210533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210566">SUSE bug 1210566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806517" comment="bpftool-7.0.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806518" comment="kernel-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806519" comment="kernel-abi-stablelists-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806520" comment="kernel-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806521" comment="kernel-cross-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806522" comment="kernel-debug-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806523" comment="kernel-debug-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806526" comment="kernel-debug-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806527" comment="kernel-debug-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806528" comment="kernel-debug-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806529" comment="kernel-debug-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806532" comment="kernel-doc-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806533" comment="kernel-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806534" comment="kernel-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806535" comment="kernel-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806536" comment="kernel-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806537" comment="kernel-tools-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806538" comment="kernel-tools-libs-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806540" comment="kernel-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806541" comment="perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806542" comment="python3-perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806543" comment="rtla-5.14.0-284.18.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2008" ref_url="https://www.suse.com/security/cve/CVE-2023-2008" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's udmabuf device driver. The specific flaw exists within a fault handler. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an array. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2008/">CVE-2023-2008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2008">CVE-2023-2008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210453">SUSE bug 1210453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20569" ref_url="https://www.suse.com/security/cve/CVE-2023-20569" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14775-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLB6EQ4PQFULA6326VPRQRWW66T32SST/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/" source="SUSE-SU"/>
    <description>
    


A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.




















    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20569/">CVE-2023-20569 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20569">CVE-2023-20569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213287">SUSE bug 1213287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816058" comment="bpftool-7.2.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811138" comment="iwl100-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811139" comment="iwl1000-firmware-39.31.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811140" comment="iwl105-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811141" comment="iwl135-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811142" comment="iwl2000-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811143" comment="iwl2030-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811144" comment="iwl3160-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811145" comment="iwl5000-firmware-8.83.5.1_1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811146" comment="iwl5150-firmware-8.24.2.2-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811147" comment="iwl6000g2a-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811148" comment="iwl6000g2b-firmware-18.168.6.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811149" comment="iwl6050-firmware-41.28.5.1-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811150" comment="iwl7260-firmware-25.30.13.0-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816059" comment="kernel-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816060" comment="kernel-abi-stablelists-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816061" comment="kernel-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816062" comment="kernel-cross-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816063" comment="kernel-debug-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816064" comment="kernel-debug-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816067" comment="kernel-debug-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816068" comment="kernel-debug-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816069" comment="kernel-debug-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816070" comment="kernel-debug-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816073" comment="kernel-doc-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816074" comment="kernel-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816075" comment="kernel-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816076" comment="kernel-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816077" comment="kernel-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816078" comment="kernel-tools-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816079" comment="kernel-tools-libs-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816081" comment="kernel-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811151" comment="libertas-sd8787-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816082" comment="libperf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811152" comment="linux-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811153" comment="linux-firmware-whence-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811154" comment="netronome-firmware-20230814-140.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816083" comment="perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816084" comment="python3-perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816085" comment="rtla-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816086" comment="rv-5.14.0-362.13.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20584" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20584" ref_url="https://www.suse.com/security/cve/CVE-2023-20584" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000106.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7484" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000103.html" source="SUSE-SU"/>
    <description>
    IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-03"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N" cvss4="4/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2023-20584/">CVE-2023-20584 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20584">CVE-2023-20584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229262">SUSE bug 1229262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945415" comment="iwl100-firmware-39.31.5.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945416" comment="iwl1000-firmware-39.31.5.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945417" comment="iwl105-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945418" comment="iwl135-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945419" comment="iwl2000-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945420" comment="iwl2030-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945421" comment="iwl3160-firmware-25.30.13.0-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945422" comment="iwl5000-firmware-8.83.5.1_1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945423" comment="iwl5150-firmware-8.24.2.2-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945424" comment="iwl6000g2a-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945425" comment="iwl6000g2b-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945426" comment="iwl6050-firmware-41.28.5.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945427" comment="iwl7260-firmware-25.30.13.0-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945428" comment="libertas-sd8787-firmware-20240905-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945429" comment="linux-firmware-20240905-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945430" comment="linux-firmware-whence-20240905-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945431" comment="netronome-firmware-20240905-143.3.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20593" ref_url="https://www.suse.com/security/cve/CVE-2023-20593" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3206-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018178.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14770-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WU6USOH6Z5LBH65E37F7SXQ2ZCYMYO4C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14775-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDYBISXNIKR4JQNKOAZNM4IWBORGXDGT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14776-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5VY6LKWXFA5DZKFFJWA52HJLZ3GJXUDB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14777-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4CQIJEA5UAOBWUSUVTBHDHKQNBQURQG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14778-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3XCURBMJRRPRVU3EVKDNACDUEBSYOCK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14787-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FWMIURVH3RGSXYDDHGU2A5NU4OI3OLPB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14791-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7ILZHMVR4NNCE6NWCEPZ2BVWZXYSWRTS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14796-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JRVYJFDMGL4ZFIAYJKJTQHRR5SPMPZJ2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14797-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RLB6EQ4PQFULA6326VPRQRWW66T32SST/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14800-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XIORKETHKWBJRRYF55G3J3DL3T7QGOEL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14804-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EISBLM6MW64JFKX5G6QNSKXKI34QXKQ4/" source="SUSE-SU"/>
    <description>
    An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-20593/">CVE-2023-20593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20593">CVE-2023-20593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213286">SUSE bug 1213286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213616">SUSE bug 1213616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20867" ref_url="https://www.suse.com/security/cve/CVE-2023-20867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2604-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016067.html" source="SUSE-SU"/>
    <description>
    A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-20867/">CVE-2023-20867 at SUSE</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20867">CVE-2023-20867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212143">SUSE bug 1212143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214402">SUSE bug 1214402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804127" comment="open-vm-tools-12.1.5-1.el9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804128" comment="open-vm-tools-desktop-12.1.5-1.el9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804129" comment="open-vm-tools-devel-12.1.5-1.el9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804130" comment="open-vm-tools-salt-minion-12.1.5-1.el9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804131" comment="open-vm-tools-sdmp-12.1.5-1.el9.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804132" comment="open-vm-tools-test-12.1.5-1.el9.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202320900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-20900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-20900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20900" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-20900" ref_url="https://www.suse.com/security/cve/CVE-2023-20900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031730.html" source="SUSE-SU"/>
    <description>
    A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html   in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-20900/">CVE-2023-20900 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-20900">CVE-2023-20900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214566">SUSE bug 1214566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225628">SUSE bug 1225628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228309">SUSE bug 1228309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806901" comment="open-vm-tools-12.1.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806902" comment="open-vm-tools-desktop-12.1.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806903" comment="open-vm-tools-salt-minion-12.1.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806904" comment="open-vm-tools-sdmp-12.1.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806905" comment="open-vm-tools-test-12.1.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21102" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21102" ref_url="https://www.suse.com/security/cve/CVE-2023-21102" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In __efi_rt_asm_wrapper of efi-rt-wrapper.S, there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-21102/">CVE-2023-21102 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21102">CVE-2023-21102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212155">SUSE bug 1212155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212346">SUSE bug 1212346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2124" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2124" ref_url="https://www.suse.com/security/cve/CVE-2023-2124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2124/">CVE-2023-2124 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2124">CVE-2023-2124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210498">SUSE bug 1210498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806517" comment="bpftool-7.0.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806518" comment="kernel-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806519" comment="kernel-abi-stablelists-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806520" comment="kernel-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806521" comment="kernel-cross-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806522" comment="kernel-debug-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806523" comment="kernel-debug-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806526" comment="kernel-debug-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806527" comment="kernel-debug-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806528" comment="kernel-debug-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806529" comment="kernel-debug-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806532" comment="kernel-doc-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806533" comment="kernel-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806534" comment="kernel-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806535" comment="kernel-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806536" comment="kernel-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806537" comment="kernel-tools-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806538" comment="kernel-tools-libs-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806540" comment="kernel-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806541" comment="perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806542" comment="python3-perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806543" comment="rtla-5.14.0-284.18.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21538" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21538" ref_url="https://www.suse.com/security/cve/CVE-2023-21538" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21538/">CVE-2023-21538 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21538">CVE-2023-21538 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805119" comment="aspnetcore-runtime-6.0-6.0.13-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805120" comment="aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805121" comment="dotnet-apphost-pack-6.0-6.0.13-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805122" comment="dotnet-hostfxr-6.0-6.0.13-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805123" comment="dotnet-runtime-6.0-6.0.13-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805124" comment="dotnet-sdk-6.0-6.0.113-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805125" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.113-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805126" comment="dotnet-targeting-pack-6.0-6.0.13-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805127" comment="dotnet-templates-6.0-6.0.113-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2156" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2156" ref_url="https://www.suse.com/security/cve/CVE-2023-2156" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031544.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the networking subsystem of the Linux kernel within the handling of the RPL protocol. This issue results from the lack of proper handling of user-supplied data, which can lead to an assertion failure. This may allow an unauthenticated remote attacker to create a denial of service condition on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2156/">CVE-2023-2156 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2156">CVE-2023-2156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211131">SUSE bug 1211131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211395">SUSE bug 1211395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2166" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2166" ref_url="https://www.suse.com/security/cve/CVE-2023-2166" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2166/">CVE-2023-2166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2166">CVE-2023-2166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210627">SUSE bug 1210627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2176" ref_url="https://www.suse.com/security/cve/CVE-2023-2176" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in compare_netdev_and_ip in drivers/infiniband/core/cma.c in RDMA in the Linux Kernel. The improper cleanup results in out-of-boundary read, where a local user can utilize this problem to crash the system or escalation of privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2176/">CVE-2023-2176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2176">CVE-2023-2176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210629">SUSE bug 1210629</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210630">SUSE bug 1210630</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2177" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2177" ref_url="https://www.suse.com/security/cve/CVE-2023-2177" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2177/">CVE-2023-2177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2177">CVE-2023-2177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210643">SUSE bug 1210643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21830" ref_url="https://www.suse.com/security/cve/CVE-2023-21830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028817.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21830/">CVE-2023-21830 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21830">CVE-2023-21830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207249">SUSE bug 1207249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805174" comment="java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805175" comment="java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805176" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805177" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805178" comment="java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805179" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805180" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805181" comment="java-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805182" comment="java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805183" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805184" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805185" comment="java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805186" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805187" comment="java-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805188" comment="java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805189" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805190" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21835" ref_url="https://www.suse.com/security/cve/CVE-2023-21835" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-21835/">CVE-2023-21835 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21835">CVE-2023-21835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207246">SUSE bug 1207246</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805151" comment="java-11-openjdk-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805152" comment="java-11-openjdk-demo-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805153" comment="java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805154" comment="java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805155" comment="java-11-openjdk-devel-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805156" comment="java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805157" comment="java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805158" comment="java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805159" comment="java-11-openjdk-headless-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805160" comment="java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805161" comment="java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805162" comment="java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805163" comment="java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805164" comment="java-11-openjdk-jmods-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805165" comment="java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805166" comment="java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805167" comment="java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805168" comment="java-11-openjdk-src-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805169" comment="java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805170" comment="java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805171" comment="java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805172" comment="java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805173" comment="java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805128" comment="java-17-openjdk-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805129" comment="java-17-openjdk-demo-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805130" comment="java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805131" comment="java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805132" comment="java-17-openjdk-devel-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805133" comment="java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805134" comment="java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805135" comment="java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805136" comment="java-17-openjdk-headless-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805137" comment="java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805138" comment="java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805139" comment="java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805140" comment="java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805141" comment="java-17-openjdk-jmods-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805142" comment="java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805143" comment="java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805144" comment="java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805145" comment="java-17-openjdk-src-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805146" comment="java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805147" comment="java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805148" comment="java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805149" comment="java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805150" comment="java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21836</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21836" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21836" ref_url="https://www.suse.com/security/cve/CVE-2023-21836" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21836/">CVE-2023-21836 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21836">CVE-2023-21836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21843" ref_url="https://www.suse.com/security/cve/CVE-2023-21843" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21843/">CVE-2023-21843 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21843">CVE-2023-21843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207248">SUSE bug 1207248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805174" comment="java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805175" comment="java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805176" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805177" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805178" comment="java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805179" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805180" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805181" comment="java-1.8.0-openjdk-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805182" comment="java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805183" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805184" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805185" comment="java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805186" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805187" comment="java-1.8.0-openjdk-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805188" comment="java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805189" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805190" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b09-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805151" comment="java-11-openjdk-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805152" comment="java-11-openjdk-demo-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805153" comment="java-11-openjdk-demo-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805154" comment="java-11-openjdk-demo-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805155" comment="java-11-openjdk-devel-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805156" comment="java-11-openjdk-devel-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805157" comment="java-11-openjdk-devel-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805158" comment="java-11-openjdk-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805159" comment="java-11-openjdk-headless-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805160" comment="java-11-openjdk-headless-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805161" comment="java-11-openjdk-headless-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805162" comment="java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805163" comment="java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805164" comment="java-11-openjdk-jmods-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805165" comment="java-11-openjdk-jmods-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805166" comment="java-11-openjdk-jmods-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805167" comment="java-11-openjdk-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805168" comment="java-11-openjdk-src-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805169" comment="java-11-openjdk-src-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805170" comment="java-11-openjdk-src-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805171" comment="java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805172" comment="java-11-openjdk-static-libs-fastdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805173" comment="java-11-openjdk-static-libs-slowdebug-11.0.18.0.10-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805128" comment="java-17-openjdk-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805129" comment="java-17-openjdk-demo-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805130" comment="java-17-openjdk-demo-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805131" comment="java-17-openjdk-demo-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805132" comment="java-17-openjdk-devel-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805133" comment="java-17-openjdk-devel-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805134" comment="java-17-openjdk-devel-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805135" comment="java-17-openjdk-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805136" comment="java-17-openjdk-headless-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805137" comment="java-17-openjdk-headless-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805138" comment="java-17-openjdk-headless-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805139" comment="java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805140" comment="java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805141" comment="java-17-openjdk-jmods-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805142" comment="java-17-openjdk-jmods-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805143" comment="java-17-openjdk-jmods-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805144" comment="java-17-openjdk-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805145" comment="java-17-openjdk-src-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805146" comment="java-17-openjdk-src-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805147" comment="java-17-openjdk-src-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805148" comment="java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805149" comment="java-17-openjdk-static-libs-fastdebug-17.0.6.0.10-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805150" comment="java-17-openjdk-static-libs-slowdebug-17.0.6.0.10-3.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21863" ref_url="https://www.suse.com/security/cve/CVE-2023-21863" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21863/">CVE-2023-21863 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21863">CVE-2023-21863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21864" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21864" ref_url="https://www.suse.com/security/cve/CVE-2023-21864" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21864/">CVE-2023-21864 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21864">CVE-2023-21864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21865" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21865" ref_url="https://www.suse.com/security/cve/CVE-2023-21865" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21865/">CVE-2023-21865 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21865">CVE-2023-21865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21866" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21866" ref_url="https://www.suse.com/security/cve/CVE-2023-21866" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21866/">CVE-2023-21866 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21866">CVE-2023-21866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21867" ref_url="https://www.suse.com/security/cve/CVE-2023-21867" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21867/">CVE-2023-21867 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21867">CVE-2023-21867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21868" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21868" ref_url="https://www.suse.com/security/cve/CVE-2023-21868" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21868/">CVE-2023-21868 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21868">CVE-2023-21868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21869" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21869" ref_url="https://www.suse.com/security/cve/CVE-2023-21869" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21869/">CVE-2023-21869 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21869">CVE-2023-21869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21870" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21870" ref_url="https://www.suse.com/security/cve/CVE-2023-21870" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21870/">CVE-2023-21870 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21870">CVE-2023-21870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21871" ref_url="https://www.suse.com/security/cve/CVE-2023-21871" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21871/">CVE-2023-21871 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21871">CVE-2023-21871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21872</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21872" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21872" ref_url="https://www.suse.com/security/cve/CVE-2023-21872" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21872/">CVE-2023-21872 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21872">CVE-2023-21872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804546" comment="mysql-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804547" comment="mysql-common-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804548" comment="mysql-devel-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804549" comment="mysql-errmsg-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804550" comment="mysql-libs-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804551" comment="mysql-server-8.0.30-3.el9_0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804552" comment="mysql-test-8.0.30-3.el9_0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21873" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21873" ref_url="https://www.suse.com/security/cve/CVE-2023-21873" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21873/">CVE-2023-21873 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21873">CVE-2023-21873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207290">SUSE bug 1207290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21874</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21874" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21874" ref_url="https://www.suse.com/security/cve/CVE-2023-21874" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21874/">CVE-2023-21874 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21874">CVE-2023-21874 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21875</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21875" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21875" ref_url="https://www.suse.com/security/cve/CVE-2023-21875" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21875/">CVE-2023-21875 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21875">CVE-2023-21875 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21876</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21876" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21876" ref_url="https://www.suse.com/security/cve/CVE-2023-21876" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21876/">CVE-2023-21876 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21876">CVE-2023-21876 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21877" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21877" ref_url="https://www.suse.com/security/cve/CVE-2023-21877" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21877/">CVE-2023-21877 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21877">CVE-2023-21877 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21878" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21878" ref_url="https://www.suse.com/security/cve/CVE-2023-21878" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21878/">CVE-2023-21878 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21878">CVE-2023-21878 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21879" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21879" ref_url="https://www.suse.com/security/cve/CVE-2023-21879" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21879/">CVE-2023-21879 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21879">CVE-2023-21879 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21880" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21880" ref_url="https://www.suse.com/security/cve/CVE-2023-21880" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21880/">CVE-2023-21880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21880">CVE-2023-21880 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21881" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21881" ref_url="https://www.suse.com/security/cve/CVE-2023-21881" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21881/">CVE-2023-21881 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21881">CVE-2023-21881 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21882" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21882" ref_url="https://www.suse.com/security/cve/CVE-2023-21882" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21882/">CVE-2023-21882 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21882">CVE-2023-21882 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21883" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21883" ref_url="https://www.suse.com/security/cve/CVE-2023-21883" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21883/">CVE-2023-21883 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21883">CVE-2023-21883 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21887</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21887" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21887" ref_url="https://www.suse.com/security/cve/CVE-2023-21887" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21887/">CVE-2023-21887 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21887">CVE-2023-21887 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21911" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21911" ref_url="https://www.suse.com/security/cve/CVE-2023-21911" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21911/">CVE-2023-21911 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21911">CVE-2023-21911 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21912</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21912" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21912" ref_url="https://www.suse.com/security/cve/CVE-2023-21912" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21912/">CVE-2023-21912 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21912">CVE-2023-21912 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21913" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21913" ref_url="https://www.suse.com/security/cve/CVE-2023-21913" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21913/">CVE-2023-21913 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21913">CVE-2023-21913 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21917" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21917" ref_url="https://www.suse.com/security/cve/CVE-2023-21917" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21917/">CVE-2023-21917 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21917">CVE-2023-21917 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21919" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21919" ref_url="https://www.suse.com/security/cve/CVE-2023-21919" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21919/">CVE-2023-21919 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21919">CVE-2023-21919 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21920" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21920" ref_url="https://www.suse.com/security/cve/CVE-2023-21920" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21920/">CVE-2023-21920 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21920">CVE-2023-21920 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21929" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21929" ref_url="https://www.suse.com/security/cve/CVE-2023-21929" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21929/">CVE-2023-21929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21929">CVE-2023-21929 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21930</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21930" ref_url="https://www.suse.com/security/cve/CVE-2023-21930" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-21930/">CVE-2023-21930 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21930">CVE-2023-21930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210628">SUSE bug 1210628</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805572" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805573" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805574" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805575" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805576" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805577" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805578" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805579" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805580" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805581" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805582" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805583" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805584" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805585" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805586" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805587" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805588" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805549" comment="java-11-openjdk-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805550" comment="java-11-openjdk-demo-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805551" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805552" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805553" comment="java-11-openjdk-devel-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805554" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805555" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805556" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805557" comment="java-11-openjdk-headless-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805558" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805559" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805560" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805561" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805562" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805563" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805564" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805565" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805566" comment="java-11-openjdk-src-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805567" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805568" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805569" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805570" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805571" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805526" comment="java-17-openjdk-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805527" comment="java-17-openjdk-demo-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805528" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805529" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805530" comment="java-17-openjdk-devel-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805531" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805532" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805533" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805534" comment="java-17-openjdk-headless-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805535" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805536" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805537" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805538" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805539" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805540" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805541" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805542" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805543" comment="java-17-openjdk-src-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805544" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805545" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805546" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805547" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805548" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21933" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21933" ref_url="https://www.suse.com/security/cve/CVE-2023-21933" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21933/">CVE-2023-21933 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21933">CVE-2023-21933 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21935" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21935" ref_url="https://www.suse.com/security/cve/CVE-2023-21935" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21935/">CVE-2023-21935 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21935">CVE-2023-21935 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21937" ref_url="https://www.suse.com/security/cve/CVE-2023-21937" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21937/">CVE-2023-21937 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21937">CVE-2023-21937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210631">SUSE bug 1210631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805572" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805573" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805574" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805575" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805576" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805577" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805578" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805579" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805580" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805581" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805582" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805583" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805584" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805585" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805586" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805587" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805588" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805549" comment="java-11-openjdk-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805550" comment="java-11-openjdk-demo-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805551" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805552" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805553" comment="java-11-openjdk-devel-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805554" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805555" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805556" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805557" comment="java-11-openjdk-headless-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805558" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805559" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805560" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805561" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805562" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805563" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805564" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805565" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805566" comment="java-11-openjdk-src-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805567" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805568" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805569" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805570" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805571" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805526" comment="java-17-openjdk-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805527" comment="java-17-openjdk-demo-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805528" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805529" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805530" comment="java-17-openjdk-devel-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805531" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805532" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805533" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805534" comment="java-17-openjdk-headless-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805535" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805536" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805537" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805538" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805539" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805540" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805541" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805542" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805543" comment="java-17-openjdk-src-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805544" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805545" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805546" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805547" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805548" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21938" ref_url="https://www.suse.com/security/cve/CVE-2023-21938" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21938/">CVE-2023-21938 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21938">CVE-2023-21938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210632">SUSE bug 1210632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805572" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805573" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805574" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805575" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805576" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805577" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805578" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805579" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805580" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805581" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805582" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805583" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805584" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805585" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805586" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805587" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805588" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805549" comment="java-11-openjdk-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805550" comment="java-11-openjdk-demo-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805551" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805552" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805553" comment="java-11-openjdk-devel-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805554" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805555" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805556" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805557" comment="java-11-openjdk-headless-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805558" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805559" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805560" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805561" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805562" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805563" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805564" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805565" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805566" comment="java-11-openjdk-src-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805567" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805568" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805569" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805570" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805571" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805526" comment="java-17-openjdk-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805527" comment="java-17-openjdk-demo-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805528" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805529" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805530" comment="java-17-openjdk-devel-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805531" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805532" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805533" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805534" comment="java-17-openjdk-headless-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805535" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805536" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805537" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805538" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805539" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805540" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805541" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805542" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805543" comment="java-17-openjdk-src-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805544" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805545" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805546" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805547" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805548" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21939" ref_url="https://www.suse.com/security/cve/CVE-2023-21939" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21939/">CVE-2023-21939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21939">CVE-2023-21939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210634">SUSE bug 1210634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805572" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805573" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805574" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805575" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805576" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805577" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805578" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805579" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805580" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805581" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805582" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805583" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805584" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805585" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805586" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805587" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805588" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805549" comment="java-11-openjdk-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805550" comment="java-11-openjdk-demo-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805551" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805552" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805553" comment="java-11-openjdk-devel-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805554" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805555" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805556" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805557" comment="java-11-openjdk-headless-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805558" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805559" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805560" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805561" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805562" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805563" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805564" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805565" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805566" comment="java-11-openjdk-src-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805567" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805568" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805569" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805570" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805571" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805526" comment="java-17-openjdk-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805527" comment="java-17-openjdk-demo-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805528" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805529" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805530" comment="java-17-openjdk-devel-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805531" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805532" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805533" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805534" comment="java-17-openjdk-headless-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805535" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805536" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805537" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805538" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805539" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805540" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805541" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805542" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805543" comment="java-17-openjdk-src-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805544" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805545" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805546" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805547" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805548" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2194" ref_url="https://www.suse.com/security/cve/CVE-2023-2194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data-&gt;block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-2194/">CVE-2023-2194 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2194">CVE-2023-2194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210715">SUSE bug 1210715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806517" comment="bpftool-7.0.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806518" comment="kernel-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806519" comment="kernel-abi-stablelists-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806520" comment="kernel-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806521" comment="kernel-cross-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806522" comment="kernel-debug-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806523" comment="kernel-debug-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806526" comment="kernel-debug-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806527" comment="kernel-debug-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806528" comment="kernel-debug-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806529" comment="kernel-debug-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806532" comment="kernel-doc-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806533" comment="kernel-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806534" comment="kernel-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806535" comment="kernel-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806536" comment="kernel-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806537" comment="kernel-tools-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806538" comment="kernel-tools-libs-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806540" comment="kernel-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806541" comment="perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806542" comment="python3-perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806543" comment="rtla-5.14.0-284.18.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21940</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21940" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21940" ref_url="https://www.suse.com/security/cve/CVE-2023-21940" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21940/">CVE-2023-21940 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21940">CVE-2023-21940 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21945" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21945" ref_url="https://www.suse.com/security/cve/CVE-2023-21945" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21945/">CVE-2023-21945 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21945">CVE-2023-21945 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21946</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21946" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21946" ref_url="https://www.suse.com/security/cve/CVE-2023-21946" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21946/">CVE-2023-21946 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21946">CVE-2023-21946 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21947</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21947" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21947" ref_url="https://www.suse.com/security/cve/CVE-2023-21947" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21947/">CVE-2023-21947 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21947">CVE-2023-21947 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21953</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21953" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21953" ref_url="https://www.suse.com/security/cve/CVE-2023-21953" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21953/">CVE-2023-21953 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21953">CVE-2023-21953 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21954</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21954" ref_url="https://www.suse.com/security/cve/CVE-2023-21954" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-21954/">CVE-2023-21954 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21954">CVE-2023-21954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210635">SUSE bug 1210635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805572" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805573" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805574" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805575" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805576" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805577" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805578" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805579" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805580" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805581" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805582" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805583" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805584" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805585" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805586" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805587" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805588" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805549" comment="java-11-openjdk-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805550" comment="java-11-openjdk-demo-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805551" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805552" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805553" comment="java-11-openjdk-devel-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805554" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805555" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805556" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805557" comment="java-11-openjdk-headless-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805558" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805559" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805560" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805561" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805562" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805563" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805564" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805565" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805566" comment="java-11-openjdk-src-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805567" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805568" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805569" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805570" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805571" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805526" comment="java-17-openjdk-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805527" comment="java-17-openjdk-demo-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805528" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805529" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805530" comment="java-17-openjdk-devel-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805531" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805532" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805533" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805534" comment="java-17-openjdk-headless-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805535" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805536" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805537" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805538" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805539" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805540" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805541" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805542" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805543" comment="java-17-openjdk-src-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805544" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805545" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805546" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805547" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805548" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21955</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21955" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21955" ref_url="https://www.suse.com/security/cve/CVE-2023-21955" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21955/">CVE-2023-21955 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21955">CVE-2023-21955 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21962" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21962" ref_url="https://www.suse.com/security/cve/CVE-2023-21962" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21962/">CVE-2023-21962 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21962">CVE-2023-21962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21963</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21963" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21963" ref_url="https://www.suse.com/security/cve/CVE-2023-21963" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21963/">CVE-2023-21963 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21963">CVE-2023-21963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21966" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21966" ref_url="https://www.suse.com/security/cve/CVE-2023-21966" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21966/">CVE-2023-21966 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21966">CVE-2023-21966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21967" ref_url="https://www.suse.com/security/cve/CVE-2023-21967" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-21967/">CVE-2023-21967 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21967">CVE-2023-21967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210636">SUSE bug 1210636</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805572" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805573" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805574" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805575" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805576" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805577" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805578" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805579" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805580" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805581" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805582" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805583" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805584" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805585" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805586" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805587" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805588" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805549" comment="java-11-openjdk-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805550" comment="java-11-openjdk-demo-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805551" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805552" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805553" comment="java-11-openjdk-devel-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805554" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805555" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805556" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805557" comment="java-11-openjdk-headless-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805558" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805559" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805560" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805561" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805562" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805563" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805564" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805565" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805566" comment="java-11-openjdk-src-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805567" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805568" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805569" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805570" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805571" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805526" comment="java-17-openjdk-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805527" comment="java-17-openjdk-demo-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805528" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805529" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805530" comment="java-17-openjdk-devel-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805531" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805532" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805533" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805534" comment="java-17-openjdk-headless-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805535" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805536" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805537" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805538" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805539" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805540" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805541" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805542" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805543" comment="java-17-openjdk-src-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805544" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805545" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805546" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805547" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805548" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21968" ref_url="https://www.suse.com/security/cve/CVE-2023-21968" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1596-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2242-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031002.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-21968/">CVE-2023-21968 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21968">CVE-2023-21968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210637">SUSE bug 1210637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805572" comment="java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805573" comment="java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805574" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805575" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805576" comment="java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805577" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805578" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805579" comment="java-1.8.0-openjdk-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805580" comment="java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805581" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805582" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805583" comment="java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805584" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805585" comment="java-1.8.0-openjdk-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805586" comment="java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805587" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805588" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.372.b07-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805549" comment="java-11-openjdk-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805550" comment="java-11-openjdk-demo-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805551" comment="java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805552" comment="java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805553" comment="java-11-openjdk-devel-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805554" comment="java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805555" comment="java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805556" comment="java-11-openjdk-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805557" comment="java-11-openjdk-headless-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805558" comment="java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805559" comment="java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805560" comment="java-11-openjdk-javadoc-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805561" comment="java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805562" comment="java-11-openjdk-jmods-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805563" comment="java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805564" comment="java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805565" comment="java-11-openjdk-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805566" comment="java-11-openjdk-src-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805567" comment="java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805568" comment="java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805569" comment="java-11-openjdk-static-libs-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805570" comment="java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805571" comment="java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805526" comment="java-17-openjdk-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805527" comment="java-17-openjdk-demo-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805528" comment="java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805529" comment="java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805530" comment="java-17-openjdk-devel-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805531" comment="java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805532" comment="java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805533" comment="java-17-openjdk-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805534" comment="java-17-openjdk-headless-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805535" comment="java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805536" comment="java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805537" comment="java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805538" comment="java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805539" comment="java-17-openjdk-jmods-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805540" comment="java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805541" comment="java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805542" comment="java-17-openjdk-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805543" comment="java-17-openjdk-src-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805544" comment="java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805545" comment="java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805546" comment="java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805547" comment="java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805548" comment="java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21972</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21972" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21972" ref_url="https://www.suse.com/security/cve/CVE-2023-21972" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21972/">CVE-2023-21972 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21972">CVE-2023-21972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21976" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21976" ref_url="https://www.suse.com/security/cve/CVE-2023-21976" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21976/">CVE-2023-21976 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21976">CVE-2023-21976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21977" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21977" ref_url="https://www.suse.com/security/cve/CVE-2023-21977" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21977/">CVE-2023-21977 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21977">CVE-2023-21977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21980</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21980" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21980" ref_url="https://www.suse.com/security/cve/CVE-2023-21980" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21980/">CVE-2023-21980 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21980">CVE-2023-21980 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202321982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-21982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-21982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21982" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-21982" ref_url="https://www.suse.com/security/cve/CVE-2023-21982" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-21982/">CVE-2023-21982 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-21982">CVE-2023-21982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22005" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22005" ref_url="https://www.suse.com/security/cve/CVE-2023-22005" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22005/">CVE-2023-22005 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22005">CVE-2023-22005 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22006" ref_url="https://www.suse.com/security/cve/CVE-2023-22006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22006/">CVE-2023-22006 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22006">CVE-2023-22006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213473">SUSE bug 1213473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806587" comment="java-11-openjdk-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806588" comment="java-11-openjdk-demo-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806589" comment="java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806590" comment="java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806591" comment="java-11-openjdk-devel-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806592" comment="java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806593" comment="java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806594" comment="java-11-openjdk-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806595" comment="java-11-openjdk-headless-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806596" comment="java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806597" comment="java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806598" comment="java-11-openjdk-javadoc-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806599" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806600" comment="java-11-openjdk-jmods-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806601" comment="java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806602" comment="java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806603" comment="java-11-openjdk-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806604" comment="java-11-openjdk-src-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806605" comment="java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806606" comment="java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806607" comment="java-11-openjdk-static-libs-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806608" comment="java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806609" comment="java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806610" comment="java-17-openjdk-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806611" comment="java-17-openjdk-demo-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806612" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806613" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806614" comment="java-17-openjdk-devel-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806615" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806616" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806617" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806618" comment="java-17-openjdk-headless-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806619" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806620" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806621" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806622" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806623" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806624" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806625" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806626" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806627" comment="java-17-openjdk-src-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806628" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806629" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806630" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806631" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806632" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22007</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22007" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22007" ref_url="https://www.suse.com/security/cve/CVE-2023-22007" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22007/">CVE-2023-22007 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22007">CVE-2023-22007 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22008" ref_url="https://www.suse.com/security/cve/CVE-2023-22008" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22008/">CVE-2023-22008 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22008">CVE-2023-22008 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22015" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22015" ref_url="https://www.suse.com/security/cve/CVE-2023-22015" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22015/">CVE-2023-22015 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22015">CVE-2023-22015 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22025</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22025" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22025" ref_url="https://www.suse.com/security/cve/CVE-2023-22025" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017258.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22025/">CVE-2023-22025 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22025">CVE-2023-22025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216339">SUSE bug 1216339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807248" comment="java-17-openjdk-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807249" comment="java-17-openjdk-demo-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807250" comment="java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807251" comment="java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807252" comment="java-17-openjdk-devel-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807253" comment="java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807254" comment="java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807255" comment="java-17-openjdk-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807256" comment="java-17-openjdk-headless-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807257" comment="java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807258" comment="java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807259" comment="java-17-openjdk-javadoc-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807260" comment="java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807261" comment="java-17-openjdk-jmods-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807262" comment="java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807263" comment="java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807264" comment="java-17-openjdk-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807265" comment="java-17-openjdk-src-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807266" comment="java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807267" comment="java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807268" comment="java-17-openjdk-static-libs-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807269" comment="java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807270" comment="java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813734" comment="java-21-openjdk-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813735" comment="java-21-openjdk-demo-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813736" comment="java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813737" comment="java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813738" comment="java-21-openjdk-devel-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813739" comment="java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813740" comment="java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813741" comment="java-21-openjdk-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813742" comment="java-21-openjdk-headless-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813743" comment="java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813744" comment="java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813745" comment="java-21-openjdk-javadoc-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813746" comment="java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813747" comment="java-21-openjdk-jmods-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813748" comment="java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813749" comment="java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813750" comment="java-21-openjdk-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813751" comment="java-21-openjdk-src-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813752" comment="java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813753" comment="java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813754" comment="java-21-openjdk-static-libs-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813755" comment="java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813756" comment="java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22026" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22026" ref_url="https://www.suse.com/security/cve/CVE-2023-22026" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22026/">CVE-2023-22026 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22026">CVE-2023-22026 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22028" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22028" ref_url="https://www.suse.com/security/cve/CVE-2023-22028" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22028/">CVE-2023-22028 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22028">CVE-2023-22028 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805958" comment="mysql-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805959" comment="mysql-common-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805960" comment="mysql-devel-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805961" comment="mysql-errmsg-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805962" comment="mysql-libs-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805963" comment="mysql-server-8.0.32-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805964" comment="mysql-test-8.0.32-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2203" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2203" ref_url="https://www.suse.com/security/cve/CVE-2023-2203" source="SUSE CVE"/>
    <description>
    A flaw was found in the WebKitGTK package. An improper input validation issue may lead to a use-after-free vulnerability. This flaw allows attackers with network access to pass specially crafted web content files, causing a denial of service or arbitrary code execution. This CVE exists because of a CVE-2023-28205 security regression for the WebKitGTK package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2203/">CVE-2023-2203 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2203">CVE-2023-2203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211191">SUSE bug 1211191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805984" comment="webkit2gtk3-2.38.5-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805985" comment="webkit2gtk3-devel-2.38.5-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805986" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805987" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22032" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22032" ref_url="https://www.suse.com/security/cve/CVE-2023-22032" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22032/">CVE-2023-22032 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22032">CVE-2023-22032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22033" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22033" ref_url="https://www.suse.com/security/cve/CVE-2023-22033" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22033/">CVE-2023-22033 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22033">CVE-2023-22033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213513">SUSE bug 1213513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22036</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22036" ref_url="https://www.suse.com/security/cve/CVE-2023-22036" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22036/">CVE-2023-22036 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22036">CVE-2023-22036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213474">SUSE bug 1213474</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806587" comment="java-11-openjdk-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806588" comment="java-11-openjdk-demo-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806589" comment="java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806590" comment="java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806591" comment="java-11-openjdk-devel-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806592" comment="java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806593" comment="java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806594" comment="java-11-openjdk-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806595" comment="java-11-openjdk-headless-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806596" comment="java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806597" comment="java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806598" comment="java-11-openjdk-javadoc-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806599" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806600" comment="java-11-openjdk-jmods-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806601" comment="java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806602" comment="java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806603" comment="java-11-openjdk-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806604" comment="java-11-openjdk-src-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806605" comment="java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806606" comment="java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806607" comment="java-11-openjdk-static-libs-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806608" comment="java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806609" comment="java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806610" comment="java-17-openjdk-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806611" comment="java-17-openjdk-demo-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806612" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806613" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806614" comment="java-17-openjdk-devel-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806615" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806616" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806617" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806618" comment="java-17-openjdk-headless-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806619" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806620" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806621" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806622" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806623" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806624" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806625" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806626" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806627" comment="java-17-openjdk-src-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806628" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806629" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806630" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806631" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806632" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22038</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22038" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22038" ref_url="https://www.suse.com/security/cve/CVE-2023-22038" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22038/">CVE-2023-22038 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22038">CVE-2023-22038 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22041" ref_url="https://www.suse.com/security/cve/CVE-2023-22041" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22041/">CVE-2023-22041 at SUSE</cve>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22041">CVE-2023-22041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213475">SUSE bug 1213475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806587" comment="java-11-openjdk-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806588" comment="java-11-openjdk-demo-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806589" comment="java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806590" comment="java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806591" comment="java-11-openjdk-devel-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806592" comment="java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806593" comment="java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806594" comment="java-11-openjdk-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806595" comment="java-11-openjdk-headless-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806596" comment="java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806597" comment="java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806598" comment="java-11-openjdk-javadoc-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806599" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806600" comment="java-11-openjdk-jmods-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806601" comment="java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806602" comment="java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806603" comment="java-11-openjdk-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806604" comment="java-11-openjdk-src-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806605" comment="java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806606" comment="java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806607" comment="java-11-openjdk-static-libs-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806608" comment="java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806609" comment="java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806610" comment="java-17-openjdk-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806611" comment="java-17-openjdk-demo-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806612" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806613" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806614" comment="java-17-openjdk-devel-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806615" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806616" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806617" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806618" comment="java-17-openjdk-headless-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806619" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806620" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806621" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806622" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806623" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806624" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806625" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806626" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806627" comment="java-17-openjdk-src-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806628" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806629" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806630" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806631" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806632" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22044" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22044" ref_url="https://www.suse.com/security/cve/CVE-2023-22044" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22044/">CVE-2023-22044 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22044">CVE-2023-22044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213479">SUSE bug 1213479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806610" comment="java-17-openjdk-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806611" comment="java-17-openjdk-demo-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806612" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806613" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806614" comment="java-17-openjdk-devel-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806615" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806616" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806617" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806618" comment="java-17-openjdk-headless-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806619" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806620" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806621" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806622" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806623" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806624" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806625" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806626" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806627" comment="java-17-openjdk-src-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806628" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806629" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806630" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806631" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806632" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22045" ref_url="https://www.suse.com/security/cve/CVE-2023-22045" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031211.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22045/">CVE-2023-22045 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22045">CVE-2023-22045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213481">SUSE bug 1213481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806633" comment="java-1.8.0-openjdk-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806634" comment="java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806635" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806636" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806637" comment="java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806638" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806639" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806640" comment="java-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806641" comment="java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806642" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806643" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806644" comment="java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806645" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806646" comment="java-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806647" comment="java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806648" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806649" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806587" comment="java-11-openjdk-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806588" comment="java-11-openjdk-demo-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806589" comment="java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806590" comment="java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806591" comment="java-11-openjdk-devel-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806592" comment="java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806593" comment="java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806594" comment="java-11-openjdk-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806595" comment="java-11-openjdk-headless-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806596" comment="java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806597" comment="java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806598" comment="java-11-openjdk-javadoc-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806599" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806600" comment="java-11-openjdk-jmods-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806601" comment="java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806602" comment="java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806603" comment="java-11-openjdk-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806604" comment="java-11-openjdk-src-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806605" comment="java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806606" comment="java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806607" comment="java-11-openjdk-static-libs-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806608" comment="java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806609" comment="java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806610" comment="java-17-openjdk-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806611" comment="java-17-openjdk-demo-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806612" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806613" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806614" comment="java-17-openjdk-devel-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806615" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806616" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806617" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806618" comment="java-17-openjdk-headless-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806619" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806620" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806621" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806622" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806623" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806624" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806625" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806626" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806627" comment="java-17-openjdk-src-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806628" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806629" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806630" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806631" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806632" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22046" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22046" ref_url="https://www.suse.com/security/cve/CVE-2023-22046" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22046/">CVE-2023-22046 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22046">CVE-2023-22046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22048" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22048" ref_url="https://www.suse.com/security/cve/CVE-2023-22048" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22048/">CVE-2023-22048 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22048">CVE-2023-22048 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22049" ref_url="https://www.suse.com/security/cve/CVE-2023-22049" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031211.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22049/">CVE-2023-22049 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22049">CVE-2023-22049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213482">SUSE bug 1213482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806633" comment="java-1.8.0-openjdk-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806634" comment="java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806635" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806636" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806637" comment="java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806638" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806639" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806640" comment="java-1.8.0-openjdk-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806641" comment="java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806642" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806643" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806644" comment="java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806645" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806646" comment="java-1.8.0-openjdk-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806647" comment="java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806648" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806649" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.382.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806587" comment="java-11-openjdk-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806588" comment="java-11-openjdk-demo-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806589" comment="java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806590" comment="java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806591" comment="java-11-openjdk-devel-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806592" comment="java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806593" comment="java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806594" comment="java-11-openjdk-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806595" comment="java-11-openjdk-headless-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806596" comment="java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806597" comment="java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806598" comment="java-11-openjdk-javadoc-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806599" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806600" comment="java-11-openjdk-jmods-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806601" comment="java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806602" comment="java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806603" comment="java-11-openjdk-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806604" comment="java-11-openjdk-src-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806605" comment="java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806606" comment="java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806607" comment="java-11-openjdk-static-libs-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806608" comment="java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806609" comment="java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806610" comment="java-17-openjdk-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806611" comment="java-17-openjdk-demo-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806612" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806613" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806614" comment="java-17-openjdk-devel-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806615" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806616" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806617" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806618" comment="java-17-openjdk-headless-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806619" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806620" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806621" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806622" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806623" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806624" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806625" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806626" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806627" comment="java-17-openjdk-src-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806628" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806629" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806630" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806631" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806632" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22053" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22053" ref_url="https://www.suse.com/security/cve/CVE-2023-22053" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22053/">CVE-2023-22053 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22053">CVE-2023-22053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22054</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22054" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22054" ref_url="https://www.suse.com/security/cve/CVE-2023-22054" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22054/">CVE-2023-22054 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22054">CVE-2023-22054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22056" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22056" ref_url="https://www.suse.com/security/cve/CVE-2023-22056" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22056/">CVE-2023-22056 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22056">CVE-2023-22056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22057" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22057" ref_url="https://www.suse.com/security/cve/CVE-2023-22057" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22057/">CVE-2023-22057 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22057">CVE-2023-22057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22058" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22058" ref_url="https://www.suse.com/security/cve/CVE-2023-22058" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22058/">CVE-2023-22058 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22058">CVE-2023-22058 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22059" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22059" ref_url="https://www.suse.com/security/cve/CVE-2023-22059" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22059/">CVE-2023-22059 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22059">CVE-2023-22059 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22064" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22064" ref_url="https://www.suse.com/security/cve/CVE-2023-22064" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22064/">CVE-2023-22064 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22064">CVE-2023-22064 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22065</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22065" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22065" ref_url="https://www.suse.com/security/cve/CVE-2023-22065" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22065/">CVE-2023-22065 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22065">CVE-2023-22065 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22066" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22066" ref_url="https://www.suse.com/security/cve/CVE-2023-22066" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22066/">CVE-2023-22066 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22066">CVE-2023-22066 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22067</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22067" ref_url="https://www.suse.com/security/cve/CVE-2023-22067" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017258.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-22067/">CVE-2023-22067 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22067">CVE-2023-22067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216379">SUSE bug 1216379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807189" comment="java-1.8.0-openjdk-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807190" comment="java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807191" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807192" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807193" comment="java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807194" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807195" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807196" comment="java-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807197" comment="java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807198" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807199" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807200" comment="java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807201" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807202" comment="java-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807203" comment="java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807204" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807205" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22068" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22068" ref_url="https://www.suse.com/security/cve/CVE-2023-22068" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22068/">CVE-2023-22068 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22068">CVE-2023-22068 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22070" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22070" ref_url="https://www.suse.com/security/cve/CVE-2023-22070" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22070/">CVE-2023-22070 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22070">CVE-2023-22070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22078" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22078" ref_url="https://www.suse.com/security/cve/CVE-2023-22078" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22078/">CVE-2023-22078 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22078">CVE-2023-22078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22079" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22079" ref_url="https://www.suse.com/security/cve/CVE-2023-22079" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22079/">CVE-2023-22079 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22079">CVE-2023-22079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22081" ref_url="https://www.suse.com/security/cve/CVE-2023-22081" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017258.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-22081/">CVE-2023-22081 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22081">CVE-2023-22081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216374">SUSE bug 1216374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807189" comment="java-1.8.0-openjdk-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807190" comment="java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807191" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807192" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807193" comment="java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807194" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807195" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807196" comment="java-1.8.0-openjdk-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807197" comment="java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807198" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807199" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807200" comment="java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807201" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807202" comment="java-1.8.0-openjdk-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807203" comment="java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807204" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807205" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.392.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807214" comment="java-11-openjdk-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807215" comment="java-11-openjdk-demo-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807216" comment="java-11-openjdk-demo-fastdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807217" comment="java-11-openjdk-demo-slowdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807218" comment="java-11-openjdk-devel-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807219" comment="java-11-openjdk-devel-fastdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807220" comment="java-11-openjdk-devel-slowdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807221" comment="java-11-openjdk-fastdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807222" comment="java-11-openjdk-headless-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807223" comment="java-11-openjdk-headless-fastdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807224" comment="java-11-openjdk-headless-slowdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807225" comment="java-11-openjdk-javadoc-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807226" comment="java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807227" comment="java-11-openjdk-jmods-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807228" comment="java-11-openjdk-jmods-fastdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807229" comment="java-11-openjdk-jmods-slowdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807230" comment="java-11-openjdk-slowdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807231" comment="java-11-openjdk-src-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807232" comment="java-11-openjdk-src-fastdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807233" comment="java-11-openjdk-src-slowdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807234" comment="java-11-openjdk-static-libs-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807235" comment="java-11-openjdk-static-libs-fastdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807236" comment="java-11-openjdk-static-libs-slowdebug-11.0.21.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807248" comment="java-17-openjdk-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807249" comment="java-17-openjdk-demo-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807250" comment="java-17-openjdk-demo-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807251" comment="java-17-openjdk-demo-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807252" comment="java-17-openjdk-devel-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807253" comment="java-17-openjdk-devel-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807254" comment="java-17-openjdk-devel-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807255" comment="java-17-openjdk-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807256" comment="java-17-openjdk-headless-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807257" comment="java-17-openjdk-headless-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807258" comment="java-17-openjdk-headless-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807259" comment="java-17-openjdk-javadoc-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807260" comment="java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807261" comment="java-17-openjdk-jmods-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807262" comment="java-17-openjdk-jmods-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807263" comment="java-17-openjdk-jmods-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807264" comment="java-17-openjdk-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807265" comment="java-17-openjdk-src-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807266" comment="java-17-openjdk-src-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807267" comment="java-17-openjdk-src-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807268" comment="java-17-openjdk-static-libs-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807269" comment="java-17-openjdk-static-libs-fastdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807270" comment="java-17-openjdk-static-libs-slowdebug-17.0.9.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813734" comment="java-21-openjdk-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813735" comment="java-21-openjdk-demo-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813736" comment="java-21-openjdk-demo-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813737" comment="java-21-openjdk-demo-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813738" comment="java-21-openjdk-devel-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813739" comment="java-21-openjdk-devel-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813740" comment="java-21-openjdk-devel-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813741" comment="java-21-openjdk-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813742" comment="java-21-openjdk-headless-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813743" comment="java-21-openjdk-headless-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813744" comment="java-21-openjdk-headless-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813745" comment="java-21-openjdk-javadoc-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813746" comment="java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813747" comment="java-21-openjdk-jmods-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813748" comment="java-21-openjdk-jmods-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813749" comment="java-21-openjdk-jmods-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813750" comment="java-21-openjdk-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813751" comment="java-21-openjdk-src-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813752" comment="java-21-openjdk-src-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813753" comment="java-21-openjdk-src-slowdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813754" comment="java-21-openjdk-static-libs-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813755" comment="java-21-openjdk-static-libs-fastdebug-21.0.1.0.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813756" comment="java-21-openjdk-static-libs-slowdebug-21.0.1.0.12-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22084" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22084" ref_url="https://www.suse.com/security/cve/CVE-2023-22084" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0739" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002085.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035550.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22084/">CVE-2023-22084 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22084">CVE-2023-22084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217405">SUSE bug 1217405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009962406" comment="galera-26.4.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962407" comment="mariadb-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962408" comment="mariadb-backup-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962409" comment="mariadb-common-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962410" comment="mariadb-devel-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962411" comment="mariadb-embedded-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962412" comment="mariadb-embedded-devel-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962413" comment="mariadb-errmsg-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962414" comment="mariadb-gssapi-server-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962415" comment="mariadb-oqgraph-engine-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962416" comment="mariadb-pam-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962417" comment="mariadb-server-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962418" comment="mariadb-server-galera-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962419" comment="mariadb-server-utils-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962420" comment="mariadb-test-10.5.27-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22092" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22092" ref_url="https://www.suse.com/security/cve/CVE-2023-22092" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22092/">CVE-2023-22092 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22092">CVE-2023-22092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22097" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22097" ref_url="https://www.suse.com/security/cve/CVE-2023-22097" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22097/">CVE-2023-22097 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22097">CVE-2023-22097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22103</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22103" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22103" ref_url="https://www.suse.com/security/cve/CVE-2023-22103" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22103/">CVE-2023-22103 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22103">CVE-2023-22103 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22104" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22104" ref_url="https://www.suse.com/security/cve/CVE-2023-22104" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22104/">CVE-2023-22104 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22104">CVE-2023-22104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22110" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22110" ref_url="https://www.suse.com/security/cve/CVE-2023-22110" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22110/">CVE-2023-22110 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22110">CVE-2023-22110 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22111" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22111" ref_url="https://www.suse.com/security/cve/CVE-2023-22111" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22111/">CVE-2023-22111 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22111">CVE-2023-22111 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22112" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22112" ref_url="https://www.suse.com/security/cve/CVE-2023-22112" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22112/">CVE-2023-22112 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22112">CVE-2023-22112 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22113" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22113" ref_url="https://www.suse.com/security/cve/CVE-2023-22113" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22113/">CVE-2023-22113 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22113">CVE-2023-22113 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22114</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22114" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22114" ref_url="https://www.suse.com/security/cve/CVE-2023-22114" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22114/">CVE-2023-22114 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22114">CVE-2023-22114 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22115</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22115" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22115" ref_url="https://www.suse.com/security/cve/CVE-2023-22115" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-22115/">CVE-2023-22115 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22115">CVE-2023-22115 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2235" ref_url="https://www.suse.com/security/cve/CVE-2023-2235" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.

The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but  remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.

We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2235/">CVE-2023-2235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2235">CVE-2023-2235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210986">SUSE bug 1210986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210987">SUSE bug 1210987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806517" comment="bpftool-7.0.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806518" comment="kernel-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806519" comment="kernel-abi-stablelists-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806520" comment="kernel-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806521" comment="kernel-cross-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806522" comment="kernel-debug-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806523" comment="kernel-debug-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806526" comment="kernel-debug-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806527" comment="kernel-debug-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806528" comment="kernel-debug-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806529" comment="kernel-debug-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806532" comment="kernel-doc-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806533" comment="kernel-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806534" comment="kernel-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806535" comment="kernel-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806536" comment="kernel-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806537" comment="kernel-tools-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806538" comment="kernel-tools-libs-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806540" comment="kernel-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806541" comment="perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806542" comment="python3-perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806543" comment="rtla-5.14.0-284.18.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22490" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22490" ref_url="https://www.suse.com/security/cve/CVE-2023-22490" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013770.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Using a specially-crafted repository, Git prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8 can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source `$GIT_DIR/objects` directory contains symbolic links, the `objects` directory itself may still be a symbolic link. These two may be combined to include arbitrary files based on known paths on the victim's filesystem within the malicious repository's working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253.

A fix has been prepared and will appear in v2.39.2 v2.38.4 v2.37.6 v2.36.5 v2.35.7 v2.34.7 v2.33.7 v2.32.6, v2.31.7 and v2.30.8. If upgrading is impractical, two short-term workarounds are available. Avoid cloning repositories from untrusted sources with `--recurse-submodules`. Instead, consider cloning repositories without recursively cloning their submodules, and instead run `git submodule update` at each layer. Before doing so, inspect each new `.gitmodules` file to ensure that it does not contain suspicious module URLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-22490/">CVE-2023-22490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22490">CVE-2023-22490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208027">SUSE bug 1208027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806013" comment="git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806014" comment="git-all-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806015" comment="git-core-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806016" comment="git-core-doc-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806017" comment="git-credential-libsecret-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806018" comment="git-daemon-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806019" comment="git-email-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806020" comment="git-gui-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806021" comment="git-instaweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806022" comment="git-subtree-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806023" comment="git-svn-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806024" comment="gitk-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806025" comment="gitweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806026" comment="perl-Git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806027" comment="perl-Git-SVN-2.39.3-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22652" ref_url="https://www.suse.com/security/cve/CVE-2023-22652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files.
This issue affects libeconf: before 0.5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22652/">CVE-2023-22652 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22652">CVE-2023-22652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806711" comment="libeconf-0.4.1-3.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22655" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22655" ref_url="https://www.suse.com/security/cve/CVE-2023-22655" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021372.html" source="SUSE-SU"/>
    <description>
    Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-22655/">CVE-2023-22655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-22655">CVE-2023-22655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954004" comment="microcode_ctl-20240910-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2269" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2269" ref_url="https://www.suse.com/security/cve/CVE-2023-2269" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2269/">CVE-2023-2269 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2269">CVE-2023-2269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210806">SUSE bug 1210806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22745" ref_url="https://www.suse.com/security/cve/CVE-2023-22745" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013966.html" source="SUSE-SU"/>
    <description>
    tpm2-tss is an open source software implementation of the Trusted Computing Group (TCG) Trusted Platform Module (TPM) 2 Software Stack (TSS2). In versions prior to 4.1.0-rc0, 4.0.1, and 3.2.2-rc1, `Tss2_RC_SetHandler` and `Tss2_RC_Decode` both index into `layer_handler` with an 8 bit layer number, but the array only has `TPM2_ERROR_TSS2_RC_LAYER_COUNT` entries, so trying to add a handler for higher-numbered layers or decode a response code with such a layer number reads/writes past the end of the buffer. This Buffer overrun, could result in arbitrary code execution. An example attack would be a MiTM bus attack that returns 0xFFFFFFFF for the RC. Given the common use case of TPM modules an attacker must have local access to the target machine with local system privileges which allows access to the TPM system. Usually TPM access requires administrative privilege. Versions 4.1.0-rc0, 4.0.1, and 3.2.2-rc1 fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22745/">CVE-2023-22745 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22745">CVE-2023-22745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207325">SUSE bug 1207325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810818" comment="tpm2-tss-3.2.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810819" comment="tpm2-tss-devel-3.2.2-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22809" ref_url="https://www.suse.com/security/cve/CVE-2023-22809" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013484.html" source="SUSE-SU"/>
    <description>
    In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-22809/">CVE-2023-22809 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22809">CVE-2023-22809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207082">SUSE bug 1207082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208053">SUSE bug 1208053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1209326">SUSE bug 1209326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214446">SUSE bug 1214446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225623">SUSE bug 1225623</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805191" comment="sudo-1.9.5p2-7.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805192" comment="sudo-python-plugin-1.9.5p2-7.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2283" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2283" ref_url="https://www.suse.com/security/cve/CVE-2023-2283" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-2283/">CVE-2023-2283 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2283">CVE-2023-2283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211190">SUSE bug 1211190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810807" comment="libssh-0.10.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810808" comment="libssh-config-0.10.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810809" comment="libssh-devel-0.10.4-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2295</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2295" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2295" ref_url="https://www.suse.com/security/cve/CVE-2023-2295" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SPI as its own initiator SPI, the pluto daemon state machine crashes. No remote code execution is possible. This CVE exists because of a CVE-2023-30570 security regression for libreswan package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2295/">CVE-2023-2295 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2295">CVE-2023-2295 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806011" comment="libreswan-4.9-4.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202322998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-22998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-22998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22998" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-22998" ref_url="https://www.suse.com/security/cve/CVE-2023-22998" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.0.3, drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-22998/">CVE-2023-22998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-22998">CVE-2023-22998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208776">SUSE bug 1208776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23009" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23009" ref_url="https://www.suse.com/security/cve/CVE-2023-23009" source="SUSE CVE"/>
    <description>
    Libreswan 4.9 allows remote attackers to cause a denial of service (assert failure and daemon restart) via crafted TS payload with an incorrect selector length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23009/">CVE-2023-23009 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23009">CVE-2023-23009 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805970" comment="libreswan-4.9-2.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2319" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2319" ref_url="https://www.suse.com/security/cve/CVE-2023-2319" source="SUSE CVE"/>
    <description>
    It was discovered that an update for PCS package in RHBA-2023:2151 erratum released as part of Red Hat Enterprise Linux 9.2 failed to include the fix for the Webpack issue CVE-2023-28154 (for PCS package), which was previously addressed in Red Hat Enterprise Linux 9.1 via erratum RHSA-2023:1591. The CVE-2023-2319 was assigned to that Red Hat specific security regression in Red Hat Enterprise Linux 9.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2319/">CVE-2023-2319 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2319">CVE-2023-2319 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805982" comment="pcs-0.11.4-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805983" comment="pcs-snmp-0.11.4-7.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23517" ref_url="https://www.suse.com/security/cve/CVE-2023-23517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23517/">CVE-2023-23517 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23517">CVE-2023-23517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207997">SUSE bug 1207997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23518</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23518" ref_url="https://www.suse.com/security/cve/CVE-2023-23518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028468.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.6.3, macOS Ventura 13.2, watchOS 9.3, macOS Big Sur 11.7.3, Safari 16.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23518/">CVE-2023-23518 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23518">CVE-2023-23518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207997">SUSE bug 1207997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23529" ref_url="https://www.suse.com/security/cve/CVE-2023-23529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028468.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved checks. This issue is fixed in iOS 15.7.4 and iPadOS 15.7.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, Safari 16.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23529/">CVE-2023-23529 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23529">CVE-2023-23529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208328">SUSE bug 1208328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805315" comment="webkit2gtk3-2.36.7-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805316" comment="webkit2gtk3-devel-2.36.7-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805317" comment="webkit2gtk3-jsc-2.36.7-1.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805318" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23598" ref_url="https://www.suse.com/security/cve/CVE-2023-23598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to `DataTransfer.setData`. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23598/">CVE-2023-23598 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23598">CVE-2023-23598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23599" ref_url="https://www.suse.com/security/cve/CVE-2023-23599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23599/">CVE-2023-23599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23599">CVE-2023-23599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23601" ref_url="https://www.suse.com/security/cve/CVE-2023-23601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23601/">CVE-2023-23601 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23601">CVE-2023-23601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23602" ref_url="https://www.suse.com/security/cve/CVE-2023-23602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23602/">CVE-2023-23602 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23602">CVE-2023-23602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23603" ref_url="https://www.suse.com/security/cve/CVE-2023-23603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Regular expressions used to filter out forbidden properties and values from style directives in calls to `console.log` weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23603/">CVE-2023-23603 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23603">CVE-2023-23603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23605" ref_url="https://www.suse.com/security/cve/CVE-2023-23605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-January/013482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013713.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 109, Firefox ESR &lt; 102.7, and Thunderbird &lt; 102.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-23605/">CVE-2023-23605 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23605">CVE-2023-23605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207119">SUSE bug 1207119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805193" comment="firefox-102.7.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805276" comment="thunderbird-102.7.1-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23916</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23916" ref_url="https://www.suse.com/security/cve/CVE-2023-23916" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    An allocation of resources without limits or throttling vulnerability exists in curl &lt;v7.88.0 based on the "chained" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped, but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb", making curl end up spending enormous amounts of allocated heap memory, or trying to and returning out of memory errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23916/">CVE-2023-23916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23916">CVE-2023-23916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207992">SUSE bug 1207992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805496" comment="curl-7.76.1-19.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805497" comment="curl-minimal-7.76.1-19.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805498" comment="libcurl-7.76.1-19.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805499" comment="libcurl-devel-7.76.1-19.el9_1.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805500" comment="libcurl-minimal-7.76.1-19.el9_1.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23918" ref_url="https://www.suse.com/security/cve/CVE-2023-23918" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031219.html" source="SUSE-SU"/>
    <description>
    A privilege escalation vulnerability exists in Node.js &lt;19.6.1, &lt;18.14.1, &lt;16.19.1 and &lt;14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23918/">CVE-2023-23918 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23918">CVE-2023-23918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208481">SUSE bug 1208481</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805997" comment="nodejs-libs-16.19.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805998" comment="nodejs-nodemon-2.0.20-3.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23919" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23919" ref_url="https://www.suse.com/security/cve/CVE-2023-23919" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014041.html" source="SUSE-SU"/>
    <description>
    A cryptographic vulnerability exists in Node.js &lt;19.2.0, &lt;18.14.1, &lt;16.19.1, &lt;14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-23919/">CVE-2023-23919 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23919">CVE-2023-23919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208483">SUSE bug 1208483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805992" comment="nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23920" ref_url="https://www.suse.com/security/cve/CVE-2023-23920" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014041.html" source="SUSE-SU"/>
    <description>
    An untrusted search path vulnerability exists in Node.js. &lt;19.6.1, &lt;18.14.1, &lt;16.19.1, and &lt;14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-23920/">CVE-2023-23920 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23920">CVE-2023-23920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208487">SUSE bug 1208487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805997" comment="nodejs-libs-16.19.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805998" comment="nodejs-nodemon-2.0.20-3.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23931" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23931" ref_url="https://www.suse.com/security/cve/CVE-2023-23931" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0722-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014901.html" source="SUSE-SU"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23931/">CVE-2023-23931 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23931">CVE-2023-23931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208036">SUSE bug 1208036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811163" comment="python3-cryptography-36.0.1-4.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23936" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23936" ref_url="https://www.suse.com/security/cve/CVE-2023-23936" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014041.html" source="SUSE-SU"/>
    <description>
    Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` string before passing to undici.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-23936/">CVE-2023-23936 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23936">CVE-2023-23936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208485">SUSE bug 1208485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805997" comment="nodejs-libs-16.19.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805998" comment="nodejs-nodemon-2.0.20-3.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202323946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-23946</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-23946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23946" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-23946" ref_url="https://www.suse.com/security/cve/CVE-2023-23946" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013770.html" source="SUSE-SU"/>
    <description>
    Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2, v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7, v2.33.7, v2.32.6, v2.31.7, and v2.30.8. As a workaround, use `git apply --stat` to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-23946/">CVE-2023-23946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-23946">CVE-2023-23946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208028">SUSE bug 1208028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806013" comment="git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806014" comment="git-all-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806015" comment="git-core-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806016" comment="git-core-doc-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806017" comment="git-credential-libsecret-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806018" comment="git-daemon-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806019" comment="git-email-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806020" comment="git-gui-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806021" comment="git-instaweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806022" comment="git-subtree-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806023" comment="git-svn-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806024" comment="gitk-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806025" comment="gitweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806026" comment="perl-Git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806027" comment="perl-Git-SVN-2.39.3-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24023" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24023" ref_url="https://www.suse.com/security/cve/CVE-2023-24023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24023/">CVE-2023-24023 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24023">CVE-2023-24023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218148">SUSE bug 1218148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24329</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24329" ref_url="https://www.suse.com/security/cve/CVE-2023-24329" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0868-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015621.html" source="SUSE-SU"/>
    <description>
    An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24329/">CVE-2023-24329 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24329">CVE-2023-24329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208471">SUSE bug 1208471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213553">SUSE bug 1213553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213554">SUSE bug 1213554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213839">SUSE bug 1213839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225672">SUSE bug 1225672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806085" comment="python-unversioned-command-3.9.16-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806086" comment="python3-3.9.16-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806087" comment="python3-debug-3.9.16-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806088" comment="python3-devel-3.9.16-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806089" comment="python3-idle-3.9.16-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806090" comment="python3-libs-3.9.16-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806091" comment="python3-test-3.9.16-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806092" comment="python3-tkinter-3.9.16-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806059" comment="python3.11-3.11.2-2.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806060" comment="python3.11-debug-3.11.2-2.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806061" comment="python3.11-devel-3.11.2-2.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806062" comment="python3.11-idle-3.11.2-2.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806063" comment="python3.11-libs-3.11.2-2.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806064" comment="python3.11-test-3.11.2-2.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806065" comment="python3.11-tkinter-3.11.2-2.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24532</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24532" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24532" ref_url="https://www.suse.com/security/cve/CVE-2023-24532" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014139.html" source="SUSE-SU"/>
    <description>
    The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars (a scalar larger than the order of the curve). This does not impact usages of crypto/ecdsa or crypto/ecdh.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24532/">CVE-2023-24532 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24532">CVE-2023-24532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209030">SUSE bug 1209030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24534" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24534" ref_url="https://www.suse.com/security/cve/CVE-2023-24534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014783.html" source="SUSE-SU"/>
    <description>
    HTTP and MIME header parsing can allocate large amounts of memory, even when parsing small inputs, potentially leading to a denial of service. Certain unusual patterns of input data can cause the common function used to parse HTTP and MIME headers to allocate substantially more memory than required to hold the parsed headers. An attacker can exploit this behavior to cause an HTTP server to allocate large amounts of memory from a small request, potentially leading to memory exhaustion and a denial of service. With fix, header parsing now correctly allocates only the memory required to hold parsed headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24534/">CVE-2023-24534 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24534">CVE-2023-24534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210127">SUSE bug 1210127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813704" comment="grafana-9.2.10-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24536" ref_url="https://www.suse.com/security/cve/CVE-2023-24536" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014783.html" source="SUSE-SU"/>
    <description>
    Multipart form parsing can consume large amounts of CPU and memory when processing form inputs containing very large numbers of parts. This stems from several causes: 1. mime/multipart.Reader.ReadForm limits the total memory a parsed multipart form can consume. ReadForm can undercount the amount of memory consumed, leading it to accept larger inputs than intended. 2. Limiting total memory does not account for increased pressure on the garbage collector from large numbers of small allocations in forms with many parts. 3. ReadForm can allocate a large number of short-lived buffers, further increasing pressure on the garbage collector. The combination of these factors can permit an attacker to cause an program that parses multipart forms to consume large amounts of CPU and memory, potentially resulting in a denial of service. This affects programs that use mime/multipart.Reader.ReadForm, as well as form parsing in the net/http package with the Request methods FormFile, FormValue, ParseMultipartForm, and PostFormValue. With fix, ReadForm now does a better job of estimating the memory consumption of parsed forms, and performs many fewer short-lived allocations. In addition, the fixed mime/multipart.Reader imposes the following limits on the size of parsed forms: 1. Forms parsed with ReadForm may contain no more than 1000 parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxparts=. 2. Form parts parsed with NextPart and NextRawPart may contain no more than 10,000 header fields. In addition, forms parsed with ReadForm may contain no more than 10,000 header fields across all parts. This limit may be adjusted with the environment variable GODEBUG=multipartmaxheaders=.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24536/">CVE-2023-24536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24536">CVE-2023-24536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210128">SUSE bug 1210128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24537" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24537" ref_url="https://www.suse.com/security/cve/CVE-2023-24537" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014783.html" source="SUSE-SU"/>
    <description>
    Calling any of the Parse functions on Go source code which contains //line directives with very large line numbers can cause an infinite loop due to integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24537/">CVE-2023-24537 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24537">CVE-2023-24537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210129">SUSE bug 1210129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24538" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24538" ref_url="https://www.suse.com/security/cve/CVE-2023-24538" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014783.html" source="SUSE-SU"/>
    <description>
    Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g. "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template.Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported, but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-24538/">CVE-2023-24538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24538">CVE-2023-24538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210130">SUSE bug 1210130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24539" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24539" ref_url="https://www.suse.com/security/cve/CVE-2023-24539" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014783.html" source="SUSE-SU"/>
    <description>
    Angle brackets (&lt;&gt;) are not considered dangerous characters when inserted into CSS contexts. Templates containing multiple actions separated by a '/' character can result in unexpectedly closing the CSS context and allowing for injection of unexpected HTML, if executed with untrusted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-24539/">CVE-2023-24539 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24539">CVE-2023-24539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211029">SUSE bug 1211029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2454</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2454" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2454" ref_url="https://www.suse.com/security/cve/CVE-2023-2454" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
    <description>
    schema_element defeats protective search_path changes; It was found that certain database calls in PostgreSQL could permit an authed attacker with elevated database-level privileges to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2454/">CVE-2023-2454 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2454">CVE-2023-2454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211228">SUSE bug 1211228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806691" comment="postgresql-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806692" comment="postgresql-contrib-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806693" comment="postgresql-docs-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806694" comment="postgresql-plperl-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806695" comment="postgresql-plpython3-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806696" comment="postgresql-pltcl-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806697" comment="postgresql-private-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806698" comment="postgresql-private-libs-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806699" comment="postgresql-server-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806700" comment="postgresql-server-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806701" comment="postgresql-static-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806702" comment="postgresql-test-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806703" comment="postgresql-test-rpm-macros-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806704" comment="postgresql-upgrade-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806705" comment="postgresql-upgrade-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24540" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24540" ref_url="https://www.suse.com/security/cve/CVE-2023-24540" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014783.html" source="SUSE-SU"/>
    <description>
    Not all valid JavaScript whitespace characters are considered to be whitespace. Templates containing whitespace characters outside of the character set "\t\n\f\r\u0020\u2028\u2029" in JavaScript contexts that also contain actions may not be properly sanitized during execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-24540/">CVE-2023-24540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24540">CVE-2023-24540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211030">SUSE bug 1211030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2455" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2455" ref_url="https://www.suse.com/security/cve/CVE-2023-2455" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
    <description>
    Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2455/">CVE-2023-2455 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2455">CVE-2023-2455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211229">SUSE bug 1211229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806691" comment="postgresql-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806692" comment="postgresql-contrib-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806693" comment="postgresql-docs-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806694" comment="postgresql-plperl-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806695" comment="postgresql-plpython3-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806696" comment="postgresql-pltcl-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806697" comment="postgresql-private-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806698" comment="postgresql-private-libs-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806699" comment="postgresql-server-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806700" comment="postgresql-server-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806701" comment="postgresql-static-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806702" comment="postgresql-test-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806703" comment="postgresql-test-rpm-macros-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806704" comment="postgresql-upgrade-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806705" comment="postgresql-upgrade-devel-15.3-1.module+el9.2.0.z+19113+6f5d9d63 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24805" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24805" ref_url="https://www.suse.com/security/cve/CVE-2023-24805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2233-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2233-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029509.html" source="SUSE-SU"/>
    <description>
    cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) &gt;&gt; 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-24805/">CVE-2023-24805 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24805">CVE-2023-24805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211340">SUSE bug 1211340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806036" comment="cups-filters-1.28.7-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806037" comment="cups-filters-devel-1.28.7-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806038" comment="cups-filters-libs-1.28.7-11.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24807" ref_url="https://www.suse.com/security/cve/CVE-2023-24807" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014041.html" source="SUSE-SU"/>
    <description>
    Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the `headerValueNormalize()` utility function. This vulnerability was patched in v5.19.1. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24807/">CVE-2023-24807 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24807">CVE-2023-24807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208413">SUSE bug 1208413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805988" comment="nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805989" comment="nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805990" comment="nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805991" comment="nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805997" comment="nodejs-libs-16.19.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805998" comment="nodejs-nodemon-2.0.20-3.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805993" comment="npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2491" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2491" ref_url="https://www.suse.com/security/cve/CVE-2023-2491" source="SUSE CVE"/>
    <description>
    A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-2491/">CVE-2023-2491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2491">CVE-2023-2491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805965" comment="emacs-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805966" comment="emacs-common-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805967" comment="emacs-filesystem-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805968" comment="emacs-lucid-27.2-8.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805969" comment="emacs-nox-27.2-8.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24936" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24936" ref_url="https://www.suse.com/security/cve/CVE-2023-24936" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-24936/">CVE-2023-24936 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24936">CVE-2023-24936 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806050" comment="aspnetcore-runtime-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806074" comment="aspnetcore-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806051" comment="aspnetcore-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806075" comment="aspnetcore-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806052" comment="dotnet-apphost-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806076" comment="dotnet-apphost-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806077" comment="dotnet-host-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806053" comment="dotnet-hostfxr-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806078" comment="dotnet-hostfxr-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806054" comment="dotnet-runtime-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806079" comment="dotnet-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806055" comment="dotnet-sdk-6.0-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806056" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806080" comment="dotnet-sdk-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806081" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806057" comment="dotnet-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806082" comment="dotnet-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806058" comment="dotnet-templates-6.0-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806083" comment="dotnet-templates-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806084" comment="netstandard-targeting-pack-2.1-7.0.107-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202324998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-24998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-24998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24998" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-24998" ref_url="https://www.suse.com/security/cve/CVE-2023-24998" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads.




Note that, like all of the file upload limits, the
          new configuration option (FileUploadBase#setFileCountMax) is not
          enabled by default and must be explicitly configured.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-24998/">CVE-2023-24998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-24998">CVE-2023-24998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208513">SUSE bug 1208513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210310">SUSE bug 1210310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211608">SUSE bug 1211608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228313">SUSE bug 1228313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811121" comment="tomcat-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811122" comment="tomcat-admin-webapps-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811123" comment="tomcat-docs-webapp-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811124" comment="tomcat-el-3.0-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811125" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811126" comment="tomcat-lib-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811127" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811128" comment="tomcat-webapps-9.0.62-37.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2513</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2513" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2513" ref_url="https://www.suse.com/security/cve/CVE-2023-2513" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-2513/">CVE-2023-2513 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2513">CVE-2023-2513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211105">SUSE bug 1211105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25136" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25136" ref_url="https://www.suse.com/security/cve/CVE-2023-25136" source="SUSE CVE"/>
    <description>
    OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible."
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25136/">CVE-2023-25136 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25136">CVE-2023-25136 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805971" comment="openssh-8.7p1-29.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805972" comment="openssh-askpass-8.7p1-29.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805973" comment="openssh-clients-8.7p1-29.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805974" comment="openssh-keycat-8.7p1-29.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805975" comment="openssh-server-8.7p1-29.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805976" comment="pam_ssh_agent_auth-0.10.4-5.29.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25173</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25173" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25173" ref_url="https://www.suse.com/security/cve/CVE-2023-25173" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016751.html" source="SUSE-SU"/>
    <description>
    containerd is an open source container runtime. A bug was found in containerd prior to versions 1.6.18 and 1.5.18 where supplementary groups are not set up properly inside a container. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group access to bypass primary group restrictions in some cases, potentially gaining access to sensitive information or gaining the ability to execute code in that container. Downstream applications that use the containerd client library may be affected as well.

This bug has been fixed in containerd v1.6.18 and v.1.5.18. Users should update to these versions and recreate containers to resolve this issue. Users who rely on a downstream application that uses containerd's client library should check that application for a separate advisory and instructions. As a workaround, ensure that the `"USER $USERNAME"` Dockerfile instruction is not used. Instead, set the container entrypoint to a value similar to `ENTRYPOINT ["su", "-", "user"]` to allow `su` to properly set up supplementary groups.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25173/">CVE-2023-25173 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25173">CVE-2023-25173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208426">SUSE bug 1208426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215588">SUSE bug 1215588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25193" ref_url="https://www.suse.com/security/cve/CVE-2023-25193" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016025.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25193/">CVE-2023-25193 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25193">CVE-2023-25193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1207922">SUSE bug 1207922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213939">SUSE bug 1213939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866723" comment="harfbuzz-2.7.4-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866724" comment="harfbuzz-devel-2.7.4-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866725" comment="harfbuzz-icu-2.7.4-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806587" comment="java-11-openjdk-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806588" comment="java-11-openjdk-demo-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806589" comment="java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806590" comment="java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806591" comment="java-11-openjdk-devel-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806592" comment="java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806593" comment="java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806594" comment="java-11-openjdk-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806595" comment="java-11-openjdk-headless-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806596" comment="java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806597" comment="java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806598" comment="java-11-openjdk-javadoc-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806599" comment="java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806600" comment="java-11-openjdk-jmods-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806601" comment="java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806602" comment="java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806603" comment="java-11-openjdk-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806604" comment="java-11-openjdk-src-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806605" comment="java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806606" comment="java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806607" comment="java-11-openjdk-static-libs-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806608" comment="java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806609" comment="java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806610" comment="java-17-openjdk-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806611" comment="java-17-openjdk-demo-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806612" comment="java-17-openjdk-demo-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806613" comment="java-17-openjdk-demo-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806614" comment="java-17-openjdk-devel-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806615" comment="java-17-openjdk-devel-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806616" comment="java-17-openjdk-devel-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806617" comment="java-17-openjdk-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806618" comment="java-17-openjdk-headless-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806619" comment="java-17-openjdk-headless-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806620" comment="java-17-openjdk-headless-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806621" comment="java-17-openjdk-javadoc-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806622" comment="java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806623" comment="java-17-openjdk-jmods-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806624" comment="java-17-openjdk-jmods-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806625" comment="java-17-openjdk-jmods-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806626" comment="java-17-openjdk-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806627" comment="java-17-openjdk-src-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806628" comment="java-17-openjdk-src-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806629" comment="java-17-openjdk-src-slowdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806630" comment="java-17-openjdk-static-libs-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806631" comment="java-17-openjdk-static-libs-fastdebug-17.0.8.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806632" comment="java-17-openjdk-static-libs-slowdebug-17.0.8.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25358</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25358" ref_url="https://www.suse.com/security/cve/CVE-2023-25358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25358/">CVE-2023-25358 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25358">CVE-2023-25358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208897">SUSE bug 1208897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25360" ref_url="https://www.suse.com/security/cve/CVE-2023-25360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in WebCore::RenderLayer::renderer in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25360/">CVE-2023-25360 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25360">CVE-2023-25360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208893">SUSE bug 1208893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25361</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25361" ref_url="https://www.suse.com/security/cve/CVE-2023-25361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25361/">CVE-2023-25361 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25361">CVE-2023-25361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208894">SUSE bug 1208894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25362</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25362" ref_url="https://www.suse.com/security/cve/CVE-2023-25362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25362/">CVE-2023-25362 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25362">CVE-2023-25362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208895">SUSE bug 1208895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25363" ref_url="https://www.suse.com/security/cve/CVE-2023-25363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-25363/">CVE-2023-25363 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25363">CVE-2023-25363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208896">SUSE bug 1208896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805735" comment="webkit2gtk3-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805736" comment="webkit2gtk3-devel-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805737" comment="webkit2gtk3-jsc-2.38.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805738" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25652" ref_url="https://www.suse.com/security/cve/CVE-2023-25652" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014775.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (corresponding to the rejected hunk(s) from the given patch). A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid using `git apply` with `--reject` when applying patches from an untrusted source. Use `git apply --stat` to inspect a patch before applying; avoid applying one that create a conflict where a link corresponding to the `*.rej` file exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-25652/">CVE-2023-25652 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25652">CVE-2023-25652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210686">SUSE bug 1210686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806013" comment="git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806014" comment="git-all-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806015" comment="git-core-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806016" comment="git-core-doc-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806017" comment="git-credential-libsecret-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806018" comment="git-daemon-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806019" comment="git-email-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806020" comment="git-gui-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806021" comment="git-instaweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806022" comment="git-subtree-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806023" comment="git-svn-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806024" comment="gitk-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806025" comment="gitweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806026" comment="perl-Git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806027" comment="perl-Git-SVN-2.39.3-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25690" ref_url="https://www.suse.com/security/cve/CVE-2023-25690" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014223.html" source="SUSE-SU"/>
    <description>
    Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.




Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
 or ProxyPassMatch in which a non-specific pattern matches
 some portion of the user-supplied request-target (URL) data and is then
 re-inserted into the proxied request-target using variable 
substitution. For example, something like:




RewriteEngine on
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ http://example.com:8080/


Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-25690/">CVE-2023-25690 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25690">CVE-2023-25690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209047">SUSE bug 1209047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212409">SUSE bug 1212409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212865">SUSE bug 1212865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805469" comment="httpd-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805470" comment="httpd-core-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805471" comment="httpd-devel-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805472" comment="httpd-filesystem-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805473" comment="httpd-manual-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805474" comment="httpd-tools-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805475" comment="mod_http2-1.15.19-3.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805476" comment="mod_ldap-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805477" comment="mod_lua-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805478" comment="mod_proxy_html-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805479" comment="mod_session-2.4.53-7.el9_1.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805480" comment="mod_ssl-2.4.53-7.el9_1.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25725" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25725" ref_url="https://www.suse.com/security/cve/CVE-2023-25725" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2023:2117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-FU-2023:2119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013762.html" source="SUSE-SU"/>
    <description>
    HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-25725/">CVE-2023-25725 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25725">CVE-2023-25725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208132">SUSE bug 1208132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805495" comment="haproxy-2.4.17-3.el9_1.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25728" ref_url="https://www.suse.com/security/cve/CVE-2023-25728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The &lt;code&gt;Content-Security-Policy-Report-Only&lt;/code&gt; header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25728/">CVE-2023-25728 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25728">CVE-2023-25728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25729" ref_url="https://www.suse.com/security/cve/CVE-2023-25729" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Permission prompts for opening external schemes were only shown for &lt;code&gt;ContentPrincipals&lt;/code&gt; resulting in extensions being able to open them without user interaction via &lt;code&gt;ExpandedPrincipals&lt;/code&gt;. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25729/">CVE-2023-25729 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25729">CVE-2023-25729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25730" ref_url="https://www.suse.com/security/cve/CVE-2023-25730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A background script invoking &lt;code&gt;requestFullscreen&lt;/code&gt; and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25730/">CVE-2023-25730 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25730">CVE-2023-25730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25732" ref_url="https://www.suse.com/security/cve/CVE-2023-25732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When encoding data from an &lt;code&gt;inputStream&lt;/code&gt; in &lt;code&gt;xpcom&lt;/code&gt; the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25732/">CVE-2023-25732 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25732">CVE-2023-25732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25735" ref_url="https://www.suse.com/security/cve/CVE-2023-25735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25735/">CVE-2023-25735 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25735">CVE-2023-25735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25737" ref_url="https://www.suse.com/security/cve/CVE-2023-25737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An invalid downcast from &lt;code&gt;nsTextNode&lt;/code&gt; to &lt;code&gt;SVGElement&lt;/code&gt; could have lead to undefined behavior. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25737/">CVE-2023-25737 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25737">CVE-2023-25737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25739" ref_url="https://www.suse.com/security/cve/CVE-2023-25739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in &lt;code&gt;ScriptLoadContext&lt;/code&gt;. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25739/">CVE-2023-25739 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25739">CVE-2023-25739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25742" ref_url="https://www.suse.com/security/cve/CVE-2023-25742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25742/">CVE-2023-25742 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25742">CVE-2023-25742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25743" ref_url="https://www.suse.com/security/cve/CVE-2023-25743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome.&lt;br&gt;*This bug only affects Firefox Focus. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox &lt; 110 and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25743/">CVE-2023-25743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25743">CVE-2023-25743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25744" ref_url="https://www.suse.com/security/cve/CVE-2023-25744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 110 and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25744/">CVE-2023-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25744">CVE-2023-25744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25746" ref_url="https://www.suse.com/security/cve/CVE-2023-25746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-February/013850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/013965.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 102.8 and Firefox ESR &lt; 102.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25746/">CVE-2023-25746 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25746">CVE-2023-25746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208144">SUSE bug 1208144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805312" comment="firefox-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805313" comment="firefox-x11-102.8.0-2.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805314" comment="thunderbird-102.8.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25751" ref_url="https://www.suse.com/security/cve/CVE-2023-25751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Sometimes, when invalidating JIT code while following an iterator, the newly generated code could be overwritten incorrectly. This could lead to a potentially exploitable crash. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25751/">CVE-2023-25751 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25751">CVE-2023-25751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805423" comment="firefox-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805424" comment="firefox-x11-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805437" comment="thunderbird-102.9.0-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25752" ref_url="https://www.suse.com/security/cve/CVE-2023-25752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When accessing throttled streams, the count of available bytes needed to be checked in the calling function to be within bounds. This may have lead future code to be incorrect and vulnerable. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-25752/">CVE-2023-25752 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25752">CVE-2023-25752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805423" comment="firefox-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805424" comment="firefox-x11-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805437" comment="thunderbird-102.9.0-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25775" ref_url="https://www.suse.com/security/cve/CVE-2023-25775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    Improper access control in the Intel(R) Ethernet Controller RDMA driver for linux before version 1.9.30 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-25775/">CVE-2023-25775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25775">CVE-2023-25775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216959">SUSE bug 1216959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25809" ref_url="https://www.suse.com/security/cve/CVE-2023-25809" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028987.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. In affected versions it was found that rootless runc makes `/sys/fs/cgroup` writable in following conditons: 1. when runc is executed inside the user namespace, and the `config.json` does not specify the cgroup namespace to be unshared (e.g.., `(docker|podman|nerdctl) run --cgroupns=host`, with Rootless Docker/Podman/nerdctl) or 2. when runc is executed outside the user namespace, and `/sys` is mounted with `rbind, ro` (e.g., `runc spec --rootless`; this condition is very rare). A container may gain the write access to user-owned cgroup hierarchy `/sys/fs/cgroup/user.slice/...` on the host . Other users's cgroup hierarchies are not affected. Users are advised to upgrade to version 1.1.5. Users unable to upgrade may unshare the cgroup namespace (`(docker|podman|nerdctl) run --cgroupns=private)`. This is the default behavior of Docker/Podman/nerdctl on cgroup v2 hosts. or add `/sys/fs/cgroup` to `maskedPaths`.

    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-25809/">CVE-2023-25809 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25809">CVE-2023-25809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209884">SUSE bug 1209884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810790" comment="runc-1.1.9-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202325815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-25815</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-25815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25815" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-25815" ref_url="https://www.suse.com/security/cve/CVE-2023-25815" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014775.html" source="SUSE-SU"/>
    <description>
    In Git for Windows, the Windows port of Git, no localized messages are shipped with the installer. As a consequence, Git is expected not to localize messages at all, and skips the gettext initialization. However, due to a change in MINGW-packages, the `gettext()` function's implicit initialization no longer uses the runtime prefix but uses the hard-coded path `C:\mingw64\share\locale` to look for localized messages. And since any authenticated user has the permission to create folders in `C:\` (and since `C:\mingw64` does not typically exist), it is possible for low-privilege users to place fake messages in that location where `git.exe` will pick them up in version 2.40.1.

This vulnerability is relatively hard to exploit and requires social engineering. For example, a legitimate message at the end of a clone could be maliciously modified to ask the user to direct their web browser to a malicious website, and the user might think that the message comes from Git and is legitimate. It does require local write access by the attacker, though, which makes this attack vector less likely. Version 2.40.1 contains a patch for this issue. Some workarounds are available. Do not work on a Windows machine with shared accounts, or alternatively create a `C:\mingw64` folder and leave it empty. Users who have administrative rights may remove the permission to create folders in `C:\`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-25815/">CVE-2023-25815 at SUSE</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-25815">CVE-2023-25815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210686">SUSE bug 1210686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806013" comment="git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806014" comment="git-all-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806015" comment="git-core-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806016" comment="git-core-doc-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806017" comment="git-credential-libsecret-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806018" comment="git-daemon-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806019" comment="git-email-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806020" comment="git-gui-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806021" comment="git-instaweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806022" comment="git-subtree-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806023" comment="git-svn-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806024" comment="gitk-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806025" comment="gitweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806026" comment="perl-Git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806027" comment="perl-Git-SVN-2.39.3-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2602" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2602" ref_url="https://www.suse.com/security/cve/CVE-2023-2602" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015408.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2602/">CVE-2023-2602 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2602">CVE-2023-2602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211418">SUSE bug 1211418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806843" comment="libcap-2.48-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806844" comment="libcap-devel-2.48-9.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2603" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2603" ref_url="https://www.suse.com/security/cve/CVE-2023-2603" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015622.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2603/">CVE-2023-2603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2603">CVE-2023-2603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211419">SUSE bug 1211419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806843" comment="libcap-2.48-9.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806844" comment="libcap-devel-2.48-9.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2650" ref_url="https://www.suse.com/security/cve/CVE-2023-2650" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2327-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2328-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2330-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:29171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030013.html" source="SUSE-SU"/>
    <description>
    Issue summary: Processing some specially crafted ASN.1 object identifiers or
data containing them may be very slow.

Impact summary: Applications that use OBJ_obj2txt() directly, or use any of
the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message
size limit may experience notable to very long delays when processing those
messages, which may lead to a Denial of Service.

An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -
most of which have no size limit.  OBJ_obj2txt() may be used to translate
an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL
type ASN1_OBJECT) to its canonical numeric text form, which are the
sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by
periods.

When one of the sub-identifiers in the OBJECT IDENTIFIER is very large
(these are sizes that are seen as absurdly large, taking up tens or hundreds
of KiBs), the translation to a decimal number in text may take a very long
time.  The time complexity is O(n^2) with 'n' being the size of the
sub-identifiers in bytes (*).

With OpenSSL 3.0, support to fetch cryptographic algorithms using names /
identifiers in string form was introduced.  This includes using OBJECT
IDENTIFIERs in canonical numeric text form as identifiers for fetching
algorithms.

Such OBJECT IDENTIFIERs may be received through the ASN.1 structure
AlgorithmIdentifier, which is commonly used in multiple protocols to specify
what cryptographic algorithm should be used to sign or verify, encrypt or
decrypt, or digest passed data.

Applications that call OBJ_obj2txt() directly with untrusted data are
affected, with any version of OpenSSL.  If the use is for the mere purpose
of display, the severity is considered low.

In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,
CMS, CMP/CRMF or TS.  It also impacts anything that processes X.509
certificates, including simple things like verifying its signature.

The impact on TLS is relatively low, because all versions of OpenSSL have a
100KiB limit on the peer's certificate chain.  Additionally, this only
impacts clients, or servers that have explicitly enabled client
authentication.

In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,
such as X.509 certificates.  This is assumed to not happen in such a way
that it would cause a Denial of Service, so these versions are considered
not affected by this issue in such a way that it would be cause for concern,
and the severity is therefore considered low.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2650/">CVE-2023-2650 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2650">CVE-2023-2650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211430">SUSE bug 1211430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811013" comment="edk2-ovmf-20230524-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811014" comment="edk2-tools-20230524-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811015" comment="edk2-tools-doc-20230524-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806513" comment="openssl-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806514" comment="openssl-devel-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806515" comment="openssl-libs-3.0.7-16.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806516" comment="openssl-perl-3.0.7-16.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26545</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26545" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26545" ref_url="https://www.suse.com/security/cve/CVE-2023-26545" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0749-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1574-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26545/">CVE-2023-26545 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26545">CVE-2023-26545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208700">SUSE bug 1208700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1208909">SUSE bug 1208909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210423">SUSE bug 1210423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26767" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26767" ref_url="https://www.suse.com/security/cve/CVE-2023-26767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014729.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the lou_logFile function at logginc.c endpoint.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26767/">CVE-2023-26767 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26767">CVE-2023-26767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209429">SUSE bug 1209429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811027" comment="liblouis-3.16.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811028" comment="python3-louis-3.16.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26768" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26768" ref_url="https://www.suse.com/security/cve/CVE-2023-26768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1854-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028813.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26768/">CVE-2023-26768 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26768">CVE-2023-26768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209431">SUSE bug 1209431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811027" comment="liblouis-3.16.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811028" comment="python3-louis-3.16.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26769" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26769" ref_url="https://www.suse.com/security/cve/CVE-2023-26769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014729.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability found in Liblouis Lou_Trace v.3.24.0 allows a remote attacker to cause a denial of service via the resolveSubtable function at compileTranslationTabel.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26769/">CVE-2023-26769 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26769">CVE-2023-26769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209432">SUSE bug 1209432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811027" comment="liblouis-3.16.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811028" comment="python3-louis-3.16.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26965" ref_url="https://www.suse.com/security/cve/CVE-2023-26965" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    loadImage() in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based use after free via a crafted TIFF image.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-26965/">CVE-2023-26965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26965">CVE-2023-26965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212398">SUSE bug 1212398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811129" comment="libtiff-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811130" comment="libtiff-devel-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811131" comment="libtiff-tools-4.4.0-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26966" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26966" ref_url="https://www.suse.com/security/cve/CVE-2023-26966" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-26966/">CVE-2023-26966 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-26966">CVE-2023-26966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212881">SUSE bug 1212881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811129" comment="libtiff-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811130" comment="libtiff-devel-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811131" comment="libtiff-tools-4.4.0-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2700" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2700" ref_url="https://www.suse.com/security/cve/CVE-2023-2700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030083.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14490-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UEZKWHJBBGGKIPJ6SR2VA5UMFQO2PBNJ/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2700/">CVE-2023-2700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2700">CVE-2023-2700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211390">SUSE bug 1211390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806487" comment="libvirt-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806488" comment="libvirt-client-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806489" comment="libvirt-client-qemu-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806490" comment="libvirt-daemon-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806491" comment="libvirt-daemon-config-network-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806492" comment="libvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806493" comment="libvirt-daemon-driver-interface-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806494" comment="libvirt-daemon-driver-network-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806495" comment="libvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806496" comment="libvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806497" comment="libvirt-daemon-driver-qemu-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806498" comment="libvirt-daemon-driver-secret-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806499" comment="libvirt-daemon-driver-storage-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806500" comment="libvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806501" comment="libvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806502" comment="libvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806503" comment="libvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806504" comment="libvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806505" comment="libvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806506" comment="libvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806507" comment="libvirt-daemon-kvm-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806508" comment="libvirt-devel-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806509" comment="libvirt-docs-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806510" comment="libvirt-libs-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806511" comment="libvirt-lock-sanlock-9.0.0-10.2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806512" comment="libvirt-nss-9.0.0-10.2.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27043</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27043" ref_url="https://www.suse.com/security/cve/CVE-2023-27043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0329-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
    <description>
    The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-27043/">CVE-2023-27043 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27043">CVE-2023-27043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210638">SUSE bug 1210638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222537">SUSE bug 1222537</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845160" comment="python-unversioned-command-3.9.18-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845161" comment="python3-3.9.18-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845162" comment="python3-debug-3.9.18-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845163" comment="python3-devel-3.9.18-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845164" comment="python3-idle-3.9.18-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845165" comment="python3-libs-3.9.18-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845166" comment="python3-test-3.9.18-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845167" comment="python3-tkinter-3.9.18-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866657" comment="python3.11-3.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866658" comment="python3.11-debug-3.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866659" comment="python3.11-devel-3.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866660" comment="python3.11-idle-3.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866661" comment="python3.11-libs-3.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866662" comment="python3.11-test-3.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866663" comment="python3.11-tkinter-3.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2731" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2731" ref_url="https://www.suse.com/security/cve/CVE-2023-2731" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017421.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2731/">CVE-2023-2731 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2731">CVE-2023-2731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211478">SUSE bug 1211478</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811129" comment="libtiff-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811130" comment="libtiff-devel-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811131" comment="libtiff-tools-4.4.0-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27349" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27349" ref_url="https://www.suse.com/security/cve/CVE-2023-27349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2533-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2562-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2605-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018026.html" source="SUSE-SU"/>
    <description>
    BlueZ Audio Profile AVRCP Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device.

The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19908.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27349/">CVE-2023-27349 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27349">CVE-2023-27349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210398">SUSE bug 1210398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27371</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27371" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27371" ref_url="https://www.suse.com/security/cve/CVE-2023-27371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1686-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014542.html" source="SUSE-SU"/>
    <description>
    GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27371/">CVE-2023-27371 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27371">CVE-2023-27371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208745">SUSE bug 1208745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813977" comment="libmicrohttpd-0.9.72-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813978" comment="libmicrohttpd-devel-0.9.72-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813979" comment="libmicrohttpd-doc-0.9.72-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27522" ref_url="https://www.suse.com/security/cve/CVE-2023-27522" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014223.html" source="SUSE-SU"/>
    <description>
    HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.

Special characters in the origin response header can truncate/split the response forwarded to the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27522/">CVE-2023-27522 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27522">CVE-2023-27522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209049">SUSE bug 1209049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811030" comment="httpd-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811031" comment="httpd-core-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811032" comment="httpd-devel-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811033" comment="httpd-filesystem-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811034" comment="httpd-manual-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811035" comment="httpd-tools-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811036" comment="mod_http2-1.15.19-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811037" comment="mod_ldap-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811038" comment="mod_lua-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811039" comment="mod_proxy_html-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811040" comment="mod_session-2.4.57-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811041" comment="mod_ssl-2.4.57-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27530" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27530" ref_url="https://www.suse.com/security/cve/CVE-2023-27530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2781-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030186.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLQ74D2IZAJC5KD6QXVUZAQ6O5LNAWZX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOZFATD6SCQREBY3SZW5KQJPN6KN7A6D/" source="SUSE-SU"/>
    <description>
    A DoS vulnerability exists in Rack &lt;v3.0.4.2, &lt;v2.2.6.3, &lt;v2.1.4.3 and &lt;v2.0.9.3 within in the Multipart MIME parsing code in which could allow an attacker to craft requests that can be abuse to cause multipart parsing to take longer than expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-27530/">CVE-2023-27530 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27530">CVE-2023-27530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209095">SUSE bug 1209095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805982" comment="pcs-0.11.4-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805983" comment="pcs-snmp-0.11.4-7.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27533" ref_url="https://www.suse.com/security/cve/CVE-2023-27533" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    A vulnerability in input validation exists in curl &lt;8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input, thereby enabling attackers to execute arbitrary code on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27533/">CVE-2023-27533 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27533">CVE-2023-27533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209209">SUSE bug 1209209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811175" comment="curl-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811176" comment="curl-minimal-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811177" comment="libcurl-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811178" comment="libcurl-devel-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811179" comment="libcurl-minimal-7.76.1-26.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27534" ref_url="https://www.suse.com/security/cve/CVE-2023-27534" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024160.html" source="SUSE-SU"/>
    <description>
    A path traversal vulnerability exists in curl &lt;8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element, in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-27534/">CVE-2023-27534 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27534">CVE-2023-27534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209210">SUSE bug 1209210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811175" comment="curl-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811176" comment="curl-minimal-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811177" comment="libcurl-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811178" comment="libcurl-devel-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811179" comment="libcurl-minimal-7.76.1-26.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27535" ref_url="https://www.suse.com/security/cve/CVE-2023-27535" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    An authentication bypass vulnerability exists in libcurl &lt;8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27535/">CVE-2023-27535 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27535">CVE-2023-27535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209211">SUSE bug 1209211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805977" comment="curl-7.76.1-23.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805978" comment="curl-minimal-7.76.1-23.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805979" comment="libcurl-7.76.1-23.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805980" comment="libcurl-devel-7.76.1-23.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805981" comment="libcurl-minimal-7.76.1-23.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27536" ref_url="https://www.suse.com/security/cve/CVE-2023-27536" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    An authentication bypass vulnerability exists libcurl &lt;8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27536/">CVE-2023-27536 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27536">CVE-2023-27536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209212">SUSE bug 1209212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811175" comment="curl-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811176" comment="curl-minimal-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811177" comment="libcurl-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811178" comment="libcurl-devel-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811179" comment="libcurl-minimal-7.76.1-26.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27538" ref_url="https://www.suse.com/security/cve/CVE-2023-27538" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
    <description>
    An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-27538/">CVE-2023-27538 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27538">CVE-2023-27538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209214">SUSE bug 1209214</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811175" comment="curl-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811176" comment="curl-minimal-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811177" comment="libcurl-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811178" comment="libcurl-devel-7.76.1-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811179" comment="libcurl-minimal-7.76.1-26.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27539" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27539" ref_url="https://www.suse.com/security/cve/CVE-2023-27539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014477.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLQ74D2IZAJC5KD6QXVUZAQ6O5LNAWZX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOZFATD6SCQREBY3SZW5KQJPN6KN7A6D/" source="SUSE-SU"/>
    <description>
    There is a denial of service vulnerability in the header parsing component of Rack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-10-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-27539/">CVE-2023-27539 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27539">CVE-2023-27539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209503">SUSE bug 1209503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805982" comment="pcs-0.11.4-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805983" comment="pcs-snmp-0.11.4-7.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27561</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27561" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27561" ref_url="https://www.suse.com/security/cve/CVE-2023-27561" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028987.html" source="SUSE-SU"/>
    <description>
    runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges, related to libcontainer/rootfs_linux.go. To exploit this, an attacker must be able to spawn two containers with custom volume-mount configurations, and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-08-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-27561/">CVE-2023-27561 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27561">CVE-2023-27561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1208962">SUSE bug 1208962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810790" comment="runc-1.1.9-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27932" ref_url="https://www.suse.com/security/cve/CVE-2023-27932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, tvOS 16.4, watchOS 9.4. Processing maliciously crafted web content may bypass Same Origin Policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-27932/">CVE-2023-27932 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27932">CVE-2023-27932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202327954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-27954</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-27954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-27954" ref_url="https://www.suse.com/security/cve/CVE-2023-27954" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    The issue was addressed by removing origin information. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4, watchOS 9.4. A website may be able to track sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-27954/">CVE-2023-27954 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-27954">CVE-2023-27954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28100" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28100" ref_url="https://www.suse.com/security/cve/CVE-2023-28100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028537.html" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. Versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4 contain a vulnerability similar to CVE-2017-5226, but using the `TIOCLINUX` ioctl command instead of `TIOCSTI`. If a Flatpak app is run on a Linux virtual console such as `/dev/tty1`, it can copy text from the virtual console and paste it into the command buffer, from which the command might be run after the Flatpak app has exited. Ordinary graphical terminal emulators like xterm, gnome-terminal and Konsole are unaffected. This vulnerability is specific to the Linux virtual consoles `/dev/tty1`, `/dev/tty2` and so on. A patch is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, don't run Flatpak on a Linux virtual console. Flatpak is primarily designed to be used in a Wayland or X11 graphical environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28100/">CVE-2023-28100 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28100">CVE-2023-28100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209411">SUSE bug 1209411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811095" comment="flatpak-1.12.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811096" comment="flatpak-devel-1.12.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811097" comment="flatpak-libs-1.12.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811098" comment="flatpak-selinux-1.12.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811099" comment="flatpak-session-helper-1.12.8-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28101</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28101" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28101" ref_url="https://www.suse.com/security/cve/CVE-2023-28101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028537.html" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. In versions prior to 1.10.8, 1.12.8, 1.14.4, and 1.15.4, if an attacker publishes a Flatpak app with elevated permissions, they can hide those permissions from users of the `flatpak(1)` command-line interface by setting other permissions to crafted values that contain non-printable control characters such as `ESC`. A fix is available in versions 1.10.8, 1.12.8, 1.14.4, and 1.15.4. As a workaround, use a GUI like GNOME Software rather than the command-line interface, or only install apps whose maintainers you trust.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28101/">CVE-2023-28101 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28101">CVE-2023-28101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209410">SUSE bug 1209410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811095" comment="flatpak-1.12.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811096" comment="flatpak-devel-1.12.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811097" comment="flatpak-libs-1.12.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811098" comment="flatpak-selinux-1.12.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811099" comment="flatpak-session-helper-1.12.8-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28154" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28154" ref_url="https://www.suse.com/security/cve/CVE-2023-28154" source="SUSE CVE"/>
    <description>
    Webpack 5 before 5.76.0 does not avoid cross-realm object access. ImportParserPlugin.js mishandles the magic comment feature. An attacker who controls a property of an untrusted object can obtain access to the real global object.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28154/">CVE-2023-28154 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28154">CVE-2023-28154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209486">SUSE bug 1209486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805460" comment="pcs-0.11.3-4.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805461" comment="pcs-snmp-0.11.3-4.el9_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28162</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28162" ref_url="https://www.suse.com/security/cve/CVE-2023-28162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    While implementing AudioWorklets, some code may have casted one type to another, invalid, dynamic type. This could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28162/">CVE-2023-28162 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28162">CVE-2023-28162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805423" comment="firefox-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805424" comment="firefox-x11-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805437" comment="thunderbird-102.9.0-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28164</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28164" ref_url="https://www.suse.com/security/cve/CVE-2023-28164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Dragging a URL from a cross-origin iframe that was removed during the drag could have led to user confusion and website spoofing attacks. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28164/">CVE-2023-28164 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28164">CVE-2023-28164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805423" comment="firefox-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805424" comment="firefox-x11-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805437" comment="thunderbird-102.9.0-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28176" ref_url="https://www.suse.com/security/cve/CVE-2023-28176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 110 and Firefox ESR 102.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 111, Firefox ESR &lt; 102.9, and Thunderbird &lt; 102.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28176/">CVE-2023-28176 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28176">CVE-2023-28176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209173">SUSE bug 1209173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805423" comment="firefox-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805424" comment="firefox-x11-102.9.0-3.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805437" comment="thunderbird-102.9.0-1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28198" ref_url="https://www.suse.com/security/cve/CVE-2023-28198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28198/">CVE-2023-28198 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28198">CVE-2023-28198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215230">SUSE bug 1215230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215457">SUSE bug 1215457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215589">SUSE bug 1215589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28204" ref_url="https://www.suse.com/security/cve/CVE-2023-28204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2606-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28204/">CVE-2023-28204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28204">CVE-2023-28204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211659">SUSE bug 1211659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806039" comment="webkit2gtk3-2.38.5-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806040" comment="webkit2gtk3-devel-2.38.5-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806041" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806042" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28205" ref_url="https://www.suse.com/security/cve/CVE-2023-28205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014714.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28205/">CVE-2023-28205 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28205">CVE-2023-28205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210295">SUSE bug 1210295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210731">SUSE bug 1210731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805589" comment="webkit2gtk3-2.36.7-1.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805590" comment="webkit2gtk3-devel-2.36.7-1.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805591" comment="webkit2gtk3-jsc-2.36.7-1.el9_1.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805592" comment="webkit2gtk3-jsc-devel-2.36.7-1.el9_1.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2828" ref_url="https://www.suse.com/security/cve/CVE-2023-2828" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018035.html" source="SUSE-SU"/>
    <description>
    Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.

It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded.
This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2828/">CVE-2023-2828 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2828">CVE-2023-2828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212544">SUSE bug 1212544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216764">SUSE bug 1216764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806577" comment="bind-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806578" comment="bind-chroot-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806579" comment="bind-devel-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806580" comment="bind-dnssec-doc-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806581" comment="bind-dnssec-utils-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806582" comment="bind-doc-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806583" comment="bind-libs-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806584" comment="bind-license-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806585" comment="bind-utils-9.16.23-11.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806586" comment="python3-bind-9.16.23-11.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28321" ref_url="https://www.suse.com/security/cve/CVE-2023-28321" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029436.html" source="SUSE-SU"/>
    <description>
    An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match, but the wildcard check in curl could still check for `x*`, which would match even though the IDN name most likely contained nothing even resembling an `x`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28321/">CVE-2023-28321 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28321">CVE-2023-28321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211232">SUSE bug 1211232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218210">SUSE bug 1218210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806718" comment="curl-7.76.1-23.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806719" comment="curl-minimal-7.76.1-23.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806720" comment="libcurl-7.76.1-23.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806721" comment="libcurl-devel-7.76.1-23.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806722" comment="libcurl-minimal-7.76.1-23.el9_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28322" ref_url="https://www.suse.com/security/cve/CVE-2023-28322" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2224-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2230-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029436.html" source="SUSE-SU"/>
    <description>
    An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28322/">CVE-2023-28322 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28322">CVE-2023-28322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211233">SUSE bug 1211233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806718" comment="curl-7.76.1-23.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806719" comment="curl-minimal-7.76.1-23.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806720" comment="libcurl-7.76.1-23.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806721" comment="libcurl-devel-7.76.1-23.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806722" comment="libcurl-minimal-7.76.1-23.el9_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28370</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28370" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28370" ref_url="https://www.suse.com/security/cve/CVE-2023-28370" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015735.html" source="SUSE-SU"/>
    <description>
    Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28370/">CVE-2023-28370 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28370">CVE-2023-28370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211741">SUSE bug 1211741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811100" comment="python3-tornado-6.1.0-9.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28410" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28410" ref_url="https://www.suse.com/security/cve/CVE-2023-28410" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    Improper restriction of operations within the bounds of a memory buffer in some Intel(R) i915 Graphics drivers for linux before kernel version 6.2.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28410/">CVE-2023-28410 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28410">CVE-2023-28410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211263">SUSE bug 1211263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211819">SUSE bug 1211819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28427" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28427" ref_url="https://www.suse.com/security/cve/CVE-2023-28427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014339.html" source="SUSE-SU"/>
    <description>
    matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. In versions prior to 24.0.0 events sent with special strings in key places can temporarily disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normally but be excluding or corrupting runtime data presented to the consumer. This vulnerability is distinct from GHSA-rfv9-x7hh-xc32 which covers a similar issue. The issue has been patched in matrix-js-sdk 24.0.0 and users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-28427/">CVE-2023-28427 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28427">CVE-2023-28427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209953">SUSE bug 1209953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28450</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28450" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28450" ref_url="https://www.suse.com/security/cve/CVE-2023-28450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021209.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-28450/">CVE-2023-28450 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28450">CVE-2023-28450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209358">SUSE bug 1209358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811101" comment="dnsmasq-2.85-14.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811102" comment="dnsmasq-utils-2.85-14.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28464" ref_url="https://www.suse.com/security/cve/CVE-2023-28464" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28464/">CVE-2023-28464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28464">CVE-2023-28464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209052">SUSE bug 1209052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211111">SUSE bug 1211111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220130">SUSE bug 1220130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28466" ref_url="https://www.suse.com/security/cve/CVE-2023-28466" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1800-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
    <description>
    do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28466/">CVE-2023-28466 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28466">CVE-2023-28466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209366">SUSE bug 1209366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210452">SUSE bug 1210452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211833">SUSE bug 1211833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213841">SUSE bug 1213841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806517" comment="bpftool-7.0.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806518" comment="kernel-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806519" comment="kernel-abi-stablelists-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806520" comment="kernel-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806521" comment="kernel-cross-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806522" comment="kernel-debug-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806523" comment="kernel-debug-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806526" comment="kernel-debug-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806527" comment="kernel-debug-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806528" comment="kernel-debug-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806529" comment="kernel-debug-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806532" comment="kernel-doc-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806533" comment="kernel-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806534" comment="kernel-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806535" comment="kernel-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806536" comment="kernel-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806537" comment="kernel-tools-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806538" comment="kernel-tools-libs-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806540" comment="kernel-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806541" comment="perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806542" comment="python3-perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806543" comment="rtla-5.14.0-284.18.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28484" ref_url="https://www.suse.com/security/cve/CVE-2023-28484" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.10.4, parsing of certain invalid XSD schemas can lead to a NULL pointer dereference and subsequently a segfault. This occurs in xmlSchemaFixupComplexType in xmlschemas.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28484/">CVE-2023-28484 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28484">CVE-2023-28484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210411">SUSE bug 1210411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806712" comment="libxml2-2.9.13-3.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806713" comment="libxml2-devel-2.9.13-3.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806714" comment="python3-libxml2-2.9.13-3.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28486</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28486" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28486" ref_url="https://www.suse.com/security/cve/CVE-2023-28486" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028499.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.13 does not escape control characters in log messages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28486/">CVE-2023-28486 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28486">CVE-2023-28486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209362">SUSE bug 1209362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009848258" comment="sudo-1.9.5p2-10.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848259" comment="sudo-python-plugin-1.9.5p2-10.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28487" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28487" ref_url="https://www.suse.com/security/cve/CVE-2023-28487" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1665-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028499.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.13 does not escape control characters in sudoreplay output.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-28487/">CVE-2023-28487 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28487">CVE-2023-28487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209361">SUSE bug 1209361</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009848258" comment="sudo-1.9.5p2-10.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848259" comment="sudo-python-plugin-1.9.5p2-10.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2855" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2855" ref_url="https://www.suse.com/security/cve/CVE-2023-2855" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015828.html" source="SUSE-SU"/>
    <description>
    Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-2855/">CVE-2023-2855 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2855">CVE-2023-2855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211703">SUSE bug 1211703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811077" comment="wireshark-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811078" comment="wireshark-cli-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811079" comment="wireshark-devel-3.4.10-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2856" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2856" ref_url="https://www.suse.com/security/cve/CVE-2023-2856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015828.html" source="SUSE-SU"/>
    <description>
    VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2856/">CVE-2023-2856 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2856">CVE-2023-2856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211707">SUSE bug 1211707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811077" comment="wireshark-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811078" comment="wireshark-cli-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811079" comment="wireshark-devel-3.4.10-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2858" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2858" ref_url="https://www.suse.com/security/cve/CVE-2023-2858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015828.html" source="SUSE-SU"/>
    <description>
    NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2858/">CVE-2023-2858 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2858">CVE-2023-2858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211706">SUSE bug 1211706</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811077" comment="wireshark-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811078" comment="wireshark-cli-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811079" comment="wireshark-devel-3.4.10-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28617" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28617" ref_url="https://www.suse.com/security/cve/CVE-2023-28617" source="SUSE CVE"/>
    <description>
    org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-28617/">CVE-2023-28617 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28617">CVE-2023-28617 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805593" comment="emacs-27.2-6.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805594" comment="emacs-common-27.2-6.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805595" comment="emacs-filesystem-27.2-6.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805596" comment="emacs-lucid-27.2-6.el9_1.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805597" comment="emacs-nox-27.2-6.el9_1.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28625" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28625" ref_url="https://www.suse.com/security/cve/CVE-2023-28625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023659.html" source="SUSE-SU"/>
    <description>
    mod_auth_openidc is an authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In versions 2.0.0 through 2.4.13.1, when `OIDCStripCookies` is set and a crafted cookie supplied, a NULL pointer dereference would occur, resulting in a segmentation fault. This could be used in a Denial-of-Service attack and thus presents an availability risk. Version 2.4.13.2 contains a patch for this issue. As a workaround, avoid using `OIDCStripCookies`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-12-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28625/">CVE-2023-28625 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28625">CVE-2023-28625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210073">SUSE bug 1210073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811026" comment="mod_auth_openidc-2.4.9.4-4.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28642" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28642" ref_url="https://www.suse.com/security/cve/CVE-2023-28642" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028987.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. It was found that AppArmor can be bypassed when `/proc` inside the container is symlinked with a specific mount configuration. This issue has been fixed in runc version 1.1.5, by prohibiting symlinked `/proc`. See PR #3785 for details. users are advised to upgrade. Users unable to upgrade should avoid using an untrusted container image.


    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-28642/">CVE-2023-28642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28642">CVE-2023-28642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209888">SUSE bug 1209888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810790" comment="runc-1.1.9-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28708</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28708" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28708" ref_url="https://www.suse.com/security/cve/CVE-2023-28708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-March/014225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-March/028476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    When using the RemoteIpFilter with requests received from a    reverse proxy via HTTP that include the X-Forwarded-Proto    header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not  include the secure attribute. This could result in the user agent  transmitting the session cookie over an insecure channel.

Older, EOL versions may also be affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28708/">CVE-2023-28708 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28708">CVE-2023-28708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209622">SUSE bug 1209622</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811121" comment="tomcat-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811122" comment="tomcat-admin-webapps-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811123" comment="tomcat-docs-webapp-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811124" comment="tomcat-el-3.0-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811125" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811126" comment="tomcat-lib-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811127" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811128" comment="tomcat-webapps-9.0.62-37.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28709" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28709" ref_url="https://www.suse.com/security/cve/CVE-2023-28709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP       connector settings were used such that the maxParameterCount  could be reached using query string parameters and a request was       submitted that supplied exactly maxParameterCount parameters  in the query string, the limit for uploaded request parts could be  bypassed with the potential for a denial of service to occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28709/">CVE-2023-28709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28709">CVE-2023-28709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211608">SUSE bug 1211608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228313">SUSE bug 1228313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811121" comment="tomcat-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811122" comment="tomcat-admin-webapps-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811123" comment="tomcat-docs-webapp-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811124" comment="tomcat-el-3.0-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811125" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811126" comment="tomcat-lib-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811127" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811128" comment="tomcat-webapps-9.0.62-37.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28746" ref_url="https://www.suse.com/security/cve/CVE-2023-28746" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021372.html" source="SUSE-SU"/>
		<reference ref_id="TID000021404" ref_url="https://www.suse.com/support/kb/doc/?id=000021404" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    Information exposure through microarchitectural state after transient execution from some register files for some Intel(R) Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28746/">CVE-2023-28746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-28746">CVE-2023-28746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213456">SUSE bug 1213456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954004" comment="microcode_ctl-20240910-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28755</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28755" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28755" ref_url="https://www.suse.com/security/cve/CVE-2023-28755" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032354.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14621-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4CUQQ6QHKQ66CAQFISBEQ34A2SLDQ5JS/" source="SUSE-SU"/>
    <description>
    A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-28755/">CVE-2023-28755 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28755">CVE-2023-28755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209891">SUSE bug 1209891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212890">SUSE bug 1212890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872248" comment="ruby-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872249" comment="ruby-bundled-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872250" comment="ruby-default-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872251" comment="ruby-devel-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872252" comment="ruby-doc-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872253" comment="ruby-libs-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872254" comment="rubygem-bigdecimal-3.1.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872255" comment="rubygem-bundler-2.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872256" comment="rubygem-io-console-0.5.11-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872257" comment="rubygem-irb-1.4.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872258" comment="rubygem-json-2.6.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872259" comment="rubygem-minitest-5.15.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872264" comment="rubygem-power_assert-2.0.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872265" comment="rubygem-psych-4.0.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872266" comment="rubygem-rake-13.0.6-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872267" comment="rubygem-rbs-2.7.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872268" comment="rubygem-rdoc-6.4.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872585" comment="rubygem-rexml-3.2.5-162.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872586" comment="rubygem-rss-0.2.9-162.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872271" comment="rubygem-test-unit-3.5.3-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872272" comment="rubygem-typeprof-0.21.3-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872273" comment="rubygems-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872274" comment="rubygems-devel-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28756" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28756" ref_url="https://www.suse.com/security/cve/CVE-2023-28756" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032354.html" source="SUSE-SU"/>
    <description>
    A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-28756/">CVE-2023-28756 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28756">CVE-2023-28756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209967">SUSE bug 1209967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212739">SUSE bug 1212739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872248" comment="ruby-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872249" comment="ruby-bundled-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872250" comment="ruby-default-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872251" comment="ruby-devel-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872252" comment="ruby-doc-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872253" comment="ruby-libs-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872254" comment="rubygem-bigdecimal-3.1.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872255" comment="rubygem-bundler-2.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872256" comment="rubygem-io-console-0.5.11-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872257" comment="rubygem-irb-1.4.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872258" comment="rubygem-json-2.6.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872259" comment="rubygem-minitest-5.15.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872264" comment="rubygem-power_assert-2.0.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872265" comment="rubygem-psych-4.0.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872266" comment="rubygem-rake-13.0.6-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872267" comment="rubygem-rbs-2.7.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872268" comment="rubygem-rdoc-6.4.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872585" comment="rubygem-rexml-3.2.5-162.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872586" comment="rubygem-rss-0.2.9-162.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872271" comment="rubygem-test-unit-3.5.3-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872272" comment="rubygem-typeprof-0.21.3-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872273" comment="rubygems-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872274" comment="rubygems-devel-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28866" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28866" ref_url="https://www.suse.com/security/cve/CVE-2023-28866" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.2.8, net/bluetooth/hci_sync.c allows out-of-bounds access because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element, but do not.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-28866/">CVE-2023-28866 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28866">CVE-2023-28866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1209780">SUSE bug 1209780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202328879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-28879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-28879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28879" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-28879" ref_url="https://www.suse.com/security/cve/CVE-2023-28879" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014432.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript through 10.01.0, there is a buffer overflow leading to potential corruption of data internal to the PostScript interpreter, in base/sbcp.c. This affects BCPEncode, BCPDecode, TBCPEncode, and TBCPDecode. If the write buffer is filled to one byte less than full, and one then tries to write an escaped character, two bytes are written.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-28879/">CVE-2023-28879 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-28879">CVE-2023-28879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210062">SUSE bug 1210062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1210900">SUSE bug 1210900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211514">SUSE bug 1211514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213844">SUSE bug 1213844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811109" comment="ghostscript-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811110" comment="ghostscript-doc-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811111" comment="ghostscript-tools-dvipdf-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811112" comment="ghostscript-tools-fonts-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811113" comment="ghostscript-tools-printing-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811114" comment="ghostscript-x11-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811115" comment="libgs-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811116" comment="libgs-devel-9.54.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29007</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29007" ref_url="https://www.suse.com/security/cve/CVE-2023-29007" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2038-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014775.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1, a specially crafted `.gitmodules` file with submodule URLs that are longer than 1024 characters can used to exploit a bug in `config.c::git_config_copy_or_rename_section_in_file()`. This bug can be used to inject arbitrary configuration into a user's `$GIT_DIR/config` when attempting to remove the configuration section associated with that submodule. When the attacker injects configuration values which specify executables to run (such as `core.pager`, `core.editor`, `core.sshCommand`, etc.) this can lead to a remote code execution. A fix A fix is available in versions 2.30.9, 2.31.8, 2.32.7, 2.33.8, 2.34.8, 2.35.8, 2.36.6, 2.37.7, 2.38.5, 2.39.3, and 2.40.1. As a workaround, avoid running `git submodule deinit` on untrusted repositories or without prior inspection of any submodule sections in `$GIT_DIR/config`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-29007/">CVE-2023-29007 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29007">CVE-2023-29007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210686">SUSE bug 1210686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806013" comment="git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806014" comment="git-all-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806015" comment="git-core-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806016" comment="git-core-doc-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806017" comment="git-credential-libsecret-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806018" comment="git-daemon-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806019" comment="git-email-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806020" comment="git-gui-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806021" comment="git-instaweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806022" comment="git-subtree-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806023" comment="git-svn-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806024" comment="gitk-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806025" comment="gitweb-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806026" comment="perl-Git-2.39.3-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806027" comment="perl-Git-SVN-2.39.3-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29331</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29331" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29331" ref_url="https://www.suse.com/security/cve/CVE-2023-29331" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29331/">CVE-2023-29331 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29331">CVE-2023-29331 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806050" comment="aspnetcore-runtime-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806074" comment="aspnetcore-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806051" comment="aspnetcore-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806075" comment="aspnetcore-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806052" comment="dotnet-apphost-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806076" comment="dotnet-apphost-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806077" comment="dotnet-host-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806053" comment="dotnet-hostfxr-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806078" comment="dotnet-hostfxr-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806054" comment="dotnet-runtime-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806079" comment="dotnet-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806055" comment="dotnet-sdk-6.0-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806056" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806080" comment="dotnet-sdk-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806081" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806057" comment="dotnet-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806082" comment="dotnet-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806058" comment="dotnet-templates-6.0-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806083" comment="dotnet-templates-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806084" comment="netstandard-targeting-pack-2.1-7.0.107-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29337" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29337" ref_url="https://www.suse.com/security/cve/CVE-2023-29337" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29337/">CVE-2023-29337 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29337">CVE-2023-29337 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806050" comment="aspnetcore-runtime-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806074" comment="aspnetcore-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806051" comment="aspnetcore-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806075" comment="aspnetcore-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806052" comment="dotnet-apphost-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806076" comment="dotnet-apphost-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806077" comment="dotnet-host-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806053" comment="dotnet-hostfxr-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806078" comment="dotnet-hostfxr-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806054" comment="dotnet-runtime-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806079" comment="dotnet-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806055" comment="dotnet-sdk-6.0-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806056" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806080" comment="dotnet-sdk-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806081" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806057" comment="dotnet-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806082" comment="dotnet-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806058" comment="dotnet-templates-6.0-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806083" comment="dotnet-templates-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806084" comment="netstandard-targeting-pack-2.1-7.0.107-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29400</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29400" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29400" ref_url="https://www.suse.com/security/cve/CVE-2023-29400" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2105-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014783.html" source="SUSE-SU"/>
    <description>
    Templates containing actions in unquoted HTML attributes (e.g. "attr={{.}}") executed with empty input can result in output with unexpected results when parsed due to HTML normalization rules. This may allow injection of arbitrary attributes into tags.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-29400/">CVE-2023-29400 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29400">CVE-2023-29400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211031">SUSE bug 1211031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806028" comment="go-toolset-1.19.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806029" comment="golang-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806030" comment="golang-bin-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806031" comment="golang-docs-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806032" comment="golang-misc-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806033" comment="golang-race-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806034" comment="golang-src-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806035" comment="golang-tests-1.19.9-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29402" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29402" ref_url="https://www.suse.com/security/cve/CVE-2023-29402" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015222.html" source="SUSE-SU"/>
    <description>
    The go command may generate unexpected code at build time when using cgo. This may result in unexpected behavior when running a go program which uses cgo. This may occur when running an untrusted module which contains directories with newline characters in their names. Modules which are retrieved using the go command, i.e. via "go get", are not affected (modules retrieved using GOPATH-mode, i.e. GO111MODULE=off, may be affected).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29402/">CVE-2023-29402 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29402">CVE-2023-29402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212073">SUSE bug 1212073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806545" comment="go-toolset-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806546" comment="golang-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806547" comment="golang-bin-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806548" comment="golang-docs-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806549" comment="golang-misc-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806550" comment="golang-race-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806551" comment="golang-src-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806552" comment="golang-tests-1.19.10-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29403" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29403" ref_url="https://www.suse.com/security/cve/CVE-2023-29403" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015222.html" source="SUSE-SU"/>
    <description>
    On Unix platforms, the Go runtime does not behave differently when a binary is run with the setuid/setgid bits. This can be dangerous in certain cases, such as when dumping memory state, or assuming the status of standard i/o file descriptors. If a setuid/setgid binary is executed with standard I/O file descriptors closed, opening any files can result in unexpected content being read or written with elevated privileges. Similarly, if a setuid/setgid program is terminated, either via panic or signal, it may leak the contents of its registers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29403/">CVE-2023-29403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29403">CVE-2023-29403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212074">SUSE bug 1212074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806545" comment="go-toolset-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806546" comment="golang-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806547" comment="golang-bin-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806548" comment="golang-docs-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806549" comment="golang-misc-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806550" comment="golang-race-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806551" comment="golang-src-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806552" comment="golang-tests-1.19.10-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29404" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29404" ref_url="https://www.suse.com/security/cve/CVE-2023-29404" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015222.html" source="SUSE-SU"/>
    <description>
    The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. The arguments for a number of flags which are non-optional are incorrectly considered optional, allowing disallowed flags to be smuggled through the LDFLAGS sanitization. This affects usage of both the gc and gccgo compilers.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29404/">CVE-2023-29404 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29404">CVE-2023-29404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212075">SUSE bug 1212075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806545" comment="go-toolset-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806546" comment="golang-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806547" comment="golang-bin-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806548" comment="golang-docs-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806549" comment="golang-misc-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806550" comment="golang-race-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806551" comment="golang-src-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806552" comment="golang-tests-1.19.10-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29405</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29405" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29405" ref_url="https://www.suse.com/security/cve/CVE-2023-29405" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015222.html" source="SUSE-SU"/>
    <description>
    The go command may execute arbitrary code at build time when using cgo. This may occur when running "go get" on a malicious module, or when running any other command which builds untrusted code. This is can by triggered by linker flags, specified via a "#cgo LDFLAGS" directive. Flags containing embedded spaces are mishandled, allowing disallowed flags to be smuggled through the LDFLAGS sanitization by including them in the argument of another flag. This only affects usage of the gccgo compiler.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29405/">CVE-2023-29405 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29405">CVE-2023-29405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212076">SUSE bug 1212076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806545" comment="go-toolset-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806546" comment="golang-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806547" comment="golang-bin-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806548" comment="golang-docs-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806549" comment="golang-misc-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806550" comment="golang-race-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806551" comment="golang-src-1.19.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806552" comment="golang-tests-1.19.10-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29406</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29406" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29406" ref_url="https://www.suse.com/security/cve/CVE-2023-29406" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
    <description>
    The HTTP/1 client does not fully validate the contents of the Host header. A maliciously crafted Host header can inject additional headers or entire requests. With fix, the HTTP/1 client now refuses to send requests containing an invalid Request.Host or Request.URL.Host value.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-29406/">CVE-2023-29406 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29406">CVE-2023-29406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213229">SUSE bug 1213229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811080" comment="buildah-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811081" comment="buildah-tests-1.31.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811029" comment="containernetworking-plugins-1.3.0-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053659" comment="git-lfs-3.4.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807206" comment="go-toolset-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807207" comment="golang-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807208" comment="golang-bin-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807209" comment="golang-docs-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807210" comment="golang-misc-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807211" comment="golang-race-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807212" comment="golang-src-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807213" comment="golang-tests-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811024" comment="skopeo-1.13.3-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811025" comment="skopeo-tests-1.13.3-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29409" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29409" ref_url="https://www.suse.com/security/cve/CVE-2023-29409" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202306:15231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202309:15230-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3867-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3868-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016419.html" source="SUSE-SU"/>
    <description>
    Extremely large RSA keys in certificate chains can cause a client/server to expend significant CPU time verifying signatures. With fix, the size of RSA keys transmitted during handshakes is restricted to &lt;= 8192 bits. Based on a survey of publicly trusted RSA keys, there are currently only three certificates in circulation with keys larger than this, and all three appear to be test certificates that are not actively deployed. It is possible there are larger keys in use in private PKIs, but we target the web PKI, so causing breakage here in the interests of increasing the default safety of users of crypto/tls seems reasonable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29409/">CVE-2023-29409 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29409">CVE-2023-29409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213880">SUSE bug 1213880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816428" comment="buildah-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816429" comment="buildah-tests-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816436" comment="containernetworking-plugins-1.3.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807206" comment="go-toolset-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807207" comment="golang-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807208" comment="golang-bin-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807209" comment="golang-docs-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807210" comment="golang-misc-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807211" comment="golang-race-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807212" comment="golang-src-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807213" comment="golang-tests-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816430" comment="podman-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816431" comment="podman-docker-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816432" comment="podman-gvproxy-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816433" comment="podman-plugins-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816434" comment="podman-remote-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816435" comment="podman-tests-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816427" comment="runc-1.1.9-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816425" comment="skopeo-1.13.3-3.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816426" comment="skopeo-tests-1.13.3-3.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29469" ref_url="https://www.suse.com/security/cve/CVE-2023-29469" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/029028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14697-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U5YNW74OL2W7SH2XTAVN5TODNFIVFL3Y/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\0' value).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29469/">CVE-2023-29469 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29469">CVE-2023-29469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210412">SUSE bug 1210412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806712" comment="libxml2-2.9.13-3.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806713" comment="libxml2-devel-2.9.13-3.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806714" comment="python3-libxml2-2.9.13-3.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29479" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29479" ref_url="https://www.suse.com/security/cve/CVE-2023-29479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
    <description>
    Ribose RNP before 0.16.3 may hang when the input is malformed.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29479/">CVE-2023-29479 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29479">CVE-2023-29479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29483</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29483" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29483" ref_url="https://www.suse.com/security/cve/CVE-2023-29483" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9423" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2605-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021208.html" source="SUSE-SU"/>
    <description>
    eventlet before 0.35.2, as used in dnspython before 2.6.0, allows remote attackers to interfere with DNS name resolution by quickly sending an invalid packet from the expected IP address and source port, aka a "TuDoor" attack. In other words, dnspython does not have the preferred behavior in which the DNS name resolution algorithm would proceed, within the full time window, in order to wait for a valid packet. NOTE: dnspython 2.6.0 is unusable for a different reason that was addressed in 2.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29483/">CVE-2023-29483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-29483">CVE-2023-29483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222693">SUSE bug 1222693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953761" comment="python3-dns-2.6.1-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29491" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29491" ref_url="https://www.suse.com/security/cve/CVE-2023-29491" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014765.html" source="SUSE-SU"/>
    <description>
    ncurses before 6.4 20230408, when used by a setuid application, allows local users to trigger security-relevant memory corruption via malformed data in a terminfo database file that is found in $HOME/.terminfo or reached via the TERMINFO or TERM environment variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-29491/">CVE-2023-29491 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29491">CVE-2023-29491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210434">SUSE bug 1210434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810820" comment="ncurses-6.2-10.20210508.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810821" comment="ncurses-base-6.2-10.20210508.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810822" comment="ncurses-c++-libs-6.2-10.20210508.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810823" comment="ncurses-devel-6.2-10.20210508.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810824" comment="ncurses-libs-6.2-10.20210508.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810825" comment="ncurses-term-6.2-10.20210508.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29499" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29499" ref_url="https://www.suse.com/security/cve/CVE-2023-29499" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016101.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-29499/">CVE-2023-29499 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29499">CVE-2023-29499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211947">SUSE bug 1211947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211948">SUSE bug 1211948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810802" comment="glib2-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810803" comment="glib2-devel-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810804" comment="glib2-doc-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810805" comment="glib2-static-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810806" comment="glib2-tests-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868750" comment="mingw32-glib2-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868751" comment="mingw32-glib2-static-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868752" comment="mingw64-glib2-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868753" comment="mingw64-glib2-static-2.78.0-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2952" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2952" ref_url="https://www.suse.com/security/cve/CVE-2023-2952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015828.html" source="SUSE-SU"/>
    <description>
    XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-2952/">CVE-2023-2952 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2952">CVE-2023-2952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211844">SUSE bug 1211844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811077" comment="wireshark-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811078" comment="wireshark-cli-3.4.10-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811079" comment="wireshark-devel-3.4.10-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29533" ref_url="https://www.suse.com/security/cve/CVE-2023-29533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the fullscreen notification by using a combination of &lt;code&gt;window.open&lt;/code&gt;, fullscreen requests, &lt;code&gt;window.name&lt;/code&gt; assignments, and &lt;code&gt;setInterval&lt;/code&gt; calls. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29533/">CVE-2023-29533 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29533">CVE-2023-29533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29535" ref_url="https://www.suse.com/security/cve/CVE-2023-29535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Following a Garbage Collector compaction, weak maps may have been accessed before they were correctly traced. This resulted in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29535/">CVE-2023-29535 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29535">CVE-2023-29535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29536" ref_url="https://www.suse.com/security/cve/CVE-2023-29536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could cause the memory manager to incorrectly free a pointer that addresses attacker-controlled memory, resulting in an assertion, memory corruption, or a potentially exploitable crash. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29536/">CVE-2023-29536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29536">CVE-2023-29536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29539" ref_url="https://www.suse.com/security/cve/CVE-2023-29539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When handling the filename directive in the Content-Disposition header, the filename would be truncated if the filename contained a NULL character. This could have led to reflected file download attacks potentially tricking users to install malware. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29539/">CVE-2023-29539 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29539">CVE-2023-29539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29541" ref_url="https://www.suse.com/security/cve/CVE-2023-29541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox did not properly handle downloads of files ending in &lt;code&gt;.desktop&lt;/code&gt;, which can be interpreted to run attacker-controlled commands. &lt;br&gt;*This bug only affects Firefox for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29541/">CVE-2023-29541 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29541">CVE-2023-29541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29548" ref_url="https://www.suse.com/security/cve/CVE-2023-29548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A wrong lowering instruction in the ARM64 Ion compiler resulted in a wrong optimization result. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29548/">CVE-2023-29548 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29548">CVE-2023-29548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202329550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-29550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-29550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-29550" ref_url="https://www.suse.com/security/cve/CVE-2023-29550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:1817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014672.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 111 and Firefox ESR 102.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 112, Focus for Android &lt; 112, Firefox ESR &lt; 102.10, Firefox for Android &lt; 112, and Thunderbird &lt; 102.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-29550/">CVE-2023-29550 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-29550">CVE-2023-29550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210212">SUSE bug 1210212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805523" comment="firefox-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805524" comment="firefox-x11-102.10.0-1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805525" comment="thunderbird-102.10.0-2.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2975" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2975" ref_url="https://www.suse.com/security/cve/CVE-2023-2975" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015685.html" source="SUSE-SU"/>
    <description>
    Issue summary: The AES-SIV cipher implementation contains a bug that causes
it to ignore empty associated data entries which are unauthenticated as
a consequence.

Impact summary: Applications that use the AES-SIV algorithm and want to
authenticate empty data entries as associated data can be misled by removing,
adding or reordering such empty entries as these are ignored by the OpenSSL
implementation. We are currently unaware of any such applications.

The AES-SIV algorithm allows for authentication of multiple associated
data entries along with the encryption. To authenticate empty data the
application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with
NULL pointer as the output buffer and 0 as the input buffer length.
The AES-SIV implementation in OpenSSL just returns success for such a call
instead of performing the associated data authentication operation.
The empty data thus will not be authenticated.

As this issue does not affect non-empty associated data authentication and
we expect it to be rare for an application to use empty associated data
entries this is qualified as Low severity issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-2975/">CVE-2023-2975 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213383">SUSE bug 1213383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867976" comment="openssl-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867977" comment="openssl-devel-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867978" comment="openssl-fips-provider-3.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867979" comment="openssl-libs-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867980" comment="openssl-perl-3.0.7-27.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20232977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-2977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-2977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2977" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-2977" ref_url="https://www.suse.com/security/cve/CVE-2023-2977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2508-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029894.html" source="SUSE-SU"/>
    <description>
    A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-2977/">CVE-2023-2977 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-2977">CVE-2023-2977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211894">SUSE bug 1211894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811134" comment="opensc-0.23.0-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30079" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30079" ref_url="https://www.suse.com/security/cve/CVE-2023-30079" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3954-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036542.html" source="SUSE-SU"/>
    <description>
    DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30079/">CVE-2023-30079 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30079">CVE-2023-30079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211078">SUSE bug 1211078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214598">SUSE bug 1214598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806711" comment="libeconf-0.4.1-3.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30086" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30086" ref_url="https://www.suse.com/security/cve/CVE-2023-30086" source="SUSE CVE"/>
    <description>
    Buffer Overflow vulnerability found in Libtiff V.4.0.7 allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30086/">CVE-2023-30086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30086">CVE-2023-30086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211252">SUSE bug 1211252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3019" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3019" ref_url="https://www.suse.com/security/cve/CVE-2023-3019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
    <description>
    A DMA reentrancy issue leading to a use-after-free error was found in the e1000e NIC emulation code in QEMU. This issue could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3019/">CVE-2023-3019 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3019">CVE-2023-3019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213269">SUSE bug 1213269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872275" comment="qemu-guest-agent-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872276" comment="qemu-img-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872277" comment="qemu-kvm-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872278" comment="qemu-kvm-audio-pa-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872279" comment="qemu-kvm-block-blkio-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872280" comment="qemu-kvm-block-curl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872281" comment="qemu-kvm-block-rbd-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872282" comment="qemu-kvm-common-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872283" comment="qemu-kvm-core-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872284" comment="qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872285" comment="qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872286" comment="qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872287" comment="qemu-kvm-device-usb-host-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872288" comment="qemu-kvm-device-usb-redirect-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872289" comment="qemu-kvm-docs-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872290" comment="qemu-kvm-tools-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872291" comment="qemu-kvm-ui-egl-headless-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872292" comment="qemu-kvm-ui-opengl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872293" comment="qemu-pr-helper-8.2.0-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30456" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30456" ref_url="https://www.suse.com/security/cve/CVE-2023-30456" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in arch/x86/kvm/vmx/nested.c in the Linux kernel before 6.2.8. nVMX on x86_64 lacks consistency checks for CR0 and CR4.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-30456/">CVE-2023-30456 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30456">CVE-2023-30456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210294">SUSE bug 1210294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30581" ref_url="https://www.suse.com/security/cve/CVE-2023-30581" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031219.html" source="SUSE-SU"/>
    <description>
    The use of __proto__ in process.mainModule.__proto__.require() can bypass the policy mechanism and require modules outside of the policy.json definition. This vulnerability affects all users using the experimental policy mechanism in all active release lines: v16, v18 and, v20.

Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-30581/">CVE-2023-30581 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30581">CVE-2023-30581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212574">SUSE bug 1212574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806706" comment="nodejs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806707" comment="nodejs-docs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806708" comment="nodejs-full-i18n-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806709" comment="nodejs-libs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806710" comment="npm-8.19.4-1.16.20.1.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30588</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30588" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30588" ref_url="https://www.suse.com/security/cve/CVE-2023-30588" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario. This vulnerability affects all active Node.js versions v16, v18, and, v20.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30588/">CVE-2023-30588 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30588">CVE-2023-30588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212581">SUSE bug 1212581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806706" comment="nodejs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806707" comment="nodejs-docs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806708" comment="nodejs-full-i18n-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806709" comment="nodejs-libs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806710" comment="npm-8.19.4-1.16.20.1.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30589</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30589" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30589" ref_url="https://www.suse.com/security/cve/CVE-2023-30589" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031219.html" source="SUSE-SU"/>
    <description>
    The llhttp parser in the http module in Node v20.2.0 does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).

The CR character (without LF) is sufficient to delimit HTTP header fields in the llhttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This impacts all Node.js active versions: v16, v18, and, v20
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-05-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-30589/">CVE-2023-30589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30589">CVE-2023-30589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212582">SUSE bug 1212582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806706" comment="nodejs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806707" comment="nodejs-docs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806708" comment="nodejs-full-i18n-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806709" comment="nodejs-libs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806710" comment="npm-8.19.4-1.16.20.1.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30590</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30590" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30590" ref_url="https://www.suse.com/security/cve/CVE-2023-30590" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031219.html" source="SUSE-SU"/>
    <description>
    The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However, the documentation says this API call: "Generates private and public Diffie-Hellman key values".

The documented behavior is very different from the actual behavior, and this difference could easily lead to security issues in applications that use these APIs as the DiffieHellman may be used as the basis for application-level security, implications are consequently broad.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-30590/">CVE-2023-30590 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30590">CVE-2023-30590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212583">SUSE bug 1212583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806706" comment="nodejs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806707" comment="nodejs-docs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806708" comment="nodejs-full-i18n-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806709" comment="nodejs-libs-16.20.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806710" comment="npm-8.19.4-1.16.20.1.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30630" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30630" ref_url="https://www.suse.com/security/cve/CVE-2023-30630" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-April/028935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-April/014595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029418.html" source="SUSE-SU"/>
    <description>
    Dmidecode before 3.5 allows -dump-bin to overwrite a local file. This has security relevance because, for example, execution of Dmidecode via Sudo is plausible. NOTE: Some third parties have indicated the fix in 3.5 does not adequately address the vulnerability. The argument is that the proposed patch prevents dmidecode from writing to an existing file. However, there are multiple attack vectors that would not require overwriting an existing file that would provide the same level of unauthorized privilege escalation (e.g. creating a new file in /etc/cron.hourly).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-30630/">CVE-2023-30630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30630">CVE-2023-30630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210418">SUSE bug 1210418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806815" comment="dmidecode-3.3-7.el9_2.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30774</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30774" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30774" ref_url="https://www.suse.com/security/cve/CVE-2023-30774" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-30774/">CVE-2023-30774 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30774">CVE-2023-30774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210493">SUSE bug 1210493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202330775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-30775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-30775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30775" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-30775" ref_url="https://www.suse.com/security/cve/CVE-2023-30775" source="SUSE CVE"/>
    <description>
    A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-30775/">CVE-2023-30775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-30775">CVE-2023-30775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210494">SUSE bug 1210494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805814" comment="libtiff-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805815" comment="libtiff-devel-4.4.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805816" comment="libtiff-tools-4.4.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3090" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3090" ref_url="https://www.suse.com/security/cve/CVE-2023-3090" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031545.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.

The out-of-bounds write is caused by missing skb-&gt;cb  initialization in the ipvlan network driver. The vulnerability is reachable if  CONFIG_IPVLAN is enabled.


We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3090/">CVE-2023-3090 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3090">CVE-2023-3090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212842">SUSE bug 1212842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212849">SUSE bug 1212849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214128">SUSE bug 1214128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219701">SUSE bug 1219701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806723" comment="bpftool-7.0.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806724" comment="kernel-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806725" comment="kernel-abi-stablelists-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806726" comment="kernel-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806727" comment="kernel-cross-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806728" comment="kernel-debug-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806729" comment="kernel-debug-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806732" comment="kernel-debug-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806733" comment="kernel-debug-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806734" comment="kernel-debug-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806735" comment="kernel-debug-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806738" comment="kernel-doc-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806739" comment="kernel-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806740" comment="kernel-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806741" comment="kernel-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806742" comment="kernel-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806743" comment="kernel-tools-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806744" comment="kernel-tools-libs-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806746" comment="kernel-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806747" comment="perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806748" comment="python3-perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806749" comment="rtla-5.14.0-284.25.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31083" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31083" ref_url="https://www.suse.com/security/cve/CVE-2023-31083" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/bluetooth/hci_ldisc.c in the Linux kernel 6.2. In hci_uart_tty_ioctl, there is a race condition between HCIUARTSETPROTO and HCIUARTGETPROTO. HCI_UART_PROTO_SET is set before hu-&gt;proto is set. A NULL pointer dereference may occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31083/">CVE-2023-31083 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31083">CVE-2023-31083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210780">SUSE bug 1210780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31122" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31122" ref_url="https://www.suse.com/security/cve/CVE-2023-31122" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017043.html" source="SUSE-SU"/>
    <description>
    Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31122/">CVE-2023-31122 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31122">CVE-2023-31122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216424">SUSE bug 1216424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217549">SUSE bug 1217549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866640" comment="httpd-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866641" comment="httpd-core-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866642" comment="httpd-devel-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866643" comment="httpd-filesystem-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866644" comment="httpd-manual-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866645" comment="httpd-tools-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866646" comment="mod_ldap-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866647" comment="mod_lua-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866648" comment="mod_proxy_html-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866649" comment="mod_session-2.4.57-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866650" comment="mod_ssl-2.4.57-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31124" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31124" ref_url="https://www.suse.com/security/cve/CVE-2023-31124" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android.  This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-31124/">CVE-2023-31124 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31124">CVE-2023-31124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211607">SUSE bug 1211607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811170" comment="c-ares-1.19.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811171" comment="c-ares-devel-1.19.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806045" comment="nodejs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806046" comment="nodejs-devel-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806047" comment="nodejs-docs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806048" comment="nodejs-full-i18n-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806069" comment="nodejs-libs-16.19.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805992" comment="nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806049" comment="npm-9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31130" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31130" ref_url="https://www.suse.com/security/cve/CVE-2023-31130" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue.  C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-31130/">CVE-2023-31130 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31130">CVE-2023-31130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211606">SUSE bug 1211606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811170" comment="c-ares-1.19.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811171" comment="c-ares-devel-1.19.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806045" comment="nodejs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806046" comment="nodejs-devel-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806047" comment="nodejs-docs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806048" comment="nodejs-full-i18n-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806069" comment="nodejs-libs-16.19.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805992" comment="nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806049" comment="npm-9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31147" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31147" ref_url="https://www.suse.com/security/cve/CVE-2023-31147" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31147/">CVE-2023-31147 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31147">CVE-2023-31147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211605">SUSE bug 1211605</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811170" comment="c-ares-1.19.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811171" comment="c-ares-devel-1.19.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806045" comment="nodejs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806046" comment="nodejs-devel-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806047" comment="nodejs-docs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806048" comment="nodejs-full-i18n-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806069" comment="nodejs-libs-16.19.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805992" comment="nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806049" comment="npm-9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31248" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31248" ref_url="https://www.suse.com/security/cve/CVE-2023-31248" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-31248/">CVE-2023-31248 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31248">CVE-2023-31248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213061">SUSE bug 1213061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213064">SUSE bug 1213064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3128</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3128" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3128" ref_url="https://www.suse.com/security/cve/CVE-2023-3128" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2915-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2916-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020341.html" source="SUSE-SU"/>
    <description>
    Grafana is validating Azure AD accounts based on the email claim. 

On Azure AD, the profile email field is not unique and can be easily modified. 

This leads to account takeover and authentication bypass when Azure AD OAuth is configured with a multi-tenant app.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-3128/">CVE-2023-3128 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3128">CVE-2023-3128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212641">SUSE bug 1212641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806553" comment="grafana-9.0.9-3.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31346</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31346" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31346" ref_url="https://www.suse.com/security/cve/CVE-2023-31346" source="SUSE CVE"/>
    <description>
    Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.

















    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-31346/">CVE-2023-31346 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31346">CVE-2023-31346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219902">SUSE bug 1219902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877115" comment="iwl100-firmware-39.31.5.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877116" comment="iwl1000-firmware-39.31.5.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877117" comment="iwl105-firmware-18.168.6.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877118" comment="iwl135-firmware-18.168.6.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877119" comment="iwl2000-firmware-18.168.6.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877120" comment="iwl2030-firmware-18.168.6.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877121" comment="iwl3160-firmware-25.30.13.0-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877122" comment="iwl5000-firmware-8.83.5.1_1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877123" comment="iwl5150-firmware-8.24.2.2-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877124" comment="iwl6000g2a-firmware-18.168.6.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877125" comment="iwl6000g2b-firmware-18.168.6.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877126" comment="iwl6050-firmware-41.28.5.1-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877127" comment="iwl7260-firmware-25.30.13.0-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877128" comment="libertas-sd8787-firmware-20240603-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877129" comment="linux-firmware-20240603-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877130" comment="linux-firmware-whence-20240603-143.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877131" comment="netronome-firmware-20240603-143.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31356" ref_url="https://www.suse.com/security/cve/CVE-2023-31356" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000106.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7484" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000103.html" source="SUSE-SU"/>
    <description>
    Incomplete system memory cleanup in SEV firmware could
allow a privileged attacker to corrupt guest private memory, potentially
resulting in a loss of data integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-03"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-31356/">CVE-2023-31356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-31356">CVE-2023-31356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229263">SUSE bug 1229263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945415" comment="iwl100-firmware-39.31.5.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945416" comment="iwl1000-firmware-39.31.5.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945417" comment="iwl105-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945418" comment="iwl135-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945419" comment="iwl2000-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945420" comment="iwl2030-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945421" comment="iwl3160-firmware-25.30.13.0-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945422" comment="iwl5000-firmware-8.83.5.1_1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945423" comment="iwl5150-firmware-8.24.2.2-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945424" comment="iwl6000g2a-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945425" comment="iwl6000g2b-firmware-18.168.6.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945426" comment="iwl6050-firmware-41.28.5.1-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945427" comment="iwl7260-firmware-25.30.13.0-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945428" comment="libertas-sd8787-firmware-20240905-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945429" comment="linux-firmware-20240905-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945430" comment="linux-firmware-whence-20240905-143.3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945431" comment="netronome-firmware-20240905-143.3.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3138</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3138" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3138" ref_url="https://www.suse.com/security/cve/CVE-2023-3138" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030001.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11. The security flaw occurs because the functions in src/InitExt.c in libX11 do not check that the values provided for the Request, Event, or Error IDs are within the bounds of the arrays that those functions write to, using those IDs as array indexes. They trust that they were called with values provided by an Xserver adhering to the bounds specified in the X11 protocol, as all X servers provided by X.Org do. As the protocol only specifies a single byte for these values, an out-of-bounds value provided by a malicious server (or a malicious proxy-in-the-middle) can only overwrite other portions of the Display structure and not write outside the bounds of the Display structure itself, possibly causing the client to crash with this memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3138/">CVE-2023-3138 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3138">CVE-2023-3138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212102">SUSE bug 1212102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212746">SUSE bug 1212746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213994">SUSE bug 1213994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811091" comment="libX11-1.7.0-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811092" comment="libX11-common-1.7.0-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811093" comment="libX11-devel-1.7.0-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811094" comment="libX11-xcb-1.7.0-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3141" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3141" ref_url="https://www.suse.com/security/cve/CVE-2023-3141" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-3141/">CVE-2023-3141 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3141">CVE-2023-3141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212129">SUSE bug 1212129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31484" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31484" ref_url="https://www.suse.com/security/cve/CVE-2023-31484" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0079" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2881-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018518.html" source="SUSE-SU"/>
    <description>
    CPAN.pm before 2.35 does not verify TLS certificates when downloading distributions over HTTPS.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-01-15"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31484/">CVE-2023-31484 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31484">CVE-2023-31484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210999">SUSE bug 1210999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811107" comment="perl-CPAN-2.29-3.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31486</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31486" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31486" ref_url="https://www.suse.com/security/cve/CVE-2023-31486" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2023:0222-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FZ3WQJQQLQE44DSFUCLKY6CTBST6SPN6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0223-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E3ZS64YN6IDP4X4L3RSPD77DZ3YJT32J/" source="SUSE-SU"/>
    <description>
    HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-31486/">CVE-2023-31486 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31486">CVE-2023-31486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211001">SUSE bug 1211001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811108" comment="perl-HTTP-Tiny-0.076-461.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31489" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31489" ref_url="https://www.suse.com/security/cve/CVE-2023-31489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_capability_llgr() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31489/">CVE-2023-31489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31489">CVE-2023-31489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211248">SUSE bug 1211248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202331490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-31490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-31490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31490" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-31490" ref_url="https://www.suse.com/security/cve/CVE-2023-31490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-31490/">CVE-2023-31490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-31490">CVE-2023-31490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211249">SUSE bug 1211249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3161</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3161" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3161" ref_url="https://www.suse.com/security/cve/CVE-2023-3161" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing font-&gt;width and font-&gt;height greater than 32 to fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs leading to undefined behavior and possible denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3161/">CVE-2023-3161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3161">CVE-2023-3161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212154">SUSE bug 1212154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32002" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32002" ref_url="https://www.suse.com/security/cve/CVE-2023-32002" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031219.html" source="SUSE-SU"/>
    <description>
    The use of `Module._load()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.

This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x.

Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-32002/">CVE-2023-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32002">CVE-2023-32002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214150">SUSE bug 1214150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806906" comment="nodejs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806907" comment="nodejs-devel-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806908" comment="nodejs-docs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806909" comment="nodejs-full-i18n-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807156" comment="nodejs-libs-16.20.2-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806911" comment="npm-9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32006" ref_url="https://www.suse.com/security/cve/CVE-2023-32006" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031219.html" source="SUSE-SU"/>
    <description>
    The use of `module.constructor.createRequire()` can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.

This vulnerability affects all users using the experimental policy mechanism in all active release lines: 16.x, 18.x, and, 20.x.

Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32006/">CVE-2023-32006 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32006">CVE-2023-32006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214156">SUSE bug 1214156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806906" comment="nodejs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806907" comment="nodejs-devel-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806908" comment="nodejs-docs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806909" comment="nodejs-full-i18n-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807156" comment="nodejs-libs-16.20.2-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806911" comment="npm-9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32032" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32032" ref_url="https://www.suse.com/security/cve/CVE-2023-32032" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32032/">CVE-2023-32032 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32032">CVE-2023-32032 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806074" comment="aspnetcore-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806075" comment="aspnetcore-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806076" comment="dotnet-apphost-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806077" comment="dotnet-host-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806078" comment="dotnet-hostfxr-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806079" comment="dotnet-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806080" comment="dotnet-sdk-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806081" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806082" comment="dotnet-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806083" comment="dotnet-templates-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806084" comment="netstandard-targeting-pack-2.1-7.0.107-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32067</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32067" ref_url="https://www.suse.com/security/cve/CVE-2023-32067" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:1678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:1679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/015004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015510.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32067/">CVE-2023-32067 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32067">CVE-2023-32067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211604">SUSE bug 1211604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806043" comment="c-ares-1.17.1-5.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806044" comment="c-ares-devel-1.17.1-5.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806045" comment="nodejs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806046" comment="nodejs-devel-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806047" comment="nodejs-docs-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806048" comment="nodejs-full-i18n-18.14.2-3.module+el9.2.0.z+18964+42696395 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806069" comment="nodejs-libs-16.19.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805992" comment="nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806049" comment="npm-9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3212" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3212" ref_url="https://www.suse.com/security/cve/CVE-2023-3212" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference issue was found in the gfs2 file system in the Linux kernel. It occurs on corrupt gfs2 file systems when the evict code tries to reference the journal descriptor structure after it has been freed and set to NULL. A privileged local user could use this flaw to cause a kernel panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3212/">CVE-2023-3212 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3212">CVE-2023-3212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212265">SUSE bug 1212265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32205" ref_url="https://www.suse.com/security/cve/CVE-2023-32205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32205/">CVE-2023-32205 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32205">CVE-2023-32205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806000" comment="firefox-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806001" comment="firefox-x11-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806012" comment="thunderbird-102.11.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32206" ref_url="https://www.suse.com/security/cve/CVE-2023-32206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32206/">CVE-2023-32206 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32206">CVE-2023-32206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806000" comment="firefox-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806001" comment="firefox-x11-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806012" comment="thunderbird-102.11.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32207" ref_url="https://www.suse.com/security/cve/CVE-2023-32207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32207/">CVE-2023-32207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32207">CVE-2023-32207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806000" comment="firefox-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806001" comment="firefox-x11-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806012" comment="thunderbird-102.11.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32211" ref_url="https://www.suse.com/security/cve/CVE-2023-32211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32211/">CVE-2023-32211 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32211">CVE-2023-32211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806000" comment="firefox-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806001" comment="firefox-x11-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806012" comment="thunderbird-102.11.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32212" ref_url="https://www.suse.com/security/cve/CVE-2023-32212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have positioned a `datalist` element to obscure the address bar. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32212/">CVE-2023-32212 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32212">CVE-2023-32212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806000" comment="firefox-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806001" comment="firefox-x11-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806012" comment="thunderbird-102.11.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32213" ref_url="https://www.suse.com/security/cve/CVE-2023-32213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32213/">CVE-2023-32213 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32213">CVE-2023-32213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806000" comment="firefox-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806001" comment="firefox-x11-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806012" comment="thunderbird-102.11.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32215" ref_url="https://www.suse.com/security/cve/CVE-2023-32215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2176-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029422.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-32215/">CVE-2023-32215 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32215">CVE-2023-32215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211175">SUSE bug 1211175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806000" comment="firefox-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806001" comment="firefox-x11-102.11.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806012" comment="thunderbird-102.11.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32233" ref_url="https://www.suse.com/security/cve/CVE-2023-32233" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32233/">CVE-2023-32233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32233">CVE-2023-32233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211043">SUSE bug 1211043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211187">SUSE bug 1211187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806517" comment="bpftool-7.0.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806518" comment="kernel-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806519" comment="kernel-abi-stablelists-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806520" comment="kernel-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806521" comment="kernel-cross-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806522" comment="kernel-debug-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806523" comment="kernel-debug-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806526" comment="kernel-debug-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806527" comment="kernel-debug-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806528" comment="kernel-debug-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806529" comment="kernel-debug-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806532" comment="kernel-doc-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806533" comment="kernel-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806534" comment="kernel-modules-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806535" comment="kernel-modules-core-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806536" comment="kernel-modules-extra-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806537" comment="kernel-tools-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806538" comment="kernel-tools-libs-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806540" comment="kernel-uki-virt-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806541" comment="perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806542" comment="python3-perf-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806543" comment="rtla-5.14.0-284.18.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32324</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32324" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32324" ref_url="https://www.suse.com/security/cve/CVE-2023-32324" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021226.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32324/">CVE-2023-32324 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32324">CVE-2023-32324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211643">SUSE bug 1211643</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811155" comment="cups-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811156" comment="cups-client-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811157" comment="cups-devel-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811158" comment="cups-filesystem-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811159" comment="cups-ipptool-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811160" comment="cups-libs-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811161" comment="cups-lpd-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811162" comment="cups-printerapp-2.3.3op2-21.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32359</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32359" ref_url="https://www.suse.com/security/cve/CVE-2023-32359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017581.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved redaction of sensitive information. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2. A user's password may be read aloud by VoiceOver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32359/">CVE-2023-32359 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32359">CVE-2023-32359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217568">SUSE bug 1217568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32360" ref_url="https://www.suse.com/security/cve/CVE-2023-32360" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3707-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021226.html" source="SUSE-SU"/>
    <description>
    An authentication issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.7.7, macOS Monterey 12.6.6, macOS Ventura 13.4. An unauthenticated user may be able to access recently printed documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32360/">CVE-2023-32360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32360">CVE-2023-32360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214254">SUSE bug 1214254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806801" comment="cups-2.3.3op2-16.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806802" comment="cups-client-2.3.3op2-16.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806803" comment="cups-devel-2.3.3op2-16.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806804" comment="cups-filesystem-2.3.3op2-16.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806805" comment="cups-ipptool-2.3.3op2-16.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806806" comment="cups-libs-2.3.3op2-16.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806807" comment="cups-lpd-2.3.3op2-16.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806808" comment="cups-printerapp-2.3.3op2-16.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32370</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32370" ref_url="https://www.suse.com/security/cve/CVE-2023-32370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.3. Content Security Policy to block domains with wildcards may fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-32370/">CVE-2023-32370 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32370">CVE-2023-32370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215230">SUSE bug 1215230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32373" ref_url="https://www.suse.com/security/cve/CVE-2023-32373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2606-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32373/">CVE-2023-32373 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32373">CVE-2023-32373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211658">SUSE bug 1211658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806039" comment="webkit2gtk3-2.38.5-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806040" comment="webkit2gtk3-devel-2.38.5-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806041" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806042" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32393" ref_url="https://www.suse.com/security/cve/CVE-2023-32393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032584.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.3, tvOS 16.3, macOS Ventura 13.2, iOS 16.3 and iPadOS 16.3. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32393/">CVE-2023-32393 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32393">CVE-2023-32393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213581">SUSE bug 1213581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32435</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32435" ref_url="https://www.suse.com/security/cve/CVE-2023-32435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.7 and iPadOS 15.7.7. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32435/">CVE-2023-32435 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32435">CVE-2023-32435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212863">SUSE bug 1212863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32439</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32439" ref_url="https://www.suse.com/security/cve/CVE-2023-32439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved checks. This issue is fixed in iOS 16.5.1 and iPadOS 16.5.1, iOS 15.7.7 and iPadOS 15.7.7, macOS Ventura 13.4.1, Safari 16.5.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32439/">CVE-2023-32439 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32439">CVE-2023-32439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212863">SUSE bug 1212863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3247</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3247" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3247" ref_url="https://www.suse.com/security/cve/CVE-2023-3247" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015639.html" source="SUSE-SU"/>
    <description>
    In PHP versions 8.0.* before 8.0.29, 8.1.* before 8.1.20, 8.2.* before 8.2.7 when using SOAP HTTP Digest Authentication, random value generator was not checked for failure, and was using narrower range of values than it should have. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce.  


    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3247/">CVE-2023-3247 at SUSE</cve>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3247">CVE-2023-3247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212349">SUSE bug 1212349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844596" comment="php-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844597" comment="php-bcmath-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844598" comment="php-cli-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844599" comment="php-common-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844600" comment="php-dba-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844601" comment="php-dbg-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844602" comment="php-devel-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844603" comment="php-embedded-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844604" comment="php-enchant-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844605" comment="php-ffi-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844606" comment="php-fpm-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844607" comment="php-gd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844608" comment="php-gmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844609" comment="php-intl-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844610" comment="php-ldap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844611" comment="php-mbstring-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844612" comment="php-mysqlnd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844613" comment="php-odbc-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844614" comment="php-opcache-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844615" comment="php-pdo-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844616" comment="php-pgsql-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844617" comment="php-process-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844618" comment="php-snmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844619" comment="php-soap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844620" comment="php-xml-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3255</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3255" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3255" ref_url="https://www.suse.com/security/cve/CVE-2023-3255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3082-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBGW5JBGK2W2H3MOOD5HENYWYUVVQPM/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3082-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3234-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030855.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. A wrong exit condition may lead to an infinite loop when inflating an attacker controlled zlib buffer in the `inflate_buffer` function. This could allow a remote authenticated client who is able to send a clipboard to the VNC server to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3255/">CVE-2023-3255 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3255">CVE-2023-3255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213001">SUSE bug 1213001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872275" comment="qemu-guest-agent-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872276" comment="qemu-img-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872277" comment="qemu-kvm-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872278" comment="qemu-kvm-audio-pa-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872279" comment="qemu-kvm-block-blkio-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872280" comment="qemu-kvm-block-curl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872281" comment="qemu-kvm-block-rbd-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872282" comment="qemu-kvm-common-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872283" comment="qemu-kvm-core-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872284" comment="qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872285" comment="qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872286" comment="qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872287" comment="qemu-kvm-device-usb-host-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872288" comment="qemu-kvm-device-usb-redirect-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872289" comment="qemu-kvm-docs-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872290" comment="qemu-kvm-tools-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872291" comment="qemu-kvm-ui-egl-headless-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872292" comment="qemu-kvm-ui-opengl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872293" comment="qemu-pr-helper-8.2.0-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32559" ref_url="https://www.suse.com/security/cve/CVE-2023-32559" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031219.html" source="SUSE-SU"/>
    <description>
    A privilege escalation vulnerability exists in the experimental policy mechanism in all active release lines: 16.x, 18.x and, 20.x. The use of the deprecated API `process.binding()` can bypass the policy mechanism by requiring internal modules and eventually take advantage of `process.binding('spawn_sync')` run arbitrary code, outside of the limits defined in a `policy.json` file. Please note that at the time this CVE was issued, the policy is an experimental feature of Node.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-32559/">CVE-2023-32559 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32559">CVE-2023-32559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214154">SUSE bug 1214154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806906" comment="nodejs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806907" comment="nodejs-devel-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806908" comment="nodejs-docs-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806909" comment="nodejs-full-i18n-18.17.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807156" comment="nodejs-libs-16.20.2-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806911" comment="npm-9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32573" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32573" ref_url="https://www.suse.com/security/cve/CVE-2023-32573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041344.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0111-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O26KXMLO3LTP3U7YIV4W3GODD6Y6BXYN/" source="SUSE-SU"/>
    <description>
    In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32573/">CVE-2023-32573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32573">CVE-2023-32573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211298">SUSE bug 1211298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813867" comment="adwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813868" comment="libadwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813869" comment="python-qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813870" comment="python3-pyqt5-sip-12.11.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813871" comment="python3-qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813872" comment="python3-qt5-base-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813873" comment="python3-qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813874" comment="qgnomeplatform-0.9.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813875" comment="qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813876" comment="qt5-assistant-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813877" comment="qt5-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813878" comment="qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813879" comment="qt5-doctools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813880" comment="qt5-linguist-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813881" comment="qt5-qdbusviewer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813882" comment="qt5-qt3d-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813883" comment="qt5-qt3d-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813884" comment="qt5-qt3d-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813885" comment="qt5-qt3d-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813886" comment="qt5-qtbase-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813887" comment="qt5-qtbase-common-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813888" comment="qt5-qtbase-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813889" comment="qt5-qtbase-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813890" comment="qt5-qtbase-examples-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813891" comment="qt5-qtbase-gui-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813892" comment="qt5-qtbase-mysql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813893" comment="qt5-qtbase-odbc-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813894" comment="qt5-qtbase-postgresql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813895" comment="qt5-qtbase-private-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813896" comment="qt5-qtbase-static-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813897" comment="qt5-qtconnectivity-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813898" comment="qt5-qtconnectivity-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813899" comment="qt5-qtconnectivity-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813900" comment="qt5-qtconnectivity-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813901" comment="qt5-qtdeclarative-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813902" comment="qt5-qtdeclarative-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813903" comment="qt5-qtdeclarative-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813904" comment="qt5-qtdeclarative-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813905" comment="qt5-qtdeclarative-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813906" comment="qt5-qtdoc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813907" comment="qt5-qtgraphicaleffects-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813908" comment="qt5-qtgraphicaleffects-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813909" comment="qt5-qtimageformats-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813910" comment="qt5-qtimageformats-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813911" comment="qt5-qtlocation-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813912" comment="qt5-qtlocation-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813913" comment="qt5-qtlocation-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813914" comment="qt5-qtlocation-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813915" comment="qt5-qtmultimedia-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813916" comment="qt5-qtmultimedia-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813917" comment="qt5-qtmultimedia-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813918" comment="qt5-qtmultimedia-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813919" comment="qt5-qtquickcontrols-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813920" comment="qt5-qtquickcontrols-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813921" comment="qt5-qtquickcontrols-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813922" comment="qt5-qtquickcontrols2-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813923" comment="qt5-qtquickcontrols2-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813924" comment="qt5-qtquickcontrols2-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813925" comment="qt5-qtquickcontrols2-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813926" comment="qt5-qtscript-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813927" comment="qt5-qtscript-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813928" comment="qt5-qtscript-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813929" comment="qt5-qtscript-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813930" comment="qt5-qtsensors-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813931" comment="qt5-qtsensors-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813932" comment="qt5-qtsensors-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813933" comment="qt5-qtsensors-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813934" comment="qt5-qtserialbus-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813935" comment="qt5-qtserialbus-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813936" comment="qt5-qtserialbus-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813937" comment="qt5-qtserialbus-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813938" comment="qt5-qtserialport-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813939" comment="qt5-qtserialport-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813940" comment="qt5-qtserialport-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813941" comment="qt5-qtserialport-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813942" comment="qt5-qtsvg-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813943" comment="qt5-qtsvg-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813944" comment="qt5-qtsvg-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813945" comment="qt5-qtsvg-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813946" comment="qt5-qttools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813947" comment="qt5-qttools-common-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813948" comment="qt5-qttools-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813949" comment="qt5-qttools-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813950" comment="qt5-qttools-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813951" comment="qt5-qttools-libs-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813952" comment="qt5-qttools-libs-designercomponents-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813953" comment="qt5-qttools-libs-help-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813954" comment="qt5-qttools-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813955" comment="qt5-qttranslations-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813956" comment="qt5-qtwayland-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813957" comment="qt5-qtwayland-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813958" comment="qt5-qtwayland-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813959" comment="qt5-qtwayland-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813960" comment="qt5-qtwebchannel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813961" comment="qt5-qtwebchannel-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813962" comment="qt5-qtwebchannel-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813963" comment="qt5-qtwebchannel-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813964" comment="qt5-qtwebsockets-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813965" comment="qt5-qtwebsockets-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813966" comment="qt5-qtwebsockets-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813967" comment="qt5-qtwebsockets-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813968" comment="qt5-qtx11extras-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813969" comment="qt5-qtx11extras-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813970" comment="qt5-qtx11extras-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813971" comment="qt5-qtxmlpatterns-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813972" comment="qt5-qtxmlpatterns-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813973" comment="qt5-qtxmlpatterns-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813974" comment="qt5-qtxmlpatterns-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813975" comment="qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813976" comment="qt5-srpm-macros-5.15.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32611" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32611" ref_url="https://www.suse.com/security/cve/CVE-2023-32611" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016101.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32611/">CVE-2023-32611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32611">CVE-2023-32611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211951">SUSE bug 1211951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810802" comment="glib2-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810803" comment="glib2-devel-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810804" comment="glib2-doc-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810805" comment="glib2-static-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810806" comment="glib2-tests-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868750" comment="mingw32-glib2-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868751" comment="mingw32-glib2-static-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868752" comment="mingw64-glib2-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868753" comment="mingw64-glib2-static-2.78.0-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32636" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32636" ref_url="https://www.suse.com/security/cve/CVE-2023-32636" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016101.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32636/">CVE-2023-32636 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32636">CVE-2023-32636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211948">SUSE bug 1211948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868750" comment="mingw32-glib2-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868751" comment="mingw32-glib2-static-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868752" comment="mingw64-glib2-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868753" comment="mingw64-glib2-static-2.78.0-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32665</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32665" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32665" ref_url="https://www.suse.com/security/cve/CVE-2023-32665" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016101.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-32665/">CVE-2023-32665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32665">CVE-2023-32665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211945">SUSE bug 1211945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211946">SUSE bug 1211946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810802" comment="glib2-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810803" comment="glib2-devel-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810804" comment="glib2-doc-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810805" comment="glib2-static-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810806" comment="glib2-tests-2.68.4-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868750" comment="mingw32-glib2-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868751" comment="mingw32-glib2-static-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868752" comment="mingw64-glib2-2.78.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868753" comment="mingw64-glib2-static-2.78.0-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3268</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3268" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3268" ref_url="https://www.suse.com/security/cve/CVE-2023-3268" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
    <description>
    An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3268/">CVE-2023-3268 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3268">CVE-2023-3268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212502">SUSE bug 1212502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32681</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32681" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32681" ref_url="https://www.suse.com/security/cve/CVE-2023-32681" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036241.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJHTSZ2BBTEOR5VWX6IPMTWJ5V4265YW/" source="SUSE-SU"/>
    <description>
    Requests is a HTTP library. Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use `rebuild_proxies` to reattach the `Proxy-Authorization` header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the `Proxy-Authorization` header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information. This issue has been patched in version 2.31.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-32681/">CVE-2023-32681 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32681">CVE-2023-32681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211674">SUSE bug 1211674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806715" comment="python3-requests-2.25.1-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806716" comment="python3-requests+security-2.25.1-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806717" comment="python3-requests+socks-2.25.1-7.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202332700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-32700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-32700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32700" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-32700" ref_url="https://www.suse.com/security/cve/CVE-2023-32700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2284-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-May/014956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-May/029509.html" source="SUSE-SU"/>
    <description>
    LuaTeX before 1.17.0 allows execution of arbitrary shell commands when compiling a TeX file obtained from an untrusted source. This occurs because luatex-core.lua lets the original io.popen be accessed. This also affects TeX Live before 2023 r66984 and MiKTeX before 23.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-32700/">CVE-2023-32700 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-32700">CVE-2023-32700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211389">SUSE bug 1211389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806093" comment="texlive-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806094" comment="texlive-adjustbox-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806095" comment="texlive-ae-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806096" comment="texlive-algorithms-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806097" comment="texlive-alphalph-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806098" comment="texlive-amscls-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806099" comment="texlive-amsfonts-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806100" comment="texlive-amsmath-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806101" comment="texlive-anyfontsize-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806102" comment="texlive-anysize-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806103" comment="texlive-appendix-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806104" comment="texlive-arabxetex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806105" comment="texlive-arphic-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806106" comment="texlive-atbegshi-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806107" comment="texlive-attachfile-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806108" comment="texlive-attachfile2-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806109" comment="texlive-atveryend-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806110" comment="texlive-auxhook-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806111" comment="texlive-avantgar-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806112" comment="texlive-awesomebox-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806113" comment="texlive-babel-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806114" comment="texlive-babel-english-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806115" comment="texlive-babelbib-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806116" comment="texlive-base-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806117" comment="texlive-beamer-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806118" comment="texlive-bera-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806119" comment="texlive-beton-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806120" comment="texlive-bibtex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806121" comment="texlive-bibtopic-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806122" comment="texlive-bidi-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806123" comment="texlive-bigfoot-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806124" comment="texlive-bigintcalc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806125" comment="texlive-bitset-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806126" comment="texlive-bookman-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806127" comment="texlive-bookmark-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806128" comment="texlive-booktabs-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806129" comment="texlive-breakurl-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806130" comment="texlive-breqn-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806131" comment="texlive-capt-of-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806132" comment="texlive-caption-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806133" comment="texlive-carlisle-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806134" comment="texlive-catchfile-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806135" comment="texlive-changebar-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806136" comment="texlive-changepage-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806137" comment="texlive-charter-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806138" comment="texlive-chngcntr-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806139" comment="texlive-cite-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806140" comment="texlive-cjk-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806141" comment="texlive-classpack-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806142" comment="texlive-cm-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806143" comment="texlive-cm-lgc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806144" comment="texlive-cm-super-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806145" comment="texlive-cmap-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806146" comment="texlive-cmextra-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806147" comment="texlive-cns-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806148" comment="texlive-collectbox-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806149" comment="texlive-collection-basic-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806150" comment="texlive-collection-fontsrecommended-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806151" comment="texlive-collection-htmlxml-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806152" comment="texlive-collection-latex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806153" comment="texlive-collection-latexrecommended-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806154" comment="texlive-collection-xetex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806155" comment="texlive-colorprofiles-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806156" comment="texlive-colortbl-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806157" comment="texlive-context-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806158" comment="texlive-courier-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806159" comment="texlive-crop-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806160" comment="texlive-csquotes-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806161" comment="texlive-ctable-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806162" comment="texlive-ctablestack-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806163" comment="texlive-currfile-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806164" comment="texlive-datetime-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806165" comment="texlive-dehyph-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806166" comment="texlive-dvipdfmx-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806167" comment="texlive-dvipng-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806168" comment="texlive-dvips-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806169" comment="texlive-dvisvgm-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806170" comment="texlive-ec-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806171" comment="texlive-eepic-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806172" comment="texlive-enctex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806173" comment="texlive-enumitem-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806174" comment="texlive-environ-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806175" comment="texlive-epsf-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806176" comment="texlive-epstopdf-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806177" comment="texlive-epstopdf-pkg-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806178" comment="texlive-eqparbox-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806179" comment="texlive-eso-pic-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806180" comment="texlive-etex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806181" comment="texlive-etex-pkg-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806182" comment="texlive-etexcmds-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806183" comment="texlive-etoc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806184" comment="texlive-etoolbox-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806185" comment="texlive-euenc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806186" comment="texlive-euler-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806187" comment="texlive-euro-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806188" comment="texlive-eurosym-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806189" comment="texlive-extsizes-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806190" comment="texlive-fancybox-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806191" comment="texlive-fancyhdr-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806192" comment="texlive-fancyref-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806193" comment="texlive-fancyvrb-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806194" comment="texlive-filecontents-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806195" comment="texlive-filehook-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806196" comment="texlive-finstrut-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806197" comment="texlive-fix2col-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806198" comment="texlive-fixlatvian-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806199" comment="texlive-float-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806200" comment="texlive-fmtcount-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806201" comment="texlive-fncychap-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806202" comment="texlive-fontawesome-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806203" comment="texlive-fontbook-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806204" comment="texlive-fonts-tlwg-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806205" comment="texlive-fontspec-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806206" comment="texlive-fontware-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806207" comment="texlive-fontwrap-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806208" comment="texlive-footmisc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806209" comment="texlive-footnotehyper-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806210" comment="texlive-fp-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806211" comment="texlive-fpl-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806212" comment="texlive-framed-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806213" comment="texlive-garuda-c90-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806214" comment="texlive-geometry-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806215" comment="texlive-gettitlestring-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806216" comment="texlive-glyphlist-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806217" comment="texlive-gnu-freefont-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806218" comment="texlive-graphics-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806219" comment="texlive-graphics-cfg-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806220" comment="texlive-graphics-def-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806221" comment="texlive-grfext-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806222" comment="texlive-grffile-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806223" comment="texlive-gsftopk-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806224" comment="texlive-hanging-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806225" comment="texlive-helvetic-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806226" comment="texlive-hobsub-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806227" comment="texlive-hologo-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806228" comment="texlive-hycolor-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806229" comment="texlive-hyperref-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806230" comment="texlive-hyph-utf8-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806231" comment="texlive-hyphen-base-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806232" comment="texlive-hyphenat-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806233" comment="texlive-hyphenex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806234" comment="texlive-ifetex-20180414-29.el8_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806235" comment="texlive-ifluatex-20180414-29.el8_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806236" comment="texlive-ifmtarg-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806237" comment="texlive-ifoddpage-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806238" comment="texlive-ifplatform-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806239" comment="texlive-iftex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806240" comment="texlive-ifxetex-20180414-29.el8_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806241" comment="texlive-import-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806242" comment="texlive-index-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806243" comment="texlive-infwarerr-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806244" comment="texlive-intcalc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806245" comment="texlive-jadetex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806246" comment="texlive-jknapltx-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806247" comment="texlive-kastrup-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806248" comment="texlive-kerkis-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806249" comment="texlive-knuth-lib-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806250" comment="texlive-knuth-local-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806251" comment="texlive-koma-script-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806252" comment="texlive-kpathsea-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806253" comment="texlive-kvdefinekeys-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806254" comment="texlive-kvoptions-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806255" comment="texlive-kvsetkeys-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806256" comment="texlive-l3backend-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806257" comment="texlive-l3experimental-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806258" comment="texlive-l3kernel-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806259" comment="texlive-l3packages-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806260" comment="texlive-lastpage-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806261" comment="texlive-latex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806262" comment="texlive-latex-fonts-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806263" comment="texlive-latex2man-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806264" comment="texlive-latexbug-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806265" comment="texlive-latexconfig-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806266" comment="texlive-letltxmacro-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806267" comment="texlive-lettrine-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806268" comment="texlive-lib-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806269" comment="texlive-lib-devel-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806270" comment="texlive-linegoal-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806271" comment="texlive-lineno-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806272" comment="texlive-listings-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806273" comment="texlive-listofitems-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806274" comment="texlive-lm-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806275" comment="texlive-lm-math-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806276" comment="texlive-ltabptch-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806277" comment="texlive-ltxcmds-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806278" comment="texlive-ltxmisc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806279" comment="texlive-lua-alt-getopt-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806280" comment="texlive-luahbtex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806281" comment="texlive-lualatex-math-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806282" comment="texlive-lualibs-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806283" comment="texlive-luaotfload-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806284" comment="texlive-luatex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806285" comment="texlive-luatex85-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806286" comment="texlive-luatexbase-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806287" comment="texlive-lwarp-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806288" comment="texlive-makecmds-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806289" comment="texlive-makeindex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806290" comment="texlive-manfnt-font-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806291" comment="texlive-marginnote-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806292" comment="texlive-marvosym-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806293" comment="texlive-mathpazo-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806294" comment="texlive-mathspec-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806295" comment="texlive-mathtools-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806296" comment="texlive-mdwtools-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806297" comment="texlive-memoir-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806298" comment="texlive-metafont-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806299" comment="texlive-metalogo-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806300" comment="texlive-metapost-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806301" comment="texlive-mflogo-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806302" comment="texlive-mflogo-font-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806303" comment="texlive-mfnfss-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806304" comment="texlive-mfware-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806305" comment="texlive-microtype-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806306" comment="texlive-minitoc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806307" comment="texlive-mnsymbol-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806308" comment="texlive-modes-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806309" comment="texlive-mparhack-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806310" comment="texlive-mptopdf-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806311" comment="texlive-ms-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806312" comment="texlive-multido-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806313" comment="texlive-multirow-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806314" comment="texlive-natbib-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806315" comment="texlive-ncctools-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806316" comment="texlive-ncntrsbk-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806317" comment="texlive-needspace-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806318" comment="texlive-newfloat-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806319" comment="texlive-newunicodechar-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806320" comment="texlive-norasi-c90-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806321" comment="texlive-notoccite-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806322" comment="texlive-ntgclass-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806323" comment="texlive-oberdiek-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806324" comment="texlive-obsolete-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806325" comment="texlive-overpic-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806326" comment="texlive-palatino-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806327" comment="texlive-paralist-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806328" comment="texlive-parallel-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806329" comment="texlive-parskip-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806330" comment="texlive-passivetex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806331" comment="texlive-pdfcolmk-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806332" comment="texlive-pdfescape-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806333" comment="texlive-pdflscape-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806334" comment="texlive-pdfpages-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806335" comment="texlive-pdftex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806336" comment="texlive-pdftexcmds-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806337" comment="texlive-pgf-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806338" comment="texlive-philokalia-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806339" comment="texlive-placeins-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806340" comment="texlive-plain-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806341" comment="texlive-polyglossia-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806342" comment="texlive-powerdot-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806343" comment="texlive-preprint-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806344" comment="texlive-psfrag-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806345" comment="texlive-pslatex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806346" comment="texlive-psnfss-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806347" comment="texlive-pspicture-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806348" comment="texlive-pst-3d-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806349" comment="texlive-pst-arrow-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806350" comment="texlive-pst-blur-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806351" comment="texlive-pst-coil-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806352" comment="texlive-pst-eps-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806353" comment="texlive-pst-fill-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806354" comment="texlive-pst-grad-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806355" comment="texlive-pst-math-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806356" comment="texlive-pst-node-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806357" comment="texlive-pst-plot-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806358" comment="texlive-pst-slpe-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806359" comment="texlive-pst-text-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806360" comment="texlive-pst-tools-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806361" comment="texlive-pst-tree-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806362" comment="texlive-pstricks-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806363" comment="texlive-pstricks-add-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806364" comment="texlive-ptext-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806365" comment="texlive-pxfonts-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806366" comment="texlive-qstest-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806367" comment="texlive-ragged2e-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806368" comment="texlive-rcs-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806369" comment="texlive-realscripts-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806370" comment="texlive-refcount-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806371" comment="texlive-rerunfilecheck-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806372" comment="texlive-rsfs-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806373" comment="texlive-sansmath-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806374" comment="texlive-sansmathaccent-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806375" comment="texlive-sauerj-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806376" comment="texlive-scheme-basic-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806377" comment="texlive-section-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806378" comment="texlive-sectsty-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806379" comment="texlive-seminar-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806380" comment="texlive-sepnum-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806381" comment="texlive-setspace-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806382" comment="texlive-showexpl-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806383" comment="texlive-soul-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806384" comment="texlive-stackengine-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806385" comment="texlive-stmaryrd-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806386" comment="texlive-stringenc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806387" comment="texlive-subfig-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806388" comment="texlive-subfigure-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806389" comment="texlive-svn-prov-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806390" comment="texlive-symbol-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806391" comment="texlive-t2-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806392" comment="texlive-tabu-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806393" comment="texlive-tabulary-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806394" comment="texlive-tetex-20180414-29.el8_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806395" comment="texlive-tex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806396" comment="texlive-tex-gyre-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806397" comment="texlive-tex-gyre-math-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806398" comment="texlive-tex-ini-files-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806399" comment="texlive-tex4ht-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806400" comment="texlive-texconfig-20180414-29.el8_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806401" comment="texlive-texlive-common-doc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806402" comment="texlive-texlive-docindex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806403" comment="texlive-texlive-en-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806404" comment="texlive-texlive-msg-translations-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806405" comment="texlive-texlive-scripts-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806406" comment="texlive-texlive-scripts-extra-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806407" comment="texlive-texlive.infra-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806408" comment="texlive-textcase-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806409" comment="texlive-textpos-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806410" comment="texlive-threeparttable-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806411" comment="texlive-thumbpdf-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806412" comment="texlive-times-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806413" comment="texlive-tipa-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806414" comment="texlive-titlesec-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806415" comment="texlive-titling-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806416" comment="texlive-tocloft-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806417" comment="texlive-tools-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806418" comment="texlive-translator-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806419" comment="texlive-trimspaces-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806420" comment="texlive-txfonts-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806421" comment="texlive-type1cm-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806422" comment="texlive-typehtml-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806423" comment="texlive-ucharcat-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806424" comment="texlive-ucharclasses-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806425" comment="texlive-ucs-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806426" comment="texlive-uhc-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806427" comment="texlive-ulem-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806428" comment="texlive-underscore-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806429" comment="texlive-unicode-data-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806430" comment="texlive-unicode-math-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806431" comment="texlive-uniquecounter-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806432" comment="texlive-unisugar-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806433" comment="texlive-updmap-map-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806434" comment="texlive-upquote-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806435" comment="texlive-url-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806436" comment="texlive-utopia-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806437" comment="texlive-varwidth-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806438" comment="texlive-wadalab-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806439" comment="texlive-was-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806440" comment="texlive-wasy-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806441" comment="texlive-wasy-type1-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806442" comment="texlive-wasy2-ps-20180414-29.el8_8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806443" comment="texlive-wasysym-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806444" comment="texlive-wrapfig-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806445" comment="texlive-xcolor-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806446" comment="texlive-xdvi-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806447" comment="texlive-xecjk-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806448" comment="texlive-xecolor-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806449" comment="texlive-xecyr-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806450" comment="texlive-xeindex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806451" comment="texlive-xepersian-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806452" comment="texlive-xesearch-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806453" comment="texlive-xetex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806454" comment="texlive-xetex-itrans-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806455" comment="texlive-xetex-pstricks-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806456" comment="texlive-xetex-tibetan-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806457" comment="texlive-xetexconfig-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806458" comment="texlive-xetexfontinfo-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806459" comment="texlive-xifthen-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806460" comment="texlive-xkeyval-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806461" comment="texlive-xltxtra-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806462" comment="texlive-xmltex-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806463" comment="texlive-xmltexconfig-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806464" comment="texlive-xstring-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806465" comment="texlive-xtab-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806466" comment="texlive-xunicode-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806467" comment="texlive-zapfchan-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806468" comment="texlive-zapfding-20200406-26.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806469" comment="texlive-zref-20200406-26.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33128</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33128" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33128" ref_url="https://www.suse.com/security/cve/CVE-2023-33128" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33128/">CVE-2023-33128 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33128">CVE-2023-33128 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806050" comment="aspnetcore-runtime-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806074" comment="aspnetcore-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806051" comment="aspnetcore-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806075" comment="aspnetcore-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806052" comment="dotnet-apphost-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806076" comment="dotnet-apphost-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806077" comment="dotnet-host-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806053" comment="dotnet-hostfxr-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806078" comment="dotnet-hostfxr-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806054" comment="dotnet-runtime-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806079" comment="dotnet-runtime-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806055" comment="dotnet-sdk-6.0-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806056" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806080" comment="dotnet-sdk-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806081" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806057" comment="dotnet-targeting-pack-6.0-6.0.18-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806082" comment="dotnet-targeting-pack-7.0-7.0.7-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806058" comment="dotnet-templates-6.0-6.0.118-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806083" comment="dotnet-templates-7.0-7.0.107-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806084" comment="netstandard-targeting-pack-2.1-7.0.107-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3316</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3316" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3316" ref_url="https://www.suse.com/security/cve/CVE-2023-3316" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3316/">CVE-2023-3316 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3316">CVE-2023-3316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212535">SUSE bug 1212535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811129" comment="libtiff-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811130" comment="libtiff-devel-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811131" comment="libtiff-tools-4.4.0-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33170</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33170" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33170" ref_url="https://www.suse.com/security/cve/CVE-2023-33170" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33170/">CVE-2023-33170 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33170">CVE-2023-33170 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806565" comment="aspnetcore-runtime-6.0-6.0.20-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806554" comment="aspnetcore-runtime-7.0-7.0.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806566" comment="aspnetcore-targeting-pack-6.0-6.0.20-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806555" comment="aspnetcore-targeting-pack-7.0-7.0.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806567" comment="dotnet-apphost-pack-6.0-6.0.20-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806556" comment="dotnet-apphost-pack-7.0-7.0.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806557" comment="dotnet-host-7.0.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806568" comment="dotnet-hostfxr-6.0-6.0.20-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806558" comment="dotnet-hostfxr-7.0-7.0.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806569" comment="dotnet-runtime-6.0-6.0.20-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806559" comment="dotnet-runtime-7.0-7.0.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806570" comment="dotnet-sdk-6.0-6.0.120-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806571" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.120-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806560" comment="dotnet-sdk-7.0-7.0.109-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806561" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.109-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806572" comment="dotnet-targeting-pack-6.0-6.0.20-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806562" comment="dotnet-targeting-pack-7.0-7.0.9-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806573" comment="dotnet-templates-6.0-6.0.120-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806563" comment="dotnet-templates-7.0-7.0.109-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806564" comment="netstandard-targeting-pack-2.1-7.0.109-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33203" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33203" ref_url="https://www.suse.com/security/cve/CVE-2023-33203" source="SUSE CVE"/>
    <description>
    The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-33203/">CVE-2023-33203 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33203">CVE-2023-33203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1210685">SUSE bug 1210685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1211037">SUSE bug 1211037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33204" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33204" ref_url="https://www.suse.com/security/cve/CVE-2023-33204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020063.html" source="SUSE-SU"/>
    <description>
    sysstat through 12.7.2 allows a multiplication integer overflow in check_overflow in common.c. NOTE: this issue exists because of an incomplete fix for CVE-2022-39377.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-33204/">CVE-2023-33204 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33204">CVE-2023-33204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211507">SUSE bug 1211507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217270">SUSE bug 1217270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811120" comment="sysstat-12.5.4-7.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33285" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33285" ref_url="https://www.suse.com/security/cve/CVE-2023-33285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015989.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-33285/">CVE-2023-33285 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33285">CVE-2023-33285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211642">SUSE bug 1211642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813867" comment="adwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813868" comment="libadwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813869" comment="python-qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813870" comment="python3-pyqt5-sip-12.11.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813871" comment="python3-qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813872" comment="python3-qt5-base-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813873" comment="python3-qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813874" comment="qgnomeplatform-0.9.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813875" comment="qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813876" comment="qt5-assistant-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813877" comment="qt5-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813878" comment="qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813879" comment="qt5-doctools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813880" comment="qt5-linguist-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813881" comment="qt5-qdbusviewer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813882" comment="qt5-qt3d-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813883" comment="qt5-qt3d-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813884" comment="qt5-qt3d-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813885" comment="qt5-qt3d-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813886" comment="qt5-qtbase-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813887" comment="qt5-qtbase-common-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813888" comment="qt5-qtbase-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813889" comment="qt5-qtbase-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813890" comment="qt5-qtbase-examples-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813891" comment="qt5-qtbase-gui-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813892" comment="qt5-qtbase-mysql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813893" comment="qt5-qtbase-odbc-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813894" comment="qt5-qtbase-postgresql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813895" comment="qt5-qtbase-private-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813896" comment="qt5-qtbase-static-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813897" comment="qt5-qtconnectivity-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813898" comment="qt5-qtconnectivity-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813899" comment="qt5-qtconnectivity-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813900" comment="qt5-qtconnectivity-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813901" comment="qt5-qtdeclarative-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813902" comment="qt5-qtdeclarative-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813903" comment="qt5-qtdeclarative-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813904" comment="qt5-qtdeclarative-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813905" comment="qt5-qtdeclarative-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813906" comment="qt5-qtdoc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813907" comment="qt5-qtgraphicaleffects-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813908" comment="qt5-qtgraphicaleffects-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813909" comment="qt5-qtimageformats-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813910" comment="qt5-qtimageformats-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813911" comment="qt5-qtlocation-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813912" comment="qt5-qtlocation-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813913" comment="qt5-qtlocation-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813914" comment="qt5-qtlocation-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813915" comment="qt5-qtmultimedia-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813916" comment="qt5-qtmultimedia-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813917" comment="qt5-qtmultimedia-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813918" comment="qt5-qtmultimedia-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813919" comment="qt5-qtquickcontrols-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813920" comment="qt5-qtquickcontrols-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813921" comment="qt5-qtquickcontrols-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813922" comment="qt5-qtquickcontrols2-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813923" comment="qt5-qtquickcontrols2-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813924" comment="qt5-qtquickcontrols2-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813925" comment="qt5-qtquickcontrols2-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813926" comment="qt5-qtscript-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813927" comment="qt5-qtscript-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813928" comment="qt5-qtscript-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813929" comment="qt5-qtscript-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813930" comment="qt5-qtsensors-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813931" comment="qt5-qtsensors-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813932" comment="qt5-qtsensors-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813933" comment="qt5-qtsensors-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813934" comment="qt5-qtserialbus-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813935" comment="qt5-qtserialbus-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813936" comment="qt5-qtserialbus-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813937" comment="qt5-qtserialbus-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813938" comment="qt5-qtserialport-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813939" comment="qt5-qtserialport-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813940" comment="qt5-qtserialport-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813941" comment="qt5-qtserialport-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813942" comment="qt5-qtsvg-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813943" comment="qt5-qtsvg-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813944" comment="qt5-qtsvg-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813945" comment="qt5-qtsvg-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813946" comment="qt5-qttools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813947" comment="qt5-qttools-common-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813948" comment="qt5-qttools-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813949" comment="qt5-qttools-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813950" comment="qt5-qttools-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813951" comment="qt5-qttools-libs-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813952" comment="qt5-qttools-libs-designercomponents-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813953" comment="qt5-qttools-libs-help-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813954" comment="qt5-qttools-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813955" comment="qt5-qttranslations-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813956" comment="qt5-qtwayland-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813957" comment="qt5-qtwayland-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813958" comment="qt5-qtwayland-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813959" comment="qt5-qtwayland-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813960" comment="qt5-qtwebchannel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813961" comment="qt5-qtwebchannel-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813962" comment="qt5-qtwebchannel-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813963" comment="qt5-qtwebchannel-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813964" comment="qt5-qtwebsockets-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813965" comment="qt5-qtwebsockets-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813966" comment="qt5-qtwebsockets-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813967" comment="qt5-qtwebsockets-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813968" comment="qt5-qtx11extras-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813969" comment="qt5-qtx11extras-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813970" comment="qt5-qtx11extras-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813971" comment="qt5-qtxmlpatterns-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813972" comment="qt5-qtxmlpatterns-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813973" comment="qt5-qtxmlpatterns-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813974" comment="qt5-qtxmlpatterns-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813975" comment="qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813976" comment="qt5-srpm-macros-5.15.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3341" ref_url="https://www.suse.com/security/cve/CVE-2023-3341" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031872.html" source="SUSE-SU"/>
    <description>
    The code that processes control channel messages sent to `named` calls certain functions recursively during packet parsing. Recursion depth is only limited by the maximum accepted packet size; depending on the environment, this may cause the packet-parsing code to run out of available stack memory, causing `named` to terminate unexpectedly. Since each incoming control channel message is fully parsed before its contents are authenticated, exploiting this flaw does not require the attacker to hold a valid RNDC key; only network access to the control channel's configured TCP port is necessary.
This issue affects BIND 9 versions 9.2.0 through 9.16.43, 9.18.0 through 9.18.18, 9.19.0 through 9.19.16, 9.9.3-S1 through 9.16.43-S1, and 9.18.0-S1 through 9.18.18-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3341/">CVE-2023-3341 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3341">CVE-2023-3341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215472">SUSE bug 1215472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216764">SUSE bug 1216764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217453">SUSE bug 1217453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217551">SUSE bug 1217551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217600">SUSE bug 1217600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223092">SUSE bug 1223092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807160" comment="bind-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807161" comment="bind-chroot-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807162" comment="bind-devel-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807163" comment="bind-dnssec-doc-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807164" comment="bind-dnssec-utils-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807165" comment="bind-doc-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807166" comment="bind-libs-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807167" comment="bind-license-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807168" comment="bind-utils-9.16.23-11.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807169" comment="python3-bind-9.16.23-11.el9_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33460" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33460" ref_url="https://www.suse.com/security/cve/CVE-2023-33460" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030996.html" source="SUSE-SU"/>
    <description>
    There's a memory leak in yajl 2.1.0 with use of yajl_tree_parse function. which will cause out-of-memory in server and cause crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-33460/">CVE-2023-33460 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33460">CVE-2023-33460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212928">SUSE bug 1212928</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811118" comment="yajl-2.1.0-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811119" comment="yajl-devel-2.1.0-22.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3347" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3347" ref_url="https://www.suse.com/security/cve/CVE-2023-3347" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3347/">CVE-2023-3347 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3347">CVE-2023-3347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213170">SUSE bug 1213170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806654" comment="ctdb-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806655" comment="libnetapi-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806656" comment="libnetapi-devel-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806657" comment="libsmbclient-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806658" comment="libsmbclient-devel-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806659" comment="libwbclient-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806660" comment="libwbclient-devel-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806661" comment="python3-samba-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806662" comment="python3-samba-dc-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806663" comment="python3-samba-devel-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806664" comment="python3-samba-test-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806665" comment="samba-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806666" comment="samba-client-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806667" comment="samba-client-libs-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806668" comment="samba-common-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806669" comment="samba-common-libs-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806670" comment="samba-common-tools-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806671" comment="samba-dc-libs-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806672" comment="samba-dcerpc-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806673" comment="samba-devel-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806674" comment="samba-krb5-printing-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806675" comment="samba-ldb-ldap-modules-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806676" comment="samba-libs-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806677" comment="samba-pidl-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806678" comment="samba-test-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806679" comment="samba-test-libs-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806680" comment="samba-tools-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806681" comment="samba-usershares-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806682" comment="samba-vfs-iouring-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806683" comment="samba-winbind-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806684" comment="samba-winbind-clients-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806685" comment="samba-winbind-krb5-locator-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806686" comment="samba-winbind-modules-4.17.5-103.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806687" comment="samba-winexe-4.17.5-103.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3354</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3354" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3354" ref_url="https://www.suse.com/security/cve/CVE-2023-3354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035062.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server. When a client connects to the VNC server, QEMU checks whether the current number of connections crosses a certain threshold and if so, cleans up the previous connection. If the previous connection happens to be in the handshake phase and fails, QEMU cleans up the connection again, resulting in a NULL pointer dereference issue. This could allow a remote unauthenticated client to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3354/">CVE-2023-3354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3354">CVE-2023-3354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212850">SUSE bug 1212850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806855" comment="qemu-guest-agent-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806856" comment="qemu-img-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806857" comment="qemu-kvm-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806858" comment="qemu-kvm-audio-pa-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806859" comment="qemu-kvm-block-curl-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806860" comment="qemu-kvm-block-rbd-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806861" comment="qemu-kvm-common-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806862" comment="qemu-kvm-core-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806863" comment="qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806864" comment="qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806865" comment="qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806866" comment="qemu-kvm-device-usb-host-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806867" comment="qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806868" comment="qemu-kvm-docs-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806869" comment="qemu-kvm-tools-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806870" comment="qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806871" comment="qemu-kvm-ui-opengl-7.2.0-14.el9_2.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806872" comment="qemu-pr-helper-7.2.0-14.el9_2.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3358</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3358" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3358" ref_url="https://www.suse.com/security/cve/CVE-2023-3358" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference was found in the Linux kernel's Integrated Sensor Hub (ISH) driver. This issue could allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3358/">CVE-2023-3358 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3358">CVE-2023-3358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212606">SUSE bug 1212606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3390" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3390" ref_url="https://www.suse.com/security/cve/CVE-2023-3390" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the Linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.

Mishandled error handling with NFT_MSG_NEWRULE makes it possible to use a dangling pointer in the same transaction causing a use-after-free vulnerability. This flaw allows a local attacker with user access to cause a privilege escalation issue.

We recommend upgrading past commit  1240eb93f0616b21c675416516ff3d74798fdc97.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3390/">CVE-2023-3390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3390">CVE-2023-3390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212846">SUSE bug 1212846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212934">SUSE bug 1212934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213245">SUSE bug 1213245</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216225">SUSE bug 1216225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33951</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33951" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33951" ref_url="https://www.suse.com/security/cve/CVE-2023-33951" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A race condition vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of GEM objects. The issue results from improper locking when performing operations on an object. This flaw allows a local privileged user to disclose information in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-33951/">CVE-2023-33951 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33951">CVE-2023-33951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211593">SUSE bug 1211593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202333952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-33952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-33952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33952" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-33952" ref_url="https://www.suse.com/security/cve/CVE-2023-33952" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-33952/">CVE-2023-33952 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-33952">CVE-2023-33952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211595">SUSE bug 1211595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212348">SUSE bug 1212348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34058" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34058" ref_url="https://www.suse.com/security/cve/CVE-2023-34058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016889.html" source="SUSE-SU"/>
    <description>
    VMware Tools contains a SAML token signature bypass vulnerability.  A malicious actor that has been granted  Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html   in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged  Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34058/">CVE-2023-34058 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34058">CVE-2023-34058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216432">SUSE bug 1216432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228309">SUSE bug 1228309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811287" comment="open-vm-tools-12.2.5-3.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811288" comment="open-vm-tools-desktop-12.2.5-3.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811289" comment="open-vm-tools-salt-minion-12.2.5-3.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811290" comment="open-vm-tools-sdmp-12.2.5-3.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811291" comment="open-vm-tools-test-12.2.5-3.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34059" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34059" ref_url="https://www.suse.com/security/cve/CVE-2023-34059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016889.html" source="SUSE-SU"/>
    <description>
    open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper.  A malicious actor with non-root privileges may be able to hijack the 
/dev/uinput file descriptor allowing them to simulate user inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34059/">CVE-2023-34059 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34059">CVE-2023-34059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216433">SUSE bug 1216433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225967">SUSE bug 1225967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811287" comment="open-vm-tools-12.2.5-3.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811288" comment="open-vm-tools-desktop-12.2.5-3.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811289" comment="open-vm-tools-salt-minion-12.2.5-3.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811290" comment="open-vm-tools-sdmp-12.2.5-3.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811291" comment="open-vm-tools-test-12.2.5-3.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3417</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3417" ref_url="https://www.suse.com/security/cve/CVE-2023-3417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030640.html" source="SUSE-SU"/>
    <description>
    Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in  fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird &lt; 115.0.1 and Thunderbird &lt; 102.13.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3417/">CVE-2023-3417 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3417">CVE-2023-3417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213658">SUSE bug 1213658</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34241" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34241" ref_url="https://www.suse.com/security/cve/CVE-2023-34241" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/030000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021226.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process.

The exact cause of this issue is the function `httpClose(con-&gt;http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/etc/hosts.deny`.

Version 2.4.6 has a patch for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34241/">CVE-2023-34241 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34241">CVE-2023-34241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212230">SUSE bug 1212230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217457">SUSE bug 1217457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218317">SUSE bug 1218317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811155" comment="cups-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811156" comment="cups-client-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811157" comment="cups-devel-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811158" comment="cups-filesystem-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811159" comment="cups-ipptool-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811160" comment="cups-libs-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811161" comment="cups-lpd-2.3.3op2-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811162" comment="cups-printerapp-2.3.3op2-21.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34410" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34410" ref_url="https://www.suse.com/security/cve/CVE-2023-34410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041344.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34410/">CVE-2023-34410 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34410">CVE-2023-34410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211994">SUSE bug 1211994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813867" comment="adwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813868" comment="libadwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813869" comment="python-qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813870" comment="python3-pyqt5-sip-12.11.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813871" comment="python3-qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813872" comment="python3-qt5-base-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813873" comment="python3-qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813874" comment="qgnomeplatform-0.9.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813875" comment="qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813876" comment="qt5-assistant-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813877" comment="qt5-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813878" comment="qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813879" comment="qt5-doctools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813880" comment="qt5-linguist-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813881" comment="qt5-qdbusviewer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813882" comment="qt5-qt3d-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813883" comment="qt5-qt3d-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813884" comment="qt5-qt3d-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813885" comment="qt5-qt3d-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813886" comment="qt5-qtbase-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813887" comment="qt5-qtbase-common-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813888" comment="qt5-qtbase-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813889" comment="qt5-qtbase-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813890" comment="qt5-qtbase-examples-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813891" comment="qt5-qtbase-gui-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813892" comment="qt5-qtbase-mysql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813893" comment="qt5-qtbase-odbc-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813894" comment="qt5-qtbase-postgresql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813895" comment="qt5-qtbase-private-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813896" comment="qt5-qtbase-static-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813897" comment="qt5-qtconnectivity-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813898" comment="qt5-qtconnectivity-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813899" comment="qt5-qtconnectivity-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813900" comment="qt5-qtconnectivity-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813901" comment="qt5-qtdeclarative-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813902" comment="qt5-qtdeclarative-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813903" comment="qt5-qtdeclarative-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813904" comment="qt5-qtdeclarative-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813905" comment="qt5-qtdeclarative-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813906" comment="qt5-qtdoc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813907" comment="qt5-qtgraphicaleffects-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813908" comment="qt5-qtgraphicaleffects-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813909" comment="qt5-qtimageformats-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813910" comment="qt5-qtimageformats-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813911" comment="qt5-qtlocation-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813912" comment="qt5-qtlocation-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813913" comment="qt5-qtlocation-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813914" comment="qt5-qtlocation-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813915" comment="qt5-qtmultimedia-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813916" comment="qt5-qtmultimedia-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813917" comment="qt5-qtmultimedia-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813918" comment="qt5-qtmultimedia-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813919" comment="qt5-qtquickcontrols-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813920" comment="qt5-qtquickcontrols-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813921" comment="qt5-qtquickcontrols-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813922" comment="qt5-qtquickcontrols2-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813923" comment="qt5-qtquickcontrols2-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813924" comment="qt5-qtquickcontrols2-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813925" comment="qt5-qtquickcontrols2-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813926" comment="qt5-qtscript-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813927" comment="qt5-qtscript-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813928" comment="qt5-qtscript-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813929" comment="qt5-qtscript-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813930" comment="qt5-qtsensors-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813931" comment="qt5-qtsensors-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813932" comment="qt5-qtsensors-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813933" comment="qt5-qtsensors-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813934" comment="qt5-qtserialbus-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813935" comment="qt5-qtserialbus-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813936" comment="qt5-qtserialbus-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813937" comment="qt5-qtserialbus-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813938" comment="qt5-qtserialport-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813939" comment="qt5-qtserialport-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813940" comment="qt5-qtserialport-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813941" comment="qt5-qtserialport-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813942" comment="qt5-qtsvg-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813943" comment="qt5-qtsvg-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813944" comment="qt5-qtsvg-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813945" comment="qt5-qtsvg-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813946" comment="qt5-qttools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813947" comment="qt5-qttools-common-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813948" comment="qt5-qttools-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813949" comment="qt5-qttools-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813950" comment="qt5-qttools-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813951" comment="qt5-qttools-libs-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813952" comment="qt5-qttools-libs-designercomponents-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813953" comment="qt5-qttools-libs-help-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813954" comment="qt5-qttools-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813955" comment="qt5-qttranslations-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813956" comment="qt5-qtwayland-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813957" comment="qt5-qtwayland-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813958" comment="qt5-qtwayland-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813959" comment="qt5-qtwayland-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813960" comment="qt5-qtwebchannel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813961" comment="qt5-qtwebchannel-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813962" comment="qt5-qtwebchannel-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813963" comment="qt5-qtwebchannel-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813964" comment="qt5-qtwebsockets-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813965" comment="qt5-qtwebsockets-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813966" comment="qt5-qtwebsockets-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813967" comment="qt5-qtwebsockets-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813968" comment="qt5-qtx11extras-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813969" comment="qt5-qtx11extras-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813970" comment="qt5-qtx11extras-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813971" comment="qt5-qtxmlpatterns-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813972" comment="qt5-qtxmlpatterns-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813973" comment="qt5-qtxmlpatterns-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813974" comment="qt5-qtxmlpatterns-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813975" comment="qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813976" comment="qt5-srpm-macros-5.15.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34414" ref_url="https://www.suse.com/security/cve/CVE-2023-34414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The error page for sites with invalid TLS certificates was missing the
activation-delay Firefox uses to protect prompts and permission dialogs
from attacks that exploit human response time delays. If a malicious
page elicited user clicks in precise locations immediately before
navigating to a site with a certificate error and made the renderer
extremely busy at the same time, it could create a gap between when
the error page was loaded and when the display actually refreshed.
With the right timing the elicited clicks could land in that gap and 
activate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR &lt; 102.12, Firefox &lt; 114, and Thunderbird &lt; 102.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34414/">CVE-2023-34414 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34414">CVE-2023-34414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211922">SUSE bug 1211922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806072" comment="firefox-102.12.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806073" comment="firefox-x11-102.12.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806071" comment="thunderbird-102.12.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34416" ref_url="https://www.suse.com/security/cve/CVE-2023-34416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-June/029767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-June/015139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018023.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 113, Firefox ESR 102.11, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.12, Firefox &lt; 114, and Thunderbird &lt; 102.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-34416/">CVE-2023-34416 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34416">CVE-2023-34416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1211922">SUSE bug 1211922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806072" comment="firefox-102.12.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806073" comment="firefox-x11-102.12.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806071" comment="thunderbird-102.12.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34440" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34440" ref_url="https://www.suse.com/security/cve/CVE-2023-34440" source="SUSE CVE"/>
    <description>
    Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-34440/">CVE-2023-34440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-34440">CVE-2023-34440 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053952" comment="microcode_ctl-20240910-1.20250211.1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3446" ref_url="https://www.suse.com/security/cve/CVE-2023-3446" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015773.html" source="SUSE-SU"/>
    <description>
    Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. One of those
checks confirms that the modulus ('p' parameter) is not too large. Trying to use
a very large modulus is slow and OpenSSL will not normally use a modulus which
is over 10,000 bits in length.

However the DH_check() function checks numerous aspects of the key or parameters
that have been supplied. Some of those checks use the supplied modulus value
even if it has already been found to be too large.

An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulernable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the '-check' option.

The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3446/">CVE-2023-3446 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213487">SUSE bug 1213487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221185">SUSE bug 1221185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867976" comment="openssl-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867977" comment="openssl-devel-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867978" comment="openssl-fips-provider-3.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867979" comment="openssl-libs-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867980" comment="openssl-perl-3.0.7-27.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34966" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34966" ref_url="https://www.suse.com/security/cve/CVE-2023-34966" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015711.html" source="SUSE-SU"/>
    <description>
    An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34966/">CVE-2023-34966 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34966">CVE-2023-34966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213173">SUSE bug 1213173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813379" comment="ctdb-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813302" comment="evolution-mapi-3.40.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813303" comment="evolution-mapi-langpacks-3.40.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813304" comment="libnetapi-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813380" comment="libnetapi-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813305" comment="libsmbclient-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813381" comment="libsmbclient-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813306" comment="libwbclient-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813382" comment="libwbclient-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813307" comment="openchange-2.3-41.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813308" comment="python3-samba-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813309" comment="python3-samba-dc-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813383" comment="python3-samba-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813384" comment="python3-samba-test-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813310" comment="samba-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813311" comment="samba-client-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813312" comment="samba-client-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813313" comment="samba-common-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813314" comment="samba-common-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813315" comment="samba-common-tools-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813316" comment="samba-dc-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813317" comment="samba-dcerpc-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813385" comment="samba-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813318" comment="samba-krb5-printing-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813319" comment="samba-ldb-ldap-modules-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813320" comment="samba-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813386" comment="samba-pidl-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813387" comment="samba-test-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813388" comment="samba-test-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813321" comment="samba-tools-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813322" comment="samba-usershares-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813323" comment="samba-vfs-iouring-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813324" comment="samba-winbind-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813325" comment="samba-winbind-clients-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813326" comment="samba-winbind-krb5-locator-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813327" comment="samba-winbind-modules-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813328" comment="samba-winexe-4.18.6-100.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34967" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34967" ref_url="https://www.suse.com/security/cve/CVE-2023-34967" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015711.html" source="SUSE-SU"/>
    <description>
    A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-34967/">CVE-2023-34967 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34967">CVE-2023-34967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213172">SUSE bug 1213172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813379" comment="ctdb-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813302" comment="evolution-mapi-3.40.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813303" comment="evolution-mapi-langpacks-3.40.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813304" comment="libnetapi-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813380" comment="libnetapi-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813305" comment="libsmbclient-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813381" comment="libsmbclient-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813306" comment="libwbclient-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813382" comment="libwbclient-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813307" comment="openchange-2.3-41.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813308" comment="python3-samba-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813309" comment="python3-samba-dc-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813383" comment="python3-samba-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813384" comment="python3-samba-test-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813310" comment="samba-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813311" comment="samba-client-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813312" comment="samba-client-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813313" comment="samba-common-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813314" comment="samba-common-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813315" comment="samba-common-tools-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813316" comment="samba-dc-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813317" comment="samba-dcerpc-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813385" comment="samba-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813318" comment="samba-krb5-printing-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813319" comment="samba-ldb-ldap-modules-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813320" comment="samba-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813386" comment="samba-pidl-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813387" comment="samba-test-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813388" comment="samba-test-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813321" comment="samba-tools-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813322" comment="samba-usershares-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813323" comment="samba-vfs-iouring-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813324" comment="samba-winbind-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813325" comment="samba-winbind-clients-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813326" comment="samba-winbind-krb5-locator-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813327" comment="samba-winbind-modules-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813328" comment="samba-winexe-4.18.6-100.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34968" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34968" ref_url="https://www.suse.com/security/cve/CVE-2023-34968" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015711.html" source="SUSE-SU"/>
    <description>
    A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-34968/">CVE-2023-34968 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34968">CVE-2023-34968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213171">SUSE bug 1213171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813379" comment="ctdb-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813302" comment="evolution-mapi-3.40.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813303" comment="evolution-mapi-langpacks-3.40.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813304" comment="libnetapi-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813380" comment="libnetapi-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813305" comment="libsmbclient-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813381" comment="libsmbclient-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813306" comment="libwbclient-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813382" comment="libwbclient-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813307" comment="openchange-2.3-41.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813308" comment="python3-samba-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813309" comment="python3-samba-dc-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813383" comment="python3-samba-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813384" comment="python3-samba-test-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813310" comment="samba-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813311" comment="samba-client-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813312" comment="samba-client-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813313" comment="samba-common-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813314" comment="samba-common-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813315" comment="samba-common-tools-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813316" comment="samba-dc-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813317" comment="samba-dcerpc-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813385" comment="samba-devel-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813318" comment="samba-krb5-printing-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813319" comment="samba-ldb-ldap-modules-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813320" comment="samba-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813386" comment="samba-pidl-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813387" comment="samba-test-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813388" comment="samba-test-libs-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813321" comment="samba-tools-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813322" comment="samba-usershares-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813323" comment="samba-vfs-iouring-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813324" comment="samba-winbind-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813325" comment="samba-winbind-clients-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813326" comment="samba-winbind-krb5-locator-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813327" comment="samba-winbind-modules-4.18.6-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813328" comment="samba-winexe-4.18.6-100.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202334969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-34969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-34969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34969" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-34969" ref_url="https://www.suse.com/security/cve/CVE-2023-34969" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015525.html" source="SUSE-SU"/>
    <description>
    D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-34969/">CVE-2023-34969 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-34969">CVE-2023-34969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212126">SUSE bug 1212126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806758" comment="dbus-1.12.20-7.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806759" comment="dbus-common-1.12.20-7.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806760" comment="dbus-daemon-1.12.20-7.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806761" comment="dbus-devel-1.12.20-7.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806762" comment="dbus-libs-1.12.20-7.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806763" comment="dbus-tools-1.12.20-7.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806764" comment="dbus-x11-1.12.20-7.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35001</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35001" ref_url="https://www.suse.com/security/cve/CVE-2023-35001" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031544.html" source="SUSE-SU"/>
    <description>
    Linux Kernel nftables Out-Of-Bounds Read/Write Vulnerability; nft_byteorder poorly handled vm register contents when CAP_NET_ADMIN is in any user or network namespace
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35001/">CVE-2023-35001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35001">CVE-2023-35001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213059">SUSE bug 1213059</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213063">SUSE bug 1213063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35074" ref_url="https://www.suse.com/security/cve/CVE-2023-35074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032584.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35074/">CVE-2023-35074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35074">CVE-2023-35074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215866">SUSE bug 1215866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217568">SUSE bug 1217568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35390" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35390" ref_url="https://www.suse.com/security/cve/CVE-2023-35390" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-35390/">CVE-2023-35390 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35390">CVE-2023-35390 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806792" comment="aspnetcore-runtime-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806781" comment="aspnetcore-runtime-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806793" comment="aspnetcore-targeting-pack-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806782" comment="aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806794" comment="dotnet-apphost-pack-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806783" comment="dotnet-apphost-pack-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806784" comment="dotnet-host-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806795" comment="dotnet-hostfxr-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806785" comment="dotnet-hostfxr-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806796" comment="dotnet-runtime-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806786" comment="dotnet-runtime-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806797" comment="dotnet-sdk-6.0-6.0.121-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806798" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806787" comment="dotnet-sdk-7.0-7.0.110-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806788" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806799" comment="dotnet-targeting-pack-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806789" comment="dotnet-targeting-pack-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806800" comment="dotnet-templates-6.0-6.0.121-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806790" comment="dotnet-templates-7.0-7.0.110-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806791" comment="netstandard-targeting-pack-2.1-7.0.110-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3567" ref_url="https://www.suse.com/security/cve/CVE-2023-3567" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3567/">CVE-2023-3567 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3567">CVE-2023-3567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213167">SUSE bug 1213167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213244">SUSE bug 1213244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213842">SUSE bug 1213842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3576</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3576" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3576" ref_url="https://www.suse.com/security/cve/CVE-2023-3576" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3576/">CVE-2023-3576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3576">CVE-2023-3576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213273">SUSE bug 1213273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811129" comment="libtiff-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811130" comment="libtiff-devel-4.4.0-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811131" comment="libtiff-tools-4.4.0-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35788" ref_url="https://www.suse.com/security/cve/CVE-2023-35788" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015755.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35788/">CVE-2023-35788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35788">CVE-2023-35788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212504">SUSE bug 1212504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1212509">SUSE bug 1212509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806723" comment="bpftool-7.0.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806724" comment="kernel-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806725" comment="kernel-abi-stablelists-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806726" comment="kernel-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806727" comment="kernel-cross-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806728" comment="kernel-debug-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806729" comment="kernel-debug-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806732" comment="kernel-debug-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806733" comment="kernel-debug-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806734" comment="kernel-debug-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806735" comment="kernel-debug-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806738" comment="kernel-doc-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806739" comment="kernel-headers-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806740" comment="kernel-modules-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806741" comment="kernel-modules-core-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806742" comment="kernel-modules-extra-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806743" comment="kernel-tools-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806744" comment="kernel-tools-libs-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806746" comment="kernel-uki-virt-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806747" comment="perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806748" comment="python3-perf-5.14.0-284.25.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806749" comment="rtla-5.14.0-284.25.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35789" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35789" ref_url="https://www.suse.com/security/cve/CVE-2023-35789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018036.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-35789/">CVE-2023-35789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-35789">CVE-2023-35789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212499">SUSE bug 1212499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810799" comment="librabbitmq-0.11.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810800" comment="librabbitmq-devel-0.11.0-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810801" comment="librabbitmq-tools-0.11.0-7.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202335825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-35825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-35825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35825" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-35825" ref_url="https://www.suse.com/security/cve/CVE-2023-35825" source="SUSE CVE"/>
    <description>
    DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-3141. Reason: This candidate is a reservation duplicate of CVE-2023-3141. Notes: All CVE users should reference CVE-2023-3141 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-35825/">CVE-2023-35825 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-35825">CVE-2023-35825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212503">SUSE bug 1212503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3600" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3600" ref_url="https://www.suse.com/security/cve/CVE-2023-3600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030640.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During the worker lifecycle, a use-after-free condition could have occurred, which could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 115.0.2, Firefox ESR &lt; 115.0.2, and Thunderbird &lt; 115.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3600/">CVE-2023-3600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3600">CVE-2023-3600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213230">SUSE bug 1213230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806912" comment="firefox-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806913" comment="firefox-x11-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806914" comment="thunderbird-115.3.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202336049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-36049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-36049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-36049" ref_url="https://www.suse.com/security/cve/CVE-2023-36049" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36049/">CVE-2023-36049 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36049">CVE-2023-36049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811278" comment="aspnetcore-runtime-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811269" comment="aspnetcore-runtime-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814533" comment="aspnetcore-runtime-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811279" comment="aspnetcore-targeting-pack-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811270" comment="aspnetcore-targeting-pack-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814534" comment="aspnetcore-targeting-pack-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811280" comment="dotnet-apphost-pack-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811271" comment="dotnet-apphost-pack-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814535" comment="dotnet-apphost-pack-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814536" comment="dotnet-host-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811281" comment="dotnet-hostfxr-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811272" comment="dotnet-hostfxr-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814537" comment="dotnet-hostfxr-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811282" comment="dotnet-runtime-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811273" comment="dotnet-runtime-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814538" comment="dotnet-runtime-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811283" comment="dotnet-sdk-6.0-6.0.125-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811284" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811274" comment="dotnet-sdk-7.0-7.0.114-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811275" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814539" comment="dotnet-sdk-8.0-8.0.100-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814540" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811285" comment="dotnet-targeting-pack-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811276" comment="dotnet-targeting-pack-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814541" comment="dotnet-targeting-pack-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811286" comment="dotnet-templates-6.0-6.0.125-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811277" comment="dotnet-templates-7.0-7.0.114-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814542" comment="dotnet-templates-8.0-8.0.100-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814543" comment="netstandard-targeting-pack-2.1-8.0.100-2.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202336054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-36054</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-36054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36054" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-36054" ref_url="https://www.suse.com/security/cve/CVE-2023-36054" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016024.html" source="SUSE-SU"/>
    <description>
    lib/kadm5/kadm_rpc_xdr.c in MIT Kerberos 5 (aka krb5) before 1.20.2 and 1.21.x before 1.21.1 frees an uninitialized pointer. A remote authenticated user can trigger a kadmind crash. This occurs because _xdr_kadm5_principal_ent_rec does not validate the relationship between n_key_data and the key_data array count.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36054/">CVE-2023-36054 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36054">CVE-2023-36054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214054">SUSE bug 1214054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217441">SUSE bug 1217441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217443">SUSE bug 1217443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218348">SUSE bug 1218348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219710">SUSE bug 1219710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810826" comment="krb5-devel-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810827" comment="krb5-libs-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810828" comment="krb5-pkinit-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810829" comment="krb5-server-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810830" comment="krb5-server-ldap-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810831" comment="krb5-workstation-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810832" comment="libkadm5-1.21.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3609" ref_url="https://www.suse.com/security/cve/CVE-2023-3609" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="TID000021529" ref_url="https://www.suse.com/support/kb/doc/?id=000021529" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, u32_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 04c55383fa5689357bcdd2c8036725a55ed632bc.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3609/">CVE-2023-3609 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3609">CVE-2023-3609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213586">SUSE bug 1213586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213587">SUSE bug 1213587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3610</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3610" ref_url="https://www.suse.com/security/cve/CVE-2023-3610" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Flaw in the error handling of bound chains causes a use-after-free in the abort path of NFT_MSG_NEWRULE. The vulnerability requires CAP_NET_ADMIN to be triggered.

We recommend upgrading past commit 4bedf9eee016286c835e3d8fa981ddece5338795.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3610/">CVE-2023-3610 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3610">CVE-2023-3610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213580">SUSE bug 1213580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213584">SUSE bug 1213584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3618</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3618" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3618" ref_url="https://www.suse.com/security/cve/CVE-2023-3618" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3618/">CVE-2023-3618 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3618">CVE-2023-3618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213274">SUSE bug 1213274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866653" comment="libtiff-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866654" comment="libtiff-devel-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866655" comment="libtiff-tools-4.4.0-12.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3640" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3640" ref_url="https://www.suse.com/security/cve/CVE-2023-3640" source="SUSE CVE"/>
    <description>
    A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3640/">CVE-2023-3640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3640">CVE-2023-3640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213271">SUSE bug 1213271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202336558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-36558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-36558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36558" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-36558" ref_url="https://www.suse.com/security/cve/CVE-2023-36558" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36558/">CVE-2023-36558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36558">CVE-2023-36558 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811278" comment="aspnetcore-runtime-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811269" comment="aspnetcore-runtime-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814533" comment="aspnetcore-runtime-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811279" comment="aspnetcore-targeting-pack-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811270" comment="aspnetcore-targeting-pack-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814534" comment="aspnetcore-targeting-pack-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811280" comment="dotnet-apphost-pack-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811271" comment="dotnet-apphost-pack-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814535" comment="dotnet-apphost-pack-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814536" comment="dotnet-host-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811281" comment="dotnet-hostfxr-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811272" comment="dotnet-hostfxr-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814537" comment="dotnet-hostfxr-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811282" comment="dotnet-runtime-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811273" comment="dotnet-runtime-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814538" comment="dotnet-runtime-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811283" comment="dotnet-sdk-6.0-6.0.125-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811284" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.125-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811274" comment="dotnet-sdk-7.0-7.0.114-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811275" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.114-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814539" comment="dotnet-sdk-8.0-8.0.100-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814540" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.100-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811285" comment="dotnet-targeting-pack-6.0-6.0.25-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811276" comment="dotnet-targeting-pack-7.0-7.0.14-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814541" comment="dotnet-targeting-pack-8.0-8.0.0-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811286" comment="dotnet-templates-6.0-6.0.125-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811277" comment="dotnet-templates-7.0-7.0.114-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814542" comment="dotnet-templates-8.0-8.0.100-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814543" comment="netstandard-targeting-pack-2.1-8.0.100-2.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202336617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-36617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-36617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36617" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-36617" ref_url="https://www.suse.com/security/cve/CVE-2023-36617" source="SUSE CVE"/>
    <description>
    A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-36617/">CVE-2023-36617 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36617">CVE-2023-36617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212890">SUSE bug 1212890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872248" comment="ruby-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872249" comment="ruby-bundled-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872250" comment="ruby-default-gems-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872251" comment="ruby-devel-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872252" comment="ruby-doc-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872253" comment="ruby-libs-3.1.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872254" comment="rubygem-bigdecimal-3.1.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872255" comment="rubygem-bundler-2.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872256" comment="rubygem-io-console-0.5.11-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872257" comment="rubygem-irb-1.4.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872258" comment="rubygem-json-2.6.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872259" comment="rubygem-minitest-5.15.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872264" comment="rubygem-power_assert-2.0.1-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872265" comment="rubygem-psych-4.0.4-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872266" comment="rubygem-rake-13.0.6-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872267" comment="rubygem-rbs-2.7.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872268" comment="rubygem-rdoc-6.4.0-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872269" comment="rubygem-rexml-3.2.5-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872270" comment="rubygem-rss-0.2.9-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872271" comment="rubygem-test-unit-3.5.3-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872272" comment="rubygem-typeprof-0.21.3-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872273" comment="rubygems-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872274" comment="rubygems-devel-3.3.26-143.module+el9.3.0+21558+96b51efd is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202336664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-36664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-36664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36664" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-36664" ref_url="https://www.suse.com/security/cve/CVE-2023-36664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015506.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript through 10.01.2 mishandles permission validation for pipe devices (with the %pipe% prefix or the | pipe character prefix).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-36664/">CVE-2023-36664 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36664">CVE-2023-36664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212711">SUSE bug 1212711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213725">SUSE bug 1213725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214098">SUSE bug 1214098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807137" comment="ghostscript-9.54.0-10.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807138" comment="ghostscript-doc-9.54.0-10.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807139" comment="ghostscript-tools-dvipdf-9.54.0-10.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807140" comment="ghostscript-tools-fonts-9.54.0-10.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807141" comment="ghostscript-tools-printing-9.54.0-10.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807142" comment="ghostscript-x11-9.54.0-10.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807143" comment="libgs-9.54.0-10.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807144" comment="libgs-devel-9.54.0-10.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3674" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3674" ref_url="https://www.suse.com/security/cve/CVE-2023-3674" source="SUSE CVE"/>
    <description>
    A flaw was found in the keylime attestation verifier, which fails to flag a device's submitted TPM quote as faulty when the quote's signature does not validate for some reason. Instead, it will only emit an error in the log without flagging the device as untrusted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-09"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-3674/">CVE-2023-3674 at SUSE</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3674">CVE-2023-3674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213347">SUSE bug 1213347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009850282" comment="keylime-7.3.0-13.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850283" comment="keylime-base-7.3.0-13.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850284" comment="keylime-registrar-7.3.0-13.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850285" comment="keylime-selinux-7.3.0-13.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850286" comment="keylime-tenant-7.3.0-13.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850287" comment="keylime-verifier-7.3.0-13.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850288" comment="python3-keylime-7.3.0-13.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202336799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-36799</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-36799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36799" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-36799" ref_url="https://www.suse.com/security/cve/CVE-2023-36799" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-36799/">CVE-2023-36799 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-36799">CVE-2023-36799 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808828" comment="aspnetcore-runtime-6.0-6.0.24-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808837" comment="aspnetcore-runtime-7.0-7.0.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808829" comment="aspnetcore-targeting-pack-6.0-6.0.24-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808838" comment="aspnetcore-targeting-pack-7.0-7.0.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808830" comment="dotnet-apphost-pack-6.0-6.0.24-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808839" comment="dotnet-apphost-pack-7.0-7.0.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808840" comment="dotnet-host-7.0.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808831" comment="dotnet-hostfxr-6.0-6.0.24-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808841" comment="dotnet-hostfxr-7.0-7.0.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808832" comment="dotnet-runtime-6.0-6.0.24-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808842" comment="dotnet-runtime-7.0-7.0.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808833" comment="dotnet-sdk-6.0-6.0.124-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808834" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.124-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808843" comment="dotnet-sdk-7.0-7.0.113-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808844" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.113-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808835" comment="dotnet-targeting-pack-6.0-6.0.24-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808845" comment="dotnet-targeting-pack-7.0-7.0.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808836" comment="dotnet-templates-6.0-6.0.124-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808846" comment="dotnet-templates-7.0-7.0.113-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808847" comment="netstandard-targeting-pack-2.1-7.0.113-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37201" ref_url="https://www.suse.com/security/cve/CVE-2023-37201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have triggered a use-after-free condition when creating a WebRTC connection over HTTPS. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37201/">CVE-2023-37201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37201">CVE-2023-37201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806575" comment="firefox-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806576" comment="firefox-x11-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806574" comment="thunderbird-102.13.0-2.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37202</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37202" ref_url="https://www.suse.com/security/cve/CVE-2023-37202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37202/">CVE-2023-37202 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37202">CVE-2023-37202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806575" comment="firefox-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806576" comment="firefox-x11-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806574" comment="thunderbird-102.13.0-2.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37207" ref_url="https://www.suse.com/security/cve/CVE-2023-37207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the fullscreen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37207/">CVE-2023-37207 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37207">CVE-2023-37207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806575" comment="firefox-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806576" comment="firefox-x11-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806574" comment="thunderbird-102.13.0-2.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37208" ref_url="https://www.suse.com/security/cve/CVE-2023-37208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When opening Diagcab files, Firefox did not warn the user that these files may contain malicious code. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37208/">CVE-2023-37208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37208">CVE-2023-37208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806575" comment="firefox-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806576" comment="firefox-x11-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806574" comment="thunderbird-102.13.0-2.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37211" ref_url="https://www.suse.com/security/cve/CVE-2023-37211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 114, Firefox ESR 102.12, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 115, Firefox ESR &lt; 102.13, and Thunderbird &lt; 102.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-37211/">CVE-2023-37211 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37211">CVE-2023-37211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212438">SUSE bug 1212438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806575" comment="firefox-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806576" comment="firefox-x11-102.13.0-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806574" comment="thunderbird-102.13.0-2.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37327</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37327" ref_url="https://www.suse.com/security/cve/CVE-2023-37327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3219-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016338.html" source="SUSE-SU"/>
    <description>
    GStreamer FLAC File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of FLAC audio files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-20775.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37327/">CVE-2023-37327 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37327">CVE-2023-37327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213128">SUSE bug 1213128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866679" comment="gstreamer1-plugins-good-1.22.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866680" comment="gstreamer1-plugins-good-gtk-1.22.1-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37328</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37328" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37328" ref_url="https://www.suse.com/security/cve/CVE-2023-37328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016338.html" source="SUSE-SU"/>
    <description>
    GStreamer PGS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of PGS subtitle files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-20994.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37328/">CVE-2023-37328 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37328">CVE-2023-37328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213131">SUSE bug 1213131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866676" comment="gstreamer1-plugins-base-1.22.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866677" comment="gstreamer1-plugins-base-devel-1.22.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866678" comment="gstreamer1-plugins-base-tools-1.22.1-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37369</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37369" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37369" ref_url="https://www.suse.com/security/cve/CVE-2023-37369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041344.html" source="SUSE-SU"/>
    <description>
    In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37369/">CVE-2023-37369 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37369">CVE-2023-37369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214327">SUSE bug 1214327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813867" comment="adwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813868" comment="libadwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813869" comment="python-qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813870" comment="python3-pyqt5-sip-12.11.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813871" comment="python3-qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813872" comment="python3-qt5-base-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813873" comment="python3-qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813874" comment="qgnomeplatform-0.9.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813875" comment="qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813876" comment="qt5-assistant-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813877" comment="qt5-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813878" comment="qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813879" comment="qt5-doctools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813880" comment="qt5-linguist-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813881" comment="qt5-qdbusviewer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813882" comment="qt5-qt3d-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813883" comment="qt5-qt3d-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813884" comment="qt5-qt3d-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813885" comment="qt5-qt3d-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813886" comment="qt5-qtbase-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813887" comment="qt5-qtbase-common-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813888" comment="qt5-qtbase-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813889" comment="qt5-qtbase-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813890" comment="qt5-qtbase-examples-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813891" comment="qt5-qtbase-gui-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813892" comment="qt5-qtbase-mysql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813893" comment="qt5-qtbase-odbc-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813894" comment="qt5-qtbase-postgresql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813895" comment="qt5-qtbase-private-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813896" comment="qt5-qtbase-static-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813897" comment="qt5-qtconnectivity-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813898" comment="qt5-qtconnectivity-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813899" comment="qt5-qtconnectivity-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813900" comment="qt5-qtconnectivity-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813901" comment="qt5-qtdeclarative-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813902" comment="qt5-qtdeclarative-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813903" comment="qt5-qtdeclarative-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813904" comment="qt5-qtdeclarative-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813905" comment="qt5-qtdeclarative-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813906" comment="qt5-qtdoc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813907" comment="qt5-qtgraphicaleffects-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813908" comment="qt5-qtgraphicaleffects-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813909" comment="qt5-qtimageformats-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813910" comment="qt5-qtimageformats-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813911" comment="qt5-qtlocation-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813912" comment="qt5-qtlocation-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813913" comment="qt5-qtlocation-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813914" comment="qt5-qtlocation-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813915" comment="qt5-qtmultimedia-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813916" comment="qt5-qtmultimedia-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813917" comment="qt5-qtmultimedia-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813918" comment="qt5-qtmultimedia-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813919" comment="qt5-qtquickcontrols-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813920" comment="qt5-qtquickcontrols-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813921" comment="qt5-qtquickcontrols-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813922" comment="qt5-qtquickcontrols2-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813923" comment="qt5-qtquickcontrols2-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813924" comment="qt5-qtquickcontrols2-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813925" comment="qt5-qtquickcontrols2-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813926" comment="qt5-qtscript-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813927" comment="qt5-qtscript-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813928" comment="qt5-qtscript-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813929" comment="qt5-qtscript-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813930" comment="qt5-qtsensors-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813931" comment="qt5-qtsensors-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813932" comment="qt5-qtsensors-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813933" comment="qt5-qtsensors-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813934" comment="qt5-qtserialbus-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813935" comment="qt5-qtserialbus-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813936" comment="qt5-qtserialbus-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813937" comment="qt5-qtserialbus-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813938" comment="qt5-qtserialport-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813939" comment="qt5-qtserialport-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813940" comment="qt5-qtserialport-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813941" comment="qt5-qtserialport-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813942" comment="qt5-qtsvg-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813943" comment="qt5-qtsvg-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813944" comment="qt5-qtsvg-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813945" comment="qt5-qtsvg-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813946" comment="qt5-qttools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813947" comment="qt5-qttools-common-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813948" comment="qt5-qttools-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813949" comment="qt5-qttools-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813950" comment="qt5-qttools-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813951" comment="qt5-qttools-libs-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813952" comment="qt5-qttools-libs-designercomponents-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813953" comment="qt5-qttools-libs-help-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813954" comment="qt5-qttools-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813955" comment="qt5-qttranslations-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813956" comment="qt5-qtwayland-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813957" comment="qt5-qtwayland-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813958" comment="qt5-qtwayland-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813959" comment="qt5-qtwayland-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813960" comment="qt5-qtwebchannel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813961" comment="qt5-qtwebchannel-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813962" comment="qt5-qtwebchannel-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813963" comment="qt5-qtwebchannel-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813964" comment="qt5-qtwebsockets-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813965" comment="qt5-qtwebsockets-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813966" comment="qt5-qtwebsockets-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813967" comment="qt5-qtwebsockets-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813968" comment="qt5-qtx11extras-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813969" comment="qt5-qtx11extras-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813970" comment="qt5-qtx11extras-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813971" comment="qt5-qtxmlpatterns-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813972" comment="qt5-qtxmlpatterns-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813973" comment="qt5-qtxmlpatterns-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813974" comment="qt5-qtxmlpatterns-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813975" comment="qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813976" comment="qt5-srpm-macros-5.15.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37450</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37450" ref_url="https://www.suse.com/security/cve/CVE-2023-37450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032584.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, Safari 16.5.2, tvOS 16.6, macOS Ventura 13.5, watchOS 9.6. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-37450/">CVE-2023-37450 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37450">CVE-2023-37450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213379">SUSE bug 1213379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37453</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37453" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37453" ref_url="https://www.suse.com/security/cve/CVE-2023-37453" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the USB subsystem in the Linux kernel through 6.4.2. There is an out-of-bounds and crash in read_descriptors in drivers/usb/core/sysfs.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-37453/">CVE-2023-37453 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37453">CVE-2023-37453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213123">SUSE bug 1213123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37464" ref_url="https://www.suse.com/security/cve/CVE-2023-37464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015807.html" source="SUSE-SU"/>
    <description>
    OpenIDC/cjose is a C library implementing the Javascript Object Signing and Encryption (JOSE). The AES GCM decryption routine incorrectly uses the Tag length from the actual Authentication Tag provided in the JWE. The spec  says that a fixed length of 16 octets must be applied. Therefore this bug allows an attacker to provide a truncated Authentication Tag and to modify the JWE accordingly. Users should upgrade to a version &gt;= 0.6.2.2. Users unable to upgrade should avoid using AES GCM encryption and replace it with another encryption algorithm (e.g. AES CBC).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37464/">CVE-2023-37464 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37464">CVE-2023-37464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213385">SUSE bug 1213385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806750" comment="cjose-0.6.1-13.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3750" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3750" ref_url="https://www.suse.com/security/cve/CVE-2023-3750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030643.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libvirt. The virStoragePoolObjListSearch function does not return a locked pool as expected, resulting in a race condition and denial of service when attempting to lock the same object from another thread. This issue could allow clients connecting to the read-only socket to crash the libvirt daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3750/">CVE-2023-3750 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3750">CVE-2023-3750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213447">SUSE bug 1213447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811042" comment="libvirt-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811043" comment="libvirt-client-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811044" comment="libvirt-client-qemu-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811045" comment="libvirt-daemon-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811046" comment="libvirt-daemon-common-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811047" comment="libvirt-daemon-config-network-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811048" comment="libvirt-daemon-config-nwfilter-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811049" comment="libvirt-daemon-driver-interface-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811050" comment="libvirt-daemon-driver-network-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811051" comment="libvirt-daemon-driver-nodedev-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811052" comment="libvirt-daemon-driver-nwfilter-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811053" comment="libvirt-daemon-driver-qemu-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811054" comment="libvirt-daemon-driver-secret-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811055" comment="libvirt-daemon-driver-storage-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811056" comment="libvirt-daemon-driver-storage-core-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811057" comment="libvirt-daemon-driver-storage-disk-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811058" comment="libvirt-daemon-driver-storage-iscsi-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811059" comment="libvirt-daemon-driver-storage-logical-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811060" comment="libvirt-daemon-driver-storage-mpath-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811061" comment="libvirt-daemon-driver-storage-rbd-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811062" comment="libvirt-daemon-driver-storage-scsi-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811063" comment="libvirt-daemon-kvm-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811064" comment="libvirt-daemon-lock-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811065" comment="libvirt-daemon-log-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811066" comment="libvirt-daemon-plugin-lockd-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811067" comment="libvirt-daemon-plugin-sanlock-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811068" comment="libvirt-daemon-proxy-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811069" comment="libvirt-devel-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811070" comment="libvirt-docs-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811071" comment="libvirt-libs-9.5.0-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811072" comment="libvirt-nss-9.5.0-7.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3758</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3758" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3758" ref_url="https://www.suse.com/security/cve/CVE-2023-3758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1549-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021200.html" source="SUSE-SU"/>
    <description>
    A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3758/">CVE-2023-3758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-3758">CVE-2023-3758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223100">SUSE bug 1223100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868954" comment="libipa_hbac-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868955" comment="libsss_autofs-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868956" comment="libsss_certmap-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868957" comment="libsss_idmap-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868958" comment="libsss_nss_idmap-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868959" comment="libsss_nss_idmap-devel-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868960" comment="libsss_simpleifp-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868961" comment="libsss_sudo-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868962" comment="python3-libipa_hbac-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868963" comment="python3-libsss_nss_idmap-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868964" comment="python3-sss-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868965" comment="python3-sss-murmur-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868966" comment="python3-sssdconfig-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868967" comment="sssd-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868968" comment="sssd-ad-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868969" comment="sssd-client-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868970" comment="sssd-common-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868971" comment="sssd-common-pac-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868972" comment="sssd-dbus-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868973" comment="sssd-idp-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868974" comment="sssd-ipa-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868975" comment="sssd-kcm-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868976" comment="sssd-krb5-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868977" comment="sssd-krb5-common-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868978" comment="sssd-ldap-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868979" comment="sssd-nfs-idmap-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868980" comment="sssd-passkey-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868981" comment="sssd-polkit-rules-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868982" comment="sssd-proxy-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868983" comment="sssd-tools-2.9.4-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868984" comment="sssd-winbind-idmap-2.9.4-6.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3772</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3772" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3772" ref_url="https://www.suse.com/security/cve/CVE-2023-3772" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-3772/">CVE-2023-3772 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3772">CVE-2023-3772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213666">SUSE bug 1213666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3773</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3773" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3773" ref_url="https://www.suse.com/security/cve/CVE-2023-3773" source="SUSE CVE"/>
    <description>
    A flaw was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes, leading to potential leakage of sensitive heap data to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-3773/">CVE-2023-3773 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3773">CVE-2023-3773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213667">SUSE bug 1213667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3776" ref_url="https://www.suse.com/security/cve/CVE-2023-3776" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.

If tcf_change_indev() fails, fw_set_parms() will immediately return an error after incrementing or decrementing the reference counter in tcf_bind_filter(). If an attacker can control the reference counter and set it to zero, they can cause the reference to be freed, leading to a use-after-free vulnerability.

We recommend upgrading past commit 0323bce598eea038714f941ce2b22541c46d488f.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3776/">CVE-2023-3776 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3776">CVE-2023-3776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213588">SUSE bug 1213588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215119">SUSE bug 1215119</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215674">SUSE bug 1215674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223091">SUSE bug 1223091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223973">SUSE bug 1223973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3777" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3777" ref_url="https://www.suse.com/security/cve/CVE-2023-3777" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

When nf_tables_delrule() is flushing table rules, it is not checked whether the chain is bound and the chain's owner rule can also release the objects in certain circumstances.

We recommend upgrading past commit 6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3777/">CVE-2023-3777 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3777">CVE-2023-3777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215095">SUSE bug 1215095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215097">SUSE bug 1215097</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202337920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-37920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-37920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37920" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-37920" ref_url="https://www.suse.com/security/cve/CVE-2023-37920" source="SUSE CVE"/>
    <description>
    Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-37920/">CVE-2023-37920 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-37920">CVE-2023-37920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213662">SUSE bug 1213662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053884" comment="ca-certificates-2024.2.69_v8.0.303-91.4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846265" comment="fence-agents-aliyun-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846266" comment="fence-agents-all-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846267" comment="fence-agents-amt-ws-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846268" comment="fence-agents-apc-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846269" comment="fence-agents-apc-snmp-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846270" comment="fence-agents-aws-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846271" comment="fence-agents-azure-arm-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846272" comment="fence-agents-bladecenter-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846273" comment="fence-agents-brocade-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846274" comment="fence-agents-cisco-mds-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846275" comment="fence-agents-cisco-ucs-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846276" comment="fence-agents-common-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846277" comment="fence-agents-compute-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846278" comment="fence-agents-drac5-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846279" comment="fence-agents-eaton-snmp-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846280" comment="fence-agents-emerson-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846281" comment="fence-agents-eps-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846282" comment="fence-agents-gce-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846283" comment="fence-agents-heuristics-ping-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846284" comment="fence-agents-hpblade-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846285" comment="fence-agents-ibm-powervs-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846286" comment="fence-agents-ibm-vpc-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846287" comment="fence-agents-ibmblade-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846288" comment="fence-agents-ifmib-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846289" comment="fence-agents-ilo-moonshot-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846290" comment="fence-agents-ilo-mp-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846291" comment="fence-agents-ilo-ssh-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846292" comment="fence-agents-ilo2-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846293" comment="fence-agents-intelmodular-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846294" comment="fence-agents-ipdu-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846295" comment="fence-agents-ipmilan-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846296" comment="fence-agents-kdump-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846297" comment="fence-agents-kubevirt-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846298" comment="fence-agents-mpath-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846299" comment="fence-agents-openstack-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846300" comment="fence-agents-redfish-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846301" comment="fence-agents-rhevm-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846302" comment="fence-agents-rsa-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846303" comment="fence-agents-rsb-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846304" comment="fence-agents-sbd-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846305" comment="fence-agents-scsi-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846306" comment="fence-agents-virsh-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846307" comment="fence-agents-vmware-rest-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846308" comment="fence-agents-vmware-soap-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846309" comment="fence-agents-wti-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846310" comment="fence-virt-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846311" comment="fence-virtd-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846312" comment="fence-virtd-cpg-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846313" comment="fence-virtd-libvirt-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846314" comment="fence-virtd-multicast-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846315" comment="fence-virtd-serial-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846316" comment="fence-virtd-tcp-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846317" comment="ha-cloud-support-4.10.0-55.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3812" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3812" ref_url="https://www.suse.com/security/cve/CVE-2023-3812" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the Linux kernel's TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3812/">CVE-2023-3812 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3812">CVE-2023-3812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213543">SUSE bug 1213543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1213706">SUSE bug 1213706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38133" ref_url="https://www.suse.com/security/cve/CVE-2023-38133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may disclose sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38133/">CVE-2023-38133 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38133">CVE-2023-38133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3817" ref_url="https://www.suse.com/security/cve/CVE-2023-3817" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2547-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3243-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3244-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3291-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3338-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3958-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016834.html" source="SUSE-SU"/>
    <description>
    Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. After fixing
CVE-2023-3446 it was discovered that a large q parameter value can also trigger
an overly long computation during some of these checks. A correct q value,
if present, cannot be larger than the modulus p parameter, thus it is
unnecessary to perform these checks if q is larger than p.

An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulnerable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the "-check" option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-3817/">CVE-2023-3817 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213853">SUSE bug 1213853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867976" comment="openssl-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867977" comment="openssl-devel-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867978" comment="openssl-fips-provider-3.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867979" comment="openssl-libs-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867980" comment="openssl-perl-3.0.7-27.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38180" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38180" ref_url="https://www.suse.com/security/cve/CVE-2023-38180" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38180/">CVE-2023-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38180">CVE-2023-38180 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806792" comment="aspnetcore-runtime-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806781" comment="aspnetcore-runtime-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806793" comment="aspnetcore-targeting-pack-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806782" comment="aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806794" comment="dotnet-apphost-pack-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806783" comment="dotnet-apphost-pack-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806784" comment="dotnet-host-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806795" comment="dotnet-hostfxr-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806785" comment="dotnet-hostfxr-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806796" comment="dotnet-runtime-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806786" comment="dotnet-runtime-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806797" comment="dotnet-sdk-6.0-6.0.121-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806798" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.121-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806787" comment="dotnet-sdk-7.0-7.0.110-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806788" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.110-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806799" comment="dotnet-targeting-pack-6.0-6.0.21-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806789" comment="dotnet-targeting-pack-7.0-7.0.10-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806800" comment="dotnet-templates-6.0-6.0.121-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806790" comment="dotnet-templates-7.0-7.0.110-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806791" comment="netstandard-targeting-pack-2.1-7.0.110-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38197" ref_url="https://www.suse.com/security/cve/CVE-2023-38197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-July/030624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041344.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3. There are infinite loops in recursive entity expansion.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-01"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38197/">CVE-2023-38197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38197">CVE-2023-38197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213326">SUSE bug 1213326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813867" comment="adwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813868" comment="libadwaita-qt5-1.4.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813869" comment="python-qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813870" comment="python3-pyqt5-sip-12.11.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813871" comment="python3-qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813872" comment="python3-qt5-base-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813873" comment="python3-qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813874" comment="qgnomeplatform-0.9.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813875" comment="qt5-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813876" comment="qt5-assistant-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813877" comment="qt5-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813878" comment="qt5-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813879" comment="qt5-doctools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813880" comment="qt5-linguist-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813881" comment="qt5-qdbusviewer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813882" comment="qt5-qt3d-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813883" comment="qt5-qt3d-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813884" comment="qt5-qt3d-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813885" comment="qt5-qt3d-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813886" comment="qt5-qtbase-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813887" comment="qt5-qtbase-common-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813888" comment="qt5-qtbase-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813889" comment="qt5-qtbase-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813890" comment="qt5-qtbase-examples-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813891" comment="qt5-qtbase-gui-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813892" comment="qt5-qtbase-mysql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813893" comment="qt5-qtbase-odbc-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813894" comment="qt5-qtbase-postgresql-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813895" comment="qt5-qtbase-private-devel-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813896" comment="qt5-qtbase-static-5.15.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813897" comment="qt5-qtconnectivity-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813898" comment="qt5-qtconnectivity-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813899" comment="qt5-qtconnectivity-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813900" comment="qt5-qtconnectivity-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813901" comment="qt5-qtdeclarative-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813902" comment="qt5-qtdeclarative-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813903" comment="qt5-qtdeclarative-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813904" comment="qt5-qtdeclarative-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813905" comment="qt5-qtdeclarative-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813906" comment="qt5-qtdoc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813907" comment="qt5-qtgraphicaleffects-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813908" comment="qt5-qtgraphicaleffects-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813909" comment="qt5-qtimageformats-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813910" comment="qt5-qtimageformats-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813911" comment="qt5-qtlocation-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813912" comment="qt5-qtlocation-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813913" comment="qt5-qtlocation-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813914" comment="qt5-qtlocation-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813915" comment="qt5-qtmultimedia-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813916" comment="qt5-qtmultimedia-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813917" comment="qt5-qtmultimedia-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813918" comment="qt5-qtmultimedia-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813919" comment="qt5-qtquickcontrols-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813920" comment="qt5-qtquickcontrols-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813921" comment="qt5-qtquickcontrols-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813922" comment="qt5-qtquickcontrols2-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813923" comment="qt5-qtquickcontrols2-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813924" comment="qt5-qtquickcontrols2-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813925" comment="qt5-qtquickcontrols2-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813926" comment="qt5-qtscript-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813927" comment="qt5-qtscript-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813928" comment="qt5-qtscript-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813929" comment="qt5-qtscript-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813930" comment="qt5-qtsensors-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813931" comment="qt5-qtsensors-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813932" comment="qt5-qtsensors-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813933" comment="qt5-qtsensors-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813934" comment="qt5-qtserialbus-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813935" comment="qt5-qtserialbus-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813936" comment="qt5-qtserialbus-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813937" comment="qt5-qtserialbus-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813938" comment="qt5-qtserialport-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813939" comment="qt5-qtserialport-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813940" comment="qt5-qtserialport-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813941" comment="qt5-qtserialport-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813942" comment="qt5-qtsvg-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813943" comment="qt5-qtsvg-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813944" comment="qt5-qtsvg-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813945" comment="qt5-qtsvg-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813946" comment="qt5-qttools-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813947" comment="qt5-qttools-common-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813948" comment="qt5-qttools-devel-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813949" comment="qt5-qttools-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813950" comment="qt5-qttools-examples-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813951" comment="qt5-qttools-libs-designer-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813952" comment="qt5-qttools-libs-designercomponents-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813953" comment="qt5-qttools-libs-help-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813954" comment="qt5-qttools-static-5.15.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813955" comment="qt5-qttranslations-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813956" comment="qt5-qtwayland-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813957" comment="qt5-qtwayland-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813958" comment="qt5-qtwayland-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813959" comment="qt5-qtwayland-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813960" comment="qt5-qtwebchannel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813961" comment="qt5-qtwebchannel-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813962" comment="qt5-qtwebchannel-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813963" comment="qt5-qtwebchannel-examples-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813964" comment="qt5-qtwebsockets-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813965" comment="qt5-qtwebsockets-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813966" comment="qt5-qtwebsockets-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813967" comment="qt5-qtwebsockets-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813968" comment="qt5-qtx11extras-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813969" comment="qt5-qtx11extras-devel-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813970" comment="qt5-qtx11extras-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813971" comment="qt5-qtxmlpatterns-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813972" comment="qt5-qtxmlpatterns-devel-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813973" comment="qt5-qtxmlpatterns-doc-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813974" comment="qt5-qtxmlpatterns-examples-5.15.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813975" comment="qt5-rpm-macros-5.15.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813976" comment="qt5-srpm-macros-5.15.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38200" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38200" ref_url="https://www.suse.com/security/cve/CVE-2023-38200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3245-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030844.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Keylime. Due to their blocking nature, the Keylime registrar is subject to a remote denial of service against its SSL connections. This flaw allows an attacker to exhaust all available connections.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38200/">CVE-2023-38200 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38200">CVE-2023-38200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213310">SUSE bug 1213310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806845" comment="keylime-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806846" comment="keylime-base-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806847" comment="keylime-registrar-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806848" comment="keylime-selinux-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806849" comment="keylime-tenant-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806850" comment="keylime-verifier-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806851" comment="python3-keylime-6.5.2-6.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38201" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38201" ref_url="https://www.suse.com/security/cve/CVE-2023-38201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016092.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Keylime registrar that could allow a bypass of the challenge-response protocol during agent registration. This issue may allow an attacker to impersonate an agent and hide the true status of a monitored machine if the fake agent is added to the verifier list by a legitimate user, resulting in a breach of the integrity of the registrar database.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-38201/">CVE-2023-38201 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38201">CVE-2023-38201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213314">SUSE bug 1213314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806845" comment="keylime-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806846" comment="keylime-base-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806847" comment="keylime-registrar-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806848" comment="keylime-selinux-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806849" comment="keylime-tenant-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806850" comment="keylime-verifier-6.5.2-6.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806851" comment="python3-keylime-6.5.2-6.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3823" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3823" ref_url="https://www.suse.com/security/cve/CVE-2023-3823" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016097.html" source="SUSE-SU"/>
    <description>
    In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unless the user explicitly changes it by calling appropriate function. However, since the state is process-global, other modules - such as  ImageMagick - may also use this library within the same process, and change that global state for their internal purposes, and leave it in a state where external entities loading is enabled. This can lead to the situation where external XML is parsed with external entities loaded, which can lead to disclosure of any local files accessible to PHP. This vulnerable state may persist in the same process across many requests, until the process is shut down.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3823/">CVE-2023-3823 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3823">CVE-2023-3823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214106">SUSE bug 1214106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844596" comment="php-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844597" comment="php-bcmath-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844598" comment="php-cli-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844599" comment="php-common-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844600" comment="php-dba-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844601" comment="php-dbg-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844602" comment="php-devel-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844603" comment="php-embedded-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844604" comment="php-enchant-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844605" comment="php-ffi-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844606" comment="php-fpm-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844607" comment="php-gd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844608" comment="php-gmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844609" comment="php-intl-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844610" comment="php-ldap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844611" comment="php-mbstring-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844612" comment="php-mysqlnd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844613" comment="php-odbc-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844614" comment="php-opcache-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844615" comment="php-pdo-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844616" comment="php-pgsql-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844617" comment="php-process-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844618" comment="php-snmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844619" comment="php-soap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844620" comment="php-xml-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3824" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3824" ref_url="https://www.suse.com/security/cve/CVE-2023-3824" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016097.html" source="SUSE-SU"/>
    <description>
    In PHP version 8.0.* before 8.0.30,   8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-3824/">CVE-2023-3824 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3824">CVE-2023-3824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214103">SUSE bug 1214103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805832" comment="apcu-panel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844596" comment="php-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844597" comment="php-bcmath-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844598" comment="php-cli-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844599" comment="php-common-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844600" comment="php-dba-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844601" comment="php-dbg-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844602" comment="php-devel-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844603" comment="php-embedded-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844604" comment="php-enchant-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844605" comment="php-ffi-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844606" comment="php-fpm-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844607" comment="php-gd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844608" comment="php-gmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844609" comment="php-intl-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844610" comment="php-ldap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844611" comment="php-mbstring-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844612" comment="php-mysqlnd-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844613" comment="php-odbc-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844614" comment="php-opcache-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844615" comment="php-pdo-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805853" comment="php-pecl-apcu-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805854" comment="php-pecl-apcu-devel-5.1.21-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805855" comment="php-pecl-rrd-2.0.3-4.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805856" comment="php-pecl-xdebug3-3.1.4-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805857" comment="php-pecl-zip-1.20.1-1.module+el9.1.0.z+15477+cb86791d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844616" comment="php-pgsql-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844617" comment="php-process-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844618" comment="php-snmp-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844619" comment="php-soap-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844620" comment="php-xml-8.1.27-1.module+el9.3.0.z+21063+f4ccb976 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38403" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38403" ref_url="https://www.suse.com/security/cve/CVE-2023-38403" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:2987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015669.html" source="SUSE-SU"/>
    <description>
    iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38403/">CVE-2023-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38403">CVE-2023-38403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213430">SUSE bug 1213430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806765" comment="iperf3-3.9-10.el9_2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38406</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38406" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38406" ref_url="https://www.suse.com/security/cve/CVE-2023-38406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    bgpd/bgp_flowspec.c in FRRouting (FRR) before 8.4.3 mishandles an nlri length of zero, aka a "flowspec overflow."
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38406/">CVE-2023-38406 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38406">CVE-2023-38406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216900">SUSE bug 1216900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872198" comment="frr-8.3.1-11.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872199" comment="frr-selinux-8.3.1-11.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38407</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38407" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38407" ref_url="https://www.suse.com/security/cve/CVE-2023-38407" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    bgpd/bgp_label.c in FRRouting (FRR) before 8.5 attempts to read beyond the end of the stream during labeled unicast parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38407/">CVE-2023-38407 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38407">CVE-2023-38407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216899">SUSE bug 1216899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872198" comment="frr-8.3.1-11.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872199" comment="frr-selinux-8.3.1-11.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38408" ref_url="https://www.suse.com/security/cve/CVE-2023-38408" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015603.html" source="SUSE-SU"/>
		<reference ref_id="TID000021143" ref_url="https://www.suse.com/support/kb/doc/?id=000021143" source="SUSE-SU"/>
    <description>
    The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38408/">CVE-2023-38408 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38408">CVE-2023-38408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213504">SUSE bug 1213504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217034">SUSE bug 1217034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217035">SUSE bug 1217035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218970">SUSE bug 1218970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225676">SUSE bug 1225676</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806751" comment="openssh-8.7p1-30.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806752" comment="openssh-clients-8.7p1-30.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806753" comment="openssh-keycat-8.7p1-30.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806754" comment="openssh-server-8.7p1-30.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38409" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38409" ref_url="https://www.suse.com/security/cve/CVE-2023-38409" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38409/">CVE-2023-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38409">CVE-2023-38409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213417">SUSE bug 1213417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38469" ref_url="https://www.suse.com/security/cve/CVE-2023-38469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021355.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38469/">CVE-2023-38469 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38469">CVE-2023-38469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216598">SUSE bug 1216598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866726" comment="avahi-glib-0.8-20.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866727" comment="avahi-tools-0.8-20.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38470" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38470" ref_url="https://www.suse.com/security/cve/CVE-2023-38470" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035174.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_escape_label() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38470/">CVE-2023-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38470">CVE-2023-38470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215947">SUSE bug 1215947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866726" comment="avahi-glib-0.8-20.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866727" comment="avahi-tools-0.8-20.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38471</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38471" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38471" ref_url="https://www.suse.com/security/cve/CVE-2023-38471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1014-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021355.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the dbus_set_host_name function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38471/">CVE-2023-38471 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38471">CVE-2023-38471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216594">SUSE bug 1216594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866726" comment="avahi-glib-0.8-20.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866727" comment="avahi-tools-0.8-20.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38472" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38472" ref_url="https://www.suse.com/security/cve/CVE-2023-38472" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035208.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_rdata_parse() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38472/">CVE-2023-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38472">CVE-2023-38472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216853">SUSE bug 1216853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866726" comment="avahi-glib-0.8-20.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866727" comment="avahi-tools-0.8-20.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38473" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38473" ref_url="https://www.suse.com/security/cve/CVE-2023-38473" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017450.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Avahi. A reachable assertion exists in the avahi_alternative_host_name() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-11-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38473/">CVE-2023-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38473">CVE-2023-38473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216419">SUSE bug 1216419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866726" comment="avahi-glib-0.8-20.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866727" comment="avahi-tools-0.8-20.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38497</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38497" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38497" ref_url="https://www.suse.com/security/cve/CVE-2023-38497" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015829.html" source="SUSE-SU"/>
    <description>
    Cargo downloads the Rust project's dependencies and compiles the project. Cargo prior to version 0.72.2, bundled with Rust prior to version 1.71.1, did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user. To prevent existing cached extractions from being exploitable, the Cargo binary version 0.72.2 included in Rust 1.71.1 or later will purge caches generated by older Cargo versions automatically. As a workaround, configure one's system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38497/">CVE-2023-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38497">CVE-2023-38497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213817">SUSE bug 1213817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806766" comment="cargo-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806767" comment="clippy-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806768" comment="rust-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806769" comment="rust-analysis-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806770" comment="rust-analyzer-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806771" comment="rust-debugger-common-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806772" comment="rust-doc-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806773" comment="rust-gdb-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806774" comment="rust-lldb-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806775" comment="rust-src-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806776" comment="rust-std-static-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806777" comment="rust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806778" comment="rust-std-static-wasm32-wasi-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806779" comment="rust-toolset-1.66.1-2.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806780" comment="rustfmt-1.66.1-2.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38545</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38545" ref_url="https://www.suse.com/security/cve/CVE-2023-38545" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032069.html" source="SUSE-SU"/>
    <description>
    This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.

When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.

If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.

The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38545/">CVE-2023-38545 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38545">CVE-2023-38545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215888">SUSE bug 1215888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811237" comment="curl-7.76.1-26.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811238" comment="curl-minimal-7.76.1-26.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811239" comment="libcurl-7.76.1-26.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811240" comment="libcurl-devel-7.76.1-26.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811241" comment="libcurl-minimal-7.76.1-26.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38546" ref_url="https://www.suse.com/security/cve/CVE-2023-38546" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4045-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017403.html" source="SUSE-SU"/>
    <description>
    This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.

libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.

libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).

If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle did not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).

Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-38546/">CVE-2023-38546 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38546">CVE-2023-38546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215889">SUSE bug 1215889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811237" comment="curl-7.76.1-26.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811238" comment="curl-minimal-7.76.1-26.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811239" comment="libcurl-7.76.1-26.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811240" comment="libcurl-devel-7.76.1-26.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811241" comment="libcurl-minimal-7.76.1-26.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38552" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38552" ref_url="https://www.suse.com/security/cve/CVE-2023-38552" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016996.html" source="SUSE-SU"/>
    <description>
    When the Node.js policy feature checks the integrity of a resource against a trusted manifest, the application can intercept the operation and return a forged checksum to the node's policy implementation, thus effectively disabling the integrity check.
Impacts:
This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and, 20.x.
Please note that at the time this CVE was issued, the policy mechanism is an experimental feature of Node.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38552/">CVE-2023-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38552">CVE-2023-38552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216272">SUSE bug 1216272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807284" comment="nodejs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807285" comment="nodejs-devel-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807286" comment="nodejs-docs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807287" comment="nodejs-full-i18n-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807288" comment="npm-9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38559" ref_url="https://www.suse.com/security/cve/CVE-2023-38559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016027.html" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in base/gdevdevn.c:1973 in devn_pcx_write_rle() in ghostscript. This issue may allow a local attacker to cause a denial of service via outputting a crafted PDF file for a DEVN device with gs.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-38559/">CVE-2023-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38559">CVE-2023-38559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213637">SUSE bug 1213637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811109" comment="ghostscript-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811110" comment="ghostscript-doc-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811111" comment="ghostscript-tools-dvipdf-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811112" comment="ghostscript-tools-fonts-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811113" comment="ghostscript-tools-printing-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811114" comment="ghostscript-x11-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811115" comment="libgs-9.54.0-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811116" comment="libgs-devel-9.54.0-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38572</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38572" ref_url="https://www.suse.com/security/cve/CVE-2023-38572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. A website may be able to bypass Same Origin Policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38572/">CVE-2023-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38572">CVE-2023-38572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38575" ref_url="https://www.suse.com/security/cve/CVE-2023-38575" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021372.html" source="SUSE-SU"/>
    <description>
    Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38575/">CVE-2023-38575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38575">CVE-2023-38575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954004" comment="microcode_ctl-20240910-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38592</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38592" ref_url="https://www.suse.com/security/cve/CVE-2023-38592" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38592/">CVE-2023-38592 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38592">CVE-2023-38592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38594" ref_url="https://www.suse.com/security/cve/CVE-2023-38594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38594/">CVE-2023-38594 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38594">CVE-2023-38594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215457">SUSE bug 1215457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215589">SUSE bug 1215589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38595" ref_url="https://www.suse.com/security/cve/CVE-2023-38595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38595/">CVE-2023-38595 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38595">CVE-2023-38595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38597" ref_url="https://www.suse.com/security/cve/CVE-2023-38597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5, Safari 16.6. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-38597/">CVE-2023-38597 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38597">CVE-2023-38597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215457">SUSE bug 1215457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215589">SUSE bug 1215589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38599" ref_url="https://www.suse.com/security/cve/CVE-2023-38599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A website may be able to track sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38599/">CVE-2023-38599 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38599">CVE-2023-38599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38600" ref_url="https://www.suse.com/security/cve/CVE-2023-38600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38600/">CVE-2023-38600 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38600">CVE-2023-38600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38611" ref_url="https://www.suse.com/security/cve/CVE-2023-38611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Ventura 13.5, Safari 16.6, watchOS 9.6. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38611/">CVE-2023-38611 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38611">CVE-2023-38611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213905">SUSE bug 1213905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214251">SUSE bug 1214251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214253">SUSE bug 1214253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38633" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38633" ref_url="https://www.suse.com/security/cve/CVE-2023-38633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-July/015690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030820.html" source="SUSE-SU"/>
    <description>
    A directory traversal problem in the URL decoder of librsvg before 2.56.3 could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=".?../../../../../../../../../../etc/passwd" in an xi:include element.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-38633/">CVE-2023-38633 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38633">CVE-2023-38633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213502">SUSE bug 1213502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806852" comment="librsvg2-2.50.7-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806853" comment="librsvg2-devel-2.50.7-1.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806854" comment="librsvg2-tools-2.50.7-1.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38709" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38709" ref_url="https://www.suse.com/security/cve/CVE-2023-38709" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018665.html" source="SUSE-SU"/>
    <description>
    Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.

This issue affects Apache HTTP Server: through 2.4.58.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-38709/">CVE-2023-38709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-38709">CVE-2023-38709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222330">SUSE bug 1222330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953701" comment="httpd-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953702" comment="httpd-core-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953703" comment="httpd-devel-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953704" comment="httpd-filesystem-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953705" comment="httpd-manual-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953706" comment="httpd-tools-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953707" comment="mod_ldap-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953708" comment="mod_lua-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953709" comment="mod_proxy_html-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953710" comment="mod_session-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953711" comment="mod_ssl-2.4.62-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38710" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38710" ref_url="https://www.suse.com/security/cve/CVE-2023-38710" source="SUSE CVE"/>
    <description>
    An issue was discovered in Libreswan before 4.12. When an IKEv2 Child SA REKEY packet contains an invalid IPsec protocol ID number of 0 or 1, an error notify INVALID_SPI is sent back. The notify payload's protocol ID is copied from the incoming packet, but the code that verifies outgoing packets fails an assertion that the protocol ID must be ESP (2) or AH(3) and causes the pluto daemon to crash and restart. NOTE: the earliest affected version is 3.20.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38710/">CVE-2023-38710 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38710">CVE-2023-38710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811117" comment="libreswan-4.12-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38711" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38711" ref_url="https://www.suse.com/security/cve/CVE-2023-38711" source="SUSE CVE"/>
    <description>
    An issue was discovered in Libreswan before 4.12. When an IKEv1 Quick Mode connection configured with ID_IPV4_ADDR or ID_IPV6_ADDR receives an IDcr payload with ID_FQDN, a NULL pointer dereference causes a crash and restart of the pluto daemon. NOTE: the earliest affected version is 4.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38711/">CVE-2023-38711 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38711">CVE-2023-38711 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811117" comment="libreswan-4.12-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38712" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38712" ref_url="https://www.suse.com/security/cve/CVE-2023-38712" source="SUSE CVE"/>
    <description>
    An issue was discovered in Libreswan 3.x and 4.x before 4.12. When an IKEv1 ISAKMP SA Informational Exchange packet contains a Delete/Notify payload followed by further Notifies that act on the ISAKMP SA, such as a duplicated Delete/Notify message, a NULL pointer dereference on the deleted state causes the pluto daemon to crash and restart.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-38712/">CVE-2023-38712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38712">CVE-2023-38712 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811117" comment="libreswan-4.12-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202338802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-38802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-38802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38802" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-38802" ref_url="https://www.suse.com/security/cve/CVE-2023-38802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-38802/">CVE-2023-38802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-38802">CVE-2023-38802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213284">SUSE bug 1213284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806893" comment="frr-8.3.1-5.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806894" comment="frr-selinux-8.3.1-5.el9_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39189" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39189" ref_url="https://www.suse.com/security/cve/CVE-2023-39189" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The nfnl_osf_add_callback function did not validate the user mode controlled opt_num field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39189/">CVE-2023-39189 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39189">CVE-2023-39189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216046">SUSE bug 1216046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39191" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39191" ref_url="https://www.suse.com/security/cve/CVE-2023-39191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
    <description>
    An improper input validation flaw was found in the eBPF subsystem in the Linux kernel. The issue occurs due to a lack of proper validation of dynamic pointers within user-supplied eBPF programs prior to executing them. This may allow an attacker with CAP_BPF privileges to escalate privileges and execute arbitrary code in the context of the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39191/">CVE-2023-39191 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39191">CVE-2023-39191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215863">SUSE bug 1215863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215887">SUSE bug 1215887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39193" ref_url="https://www.suse.com/security/cve/CVE-2023-39193" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Netfilter subsystem in the Linux kernel. The sctp_mt_check did not validate the flag_count field. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, leading to a crash or information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39193/">CVE-2023-39193 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39193">CVE-2023-39193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215860">SUSE bug 1215860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39194" ref_url="https://www.suse.com/security/cve/CVE-2023-39194" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the XFRM subsystem in the Linux kernel. The specific flaw exists within the processing of state filters, which can result in a read past the end of an allocated buffer. This flaw allows a local privileged (CAP_NET_ADMIN) attacker to trigger an out-of-bounds read, potentially leading to an information disclosure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-39194/">CVE-2023-39194 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39194">CVE-2023-39194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215861">SUSE bug 1215861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39198" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39198" ref_url="https://www.suse.com/security/cve/CVE-2023-39198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
    <description>
    A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39198/">CVE-2023-39198 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39198">CVE-2023-39198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216965">SUSE bug 1216965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217116">SUSE bug 1217116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219703">SUSE bug 1219703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39318" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39318" ref_url="https://www.suse.com/security/cve/CVE-2023-39318" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
    <description>
    The html/template package does not properly handle HTML-like "" comment tokens, nor hashbang "#!" comment tokens, in &lt;script&gt; contexts. This may cause the template parser to improperly interpret the contents of &lt;script&gt; contexts, causing actions to be improperly escaped. This may be leveraged to perform an XSS attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39318/">CVE-2023-39318 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39318">CVE-2023-39318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215084">SUSE bug 1215084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816428" comment="buildah-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816429" comment="buildah-tests-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816436" comment="containernetworking-plugins-1.3.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053642" comment="delve-1.20.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053643" comment="go-toolset-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053644" comment="golang-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053645" comment="golang-bin-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053646" comment="golang-docs-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053647" comment="golang-misc-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053648" comment="golang-src-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053649" comment="golang-tests-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816430" comment="podman-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816431" comment="podman-docker-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816432" comment="podman-gvproxy-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816433" comment="podman-plugins-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816434" comment="podman-remote-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816435" comment="podman-tests-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816425" comment="skopeo-1.13.3-3.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816426" comment="skopeo-tests-1.13.3-3.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39319" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39319" ref_url="https://www.suse.com/security/cve/CVE-2023-39319" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
    <description>
    The html/template package does not apply the proper rules for handling occurrences of "&lt;script", "&lt;!--", and "&lt;/script" within JS literals in &lt;script&gt; contexts. This may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped. This could be leveraged to perform an XSS attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39319/">CVE-2023-39319 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39319">CVE-2023-39319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215085">SUSE bug 1215085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816428" comment="buildah-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816429" comment="buildah-tests-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816436" comment="containernetworking-plugins-1.3.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053642" comment="delve-1.20.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053643" comment="go-toolset-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053644" comment="golang-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053645" comment="golang-bin-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053646" comment="golang-docs-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053647" comment="golang-misc-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053648" comment="golang-src-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053649" comment="golang-tests-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816430" comment="podman-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816431" comment="podman-docker-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816432" comment="podman-gvproxy-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816433" comment="podman-plugins-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816434" comment="podman-remote-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816435" comment="podman-tests-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816425" comment="skopeo-1.13.3-3.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816426" comment="skopeo-tests-1.13.3-3.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39321" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39321" ref_url="https://www.suse.com/security/cve/CVE-2023-39321" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7256" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
    <description>
    Processing an incomplete post-handshake message for a QUIC connection can cause a panic.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39321/">CVE-2023-39321 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39321">CVE-2023-39321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215087">SUSE bug 1215087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816428" comment="buildah-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816429" comment="buildah-tests-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816436" comment="containernetworking-plugins-1.3.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053642" comment="delve-1.20.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983915" comment="git-lfs-3.6.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053643" comment="go-toolset-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053644" comment="golang-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053645" comment="golang-bin-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053646" comment="golang-docs-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053647" comment="golang-misc-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053648" comment="golang-src-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053649" comment="golang-tests-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816430" comment="podman-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816431" comment="podman-docker-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816432" comment="podman-gvproxy-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816433" comment="podman-plugins-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816434" comment="podman-remote-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816435" comment="podman-tests-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816427" comment="runc-1.1.9-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816425" comment="skopeo-1.13.3-3.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816426" comment="skopeo-tests-1.13.3-3.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39322" ref_url="https://www.suse.com/security/cve/CVE-2023-39322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7256" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
    <description>
    QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With fix, connections now consistently reject messages larger than 65KiB in size.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39322/">CVE-2023-39322 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39322">CVE-2023-39322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215087">SUSE bug 1215087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816428" comment="buildah-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816429" comment="buildah-tests-1.31.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816436" comment="containernetworking-plugins-1.3.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053642" comment="delve-1.20.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983915" comment="git-lfs-3.6.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053643" comment="go-toolset-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053644" comment="golang-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053645" comment="golang-bin-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053646" comment="golang-docs-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053647" comment="golang-misc-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053648" comment="golang-src-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053649" comment="golang-tests-1.20.10-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816430" comment="podman-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816431" comment="podman-docker-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816432" comment="podman-gvproxy-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816433" comment="podman-plugins-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816434" comment="podman-remote-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816435" comment="podman-tests-4.6.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816427" comment="runc-1.1.9-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816425" comment="skopeo-1.13.3-3.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816426" comment="skopeo-tests-1.13.3-3.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39325</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39325" ref_url="https://www.suse.com/security/cve/CVE-2023-39325" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
    <description>
    A malicious HTTP/2 client which rapidly creates requests and immediately resets them can cause excessive server resource consumption. While the total number of requests is bounded by the http2.Server.MaxConcurrentStreams setting, resetting an in-progress request allows the attacker to create a new request while the existing one is still executing. With the fix applied, HTTP/2 servers now bound the number of simultaneously executing handler goroutines to the stream concurrency limit (MaxConcurrentStreams). New requests arriving when at the limit (which can only happen after the client has reset an existing, in-flight request) will be queued until a handler exits. If the request queue grows too large, the server will terminate the connection. This issue is also fixed in golang.org/x/net/http2 for users manually configuring HTTP/2. The default stream concurrency limit is 250 streams (requests) per HTTP/2 connection. This value may be adjusted using the golang.org/x/net/http2 package; see the Server.MaxConcurrentStreams setting and the ConfigureServer function.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39325/">CVE-2023-39325 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39325">CVE-2023-39325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230323">SUSE bug 1230323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807206" comment="go-toolset-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807207" comment="golang-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807208" comment="golang-bin-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807209" comment="golang-docs-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807210" comment="golang-misc-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807211" comment="golang-race-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807212" comment="golang-src-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807213" comment="golang-tests-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807289" comment="grafana-9.0.9-4.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39326</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39326" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39326" ref_url="https://www.suse.com/security/cve/CVE-2023-39326" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017503.html" source="SUSE-SU"/>
    <description>
    A malicious HTTP sender can use chunk extensions to cause a receiver reading from a request or response body to read many more bytes from the network than are in the body. A malicious HTTP client can further exploit this to cause a server to automatically read a large amount of data (up to about 1GiB) when a handler fails to read the entire body of a request. Chunk extensions are a little-used HTTP feature which permit including additional metadata in a request or response body sent using the chunked encoding. The net/http chunked encoding reader discards this metadata. A sender can exploit this by inserting a large metadata segment with each byte transferred. The chunk reader now produces an error if the ratio of real body to encoded bytes grows too small.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39326/">CVE-2023-39326 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39326">CVE-2023-39326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217833">SUSE bug 1217833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866624" comment="buildah-1.33.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866625" comment="buildah-tests-1.33.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866629" comment="containernetworking-plugins-1.4.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849886" comment="go-toolset-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849887" comment="golang-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849888" comment="golang-bin-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849889" comment="golang-docs-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849890" comment="golang-misc-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849891" comment="golang-src-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849892" comment="golang-tests-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867213" comment="podman-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867214" comment="podman-docker-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867215" comment="podman-plugins-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867216" comment="podman-remote-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867217" comment="podman-tests-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850291" comment="skopeo-1.13.3-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850292" comment="skopeo-tests-1.13.3-4.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39333</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39333" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39333" ref_url="https://www.suse.com/security/cve/CVE-2023-39333" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032392.html" source="SUSE-SU"/>
    <description>
    Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.

This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-39333/">CVE-2023-39333 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39333">CVE-2023-39333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216273">SUSE bug 1216273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807284" comment="nodejs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807285" comment="nodejs-devel-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807286" comment="nodejs-docs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807287" comment="nodejs-full-i18n-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807288" comment="npm-9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39350</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39350" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39350" ref_url="https://www.suse.com/security/cve/CVE-2023-39350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. This issue affects Clients only. Integer underflow leading to DOS (e.g. abort due to `WINPR_ASSERT` with default compilation flags). When an insufficient blockLen is provided, and proper length validation is not performed, an Integer Underflow occurs, leading to a Denial of Service (DOS) vulnerability. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39350/">CVE-2023-39350 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39350">CVE-2023-39350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214856">SUSE bug 1214856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39351</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39351" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39351" ref_url="https://www.suse.com/security/cve/CVE-2023-39351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions of FreeRDP are subject to a Null Pointer Dereference leading a crash in the RemoteFX (rfx) handling.  Inside the `rfx_process_message_tileset` function, the program allocates tiles using `rfx_allocate_tiles` for the number of numTiles. If the initialization process of tiles is not completed for various reasons, tiles will have a NULL pointer. Which may be accessed in further processing and would cause a program crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39351/">CVE-2023-39351 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39351">CVE-2023-39351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214857">SUSE bug 1214857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39352</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39352" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39352" ref_url="https://www.suse.com/security/cve/CVE-2023-39352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an invalid offset validation leading to Out Of Bound Write. This can be triggered when the values `rect-&gt;left` and `rect-&gt;top` are exactly equal to `surface-&gt;width` and  `surface-&gt;height`. eg. `rect-&gt;left` == `surface-&gt;width` &amp;&amp; `rect-&gt;top` == `surface-&gt;height`. In practice this should cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39352/">CVE-2023-39352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39352">CVE-2023-39352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214858">SUSE bug 1214858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39353</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39353" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39353" ref_url="https://www.suse.com/security/cve/CVE-2023-39353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the `libfreerdp/codec/rfx.c` file there is no offset validation in `tile-&gt;quantIdxY`, `tile-&gt;quantIdxCb`, and `tile-&gt;quantIdxCr`. As a result crafted input can lead to an out of bounds read access which in turn will cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39353/">CVE-2023-39353 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39353">CVE-2023-39353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214859">SUSE bug 1214859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39354</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39354" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39354" ref_url="https://www.suse.com/security/cve/CVE-2023-39354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `nsc_rle_decompress_data` function. The Out-Of-Bounds Read occurs because it processes `context-&gt;Planes` without  checking if it contains data of sufficient length. Should an attacker be able to leverage this vulnerability they may be able to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39354/">CVE-2023-39354 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39354">CVE-2023-39354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214860">SUSE bug 1214860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39356" ref_url="https://www.suse.com/security/cve/CVE-2023-39356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions a missing offset validation may lead to an Out Of Bound Read in the function `gdi_multi_opaque_rect`. In particular there is no code to validate if the value `multi_opaque_rect-&gt;numRectangles` is less than 45. Looping through `multi_opaque_rect-&gt;`numRectangles without proper boundary checks can lead to Out-of-Bounds Read errors which will likely lead to a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-39356/">CVE-2023-39356 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39356">CVE-2023-39356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214862">SUSE bug 1214862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39368</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39368" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39368" ref_url="https://www.suse.com/security/cve/CVE-2023-39368" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021372.html" source="SUSE-SU"/>
    <description>
    Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39368/">CVE-2023-39368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39368">CVE-2023-39368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954004" comment="microcode_ctl-20240910-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39417</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39417" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39417" ref_url="https://www.suse.com/security/cve/CVE-2023-39417" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3344-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015996.html" source="SUSE-SU"/>
    <description>
    IN THE EXTENSION SCRIPT, a SQL Injection vulnerability was found in PostgreSQL if it uses @extowner@, @extschema@, or @extschema:...@ inside a quoting construct (dollar quoting, '', or ""). If an administrator has installed files of a vulnerable, trusted, non-bundled extension, an attacker with database-level CREATE privilege can execute arbitrary code as the bootstrap superuser.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39417/">CVE-2023-39417 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39417">CVE-2023-39417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214059">SUSE bug 1214059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816725" comment="postgresql-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816726" comment="postgresql-contrib-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816727" comment="postgresql-docs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816728" comment="postgresql-plperl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816729" comment="postgresql-plpython3-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816730" comment="postgresql-pltcl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816731" comment="postgresql-private-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816732" comment="postgresql-private-libs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816733" comment="postgresql-server-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816734" comment="postgresql-server-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816735" comment="postgresql-static-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816736" comment="postgresql-test-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816737" comment="postgresql-test-rpm-macros-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816738" comment="postgresql-upgrade-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816739" comment="postgresql-upgrade-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39418" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39418" ref_url="https://www.suse.com/security/cve/CVE-2023-39418" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2719-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031066.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT. If UPDATE and SELECT policies forbid some rows that INSERT policies do not forbid, a user could store such rows.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-39418/">CVE-2023-39418 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39418">CVE-2023-39418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214061">SUSE bug 1214061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816725" comment="postgresql-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816726" comment="postgresql-contrib-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816727" comment="postgresql-docs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816728" comment="postgresql-plperl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816729" comment="postgresql-plpython3-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816730" comment="postgresql-pltcl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816731" comment="postgresql-private-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816732" comment="postgresql-private-libs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816733" comment="postgresql-server-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816734" comment="postgresql-server-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816735" comment="postgresql-static-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816736" comment="postgresql-test-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816737" comment="postgresql-test-rpm-macros-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816738" comment="postgresql-upgrade-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816739" comment="postgresql-upgrade-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3961" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3961" ref_url="https://www.suse.com/security/cve/CVE-2023-3961" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
    <description>
    A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-3961/">CVE-2023-3961 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3961">CVE-2023-3961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215907">SUSE bug 1215907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811203" comment="ctdb-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811204" comment="libnetapi-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811205" comment="libnetapi-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811206" comment="libsmbclient-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811207" comment="libsmbclient-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811208" comment="libwbclient-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811209" comment="libwbclient-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811210" comment="python3-samba-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811211" comment="python3-samba-dc-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811212" comment="python3-samba-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811213" comment="python3-samba-test-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811214" comment="samba-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811215" comment="samba-client-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811216" comment="samba-client-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811217" comment="samba-common-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811218" comment="samba-common-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811219" comment="samba-common-tools-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811220" comment="samba-dc-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811221" comment="samba-dcerpc-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811222" comment="samba-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811223" comment="samba-krb5-printing-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811224" comment="samba-ldb-ldap-modules-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811225" comment="samba-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811226" comment="samba-pidl-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811227" comment="samba-test-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811228" comment="samba-test-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811229" comment="samba-tools-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811230" comment="samba-usershares-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811231" comment="samba-vfs-iouring-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811232" comment="samba-winbind-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811233" comment="samba-winbind-clients-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811234" comment="samba-winbind-krb5-locator-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811235" comment="samba-winbind-modules-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811236" comment="samba-winexe-4.18.6-101.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39615" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39615" ref_url="https://www.suse.com/security/cve/CVE-2023-39615" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3666-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031569.html" source="SUSE-SU"/>
    <description>
    Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39615/">CVE-2023-39615 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39615">CVE-2023-39615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214768">SUSE bug 1214768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816708" comment="libxml2-2.9.13-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816709" comment="libxml2-devel-2.9.13-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816710" comment="python3-libxml2-2.9.13-5.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20233978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-3978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-3978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3978" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-3978" ref_url="https://www.suse.com/security/cve/CVE-2023-3978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019832.html" source="SUSE-SU"/>
    <description>
    Text nodes not in the HTML namespace are incorrectly literally rendered, causing text which should be escaped to not be. This could lead to an XSS attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-3978/">CVE-2023-3978 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-3978">CVE-2023-3978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213933">SUSE bug 1213933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810793" comment="podman-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810794" comment="podman-docker-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810795" comment="podman-gvproxy-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810796" comment="podman-plugins-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810797" comment="podman-remote-4.6.1-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810798" comment="podman-tests-4.6.1-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39928" ref_url="https://www.suse.com/security/cve/CVE-2023-39928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017581.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39928/">CVE-2023-39928 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928">CVE-2023-39928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215868">SUSE bug 1215868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217568">SUSE bug 1217568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39975" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39975" ref_url="https://www.suse.com/security/cve/CVE-2023-39975" source="SUSE CVE"/>
    <description>
    kdc/do_tgs_req.c in MIT Kerberos 5 (aka krb5) 1.21 before 1.21.2 has a double free that is reachable if an authenticated user can trigger an authorization-data handling failure. Incorrect data is copied from one ticket to another.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-39975/">CVE-2023-39975 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39975">CVE-2023-39975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218211">SUSE bug 1218211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009810826" comment="krb5-devel-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810827" comment="krb5-libs-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810828" comment="krb5-pkinit-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810829" comment="krb5-server-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810830" comment="krb5-server-ldap-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810831" comment="krb5-workstation-1.21.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009810832" comment="libkadm5-1.21.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39976" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39976" ref_url="https://www.suse.com/security/cve/CVE-2023-39976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031896.html" source="SUSE-SU"/>
    <description>
    log_blackbox.c in libqb before 2.0.8 allows a buffer overflow via long log messages because the header size is not considered.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-39976/">CVE-2023-39976 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-39976">CVE-2023-39976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214066">SUSE bug 1214066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811132" comment="libqb-2.0.6-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811133" comment="libqb-devel-2.0.6-4.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4001</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4001" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4001" ref_url="https://www.suse.com/security/cve/CVE-2023-4001" source="SUSE CVE"/>
    <description>
    An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4001/">CVE-2023-4001 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4001">CVE-2023-4001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218714">SUSE bug 1218714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845912" comment="grub2-common-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845913" comment="grub2-efi-x64-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845914" comment="grub2-efi-x64-cdboot-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845915" comment="grub2-efi-x64-modules-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845916" comment="grub2-pc-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845917" comment="grub2-pc-modules-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845918" comment="grub2-tools-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845919" comment="grub2-tools-efi-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845920" comment="grub2-tools-extra-2.06-70.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845921" comment="grub2-tools-minimal-2.06-70.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4004" ref_url="https://www.suse.com/security/cve/CVE-2023-4004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4004/">CVE-2023-4004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4004">CVE-2023-4004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213812">SUSE bug 1213812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214812">SUSE bug 1214812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4015" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4015" ref_url="https://www.suse.com/security/cve/CVE-2023-4015" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

On an error when building a nftables rule, deactivating immediate expressions in nft_immediate_deactivate() can lead unbinding the chain and objects be deactivated but later used.

We recommend upgrading past commit 0a771f7b266b02d262900c75f1e175c7fe76fec2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4015/">CVE-2023-4015 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4015">CVE-2023-4015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215104">SUSE bug 1215104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215106">SUSE bug 1215106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4016" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4016" ref_url="https://www.suse.com/security/cve/CVE-2023-4016" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/031239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021163.html" source="SUSE-SU"/>
    <description>
    Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4016/">CVE-2023-4016 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4016">CVE-2023-4016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214290">SUSE bug 1214290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811182" comment="procps-ng-3.3.17-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811183" comment="procps-ng-devel-3.3.17-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811184" comment="procps-ng-i18n-3.3.17-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40181" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40181" ref_url="https://www.suse.com/security/cve/CVE-2023-40181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Integer-Underflow leading to Out-Of-Bound Read in the `zgfx_decompress_segment` function. In the context of `CopyMemory`, it's possible to read data beyond the transmitted packet range and likely cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40181/">CVE-2023-40181 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40181">CVE-2023-40181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214863">SUSE bug 1214863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40186</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40186" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40186" ref_url="https://www.suse.com/security/cve/CVE-2023-40186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an IntegerOverflow leading to Out-Of-Bound Write Vulnerability in the `gdi_CreateSurface` function. This issue affects FreeRDP based clients only. FreeRDP proxies are not affected as image decoding is not done by a proxy. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40186/">CVE-2023-40186 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40186">CVE-2023-40186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214864">SUSE bug 1214864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40188" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40188" ref_url="https://www.suse.com/security/cve/CVE-2023-40188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_LumaToYUV444` function. This Out-Of-Bounds Read occurs because processing is done on the `in` variable without checking if it contains data of sufficient length. Insufficient data for the `in` variable may cause errors or crashes. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40188/">CVE-2023-40188 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40188">CVE-2023-40188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214866">SUSE bug 1214866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40217" ref_url="https://www.suse.com/security/cve/CVE-2023-40217" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3828-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018102.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40217/">CVE-2023-40217 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40217">CVE-2023-40217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214692">SUSE bug 1214692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217524">SUSE bug 1217524</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218319">SUSE bug 1218319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218476">SUSE bug 1218476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218965">SUSE bug 1218965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219713">SUSE bug 1219713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221582">SUSE bug 1221582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224883">SUSE bug 1224883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807145" comment="python-unversioned-command-3.9.16-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807146" comment="python3-3.9.16-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807147" comment="python3-debug-3.9.16-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807148" comment="python3-devel-3.9.16-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807149" comment="python3-idle-3.9.16-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807150" comment="python3-libs-3.9.16-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807151" comment="python3-test-3.9.16-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807152" comment="python3-tkinter-3.9.16-1.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807130" comment="python3.11-3.11.2-2.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807131" comment="python3.11-debug-3.11.2-2.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807132" comment="python3.11-devel-3.11.2-2.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807133" comment="python3.11-idle-3.11.2-2.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807134" comment="python3.11-libs-3.11.2-2.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807135" comment="python3.11-test-3.11.2-2.el9_2.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807136" comment="python3.11-tkinter-3.11.2-2.el9_2.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40225</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40225" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40225" ref_url="https://www.suse.com/security/cve/CVE-2023-40225" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/016047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017412.html" source="SUSE-SU"/>
    <description>
    HAProxy through 2.0.32, 2.1.x and 2.2.x through 2.2.30, 2.3.x and 2.4.x through 2.4.23, 2.5.x and 2.6.x before 2.6.15, 2.7.x before 2.7.10, and 2.8.x before 2.8.2 forwards empty Content-Length headers, violating RFC 9110 section 8.6. In uncommon cases, an HTTP/1 server behind HAProxy may interpret the payload as an extra request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-09"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-40225/">CVE-2023-40225 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40225">CVE-2023-40225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214102">SUSE bug 1214102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850289" comment="haproxy-2.4.22-3.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40283" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40283" ref_url="https://www.suse.com/security/cve/CVE-2023-40283" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in l2cap_sock_release in net/bluetooth/l2cap_sock.c in the Linux kernel before 6.4.10. There is a use-after-free because the children of an sk are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40283/">CVE-2023-40283 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40283">CVE-2023-40283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214233">SUSE bug 1214233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40397" ref_url="https://www.suse.com/security/cve/CVE-2023-40397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016317.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.5. A remote attacker may be able to cause arbitrary javascript code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40397/">CVE-2023-40397 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40397">CVE-2023-40397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215230">SUSE bug 1215230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215457">SUSE bug 1215457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215589">SUSE bug 1215589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40403" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40403" ref_url="https://www.suse.com/security/cve/CVE-2023-40403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001656.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6266" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003282.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6499" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021045.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may disclose sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-40403/">CVE-2023-40403 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40403">CVE-2023-40403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238591">SUSE bug 1238591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055874" comment="libxslt-1.1.34-14.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055875" comment="libxslt-devel-1.1.34-14.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40414" ref_url="https://www.suse.com/security/cve/CVE-2023-40414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017970.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 10, iOS 17 and iPadOS 17, tvOS 17, macOS Sonoma 14, Safari 17. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40414/">CVE-2023-40414 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40414">CVE-2023-40414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219604">SUSE bug 1219604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4045" ref_url="https://www.suse.com/security/cve/CVE-2023-4045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Offscreen Canvas did not properly track cross-origin tainting, which could have been used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4045/">CVE-2023-4045 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4045">CVE-2023-4045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40451</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40451" ref_url="https://www.suse.com/security/cve/CVE-2023-40451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017581.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 17. An attacker with JavaScript execution may be able to execute arbitrary code.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40451/">CVE-2023-40451 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40451">CVE-2023-40451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215869">SUSE bug 1215869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217568">SUSE bug 1217568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4046" ref_url="https://www.suse.com/security/cve/CVE-2023-4046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In some circumstances, a stale value could have been used for a global variable in WASM JIT analysis. This resulted in incorrect compilation and a potentially exploitable crash in the content process. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4046/">CVE-2023-4046 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4046">CVE-2023-4046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4047" ref_url="https://www.suse.com/security/cve/CVE-2023-4047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4047/">CVE-2023-4047 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4047">CVE-2023-4047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40474</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40474" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40474" ref_url="https://www.suse.com/security/cve/CVE-2023-40474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4350-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4982-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017841.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYQ73JMQYKYFAPDQHXO3OANFFF6OOUL6/" source="SUSE-SU"/>
    <description>
    GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of MXF video files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-21660.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40474/">CVE-2023-40474 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40474">CVE-2023-40474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215796">SUSE bug 1215796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866651" comment="gstreamer1-plugins-bad-free-1.22.1-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866652" comment="gstreamer1-plugins-bad-free-devel-1.22.1-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40475</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40475" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40475" ref_url="https://www.suse.com/security/cve/CVE-2023-40475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017580.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/73CSYYN6KCRAUIBATMXYYKQT4I5PVKDJ/" source="SUSE-SU"/>
    <description>
    GStreamer MXF File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of MXF video files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-21661.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40475/">CVE-2023-40475 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40475">CVE-2023-40475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215792">SUSE bug 1215792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866651" comment="gstreamer1-plugins-bad-free-1.22.1-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866652" comment="gstreamer1-plugins-bad-free-devel-1.22.1-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40476" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40476" ref_url="https://www.suse.com/security/cve/CVE-2023-40476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017245.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NYQ73JMQYKYFAPDQHXO3OANFFF6OOUL6/" source="SUSE-SU"/>
    <description>
    GStreamer H265 Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of H265 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-21768.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-40476/">CVE-2023-40476 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40476">CVE-2023-40476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215793">SUSE bug 1215793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866651" comment="gstreamer1-plugins-bad-free-1.22.1-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866652" comment="gstreamer1-plugins-bad-free-devel-1.22.1-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4048" ref_url="https://www.suse.com/security/cve/CVE-2023-4048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read could have led to an exploitable crash when parsing HTML with DOMParser in low memory situations. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4048/">CVE-2023-4048 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4048">CVE-2023-4048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4049" ref_url="https://www.suse.com/security/cve/CVE-2023-4049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Race conditions in reference counting code were found through code inspection. These could have resulted in potentially exploitable use-after-free vulnerabilities. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4049/">CVE-2023-4049 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4049">CVE-2023-4049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4050" ref_url="https://www.suse.com/security/cve/CVE-2023-4050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In some cases, an untrusted input stream was copied to a stack buffer without checking its size. This resulted in a potentially exploitable crash which could have led to a sandbox escape. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4050/">CVE-2023-4050 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4050">CVE-2023-4050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4051" ref_url="https://www.suse.com/security/cve/CVE-2023-4051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4051/">CVE-2023-4051 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4051">CVE-2023-4051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4053" ref_url="https://www.suse.com/security/cve/CVE-2023-4053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the full screen notification by using a URL with a scheme handled by an external program, such as a mailto URL. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4053/">CVE-2023-4053 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4053">CVE-2023-4053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4055" ref_url="https://www.suse.com/security/cve/CVE-2023-4055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When the number of cookies per domain was exceeded in `document.cookie`, the actual cookie jar sent to the host was no longer consistent with expected cookie jar state. This could have caused requests to be sent with some cookies missing. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4055/">CVE-2023-4055 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4055">CVE-2023-4055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4056" ref_url="https://www.suse.com/security/cve/CVE-2023-4056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 115, Firefox ESR 115.0, Firefox ESR 102.13, Thunderbird 115.0, and Thunderbird 102.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 102.14, and Firefox ESR &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4056/">CVE-2023-4056 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4056">CVE-2023-4056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40567" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40567" ref_url="https://www.suse.com/security/cve/CVE-2023-40567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `clear_decompress_bands_data` function in which there is no offset validation. Abuse of this vulnerability may lead to an out of bounds write. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40567/">CVE-2023-40567 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40567">CVE-2023-40567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214867">SUSE bug 1214867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40569" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40569" ref_url="https://www.suse.com/security/cve/CVE-2023-40569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `progressive_decompress` function. This issue is likely down to incorrect calculations of the `nXSrc` and `nYSrc` variables. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. there are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40569/">CVE-2023-40569 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40569">CVE-2023-40569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214868">SUSE bug 1214868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4057" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4057" ref_url="https://www.suse.com/security/cve/CVE-2023-4057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-August/030750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015804.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 115, Firefox ESR 115.0, and Thunderbird 115.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 116, Firefox ESR &lt; 115.1, and Thunderbird &lt; 115.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4057/">CVE-2023-4057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4057">CVE-2023-4057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213746">SUSE bug 1213746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806755" comment="firefox-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806756" comment="firefox-x11-102.14.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806757" comment="thunderbird-102.14.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40589</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40589" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40589" ref_url="https://www.suse.com/security/cve/CVE-2023-40589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. In affected versions there is a Global-Buffer-Overflow in the ncrush_decompress function. Feeding crafted input into this function can trigger the overflow which has only been shown to cause a crash. This issue has been addressed in versions 2.11.0 and 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40589/">CVE-2023-40589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40589">CVE-2023-40589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214872">SUSE bug 1214872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866516" comment="freerdp-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866517" comment="freerdp-devel-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866518" comment="freerdp-libs-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866519" comment="libwinpr-2.11.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866520" comment="libwinpr-devel-2.11.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40660</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40660" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40660" ref_url="https://www.suse.com/security/cve/CVE-2023-40660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016707.html" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-27"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-40660/">CVE-2023-40660 at SUSE</cve>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40660">CVE-2023-40660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215762">SUSE bug 1215762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818054" comment="opensc-0.23.0-3.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40661" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40661" ref_url="https://www.suse.com/security/cve/CVE-2023-40661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016707.html" source="SUSE-SU"/>
    <description>
    Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow 
compromise key generation, certificate loading, and other card management operations during enrollment.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-27"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-40661/">CVE-2023-40661 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40661">CVE-2023-40661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215761">SUSE bug 1215761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818054" comment="opensc-0.23.0-3.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40745" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40745" ref_url="https://www.suse.com/security/cve/CVE-2023-40745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
    <description>
    LibTIFF is vulnerable to an integer overflow. This flaw allows remote attackers to cause a denial of service (application crash) or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-40745/">CVE-2023-40745 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40745">CVE-2023-40745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214687">SUSE bug 1214687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866653" comment="libtiff-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866654" comment="libtiff-devel-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866655" comment="libtiff-tools-4.4.0-12.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4091" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4091" ref_url="https://www.suse.com/security/cve/CVE-2023-4091" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032195.html" source="SUSE-SU"/>
    <description>
    A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-4091/">CVE-2023-4091 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4091">CVE-2023-4091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215904">SUSE bug 1215904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811203" comment="ctdb-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811204" comment="libnetapi-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811205" comment="libnetapi-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811206" comment="libsmbclient-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811207" comment="libsmbclient-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811208" comment="libwbclient-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811209" comment="libwbclient-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811210" comment="python3-samba-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811211" comment="python3-samba-dc-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811212" comment="python3-samba-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811213" comment="python3-samba-test-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811214" comment="samba-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811215" comment="samba-client-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811216" comment="samba-client-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811217" comment="samba-common-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811218" comment="samba-common-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811219" comment="samba-common-tools-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811220" comment="samba-dc-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811221" comment="samba-dcerpc-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811222" comment="samba-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811223" comment="samba-krb5-printing-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811224" comment="samba-ldb-ldap-modules-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811225" comment="samba-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811226" comment="samba-pidl-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811227" comment="samba-test-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811228" comment="samba-test-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811229" comment="samba-tools-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811230" comment="samba-usershares-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811231" comment="samba-vfs-iouring-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811232" comment="samba-winbind-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811233" comment="samba-winbind-clients-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811234" comment="samba-winbind-krb5-locator-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811235" comment="samba-winbind-modules-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811236" comment="samba-winexe-4.18.6-101.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41053" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41053" ref_url="https://www.suse.com/security/cve/CVE-2023-41053" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016258.html" source="SUSE-SU"/>
    <description>
    Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-07"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41053/">CVE-2023-41053 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41053">CVE-2023-41053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215094">SUSE bug 1215094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009956891" comment="redis-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956892" comment="redis-devel-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956893" comment="redis-doc-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41056" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41056" ref_url="https://www.suse.com/security/cve/CVE-2023-41056" source="SUSE CVE"/>
    <description>
    Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41056/">CVE-2023-41056 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41056">CVE-2023-41056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218646">SUSE bug 1218646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053976" comment="redis-7.0.12-2.module+el9.3.0+21263+4e58afe8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053977" comment="redis-devel-7.0.12-2.module+el9.3.0+21263+4e58afe8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053978" comment="redis-doc-7.0.12-2.module+el9.3.0+21263+4e58afe8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41074" ref_url="https://www.suse.com/security/cve/CVE-2023-41074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017581.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-41074/">CVE-2023-41074 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41074">CVE-2023-41074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215870">SUSE bug 1215870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217568">SUSE bug 1217568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41080" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41080" ref_url="https://www.suse.com/security/cve/CVE-2023-41080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92.
Older, EOL versions may  also be affected.


The vulnerability is limited to the ROOT (default) web application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41080/">CVE-2023-41080 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41080">CVE-2023-41080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214666">SUSE bug 1214666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849878" comment="tomcat-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849879" comment="tomcat-admin-webapps-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849880" comment="tomcat-docs-webapp-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849881" comment="tomcat-el-3.0-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849882" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849883" comment="tomcat-lib-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849884" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849885" comment="tomcat-webapps-9.0.62-37.el9_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41081" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41081" ref_url="https://www.suse.com/security/cve/CVE-2023-41081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020119.html" source="SUSE-SU"/>
    <description>
    Important: Authentication Bypass CVE-2023-41081

The mod_jk component of Apache Tomcat Connectors  in some circumstances, such as when a configuration included  "JkOptions +ForwardDirectories" but the configuration did not       provide explicit mounts for all possible proxied requests, mod_jk would       use an implicit mapping and map the request to the first defined worker.  Such an implicit mapping could result in the unintended exposure of the  status worker and/or bypass security constraints configured in httpd. As  of JK 1.2.49, the implicit mapping functionality has been removed and all  mappings must now be via explicit configuration.  Only mod_jk is affected  by this issue. The ISAPI redirector is not affected.

This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48.

Users are recommended to upgrade to version 1.2.49, which fixes the issue.

History
2023-09-13 Original advisory

2023-09-28 Updated summary


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41081/">CVE-2023-41081 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41081">CVE-2023-41081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215301">SUSE bug 1215301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866720" comment="mod_jk-1.2.49-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866721" comment="mod_proxy_cluster-1.3.20-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41105</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41105" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41105" ref_url="https://www.suse.com/security/cve/CVE-2023-41105" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031897.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Python 3.11 through 3.11.4. If a path containing '\0' bytes is passed to os.path.normpath(), the path will be truncated unexpectedly at the first '\0' byte. There are plausible cases in which an application would have rejected a filename for security reasons in Python 3.10.x or earlier, but that filename is no longer rejected in Python 3.11.x.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-41105/">CVE-2023-41105 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41105">CVE-2023-41105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214693">SUSE bug 1214693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811083" comment="python3.11-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811084" comment="python3.11-debug-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811085" comment="python3.11-devel-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811086" comment="python3.11-idle-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811087" comment="python3.11-libs-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811088" comment="python3.11-test-3.11.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811089" comment="python3.11-tkinter-3.11.5-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41175</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41175" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41175" ref_url="https://www.suse.com/security/cve/CVE-2023-41175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018188.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libtiff due to multiple potential integer overflows in raw2tiff.c. This flaw allows remote attackers to cause a denial of service or possibly execute an arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41175/">CVE-2023-41175 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41175">CVE-2023-41175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214686">SUSE bug 1214686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866653" comment="libtiff-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866654" comment="libtiff-devel-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866655" comment="libtiff-tools-4.4.0-12.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4133" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4133" ref_url="https://www.suse.com/security/cve/CVE-2023-4133" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the cxgb4 driver in the Linux kernel. The bug occurs when the cxgb4 device is detaching due to a possible rearming of the flower_stats_timer from the work queue. This flaw allows a local user to crash the system, causing a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4133/">CVE-2023-4133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4133">CVE-2023-4133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213970">SUSE bug 1213970</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41358</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41358" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41358" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41358" ref_url="https://www.suse.com/security/cve/CVE-2023-41358" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41358/">CVE-2023-41358 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41358">CVE-2023-41358 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214735">SUSE bug 1214735</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41359</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41359" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41359" ref_url="https://www.suse.com/security/cve/CVE-2023-41359" source="SUSE CVE"/>
    <description>
    An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41359/">CVE-2023-41359 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41359">CVE-2023-41359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214738">SUSE bug 1214738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41360</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41360" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41360" ref_url="https://www.suse.com/security/cve/CVE-2023-41360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-41360/">CVE-2023-41360 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41360">CVE-2023-41360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214739">SUSE bug 1214739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4147" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4147" ref_url="https://www.suse.com/security/cve/CVE-2023-4147" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux kernel's Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. This flaw allows a local user to crash or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4147/">CVE-2023-4147 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4147">CVE-2023-4147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1213968">SUSE bug 1213968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215118">SUSE bug 1215118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4155" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4155" ref_url="https://www.suse.com/security/cve/CVE-2023-4155" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
    <description>
    A flaw was found in KVM AMD Secure Encrypted Virtualization (SEV) in the Linux kernel. A KVM guest using SEV-ES or SEV-SNP with multiple vCPUs can trigger a double fetch race condition vulnerability and invoke the `VMGEXIT` handler recursively. If an attacker manages to call the handler multiple times, they can trigger a stack overflow and cause a denial of service or potentially guest-to-host escape in kernel configurations without stack guard pages (`CONFIG_VMAP_STACK`).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4155/">CVE-2023-4155 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4155">CVE-2023-4155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214022">SUSE bug 1214022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41909</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41909" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41909" ref_url="https://www.suse.com/security/cve/CVE-2023-41909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FRRouting FRR through 9.0. bgp_nlri_parse_flowspec in bgpd/bgp_flowspec.c processes malformed requests with no attributes, leading to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-41909/">CVE-2023-41909 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41909">CVE-2023-41909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215065">SUSE bug 1215065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41910</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41910" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41910" ref_url="https://www.suse.com/security/cve/CVE-2023-41910" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9158" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000571.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-41910/">CVE-2023-41910 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41910">CVE-2023-41910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215067">SUSE bug 1215067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953640" comment="lldpd-1.0.18-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953641" comment="lldpd-devel-1.0.18-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41915</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41915" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41915" ref_url="https://www.suse.com/security/cve/CVE-2023-41915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031798.html" source="SUSE-SU"/>
    <description>
    OpenPMIx PMIx before 4.2.6 and 5.0.x before 5.0.1 allows attackers to obtain ownership of arbitrary files via a race condition during execution of library code with UID 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-41915/">CVE-2023-41915 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41915">CVE-2023-41915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215190">SUSE bug 1215190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866504" comment="pmix-3.2.3-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866505" comment="pmix-devel-3.2.3-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866506" comment="pmix-pmi-3.2.3-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866507" comment="pmix-pmi-devel-3.2.3-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866508" comment="pmix-tools-3.2.3-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4194" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4194" ref_url="https://www.suse.com/security/cve/CVE-2023-4194" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-August/015997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's TUN/TAP functionality. This issue could allow a local user to bypass network filters and gain unauthorized access to some resources. The original patches fixing CVE-2023-1076 are incorrect or incomplete. The problem is that the following upstream commits - a096ccca6e50 ("tun: tun_chr_open(): correctly initialize socket uid"), - 66b2c338adce ("tap: tap_open(): correctly initialize socket uid"), pass "inode-&gt;i_uid" to sock_init_data_uid() as the last parameter and that turns out to not be accurate.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4194/">CVE-2023-4194 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4194">CVE-2023-4194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214019">SUSE bug 1214019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41983" ref_url="https://www.suse.com/security/cve/CVE-2023-41983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017406.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.1, Safari 17.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. Processing web content may lead to a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-41983/">CVE-2023-41983 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41983">CVE-2023-41983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202341993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-41993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-41993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-41993" ref_url="https://www.suse.com/security/cve/CVE-2023-41993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032584.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-41993/">CVE-2023-41993 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-41993">CVE-2023-41993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215661">SUSE bug 1215661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217568">SUSE bug 1217568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4206" ref_url="https://www.suse.com/security/cve/CVE-2023-4206" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_route component can be exploited to achieve local privilege escalation.

When route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.

We recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4206/">CVE-2023-4206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4206">CVE-2023-4206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215110">SUSE bug 1215110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4207" ref_url="https://www.suse.com/security/cve/CVE-2023-4207" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_fw component can be exploited to achieve local privilege escalation.

When fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.

We recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4207/">CVE-2023-4207 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4207">CVE-2023-4207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215113">SUSE bug 1215113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4208" ref_url="https://www.suse.com/security/cve/CVE-2023-4208" source="SUSE CVE"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: cls_u32 component can be exploited to achieve local privilege escalation.

When u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter. This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free.

We recommend upgrading past commit 3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4208/">CVE-2023-4208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4208">CVE-2023-4208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215114">SUSE bug 1215114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4244" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4244" ref_url="https://www.suse.com/security/cve/CVE-2023-4244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

Due to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.

We recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4244/">CVE-2023-4244 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4244">CVE-2023-4244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215420">SUSE bug 1215420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215424">SUSE bug 1215424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42465" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42465" ref_url="https://www.suse.com/security/cve/CVE-2023-42465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0794-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0795-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0796-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0796-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0797-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0876-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018176.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42465/">CVE-2023-42465 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42465">CVE-2023-42465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219026">SUSE bug 1219026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221593">SUSE bug 1221593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224872">SUSE bug 1224872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009848258" comment="sudo-1.9.5p2-10.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848259" comment="sudo-python-plugin-1.9.5p2-10.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42467" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42467" ref_url="https://www.suse.com/security/cve/CVE-2023-42467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020338.html" source="SUSE-SU"/>
    <description>
    QEMU through 8.0.0 could trigger a division by zero in scsi_disk_reset in hw/scsi/scsi-disk.c because scsi_disk_emulate_mode_select does not prevent s-&gt;qdev.blocksize from being 256. This stops QEMU and the guest immediately.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42467/">CVE-2023-42467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42467">CVE-2023-42467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215192">SUSE bug 1215192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872275" comment="qemu-guest-agent-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872276" comment="qemu-img-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872277" comment="qemu-kvm-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872278" comment="qemu-kvm-audio-pa-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872279" comment="qemu-kvm-block-blkio-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872280" comment="qemu-kvm-block-curl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872281" comment="qemu-kvm-block-rbd-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872282" comment="qemu-kvm-common-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872283" comment="qemu-kvm-core-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872284" comment="qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872285" comment="qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872286" comment="qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872287" comment="qemu-kvm-device-usb-host-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872288" comment="qemu-kvm-device-usb-redirect-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872289" comment="qemu-kvm-docs-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872290" comment="qemu-kvm-tools-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872291" comment="qemu-kvm-ui-egl-headless-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872292" comment="qemu-kvm-ui-opengl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872293" comment="qemu-pr-helper-8.2.0-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42669" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42669" ref_url="https://www.suse.com/security/cve/CVE-2023-42669" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032195.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Samba's "rpcecho" development server, a non-Windows RPC server used to test Samba's DCE/RPC stack elements. This vulnerability stems from an RPC function that can be blocked indefinitely. The issue arises because the "rpcecho" service operates with only one worker in the main RPC task, allowing calls to the "rpcecho" server to be blocked for a specified time, causing service disruptions. This disruption is triggered by a "sleep()" call in the "dcesrv_echo_TestSleep()" function under specific conditions. Authenticated users or attackers can exploit this vulnerability to make calls to the "rpcecho" server, requesting it to block for a specified duration, effectively disrupting most services and leading to a complete denial of service on the AD DC. The DoS affects all other services as "rpcecho" runs in the main RPC task.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42669/">CVE-2023-42669 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42669">CVE-2023-42669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215905">SUSE bug 1215905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811203" comment="ctdb-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811204" comment="libnetapi-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811205" comment="libnetapi-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811206" comment="libsmbclient-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811207" comment="libsmbclient-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811208" comment="libwbclient-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811209" comment="libwbclient-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811210" comment="python3-samba-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811211" comment="python3-samba-dc-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811212" comment="python3-samba-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811213" comment="python3-samba-test-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811214" comment="samba-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811215" comment="samba-client-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811216" comment="samba-client-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811217" comment="samba-common-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811218" comment="samba-common-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811219" comment="samba-common-tools-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811220" comment="samba-dc-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811221" comment="samba-dcerpc-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811222" comment="samba-devel-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811223" comment="samba-krb5-printing-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811224" comment="samba-ldb-ldap-modules-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811225" comment="samba-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811226" comment="samba-pidl-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811227" comment="samba-test-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811228" comment="samba-test-libs-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811229" comment="samba-tools-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811230" comment="samba-usershares-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811231" comment="samba-vfs-iouring-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811232" comment="samba-winbind-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811233" comment="samba-winbind-clients-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811234" comment="samba-winbind-krb5-locator-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811235" comment="samba-winbind-modules-4.18.6-101.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811236" comment="samba-winexe-4.18.6-101.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4273" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4273" ref_url="https://www.suse.com/security/cve/CVE-2023-4273" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4273/">CVE-2023-4273 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4273">CVE-2023-4273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214120">SUSE bug 1214120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1214123">SUSE bug 1214123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42753" ref_url="https://www.suse.com/security/cve/CVE-2023-42753" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    An array indexing vulnerability was found in the netfilter subsystem of the Linux kernel. A missing macro could lead to a miscalculation of the `h-&gt;nets` array offset, providing attackers with the primitive to arbitrarily increment/decrement a memory buffer out-of-bound. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42753/">CVE-2023-42753 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42753">CVE-2023-42753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215150">SUSE bug 1215150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218613">SUSE bug 1218613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42754" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42754" ref_url="https://www.suse.com/security/cve/CVE-2023-42754" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017001.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the Linux kernel ipv4 stack. The socket buffer (skb) was assumed to be associated with a device before calling __ip_options_compile, which is not always the case if the skb is re-routed by ipvs. This issue may allow a local user with CAP_NET_ADMIN privileges to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42754/">CVE-2023-42754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42754">CVE-2023-42754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215467">SUSE bug 1215467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222212">SUSE bug 1222212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42756" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42756" ref_url="https://www.suse.com/security/cve/CVE-2023-42756" source="SUSE CVE"/>
    <description>
    A flaw was found in the Netfilter subsystem of the Linux kernel. A race condition between IPSET_CMD_ADD and IPSET_CMD_SWAP can lead to a kernel panic due to the invocation of `__ip_set_put` on a wrong `set`. This issue may allow a local user to crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42756/">CVE-2023-42756 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42756">CVE-2023-42756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215767">SUSE bug 1215767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42794</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42794" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42794" ref_url="https://www.suse.com/security/cve/CVE-2023-42794" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017913.html" source="SUSE-SU"/>
    <description>
    Incomplete Cleanup vulnerability in Apache Tomcat.

The internal fork of Commons FileUpload packaged with Apache Tomcat 9.0.70 through 9.0.80 and 8.5.85 through 8.5.93 included an unreleased, 
in progress refactoring that exposed a potential denial of service on 
Windows if a web application opened a stream for an uploaded file but 
failed to close the stream. The file would never be deleted from disk 
creating the possibility of an eventual denial of service due to the 
disk being full.

Other, EOL versions may also be affected.


Users are recommended to upgrade to version 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-10-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42794/">CVE-2023-42794 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42794">CVE-2023-42794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216120">SUSE bug 1216120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849878" comment="tomcat-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849879" comment="tomcat-admin-webapps-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849880" comment="tomcat-docs-webapp-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849881" comment="tomcat-el-3.0-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849882" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849883" comment="tomcat-lib-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849884" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849885" comment="tomcat-webapps-9.0.62-37.el9_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42795" ref_url="https://www.suse.com/security/cve/CVE-2023-42795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Incomplete Cleanup vulnerability in Apache Tomcat.When recycling various internal objects in Apache Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.80 and from 8.5.0 through 8.5.93, an error could 
cause Tomcat to skip some parts of the recycling process leading to 
information leaking from the current request/response to the next.
Older, EOL versions may  also be affected.


Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42795/">CVE-2023-42795 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42795">CVE-2023-42795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216119">SUSE bug 1216119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849878" comment="tomcat-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849879" comment="tomcat-admin-webapps-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849880" comment="tomcat-docs-webapp-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849881" comment="tomcat-el-3.0-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849882" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849883" comment="tomcat-lib-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849884" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849885" comment="tomcat-webapps-9.0.62-37.el9_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42833</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42833" ref_url="https://www.suse.com/security/cve/CVE-2023-42833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017970.html" source="SUSE-SU"/>
    <description>
    A correctness issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14, Safari 17, iOS 17 and iPadOS 17. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42833/">CVE-2023-42833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42833">CVE-2023-42833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219604">SUSE bug 1219604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811103" comment="webkit2gtk3-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811104" comment="webkit2gtk3-devel-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811105" comment="webkit2gtk3-jsc-2.40.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811106" comment="webkit2gtk3-jsc-devel-2.40.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42843" ref_url="https://www.suse.com/security/cve/CVE-2023-42843" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
    <description>
    An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, Safari 17.1, macOS Sonoma 14.1. Visiting a malicious website may lead to address bar spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-04-01"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-42843/">CVE-2023-42843 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42843">CVE-2023-42843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953635" comment="webkit2gtk3-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953636" comment="webkit2gtk3-devel-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953637" comment="webkit2gtk3-jsc-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953638" comment="webkit2gtk3-jsc-devel-2.44.3-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42852" ref_url="https://www.suse.com/security/cve/CVE-2023-42852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017406.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42852/">CVE-2023-42852 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42852">CVE-2023-42852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217210">SUSE bug 1217210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217568">SUSE bug 1217568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42875</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42875" ref_url="https://www.suse.com/security/cve/CVE-2023-42875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040413.html" source="SUSE-SU"/>
    <description>
    Processing web content may lead to arbitrary code execution. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17, Safari 17. The issue was addressed with improved memory handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42875/">CVE-2023-42875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42875">CVE-2023-42875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241158">SUSE bug 1241158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42883" ref_url="https://www.suse.com/security/cve/CVE-2023-42883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017581.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, iOS 17.2 and iPadOS 17.2, watchOS 10.2, tvOS 17.2, iOS 16.7.3 and iPadOS 16.7.3. Processing an image may lead to a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42883/">CVE-2023-42883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42883">CVE-2023-42883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218032">SUSE bug 1218032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42890" ref_url="https://www.suse.com/security/cve/CVE-2023-42890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017581.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, macOS Sonoma 14.2, watchOS 10.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42890/">CVE-2023-42890 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42890">CVE-2023-42890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218033">SUSE bug 1218033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218407">SUSE bug 1218407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42916</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42916" ref_url="https://www.suse.com/security/cve/CVE-2023-42916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017364.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-42916/">CVE-2023-42916 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42916">CVE-2023-42916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217844">SUSE bug 1217844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42917" ref_url="https://www.suse.com/security/cve/CVE-2023-42917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017364.html" source="SUSE-SU"/>
    <description>
    A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42917/">CVE-2023-42917 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42917">CVE-2023-42917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217844">SUSE bug 1217844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218407">SUSE bug 1218407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42950</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42950" ref_url="https://www.suse.com/security/cve/CVE-2023-42950" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
    <description>
    A use after free issue was addressed with improved memory management. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-42950/">CVE-2023-42950 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42950">CVE-2023-42950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953635" comment="webkit2gtk3-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953636" comment="webkit2gtk3-devel-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953637" comment="webkit2gtk3-jsc-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953638" comment="webkit2gtk3-jsc-devel-2.44.3-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42956" ref_url="https://www.suse.com/security/cve/CVE-2023-42956" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2. Processing web content may lead to a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-42956/">CVE-2023-42956 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-42956">CVE-2023-42956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953635" comment="webkit2gtk3-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953636" comment="webkit2gtk3-devel-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953637" comment="webkit2gtk3-jsc-2.44.3-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953638" comment="webkit2gtk3-jsc-devel-2.44.3-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202342970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-42970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-42970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-42970" ref_url="https://www.suse.com/security/cve/CVE-2023-42970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040413.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14, watchOS 10, tvOS 17, Safari 17. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-42970/">CVE-2023-42970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-42970">CVE-2023-42970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241160">SUSE bug 1241160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43000</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43000" ref_url="https://www.suse.com/security/cve/CVE-2023-43000" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, Safari 16.6, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-43000/">CVE-2023-43000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000">CVE-2023-43000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254164">SUSE bug 1254164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43010" ref_url="https://www.suse.com/security/cve/CVE-2023-43010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2, Safari 17.2, iOS 16.7.15 and iPadOS 16.7.15, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-43010/">CVE-2023-43010 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43010">CVE-2023-43010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259950">SUSE bug 1259950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43115</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43115" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43115" ref_url="https://www.suse.com/security/cve/CVE-2023-43115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016546.html" source="SUSE-SU"/>
    <description>
    In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-43115/">CVE-2023-43115 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43115">CVE-2023-43115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215466">SUSE bug 1215466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217554">SUSE bug 1217554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217601">SUSE bug 1217601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221587">SUSE bug 1221587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811195" comment="ghostscript-9.54.0-14.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811196" comment="ghostscript-doc-9.54.0-14.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811197" comment="ghostscript-tools-dvipdf-9.54.0-14.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811198" comment="ghostscript-tools-fonts-9.54.0-14.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811199" comment="ghostscript-tools-printing-9.54.0-14.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811200" comment="ghostscript-x11-9.54.0-14.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811201" comment="libgs-9.54.0-14.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811202" comment="libgs-devel-9.54.0-14.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43490" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43490" ref_url="https://www.suse.com/security/cve/CVE-2023-43490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021372.html" source="SUSE-SU"/>
    <description>
    Incorrect calculation in microcode keying mechanism for some Intel(R) Xeon(R) D Processors with Intel(R) SGX may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-43490/">CVE-2023-43490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43490">CVE-2023-43490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221323">SUSE bug 1221323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954004" comment="microcode_ctl-20240910-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43622" ref_url="https://www.suse.com/security/cve/CVE-2023-43622" source="SUSE CVE"/>
    <description>
    An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern.
This has been fixed in version 2.4.58, so that such connection are terminated properly after the configured connection timeout.

This issue affects Apache HTTP Server: from 2.4.55 through 2.4.57.

Users are recommended to upgrade to version 2.4.58, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43622/">CVE-2023-43622 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43622">CVE-2023-43622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216425">SUSE bug 1216425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866716" comment="mod_http2-2.0.26-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43758</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43758" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43758" ref_url="https://www.suse.com/security/cve/CVE-2023-43758" source="SUSE CVE"/>
    <description>
    Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43758/">CVE-2023-43758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43758">CVE-2023-43758 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053952" comment="microcode_ctl-20240910-1.20250211.1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43785</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43785" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43785" ref_url="https://www.suse.com/security/cve/CVE-2023-43785" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-43785/">CVE-2023-43785 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43785">CVE-2023-43785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215683">SUSE bug 1215683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866485" comment="libX11-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866486" comment="libX11-common-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866487" comment="libX11-devel-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866488" comment="libX11-xcb-1.7.0-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43786" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43786" ref_url="https://www.suse.com/security/cve/CVE-2023-43786" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to an infinite loop within the PutSubImage() function. This flaw allows a local user to consume all available system resources and cause a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43786/">CVE-2023-43786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43786">CVE-2023-43786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215684">SUSE bug 1215684</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866485" comment="libX11-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866486" comment="libX11-common-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866487" comment="libX11-devel-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866488" comment="libX11-xcb-1.7.0-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43787" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43787" ref_url="https://www.suse.com/security/cve/CVE-2023-43787" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036507.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-43787/">CVE-2023-43787 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43787">CVE-2023-43787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215685">SUSE bug 1215685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866485" comment="libX11-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866486" comment="libX11-common-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866487" comment="libX11-devel-1.7.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866488" comment="libX11-xcb-1.7.0-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43788" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43788" ref_url="https://www.suse.com/security/cve/CVE-2023-43788" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031903.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libXpm due to a boundary condition within the XpmCreateXpmImageFromBuffer() function. This flaw allows a local attacker to trigger an out-of-bounds read error and read the contents of memory on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43788/">CVE-2023-43788 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43788">CVE-2023-43788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215686">SUSE bug 1215686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866489" comment="libXpm-3.5.13-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866490" comment="libXpm-devel-3.5.13-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866522" comment="motif-2.3.4-28.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866523" comment="motif-devel-2.3.4-28.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43789" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43789" ref_url="https://www.suse.com/security/cve/CVE-2023-43789" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3965-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031903.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libXpm where a vulnerability exists due to a boundary condition, a local user can trigger an out-of-bounds read error and read contents of memory on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-43789/">CVE-2023-43789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43789">CVE-2023-43789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215682">SUSE bug 1215682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215687">SUSE bug 1215687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866489" comment="libXpm-3.5.13-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866490" comment="libXpm-devel-3.5.13-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866522" comment="motif-2.3.4-28.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866523" comment="motif-devel-2.3.4-28.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43804" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43804" ref_url="https://www.suse.com/security/cve/CVE-2023-43804" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4352-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032586.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-43804/">CVE-2023-43804 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43804">CVE-2023-43804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215968">SUSE bug 1215968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846265" comment="fence-agents-aliyun-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846266" comment="fence-agents-all-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846267" comment="fence-agents-amt-ws-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846268" comment="fence-agents-apc-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846269" comment="fence-agents-apc-snmp-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846270" comment="fence-agents-aws-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846271" comment="fence-agents-azure-arm-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846272" comment="fence-agents-bladecenter-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846273" comment="fence-agents-brocade-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846274" comment="fence-agents-cisco-mds-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846275" comment="fence-agents-cisco-ucs-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846276" comment="fence-agents-common-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846277" comment="fence-agents-compute-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846278" comment="fence-agents-drac5-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846279" comment="fence-agents-eaton-snmp-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846280" comment="fence-agents-emerson-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846281" comment="fence-agents-eps-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846282" comment="fence-agents-gce-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846283" comment="fence-agents-heuristics-ping-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846284" comment="fence-agents-hpblade-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846285" comment="fence-agents-ibm-powervs-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846286" comment="fence-agents-ibm-vpc-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846287" comment="fence-agents-ibmblade-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846288" comment="fence-agents-ifmib-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846289" comment="fence-agents-ilo-moonshot-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846290" comment="fence-agents-ilo-mp-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846291" comment="fence-agents-ilo-ssh-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846292" comment="fence-agents-ilo2-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846293" comment="fence-agents-intelmodular-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846294" comment="fence-agents-ipdu-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846295" comment="fence-agents-ipmilan-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846296" comment="fence-agents-kdump-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846297" comment="fence-agents-kubevirt-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846298" comment="fence-agents-mpath-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846299" comment="fence-agents-openstack-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846300" comment="fence-agents-redfish-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846301" comment="fence-agents-rhevm-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846302" comment="fence-agents-rsa-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846303" comment="fence-agents-rsb-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846304" comment="fence-agents-sbd-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846305" comment="fence-agents-scsi-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846306" comment="fence-agents-virsh-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846307" comment="fence-agents-vmware-rest-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846308" comment="fence-agents-vmware-soap-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846309" comment="fence-agents-wti-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846310" comment="fence-virt-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846311" comment="fence-virtd-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846312" comment="fence-virtd-cpg-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846313" comment="fence-virtd-libvirt-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846314" comment="fence-virtd-multicast-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846315" comment="fence-virtd-serial-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846316" comment="fence-virtd-tcp-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846317" comment="ha-cloud-support-4.10.0-55.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845159" comment="python3-urllib3-1.26.5-3.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866491" comment="python3.11-urllib3-1.26.12-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4387" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4387" ref_url="https://www.suse.com/security/cve/CVE-2023-4387" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3599-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3600-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3683-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016554.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in vmxnet3_rq_alloc_rx_buf in drivers/net/vmxnet3/vmxnet3_drv.c in VMware's vmxnet3 ethernet NIC driver in the Linux Kernel. This issue could allow a local attacker to crash the system due to a double-free while cleaning up vmxnet3_rq_cleanup_all, which could also lead to a kernel information leak problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4387/">CVE-2023-4387 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4387">CVE-2023-4387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214350">SUSE bug 1214350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009804960" comment="bpftool-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804961" comment="kernel-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804962" comment="kernel-abi-stablelists-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804963" comment="kernel-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804964" comment="kernel-cross-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804965" comment="kernel-debug-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804966" comment="kernel-debug-core-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804969" comment="kernel-debug-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804970" comment="kernel-debug-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804973" comment="kernel-doc-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804974" comment="kernel-headers-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804975" comment="kernel-modules-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804976" comment="kernel-modules-extra-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804977" comment="kernel-tools-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804978" comment="kernel-tools-libs-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804980" comment="perf-5.14.0-162.6.1.el9_1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009804981" comment="python3-perf-5.14.0-162.6.1.el9_1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4408" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4408" ref_url="https://www.suse.com/security/cve/CVE-2023-4408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
    <description>
    The DNS message parsing code in `named` includes a section whose computational complexity is overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects both authoritative servers and recursive resolvers.
This issue affects BIND 9 versions 9.0.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4408/">CVE-2023-4408 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4408">CVE-2023-4408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219851">SUSE bug 1219851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867223" comment="bind-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867224" comment="bind-chroot-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867225" comment="bind-devel-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867226" comment="bind-dnssec-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867227" comment="bind-dnssec-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867228" comment="bind-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867229" comment="bind-dyndb-ldap-11.9-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867230" comment="bind-libs-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867231" comment="bind-license-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867232" comment="bind-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867233" comment="python3-bind-9.16.23-18.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44429" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44429" ref_url="https://www.suse.com/security/cve/CVE-2023-44429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017425.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/73CSYYN6KCRAUIBATMXYYKQT4I5PVKDJ/" source="SUSE-SU"/>
    <description>
    GStreamer AV1 Codec Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of AV1 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22226.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44429/">CVE-2023-44429 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44429">CVE-2023-44429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217211">SUSE bug 1217211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816825" comment="gstreamer1-plugins-bad-free-1.22.1-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816826" comment="gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44431</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44431" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44431" ref_url="https://www.suse.com/security/cve/CVE-2023-44431" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
    <description>
    BlueZ Audio Profile AVRCP Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device.

The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-19909.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44431/">CVE-2023-44431 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44431">CVE-2023-44431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223974">SUSE bug 1223974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44441</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44441" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44441" ref_url="https://www.suse.com/security/cve/CVE-2023-44441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001020.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017408.html" source="SUSE-SU"/>
    <description>
    GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of DDS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-22093.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44441/">CVE-2023-44441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44441">CVE-2023-44441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217160">SUSE bug 1217160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983961" comment="gimp-2.99.8-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983962" comment="gimp-libs-2.99.8-4.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44442</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44442" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44442" ref_url="https://www.suse.com/security/cve/CVE-2023-44442" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001020.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017390.html" source="SUSE-SU"/>
    <description>
    GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current process. Was ZDI-CAN-22094.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44442/">CVE-2023-44442 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44442">CVE-2023-44442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217161">SUSE bug 1217161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983961" comment="gimp-2.99.8-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983962" comment="gimp-libs-2.99.8-4.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44443" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44443" ref_url="https://www.suse.com/security/cve/CVE-2023-44443" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001020.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017408.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14534-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7UFJHBPLWAYPCEKYTYRWURM3JQUU2ZPU/" source="SUSE-SU"/>
    <description>
    GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-22096.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44443/">CVE-2023-44443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44443">CVE-2023-44443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217162">SUSE bug 1217162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983961" comment="gimp-2.99.8-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983962" comment="gimp-libs-2.99.8-4.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44444" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44444" ref_url="https://www.suse.com/security/cve/CVE-2023-44444" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001020.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4697-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017390.html" source="SUSE-SU"/>
    <description>
    GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSP files. Crafted data in a PSP file can trigger an off-by-one error when calculating a location to write within a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-22097.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-44444/">CVE-2023-44444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-44444">CVE-2023-44444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217163">SUSE bug 1217163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983961" comment="gimp-2.99.8-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983962" comment="gimp-libs-2.99.8-4.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44446" ref_url="https://www.suse.com/security/cve/CVE-2023-44446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018110.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/73CSYYN6KCRAUIBATMXYYKQT4I5PVKDJ/" source="SUSE-SU"/>
    <description>
    GStreamer MXF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of MXF video files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22299.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-44446/">CVE-2023-44446 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44446">CVE-2023-44446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217213">SUSE bug 1217213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816825" comment="gstreamer1-plugins-bad-free-1.22.1-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816826" comment="gstreamer1-plugins-bad-free-devel-1.22.1-2.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44466" ref_url="https://www.suse.com/security/cve/CVE-2023-44466" source="SUSE CVE"/>
    <description>
    An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-44466/">CVE-2023-44466 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44466">CVE-2023-44466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215871">SUSE bug 1215871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44487" ref_url="https://www.suse.com/security/cve/CVE-2023-44487" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="TID000021240" ref_url="https://www.suse.com/support/kb/doc/?id=000021240" source="SUSE-SU"/>
		<reference ref_id="TID000021980" ref_url="https://www.suse.com/support/kb/doc/?id=000021980" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PHLNOE5TP7BJKIUIINHT2OD2ZR672SJX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14442-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TNFN6MBU4SQLAGX7GNFLRGTPGY3IBHZG/" source="SUSE-SU"/>
    <description>
    The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44487/">CVE-2023-44487 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44487">CVE-2023-44487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216109">SUSE bug 1216109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216123">SUSE bug 1216123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216169">SUSE bug 1216169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216171">SUSE bug 1216171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216174">SUSE bug 1216174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216176">SUSE bug 1216176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216181">SUSE bug 1216181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216182">SUSE bug 1216182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216190">SUSE bug 1216190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807170" comment="aspnetcore-runtime-6.0-6.0.23-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807237" comment="aspnetcore-runtime-7.0-7.0.12-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053965" comment="aspnetcore-runtime-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807171" comment="aspnetcore-targeting-pack-6.0-6.0.23-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807238" comment="aspnetcore-targeting-pack-7.0-7.0.12-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053966" comment="aspnetcore-targeting-pack-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807172" comment="dotnet-apphost-pack-6.0-6.0.23-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807239" comment="dotnet-apphost-pack-7.0-7.0.12-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053967" comment="dotnet-apphost-pack-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053968" comment="dotnet-host-8.0.0~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807173" comment="dotnet-hostfxr-6.0-6.0.23-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807241" comment="dotnet-hostfxr-7.0-7.0.12-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053969" comment="dotnet-hostfxr-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807174" comment="dotnet-runtime-6.0-6.0.23-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807242" comment="dotnet-runtime-7.0-7.0.12-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053970" comment="dotnet-runtime-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807175" comment="dotnet-sdk-6.0-6.0.123-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807176" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.123-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807243" comment="dotnet-sdk-7.0-7.0.112-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807244" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.112-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053971" comment="dotnet-sdk-8.0-8.0.100~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053972" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.100~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807177" comment="dotnet-targeting-pack-6.0-6.0.23-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807245" comment="dotnet-targeting-pack-7.0-7.0.12-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053973" comment="dotnet-targeting-pack-8.0-8.0.0~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807178" comment="dotnet-templates-6.0-6.0.123-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807246" comment="dotnet-templates-7.0-7.0.112-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053974" comment="dotnet-templates-8.0-8.0.100~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807206" comment="go-toolset-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807207" comment="golang-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807208" comment="golang-bin-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807209" comment="golang-docs-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807210" comment="golang-misc-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807211" comment="golang-race-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807212" comment="golang-src-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807213" comment="golang-tests-1.19.13-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807289" comment="grafana-9.0.9-4.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811242" comment="libnghttp2-1.43.0-5.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811243" comment="libnghttp2-devel-1.43.0-5.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053975" comment="netstandard-targeting-pack-2.1-8.0.100~rc.2-0.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811244" comment="nghttp2-1.43.0-5.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053954" comment="nginx-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053955" comment="nginx-all-modules-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053956" comment="nginx-core-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053957" comment="nginx-filesystem-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053958" comment="nginx-mod-devel-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053959" comment="nginx-mod-http-image-filter-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053960" comment="nginx-mod-http-perl-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053961" comment="nginx-mod-http-xslt-filter-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053962" comment="nginx-mod-mail-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053963" comment="nginx-mod-stream-1.22.1-5.module+el9.3.0.z+20438+032561a0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807284" comment="nodejs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807285" comment="nodejs-devel-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807286" comment="nodejs-docs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807287" comment="nodejs-full-i18n-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807279" comment="nodejs-libs-16.20.2-3.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807288" comment="npm-9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807318" comment="tomcat-9.0.62-11.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807319" comment="tomcat-admin-webapps-9.0.62-11.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807320" comment="tomcat-docs-webapp-9.0.62-11.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807321" comment="tomcat-el-3.0-api-9.0.62-11.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807322" comment="tomcat-jsp-2.3-api-9.0.62-11.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807323" comment="tomcat-lib-9.0.62-11.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807324" comment="tomcat-servlet-4.0-api-9.0.62-11.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807325" comment="tomcat-webapps-9.0.62-11.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807290" comment="varnish-6.6.2-3.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807291" comment="varnish-devel-6.6.2-3.el9_2.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807292" comment="varnish-docs-6.6.2-3.el9_2.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202344488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-44488</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-44488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44488" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-44488" ref_url="https://www.suse.com/security/cve/CVE-2023-44488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035913.html" source="SUSE-SU"/>
    <description>
    VP9 in libvpx before 1.13.1 mishandles widths, leading to a crash related to encoding.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-44488/">CVE-2023-44488 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-44488">CVE-2023-44488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216879">SUSE bug 1216879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217559">SUSE bug 1217559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808826" comment="firefox-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808827" comment="firefox-x11-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807158" comment="libvpx-1.9.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807159" comment="libvpx-devel-1.9.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009809033" comment="thunderbird-115.4.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45143</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45143" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45143" ref_url="https://www.suse.com/security/cve/CVE-2023-45143" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032392.html" source="SUSE-SU"/>
    <description>
    Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45143/">CVE-2023-45143 at SUSE</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45143">CVE-2023-45143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216205">SUSE bug 1216205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807284" comment="nodejs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807285" comment="nodejs-devel-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807286" comment="nodejs-docs-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807287" comment="nodejs-full-i18n-18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806910" comment="nodejs-nodemon-3.0.1-1.module+el9.2.0.z+19753+58118bc0 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807288" comment="npm-9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45145" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45145" ref_url="https://www.suse.com/security/cve/CVE-2023-45145" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000638.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0595" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000798.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017742.html" source="SUSE-SU"/>
    <description>
    Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-07"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45145/">CVE-2023-45145 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45145">CVE-2023-45145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216376">SUSE bug 1216376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009956891" comment="redis-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956892" comment="redis-devel-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956893" comment="redis-doc-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45229" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45229" ref_url="https://www.suse.com/security/cve/CVE-2023-45229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023768.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to an out-of-bounds read
 vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45229/">CVE-2023-45229 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45229">CVE-2023-45229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218879">SUSE bug 1218879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45230" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45230" ref_url="https://www.suse.com/security/cve/CVE-2023-45230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023768.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-01-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45230/">CVE-2023-45230 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45230">CVE-2023-45230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218880">SUSE bug 1218880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851378" comment="edk2-ovmf-20230524-4.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851379" comment="edk2-tools-20230524-4.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851380" comment="edk2-tools-doc-20230524-4.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45231" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45231" ref_url="https://www.suse.com/security/cve/CVE-2023-45231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023832.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to an out-of-bounds read
 vulnerability when processing   Neighbor Discovery Redirect message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45231/">CVE-2023-45231 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45231">CVE-2023-45231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218881">SUSE bug 1218881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45232</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45232" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45232" ref_url="https://www.suse.com/security/cve/CVE-2023-45232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023832.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45232/">CVE-2023-45232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45232">CVE-2023-45232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218882">SUSE bug 1218882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45233" ref_url="https://www.suse.com/security/cve/CVE-2023-45233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023832.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45233/">CVE-2023-45233 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45233">CVE-2023-45233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218883">SUSE bug 1218883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45234</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45234" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45234" ref_url="https://www.suse.com/security/cve/CVE-2023-45234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023832.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45234/">CVE-2023-45234 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45234">CVE-2023-45234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218884">SUSE bug 1218884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851378" comment="edk2-ovmf-20230524-4.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851379" comment="edk2-tools-20230524-4.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851380" comment="edk2-tools-doc-20230524-4.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45235" ref_url="https://www.suse.com/security/cve/CVE-2023-45235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023832.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to a buffer overflow vulnerability when





handling Server ID option 



 from a DHCPv6 proxy Advertise message. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-45235/">CVE-2023-45235 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45235">CVE-2023-45235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218885">SUSE bug 1218885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866626" comment="edk2-ovmf-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866627" comment="edk2-tools-20231122-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866628" comment="edk2-tools-doc-20231122-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45236" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45236" ref_url="https://www.suse.com/security/cve/CVE-2023-45236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45236/">CVE-2023-45236 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45236">CVE-2023-45236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218886">SUSE bug 1218886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877070" comment="edk2-ovmf-20231122-6.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877071" comment="edk2-tools-20231122-6.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877072" comment="edk2-tools-doc-20231122-6.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45237" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45237" ref_url="https://www.suse.com/security/cve/CVE-2023-45237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
    <description>
    EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This
 vulnerability can be exploited by an attacker to gain unauthorized 
access and potentially lead to a loss of Confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45237/">CVE-2023-45237 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45237">CVE-2023-45237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218887">SUSE bug 1218887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877070" comment="edk2-ovmf-20231122-6.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877071" comment="edk2-tools-20231122-6.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877072" comment="edk2-tools-doc-20231122-6.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4527" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4527" ref_url="https://www.suse.com/security/cve/CVE-2023-4527" source="SUSE CVE"/>
    <description>
    A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4527/">CVE-2023-4527 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4527">CVE-2023-4527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215280">SUSE bug 1215280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228400">SUSE bug 1228400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806915" comment="glibc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806916" comment="glibc-all-langpacks-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806917" comment="glibc-benchtests-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806918" comment="glibc-common-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806919" comment="glibc-devel-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806920" comment="glibc-doc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806921" comment="glibc-gconv-extra-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806922" comment="glibc-headers-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806923" comment="glibc-langpack-aa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806924" comment="glibc-langpack-af-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806925" comment="glibc-langpack-agr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806926" comment="glibc-langpack-ak-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806927" comment="glibc-langpack-am-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806928" comment="glibc-langpack-an-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806929" comment="glibc-langpack-anp-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806930" comment="glibc-langpack-ar-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806931" comment="glibc-langpack-as-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806932" comment="glibc-langpack-ast-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806933" comment="glibc-langpack-ayc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806934" comment="glibc-langpack-az-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806935" comment="glibc-langpack-be-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806936" comment="glibc-langpack-bem-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806937" comment="glibc-langpack-ber-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806938" comment="glibc-langpack-bg-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806939" comment="glibc-langpack-bhb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806940" comment="glibc-langpack-bho-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806941" comment="glibc-langpack-bi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806942" comment="glibc-langpack-bn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806943" comment="glibc-langpack-bo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806944" comment="glibc-langpack-br-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806945" comment="glibc-langpack-brx-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806946" comment="glibc-langpack-bs-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806947" comment="glibc-langpack-byn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806948" comment="glibc-langpack-ca-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806949" comment="glibc-langpack-ce-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806950" comment="glibc-langpack-chr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806951" comment="glibc-langpack-ckb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806952" comment="glibc-langpack-cmn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806953" comment="glibc-langpack-crh-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806954" comment="glibc-langpack-cs-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806955" comment="glibc-langpack-csb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806956" comment="glibc-langpack-cv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806957" comment="glibc-langpack-cy-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806958" comment="glibc-langpack-da-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806959" comment="glibc-langpack-de-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806960" comment="glibc-langpack-doi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806961" comment="glibc-langpack-dsb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806962" comment="glibc-langpack-dv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806963" comment="glibc-langpack-dz-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806964" comment="glibc-langpack-el-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806965" comment="glibc-langpack-en-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806966" comment="glibc-langpack-eo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806967" comment="glibc-langpack-es-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806968" comment="glibc-langpack-et-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806969" comment="glibc-langpack-eu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806970" comment="glibc-langpack-fa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806971" comment="glibc-langpack-ff-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806972" comment="glibc-langpack-fi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806973" comment="glibc-langpack-fil-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806974" comment="glibc-langpack-fo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806975" comment="glibc-langpack-fr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806976" comment="glibc-langpack-fur-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806977" comment="glibc-langpack-fy-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806978" comment="glibc-langpack-ga-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806979" comment="glibc-langpack-gd-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806980" comment="glibc-langpack-gez-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806981" comment="glibc-langpack-gl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806982" comment="glibc-langpack-gu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806983" comment="glibc-langpack-gv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806984" comment="glibc-langpack-ha-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806985" comment="glibc-langpack-hak-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806986" comment="glibc-langpack-he-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806987" comment="glibc-langpack-hi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806988" comment="glibc-langpack-hif-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806989" comment="glibc-langpack-hne-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806990" comment="glibc-langpack-hr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806991" comment="glibc-langpack-hsb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806992" comment="glibc-langpack-ht-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806993" comment="glibc-langpack-hu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806994" comment="glibc-langpack-hy-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806995" comment="glibc-langpack-ia-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806996" comment="glibc-langpack-id-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806997" comment="glibc-langpack-ig-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806998" comment="glibc-langpack-ik-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806999" comment="glibc-langpack-is-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807000" comment="glibc-langpack-it-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807001" comment="glibc-langpack-iu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807002" comment="glibc-langpack-ja-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807003" comment="glibc-langpack-ka-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807004" comment="glibc-langpack-kab-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807005" comment="glibc-langpack-kk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807006" comment="glibc-langpack-kl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807007" comment="glibc-langpack-km-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807008" comment="glibc-langpack-kn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807009" comment="glibc-langpack-ko-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807010" comment="glibc-langpack-kok-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807011" comment="glibc-langpack-ks-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807012" comment="glibc-langpack-ku-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807013" comment="glibc-langpack-kw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807014" comment="glibc-langpack-ky-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807015" comment="glibc-langpack-lb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807016" comment="glibc-langpack-lg-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807017" comment="glibc-langpack-li-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807018" comment="glibc-langpack-lij-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807019" comment="glibc-langpack-ln-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807020" comment="glibc-langpack-lo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807021" comment="glibc-langpack-lt-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807022" comment="glibc-langpack-lv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807023" comment="glibc-langpack-lzh-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807024" comment="glibc-langpack-mag-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807025" comment="glibc-langpack-mai-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807026" comment="glibc-langpack-mfe-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807027" comment="glibc-langpack-mg-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807028" comment="glibc-langpack-mhr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807029" comment="glibc-langpack-mi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807030" comment="glibc-langpack-miq-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807031" comment="glibc-langpack-mjw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807032" comment="glibc-langpack-mk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807033" comment="glibc-langpack-ml-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807034" comment="glibc-langpack-mn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807035" comment="glibc-langpack-mni-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807036" comment="glibc-langpack-mnw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807037" comment="glibc-langpack-mr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807038" comment="glibc-langpack-ms-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807039" comment="glibc-langpack-mt-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807040" comment="glibc-langpack-my-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807041" comment="glibc-langpack-nan-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807042" comment="glibc-langpack-nb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807043" comment="glibc-langpack-nds-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807044" comment="glibc-langpack-ne-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807045" comment="glibc-langpack-nhn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807046" comment="glibc-langpack-niu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807047" comment="glibc-langpack-nl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807048" comment="glibc-langpack-nn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807049" comment="glibc-langpack-nr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807050" comment="glibc-langpack-nso-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807051" comment="glibc-langpack-oc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807052" comment="glibc-langpack-om-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807053" comment="glibc-langpack-or-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807054" comment="glibc-langpack-os-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807055" comment="glibc-langpack-pa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807056" comment="glibc-langpack-pap-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807057" comment="glibc-langpack-pl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807058" comment="glibc-langpack-ps-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807059" comment="glibc-langpack-pt-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807060" comment="glibc-langpack-quz-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807061" comment="glibc-langpack-raj-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807062" comment="glibc-langpack-ro-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807063" comment="glibc-langpack-ru-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807064" comment="glibc-langpack-rw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807065" comment="glibc-langpack-sa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807066" comment="glibc-langpack-sah-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807067" comment="glibc-langpack-sat-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807068" comment="glibc-langpack-sc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807069" comment="glibc-langpack-sd-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807070" comment="glibc-langpack-se-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807071" comment="glibc-langpack-sgs-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807072" comment="glibc-langpack-shn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807073" comment="glibc-langpack-shs-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807074" comment="glibc-langpack-si-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807075" comment="glibc-langpack-sid-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807076" comment="glibc-langpack-sk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807077" comment="glibc-langpack-sl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807078" comment="glibc-langpack-sm-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807079" comment="glibc-langpack-so-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807080" comment="glibc-langpack-sq-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807081" comment="glibc-langpack-sr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807082" comment="glibc-langpack-ss-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807083" comment="glibc-langpack-st-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807084" comment="glibc-langpack-sv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807085" comment="glibc-langpack-sw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807086" comment="glibc-langpack-szl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807087" comment="glibc-langpack-ta-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807088" comment="glibc-langpack-tcy-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807089" comment="glibc-langpack-te-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807090" comment="glibc-langpack-tg-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807091" comment="glibc-langpack-th-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807092" comment="glibc-langpack-the-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807093" comment="glibc-langpack-ti-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807094" comment="glibc-langpack-tig-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807095" comment="glibc-langpack-tk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807096" comment="glibc-langpack-tl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807097" comment="glibc-langpack-tn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807098" comment="glibc-langpack-to-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807099" comment="glibc-langpack-tpi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807100" comment="glibc-langpack-tr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807101" comment="glibc-langpack-ts-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807102" comment="glibc-langpack-tt-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807103" comment="glibc-langpack-ug-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807104" comment="glibc-langpack-uk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807105" comment="glibc-langpack-unm-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807106" comment="glibc-langpack-ur-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807107" comment="glibc-langpack-uz-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807108" comment="glibc-langpack-ve-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807109" comment="glibc-langpack-vi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807110" comment="glibc-langpack-wa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807111" comment="glibc-langpack-wae-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807112" comment="glibc-langpack-wal-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807113" comment="glibc-langpack-wo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807114" comment="glibc-langpack-xh-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807115" comment="glibc-langpack-yi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807116" comment="glibc-langpack-yo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807117" comment="glibc-langpack-yue-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807118" comment="glibc-langpack-yuw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807119" comment="glibc-langpack-zh-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807120" comment="glibc-langpack-zu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807121" comment="glibc-locale-source-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807122" comment="glibc-minimal-langpack-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807123" comment="glibc-nss-devel-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807124" comment="glibc-static-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807125" comment="glibc-utils-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807126" comment="libnsl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807127" comment="nscd-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807128" comment="nss_db-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807129" comment="nss_hesiod-2.34-60.el9_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45285" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45285" ref_url="https://www.suse.com/security/cve/CVE-2023-45285" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017503.html" source="SUSE-SU"/>
    <description>
    Using go get to fetch a module with the ".git" suffix may unexpectedly fallback to the insecure "git://" protocol if the module is unavailable via the secure "https://" and "git+ssh://" protocols, even if GOINSECURE is not set for said module. This only affects users who are not using the module proxy and are fetching modules directly (i.e. GOPROXY=off).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-45285/">CVE-2023-45285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45285">CVE-2023-45285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217834">SUSE bug 1217834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849886" comment="go-toolset-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849887" comment="golang-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849888" comment="golang-bin-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849889" comment="golang-docs-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849890" comment="golang-misc-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849891" comment="golang-src-1.20.12-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849892" comment="golang-tests-1.20.12-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45287" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45287" ref_url="https://www.suse.com/security/cve/CVE-2023-45287" source="SUSE CVE"/>
    <description>
    Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-45287/">CVE-2023-45287 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45287">CVE-2023-45287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217842">SUSE bug 1217842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866624" comment="buildah-1.33.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866625" comment="buildah-tests-1.33.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866629" comment="containernetworking-plugins-1.4.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867213" comment="podman-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867214" comment="podman-docker-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867215" comment="podman-plugins-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867216" comment="podman-remote-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867217" comment="podman-tests-4.9.4-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871419" comment="runc-1.1.12-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868530" comment="skopeo-1.14.3-0.1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868531" comment="skopeo-tests-1.14.3-0.1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45288</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45288" ref_url="https://www.suse.com/security/cve/CVE-2023-45288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3155-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-February/038343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024484.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14399-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4SYE7WTKUNXNTHQW42V7UBGJBEQBHRTP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14400-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4ZZCCVQLIJ7QABQ7SEQNIICQGIOXKWPA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14714-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NNZGCIESABPBXHMTGTQFNKICWRW67ACD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14744-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XZS7XT62LC6S42NWSITGMUS7QX5RQGAX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15075-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HCWJWNWXOFGQ73SBS66L5ZCYZ5J7FOQY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLZDGCKYKLU6M3753VM7UMQPAHBYR63F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHSZPRYNEYI2KIIJZMPPNQRPAMZ5ILGP/" source="SUSE-SU"/>
    <description>
    An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames. Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed. This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send. The fix sets a limit on the amount of excess header frames we will process before closing a connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-45288/">CVE-2023-45288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45288">CVE-2023-45288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221400">SUSE bug 1221400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866780" comment="git-lfs-3.4.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866758" comment="go-toolset-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866759" comment="golang-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866760" comment="golang-bin-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866761" comment="golang-docs-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866762" comment="golang-misc-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866763" comment="golang-src-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866764" comment="golang-tests-1.21.9-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45289</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45289" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45289" ref_url="https://www.suse.com/security/cve/CVE-2023-45289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
    <description>
    When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45289/">CVE-2023-45289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45289">CVE-2023-45289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221000">SUSE bug 1221000</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866780" comment="git-lfs-3.4.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866758" comment="go-toolset-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866759" comment="golang-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866760" comment="golang-bin-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866761" comment="golang-docs-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866762" comment="golang-misc-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866763" comment="golang-src-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866764" comment="golang-tests-1.21.9-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45290</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45290" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45290" ref_url="https://www.suse.com/security/cve/CVE-2023-45290" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6969" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8038" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
    <description>
    When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45290/">CVE-2023-45290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45290">CVE-2023-45290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221001">SUSE bug 1221001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867063" comment="buildah-1.33.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867064" comment="buildah-tests-1.33.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872568" comment="containernetworking-plugins-1.4.0-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866780" comment="git-lfs-3.4.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866758" comment="go-toolset-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866759" comment="golang-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866760" comment="golang-bin-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866761" comment="golang-docs-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866762" comment="golang-misc-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866763" comment="golang-src-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866764" comment="golang-tests-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869921" comment="gvisor-tap-vsock-0.7.3-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867234" comment="podman-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867235" comment="podman-docker-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867236" comment="podman-plugins-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867237" comment="podman-remote-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867238" comment="podman-tests-4.9.4-4.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4535" ref_url="https://www.suse.com/security/cve/CVE-2023-4535" source="SUSE CVE"/>
    <description>
    An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-27"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-4535/">CVE-2023-4535 at SUSE</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4535">CVE-2023-4535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215763">SUSE bug 1215763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818054" comment="opensc-0.23.0-3.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45539" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45539" ref_url="https://www.suse.com/security/cve/CVE-2023-45539" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8849" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035891.html" source="SUSE-SU"/>
    <description>
    HAProxy before 2.8.2 accepts # as part of the URI component, which might allow remote attackers to obtain sensitive information or have unspecified other impact upon misinterpretation of a path_end rule, such as routing index.html#.png to a static server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-09"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45539/">CVE-2023-45539 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45539">CVE-2023-45539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217653">SUSE bug 1217653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850289" comment="haproxy-2.4.22-3.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45648" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45648" ref_url="https://www.suse.com/security/cve/CVE-2023-45648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017913.html" source="SUSE-SU"/>
    <description>
    Improper Input Validation vulnerability in Apache Tomcat.Tomcat  from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially 
crafted, invalid trailer header could cause Tomcat to treat a single 
request as multiple requests leading to the possibility of request 
smuggling when behind a reverse proxy.

Older, EOL versions may also be affected.


Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-06"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45648/">CVE-2023-45648 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45648">CVE-2023-45648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216118">SUSE bug 1216118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849878" comment="tomcat-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849879" comment="tomcat-admin-webapps-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849880" comment="tomcat-docs-webapp-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849881" comment="tomcat-el-3.0-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849882" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849883" comment="tomcat-lib-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849884" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849885" comment="tomcat-webapps-9.0.62-37.el9_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4573" ref_url="https://www.suse.com/security/cve/CVE-2023-4573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When receiving rendering data over IPC `mStream` could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4573/">CVE-2023-4573 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4573">CVE-2023-4573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45733" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45733" ref_url="https://www.suse.com/security/cve/CVE-2023-45733" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021372.html" source="SUSE-SU"/>
    <description>
    Hardware logic contains race conditions in some Intel(R) Processors may allow an authenticated user to potentially enable partial information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45733/">CVE-2023-45733 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-45733">CVE-2023-45733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954004" comment="microcode_ctl-20240910-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4574" ref_url="https://www.suse.com/security/cve/CVE-2023-4574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4574/">CVE-2023-4574 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4574">CVE-2023-4574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4575" ref_url="https://www.suse.com/security/cve/CVE-2023-4575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4575/">CVE-2023-4575 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4575">CVE-2023-4575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4577" ref_url="https://www.suse.com/security/cve/CVE-2023-4577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When `UpdateRegExpStatics` attempted to access `initialStringHeap` it could already have been garbage collected prior to entering the function, which could potentially have led to an exploitable crash. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4577/">CVE-2023-4577 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4577">CVE-2023-4577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4578" ref_url="https://www.suse.com/security/cve/CVE-2023-4578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When calling `JS::CheckRegExpSyntax` a Syntax Error could have been set which would end in calling `convertToRuntimeErrorAndClear`. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4578/">CVE-2023-4578 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4578">CVE-2023-4578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4580" ref_url="https://www.suse.com/security/cve/CVE-2023-4580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Push notifications stored on disk in private browsing mode were not being encrypted potentially allowing the leak of sensitive information. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4580/">CVE-2023-4580 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4580">CVE-2023-4580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45802" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45802" ref_url="https://www.suse.com/security/cve/CVE-2023-45802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019822.html" source="SUSE-SU"/>
    <description>
    When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.

This was found by the reporter during testing of  CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.

Users are recommended to upgrade to version 2.4.58, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45802/">CVE-2023-45802 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45802">CVE-2023-45802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216423">SUSE bug 1216423</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866716" comment="mod_http2-2.0.26-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45803" ref_url="https://www.suse.com/security/cve/CVE-2023-45803" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000678.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4352-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4356-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035989.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-45803/">CVE-2023-45803 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45803">CVE-2023-45803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216377">SUSE bug 1216377</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866430" comment="fence-agents-aliyun-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866431" comment="fence-agents-all-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866432" comment="fence-agents-amt-ws-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866433" comment="fence-agents-apc-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866434" comment="fence-agents-apc-snmp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866435" comment="fence-agents-aws-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866436" comment="fence-agents-azure-arm-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866437" comment="fence-agents-bladecenter-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866438" comment="fence-agents-brocade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866439" comment="fence-agents-cisco-mds-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866440" comment="fence-agents-cisco-ucs-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866441" comment="fence-agents-common-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866442" comment="fence-agents-compute-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866443" comment="fence-agents-drac5-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866444" comment="fence-agents-eaton-snmp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866445" comment="fence-agents-emerson-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866446" comment="fence-agents-eps-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866447" comment="fence-agents-gce-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866448" comment="fence-agents-heuristics-ping-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866449" comment="fence-agents-hpblade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866450" comment="fence-agents-ibm-powervs-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866451" comment="fence-agents-ibm-vpc-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866452" comment="fence-agents-ibmblade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866453" comment="fence-agents-ifmib-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866454" comment="fence-agents-ilo-moonshot-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866455" comment="fence-agents-ilo-mp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866456" comment="fence-agents-ilo-ssh-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866457" comment="fence-agents-ilo2-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866458" comment="fence-agents-intelmodular-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866459" comment="fence-agents-ipdu-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866460" comment="fence-agents-ipmilan-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866461" comment="fence-agents-kdump-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866462" comment="fence-agents-kubevirt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866463" comment="fence-agents-mpath-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866464" comment="fence-agents-openstack-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866465" comment="fence-agents-redfish-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866466" comment="fence-agents-rhevm-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866467" comment="fence-agents-rsa-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866468" comment="fence-agents-rsb-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866469" comment="fence-agents-sbd-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866470" comment="fence-agents-scsi-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866471" comment="fence-agents-virsh-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866472" comment="fence-agents-vmware-rest-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866473" comment="fence-agents-vmware-soap-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866474" comment="fence-agents-wti-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866475" comment="fence-virt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866476" comment="fence-virtd-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866477" comment="fence-virtd-cpg-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866478" comment="fence-virtd-libvirt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866479" comment="fence-virtd-multicast-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866480" comment="fence-virtd-serial-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866481" comment="fence-virtd-tcp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866482" comment="ha-cloud-support-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845159" comment="python3-urllib3-1.26.5-3.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958547" comment="python3.11-urllib3-1.26.12-2.el9_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4581" ref_url="https://www.suse.com/security/cve/CVE-2023-4581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Excel `.xll` add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4581/">CVE-2023-4581 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4581">CVE-2023-4581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4583" ref_url="https://www.suse.com/security/cve/CVE-2023-4583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When checking if the Browsing Context had been discarded in `HttpBaseChannel`, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4583/">CVE-2023-4583 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4583">CVE-2023-4583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4584" ref_url="https://www.suse.com/security/cve/CVE-2023-4584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1, Thunderbird 102.14, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 102.15, Firefox ESR &lt; 115.2, Thunderbird &lt; 102.15, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4584/">CVE-2023-4584 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4584">CVE-2023-4584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4585" ref_url="https://www.suse.com/security/cve/CVE-2023-4585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.2, and Thunderbird &lt; 115.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4585/">CVE-2023-4585 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4585">CVE-2023-4585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214606">SUSE bug 1214606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806810" comment="firefox-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806811" comment="firefox-x11-102.15.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806809" comment="thunderbird-102.15.0-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45863" ref_url="https://www.suse.com/security/cve/CVE-2023-45863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-45863/">CVE-2023-45863 at SUSE</cve>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45863">CVE-2023-45863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216058">SUSE bug 1216058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45866" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45866" ref_url="https://www.suse.com/security/cve/CVE-2023-45866" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11154" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000677.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03277-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03590-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20804-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023766.html" source="SUSE-SU"/>
    <description>
    Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases, a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-45866/">CVE-2023-45866 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45866">CVE-2023-45866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217877">SUSE bug 1217877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45871" ref_url="https://www.suse.com/security/cve/CVE-2023-45871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-45871/">CVE-2023-45871 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45871">CVE-2023-45871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216259">SUSE bug 1216259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816058" comment="bpftool-7.2.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816059" comment="kernel-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816060" comment="kernel-abi-stablelists-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816061" comment="kernel-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816062" comment="kernel-cross-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816063" comment="kernel-debug-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816064" comment="kernel-debug-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816067" comment="kernel-debug-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816068" comment="kernel-debug-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816069" comment="kernel-debug-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816070" comment="kernel-debug-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816073" comment="kernel-doc-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816074" comment="kernel-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816075" comment="kernel-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816076" comment="kernel-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816077" comment="kernel-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816078" comment="kernel-tools-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816079" comment="kernel-tools-libs-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816081" comment="kernel-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816082" comment="libperf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816083" comment="perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816084" comment="python3-perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816085" comment="rtla-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816086" comment="rv-5.14.0-362.13.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202345897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-45897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-45897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45897" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-45897" ref_url="https://www.suse.com/security/cve/CVE-2023-45897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017041.html" source="SUSE-SU"/>
    <description>
    exfatprogs before 1.2.2 allows out-of-bounds memory access, such as in read_file_dentry_set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-45897/">CVE-2023-45897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-45897">CVE-2023-45897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216701">SUSE bug 1216701</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866728" comment="exfatprogs-1.2.2-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46103</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46103" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46103" ref_url="https://www.suse.com/security/cve/CVE-2023-46103" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021372.html" source="SUSE-SU"/>
    <description>
    Sequence of processor instructions leads to unexpected behavior in Intel(R) Core(TM) Ultra Processors may allow an authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46103/">CVE-2023-46103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46103">CVE-2023-46103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224277">SUSE bug 1224277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954004" comment="microcode_ctl-20240910-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46218</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46218" ref_url="https://www.suse.com/security/cve/CVE-2023-46218" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4029-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033029.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017305.html" source="SUSE-SU"/>
    <description>
    This flaw allows a malicious HTTP server to set "super cookies" in curl that
are then passed back to more origins than what is otherwise allowed or
possible. This allows a site to set cookies that then would get sent to
different and unrelated sites and domains.

It could do this by exploiting a mixed case flaw in curl's function that
verifies a given cookie domain against the Public Suffix List (PSL). For
example a cookie could be set with `domain=co.UK` when the URL used a lower
case hostname `curl.co.uk`, even though `co.uk` is listed as a PSL domain.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-07"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-46218/">CVE-2023-46218 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46218">CVE-2023-46218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217573">SUSE bug 1217573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849945" comment="curl-7.76.1-26.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849946" comment="curl-minimal-7.76.1-26.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849947" comment="libcurl-7.76.1-26.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849948" comment="libcurl-devel-7.76.1-26.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849949" comment="libcurl-minimal-7.76.1-26.el9_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4622" ref_url="https://www.suse.com/security/cve/CVE-2023-4622" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4795-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's af_unix component can be exploited to achieve local privilege escalation.

The unix_stream_sendpage() function tries to add data to the last skb in the peer's recv queue without locking the queue. Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free.

We recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4622/">CVE-2023-4622 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4622">CVE-2023-4622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215117">SUSE bug 1215117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215442">SUSE bug 1215442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219699">SUSE bug 1219699</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4623" ref_url="https://www.suse.com/security/cve/CVE-2023-4623" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032577.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's net/sched: sch_hfsc (HFSC qdisc traffic control) component can be exploited to achieve local privilege escalation.

If a class with a link-sharing curve (i.e. with the HFSC_FSC flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf(). This leaves a dangling pointer that can cause a use-after-free.

We recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4623/">CVE-2023-4623 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4623">CVE-2023-4623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215115">SUSE bug 1215115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215440">SUSE bug 1215440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217444">SUSE bug 1217444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217531">SUSE bug 1217531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219698">SUSE bug 1219698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46233" ref_url="https://www.suse.com/security/cve/CVE-2023-46233" source="SUSE CVE"/>
    <description>
    crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-46233/">CVE-2023-46233 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46233">CVE-2023-46233 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009819673" comment="aspnetcore-runtime-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872202" comment="aspnetcore-runtime-7.0-7.0.16-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819674" comment="aspnetcore-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872203" comment="aspnetcore-targeting-pack-7.0-7.0.16-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819675" comment="dotnet-apphost-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872204" comment="dotnet-apphost-pack-7.0-7.0.16-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819676" comment="dotnet-hostfxr-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872205" comment="dotnet-hostfxr-7.0-7.0.16-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819677" comment="dotnet-runtime-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872206" comment="dotnet-runtime-7.0-7.0.16-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819678" comment="dotnet-sdk-6.0-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819679" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872207" comment="dotnet-sdk-7.0-7.0.116-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872208" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.116-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819680" comment="dotnet-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872209" comment="dotnet-targeting-pack-7.0-7.0.16-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819681" comment="dotnet-templates-6.0-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872210" comment="dotnet-templates-7.0-7.0.116-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46316</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46316" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46316" ref_url="https://www.suse.com/security/cve/CVE-2023-46316" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3924-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/032984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035983.html" source="SUSE-SU"/>
    <description>
    In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3, the wrapper scripts do not properly parse command lines.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46316/">CVE-2023-46316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46316">CVE-2023-46316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216591">SUSE bug 1216591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866744" comment="traceroute-2.1.0-18.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4641" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4641" ref_url="https://www.suse.com/security/cve/CVE-2023-4641" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:2968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:1228-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1007-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036530.html" source="SUSE-SU"/>
    <description>
    A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-19"/>
	<updated date="2026-04-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4641/">CVE-2023-4641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4641">CVE-2023-4641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214806">SUSE bug 1214806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009811167" comment="shadow-utils-4.9-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811168" comment="shadow-utils-subid-4.9-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811169" comment="shadow-utils-subid-devel-4.9-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46589</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46589" ref_url="https://www.suse.com/security/cve/CVE-2023-46589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single 
request as multiple requests leading to the possibility of request 
smuggling when behind a reverse proxy.


Older, EOL versions may also be affected.


Users are recommended to upgrade to version 11.0.0-M11  onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46589/">CVE-2023-46589 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46589">CVE-2023-46589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217649">SUSE bug 1217649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851381" comment="tomcat-9.0.62-37.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851382" comment="tomcat-admin-webapps-9.0.62-37.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851383" comment="tomcat-docs-webapp-9.0.62-37.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851384" comment="tomcat-el-3.0-api-9.0.62-37.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851385" comment="tomcat-jsp-2.3-api-9.0.62-37.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851386" comment="tomcat-lib-9.0.62-37.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851387" comment="tomcat-servlet-4.0-api-9.0.62-37.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851388" comment="tomcat-webapps-9.0.62-37.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46724" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46724" ref_url="https://www.suse.com/security/cve/CVE-2023-46724" source="SUSE CVE"/>
		<reference ref_id="GHSA-73m6-jm96-c6r3" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-73m6-jm96-c6r3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017008.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46724/">CVE-2023-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46724">CVE-2023-46724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216803">SUSE bug 1216803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819046" comment="squid-5.5-6.el9_3.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46728" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46728" ref_url="https://www.suse.com/security/cve/CVE-2023-46728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017237.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a NULL pointer dereference bug Squid is vulnerable to a Denial of Service attack against Squid's Gopher gateway. The gopher protocol is always available and enabled in Squid prior to Squid 6.0.1. Responses triggering this bug are possible to be received from any gopher server, even those without malicious intent. Gopher support has been removed in Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should reject all gopher URL requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46728/">CVE-2023-46728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46728">CVE-2023-46728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216926">SUSE bug 1216926</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819046" comment="squid-5.5-6.el9_3.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46751" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46751" ref_url="https://www.suse.com/security/cve/CVE-2023-46751" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4362" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001092.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017498.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the function gdev_prn_open_printer_seekable() in Artifex Ghostscript through 10.02.0 allows remote attackers to crash the application via a dangling pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46751/">CVE-2023-46751 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46751">CVE-2023-46751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217871">SUSE bug 1217871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983964" comment="ghostscript-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983965" comment="ghostscript-doc-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983966" comment="ghostscript-tools-dvipdf-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983967" comment="ghostscript-tools-fonts-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983968" comment="ghostscript-tools-printing-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983969" comment="ghostscript-x11-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983970" comment="libgs-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983971" comment="libgs-devel-9.54.0-18.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46752" ref_url="https://www.suse.com/security/cve/CVE-2023-46752" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46752/">CVE-2023-46752 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46752">CVE-2023-46752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216627">SUSE bug 1216627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46753" ref_url="https://www.suse.com/security/cve/CVE-2023-46753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-18"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46753/">CVE-2023-46753 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46753">CVE-2023-46753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216626">SUSE bug 1216626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867211" comment="frr-8.5.3-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867212" comment="frr-selinux-8.5.3-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46809" ref_url="https://www.suse.com/security/cve/CVE-2023-46809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018074.html" source="SUSE-SU"/>
    <description>
    Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46809/">CVE-2023-46809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-46809">CVE-2023-46809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219997">SUSE bug 1219997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009853717" comment="nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853718" comment="nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853719" comment="nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853720" comment="nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853724" comment="npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46813" ref_url="https://www.suse.com/security/cve/CVE-2023-46813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.5.9, exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-46813/">CVE-2023-46813 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46813">CVE-2023-46813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212649">SUSE bug 1212649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216896">SUSE bug 1216896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46846</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46846" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46846" ref_url="https://www.suse.com/security/cve/CVE-2023-46846" source="SUSE CVE"/>
		<reference ref_id="GHSA-j83v-w3p4-5cqh" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-j83v-w3p4-5cqh" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017008.html" source="SUSE-SU"/>
    <description>
    SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-05"/>
	<updated date="2025-09-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-46846/">CVE-2023-46846 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46846">CVE-2023-46846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216500">SUSE bug 1216500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811245" comment="squid-5.5-6.el9_3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46847</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46847" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46847" ref_url="https://www.suse.com/security/cve/CVE-2023-46847" source="SUSE CVE"/>
		<reference ref_id="GHSA-phqj-m8gv-cq4g" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-phqj-m8gv-cq4g" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017008.html" source="SUSE-SU"/>
    <description>
    Squid is vulnerable to a Denial of Service,  where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46847/">CVE-2023-46847 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46847">CVE-2023-46847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216495">SUSE bug 1216495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811245" comment="squid-5.5-6.el9_3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46848" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46848" ref_url="https://www.suse.com/security/cve/CVE-2023-46848" source="SUSE CVE"/>
		<reference ref_id="GHSA-2g3c-pg7q-g59w" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-2g3c-pg7q-g59w" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017008.html" source="SUSE-SU"/>
    <description>
    Squid is vulnerable to Denial of Service,  where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46848/">CVE-2023-46848 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46848">CVE-2023-46848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216498">SUSE bug 1216498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009811245" comment="squid-5.5-6.el9_3.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202346862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-46862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-46862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-46862" ref_url="https://www.suse.com/security/cve/CVE-2023-46862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel through 6.5.9. During a race with SQ thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo NULL pointer dereference can occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-46862/">CVE-2023-46862 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-46862">CVE-2023-46862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216693">SUSE bug 1216693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4692" ref_url="https://www.suse.com/security/cve/CVE-2023-4692" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-06-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4692/">CVE-2023-4692 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4692">CVE-2023-4692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215935">SUSE bug 1215935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217434">SUSE bug 1217434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217555">SUSE bug 1217555</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219709">SUSE bug 1219709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221589">SUSE bug 1221589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227915">SUSE bug 1227915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872294" comment="grub2-common-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872295" comment="grub2-efi-x64-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872296" comment="grub2-efi-x64-cdboot-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872297" comment="grub2-efi-x64-modules-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872298" comment="grub2-pc-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872299" comment="grub2-pc-modules-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872300" comment="grub2-tools-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872301" comment="grub2-tools-efi-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872302" comment="grub2-tools-extra-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872303" comment="grub2-tools-minimal-2.06-77.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4693" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4693" ref_url="https://www.suse.com/security/cve/CVE-2023-4693" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-06-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-4693/">CVE-2023-4693 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4693">CVE-2023-4693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215936">SUSE bug 1215936</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872294" comment="grub2-common-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872295" comment="grub2-efi-x64-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872296" comment="grub2-efi-x64-cdboot-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872297" comment="grub2-efi-x64-modules-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872298" comment="grub2-pc-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872299" comment="grub2-pc-modules-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872300" comment="grub2-tools-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872301" comment="grub2-tools-efi-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872302" comment="grub2-tools-extra-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872303" comment="grub2-tools-minimal-2.06-77.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202347038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-47038</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-47038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47038" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-47038" ref_url="https://www.suse.com/security/cve/CVE-2023-47038" source="SUSE CVE"/>
    <description>
    A vulnerability was found in perl 5.30.0 through 5.38.0. This issue occurs when a crafted regular expression is compiled by perl, which can allow an attacker controlled byte buffer overflow in a heap allocated buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-47038/">CVE-2023-47038 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47038">CVE-2023-47038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217084">SUSE bug 1217084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866524" comment="perl-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866525" comment="perl-Attribute-Handlers-1.01-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866526" comment="perl-AutoLoader-5.74-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866527" comment="perl-AutoSplit-5.74-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866528" comment="perl-B-1.80-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866529" comment="perl-Benchmark-1.23-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866530" comment="perl-Class-Struct-0.66-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866531" comment="perl-Config-Extensions-0.03-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866532" comment="perl-DBM_Filter-0.06-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866533" comment="perl-Devel-Peek-1.28-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866534" comment="perl-Devel-SelfStubber-1.06-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866535" comment="perl-DirHandle-1.05-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866536" comment="perl-Dumpvalue-2.27-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866537" comment="perl-DynaLoader-1.47-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866538" comment="perl-English-1.11-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866539" comment="perl-Errno-1.30-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866540" comment="perl-ExtUtils-Constant-0.25-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866541" comment="perl-ExtUtils-Embed-1.35-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866542" comment="perl-ExtUtils-Miniperl-1.09-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866543" comment="perl-Fcntl-1.13-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866544" comment="perl-File-Basename-2.85-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866545" comment="perl-File-Compare-1.100.600-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866546" comment="perl-File-Copy-2.34-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866547" comment="perl-File-DosGlob-1.12-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866548" comment="perl-File-Find-1.37-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866549" comment="perl-File-stat-1.09-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866550" comment="perl-FileCache-1.10-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866551" comment="perl-FileHandle-2.03-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866552" comment="perl-FindBin-1.51-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866553" comment="perl-GDBM_File-1.18-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866554" comment="perl-Getopt-Std-1.12-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866555" comment="perl-Hash-Util-0.23-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866556" comment="perl-Hash-Util-FieldHash-1.20-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866557" comment="perl-I18N-Collate-1.02-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866558" comment="perl-I18N-LangTags-0.44-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866559" comment="perl-I18N-Langinfo-0.19-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866560" comment="perl-IO-1.43-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866561" comment="perl-IPC-Open3-1.21-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866562" comment="perl-Locale-Maketext-Simple-0.21-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866563" comment="perl-Math-Complex-1.59-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866564" comment="perl-Memoize-1.03-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866565" comment="perl-Module-Loaded-0.08-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866566" comment="perl-NDBM_File-1.15-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866567" comment="perl-NEXT-0.67-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866568" comment="perl-Net-1.02-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866569" comment="perl-ODBM_File-1.16-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866570" comment="perl-Opcode-1.48-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866571" comment="perl-POSIX-1.94-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866572" comment="perl-Pod-Functions-1.13-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866573" comment="perl-Pod-Html-1.25-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866574" comment="perl-Safe-2.41-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866575" comment="perl-Search-Dict-1.07-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866576" comment="perl-SelectSaver-1.02-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866577" comment="perl-SelfLoader-1.26-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866578" comment="perl-Symbol-1.08-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866579" comment="perl-Sys-Hostname-1.23-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866580" comment="perl-Term-Complete-1.403-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866581" comment="perl-Term-ReadLine-1.17-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866582" comment="perl-Test-1.31-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866583" comment="perl-Text-Abbrev-1.02-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866584" comment="perl-Thread-3.05-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866585" comment="perl-Thread-Semaphore-2.13-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866586" comment="perl-Tie-4.6-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866587" comment="perl-Tie-File-1.06-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866588" comment="perl-Tie-Memoize-1.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866589" comment="perl-Time-1.03-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866590" comment="perl-Time-Piece-1.3401-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866591" comment="perl-Unicode-UCD-0.75-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866592" comment="perl-User-pwent-1.03-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866593" comment="perl-autouse-1.11-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866594" comment="perl-base-2.27-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866595" comment="perl-blib-1.07-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866596" comment="perl-debugger-1.56-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866597" comment="perl-deprecate-0.04-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866598" comment="perl-devel-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866599" comment="perl-diagnostics-1.37-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866600" comment="perl-doc-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866601" comment="perl-encoding-warnings-0.13-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866602" comment="perl-fields-2.27-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866603" comment="perl-filetest-1.03-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866604" comment="perl-if-0.60.800-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866605" comment="perl-interpreter-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866606" comment="perl-less-0.03-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866607" comment="perl-lib-0.65-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866608" comment="perl-libnetcfg-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866609" comment="perl-libs-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866610" comment="perl-locale-1.09-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866611" comment="perl-macros-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866612" comment="perl-meta-notation-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866613" comment="perl-mro-1.23-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866614" comment="perl-open-1.12-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866615" comment="perl-overload-1.31-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866616" comment="perl-overloading-0.02-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866617" comment="perl-ph-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866618" comment="perl-sigtrap-1.09-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866619" comment="perl-sort-2.04-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866620" comment="perl-subs-1.03-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866621" comment="perl-utils-5.32.1-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866622" comment="perl-vars-1.05-481.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866623" comment="perl-vmsish-1.04-481.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202347234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-47234</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-47234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47234" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-47234" ref_url="https://www.suse.com/security/cve/CVE-2023-47234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47234/">CVE-2023-47234 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47234">CVE-2023-47234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216897">SUSE bug 1216897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872198" comment="frr-8.3.1-11.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872199" comment="frr-selinux-8.3.1-11.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202347235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-47235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-47235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-47235" ref_url="https://www.suse.com/security/cve/CVE-2023-47235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019857.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-47235/">CVE-2023-47235 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-47235">CVE-2023-47235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216896">SUSE bug 1216896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872198" comment="frr-8.3.1-11.el9_3.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872199" comment="frr-selinux-8.3.1-11.el9_3.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4727" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4727" ref_url="https://www.suse.com/security/cve/CVE-2023-4727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4222" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000001.html" source="SUSE-SU"/>
    <description>
    A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4727/">CVE-2023-4727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-4727">CVE-2023-4727 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870170" comment="idm-pki-acme-11.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870171" comment="idm-pki-base-11.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870172" comment="idm-pki-ca-11.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870173" comment="idm-pki-est-11.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870174" comment="idm-pki-java-11.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870175" comment="idm-pki-kra-11.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870176" comment="idm-pki-server-11.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870177" comment="idm-pki-tools-11.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870178" comment="python3-idm-pki-11.5.0-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4752" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4752" ref_url="https://www.suse.com/security/cve/CVE-2023-4752" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7440" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017223.html" source="SUSE-SU"/>
    <description>
    Use After Free in GitHub repository vim/vim prior to 9.0.1858.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4752/">CVE-2023-4752 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4752">CVE-2023-4752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215006">SUSE bug 1215006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217411">SUSE bug 1217411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218353">SUSE bug 1218353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221583">SUSE bug 1221583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984036" comment="vim-X11-8.2.2637-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984037" comment="vim-common-8.2.2637-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984038" comment="vim-enhanced-8.2.2637-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984039" comment="vim-filesystem-8.2.2637-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984040" comment="vim-minimal-8.2.2637-22.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4806" ref_url="https://www.suse.com/security/cve/CVE-2023-4806" source="SUSE CVE"/>
    <description>
    A flaw has been identified in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4806/">CVE-2023-4806 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4806">CVE-2023-4806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215281">SUSE bug 1215281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215714">SUSE bug 1215714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053660" comment="glibc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053661" comment="glibc-all-langpacks-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053662" comment="glibc-benchtests-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053663" comment="glibc-common-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053664" comment="glibc-devel-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053665" comment="glibc-doc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053666" comment="glibc-gconv-extra-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053667" comment="glibc-headers-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053668" comment="glibc-langpack-aa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053669" comment="glibc-langpack-af-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053670" comment="glibc-langpack-agr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053671" comment="glibc-langpack-ak-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053672" comment="glibc-langpack-am-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053673" comment="glibc-langpack-an-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053674" comment="glibc-langpack-anp-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053675" comment="glibc-langpack-ar-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053676" comment="glibc-langpack-as-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053677" comment="glibc-langpack-ast-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053678" comment="glibc-langpack-ayc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053679" comment="glibc-langpack-az-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053680" comment="glibc-langpack-be-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053681" comment="glibc-langpack-bem-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053682" comment="glibc-langpack-ber-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053683" comment="glibc-langpack-bg-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053684" comment="glibc-langpack-bhb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053685" comment="glibc-langpack-bho-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053686" comment="glibc-langpack-bi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053687" comment="glibc-langpack-bn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053688" comment="glibc-langpack-bo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053689" comment="glibc-langpack-br-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053690" comment="glibc-langpack-brx-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053691" comment="glibc-langpack-bs-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053692" comment="glibc-langpack-byn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053693" comment="glibc-langpack-ca-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053694" comment="glibc-langpack-ce-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053695" comment="glibc-langpack-chr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053696" comment="glibc-langpack-ckb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053697" comment="glibc-langpack-cmn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053698" comment="glibc-langpack-crh-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053699" comment="glibc-langpack-cs-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053700" comment="glibc-langpack-csb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053701" comment="glibc-langpack-cv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053702" comment="glibc-langpack-cy-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053703" comment="glibc-langpack-da-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053704" comment="glibc-langpack-de-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053705" comment="glibc-langpack-doi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053706" comment="glibc-langpack-dsb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053707" comment="glibc-langpack-dv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053708" comment="glibc-langpack-dz-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053709" comment="glibc-langpack-el-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053710" comment="glibc-langpack-en-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053711" comment="glibc-langpack-eo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053712" comment="glibc-langpack-es-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053713" comment="glibc-langpack-et-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053714" comment="glibc-langpack-eu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053715" comment="glibc-langpack-fa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053716" comment="glibc-langpack-ff-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053717" comment="glibc-langpack-fi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053718" comment="glibc-langpack-fil-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053719" comment="glibc-langpack-fo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053720" comment="glibc-langpack-fr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053721" comment="glibc-langpack-fur-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053722" comment="glibc-langpack-fy-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053723" comment="glibc-langpack-ga-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053724" comment="glibc-langpack-gd-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053725" comment="glibc-langpack-gez-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053726" comment="glibc-langpack-gl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053727" comment="glibc-langpack-gu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053728" comment="glibc-langpack-gv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053729" comment="glibc-langpack-ha-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053730" comment="glibc-langpack-hak-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053731" comment="glibc-langpack-he-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053732" comment="glibc-langpack-hi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053733" comment="glibc-langpack-hif-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053734" comment="glibc-langpack-hne-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053735" comment="glibc-langpack-hr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053736" comment="glibc-langpack-hsb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053737" comment="glibc-langpack-ht-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053738" comment="glibc-langpack-hu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053739" comment="glibc-langpack-hy-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053740" comment="glibc-langpack-ia-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053741" comment="glibc-langpack-id-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053742" comment="glibc-langpack-ig-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053743" comment="glibc-langpack-ik-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053744" comment="glibc-langpack-is-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053745" comment="glibc-langpack-it-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053746" comment="glibc-langpack-iu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053747" comment="glibc-langpack-ja-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053748" comment="glibc-langpack-ka-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053749" comment="glibc-langpack-kab-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053750" comment="glibc-langpack-kk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053751" comment="glibc-langpack-kl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053752" comment="glibc-langpack-km-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053753" comment="glibc-langpack-kn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053754" comment="glibc-langpack-ko-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053755" comment="glibc-langpack-kok-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053756" comment="glibc-langpack-ks-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053757" comment="glibc-langpack-ku-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053758" comment="glibc-langpack-kw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053759" comment="glibc-langpack-ky-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053760" comment="glibc-langpack-lb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053761" comment="glibc-langpack-lg-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053762" comment="glibc-langpack-li-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053763" comment="glibc-langpack-lij-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053764" comment="glibc-langpack-ln-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053765" comment="glibc-langpack-lo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053766" comment="glibc-langpack-lt-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053767" comment="glibc-langpack-lv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053768" comment="glibc-langpack-lzh-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053769" comment="glibc-langpack-mag-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053770" comment="glibc-langpack-mai-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053771" comment="glibc-langpack-mfe-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053772" comment="glibc-langpack-mg-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053773" comment="glibc-langpack-mhr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053774" comment="glibc-langpack-mi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053775" comment="glibc-langpack-miq-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053776" comment="glibc-langpack-mjw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053777" comment="glibc-langpack-mk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053778" comment="glibc-langpack-ml-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053779" comment="glibc-langpack-mn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053780" comment="glibc-langpack-mni-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053781" comment="glibc-langpack-mnw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053782" comment="glibc-langpack-mr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053783" comment="glibc-langpack-ms-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053784" comment="glibc-langpack-mt-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053785" comment="glibc-langpack-my-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053786" comment="glibc-langpack-nan-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053787" comment="glibc-langpack-nb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053788" comment="glibc-langpack-nds-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053789" comment="glibc-langpack-ne-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053790" comment="glibc-langpack-nhn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053791" comment="glibc-langpack-niu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053792" comment="glibc-langpack-nl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053793" comment="glibc-langpack-nn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053794" comment="glibc-langpack-nr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053795" comment="glibc-langpack-nso-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053796" comment="glibc-langpack-oc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053797" comment="glibc-langpack-om-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053798" comment="glibc-langpack-or-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053799" comment="glibc-langpack-os-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053800" comment="glibc-langpack-pa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053801" comment="glibc-langpack-pap-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053802" comment="glibc-langpack-pl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053803" comment="glibc-langpack-ps-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053804" comment="glibc-langpack-pt-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053805" comment="glibc-langpack-quz-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053806" comment="glibc-langpack-raj-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053807" comment="glibc-langpack-ro-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053808" comment="glibc-langpack-ru-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053809" comment="glibc-langpack-rw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053810" comment="glibc-langpack-sa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053811" comment="glibc-langpack-sah-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053812" comment="glibc-langpack-sat-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053813" comment="glibc-langpack-sc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053814" comment="glibc-langpack-sd-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053815" comment="glibc-langpack-se-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053816" comment="glibc-langpack-sgs-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053817" comment="glibc-langpack-shn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053818" comment="glibc-langpack-shs-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053819" comment="glibc-langpack-si-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053820" comment="glibc-langpack-sid-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053821" comment="glibc-langpack-sk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053822" comment="glibc-langpack-sl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053823" comment="glibc-langpack-sm-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053824" comment="glibc-langpack-so-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053825" comment="glibc-langpack-sq-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053826" comment="glibc-langpack-sr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053827" comment="glibc-langpack-ss-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053828" comment="glibc-langpack-st-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053829" comment="glibc-langpack-sv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053830" comment="glibc-langpack-sw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053831" comment="glibc-langpack-szl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053832" comment="glibc-langpack-ta-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053833" comment="glibc-langpack-tcy-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053834" comment="glibc-langpack-te-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053835" comment="glibc-langpack-tg-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053836" comment="glibc-langpack-th-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053837" comment="glibc-langpack-the-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053838" comment="glibc-langpack-ti-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053839" comment="glibc-langpack-tig-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053840" comment="glibc-langpack-tk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053841" comment="glibc-langpack-tl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053842" comment="glibc-langpack-tn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053843" comment="glibc-langpack-to-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053844" comment="glibc-langpack-tpi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053845" comment="glibc-langpack-tr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053846" comment="glibc-langpack-ts-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053847" comment="glibc-langpack-tt-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053848" comment="glibc-langpack-ug-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053849" comment="glibc-langpack-uk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053850" comment="glibc-langpack-unm-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053851" comment="glibc-langpack-ur-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053852" comment="glibc-langpack-uz-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053853" comment="glibc-langpack-ve-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053854" comment="glibc-langpack-vi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053855" comment="glibc-langpack-wa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053856" comment="glibc-langpack-wae-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053857" comment="glibc-langpack-wal-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053858" comment="glibc-langpack-wo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053859" comment="glibc-langpack-xh-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053860" comment="glibc-langpack-yi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053861" comment="glibc-langpack-yo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053862" comment="glibc-langpack-yue-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053863" comment="glibc-langpack-yuw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053864" comment="glibc-langpack-zh-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053865" comment="glibc-langpack-zu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053866" comment="glibc-locale-source-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053867" comment="glibc-minimal-langpack-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053868" comment="glibc-nss-devel-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053869" comment="glibc-static-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053870" comment="glibc-utils-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053871" comment="libnsl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053872" comment="nscd-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053873" comment="nss_db-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053874" comment="nss_hesiod-2.34-100.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4813" ref_url="https://www.suse.com/security/cve/CVE-2023-4813" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3464-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3509-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2023:4063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016723.html" source="SUSE-SU"/>
    <description>
    A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-4813/">CVE-2023-4813 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4813">CVE-2023-4813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215286">SUSE bug 1215286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053660" comment="glibc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053661" comment="glibc-all-langpacks-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053662" comment="glibc-benchtests-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053663" comment="glibc-common-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053664" comment="glibc-devel-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053665" comment="glibc-doc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053666" comment="glibc-gconv-extra-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053667" comment="glibc-headers-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053668" comment="glibc-langpack-aa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053669" comment="glibc-langpack-af-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053670" comment="glibc-langpack-agr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053671" comment="glibc-langpack-ak-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053672" comment="glibc-langpack-am-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053673" comment="glibc-langpack-an-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053674" comment="glibc-langpack-anp-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053675" comment="glibc-langpack-ar-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053676" comment="glibc-langpack-as-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053677" comment="glibc-langpack-ast-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053678" comment="glibc-langpack-ayc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053679" comment="glibc-langpack-az-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053680" comment="glibc-langpack-be-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053681" comment="glibc-langpack-bem-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053682" comment="glibc-langpack-ber-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053683" comment="glibc-langpack-bg-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053684" comment="glibc-langpack-bhb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053685" comment="glibc-langpack-bho-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053686" comment="glibc-langpack-bi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053687" comment="glibc-langpack-bn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053688" comment="glibc-langpack-bo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053689" comment="glibc-langpack-br-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053690" comment="glibc-langpack-brx-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053691" comment="glibc-langpack-bs-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053692" comment="glibc-langpack-byn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053693" comment="glibc-langpack-ca-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053694" comment="glibc-langpack-ce-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053695" comment="glibc-langpack-chr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053696" comment="glibc-langpack-ckb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053697" comment="glibc-langpack-cmn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053698" comment="glibc-langpack-crh-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053699" comment="glibc-langpack-cs-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053700" comment="glibc-langpack-csb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053701" comment="glibc-langpack-cv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053702" comment="glibc-langpack-cy-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053703" comment="glibc-langpack-da-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053704" comment="glibc-langpack-de-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053705" comment="glibc-langpack-doi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053706" comment="glibc-langpack-dsb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053707" comment="glibc-langpack-dv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053708" comment="glibc-langpack-dz-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053709" comment="glibc-langpack-el-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053710" comment="glibc-langpack-en-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053711" comment="glibc-langpack-eo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053712" comment="glibc-langpack-es-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053713" comment="glibc-langpack-et-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053714" comment="glibc-langpack-eu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053715" comment="glibc-langpack-fa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053716" comment="glibc-langpack-ff-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053717" comment="glibc-langpack-fi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053718" comment="glibc-langpack-fil-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053719" comment="glibc-langpack-fo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053720" comment="glibc-langpack-fr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053721" comment="glibc-langpack-fur-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053722" comment="glibc-langpack-fy-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053723" comment="glibc-langpack-ga-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053724" comment="glibc-langpack-gd-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053725" comment="glibc-langpack-gez-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053726" comment="glibc-langpack-gl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053727" comment="glibc-langpack-gu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053728" comment="glibc-langpack-gv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053729" comment="glibc-langpack-ha-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053730" comment="glibc-langpack-hak-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053731" comment="glibc-langpack-he-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053732" comment="glibc-langpack-hi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053733" comment="glibc-langpack-hif-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053734" comment="glibc-langpack-hne-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053735" comment="glibc-langpack-hr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053736" comment="glibc-langpack-hsb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053737" comment="glibc-langpack-ht-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053738" comment="glibc-langpack-hu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053739" comment="glibc-langpack-hy-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053740" comment="glibc-langpack-ia-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053741" comment="glibc-langpack-id-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053742" comment="glibc-langpack-ig-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053743" comment="glibc-langpack-ik-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053744" comment="glibc-langpack-is-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053745" comment="glibc-langpack-it-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053746" comment="glibc-langpack-iu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053747" comment="glibc-langpack-ja-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053748" comment="glibc-langpack-ka-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053749" comment="glibc-langpack-kab-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053750" comment="glibc-langpack-kk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053751" comment="glibc-langpack-kl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053752" comment="glibc-langpack-km-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053753" comment="glibc-langpack-kn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053754" comment="glibc-langpack-ko-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053755" comment="glibc-langpack-kok-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053756" comment="glibc-langpack-ks-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053757" comment="glibc-langpack-ku-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053758" comment="glibc-langpack-kw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053759" comment="glibc-langpack-ky-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053760" comment="glibc-langpack-lb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053761" comment="glibc-langpack-lg-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053762" comment="glibc-langpack-li-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053763" comment="glibc-langpack-lij-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053764" comment="glibc-langpack-ln-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053765" comment="glibc-langpack-lo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053766" comment="glibc-langpack-lt-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053767" comment="glibc-langpack-lv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053768" comment="glibc-langpack-lzh-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053769" comment="glibc-langpack-mag-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053770" comment="glibc-langpack-mai-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053771" comment="glibc-langpack-mfe-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053772" comment="glibc-langpack-mg-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053773" comment="glibc-langpack-mhr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053774" comment="glibc-langpack-mi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053775" comment="glibc-langpack-miq-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053776" comment="glibc-langpack-mjw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053777" comment="glibc-langpack-mk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053778" comment="glibc-langpack-ml-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053779" comment="glibc-langpack-mn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053780" comment="glibc-langpack-mni-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053781" comment="glibc-langpack-mnw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053782" comment="glibc-langpack-mr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053783" comment="glibc-langpack-ms-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053784" comment="glibc-langpack-mt-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053785" comment="glibc-langpack-my-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053786" comment="glibc-langpack-nan-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053787" comment="glibc-langpack-nb-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053788" comment="glibc-langpack-nds-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053789" comment="glibc-langpack-ne-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053790" comment="glibc-langpack-nhn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053791" comment="glibc-langpack-niu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053792" comment="glibc-langpack-nl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053793" comment="glibc-langpack-nn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053794" comment="glibc-langpack-nr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053795" comment="glibc-langpack-nso-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053796" comment="glibc-langpack-oc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053797" comment="glibc-langpack-om-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053798" comment="glibc-langpack-or-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053799" comment="glibc-langpack-os-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053800" comment="glibc-langpack-pa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053801" comment="glibc-langpack-pap-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053802" comment="glibc-langpack-pl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053803" comment="glibc-langpack-ps-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053804" comment="glibc-langpack-pt-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053805" comment="glibc-langpack-quz-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053806" comment="glibc-langpack-raj-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053807" comment="glibc-langpack-ro-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053808" comment="glibc-langpack-ru-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053809" comment="glibc-langpack-rw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053810" comment="glibc-langpack-sa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053811" comment="glibc-langpack-sah-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053812" comment="glibc-langpack-sat-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053813" comment="glibc-langpack-sc-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053814" comment="glibc-langpack-sd-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053815" comment="glibc-langpack-se-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053816" comment="glibc-langpack-sgs-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053817" comment="glibc-langpack-shn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053818" comment="glibc-langpack-shs-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053819" comment="glibc-langpack-si-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053820" comment="glibc-langpack-sid-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053821" comment="glibc-langpack-sk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053822" comment="glibc-langpack-sl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053823" comment="glibc-langpack-sm-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053824" comment="glibc-langpack-so-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053825" comment="glibc-langpack-sq-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053826" comment="glibc-langpack-sr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053827" comment="glibc-langpack-ss-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053828" comment="glibc-langpack-st-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053829" comment="glibc-langpack-sv-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053830" comment="glibc-langpack-sw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053831" comment="glibc-langpack-szl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053832" comment="glibc-langpack-ta-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053833" comment="glibc-langpack-tcy-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053834" comment="glibc-langpack-te-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053835" comment="glibc-langpack-tg-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053836" comment="glibc-langpack-th-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053837" comment="glibc-langpack-the-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053838" comment="glibc-langpack-ti-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053839" comment="glibc-langpack-tig-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053840" comment="glibc-langpack-tk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053841" comment="glibc-langpack-tl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053842" comment="glibc-langpack-tn-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053843" comment="glibc-langpack-to-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053844" comment="glibc-langpack-tpi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053845" comment="glibc-langpack-tr-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053846" comment="glibc-langpack-ts-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053847" comment="glibc-langpack-tt-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053848" comment="glibc-langpack-ug-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053849" comment="glibc-langpack-uk-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053850" comment="glibc-langpack-unm-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053851" comment="glibc-langpack-ur-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053852" comment="glibc-langpack-uz-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053853" comment="glibc-langpack-ve-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053854" comment="glibc-langpack-vi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053855" comment="glibc-langpack-wa-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053856" comment="glibc-langpack-wae-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053857" comment="glibc-langpack-wal-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053858" comment="glibc-langpack-wo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053859" comment="glibc-langpack-xh-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053860" comment="glibc-langpack-yi-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053861" comment="glibc-langpack-yo-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053862" comment="glibc-langpack-yue-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053863" comment="glibc-langpack-yuw-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053864" comment="glibc-langpack-zh-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053865" comment="glibc-langpack-zu-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053866" comment="glibc-locale-source-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053867" comment="glibc-minimal-langpack-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053868" comment="glibc-nss-devel-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053869" comment="glibc-static-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053870" comment="glibc-utils-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053871" comment="libnsl-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053872" comment="nscd-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053873" comment="nss_db-2.34-100.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053874" comment="nss_hesiod-2.34-100.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48161</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48161" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48161" ref_url="https://www.suse.com/security/cve/CVE-2023-48161" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8117" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8124" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8127" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018107.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-48161/">CVE-2023-48161 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48161">CVE-2023-48161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217390">SUSE bug 1217390</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947853" comment="java-1.8.0-openjdk-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947854" comment="java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947855" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947856" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947857" comment="java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947858" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947859" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947860" comment="java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947861" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947862" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947863" comment="java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947864" comment="java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947865" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947866" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947867" comment="java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947868" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947869" comment="java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947870" comment="java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947871" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947872" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947743" comment="java-11-openjdk-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947744" comment="java-11-openjdk-demo-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947745" comment="java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947746" comment="java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947747" comment="java-11-openjdk-devel-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947748" comment="java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947749" comment="java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947750" comment="java-11-openjdk-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947751" comment="java-11-openjdk-headless-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947752" comment="java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947753" comment="java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947754" comment="java-11-openjdk-javadoc-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947755" comment="java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947756" comment="java-11-openjdk-jmods-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947757" comment="java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947758" comment="java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947759" comment="java-11-openjdk-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947760" comment="java-11-openjdk-src-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947761" comment="java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947762" comment="java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947763" comment="java-11-openjdk-static-libs-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947764" comment="java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947765" comment="java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947873" comment="java-17-openjdk-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947874" comment="java-17-openjdk-demo-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947875" comment="java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947876" comment="java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947877" comment="java-17-openjdk-devel-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947878" comment="java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947879" comment="java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947880" comment="java-17-openjdk-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947881" comment="java-17-openjdk-headless-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947882" comment="java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947883" comment="java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947884" comment="java-17-openjdk-javadoc-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947885" comment="java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947886" comment="java-17-openjdk-jmods-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947887" comment="java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947888" comment="java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947889" comment="java-17-openjdk-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947890" comment="java-17-openjdk-src-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947891" comment="java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947892" comment="java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947893" comment="java-17-openjdk-static-libs-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947894" comment="java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947895" comment="java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948242" comment="java-21-openjdk-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948243" comment="java-21-openjdk-demo-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948244" comment="java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948245" comment="java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948246" comment="java-21-openjdk-devel-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948247" comment="java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948248" comment="java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948249" comment="java-21-openjdk-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948250" comment="java-21-openjdk-headless-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948251" comment="java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948252" comment="java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948253" comment="java-21-openjdk-javadoc-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948254" comment="java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948255" comment="java-21-openjdk-jmods-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948256" comment="java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948257" comment="java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948258" comment="java-21-openjdk-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948259" comment="java-21-openjdk-src-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948260" comment="java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948261" comment="java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948262" comment="java-21-openjdk-static-libs-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948263" comment="java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948264" comment="java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4863" ref_url="https://www.suse.com/security/cve/CVE-2023-4863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3609-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031736.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0246-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MR7EQOG2DAHINLCMYHZGRM66IUNSTTSW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0247-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/452ZGDR435PX435CLL4M7OFR4DCKZZWI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0278-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5SOOP74GTYPZCPPWK473Q6QVJGSGCJQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4863/">CVE-2023-4863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863">CVE-2023-4863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215231">SUSE bug 1215231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217115">SUSE bug 1217115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217117">SUSE bug 1217117</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806895" comment="firefox-102.15.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806896" comment="firefox-x11-102.15.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806897" comment="libwebp-1.2.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806898" comment="libwebp-devel-1.2.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806899" comment="libwebp-tools-1.2.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806900" comment="thunderbird-102.15.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4874</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4874" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4874" ref_url="https://www.suse.com/security/cve/CVE-2023-4874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031739.html" source="SUSE-SU"/>
    <description>
    Null pointer dereference when viewing a specially crafted email in Mutt &gt;1.5.2 &lt;2.2.12
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4874/">CVE-2023-4874 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4874">CVE-2023-4874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215189">SUSE bug 1215189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866656" comment="mutt-2.2.6-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4875</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4875" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4875" ref_url="https://www.suse.com/security/cve/CVE-2023-4875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031739.html" source="SUSE-SU"/>
    <description>
    Null pointer dereference when composing from a specially crafted draft message in Mutt &gt;1.5.2 &lt;2.2.12
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-4875/">CVE-2023-4875 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4875">CVE-2023-4875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215191">SUSE bug 1215191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866656" comment="mutt-2.2.6-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021369.html" source="SUSE-SU"/>
		<reference ref_id="TID000021295" ref_url="https://www.suse.com/support/kb/doc/?id=000021295" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7UNBVBZXNPUVRYGXMQJVWO63X7TAJUV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNYVAEZZNHEKG5C7JHU5U3MPN73U4OKG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVOEVD2B4CFVDJEJANZW6QGRI6FTWFJ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L45IOOVVBSIBE7RRRVUWOWDGUABBZE4Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXSOYCFCX44QUQ434BAHHQRSSCB3KZG5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJ4UKYMVT5L6QOJVM6JMV6AQINAVT4JW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PE3D4WEFUCELLDKJUEM2KLPFMME7KTAI/" source="SUSE-SU"/>
    <description>
    The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-09"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217950">SUSE bug 1217950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218708">SUSE bug 1218708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009850293" comment="buildah-1.31.4-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850294" comment="buildah-tests-1.31.4-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053650" comment="libssh-0.10.4-12.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053651" comment="libssh-config-0.10.4-12.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053652" comment="libssh-devel-0.10.4-12.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850276" comment="openssh-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850277" comment="openssh-askpass-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850278" comment="openssh-clients-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850279" comment="openssh-keycat-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850280" comment="openssh-server-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850281" comment="pam_ssh_agent_auth-0.10.4-5.34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053653" comment="podman-4.6.1-8.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053654" comment="podman-docker-4.6.1-8.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053655" comment="podman-gvproxy-4.6.1-8.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053656" comment="podman-plugins-4.6.1-8.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053657" comment="podman-remote-4.6.1-8.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053658" comment="podman-tests-4.6.1-8.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49083" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49083" ref_url="https://www.suse.com/security/cve/CVE-2023-49083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001934.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15874" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035893.html" source="SUSE-SU"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Calling `load_pem_pkcs7_certificates` or `load_der_pkcs7_certificates` could lead to a NULL-pointer dereference and segfault. Exploitation of this vulnerability poses a serious risk of Denial of Service (DoS) for any application attempting to deserialize a PKCS7 blob/certificate. The consequences extend to potential disruptions in system availability and stability. This vulnerability has been patched in version 41.0.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-09-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49083/">CVE-2023-49083 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49083">CVE-2023-49083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217592">SUSE bug 1217592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018283" comment="python3-cryptography-36.0.1-5.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866681" comment="python3.11-cryptography-37.0.2-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4911" ref_url="https://www.suse.com/security/cve/CVE-2023-4911" source="SUSE CVE"/>
    <description>
    A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-4911/">CVE-2023-4911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4911">CVE-2023-4911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215501">SUSE bug 1215501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215502">SUSE bug 1215502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806915" comment="glibc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806916" comment="glibc-all-langpacks-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806917" comment="glibc-benchtests-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806918" comment="glibc-common-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806919" comment="glibc-devel-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806920" comment="glibc-doc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806921" comment="glibc-gconv-extra-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806922" comment="glibc-headers-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806923" comment="glibc-langpack-aa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806924" comment="glibc-langpack-af-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806925" comment="glibc-langpack-agr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806926" comment="glibc-langpack-ak-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806927" comment="glibc-langpack-am-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806928" comment="glibc-langpack-an-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806929" comment="glibc-langpack-anp-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806930" comment="glibc-langpack-ar-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806931" comment="glibc-langpack-as-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806932" comment="glibc-langpack-ast-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806933" comment="glibc-langpack-ayc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806934" comment="glibc-langpack-az-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806935" comment="glibc-langpack-be-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806936" comment="glibc-langpack-bem-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806937" comment="glibc-langpack-ber-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806938" comment="glibc-langpack-bg-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806939" comment="glibc-langpack-bhb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806940" comment="glibc-langpack-bho-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806941" comment="glibc-langpack-bi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806942" comment="glibc-langpack-bn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806943" comment="glibc-langpack-bo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806944" comment="glibc-langpack-br-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806945" comment="glibc-langpack-brx-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806946" comment="glibc-langpack-bs-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806947" comment="glibc-langpack-byn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806948" comment="glibc-langpack-ca-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806949" comment="glibc-langpack-ce-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806950" comment="glibc-langpack-chr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806951" comment="glibc-langpack-ckb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806952" comment="glibc-langpack-cmn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806953" comment="glibc-langpack-crh-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806954" comment="glibc-langpack-cs-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806955" comment="glibc-langpack-csb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806956" comment="glibc-langpack-cv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806957" comment="glibc-langpack-cy-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806958" comment="glibc-langpack-da-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806959" comment="glibc-langpack-de-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806960" comment="glibc-langpack-doi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806961" comment="glibc-langpack-dsb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806962" comment="glibc-langpack-dv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806963" comment="glibc-langpack-dz-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806964" comment="glibc-langpack-el-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806965" comment="glibc-langpack-en-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806966" comment="glibc-langpack-eo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806967" comment="glibc-langpack-es-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806968" comment="glibc-langpack-et-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806969" comment="glibc-langpack-eu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806970" comment="glibc-langpack-fa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806971" comment="glibc-langpack-ff-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806972" comment="glibc-langpack-fi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806973" comment="glibc-langpack-fil-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806974" comment="glibc-langpack-fo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806975" comment="glibc-langpack-fr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806976" comment="glibc-langpack-fur-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806977" comment="glibc-langpack-fy-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806978" comment="glibc-langpack-ga-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806979" comment="glibc-langpack-gd-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806980" comment="glibc-langpack-gez-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806981" comment="glibc-langpack-gl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806982" comment="glibc-langpack-gu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806983" comment="glibc-langpack-gv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806984" comment="glibc-langpack-ha-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806985" comment="glibc-langpack-hak-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806986" comment="glibc-langpack-he-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806987" comment="glibc-langpack-hi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806988" comment="glibc-langpack-hif-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806989" comment="glibc-langpack-hne-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806990" comment="glibc-langpack-hr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806991" comment="glibc-langpack-hsb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806992" comment="glibc-langpack-ht-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806993" comment="glibc-langpack-hu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806994" comment="glibc-langpack-hy-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806995" comment="glibc-langpack-ia-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806996" comment="glibc-langpack-id-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806997" comment="glibc-langpack-ig-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806998" comment="glibc-langpack-ik-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806999" comment="glibc-langpack-is-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807000" comment="glibc-langpack-it-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807001" comment="glibc-langpack-iu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807002" comment="glibc-langpack-ja-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807003" comment="glibc-langpack-ka-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807004" comment="glibc-langpack-kab-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807005" comment="glibc-langpack-kk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807006" comment="glibc-langpack-kl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807007" comment="glibc-langpack-km-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807008" comment="glibc-langpack-kn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807009" comment="glibc-langpack-ko-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807010" comment="glibc-langpack-kok-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807011" comment="glibc-langpack-ks-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807012" comment="glibc-langpack-ku-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807013" comment="glibc-langpack-kw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807014" comment="glibc-langpack-ky-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807015" comment="glibc-langpack-lb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807016" comment="glibc-langpack-lg-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807017" comment="glibc-langpack-li-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807018" comment="glibc-langpack-lij-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807019" comment="glibc-langpack-ln-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807020" comment="glibc-langpack-lo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807021" comment="glibc-langpack-lt-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807022" comment="glibc-langpack-lv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807023" comment="glibc-langpack-lzh-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807024" comment="glibc-langpack-mag-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807025" comment="glibc-langpack-mai-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807026" comment="glibc-langpack-mfe-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807027" comment="glibc-langpack-mg-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807028" comment="glibc-langpack-mhr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807029" comment="glibc-langpack-mi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807030" comment="glibc-langpack-miq-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807031" comment="glibc-langpack-mjw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807032" comment="glibc-langpack-mk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807033" comment="glibc-langpack-ml-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807034" comment="glibc-langpack-mn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807035" comment="glibc-langpack-mni-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807036" comment="glibc-langpack-mnw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807037" comment="glibc-langpack-mr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807038" comment="glibc-langpack-ms-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807039" comment="glibc-langpack-mt-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807040" comment="glibc-langpack-my-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807041" comment="glibc-langpack-nan-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807042" comment="glibc-langpack-nb-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807043" comment="glibc-langpack-nds-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807044" comment="glibc-langpack-ne-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807045" comment="glibc-langpack-nhn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807046" comment="glibc-langpack-niu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807047" comment="glibc-langpack-nl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807048" comment="glibc-langpack-nn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807049" comment="glibc-langpack-nr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807050" comment="glibc-langpack-nso-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807051" comment="glibc-langpack-oc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807052" comment="glibc-langpack-om-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807053" comment="glibc-langpack-or-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807054" comment="glibc-langpack-os-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807055" comment="glibc-langpack-pa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807056" comment="glibc-langpack-pap-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807057" comment="glibc-langpack-pl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807058" comment="glibc-langpack-ps-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807059" comment="glibc-langpack-pt-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807060" comment="glibc-langpack-quz-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807061" comment="glibc-langpack-raj-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807062" comment="glibc-langpack-ro-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807063" comment="glibc-langpack-ru-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807064" comment="glibc-langpack-rw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807065" comment="glibc-langpack-sa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807066" comment="glibc-langpack-sah-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807067" comment="glibc-langpack-sat-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807068" comment="glibc-langpack-sc-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807069" comment="glibc-langpack-sd-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807070" comment="glibc-langpack-se-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807071" comment="glibc-langpack-sgs-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807072" comment="glibc-langpack-shn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807073" comment="glibc-langpack-shs-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807074" comment="glibc-langpack-si-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807075" comment="glibc-langpack-sid-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807076" comment="glibc-langpack-sk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807077" comment="glibc-langpack-sl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807078" comment="glibc-langpack-sm-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807079" comment="glibc-langpack-so-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807080" comment="glibc-langpack-sq-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807081" comment="glibc-langpack-sr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807082" comment="glibc-langpack-ss-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807083" comment="glibc-langpack-st-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807084" comment="glibc-langpack-sv-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807085" comment="glibc-langpack-sw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807086" comment="glibc-langpack-szl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807087" comment="glibc-langpack-ta-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807088" comment="glibc-langpack-tcy-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807089" comment="glibc-langpack-te-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807090" comment="glibc-langpack-tg-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807091" comment="glibc-langpack-th-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807092" comment="glibc-langpack-the-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807093" comment="glibc-langpack-ti-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807094" comment="glibc-langpack-tig-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807095" comment="glibc-langpack-tk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807096" comment="glibc-langpack-tl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807097" comment="glibc-langpack-tn-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807098" comment="glibc-langpack-to-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807099" comment="glibc-langpack-tpi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807100" comment="glibc-langpack-tr-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807101" comment="glibc-langpack-ts-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807102" comment="glibc-langpack-tt-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807103" comment="glibc-langpack-ug-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807104" comment="glibc-langpack-uk-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807105" comment="glibc-langpack-unm-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807106" comment="glibc-langpack-ur-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807107" comment="glibc-langpack-uz-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807108" comment="glibc-langpack-ve-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807109" comment="glibc-langpack-vi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807110" comment="glibc-langpack-wa-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807111" comment="glibc-langpack-wae-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807112" comment="glibc-langpack-wal-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807113" comment="glibc-langpack-wo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807114" comment="glibc-langpack-xh-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807115" comment="glibc-langpack-yi-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807116" comment="glibc-langpack-yo-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807117" comment="glibc-langpack-yue-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807118" comment="glibc-langpack-yuw-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807119" comment="glibc-langpack-zh-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807120" comment="glibc-langpack-zu-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807121" comment="glibc-locale-source-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807122" comment="glibc-minimal-langpack-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807123" comment="glibc-nss-devel-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807124" comment="glibc-static-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807125" comment="glibc-utils-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807126" comment="libnsl-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807127" comment="nscd-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807128" comment="nss_db-2.34-60.el9_2.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807129" comment="nss_hesiod-2.34-60.el9_2.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49285" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49285" ref_url="https://www.suse.com/security/cve/CVE-2023-49285" source="SUSE CVE"/>
		<reference ref_id="GHSA-8w9r-p88v-mmx9" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-8w9r-p88v-mmx9" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017368.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49285/">CVE-2023-49285 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49285">CVE-2023-49285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217813">SUSE bug 1217813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819046" comment="squid-5.5-6.el9_3.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49286" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49286" ref_url="https://www.suse.com/security/cve/CVE-2023-49286" source="SUSE CVE"/>
		<reference ref_id="GHSA-xggx-9329-3c27" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-xggx-9329-3c27" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017368.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-10"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49286/">CVE-2023-49286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49286">CVE-2023-49286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217815">SUSE bug 1217815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819046" comment="squid-5.5-6.el9_3.5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202349288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-49288</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-49288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-49288" ref_url="https://www.suse.com/security/cve/CVE-2023-49288" source="SUSE CVE"/>
		<reference ref_id="GHSA-rj5h-46j6-q2g5" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-rj5h-46j6-q2g5" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Affected versions of squid are subject to a a Use-After-Free bug which can lead to a Denial of Service attack via collapsed forwarding. All versions of Squid from 3.5 up to and including 5.9 configured with "collapsed_forwarding on" are vulnerable. Configurations with "collapsed_forwarding off" or without a "collapsed_forwarding" directive are not vulnerable. This bug is fixed by Squid version 6.0.1. Users are advised to upgrade. Users unable to upgrade should remove all collapsed_forwarding lines from their squid.conf.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-49288/">CVE-2023-49288 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-49288">CVE-2023-49288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217825">SUSE bug 1217825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813389" comment="squid-5.5-6.el9_3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50186</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50186" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50186" ref_url="https://www.suse.com/security/cve/CVE-2023-50186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036933.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0305-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/73CSYYN6KCRAUIBATMXYYKQT4I5PVKDJ/" source="SUSE-SU"/>
    <description>
    GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of metadata within AV1 encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22300.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50186/">CVE-2023-50186 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50186">CVE-2023-50186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223263">SUSE bug 1223263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866651" comment="gstreamer1-plugins-bad-free-1.22.1-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866652" comment="gstreamer1-plugins-bad-free-devel-1.22.1-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50229" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50229" ref_url="https://www.suse.com/security/cve/CVE-2023-50229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017754.html" source="SUSE-SU"/>
    <description>
    BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20936.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50229/">CVE-2023-50229 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50229">CVE-2023-50229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218300">SUSE bug 1218300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50230" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50230" ref_url="https://www.suse.com/security/cve/CVE-2023-50230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017754.html" source="SUSE-SU"/>
    <description>
    BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20938.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-50230/">CVE-2023-50230 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50230">CVE-2023-50230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218301">SUSE bug 1218301</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50269" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50269" ref_url="https://www.suse.com/security/cve/CVE-2023-50269" source="SUSE CVE"/>
		<reference ref_id="GHSA-wgq4-4cfg-c4x3" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-wgq4-4cfg-c4x3" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017906.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. Due to an Uncontrolled Recursion bug in versions 2.6 through 2.7.STABLE9, versions 3.1 through 5.9, and versions 6.0.1 through 6.5, Squid may be vulnerable to a Denial of Service attack against HTTP Request parsing. This problem allows a remote client to perform Denial of Service attack by sending a large X-Forwarded-For header when the follow_x_forwarded_for feature is configured. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-21"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50269/">CVE-2023-50269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50269">CVE-2023-50269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217654">SUSE bug 1217654</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851786" comment="squid-5.5-6.el9_3.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50387" ref_url="https://www.suse.com/security/cve/CVE-2023-50387" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZPNQJJ7XX3KPQTYPFVQXAGEDZZNY73R/" source="SUSE-SU"/>
    <description>
    Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50387/">CVE-2023-50387 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50387">CVE-2023-50387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220717">SUSE bug 1220717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867223" comment="bind-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867224" comment="bind-chroot-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867225" comment="bind-devel-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867226" comment="bind-dnssec-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867227" comment="bind-dnssec-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867228" comment="bind-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867229" comment="bind-dyndb-ldap-11.9-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867230" comment="bind-libs-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867231" comment="bind-license-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867232" comment="bind-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851423" comment="dnsmasq-2.85-14.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851424" comment="dnsmasq-utils-2.85-14.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867233" comment="python3-bind-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849202" comment="python3-unbound-1.16.2-3.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849203" comment="unbound-1.16.2-3.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849204" comment="unbound-devel-1.16.2-3.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849205" comment="unbound-libs-1.16.2-3.el9_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50761" ref_url="https://www.suse.com/security/cve/CVE-2023-50761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
    <description>
    The signature of a digitally signed S/MIME email message may optionally specify the signature creation date and time. If present, Thunderbird did not compare the signature creation date with the message date and time, and displayed a valid signature despite a date or time mismatch. This could be used to give recipients the impression that a message was sent at a different date or time. This vulnerability affects Thunderbird &lt; 115.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50761/">CVE-2023-50761 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50761">CVE-2023-50761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50762" ref_url="https://www.suse.com/security/cve/CVE-2023-50762" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
    <description>
    When processing a PGP/MIME payload that contains digitally signed text, the first paragraph of the text was never shown to the user. This is because the text was interpreted as a MIME message and the first paragraph was always treated as an email header section. A digitally signed text from a different context, such as a signed GIT commit, could be used to spoof an email message. This vulnerability affects Thunderbird &lt; 115.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50762/">CVE-2023-50762 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50762">CVE-2023-50762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50868" ref_url="https://www.suse.com/security/cve/CVE-2023-50868" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1991-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021209.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0048-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZPNQJJ7XX3KPQTYPFVQXAGEDZZNY73R/" source="SUSE-SU"/>
    <description>
    The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-50868/">CVE-2023-50868 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-50868">CVE-2023-50868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219823">SUSE bug 1219823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219826">SUSE bug 1219826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221586">SUSE bug 1221586</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867223" comment="bind-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867224" comment="bind-chroot-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867225" comment="bind-devel-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867226" comment="bind-dnssec-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867227" comment="bind-dnssec-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867228" comment="bind-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867229" comment="bind-dyndb-ldap-11.9-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867230" comment="bind-libs-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867231" comment="bind-license-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867232" comment="bind-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851423" comment="dnsmasq-2.85-14.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851424" comment="dnsmasq-utils-2.85-14.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867233" comment="python3-bind-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849202" comment="python3-unbound-1.16.2-3.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849203" comment="unbound-1.16.2-3.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849204" comment="unbound-devel-1.16.2-3.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849205" comment="unbound-libs-1.16.2-3.el9_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5088" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5088" ref_url="https://www.suse.com/security/cve/CVE-2023-5088" source="SUSE CVE"/>
    <description>
    A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5088/">CVE-2023-5088 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5088">CVE-2023-5088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216771">SUSE bug 1216771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872275" comment="qemu-guest-agent-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872276" comment="qemu-img-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872277" comment="qemu-kvm-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872278" comment="qemu-kvm-audio-pa-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872279" comment="qemu-kvm-block-blkio-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872280" comment="qemu-kvm-block-curl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872281" comment="qemu-kvm-block-rbd-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872282" comment="qemu-kvm-common-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872283" comment="qemu-kvm-core-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872284" comment="qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872285" comment="qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872286" comment="qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872287" comment="qemu-kvm-device-usb-host-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872288" comment="qemu-kvm-device-usb-redirect-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872289" comment="qemu-kvm-docs-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872290" comment="qemu-kvm-tools-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872291" comment="qemu-kvm-ui-egl-headless-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872292" comment="qemu-kvm-ui-opengl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872293" comment="qemu-pr-helper-8.2.0-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5090" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5090" ref_url="https://www.suse.com/security/cve/CVE-2023-5090" source="SUSE CVE"/>
    <description>
    A flaw was found in KVM. An improper check in svm_set_x2apic_msr_interception() may allow direct access to host x2apic msrs when the guest resets its apic, potentially leading to a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5090/">CVE-2023-5090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5090">CVE-2023-5090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216927">SUSE bug 1216927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870083" comment="bpftool-7.3.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870084" comment="kernel-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870085" comment="kernel-abi-stablelists-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870086" comment="kernel-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870087" comment="kernel-cross-headers-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870088" comment="kernel-debug-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870089" comment="kernel-debug-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870092" comment="kernel-debug-modules-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870093" comment="kernel-debug-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870094" comment="kernel-debug-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870095" comment="kernel-debug-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870098" comment="kernel-doc-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870099" comment="kernel-headers-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870100" comment="kernel-modules-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870101" comment="kernel-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870102" comment="kernel-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870103" comment="kernel-tools-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870104" comment="kernel-tools-libs-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870106" comment="kernel-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870107" comment="libperf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870108" comment="perf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870109" comment="python3-perf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870110" comment="rtla-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870111" comment="rv-5.14.0-427.16.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202350967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-50967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-50967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50967" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-50967" ref_url="https://www.suse.com/security/cve/CVE-2023-50967" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000564.html" source="SUSE-SU"/>
    <description>
    latchset jose through version 11 allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-50967/">CVE-2023-50967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-50967">CVE-2023-50967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221804">SUSE bug 1221804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953653" comment="jose-14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953654" comment="libjose-14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953655" comment="libjose-devel-14-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51042" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51042" ref_url="https://www.suse.com/security/cve/CVE-2023-51042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.4.12, amdgpu_cs_wait_all_fences in drivers/gpu/drm/amd/amdgpu/amdgpu_cs.c has a fence use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51042/">CVE-2023-51042 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51042">CVE-2023-51042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219128">SUSE bug 1219128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51043</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51043" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51043" ref_url="https://www.suse.com/security/cve/CVE-2023-51043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.4.5, drivers/gpu/drm/drm_atomic.c has a use-after-free during a race condition between a nonblocking atomic commit and a driver unload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51043/">CVE-2023-51043 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51043">CVE-2023-51043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219120">SUSE bug 1219120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5129" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5129" ref_url="https://www.suse.com/security/cve/CVE-2023-5129" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.  Duplicate of CVE-2023-4863.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5129/">CVE-2023-5129 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5129">CVE-2023-5129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215715">SUSE bug 1215715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806895" comment="firefox-102.15.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806896" comment="firefox-x11-102.15.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806897" comment="libwebp-1.2.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806898" comment="libwebp-devel-1.2.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806899" comment="libwebp-tools-1.2.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806900" comment="thunderbird-102.15.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51385" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51385" ref_url="https://www.suse.com/security/cve/CVE-2023-51385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021369.html" source="SUSE-SU"/>
    <description>
    In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-09"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51385/">CVE-2023-51385 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51385">CVE-2023-51385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218215">SUSE bug 1218215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218708">SUSE bug 1218708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009850276" comment="openssh-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850277" comment="openssh-askpass-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850278" comment="openssh-clients-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850279" comment="openssh-keycat-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850280" comment="openssh-server-8.7p1-34.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850281" comment="pam_ssh_agent_auth-0.10.4-5.34.el9_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5157</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5157" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5157" ref_url="https://www.suse.com/security/cve/CVE-2023-5157" source="SUSE CVE"/>
    <description>
    A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-01"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5157/">CVE-2023-5157 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5157">CVE-2023-5157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215712">SUSE bug 1215712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009807680" comment="galera-26.4.14-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807681" comment="mariadb-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807682" comment="mariadb-backup-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807683" comment="mariadb-common-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807684" comment="mariadb-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807685" comment="mariadb-embedded-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807686" comment="mariadb-embedded-devel-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807687" comment="mariadb-errmsg-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807688" comment="mariadb-gssapi-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807689" comment="mariadb-oqgraph-engine-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807690" comment="mariadb-pam-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807691" comment="mariadb-server-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807692" comment="mariadb-server-galera-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807693" comment="mariadb-server-utils-10.5.22-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807694" comment="mariadb-test-10.5.22-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51580" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51580" ref_url="https://www.suse.com/security/cve/CVE-2023-51580" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
    <description>
    BlueZ Audio Profile AVRCP avrcp_parse_attribute_list Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device.

The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20852.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-51580/">CVE-2023-51580 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51580">CVE-2023-51580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218337">SUSE bug 1218337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51589</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51589" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51589" ref_url="https://www.suse.com/security/cve/CVE-2023-51589" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001050.html" source="SUSE-SU"/>
    <description>
    BlueZ Audio Profile AVRCP parse_media_element Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device.

The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20853.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-51589/">CVE-2023-51589 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51589">CVE-2023-51589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218341">SUSE bug 1218341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51592</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51592" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51592" ref_url="https://www.suse.com/security/cve/CVE-2023-51592" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
    <description>
    BlueZ Audio Profile AVRCP parse_media_folder Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device.

The specific flaw exists within the handling of the AVRCP protocol. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20854.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-51592/">CVE-2023-51592 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51592">CVE-2023-51592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218340">SUSE bug 1218340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51594" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51594" ref_url="https://www.suse.com/security/cve/CVE-2023-51594" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
    <description>
    BlueZ OBEX Library Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of OBEX protocol parameters. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-20937.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-51594/">CVE-2023-51594 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51594">CVE-2023-51594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218339">SUSE bug 1218339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51596" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51596" ref_url="https://www.suse.com/security/cve/CVE-2023-51596" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9413" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000583.html" source="SUSE-SU"/>
    <description>
    BlueZ Phone Book Access Profile Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.

The specific flaw exists within the handling of the Phone Book Access profile. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20939.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51596/">CVE-2023-51596 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51596">CVE-2023-51596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218338">SUSE bug 1218338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953756" comment="bluez-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953757" comment="bluez-cups-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953758" comment="bluez-libs-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953759" comment="bluez-libs-devel-5.72-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953760" comment="bluez-obexd-5.72-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5169" ref_url="https://www.suse.com/security/cve/CVE-2023-5169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5169/">CVE-2023-5169 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5169">CVE-2023-5169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806912" comment="firefox-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806913" comment="firefox-x11-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806914" comment="thunderbird-115.3.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5171" ref_url="https://www.suse.com/security/cve/CVE-2023-5171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5171/">CVE-2023-5171 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5171">CVE-2023-5171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806912" comment="firefox-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806913" comment="firefox-x11-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806914" comment="thunderbird-115.3.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51714" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51714" ref_url="https://www.suse.com/security/cve/CVE-2023-51714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-January/033591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036479.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the HTTP2 implementation in Qt before 5.15.17, 6.x before 6.2.11, 6.3.x through 6.5.x before 6.5.4, and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-51714/">CVE-2023-51714 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51714">CVE-2023-51714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218413">SUSE bug 1218413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866630" comment="qt5-qtbase-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866631" comment="qt5-qtbase-common-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866632" comment="qt5-qtbase-devel-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866633" comment="qt5-qtbase-examples-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866634" comment="qt5-qtbase-gui-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866635" comment="qt5-qtbase-mysql-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866636" comment="qt5-qtbase-odbc-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866637" comment="qt5-qtbase-postgresql-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866638" comment="qt5-qtbase-private-devel-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866639" comment="qt5-qtbase-static-5.15.9-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5176" ref_url="https://www.suse.com/security/cve/CVE-2023-5176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-September/031728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-September/016460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5176/">CVE-2023-5176 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5176">CVE-2023-5176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215575">SUSE bug 1215575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806912" comment="firefox-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806913" comment="firefox-x11-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806914" comment="thunderbird-115.3.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51764" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51764" ref_url="https://www.suse.com/security/cve/CVE-2023-51764" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9243" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4981-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1149-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034873.html" source="SUSE-SU"/>
		<reference ref_id="TID000021307" ref_url="https://www.suse.com/support/kb/doc/?id=000021307" source="SUSE-SU"/>
    <description>
    Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Postfix supports &lt;LF&gt;.&lt;CR&gt;&lt;LF&gt; but some other popular e-mail servers do not. To prevent attack variants (by always disallowing &lt;LF&gt; without &lt;CR&gt;), a different solution is required, such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23, 3.6.13, 3.7.9, 3.8.4, or 3.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-51764/">CVE-2023-51764 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51764">CVE-2023-51764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218304">SUSE bug 1218304</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953685" comment="postfix-3.5.25-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953686" comment="postfix-cdb-3.5.25-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953687" comment="postfix-ldap-3.5.25-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953688" comment="postfix-lmdb-3.5.25-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953689" comment="postfix-mysql-3.5.25-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953690" comment="postfix-pcre-3.5.25-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953691" comment="postfix-perl-scripts-3.5.25-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953692" comment="postfix-pgsql-3.5.25-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953693" comment="postfix-sqlite-3.5.25-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51779" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51779" ref_url="https://www.suse.com/security/cve/CVE-2023-51779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034860.html" source="SUSE-SU"/>
    <description>
    bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51779/">CVE-2023-51779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-51779">CVE-2023-51779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218559">SUSE bug 1218559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218610">SUSE bug 1218610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5178" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5178" ref_url="https://www.suse.com/security/cve/CVE-2023-5178" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5178/">CVE-2023-5178 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5178">CVE-2023-5178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215768">SUSE bug 1215768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216044">SUSE bug 1216044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202351780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-51780</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-51780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51780" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-51780" ref_url="https://www.suse.com/security/cve/CVE-2023-51780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-51780/">CVE-2023-51780 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-51780">CVE-2023-51780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218730">SUSE bug 1218730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218733">SUSE bug 1218733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5215" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5215" ref_url="https://www.suse.com/security/cve/CVE-2023-5215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016882.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5215/">CVE-2023-5215 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5215">CVE-2023-5215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215799">SUSE bug 1215799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866509" comment="libnbd-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866510" comment="libnbd-bash-completion-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866511" comment="libnbd-devel-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866512" comment="nbdfuse-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866513" comment="ocaml-libnbd-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866514" comment="ocaml-libnbd-devel-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866515" comment="python3-libnbd-1.18.1-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52160" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52160" ref_url="https://www.suse.com/security/cve/CVE-2023-52160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0764-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021227.html" source="SUSE-SU"/>
    <description>
    The implementation of PEAP in wpa_supplicant through 2.10 allows authentication bypass. For a successful attack, wpa_supplicant must be configured to not verify the network's TLS certificate during Phase 1 authentication, and an eap_peap_decrypt vulnerability can then be abused to skip Phase 2 authentication. The attack vector is sending an EAP-TLV Success packet instead of starting Phase 2. This allows an adversary to impersonate Enterprise Wi-Fi networks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52160/">CVE-2023-52160 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52160">CVE-2023-52160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219975">SUSE bug 1219975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866752" comment="wpa_supplicant-2.10-5.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5217" ref_url="https://www.suse.com/security/cve/CVE-2023-5217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/031894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016575.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0277-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVWTK2X25FKSQAO2JO5SKRXBOHGOHPUO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0297-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SA3UIF6YUP4F422WZCCPKQ6TLSBG7YAK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0298-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V5KRGLOBRAIYNFCNZH4YM2ETGNMPQEKZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0365-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4PHTZYGRNV6PDZMHUALPCK2YD6IRL3XD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0366-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M45KVAFI32X55HONDKLE2FBN6GETMIUL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2023-10-30"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5217/">CVE-2023-5217 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5217">CVE-2023-5217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215776">SUSE bug 1215776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215778">SUSE bug 1215778</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215814">SUSE bug 1215814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217559">SUSE bug 1217559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806912" comment="firefox-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806913" comment="firefox-x11-115.3.1-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807158" comment="libvpx-1.9.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009807159" comment="libvpx-devel-1.9.0-7.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806914" comment="thunderbird-115.3.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52323</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52323" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52323" ref_url="https://www.suse.com/security/cve/CVE-2023-52323" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:1829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:1829-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018003.html" source="SUSE-SU"/>
    <description>
    PyCryptodome and pycryptodomex before 3.19.1 allow side-channel leakage for OAEP decryption, exploitable for a Manger attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52323/">CVE-2023-52323 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52323">CVE-2023-52323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218564">SUSE bug 1218564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226977">SUSE bug 1226977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866430" comment="fence-agents-aliyun-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866431" comment="fence-agents-all-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866432" comment="fence-agents-amt-ws-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866433" comment="fence-agents-apc-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866434" comment="fence-agents-apc-snmp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866435" comment="fence-agents-aws-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866436" comment="fence-agents-azure-arm-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866437" comment="fence-agents-bladecenter-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866438" comment="fence-agents-brocade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866439" comment="fence-agents-cisco-mds-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866440" comment="fence-agents-cisco-ucs-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866441" comment="fence-agents-common-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866442" comment="fence-agents-compute-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866443" comment="fence-agents-drac5-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866444" comment="fence-agents-eaton-snmp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866445" comment="fence-agents-emerson-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866446" comment="fence-agents-eps-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866447" comment="fence-agents-gce-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866448" comment="fence-agents-heuristics-ping-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866449" comment="fence-agents-hpblade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866450" comment="fence-agents-ibm-powervs-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866451" comment="fence-agents-ibm-vpc-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866452" comment="fence-agents-ibmblade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866453" comment="fence-agents-ifmib-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866454" comment="fence-agents-ilo-moonshot-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866455" comment="fence-agents-ilo-mp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866456" comment="fence-agents-ilo-ssh-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866457" comment="fence-agents-ilo2-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866458" comment="fence-agents-intelmodular-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866459" comment="fence-agents-ipdu-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866460" comment="fence-agents-ipmilan-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866461" comment="fence-agents-kdump-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866462" comment="fence-agents-kubevirt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866463" comment="fence-agents-mpath-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866464" comment="fence-agents-openstack-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866465" comment="fence-agents-redfish-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866466" comment="fence-agents-rhevm-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866467" comment="fence-agents-rsa-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866468" comment="fence-agents-rsb-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866469" comment="fence-agents-sbd-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866470" comment="fence-agents-scsi-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866471" comment="fence-agents-virsh-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866472" comment="fence-agents-vmware-rest-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866473" comment="fence-agents-vmware-soap-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866474" comment="fence-agents-wti-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866475" comment="fence-virt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866476" comment="fence-virtd-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866477" comment="fence-virtd-cpg-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866478" comment="fence-virtd-libvirt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866479" comment="fence-virtd-multicast-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866480" comment="fence-virtd-serial-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866481" comment="fence-virtd-tcp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866482" comment="ha-cloud-support-4.10.0-62.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52340</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52340" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52340" ref_url="https://www.suse.com/security/cve/CVE-2023-52340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    The IPv6 implementation in the Linux kernel before 6.3 has a net/ipv6/route.c max_size threshold that can be consumed easily, e.g., leading to a denial of service (network is unreachable errors) when IPv6 packets are sent in a loop via a raw socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52340/">CVE-2023-52340 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52340">CVE-2023-52340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219295">SUSE bug 1219295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219296">SUSE bug 1219296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52425" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52425" ref_url="https://www.suse.com/security/cve/CVE-2023-52425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024203.html" source="SUSE-SU"/>
    <description>
    libexpat through 2.5.0 allows a denial of service (resource consumption) because many full reparsings are required in the case of a large token for which multiple buffer fills are needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52425/">CVE-2023-52425 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52425">CVE-2023-52425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219559">SUSE bug 1219559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851989" comment="expat-2.5.0-1.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851990" comment="expat-devel-2.5.0-1.el9_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52434" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52434" ref_url="https://www.suse.com/security/cve/CVE-2023-52434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential OOBs in smb2_parse_contexts()

Validate offsets and lengths before dereferencing create contexts in
smb2_parse_contexts().

This fixes following oops when accessing invalid create contexts from
server:

  BUG: unable to handle page fault for address: ffff8881178d8cc3
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 4a01067 P4D 4a01067 PUD 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 3 PID: 1736 Comm: mount.cifs Not tainted 6.7.0-rc4 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
  RIP: 0010:smb2_parse_contexts+0xa0/0x3a0 [cifs]
  Code: f8 10 75 13 48 b8 93 ad 25 50 9c b4 11 e7 49 39 06 0f 84 d2 00
  00 00 8b 45 00 85 c0 74 61 41 29 c5 48 01 c5 41 83 fd 0f 76 55 &lt;0f&gt; b7
  7d 04 0f b7 45 06 4c 8d 74 3d 00 66 83 f8 04 75 bc ba 04 00
  RSP: 0018:ffffc900007939e0 EFLAGS: 00010216
  RAX: ffffc90000793c78 RBX: ffff8880180cc000 RCX: ffffc90000793c90
  RDX: ffffc90000793cc0 RSI: ffff8880178d8cc0 RDI: ffff8880180cc000
  RBP: ffff8881178d8cbf R08: ffffc90000793c22 R09: 0000000000000000
  R10: ffff8880180cc000 R11: 0000000000000024 R12: 0000000000000000
  R13: 0000000000000020 R14: 0000000000000000 R15: ffffc90000793c22
  FS: 00007f873753cbc0(0000) GS:ffff88806bc00000(0000)
  knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffff8881178d8cc3 CR3: 00000000181ca000 CR4: 0000000000750ef0
  PKRU: 55555554
  Call Trace:
   &lt;TASK&gt;
   ? __die+0x23/0x70
   ? page_fault_oops+0x181/0x480
   ? search_module_extables+0x19/0x60
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? exc_page_fault+0x1b6/0x1c0
   ? asm_exc_page_fault+0x26/0x30
   ? smb2_parse_contexts+0xa0/0x3a0 [cifs]
   SMB2_open+0x38d/0x5f0 [cifs]
   ? smb2_is_path_accessible+0x138/0x260 [cifs]
   smb2_is_path_accessible+0x138/0x260 [cifs]
   cifs_is_path_remote+0x8d/0x230 [cifs]
   cifs_mount+0x7e/0x350 [cifs]
   cifs_smb3_do_mount+0x128/0x780 [cifs]
   smb3_get_tree+0xd9/0x290 [cifs]
   vfs_get_tree+0x2c/0x100
   ? capable+0x37/0x70
   path_mount+0x2d7/0xb80
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? _raw_spin_unlock_irqrestore+0x44/0x60
   __x64_sys_mount+0x11a/0x150
   do_syscall_64+0x47/0xf0
   entry_SYSCALL_64_after_hwframe+0x6f/0x77
  RIP: 0033:0x7f8737657b1e
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52434/">CVE-2023-52434 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52434">CVE-2023-52434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220148">SUSE bug 1220148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52439</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52439" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52439" ref_url="https://www.suse.com/security/cve/CVE-2023-52439" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio: Fix use-after-free in uio_open

core-1				core-2
-------------------------------------------------------
uio_unregister_device		uio_open
				idev = idr_find()
device_unregister(&amp;idev-&gt;dev)
put_device(&amp;idev-&gt;dev)
uio_device_release
				get_device(&amp;idev-&gt;dev)
kfree(idev)
uio_free_minor(minor)
				uio_release
				put_device(&amp;idev-&gt;dev)
				kfree(idev)
-------------------------------------------------------

In the core-1 uio_unregister_device(), the device_unregister will kfree
idev when the idev-&gt;dev kobject ref is 1. But after core-1
device_unregister, put_device and before doing kfree, the core-2 may
get_device. Then:
1. After core-1 kfree idev, the core-2 will do use-after-free for idev.
2. When core-2 do uio_release and put_device, the idev will be double
   freed.

To address this issue, we can get idev atomic &amp; inc idev reference with
minor_lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52439/">CVE-2023-52439 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52439">CVE-2023-52439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220140">SUSE bug 1220140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52448</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52448" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52448" ref_url="https://www.suse.com/security/cve/CVE-2023-52448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix kernel NULL pointer dereference in gfs2_rgrp_dump

Syzkaller has reported a NULL pointer dereference when accessing
rgd-&gt;rd_rgl in gfs2_rgrp_dump().  This can happen when creating
rgd-&gt;rd_gl fails in read_rindex_entry().  Add a NULL pointer check in
gfs2_rgrp_dump() to prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52448/">CVE-2023-52448 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52448">CVE-2023-52448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220253">SUSE bug 1220253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52450</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52450" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52450" ref_url="https://www.suse.com/security/cve/CVE-2023-52450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()

Get logical socket id instead of physical id in discover_upi_topology()
to avoid out-of-bound access on 'upi = &amp;type-&gt;topology[nid][idx];' line
that leads to NULL pointer dereference in upi_fill_topology()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52450/">CVE-2023-52450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52450">CVE-2023-52450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220237">SUSE bug 1220237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52458" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52458" ref_url="https://www.suse.com/security/cve/CVE-2023-52458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: add check that partition length needs to be aligned with block size

Before calling add partition or resize partition, there is no check
on whether the length is aligned with the logical block size.
If the logical block size of the disk is larger than 512 bytes,
then the partition size maybe not the multiple of the logical block size,
and when the last sector is read, bio_truncate() will adjust the bio size,
resulting in an IO error if the size of the read command is smaller than
the logical block size.If integrity data is supported, this will also
result in a null pointer dereference when calling bio_integrity_free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52458/">CVE-2023-52458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52458">CVE-2023-52458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220428">SUSE bug 1220428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52463</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52463" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52463" ref_url="https://www.suse.com/security/cve/CVE-2023-52463" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: force RO when remounting if SetVariable is not supported

If SetVariable at runtime is not supported by the firmware we never assign
a callback for that function. At the same time mount the efivarfs as
RO so no one can call that.  However, we never check the permission flags
when someone remounts the filesystem as RW. As a result this leads to a
crash looking like this:

$ mount -o remount,rw /sys/firmware/efi/efivars
$ efi-updatevar -f PK.auth PK

[  303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  303.280482] Mem abort info:
[  303.280854]   ESR = 0x0000000086000004
[  303.281338]   EC = 0x21: IABT (current EL), IL = 32 bits
[  303.282016]   SET = 0, FnV = 0
[  303.282414]   EA = 0, S1PTW = 0
[  303.282821]   FSC = 0x04: level 0 translation fault
[  303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000
[  303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
[  303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
[  303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6
[  303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1
[  303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023
[  303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  303.292123] pc : 0x0
[  303.292443] lr : efivar_set_variable_locked+0x74/0xec
[  303.293156] sp : ffff800008673c10
[  303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000
[  303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027
[  303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000
[  303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000
[  303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54
[  303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4
[  303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002
[  303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201
[  303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc
[  303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000
[  303.303341] Call trace:
[  303.303679]  0x0
[  303.303938]  efivar_entry_set_get_size+0x98/0x16c
[  303.304585]  efivarfs_file_write+0xd0/0x1a4
[  303.305148]  vfs_write+0xc4/0x2e4
[  303.305601]  ksys_write+0x70/0x104
[  303.306073]  __arm64_sys_write+0x1c/0x28
[  303.306622]  invoke_syscall+0x48/0x114
[  303.307156]  el0_svc_common.constprop.0+0x44/0xec
[  303.307803]  do_el0_svc+0x38/0x98
[  303.308268]  el0_svc+0x2c/0x84
[  303.308702]  el0t_64_sync_handler+0xf4/0x120
[  303.309293]  el0t_64_sync+0x190/0x194
[  303.309794] Code: ???????? ???????? ???????? ???????? (????????)
[  303.310612] ---[ end trace 0000000000000000 ]---

Fix this by adding a .reconfigure() function to the fs operations which
we can use to check the requested flags and deny anything that's not RO
if the firmware doesn't implement SetVariable at runtime.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52463/">CVE-2023-52463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52463">CVE-2023-52463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220328">SUSE bug 1220328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52469" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52469" ref_url="https://www.suse.com/security/cve/CVE-2023-52469" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/amd/pm: fix a use-after-free in kv_parse_power_table

When ps allocated by kzalloc equals to NULL, kv_parse_power_table
frees adev-&gt;pm.dpm.ps that allocated before. However, after the control
flow goes through the following call chains:

kv_parse_power_table
  |-&gt; kv_dpm_init
        |-&gt; kv_dpm_sw_init
	      |-&gt; kv_dpm_fini

The adev-&gt;pm.dpm.ps is used in the for loop of kv_dpm_fini after its
first free in kv_parse_power_table and causes a use-after-free bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-52469/">CVE-2023-52469 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52469">CVE-2023-52469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220411">SUSE bug 1220411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52470</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52470" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52470" ref_url="https://www.suse.com/security/cve/CVE-2023-52470" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: check the alloc_workqueue return value in radeon_crtc_init()

check the alloc_workqueue return value in radeon_crtc_init()
to avoid null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52470/">CVE-2023-52470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52470">CVE-2023-52470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220413">SUSE bug 1220413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52476" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52476" ref_url="https://www.suse.com/security/cve/CVE-2023-52476" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/lbr: Filter vsyscall addresses

We found that a panic can occur when a vsyscall is made while LBR sampling
is active. If the vsyscall is interrupted (NMI) for perf sampling, this
call sequence can occur (most recent at top):

    __insn_get_emulate_prefix()
    insn_get_emulate_prefix()
    insn_get_prefixes()
    insn_get_opcode()
    decode_branch_type()
    get_branch_type()
    intel_pmu_lbr_filter()
    intel_pmu_handle_irq()
    perf_event_nmi_handler()

Within __insn_get_emulate_prefix() at frame 0, a macro is called:

    peek_nbyte_next(insn_byte_t, insn, i)

Within this macro, this dereference occurs:

    (insn)-&gt;next_byte

Inspecting registers at this point, the value of the next_byte field is the
address of the vsyscall made, for example the location of the vsyscall
version of gettimeofday() at 0xffffffffff600000. The access to an address
in the vsyscall region will trigger an oops due to an unhandled page fault.

To fix the bug, filtering for vsyscalls can be done when
determining the branch type. This patch will return
a "none" branch if a kernel address if found to lie in the
vsyscall region.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52476/">CVE-2023-52476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52476">CVE-2023-52476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220703">SUSE bug 1220703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52478" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52478" ref_url="https://www.suse.com/security/cve/CVE-2023-52478" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: logitech-hidpp: Fix kernel crash on receiver USB disconnect

hidpp_connect_event() has *four* time-of-check vs time-of-use (TOCTOU)
races when it races with itself.

hidpp_connect_event() primarily runs from a workqueue but it also runs
on probe() and if a "device-connected" packet is received by the hw
when the thread running hidpp_connect_event() from probe() is waiting on
the hw, then a second thread running hidpp_connect_event() will be
started from the workqueue.

This opens the following races (note the below code is simplified):

1. Retrieving + printing the protocol (harmless race):

	if (!hidpp-&gt;protocol_major) {
		hidpp_root_get_protocol_version()
		hidpp-&gt;protocol_major = response.rap.params[0];
	}

We can actually see this race hit in the dmesg in the abrt output
attached to rhbz#2227968:

[ 3064.624215] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.
[ 3064.658184] logitech-hidpp-device 0003:046D:4071.0049: HID++ 4.5 device connected.

Testing with extra logging added has shown that after this the 2 threads
take turn grabbing the hw access mutex (send_mutex) so they ping-pong
through all the other TOCTOU cases managing to hit all of them:

2. Updating the name to the HIDPP name (harmless race):

	if (hidpp-&gt;name == hdev-&gt;name) {
		...
		hidpp-&gt;name = new_name;
	}

3. Initializing the power_supply class for the battery (problematic!):

hidpp_initialize_battery()
{
        if (hidpp-&gt;battery.ps)
                return 0;

	probe_battery(); /* Blocks, threads take turns executing this */

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);
}

4. Creating delayed input_device (potentially problematic):

	if (hidpp-&gt;delayed_input)
		return;

	hidpp-&gt;delayed_input = hidpp_allocate_input(hdev);

The really big problem here is 3. Hitting the race leads to the following
sequence:

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);

	...

	hidpp-&gt;battery.desc.properties =
		devm_kmemdup(dev, hidpp_battery_props, cnt, GFP_KERNEL);

	hidpp-&gt;battery.ps =
		devm_power_supply_register(&amp;hidpp-&gt;hid_dev-&gt;dev,
					   &amp;hidpp-&gt;battery.desc, cfg);

So now we have registered 2 power supplies for the same battery,
which looks a bit weird from userspace's pov but this is not even
the really big problem.

Notice how:

1. This is all devm-maganaged
2. The hidpp-&gt;battery.desc struct is shared between the 2 power supplies
3. hidpp-&gt;battery.desc.properties points to the result from the second
   devm_kmemdup()

This causes a use after free scenario on USB disconnect of the receiver:
1. The last registered power supply class device gets unregistered
2. The memory from the last devm_kmemdup() call gets freed,
   hidpp-&gt;battery.desc.properties now points to freed memory
3. The first registered power supply class device gets unregistered,
   this involves sending a remove uevent to userspace which invokes
   power_supply_uevent() to fill the uevent data
4. power_supply_uevent() uses hidpp-&gt;battery.desc.properties which
   now points to freed memory leading to backtraces like this one:

Sep 22 20:01:35 eric kernel: BUG: unable to handle page fault for address: ffffb2140e017f08
...
Sep 22 20:01:35 eric kernel: Workqueue: usb_hub_wq hub_event
Sep 22 20:01:35 eric kernel: RIP: 0010:power_supply_uevent+0xee/0x1d0
...
Sep 22 20:01:35 eric kernel:  ? asm_exc_page_fault+0x26/0x30
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0xee/0x1d0
Sep 22 20:01:35 eric kernel:  ? power_supply_uevent+0x10d/0x1d0
Sep 22 20:01:35 eric kernel:  dev_uevent+0x10f/0x2d0
Sep 22 20:01:35 eric kernel:  kobject_uevent_env+0x291/0x680
Sep 22 20:01:35 eric kernel:  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52478/">CVE-2023-52478 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52478">CVE-2023-52478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220796">SUSE bug 1220796</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52486</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52486" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52486" ref_url="https://www.suse.com/security/cve/CVE-2023-52486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: Don't unref the same fb many times by mistake due to deadlock handling

If we get a deadlock after the fb lookup in drm_mode_page_flip_ioctl()
we proceed to unref the fb and then retry the whole thing from the top.
But we forget to reset the fb pointer back to NULL, and so if we then
get another error during the retry, before the fb lookup, we proceed
the unref the same fb again without having gotten another reference.
The end result is that the fb will (eventually) end up being freed
while it's still in use.

Reset fb to NULL once we've unreffed it to avoid doing it again
until we've done another fb lookup.

This turned out to be pretty easy to hit on a DG2 when doing async
flips (and CONFIG_DEBUG_WW_MUTEX_SLOWPATH=y). The first symptom I
saw that drm_closefb() simply got stuck in a busy loop while walking
the framebuffer list. Fortunately I was able to convince it to oops
instead, and from there it was easier to track down the culprit.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52486/">CVE-2023-52486 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52486">CVE-2023-52486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221277">SUSE bug 1221277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52489" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52489" ref_url="https://www.suse.com/security/cve/CVE-2023-52489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/sparsemem: fix race in accessing memory_section-&gt;usage

The below race is observed on a PFN which falls into the device memory
region with the system memory configuration where PFN's are such that
[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL].  Since normal zone start and end
pfn contains the device memory PFN's as well, the compaction triggered
will try on the device memory PFN's too though they end up in NOP(because
pfn_to_online_page() returns NULL for ZONE_DEVICE memory sections).  When
from other core, the section mappings are being removed for the
ZONE_DEVICE region, that the PFN in question belongs to, on which
compaction is currently being operated is resulting into the kernel crash
with CONFIG_SPASEMEM_VMEMAP enabled.  The crash logs can be seen at [1].

compact_zone()			memunmap_pages
-------------			---------------
__pageblock_pfn_to_page
   ......
 (a)pfn_valid():
     valid_section()//return true
			      (b)__remove_pages()-&gt;
				  sparse_remove_section()-&gt;
				    section_deactivate():
				    [Free the array ms-&gt;usage and set
				     ms-&gt;usage = NULL]
     pfn_section_valid()
     [Access ms-&gt;usage which
     is NULL]

NOTE: From the above it can be said that the race is reduced to between
the pfn_valid()/pfn_section_valid() and the section deactivate with
SPASEMEM_VMEMAP enabled.

The commit b943f045a9af("mm/sparse: fix kernel crash with
pfn_section_valid check") tried to address the same problem by clearing
the SECTION_HAS_MEM_MAP with the expectation of valid_section() returns
false thus ms-&gt;usage is not accessed.

Fix this issue by the below steps:

a) Clear SECTION_HAS_MEM_MAP before freeing the -&gt;usage.

b) RCU protected read side critical section will either return NULL
   when SECTION_HAS_MEM_MAP is cleared or can successfully access -&gt;usage.

c) Free the -&gt;usage with kfree_rcu() and set ms-&gt;usage = NULL.  No
   attempt will be made to access -&gt;usage after this as the
   SECTION_HAS_MEM_MAP is cleared thus valid_section() return false.

Thanks to David/Pavan for their inputs on this patch.

[1] https://lore.kernel.org/linux-mm/994410bb-89aa-d987-1f50-f514903c55aa@quicinc.com/

On Snapdragon SoC, with the mentioned memory configuration of PFN's as
[ZONE_NORMAL ZONE_DEVICE ZONE_NORMAL], we are able to see bunch of
issues daily while testing on a device farm.

For this particular issue below is the log.  Though the below log is
not directly pointing to the pfn_section_valid(){ ms-&gt;usage;}, when we
loaded this dump on T32 lauterbach tool, it is pointing.

[  540.578056] Unable to handle kernel NULL pointer dereference at
virtual address 0000000000000000
[  540.578068] Mem abort info:
[  540.578070]   ESR = 0x0000000096000005
[  540.578073]   EC = 0x25: DABT (current EL), IL = 32 bits
[  540.578077]   SET = 0, FnV = 0
[  540.578080]   EA = 0, S1PTW = 0
[  540.578082]   FSC = 0x05: level 1 translation fault
[  540.578085] Data abort info:
[  540.578086]   ISV = 0, ISS = 0x00000005
[  540.578088]   CM = 0, WnR = 0
[  540.579431] pstate: 82400005 (Nzcv daif +PAN -UAO +TCO -DIT -SSBSBTYPE=--)
[  540.579436] pc : __pageblock_pfn_to_page+0x6c/0x14c
[  540.579454] lr : compact_zone+0x994/0x1058
[  540.579460] sp : ffffffc03579b510
[  540.579463] x29: ffffffc03579b510 x28: 0000000000235800 x27:000000000000000c
[  540.579470] x26: 0000000000235c00 x25: 0000000000000068 x24:ffffffc03579b640
[  540.579477] x23: 0000000000000001 x22: ffffffc03579b660 x21:0000000000000000
[  540.579483] x20: 0000000000235bff x19: ffffffdebf7e3940 x18:ffffffdebf66d140
[  540.579489] x17: 00000000739ba063 x16: 00000000739ba063 x15:00000000009f4bff
[  540.579495] x14: 0000008000000000 x13: 0000000000000000 x12:0000000000000001
[  540.579501] x11: 0000000000000000 x10: 0000000000000000 x9 :ffffff897d2cd440
[  540.579507] x8 : 0000000000000000 x7 : 0000000000000000 x6 :ffffffc03579b5b4
[  540.579512] x5 : 0000000000027f25 x4 : ffffffc03579b5b8 x3 :0000000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52489/">CVE-2023-52489 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52489">CVE-2023-52489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221326">SUSE bug 1221326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52490" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52490" ref_url="https://www.suse.com/security/cve/CVE-2023-52490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1659" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000887.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: migrate: fix getting incorrect page mapping during page migration

When running stress-ng testing, we found below kernel crash after a few hours:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
pc : dentry_name+0xd8/0x224
lr : pointer+0x22c/0x370
sp : ffff800025f134c0
......
Call trace:
  dentry_name+0xd8/0x224
  pointer+0x22c/0x370
  vsnprintf+0x1ec/0x730
  vscnprintf+0x2c/0x60
  vprintk_store+0x70/0x234
  vprintk_emit+0xe0/0x24c
  vprintk_default+0x3c/0x44
  vprintk_func+0x84/0x2d0
  printk+0x64/0x88
  __dump_page+0x52c/0x530
  dump_page+0x14/0x20
  set_migratetype_isolate+0x110/0x224
  start_isolate_page_range+0xc4/0x20c
  offline_pages+0x124/0x474
  memory_block_offline+0x44/0xf4
  memory_subsys_offline+0x3c/0x70
  device_offline+0xf0/0x120
  ......

After analyzing the vmcore, I found this issue is caused by page migration.
The scenario is that, one thread is doing page migration, and we will use the
target page's -&gt;mapping field to save 'anon_vma' pointer between page unmap and
page move, and now the target page is locked and refcount is 1.

Currently, there is another stress-ng thread performing memory hotplug,
attempting to offline the target page that is being migrated. It discovers that
the refcount of this target page is 1, preventing the offline operation, thus
proceeding to dump the page. However, page_mapping() of the target page may
return an incorrect file mapping to crash the system in dump_mapping(), since
the target page-&gt;mapping only saves 'anon_vma' pointer without setting
PAGE_MAPPING_ANON flag.

There are seveval ways to fix this issue:
(1) Setting the PAGE_MAPPING_ANON flag for target page's -&gt;mapping when saving
'anon_vma', but this can confuse PageAnon() for PFN walkers, since the target
page has not built mappings yet.
(2) Getting the page lock to call page_mapping() in __dump_page() to avoid crashing
the system, however, there are still some PFN walkers that call page_mapping()
without holding the page lock, such as compaction.
(3) Using target page-&gt;private field to save the 'anon_vma' pointer and 2 bits
page state, just as page-&gt;mapping records an anonymous page, which can remove
the page_mapping() impact for PFN walkers and also seems a simple way.

So I choose option 3 to fix this issue, and this can also fix other potential
issues for PFN walkers, such as compaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52490/">CVE-2023-52490 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52490">CVE-2023-52490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221325">SUSE bug 1221325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965064" comment="bpftool-7.4.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965065" comment="kernel-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965066" comment="kernel-abi-stablelists-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965067" comment="kernel-core-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965068" comment="kernel-cross-headers-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965069" comment="kernel-debug-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965070" comment="kernel-debug-core-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965073" comment="kernel-debug-modules-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965074" comment="kernel-debug-modules-core-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965075" comment="kernel-debug-modules-extra-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965076" comment="kernel-debug-uki-virt-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965079" comment="kernel-doc-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965080" comment="kernel-headers-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965081" comment="kernel-modules-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965082" comment="kernel-modules-core-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965083" comment="kernel-modules-extra-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965084" comment="kernel-tools-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965085" comment="kernel-tools-libs-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965087" comment="kernel-uki-virt-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965088" comment="kernel-uki-virt-addons-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965089" comment="libperf-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965090" comment="perf-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965091" comment="python3-perf-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965092" comment="rtla-5.14.0-503.26.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965093" comment="rv-5.14.0-503.26.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52522" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52522" ref_url="https://www.suse.com/security/cve/CVE-2023-52522" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix possible store tearing in neigh_periodic_work()

While looking at a related syzbot report involving neigh_periodic_work(),
I found that I forgot to add an annotation when deleting an
RCU protected item from a list.

Readers use rcu_deference(*np), we need to use either
rcu_assign_pointer() or WRITE_ONCE() on writer side
to prevent store tearing.

I use rcu_assign_pointer() to have lockdep support,
this was the choice made in neigh_flush_dev().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52522/">CVE-2023-52522 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52522">CVE-2023-52522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220924">SUSE bug 1220924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52529" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52529" ref_url="https://www.suse.com/security/cve/CVE-2023-52529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: sony: Fix a potential memory leak in sony_probe()

If an error occurs after a successful usb_alloc_urb() call, usb_free_urb()
should be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52529/">CVE-2023-52529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52529">CVE-2023-52529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220929">SUSE bug 1220929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52574" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52574" ref_url="https://www.suse.com/security/cve/CVE-2023-52574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: fix null-ptr-deref when team device type is changed

Get a null-ptr-deref bug as follows with reproducer [1].

BUG: kernel NULL pointer dereference, address: 0000000000000228
...
RIP: 0010:vlan_dev_hard_header+0x35/0x140 [8021q]
...
Call Trace:
 &lt;TASK&gt;
 ? __die+0x24/0x70
 ? page_fault_oops+0x82/0x150
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x26/0x30
 ? vlan_dev_hard_header+0x35/0x140 [8021q]
 ? vlan_dev_hard_header+0x8e/0x140 [8021q]
 neigh_connected_output+0xb2/0x100
 ip6_finish_output2+0x1cb/0x520
 ? nf_hook_slow+0x43/0xc0
 ? ip6_mtu+0x46/0x80
 ip6_finish_output+0x2a/0xb0
 mld_sendpack+0x18f/0x250
 mld_ifc_work+0x39/0x160
 process_one_work+0x1e6/0x3f0
 worker_thread+0x4d/0x2f0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe5/0x120
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30

[1]
$ teamd -t team0 -d -c '{"runner": {"name": "loadbalance"}}'
$ ip link add name t-dummy type dummy
$ ip link add link t-dummy name t-dummy.100 type vlan id 100
$ ip link add name t-nlmon type nlmon
$ ip link set t-nlmon master team0
$ ip link set t-nlmon nomaster
$ ip link set t-dummy up
$ ip link set team0 up
$ ip link set t-dummy.100 down
$ ip link set t-dummy.100 master team0

When enslave a vlan device to team device and team device type is changed
from non-ether to ether, header_ops of team device is changed to
vlan_header_ops. That is incorrect and will trigger null-ptr-deref
for vlan-&gt;real_dev in vlan_dev_hard_header() because team device is not
a vlan device.

Cache eth_header_ops in team_setup(), then assign cached header_ops to
header_ops of team net device when its type is changed from non-ether
to ether to fix the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52574/">CVE-2023-52574 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52574">CVE-2023-52574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220870">SUSE bug 1220870</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52578" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52578" ref_url="https://www.suse.com/security/cve/CVE-2023-52578" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: use DEV_STATS_INC()

syzbot/KCSAN reported data-races in br_handle_frame_finish() [1]
This function can run from multiple cpus without mutual exclusion.

Adopt SMP safe DEV_STATS_INC() to update dev-&gt;stats fields.

Handles updates to dev-&gt;stats.tx_dropped while we are at it.

[1]
BUG: KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish

read-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 1:
br_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189
br_nf_hook_thresh+0x1ed/0x220
br_nf_pre_routing_finish_ipv6+0x50f/0x540
NF_HOOK include/linux/netfilter.h:304 [inline]
br_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178
br_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508
nf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:272 [inline]
br_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417
__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417
__netif_receive_skb_one_core net/core/dev.c:5521 [inline]
__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637
process_backlog+0x21f/0x380 net/core/dev.c:5965
__napi_poll+0x60/0x3b0 net/core/dev.c:6527
napi_poll net/core/dev.c:6594 [inline]
net_rx_action+0x32b/0x750 net/core/dev.c:6727
__do_softirq+0xc1/0x265 kernel/softirq.c:553
run_ksoftirqd+0x17/0x20 kernel/softirq.c:921
smpboot_thread_fn+0x30a/0x4a0 kernel/smpboot.c:164
kthread+0x1d7/0x210 kernel/kthread.c:388
ret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304

read-write to 0xffff8881374b2178 of 8 bytes by interrupt on cpu 0:
br_handle_frame_finish+0xd4f/0xef0 net/bridge/br_input.c:189
br_nf_hook_thresh+0x1ed/0x220
br_nf_pre_routing_finish_ipv6+0x50f/0x540
NF_HOOK include/linux/netfilter.h:304 [inline]
br_nf_pre_routing_ipv6+0x1e3/0x2a0 net/bridge/br_netfilter_ipv6.c:178
br_nf_pre_routing+0x526/0xba0 net/bridge/br_netfilter_hooks.c:508
nf_hook_entry_hookfn include/linux/netfilter.h:144 [inline]
nf_hook_bridge_pre net/bridge/br_input.c:272 [inline]
br_handle_frame+0x4c9/0x940 net/bridge/br_input.c:417
__netif_receive_skb_core+0xa8a/0x21e0 net/core/dev.c:5417
__netif_receive_skb_one_core net/core/dev.c:5521 [inline]
__netif_receive_skb+0x57/0x1b0 net/core/dev.c:5637
process_backlog+0x21f/0x380 net/core/dev.c:5965
__napi_poll+0x60/0x3b0 net/core/dev.c:6527
napi_poll net/core/dev.c:6594 [inline]
net_rx_action+0x32b/0x750 net/core/dev.c:6727
__do_softirq+0xc1/0x265 kernel/softirq.c:553
do_softirq+0x5e/0x90 kernel/softirq.c:454
__local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:396 [inline]
batadv_tt_local_purge+0x1a8/0x1f0 net/batman-adv/translation-table.c:1356
batadv_tt_purge+0x2b/0x630 net/batman-adv/translation-table.c:3560
process_one_work kernel/workqueue.c:2630 [inline]
process_scheduled_works+0x5b8/0xa30 kernel/workqueue.c:2703
worker_thread+0x525/0x730 kernel/workqueue.c:2784
kthread+0x1d7/0x210 kernel/kthread.c:388
ret_from_fork+0x48/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304

value changed: 0x00000000000d7190 -&gt; 0x00000000000d7191

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 14848 Comm: kworker/u4:11 Not tainted 6.6.0-rc1-syzkaller-00236-gad8a69f361b9 #0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52578/">CVE-2023-52578 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52578">CVE-2023-52578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220874">SUSE bug 1220874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52580" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52580" ref_url="https://www.suse.com/security/cve/CVE-2023-52580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/core: Fix ETH_P_1588 flow dissector

When a PTP ethernet raw frame with a size of more than 256 bytes followed
by a 0xff pattern is sent to __skb_flow_dissect, nhoff value calculation
is wrong. For example: hdr-&gt;message_length takes the wrong value (0xffff)
and it does not replicate real header length. In this case, 'nhoff' value
was overridden and the PTP header was badly dissected. This leads to a
kernel crash.

net/core: flow_dissector
net/core flow dissector nhoff = 0x0000000e
net/core flow dissector hdr-&gt;message_length = 0x0000ffff
net/core flow dissector nhoff = 0x0001000d (u16 overflow)
...
skb linear:   00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88
skb frag:     00000000: f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Using the size of the ptp_header struct will allow the corrected
calculation of the nhoff value.

net/core flow dissector nhoff = 0x0000000e
net/core flow dissector nhoff = 0x00000030 (sizeof ptp_header)
...
skb linear:   00000000: 00 a0 c9 00 00 00 00 a0 c9 00 00 00 88 f7 ff ff
skb linear:   00000010: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
skb linear:   00000020: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
skb frag:     00000000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Kernel trace:
[   74.984279] ------------[ cut here ]------------
[   74.989471] kernel BUG at include/linux/skbuff.h:2440!
[   74.995237] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[   75.001098] CPU: 4 PID: 0 Comm: swapper/4 Tainted: G     U            5.15.85-intel-ese-standard-lts #1
[   75.011629] Hardware name: Intel Corporation A-Island (CPU:AlderLake)/A-Island (ID:06), BIOS SB_ADLP.01.01.00.01.03.008.D-6A9D9E73-dirty Mar 30 2023
[   75.026507] RIP: 0010:eth_type_trans+0xd0/0x130
[   75.031594] Code: 03 88 47 78 eb c7 8b 47 68 2b 47 6c 48 8b 97 c0 00 00 00 83 f8 01 7e 1b 48 85 d2 74 06 66 83 3a ff 74 09 b8 00 04 00 00 eb ab &lt;0f&gt; 0b b8 00 01 00 00 eb a2 48 85 ff 74 eb 48 8d 54 24 06 31 f6 b9
[   75.052612] RSP: 0018:ffff9948c0228de0 EFLAGS: 00010297
[   75.058473] RAX: 00000000000003f2 RBX: ffff8e47047dc300 RCX: 0000000000001003
[   75.066462] RDX: ffff8e4e8c9ea040 RSI: ffff8e4704e0a000 RDI: ffff8e47047dc300
[   75.074458] RBP: ffff8e4704e2acc0 R08: 00000000000003f3 R09: 0000000000000800
[   75.082466] R10: 000000000000000d R11: ffff9948c0228dec R12: ffff8e4715e4e010
[   75.090461] R13: ffff9948c0545018 R14: 0000000000000001 R15: 0000000000000800
[   75.098464] FS:  0000000000000000(0000) GS:ffff8e4e8fb00000(0000) knlGS:0000000000000000
[   75.107530] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   75.113982] CR2: 00007f5eb35934a0 CR3: 0000000150e0a002 CR4: 0000000000770ee0
[   75.121980] PKRU: 55555554
[   75.125035] Call Trace:
[   75.127792]  &lt;IRQ&gt;
[   75.130063]  ? eth_get_headlen+0xa4/0xc0
[   75.134472]  igc_process_skb_fields+0xcd/0x150
[   75.139461]  igc_poll+0xc80/0x17b0
[   75.143272]  __napi_poll+0x27/0x170
[   75.147192]  net_rx_action+0x234/0x280
[   75.151409]  __do_softirq+0xef/0x2f4
[   75.155424]  irq_exit_rcu+0xc7/0x110
[   75.159432]  common_interrupt+0xb8/0xd0
[   75.163748]  &lt;/IRQ&gt;
[   75.166112]  &lt;TASK&gt;
[   75.168473]  asm_common_interrupt+0x22/0x40
[   75.173175] RIP: 0010:cpuidle_enter_state+0xe2/0x350
[   75.178749] Code: 85 c0 0f 8f 04 02 00 00 31 ff e8 39 6c 67 ff 45 84 ff 74 12 9c 58 f6 c4 02 0f 85 50 02 00 00 31 ff e8 52 b0 6d ff fb 45 85 f6 &lt;0f&gt; 88 b1 00 00 00 49 63 ce 4c 2b 2c 24 48 89 c8 48 6b d1 68 48 c1
[   75.199757] RSP: 0018:ffff9948c013bea8 EFLAGS: 00000202
[   75.205614] RAX: ffff8e4e8fb00000 RBX: ffffb948bfd23900 RCX: 000000000000001f
[   75.213619] RDX: 0000000000000004 RSI: ffffffff94206161 RDI: ffffffff94212e20
[   75.221620] RBP: 0000000000000004 R08: 000000117568973a R09: 0000000000000001
[   75.229622] R10: 000000000000afc8 R11: ffff8e4e8fb29ce4 R12: ffffffff945ae980
[   75.237628] R13: 000000117568973a R14: 0000000000000004 R15: 0000000000000000
[   75.245635]  ? 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52580/">CVE-2023-52580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52580">CVE-2023-52580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220876">SUSE bug 1220876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52581" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52581" ref_url="https://www.suse.com/security/cve/CVE-2023-52581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix memleak when more than 255 elements expired

When more than 255 elements expired we're supposed to switch to a new gc
container structure.

This never happens: u8 type will wrap before reaching the boundary
and nft_trans_gc_space() always returns true.

This means we recycle the initial gc container structure and
lose track of the elements that came before.

While at it, don't deref 'gc' after we've passed it to call_rcu.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52581/">CVE-2023-52581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52581">CVE-2023-52581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220877">SUSE bug 1220877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52597" ref_url="https://www.suse.com/security/cve/CVE-2023-52597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: fix setting of fpc register

kvm_arch_vcpu_ioctl_set_fpu() allows to set the floating point control
(fpc) register of a guest cpu. The new value is tested for validity by
temporarily loading it into the fpc register.

This may lead to corruption of the fpc register of the host process:
if an interrupt happens while the value is temporarily loaded into the fpc
register, and within interrupt context floating point or vector registers
are used, the current fp/vx registers are saved with save_fpu_regs()
assuming they belong to user space and will be loaded into fp/vx registers
when returning to user space.

test_fp_ctl() restores the original user space / host process fpc register
value, however it will be discarded, when returning to user space.

In result the host process will incorrectly continue to run with the value
that was supposed to be used for a guest cpu.

Fix this by simply removing the test. There is another test right before
the SIE context is entered which will handles invalid values.

This results in a change of behaviour: invalid values will now be accepted
instead of that the ioctl fails with -EINVAL. This seems to be acceptable,
given that this interface is most likely not used anymore, and this is in
addition the same behaviour implemented with the memory mapped interface
(replace invalid values with zero) - see sync_regs() in kvm-s390.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-52597/">CVE-2023-52597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52597">CVE-2023-52597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221040">SUSE bug 1221040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52605" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52605" ref_url="https://www.suse.com/security/cve/CVE-2023-52605" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52605/">CVE-2023-52605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52605">CVE-2023-52605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221039">SUSE bug 1221039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968351" comment="bpftool-7.4.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968352" comment="kernel-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968353" comment="kernel-abi-stablelists-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968354" comment="kernel-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968355" comment="kernel-cross-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968356" comment="kernel-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968357" comment="kernel-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968360" comment="kernel-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968361" comment="kernel-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968362" comment="kernel-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968363" comment="kernel-debug-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968366" comment="kernel-doc-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968367" comment="kernel-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968368" comment="kernel-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968369" comment="kernel-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968370" comment="kernel-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968371" comment="kernel-rt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968372" comment="kernel-rt-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968373" comment="kernel-rt-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968374" comment="kernel-rt-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968376" comment="kernel-rt-debug-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968377" comment="kernel-rt-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968378" comment="kernel-rt-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968379" comment="kernel-rt-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968381" comment="kernel-rt-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968382" comment="kernel-rt-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968383" comment="kernel-rt-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968384" comment="kernel-rt-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968385" comment="kernel-tools-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968386" comment="kernel-tools-libs-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968388" comment="kernel-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968389" comment="kernel-uki-virt-addons-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968390" comment="libperf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968391" comment="perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968392" comment="python3-perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968393" comment="rtla-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968394" comment="rv-5.14.0-503.31.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52610</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52610" ref_url="https://www.suse.com/security/cve/CVE-2023-52610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_ct: fix skb leak and crash on ooo frags

act_ct adds skb-&gt;users before defragmentation. If frags arrive in order,
the last frag's reference is reset in:

  inet_frag_reasm_prepare
    skb_morph

which is not straightforward.

However when frags arrive out of order, nobody unref the last frag, and
all frags are leaked. The situation is even worse, as initiating packet
capture can lead to a crash[0] when skb has been cloned and shared at the
same time.

Fix the issue by removing skb_get() before defragmentation. act_ct
returns TC_ACT_CONSUMED when defrag failed or in progress.

[0]:
[  843.804823] ------------[ cut here ]------------
[  843.809659] kernel BUG at net/core/skbuff.c:2091!
[  843.814516] invalid opcode: 0000 [#1] PREEMPT SMP
[  843.819296] CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G S 6.7.0-rc3 #2
[  843.824107] Hardware name: XFUSION 1288H V6/BC13MBSBD, BIOS 1.29 11/25/2022
[  843.828953] RIP: 0010:pskb_expand_head+0x2ac/0x300
[  843.833805] Code: 8b 70 28 48 85 f6 74 82 48 83 c6 08 bf 01 00 00 00 e8 38 bd ff ff 8b 83 c0 00 00 00 48 03 83 c8 00 00 00 e9 62 ff ff ff 0f 0b &lt;0f&gt; 0b e8 8d d0 ff ff e9 b3 fd ff ff 81 7c 24 14 40 01 00 00 4c 89
[  843.843698] RSP: 0018:ffffc9000cce07c0 EFLAGS: 00010202
[  843.848524] RAX: 0000000000000002 RBX: ffff88811a211d00 RCX: 0000000000000820
[  843.853299] RDX: 0000000000000640 RSI: 0000000000000000 RDI: ffff88811a211d00
[  843.857974] RBP: ffff888127d39518 R08: 00000000bee97314 R09: 0000000000000000
[  843.862584] R10: 0000000000000000 R11: ffff8881109f0000 R12: 0000000000000880
[  843.867147] R13: ffff888127d39580 R14: 0000000000000640 R15: ffff888170f7b900
[  843.871680] FS:  0000000000000000(0000) GS:ffff889ffffc0000(0000) knlGS:0000000000000000
[  843.876242] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  843.880778] CR2: 00007fa42affcfb8 CR3: 000000011433a002 CR4: 0000000000770ef0
[  843.885336] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  843.889809] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  843.894229] PKRU: 55555554
[  843.898539] Call Trace:
[  843.902772]  &lt;IRQ&gt;
[  843.906922]  ? __die_body+0x1e/0x60
[  843.911032]  ? die+0x3c/0x60
[  843.915037]  ? do_trap+0xe2/0x110
[  843.918911]  ? pskb_expand_head+0x2ac/0x300
[  843.922687]  ? do_error_trap+0x65/0x80
[  843.926342]  ? pskb_expand_head+0x2ac/0x300
[  843.929905]  ? exc_invalid_op+0x50/0x60
[  843.933398]  ? pskb_expand_head+0x2ac/0x300
[  843.936835]  ? asm_exc_invalid_op+0x1a/0x20
[  843.940226]  ? pskb_expand_head+0x2ac/0x300
[  843.943580]  inet_frag_reasm_prepare+0xd1/0x240
[  843.946904]  ip_defrag+0x5d4/0x870
[  843.950132]  nf_ct_handle_fragments+0xec/0x130 [nf_conntrack]
[  843.953334]  tcf_ct_act+0x252/0xd90 [act_ct]
[  843.956473]  ? tcf_mirred_act+0x516/0x5a0 [act_mirred]
[  843.959657]  tcf_action_exec+0xa1/0x160
[  843.962823]  fl_classify+0x1db/0x1f0 [cls_flower]
[  843.966010]  ? skb_clone+0x53/0xc0
[  843.969173]  tcf_classify+0x24d/0x420
[  843.972333]  tc_run+0x8f/0xf0
[  843.975465]  __netif_receive_skb_core+0x67a/0x1080
[  843.978634]  ? dev_gro_receive+0x249/0x730
[  843.981759]  __netif_receive_skb_list_core+0x12d/0x260
[  843.984869]  netif_receive_skb_list_internal+0x1cb/0x2f0
[  843.987957]  ? mlx5e_handle_rx_cqe_mpwrq_rep+0xfa/0x1a0 [mlx5_core]
[  843.991170]  napi_complete_done+0x72/0x1a0
[  843.994305]  mlx5e_napi_poll+0x28c/0x6d0 [mlx5_core]
[  843.997501]  __napi_poll+0x25/0x1b0
[  844.000627]  net_rx_action+0x256/0x330
[  844.003705]  __do_softirq+0xb3/0x29b
[  844.006718]  irq_exit_rcu+0x9e/0xc0
[  844.009672]  common_interrupt+0x86/0xa0
[  844.012537]  &lt;/IRQ&gt;
[  844.015285]  &lt;TASK&gt;
[  844.017937]  asm_common_interrupt+0x26/0x40
[  844.020591] RIP: 0010:acpi_safe_halt+0x1b/0x20
[  844.023247] Code: ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 65 48 8b 04 25 00 18 03 00 48 8b 00 a8 08 75 0c 66 90 0f 00 2d 81 d0 44 00 fb
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52610/">CVE-2023-52610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52610">CVE-2023-52610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221610">SUSE bug 1221610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52620</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52620" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52620" ref_url="https://www.suse.com/security/cve/CVE-2023-52620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow timeout for anonymous sets

Never used from userspace, disallow these parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52620/">CVE-2023-52620 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52620">CVE-2023-52620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221825">SUSE bug 1221825</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52626" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52626" ref_url="https://www.suse.com/security/cve/CVE-2023-52626" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context

Indirection (*) is of lower precedence than postfix increment (++). Logic
in napi_poll context would cause an out-of-bound read by first increment
the pointer address by byte address space and then dereference the value.
Rather, the intended logic was to dereference first and then increment the
underlying value.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52626/">CVE-2023-52626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52626">CVE-2023-52626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222054">SUSE bug 1222054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52628" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52628" ref_url="https://www.suse.com/security/cve/CVE-2023-52628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018820.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: exthdr: fix 4-byte stack OOB write

If priv-&gt;len is a multiple of 4, then dst[len / 4] can write past
the destination array which leads to stack corruption.

This construct is necessary to clean the remainder of the register
in case -&gt;len is NOT a multiple of the register size, so make it
conditional just like nft_payload.c does.

The bug was added in 4.1 cycle and then copied/inherited when
tcp/sctp and ip option support was added.

Bug reported by Zero Day Initiative project (ZDI-CAN-21950,
ZDI-CAN-21951, ZDI-CAN-21961).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52628/">CVE-2023-52628 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52628">CVE-2023-52628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222117">SUSE bug 1222117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222118">SUSE bug 1222118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52638" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52638" ref_url="https://www.suse.com/security/cve/CVE-2023-52638" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock

The following 3 locks would race against each other, causing the
deadlock situation in the Syzbot bug report:

- j1939_socks_lock
- active_session_list_lock
- sk_session_queue_lock

A reasonable fix is to change j1939_socks_lock to an rwlock, since in
the rare situations where a write lock is required for the linked list
that j1939_socks_lock is protecting, the code does not attempt to
acquire any more locks. This would break the circular lock dependency,
where, for example, the current thread already locks j1939_socks_lock
and attempts to acquire sk_session_queue_lock, and at the same time,
another thread attempts to acquire j1939_socks_lock while holding
sk_session_queue_lock.

NOTE: This patch along does not fix the unregister_netdevice bug
reported by Syzbot; instead, it solves a deadlock situation to prepare
for one or more further patches to actually fix the Syzbot bug, which
appears to be a reference counting problem within the j1939 codebase.

[mkl: remove unrelated newline change]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52638/">CVE-2023-52638 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52638">CVE-2023-52638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222299">SUSE bug 1222299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52651</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52651" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52651" ref_url="https://www.suse.com/security/cve/CVE-2023-52651" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52651/">CVE-2023-52651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52651">CVE-2023-52651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230621">SUSE bug 1230621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52658" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52658" ref_url="https://www.suse.com/security/cve/CVE-2023-52658" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "net/mlx5: Block entering switchdev mode with ns inconsistency"

This reverts commit 662404b24a4c4d839839ed25e3097571f5938b9b.
The revert is required due to the suspicion it is not good for anything
and cause crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52658/">CVE-2023-52658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52658">CVE-2023-52658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224719">SUSE bug 1224719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52667</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52667" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52667" ref_url="https://www.suse.com/security/cve/CVE-2023-52667" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix a potential double-free in fs_any_create_groups

When kcalloc() for ft-&gt;g succeeds but kvzalloc() for in fails,
fs_any_create_groups() will free ft-&gt;g. However, its caller
fs_any_create_table() will free ft-&gt;g again through calling
mlx5e_destroy_flow_table(), which will lead to a double-free.
Fix this by setting ft-&gt;g to NULL in fs_any_create_groups().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52667/">CVE-2023-52667 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52667">CVE-2023-52667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224603">SUSE bug 1224603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52672" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52672" ref_url="https://www.suse.com/security/cve/CVE-2023-52672" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pipe: wakeup wr_wait after setting max_usage

Commit c73be61cede5 ("pipe: Add general notification queue support") a
regression was introduced that would lock up resized pipes under certain
conditions. See the reproducer in [1].

The commit resizing the pipe ring size was moved to a different
function, doing that moved the wakeup for pipe-&gt;wr_wait before actually
raising pipe-&gt;max_usage. If a pipe was full before the resize occured it
would result in the wakeup never actually triggering pipe_write.

Set @max_usage and @nr_accounted before waking writers if this isn't a
watch queue.

[Christian Brauner &lt;brauner@kernel.org&gt;: rewrite to account for watch queues]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52672/">CVE-2023-52672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52672">CVE-2023-52672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224614">SUSE bug 1224614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52707</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52707" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52707" ref_url="https://www.suse.com/security/cve/CVE-2023-52707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/psi: Fix use-after-free in ep_remove_wait_queue()

If a non-root cgroup gets removed when there is a thread that registered
trigger and is polling on a pressure file within the cgroup, the polling
waitqueue gets freed in the following path:

 do_rmdir
   cgroup_rmdir
     kernfs_drain_open_files
       cgroup_file_release
         cgroup_pressure_release
           psi_trigger_destroy

However, the polling thread still has a reference to the pressure file and
will access the freed waitqueue when the file is closed or upon exit:

 fput
   ep_eventpoll_release
     ep_free
       ep_remove_wait_queue
         remove_wait_queue

This results in use-after-free as pasted below.

The fundamental problem here is that cgroup_file_release() (and
consequently waitqueue's lifetime) is not tied to the file's real lifetime.
Using wake_up_pollfree() here might be less than ideal, but it is in line
with the comment at commit 42288cb44c4b ("wait: add wake_up_pollfree()")
since the waitqueue's lifetime is not tied to file's one and can be
considered as another special case. While this would be fixable by somehow
making cgroup_file_release() be tied to the fput(), it would require
sizable refactoring at cgroups or higher layer which might be more
justifiable if we identify more cases like this.

  BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0
  Write of size 4 at addr ffff88810e625328 by task a.out/4404

	CPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38
	Hardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017
	Call Trace:
	&lt;TASK&gt;
	dump_stack_lvl+0x73/0xa0
	print_report+0x16c/0x4e0
	kasan_report+0xc3/0xf0
	kasan_check_range+0x2d2/0x310
	_raw_spin_lock_irqsave+0x60/0xc0
	remove_wait_queue+0x1a/0xa0
	ep_free+0x12c/0x170
	ep_eventpoll_release+0x26/0x30
	__fput+0x202/0x400
	task_work_run+0x11d/0x170
	do_exit+0x495/0x1130
	do_group_exit+0x100/0x100
	get_signal+0xd67/0xde0
	arch_do_signal_or_restart+0x2a/0x2b0
	exit_to_user_mode_prepare+0x94/0x100
	syscall_exit_to_user_mode+0x20/0x40
	do_syscall_64+0x52/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd
	&lt;/TASK&gt;

 Allocated by task 4404:

	kasan_set_track+0x3d/0x60
	__kasan_kmalloc+0x85/0x90
	psi_trigger_create+0x113/0x3e0
	pressure_write+0x146/0x2e0
	cgroup_file_write+0x11c/0x250
	kernfs_fop_write_iter+0x186/0x220
	vfs_write+0x3d8/0x5c0
	ksys_write+0x90/0x110
	do_syscall_64+0x43/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd

 Freed by task 4407:

	kasan_set_track+0x3d/0x60
	kasan_save_free_info+0x27/0x40
	____kasan_slab_free+0x11d/0x170
	slab_free_freelist_hook+0x87/0x150
	__kmem_cache_free+0xcb/0x180
	psi_trigger_destroy+0x2e8/0x310
	cgroup_file_release+0x4f/0xb0
	kernfs_drain_open_files+0x165/0x1f0
	kernfs_drain+0x162/0x1a0
	__kernfs_remove+0x1fb/0x310
	kernfs_remove_by_name_ns+0x95/0xe0
	cgroup_addrm_files+0x67f/0x700
	cgroup_destroy_locked+0x283/0x3c0
	cgroup_rmdir+0x29/0x100
	kernfs_iop_rmdir+0xd1/0x140
	vfs_rmdir+0xfe/0x240
	do_rmdir+0x13d/0x280
	__x64_sys_rmdir+0x2c/0x30
	do_syscall_64+0x43/0x90
	entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52707/">CVE-2023-52707 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52707">CVE-2023-52707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225109">SUSE bug 1225109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225190">SUSE bug 1225190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52734" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52734" ref_url="https://www.suse.com/security/cve/CVE-2023-52734" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Not set</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-52734/">CVE-2023-52734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52734">CVE-2023-52734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225234">SUSE bug 1225234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52735" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52735" ref_url="https://www.suse.com/security/cve/CVE-2023-52735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself

sock_map proto callbacks should never call themselves by design. Protect
against bugs like [1] and break out of the recursive loop to avoid a stack
overflow in favor of a resource leak.

[1] https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52735/">CVE-2023-52735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52735">CVE-2023-52735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225475">SUSE bug 1225475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52771</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52771" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52771" ref_url="https://www.suse.com/security/cve/CVE-2023-52771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/port: Fix delete_endpoint() vs parent unregistration race

The CXL subsystem, at cxl_mem -&gt;probe() time, establishes a lineage of
ports (struct cxl_port objects) between an endpoint and the root of a
CXL topology. Each port including the endpoint port is attached to the
cxl_port driver.

Given that setup, it follows that when either any port in that lineage
goes through a cxl_port -&gt;remove() event, or the memdev goes through a
cxl_mem -&gt;remove() event. The hierarchy below the removed port, or the
entire hierarchy if the memdev is removed needs to come down.

The delete_endpoint() callback is careful to check whether it is being
called to tear down the hierarchy, or if it is only being called to
teardown the memdev because an ancestor port is going through
-&gt;remove().

That care needs to take the device_lock() of the endpoint's parent.
Which requires 2 bugs to be fixed:

1/ A reference on the parent is needed to prevent use-after-free
   scenarios like this signature:

    BUG: spinlock bad magic on CPU#0, kworker/u56:0/11
    Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc38 05/24/2023
    Workqueue: cxl_port detach_memdev [cxl_core]
    RIP: 0010:spin_bug+0x65/0xa0
    Call Trace:
      do_raw_spin_lock+0x69/0xa0
     __mutex_lock+0x695/0xb80
     delete_endpoint+0xad/0x150 [cxl_core]
     devres_release_all+0xb8/0x110
     device_unbind_cleanup+0xe/0x70
     device_release_driver_internal+0x1d2/0x210
     detach_memdev+0x15/0x20 [cxl_core]
     process_one_work+0x1e3/0x4c0
     worker_thread+0x1dd/0x3d0

2/ In the case of RCH topologies, the parent device that needs to be
   locked is not always @port-&gt;dev as returned by cxl_mem_find_port(), use
   endpoint-&gt;dev.parent instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52771/">CVE-2023-52771 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52771">CVE-2023-52771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225007">SUSE bug 1225007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52796" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52796" ref_url="https://www.suse.com/security/cve/CVE-2023-52796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvlan: add ipvlan_route_v6_outbound() helper

Inspired by syzbot reports using a stack of multiple ipvlan devices.

Reduce stack size needed in ipvlan_process_v6_outbound() by moving
the flowi6 struct used for the route lookup in an non inlined
helper. ipvlan_route_v6_outbound() needs 120 bytes on the stack,
immediately reclaimed.

Also make sure ipvlan_process_v4_outbound() is not inlined.

We might also have to lower MAX_NEST_DEV, because only syzbot uses
setups with more than four stacked devices.

BUG: TASK stack guard page was hit at ffffc9000e803ff8 (stack is ffffc9000e804000..ffffc9000e808000)
stack guard page: 0000 [#1] SMP KASAN
CPU: 0 PID: 13442 Comm: syz-executor.4 Not tainted 6.1.52-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023
RIP: 0010:kasan_check_range+0x4/0x2a0 mm/kasan/generic.c:188
Code: 48 01 c6 48 89 c7 e8 db 4e c1 03 31 c0 5d c3 cc 0f 0b eb 02 0f 0b b8 ea ff ff ff 5d c3 cc 00 00 cc cc 00 00 cc cc 55 48 89 e5 &lt;41&gt; 57 41 56 41 55 41 54 53 b0 01 48 85 f6 0f 84 a4 01 00 00 48 89
RSP: 0018:ffffc9000e804000 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817e5bf2
RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff887c6568
RBP: ffffc9000e804000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: dffffc0000000001 R12: 1ffff92001d0080c
R13: dffffc0000000000 R14: ffffffff87e6b100 R15: 0000000000000000
FS: 00007fd0c55826c0(0000) GS:ffff8881f6800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000e803ff8 CR3: 0000000170ef7000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;#DF&gt;
&lt;/#DF&gt;
&lt;TASK&gt;
[&lt;ffffffff81f281d1&gt;] __kasan_check_read+0x11/0x20 mm/kasan/shadow.c:31
[&lt;ffffffff817e5bf2&gt;] instrument_atomic_read include/linux/instrumented.h:72 [inline]
[&lt;ffffffff817e5bf2&gt;] _test_bit include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
[&lt;ffffffff817e5bf2&gt;] cpumask_test_cpu include/linux/cpumask.h:506 [inline]
[&lt;ffffffff817e5bf2&gt;] cpu_online include/linux/cpumask.h:1092 [inline]
[&lt;ffffffff817e5bf2&gt;] trace_lock_acquire include/trace/events/lock.h:24 [inline]
[&lt;ffffffff817e5bf2&gt;] lock_acquire+0xe2/0x590 kernel/locking/lockdep.c:5632
[&lt;ffffffff8563221e&gt;] rcu_lock_acquire+0x2e/0x40 include/linux/rcupdate.h:306
[&lt;ffffffff8561464d&gt;] rcu_read_lock include/linux/rcupdate.h:747 [inline]
[&lt;ffffffff8561464d&gt;] ip6_pol_route+0x15d/0x1440 net/ipv6/route.c:2221
[&lt;ffffffff85618120&gt;] ip6_pol_route_output+0x50/0x80 net/ipv6/route.c:2606
[&lt;ffffffff856f65b5&gt;] pol_lookup_func include/net/ip6_fib.h:584 [inline]
[&lt;ffffffff856f65b5&gt;] fib6_rule_lookup+0x265/0x620 net/ipv6/fib6_rules.c:116
[&lt;ffffffff85618009&gt;] ip6_route_output_flags_noref+0x2d9/0x3a0 net/ipv6/route.c:2638
[&lt;ffffffff8561821a&gt;] ip6_route_output_flags+0xca/0x340 net/ipv6/route.c:2651
[&lt;ffffffff838bd5a3&gt;] ip6_route_output include/net/ip6_route.h:100 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:473 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:529 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:602 [inline]
[&lt;ffffffff838bd5a3&gt;] ipvlan_queue_xmit+0xc33/0x1be0 drivers/net/ipvlan/ipvlan_core.c:677
[&lt;ffffffff838c2909&gt;] ipvlan_start_xmit+0x49/0x100 drivers/net/ipvlan/ipvlan_main.c:229
[&lt;ffffffff84d03900&gt;] netdev_start_xmit include/linux/netdevice.h:4966 [inline]
[&lt;ffffffff84d03900&gt;] xmit_one net/core/dev.c:3644 [inline]
[&lt;ffffffff84d03900&gt;] dev_hard_start_xmit+0x320/0x980 net/core/dev.c:3660
[&lt;ffffffff84d080e2&gt;] __dev_queue_xmit+0x16b2/0x3370 net/core/dev.c:4324
[&lt;ffffffff855ce4cd&gt;] dev_queue_xmit include/linux/netdevice.h:3067 [inline]
[&lt;ffffffff855ce4cd&gt;] neigh_hh_output include/net/neighbour.h:529 [inline]
[&lt;f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52796/">CVE-2023-52796 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52796">CVE-2023-52796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224930">SUSE bug 1224930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52801" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52801" ref_url="https://www.suse.com/security/cve/CVE-2023-52801" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Fix missing update of domains_itree after splitting iopt_area

In iopt_area_split(), if the original iopt_area has filled a domain and is
linked to domains_itree, pages_nodes have to be properly
reinserted. Otherwise the domains_itree becomes corrupted and we will UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52801/">CVE-2023-52801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52801">CVE-2023-52801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225006">SUSE bug 1225006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52809" ref_url="https://www.suse.com/security/cve/CVE-2023-52809" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()

fc_lport_ptp_setup() did not check the return value of fc_rport_create()
which can return NULL and would cause a NULL pointer dereference. Address
this issue by checking return value of fc_rport_create() and log error
message on fc_rport_create() failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52809/">CVE-2023-52809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52809">CVE-2023-52809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225556">SUSE bug 1225556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52817" ref_url="https://www.suse.com/security/cve/CVE-2023-52817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL

In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:

1. Navigate to the directory: /sys/kernel/debug/dri/0
2. Execute command: cat amdgpu_regs_smc
3. Exception Log::
[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000
[4005007.702562] #PF: supervisor instruction fetch in kernel mode
[4005007.702567] #PF: error_code(0x0010) - not-present page
[4005007.702570] PGD 0 P4D 0
[4005007.702576] Oops: 0010 [#1] SMP NOPTI
[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G           OE     5.15.0-43-generic #46-Ubunt       u
[4005007.702590] RIP: 0010:0x0
[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206
[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68
[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000
[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980
[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000
[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000
[4005007.702622] FS:  00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000
[4005007.702626] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0
[4005007.702633] Call Trace:
[4005007.702636]  &lt;TASK&gt;
[4005007.702640]  amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]
[4005007.703002]  full_proxy_read+0x5c/0x80
[4005007.703011]  vfs_read+0x9f/0x1a0
[4005007.703019]  ksys_read+0x67/0xe0
[4005007.703023]  __x64_sys_read+0x19/0x20
[4005007.703028]  do_syscall_64+0x5c/0xc0
[4005007.703034]  ? do_user_addr_fault+0x1e3/0x670
[4005007.703040]  ? exit_to_user_mode_prepare+0x37/0xb0
[4005007.703047]  ? irqentry_exit_to_user_mode+0x9/0x20
[4005007.703052]  ? irqentry_exit+0x19/0x30
[4005007.703057]  ? exc_page_fault+0x89/0x160
[4005007.703062]  ? asm_exc_page_fault+0x8/0x30
[4005007.703068]  entry_SYSCALL_64_after_hwframe+0x44/0xae
[4005007.703075] RIP: 0033:0x7f5e07672992
[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f        1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e       c 28 48 89 54 24
[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992
[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003
[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010
[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000
[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000
[4005007.703105]  &lt;/TASK&gt;
[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_       iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t       tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm       i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo       mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v       2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core        drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca
[4005007.703184] CR2: 0000000000000000
[4005007.703188] ---[ en
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52817/">CVE-2023-52817 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52817">CVE-2023-52817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225569">SUSE bug 1225569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52832</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52832" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52832" ref_url="https://www.suse.com/security/cve/CVE-2023-52832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't return unset power in ieee80211_get_tx_power()

We can get a UBSAN warning if ieee80211_get_tx_power() returns the
INT_MIN value mac80211 internally uses for "unset power level".

 UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5
 -2147483648 * 100 cannot be represented in type 'int'
 CPU: 0 PID: 20433 Comm: insmod Tainted: G        WC OE
 Call Trace:
  dump_stack+0x74/0x92
  ubsan_epilogue+0x9/0x50
  handle_overflow+0x8d/0xd0
  __ubsan_handle_mul_overflow+0xe/0x10
  nl80211_send_iface+0x688/0x6b0 [cfg80211]
  [...]
  cfg80211_register_wdev+0x78/0xb0 [cfg80211]
  cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]
  [...]
  ieee80211_if_add+0x60e/0x8f0 [mac80211]
  ieee80211_register_hw+0xda5/0x1170 [mac80211]

In this case, simply return an error instead, to indicate
that no data is available.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52832/">CVE-2023-52832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52832">CVE-2023-52832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225577">SUSE bug 1225577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52864" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52864" ref_url="https://www.suse.com/security/cve/CVE-2023-52864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: wmi: Fix opening of char device

Since commit fa1f68db6ca7 ("drivers: misc: pass miscdevice pointer via
file private data"), the miscdevice stores a pointer to itself inside
filp-&gt;private_data, which means that private_data will not be NULL when
wmi_char_open() is called. This might cause memory corruption should
wmi_char_open() be unable to find its driver, something which can
happen when the associated WMI device is deleted in wmi_free_devices().

Fix the problem by using the miscdevice pointer to retrieve the WMI
device data associated with a char device using container_of(). This
also avoids wmi_char_open() picking a wrong WMI device bound to a
driver with the same name as the original driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52864/">CVE-2023-52864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52864">CVE-2023-52864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225132">SUSE bug 1225132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52880" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52880" ref_url="https://www.suse.com/security/cve/CVE-2023-52880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: require CAP_NET_ADMIN to attach N_GSM0710 ldisc

Any unprivileged user can attach N_GSM0710 ldisc, but it requires
CAP_NET_ADMIN to create a GSM network anyway.

Require initial namespace CAP_NET_ADMIN to do that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-52880/">CVE-2023-52880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52880">CVE-2023-52880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222619">SUSE bug 1222619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52881" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52881" ref_url="https://www.suse.com/security/cve/CVE-2023-52881" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: do not accept ACK of bytes we never sent

This patch is based on a detailed report and ideas from Yepeng Pan
and Christian Rossow.

ACK seq validation is currently following RFC 5961 5.2 guidelines:

   The ACK value is considered acceptable only if
   it is in the range of ((SND.UNA - MAX.SND.WND) &lt;= SEG.ACK &lt;=
   SND.NXT).  All incoming segments whose ACK value doesn't satisfy the
   above condition MUST be discarded and an ACK sent back.  It needs to
   be noted that RFC 793 on page 72 (fifth check) says: "If the ACK is a
   duplicate (SEG.ACK &lt; SND.UNA), it can be ignored.  If the ACK
   acknowledges something not yet sent (SEG.ACK &gt; SND.NXT) then send an
   ACK, drop the segment, and return".  The "ignored" above implies that
   the processing of the incoming data segment continues, which means
   the ACK value is treated as acceptable.  This mitigation makes the
   ACK check more stringent since any ACK &lt; SND.UNA wouldn't be
   accepted, instead only ACKs that are in the range ((SND.UNA -
   MAX.SND.WND) &lt;= SEG.ACK &lt;= SND.NXT) get through.

This can be refined for new (and possibly spoofed) flows,
by not accepting ACK for bytes that were never sent.

This greatly improves TCP security at a little cost.

I added a Fixes: tag to make sure this patch will reach stable trees,
even if the 'blamed' patch was adhering to the RFC.

tp-&gt;bytes_acked was added in linux-4.2

Following packetdrill test (courtesy of Yepeng Pan) shows
the issue at hand:

0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3
+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0
+0 bind(3, ..., ...) = 0
+0 listen(3, 1024) = 0

// ---------------- Handshake ------------------- //

// when window scale is set to 14 the window size can be extended to
// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet
// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)
// ,though this ack number acknowledges some data never
// sent by the server.

+0 &lt; S 0:0(0) win 65535 &lt;mss 1400,nop,wscale 14&gt;
+0 &gt; S. 0:0(0) ack 1 &lt;...&gt;
+0 &lt; . 1:1(0) ack 1 win 65535
+0 accept(3, ..., ...) = 4

// For the established connection, we send an ACK packet,
// the ack packet uses ack number 1 - 1073725300 + 2^32,
// where 2^32 is used to wrap around.
// Note: we used 1073725300 instead of 1073725440 to avoid possible
// edge cases.
// 1 - 1073725300 + 2^32 = 3221241997

// Oops, old kernels happily accept this packet.
+0 &lt; . 1:1001(1000) ack 3221241997 win 65535

// After the kernel fix the following will be replaced by a challenge ACK,
// and prior malicious frame would be dropped.
+0 &gt; . 1:1(0) ack 1001
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52881/">CVE-2023-52881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52881">CVE-2023-52881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225611">SUSE bug 1225611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226152">SUSE bug 1226152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52884" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52884" ref_url="https://www.suse.com/security/cve/CVE-2023-52884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: cyapa - add missing input core locking to suspend/resume functions

Grab input-&gt;mutex during suspend/resume functions like it is done in
other input drivers. This fixes the following warning during system
suspend/resume cycle on Samsung Exynos5250-based Snow Chromebook:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c
Modules linked in: ...
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G        W          6.6.0-rc5-next-20231009 #14109
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound async_run_entry_fn
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x58/0x70
 dump_stack_lvl from __warn+0x1a8/0x1cc
 __warn from warn_slowpath_fmt+0x18c/0x1b4
 warn_slowpath_fmt from input_device_enabled+0x68/0x6c
 input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc
 cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c
 cyapa_reinitialize from cyapa_resume+0x48/0x98
 cyapa_resume from dpm_run_callback+0x90/0x298
 dpm_run_callback from device_resume+0xb4/0x258
 device_resume from async_resume+0x20/0x64
 async_resume from async_run_entry_fn+0x40/0x15c
 async_run_entry_fn from process_scheduled_works+0xbc/0x6a8
 process_scheduled_works from worker_thread+0x188/0x454
 worker_thread from kthread+0x108/0x140
 kthread from ret_from_fork+0x14/0x28
Exception stack(0xf1625fb0 to 0xf1625ff8)
...
---[ end trace 0000000000000000 ]---
...
------------[ cut here ]------------
WARNING: CPU: 1 PID: 1680 at drivers/input/input.c:2291 input_device_enabled+0x68/0x6c
Modules linked in: ...
CPU: 1 PID: 1680 Comm: kworker/u4:12 Tainted: G        W          6.6.0-rc5-next-20231009 #14109
Hardware name: Samsung Exynos (Flattened Device Tree)
Workqueue: events_unbound async_run_entry_fn
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x58/0x70
 dump_stack_lvl from __warn+0x1a8/0x1cc
 __warn from warn_slowpath_fmt+0x18c/0x1b4
 warn_slowpath_fmt from input_device_enabled+0x68/0x6c
 input_device_enabled from cyapa_gen3_set_power_mode+0x13c/0x1dc
 cyapa_gen3_set_power_mode from cyapa_reinitialize+0x10c/0x15c
 cyapa_reinitialize from cyapa_resume+0x48/0x98
 cyapa_resume from dpm_run_callback+0x90/0x298
 dpm_run_callback from device_resume+0xb4/0x258
 device_resume from async_resume+0x20/0x64
 async_resume from async_run_entry_fn+0x40/0x15c
 async_run_entry_fn from process_scheduled_works+0xbc/0x6a8
 process_scheduled_works from worker_thread+0x188/0x454
 worker_thread from kthread+0x108/0x140
 kthread from ret_from_fork+0x14/0x28
Exception stack(0xf1625fb0 to 0xf1625ff8)
...
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52884/">CVE-2023-52884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52884">CVE-2023-52884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226764">SUSE bug 1226764</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52905" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52905" ref_url="https://www.suse.com/security/cve/CVE-2023-52905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix resource leakage in VF driver unbind

resources allocated like mcam entries to support the Ntuple feature
and hash tables for the tc feature are not getting freed in driver
unbind. This patch fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52905/">CVE-2023-52905 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52905">CVE-2023-52905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229528">SUSE bug 1229528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52917" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52917" ref_url="https://www.suse.com/security/cve/CVE-2023-52917" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52917/">CVE-2023-52917 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52917">CVE-2023-52917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231849">SUSE bug 1231849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52922" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52922" ref_url="https://www.suse.com/security/cve/CVE-2023-52922" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000989.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Fix UAF in bcm_proc_show()

BUG: KASAN: slab-use-after-free in bcm_proc_show+0x969/0xa80
Read of size 8 at addr ffff888155846230 by task cat/7862

CPU: 1 PID: 7862 Comm: cat Not tainted 6.5.0-rc1-00153-gc8746099c197 #230
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xd5/0x150
 print_report+0xc1/0x5e0
 kasan_report+0xba/0xf0
 bcm_proc_show+0x969/0xa80
 seq_read_iter+0x4f6/0x1260
 seq_read+0x165/0x210
 proc_reg_read+0x227/0x300
 vfs_read+0x1d5/0x8d0
 ksys_read+0x11e/0x240
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Allocated by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_kmalloc+0x9e/0xa0
 bcm_sendmsg+0x264b/0x44e0
 sock_sendmsg+0xda/0x180
 ____sys_sendmsg+0x735/0x920
 ___sys_sendmsg+0x11d/0x1b0
 __sys_sendmsg+0xfa/0x1d0
 do_syscall_64+0x35/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Freed by task 7846:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 ____kasan_slab_free+0x161/0x1c0
 slab_free_freelist_hook+0x119/0x220
 __kmem_cache_free+0xb4/0x2e0
 rcu_core+0x809/0x1bd0

bcm_op is freed before procfs entry be removed in bcm_release(),
this lead to bcm_proc_show() may read the freed bcm_op.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52922/">CVE-2023-52922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52922">CVE-2023-52922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233977">SUSE bug 1233977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968351" comment="bpftool-7.4.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968352" comment="kernel-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968353" comment="kernel-abi-stablelists-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968354" comment="kernel-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968355" comment="kernel-cross-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968356" comment="kernel-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968357" comment="kernel-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968360" comment="kernel-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968361" comment="kernel-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968362" comment="kernel-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968363" comment="kernel-debug-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968366" comment="kernel-doc-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968367" comment="kernel-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968368" comment="kernel-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968369" comment="kernel-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968370" comment="kernel-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968371" comment="kernel-rt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968372" comment="kernel-rt-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968373" comment="kernel-rt-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968374" comment="kernel-rt-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968376" comment="kernel-rt-debug-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968377" comment="kernel-rt-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968378" comment="kernel-rt-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968379" comment="kernel-rt-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968381" comment="kernel-rt-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968382" comment="kernel-rt-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968383" comment="kernel-rt-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968384" comment="kernel-rt-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968385" comment="kernel-tools-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968386" comment="kernel-tools-libs-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968388" comment="kernel-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968389" comment="kernel-uki-virt-addons-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968390" comment="libperf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968391" comment="perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968392" comment="python3-perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968393" comment="rtla-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968394" comment="rv-5.14.0-503.31.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52928" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52928" ref_url="https://www.suse.com/security/cve/CVE-2023-52928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Skip invalid kfunc call in backtrack_insn

The verifier skips invalid kfunc call in check_kfunc_call(), which
would be captured in fixup_kfunc_call() if such insn is not eliminated
by dead code elimination. However, this can lead to the following
warning in backtrack_insn(), also see [1]:

  ------------[ cut here ]------------
  verifier backtracking bug
  WARNING: CPU: 6 PID: 8646 at kernel/bpf/verifier.c:2756 backtrack_insn
  kernel/bpf/verifier.c:2756
	__mark_chain_precision kernel/bpf/verifier.c:3065
	mark_chain_precision kernel/bpf/verifier.c:3165
	adjust_reg_min_max_vals kernel/bpf/verifier.c:10715
	check_alu_op kernel/bpf/verifier.c:10928
	do_check kernel/bpf/verifier.c:13821 [inline]
	do_check_common kernel/bpf/verifier.c:16289
  [...]

So make backtracking conservative with this by returning ENOTSUPP.

  [1] https://lore.kernel.org/bpf/CACkBjsaXNceR8ZjkLG=dT3P=4A8SBsg0Z5h5PWLryF5=ghKq=g@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52928/">CVE-2023-52928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52928">CVE-2023-52928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240248">SUSE bug 1240248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52931" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52931" ref_url="https://www.suse.com/security/cve/CVE-2023-52931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Avoid potential vm use-after-free

Adding the vm to the vm_xa table makes it visible to userspace, which
could try to race with us to close the vm.  So we need to take our extra
reference before putting it in the table.

(cherry picked from commit 99343c46d4e2b34c285d3d5f68ff04274c2f9fb4)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52931/">CVE-2023-52931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52931">CVE-2023-52931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240271">SUSE bug 1240271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52933" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52933" ref_url="https://www.suse.com/security/cve/CVE-2023-52933" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: fix handling and sanity checking of xattr_ids count

A Sysbot [1] corrupted filesystem exposes two flaws in the handling and
sanity checking of the xattr_ids count in the filesystem.  Both of these
flaws cause computation overflow due to incorrect typing.

In the corrupted filesystem the xattr_ids value is 4294967071, which
stored in a signed variable becomes the negative number -225.

Flaw 1 (64-bit systems only):

The signed integer xattr_ids variable causes sign extension.

This causes variable overflow in the SQUASHFS_XATTR_*(A) macros.  The
variable is first multiplied by sizeof(struct squashfs_xattr_id) where the
type of the sizeof operator is "unsigned long".

On a 64-bit system this is 64-bits in size, and causes the negative number
to be sign extended and widened to 64-bits and then become unsigned.  This
produces the very large number 18446744073709548016 or 2^64 - 3600.  This
number when rounded up by SQUASHFS_METADATA_SIZE - 1 (8191 bytes) and
divided by SQUASHFS_METADATA_SIZE overflows and produces a length of 0
(stored in len).

Flaw 2 (32-bit systems only):

On a 32-bit system the integer variable is not widened by the unsigned
long type of the sizeof operator (32-bits), and the signedness of the
variable has no effect due it always being treated as unsigned.

The above corrupted xattr_ids value of 4294967071, when multiplied
overflows and produces the number 4294963696 or 2^32 - 3400.  This number
when rounded up by SQUASHFS_METADATA_SIZE - 1 (8191 bytes) and divided by
SQUASHFS_METADATA_SIZE overflows again and produces a length of 0.

The effect of the 0 length computation:

In conjunction with the corrupted xattr_ids field, the filesystem also has
a corrupted xattr_table_start value, where it matches the end of
filesystem value of 850.

This causes the following sanity check code to fail because the
incorrectly computed len of 0 matches the incorrect size of the table
reported by the superblock (0 bytes).

    len = SQUASHFS_XATTR_BLOCK_BYTES(*xattr_ids);
    indexes = SQUASHFS_XATTR_BLOCKS(*xattr_ids);

    /*
     * The computed size of the index table (len bytes) should exactly
     * match the table start and end points
    */
    start = table_start + sizeof(*id_table);
    end = msblk-&gt;bytes_used;

    if (len != (end - start))
            return ERR_PTR(-EINVAL);

Changing the xattr_ids variable to be "usigned int" fixes the flaw on a
64-bit system.  This relies on the fact the computation is widened by the
unsigned long type of the sizeof operator.

Casting the variable to u64 in the above macro fixes this flaw on a 32-bit
system.

It also means 64-bit systems do not implicitly rely on the type of the
sizeof operator to widen the computation.

[1] https://lore.kernel.org/lkml/000000000000cd44f005f1a0f17f@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-02"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52933/">CVE-2023-52933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52933">CVE-2023-52933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240275">SUSE bug 1240275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009997925" comment="kernel-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997926" comment="kernel-abi-stablelists-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997927" comment="kernel-core-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997928" comment="kernel-cross-headers-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997929" comment="kernel-debug-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997930" comment="kernel-debug-core-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997933" comment="kernel-debug-modules-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997934" comment="kernel-debug-modules-core-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997935" comment="kernel-debug-modules-extra-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997936" comment="kernel-debug-uki-virt-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997939" comment="kernel-doc-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997940" comment="kernel-headers-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997941" comment="kernel-modules-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997942" comment="kernel-modules-core-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997943" comment="kernel-modules-extra-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997944" comment="kernel-rt-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997945" comment="kernel-rt-core-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997946" comment="kernel-rt-debug-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997947" comment="kernel-rt-debug-core-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997949" comment="kernel-rt-debug-kvm-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997950" comment="kernel-rt-debug-modules-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997951" comment="kernel-rt-debug-modules-core-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997952" comment="kernel-rt-debug-modules-extra-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997954" comment="kernel-rt-kvm-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997955" comment="kernel-rt-modules-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997956" comment="kernel-rt-modules-core-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997957" comment="kernel-rt-modules-extra-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997958" comment="kernel-tools-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997959" comment="kernel-tools-libs-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997961" comment="kernel-uki-virt-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997962" comment="kernel-uki-virt-addons-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997963" comment="libperf-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997964" comment="perf-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997965" comment="python3-perf-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997966" comment="rtla-5.14.0-570.24.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997967" comment="rv-5.14.0-570.24.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52934" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52934" ref_url="https://www.suse.com/security/cve/CVE-2023-52934" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/MADV_COLLAPSE: catch !none !huge !bad pmd lookups

In commit 34488399fa08 ("mm/madvise: add file and shmem support to
MADV_COLLAPSE") we make the following change to find_pmd_or_thp_or_none():

	-       if (!pmd_present(pmde))
	-               return SCAN_PMD_NULL;
	+       if (pmd_none(pmde))
	+               return SCAN_PMD_NONE;

This was for-use by MADV_COLLAPSE file/shmem codepaths, where
MADV_COLLAPSE might identify a pte-mapped hugepage, only to have
khugepaged race-in, free the pte table, and clear the pmd.  Such codepaths
include:

A) If we find a suitably-aligned compound page of order HPAGE_PMD_ORDER
   already in the pagecache.
B) In retract_page_tables(), if we fail to grab mmap_lock for the target
   mm/address.

In these cases, collapse_pte_mapped_thp() really does expect a none (not
just !present) pmd, and we want to suitably identify that case separate
from the case where no pmd is found, or it's a bad-pmd (of course, many
things could happen once we drop mmap_lock, and the pmd could plausibly
undergo multiple transitions due to intervening fault, split, etc). 
Regardless, the code is prepared install a huge-pmd only when the existing
pmd entry is either a genuine pte-table-mapping-pmd, or the none-pmd.

However, the commit introduces a logical hole; namely, that we've allowed
!none- &amp;&amp; !huge- &amp;&amp; !bad-pmds to be classified as genuine
pte-table-mapping-pmds.  One such example that could leak through are swap
entries.  The pmd values aren't checked again before use in
pte_offset_map_lock(), which is expecting nothing less than a genuine
pte-table-mapping-pmd.

We want to put back the !pmd_present() check (below the pmd_none() check),
but need to be careful to deal with subtleties in pmd transitions and
treatments by various arch.

The issue is that __split_huge_pmd_locked() temporarily clears the present
bit (or otherwise marks the entry as invalid), but pmd_present() and
pmd_trans_huge() still need to return true while the pmd is in this
transitory state.  For example, x86's pmd_present() also checks the
_PAGE_PSE , riscv's version also checks the _PAGE_LEAF bit, and arm64 also
checks a PMD_PRESENT_INVALID bit.

Covering all 4 cases for x86 (all checks done on the same pmd value):

1) pmd_present() &amp;&amp; pmd_trans_huge()
   All we actually know here is that the PSE bit is set. Either:
   a) We aren't racing with __split_huge_page(), and PRESENT or PROTNONE
      is set.
      =&gt; huge-pmd
   b) We are currently racing with __split_huge_page().  The danger here
      is that we proceed as-if we have a huge-pmd, but really we are
      looking at a pte-mapping-pmd.  So, what is the risk of this
      danger?

      The only relevant path is:

	madvise_collapse() -&gt; collapse_pte_mapped_thp()

      Where we might just incorrectly report back "success", when really
      the memory isn't pmd-backed.  This is fine, since split could
      happen immediately after (actually) successful madvise_collapse().
      So, it should be safe to just assume huge-pmd here.

2) pmd_present() &amp;&amp; !pmd_trans_huge()
   Either:
   a) PSE not set and either PRESENT or PROTNONE is.
      =&gt; pte-table-mapping pmd (or PROT_NONE)
   b) devmap.  This routine can be called immediately after
      unlocking/locking mmap_lock -- or called with no locks held (see
      khugepaged_scan_mm_slot()), so previous VMA checks have since been
      invalidated.

3) !pmd_present() &amp;&amp; pmd_trans_huge()
  Not possible.

4) !pmd_present() &amp;&amp; !pmd_trans_huge()
  Neither PRESENT nor PROTNONE set
  =&gt; not present

I've checked all archs that implement pmd_trans_huge() (arm64, riscv,
powerpc, longarch, x86, mips, s390) and this logic roughly translates
(though devmap treatment is unique to x86 and powerpc, and (3) doesn't
necessarily hold in general -- but that doesn't matter since
!pmd_present() always takes failure path).

Also, add a comment above find_pmd_or_thp_or_none()
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52934/">CVE-2023-52934 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52934">CVE-2023-52934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240298">SUSE bug 1240298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52937" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52937" ref_url="https://www.suse.com/security/cve/CVE-2023-52937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HV: hv_balloon: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52937/">CVE-2023-52937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52937">CVE-2023-52937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240209">SUSE bug 1240209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52938" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52938" ref_url="https://www.suse.com/security/cve/CVE-2023-52938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Don't attempt to resume the ports before they exist

This will fix null pointer dereference that was caused by
the driver attempting to resume ports that were not yet
registered.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52938/">CVE-2023-52938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52938">CVE-2023-52938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240228">SUSE bug 1240228</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52939" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52939" ref_url="https://www.suse.com/security/cve/CVE-2023-52939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: memcg: fix NULL pointer in mem_cgroup_track_foreign_dirty_slowpath()

As commit 18365225f044 ("hwpoison, memcg: forcibly uncharge LRU pages"),
hwpoison will forcibly uncharg a LRU hwpoisoned page, the folio_memcg
could be NULl, then, mem_cgroup_track_foreign_dirty_slowpath() could
occurs a NULL pointer dereference, let's do not record the foreign
writebacks for folio memcg is null in mem_cgroup_track_foreign_dirty() to
fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52939/">CVE-2023-52939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52939">CVE-2023-52939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240231">SUSE bug 1240231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52940</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52940" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52940" ref_url="https://www.suse.com/security/cve/CVE-2023-52940" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: multi-gen LRU: fix crash during cgroup migration

lru_gen_migrate_mm() assumes lru_gen_add_mm() runs prior to itself.  This
isn't true for the following scenario:

    CPU 1                         CPU 2

  clone()
    cgroup_can_fork()
                                cgroup_procs_write()
    cgroup_post_fork()
                                  task_lock()
                                  lru_gen_migrate_mm()
                                  task_unlock()
    task_lock()
    lru_gen_add_mm()
    task_unlock()

And when the above happens, kernel crashes because of linked list
corruption (mm_struct-&gt;lru_gen.list).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52940/">CVE-2023-52940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52940">CVE-2023-52940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240221">SUSE bug 1240221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52969" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52969" ref_url="https://www.suse.com/security/cve/CVE-2023-52969" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19572" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002214.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19584" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023630.html" source="SUSE-SU"/>
    <description>
    MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, and 11.0 through 11.0.* can sometimes crash with an empty backtrace log. This may be related to make_aggr_tables_info and optimize_stage2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52969/">CVE-2023-52969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52969">CVE-2023-52969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239150">SUSE bug 1239150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024824" comment="galera-26.4.22-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52970" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52970" ref_url="https://www.suse.com/security/cve/CVE-2023-52970" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19572" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002214.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19584" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023630.html" source="SUSE-SU"/>
    <description>
    MariaDB Server 10.4 through 10.5.*, 10.6 through 10.6.*, 10.7 through 10.11.*, 11.0 through 11.0.*, and 11.1 through 11.4.* crashes in Item_direct_view_ref::derived_field_transformer_for_where.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52970/">CVE-2023-52970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52970">CVE-2023-52970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239151">SUSE bug 1239151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024824" comment="galera-26.4.22-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52971" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52971" ref_url="https://www.suse.com/security/cve/CVE-2023-52971" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041782.html" source="SUSE-SU"/>
    <description>
    MariaDB Server 10.10 through 10.11.* and 11.0 through 11.4.* crashes in JOIN::fix_all_splittings_in_plan.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52971/">CVE-2023-52971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52971">CVE-2023-52971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249219">SUSE bug 1249219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009962391" comment="galera-26.4.20-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52973" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52973" ref_url="https://www.suse.com/security/cve/CVE-2023-52973" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF

After a call to console_unlock() in vcs_read() the vc_data struct can be
freed by vc_deallocate(). Because of that, the struct vc_data pointer
load must be done at the top of while loop in vcs_read() to avoid a UAF
when vcs_size() is called.

Syzkaller reported a UAF in vcs_size().

BUG: KASAN: use-after-free in vcs_size (drivers/tty/vt/vc_screen.c:215)
Read of size 4 at addr ffff8881137479a8 by task 4a005ed81e27e65/1537

CPU: 0 PID: 1537 Comm: 4a005ed81e27e65 Not tainted 6.2.0-rc5 #1
Hardware name: Red Hat KVM, BIOS 1.15.0-2.module
Call Trace:
  &lt;TASK&gt;
__asan_report_load4_noabort (mm/kasan/report_generic.c:350)
vcs_size (drivers/tty/vt/vc_screen.c:215)
vcs_read (drivers/tty/vt/vc_screen.c:415)
vfs_read (fs/read_write.c:468 fs/read_write.c:450)
...
  &lt;/TASK&gt;

Allocated by task 1191:
...
kmalloc_trace (mm/slab_common.c:1069)
vc_allocate (./include/linux/slab.h:580 ./include/linux/slab.h:720
     drivers/tty/vt/vt.c:1128 drivers/tty/vt/vt.c:1108)
con_install (drivers/tty/vt/vt.c:3383)
tty_init_dev (drivers/tty/tty_io.c:1301 drivers/tty/tty_io.c:1413
     drivers/tty/tty_io.c:1390)
tty_open (drivers/tty/tty_io.c:2080 drivers/tty/tty_io.c:2126)
chrdev_open (fs/char_dev.c:415)
do_dentry_open (fs/open.c:883)
vfs_open (fs/open.c:1014)
...

Freed by task 1548:
...
kfree (mm/slab_common.c:1021)
vc_port_destruct (drivers/tty/vt/vt.c:1094)
tty_port_destructor (drivers/tty/tty_port.c:296)
tty_port_put (drivers/tty/tty_port.c:312)
vt_disallocate_all (drivers/tty/vt/vt_ioctl.c:662 (discriminator 2))
vt_ioctl (drivers/tty/vt/vt_ioctl.c:903)
tty_ioctl (drivers/tty/tty_io.c:2776)
...

The buggy address belongs to the object at ffff888113747800
  which belongs to the cache kmalloc-1k of size 1024
The buggy address is located 424 bytes inside of
  1024-byte region [ffff888113747800, ffff888113747c00)

The buggy address belongs to the physical page:
page:00000000b3fe6c7c refcount:1 mapcount:0 mapping:0000000000000000
     index:0x0 pfn:0x113740
head:00000000b3fe6c7c order:3 compound_mapcount:0 subpages_mapcount:0
     compound_pincount:0
anon flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff)
raw: 0017ffffc0010200 ffff888100042dc0 0000000000000000 dead000000000001
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
  ffff888113747880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff888113747900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
&gt; ffff888113747980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                   ^
  ffff888113747a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff888113747a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
Disabling lock debugging due to kernel taint
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52973/">CVE-2023-52973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52973">CVE-2023-52973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240218">SUSE bug 1240218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52976" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52976" ref_url="https://www.suse.com/security/cve/CVE-2023-52976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: fix potential NULL deref in efi_mem_reserve_persistent

When iterating on a linked list, a result of memremap is dereferenced
without checking it for NULL.

This patch adds a check that falls back on allocating a new page in
case memremap doesn't succeed.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[ardb: return -ENOMEM instead of breaking out of the loop]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52976/">CVE-2023-52976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52976">CVE-2023-52976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240283">SUSE bug 1240283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52977" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52977" ref_url="https://www.suse.com/security/cve/CVE-2023-52977" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix flow memory leak in ovs_flow_cmd_new

Syzkaller reports a memory leak of new_flow in ovs_flow_cmd_new() as it is
not freed when an allocation of a key fails.

BUG: memory leak
unreferenced object 0xffff888116668000 (size 632):
  comm "syz-executor231", pid 1090, jiffies 4294844701 (age 18.871s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;00000000defa3494&gt;] kmem_cache_zalloc include/linux/slab.h:654 [inline]
    [&lt;00000000defa3494&gt;] ovs_flow_alloc+0x19/0x180 net/openvswitch/flow_table.c:77
    [&lt;00000000c67d8873&gt;] ovs_flow_cmd_new+0x1de/0xd40 net/openvswitch/datapath.c:957
    [&lt;0000000010a539a8&gt;] genl_family_rcv_msg_doit+0x22d/0x330 net/netlink/genetlink.c:739
    [&lt;00000000dff3302d&gt;] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]
    [&lt;00000000dff3302d&gt;] genl_rcv_msg+0x328/0x590 net/netlink/genetlink.c:800
    [&lt;000000000286dd87&gt;] netlink_rcv_skb+0x153/0x430 net/netlink/af_netlink.c:2515
    [&lt;0000000061fed410&gt;] genl_rcv+0x24/0x40 net/netlink/genetlink.c:811
    [&lt;000000009dc0f111&gt;] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
    [&lt;000000009dc0f111&gt;] netlink_unicast+0x545/0x7f0 net/netlink/af_netlink.c:1339
    [&lt;000000004a5ee816&gt;] netlink_sendmsg+0x8e7/0xde0 net/netlink/af_netlink.c:1934
    [&lt;00000000482b476f&gt;] sock_sendmsg_nosec net/socket.c:651 [inline]
    [&lt;00000000482b476f&gt;] sock_sendmsg+0x152/0x190 net/socket.c:671
    [&lt;00000000698574ba&gt;] ____sys_sendmsg+0x70a/0x870 net/socket.c:2356
    [&lt;00000000d28d9e11&gt;] ___sys_sendmsg+0xf3/0x170 net/socket.c:2410
    [&lt;0000000083ba9120&gt;] __sys_sendmsg+0xe5/0x1b0 net/socket.c:2439
    [&lt;00000000c00628f8&gt;] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46
    [&lt;000000004abfdcf4&gt;] entry_SYSCALL_64_after_hwframe+0x61/0xc6

To fix this the patch rearranges the goto labels to reflect the order of
object allocations and adds appropriate goto statements on the error
paths.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52977/">CVE-2023-52977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52977">CVE-2023-52977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240268">SUSE bug 1240268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52981" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52981" ref_url="https://www.suse.com/security/cve/CVE-2023-52981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix request ref counting during error capture &amp; debugfs dump

When GuC support was added to error capture, the reference counting
around the request object was broken. Fix it up.

The context based search manages the spinlocking around the search
internally. So it needs to grab the reference count internally as
well. The execlist only request based search relies on external
locking, so it needs an external reference count but within the
spinlock not outside it.

The only other caller of the context based search is the code for
dumping engine state to debugfs. That code wasn't previously getting
an explicit reference at all as it does everything while holding the
execlist specific spinlock. So, that needs updaing as well as that
spinlock doesn't help when using GuC submission. Rather than trying to
conditionally get/put depending on submission model, just change it to
always do the get/put.

v2: Explicitly document adding an extra blank line in some dense code
(Andy Shevchenko). Fix multiple potential null pointer derefs in case
of no request found (some spotted by Tvrtko, but there was more!).
Also fix a leaked request in case of !started and another in
__guc_reset_context now that intel_context_find_active_request is
actually reference counting the returned request.
v3: Add a _get suffix to intel_context_find_active_request now that it
grabs a reference (Daniele).
v4: Split the intel_guc_find_hung_context change to a separate patch
and rename intel_context_find_active_request_get to
intel_context_get_active_request (Tvrtko).
v5: s/locking/reference counting/ in commit message (Tvrtko)

(cherry picked from commit 3700e353781e27f1bc7222f51f2cc36cbeb9b4ec)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52981/">CVE-2023-52981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52981">CVE-2023-52981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240274">SUSE bug 1240274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52984" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52984" ref_url="https://www.suse.com/security/cve/CVE-2023-52984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: dp83822: Fix null pointer access on DP83825/DP83826 devices

The probe() function is only used for the DP83822 PHY, leaving the
private data pointer uninitialized for the smaller DP83825/26 models.
While all uses of the private data structure are hidden in 82822 specific
callbacks, configuring the interrupt is shared across all models.
This causes a NULL pointer dereference on the smaller PHYs as it accesses
the private data unchecked. Verifying the pointer avoids that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52984/">CVE-2023-52984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52984">CVE-2023-52984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240279">SUSE bug 1240279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52985" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52985" ref_url="https://www.suse.com/security/cve/CVE-2023-52985" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: dts: imx8mm-verdin: Do not power down eth-phy

Currently if suspending using either freeze or memory state, the fec
driver tries to power down the phy which leads to crash of the kernel
and non-responsible kernel with the following call trace:

[   24.839889 ] Call trace:
[   24.839892 ]  phy_error+0x18/0x60
[   24.839898 ]  kszphy_handle_interrupt+0x6c/0x80
[   24.839903 ]  phy_interrupt+0x20/0x2c
[   24.839909 ]  irq_thread_fn+0x30/0xa0
[   24.839919 ]  irq_thread+0x178/0x2c0
[   24.839925 ]  kthread+0x154/0x160
[   24.839932 ]  ret_from_fork+0x10/0x20

Since there is currently no functionality in the phy subsystem to power
down phys let's just disable the feature of powering-down the ethernet
phy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52985/">CVE-2023-52985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52985">CVE-2023-52985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240217">SUSE bug 1240217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52986</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52986" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52986" ref_url="https://www.suse.com/security/cve/CVE-2023-52986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener

A listening socket linked to a sockmap has its sk_prot overridden. It
points to one of the struct proto variants in tcp_bpf_prots. The variant
depends on the socket's family and which sockmap programs are attached.

A child socket cloned from a TCP listener initially inherits their sk_prot.
But before cloning is finished, we restore the child's proto to the
listener's original non-tcp_bpf_prots one. This happens in
tcp_create_openreq_child -&gt; tcp_bpf_clone.

Today, in tcp_bpf_clone we detect if the child's proto should be restored
by checking only for the TCP_BPF_BASE proto variant. This is not
correct. The sk_prot of listening socket linked to a sockmap can point to
to any variant in tcp_bpf_prots.

If the listeners sk_prot happens to be not the TCP_BPF_BASE variant, then
the child socket unintentionally is left if the inherited sk_prot by
tcp_bpf_clone.

This leads to issues like infinite recursion on close [1], because the
child state is otherwise not set up for use with tcp_bpf_prot operations.

Adjust the check in tcp_bpf_clone to detect all of tcp_bpf_prots variants.

Note that it wouldn't be sufficient to check the socket state when
overriding the sk_prot in tcp_bpf_update_proto in order to always use the
TCP_BPF_BASE variant for listening sockets. Since commit
b8b8315e39ff ("bpf, sockmap: Remove unhash handler for BPF sockmap usage")
it is possible for a socket to transition to TCP_LISTEN state while already
linked to a sockmap, e.g. connect() -&gt; insert into map -&gt;
connect(AF_UNSPEC) -&gt; listen().

[1]: https://lore.kernel.org/all/00000000000073b14905ef2e7401@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52986/">CVE-2023-52986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52986">CVE-2023-52986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240306">SUSE bug 1240306</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52988</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52988" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52988" ref_url="https://www.suse.com/security/cve/CVE-2023-52988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda/via: Avoid potential array out-of-bound in add_secret_dac_path()

snd_hda_get_connections() can return a negative error code.
It may lead to accessing 'conn' array at a negative index.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52988/">CVE-2023-52988 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52988">CVE-2023-52988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240293">SUSE bug 1240293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52991</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52991" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52991" ref_url="https://www.suse.com/security/cve/CVE-2023-52991" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix NULL pointer in skb_segment_list

Commit 3a1296a38d0c ("net: Support GRO/GSO fraglist chaining.")
introduced UDP listifyed GRO. The segmentation relies on frag_list being
untouched when passing through the network stack. This assumption can be
broken sometimes, where frag_list itself gets pulled into linear area,
leaving frag_list being NULL. When this happens it can trigger
following NULL pointer dereference, and panic the kernel. Reverse the
test condition should fix it.

[19185.577801][    C1] BUG: kernel NULL pointer dereference, address:
...
[19185.663775][    C1] RIP: 0010:skb_segment_list+0x1cc/0x390
...
[19185.834644][    C1] Call Trace:
[19185.841730][    C1]  &lt;TASK&gt;
[19185.848563][    C1]  __udp_gso_segment+0x33e/0x510
[19185.857370][    C1]  inet_gso_segment+0x15b/0x3e0
[19185.866059][    C1]  skb_mac_gso_segment+0x97/0x110
[19185.874939][    C1]  __skb_gso_segment+0xb2/0x160
[19185.883646][    C1]  udp_queue_rcv_skb+0xc3/0x1d0
[19185.892319][    C1]  udp_unicast_rcv_skb+0x75/0x90
[19185.900979][    C1]  ip_protocol_deliver_rcu+0xd2/0x200
[19185.910003][    C1]  ip_local_deliver_finish+0x44/0x60
[19185.918757][    C1]  __netif_receive_skb_one_core+0x8b/0xa0
[19185.927834][    C1]  process_backlog+0x88/0x130
[19185.935840][    C1]  __napi_poll+0x27/0x150
[19185.943447][    C1]  net_rx_action+0x27e/0x5f0
[19185.951331][    C1]  ? mlx5_cq_tasklet_cb+0x70/0x160 [mlx5_core]
[19185.960848][    C1]  __do_softirq+0xbc/0x25d
[19185.968607][    C1]  irq_exit_rcu+0x83/0xb0
[19185.976247][    C1]  common_interrupt+0x43/0xa0
[19185.984235][    C1]  asm_common_interrupt+0x22/0x40
...
[19186.094106][    C1]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52991/">CVE-2023-52991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52991">CVE-2023-52991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240215">SUSE bug 1240215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52992" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52992" ref_url="https://www.suse.com/security/cve/CVE-2023-52992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Skip task with pid=1 in send_signal_common()

The following kernel panic can be triggered when a task with pid=1 attaches
a prog that attempts to send killing signal to itself, also see [1] for more
details:

  Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
  CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148
  Call Trace:
  &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106
  panic+0x2c4/0x60f kernel/panic.c:275
  do_exit.cold+0x63/0xe4 kernel/exit.c:789
  do_group_exit+0xd4/0x2a0 kernel/exit.c:950
  get_signal+0x2460/0x2600 kernel/signal.c:2858
  arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306
  exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
  exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203
  __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
  syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296
  do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86
  entry_SYSCALL_64_after_hwframe+0x63/0xcd

So skip task with pid=1 in bpf_send_signal_common() to avoid the panic.

  [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-52992/">CVE-2023-52992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52992">CVE-2023-52992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240317">SUSE bug 1240317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52993" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52993" ref_url="https://www.suse.com/security/cve/CVE-2023-52993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL

Baoquan reported that after triggering a crash the subsequent crash-kernel
fails to boot about half of the time. It triggers a NULL pointer
dereference in the periodic tick code.

This happens because the legacy timer interrupt (IRQ0) is resent in
software which happens in soft interrupt (tasklet) context. In this context
get_irq_regs() returns NULL which leads to the NULL pointer dereference.

The reason for the resend is a spurious APIC interrupt on the IRQ0 vector
which is captured and leads to a resend when the legacy timer interrupt is
enabled. This is wrong because the legacy PIC interrupts are level
triggered and therefore should never be resent in software, but nothing
ever sets the IRQ_LEVEL flag on those interrupts, so the core code does not
know about their trigger type.

Ensure that IRQ_LEVEL is set when the legacy PCI interrupts are set up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52993/">CVE-2023-52993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52993">CVE-2023-52993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240297">SUSE bug 1240297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52994" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52994" ref_url="https://www.suse.com/security/cve/CVE-2023-52994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

acpi: Fix suspend with Xen PV

Commit f1e525009493 ("x86/boot: Skip realmode init code when running as
Xen PV guest") missed one code path accessing real_mode_header, leading
to dereferencing NULL when suspending the system under Xen:

    [  348.284004] PM: suspend entry (deep)
    [  348.289532] Filesystems sync: 0.005 seconds
    [  348.291545] Freezing user space processes ... (elapsed 0.000 seconds) done.
    [  348.292457] OOM killer disabled.
    [  348.292462] Freezing remaining freezable tasks ... (elapsed 0.104 seconds) done.
    [  348.396612] printk: Suspending console(s) (use no_console_suspend to debug)
    [  348.749228] PM: suspend devices took 0.352 seconds
    [  348.769713] ACPI: EC: interrupt blocked
    [  348.816077] BUG: kernel NULL pointer dereference, address: 000000000000001c
    [  348.816080] #PF: supervisor read access in kernel mode
    [  348.816081] #PF: error_code(0x0000) - not-present page
    [  348.816083] PGD 0 P4D 0
    [  348.816086] Oops: 0000 [#1] PREEMPT SMP NOPTI
    [  348.816089] CPU: 0 PID: 6764 Comm: systemd-sleep Not tainted 6.1.3-1.fc32.qubes.x86_64 #1
    [  348.816092] Hardware name: Star Labs StarBook/StarBook, BIOS 8.01 07/03/2022
    [  348.816093] RIP: e030:acpi_get_wakeup_address+0xc/0x20

Fix that by adding an optional acpi callback allowing to skip setting
the wakeup address, as in the Xen PV case this will be handled by the
hypervisor anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52994/">CVE-2023-52994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52994">CVE-2023-52994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240269">SUSE bug 1240269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52997</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52997" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52997" ref_url="https://www.suse.com/security/cve/CVE-2023-52997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: prevent potential spectre v1 gadget in ip_metrics_convert()

if (!type)
		continue;
	if (type &gt; RTAX_MAX)
		return -EINVAL;
	...
	metrics[type - 1] = val;

@type being used as an array index, we need to prevent
cpu speculation or risk leaking kernel memory content.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52997/">CVE-2023-52997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-52997">CVE-2023-52997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240303">SUSE bug 1240303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202352999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-52999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-52999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52999" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-52999" ref_url="https://www.suse.com/security/cve/CVE-2023-52999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix UaF in netns ops registration error path

If net_assign_generic() fails, the current error path in ops_init() tries
to clear the gen pointer slot. Anyway, in such error path, the gen pointer
itself has not been modified yet, and the existing and accessed one is
smaller than the accessed index, causing an out-of-bounds error:

 BUG: KASAN: slab-out-of-bounds in ops_init+0x2de/0x320
 Write of size 8 at addr ffff888109124978 by task modprobe/1018

 CPU: 2 PID: 1018 Comm: modprobe Not tainted 6.2.0-rc2.mptcp_ae5ac65fbed5+ #1641
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.1-2.fc37 04/01/2014
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x6a/0x9f
  print_address_description.constprop.0+0x86/0x2b5
  print_report+0x11b/0x1fb
  kasan_report+0x87/0xc0
  ops_init+0x2de/0x320
  register_pernet_operations+0x2e4/0x750
  register_pernet_subsys+0x24/0x40
  tcf_register_action+0x9f/0x560
  do_one_initcall+0xf9/0x570
  do_init_module+0x190/0x650
  load_module+0x1fa5/0x23c0
  __do_sys_finit_module+0x10d/0x1b0
  do_syscall_64+0x58/0x80
  entry_SYSCALL_64_after_hwframe+0x72/0xdc
 RIP: 0033:0x7f42518f778d
 Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48
       89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff
       ff 73 01 c3 48 8b 0d cb 56 2c 00 f7 d8 64 89 01 48
 RSP: 002b:00007fff96869688 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
 RAX: ffffffffffffffda RBX: 00005568ef7f7c90 RCX: 00007f42518f778d
 RDX: 0000000000000000 RSI: 00005568ef41d796 RDI: 0000000000000003
 RBP: 00005568ef41d796 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000000
 R13: 00005568ef7f7d30 R14: 0000000000040000 R15: 0000000000000000
  &lt;/TASK&gt;

This change addresses the issue by skipping the gen pointer
de-reference in the mentioned error-path.

Found by code inspection and verified with explicit error injection
on a kasan-enabled kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-52999/">CVE-2023-52999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-52999">CVE-2023-52999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240299">SUSE bug 1240299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53002" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53002" ref_url="https://www.suse.com/security/cve/CVE-2023-53002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix a memory leak with reused mmap_offset

drm_vma_node_allow() and drm_vma_node_revoke() should be called in
balanced pairs. We call drm_vma_node_allow() once per-file everytime a
user calls mmap_offset, but only call drm_vma_node_revoke once per-file
on each mmap_offset. As the mmap_offset is reused by the client, the
per-file vm_count may remain non-zero and the rbtree leaked.

Call drm_vma_node_allow_once() instead to prevent that memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53002/">CVE-2023-53002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53002">CVE-2023-53002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240230">SUSE bug 1240230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53004" ref_url="https://www.suse.com/security/cve/CVE-2023-53004" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix tmpfile leak

Missed an error cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53004/">CVE-2023-53004 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53004">CVE-2023-53004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240296">SUSE bug 1240296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53006" ref_url="https://www.suse.com/security/cve/CVE-2023-53006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix oops due to uncleared server-&gt;smbd_conn in reconnect

In smbd_destroy(), clear the server-&gt;smbd_conn pointer after freeing the
smbd_connection struct that it points to so that reconnection doesn't get
confused.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53006/">CVE-2023-53006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53006">CVE-2023-53006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240208">SUSE bug 1240208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53009" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53009" ref_url="https://www.suse.com/security/cve/CVE-2023-53009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Add sync after creating vram bo

There will be data corruption on vram allocated by svm
if the initialization is not complete and application is
writting on the memory. Adding sync to wait for the
initialization completion is to resolve this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53009/">CVE-2023-53009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53009">CVE-2023-53009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240314">SUSE bug 1240314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53010" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53010" ref_url="https://www.suse.com/security/cve/CVE-2023-53010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt: Do not read past the end of test names

Test names were being concatenated based on a offset beyond the end of
the first name, which tripped the buffer overflow detection logic:

 detected buffer overflow in strnlen
 [...]
 Call Trace:
 bnxt_ethtool_init.cold+0x18/0x18

Refactor struct hwrm_selftest_qlist_output to use an actual array,
and adjust the concatenation to use snprintf() rather than a series of
strncat() calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53010/">CVE-2023-53010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53010">CVE-2023-53010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240290">SUSE bug 1240290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53012" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53012" ref_url="https://www.suse.com/security/cve/CVE-2023-53012" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: call put_device() only after device_register() fails

put_device() shouldn't be called before a prior call to
device_register(). __thermal_cooling_device_register() doesn't follow
that properly and needs fixing. Also
thermal_cooling_device_destroy_sysfs() is getting called unnecessarily
on few error paths.

Fix all this by placing the calls at the right place.

Based on initial work done by Caleb Connolly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53012/">CVE-2023-53012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53012">CVE-2023-53012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240216">SUSE bug 1240216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53013" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53013" ref_url="https://www.suse.com/security/cve/CVE-2023-53013" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptdma: pt_core_execute_cmd() should use spinlock

The interrupt handler (pt_core_irq_handler()) of the ptdma
driver can be called from interrupt context. The code flow
in this function can lead down to pt_core_execute_cmd() which
will attempt to grab a mutex, which is not appropriate in
interrupt context and ultimately leads to a kernel panic.
The fix here changes this mutex to a spinlock, which has
been verified to resolve the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53013/">CVE-2023-53013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53013">CVE-2023-53013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240291">SUSE bug 1240291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53014" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53014" ref_url="https://www.suse.com/security/cve/CVE-2023-53014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: tegra: Fix memory leak in terminate_all()

Terminate vdesc when terminating an ongoing transfer.
This will ensure that the vdesc is present in the desc_terminated list
The descriptor will be freed later in desc_free_list().

This fixes the memory leaks which can happen when terminating an
ongoing transfer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53014/">CVE-2023-53014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53014">CVE-2023-53014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240295">SUSE bug 1240295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53015" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53015" ref_url="https://www.suse.com/security/cve/CVE-2023-53015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: betop: check shape of output reports

betopff_init() only checks the total sum of the report counts for each
report field to be at least 4, but hid_betopff_play() expects 4 report
fields.
A device advertising an output report with one field and 4 report counts
would pass the check but crash the kernel with a NULL pointer dereference
in hid_betopff_play().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53015/">CVE-2023-53015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53015">CVE-2023-53015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240288">SUSE bug 1240288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53016" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53016" ref_url="https://www.suse.com/security/cve/CVE-2023-53016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix possible deadlock in rfcomm_sk_state_change

syzbot reports a possible deadlock in rfcomm_sk_state_change [1].
While rfcomm_sock_connect acquires the sk lock and waits for
the rfcomm lock, rfcomm_sock_release could have the rfcomm
lock and hit a deadlock for acquiring the sk lock.
Here's a simplified flow:

rfcomm_sock_connect:
  lock_sock(sk)
  rfcomm_dlc_open:
    rfcomm_lock()

rfcomm_sock_release:
  rfcomm_sock_shutdown:
    rfcomm_lock()
    __rfcomm_dlc_close:
        rfcomm_k_state_change:
	  lock_sock(sk)

This patch drops the sk lock before calling rfcomm_dlc_open to
avoid the possible deadlock and holds sk's reference count to
prevent use-after-free after rfcomm_dlc_open completes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53016/">CVE-2023-53016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53016">CVE-2023-53016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240281">SUSE bug 1240281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53017</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53017" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53017" ref_url="https://www.suse.com/security/cve/CVE-2023-53017" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: fix memory leak in hci_update_adv_data()

When hci_cmd_sync_queue() failed in hci_update_adv_data(), inst_ptr is
not freed, which will cause memory leak, convert to use ERR_PTR/PTR_ERR
to pass the instance to callback so no memory needs to be allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53017/">CVE-2023-53017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53017">CVE-2023-53017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240287">SUSE bug 1240287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53018" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53018" ref_url="https://www.suse.com/security/cve/CVE-2023-53018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_conn: Fix memory leaks

When hci_cmd_sync_queue() failed in hci_le_terminate_big() or
hci_le_big_terminate(), the memory pointed by variable d is not freed,
which will cause memory leak. Add release process to error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53018/">CVE-2023-53018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53018">CVE-2023-53018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240211">SUSE bug 1240211</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53019" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53019" ref_url="https://www.suse.com/security/cve/CVE-2023-53019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mdio: validate parameter addr in mdiobus_get_phy()

The caller may pass any value as addr, what may result in an out-of-bounds
access to array mdio_map. One existing case is stmmac_init_phy() that
may pass -1 as addr. Therefore validate addr before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53019/">CVE-2023-53019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53019">CVE-2023-53019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240286">SUSE bug 1240286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53020" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53020" ref_url="https://www.suse.com/security/cve/CVE-2023-53020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

l2tp: close all race conditions in l2tp_tunnel_register()

The code in l2tp_tunnel_register() is racy in several ways:

1. It modifies the tunnel socket _after_ publishing it.

2. It calls setup_udp_tunnel_sock() on an existing socket without
   locking.

3. It changes sock lock class on fly, which triggers many syzbot
   reports.

This patch amends all of them by moving socket initialization code
before publishing and under sock lock. As suggested by Jakub, the
l2tp lockdep class is not necessary as we can just switch to
bh_lock_sock_nested().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53020/">CVE-2023-53020 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53020">CVE-2023-53020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240224">SUSE bug 1240224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53021</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53021" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53021" ref_url="https://www.suse.com/security/cve/CVE-2023-53021" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_taprio: fix possible use-after-free

syzbot reported a nasty crash [1] in net_tx_action() which
made little sense until we got a repro.

This repro installs a taprio qdisc, but providing an
invalid TCA_RATE attribute.

qdisc_create() has to destroy the just initialized
taprio qdisc, and taprio_destroy() is called.

However, the hrtimer used by taprio had already fired,
therefore advance_sched() called __netif_schedule().

Then net_tx_action was trying to use a destroyed qdisc.

We can not undo the __netif_schedule(), so we must wait
until one cpu serviced the qdisc before we can proceed.

Many thanks to Alexander Potapenko for his help.

[1]
BUG: KMSAN: uninit-value in queued_spin_trylock include/asm-generic/qspinlock.h:94 [inline]
BUG: KMSAN: uninit-value in do_raw_spin_trylock include/linux/spinlock.h:191 [inline]
BUG: KMSAN: uninit-value in __raw_spin_trylock include/linux/spinlock_api_smp.h:89 [inline]
BUG: KMSAN: uninit-value in _raw_spin_trylock+0x92/0xa0 kernel/locking/spinlock.c:138
 queued_spin_trylock include/asm-generic/qspinlock.h:94 [inline]
 do_raw_spin_trylock include/linux/spinlock.h:191 [inline]
 __raw_spin_trylock include/linux/spinlock_api_smp.h:89 [inline]
 _raw_spin_trylock+0x92/0xa0 kernel/locking/spinlock.c:138
 spin_trylock include/linux/spinlock.h:359 [inline]
 qdisc_run_begin include/net/sch_generic.h:187 [inline]
 qdisc_run+0xee/0x540 include/net/pkt_sched.h:125
 net_tx_action+0x77c/0x9a0 net/core/dev.c:5086
 __do_softirq+0x1cc/0x7fb kernel/softirq.c:571
 run_ksoftirqd+0x2c/0x50 kernel/softirq.c:934
 smpboot_thread_fn+0x554/0x9f0 kernel/smpboot.c:164
 kthread+0x31b/0x430 kernel/kthread.c:376
 ret_from_fork+0x1f/0x30

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:732 [inline]
 slab_alloc_node mm/slub.c:3258 [inline]
 __kmalloc_node_track_caller+0x814/0x1250 mm/slub.c:4970
 kmalloc_reserve net/core/skbuff.c:358 [inline]
 __alloc_skb+0x346/0xcf0 net/core/skbuff.c:430
 alloc_skb include/linux/skbuff.h:1257 [inline]
 nlmsg_new include/net/netlink.h:953 [inline]
 netlink_ack+0x5f3/0x12b0 net/netlink/af_netlink.c:2436
 netlink_rcv_skb+0x55d/0x6c0 net/netlink/af_netlink.c:2507
 rtnetlink_rcv+0x30/0x40 net/core/rtnetlink.c:6108
 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [inline]
 netlink_unicast+0xf3b/0x1270 net/netlink/af_netlink.c:1345
 netlink_sendmsg+0x1288/0x1440 net/netlink/af_netlink.c:1921
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0xabc/0xe90 net/socket.c:2482
 ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2536
 __sys_sendmsg net/socket.c:2565 [inline]
 __do_sys_sendmsg net/socket.c:2574 [inline]
 __se_sys_sendmsg net/socket.c:2572 [inline]
 __x64_sys_sendmsg+0x367/0x540 net/socket.c:2572
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

CPU: 0 PID: 13 Comm: ksoftirqd/0 Not tainted 6.0.0-rc2-syzkaller-47461-gac3859c02d7f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53021/">CVE-2023-53021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53021">CVE-2023-53021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240219">SUSE bug 1240219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53024" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53024" ref_url="https://www.suse.com/security/cve/CVE-2023-53024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation

To mitigate Spectre v4, 2039f26f3aca ("bpf: Fix leakage due to
insufficient speculative store bypass mitigation") inserts lfence
instructions after 1) initializing a stack slot and 2) spilling a
pointer to the stack.

However, this does not cover cases where a stack slot is first
initialized with a pointer (subject to sanitization) but then
overwritten with a scalar (not subject to sanitization because
the slot was already initialized). In this case, the second write
may be subject to speculative store bypass (SSB) creating a
speculative pointer-as-scalar type confusion. This allows the
program to subsequently leak the numerical pointer value using,
for example, a branch-based cache side channel.

To fix this, also sanitize scalars if they write a stack slot
that previously contained a pointer. Assuming that pointer-spills
are only generated by LLVM on register-pressure, the performance
impact on most real-world BPF programs should be small.

The following unprivileged BPF bytecode drafts a minimal exploit
and the mitigation:

  [...]
  // r6 = 0 or 1 (skalar, unknown user input)
  // r7 = accessible ptr for side channel
  // r10 = frame pointer (fp), to be leaked
  //
  r9 = r10 # fp alias to encourage ssb
  *(u64 *)(r9 - 8) = r10 // fp[-8] = ptr, to be leaked
  // lfence added here because of pointer spill to stack.
  //
  // Ommitted: Dummy bpf_ringbuf_output() here to train alias predictor
  // for no r9-r10 dependency.
  //
  *(u64 *)(r10 - 8) = r6 // fp[-8] = scalar, overwrites ptr
  // 2039f26f3aca: no lfence added because stack slot was not STACK_INVALID,
  // store may be subject to SSB
  //
  // fix: also add an lfence when the slot contained a ptr
  //
  r8 = *(u64 *)(r9 - 8)
  // r8 = architecturally a scalar, speculatively a ptr
  //
  // leak ptr using branch-based cache side channel:
  r8 &amp;= 1 // choose bit to leak
  if r8 == 0 goto SLOW // no mispredict
  // architecturally dead code if input r6 is 0,
  // only executes speculatively iff ptr bit is 1
  r8 = *(u64 *)(r7 + 0) # encode bit in cache (0: slow, 1: fast)
SLOW:
  [...]

After running this, the program can time the access to *(r7 + 0) to
determine whether the chosen pointer bit was 0 or 1. Repeat this 64
times to recover the whole address on amd64.

In summary, sanitization can only be skipped if one scalar is
overwritten with another scalar. Scalar-confusion due to speculative
store bypass can not lead to invalid accesses because the pointer
bounds deducted during verification are enforced using branchless
logic. See 979d63d50c0c ("bpf: prevent out of bounds speculation on
pointer arithmetic") for details.

Do not make the mitigation depend on !env-&gt;allow_{uninit_stack,ptr_leaks}
because speculative leaks are likely unexpected if these were enabled.
For example, leaking the address to a protected log file may be acceptable
while disabling the mitigation might unintentionally leak the address
into the cached-state of a map that is accessible to unprivileged
processes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53024/">CVE-2023-53024 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53024">CVE-2023-53024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240272">SUSE bug 1240272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53025</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53025" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53025" ref_url="https://www.suse.com/security/cve/CVE-2023-53025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53025/">CVE-2023-53025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53025">CVE-2023-53025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240264">SUSE bug 1240264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53026" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53026" ref_url="https://www.suse.com/security/cve/CVE-2023-53026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Fix ib block iterator counter overflow

When registering a new DMA MR after selecting the best aligned page size
for it, we iterate over the given sglist to split each entry to smaller,
aligned to the selected page size, DMA blocks.

In given circumstances where the sg entry and page size fit certain
sizes and the sg entry is not aligned to the selected page size, the
total size of the aligned pages we need to cover the sg entry is &gt;= 4GB.
Under this circumstances, while iterating page aligned blocks, the
counter responsible for counting how much we advanced from the start of
the sg entry is overflowed because its type is u32 and we pass 4GB in
size. This can lead to an infinite loop inside the iterator function
because the overflow prevents the counter to be larger
than the size of the sg entry.

Fix the presented problem by changing the advancement condition to
eliminate overflow.

Backtrace:
[  192.374329] efa_reg_user_mr_dmabuf
[  192.376783] efa_register_mr
[  192.382579] pgsz_bitmap 0xfffff000 rounddown 0x80000000
[  192.386423] pg_sz [0x80000000] umem_length[0xc0000000]
[  192.392657] start 0x0 length 0xc0000000 params.page_shift 31 params.page_num 3
[  192.399559] hp_cnt[3], pages_in_hp[524288]
[  192.403690] umem-&gt;sgt_append.sgt.nents[1]
[  192.407905] number entries: [1], pg_bit: [31]
[  192.411397] biter-&gt;__sg_nents [1] biter-&gt;__sg [0000000008b0c5d8]
[  192.415601] biter-&gt;__sg_advance [665837568] sg_dma_len[3221225472]
[  192.419823] biter-&gt;__sg_nents [1] biter-&gt;__sg [0000000008b0c5d8]
[  192.423976] biter-&gt;__sg_advance [2813321216] sg_dma_len[3221225472]
[  192.428243] biter-&gt;__sg_nents [1] biter-&gt;__sg [0000000008b0c5d8]
[  192.432397] biter-&gt;__sg_advance [665837568] sg_dma_len[3221225472]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53026/">CVE-2023-53026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53026">CVE-2023-53026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240308">SUSE bug 1240308</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53028" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53028" ref_url="https://www.suse.com/security/cve/CVE-2023-53028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "wifi: mac80211: fix memory leak in ieee80211_if_add()"

This reverts commit 13e5afd3d773c6fc6ca2b89027befaaaa1ea7293.

ieee80211_if_free() is already called from free_netdev(ndev)
because ndev-&gt;priv_destructor == ieee80211_if_free

syzbot reported:

general protection fault, probably for non-canonical address 0xdffffc0000000004: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000020-0x0000000000000027]
CPU: 0 PID: 10041 Comm: syz-executor.0 Not tainted 6.2.0-rc2-syzkaller-00388-g55b98837e37d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:pcpu_get_page_chunk mm/percpu.c:262 [inline]
RIP: 0010:pcpu_chunk_addr_search mm/percpu.c:1619 [inline]
RIP: 0010:free_percpu mm/percpu.c:2271 [inline]
RIP: 0010:free_percpu+0x186/0x10f0 mm/percpu.c:2254
Code: 80 3c 02 00 0f 85 f5 0e 00 00 48 8b 3b 48 01 ef e8 cf b3 0b 00 48 ba 00 00 00 00 00 fc ff df 48 8d 78 20 48 89 f9 48 c1 e9 03 &lt;80&gt; 3c 11 00 0f 85 3b 0e 00 00 48 8b 58 20 48 b8 00 00 00 00 00 fc
RSP: 0018:ffffc90004ba7068 EFLAGS: 00010002
RAX: 0000000000000000 RBX: ffff88823ffe2b80 RCX: 0000000000000004
RDX: dffffc0000000000 RSI: ffffffff81c1f4e7 RDI: 0000000000000020
RBP: ffffe8fffe8fc220 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 1ffffffff2179ab2 R12: ffff8880b983d000
R13: 0000000000000003 R14: 0000607f450fc220 R15: ffff88823ffe2988
FS: 00007fcb349de700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32220000 CR3: 000000004914f000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
netdev_run_todo+0x6bf/0x1100 net/core/dev.c:10352
ieee80211_register_hw+0x2663/0x4040 net/mac80211/main.c:1411
mac80211_hwsim_new_radio+0x2537/0x4d80 drivers/net/wireless/mac80211_hwsim.c:4583
hwsim_new_radio_nl+0xa09/0x10f0 drivers/net/wireless/mac80211_hwsim.c:5176
genl_family_rcv_msg_doit.isra.0+0x1e6/0x2d0 net/netlink/genetlink.c:968
genl_family_rcv_msg net/netlink/genetlink.c:1048 [inline]
genl_rcv_msg+0x4ff/0x7e0 net/netlink/genetlink.c:1065
netlink_rcv_skb+0x165/0x440 net/netlink/af_netlink.c:2564
genl_rcv+0x28/0x40 net/netlink/genetlink.c:1076
netlink_unicast_kernel net/netlink/af_netlink.c:1330 [inline]
netlink_unicast+0x547/0x7f0 net/netlink/af_netlink.c:1356
netlink_sendmsg+0x91b/0xe10 net/netlink/af_netlink.c:1932
sock_sendmsg_nosec net/socket.c:714 [inline]
sock_sendmsg+0xd3/0x120 net/socket.c:734
____sys_sendmsg+0x712/0x8c0 net/socket.c:2476
___sys_sendmsg+0x110/0x1b0 net/socket.c:2530
__sys_sendmsg+0xf7/0x1c0 net/socket.c:2559
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53028/">CVE-2023-53028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53028">CVE-2023-53028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240212">SUSE bug 1240212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53029" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53029" ref_url="https://www.suse.com/security/cve/CVE-2023-53029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix the use of GFP_KERNEL in atomic context on rt

The commit 4af1b64f80fb ("octeontx2-pf: Fix lmtst ID used in aura
free") uses the get/put_cpu() to protect the usage of percpu pointer
in -&gt;aura_freeptr() callback, but it also unnecessarily disable the
preemption for the blockable memory allocation. The commit 87b93b678e95
("octeontx2-pf: Avoid use of GFP_KERNEL in atomic context") tried to
fix these sleep inside atomic warnings. But it only fix the one for
the non-rt kernel. For the rt kernel, we still get the similar warnings
like below.
  BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46
  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0
  preempt_count: 1, expected: 0
  RCU nest depth: 0, expected: 0
  3 locks held by swapper/0/1:
   #0: ffff800009fc5fe8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock+0x24/0x30
   #1: ffff000100c276c0 (&amp;mbox-&gt;lock){+.+.}-{3:3}, at: otx2_init_hw_resources+0x8c/0x3a4
   #2: ffffffbfef6537e0 (&amp;cpu_rcache-&gt;lock){+.+.}-{2:2}, at: alloc_iova_fast+0x1ac/0x2ac
  Preemption disabled at:
  [&lt;ffff800008b1908c&gt;] otx2_rq_aura_pool_init+0x14c/0x284
  CPU: 20 PID: 1 Comm: swapper/0 Tainted: G        W          6.2.0-rc3-rt1-yocto-preempt-rt #1
  Hardware name: Marvell OcteonTX CN96XX board (DT)
  Call trace:
   dump_backtrace.part.0+0xe8/0xf4
   show_stack+0x20/0x30
   dump_stack_lvl+0x9c/0xd8
   dump_stack+0x18/0x34
   __might_resched+0x188/0x224
   rt_spin_lock+0x64/0x110
   alloc_iova_fast+0x1ac/0x2ac
   iommu_dma_alloc_iova+0xd4/0x110
   __iommu_dma_map+0x80/0x144
   iommu_dma_map_page+0xe8/0x260
   dma_map_page_attrs+0xb4/0xc0
   __otx2_alloc_rbuf+0x90/0x150
   otx2_rq_aura_pool_init+0x1c8/0x284
   otx2_init_hw_resources+0xe4/0x3a4
   otx2_open+0xf0/0x610
   __dev_open+0x104/0x224
   __dev_change_flags+0x1e4/0x274
   dev_change_flags+0x2c/0x7c
   ic_open_devs+0x124/0x2f8
   ip_auto_config+0x180/0x42c
   do_one_initcall+0x90/0x4dc
   do_basic_setup+0x10c/0x14c
   kernel_init_freeable+0x10c/0x13c
   kernel_init+0x2c/0x140
   ret_from_fork+0x10/0x20

Of course, we can shuffle the get/put_cpu() to only wrap the invocation
of -&gt;aura_freeptr() as what commit 87b93b678e95 does. But there are only
two -&gt;aura_freeptr() callbacks, otx2_aura_freeptr() and
cn10k_aura_freeptr(). There is no usage of perpcu variable in the
otx2_aura_freeptr() at all, so the get/put_cpu() seems redundant to it.
We can move the get/put_cpu() into the corresponding callback which
really has the percpu variable usage and avoid the sprinkling of
get/put_cpu() in several places.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53029/">CVE-2023-53029 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53029">CVE-2023-53029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240220">SUSE bug 1240220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53030</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53030" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53030" ref_url="https://www.suse.com/security/cve/CVE-2023-53030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Avoid use of GFP_KERNEL in atomic context

Using GFP_KERNEL in preemption disable context, causing below warning
when CONFIG_DEBUG_ATOMIC_SLEEP is enabled.

[   32.542271] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274
[   32.550883] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0
[   32.558707] preempt_count: 1, expected: 0
[   32.562710] RCU nest depth: 0, expected: 0
[   32.566800] CPU: 3 PID: 1 Comm: swapper/0 Tainted: G        W          6.2.0-rc2-00269-gae9dcb91c606 #7
[   32.576188] Hardware name: Marvell CN106XX board (DT)
[   32.581232] Call trace:
[   32.583670]  dump_backtrace.part.0+0xe0/0xf0
[   32.587937]  show_stack+0x18/0x30
[   32.591245]  dump_stack_lvl+0x68/0x84
[   32.594900]  dump_stack+0x18/0x34
[   32.598206]  __might_resched+0x12c/0x160
[   32.602122]  __might_sleep+0x48/0xa0
[   32.605689]  __kmem_cache_alloc_node+0x2b8/0x2e0
[   32.610301]  __kmalloc+0x58/0x190
[   32.613610]  otx2_sq_aura_pool_init+0x1a8/0x314
[   32.618134]  otx2_open+0x1d4/0x9d0

To avoid use of GFP_ATOMIC for memory allocation, disable preemption
after all memory allocation is done.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53030/">CVE-2023-53030 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53030">CVE-2023-53030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240292">SUSE bug 1240292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53031</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53031" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53031" ref_url="https://www.suse.com/security/cve/CVE-2023-53031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/imc-pmu: Fix use of mutex in IRQs disabled section

Current imc-pmu code triggers a WARNING with CONFIG_DEBUG_ATOMIC_SLEEP
and CONFIG_PROVE_LOCKING enabled, while running a thread_imc event.

Command to trigger the warning:
  # perf stat -e thread_imc/CPM_CS_FROM_L4_MEM_X_DPTEG/ sleep 5

   Performance counter stats for 'sleep 5':

                   0      thread_imc/CPM_CS_FROM_L4_MEM_X_DPTEG/

         5.002117947 seconds time elapsed

         0.000131000 seconds user
         0.001063000 seconds sys

Below is snippet of the warning in dmesg:

  BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580
  in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2869, name: perf-exec
  preempt_count: 2, expected: 0
  4 locks held by perf-exec/2869:
   #0: c00000004325c540 (&amp;sig-&gt;cred_guard_mutex){+.+.}-{3:3}, at: bprm_execve+0x64/0xa90
   #1: c00000004325c5d8 (&amp;sig-&gt;exec_update_lock){++++}-{3:3}, at: begin_new_exec+0x460/0xef0
   #2: c0000003fa99d4e0 (&amp;cpuctx_lock){-...}-{2:2}, at: perf_event_exec+0x290/0x510
   #3: c000000017ab8418 (&amp;ctx-&gt;lock){....}-{2:2}, at: perf_event_exec+0x29c/0x510
  irq event stamp: 4806
  hardirqs last  enabled at (4805): [&lt;c000000000f65b94&gt;] _raw_spin_unlock_irqrestore+0x94/0xd0
  hardirqs last disabled at (4806): [&lt;c0000000003fae44&gt;] perf_event_exec+0x394/0x510
  softirqs last  enabled at (0): [&lt;c00000000013c404&gt;] copy_process+0xc34/0x1ff0
  softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
  CPU: 36 PID: 2869 Comm: perf-exec Not tainted 6.2.0-rc2-00011-g1247637727f2 #61
  Hardware name: 8375-42A POWER9 0x4e1202 opal:v7.0-16-g9b85f7d961 PowerNV
  Call Trace:
    dump_stack_lvl+0x98/0xe0 (unreliable)
    __might_resched+0x2f8/0x310
    __mutex_lock+0x6c/0x13f0
    thread_imc_event_add+0xf4/0x1b0
    event_sched_in+0xe0/0x210
    merge_sched_in+0x1f0/0x600
    visit_groups_merge.isra.92.constprop.166+0x2bc/0x6c0
    ctx_flexible_sched_in+0xcc/0x140
    ctx_sched_in+0x20c/0x2a0
    ctx_resched+0x104/0x1c0
    perf_event_exec+0x340/0x510
    begin_new_exec+0x730/0xef0
    load_elf_binary+0x3f8/0x1e10
  ...
  do not call blocking ops when !TASK_RUNNING; state=2001 set at [&lt;00000000fd63e7cf&gt;] do_nanosleep+0x60/0x1a0
  WARNING: CPU: 36 PID: 2869 at kernel/sched/core.c:9912 __might_sleep+0x9c/0xb0
  CPU: 36 PID: 2869 Comm: sleep Tainted: G        W          6.2.0-rc2-00011-g1247637727f2 #61
  Hardware name: 8375-42A POWER9 0x4e1202 opal:v7.0-16-g9b85f7d961 PowerNV
  NIP:  c000000000194a1c LR: c000000000194a18 CTR: c000000000a78670
  REGS: c00000004d2134e0 TRAP: 0700   Tainted: G        W           (6.2.0-rc2-00011-g1247637727f2)
  MSR:  9000000000021033 &lt;SF,HV,ME,IR,DR,RI,LE&gt;  CR: 48002824  XER: 00000000
  CFAR: c00000000013fb64 IRQMASK: 1

The above warning triggered because the current imc-pmu code uses mutex
lock in interrupt disabled sections. The function mutex_lock()
internally calls __might_resched(), which will check if IRQs are
disabled and in case IRQs are disabled, it will trigger the warning.

Fix the issue by changing the mutex lock to spinlock.

[mpe: Fix comments, trim oops in change log, add reported-by tags]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53031/">CVE-2023-53031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53031">CVE-2023-53031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240285">SUSE bug 1240285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53033" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53033" ref_url="https://www.suse.com/security/cve/CVE-2023-53033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_payload: incorrect arithmetics when fetching VLAN header bits

If the offset + length goes over the ethernet + vlan header, then the
length is adjusted to copy the bytes that are within the boundaries of
the vlan_ethhdr scratchpad area. The remaining bytes beyond ethernet +
vlan header are copied directly from the skbuff data area.

Fix incorrect arithmetic operator: subtract, not add, the size of the
vlan header in case of double-tagged packets to adjust the length
accordingly to address CVE-2023-0179.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53033/">CVE-2023-53033 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53033">CVE-2023-53033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240210">SUSE bug 1240210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53034" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53034" ref_url="https://www.suse.com/security/cve/CVE-2023-53034" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ntb_hw_switchtec: Fix shift-out-of-bounds in switchtec_ntb_mw_set_trans

There is a kernel API ntb_mw_clear_trans() would pass 0 to both addr and
size. This would make xlate_pos negative.

[   23.734156] switchtec switchtec0: MW 0: part 0 addr 0x0000000000000000 size 0x0000000000000000
[   23.734158] ================================================================================
[   23.734172] UBSAN: shift-out-of-bounds in drivers/ntb/hw/mscc/ntb_hw_switchtec.c:293:7
[   23.734418] shift exponent -1 is negative

Ensuring xlate_pos is a positive or zero before BIT.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53034/">CVE-2023-53034 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53034">CVE-2023-53034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241341">SUSE bug 1241341</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055132" comment="kernel-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055133" comment="kernel-abi-stablelists-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055134" comment="kernel-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055135" comment="kernel-cross-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055136" comment="kernel-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055137" comment="kernel-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055138" comment="kernel-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055139" comment="kernel-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055140" comment="kernel-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055141" comment="kernel-debug-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055142" comment="kernel-doc-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055143" comment="kernel-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055144" comment="kernel-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055145" comment="kernel-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055146" comment="kernel-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055147" comment="kernel-rt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055148" comment="kernel-rt-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055149" comment="kernel-rt-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055150" comment="kernel-rt-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055151" comment="kernel-rt-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055152" comment="kernel-rt-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055153" comment="kernel-rt-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055154" comment="kernel-rt-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055155" comment="kernel-rt-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055156" comment="kernel-rt-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055157" comment="kernel-tools-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055158" comment="kernel-tools-libs-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055159" comment="kernel-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055160" comment="kernel-uki-virt-addons-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055161" comment="libperf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055162" comment="perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055163" comment="python3-perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055164" comment="rtla-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055165" comment="rv-5.14.0-611.34.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53036</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53036" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53036" ref_url="https://www.suse.com/security/cve/CVE-2023-53036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix call trace warning and hang when removing amdgpu device

On GPUs with RAS enabled, below call trace and hang are observed when
shutting down device.

v2: use DRM device unplugged flag instead of shutdown flag as the check to
prevent memory wipe in shutdown stage.

[ +0.000000] RIP: 0010:amdgpu_vram_mgr_fini+0x18d/0x1c0 [amdgpu]
[ +0.000001] PKRU: 55555554
[ +0.000001] Call Trace:
[ +0.000001] &lt;TASK&gt;
[ +0.000002] amdgpu_ttm_fini+0x140/0x1c0 [amdgpu]
[ +0.000183] amdgpu_bo_fini+0x27/0xa0 [amdgpu]
[ +0.000184] gmc_v11_0_sw_fini+0x2b/0x40 [amdgpu]
[ +0.000163] amdgpu_device_fini_sw+0xb6/0x510 [amdgpu]
[ +0.000152] amdgpu_driver_release_kms+0x16/0x30 [amdgpu]
[ +0.000090] drm_dev_release+0x28/0x50 [drm]
[ +0.000016] devm_drm_dev_init_release+0x38/0x60 [drm]
[ +0.000011] devm_action_release+0x15/0x20
[ +0.000003] release_nodes+0x40/0xc0
[ +0.000001] devres_release_all+0x9e/0xe0
[ +0.000001] device_unbind_cleanup+0x12/0x80
[ +0.000003] device_release_driver_internal+0xff/0x160
[ +0.000001] driver_detach+0x4a/0x90
[ +0.000001] bus_remove_driver+0x6c/0xf0
[ +0.000001] driver_unregister+0x31/0x50
[ +0.000001] pci_unregister_driver+0x40/0x90
[ +0.000003] amdgpu_exit+0x15/0x120 [amdgpu]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53036/">CVE-2023-53036 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53036">CVE-2023-53036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242740">SUSE bug 1242740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53038</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53038" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53038" ref_url="https://www.suse.com/security/cve/CVE-2023-53038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Check kzalloc() in lpfc_sli4_cgn_params_read()

If kzalloc() fails in lpfc_sli4_cgn_params_read(), then we rely on
lpfc_read_object()'s routine to NULL check pdata.

Currently, an early return error is thrown from lpfc_read_object() to
protect us from NULL ptr dereference, but the errno code is -ENODEV.

Change the errno code to a more appropriate -ENOMEM.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53038/">CVE-2023-53038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53038">CVE-2023-53038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242743">SUSE bug 1242743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53039" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53039" ref_url="https://www.suse.com/security/cve/CVE-2023-53039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: ipc: Fix potential use-after-free in work function

When a reset notify IPC message is received, the ISR schedules a work
function and passes the ISHTP device to it via a global pointer
ishtp_dev. If ish_probe() fails, the devm-managed device resources
including ishtp_dev are freed, but the work is not cancelled, causing a
use-after-free when the work function tries to access ishtp_dev. Use
devm_work_autocancel() instead, so that the work is automatically
cancelled if probe fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53039/">CVE-2023-53039 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53039">CVE-2023-53039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242745">SUSE bug 1242745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242880">SUSE bug 1242880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53042" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53042" ref_url="https://www.suse.com/security/cve/CVE-2023-53042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Do not set DRR on pipe Commit

[WHY]
Writing to DRR registers such as OTG_V_TOTAL_MIN on the same frame as a
pipe commit can cause underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53042/">CVE-2023-53042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53042">CVE-2023-53042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242748">SUSE bug 1242748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53044" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53044" ref_url="https://www.suse.com/security/cve/CVE-2023-53044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm stats: check for and propagate alloc_percpu failure

Check alloc_precpu()'s return value and return an error from
dm_stats_init() if it fails. Update alloc_dev() to fail if
dm_stats_init() does.

Otherwise, a NULL pointer dereference will occur in dm_stats_cleanup()
even if dm-stats isn't being actively used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53044/">CVE-2023-53044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53044">CVE-2023-53044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242759">SUSE bug 1242759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53046" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53046" ref_url="https://www.suse.com/security/cve/CVE-2023-53046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix race condition in hci_cmd_sync_clear

There is a potential race condition in hci_cmd_sync_work and
hci_cmd_sync_clear, and could lead to use-after-free. For instance,
hci_cmd_sync_work is added to the 'req_workqueue' after cancel_work_sync
The entry of 'cmd_sync_work_list' may be freed in hci_cmd_sync_clear, and
causing kernel panic when it is used in 'hci_cmd_sync_work'.

Here's the call trace:

dump_stack_lvl+0x49/0x63
print_report.cold+0x5e/0x5d3
? hci_cmd_sync_work+0x282/0x320
kasan_report+0xaa/0x120
? hci_cmd_sync_work+0x282/0x320
__asan_report_load8_noabort+0x14/0x20
hci_cmd_sync_work+0x282/0x320
process_one_work+0x77b/0x11c0
? _raw_spin_lock_irq+0x8e/0xf0
worker_thread+0x544/0x1180
? poll_idle+0x1e0/0x1e0
kthread+0x285/0x320
? process_one_work+0x11c0/0x11c0
? kthread_complete_and_exit+0x30/0x30
ret_from_fork+0x22/0x30
&lt;/TASK&gt;

Allocated by task 266:
kasan_save_stack+0x26/0x50
__kasan_kmalloc+0xae/0xe0
kmem_cache_alloc_trace+0x191/0x350
hci_cmd_sync_queue+0x97/0x2b0
hci_update_passive_scan+0x176/0x1d0
le_conn_complete_evt+0x1b5/0x1a00
hci_le_conn_complete_evt+0x234/0x340
hci_le_meta_evt+0x231/0x4e0
hci_event_packet+0x4c5/0xf00
hci_rx_work+0x37d/0x880
process_one_work+0x77b/0x11c0
worker_thread+0x544/0x1180
kthread+0x285/0x320
ret_from_fork+0x22/0x30

Freed by task 269:
kasan_save_stack+0x26/0x50
kasan_set_track+0x25/0x40
kasan_set_free_info+0x24/0x40
____kasan_slab_free+0x176/0x1c0
__kasan_slab_free+0x12/0x20
slab_free_freelist_hook+0x95/0x1a0
kfree+0xba/0x2f0
hci_cmd_sync_clear+0x14c/0x210
hci_unregister_dev+0xff/0x440
vhci_release+0x7b/0xf0
__fput+0x1f3/0x970
____fput+0xe/0x20
task_work_run+0xd4/0x160
do_exit+0x8b0/0x22a0
do_group_exit+0xba/0x2a0
get_signal+0x1e4a/0x25b0
arch_do_signal_or_restart+0x93/0x1f80
exit_to_user_mode_prepare+0xf5/0x1a0
syscall_exit_to_user_mode+0x26/0x50
ret_from_fork+0x15/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53046/">CVE-2023-53046 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53046">CVE-2023-53046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244180">SUSE bug 1244180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53047" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53047" ref_url="https://www.suse.com/security/cve/CVE-2023-53047" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: amdtee: fix race condition in amdtee_open_session

There is a potential race condition in amdtee_open_session that may
lead to use-after-free. For instance, in amdtee_open_session() after
sess-&gt;sess_mask is set, and before setting:

    sess-&gt;session_info[i] = session_info;

if amdtee_close_session() closes this same session, then 'sess' data
structure will be released, causing kernel panic when 'sess' is
accessed within amdtee_open_session().

The solution is to set the bit sess-&gt;sess_mask as the last step in
amdtee_open_session().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53047/">CVE-2023-53047 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53047">CVE-2023-53047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242757">SUSE bug 1242757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53050" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53050" ref_url="https://www.suse.com/security/cve/CVE-2023-53050" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Fix memory leak in margining

Memory for the usb4-&gt;margining needs to be relased for the upstream port
of the router as well, even though the debugfs directory gets released
with the router device removal. Fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53050/">CVE-2023-53050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53050">CVE-2023-53050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242220">SUSE bug 1242220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53051" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53051" ref_url="https://www.suse.com/security/cve/CVE-2023-53051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm crypt: add cond_resched() to dmcrypt_write()

The loop in dmcrypt_write may be running for unbounded amount of time,
thus we need cond_resched() in it.

This commit fixes the following warning:

[ 3391.153255][   C12] watchdog: BUG: soft lockup - CPU#12 stuck for 23s! [dmcrypt_write/2:2897]
...
[ 3391.387210][   C12] Call trace:
[ 3391.390338][   C12]  blk_attempt_bio_merge.part.6+0x38/0x158
[ 3391.395970][   C12]  blk_attempt_plug_merge+0xc0/0x1b0
[ 3391.401085][   C12]  blk_mq_submit_bio+0x398/0x550
[ 3391.405856][   C12]  submit_bio_noacct+0x308/0x380
[ 3391.410630][   C12]  dmcrypt_write+0x1e4/0x208 [dm_crypt]
[ 3391.416005][   C12]  kthread+0x130/0x138
[ 3391.419911][   C12]  ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53051/">CVE-2023-53051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53051">CVE-2023-53051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242284">SUSE bug 1242284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53052" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53052" ref_url="https://www.suse.com/security/cve/CVE-2023-53052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix use-after-free bug in refresh_cache_worker()

The UAF bug occurred because we were putting DFS root sessions in
cifs_umount() while DFS cache refresher was being executed.

Make DFS root sessions have same lifetime as DFS tcons so we can avoid
the use-after-free bug is DFS cache refresher and other places that
require IPCs to get new DFS referrals on.  Also, get rid of mount
group handling in DFS cache as we no longer need it.

This fixes below use-after-free bug catched by KASAN

[ 379.946955] BUG: KASAN: use-after-free in __refresh_tcon.isra.0+0x10b/0xc10 [cifs]
[ 379.947642] Read of size 8 at addr ffff888018f57030 by task kworker/u4:3/56
[ 379.948096]
[ 379.948208] CPU: 0 PID: 56 Comm: kworker/u4:3 Not tainted 6.2.0-rc7-lku #23
[ 379.948661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
rel-1.16.0-0-gd239552-rebuilt.opensuse.org 04/01/2014
[ 379.949368] Workqueue: cifs-dfscache refresh_cache_worker [cifs]
[ 379.949942] Call Trace:
[ 379.950113] &lt;TASK&gt;
[ 379.950260] dump_stack_lvl+0x50/0x67
[ 379.950510] print_report+0x16a/0x48e
[ 379.950759] ? __virt_addr_valid+0xd8/0x160
[ 379.951040] ? __phys_addr+0x41/0x80
[ 379.951285] kasan_report+0xdb/0x110
[ 379.951533] ? __refresh_tcon.isra.0+0x10b/0xc10 [cifs]
[ 379.952056] ? __refresh_tcon.isra.0+0x10b/0xc10 [cifs]
[ 379.952585] __refresh_tcon.isra.0+0x10b/0xc10 [cifs]
[ 379.953096] ? __pfx___refresh_tcon.isra.0+0x10/0x10 [cifs]
[ 379.953637] ? __pfx___mutex_lock+0x10/0x10
[ 379.953915] ? lock_release+0xb6/0x720
[ 379.954167] ? __pfx_lock_acquire+0x10/0x10
[ 379.954443] ? refresh_cache_worker+0x34e/0x6d0 [cifs]
[ 379.954960] ? __pfx_wb_workfn+0x10/0x10
[ 379.955239] refresh_cache_worker+0x4ad/0x6d0 [cifs]
[ 379.955755] ? __pfx_refresh_cache_worker+0x10/0x10 [cifs]
[ 379.956323] ? __pfx_lock_acquired+0x10/0x10
[ 379.956615] ? read_word_at_a_time+0xe/0x20
[ 379.956898] ? lockdep_hardirqs_on_prepare+0x12/0x220
[ 379.957235] process_one_work+0x535/0x990
[ 379.957509] ? __pfx_process_one_work+0x10/0x10
[ 379.957812] ? lock_acquired+0xb7/0x5f0
[ 379.958069] ? __list_add_valid+0x37/0xd0
[ 379.958341] ? __list_add_valid+0x37/0xd0
[ 379.958611] worker_thread+0x8e/0x630
[ 379.958861] ? __pfx_worker_thread+0x10/0x10
[ 379.959148] kthread+0x17d/0x1b0
[ 379.959369] ? __pfx_kthread+0x10/0x10
[ 379.959630] ret_from_fork+0x2c/0x50
[ 379.959879] &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53052/">CVE-2023-53052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53052">CVE-2023-53052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242749">SUSE bug 1242749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242881">SUSE bug 1242881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53053" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53053" ref_url="https://www.suse.com/security/cve/CVE-2023-53053" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erspan: do not use skb_mac_header() in ndo_start_xmit()

Drivers should not assume skb_mac_header(skb) == skb-&gt;data in their
ndo_start_xmit().

Use skb_network_offset() and skb_transport_offset() which
better describe what is needed in erspan_fb_xmit() and
ip6erspan_tunnel_xmit()

syzbot reported:
WARNING: CPU: 0 PID: 5083 at include/linux/skbuff.h:2873 skb_mac_header include/linux/skbuff.h:2873 [inline]
WARNING: CPU: 0 PID: 5083 at include/linux/skbuff.h:2873 ip6erspan_tunnel_xmit+0x1d9c/0x2d90 net/ipv6/ip6_gre.c:962
Modules linked in:
CPU: 0 PID: 5083 Comm: syz-executor406 Not tainted 6.3.0-rc2-syzkaller-00866-gd4671cb96fa3 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023
RIP: 0010:skb_mac_header include/linux/skbuff.h:2873 [inline]
RIP: 0010:ip6erspan_tunnel_xmit+0x1d9c/0x2d90 net/ipv6/ip6_gre.c:962
Code: 04 02 41 01 de 84 c0 74 08 3c 03 0f 8e 1c 0a 00 00 45 89 b4 24 c8 00 00 00 c6 85 77 fe ff ff 01 e9 33 e7 ff ff e8 b4 27 a1 f8 &lt;0f&gt; 0b e9 b6 e7 ff ff e8 a8 27 a1 f8 49 8d bf f0 0c 00 00 48 b8 00
RSP: 0018:ffffc90003b2f830 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 000000000000ffff RCX: 0000000000000000
RDX: ffff888021273a80 RSI: ffffffff88e1bd4c RDI: 0000000000000003
RBP: ffffc90003b2f9d8 R08: 0000000000000003 R09: 000000000000ffff
R10: 000000000000ffff R11: 0000000000000000 R12: ffff88802b28da00
R13: 00000000000000d0 R14: ffff88807e25b6d0 R15: ffff888023408000
FS: 0000555556a61300(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055e5b11eb6e8 CR3: 0000000027c1b000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
__netdev_start_xmit include/linux/netdevice.h:4900 [inline]
netdev_start_xmit include/linux/netdevice.h:4914 [inline]
__dev_direct_xmit+0x504/0x730 net/core/dev.c:4300
dev_direct_xmit include/linux/netdevice.h:3088 [inline]
packet_xmit+0x20a/0x390 net/packet/af_packet.c:285
packet_snd net/packet/af_packet.c:3075 [inline]
packet_sendmsg+0x31a0/0x5150 net/packet/af_packet.c:3107
sock_sendmsg_nosec net/socket.c:724 [inline]
sock_sendmsg+0xde/0x190 net/socket.c:747
__sys_sendto+0x23a/0x340 net/socket.c:2142
__do_sys_sendto net/socket.c:2154 [inline]
__se_sys_sendto net/socket.c:2150 [inline]
__x64_sys_sendto+0xe1/0x1b0 net/socket.c:2150
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f123aaa1039
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffc15d12058 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f123aaa1039
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 0000000000000000 R08: 0000000020000040 R09: 0000000000000014
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f123aa648c0
R13: 431bde82d7b634db R14: 0000000000000000 R15: 0000000000000000
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53053/">CVE-2023-53053 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53053">CVE-2023-53053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242234">SUSE bug 1242234</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53056" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53056" ref_url="https://www.suse.com/security/cve/CVE-2023-53056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Synchronize the IOCB count to be in order

A system hang was observed with the following call trace:

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 15 PID: 86747 Comm: nvme Kdump: loaded Not tainted 6.2.0+ #1
Hardware name: Dell Inc. PowerEdge R6515/04F3CJ, BIOS 2.7.3 03/31/2022
RIP: 0010:__wake_up_common+0x55/0x190
Code: 41 f6 01 04 0f 85 b2 00 00 00 48 8b 43 08 4c 8d
      40 e8 48 8d 43 08 48 89 04 24 48 89 c6\
      49 8d 40 18 48 39 c6 0f 84 e9 00 00 00 &lt;49&gt; 8b 40 18 89 6c 24 14 31
      ed 4c 8d 60 e8 41 8b 18 f6 c3 04 75 5d
RSP: 0018:ffffb05a82afbba0 EFLAGS: 00010082
RAX: 0000000000000000 RBX: ffff8f9b83a00018 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffff8f9b83a00020 RDI: ffff8f9b83a00018
RBP: 0000000000000001 R08: ffffffffffffffe8 R09: ffffb05a82afbbf8
R10: 70735f7472617473 R11: 5f30307832616c71 R12: 0000000000000001
R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f815cf4c740(0000) GS:ffff8f9eeed80000(0000)
	knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000010633a000 CR4: 0000000000350ee0
Call Trace:
    &lt;TASK&gt;
    __wake_up_common_lock+0x83/0xd0
    qla_nvme_ls_req+0x21b/0x2b0 [qla2xxx]
    __nvme_fc_send_ls_req+0x1b5/0x350 [nvme_fc]
    nvme_fc_xmt_disconnect_assoc+0xca/0x110 [nvme_fc]
    nvme_fc_delete_association+0x1bf/0x220 [nvme_fc]
    ? nvme_remove_namespaces+0x9f/0x140 [nvme_core]
    nvme_do_delete_ctrl+0x5b/0xa0 [nvme_core]
    nvme_sysfs_delete+0x5f/0x70 [nvme_core]
    kernfs_fop_write_iter+0x12b/0x1c0
    vfs_write+0x2a3/0x3b0
    ksys_write+0x5f/0xe0
    do_syscall_64+0x5c/0x90
    ? syscall_exit_work+0x103/0x130
    ? syscall_exit_to_user_mode+0x12/0x30
    ? do_syscall_64+0x69/0x90
    ? exit_to_user_mode_loop+0xd0/0x130
    ? exit_to_user_mode_prepare+0xec/0x100
    ? syscall_exit_to_user_mode+0x12/0x30
    ? do_syscall_64+0x69/0x90
    ? syscall_exit_to_user_mode+0x12/0x30
    ? do_syscall_64+0x69/0x90
    entry_SYSCALL_64_after_hwframe+0x72/0xdc
    RIP: 0033:0x7f815cd3eb97

The IOCB counts are out of order and that would block any commands from
going out and subsequently hang the system. Synchronize the IOCB count to
be in correct order.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53056/">CVE-2023-53056 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53056">CVE-2023-53056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242219">SUSE bug 1242219</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53057" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53057" ref_url="https://www.suse.com/security/cve/CVE-2023-53057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: HCI: Fix global-out-of-bounds

To loop a variable-length array, hci_init_stage_sync(stage) considers
that stage[i] is valid as long as stage[i-1].func is valid.
Thus, the last element of stage[].func should be intentionally invalid
as hci_init0[], le_init2[], and others did.
However, amp_init1[] and amp_init2[] have no invalid element, letting
hci_init_stage_sync() keep accessing amp_init1[] over its valid range.
This patch fixes this by adding {} in the last of amp_init1[] and
amp_init2[].

==================================================================
BUG: KASAN: global-out-of-bounds in hci_dev_open_sync (
/v6.2-bzimage/net/bluetooth/hci_sync.c:3154
/v6.2-bzimage/net/bluetooth/hci_sync.c:3343
/v6.2-bzimage/net/bluetooth/hci_sync.c:4418
/v6.2-bzimage/net/bluetooth/hci_sync.c:4609
/v6.2-bzimage/net/bluetooth/hci_sync.c:4689)
Read of size 8 at addr ffffffffaed1ab70 by task kworker/u5:0/1032
CPU: 0 PID: 1032 Comm: kworker/u5:0 Not tainted 6.2.0 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04
Workqueue: hci1 hci_power_on
Call Trace:
 &lt;TASK&gt;
dump_stack_lvl (/v6.2-bzimage/lib/dump_stack.c:107 (discriminator 1))
print_report (/v6.2-bzimage/mm/kasan/report.c:307
  /v6.2-bzimage/mm/kasan/report.c:417)
? hci_dev_open_sync (/v6.2-bzimage/net/bluetooth/hci_sync.c:3154
  /v6.2-bzimage/net/bluetooth/hci_sync.c:3343
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4418
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4609
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4689)
kasan_report (/v6.2-bzimage/mm/kasan/report.c:184
  /v6.2-bzimage/mm/kasan/report.c:519)
? hci_dev_open_sync (/v6.2-bzimage/net/bluetooth/hci_sync.c:3154
  /v6.2-bzimage/net/bluetooth/hci_sync.c:3343
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4418
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4609
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4689)
hci_dev_open_sync (/v6.2-bzimage/net/bluetooth/hci_sync.c:3154
  /v6.2-bzimage/net/bluetooth/hci_sync.c:3343
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4418
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4609
  /v6.2-bzimage/net/bluetooth/hci_sync.c:4689)
? __pfx_hci_dev_open_sync (/v6.2-bzimage/net/bluetooth/hci_sync.c:4635)
? mutex_lock (/v6.2-bzimage/./arch/x86/include/asm/atomic64_64.h:190
  /v6.2-bzimage/./include/linux/atomic/atomic-long.h:443
  /v6.2-bzimage/./include/linux/atomic/atomic-instrumented.h:1781
  /v6.2-bzimage/kernel/locking/mutex.c:171
  /v6.2-bzimage/kernel/locking/mutex.c:285)
? __pfx_mutex_lock (/v6.2-bzimage/kernel/locking/mutex.c:282)
hci_power_on (/v6.2-bzimage/net/bluetooth/hci_core.c:485
  /v6.2-bzimage/net/bluetooth/hci_core.c:984)
? __pfx_hci_power_on (/v6.2-bzimage/net/bluetooth/hci_core.c:969)
? read_word_at_a_time (/v6.2-bzimage/./include/asm-generic/rwonce.h:85)
? strscpy (/v6.2-bzimage/./arch/x86/include/asm/word-at-a-time.h:62
  /v6.2-bzimage/lib/string.c:161)
process_one_work (/v6.2-bzimage/kernel/workqueue.c:2294)
worker_thread (/v6.2-bzimage/./include/linux/list.h:292
  /v6.2-bzimage/kernel/workqueue.c:2437)
? __pfx_worker_thread (/v6.2-bzimage/kernel/workqueue.c:2379)
kthread (/v6.2-bzimage/kernel/kthread.c:376)
? __pfx_kthread (/v6.2-bzimage/kernel/kthread.c:331)
ret_from_fork (/v6.2-bzimage/arch/x86/entry/entry_64.S:314)
 &lt;/TASK&gt;
The buggy address belongs to the variable:
amp_init1+0x30/0x60
The buggy address belongs to the physical page:
page:000000003a157ec6 refcount:1 mapcount:0 mapping:0000000000000000 ia
flags: 0x200000000001000(reserved|node=0|zone=2)
raw: 0200000000001000 ffffea0005054688 ffffea0005054688 000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 000000000000000
page dumped because: kasan: bad access detected
Memory state around the buggy address:
 ffffffffaed1aa00: f9 f9 f9 f9 00 00 00 00 f9 f9 f9 f9 00 00 00 00
 ffffffffaed1aa80: 00 00 00 00 f9 f9 f9 f9 00 00 00 00 00 00 00 00
&gt;ffffffffaed1ab00: 00 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 f9 f9
                  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53057/">CVE-2023-53057 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53057">CVE-2023-53057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242240">SUSE bug 1242240</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53058" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53058" ref_url="https://www.suse.com/security/cve/CVE-2023-53058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: E-Switch, Fix an Oops in error handling code

The error handling dereferences "vport".  There is nothing we can do if
it is an error pointer except returning the error code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53058/">CVE-2023-53058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53058">CVE-2023-53058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242237">SUSE bug 1242237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53060" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53060" ref_url="https://www.suse.com/security/cve/CVE-2023-53060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: revert rtnl_lock() that causes deadlock

The commit 6faee3d4ee8b ("igb: Add lock to avoid data race") adds
rtnl_lock to eliminate a false data race shown below

 (FREE from device detaching)      |   (USE from netdev core)
igb_remove                         |  igb_ndo_get_vf_config
 igb_disable_sriov                 |  vf &gt;= adapter-&gt;vfs_allocated_count?
  kfree(adapter-&gt;vf_data)          |
  adapter-&gt;vfs_allocated_count = 0 |
                                   |    memcpy(... adapter-&gt;vf_data[vf]

The above race will never happen and the extra rtnl_lock causes deadlock
below

[  141.420169]  &lt;TASK&gt;
[  141.420672]  __schedule+0x2dd/0x840
[  141.421427]  schedule+0x50/0xc0
[  141.422041]  schedule_preempt_disabled+0x11/0x20
[  141.422678]  __mutex_lock.isra.13+0x431/0x6b0
[  141.423324]  unregister_netdev+0xe/0x20
[  141.423578]  igbvf_remove+0x45/0xe0 [igbvf]
[  141.423791]  pci_device_remove+0x36/0xb0
[  141.423990]  device_release_driver_internal+0xc1/0x160
[  141.424270]  pci_stop_bus_device+0x6d/0x90
[  141.424507]  pci_stop_and_remove_bus_device+0xe/0x20
[  141.424789]  pci_iov_remove_virtfn+0xba/0x120
[  141.425452]  sriov_disable+0x2f/0xf0
[  141.425679]  igb_disable_sriov+0x4e/0x100 [igb]
[  141.426353]  igb_remove+0xa0/0x130 [igb]
[  141.426599]  pci_device_remove+0x36/0xb0
[  141.426796]  device_release_driver_internal+0xc1/0x160
[  141.427060]  driver_detach+0x44/0x90
[  141.427253]  bus_remove_driver+0x55/0xe0
[  141.427477]  pci_unregister_driver+0x2a/0xa0
[  141.428296]  __x64_sys_delete_module+0x141/0x2b0
[  141.429126]  ? mntput_no_expire+0x4a/0x240
[  141.429363]  ? syscall_trace_enter.isra.19+0x126/0x1a0
[  141.429653]  do_syscall_64+0x5b/0x80
[  141.429847]  ? exit_to_user_mode_prepare+0x14d/0x1c0
[  141.430109]  ? syscall_exit_to_user_mode+0x12/0x30
[  141.430849]  ? do_syscall_64+0x67/0x80
[  141.431083]  ? syscall_exit_to_user_mode_prepare+0x183/0x1b0
[  141.431770]  ? syscall_exit_to_user_mode+0x12/0x30
[  141.432482]  ? do_syscall_64+0x67/0x80
[  141.432714]  ? exc_page_fault+0x64/0x140
[  141.432911]  entry_SYSCALL_64_after_hwframe+0x72/0xdc

Since the igb_disable_sriov() will call pci_disable_sriov() before
releasing any resources, the netdev core will synchronize the cleanup to
avoid any races. This patch removes the useless rtnl_(un)lock to guarantee
correctness.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53060/">CVE-2023-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53060">CVE-2023-53060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242241">SUSE bug 1242241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53064" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53064" ref_url="https://www.suse.com/security/cve/CVE-2023-53064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: fix hang on reboot with ice

When a system with E810 with existing VFs gets rebooted the following
hang may be observed.

 Pid 1 is hung in iavf_remove(), part of a network driver:
 PID: 1        TASK: ffff965400e5a340  CPU: 24   COMMAND: "systemd-shutdow"
  #0 [ffffaad04005fa50] __schedule at ffffffff8b3239cb
  #1 [ffffaad04005fae8] schedule at ffffffff8b323e2d
  #2 [ffffaad04005fb00] schedule_hrtimeout_range_clock at ffffffff8b32cebc
  #3 [ffffaad04005fb80] usleep_range_state at ffffffff8b32c930
  #4 [ffffaad04005fbb0] iavf_remove at ffffffffc12b9b4c [iavf]
  #5 [ffffaad04005fbf0] pci_device_remove at ffffffff8add7513
  #6 [ffffaad04005fc10] device_release_driver_internal at ffffffff8af08baa
  #7 [ffffaad04005fc40] pci_stop_bus_device at ffffffff8adcc5fc
  #8 [ffffaad04005fc60] pci_stop_and_remove_bus_device at ffffffff8adcc81e
  #9 [ffffaad04005fc70] pci_iov_remove_virtfn at ffffffff8adf9429
 #10 [ffffaad04005fca8] sriov_disable at ffffffff8adf98e4
 #11 [ffffaad04005fcc8] ice_free_vfs at ffffffffc04bb2c8 [ice]
 #12 [ffffaad04005fd10] ice_remove at ffffffffc04778fe [ice]
 #13 [ffffaad04005fd38] ice_shutdown at ffffffffc0477946 [ice]
 #14 [ffffaad04005fd50] pci_device_shutdown at ffffffff8add58f1
 #15 [ffffaad04005fd70] device_shutdown at ffffffff8af05386
 #16 [ffffaad04005fd98] kernel_restart at ffffffff8a92a870
 #17 [ffffaad04005fda8] __do_sys_reboot at ffffffff8a92abd6
 #18 [ffffaad04005fee0] do_syscall_64 at ffffffff8b317159
 #19 [ffffaad04005ff08] __context_tracking_enter at ffffffff8b31b6fc
 #20 [ffffaad04005ff18] syscall_exit_to_user_mode at ffffffff8b31b50d
 #21 [ffffaad04005ff28] do_syscall_64 at ffffffff8b317169
 #22 [ffffaad04005ff50] entry_SYSCALL_64_after_hwframe at ffffffff8b40009b
     RIP: 00007f1baa5c13d7  RSP: 00007fffbcc55a98  RFLAGS: 00000202
     RAX: ffffffffffffffda  RBX: 0000000000000000  RCX: 00007f1baa5c13d7
     RDX: 0000000001234567  RSI: 0000000028121969  RDI: 00000000fee1dead
     RBP: 00007fffbcc55ca0   R8: 0000000000000000   R9: 00007fffbcc54e90
     R10: 00007fffbcc55050  R11: 0000000000000202  R12: 0000000000000005
     R13: 0000000000000000  R14: 00007fffbcc55af0  R15: 0000000000000000
     ORIG_RAX: 00000000000000a9  CS: 0033  SS: 002b

During reboot all drivers PM shutdown callbacks are invoked.
In iavf_shutdown() the adapter state is changed to __IAVF_REMOVE.
In ice_shutdown() the call chain above is executed, which at some point
calls iavf_remove(). However iavf_remove() expects the VF to be in one
of the states __IAVF_RUNNING, __IAVF_DOWN or __IAVF_INIT_FAILED. If
that's not the case it sleeps forever.
So if iavf_shutdown() gets invoked before iavf_remove() the system will
hang indefinitely because the adapter is already in state __IAVF_REMOVE.

Fix this by returning from iavf_remove() if the state is __IAVF_REMOVE,
as we already went through iavf_shutdown().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53064/">CVE-2023-53064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53064">CVE-2023-53064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242222">SUSE bug 1242222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53065</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53065" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53065" ref_url="https://www.suse.com/security/cve/CVE-2023-53065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Fix perf_output_begin parameter is incorrectly invoked in perf_event_bpf_output

syzkaller reportes a KASAN issue with stack-out-of-bounds.
The call trace is as follows:
  dump_stack+0x9c/0xd3
  print_address_description.constprop.0+0x19/0x170
  __kasan_report.cold+0x6c/0x84
  kasan_report+0x3a/0x50
  __perf_event_header__init_id+0x34/0x290
  perf_event_header__init_id+0x48/0x60
  perf_output_begin+0x4a4/0x560
  perf_event_bpf_output+0x161/0x1e0
  perf_iterate_sb_cpu+0x29e/0x340
  perf_iterate_sb+0x4c/0xc0
  perf_event_bpf_event+0x194/0x2c0
  __bpf_prog_put.constprop.0+0x55/0xf0
  __cls_bpf_delete_prog+0xea/0x120 [cls_bpf]
  cls_bpf_delete_prog_work+0x1c/0x30 [cls_bpf]
  process_one_work+0x3c2/0x730
  worker_thread+0x93/0x650
  kthread+0x1b8/0x210
  ret_from_fork+0x1f/0x30

commit 267fb27352b6 ("perf: Reduce stack usage of perf_output_begin()")
use on-stack struct perf_sample_data of the caller function.

However, perf_event_bpf_output uses incorrect parameter to convert
small-sized data (struct perf_bpf_event) into large-sized data
(struct perf_sample_data), which causes memory overwriting occurs in
__perf_event_header__init_id.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53065/">CVE-2023-53065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53065">CVE-2023-53065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242229">SUSE bug 1242229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53066" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53066" ref_url="https://www.suse.com/security/cve/CVE-2023-53066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info

We have to make sure that the info returned by the helper is valid
before using it.

Found by Linux Verification Center (linuxtesting.org) with the SVACE
static analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53066/">CVE-2023-53066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53066">CVE-2023-53066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242227">SUSE bug 1242227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53070" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53070" ref_url="https://www.suse.com/security/cve/CVE-2023-53070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: PPTT: Fix to avoid sleep in the atomic context when PPTT is absent

Commit 0c80f9e165f8 ("ACPI: PPTT: Leave the table mapped for the runtime usage")
enabled to map PPTT once on the first invocation of acpi_get_pptt() and
never unmapped the same allowing it to be used at runtime with out the
hassle of mapping and unmapping the table. This was needed to fetch LLC
information from the PPTT in the cpuhotplug path which is executed in
the atomic context as the acpi_get_table() might sleep waiting for a
mutex.

However it missed to handle the case when there is no PPTT on the system
which results in acpi_get_pptt() being called from all the secondary
CPUs attempting to fetch the LLC information in the atomic context
without knowing the absence of PPTT resulting in the splat like below:

 | BUG: sleeping function called from invalid context at kernel/locking/semaphore.c:164
 | in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/1
 | preempt_count: 1, expected: 0
 | RCU nest depth: 0, expected: 0
 | no locks held by swapper/1/0.
 | irq event stamp: 0
 | hardirqs last  enabled at (0): 0x0
 | hardirqs last disabled at (0): copy_process+0x61c/0x1b40
 | softirqs last  enabled at (0): copy_process+0x61c/0x1b40
 | softirqs last disabled at (0): 0x0
 | CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.3.0-rc1 #1
 | Call trace:
 |  dump_backtrace+0xac/0x138
 |  show_stack+0x30/0x48
 |  dump_stack_lvl+0x60/0xb0
 |  dump_stack+0x18/0x28
 |  __might_resched+0x160/0x270
 |  __might_sleep+0x58/0xb0
 |  down_timeout+0x34/0x98
 |  acpi_os_wait_semaphore+0x7c/0xc0
 |  acpi_ut_acquire_mutex+0x58/0x108
 |  acpi_get_table+0x40/0xe8
 |  acpi_get_pptt+0x48/0xa0
 |  acpi_get_cache_info+0x38/0x140
 |  init_cache_level+0xf4/0x118
 |  detect_cache_attributes+0x2e4/0x640
 |  update_siblings_masks+0x3c/0x330
 |  store_cpu_topology+0x88/0xf0
 |  secondary_start_kernel+0xd0/0x168
 |  __secondary_switched+0xb8/0xc0

Update acpi_get_pptt() to consider the fact that PPTT is once checked and
is not available on the system and return NULL avoiding any attempts to
fetch PPTT and thereby avoiding any possible sleep waiting for a mutex
in the atomic context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53070/">CVE-2023-53070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53070">CVE-2023-53070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242286">SUSE bug 1242286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53071</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53071" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53071" ref_url="https://www.suse.com/security/cve/CVE-2023-53071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: do not run mt76_unregister_device() on unregistered hw

Trying to probe a mt7921e pci card without firmware results in a
successful probe where ieee80211_register_hw hasn't been called. When
removing the driver, ieee802111_unregister_hw is called unconditionally
leading to a kernel NULL pointer dereference.
Fix the issue running mt76_unregister_device routine just for registered
hw.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53071/">CVE-2023-53071 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53071">CVE-2023-53071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242217">SUSE bug 1242217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53072</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53072" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53072" ref_url="https://www.suse.com/security/cve/CVE-2023-53072" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: use the workqueue to destroy unaccepted sockets

Christoph reported a UaF at token lookup time after having
refactored the passive socket initialization part:

  BUG: KASAN: use-after-free in __token_bucket_busy+0x253/0x260
  Read of size 4 at addr ffff88810698d5b0 by task syz-executor653/3198

  CPU: 1 PID: 3198 Comm: syz-executor653 Not tainted 6.2.0-rc59af4eaa31c1f6c00c8f1e448ed99a45c66340dd5 #6
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6e/0x91
   print_report+0x16a/0x46f
   kasan_report+0xad/0x130
   __token_bucket_busy+0x253/0x260
   mptcp_token_new_connect+0x13d/0x490
   mptcp_connect+0x4ed/0x860
   __inet_stream_connect+0x80e/0xd90
   tcp_sendmsg_fastopen+0x3ce/0x710
   mptcp_sendmsg+0xff1/0x1a20
   inet_sendmsg+0x11d/0x140
   __sys_sendto+0x405/0x490
   __x64_sys_sendto+0xdc/0x1b0
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

We need to properly clean-up all the paired MPTCP-level
resources and be sure to release the msk last, even when
the unaccepted subflow is destroyed by the TCP internals
via inet_child_forget().

We can re-use the existing MPTCP_WORK_CLOSE_SUBFLOW infra,
explicitly checking that for the critical scenario: the
closed subflow is the MPC one, the msk is not accepted and
eventually going through full cleanup.

With such change, __mptcp_destroy_sock() is always called
on msk sockets, even on accepted ones. We don't need anymore
to transiently drop one sk reference at msk clone time.

Please note this commit depends on the parent one:

  mptcp: refactor passive socket initialization
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53072/">CVE-2023-53072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53072">CVE-2023-53072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242223">SUSE bug 1242223</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53073</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53073" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53073" ref_url="https://www.suse.com/security/cve/CVE-2023-53073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/amd/core: Always clear status for idx

The variable 'status' (which contains the unhandled overflow bits) is
not being properly masked in some cases, displaying the following
warning:

  WARNING: CPU: 156 PID: 475601 at arch/x86/events/amd/core.c:972 amd_pmu_v2_handle_irq+0x216/0x270

This seems to be happening because the loop is being continued before
the status bit being unset, in case x86_perf_event_set_period()
returns 0. This is also causing an inconsistency because the "handled"
counter is incremented, but the status bit is not cleaned.

Move the bit cleaning together above, together when the "handled"
counter is incremented.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53073/">CVE-2023-53073 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53073">CVE-2023-53073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242224">SUSE bug 1242224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53077" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53077" ref_url="https://www.suse.com/security/cve/CVE-2023-53077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix shift-out-of-bounds in CalculateVMAndRowBytes

[WHY]
When PTEBufferSizeInRequests is zero, UBSAN reports the following
warning because dml_log2 returns an unexpected negative value:

  shift exponent 4294966273 is too large for 32-bit type 'int'

[HOW]

In the case PTEBufferSizeInRequests is zero, skip the dml_log2() and
assign the result directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53077/">CVE-2023-53077 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53077">CVE-2023-53077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242752">SUSE bug 1242752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53078" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53078" ref_url="https://www.suse.com/security/cve/CVE-2023-53078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: scsi_dh_alua: Fix memleak for 'qdata' in alua_activate()

If alua_rtpg_queue() failed from alua_activate(), then 'qdata' is not
freed, which will cause following memleak:

unreferenced object 0xffff88810b2c6980 (size 32):
  comm "kworker/u16:2", pid 635322, jiffies 4355801099 (age 1216426.076s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    40 39 24 c1 ff ff ff ff 00 f8 ea 0a 81 88 ff ff  @9$.............
  backtrace:
    [&lt;0000000098f3a26d&gt;] alua_activate+0xb0/0x320
    [&lt;000000003b529641&gt;] scsi_dh_activate+0xb2/0x140
    [&lt;000000007b296db3&gt;] activate_path_work+0xc6/0xe0 [dm_multipath]
    [&lt;000000007adc9ace&gt;] process_one_work+0x3c5/0x730
    [&lt;00000000c457a985&gt;] worker_thread+0x93/0x650
    [&lt;00000000cb80e628&gt;] kthread+0x1ba/0x210
    [&lt;00000000a1e61077&gt;] ret_from_fork+0x22/0x30

Fix the problem by freeing 'qdata' in error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53078/">CVE-2023-53078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53078">CVE-2023-53078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242231">SUSE bug 1242231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53079" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53079" ref_url="https://www.suse.com/security/cve/CVE-2023-53079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix steering rules cleanup

vport's mc, uc and multicast rules are not deleted in teardown path when
EEH happens. Since the vport's promisc settings(uc, mc and all) in
firmware are reset after EEH, mlx5 driver will try to delete the above
rules in the initialization path. This cause kernel crash because these
software rules are no longer valid.

Fix by nullifying these rules right after delete to avoid accessing any dangling
pointers.

Call Trace:
__list_del_entry_valid+0xcc/0x100 (unreliable)
tree_put_node+0xf4/0x1b0 [mlx5_core]
tree_remove_node+0x30/0x70 [mlx5_core]
mlx5_del_flow_rules+0x14c/0x1f0 [mlx5_core]
esw_apply_vport_rx_mode+0x10c/0x200 [mlx5_core]
esw_update_vport_rx_mode+0xb4/0x180 [mlx5_core]
esw_vport_change_handle_locked+0x1ec/0x230 [mlx5_core]
esw_enable_vport+0x130/0x260 [mlx5_core]
mlx5_eswitch_enable_sriov+0x2a0/0x2f0 [mlx5_core]
mlx5_device_enable_sriov+0x74/0x440 [mlx5_core]
mlx5_load_one+0x114c/0x1550 [mlx5_core]
mlx5_pci_resume+0x68/0xf0 [mlx5_core]
eeh_report_resume+0x1a4/0x230
eeh_pe_dev_traverse+0x98/0x170
eeh_handle_normal_event+0x3e4/0x640
eeh_handle_event+0x4c/0x370
eeh_event_handler+0x14c/0x210
kthread+0x168/0x1b0
ret_from_kernel_thread+0x5c/0x84
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53079/">CVE-2023-53079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53079">CVE-2023-53079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242765">SUSE bug 1242765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53083" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53083" ref_url="https://www.suse.com/security/cve/CVE-2023-53083" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: don't replace page in rq_pages if it's a continuation of last page

The splice read calls nfsd_splice_actor to put the pages containing file
data into the svc_rqst-&gt;rq_pages array. It's possible however to get a
splice result that only has a partial page at the end, if (e.g.) the
filesystem hands back a short read that doesn't cover the whole page.

nfsd_splice_actor will plop the partial page into its rq_pages array and
return. Then later, when nfsd_splice_actor is called again, the
remainder of the page may end up being filled out. At this point,
nfsd_splice_actor will put the page into the array _again_ corrupting
the reply. If this is done enough times, rq_next_page will overrun the
array and corrupt the trailing fields -- the rq_respages and
rq_next_page pointers themselves.

If we've already added the page to the array in the last pass, don't add
it to the array a second time when dealing with a splice continuation.
This was originally handled properly in nfsd_splice_actor, but commit
91e23b1c3982 ("NFSD: Clean up nfsd_splice_actor()") removed the check
for it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53083/">CVE-2023-53083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53083">CVE-2023-53083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242290">SUSE bug 1242290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53084" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53084" ref_url="https://www.suse.com/security/cve/CVE-2023-53084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/shmem-helper: Remove another errant put in error path

drm_gem_shmem_mmap() doesn't own reference in error code path, resulting
in the dma-buf shmem GEM object getting prematurely freed leading to a
later use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53084/">CVE-2023-53084 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53084">CVE-2023-53084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242294">SUSE bug 1242294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53085" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53085" ref_url="https://www.suse.com/security/cve/CVE-2023-53085" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/edid: fix info leak when failing to get panel id

Make sure to clear the transfer buffer before fetching the EDID to
avoid leaking slab data to the logs on errors that leave the buffer
unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53085/">CVE-2023-53085 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53085">CVE-2023-53085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242293">SUSE bug 1242293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53086" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53086" ref_url="https://www.suse.com/security/cve/CVE-2023-53086" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: connac: do not check WED status for non-mmio devices

WED is supported just for mmio devices, so do not check it for usb or
sdio devices. This patch fixes the crash reported below:

[   21.946627] wlp0s3u1i3: authenticate with c4:41:1e:f5:2b:1d
[   22.525298] wlp0s3u1i3: send auth to c4:41:1e:f5:2b:1d (try 1/3)
[   22.548274] wlp0s3u1i3: authenticate with c4:41:1e:f5:2b:1d
[   22.557694] wlp0s3u1i3: send auth to c4:41:1e:f5:2b:1d (try 1/3)
[   22.565885] wlp0s3u1i3: authenticated
[   22.569502] wlp0s3u1i3: associate with c4:41:1e:f5:2b:1d (try 1/3)
[   22.578966] wlp0s3u1i3: RX AssocResp from c4:41:1e:f5:2b:1d (capab=0x11 status=30 aid=3)
[   22.579113] wlp0s3u1i3: c4:41:1e:f5:2b:1d rejected association temporarily; comeback duration 1000 TU (1024 ms)
[   23.649518] wlp0s3u1i3: associate with c4:41:1e:f5:2b:1d (try 2/3)
[   23.752528] wlp0s3u1i3: RX AssocResp from c4:41:1e:f5:2b:1d (capab=0x11 status=0 aid=3)
[   23.797450] wlp0s3u1i3: associated
[   24.959527] kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
[   24.959640] BUG: unable to handle page fault for address: ffff88800c223200
[   24.959706] #PF: supervisor instruction fetch in kernel mode
[   24.959788] #PF: error_code(0x0011) - permissions violation
[   24.959846] PGD 2c01067 P4D 2c01067 PUD 2c02067 PMD c2a8063 PTE 800000000c223163
[   24.959957] Oops: 0011 [#1] PREEMPT SMP
[   24.960009] CPU: 0 PID: 391 Comm: wpa_supplicant Not tainted 6.2.0-kvm #18
[   24.960089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.1-2.fc37 04/01/2014
[   24.960191] RIP: 0010:0xffff88800c223200
[   24.960446] RSP: 0018:ffffc90000ff7698 EFLAGS: 00010282
[   24.960513] RAX: ffff888028397010 RBX: ffff88800c26e630 RCX: 0000000000000058
[   24.960598] RDX: ffff88800c26f844 RSI: 0000000000000006 RDI: ffff888028397010
[   24.960682] RBP: ffff88800ea72f00 R08: 18b873fbab2b964c R09: be06b38235f3c63c
[   24.960766] R10: 18b873fbab2b964c R11: be06b38235f3c63c R12: 0000000000000001
[   24.960853] R13: ffff88800c26f84c R14: ffff8880063f0ff8 R15: ffff88800c26e644
[   24.960950] FS:  00007effcea327c0(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000
[   24.961036] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   24.961106] CR2: ffff88800c223200 CR3: 000000000eaa2000 CR4: 00000000000006b0
[   24.961190] Call Trace:
[   24.961219]  &lt;TASK&gt;
[   24.961245]  ? mt76_connac_mcu_add_key+0x2cf/0x310
[   24.961313]  ? mt7921_set_key+0x150/0x200
[   24.961365]  ? drv_set_key+0xa9/0x1b0
[   24.961418]  ? ieee80211_key_enable_hw_accel+0xd9/0x240
[   24.961485]  ? ieee80211_key_replace+0x3f3/0x730
[   24.961541]  ? crypto_shash_setkey+0x89/0xd0
[   24.961597]  ? ieee80211_key_link+0x2d7/0x3a0
[   24.961664]  ? crypto_aead_setauthsize+0x31/0x50
[   24.961730]  ? sta_info_hash_lookup+0xa6/0xf0
[   24.961785]  ? ieee80211_add_key+0x1fc/0x250
[   24.961842]  ? rdev_add_key+0x41/0x140
[   24.961882]  ? nl80211_parse_key+0x6c/0x2f0
[   24.961940]  ? nl80211_new_key+0x24a/0x290
[   24.961984]  ? genl_rcv_msg+0x36c/0x3a0
[   24.962036]  ? rdev_mod_link_station+0xe0/0xe0
[   24.962102]  ? nl80211_set_key+0x410/0x410
[   24.962143]  ? nl80211_pre_doit+0x200/0x200
[   24.962187]  ? genl_bind+0xc0/0xc0
[   24.962217]  ? netlink_rcv_skb+0xaa/0xd0
[   24.962259]  ? genl_rcv+0x24/0x40
[   24.962300]  ? netlink_unicast+0x224/0x2f0
[   24.962345]  ? netlink_sendmsg+0x30b/0x3d0
[   24.962388]  ? ____sys_sendmsg+0x109/0x1b0
[   24.962388]  ? ____sys_sendmsg+0x109/0x1b0
[   24.962440]  ? __import_iovec+0x2e/0x110
[   24.962482]  ? ___sys_sendmsg+0xbe/0xe0
[   24.962525]  ? mod_objcg_state+0x25c/0x330
[   24.962576]  ? __dentry_kill+0x19e/0x1d0
[   24.962618]  ? call_rcu+0x18f/0x270
[   24.962660]  ? __dentry_kill+0x19e/0x1d0
[   24.962702]  ? __x64_sys_sendmsg+0x70/0x90
[   24.962744]  ? do_syscall_64+0x3d/0x80
[   24.962796]  ? exit_to_user_mode_prepare+0x1b/0x70
[   24.962852]  ? entry_SYSCA
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53086/">CVE-2023-53086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53086">CVE-2023-53086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242292">SUSE bug 1242292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53087" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53087" ref_url="https://www.suse.com/security/cve/CVE-2023-53087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/active: Fix misuse of non-idle barriers as fence trackers

Users reported oopses on list corruptions when using i915 perf with a
number of concurrently running graphics applications.  Root cause analysis
pointed at an issue in barrier processing code -- a race among perf open /
close replacing active barriers with perf requests on kernel context and
concurrent barrier preallocate / acquire operations performed during user
context first pin / last unpin.

When adding a request to a composite tracker, we try to reuse an existing
fence tracker, already allocated and registered with that composite.  The
tracker we obtain may already track another fence, may be an idle barrier,
or an active barrier.

If the tracker we get occurs a non-idle barrier then we try to delete that
barrier from a list of barrier tasks it belongs to.  However, while doing
that we don't respect return value from a function that performs the
barrier deletion.  Should the deletion ever fail, we would end up reusing
the tracker still registered as a barrier task.  Since the same structure
field is reused with both fence callback lists and barrier tasks list,
list corruptions would likely occur.

Barriers are now deleted from a barrier tasks list by temporarily removing
the list content, traversing that content with skip over the node to be
deleted, then populating the list back with the modified content.  Should
that intentionally racy concurrent deletion attempts be not serialized,
one or more of those may fail because of the list being temporary empty.

Related code that ignores the results of barrier deletion was initially
introduced in v5.4 by commit d8af05ff38ae ("drm/i915: Allow sharing the
idle-barrier from other kernel requests").  However, all users of the
barrier deletion routine were apparently serialized at that time, then the
issue didn't exhibit itself.  Results of git bisect with help of a newly
developed igt@gem_barrier_race@remote-request IGT test indicate that list
corruptions might start to appear after commit 311770173fac ("drm/i915/gt:
Schedule request retirement when timeline idles"), introduced in v5.5.

Respect results of barrier deletion attempts -- mark the barrier as idle
only if successfully deleted from the list.  Then, before proceeding with
setting our fence as the one currently tracked, make sure that the tracker
we've got is not a non-idle barrier.  If that check fails then don't use
that tracker but go back and try to acquire a new, usable one.

v3: use unlikely() to document what outcome we expect (Andi),
  - fix bad grammar in commit description.
v2: no code changes,
  - blame commit 311770173fac ("drm/i915/gt: Schedule request retirement
    when timeline idles"), v5.5, not commit d8af05ff38ae ("drm/i915: Allow
    sharing the idle-barrier from other kernel requests"), v5.4,
  - reword commit description.

(cherry picked from commit 506006055769b10d1b2b4e22f636f3b45e0e9fc7)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53087/">CVE-2023-53087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53087">CVE-2023-53087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242280">SUSE bug 1242280</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53088" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53088" ref_url="https://www.suse.com/security/cve/CVE-2023-53088" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix UaF in listener shutdown

As reported by Christoph after having refactored the passive
socket initialization, the mptcp listener shutdown path is prone
to an UaF issue.

  BUG: KASAN: use-after-free in _raw_spin_lock_bh+0x73/0xe0
  Write of size 4 at addr ffff88810cb23098 by task syz-executor731/1266

  CPU: 1 PID: 1266 Comm: syz-executor731 Not tainted 6.2.0-rc59af4eaa31c1f6c00c8f1e448ed99a45c66340dd5 #6
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6e/0x91
   print_report+0x16a/0x46f
   kasan_report+0xad/0x130
   kasan_check_range+0x14a/0x1a0
   _raw_spin_lock_bh+0x73/0xe0
   subflow_error_report+0x6d/0x110
   sk_error_report+0x3b/0x190
   tcp_disconnect+0x138c/0x1aa0
   inet_child_forget+0x6f/0x2e0
   inet_csk_listen_stop+0x209/0x1060
   __mptcp_close_ssk+0x52d/0x610
   mptcp_destroy_common+0x165/0x640
   mptcp_destroy+0x13/0x80
   __mptcp_destroy_sock+0xe7/0x270
   __mptcp_close+0x70e/0x9b0
   mptcp_close+0x2b/0x150
   inet_release+0xe9/0x1f0
   __sock_release+0xd2/0x280
   sock_close+0x15/0x20
   __fput+0x252/0xa20
   task_work_run+0x169/0x250
   exit_to_user_mode_prepare+0x113/0x120
   syscall_exit_to_user_mode+0x1d/0x40
   do_syscall_64+0x48/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

The msk grace period can legitly expire in between the last
reference count dropped in mptcp_subflow_queue_clean() and
the later eventual access in inet_csk_listen_stop()

After the previous patch we don't need anymore special-casing
msk listener socket cleanup: the mptcp worker will process each
of the unaccepted msk sockets.

Just drop the now unnecessary code.

Please note this commit depends on the two parent ones:

  mptcp: refactor passive socket initialization
  mptcp: use the workqueue to destroy unaccepted sockets
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53088/">CVE-2023-53088 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53088">CVE-2023-53088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242291">SUSE bug 1242291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53089" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53089" ref_url="https://www.suse.com/security/cve/CVE-2023-53089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix task hung in ext4_xattr_delete_inode

Syzbot reported a hung task problem:
==================================================================
INFO: task syz-executor232:5073 blocked for more than 143 seconds.
      Not tainted 6.2.0-rc2-syzkaller-00024-g512dee0c00ad #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:syz-exec232 state:D stack:21024 pid:5073 ppid:5072 flags:0x00004004
Call Trace:
 &lt;TASK&gt;
 context_switch kernel/sched/core.c:5244 [inline]
 __schedule+0x995/0xe20 kernel/sched/core.c:6555
 schedule+0xcb/0x190 kernel/sched/core.c:6631
 __wait_on_freeing_inode fs/inode.c:2196 [inline]
 find_inode_fast+0x35a/0x4c0 fs/inode.c:950
 iget_locked+0xb1/0x830 fs/inode.c:1273
 __ext4_iget+0x22e/0x3ed0 fs/ext4/inode.c:4861
 ext4_xattr_inode_iget+0x68/0x4e0 fs/ext4/xattr.c:389
 ext4_xattr_inode_dec_ref_all+0x1a7/0xe50 fs/ext4/xattr.c:1148
 ext4_xattr_delete_inode+0xb04/0xcd0 fs/ext4/xattr.c:2880
 ext4_evict_inode+0xd7c/0x10b0 fs/ext4/inode.c:296
 evict+0x2a4/0x620 fs/inode.c:664
 ext4_orphan_cleanup+0xb60/0x1340 fs/ext4/orphan.c:474
 __ext4_fill_super fs/ext4/super.c:5516 [inline]
 ext4_fill_super+0x81cd/0x8700 fs/ext4/super.c:5644
 get_tree_bdev+0x400/0x620 fs/super.c:1282
 vfs_get_tree+0x88/0x270 fs/super.c:1489
 do_new_mount+0x289/0xad0 fs/namespace.c:3145
 do_mount fs/namespace.c:3488 [inline]
 __do_sys_mount fs/namespace.c:3697 [inline]
 __se_sys_mount+0x2d3/0x3c0 fs/namespace.c:3674
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7fa5406fd5ea
RSP: 002b:00007ffc7232f968 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fa5406fd5ea
RDX: 0000000020000440 RSI: 0000000020000000 RDI: 00007ffc7232f970
RBP: 00007ffc7232f970 R08: 00007ffc7232f9b0 R09: 0000000000000432
R10: 0000000000804a03 R11: 0000000000000202 R12: 0000000000000004
R13: 0000555556a7a2c0 R14: 00007ffc7232f9b0 R15: 0000000000000000
 &lt;/TASK&gt;
==================================================================

The problem is that the inode contains an xattr entry with ea_inum of 15
when cleaning up an orphan inode &lt;15&gt;. When evict inode &lt;15&gt;, the reference
counting of the corresponding EA inode is decreased. When EA inode &lt;15&gt; is
found by find_inode_fast() in __ext4_iget(), it is found that the EA inode
holds the I_FREEING flag and waits for the EA inode to complete deletion.
As a result, when inode &lt;15&gt; is being deleted, we wait for inode &lt;15&gt; to
complete the deletion, resulting in an infinite loop and triggering Hung
Task. To solve this problem, we only need to check whether the ino of EA
inode and parent is the same before getting EA inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53089/">CVE-2023-53089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53089">CVE-2023-53089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242744">SUSE bug 1242744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53090" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53090" ref_url="https://www.suse.com/security/cve/CVE-2023-53090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix an illegal memory access

In the kfd_wait_on_events() function, the kfd_event_waiter structure is
allocated by alloc_event_waiters(), but the event field of the waiter
structure is not initialized; When copy_from_user() fails in the
kfd_wait_on_events() function, it will enter exception handling to
release the previously allocated memory of the waiter structure;
Due to the event field of the waiters structure being accessed
in the free_waiters() function, this results in illegal memory access
and system crash, here is the crash log:

localhost kernel: RIP: 0010:native_queued_spin_lock_slowpath+0x185/0x1e0
localhost kernel: RSP: 0018:ffffaa53c362bd60 EFLAGS: 00010082
localhost kernel: RAX: ff3d3d6bff4007cb RBX: 0000000000000282 RCX: 00000000002c0000
localhost kernel: RDX: ffff9e855eeacb80 RSI: 000000000000279c RDI: ffffe7088f6a21d0
localhost kernel: RBP: ffffe7088f6a21d0 R08: 00000000002c0000 R09: ffffaa53c362be64
localhost kernel: R10: ffffaa53c362bbd8 R11: 0000000000000001 R12: 0000000000000002
localhost kernel: R13: ffff9e7ead15d600 R14: 0000000000000000 R15: ffff9e7ead15d698
localhost kernel: FS:  0000152a3d111700(0000) GS:ffff9e855ee80000(0000) knlGS:0000000000000000
localhost kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
localhost kernel: CR2: 0000152938000010 CR3: 000000044d7a4000 CR4: 00000000003506e0
localhost kernel: Call Trace:
localhost kernel: _raw_spin_lock_irqsave+0x30/0x40
localhost kernel: remove_wait_queue+0x12/0x50
localhost kernel: kfd_wait_on_events+0x1b6/0x490 [hydcu]
localhost kernel: ? ftrace_graph_caller+0xa0/0xa0
localhost kernel: kfd_ioctl+0x38c/0x4a0 [hydcu]
localhost kernel: ? kfd_ioctl_set_trap_handler+0x70/0x70 [hydcu]
localhost kernel: ? kfd_ioctl_create_queue+0x5a0/0x5a0 [hydcu]
localhost kernel: ? ftrace_graph_caller+0xa0/0xa0
localhost kernel: __x64_sys_ioctl+0x8e/0xd0
localhost kernel: ? syscall_trace_enter.isra.18+0x143/0x1b0
localhost kernel: do_syscall_64+0x33/0x80
localhost kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9
localhost kernel: RIP: 0033:0x152a4dff68d7

Allocate the structure with kcalloc, and remove redundant 0-initialization
and a redundant loop condition check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53090/">CVE-2023-53090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53090">CVE-2023-53090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242753">SUSE bug 1242753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53094" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53094" ref_url="https://www.suse.com/security/cve/CVE-2023-53094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: fsl_lpuart: fix race on RX DMA shutdown

From time to time DMA completion can come in the middle of DMA shutdown:

&lt;process ctx&gt;:				&lt;IRQ&gt;:
lpuart32_shutdown()
  lpuart_dma_shutdown()
    del_timer_sync()
					lpuart_dma_rx_complete()
					  lpuart_copy_rx_to_tty()
					    mod_timer()
    lpuart_dma_rx_free()

When the timer fires a bit later, sport-&gt;dma_rx_desc is NULL:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
pc : lpuart_copy_rx_to_tty+0xcc/0x5bc
lr : lpuart_timer_func+0x1c/0x2c
Call trace:
 lpuart_copy_rx_to_tty
 lpuart_timer_func
 call_timer_fn
 __run_timers.part.0
 run_timer_softirq
 __do_softirq
 __irq_exit_rcu
 irq_exit
 handle_domain_irq
 gic_handle_irq
 call_on_irq_stack
 do_interrupt_handler
 ...

To fix this fold del_timer_sync() into lpuart_dma_rx_free() after
dmaengine_terminate_sync() to make sure timer will not be re-started in
lpuart_copy_rx_to_tty() &lt;= lpuart_dma_rx_complete().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53094/">CVE-2023-53094 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53094">CVE-2023-53094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242288">SUSE bug 1242288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53095" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53095" ref_url="https://www.suse.com/security/cve/CVE-2023-53095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Fix a NULL pointer dereference

The LRU mechanism may look up a resource in the process of being removed
from an object. The locking rules here are a bit unclear but it looks
currently like res-&gt;bo assignment is protected by the LRU lock, whereas
bo-&gt;resource is protected by the object lock, while *clearing* of
bo-&gt;resource is also protected by the LRU lock. This means that if
we check that bo-&gt;resource points to the LRU resource under the LRU
lock we should be safe.
So perform that check before deciding to swap out a bo. That avoids
dereferencing a NULL bo-&gt;resource in ttm_bo_swapout().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53095/">CVE-2023-53095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53095">CVE-2023-53095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242278">SUSE bug 1242278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53096" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53096" ref_url="https://www.suse.com/security/cve/CVE-2023-53096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

interconnect: fix mem leak when freeing nodes

The node link array is allocated when adding links to a node but is not
deallocated when nodes are destroyed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53096/">CVE-2023-53096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53096">CVE-2023-53096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242289">SUSE bug 1242289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53097" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53097" ref_url="https://www.suse.com/security/cve/CVE-2023-53097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/iommu: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53097/">CVE-2023-53097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53097">CVE-2023-53097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244114">SUSE bug 1244114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53100" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53100" ref_url="https://www.suse.com/security/cve/CVE-2023-53100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix WARNING in ext4_update_inline_data

Syzbot found the following issue:
EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none.
fscrypt: AES-256-CTS-CBC using implementation "cts-cbc-aes-aesni"
fscrypt: AES-256-XTS using implementation "xts-aes-aesni"
------------[ cut here ]------------
WARNING: CPU: 0 PID: 5071 at mm/page_alloc.c:5525 __alloc_pages+0x30a/0x560 mm/page_alloc.c:5525
Modules linked in:
CPU: 1 PID: 5071 Comm: syz-executor263 Not tainted 6.2.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:__alloc_pages+0x30a/0x560 mm/page_alloc.c:5525
RSP: 0018:ffffc90003c2f1c0 EFLAGS: 00010246
RAX: ffffc90003c2f220 RBX: 0000000000000014 RCX: 0000000000000000
RDX: 0000000000000028 RSI: 0000000000000000 RDI: ffffc90003c2f248
RBP: ffffc90003c2f2d8 R08: dffffc0000000000 R09: ffffc90003c2f220
R10: fffff52000785e49 R11: 1ffff92000785e44 R12: 0000000000040d40
R13: 1ffff92000785e40 R14: dffffc0000000000 R15: 1ffff92000785e3c
FS:  0000555556c0d300(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f95d5e04138 CR3: 00000000793aa000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 __alloc_pages_node include/linux/gfp.h:237 [inline]
 alloc_pages_node include/linux/gfp.h:260 [inline]
 __kmalloc_large_node+0x95/0x1e0 mm/slab_common.c:1113
 __do_kmalloc_node mm/slab_common.c:956 [inline]
 __kmalloc+0xfe/0x190 mm/slab_common.c:981
 kmalloc include/linux/slab.h:584 [inline]
 kzalloc include/linux/slab.h:720 [inline]
 ext4_update_inline_data+0x236/0x6b0 fs/ext4/inline.c:346
 ext4_update_inline_dir fs/ext4/inline.c:1115 [inline]
 ext4_try_add_inline_entry+0x328/0x990 fs/ext4/inline.c:1307
 ext4_add_entry+0x5a4/0xeb0 fs/ext4/namei.c:2385
 ext4_add_nondir+0x96/0x260 fs/ext4/namei.c:2772
 ext4_create+0x36c/0x560 fs/ext4/namei.c:2817
 lookup_open fs/namei.c:3413 [inline]
 open_last_lookups fs/namei.c:3481 [inline]
 path_openat+0x12ac/0x2dd0 fs/namei.c:3711
 do_filp_open+0x264/0x4f0 fs/namei.c:3741
 do_sys_openat2+0x124/0x4e0 fs/open.c:1310
 do_sys_open fs/open.c:1326 [inline]
 __do_sys_openat fs/open.c:1342 [inline]
 __se_sys_openat fs/open.c:1337 [inline]
 __x64_sys_openat+0x243/0x290 fs/open.c:1337
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Above issue happens as follows:
ext4_iget
   ext4_find_inline_data_nolock -&gt;i_inline_off=164 i_inline_size=60
ext4_try_add_inline_entry
   __ext4_mark_inode_dirty
      ext4_expand_extra_isize_ea -&gt;i_extra_isize=32 s_want_extra_isize=44
         ext4_xattr_shift_entries
	 -&gt;after shift i_inline_off is incorrect, actually is change to 176
ext4_try_add_inline_entry
  ext4_update_inline_dir
    get_max_inline_xattr_value_size
      if (EXT4_I(inode)-&gt;i_inline_off)
	entry = (struct ext4_xattr_entry *)((void *)raw_inode +
			EXT4_I(inode)-&gt;i_inline_off);
        free += EXT4_XATTR_SIZE(le32_to_cpu(entry-&gt;e_value_size));
	-&gt;As entry is incorrect, then 'free' may be negative
   ext4_update_inline_data
      value = kzalloc(len, GFP_NOFS);
      -&gt; len is unsigned int, maybe very large, then trigger warning when
         'kzalloc()'

To resolve the above issue we need to update 'i_inline_off' after
'ext4_xattr_shift_entries()'.  We do not need to set
EXT4_STATE_MAY_INLINE_DATA flag here, since ext4_mark_inode_dirty()
already sets this flag if needed.  Setting EXT4_STATE_MAY_INLINE_DATA
when it is needed may trigger a BUG_ON in ext4_writepages().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53100/">CVE-2023-53100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53100">CVE-2023-53100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242790">SUSE bug 1242790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53102" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53102" ref_url="https://www.suse.com/security/cve/CVE-2023-53102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: xsk: disable txq irq before flushing hw

ice_qp_dis() intends to stop a given queue pair that is a target of xsk
pool attach/detach. One of the steps is to disable interrupts on these
queues. It currently is broken in a way that txq irq is turned off
*after* HW flush which in turn takes no effect.

ice_qp_dis():
-&gt; ice_qvec_dis_irq()
--&gt; disable rxq irq
--&gt; flush hw
-&gt; ice_vsi_stop_tx_ring()
--&gt;disable txq irq

Below splat can be triggered by following steps:
- start xdpsock WITHOUT loading xdp prog
- run xdp_rxq_info with XDP_TX action on this interface
- start traffic
- terminate xdpsock

[  256.312485] BUG: kernel NULL pointer dereference, address: 0000000000000018
[  256.319560] #PF: supervisor read access in kernel mode
[  256.324775] #PF: error_code(0x0000) - not-present page
[  256.329994] PGD 0 P4D 0
[  256.332574] Oops: 0000 [#1] PREEMPT SMP NOPTI
[  256.337006] CPU: 3 PID: 32 Comm: ksoftirqd/3 Tainted: G           OE      6.2.0-rc5+ #51
[  256.345218] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[  256.355807] RIP: 0010:ice_clean_rx_irq_zc+0x9c/0x7d0 [ice]
[  256.361423] Code: b7 8f 8a 00 00 00 66 39 ca 0f 84 f1 04 00 00 49 8b 47 40 4c 8b 24 d0 41 0f b7 45 04 66 25 ff 3f 66 89 04 24 0f 84 85 02 00 00 &lt;49&gt; 8b 44 24 18 0f b7 14 24 48 05 00 01 00 00 49 89 04 24 49 89 44
[  256.380463] RSP: 0018:ffffc900088bfd20 EFLAGS: 00010206
[  256.385765] RAX: 000000000000003c RBX: 0000000000000035 RCX: 000000000000067f
[  256.393012] RDX: 0000000000000775 RSI: 0000000000000000 RDI: ffff8881deb3ac80
[  256.400256] RBP: 000000000000003c R08: ffff889847982710 R09: 0000000000010000
[  256.407500] R10: ffffffff82c060c0 R11: 0000000000000004 R12: 0000000000000000
[  256.414746] R13: ffff88811165eea0 R14: ffffc9000d255000 R15: ffff888119b37600
[  256.421990] FS:  0000000000000000(0000) GS:ffff8897e0cc0000(0000) knlGS:0000000000000000
[  256.430207] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  256.436036] CR2: 0000000000000018 CR3: 0000000005c0a006 CR4: 00000000007706e0
[  256.443283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  256.450527] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  256.457770] PKRU: 55555554
[  256.460529] Call Trace:
[  256.463015]  &lt;TASK&gt;
[  256.465157]  ? ice_xmit_zc+0x6e/0x150 [ice]
[  256.469437]  ice_napi_poll+0x46d/0x680 [ice]
[  256.473815]  ? _raw_spin_unlock_irqrestore+0x1b/0x40
[  256.478863]  __napi_poll+0x29/0x160
[  256.482409]  net_rx_action+0x136/0x260
[  256.486222]  __do_softirq+0xe8/0x2e5
[  256.489853]  ? smpboot_thread_fn+0x2c/0x270
[  256.494108]  run_ksoftirqd+0x2a/0x50
[  256.497747]  smpboot_thread_fn+0x1c1/0x270
[  256.501907]  ? __pfx_smpboot_thread_fn+0x10/0x10
[  256.506594]  kthread+0xea/0x120
[  256.509785]  ? __pfx_kthread+0x10/0x10
[  256.513597]  ret_from_fork+0x29/0x50
[  256.517238]  &lt;/TASK&gt;

In fact, irqs were not disabled and napi managed to be scheduled and run
while xsk_pool pointer was still valid, but SW ring of xdp_buff pointers
was already freed.

To fix this, call ice_qvec_dis_irq() after ice_vsi_stop_tx_ring(). Also
while at it, remove redundant ice_clean_rx_ring() call - this is handled
in ice_qp_clean_rings().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53102/">CVE-2023-53102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53102">CVE-2023-53102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242393">SUSE bug 1242393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53103</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53103" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53103" ref_url="https://www.suse.com/security/cve/CVE-2023-53103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: restore bond's IFF_SLAVE flag if a non-eth dev enslave fails

syzbot reported a warning[1] where the bond device itself is a slave and
we try to enslave a non-ethernet device as the first slave which fails
but then in the error path when ether_setup() restores the bond device
it also clears all flags. In my previous fix[2] I restored the
IFF_MASTER flag, but I didn't consider the case that the bond device
itself might also be a slave with IFF_SLAVE set, so we need to restore
that flag as well. Use the bond_ether_setup helper which does the right
thing and restores the bond's flags properly.

Steps to reproduce using a nlmon dev:
 $ ip l add nlmon0 type nlmon
 $ ip l add bond1 type bond
 $ ip l add bond2 type bond
 $ ip l set bond1 master bond2
 $ ip l set dev nlmon0 master bond1
 $ ip -d l sh dev bond1
 22: bond1: &lt;BROADCAST,MULTICAST,MASTER&gt; mtu 1500 qdisc noqueue master bond2 state DOWN mode DEFAULT group default qlen 1000
 (now bond1's IFF_SLAVE flag is gone and we'll hit a warning[3] if we
  try to delete it)

[1] https://syzkaller.appspot.com/bug?id=391c7b1f6522182899efba27d891f1743e8eb3ef
[2] commit 7d5cd2ce5292 ("bonding: correctly handle bonding type change on enslave failure")
[3] example warning:
 [   27.008664] bond1: (slave nlmon0): The slave device specified does not support setting the MAC address
 [   27.008692] bond1: (slave nlmon0): Error -95 calling set_mac_address
 [   32.464639] bond1 (unregistering): Released all slaves
 [   32.464685] ------------[ cut here ]------------
 [   32.464686] WARNING: CPU: 1 PID: 2004 at net/core/dev.c:10829 unregister_netdevice_many+0x72a/0x780
 [   32.464694] Modules linked in: br_netfilter bridge bonding virtio_net
 [   32.464699] CPU: 1 PID: 2004 Comm: ip Kdump: loaded Not tainted 5.18.0-rc3+ #47
 [   32.464703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.1-2.fc37 04/01/2014
 [   32.464704] RIP: 0010:unregister_netdevice_many+0x72a/0x780
 [   32.464707] Code: 99 fd ff ff ba 90 1a 00 00 48 c7 c6 f4 02 66 96 48 c7 c7 20 4d 35 96 c6 05 fa c7 2b 02 01 e8 be 6f 4a 00 0f 0b e9 73 fd ff ff &lt;0f&gt; 0b e9 5f fd ff ff 80 3d e3 c7 2b 02 00 0f 85 3b fd ff ff ba 59
 [   32.464710] RSP: 0018:ffffa006422d7820 EFLAGS: 00010206
 [   32.464712] RAX: ffff8f6e077140a0 RBX: ffffa006422d7888 RCX: 0000000000000000
 [   32.464714] RDX: ffff8f6e12edbe58 RSI: 0000000000000296 RDI: ffffffff96d4a520
 [   32.464716] RBP: ffff8f6e07714000 R08: ffffffff96d63600 R09: ffffa006422d7728
 [   32.464717] R10: 0000000000000ec0 R11: ffffffff9698c988 R12: ffff8f6e12edb140
 [   32.464719] R13: dead000000000122 R14: dead000000000100 R15: ffff8f6e12edb140
 [   32.464723] FS:  00007f297c2f1740(0000) GS:ffff8f6e5d900000(0000) knlGS:0000000000000000
 [   32.464725] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 [   32.464726] CR2: 00007f297bf1c800 CR3: 00000000115e8000 CR4: 0000000000350ee0
 [   32.464730] Call Trace:
 [   32.464763]  &lt;TASK&gt;
 [   32.464767]  rtnl_dellink+0x13e/0x380
 [   32.464776]  ? cred_has_capability.isra.0+0x68/0x100
 [   32.464780]  ? __rtnl_unlock+0x33/0x60
 [   32.464783]  ? bpf_lsm_capset+0x10/0x10
 [   32.464786]  ? security_capable+0x36/0x50
 [   32.464790]  rtnetlink_rcv_msg+0x14e/0x3b0
 [   32.464792]  ? _copy_to_iter+0xb1/0x790
 [   32.464796]  ? post_alloc_hook+0xa0/0x160
 [   32.464799]  ? rtnl_calcit.isra.0+0x110/0x110
 [   32.464802]  netlink_rcv_skb+0x50/0xf0
 [   32.464806]  netlink_unicast+0x216/0x340
 [   32.464809]  netlink_sendmsg+0x23f/0x480
 [   32.464812]  sock_sendmsg+0x5e/0x60
 [   32.464815]  ____sys_sendmsg+0x22c/0x270
 [   32.464818]  ? import_iovec+0x17/0x20
 [   32.464821]  ? sendmsg_copy_msghdr+0x59/0x90
 [   32.464823]  ? do_set_pte+0xa0/0xe0
 [   32.464828]  ___sys_sendmsg+0x81/0xc0
 [   32.464832]  ? mod_objcg_state+0xc6/0x300
 [   32.464835]  ? refill_obj_stock+0xa9/0x160
 [   32.464838]  ? memcg_slab_free_hook+0x1a5/0x1f0
 [   32.464842]  __sys_sendm
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53103/">CVE-2023-53103 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53103">CVE-2023-53103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242408">SUSE bug 1242408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53105</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53105" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53105" ref_url="https://www.suse.com/security/cve/CVE-2023-53105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix cleanup null-ptr deref on encap lock

During module is unloaded while a peer tc flow is still offloaded,
first the peer uplink rep profile is changed to a nic profile, and so
neigh encap lock is destroyed. Next during unload, the VF reps netdevs
are unregistered which causes the original non-peer tc flow to be deleted,
which deletes the peer flow. The peer flow deletion detaches the encap
entry and try to take the already destroyed encap lock, causing the
below trace.

Fix this by clearing peer flows during tc eswitch cleanup
(mlx5e_tc_esw_cleanup()).

Relevant trace:
[ 4316.837128] BUG: kernel NULL pointer dereference, address: 00000000000001d8
[ 4316.842239] RIP: 0010:__mutex_lock+0xb5/0xc40
[ 4316.851897] Call Trace:
[ 4316.852481]  &lt;TASK&gt;
[ 4316.857214]  mlx5e_rep_neigh_entry_release+0x93/0x790 [mlx5_core]
[ 4316.858258]  mlx5e_rep_encap_entry_detach+0xa7/0xf0 [mlx5_core]
[ 4316.859134]  mlx5e_encap_dealloc+0xa3/0xf0 [mlx5_core]
[ 4316.859867]  clean_encap_dests.part.0+0x5c/0xe0 [mlx5_core]
[ 4316.860605]  mlx5e_tc_del_fdb_flow+0x32a/0x810 [mlx5_core]
[ 4316.862609]  __mlx5e_tc_del_fdb_peer_flow+0x1a2/0x250 [mlx5_core]
[ 4316.863394]  mlx5e_tc_del_flow+0x(/0x630 [mlx5_core]
[ 4316.864090]  mlx5e_flow_put+0x5f/0x100 [mlx5_core]
[ 4316.864771]  mlx5e_delete_flower+0x4de/0xa40 [mlx5_core]
[ 4316.865486]  tc_setup_cb_reoffload+0x20/0x80
[ 4316.865905]  fl_reoffload+0x47c/0x510 [cls_flower]
[ 4316.869181]  tcf_block_playback_offloads+0x91/0x1d0
[ 4316.869649]  tcf_block_unbind+0xe7/0x1b0
[ 4316.870049]  tcf_block_offload_cmd.isra.0+0x1ee/0x270
[ 4316.879266]  tcf_block_offload_unbind+0x61/0xa0
[ 4316.879711]  __tcf_block_put+0xa4/0x310
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53105/">CVE-2023-53105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53105">CVE-2023-53105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242400">SUSE bug 1242400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53107" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53107" ref_url="https://www.suse.com/security/cve/CVE-2023-53107" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

veth: Fix use after free in XDP_REDIRECT

Commit 718a18a0c8a6 ("veth: Rework veth_xdp_rcv_skb in order
to accept non-linear skb") introduced a bug where it tried to
use pskb_expand_head() if the headroom was less than
XDP_PACKET_HEADROOM.  This however uses kmalloc to expand the head,
which will later allow consume_skb() to free the skb while is it still
in use by AF_XDP.

Previously if the headroom was less than XDP_PACKET_HEADROOM we
continued on to allocate a new skb from pages so this restores that
behavior.

BUG: KASAN: use-after-free in __xsk_rcv+0x18d/0x2c0
Read of size 78 at addr ffff888976250154 by task napi/iconduit-g/148640

CPU: 5 PID: 148640 Comm: napi/iconduit-g Kdump: loaded Tainted: G           O       6.1.4-cloudflare-kasan-2023.1.2 #1
Hardware name: Quanta Computer Inc. QuantaPlex T41S-2U/S2S-MB, BIOS S2S_3B10.03 06/21/2018
Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x34/0x48
  print_report+0x170/0x473
  ? __xsk_rcv+0x18d/0x2c0
  kasan_report+0xad/0x130
  ? __xsk_rcv+0x18d/0x2c0
  kasan_check_range+0x149/0x1a0
  memcpy+0x20/0x60
  __xsk_rcv+0x18d/0x2c0
  __xsk_map_redirect+0x1f3/0x490
  ? veth_xdp_rcv_skb+0x89c/0x1ba0 [veth]
  xdp_do_redirect+0x5ca/0xd60
  veth_xdp_rcv_skb+0x935/0x1ba0 [veth]
  ? __netif_receive_skb_list_core+0x671/0x920
  ? veth_xdp+0x670/0x670 [veth]
  veth_xdp_rcv+0x304/0xa20 [veth]
  ? do_xdp_generic+0x150/0x150
  ? veth_xdp_rcv_one+0xde0/0xde0 [veth]
  ? _raw_spin_lock_bh+0xe0/0xe0
  ? newidle_balance+0x887/0xe30
  ? __perf_event_task_sched_in+0xdb/0x800
  veth_poll+0x139/0x571 [veth]
  ? veth_xdp_rcv+0xa20/0xa20 [veth]
  ? _raw_spin_unlock+0x39/0x70
  ? finish_task_switch.isra.0+0x17e/0x7d0
  ? __switch_to+0x5cf/0x1070
  ? __schedule+0x95b/0x2640
  ? io_schedule_timeout+0x160/0x160
  __napi_poll+0xa1/0x440
  napi_threaded_poll+0x3d1/0x460
  ? __napi_poll+0x440/0x440
  ? __kthread_parkme+0xc6/0x1f0
  ? __napi_poll+0x440/0x440
  kthread+0x2a2/0x340
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x22/0x30
  &lt;/TASK&gt;

Freed by task 148640:
  kasan_save_stack+0x23/0x50
  kasan_set_track+0x21/0x30
  kasan_save_free_info+0x2a/0x40
  ____kasan_slab_free+0x169/0x1d0
  slab_free_freelist_hook+0xd2/0x190
  __kmem_cache_free+0x1a1/0x2f0
  skb_release_data+0x449/0x600
  consume_skb+0x9f/0x1c0
  veth_xdp_rcv_skb+0x89c/0x1ba0 [veth]
  veth_xdp_rcv+0x304/0xa20 [veth]
  veth_poll+0x139/0x571 [veth]
  __napi_poll+0xa1/0x440
  napi_threaded_poll+0x3d1/0x460
  kthread+0x2a2/0x340
  ret_from_fork+0x22/0x30

The buggy address belongs to the object at ffff888976250000
  which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 340 bytes inside of
  2048-byte region [ffff888976250000, ffff888976250800)

The buggy address belongs to the physical page:
page:00000000ae18262a refcount:2 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x976250
head:00000000ae18262a order:3 compound_mapcount:0 compound_pincount:0
flags: 0x2ffff800010200(slab|head|node=0|zone=2|lastcpupid=0x1ffff)
raw: 002ffff800010200 0000000000000000 dead000000000122 ffff88810004cf00
raw: 0000000000000000 0000000080080008 00000002ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
  ffff888976250000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff888976250080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
&gt; ffff888976250100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                  ^
  ffff888976250180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff888976250200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53107/">CVE-2023-53107 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53107">CVE-2023-53107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242407">SUSE bug 1242407</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53108</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53108" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53108" ref_url="https://www.suse.com/security/cve/CVE-2023-53108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/iucv: Fix size of interrupt data

iucv_irq_data needs to be 4 bytes larger.
These bytes are not used by the iucv module, but written by
the z/VM hypervisor in case a CPU is deconfigured.

Reported as:
BUG dma-kmalloc-64 (Not tainted): kmalloc Redzone overwritten
-----------------------------------------------------------------------------
0x0000000000400564-0x0000000000400567 @offset=1380. First byte 0x80 instead of 0xcc
Allocated in iucv_cpu_prepare+0x44/0xd0 age=167839 cpu=2 pid=1
__kmem_cache_alloc_node+0x166/0x450
kmalloc_node_trace+0x3a/0x70
iucv_cpu_prepare+0x44/0xd0
cpuhp_invoke_callback+0x156/0x2f0
cpuhp_issue_call+0xf0/0x298
__cpuhp_setup_state_cpuslocked+0x136/0x338
__cpuhp_setup_state+0xf4/0x288
iucv_init+0xf4/0x280
do_one_initcall+0x78/0x390
do_initcalls+0x11a/0x140
kernel_init_freeable+0x25e/0x2a0
kernel_init+0x2e/0x170
__ret_from_fork+0x3c/0x58
ret_from_fork+0xa/0x40
Freed in iucv_init+0x92/0x280 age=167839 cpu=2 pid=1
__kmem_cache_free+0x308/0x358
iucv_init+0x92/0x280
do_one_initcall+0x78/0x390
do_initcalls+0x11a/0x140
kernel_init_freeable+0x25e/0x2a0
kernel_init+0x2e/0x170
__ret_from_fork+0x3c/0x58
ret_from_fork+0xa/0x40
Slab 0x0000037200010000 objects=32 used=30 fp=0x0000000000400640 flags=0x1ffff00000010200(slab|head|node=0|zone=0|
Object 0x0000000000400540 @offset=1344 fp=0x0000000000000000
Redzone  0000000000400500: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc  ................
Redzone  0000000000400510: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc  ................
Redzone  0000000000400520: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc  ................
Redzone  0000000000400530: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc  ................
Object   0000000000400540: 00 01 00 03 00 00 00 00 00 00 00 00 00 00 00 00  ................
Object   0000000000400550: f3 86 81 f2 f4 82 f8 82 f0 f0 f0 f0 f0 f0 f0 f2  ................
Object   0000000000400560: 00 00 00 00 80 00 00 00 cc cc cc cc cc cc cc cc  ................
Object   0000000000400570: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc  ................
Redzone  0000000000400580: cc cc cc cc cc cc cc cc                          ........
Padding  00000000004005d4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
Padding  00000000004005e4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a  ZZZZZZZZZZZZZZZZ
Padding  00000000004005f4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a              ZZZZZZZZZZZZ
CPU: 6 PID: 121030 Comm: 116-pai-crypto. Not tainted 6.3.0-20230221.rc0.git4.99b8246b2d71.300.fc37.s390x+debug #1
Hardware name: IBM 3931 A01 704 (z/VM 7.3.0)
Call Trace:
[&lt;000000032aa034ec&gt;] dump_stack_lvl+0xac/0x100
[&lt;0000000329f5a6cc&gt;] check_bytes_and_report+0x104/0x140
[&lt;0000000329f5aa78&gt;] check_object+0x370/0x3c0
[&lt;0000000329f5ede6&gt;] free_debug_processing+0x15e/0x348
[&lt;0000000329f5f06a&gt;] free_to_partial_list+0x9a/0x2f0
[&lt;0000000329f5f4a4&gt;] __slab_free+0x1e4/0x3a8
[&lt;0000000329f61768&gt;] __kmem_cache_free+0x308/0x358
[&lt;000000032a91465c&gt;] iucv_cpu_dead+0x6c/0x88
[&lt;0000000329c2fc66&gt;] cpuhp_invoke_callback+0x156/0x2f0
[&lt;000000032aa062da&gt;] _cpu_down.constprop.0+0x22a/0x5e0
[&lt;0000000329c3243e&gt;] cpu_device_down+0x4e/0x78
[&lt;000000032a61dee0&gt;] device_offline+0xc8/0x118
[&lt;000000032a61e048&gt;] online_store+0x60/0xe0
[&lt;000000032a08b6b0&gt;] kernfs_fop_write_iter+0x150/0x1e8
[&lt;0000000329fab65c&gt;] vfs_write+0x174/0x360
[&lt;0000000329fab9fc&gt;] ksys_write+0x74/0x100
[&lt;000000032aa03a5a&gt;] __do_syscall+0x1da/0x208
[&lt;000000032aa177b2&gt;] system_call+0x82/0xb0
INFO: lockdep is turned off.
FIX dma-kmalloc-64: Restoring kmalloc Redzone 0x0000000000400564-0x0000000000400567=0xcc
FIX dma-kmalloc-64: Object at 0x0000000000400540 not freed
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53108/">CVE-2023-53108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53108">CVE-2023-53108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242422">SUSE bug 1242422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53110" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53110" ref_url="https://www.suse.com/security/cve/CVE-2023-53110" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()

When performing a stress test on SMC-R by rmmod mlx5_ib driver
during the wrk/nginx test, we found that there is a probability
of triggering a panic while terminating all link groups.

This issue dues to the race between smc_smcr_terminate_all()
and smc_buf_create().

			smc_smcr_terminate_all

smc_buf_create
/* init */
conn-&gt;sndbuf_desc = NULL;
...

			__smc_lgr_terminate
				smc_conn_kill
					smc_close_abort
						smc_cdc_get_slot_and_msg_send

			__softirqentry_text_start
				smc_wr_tx_process_cqe
					smc_cdc_tx_handler
						READ(conn-&gt;sndbuf_desc-&gt;len);
						/* panic dues to NULL sndbuf_desc */

conn-&gt;sndbuf_desc = xxx;

This patch tries to fix the issue by always to check the sndbuf_desc
before send any cdc msg, to make sure that no null pointer is
seen during cqe processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53110/">CVE-2023-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53110">CVE-2023-53110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242396">SUSE bug 1242396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53112</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53112" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53112" ref_url="https://www.suse.com/security/cve/CVE-2023-53112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/sseu: fix max_subslices array-index-out-of-bounds access

It seems that commit bc3c5e0809ae ("drm/i915/sseu: Don't try to store EU
mask internally in UAPI format") exposed a potential out-of-bounds
access, reported by UBSAN as following on a laptop with a gen 11 i915
card:

  UBSAN: array-index-out-of-bounds in drivers/gpu/drm/i915/gt/intel_sseu.c:65:27
  index 6 is out of range for type 'u16 [6]'
  CPU: 2 PID: 165 Comm: systemd-udevd Not tainted 6.2.0-9-generic #9-Ubuntu
  Hardware name: Dell Inc. XPS 13 9300/077Y9N, BIOS 1.11.0 03/22/2022
  Call Trace:
   &lt;TASK&gt;
   show_stack+0x4e/0x61
   dump_stack_lvl+0x4a/0x6f
   dump_stack+0x10/0x18
   ubsan_epilogue+0x9/0x3a
   __ubsan_handle_out_of_bounds.cold+0x42/0x47
   gen11_compute_sseu_info+0x121/0x130 [i915]
   intel_sseu_info_init+0x15d/0x2b0 [i915]
   intel_gt_init_mmio+0x23/0x40 [i915]
   i915_driver_mmio_probe+0x129/0x400 [i915]
   ? intel_gt_probe_all+0x91/0x2e0 [i915]
   i915_driver_probe+0xe1/0x3f0 [i915]
   ? drm_privacy_screen_get+0x16d/0x190 [drm]
   ? acpi_dev_found+0x64/0x80
   i915_pci_probe+0xac/0x1b0 [i915]
   ...

According to the definition of sseu_dev_info, eu_mask-&gt;hsw is limited to
a maximum of GEN_MAX_SS_PER_HSW_SLICE (6) sub-slices, but
gen11_sseu_info_init() can potentially set 8 sub-slices, in the
!IS_JSL_EHL(gt-&gt;i915) case.

Fix this by reserving up to 8 slots for max_subslices in the eu_mask
struct.

(cherry picked from commit 3cba09a6ac86ea1d456909626eb2685596c07822)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53112/">CVE-2023-53112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53112">CVE-2023-53112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242410">SUSE bug 1242410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53113" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53113" ref_url="https://www.suse.com/security/cve/CVE-2023-53113" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: fix NULL-ptr deref in offchan check

If, e.g. in AP mode, the link was already created by userspace
but not activated yet, it has a chandef but the chandef isn't
valid and has no channel. Check for this and ignore this link.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53113/">CVE-2023-53113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53113">CVE-2023-53113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242424">SUSE bug 1242424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53114</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53114" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53114" ref_url="https://www.suse.com/security/cve/CVE-2023-53114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix kernel crash during reboot when adapter is in recovery mode

If the driver detects during probe that firmware is in recovery
mode then i40e_init_recovery_mode() is called and the rest of
probe function is skipped including pci_set_drvdata(). Subsequent
i40e_shutdown() called during shutdown/reboot dereferences NULL
pointer as pci_get_drvdata() returns NULL.

To fix call pci_set_drvdata() also during entering to recovery mode.

Reproducer:
1) Lets have i40e NIC with firmware in recovery mode
2) Run reboot

Result:
[  139.084698] i40e: Intel(R) Ethernet Connection XL710 Network Driver
[  139.090959] i40e: Copyright (c) 2013 - 2019 Intel Corporation.
[  139.108438] i40e 0000:02:00.0: Firmware recovery mode detected. Limiting functionality.
[  139.116439] i40e 0000:02:00.0: Refer to the Intel(R) Ethernet Adapters and Devices User Guide for details on firmware recovery mode.
[  139.129499] i40e 0000:02:00.0: fw 8.3.64775 api 1.13 nvm 8.30 0x8000b78d 1.3106.0 [8086:1583] [15d9:084a]
[  139.215932] i40e 0000:02:00.0 enp2s0f0: renamed from eth0
[  139.223292] i40e 0000:02:00.1: Firmware recovery mode detected. Limiting functionality.
[  139.231292] i40e 0000:02:00.1: Refer to the Intel(R) Ethernet Adapters and Devices User Guide for details on firmware recovery mode.
[  139.244406] i40e 0000:02:00.1: fw 8.3.64775 api 1.13 nvm 8.30 0x8000b78d 1.3106.0 [8086:1583] [15d9:084a]
[  139.329209] i40e 0000:02:00.1 enp2s0f1: renamed from eth0
...
[  156.311376] BUG: kernel NULL pointer dereference, address: 00000000000006c2
[  156.318330] #PF: supervisor write access in kernel mode
[  156.323546] #PF: error_code(0x0002) - not-present page
[  156.328679] PGD 0 P4D 0
[  156.331210] Oops: 0002 [#1] PREEMPT SMP NOPTI
[  156.335567] CPU: 26 PID: 15119 Comm: reboot Tainted: G            E      6.2.0+ #1
[  156.343126] Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.4 04/13/2022
[  156.353369] RIP: 0010:i40e_shutdown+0x15/0x130 [i40e]
[  156.358430] Code: c1 fc ff ff 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 55 48 89 fd 53 48 8b 9f 48 01 00 00 &lt;f0&gt; 80 8b c2 06 00 00 04 f0 80 8b c0 06 00 00 08 48 8d bb 08 08 00
[  156.377168] RSP: 0018:ffffb223c8447d90 EFLAGS: 00010282
[  156.382384] RAX: ffffffffc073ee70 RBX: 0000000000000000 RCX: 0000000000000001
[  156.389510] RDX: 0000000080000001 RSI: 0000000000000246 RDI: ffff95db49988000
[  156.396634] RBP: ffff95db49988000 R08: ffffffffffffffff R09: ffffffff8bd17d40
[  156.403759] R10: 0000000000000001 R11: ffffffff8a5e3d28 R12: ffff95db49988000
[  156.410882] R13: ffffffff89a6fe17 R14: ffff95db49988150 R15: 0000000000000000
[  156.418007] FS:  00007fe7c0cc3980(0000) GS:ffff95ea8ee80000(0000) knlGS:0000000000000000
[  156.426083] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  156.431819] CR2: 00000000000006c2 CR3: 00000003092fc005 CR4: 0000000000770ee0
[  156.438944] PKRU: 55555554
[  156.441647] Call Trace:
[  156.444096]  &lt;TASK&gt;
[  156.446199]  pci_device_shutdown+0x38/0x60
[  156.450297]  device_shutdown+0x163/0x210
[  156.454215]  kernel_restart+0x12/0x70
[  156.457872]  __do_sys_reboot+0x1ab/0x230
[  156.461789]  ? vfs_writev+0xa6/0x1a0
[  156.465362]  ? __pfx_file_free_rcu+0x10/0x10
[  156.469635]  ? __call_rcu_common.constprop.85+0x109/0x5a0
[  156.475034]  do_syscall_64+0x3e/0x90
[  156.478611]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
[  156.483658] RIP: 0033:0x7fe7bff37ab7
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53114/">CVE-2023-53114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53114">CVE-2023-53114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242398">SUSE bug 1242398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53116" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53116" ref_url="https://www.suse.com/security/cve/CVE-2023-53116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: avoid potential UAF in nvmet_req_complete()

An nvme target -&gt;queue_response() operation implementation may free the
request passed as argument. Such implementation potentially could result
in a use after free of the request pointer when percpu_ref_put() is
called in nvmet_req_complete().

Avoid such problem by using a local variable to save the sq pointer
before calling __nvmet_req_complete(), thus avoiding dereferencing the
req pointer after that function call.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53116/">CVE-2023-53116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53116">CVE-2023-53116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242411">SUSE bug 1242411</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53117" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53117" ref_url="https://www.suse.com/security/cve/CVE-2023-53117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: prevent out-of-bounds array speculation when closing a file descriptor

Google-Bug-Id: 114199369
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53117/">CVE-2023-53117 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53117">CVE-2023-53117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242780">SUSE bug 1242780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53120" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53120" ref_url="https://www.suse.com/security/cve/CVE-2023-53120" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix config page DMA memory leak

A fix for:

DMA-API: pci 0000:83:00.0: device driver has pending DMA allocations while released from device [count=1]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53120/">CVE-2023-53120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53120">CVE-2023-53120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242375">SUSE bug 1242375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53121" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53121" ref_url="https://www.suse.com/security/cve/CVE-2023-53121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: tcp_make_synack() can be called from process context

tcp_rtx_synack() now could be called in process context as explained in
0a375c822497 ("tcp: tcp_rtx_synack() can be called from process
context").

tcp_rtx_synack() might call tcp_make_synack(), which will touch per-CPU
variables with preemption enabled. This causes the following BUG:

    BUG: using __this_cpu_add() in preemptible [00000000] code: ThriftIO1/5464
    caller is tcp_make_synack+0x841/0xac0
    Call Trace:
     &lt;TASK&gt;
     dump_stack_lvl+0x10d/0x1a0
     check_preemption_disabled+0x104/0x110
     tcp_make_synack+0x841/0xac0
     tcp_v6_send_synack+0x5c/0x450
     tcp_rtx_synack+0xeb/0x1f0
     inet_rtx_syn_ack+0x34/0x60
     tcp_check_req+0x3af/0x9e0
     tcp_rcv_state_process+0x59b/0x2030
     tcp_v6_do_rcv+0x5f5/0x700
     release_sock+0x3a/0xf0
     tcp_sendmsg+0x33/0x40
     ____sys_sendmsg+0x2f2/0x490
     __sys_sendmsg+0x184/0x230
     do_syscall_64+0x3d/0x90

Avoid calling __TCP_INC_STATS() with will touch per-cpu variables. Use
TCP_INC_STATS() which is safe to be called from context switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53121/">CVE-2023-53121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53121">CVE-2023-53121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242225">SUSE bug 1242225</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53124" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53124" ref_url="https://www.suse.com/security/cve/CVE-2023-53124" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix NULL pointer access in mpt3sas_transport_port_add()

Port is allocated by sas_port_alloc_num() and rphy is allocated by either
sas_end_device_alloc() or sas_expander_alloc(), all of which may return
NULL. So we need to check the rphy to avoid possible NULL pointer access.

If sas_rphy_add() returned with failure, rphy is set to NULL. We would
access the rphy in the following lines which would also result NULL pointer
access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53124/">CVE-2023-53124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53124">CVE-2023-53124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242165">SUSE bug 1242165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53125" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53125" ref_url="https://www.suse.com/security/cve/CVE-2023-53125" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: smsc75xx: Limit packet length to skb-&gt;len

Packet length retrieved from skb data may be larger than
the actual socket buffer length (up to 9026 bytes). In such
case the cloned skb passed up the network stack will leak
kernel memory contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53125/">CVE-2023-53125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53125">CVE-2023-53125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242285">SUSE bug 1242285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010019488" comment="kernel-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019489" comment="kernel-abi-stablelists-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019490" comment="kernel-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019491" comment="kernel-cross-headers-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019492" comment="kernel-debug-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019493" comment="kernel-debug-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019496" comment="kernel-debug-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019497" comment="kernel-debug-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019498" comment="kernel-debug-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019499" comment="kernel-debug-uki-virt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019502" comment="kernel-doc-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019503" comment="kernel-headers-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019504" comment="kernel-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019505" comment="kernel-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019506" comment="kernel-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019507" comment="kernel-rt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019508" comment="kernel-rt-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019509" comment="kernel-rt-debug-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019510" comment="kernel-rt-debug-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019512" comment="kernel-rt-debug-kvm-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019513" comment="kernel-rt-debug-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019514" comment="kernel-rt-debug-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019515" comment="kernel-rt-debug-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019517" comment="kernel-rt-kvm-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019518" comment="kernel-rt-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019519" comment="kernel-rt-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019520" comment="kernel-rt-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019521" comment="kernel-tools-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019522" comment="kernel-tools-libs-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019524" comment="kernel-uki-virt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019525" comment="kernel-uki-virt-addons-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019526" comment="libperf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019527" comment="perf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019528" comment="python3-perf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019529" comment="rtla-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019530" comment="rv-5.14.0-570.46.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53126" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53126" ref_url="https://www.suse.com/security/cve/CVE-2023-53126" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix sas_hba.phy memory leak in mpi3mr_remove()

Free mrioc-&gt;sas_hba.phy at .remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53126/">CVE-2023-53126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53126">CVE-2023-53126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242374">SUSE bug 1242374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53129" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53129" ref_url="https://www.suse.com/security/cve/CVE-2023-53129" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53129/">CVE-2023-53129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53129">CVE-2023-53129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242373">SUSE bug 1242373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53132</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53132" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53132" ref_url="https://www.suse.com/security/cve/CVE-2023-53132" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix mpi3mr_hba_port memory leak in mpi3mr_remove()

Free mpi3mr_hba_port at .remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53132/">CVE-2023-53132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53132">CVE-2023-53132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242364">SUSE bug 1242364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53134</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53134" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53134" ref_url="https://www.suse.com/security/cve/CVE-2023-53134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Avoid order-5 memory allocation for TPA data

The driver needs to keep track of all the possible concurrent TPA (GRO/LRO)
completions on the aggregation ring.  On P5 chips, the maximum number
of concurrent TPA is 256 and the amount of memory we allocate is order-5
on systems using 4K pages.  Memory allocation failure has been reported:

NetworkManager: page allocation failure: order:5, mode:0x40dc0(GFP_KERNEL|__GFP_COMP|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1
CPU: 15 PID: 2995 Comm: NetworkManager Kdump: loaded Not tainted 5.10.156 #1
Hardware name: Dell Inc. PowerEdge R660/0M1CC5, BIOS 0.2.25 08/12/2022
Call Trace:
 dump_stack+0x57/0x6e
 warn_alloc.cold.120+0x7b/0xdd
 ? _cond_resched+0x15/0x30
 ? __alloc_pages_direct_compact+0x15f/0x170
 __alloc_pages_slowpath.constprop.108+0xc58/0xc70
 __alloc_pages_nodemask+0x2d0/0x300
 kmalloc_order+0x24/0xe0
 kmalloc_order_trace+0x19/0x80
 bnxt_alloc_mem+0x1150/0x15c0 [bnxt_en]
 ? bnxt_get_func_stat_ctxs+0x13/0x60 [bnxt_en]
 __bnxt_open_nic+0x12e/0x780 [bnxt_en]
 bnxt_open+0x10b/0x240 [bnxt_en]
 __dev_open+0xe9/0x180
 __dev_change_flags+0x1af/0x220
 dev_change_flags+0x21/0x60
 do_setlink+0x35c/0x1100

Instead of allocating this big chunk of memory and dividing it up for the
concurrent TPA instances, allocate each small chunk separately for each
TPA instance.  This will reduce it to order-0 allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53134/">CVE-2023-53134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53134">CVE-2023-53134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242380">SUSE bug 1242380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53140" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53140" ref_url="https://www.suse.com/security/cve/CVE-2023-53140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Remove the /proc/scsi/${proc_name} directory earlier

Remove the /proc/scsi/${proc_name} directory earlier to fix a race
condition between unloading and reloading kernel modules. This fixes a bug
introduced in 2009 by commit 77c019768f06 ("[SCSI] fix /proc memory leak in
the SCSI core").

Fix the following kernel warning:

proc_dir_entry 'scsi/scsi_debug' already registered
WARNING: CPU: 19 PID: 27986 at fs/proc/generic.c:376 proc_register+0x27d/0x2e0
Call Trace:
 proc_mkdir+0xb5/0xe0
 scsi_proc_hostdir_add+0xb5/0x170
 scsi_host_alloc+0x683/0x6c0
 sdebug_driver_probe+0x6b/0x2d0 [scsi_debug]
 really_probe+0x159/0x540
 __driver_probe_device+0xdc/0x230
 driver_probe_device+0x4f/0x120
 __device_attach_driver+0xef/0x180
 bus_for_each_drv+0xe5/0x130
 __device_attach+0x127/0x290
 device_initial_probe+0x17/0x20
 bus_probe_device+0x110/0x130
 device_add+0x673/0xc80
 device_register+0x1e/0x30
 sdebug_add_host_helper+0x1a7/0x3b0 [scsi_debug]
 scsi_debug_init+0x64f/0x1000 [scsi_debug]
 do_one_initcall+0xd7/0x470
 do_init_module+0xe7/0x330
 load_module+0x122a/0x12c0
 __do_sys_finit_module+0x124/0x1a0
 __x64_sys_finit_module+0x46/0x50
 do_syscall_64+0x38/0x80
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53140/">CVE-2023-53140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53140">CVE-2023-53140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242372">SUSE bug 1242372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53148" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53148" ref_url="https://www.suse.com/security/cve/CVE-2023-53148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Fix igb_down hung on surprise removal

In a setup where a Thunderbolt hub connects to Ethernet and a display
through USB Type-C, users may experience a hung task timeout when they
remove the cable between the PC and the Thunderbolt hub.
This is because the igb_down function is called multiple times when
the Thunderbolt hub is unplugged. For example, the igb_io_error_detected
triggers the first call, and the igb_remove triggers the second call.
The second call to igb_down will block at napi_synchronize.
Here's the call trace:
    __schedule+0x3b0/0xddb
    ? __mod_timer+0x164/0x5d3
    schedule+0x44/0xa8
    schedule_timeout+0xb2/0x2a4
    ? run_local_timers+0x4e/0x4e
    msleep+0x31/0x38
    igb_down+0x12c/0x22a [igb 6615058754948bfde0bf01429257eb59f13030d4]
    __igb_close+0x6f/0x9c [igb 6615058754948bfde0bf01429257eb59f13030d4]
    igb_close+0x23/0x2b [igb 6615058754948bfde0bf01429257eb59f13030d4]
    __dev_close_many+0x95/0xec
    dev_close_many+0x6e/0x103
    unregister_netdevice_many+0x105/0x5b1
    unregister_netdevice_queue+0xc2/0x10d
    unregister_netdev+0x1c/0x23
    igb_remove+0xa7/0x11c [igb 6615058754948bfde0bf01429257eb59f13030d4]
    pci_device_remove+0x3f/0x9c
    device_release_driver_internal+0xfe/0x1b4
    pci_stop_bus_device+0x5b/0x7f
    pci_stop_bus_device+0x30/0x7f
    pci_stop_bus_device+0x30/0x7f
    pci_stop_and_remove_bus_device+0x12/0x19
    pciehp_unconfigure_device+0x76/0xe9
    pciehp_disable_slot+0x6e/0x131
    pciehp_handle_presence_or_link_change+0x7a/0x3f7
    pciehp_ist+0xbe/0x194
    irq_thread_fn+0x22/0x4d
    ? irq_thread+0x1fd/0x1fd
    irq_thread+0x17b/0x1fd
    ? irq_forced_thread_fn+0x5f/0x5f
    kthread+0x142/0x153
    ? __irq_get_irqchip_state+0x46/0x46
    ? kthread_associate_blkcg+0x71/0x71
    ret_from_fork+0x1f/0x30

In this case, igb_io_error_detected detaches the network interface
and requests a PCIE slot reset, however, the PCIE reset callback is
not being invoked and thus the Ethernet connection breaks down.
As the PCIE error in this case is a non-fatal one, requesting a
slot reset can be avoided.
This patch fixes the task hung issue and preserves Ethernet
connection by ignoring non-fatal PCIE errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53148/">CVE-2023-53148 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53148">CVE-2023-53148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249842">SUSE bug 1249842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53149</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53149" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53149" ref_url="https://www.suse.com/security/cve/CVE-2023-53149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid deadlock in fs reclaim with page writeback

Ext4 has a filesystem wide lock protecting ext4_writepages() calls to
avoid races with switching of journalled data flag or inode format. This
lock can however cause a deadlock like:

CPU0                            CPU1

ext4_writepages()
  percpu_down_read(sbi-&gt;s_writepages_rwsem);
                                ext4_change_inode_journal_flag()
                                  percpu_down_write(sbi-&gt;s_writepages_rwsem);
                                    - blocks, all readers block from now on
  ext4_do_writepages()
    ext4_init_io_end()
      kmem_cache_zalloc(io_end_cachep, GFP_KERNEL)
        fs_reclaim frees dentry...
          dentry_unlink_inode()
            iput() - last ref =&gt;
              iput_final() - inode dirty =&gt;
                write_inode_now()...
                  ext4_writepages() tries to acquire sbi-&gt;s_writepages_rwsem
                    and blocks forever

Make sure we cannot recurse into filesystem reclaim from writeback code
to avoid the deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53149/">CVE-2023-53149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53149">CVE-2023-53149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249882">SUSE bug 1249882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53150" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53150" ref_url="https://www.suse.com/security/cve/CVE-2023-53150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Pointer may be dereferenced

Klocwork tool reported pointer 'rport' returned from call to function
fc_bsg_to_rport() may be NULL and will be dereferenced.

Add a fix to validate rport before dereferencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53150/">CVE-2023-53150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53150">CVE-2023-53150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249853">SUSE bug 1249853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53151" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53151" ref_url="https://www.suse.com/security/cve/CVE-2023-53151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: prevent soft lockup while flush writes

Currently, there is no limit for raid1/raid10 plugged bio. While flushing
writes, raid1 has cond_resched() while raid10 doesn't, and too many
writes can cause soft lockup.

Follow up soft lockup can be triggered easily with writeback test for
raid10 with ramdisks:

watchdog: BUG: soft lockup - CPU#10 stuck for 27s! [md0_raid10:1293]
Call Trace:
 &lt;TASK&gt;
 call_rcu+0x16/0x20
 put_object+0x41/0x80
 __delete_object+0x50/0x90
 delete_object_full+0x2b/0x40
 kmemleak_free+0x46/0xa0
 slab_free_freelist_hook.constprop.0+0xed/0x1a0
 kmem_cache_free+0xfd/0x300
 mempool_free_slab+0x1f/0x30
 mempool_free+0x3a/0x100
 bio_free+0x59/0x80
 bio_put+0xcf/0x2c0
 free_r10bio+0xbf/0xf0
 raid_end_bio_io+0x78/0xb0
 one_write_done+0x8a/0xa0
 raid10_end_write_request+0x1b4/0x430
 bio_endio+0x175/0x320
 brd_submit_bio+0x3b9/0x9b7 [brd]
 __submit_bio+0x69/0xe0
 submit_bio_noacct_nocheck+0x1e6/0x5a0
 submit_bio_noacct+0x38c/0x7e0
 flush_pending_writes+0xf0/0x240
 raid10d+0xac/0x1ed0

Fix the problem by adding cond_resched() to raid10 like what raid1 did.

Note that unlimited plugged bio still need to be optimized, for example,
in the case of lots of dirty pages writeback, this will take lots of
memory and io will spend a long time in plug, hence io latency is bad.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53151/">CVE-2023-53151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53151">CVE-2023-53151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249865">SUSE bug 1249865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53152</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53152" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53152" ref_url="https://www.suse.com/security/cve/CVE-2023-53152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix calltrace warning in amddrm_buddy_fini

The following call trace is observed when removing the amdgpu driver, which
is caused by that BOs allocated for psp are not freed until removing.

[61811.450562] RIP: 0010:amddrm_buddy_fini.cold+0x29/0x47 [amddrm_buddy]
[61811.450577] Call Trace:
[61811.450577]  &lt;TASK&gt;
[61811.450579]  amdgpu_vram_mgr_fini+0x135/0x1c0 [amdgpu]
[61811.450728]  amdgpu_ttm_fini+0x207/0x290 [amdgpu]
[61811.450870]  amdgpu_bo_fini+0x27/0xa0 [amdgpu]
[61811.451012]  gmc_v9_0_sw_fini+0x4a/0x60 [amdgpu]
[61811.451166]  amdgpu_device_fini_sw+0x117/0x520 [amdgpu]
[61811.451306]  amdgpu_driver_release_kms+0x16/0x30 [amdgpu]
[61811.451447]  devm_drm_dev_init_release+0x4d/0x80 [drm]
[61811.451466]  devm_action_release+0x15/0x20
[61811.451469]  release_nodes+0x40/0xb0
[61811.451471]  devres_release_all+0x9b/0xd0
[61811.451473]  __device_release_driver+0x1bb/0x2a0
[61811.451476]  driver_detach+0xf3/0x140
[61811.451479]  bus_remove_driver+0x6c/0xf0
[61811.451481]  driver_unregister+0x31/0x60
[61811.451483]  pci_unregister_driver+0x40/0x90
[61811.451486]  amdgpu_exit+0x15/0x447 [amdgpu]

For smu v13_0_2, if the GPU supports xgmi, refer to

commit f5c7e7797060 ("drm/amdgpu: Adjust removal control flow for smu v13_0_2"),

it will run gpu recover in AMDGPU_RESET_FOR_DEVICE_REMOVE mode when removing,
which makes all devices in hive list have hw reset but no resume except the
basic ip blocks, then other ip blocks will not call .hw_fini according to
ip_block.status.hw.

Since psp_free_shared_bufs just includes some software operations, so move
it to psp_sw_fini.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53152/">CVE-2023-53152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53152">CVE-2023-53152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249883">SUSE bug 1249883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53164</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53164" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53164" ref_url="https://www.suse.com/security/cve/CVE-2023-53164" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/ti-sci: Fix refcount leak in ti_sci_intr_irq_domain_probe

of_irq_find_parent() returns a node pointer with refcount incremented,
We should use of_node_put() on it when not needed anymore.
Add missing of_node_put() to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53164/">CVE-2023-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53164">CVE-2023-53164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249879">SUSE bug 1249879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53168" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53168" ref_url="https://www.suse.com/security/cve/CVE-2023-53168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: ucsi_acpi: Increase the command completion timeout

Commit 130a96d698d7 ("usb: typec: ucsi: acpi: Increase command
completion timeout value") increased the timeout from 5 seconds
to 60 seconds due to issues related to alternate mode discovery.

After the alternate mode discovery switch to polled mode
the timeout was reduced, but instead of being set back to
5 seconds it was reduced to 1 second.

This is causing problems when using a Lenovo ThinkPad X1 yoga gen7
connected over Type-C to a LG 27UL850-W (charging DP over Type-C).

When the monitor is already connected at boot the following error
is logged: "PPM init failed (-110)", /sys/class/typec is empty and
on unplugging the NULL pointer deref fixed earlier in this series
happens.

When the monitor is connected after boot the following error
is logged instead: "GET_CONNECTOR_STATUS failed (-110)".

Setting the timeout back to 5 seconds fixes both cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53168/">CVE-2023-53168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53168">CVE-2023-53168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249874">SUSE bug 1249874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53171" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53171" ref_url="https://www.suse.com/security/cve/CVE-2023-53171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/type1: prevent underflow of locked_vm via exec()

When a vfio container is preserved across exec, the task does not change,
but it gets a new mm with locked_vm=0, and loses the count from existing
dma mappings.  If the user later unmaps a dma mapping, locked_vm underflows
to a large unsigned value, and a subsequent dma map request fails with
ENOMEM in __account_locked_vm.

To avoid underflow, grab and save the mm at the time a dma is mapped.
Use that mm when adjusting locked_vm, rather than re-acquiring the saved
task's mm, which may have changed.  If the saved mm is dead, do nothing.

locked_vm is incremented for existing mappings in a subsequent patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53171/">CVE-2023-53171 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53171">CVE-2023-53171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249933">SUSE bug 1249933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53180" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53180" ref_url="https://www.suse.com/security/cve/CVE-2023-53180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Avoid NULL pointer access during management transmit cleanup

Currently 'ar' reference is not added in skb_cb.
Though this is generally not used during transmit completion
callbacks, on interface removal the remaining idr cleanup callback
uses the ar pointer from skb_cb from management txmgmt_idr. Hence fill them
during transmit call for proper usage to avoid NULL pointer dereference.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53180/">CVE-2023-53180 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53180">CVE-2023-53180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249826">SUSE bug 1249826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53181" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53181" ref_url="https://www.suse.com/security/cve/CVE-2023-53181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf/dma-resv: Stop leaking on krealloc() failure

Currently dma_resv_get_fences() will leak the previously
allocated array if the fence iteration got restarted and
the krealloc_array() fails.

Free the old array by hand, and make sure we still clear
the returned *fences so the caller won't end up accessing
freed memory. Some (but not all) of the callers of
dma_resv_get_fences() seem to still trawl through the
array even when dma_resv_get_fences() failed. And let's
zero out *num_fences as well for good measure.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53181/">CVE-2023-53181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53181">CVE-2023-53181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249824">SUSE bug 1249824</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53184" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53184" ref_url="https://www.suse.com/security/cve/CVE-2023-53184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/sme: Set new vector length before reallocating

As part of fixing the allocation of the buffer for SVE state when changing
SME vector length we introduced an immediate reallocation of the SVE state,
this is also done when changing the SVE vector length for consistency.
Unfortunately this reallocation is done prior to writing the new vector
length to the task struct, meaning the allocation is done with the old
vector length and can lead to memory corruption due to an undersized buffer
being used.

Move the update of the vector length before the allocation to ensure that
the new vector length is taken into account.

For some reason this isn't triggering any problems when running tests on
the arm64 fixes branch (even after repeated tries) but is triggering
issues very often after merge into mainline.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53184/">CVE-2023-53184 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53184">CVE-2023-53184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249823">SUSE bug 1249823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53185" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53185" ref_url="https://www.suse.com/security/cve/CVE-2023-53185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes

A bad USB device is able to construct a service connection response
message with target endpoint being ENDPOINT0 which is reserved for
HTC_CTRL_RSVD_SVC and should not be modified to be used for any other
services.

Reject such service connection responses.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53185/">CVE-2023-53185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53185">CVE-2023-53185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249820">SUSE bug 1249820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53188</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53188" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53188" ref_url="https://www.suse.com/security/cve/CVE-2023-53188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix race on port output

assume the following setup on a single machine:
1. An openvswitch instance with one bridge and default flows
2. two network namespaces "server" and "client"
3. two ovs interfaces "server" and "client" on the bridge
4. for each ovs interface a veth pair with a matching name and 32 rx and
   tx queues
5. move the ends of the veth pairs to the respective network namespaces
6. assign ip addresses to each of the veth ends in the namespaces (needs
   to be the same subnet)
7. start some http server on the server network namespace
8. test if a client in the client namespace can reach the http server

when following the actions below the host has a chance of getting a cpu
stuck in a infinite loop:
1. send a large amount of parallel requests to the http server (around
   3000 curls should work)
2. in parallel delete the network namespace (do not delete interfaces or
   stop the server, just kill the namespace)

there is a low chance that this will cause the below kernel cpu stuck
message. If this does not happen just retry.
Below there is also the output of bpftrace for the functions mentioned
in the output.

The series of events happening here is:
1. the network namespace is deleted calling
   `unregister_netdevice_many_notify` somewhere in the process
2. this sets first `NETREG_UNREGISTERING` on both ends of the veth and
   then runs `synchronize_net`
3. it then calls `call_netdevice_notifiers` with `NETDEV_UNREGISTER`
4. this is then handled by `dp_device_event` which calls
   `ovs_netdev_detach_dev` (if a vport is found, which is the case for
   the veth interface attached to ovs)
5. this removes the rx_handlers of the device but does not prevent
   packages to be sent to the device
6. `dp_device_event` then queues the vport deletion to work in
   background as a ovs_lock is needed that we do not hold in the
   unregistration path
7. `unregister_netdevice_many_notify` continues to call
   `netdev_unregister_kobject` which sets `real_num_tx_queues` to 0
8. port deletion continues (but details are not relevant for this issue)
9. at some future point the background task deletes the vport

If after 7. but before 9. a packet is send to the ovs vport (which is
not deleted at this point in time) which forwards it to the
`dev_queue_xmit` flow even though the device is unregistering.
In `skb_tx_hash` (which is called in the `dev_queue_xmit`) path there is
a while loop (if the packet has a rx_queue recorded) that is infinite if
`dev-&gt;real_num_tx_queues` is zero.

To prevent this from happening we update `do_output` to handle devices
without carrier the same as if the device is not found (which would
be the code path after 9. is done).

Additionally we now produce a warning in `skb_tx_hash` if we will hit
the infinite loop.

bpftrace (first word is function name):

__dev_queue_xmit server: real_num_tx_queues: 1, cpu: 2, pid: 28024, tid: 28024, skb_addr: 0xffff9edb6f207000, reg_state: 1
netdev_core_pick_tx server: addr: 0xffff9f0a46d4a000 real_num_tx_queues: 1, cpu: 2, pid: 28024, tid: 28024, skb_addr: 0xffff9edb6f207000, reg_state: 1
dp_device_event server: real_num_tx_queues: 1 cpu 9, pid: 21024, tid: 21024, event 2, reg_state: 1
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
dp_device_event server: real_num_tx_queues: 1 cpu 9, pid: 21024, tid: 21024, event 6, reg_state: 2
ovs_netdev_detach_dev server: real_num_tx_queues: 1 cpu 9, pid: 21024, tid: 21024, reg_state: 2
netdev_rx_handler_unregister server: real_num_tx_queues: 1, cpu: 9, pid: 21024, tid: 21024, reg_state: 2
synchronize_rcu_expedited: cpu 9, pid: 21024, tid: 21024
netdev_rx_handler_unregister ret server: real_num_tx_queues: 1, cpu: 9, pid: 21024, tid: 21024, reg_state: 2
dp_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53188/">CVE-2023-53188 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53188">CVE-2023-53188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249854">SUSE bug 1249854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53192</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53192" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53192" ref_url="https://www.suse.com/security/cve/CVE-2023-53192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vxlan: Fix nexthop hash size

The nexthop code expects a 31 bit hash, such as what is returned by
fib_multipath_hash() and rt6_multipath_hash(). Passing the 32 bit hash
returned by skb_get_hash() can lead to problems related to the fact that
'int hash' is a negative number when the MSB is set.

In the case of hash threshold nexthop groups, nexthop_select_path_hthr()
will disproportionately select the first nexthop group entry. In the case
of resilient nexthop groups, nexthop_select_path_res() may do an out of
bounds access in nh_buckets[], for example:
    hash = -912054133
    num_nh_buckets = 2
    bucket_index = 65535

which leads to the following panic:

BUG: unable to handle page fault for address: ffffc900025910c8
PGD 100000067 P4D 100000067 PUD 10026b067 PMD 0
Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI
CPU: 4 PID: 856 Comm: kworker/4:3 Not tainted 6.5.0-rc2+ #34
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Workqueue: ipv6_addrconf addrconf_dad_work
RIP: 0010:nexthop_select_path+0x197/0xbf0
Code: c1 e4 05 be 08 00 00 00 4c 8b 35 a4 14 7e 01 4e 8d 6c 25 00 4a 8d 7c 25 08 48 01 dd e8 c2 25 15 ff 49 8d 7d 08 e8 39 13 15 ff &lt;4d&gt; 89 75 08 48 89 ef e8 7d 12 15 ff 48 8b 5d 00 e8 14 55 2f 00 85
RSP: 0018:ffff88810c36f260 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000002000c0 RCX: ffffffffaf02dd77
RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffffc900025910c8
RBP: ffffc900025910c0 R08: 0000000000000001 R09: fffff520004b2219
R10: ffffc900025910cf R11: 31392d2068736168 R12: 00000000002000c0
R13: ffffc900025910c0 R14: 00000000fffef608 R15: ffff88811840e900
FS:  0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc900025910c8 CR3: 0000000129d00000 CR4: 0000000000750ee0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die+0x23/0x70
 ? page_fault_oops+0x1ee/0x5c0
 ? __pfx_is_prefetch.constprop.0+0x10/0x10
 ? __pfx_page_fault_oops+0x10/0x10
 ? search_bpf_extables+0xfe/0x1c0
 ? fixup_exception+0x3b/0x470
 ? exc_page_fault+0xf6/0x110
 ? asm_exc_page_fault+0x26/0x30
 ? nexthop_select_path+0x197/0xbf0
 ? nexthop_select_path+0x197/0xbf0
 ? lock_is_held_type+0xe7/0x140
 vxlan_xmit+0x5b2/0x2340
 ? __lock_acquire+0x92b/0x3370
 ? __pfx_vxlan_xmit+0x10/0x10
 ? __pfx___lock_acquire+0x10/0x10
 ? __pfx_register_lock_class+0x10/0x10
 ? skb_network_protocol+0xce/0x2d0
 ? dev_hard_start_xmit+0xca/0x350
 ? __pfx_vxlan_xmit+0x10/0x10
 dev_hard_start_xmit+0xca/0x350
 __dev_queue_xmit+0x513/0x1e20
 ? __pfx___dev_queue_xmit+0x10/0x10
 ? __pfx_lock_release+0x10/0x10
 ? mark_held_locks+0x44/0x90
 ? skb_push+0x4c/0x80
 ? eth_header+0x81/0xe0
 ? __pfx_eth_header+0x10/0x10
 ? neigh_resolve_output+0x215/0x310
 ? ip6_finish_output2+0x2ba/0xc90
 ip6_finish_output2+0x2ba/0xc90
 ? lock_release+0x236/0x3e0
 ? ip6_mtu+0xbb/0x240
 ? __pfx_ip6_finish_output2+0x10/0x10
 ? find_held_lock+0x83/0xa0
 ? lock_is_held_type+0xe7/0x140
 ip6_finish_output+0x1ee/0x780
 ip6_output+0x138/0x460
 ? __pfx_ip6_output+0x10/0x10
 ? __pfx___lock_acquire+0x10/0x10
 ? __pfx_ip6_finish_output+0x10/0x10
 NF_HOOK.constprop.0+0xc0/0x420
 ? __pfx_NF_HOOK.constprop.0+0x10/0x10
 ? ndisc_send_skb+0x2c0/0x960
 ? __pfx_lock_release+0x10/0x10
 ? __local_bh_enable_ip+0x93/0x110
 ? lock_is_held_type+0xe7/0x140
 ndisc_send_skb+0x4be/0x960
 ? __pfx_ndisc_send_skb+0x10/0x10
 ? mark_held_locks+0x65/0x90
 ? find_held_lock+0x83/0xa0
 ndisc_send_ns+0xb0/0x110
 ? __pfx_ndisc_send_ns+0x10/0x10
 addrconf_dad_work+0x631/0x8e0
 ? lock_acquire+0x180/0x3f0
 ? __pfx_addrconf_dad_work+0x10/0x10
 ? mark_held_locks+0x24/0x90
 process_one_work+0x582/0x9c0
 ? __pfx_process_one_work+0x10/0x10
 ? __pfx_do_raw_spin_lock+0x10/0x10
 ? mark_held_locks+0x24/0x90
 worker_thread+0x93/0x630
 ? __kthread_parkme+0xdc/0x100
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x1a5/0x1e0
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x60
 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53192/">CVE-2023-53192 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53192">CVE-2023-53192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249897">SUSE bug 1249897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53193" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53193" ref_url="https://www.suse.com/security/cve/CVE-2023-53193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini

The gmc.ecc_irq is enabled by firmware per IFWI setting,
and the host driver is not privileged to enable/disable
the interrupt. So, it is meaningless to use the amdgpu_irq_put
function in gmc_v10_0_hw_fini, which also leads to the call
trace.

[   82.340264] Call Trace:
[   82.340265]  &lt;TASK&gt;
[   82.340269]  gmc_v10_0_hw_fini+0x83/0xa0 [amdgpu]
[   82.340447]  gmc_v10_0_suspend+0xe/0x20 [amdgpu]
[   82.340623]  amdgpu_device_ip_suspend_phase2+0x127/0x1c0 [amdgpu]
[   82.340789]  amdgpu_device_ip_suspend+0x3d/0x80 [amdgpu]
[   82.340955]  amdgpu_device_pre_asic_reset+0xdd/0x2b0 [amdgpu]
[   82.341122]  amdgpu_device_gpu_recover.cold+0x4dd/0xbb2 [amdgpu]
[   82.341359]  amdgpu_debugfs_reset_work+0x4c/0x70 [amdgpu]
[   82.341529]  process_one_work+0x21d/0x3f0
[   82.341535]  worker_thread+0x1fa/0x3c0
[   82.341538]  ? process_one_work+0x3f0/0x3f0
[   82.341540]  kthread+0xff/0x130
[   82.341544]  ? kthread_complete_and_exit+0x20/0x20
[   82.341547]  ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53193/">CVE-2023-53193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53193">CVE-2023-53193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249816">SUSE bug 1249816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53196" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53196" ref_url="https://www.suse.com/security/cve/CVE-2023-53196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: qcom: Fix potential memory leak

Function dwc3_qcom_probe() allocates memory for resource structure
which is pointed by parent_res pointer. This memory is not
freed. This leads to memory leak. Use stack memory to prevent
memory leak.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53196/">CVE-2023-53196 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53196">CVE-2023-53196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249758">SUSE bug 1249758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53197" ref_url="https://www.suse.com/security/cve/CVE-2023-53197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: uhci: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53197/">CVE-2023-53197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53197">CVE-2023-53197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249791">SUSE bug 1249791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53198" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53198" ref_url="https://www.suse.com/security/cve/CVE-2023-53198" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

raw: Fix NULL deref in raw_get_next().

Dae R. Jeong reported a NULL deref in raw_get_next() [0].

It seems that the repro was running these sequences in parallel so
that one thread was iterating on a socket that was being freed in
another netns.

  unshare(0x40060200)
  r0 = syz_open_procfs(0x0, &amp;(0x7f0000002080)='net/raw\x00')
  socket$inet_icmp_raw(0x2, 0x3, 0x1)
  pread64(r0, &amp;(0x7f0000000000)=""/10, 0xa, 0x10000000007f)

After commit 0daf07e52709 ("raw: convert raw sockets to RCU"), we
use RCU and hlist_nulls_for_each_entry() to iterate over SOCK_RAW
sockets.  However, we should use spinlock for slow paths to avoid
the NULL deref.

Also, SOCK_RAW does not use SLAB_TYPESAFE_BY_RCU, and the slab object
is not reused during iteration in the grace period.  In fact, the
lockless readers do not check the nulls marker with get_nulls_value().
So, SOCK_RAW should use hlist instead of hlist_nulls.

Instead of adding an unnecessary barrier by sk_nulls_for_each_rcu(),
let's convert hlist_nulls to hlist and use sk_for_each_rcu() for
fast paths and sk_for_each() and spinlock for /proc/net/raw.

[0]:
general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
CPU: 2 PID: 20952 Comm: syz-executor.0 Not tainted 6.2.0-g048ec869bafd-dirty #7
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
RIP: 0010:read_pnet include/net/net_namespace.h:383 [inline]
RIP: 0010:sock_net include/net/sock.h:649 [inline]
RIP: 0010:raw_get_next net/ipv4/raw.c:974 [inline]
RIP: 0010:raw_get_idx net/ipv4/raw.c:986 [inline]
RIP: 0010:raw_seq_start+0x431/0x800 net/ipv4/raw.c:995
Code: ef e8 33 3d 94 f7 49 8b 6d 00 4c 89 ef e8 b7 65 5f f7 49 89 ed 49 83 c5 98 0f 84 9a 00 00 00 48 83 c5 c8 48 89 e8 48 c1 e8 03 &lt;42&gt; 80 3c 30 00 74 08 48 89 ef e8 00 3d 94 f7 4c 8b 7d 00 48 89 ef
RSP: 0018:ffffc9001154f9b0 EFLAGS: 00010206
RAX: 0000000000000005 RBX: 1ffff1100302c8fd RCX: 0000000000000000
RDX: 0000000000000028 RSI: ffffc9001154f988 RDI: ffffc9000f77a338
RBP: 0000000000000029 R08: ffffffff8a50ffb4 R09: fffffbfff24b6bd9
R10: fffffbfff24b6bd9 R11: 0000000000000000 R12: ffff88801db73b78
R13: fffffffffffffff9 R14: dffffc0000000000 R15: 0000000000000030
FS:  00007f843ae8e700(0000) GS:ffff888063700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055bb9614b35f CR3: 000000003c672000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 seq_read_iter+0x4c6/0x10f0 fs/seq_file.c:225
 seq_read+0x224/0x320 fs/seq_file.c:162
 pde_read fs/proc/inode.c:316 [inline]
 proc_reg_read+0x23f/0x330 fs/proc/inode.c:328
 vfs_read+0x31e/0xd30 fs/read_write.c:468
 ksys_pread64 fs/read_write.c:665 [inline]
 __do_sys_pread64 fs/read_write.c:675 [inline]
 __se_sys_pread64 fs/read_write.c:672 [inline]
 __x64_sys_pread64+0x1e9/0x280 fs/read_write.c:672
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x4e/0xa0 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x478d29
Code: f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f843ae8dbe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000011
RAX: ffffffffffffffda RBX: 0000000000791408 RCX: 0000000000478d29
RDX: 000000000000000a RSI: 0000000020000000 RDI: 0000000000000003
RBP: 00000000f477909a R08: 0000000000000000 R09: 0000000000000000
R10: 000010000000007f R11: 0000000000000246 R12: 0000000000791740
R13: 0000000000791414 R14: 0000000000791408 R15: 00007ffc2eb48a50
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
RIP: 0010
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53198/">CVE-2023-53198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53198">CVE-2023-53198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249714">SUSE bug 1249714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53202</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53202" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53202" ref_url="https://www.suse.com/security/cve/CVE-2023-53202" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: domains: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53202/">CVE-2023-53202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53202">CVE-2023-53202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249792">SUSE bug 1249792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53204" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53204" ref_url="https://www.suse.com/security/cve/CVE-2023-53204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix data-races around user-&gt;unix_inflight.

user-&gt;unix_inflight is changed under spin_lock(unix_gc_lock),
but too_many_unix_fds() reads it locklessly.

Let's annotate the write/read accesses to user-&gt;unix_inflight.

BUG: KCSAN: data-race in unix_attach_fds / unix_inflight

write to 0xffffffff8546f2d0 of 8 bytes by task 44798 on cpu 1:
 unix_inflight+0x157/0x180 net/unix/scm.c:66
 unix_attach_fds+0x147/0x1e0 net/unix/scm.c:123
 unix_scm_to_skb net/unix/af_unix.c:1827 [inline]
 unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1950
 unix_seqpacket_sendmsg net/unix/af_unix.c:2308 [inline]
 unix_seqpacket_sendmsg+0xba/0x130 net/unix/af_unix.c:2292
 sock_sendmsg_nosec net/socket.c:725 [inline]
 sock_sendmsg+0x148/0x160 net/socket.c:748
 ____sys_sendmsg+0x4e4/0x610 net/socket.c:2494
 ___sys_sendmsg+0xc6/0x140 net/socket.c:2548
 __sys_sendmsg+0x94/0x140 net/socket.c:2577
 __do_sys_sendmsg net/socket.c:2586 [inline]
 __se_sys_sendmsg net/socket.c:2584 [inline]
 __x64_sys_sendmsg+0x45/0x50 net/socket.c:2584
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

read to 0xffffffff8546f2d0 of 8 bytes by task 44814 on cpu 0:
 too_many_unix_fds net/unix/scm.c:101 [inline]
 unix_attach_fds+0x54/0x1e0 net/unix/scm.c:110
 unix_scm_to_skb net/unix/af_unix.c:1827 [inline]
 unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1950
 unix_seqpacket_sendmsg net/unix/af_unix.c:2308 [inline]
 unix_seqpacket_sendmsg+0xba/0x130 net/unix/af_unix.c:2292
 sock_sendmsg_nosec net/socket.c:725 [inline]
 sock_sendmsg+0x148/0x160 net/socket.c:748
 ____sys_sendmsg+0x4e4/0x610 net/socket.c:2494
 ___sys_sendmsg+0xc6/0x140 net/socket.c:2548
 __sys_sendmsg+0x94/0x140 net/socket.c:2577
 __do_sys_sendmsg net/socket.c:2586 [inline]
 __se_sys_sendmsg net/socket.c:2584 [inline]
 __x64_sys_sendmsg+0x45/0x50 net/socket.c:2584
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

value changed: 0x000000000000000c -&gt; 0x000000000000000d

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 44814 Comm: systemd-coredum Not tainted 6.4.0-11989-g6843306689af #6
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53204/">CVE-2023-53204 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53204">CVE-2023-53204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249682">SUSE bug 1249682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53205" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53205" ref_url="https://www.suse.com/security/cve/CVE-2023-53205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler

We do check for target CPU == -1, but this might change at the time we
are going to use it. Hold the physical target CPU in a local variable to
avoid out-of-bound accesses to the cpu arrays.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53205/">CVE-2023-53205 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53205">CVE-2023-53205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249677">SUSE bug 1249677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53208" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53208" ref_url="https://www.suse.com/security/cve/CVE-2023-53208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state

When emulating nested VM-Exit, load L1's TSC multiplier if L1's desired
ratio doesn't match the current ratio, not if the ratio L1 is using for
L2 diverges from the default.  Functionally, the end result is the same
as KVM will run L2 with L1's multiplier if L2's multiplier is the default,
i.e. checking that L1's multiplier is loaded is equivalent to checking if
L2 has a non-default multiplier.

However, the assertion that TSC scaling is exposed to L1 is flawed, as
userspace can trigger the WARN at will by writing the MSR and then
updating guest CPUID to hide the feature (modifying guest CPUID is
allowed anytime before KVM_RUN).  E.g. hacking KVM's state_test
selftest to do

                vcpu_set_msr(vcpu, MSR_AMD64_TSC_RATIO, 0);
                vcpu_clear_cpuid_feature(vcpu, X86_FEATURE_TSCRATEMSR);

after restoring state in a new VM+vCPU yields an endless supply of:

  ------------[ cut here ]------------
  WARNING: CPU: 10 PID: 206939 at arch/x86/kvm/svm/nested.c:1105
           nested_svm_vmexit+0x6af/0x720 [kvm_amd]
  Call Trace:
   nested_svm_exit_handled+0x102/0x1f0 [kvm_amd]
   svm_handle_exit+0xb9/0x180 [kvm_amd]
   kvm_arch_vcpu_ioctl_run+0x1eab/0x2570 [kvm]
   kvm_vcpu_ioctl+0x4c9/0x5b0 [kvm]
   ? trace_hardirqs_off+0x4d/0xa0
   __se_sys_ioctl+0x7a/0xc0
   __x64_sys_ioctl+0x21/0x30
   do_syscall_64+0x41/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

Unlike the nested VMRUN path, hoisting the svm-&gt;tsc_scaling_enabled check
into the if-statement is wrong as KVM needs to ensure L1's multiplier is
loaded in the above scenario.   Alternatively, the WARN_ON() could simply
be deleted, but that would make KVM's behavior even more subtle, e.g. it's
not immediately obvious why it's safe to write MSR_AMD64_TSC_RATIO when
checking only tsc_ratio_msr.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53208/">CVE-2023-53208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53208">CVE-2023-53208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249698">SUSE bug 1249698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53209</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53209" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53209" ref_url="https://www.suse.com/security/cve/CVE-2023-53209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211_hwsim: Fix possible NULL dereference

In a call to mac80211_hwsim_select_tx_link() the sta pointer might
be NULL, thus need to check that it is not NULL before accessing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53209/">CVE-2023-53209 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53209">CVE-2023-53209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249856">SUSE bug 1249856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253191">SUSE bug 1253191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53210</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53210" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53210" ref_url="https://www.suse.com/security/cve/CVE-2023-53210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid()

r5l_flush_stripe_to_raid() will check if the list 'flushing_ios' is
empty, and then submit 'flush_bio', however, r5l_log_flush_endio()
is clearing the list first and then clear the bio, which will cause
null-ptr-deref:

T1: submit flush io
raid5d
 handle_active_stripes
  r5l_flush_stripe_to_raid
   // list is empty
   // add 'io_end_ios' to the list
   bio_init
   submit_bio
   // io1

T2: io1 is done
r5l_log_flush_endio
 list_splice_tail_init
 // clear the list
			T3: submit new flush io
			...
			r5l_flush_stripe_to_raid
			 // list is empty
			 // add 'io_end_ios' to the list
			 bio_init
 bio_uninit
 // clear bio-&gt;bi_blkg
			 submit_bio
			 // null-ptr-deref

Fix this problem by clearing bio before clearing the list in
r5l_log_flush_endio().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53210/">CVE-2023-53210 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53210">CVE-2023-53210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249673">SUSE bug 1249673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53211" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53211" ref_url="https://www.suse.com/security/cve/CVE-2023-53211" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: location: Free struct acpi_pld_info *pld before return false

struct acpi_pld_info *pld should be freed before the return of allocation
failure, to prevent memory leak, add the ACPI_FREE() to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53211/">CVE-2023-53211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53211">CVE-2023-53211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249674">SUSE bug 1249674</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53213" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53213" ref_url="https://www.suse.com/security/cve/CVE-2023-53213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()

Fix a slab-out-of-bounds read that occurs in kmemdup() called from
brcmf_get_assoc_ies().
The bug could occur when assoc_info-&gt;req_len, data from a URB provided
by a USB device, is bigger than the size of buffer which is defined as
WL_EXTRA_BUF_MAX.

Add the size check for req_len/resp_len of assoc_info.

Found by a modified version of syzkaller.

[   46.592467][    T7] ==================================================================
[   46.594687][    T7] BUG: KASAN: slab-out-of-bounds in kmemdup+0x3e/0x50
[   46.596572][    T7] Read of size 3014656 at addr ffff888019442000 by task kworker/0:1/7
[   46.598575][    T7]
[   46.599157][    T7] CPU: 0 PID: 7 Comm: kworker/0:1 Tainted: G           O      5.14.0+ #145
[   46.601333][    T7] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
[   46.604360][    T7] Workqueue: events brcmf_fweh_event_worker
[   46.605943][    T7] Call Trace:
[   46.606584][    T7]  dump_stack_lvl+0x8e/0xd1
[   46.607446][    T7]  print_address_description.constprop.0.cold+0x93/0x334
[   46.608610][    T7]  ? kmemdup+0x3e/0x50
[   46.609341][    T7]  kasan_report.cold+0x79/0xd5
[   46.610151][    T7]  ? kmemdup+0x3e/0x50
[   46.610796][    T7]  kasan_check_range+0x14e/0x1b0
[   46.611691][    T7]  memcpy+0x20/0x60
[   46.612323][    T7]  kmemdup+0x3e/0x50
[   46.612987][    T7]  brcmf_get_assoc_ies+0x967/0xf60
[   46.613904][    T7]  ? brcmf_notify_vif_event+0x3d0/0x3d0
[   46.614831][    T7]  ? lock_chain_count+0x20/0x20
[   46.615683][    T7]  ? mark_lock.part.0+0xfc/0x2770
[   46.616552][    T7]  ? lock_chain_count+0x20/0x20
[   46.617409][    T7]  ? mark_lock.part.0+0xfc/0x2770
[   46.618244][    T7]  ? lock_chain_count+0x20/0x20
[   46.619024][    T7]  brcmf_bss_connect_done.constprop.0+0x241/0x2e0
[   46.620019][    T7]  ? brcmf_parse_configure_security.isra.0+0x2a0/0x2a0
[   46.620818][    T7]  ? __lock_acquire+0x181f/0x5790
[   46.621462][    T7]  brcmf_notify_connect_status+0x448/0x1950
[   46.622134][    T7]  ? rcu_read_lock_bh_held+0xb0/0xb0
[   46.622736][    T7]  ? brcmf_cfg80211_join_ibss+0x7b0/0x7b0
[   46.623390][    T7]  ? find_held_lock+0x2d/0x110
[   46.623962][    T7]  ? brcmf_fweh_event_worker+0x19f/0xc60
[   46.624603][    T7]  ? mark_held_locks+0x9f/0xe0
[   46.625145][    T7]  ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0
[   46.625871][    T7]  ? brcmf_cfg80211_join_ibss+0x7b0/0x7b0
[   46.626545][    T7]  brcmf_fweh_call_event_handler.isra.0+0x90/0x100
[   46.627338][    T7]  brcmf_fweh_event_worker+0x557/0xc60
[   46.627962][    T7]  ? brcmf_fweh_call_event_handler.isra.0+0x100/0x100
[   46.628736][    T7]  ? rcu_read_lock_sched_held+0xa1/0xd0
[   46.629396][    T7]  ? rcu_read_lock_bh_held+0xb0/0xb0
[   46.629970][    T7]  ? lockdep_hardirqs_on_prepare+0x273/0x3e0
[   46.630649][    T7]  process_one_work+0x92b/0x1460
[   46.631205][    T7]  ? pwq_dec_nr_in_flight+0x330/0x330
[   46.631821][    T7]  ? rwlock_bug.part.0+0x90/0x90
[   46.632347][    T7]  worker_thread+0x95/0xe00
[   46.632832][    T7]  ? __kthread_parkme+0x115/0x1e0
[   46.633393][    T7]  ? process_one_work+0x1460/0x1460
[   46.633957][    T7]  kthread+0x3a1/0x480
[   46.634369][    T7]  ? set_kthread_struct+0x120/0x120
[   46.634933][    T7]  ret_from_fork+0x1f/0x30
[   46.635431][    T7]
[   46.635687][    T7] Allocated by task 7:
[   46.636151][    T7]  kasan_save_stack+0x1b/0x40
[   46.636628][    T7]  __kasan_kmalloc+0x7c/0x90
[   46.637108][    T7]  kmem_cache_alloc_trace+0x19e/0x330
[   46.637696][    T7]  brcmf_cfg80211_attach+0x4a0/0x4040
[   46.638275][    T7]  brcmf_attach+0x389/0xd40
[   46.638739][    T7]  brcmf_usb_probe+0x12de/0x1690
[   46.639279][    T7]  usb_probe_interface+0x2aa/0x760
[   46.639820][    T7]  really_probe+0x205/0xb70
[   46.640342][    T7]  __driver_probe_device+0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53213/">CVE-2023-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53213">CVE-2023-53213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249918">SUSE bug 1249918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53218</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53218" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53218" ref_url="https://www.suse.com/security/cve/CVE-2023-53218" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Make it so that a waiting process can be aborted

When sendmsg() creates an rxrpc call, it queues it to wait for a connection
and channel to be assigned and then waits before it can start shovelling
data as the encrypted DATA packet content includes a summary of the
connection parameters.

However, sendmsg() may get interrupted before a connection gets assigned
and further sendmsg() calls will fail with EBUSY until an assignment is
made.

Fix this so that the call can at least be aborted without failing on
EBUSY.  We have to be careful here as sendmsg() mustn't be allowed to start
the call timer if the call doesn't yet have a connection assigned as an
oops may follow shortly thereafter.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53218/">CVE-2023-53218 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53218">CVE-2023-53218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249671">SUSE bug 1249671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53221" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53221" ref_url="https://www.suse.com/security/cve/CVE-2023-53221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix memleak due to fentry attach failure

If it fails to attach fentry, the allocated bpf trampoline image will be
left in the system. That can be verified by checking /proc/kallsyms.

This meamleak can be verified by a simple bpf program as follows:

  SEC("fentry/trap_init")
  int fentry_run()
  {
      return 0;
  }

It will fail to attach trap_init because this function is freed after
kernel init, and then we can find the trampoline image is left in the
system by checking /proc/kallsyms.

  $ tail /proc/kallsyms
  ffffffffc0613000 t bpf_trampoline_6442453466_1  [bpf]
  ffffffffc06c3000 t bpf_trampoline_6442453466_1  [bpf]

  $ bpftool btf dump file /sys/kernel/btf/vmlinux | grep "FUNC 'trap_init'"
  [2522] FUNC 'trap_init' type_id=119 linkage=static

  $ echo $((6442453466 &amp; 0x7fffffff))
  2522

Note that there are two left bpf trampoline images, that is because the
libbpf will fallback to raw tracepoint if -EINVAL is returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53221/">CVE-2023-53221 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53221">CVE-2023-53221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249662">SUSE bug 1249662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53224</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53224" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53224" ref_url="https://www.suse.com/security/cve/CVE-2023-53224" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: Fix function prototype mismatch for ext4_feat_ktype

With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),
indirect call targets are validated against the expected function
pointer prototype to make sure the call target is valid to help mitigate
ROP attacks. If they are not identical, there is a failure at run time,
which manifests as either a kernel panic or thread getting killed.

ext4_feat_ktype was setting the "release" handler to "kfree", which
doesn't have a matching function prototype. Add a simple wrapper
with the correct prototype.

This was found as a result of Clang's new -Wcast-function-type-strict
flag, which is more sensitive than the simpler -Wcast-function-type,
which only checks for type width mismatches.

Note that this code is only reached when ext4 is a loadable module and
it is being unloaded:

 CFI failure at kobject_put+0xbb/0x1b0 (target: kfree+0x0/0x180; expected type: 0x7c4aa698)
 ...
 RIP: 0010:kobject_put+0xbb/0x1b0
 ...
 Call Trace:
  &lt;TASK&gt;
  ext4_exit_sysfs+0x14/0x60 [ext4]
  cleanup_module+0x67/0xedb [ext4]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53224/">CVE-2023-53224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53224">CVE-2023-53224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249656">SUSE bug 1249656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53228</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53228" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53228" ref_url="https://www.suse.com/security/cve/CVE-2023-53228" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: drop redundant sched job cleanup when cs is aborted

Once command submission failed due to userptr invalidation in
amdgpu_cs_submit, legacy code will perform cleanup of scheduler
job. However, it's not needed at all, as former commit has integrated
job cleanup stuff into amdgpu_job_free. Otherwise, because of double
free, a NULL pointer dereference will occur in such scenario.

Bug: https://gitlab.freedesktop.org/drm/amd/-/issues/2457
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53228/">CVE-2023-53228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53228">CVE-2023-53228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249652">SUSE bug 1249652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53229" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53229" ref_url="https://www.suse.com/security/cve/CVE-2023-53229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta

Avoid potential data corruption issues caused by uninitialized driver
private data structures.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53229/">CVE-2023-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53229">CVE-2023-53229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249650">SUSE bug 1249650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53232</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53232" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53232" ref_url="https://www.suse.com/security/cve/CVE-2023-53232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data

The MT7921 driver no longer uses eeprom.data, but the relevant code has not
been removed completely since
commit 16d98b548365 ("mt76: mt7921: rely on mcu_get_nic_capability").
This could result in potential invalid memory access.

To fix the kernel panic issue in mt7921, it is necessary to avoid accessing
unallocated eeprom.data which can lead to invalid memory access.

Furthermore, it is possible to entirely eliminate the
mt7921_mcu_parse_eeprom function and solely depend on
mt7921_mcu_parse_response to divide the RxD header.

[2.702735] BUG: kernel NULL pointer dereference, address: 0000000000000550
[2.702740] #PF: supervisor write access in kernel mode
[2.702741] #PF: error_code(0x0002) - not-present page
[2.702743] PGD 0 P4D 0
[2.702747] Oops: 0002 [#1] PREEMPT SMP NOPTI
[2.702755] RIP: 0010:mt7921_mcu_parse_response+0x147/0x170 [mt7921_common]
[2.702758] RSP: 0018:ffffae7c00fef828 EFLAGS: 00010286
[2.702760] RAX: ffffa367f57be024 RBX: ffffa367cc7bf500 RCX: 0000000000000000
[2.702762] RDX: 0000000000000550 RSI: 0000000000000000 RDI: ffffa367cc7bf500
[2.702763] RBP: ffffae7c00fef840 R08: ffffa367cb167000 R09: 0000000000000005
[2.702764] R10: 0000000000000000 R11: ffffffffc04702e4 R12: ffffa367e8329f40
[2.702766] R13: 0000000000000000 R14: 0000000000000001 R15: ffffa367e8329f40
[2.702768] FS:  000079ee6cf20c40(0000) GS:ffffa36b2f940000(0000) knlGS:0000000000000000
[2.702769] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[2.702775] CR2: 0000000000000550 CR3: 00000001233c6004 CR4: 0000000000770ee0
[2.702776] PKRU: 55555554
[2.702777] Call Trace:
[2.702782]  mt76_mcu_skb_send_and_get_msg+0xc3/0x11e [mt76 &lt;HASH:1bc4 5&gt;]
[2.702785]  mt7921_run_firmware+0x241/0x853 [mt7921_common &lt;HASH:6a2f 6&gt;]
[2.702789]  mt7921e_mcu_init+0x2b/0x56 [mt7921e &lt;HASH:d290 7&gt;]
[2.702792]  mt7921_register_device+0x2eb/0x5a5 [mt7921_common &lt;HASH:6a2f 6&gt;]
[2.702795]  ? mt7921_irq_tasklet+0x1d4/0x1d4 [mt7921e &lt;HASH:d290 7&gt;]
[2.702797]  mt7921_pci_probe+0x2d6/0x319 [mt7921e &lt;HASH:d290 7&gt;]
[2.702799]  pci_device_probe+0x9f/0x12a
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53232/">CVE-2023-53232 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53232">CVE-2023-53232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249648">SUSE bug 1249648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53233" ref_url="https://www.suse.com/security/cve/CVE-2023-53233" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix deadlock triggered by cancel_delayed_work_syn()

The following LOCKDEP was detected:
		Workqueue: events smc_lgr_free_work [smc]
		WARNING: possible circular locking dependency detected
		6.1.0-20221027.rc2.git8.56bc5b569087.300.fc36.s390x+debug #1 Not tainted
		------------------------------------------------------
		kworker/3:0/176251 is trying to acquire lock:
		00000000f1467148 ((wq_completion)smc_tx_wq-00000000#2){+.+.}-{0:0},
			at: __flush_workqueue+0x7a/0x4f0
		but task is already holding lock:
		0000037fffe97dc8 ((work_completion)(&amp;(&amp;lgr-&gt;free_work)-&gt;work)){+.+.}-{0:0},
			at: process_one_work+0x232/0x730
		which lock already depends on the new lock.
		the existing dependency chain (in reverse order) is:
		-&gt; #4 ((work_completion)(&amp;(&amp;lgr-&gt;free_work)-&gt;work)){+.+.}-{0:0}:
		       __lock_acquire+0x58e/0xbd8
		       lock_acquire.part.0+0xe2/0x248
		       lock_acquire+0xac/0x1c8
		       __flush_work+0x76/0xf0
		       __cancel_work_timer+0x170/0x220
		       __smc_lgr_terminate.part.0+0x34/0x1c0 [smc]
		       smc_connect_rdma+0x15e/0x418 [smc]
		       __smc_connect+0x234/0x480 [smc]
		       smc_connect+0x1d6/0x230 [smc]
		       __sys_connect+0x90/0xc0
		       __do_sys_socketcall+0x186/0x370
		       __do_syscall+0x1da/0x208
		       system_call+0x82/0xb0
		-&gt; #3 (smc_client_lgr_pending){+.+.}-{3:3}:
		       __lock_acquire+0x58e/0xbd8
		       lock_acquire.part.0+0xe2/0x248
		       lock_acquire+0xac/0x1c8
		       __mutex_lock+0x96/0x8e8
		       mutex_lock_nested+0x32/0x40
		       smc_connect_rdma+0xa4/0x418 [smc]
		       __smc_connect+0x234/0x480 [smc]
		       smc_connect+0x1d6/0x230 [smc]
		       __sys_connect+0x90/0xc0
		       __do_sys_socketcall+0x186/0x370
		       __do_syscall+0x1da/0x208
		       system_call+0x82/0xb0
		-&gt; #2 (sk_lock-AF_SMC){+.+.}-{0:0}:
		       __lock_acquire+0x58e/0xbd8
		       lock_acquire.part.0+0xe2/0x248
		       lock_acquire+0xac/0x1c8
		       lock_sock_nested+0x46/0xa8
		       smc_tx_work+0x34/0x50 [smc]
		       process_one_work+0x30c/0x730
		       worker_thread+0x62/0x420
		       kthread+0x138/0x150
		       __ret_from_fork+0x3c/0x58
		       ret_from_fork+0xa/0x40
		-&gt; #1 ((work_completion)(&amp;(&amp;smc-&gt;conn.tx_work)-&gt;work)){+.+.}-{0:0}:
		       __lock_acquire+0x58e/0xbd8
		       lock_acquire.part.0+0xe2/0x248
		       lock_acquire+0xac/0x1c8
		       process_one_work+0x2bc/0x730
		       worker_thread+0x62/0x420
		       kthread+0x138/0x150
		       __ret_from_fork+0x3c/0x58
		       ret_from_fork+0xa/0x40
		-&gt; #0 ((wq_completion)smc_tx_wq-00000000#2){+.+.}-{0:0}:
		       check_prev_add+0xd8/0xe88
		       validate_chain+0x70c/0xb20
		       __lock_acquire+0x58e/0xbd8
		       lock_acquire.part.0+0xe2/0x248
		       lock_acquire+0xac/0x1c8
		       __flush_workqueue+0xaa/0x4f0
		       drain_workqueue+0xaa/0x158
		       destroy_workqueue+0x44/0x2d8
		       smc_lgr_free+0x9e/0xf8 [smc]
		       process_one_work+0x30c/0x730
		       worker_thread+0x62/0x420
		       kthread+0x138/0x150
		       __ret_from_fork+0x3c/0x58
		       ret_from_fork+0xa/0x40
		other info that might help us debug this:
		Chain exists of:
		  (wq_completion)smc_tx_wq-00000000#2
	  	  --&gt; smc_client_lgr_pending
		  --&gt; (work_completion)(&amp;(&amp;lgr-&gt;free_work)-&gt;work)
		 Possible unsafe locking scenario:
		       CPU0                    CPU1
		       ----                    ----
		  lock((work_completion)(&amp;(&amp;lgr-&gt;free_work)-&gt;work));
		                   lock(smc_client_lgr_pending);
		                   lock((work_completion)
					(&amp;(&amp;lgr-&gt;free_work)-&gt;work));
		  lock((wq_completion)smc_tx_wq-00000000#2);
		 *** DEADLOCK ***
		2 locks held by kworker/3:0/176251:
		 #0: 0000000080183548
			((wq_completion)events){+.+.}-{0:0},
				at: process_one_work+0x232/0x730
		 #1: 0000037fffe97dc8
			((work_completion)
			 (&amp;(&amp;lgr-&gt;free_work)-&gt;work)){+.+.}-{0:0},
				at: process_one_work+0x232/0x730
		stack backtr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53233/">CVE-2023-53233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53233">CVE-2023-53233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249788">SUSE bug 1249788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53235" ref_url="https://www.suse.com/security/cve/CVE-2023-53235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tests: helpers: Avoid a driver uaf

when using __drm_kunit_helper_alloc_drm_device() the driver may be
dereferenced by device-managed resources up until the device is
freed, which is typically later than the kunit-managed resource code
frees it. Fix this by simply make the driver device-managed as well.

In short, the sequence leading to the UAF is as follows:

INIT:
Code allocates a struct device as a kunit-managed resource.
Code allocates a drm driver as a kunit-managed resource.
Code allocates a drm device as a device-managed resource.

EXIT:
Kunit resource cleanup frees the drm driver
Kunit resource cleanup puts the struct device, which starts a
      device-managed resource cleanup
device-managed cleanup calls drm_dev_put()
drm_dev_put() dereferences the (now freed) drm driver -&gt; Boom.

Related KASAN message:
[55272.551542] ==================================================================
[55272.551551] BUG: KASAN: slab-use-after-free in drm_dev_put.part.0+0xd4/0xe0 [drm]
[55272.551603] Read of size 8 at addr ffff888127502828 by task kunit_try_catch/10353

[55272.551612] CPU: 4 PID: 10353 Comm: kunit_try_catch Tainted: G     U           N 6.5.0-rc7+ #155
[55272.551620] Hardware name: ASUS System Product Name/PRIME B560M-A AC, BIOS 0403 01/26/2021
[55272.551626] Call Trace:
[55272.551629]  &lt;TASK&gt;
[55272.551633]  dump_stack_lvl+0x57/0x90
[55272.551639]  print_report+0xcf/0x630
[55272.551645]  ? _raw_spin_lock_irqsave+0x5f/0x70
[55272.551652]  ? drm_dev_put.part.0+0xd4/0xe0 [drm]
[55272.551694]  kasan_report+0xd7/0x110
[55272.551699]  ? drm_dev_put.part.0+0xd4/0xe0 [drm]
[55272.551742]  drm_dev_put.part.0+0xd4/0xe0 [drm]
[55272.551783]  devres_release_all+0x15d/0x1f0
[55272.551790]  ? __pfx_devres_release_all+0x10/0x10
[55272.551797]  device_unbind_cleanup+0x16/0x1a0
[55272.551802]  device_release_driver_internal+0x3e5/0x540
[55272.551808]  ? kobject_put+0x5d/0x4b0
[55272.551814]  bus_remove_device+0x1f1/0x3f0
[55272.551819]  device_del+0x342/0x910
[55272.551826]  ? __pfx_device_del+0x10/0x10
[55272.551830]  ? lock_release+0x339/0x5e0
[55272.551836]  ? kunit_remove_resource+0x128/0x290 [kunit]
[55272.551845]  ? __pfx_lock_release+0x10/0x10
[55272.551851]  platform_device_del.part.0+0x1f/0x1e0
[55272.551856]  ? _raw_spin_unlock_irqrestore+0x30/0x60
[55272.551863]  kunit_remove_resource+0x195/0x290 [kunit]
[55272.551871]  ? _raw_spin_unlock_irqrestore+0x30/0x60
[55272.551877]  kunit_cleanup+0x78/0x120 [kunit]
[55272.551885]  ? __kthread_parkme+0xc1/0x1f0
[55272.551891]  ? __pfx_kunit_try_run_case_cleanup+0x10/0x10 [kunit]
[55272.551900]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [kunit]
[55272.551909]  kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit]
[55272.551919]  kthread+0x2e7/0x3c0
[55272.551924]  ? __pfx_kthread+0x10/0x10
[55272.551929]  ret_from_fork+0x2d/0x70
[55272.551935]  ? __pfx_kthread+0x10/0x10
[55272.551940]  ret_from_fork_asm+0x1b/0x30
[55272.551948]  &lt;/TASK&gt;

[55272.551953] Allocated by task 10351:
[55272.551956]  kasan_save_stack+0x1c/0x40
[55272.551962]  kasan_set_track+0x21/0x30
[55272.551966]  __kasan_kmalloc+0x8b/0x90
[55272.551970]  __kmalloc+0x5e/0x160
[55272.551976]  kunit_kmalloc_array+0x1c/0x50 [kunit]
[55272.551984]  drm_exec_test_init+0xfa/0x2c0 [drm_exec_test]
[55272.551991]  kunit_try_run_case+0xdd/0x250 [kunit]
[55272.551999]  kunit_generic_run_threadfn_adapter+0x4a/0x90 [kunit]
[55272.552008]  kthread+0x2e7/0x3c0
[55272.552012]  ret_from_fork+0x2d/0x70
[55272.552017]  ret_from_fork_asm+0x1b/0x30

[55272.552024] Freed by task 10353:
[55272.552027]  kasan_save_stack+0x1c/0x40
[55272.552032]  kasan_set_track+0x21/0x30
[55272.552036]  kasan_save_free_info+0x27/0x40
[55272.552041]  __kasan_slab_free+0x106/0x180
[55272.552046]  slab_free_freelist_hook+0xb3/0x160
[55272.552051]  __kmem_cache_free+0xb2/0x290
[55272.552056]  kunit_remove_resource+0x195/0x290 [kunit]
[55272.552064]  kunit_cleanup+0x7
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53235/">CVE-2023-53235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53235">CVE-2023-53235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249785">SUSE bug 1249785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53237" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53237" ref_url="https://www.suse.com/security/cve/CVE-2023-53237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini

The gmc.ecc_irq is enabled by firmware per IFWI setting,
and the host driver is not privileged to enable/disable
the interrupt. So, it is meaningless to use the amdgpu_irq_put
function in gmc_v11_0_hw_fini, which also leads to the call
trace.

[  102.980303] Call Trace:
[  102.980303]  &lt;TASK&gt;
[  102.980304]  gmc_v11_0_hw_fini+0x54/0x90 [amdgpu]
[  102.980357]  gmc_v11_0_suspend+0xe/0x20 [amdgpu]
[  102.980409]  amdgpu_device_ip_suspend_phase2+0x240/0x460 [amdgpu]
[  102.980459]  amdgpu_device_ip_suspend+0x3d/0x80 [amdgpu]
[  102.980520]  amdgpu_device_pre_asic_reset+0xd9/0x490 [amdgpu]
[  102.980573]  amdgpu_device_gpu_recover.cold+0x548/0xce6 [amdgpu]
[  102.980687]  amdgpu_debugfs_reset_work+0x4c/0x70 [amdgpu]
[  102.980740]  process_one_work+0x21f/0x3f0
[  102.980741]  worker_thread+0x200/0x3e0
[  102.980742]  ? process_one_work+0x3f0/0x3f0
[  102.980743]  kthread+0xfd/0x130
[  102.980743]  ? kthread_complete_and_exit+0x20/0x20
[  102.980744]  ret_from_fork+0x22/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53237/">CVE-2023-53237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53237">CVE-2023-53237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249782">SUSE bug 1249782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53241" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53241" ref_url="https://www.suse.com/security/cve/CVE-2023-53241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: call op_release, even when op_func returns an error

For ops with "trivial" replies, nfsd4_encode_operation will shortcut
most of the encoding work and skip to just marshalling up the status.
One of the things it skips is calling op_release. This could cause a
memory leak in the layoutget codepath if there is an error at an
inopportune time.

Have the compound processing engine always call op_release, even when
op_func sets an error in op-&gt;status. With this change, we also need
nfsd4_block_get_device_info_scsi to set the gd_device pointer to NULL
on error to avoid a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53241/">CVE-2023-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53241">CVE-2023-53241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249638">SUSE bug 1249638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53245</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53245" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53245" ref_url="https://www.suse.com/security/cve/CVE-2023-53245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: storvsc: Fix handling of virtual Fibre Channel timeouts

Hyper-V provides the ability to connect Fibre Channel LUNs to the host
system and present them in a guest VM as a SCSI device. I/O to the vFC
device is handled by the storvsc driver. The storvsc driver includes a
partial integration with the FC transport implemented in the generic
portion of the Linux SCSI subsystem so that FC attributes can be displayed
in /sys.  However, the partial integration means that some aspects of vFC
don't work properly. Unfortunately, a full and correct integration isn't
practical because of limitations in what Hyper-V provides to the guest.

In particular, in the context of Hyper-V storvsc, the FC transport timeout
function fc_eh_timed_out() causes a kernel panic because it can't find the
rport and dereferences a NULL pointer. The original patch that added the
call from storvsc_eh_timed_out() to fc_eh_timed_out() is faulty in this
regard.

In many cases a timeout is due to a transient condition, so the situation
can be improved by just continuing to wait like with other I/O requests
issued by storvsc, and avoiding the guaranteed panic. For a permanent
failure, continuing to wait may result in a hung thread instead of a panic,
which again may be better.

So fix the panic by removing the storvsc call to fc_eh_timed_out().  This
allows storvsc to keep waiting for a response.  The change has been tested
by users who experienced a panic in fc_eh_timed_out() due to transient
timeouts, and it solves their problem.

In the future we may want to deprecate the vFC functionality in storvsc
since it can't be fully fixed. But it has current users for whom it is
working well enough, so it should probably stay for a while longer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53245/">CVE-2023-53245 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53245">CVE-2023-53245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249641">SUSE bug 1249641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53246</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53246" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53246" ref_url="https://www.suse.com/security/cve/CVE-2023-53246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL

When compiled with CONFIG_CIFS_DFS_UPCALL disabled, cifs_dfs_d_automount
is NULL. cifs.ko logic for mapping CIFS_FATTR_DFS_REFERRAL attributes to
S_AUTOMOUNT and corresponding dentry flags is retained regardless of
CONFIG_CIFS_DFS_UPCALL, leading to a NULL pointer dereference in
VFS follow_automount() when traversing a DFS referral link:
  BUG: kernel NULL pointer dereference, address: 0000000000000000
  ...
  Call Trace:
   &lt;TASK&gt;
   __traverse_mounts+0xb5/0x220
   ? cifs_revalidate_mapping+0x65/0xc0 [cifs]
   step_into+0x195/0x610
   ? lookup_fast+0xe2/0xf0
   path_lookupat+0x64/0x140
   filename_lookup+0xc2/0x140
   ? __create_object+0x299/0x380
   ? kmem_cache_alloc+0x119/0x220
   ? user_path_at_empty+0x31/0x50
   user_path_at_empty+0x31/0x50
   __x64_sys_chdir+0x2a/0xd0
   ? exit_to_user_mode_prepare+0xca/0x100
   do_syscall_64+0x42/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc

This fix adds an inline cifs_dfs_d_automount() {return -EREMOTE} handler
when CONFIG_CIFS_DFS_UPCALL is disabled. An alternative would be to
avoid flagging S_AUTOMOUNT, etc. without CONFIG_CIFS_DFS_UPCALL. This
approach was chosen as it provides more control over the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53246/">CVE-2023-53246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53246">CVE-2023-53246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249867">SUSE bug 1249867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53248" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53248" ref_url="https://www.suse.com/security/cve/CVE-2023-53248" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: install stub fence into potential unused fence pointers

When using cpu to update page tables, vm update fences are unused.
Install stub fence into these fence pointers instead of NULL
to avoid NULL dereference when calling dma_fence_wait() on them.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53248/">CVE-2023-53248 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53248">CVE-2023-53248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249779">SUSE bug 1249779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53252" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53252" ref_url="https://www.suse.com/security/cve/CVE-2023-53252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync

hci_update_accept_list_sync iterates over hdev-&gt;pend_le_conns and
hdev-&gt;pend_le_reports, and waits for controller events in the loop body,
without holding hdev lock.

Meanwhile, these lists and the items may be modified e.g. by
le_scan_cleanup. This can invalidate the list cursor or any other item
in the list, resulting to invalid behavior (eg use-after-free).

Use RCU for the hci_conn_params action lists. Since the loop bodies in
hci_sync block and we cannot use RCU or hdev-&gt;lock for the whole loop,
copy list items first and then iterate on the copy. Only the flags field
is written from elsewhere, so READ_ONCE/WRITE_ONCE should guarantee we
read valid values.

Free params everywhere with hci_conn_params_free so the cleanup is
guaranteed to be done properly.

This fixes the following, which can be triggered e.g. by BlueZ new
mgmt-tester case "Add + Remove Device Nowait - Success", or by changing
hci_le_set_cig_params to always return false, and running iso-tester:

==================================================================
BUG: KASAN: slab-use-after-free in hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2536 net/bluetooth/hci_sync.c:2723 net/bluetooth/hci_sync.c:2841)
Read of size 8 at addr ffff888001265018 by task kworker/u3:0/32

Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
&lt;TASK&gt;
dump_stack_lvl (./arch/x86/include/asm/irqflags.h:134 lib/dump_stack.c:107)
print_report (mm/kasan/report.c:320 mm/kasan/report.c:430)
? __virt_addr_valid (./include/linux/mmzone.h:1915 ./include/linux/mmzone.h:2011 arch/x86/mm/physaddr.c:65)
? hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2536 net/bluetooth/hci_sync.c:2723 net/bluetooth/hci_sync.c:2841)
kasan_report (mm/kasan/report.c:538)
? hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2536 net/bluetooth/hci_sync.c:2723 net/bluetooth/hci_sync.c:2841)
hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2536 net/bluetooth/hci_sync.c:2723 net/bluetooth/hci_sync.c:2841)
? __pfx_hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2780)
? mutex_lock (kernel/locking/mutex.c:282)
? __pfx_mutex_lock (kernel/locking/mutex.c:282)
? __pfx_mutex_unlock (kernel/locking/mutex.c:538)
? __pfx_update_passive_scan_sync (net/bluetooth/hci_sync.c:2861)
hci_cmd_sync_work (net/bluetooth/hci_sync.c:306)
process_one_work (./arch/x86/include/asm/preempt.h:27 kernel/workqueue.c:2399)
worker_thread (./include/linux/list.h:292 kernel/workqueue.c:2538)
? __pfx_worker_thread (kernel/workqueue.c:2480)
kthread (kernel/kthread.c:376)
? __pfx_kthread (kernel/kthread.c:331)
ret_from_fork (arch/x86/entry/entry_64.S:314)
&lt;/TASK&gt;

Allocated by task 31:
kasan_save_stack (mm/kasan/common.c:46)
kasan_set_track (mm/kasan/common.c:52)
__kasan_kmalloc (mm/kasan/common.c:374 mm/kasan/common.c:383)
hci_conn_params_add (./include/linux/slab.h:580 ./include/linux/slab.h:720 net/bluetooth/hci_core.c:2277)
hci_connect_le_scan (net/bluetooth/hci_conn.c:1419 net/bluetooth/hci_conn.c:1589)
hci_connect_cis (net/bluetooth/hci_conn.c:2266)
iso_connect_cis (net/bluetooth/iso.c:390)
iso_sock_connect (net/bluetooth/iso.c:899)
__sys_connect (net/socket.c:2003 net/socket.c:2020)
__x64_sys_connect (net/socket.c:2027)
do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)

Freed by task 15:
kasan_save_stack (mm/kasan/common.c:46)
kasan_set_track (mm/kasan/common.c:52)
kasan_save_free_info (mm/kasan/generic.c:523)
__kasan_slab_free (mm/kasan/common.c:238 mm/kasan/common.c:200 mm/kasan/common.c:244)
__kmem_cache_free (mm/slub.c:1807 mm/slub.c:3787 mm/slub.c:3800)
hci_conn_params_del (net/bluetooth/hci_core.c:2323)
le_scan_cleanup (net/bluetooth/hci_conn.c:202)
process_one_work (./arch/x86/include/asm/preempt.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53252/">CVE-2023-53252 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53252">CVE-2023-53252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249756">SUSE bug 1249756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254406">SUSE bug 1254406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53254" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53254" ref_url="https://www.suse.com/security/cve/CVE-2023-53254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cacheinfo: Fix shared_cpu_map to handle shared caches at different levels

The cacheinfo sets up the shared_cpu_map by checking whether the caches
with the same index are shared between CPUs. However, this will trigger
slab-out-of-bounds access if the CPUs do not have the same cache hierarchy.
Another problem is the mismatched shared_cpu_map when the shared cache does
not have the same index between CPUs.

CPU0	I	D	L3
index	0	1	2	x
	^	^	^	^
index	0	1	2	3
CPU1	I	D	L2	L3

This patch checks each cache is shared with all caches on other CPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53254/">CVE-2023-53254 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53254">CVE-2023-53254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249871">SUSE bug 1249871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250731">SUSE bug 1250731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53256</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53256" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53256" ref_url="https://www.suse.com/security/cve/CVE-2023-53256" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_ffa: Fix FFA device names for logical partitions

Each physical partition can provide multiple services each with UUID.
Each such service can be presented as logical partition with a unique
combination of VM ID and UUID. The number of distinct UUID in a system
will be less than or equal to the number of logical partitions.

However, currently it fails to register more than one logical partition
or service within a physical partition as the device name contains only
VM ID while both VM ID and UUID are maintained in the partition information.
The kernel complains with the below message:

  | sysfs: cannot create duplicate filename '/devices/arm-ffa-8001'
  | CPU: 1 PID: 1 Comm: swapper/0 Not tainted 6.3.0-rc7 #8
  | Hardware name: FVP Base RevC (DT)
  | Call trace:
  |  dump_backtrace+0xf8/0x118
  |  show_stack+0x18/0x24
  |  dump_stack_lvl+0x50/0x68
  |  dump_stack+0x18/0x24
  |  sysfs_create_dir_ns+0xe0/0x13c
  |  kobject_add_internal+0x220/0x3d4
  |  kobject_add+0x94/0x100
  |  device_add+0x144/0x5d8
  |  device_register+0x20/0x30
  |  ffa_device_register+0x88/0xd8
  |  ffa_setup_partitions+0x108/0x1b8
  |  ffa_init+0x2ec/0x3a4
  |  do_one_initcall+0xcc/0x240
  |  do_initcall_level+0x8c/0xac
  |  do_initcalls+0x54/0x94
  |  do_basic_setup+0x1c/0x28
  |  kernel_init_freeable+0x100/0x16c
  |  kernel_init+0x20/0x1a0
  |  ret_from_fork+0x10/0x20
  | kobject_add_internal failed for arm-ffa-8001 with -EEXIST, don't try to
  | register things with the same name in the same directory.
  | arm_ffa arm-ffa: unable to register device arm-ffa-8001 err=-17
  | ARM FF-A: ffa_setup_partitions: failed to register partition ID 0x8001

By virtue of being random enough to avoid collisions when generated in a
distributed system, there is no way to compress UUID keys to the number
of bits required to identify each. We can eliminate '-' in the name but
it is not worth eliminating 4 bytes and add unnecessary logic for doing
that. Also v1.0 doesn't provide the UUID of the partitions which makes
it hard to use the same for the device name.

So to keep it simple, let us alloc an ID using ida_alloc() and append the
same to "arm-ffa" to make up a unique device name. Also stash the id value
in ffa_dev to help freeing the ID later when the device is destroyed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53256/">CVE-2023-53256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53256">CVE-2023-53256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249765">SUSE bug 1249765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53258" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53258" ref_url="https://www.suse.com/security/cve/CVE-2023-53258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix possible underflow for displays with large vblank

[Why]
Underflow observed when using a display with a large vblank region
and low refresh rate

[How]
Simplify calculation of vblank_nom

Increase value for VBlankNomDefaultUS to 800us
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53258/">CVE-2023-53258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53258">CVE-2023-53258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249780">SUSE bug 1249780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53260</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53260" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53260" ref_url="https://www.suse.com/security/cve/CVE-2023-53260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix null pointer dereference in ovl_permission()

Following process:
          P1                     P2
 path_lookupat
  link_path_walk
   inode_permission
    ovl_permission
      ovl_i_path_real(inode, &amp;realpath)
        path-&gt;dentry = ovl_i_dentry_upper(inode)
                          drop_cache
			   __dentry_kill(ovl_dentry)
		            iput(ovl_inode)
		             ovl_destroy_inode(ovl_inode)
		              dput(oi-&gt;__upperdentry)
		               dentry_kill(upperdentry)
		                dentry_unlink_inode
				 upperdentry-&gt;d_inode = NULL
      realinode = d_inode(realpath.dentry) // return NULL
      inode_permission(realinode)
       inode-&gt;i_sb  // NULL pointer dereference
, will trigger an null pointer dereference at realinode:
  [  335.664979] BUG: kernel NULL pointer dereference,
                 address: 0000000000000002
  [  335.668032] CPU: 0 PID: 2592 Comm: ls Not tainted 6.3.0
  [  335.669956] RIP: 0010:inode_permission+0x33/0x2c0
  [  335.678939] Call Trace:
  [  335.679165]  &lt;TASK&gt;
  [  335.679371]  ovl_permission+0xde/0x320
  [  335.679723]  inode_permission+0x15e/0x2c0
  [  335.680090]  link_path_walk+0x115/0x550
  [  335.680771]  path_lookupat.isra.0+0xb2/0x200
  [  335.681170]  filename_lookup+0xda/0x240
  [  335.681922]  vfs_statx+0xa6/0x1f0
  [  335.682233]  vfs_fstatat+0x7b/0xb0

Fetch a reproducer in [Link].

Use the helper ovl_i_path_realinode() to get realinode and then do
non-nullptr checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53260/">CVE-2023-53260 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53260">CVE-2023-53260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249768">SUSE bug 1249768</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53261</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53261" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53261" ref_url="https://www.suse.com/security/cve/CVE-2023-53261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: Fix memory leak in acpi_buffer-&gt;pointer

There are memory leaks reported by kmemleak:
...
unreferenced object 0xffff00213c141000 (size 1024):
  comm "systemd-udevd", pid 2123, jiffies 4294909467 (age 6062.160s)
  hex dump (first 32 bytes):
    04 00 00 00 02 00 00 00 18 10 14 3c 21 00 ff ff  ...........&lt;!...
    00 00 00 00 00 00 00 00 03 00 00 00 10 00 00 00  ................
  backtrace:
    [&lt;000000004b7c9001&gt;] __kmem_cache_alloc_node+0x2f8/0x348
    [&lt;00000000b0fc7ceb&gt;] __kmalloc+0x58/0x108
    [&lt;0000000064ff4695&gt;] acpi_os_allocate+0x2c/0x68
    [&lt;000000007d57d116&gt;] acpi_ut_initialize_buffer+0x54/0xe0
    [&lt;0000000024583908&gt;] acpi_evaluate_object+0x388/0x438
    [&lt;0000000017b2e72b&gt;] acpi_evaluate_object_typed+0xe8/0x240
    [&lt;000000005df0eac2&gt;] coresight_get_platform_data+0x1b4/0x988 [coresight]
...

The ACPI buffer memory (buf.pointer) should be freed. But the buffer
is also used after returning from acpi_get_dsd_graph().
Move the temporary variables buf to acpi_coresight_parse_graph(),
and free it before the function return to prevent memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53261/">CVE-2023-53261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53261">CVE-2023-53261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249770">SUSE bug 1249770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53263" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53263" ref_url="https://www.suse.com/security/cve/CVE-2023-53263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/disp: fix use-after-free in error handling of nouveau_connector_create

We can't simply free the connector after calling drm_connector_init on it.
We need to clean up the drm side first.

It might not fix all regressions from commit 2b5d1c29f6c4
("drm/nouveau/disp: PIOR DP uses GPIO for HPD, not PMGR AUX interrupts"),
but at least it fixes a memory corruption in error handling related to
that commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53263/">CVE-2023-53263 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53263">CVE-2023-53263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249861">SUSE bug 1249861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253190">SUSE bug 1253190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53268</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53268" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53268" ref_url="https://www.suse.com/security/cve/CVE-2023-53268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: fsl_mqs: move of_node_put() to the correct location

of_node_put() should have been done directly after
mqs_priv-&gt;regmap = syscon_node_to_regmap(gpr_np);
otherwise it creates a reference leak on the success path.

To fix this, of_node_put() is moved to the correct location, and change
all the gotos to direct returns.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53268/">CVE-2023-53268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53268">CVE-2023-53268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249914">SUSE bug 1249914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53270</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53270" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53270" ref_url="https://www.suse.com/security/cve/CVE-2023-53270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix i_disksize exceeding i_size problem in paritally written case

It is possible for i_disksize can exceed i_size, triggering a warning.

generic_perform_write
 copied = iov_iter_copy_from_user_atomic(len) // copied &lt; len
 ext4_da_write_end
 | ext4_update_i_disksize
 |  new_i_size = pos + copied;
 |  WRITE_ONCE(EXT4_I(inode)-&gt;i_disksize, newsize) // update i_disksize
 | generic_write_end
 |  copied = block_write_end(copied, len) // copied = 0
 |   if (unlikely(copied &lt; len))
 |    if (!PageUptodate(page))
 |     copied = 0;
 |  if (pos + copied &gt; inode-&gt;i_size) // return false
 if (unlikely(copied == 0))
  goto again;
 if (unlikely(iov_iter_fault_in_readable(i, bytes))) {
  status = -EFAULT;
  break;
 }

We get i_disksize greater than i_size here, which could trigger WARNING
check 'i_size_read(inode) &lt; EXT4_I(inode)-&gt;i_disksize' while doing dio:

ext4_dio_write_iter
 iomap_dio_rw
  __iomap_dio_rw // return err, length is not aligned to 512
 ext4_handle_inode_extension
  WARN_ON_ONCE(i_size_read(inode) &lt; EXT4_I(inode)-&gt;i_disksize) // Oops

 WARNING: CPU: 2 PID: 2609 at fs/ext4/file.c:319
 CPU: 2 PID: 2609 Comm: aa Not tainted 6.3.0-rc2
 RIP: 0010:ext4_file_write_iter+0xbc7
 Call Trace:
  vfs_write+0x3b1
  ksys_write+0x77
  do_syscall_64+0x39

Fix it by updating 'copied' value before updating i_disksize just like
ext4_write_inline_data_end() does.

A reproducer can be found in the buganizer link below.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53270/">CVE-2023-53270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53270">CVE-2023-53270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249872">SUSE bug 1249872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53273" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53273" ref_url="https://www.suse.com/security/cve/CVE-2023-53273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: vmbus: Check for channel allocation before looking up relids

relid2channel() assumes vmbus channel array to be allocated when called.
However, in cases such as kdump/kexec, not all relids will be reset by the host.
When the second kernel boots and if the guest receives a vmbus interrupt during
vmbus driver initialization before vmbus_connect() is called, before it finishes,
or if it fails, the vmbus interrupt service routine is called which in turn calls
relid2channel() and can cause a null pointer dereference.

Print a warning and error out in relid2channel() for a channel id that's invalid
in the second kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53273/">CVE-2023-53273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53273">CVE-2023-53273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249930">SUSE bug 1249930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53275" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53275" ref_url="https://www.suse.com/security/cve/CVE-2023-53275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: fix a possible null-pointer dereference due to data race in snd_hdac_regmap_sync()

The variable codec-&gt;regmap is often protected by the lock
codec-&gt;regmap_lock when is accessed. However, it is accessed without
holding the lock when is accessed in snd_hdac_regmap_sync():

  if (codec-&gt;regmap)

In my opinion, this may be a harmful race, because if codec-&gt;regmap is
set to NULL right after the condition is checked, a null-pointer
dereference can occur in the called function regcache_sync():

  map-&gt;lock(map-&gt;lock_arg); --&gt; Line 360 in drivers/base/regmap/regcache.c

To fix this possible null-pointer dereference caused by data race, the
mutex_lock coverage is extended to protect the if statement as well as the
function call to regcache_sync().

[ Note: the lack of the regmap_lock itself is harmless for the current
  codec driver implementations, as snd_hdac_regmap_sync() is only for
  PM runtime resume that is prohibited during the codec probe.
  But the change makes the whole code more consistent, so it's merged
  as is -- tiwai ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53275/">CVE-2023-53275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53275">CVE-2023-53275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250459">SUSE bug 1250459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53280</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53280" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53280" ref_url="https://www.suse.com/security/cve/CVE-2023-53280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Remove unused nvme_ls_waitq wait queue

System crash when qla2x00_start_sp(sp) returns error code EGAIN and wake_up
gets called for uninitialized wait queue sp-&gt;nvme_ls_waitq.

    qla2xxx [0000:37:00.1]-2121:5: Returning existing qpair of ffff8ae2c0513400 for idx=0
    qla2xxx [0000:37:00.1]-700e:5: qla2x00_start_sp failed = 11
    BUG: unable to handle kernel NULL pointer dereference at 0000000000000000
    PGD 0 P4D 0
    Oops: 0000 [#1] SMP NOPTI
    Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021
    Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]
    RIP: 0010:__wake_up_common+0x4c/0x190
    RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086
    RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000
    RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320
    RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8
    R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20
    R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000
    FS:  0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000
    CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0
    DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
    PKRU: 55555554
    Call Trace:
     __wake_up_common_lock+0x7c/0xc0
     qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]
     ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]
     ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]
     ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]

Remove unused nvme_ls_waitq wait queue. nvme_ls_waitq logic was removed
previously in the commits tagged Fixed: below.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53280/">CVE-2023-53280 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53280">CVE-2023-53280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249938">SUSE bug 1249938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53285" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53285" ref_url="https://www.suse.com/security/cve/CVE-2023-53285" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add bounds checking in get_max_inline_xattr_value_size()

Normally the extended attributes in the inode body would have been
checked when the inode is first opened, but if someone is writing to
the block device while the file system is mounted, it's possible for
the inode table to get corrupted.  Add bounds checking to avoid
reading beyond the end of allocated memory if this happens.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53285/">CVE-2023-53285 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53285">CVE-2023-53285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249855">SUSE bug 1249855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250195">SUSE bug 1250195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53287" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53287" ref_url="https://www.suse.com/security/cve/CVE-2023-53287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: Put the cdns set active part outside the spin lock

The device may be scheduled during the resume process,
so this cannot appear in atomic operations. Since
pm_runtime_set_active will resume suppliers, put set
active outside the spin lock, which is only used to
protect the struct cdns data structure, otherwise the
kernel will report the following warning:

  BUG: sleeping function called from invalid context at drivers/base/power/runtime.c:1163
  in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 651, name: sh
  preempt_count: 1, expected: 0
  RCU nest depth: 0, expected: 0
  CPU: 0 PID: 651 Comm: sh Tainted: G        WC         6.1.20 #1
  Hardware name: Freescale i.MX8QM MEK (DT)
  Call trace:
    dump_backtrace.part.0+0xe0/0xf0
    show_stack+0x18/0x30
    dump_stack_lvl+0x64/0x80
    dump_stack+0x1c/0x38
    __might_resched+0x1fc/0x240
    __might_sleep+0x68/0xc0
    __pm_runtime_resume+0x9c/0xe0
    rpm_get_suppliers+0x68/0x1b0
    __pm_runtime_set_status+0x298/0x560
    cdns_resume+0xb0/0x1c0
    cdns3_controller_resume.isra.0+0x1e0/0x250
    cdns3_plat_resume+0x28/0x40
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53287/">CVE-2023-53287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53287">CVE-2023-53287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250089">SUSE bug 1250089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53288</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53288" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53288" ref_url="https://www.suse.com/security/cve/CVE-2023-53288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fix memory leak in drm_client_modeset_probe

When a new mode is set to modeset-&gt;mode, the previous mode should be freed.
This fixes the following kmemleak report:

drm_mode_duplicate+0x45/0x220 [drm]
drm_client_modeset_probe+0x944/0xf50 [drm]
__drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]
drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]
drm_client_register+0x169/0x240 [drm]
ast_pci_probe+0x142/0x190 [ast]
local_pci_probe+0xdc/0x180
work_for_cpu_fn+0x4e/0xa0
process_one_work+0x8b7/0x1540
worker_thread+0x70a/0xed0
kthread+0x29f/0x340
ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53288/">CVE-2023-53288 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53288">CVE-2023-53288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250058">SUSE bug 1250058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53290</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53290" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53290" ref_url="https://www.suse.com/security/cve/CVE-2023-53290" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

samples/bpf: Fix fout leak in hbm's run_bpf_prog

Fix fout being fopen'ed but then not subsequently fclose'd. In the affected
branch, fout is otherwise going out of scope.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53290/">CVE-2023-53290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53290">CVE-2023-53290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250326">SUSE bug 1250326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53292</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53292" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53292" ref_url="https://www.suse.com/security/cve/CVE-2023-53292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: fix NULL dereference on q-&gt;elevator in blk_mq_elv_switch_none

After grabbing q-&gt;sysfs_lock, q-&gt;elevator may become NULL because of
elevator switch.

Fix the NULL dereference on q-&gt;elevator by checking it with lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53292/">CVE-2023-53292 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53292">CVE-2023-53292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250163">SUSE bug 1250163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53293</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53293" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53293" ref_url="https://www.suse.com/security/cve/CVE-2023-53293" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53293/">CVE-2023-53293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53293">CVE-2023-53293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250172">SUSE bug 1250172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53296</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53296" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53296" ref_url="https://www.suse.com/security/cve/CVE-2023-53296" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: check send stream number after wait_for_sndbuf

This patch fixes a corner case where the asoc out stream count may change
after wait_for_sndbuf.

When the main thread in the client starts a connection, if its out stream
count is set to N while the in stream count in the server is set to N - 2,
another thread in the client keeps sending the msgs with stream number
N - 1, and waits for sndbuf before processing INIT_ACK.

However, after processing INIT_ACK, the out stream count in the client is
shrunk to N - 2, the same to the in stream count in the server. The crash
occurs when the thread waiting for sndbuf is awake and sends the msg in a
non-existing stream(N - 1), the call trace is as below:

  KASAN: null-ptr-deref in range [0x0000000000000038-0x000000000000003f]
  Call Trace:
   &lt;TASK&gt;
   sctp_cmd_send_msg net/sctp/sm_sideeffect.c:1114 [inline]
   sctp_cmd_interpreter net/sctp/sm_sideeffect.c:1777 [inline]
   sctp_side_effects net/sctp/sm_sideeffect.c:1199 [inline]
   sctp_do_sm+0x197d/0x5310 net/sctp/sm_sideeffect.c:1170
   sctp_primitive_SEND+0x9f/0xc0 net/sctp/primitive.c:163
   sctp_sendmsg_to_asoc+0x10eb/0x1a30 net/sctp/socket.c:1868
   sctp_sendmsg+0x8d4/0x1d90 net/sctp/socket.c:2026
   inet_sendmsg+0x9d/0xe0 net/ipv4/af_inet.c:825
   sock_sendmsg_nosec net/socket.c:722 [inline]
   sock_sendmsg+0xde/0x190 net/socket.c:745

The fix is to add an unlikely check for the send stream number after the
thread wakes up from the wait_for_sndbuf.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53296/">CVE-2023-53296 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53296">CVE-2023-53296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249943">SUSE bug 1249943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53297</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53297" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53297" ref_url="https://www.suse.com/security/cve/CVE-2023-53297" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: fix "bad unlock balance" in l2cap_disconnect_rsp

conn-&gt;chan_lock isn't acquired before l2cap_get_chan_by_scid,
if l2cap_get_chan_by_scid returns NULL, then 'bad unlock balance'
is triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53297/">CVE-2023-53297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53297">CVE-2023-53297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250322">SUSE bug 1250322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250728">SUSE bug 1250728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53299</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53299" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53299" ref_url="https://www.suse.com/security/cve/CVE-2023-53299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix leak of 'r10bio-&gt;remaining' for recovery

raid10_sync_request() will add 'r10bio-&gt;remaining' for both rdev and
replacement rdev. However, if the read io fails, recovery_request_write()
returns without issuing the write io, in this case, end_sync_request()
is only called once and 'remaining' is leaked, cause an io hang.

Fix the problem by decreasing 'remaining' according to if 'bio' and
'repl_bio' is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53299/">CVE-2023-53299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53299">CVE-2023-53299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249927">SUSE bug 1249927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53304" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53304" ref_url="https://www.suse.com/security/cve/CVE-2023-53304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_rbtree: fix overlap expiration walk

The lazy gc on insert that should remove timed-out entries fails to release
the other half of the interval, if any.

Can be reproduced with tests/shell/testcases/sets/0044interval_overlap_0
in nftables.git and kmemleak enabled kernel.

Second bug is the use of rbe_prev vs. prev pointer.
If rbe_prev() returns NULL after at least one iteration, rbe_prev points
to element that is not an end interval, hence it should not be removed.

Lastly, check the genmask of the end interval if this is active in the
current generation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53304/">CVE-2023-53304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53304">CVE-2023-53304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249923">SUSE bug 1249923</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53309</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53309" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53309" ref_url="https://www.suse.com/security/cve/CVE-2023-53309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix integer overflow in radeon_cs_parser_init

The type of size is unsigned, if size is 0x40000000, there will be an
integer overflow, size will be zero after size *= sizeof(uint32_t),
will cause uninitialized memory to be referenced later
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53309/">CVE-2023-53309 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53309">CVE-2023-53309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250055">SUSE bug 1250055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53317</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53317" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53317" ref_url="https://www.suse.com/security/cve/CVE-2023-53317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix WARNING in mb_find_extent

Syzbot found the following issue:

EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support!
EXT4-fs (loop0): orphan cleanup on readonly fs
------------[ cut here ]------------
WARNING: CPU: 1 PID: 5067 at fs/ext4/mballoc.c:1869 mb_find_extent+0x8a1/0xe30
Modules linked in:
CPU: 1 PID: 5067 Comm: syz-executor307 Not tainted 6.2.0-rc1-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
RIP: 0010:mb_find_extent+0x8a1/0xe30 fs/ext4/mballoc.c:1869
RSP: 0018:ffffc90003c9e098 EFLAGS: 00010293
RAX: ffffffff82405731 RBX: 0000000000000041 RCX: ffff8880783457c0
RDX: 0000000000000000 RSI: 0000000000000041 RDI: 0000000000000040
RBP: 0000000000000040 R08: ffffffff82405723 R09: ffffed10053c9402
R10: ffffed10053c9402 R11: 1ffff110053c9401 R12: 0000000000000000
R13: ffffc90003c9e538 R14: dffffc0000000000 R15: ffffc90003c9e2cc
FS:  0000555556665300(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000056312f6796f8 CR3: 0000000022437000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ext4_mb_complex_scan_group+0x353/0x1100 fs/ext4/mballoc.c:2307
 ext4_mb_regular_allocator+0x1533/0x3860 fs/ext4/mballoc.c:2735
 ext4_mb_new_blocks+0xddf/0x3db0 fs/ext4/mballoc.c:5605
 ext4_ext_map_blocks+0x1868/0x6880 fs/ext4/extents.c:4286
 ext4_map_blocks+0xa49/0x1cc0 fs/ext4/inode.c:651
 ext4_getblk+0x1b9/0x770 fs/ext4/inode.c:864
 ext4_bread+0x2a/0x170 fs/ext4/inode.c:920
 ext4_quota_write+0x225/0x570 fs/ext4/super.c:7105
 write_blk fs/quota/quota_tree.c:64 [inline]
 get_free_dqblk+0x34a/0x6d0 fs/quota/quota_tree.c:130
 do_insert_tree+0x26b/0x1aa0 fs/quota/quota_tree.c:340
 do_insert_tree+0x722/0x1aa0 fs/quota/quota_tree.c:375
 do_insert_tree+0x722/0x1aa0 fs/quota/quota_tree.c:375
 do_insert_tree+0x722/0x1aa0 fs/quota/quota_tree.c:375
 dq_insert_tree fs/quota/quota_tree.c:401 [inline]
 qtree_write_dquot+0x3b6/0x530 fs/quota/quota_tree.c:420
 v2_write_dquot+0x11b/0x190 fs/quota/quota_v2.c:358
 dquot_acquire+0x348/0x670 fs/quota/dquot.c:444
 ext4_acquire_dquot+0x2dc/0x400 fs/ext4/super.c:6740
 dqget+0x999/0xdc0 fs/quota/dquot.c:914
 __dquot_initialize+0x3d0/0xcf0 fs/quota/dquot.c:1492
 ext4_process_orphan+0x57/0x2d0 fs/ext4/orphan.c:329
 ext4_orphan_cleanup+0xb60/0x1340 fs/ext4/orphan.c:474
 __ext4_fill_super fs/ext4/super.c:5516 [inline]
 ext4_fill_super+0x81cd/0x8700 fs/ext4/super.c:5644
 get_tree_bdev+0x400/0x620 fs/super.c:1282
 vfs_get_tree+0x88/0x270 fs/super.c:1489
 do_new_mount+0x289/0xad0 fs/namespace.c:3145
 do_mount fs/namespace.c:3488 [inline]
 __do_sys_mount fs/namespace.c:3697 [inline]
 __se_sys_mount+0x2d3/0x3c0 fs/namespace.c:3674
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Add some debug information:
mb_find_extent: mb_find_extent block=41, order=0 needed=64 next=0 ex=0/41/1@3735929054 64 64 7
block_bitmap: ff 3f 0c 00 fc 01 00 00 d2 3d 00 00 00 00 00 00 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Acctually, blocks per group is 64, but block bitmap indicate at least has
128 blocks. Now, ext4_validate_block_bitmap() didn't check invalid block's
bitmap if set.
To resolve above issue, add check like fsck "Padding at end of block bitmap is
not set".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53317/">CVE-2023-53317 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53317">CVE-2023-53317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250081">SUSE bug 1250081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250194">SUSE bug 1250194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53319" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53319" ref_url="https://www.suse.com/security/cve/CVE-2023-53319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Handle kvm_arm_init failure correctly in finalize_pkvm

Currently there is no synchronisation between finalize_pkvm() and
kvm_arm_init() initcalls. The finalize_pkvm() proceeds happily even if
kvm_arm_init() fails resulting in the following warning on all the CPUs
and eventually a HYP panic:

  | kvm [1]: IPA Size Limit: 48 bits
  | kvm [1]: Failed to init hyp memory protection
  | kvm [1]: error initializing Hyp mode: -22
  |
  | &lt;snip&gt;
  |
  | WARNING: CPU: 0 PID: 0 at arch/arm64/kvm/pkvm.c:226 _kvm_host_prot_finalize+0x30/0x50
  | Modules linked in:
  | CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.4.0 #237
  | Hardware name: FVP Base RevC (DT)
  | pstate: 634020c5 (nZCv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
  | pc : _kvm_host_prot_finalize+0x30/0x50
  | lr : __flush_smp_call_function_queue+0xd8/0x230
  |
  | Call trace:
  |  _kvm_host_prot_finalize+0x3c/0x50
  |  on_each_cpu_cond_mask+0x3c/0x6c
  |  pkvm_drop_host_privileges+0x4c/0x78
  |  finalize_pkvm+0x3c/0x5c
  |  do_one_initcall+0xcc/0x240
  |  do_initcall_level+0x8c/0xac
  |  do_initcalls+0x54/0x94
  |  do_basic_setup+0x1c/0x28
  |  kernel_init_freeable+0x100/0x16c
  |  kernel_init+0x20/0x1a0
  |  ret_from_fork+0x10/0x20
  | Failed to finalize Hyp protection: -22
  |     dtb=fvp-base-revc.dtb
  | kvm [95]: nVHE hyp BUG at: arch/arm64/kvm/hyp/nvhe/mem_protect.c:540!
  | kvm [95]: nVHE call trace:
  | kvm [95]:  [&lt;ffff800081052984&gt;] __kvm_nvhe_hyp_panic+0xac/0xf8
  | kvm [95]:  [&lt;ffff800081059644&gt;] __kvm_nvhe_handle_host_mem_abort+0x1a0/0x2ac
  | kvm [95]:  [&lt;ffff80008105511c&gt;] __kvm_nvhe_handle_trap+0x4c/0x160
  | kvm [95]:  [&lt;ffff8000810540fc&gt;] __kvm_nvhe___skip_pauth_save+0x4/0x4
  | kvm [95]: ---[ end nVHE call trace ]---
  | kvm [95]: Hyp Offset: 0xfffe8db00ffa0000
  | Kernel panic - not syncing: HYP panic:
  | PS:a34023c9 PC:0000f250710b973c ESR:00000000f2000800
  | FAR:ffff000800cb00d0 HPFAR:000000000880cb00 PAR:0000000000000000
  | VCPU:0000000000000000
  | CPU: 3 PID: 95 Comm: kworker/u16:2 Tainted: G        W          6.4.0 #237
  | Hardware name: FVP Base RevC (DT)
  | Workqueue: rpciod rpc_async_schedule
  | Call trace:
  |  dump_backtrace+0xec/0x108
  |  show_stack+0x18/0x2c
  |  dump_stack_lvl+0x50/0x68
  |  dump_stack+0x18/0x24
  |  panic+0x138/0x33c
  |  nvhe_hyp_panic_handler+0x100/0x184
  |  new_slab+0x23c/0x54c
  |  ___slab_alloc+0x3e4/0x770
  |  kmem_cache_alloc_node+0x1f0/0x278
  |  __alloc_skb+0xdc/0x294
  |  tcp_stream_alloc_skb+0x2c/0xf0
  |  tcp_sendmsg_locked+0x3d0/0xda4
  |  tcp_sendmsg+0x38/0x5c
  |  inet_sendmsg+0x44/0x60
  |  sock_sendmsg+0x1c/0x34
  |  xprt_sock_sendmsg+0xdc/0x274
  |  xs_tcp_send_request+0x1ac/0x28c
  |  xprt_transmit+0xcc/0x300
  |  call_transmit+0x78/0x90
  |  __rpc_execute+0x114/0x3d8
  |  rpc_async_schedule+0x28/0x48
  |  process_one_work+0x1d8/0x314
  |  worker_thread+0x248/0x474
  |  kthread+0xfc/0x184
  |  ret_from_fork+0x10/0x20
  | SMP: stopping secondary CPUs
  | Kernel Offset: 0x57c5cb460000 from 0xffff800080000000
  | PHYS_OFFSET: 0x80000000
  | CPU features: 0x00000000,1035b7a3,ccfe773f
  | Memory Limit: none
  | ---[ end Kernel panic - not syncing: HYP panic:
  | PS:a34023c9 PC:0000f250710b973c ESR:00000000f2000800
  | FAR:ffff000800cb00d0 HPFAR:000000000880cb00 PAR:0000000000000000
  | VCPU:0000000000000000 ]---

Fix it by checking for the successfull initialisation of kvm_arm_init()
in finalize_pkvm() before proceeding any futher.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53319/">CVE-2023-53319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53319">CVE-2023-53319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250067">SUSE bug 1250067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53320</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53320" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53320" ref_url="https://www.suse.com/security/cve/CVE-2023-53320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix issues in mpi3mr_get_all_tgt_info()

The function mpi3mr_get_all_tgt_info() has four issues:

1) It calculates valid entry length in alltgt_info assuming the header part
   of the struct mpi3mr_device_map_info would equal to sizeof(u32).  The
   correct size is sizeof(u64).

2) When it calculates the valid entry length kern_entrylen, it excludes one
   entry by subtracting 1 from num_devices.

3) It copies num_device by calling memcpy(). Substitution is enough.

4) It does not specify the calculated length to sg_copy_from_buffer().
   Instead, it specifies the payload length which is larger than the
   alltgt_info size. It causes "BUG: KASAN: slab-out-of-bounds".

Fix the issues by using the correct header size, removing the subtraction
from num_devices, replacing the memcpy() with substitution and specifying
the correct length to sg_copy_from_buffer().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53320/">CVE-2023-53320 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53320">CVE-2023-53320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250068">SUSE bug 1250068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53321" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53321" ref_url="https://www.suse.com/security/cve/CVE-2023-53321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211_hwsim: drop short frames

While technically some control frames like ACK are shorter and
end after Address 1, such frames shouldn't be forwarded through
wmediumd or similar userspace, so require the full 3-address
header to avoid accessing invalid memory if shorter frames are
passed in.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53321/">CVE-2023-53321 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53321">CVE-2023-53321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250313">SUSE bug 1250313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250314">SUSE bug 1250314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53322" ref_url="https://www.suse.com/security/cve/CVE-2023-53322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Wait for io return on terminate rport

System crash due to use after free.
Current code allows terminate_rport_io to exit before making
sure all IOs has returned. For FCP-2 device, IO's can hang
on in HW because driver has not tear down the session in FW at
first sign of cable pull. When dev_loss_tmo timer pops,
terminate_rport_io is called and upper layer is about to
free various resources. Terminate_rport_io trigger qla to do
the final cleanup, but the cleanup might not be fast enough where it
leave qla still holding on to the same resource.

Wait for IO's to return to upper layer before resources are freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53322/">CVE-2023-53322 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53322">CVE-2023-53322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250323">SUSE bug 1250323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53331</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53331" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53331" ref_url="https://www.suse.com/security/cve/CVE-2023-53331" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pstore/ram: Check start of empty przs during init

After commit 30696378f68a ("pstore/ram: Do not treat empty buffers as
valid"), initialization would assume a prz was valid after seeing that
the buffer_size is zero (regardless of the buffer start position). This
unchecked start value means it could be outside the bounds of the buffer,
leading to future access panics when written to:

 sysdump_panic_event+0x3b4/0x5b8
 atomic_notifier_call_chain+0x54/0x90
 panic+0x1c8/0x42c
 die+0x29c/0x2a8
 die_kernel_fault+0x68/0x78
 __do_kernel_fault+0x1c4/0x1e0
 do_bad_area+0x40/0x100
 do_translation_fault+0x68/0x80
 do_mem_abort+0x68/0xf8
 el1_da+0x1c/0xc0
 __raw_writeb+0x38/0x174
 __memcpy_toio+0x40/0xac
 persistent_ram_update+0x44/0x12c
 persistent_ram_write+0x1a8/0x1b8
 ramoops_pstore_write+0x198/0x1e8
 pstore_console_write+0x94/0xe0
 ...

To avoid this, also check if the prz start is 0 during the initialization
phase. If not, the next prz sanity check case will discover it (start &gt;
size) and zap the buffer back to a sane state.

[kees: update commit log with backtrace and clarifications]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53331/">CVE-2023-53331 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53331">CVE-2023-53331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249950">SUSE bug 1249950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024258" comment="kernel-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024259" comment="kernel-abi-stablelists-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024260" comment="kernel-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024261" comment="kernel-cross-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024262" comment="kernel-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024263" comment="kernel-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024266" comment="kernel-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024267" comment="kernel-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024268" comment="kernel-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024269" comment="kernel-debug-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024272" comment="kernel-doc-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024273" comment="kernel-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024274" comment="kernel-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024275" comment="kernel-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024276" comment="kernel-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024277" comment="kernel-rt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024278" comment="kernel-rt-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024279" comment="kernel-rt-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024280" comment="kernel-rt-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024282" comment="kernel-rt-debug-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024283" comment="kernel-rt-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024284" comment="kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024285" comment="kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024287" comment="kernel-rt-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024288" comment="kernel-rt-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024289" comment="kernel-rt-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024290" comment="kernel-rt-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024291" comment="kernel-tools-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024292" comment="kernel-tools-libs-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024294" comment="kernel-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024295" comment="kernel-uki-virt-addons-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024296" comment="libperf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024297" comment="perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024298" comment="python3-perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024299" comment="rtla-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024300" comment="rv-5.14.0-570.58.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53333</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53333" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53333" ref_url="https://www.suse.com/security/cve/CVE-2023-53333" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: dccp: copy entire header to stack buffer, not just basic one

Eric Dumazet says:
  nf_conntrack_dccp_packet() has an unique:

  dh = skb_header_pointer(skb, dataoff, sizeof(_dh), &amp;_dh);

  And nothing more is 'pulled' from the packet, depending on the content.
  dh-&gt;dccph_doff, and/or dh-&gt;dccph_x ...)
  So dccp_ack_seq() is happily reading stuff past the _dh buffer.

BUG: KASAN: stack-out-of-bounds in nf_conntrack_dccp_packet+0x1134/0x11c0
Read of size 4 at addr ffff000128f66e0c by task syz-executor.2/29371
[..]

Fix this by increasing the stack buffer to also include room for
the extra sequence numbers and all the known dccp packet type headers,
then pull again after the initial validation of the basic header.

While at it, mark packets invalid that lack 48bit sequence bit but
where RFC says the type MUST use them.

Compile tested only.

v2: first skb_header_pointer() now needs to adjust the size to
    only pull the generic header. (Eric)

Heads-up: I intend to remove dccp conntrack support later this year.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53333/">CVE-2023-53333 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53333">CVE-2023-53333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249949">SUSE bug 1249949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53334</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53334" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53334" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53334" ref_url="https://www.suse.com/security/cve/CVE-2023-53334" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: chipidea: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53334/">CVE-2023-53334 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53334">CVE-2023-53334 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250077">SUSE bug 1250077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53335</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53335" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53335" ref_url="https://www.suse.com/security/cve/CVE-2023-53335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cxgb4: Fix potential null-ptr-deref in pass_establish()

If get_ep_from_tid() fails to lookup non-NULL value for ep, ep is
dereferenced later regardless of whether it is empty.
This patch adds a simple sanity check to fix the issue.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53335/">CVE-2023-53335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53335">CVE-2023-53335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250072">SUSE bug 1250072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53338</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53338" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53338" ref_url="https://www.suse.com/security/cve/CVE-2023-53338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lwt: Fix return values of BPF xmit ops

BPF encap ops can return different types of positive values, such like
NET_RX_DROP, NET_XMIT_CN, NETDEV_TX_BUSY, and so on, from function
skb_do_redirect and bpf_lwt_xmit_reroute. At the xmit hook, such return
values would be treated implicitly as LWTUNNEL_XMIT_CONTINUE in
ip(6)_finish_output2. When this happens, skbs that have been freed would
continue to the neighbor subsystem, causing use-after-free bug and
kernel crashes.

To fix the incorrect behavior, skb_do_redirect return values can be
simply discarded, the same as tc-egress behavior. On the other hand,
bpf_lwt_xmit_reroute returns useful errors to local senders, e.g. PMTU
information. Thus convert its return values to avoid the conflict with
LWTUNNEL_XMIT_CONTINUE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53338/">CVE-2023-53338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53338">CVE-2023-53338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250074">SUSE bug 1250074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53343</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53343" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53343" ref_url="https://www.suse.com/security/cve/CVE-2023-53343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

icmp6: Fix null-ptr-deref of ip6_null_entry-&gt;rt6i_idev in icmp6_dev().

With some IPv6 Ext Hdr (RPL, SRv6, etc.), we can send a packet that
has the link-local address as src and dst IP and will be forwarded to
an external IP in the IPv6 Ext Hdr.

For example, the script below generates a packet whose src IP is the
link-local address and dst is updated to 11::.

  # for f in $(find /proc/sys/net/ -name *seg6_enabled*); do echo 1 &gt; $f; done
  # python3
  &gt;&gt;&gt; from socket import *
  &gt;&gt;&gt; from scapy.all import *
  &gt;&gt;&gt;
  &gt;&gt;&gt; SRC_ADDR = DST_ADDR = "fe80::5054:ff:fe12:3456"
  &gt;&gt;&gt;
  &gt;&gt;&gt; pkt = IPv6(src=SRC_ADDR, dst=DST_ADDR)
  &gt;&gt;&gt; pkt /= IPv6ExtHdrSegmentRouting(type=4, addresses=["11::", "22::"], segleft=1)
  &gt;&gt;&gt;
  &gt;&gt;&gt; sk = socket(AF_INET6, SOCK_RAW, IPPROTO_RAW)
  &gt;&gt;&gt; sk.sendto(bytes(pkt), (DST_ADDR, 0))

For such a packet, we call ip6_route_input() to look up a route for the
next destination in these three functions depending on the header type.

  * ipv6_rthdr_rcv()
  * ipv6_rpl_srh_rcv()
  * ipv6_srh_rcv()

If no route is found, ip6_null_entry is set to skb, and the following
dst_input(skb) calls ip6_pkt_drop().

Finally, in icmp6_dev(), we dereference skb_rt6_info(skb)-&gt;rt6i_idev-&gt;dev
as the input device is the loopback interface.  Then, we have to check if
skb_rt6_info(skb)-&gt;rt6i_idev is NULL or not to avoid NULL pointer deref
for ip6_null_entry.

BUG: kernel NULL pointer dereference, address: 0000000000000000
 PF: supervisor read access in kernel mode
 PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 0 PID: 157 Comm: python3 Not tainted 6.4.0-11996-gb121d614371c #35
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:icmp6_send (net/ipv6/icmp.c:436 net/ipv6/icmp.c:503)
Code: fe ff ff 48 c7 40 30 c0 86 5d 83 e8 c6 44 1c 00 e9 c8 fc ff ff 49 8b 46 58 48 83 e0 fe 0f 84 4a fb ff ff 48 8b 80 d0 00 00 00 &lt;48&gt; 8b 00 44 8b 88 e0 00 00 00 e9 34 fb ff ff 4d 85 ed 0f 85 69 01
RSP: 0018:ffffc90000003c70 EFLAGS: 00000286
RAX: 0000000000000000 RBX: 0000000000000001 RCX: 00000000000000e0
RDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff888006d72a18
RBP: ffffc90000003d80 R08: 0000000000000000 R09: 0000000000000001
R10: ffffc90000003d98 R11: 0000000000000040 R12: ffff888006d72a10
R13: 0000000000000000 R14: ffff8880057fb800 R15: ffffffff835d86c0
FS:  00007f9dc72ee740(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000057b2000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
 &lt;IRQ&gt;
 ip6_pkt_drop (net/ipv6/route.c:4513)
 ipv6_rthdr_rcv (net/ipv6/exthdrs.c:640 net/ipv6/exthdrs.c:686)
 ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:437 (discriminator 5))
 ip6_input_finish (./include/linux/rcupdate.h:781 net/ipv6/ip6_input.c:483)
 __netif_receive_skb_one_core (net/core/dev.c:5455)
 process_backlog (./include/linux/rcupdate.h:781 net/core/dev.c:5895)
 __napi_poll (net/core/dev.c:6460)
 net_rx_action (net/core/dev.c:6529 net/core/dev.c:6660)
 __do_softirq (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142 kernel/softirq.c:554)
 do_softirq (kernel/softirq.c:454 kernel/softirq.c:441)
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip (kernel/softirq.c:381)
 __dev_queue_xmit (net/core/dev.c:4231)
 ip6_finish_output2 (./include/net/neighbour.h:544 net/ipv6/ip6_output.c:135)
 rawv6_sendmsg (./include/net/dst.h:458 ./include/linux/netfilter.h:303 net/ipv6/raw.c:656 net/ipv6/raw.c:914)
 sock_sendmsg (net/socket.c:725 net/socket.c:748)
 __sys_sendto (net/socket.c:2134)
 __x64_sys_sendto (net/socket.c:2146 net/socket.c:2142 net/socket.c:2142)
 do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)
RIP: 0033:0x7f9dc751baea
Code: d8 64 89 02 48 c7 c0 ff f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53343/">CVE-2023-53343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53343">CVE-2023-53343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250022">SUSE bug 1250022</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53351</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53351" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53351" ref_url="https://www.suse.com/security/cve/CVE-2023-53351" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Check scheduler work queue before calling timeout handling

During an IGT GPU reset test we see again oops despite of
commit 0c8c901aaaebc9 (drm/sched: Check scheduler ready before calling
timeout handling).

It uses ready condition whether to call drm_sched_fault which unwind
the TDR leads to GPU reset.
However it looks the ready condition is overloaded with other meanings,
for example, for the following stack is related GPU reset :

0  gfx_v9_0_cp_gfx_start
1  gfx_v9_0_cp_gfx_resume
2  gfx_v9_0_cp_resume
3  gfx_v9_0_hw_init
4  gfx_v9_0_resume
5  amdgpu_device_ip_resume_phase2

does the following:
	/* start the ring */
	gfx_v9_0_cp_gfx_start(adev);
	ring-&gt;sched.ready = true;

The same approach is for other ASICs as well :
gfx_v8_0_cp_gfx_resume
gfx_v10_0_kiq_resume, etc...

As a result, our GPU reset test causes GPU fault which calls unconditionally gfx_v9_0_fault
and then drm_sched_fault. However now it depends on whether the interrupt service routine
drm_sched_fault is executed after gfx_v9_0_cp_gfx_start is completed which sets the ready
field of the scheduler to true even  for uninitialized schedulers and causes oops vs
no fault or when ISR  drm_sched_fault is completed prior  gfx_v9_0_cp_gfx_start and
NULL pointer dereference does not occur.

Use the field timeout_wq  to prevent oops for uninitialized schedulers.
The field could be initialized by the work queue of resetting the domain.

v1: Corrections to commit message (Luben)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53351/">CVE-2023-53351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53351">CVE-2023-53351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250005">SUSE bug 1250005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53352</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53352" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53352" ref_url="https://www.suse.com/security/cve/CVE-2023-53352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: check null pointer before accessing when swapping

Add a check to avoid null pointer dereference as below:

[   90.002283] general protection fault, probably for non-canonical
address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI
[   90.002292] KASAN: null-ptr-deref in range
[0x0000000000000000-0x0000000000000007]
[   90.002346]  ? exc_general_protection+0x159/0x240
[   90.002352]  ? asm_exc_general_protection+0x26/0x30
[   90.002357]  ? ttm_bo_evict_swapout_allowable+0x322/0x5e0 [ttm]
[   90.002365]  ? ttm_bo_evict_swapout_allowable+0x42e/0x5e0 [ttm]
[   90.002373]  ttm_bo_swapout+0x134/0x7f0 [ttm]
[   90.002383]  ? __pfx_ttm_bo_swapout+0x10/0x10 [ttm]
[   90.002391]  ? lock_acquire+0x44d/0x4f0
[   90.002398]  ? ttm_device_swapout+0xa5/0x260 [ttm]
[   90.002412]  ? lock_acquired+0x355/0xa00
[   90.002416]  ? do_raw_spin_trylock+0xb6/0x190
[   90.002421]  ? __pfx_lock_acquired+0x10/0x10
[   90.002426]  ? ttm_global_swapout+0x25/0x210 [ttm]
[   90.002442]  ttm_device_swapout+0x198/0x260 [ttm]
[   90.002456]  ? __pfx_ttm_device_swapout+0x10/0x10 [ttm]
[   90.002472]  ttm_global_swapout+0x75/0x210 [ttm]
[   90.002486]  ttm_tt_populate+0x187/0x3f0 [ttm]
[   90.002501]  ttm_bo_handle_move_mem+0x437/0x590 [ttm]
[   90.002517]  ttm_bo_validate+0x275/0x430 [ttm]
[   90.002530]  ? __pfx_ttm_bo_validate+0x10/0x10 [ttm]
[   90.002544]  ? kasan_save_stack+0x33/0x60
[   90.002550]  ? kasan_set_track+0x25/0x30
[   90.002554]  ? __kasan_kmalloc+0x8f/0xa0
[   90.002558]  ? amdgpu_gtt_mgr_new+0x81/0x420 [amdgpu]
[   90.003023]  ? ttm_resource_alloc+0xf6/0x220 [ttm]
[   90.003038]  amdgpu_bo_pin_restricted+0x2dd/0x8b0 [amdgpu]
[   90.003210]  ? __x64_sys_ioctl+0x131/0x1a0
[   90.003210]  ? do_syscall_64+0x60/0x90
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53352/">CVE-2023-53352 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53352">CVE-2023-53352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250006">SUSE bug 1250006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53354</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53354" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53354" ref_url="https://www.suse.com/security/cve/CVE-2023-53354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

skbuff: skb_segment, Call zero copy functions before using skbuff frags

Commit bf5c25d60861 ("skbuff: in skb_segment, call zerocopy functions
once per nskb") added the call to zero copy functions in skb_segment().
The change introduced a bug in skb_segment() because skb_orphan_frags()
may possibly change the number of fragments or allocate new fragments
altogether leaving nrfrags and frag to point to the old values. This can
cause a panic with stacktrace like the one below.

[  193.894380] BUG: kernel NULL pointer dereference, address: 00000000000000bc
[  193.895273] CPU: 13 PID: 18164 Comm: vh-net-17428 Kdump: loaded Tainted: G           O      5.15.123+ #26
[  193.903919] RIP: 0010:skb_segment+0xb0e/0x12f0
[  194.021892] Call Trace:
[  194.027422]  &lt;TASK&gt;
[  194.072861]  tcp_gso_segment+0x107/0x540
[  194.082031]  inet_gso_segment+0x15c/0x3d0
[  194.090783]  skb_mac_gso_segment+0x9f/0x110
[  194.095016]  __skb_gso_segment+0xc1/0x190
[  194.103131]  netem_enqueue+0x290/0xb10 [sch_netem]
[  194.107071]  dev_qdisc_enqueue+0x16/0x70
[  194.110884]  __dev_queue_xmit+0x63b/0xb30
[  194.121670]  bond_start_xmit+0x159/0x380 [bonding]
[  194.128506]  dev_hard_start_xmit+0xc3/0x1e0
[  194.131787]  __dev_queue_xmit+0x8a0/0xb30
[  194.138225]  macvlan_start_xmit+0x4f/0x100 [macvlan]
[  194.141477]  dev_hard_start_xmit+0xc3/0x1e0
[  194.144622]  sch_direct_xmit+0xe3/0x280
[  194.147748]  __dev_queue_xmit+0x54a/0xb30
[  194.154131]  tap_get_user+0x2a8/0x9c0 [tap]
[  194.157358]  tap_sendmsg+0x52/0x8e0 [tap]
[  194.167049]  handle_tx_zerocopy+0x14e/0x4c0 [vhost_net]
[  194.173631]  handle_tx+0xcd/0xe0 [vhost_net]
[  194.176959]  vhost_worker+0x76/0xb0 [vhost]
[  194.183667]  kthread+0x118/0x140
[  194.190358]  ret_from_fork+0x1f/0x30
[  194.193670]  &lt;/TASK&gt;

In this case calling skb_orphan_frags() updated nr_frags leaving nrfrags
local variable in skb_segment() stale. This resulted in the code hitting
i &gt;= nrfrags prematurely and trying to move to next frag_skb using
list_skb pointer, which was NULL, and caused kernel panic. Move the call
to zero copy functions before using frags and nr_frags.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53354/">CVE-2023-53354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53354">CVE-2023-53354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250004">SUSE bug 1250004</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53359</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53359" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53359" ref_url="https://www.suse.com/security/cve/CVE-2023-53359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic at
once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53359/">CVE-2023-53359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53359">CVE-2023-53359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250316">SUSE bug 1250316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53363" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53363" ref_url="https://www.suse.com/security/cve/CVE-2023-53363" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix use-after-free in pci_bus_release_domain_nr()

Commit c14f7ccc9f5d ("PCI: Assign PCI domain IDs by ida_alloc()")
introduced a use-after-free bug in the bus removal cleanup. The issue was
found with kfence:

  [   19.293351] BUG: KFENCE: use-after-free read in pci_bus_release_domain_nr+0x10/0x70

  [   19.302817] Use-after-free read at 0x000000007f3b80eb (in kfence-#115):
  [   19.309677]  pci_bus_release_domain_nr+0x10/0x70
  [   19.309691]  dw_pcie_host_deinit+0x28/0x78
  [   19.309702]  tegra_pcie_deinit_controller+0x1c/0x38 [pcie_tegra194]
  [   19.309734]  tegra_pcie_dw_probe+0x648/0xb28 [pcie_tegra194]
  [   19.309752]  platform_probe+0x90/0xd8
  ...

  [   19.311457] kfence-#115: 0x00000000063a155a-0x00000000ba698da8, size=1072, cache=kmalloc-2k

  [   19.311469] allocated by task 96 on cpu 10 at 19.279323s:
  [   19.311562]  __kmem_cache_alloc_node+0x260/0x278
  [   19.311571]  kmalloc_trace+0x24/0x30
  [   19.311580]  pci_alloc_bus+0x24/0xa0
  [   19.311590]  pci_register_host_bridge+0x48/0x4b8
  [   19.311601]  pci_scan_root_bus_bridge+0xc0/0xe8
  [   19.311613]  pci_host_probe+0x18/0xc0
  [   19.311623]  dw_pcie_host_init+0x2c0/0x568
  [   19.311630]  tegra_pcie_dw_probe+0x610/0xb28 [pcie_tegra194]
  [   19.311647]  platform_probe+0x90/0xd8
  ...

  [   19.311782] freed by task 96 on cpu 10 at 19.285833s:
  [   19.311799]  release_pcibus_dev+0x30/0x40
  [   19.311808]  device_release+0x30/0x90
  [   19.311814]  kobject_put+0xa8/0x120
  [   19.311832]  device_unregister+0x20/0x30
  [   19.311839]  pci_remove_bus+0x78/0x88
  [   19.311850]  pci_remove_root_bus+0x5c/0x98
  [   19.311860]  dw_pcie_host_deinit+0x28/0x78
  [   19.311866]  tegra_pcie_deinit_controller+0x1c/0x38 [pcie_tegra194]
  [   19.311883]  tegra_pcie_dw_probe+0x648/0xb28 [pcie_tegra194]
  [   19.311900]  platform_probe+0x90/0xd8
  ...

  [   19.313579] CPU: 10 PID: 96 Comm: kworker/u24:2 Not tainted 6.2.0 #4
  [   19.320171] Hardware name:  /, BIOS 1.0-d7fb19b 08/10/2022
  [   19.325852] Workqueue: events_unbound deferred_probe_work_func

The stack trace is a bit misleading as dw_pcie_host_deinit() doesn't
directly call pci_bus_release_domain_nr(). The issue turns out to be in
pci_remove_root_bus() which first calls pci_remove_bus() which frees the
struct pci_bus when its struct device is released. Then
pci_bus_release_domain_nr() is called and accesses the freed struct
pci_bus. Reordering these fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53363/">CVE-2023-53363 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53363">CVE-2023-53363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249987">SUSE bug 1249987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53365" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53365" ref_url="https://www.suse.com/security/cve/CVE-2023-53365" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6mr: Fix skb_under_panic in ip6mr_cache_report()

skbuff: skb_under_panic: text:ffffffff88771f69 len:56 put:-4
 head:ffff88805f86a800 data:ffff887f5f86a850 tail:0x88 end:0x2c0 dev:pim6reg
 ------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:192!
 invalid opcode: 0000 [#1] PREEMPT SMP KASAN
 CPU: 2 PID: 22968 Comm: kworker/2:11 Not tainted 6.5.0-rc3-00044-g0a8db05b571a #236
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
 Workqueue: ipv6_addrconf addrconf_dad_work
 RIP: 0010:skb_panic+0x152/0x1d0
 Call Trace:
  &lt;TASK&gt;
  skb_push+0xc4/0xe0
  ip6mr_cache_report+0xd69/0x19b0
  reg_vif_xmit+0x406/0x690
  dev_hard_start_xmit+0x17e/0x6e0
  __dev_queue_xmit+0x2d6a/0x3d20
  vlan_dev_hard_start_xmit+0x3ab/0x5c0
  dev_hard_start_xmit+0x17e/0x6e0
  __dev_queue_xmit+0x2d6a/0x3d20
  neigh_connected_output+0x3ed/0x570
  ip6_finish_output2+0x5b5/0x1950
  ip6_finish_output+0x693/0x11c0
  ip6_output+0x24b/0x880
  NF_HOOK.constprop.0+0xfd/0x530
  ndisc_send_skb+0x9db/0x1400
  ndisc_send_rs+0x12a/0x6c0
  addrconf_dad_completed+0x3c9/0xea0
  addrconf_dad_work+0x849/0x1420
  process_one_work+0xa22/0x16e0
  worker_thread+0x679/0x10c0
  ret_from_fork+0x28/0x60
  ret_from_fork_asm+0x11/0x20

When setup a vlan device on dev pim6reg, DAD ns packet may sent on reg_vif_xmit().
reg_vif_xmit()
    ip6mr_cache_report()
        skb_push(skb, -skb_network_offset(pkt));//skb_network_offset(pkt) is 4
And skb_push declared as:
	void *skb_push(struct sk_buff *skb, unsigned int len);
		skb-&gt;data -= len;
		//0xffff88805f86a84c - 0xfffffffc = 0xffff887f5f86a850
skb-&gt;data is set to 0xffff887f5f86a850, which is invalid mem addr, lead to skb_push() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53365/">CVE-2023-53365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53365">CVE-2023-53365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249988">SUSE bug 1249988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53366</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53366" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53366" ref_url="https://www.suse.com/security/cve/CVE-2023-53366" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: be a bit more careful in checking for NULL bdev while polling

Wei reports a crash with an application using polled IO:

PGD 14265e067 P4D 14265e067 PUD 47ec50067 PMD 0
Oops: 0000 [#1] SMP
CPU: 0 PID: 21915 Comm: iocore_0 Kdump: loaded Tainted: G S                5.12.0-0_fbk12_clang_7346_g1bb6f2e7058f #1
Hardware name: Wiwynn Delta Lake MP T8/Delta Lake-Class2, BIOS Y3DLM08 04/10/2022
RIP: 0010:bio_poll+0x25/0x200
Code: 0f 1f 44 00 00 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 28 65 48 8b 04 25 28 00 00 00 48 89 44 24 20 48 8b 47 08 &lt;48&gt; 8b 80 70 02 00 00 4c 8b 70 50 8b 6f 34 31 db 83 fd ff 75 25 65
RSP: 0018:ffffc90005fafdf8 EFLAGS: 00010292
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 74b43cd65dd66600
RDX: 0000000000000003 RSI: ffffc90005fafe78 RDI: ffff8884b614e140
RBP: ffff88849964df78 R08: 0000000000000000 R09: 0000000000000008
R10: 0000000000000000 R11: 0000000000000000 R12: ffff88849964df00
R13: ffffc90005fafe78 R14: ffff888137d3c378 R15: 0000000000000001
FS:  00007fd195000640(0000) GS:ffff88903f400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000270 CR3: 0000000466121001 CR4: 00000000007706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 iocb_bio_iopoll+0x1d/0x30
 io_do_iopoll+0xac/0x250
 __se_sys_io_uring_enter+0x3c5/0x5a0
 ? __x64_sys_write+0x89/0xd0
 do_syscall_64+0x2d/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x94f225d
Code: 24 cc 00 00 00 41 8b 84 24 d0 00 00 00 c1 e0 04 83 e0 10 41 09 c2 8b 33 8b 53 04 4c 8b 43 18 4c 63 4b 0c b8 aa 01 00 00 0f 05 &lt;85&gt; c0 0f 88 85 00 00 00 29 03 45 84 f6 0f 84 88 00 00 00 41 f6 c7
RSP: 002b:00007fd194ffcd88 EFLAGS: 00000202 ORIG_RAX: 00000000000001aa
RAX: ffffffffffffffda RBX: 00007fd194ffcdc0 RCX: 00000000094f225d
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007
RBP: 00007fd194ffcdb0 R08: 0000000000000000 R09: 0000000000000008
R10: 0000000000000001 R11: 0000000000000202 R12: 00007fd269d68030
R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000000

which is due to bio-&gt;bi_bdev being NULL. This can happen if we have two
tasks doing polled IO, and task B ends up completing IO from task A if
they are sharing a poll queue. If task B completes the IO and puts the
bio into our cache, then it can allocate that bio again before task A
is done polling for it. As that would necessitate a preempt between the
two tasks, it's enough to just be a bit more careful in checking for
whether or not bio-&gt;bi_bdev is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53366/">CVE-2023-53366 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53366">CVE-2023-53366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249983">SUSE bug 1249983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53370</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53370" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53370" ref_url="https://www.suse.com/security/cve/CVE-2023-53370" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix memory leak in mes self test

The fences associated with mes queue have to be freed
up during amdgpu_ring_fini.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53370/">CVE-2023-53370 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53370">CVE-2023-53370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250208">SUSE bug 1250208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53371</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53371" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53371" ref_url="https://www.suse.com/security/cve/CVE-2023-53371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create

The memory pointed to by the fs-&gt;any pointer is not freed in the error
path of mlx5e_fs_tt_redirect_any_create, which can lead to a memory leak.
Fix by freeing the memory in the error path, thereby making the error path
identical to mlx5e_fs_tt_redirect_any_destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53371/">CVE-2023-53371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53371">CVE-2023-53371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250112">SUSE bug 1250112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53372</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53372" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53372" ref_url="https://www.suse.com/security/cve/CVE-2023-53372" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: fix a potential overflow in sctp_ifwdtsn_skip

Currently, when traversing ifwdtsn skips with _sctp_walk_ifwdtsn, it only
checks the pos against the end of the chunk. However, the data left for
the last pos may be &lt; sizeof(struct sctp_ifwdtsn_skip), and dereference
it as struct sctp_ifwdtsn_skip may cause coverflow.

This patch fixes it by checking the pos against "the end of the chunk -
sizeof(struct sctp_ifwdtsn_skip)" in sctp_ifwdtsn_skip, similar to
sctp_fwdtsn_skip.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53372/">CVE-2023-53372 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53372">CVE-2023-53372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250210">SUSE bug 1250210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53373" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53373" ref_url="https://www.suse.com/security/cve/CVE-2023-53373" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: seqiv - Handle EBUSY correctly

As it is seqiv only handles the special return value of EINPROGERSS,
which means that in all other cases it will free data related to the
request.

However, as the caller of seqiv may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in the same way.  Otherwise backlogged
requests will trigger a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-15"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53373/">CVE-2023-53373 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53373">CVE-2023-53373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250137">SUSE bug 1250137</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021393" comment="kernel-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021394" comment="kernel-abi-stablelists-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021395" comment="kernel-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021396" comment="kernel-cross-headers-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021397" comment="kernel-debug-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021398" comment="kernel-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021401" comment="kernel-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021402" comment="kernel-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021403" comment="kernel-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021404" comment="kernel-debug-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021407" comment="kernel-doc-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021408" comment="kernel-headers-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021409" comment="kernel-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021410" comment="kernel-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021411" comment="kernel-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021412" comment="kernel-rt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021413" comment="kernel-rt-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021414" comment="kernel-rt-debug-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021415" comment="kernel-rt-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021417" comment="kernel-rt-debug-kvm-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021418" comment="kernel-rt-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021419" comment="kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021420" comment="kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021422" comment="kernel-rt-kvm-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021423" comment="kernel-rt-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021424" comment="kernel-rt-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021425" comment="kernel-rt-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021426" comment="kernel-tools-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021427" comment="kernel-tools-libs-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021429" comment="kernel-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021430" comment="kernel-uki-virt-addons-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021431" comment="libperf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021432" comment="perf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021433" comment="python3-perf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021434" comment="rtla-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021435" comment="rv-5.14.0-570.52.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53376</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53376" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53376" ref_url="https://www.suse.com/security/cve/CVE-2023-53376" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Use number of bits to manage bitmap sizes

To allocate bitmaps, the mpi3mr driver calculates sizes of bitmaps using
byte as unit. However, bitmap helper functions assume that bitmaps are
allocated using unsigned long as unit. This gap causes memory access beyond
the bitmap sizes and results in "BUG: KASAN: slab-out-of-bounds".  The BUG
was observed at firmware download to eHBA-9600. Call trace indicated that
the out-of-bounds access happened in find_first_zero_bit() called from
mpi3mr_send_event_ack() for miroc-&gt;evtack_cmds_bitmap.

To fix the BUG, do not use bytes to manage bitmap sizes. Instead, use
number of bits, and call bitmap helper functions which take number of bits
as arguments. For memory allocation, call bitmap_zalloc() instead of
kzalloc() and krealloc(). For memory free, call bitmap_free() instead of
kfree(). For zero clear, call bitmap_clear() instead of memset().

Remove three fields for bitmap byte sizes in struct scmd_priv which are no
longer required. Replace the field dev_handle_bitmap_sz with
dev_handle_bitmap_bits to keep number of bits of removepend_bitmap across
resize.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53376/">CVE-2023-53376 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53376">CVE-2023-53376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250154">SUSE bug 1250154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53380</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53380" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53380" ref_url="https://www.suse.com/security/cve/CVE-2023-53380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request

There are two check of 'mreplace' in raid10_sync_request(). In the first
check, 'need_replace' will be set and 'mreplace' will be used later if
no-Faulty 'mreplace' exists, In the second check, 'mreplace' will be
set to NULL if it is Faulty, but 'need_replace' will not be changed
accordingly. null-ptr-deref occurs if Faulty is set between two check.

Fix it by merging two checks into one. And replace 'need_replace' with
'mreplace' because their values are always the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53380/">CVE-2023-53380 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53380">CVE-2023-53380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250198">SUSE bug 1250198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53381</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53381" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53381" ref_url="https://www.suse.com/security/cve/CVE-2023-53381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix leaked reference count of nfsd4_ssc_umount_item

The reference count of nfsd4_ssc_umount_item is not decremented
on error conditions. This prevents the laundromat from unmounting
the vfsmount of the source file.

This patch decrements the reference count of nfsd4_ssc_umount_item
on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53381/">CVE-2023-53381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53381">CVE-2023-53381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250118">SUSE bug 1250118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53383" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53383" ref_url="https://www.suse.com/security/cve/CVE-2023-53383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4

The T241 platform suffers from the T241-FABRIC-4 erratum which causes
unexpected behavior in the GIC when multiple transactions are received
simultaneously from different sources. This hardware issue impacts
NVIDIA server platforms that use more than two T241 chips
interconnected. Each chip has support for 320 {E}SPIs.

This issue occurs when multiple packets from different GICs are
incorrectly interleaved at the target chip. The erratum text below
specifies exactly what can cause multiple transfer packets susceptible
to interleaving and GIC state corruption. GIC state corruption can
lead to a range of problems, including kernel panics, and unexpected
behavior.

&gt;From the erratum text:
  "In some cases, inter-socket AXI4 Stream packets with multiple
  transfers, may be interleaved by the fabric when presented to ARM
  Generic Interrupt Controller. GIC expects all transfers of a packet
  to be delivered without any interleaving.

  The following GICv3 commands may result in multiple transfer packets
  over inter-socket AXI4 Stream interface:
   - Register reads from GICD_I* and GICD_N*
   - Register writes to 64-bit GICD registers other than GICD_IROUTERn*
   - ITS command MOVALL

  Multiple commands in GICv4+ utilize multiple transfer packets,
  including VMOVP, VMOVI, VMAPP, and 64-bit register accesses."

  This issue impacts system configurations with more than 2 sockets,
  that require multi-transfer packets to be sent over inter-socket
  AXI4 Stream interface between GIC instances on different sockets.
  GICv4 cannot be supported. GICv3 SW model can only be supported
  with the workaround. Single and Dual socket configurations are not
  impacted by this issue and support GICv3 and GICv4."


Writing to the chip alias region of the GICD_In{E} registers except
GICD_ICENABLERn has an equivalent effect as writing to the global
distributor. The SPI interrupt deactivate path is not impacted by
the erratum.

To fix this problem, implement a workaround that ensures read accesses
to the GICD_In{E} registers are directed to the chip that owns the
SPI, and disable GICv4.x features. To simplify code changes, the
gic_configure_irq() function uses the same alias region for both read
and write operations to GICD_ICFGR.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53383/">CVE-2023-53383 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53383">CVE-2023-53383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250327">SUSE bug 1250327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53384" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53384" ref_url="https://www.suse.com/security/cve/CVE-2023-53384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: avoid possible NULL skb pointer dereference

In 'mwifiex_handle_uap_rx_forward()', always check the value
returned by 'skb_copy()' to avoid potential NULL pointer
dereference in 'mwifiex_uap_queue_bridged_pkt()', and drop
original skb in case of copying failure.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53384/">CVE-2023-53384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53384">CVE-2023-53384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250127">SUSE bug 1250127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53387" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53387" ref_url="https://www.suse.com/security/cve/CVE-2023-53387" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix device management cmd timeout flow

In the UFS error handling flow, the host will send a device management cmd
(NOP OUT) to the device for link recovery. If this cmd times out and
clearing the doorbell fails, ufshcd_wait_for_dev_cmd() will do nothing and
return. hba-&gt;dev_cmd.complete struct is not set to NULL.

When this happens, if cmd has been completed by device, then we will call
complete() in __ufshcd_transfer_req_compl(). Because the complete struct is
allocated on the stack, the following crash will occur:

  ipanic_die+0x24/0x38 [mrdump]
  die+0x344/0x748
  arm64_notify_die+0x44/0x104
  do_debug_exception+0x104/0x1e0
  el1_dbg+0x38/0x54
  el1_sync_handler+0x40/0x88
  el1_sync+0x8c/0x140
  queued_spin_lock_slowpath+0x2e4/0x3c0
  __ufshcd_transfer_req_compl+0x3b0/0x1164
  ufshcd_trc_handler+0x15c/0x308
  ufshcd_host_reset_and_restore+0x54/0x260
  ufshcd_reset_and_restore+0x28c/0x57c
  ufshcd_err_handler+0xeb8/0x1b6c
  process_one_work+0x288/0x964
  worker_thread+0x4bc/0xc7c
  kthread+0x15c/0x264
  ret_from_fork+0x10/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53387/">CVE-2023-53387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53387">CVE-2023-53387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250321">SUSE bug 1250321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53390</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53390" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53390" ref_url="https://www.suse.com/security/cve/CVE-2023-53390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: base: dd: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53390/">CVE-2023-53390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53390">CVE-2023-53390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250453">SUSE bug 1250453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53392" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53392" ref_url="https://www.suse.com/security/cve/CVE-2023-53392" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: Fix kernel panic during warm reset

During warm reset device-&gt;fw_client is set to NULL. If a bus driver is
registered after this NULL setting and before new firmware clients are
enumerated by ISHTP, kernel panic will result in the function
ishtp_cl_bus_match(). This is because of reference to
device-&gt;fw_client-&gt;props.protocol_name.

ISH firmware after getting successfully loaded, sends a warm reset
notification to remove all clients from the bus and sets
device-&gt;fw_client to NULL. Until kernel v5.15, all enabled ISHTP kernel
module drivers were loaded right after any of the first ISHTP device was
registered, regardless of whether it was a matched or an unmatched
device. This resulted in all drivers getting registered much before the
warm reset notification from ISH.

Starting kernel v5.16, this issue got exposed after the change was
introduced to load only bus drivers for the respective matching devices.
In this scenario, cros_ec_ishtp device and cros_ec_ishtp driver are
registered after the warm reset device fw_client NULL setting.
cros_ec_ishtp driver_register() triggers the callback to
ishtp_cl_bus_match() to match ISHTP driver to the device and causes kernel
panic in guid_equal() when dereferencing fw_client NULL pointer to get
protocol_name.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53392/">CVE-2023-53392 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53392">CVE-2023-53392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250116">SUSE bug 1250116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53393" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53393" ref_url="https://www.suse.com/security/cve/CVE-2023-53393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device

Currently, when mlx5_ib_get_hw_stats() is used for device (port_num = 0),
there is a special handling in order to use the correct counters, but,
port_num is being passed down the stack without any change.  Also, some
functions assume that port_num &gt;=1. As a result, the following oops can
occur.

 BUG: unable to handle page fault for address: ffff89510294f1a8
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 0 P4D 0
 Oops: 0002 [#1] SMP
 CPU: 8 PID: 1382 Comm: devlink Tainted: G W          6.1.0-rc4_for_upstream_base_2022_11_10_16_12 #1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 RIP: 0010:_raw_spin_lock+0xc/0x20
 Call Trace:
  &lt;TASK&gt;
  mlx5_ib_get_native_port_mdev+0x73/0xe0 [mlx5_ib]
  do_get_hw_stats.constprop.0+0x109/0x160 [mlx5_ib]
  mlx5_ib_get_hw_stats+0xad/0x180 [mlx5_ib]
  ib_setup_device_attrs+0xf0/0x290 [ib_core]
  ib_register_device+0x3bb/0x510 [ib_core]
  ? atomic_notifier_chain_register+0x67/0x80
  __mlx5_ib_add+0x2b/0x80 [mlx5_ib]
  mlx5r_probe+0xb8/0x150 [mlx5_ib]
  ? auxiliary_match_id+0x6a/0x90
  auxiliary_bus_probe+0x3c/0x70
  ? driver_sysfs_add+0x6b/0x90
  really_probe+0xcd/0x380
  __driver_probe_device+0x80/0x170
  driver_probe_device+0x1e/0x90
  __device_attach_driver+0x7d/0x100
  ? driver_allows_async_probing+0x60/0x60
  ? driver_allows_async_probing+0x60/0x60
  bus_for_each_drv+0x7b/0xc0
  __device_attach+0xbc/0x200
  bus_probe_device+0x87/0xa0
  device_add+0x404/0x940
  ? dev_set_name+0x53/0x70
  __auxiliary_device_add+0x43/0x60
  add_adev+0x99/0xe0 [mlx5_core]
  mlx5_attach_device+0xc8/0x120 [mlx5_core]
  mlx5_load_one_devl_locked+0xb2/0xe0 [mlx5_core]
  devlink_reload+0x133/0x250
  devlink_nl_cmd_reload+0x480/0x570
  ? devlink_nl_pre_doit+0x44/0x2b0
  genl_family_rcv_msg_doit.isra.0+0xc2/0x110
  genl_rcv_msg+0x180/0x2b0
  ? devlink_nl_cmd_region_read_dumpit+0x540/0x540
  ? devlink_reload+0x250/0x250
  ? devlink_put+0x50/0x50
  ? genl_family_rcv_msg_doit.isra.0+0x110/0x110
  netlink_rcv_skb+0x54/0x100
  genl_rcv+0x24/0x40
  netlink_unicast+0x1f6/0x2c0
  netlink_sendmsg+0x237/0x490
  sock_sendmsg+0x33/0x40
  __sys_sendto+0x103/0x160
  ? handle_mm_fault+0x10e/0x290
  ? do_user_addr_fault+0x1c0/0x5f0
  __x64_sys_sendto+0x25/0x30
  do_syscall_64+0x3d/0x90
  entry_SYSCALL_64_after_hwframe+0x46/0xb0

Fix it by setting port_num to 1 in order to get device status and remove
unused variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53393/">CVE-2023-53393 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53393">CVE-2023-53393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250114">SUSE bug 1250114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53394" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53394" ref_url="https://www.suse.com/security/cve/CVE-2023-53394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: xsk: Fix crash on regular rq reactivation

When the regular rq is reactivated after the XSK socket is closed
it could be reading stale cqes which eventually corrupts the rq.
This leads to no more traffic being received on the regular rq and a
crash on the next close or deactivation of the rq.

Kal Cuttler Conely reported this issue as a crash on the release
path when the xdpsock sample program is stopped (killed) and restarted
in sequence while traffic is running.

This patch flushes all cqes when during the rq flush. The cqe flushing
is done in the reset state of the rq. mlx5e_rq_to_ready code is moved
into the flush function to allow for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53394/">CVE-2023-53394 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53394">CVE-2023-53394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250199">SUSE bug 1250199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53398" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53398" ref_url="https://www.suse.com/security/cve/CVE-2023-53398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlx5: fix possible ptp queue fifo use-after-free

Fifo indexes are not checked during pop operations and it leads to
potential use-after-free when poping from empty queue. Such case was
possible during re-sync action. WARN_ON_ONCE covers future cases.

There were out-of-order cqe spotted which lead to drain of the queue and
use-after-free because of lack of fifo pointers check. Special check and
counter are added to avoid resync operation if SKB could not exist in the
fifo because of OOO cqe (skb_id must be between consumer and producer
index).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53398/">CVE-2023-53398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53398">CVE-2023-53398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250144">SUSE bug 1250144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53400</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53400" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53400" ref_url="https://www.suse.com/security/cve/CVE-2023-53400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix Oops by 9.1 surround channel names

get_line_out_pfx() may trigger an Oops by overflowing the static array
with more than 8 channels.  This was reported for MacBookPro 12,1 with
Cirrus codec.

As a workaround, extend for the 9.1 channels and also fix the
potential Oops by unifying the code paths accessing the same array
with the proper size check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53400/">CVE-2023-53400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53400">CVE-2023-53400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250328">SUSE bug 1250328</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53408" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53408" ref_url="https://www.suse.com/security/cve/CVE-2023-53408" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

trace/blktrace: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53408/">CVE-2023-53408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53408">CVE-2023-53408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250460">SUSE bug 1250460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53409" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53409" ref_url="https://www.suse.com/security/cve/CVE-2023-53409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers: base: component: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53409/">CVE-2023-53409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53409">CVE-2023-53409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250418">SUSE bug 1250418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53410</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53410" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53410" ref_url="https://www.suse.com/security/cve/CVE-2023-53410" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: ULPI: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53410/">CVE-2023-53410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53410">CVE-2023-53410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250420">SUSE bug 1250420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53415" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53415" ref_url="https://www.suse.com/security/cve/CVE-2023-53415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: dwc3: fix memory leak with using debugfs_lookup()

When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time.  To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.

Note, the root dentry for the debugfs directory for the device needs to
be saved so we don't have to keep looking it up, which required a bit
more refactoring to properly create and remove it when needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53415/">CVE-2023-53415 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53415">CVE-2023-53415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250412">SUSE bug 1250412</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53421" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53421" ref_url="https://www.suse.com/security/cve/CVE-2023-53421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Reinit blkg_iostat_set after clearing in blkcg_reset_stats()

When blkg_alloc() is called to allocate a blkcg_gq structure
with the associated blkg_iostat_set's, there are 2 fields within
blkg_iostat_set that requires proper initialization - blkg &amp; sync.
The former field was introduced by commit 3b8cc6298724 ("blk-cgroup:
Optimize blkcg_rstat_flush()") while the later one was introduced by
commit f73316482977 ("blk-cgroup: reimplement basic IO stats using
cgroup rstat").

Unfortunately those fields in the blkg_iostat_set's are not properly
re-initialized when they are cleared in v1's blkcg_reset_stats(). This
can lead to a kernel panic due to NULL pointer access of the blkg
pointer. The missing initialization of sync is less problematic and
can be a problem in a debug kernel due to missing lockdep initialization.

Fix these problems by re-initializing them after memory clearing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53421/">CVE-2023-53421 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53421">CVE-2023-53421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250171">SUSE bug 1250171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53422" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53422" ref_url="https://www.suse.com/security/cve/CVE-2023-53422" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: fw: fix memory leak in debugfs

Fix a memory leak that occurs when reading the fw_info
file all the way, since we return NULL indicating no
more data, but don't free the status tracking object.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53422/">CVE-2023-53422 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53422">CVE-2023-53422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250182">SUSE bug 1250182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53430</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53430" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53430" ref_url="https://www.suse.com/security/cve/CVE-2023-53430" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: dma: fix memory leak running mt76_dma_tx_cleanup

Fix device unregister memory leak and alway cleanup all configured
rx queues in mt76_dma_tx_cleanup routine.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53430/">CVE-2023-53430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53430">CVE-2023-53430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250162">SUSE bug 1250162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53431</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53431" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53431" ref_url="https://www.suse.com/security/cve/CVE-2023-53431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Handle enclosure with just a primary component gracefully

This reverts commit 3fe97ff3d949 ("scsi: ses: Don't attach if enclosure
has no components") and introduces proper handling of case where there are
no detected secondary components, but primary component (enumerated in
num_enclosures) does exist. That fix was originally proposed by Ding Hui
&lt;dinghui@sangfor.com.cn&gt;.

Completely ignoring devices that have one primary enclosure and no
secondary one results in ses_intf_add() bailing completely

	scsi 2:0:0:254: enclosure has no enumerated components
        scsi 2:0:0:254: Failed to bind enclosure -12ven in valid configurations such

even on valid configurations with 1 primary and 0 secondary enclosures as
below:

	# sg_ses /dev/sg0
	  3PARdata  SES               3321
	Supported diagnostic pages:
	  Supported Diagnostic Pages [sdp] [0x0]
	  Configuration (SES) [cf] [0x1]
	  Short Enclosure Status (SES) [ses] [0x8]
	# sg_ses -p cf /dev/sg0
	  3PARdata  SES               3321
	Configuration diagnostic page:
	  number of secondary subenclosures: 0
	  generation code: 0x0
	  enclosure descriptor list
	    Subenclosure identifier: 0 [primary]
	      relative ES process id: 0, number of ES processes: 1
	      number of type descriptor headers: 1
	      enclosure logical identifier (hex): 20000002ac02068d
	      enclosure vendor: 3PARdata  product: VV                rev: 3321
	  type descriptor header and text list
	    Element type: Unspecified, subenclosure id: 0
	      number of possible elements: 1

The changelog for the original fix follows

=====
We can get a crash when disconnecting the iSCSI session,
the call trace like this:

  [ffff00002a00fb70] kfree at ffff00000830e224
  [ffff00002a00fba0] ses_intf_remove at ffff000001f200e4
  [ffff00002a00fbd0] device_del at ffff0000086b6a98
  [ffff00002a00fc50] device_unregister at ffff0000086b6d58
  [ffff00002a00fc70] __scsi_remove_device at ffff00000870608c
  [ffff00002a00fca0] scsi_remove_device at ffff000008706134
  [ffff00002a00fcc0] __scsi_remove_target at ffff0000087062e4
  [ffff00002a00fd10] scsi_remove_target at ffff0000087064c0
  [ffff00002a00fd70] __iscsi_unbind_session at ffff000001c872c4
  [ffff00002a00fdb0] process_one_work at ffff00000810f35c
  [ffff00002a00fe00] worker_thread at ffff00000810f648
  [ffff00002a00fe70] kthread at ffff000008116e98

In ses_intf_add, components count could be 0, and kcalloc 0 size scomp,
but not saved in edev-&gt;component[i].scratch

In this situation, edev-&gt;component[0].scratch is an invalid pointer,
when kfree it in ses_intf_remove_enclosure, a crash like above would happen
The call trace also could be other random cases when kfree cannot catch
the invalid pointer

We should not use edev-&gt;component[] array when the components count is 0
We also need check index when use edev-&gt;component[] array in
ses_enclosure_data_process
=====
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53431/">CVE-2023-53431 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53431">CVE-2023-53431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250374">SUSE bug 1250374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53433" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53433" ref_url="https://www.suse.com/security/cve/CVE-2023-53433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: add vlan_get_protocol_and_depth() helper

Before blamed commit, pskb_may_pull() was used instead
of skb_header_pointer() in __vlan_get_protocol() and friends.

Few callers depended on skb-&gt;head being populated with MAC header,
syzbot caught one of them (skb_mac_gso_segment())

Add vlan_get_protocol_and_depth() to make the intent clearer
and use it where sensible.

This is a more generic fix than commit e9d3f80935b6
("net/af_packet: make sure to pull mac header") which was
dealing with a similar issue.

kernel BUG at include/linux/skbuff.h:2655 !
invalid opcode: 0000 [#1] SMP KASAN
CPU: 0 PID: 1441 Comm: syz-executor199 Not tainted 6.1.24-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023
RIP: 0010:__skb_pull include/linux/skbuff.h:2655 [inline]
RIP: 0010:skb_mac_gso_segment+0x68f/0x6a0 net/core/gro.c:136
Code: fd 48 8b 5c 24 10 44 89 6b 70 48 c7 c7 c0 ae 0d 86 44 89 e6 e8 a1 91 d0 00 48 c7 c7 00 af 0d 86 48 89 de 31 d2 e8 d1 4a e9 ff &lt;0f&gt; 0b 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 41
RSP: 0018:ffffc90001bd7520 EFLAGS: 00010286
RAX: ffffffff8469736a RBX: ffff88810f31dac0 RCX: ffff888115a18b00
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc90001bd75e8 R08: ffffffff84697183 R09: fffff5200037adf9
R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000012
R13: 000000000000fee5 R14: 0000000000005865 R15: 000000000000fed7
FS: 000055555633f300(0000) GS:ffff8881f6a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000000 CR3: 0000000116fea000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
[&lt;ffffffff847018dd&gt;] __skb_gso_segment+0x32d/0x4c0 net/core/dev.c:3419
[&lt;ffffffff8470398a&gt;] skb_gso_segment include/linux/netdevice.h:4819 [inline]
[&lt;ffffffff8470398a&gt;] validate_xmit_skb+0x3aa/0xee0 net/core/dev.c:3725
[&lt;ffffffff84707042&gt;] __dev_queue_xmit+0x1332/0x3300 net/core/dev.c:4313
[&lt;ffffffff851a9ec7&gt;] dev_queue_xmit+0x17/0x20 include/linux/netdevice.h:3029
[&lt;ffffffff851b4a82&gt;] packet_snd net/packet/af_packet.c:3111 [inline]
[&lt;ffffffff851b4a82&gt;] packet_sendmsg+0x49d2/0x6470 net/packet/af_packet.c:3142
[&lt;ffffffff84669a12&gt;] sock_sendmsg_nosec net/socket.c:716 [inline]
[&lt;ffffffff84669a12&gt;] sock_sendmsg net/socket.c:736 [inline]
[&lt;ffffffff84669a12&gt;] __sys_sendto+0x472/0x5f0 net/socket.c:2139
[&lt;ffffffff84669c75&gt;] __do_sys_sendto net/socket.c:2151 [inline]
[&lt;ffffffff84669c75&gt;] __se_sys_sendto net/socket.c:2147 [inline]
[&lt;ffffffff84669c75&gt;] __x64_sys_sendto+0xe5/0x100 net/socket.c:2147
[&lt;ffffffff8551d40f&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
[&lt;ffffffff8551d40f&gt;] do_syscall_64+0x2f/0x50 arch/x86/entry/common.c:80
[&lt;ffffffff85600087&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53433/">CVE-2023-53433 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53433">CVE-2023-53433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250164">SUSE bug 1250164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53437</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53437" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53437" ref_url="https://www.suse.com/security/cve/CVE-2023-53437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Handle cameras with invalid descriptors

If the source entity does not contain any pads, do not create a link.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53437/">CVE-2023-53437 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53437">CVE-2023-53437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250178">SUSE bug 1250178</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250710">SUSE bug 1250710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53441</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53441" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53441" ref_url="https://www.suse.com/security/cve/CVE-2023-53441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: cpumap: Fix memory leak in cpu_map_update_elem

Syzkaller reported a memory leak as follows:

BUG: memory leak
unreferenced object 0xff110001198ef748 (size 192):
  comm "syz-executor.3", pid 17672, jiffies 4298118891 (age 9.906s)
  hex dump (first 32 bytes):
    00 00 00 00 4a 19 00 00 80 ad e3 e4 fe ff c0 00  ....J...........
    00 b2 d3 0c 01 00 11 ff 28 f5 8e 19 01 00 11 ff  ........(.......
  backtrace:
    [&lt;ffffffffadd28087&gt;] __cpu_map_entry_alloc+0xf7/0xb00
    [&lt;ffffffffadd28d8e&gt;] cpu_map_update_elem+0x2fe/0x3d0
    [&lt;ffffffffadc6d0fd&gt;] bpf_map_update_value.isra.0+0x2bd/0x520
    [&lt;ffffffffadc7349b&gt;] map_update_elem+0x4cb/0x720
    [&lt;ffffffffadc7d983&gt;] __se_sys_bpf+0x8c3/0xb90
    [&lt;ffffffffb029cc80&gt;] do_syscall_64+0x30/0x40
    [&lt;ffffffffb0400099&gt;] entry_SYSCALL_64_after_hwframe+0x61/0xc6

BUG: memory leak
unreferenced object 0xff110001198ef528 (size 192):
  comm "syz-executor.3", pid 17672, jiffies 4298118891 (age 9.906s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffffadd281f0&gt;] __cpu_map_entry_alloc+0x260/0xb00
    [&lt;ffffffffadd28d8e&gt;] cpu_map_update_elem+0x2fe/0x3d0
    [&lt;ffffffffadc6d0fd&gt;] bpf_map_update_value.isra.0+0x2bd/0x520
    [&lt;ffffffffadc7349b&gt;] map_update_elem+0x4cb/0x720
    [&lt;ffffffffadc7d983&gt;] __se_sys_bpf+0x8c3/0xb90
    [&lt;ffffffffb029cc80&gt;] do_syscall_64+0x30/0x40
    [&lt;ffffffffb0400099&gt;] entry_SYSCALL_64_after_hwframe+0x61/0xc6

BUG: memory leak
unreferenced object 0xff1100010fd93d68 (size 8):
  comm "syz-executor.3", pid 17672, jiffies 4298118891 (age 9.906s)
  hex dump (first 8 bytes):
    00 00 00 00 00 00 00 00                          ........
  backtrace:
    [&lt;ffffffffade5db3e&gt;] kvmalloc_node+0x11e/0x170
    [&lt;ffffffffadd28280&gt;] __cpu_map_entry_alloc+0x2f0/0xb00
    [&lt;ffffffffadd28d8e&gt;] cpu_map_update_elem+0x2fe/0x3d0
    [&lt;ffffffffadc6d0fd&gt;] bpf_map_update_value.isra.0+0x2bd/0x520
    [&lt;ffffffffadc7349b&gt;] map_update_elem+0x4cb/0x720
    [&lt;ffffffffadc7d983&gt;] __se_sys_bpf+0x8c3/0xb90
    [&lt;ffffffffb029cc80&gt;] do_syscall_64+0x30/0x40
    [&lt;ffffffffb0400099&gt;] entry_SYSCALL_64_after_hwframe+0x61/0xc6

In the cpu_map_update_elem flow, when kthread_stop is called before
calling the threadfn of rcpu-&gt;kthread, since the KTHREAD_SHOULD_STOP bit
of kthread has been set by kthread_stop, the threadfn of rcpu-&gt;kthread
will never be executed, and rcpu-&gt;refcnt will never be 0, which will
lead to the allocated rcpu, rcpu-&gt;queue and rcpu-&gt;queue-&gt;queue cannot be
released.

Calling kthread_stop before executing kthread's threadfn will return
-EINTR. We can complete the release of memory resources in this state.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53441/">CVE-2023-53441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53441">CVE-2023-53441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250150">SUSE bug 1250150</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53442</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53442" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53442" ref_url="https://www.suse.com/security/cve/CVE-2023-53442" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Block switchdev mode when ADQ is active and vice versa

ADQ and switchdev are not supported simultaneously. Enabling both at the
same time can result in nullptr dereference.

To prevent this, check if ADQ is active when changing devlink mode to
switchdev mode, and check if switchdev is active when enabling ADQ.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53442/">CVE-2023-53442 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53442">CVE-2023-53442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250201">SUSE bug 1250201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53443" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53443" ref_url="https://www.suse.com/security/cve/CVE-2023-53443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak

In arizona_clk32k_enable(), we should use pm_runtime_resume_and_get()
as pm_runtime_get_sync() will increase the refcnt even when it
returns an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53443/">CVE-2023-53443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53443">CVE-2023-53443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250457">SUSE bug 1250457</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53444" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53444" ref_url="https://www.suse.com/security/cve/CVE-2023-53444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: fix bulk_move corruption when adding a entry

When the resource is the first in the bulk_move range, adding it again
(thus moving it to the tail) will corrupt the list since the first
pointer is not moved. This eventually lead to null pointer deref in
ttm_lru_bulk_move_del()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53444/">CVE-2023-53444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53444">CVE-2023-53444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250157">SUSE bug 1250157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5345" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5345" ref_url="https://www.suse.com/security/cve/CVE-2023-5345" source="SUSE CVE"/>
		<reference ref_id="SUSE-IU-2023:731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4072-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017423.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's fs/smb/client component can be exploited to achieve local privilege escalation.

In case of an error in smb3_fs_context_parse_param, ctx-&gt;password was freed but the field was not set to NULL which could lead to double free.

We recommend upgrading past commit e6e43b8aa7cd3c3af686caf0c2e11819a886d705.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-14"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5345/">CVE-2023-5345 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5345">CVE-2023-5345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1215899">SUSE bug 1215899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1215971">SUSE bug 1215971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816058" comment="bpftool-7.2.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816059" comment="kernel-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816060" comment="kernel-abi-stablelists-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816061" comment="kernel-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816062" comment="kernel-cross-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816063" comment="kernel-debug-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816064" comment="kernel-debug-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816067" comment="kernel-debug-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816068" comment="kernel-debug-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816069" comment="kernel-debug-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816070" comment="kernel-debug-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816073" comment="kernel-doc-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816074" comment="kernel-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816075" comment="kernel-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816076" comment="kernel-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816077" comment="kernel-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816078" comment="kernel-tools-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816079" comment="kernel-tools-libs-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816081" comment="kernel-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816082" comment="libperf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816083" comment="perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816084" comment="python3-perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816085" comment="rtla-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816086" comment="rv-5.14.0-362.13.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53451</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53451" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53451" ref_url="https://www.suse.com/security/cve/CVE-2023-53451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix potential NULL pointer dereference

Klocwork tool reported 'cur_dsd' may be dereferenced.  Add fix to validate
pointer before dereferencing the pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53451/">CVE-2023-53451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53451">CVE-2023-53451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250831">SUSE bug 1250831</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53453</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53453" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53453" ref_url="https://www.suse.com/security/cve/CVE-2023-53453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: free iio for atombios when driver shutdown

Fix below kmemleak when unload radeon driver:

unreferenced object 0xffff9f8608ede200 (size 512):
  comm "systemd-udevd", pid 326, jiffies 4294682822 (age 716.338s)
  hex dump (first 32 bytes):
    00 00 00 00 c4 aa ec aa 14 ab 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;0000000062fadebe&gt;] kmem_cache_alloc_trace+0x2f1/0x500
    [&lt;00000000b6883cea&gt;] atom_parse+0x117/0x230 [radeon]
    [&lt;00000000158c23fd&gt;] radeon_atombios_init+0xab/0x170 [radeon]
    [&lt;00000000683f672e&gt;] si_init+0x57/0x750 [radeon]
    [&lt;00000000566cc31f&gt;] radeon_device_init+0x559/0x9c0 [radeon]
    [&lt;0000000046efabb3&gt;] radeon_driver_load_kms+0xc1/0x1a0 [radeon]
    [&lt;00000000b5155064&gt;] drm_dev_register+0xdd/0x1d0
    [&lt;0000000045fec835&gt;] radeon_pci_probe+0xbd/0x100 [radeon]
    [&lt;00000000e69ecca3&gt;] pci_device_probe+0xe1/0x160
    [&lt;0000000019484b76&gt;] really_probe.part.0+0xc1/0x2c0
    [&lt;000000003f2649da&gt;] __driver_probe_device+0x96/0x130
    [&lt;00000000231c5bb1&gt;] driver_probe_device+0x24/0xf0
    [&lt;0000000000a42377&gt;] __driver_attach+0x77/0x190
    [&lt;00000000d7574da6&gt;] bus_for_each_dev+0x7f/0xd0
    [&lt;00000000633166d2&gt;] driver_attach+0x1e/0x30
    [&lt;00000000313b05b8&gt;] bus_add_driver+0x12c/0x1e0

iio was allocated in atom_index_iio() called by atom_parse(),
but it doesn't got released when the dirver is shutdown.
Fix this kmemleak by free it in radeon_atombios_fini().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53453/">CVE-2023-53453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53453">CVE-2023-53453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250761">SUSE bug 1250761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53461" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53461" ref_url="https://www.suse.com/security/cve/CVE-2023-53461" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: wait interruptibly for request completions on exit

WHen the ring exits, cleanup is done and the final cancelation and
waiting on completions is done by io_ring_exit_work. That function is
invoked by kworker, which doesn't take any signals. Because of that, it
doesn't really matter if we wait for completions in TASK_INTERRUPTIBLE
or TASK_UNINTERRUPTIBLE state. However, it does matter to the hung task
detection checker!

Normally we expect cancelations and completions to happen rather
quickly. Some test cases, however, will exit the ring and park the
owning task stopped (eg via SIGSTOP). If the owning task needs to run
task_work to complete requests, then io_ring_exit_work won't make any
progress until the task is runnable again. Hence io_ring_exit_work can
trigger the hung task detection, which is particularly problematic if
panic-on-hung-task is enabled.

As the ring exit doesn't take signals to begin with, have it wait
interruptibly rather than uninterruptibly. io_uring has a separate
stuck-exit warning that triggers independently anyway, so we're not
really missing anything by making this switch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53461/">CVE-2023-53461 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53461">CVE-2023-53461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250941">SUSE bug 1250941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53462" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53462" ref_url="https://www.suse.com/security/cve/CVE-2023-53462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hsr: Fix uninit-value access in fill_frame_info()

Syzbot reports the following uninit-value access problem.

=====================================================
BUG: KMSAN: uninit-value in fill_frame_info net/hsr/hsr_forward.c:601 [inline]
BUG: KMSAN: uninit-value in hsr_forward_skb+0x9bd/0x30f0 net/hsr/hsr_forward.c:616
 fill_frame_info net/hsr/hsr_forward.c:601 [inline]
 hsr_forward_skb+0x9bd/0x30f0 net/hsr/hsr_forward.c:616
 hsr_dev_xmit+0x192/0x330 net/hsr/hsr_device.c:223
 __netdev_start_xmit include/linux/netdevice.h:4889 [inline]
 netdev_start_xmit include/linux/netdevice.h:4903 [inline]
 xmit_one net/core/dev.c:3544 [inline]
 dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3560
 __dev_queue_xmit+0x34d0/0x52a0 net/core/dev.c:4340
 dev_queue_xmit include/linux/netdevice.h:3082 [inline]
 packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276
 packet_snd net/packet/af_packet.c:3087 [inline]
 packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 sock_sendmsg net/socket.c:753 [inline]
 __sys_sendto+0x781/0xa30 net/socket.c:2176
 __do_sys_sendto net/socket.c:2188 [inline]
 __se_sys_sendto net/socket.c:2184 [inline]
 __ia32_sys_sendto+0x11f/0x1c0 net/socket.c:2184
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203
 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246
 entry_SYSENTER_compat_after_hwframe+0x70/0x82

Uninit was created at:
 slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767
 slab_alloc_node mm/slub.c:3478 [inline]
 kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523
 kmalloc_reserve+0x148/0x470 net/core/skbuff.c:559
 __alloc_skb+0x318/0x740 net/core/skbuff.c:644
 alloc_skb include/linux/skbuff.h:1286 [inline]
 alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6299
 sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2794
 packet_alloc_skb net/packet/af_packet.c:2936 [inline]
 packet_snd net/packet/af_packet.c:3030 [inline]
 packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119
 sock_sendmsg_nosec net/socket.c:730 [inline]
 sock_sendmsg net/socket.c:753 [inline]
 __sys_sendto+0x781/0xa30 net/socket.c:2176
 __do_sys_sendto net/socket.c:2188 [inline]
 __se_sys_sendto net/socket.c:2184 [inline]
 __ia32_sys_sendto+0x11f/0x1c0 net/socket.c:2184
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0xa2/0x100 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x37/0x80 arch/x86/entry/common.c:203
 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:246
 entry_SYSENTER_compat_after_hwframe+0x70/0x82

It is because VLAN not yet supported in hsr driver. Return error
when protocol is ETH_P_8021Q in fill_frame_info() now to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53462/">CVE-2023-53462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53462">CVE-2023-53462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250878">SUSE bug 1250878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53464" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53464" ref_url="https://www.suse.com/security/cve/CVE-2023-53464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()

The validity of sock should be checked before assignment to avoid incorrect
values. Commit 57569c37f0ad ("scsi: iscsi: iscsi_tcp: Fix null-ptr-deref
while calling getpeername()") introduced this change which may lead to
inconsistent values of tcp_sw_conn-&gt;sendpage and conn-&gt;datadgst_en.

Fix the issue by moving the position of the assignment.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53464/">CVE-2023-53464 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53464">CVE-2023-53464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250868">SUSE bug 1250868</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53465" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53465" ref_url="https://www.suse.com/security/cve/CVE-2023-53465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soundwire: qcom: fix storing port config out-of-bounds

The 'qcom_swrm_ctrl-&gt;pconfig' has size of QCOM_SDW_MAX_PORTS (14),
however we index it starting from 1, not 0, to match real port numbers.
This can lead to writing port config past 'pconfig' bounds and
overwriting next member of 'qcom_swrm_ctrl' struct.  Reported also by
smatch:

  drivers/soundwire/qcom.c:1269 qcom_swrm_get_port_config() error: buffer overflow 'ctrl-&gt;pconfig' 14 &lt;= 14
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53465/">CVE-2023-53465 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53465">CVE-2023-53465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250863">SUSE bug 1250863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53466" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53466" ref_url="https://www.suse.com/security/cve/CVE-2023-53466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit

Always purge mcu skb queues in mt7915_mcu_exit routine even if
mt7915_firmware_state fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53466/">CVE-2023-53466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53466">CVE-2023-53466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250862">SUSE bug 1250862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53471</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53471" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53471" ref_url="https://www.suse.com/security/cve/CVE-2023-53471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras

gfx9 cp_ecc_error_irq is only enabled when legacy gfx ras is assert.
So in gfx_v9_0_hw_fini, interrupt disablement for cp_ecc_error_irq
should be executed under such condition, otherwise, an amdgpu_irq_put
calltrace will occur.

[ 7283.170322] RIP: 0010:amdgpu_irq_put+0x45/0x70 [amdgpu]
[ 7283.170964] RSP: 0018:ffff9a5fc3967d00 EFLAGS: 00010246
[ 7283.170967] RAX: ffff98d88afd3040 RBX: ffff98d89da20000 RCX: 0000000000000000
[ 7283.170969] RDX: 0000000000000000 RSI: ffff98d89da2bef8 RDI: ffff98d89da20000
[ 7283.170971] RBP: ffff98d89da20000 R08: ffff98d89da2ca18 R09: 0000000000000006
[ 7283.170973] R10: ffffd5764243c008 R11: 0000000000000000 R12: 0000000000001050
[ 7283.170975] R13: ffff98d89da38978 R14: ffffffff999ae15a R15: ffff98d880130105
[ 7283.170978] FS:  0000000000000000(0000) GS:ffff98d996f00000(0000) knlGS:0000000000000000
[ 7283.170981] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 7283.170983] CR2: 00000000f7a9d178 CR3: 00000001c42ea000 CR4: 00000000003506e0
[ 7283.170986] Call Trace:
[ 7283.170988]  &lt;TASK&gt;
[ 7283.170989]  gfx_v9_0_hw_fini+0x1c/0x6d0 [amdgpu]
[ 7283.171655]  amdgpu_device_ip_suspend_phase2+0x101/0x1a0 [amdgpu]
[ 7283.172245]  amdgpu_device_suspend+0x103/0x180 [amdgpu]
[ 7283.172823]  amdgpu_pmops_freeze+0x21/0x60 [amdgpu]
[ 7283.173412]  pci_pm_freeze+0x54/0xc0
[ 7283.173419]  ? __pfx_pci_pm_freeze+0x10/0x10
[ 7283.173425]  dpm_run_callback+0x98/0x200
[ 7283.173430]  __device_suspend+0x164/0x5f0

v2: drop gfx11 as it's fixed in a different solution by retiring cp_ecc_irq funcs(Hawking)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53471/">CVE-2023-53471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53471">CVE-2023-53471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250866">SUSE bug 1250866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53473" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53473" ref_url="https://www.suse.com/security/cve/CVE-2023-53473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: improve error handling from ext4_dirhash()

The ext4_dirhash() will *almost* never fail, especially when the hash
tree feature was first introduced.  However, with the addition of
support of encrypted, casefolded file names, that function can most
certainly fail today.

So make sure the callers of ext4_dirhash() properly check for
failures, and reflect the errors back up to their callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53473/">CVE-2023-53473 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53473">CVE-2023-53473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250848">SUSE bug 1250848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53476" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53476" ref_url="https://www.suse.com/security/cve/CVE-2023-53476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry()

This condition needs to match the previous "if (epcp-&gt;state == LISTEN) {"
exactly to avoid a NULL dereference of either "listen_ep" or "ep". The
problem is that "epcp" has been re-assigned so just testing
"if (epcp-&gt;state == LISTEN) {" a second time is not sufficient.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53476/">CVE-2023-53476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53476">CVE-2023-53476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250839">SUSE bug 1250839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53477" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53477" ref_url="https://www.suse.com/security/cve/CVE-2023-53477" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Add lwtunnel encap size of all siblings in nexthop calculation

In function rt6_nlmsg_size(), the length of nexthop is calculated
by multipling the nexthop length of fib6_info and the number of
siblings. However if the fib6_info has no lwtunnel but the siblings
have lwtunnels, the nexthop length is less than it should be, and
it will trigger a warning in inet6_rt_notify() as follows:

WARNING: CPU: 0 PID: 6082 at net/ipv6/route.c:6180 inet6_rt_notify+0x120/0x130
......
Call Trace:
 &lt;TASK&gt;
 fib6_add_rt2node+0x685/0xa30
 fib6_add+0x96/0x1b0
 ip6_route_add+0x50/0xd0
 inet6_rtm_newroute+0x97/0xa0
 rtnetlink_rcv_msg+0x156/0x3d0
 netlink_rcv_skb+0x5a/0x110
 netlink_unicast+0x246/0x350
 netlink_sendmsg+0x250/0x4c0
 sock_sendmsg+0x66/0x70
 ___sys_sendmsg+0x7c/0xd0
 __sys_sendmsg+0x5d/0xb0
 do_syscall_64+0x3f/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

This bug can be reproduced by script:

ip -6 addr add 2002::2/64 dev ens2
ip -6 route add 100::/64 via 2002::1 dev ens2 metric 100

for i in 10 20 30 40 50 60 70;
do
	ip link add link ens2 name ipv_$i type ipvlan
	ip -6 addr add 2002::$i/64 dev ipv_$i
	ifconfig ipv_$i up
done

for i in 10 20 30 40 50 60;
do
	ip -6 route append 100::/64 encap ip6 dst 2002::$i via 2002::1
dev ipv_$i metric 100
done

ip -6 route append 100::/64 via 2002::1 dev ipv_70 metric 100

This patch fixes it by adding nexthop_len of every siblings using
rt6_nh_nlmsg_size().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53477/">CVE-2023-53477 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53477">CVE-2023-53477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250840">SUSE bug 1250840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53479" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53479" ref_url="https://www.suse.com/security/cve/CVE-2023-53479" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/acpi: Fix a use-after-free in cxl_parse_cfmws()

KASAN and KFENCE detected an user-after-free in the CXL driver. This
happens in the cxl_decoder_add() fail path. KASAN prints the following
error:

   BUG: KASAN: slab-use-after-free in cxl_parse_cfmws (drivers/cxl/acpi.c:299)

This happens in cxl_parse_cfmws(), where put_device() is called,
releasing cxld, which is accessed later.

Use the local variables in the dev_err() instead of pointing to the
released memory. Since the dev_err() is printing a resource, change the open
coded print format to use the %pr format specifier.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53479/">CVE-2023-53479 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53479">CVE-2023-53479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250837">SUSE bug 1250837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53487" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53487" ref_url="https://www.suse.com/security/cve/CVE-2023-53487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/rtas_flash: allow user copy to flash block cache objects

With hardened usercopy enabled (CONFIG_HARDENED_USERCOPY=y), using the
/proc/powerpc/rtas/firmware_update interface to prepare a system
firmware update yields a BUG():

  kernel BUG at mm/usercopy.c:102!
  Oops: Exception in kernel mode, sig: 5 [#1]
  LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
  Modules linked in:
  CPU: 0 PID: 2232 Comm: dd Not tainted 6.5.0-rc3+ #2
  Hardware name: IBM,8408-E8E POWER8E (raw) 0x4b0201 0xf000004 of:IBM,FW860.50 (SV860_146) hv:phyp pSeries
  NIP:  c0000000005991d0 LR: c0000000005991cc CTR: 0000000000000000
  REGS: c0000000148c76a0 TRAP: 0700   Not tainted  (6.5.0-rc3+)
  MSR:  8000000000029033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 24002242  XER: 0000000c
  CFAR: c0000000001fbd34 IRQMASK: 0
  [ ... GPRs omitted ... ]
  NIP usercopy_abort+0xa0/0xb0
  LR  usercopy_abort+0x9c/0xb0
  Call Trace:
    usercopy_abort+0x9c/0xb0 (unreliable)
    __check_heap_object+0x1b4/0x1d0
    __check_object_size+0x2d0/0x380
    rtas_flash_write+0xe4/0x250
    proc_reg_write+0xfc/0x160
    vfs_write+0xfc/0x4e0
    ksys_write+0x90/0x160
    system_call_exception+0x178/0x320
    system_call_common+0x160/0x2c4

The blocks of the firmware image are copied directly from user memory
to objects allocated from flash_block_cache, so flash_block_cache must
be created using kmem_cache_create_usercopy() to mark it safe for user
access.

[mpe: Trim and indent oops]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53487/">CVE-2023-53487 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53487">CVE-2023-53487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250830">SUSE bug 1250830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53489" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53489" ref_url="https://www.suse.com/security/cve/CVE-2023-53489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp.

syzkaller reported [0] memory leaks of an UDP socket and ZEROCOPY
skbs.  We can reproduce the problem with these sequences:

  sk = socket(AF_INET, SOCK_DGRAM, 0)
  sk.setsockopt(SOL_SOCKET, SO_TIMESTAMPING, SOF_TIMESTAMPING_TX_SOFTWARE)
  sk.setsockopt(SOL_SOCKET, SO_ZEROCOPY, 1)
  sk.sendto(b'', MSG_ZEROCOPY, ('127.0.0.1', 53))
  sk.close()

sendmsg() calls msg_zerocopy_alloc(), which allocates a skb, sets
skb-&gt;cb-&gt;ubuf.refcnt to 1, and calls sock_hold().  Here, struct
ubuf_info_msgzc indirectly holds a refcnt of the socket.  When the
skb is sent, __skb_tstamp_tx() clones it and puts the clone into
the socket's error queue with the TX timestamp.

When the original skb is received locally, skb_copy_ubufs() calls
skb_unclone(), and pskb_expand_head() increments skb-&gt;cb-&gt;ubuf.refcnt.
This additional count is decremented while freeing the skb, but struct
ubuf_info_msgzc still has a refcnt, so __msg_zerocopy_callback() is
not called.

The last refcnt is not released unless we retrieve the TX timestamped
skb by recvmsg().  Since we clear the error queue in inet_sock_destruct()
after the socket's refcnt reaches 0, there is a circular dependency.
If we close() the socket holding such skbs, we never call sock_put()
and leak the count, sk, and skb.

TCP has the same problem, and commit e0c8bccd40fc ("net: stream:
purge sk_error_queue in sk_stream_kill_queues()") tried to fix it
by calling skb_queue_purge() during close().  However, there is a
small chance that skb queued in a qdisc or device could be put
into the error queue after the skb_queue_purge() call.

In __skb_tstamp_tx(), the cloned skb should not have a reference
to the ubuf to remove the circular dependency, but skb_clone() does
not call skb_copy_ubufs() for zerocopy skb.  So, we need to call
skb_orphan_frags_rx() for the cloned skb to call skb_copy_ubufs().

[0]:
BUG: memory leak
unreferenced object 0xffff88800c6d2d00 (size 1152):
  comm "syz-executor392", pid 264, jiffies 4294785440 (age 13.044s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 cd af e8 81 00 00 00 00  ................
    02 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00  ...@............
  backtrace:
    [&lt;0000000055636812&gt;] sk_prot_alloc+0x64/0x2a0 net/core/sock.c:2024
    [&lt;0000000054d77b7a&gt;] sk_alloc+0x3b/0x800 net/core/sock.c:2083
    [&lt;0000000066f3c7e0&gt;] inet_create net/ipv4/af_inet.c:319 [inline]
    [&lt;0000000066f3c7e0&gt;] inet_create+0x31e/0xe40 net/ipv4/af_inet.c:245
    [&lt;000000009b83af97&gt;] __sock_create+0x2ab/0x550 net/socket.c:1515
    [&lt;00000000b9b11231&gt;] sock_create net/socket.c:1566 [inline]
    [&lt;00000000b9b11231&gt;] __sys_socket_create net/socket.c:1603 [inline]
    [&lt;00000000b9b11231&gt;] __sys_socket_create net/socket.c:1588 [inline]
    [&lt;00000000b9b11231&gt;] __sys_socket+0x138/0x250 net/socket.c:1636
    [&lt;000000004fb45142&gt;] __do_sys_socket net/socket.c:1649 [inline]
    [&lt;000000004fb45142&gt;] __se_sys_socket net/socket.c:1647 [inline]
    [&lt;000000004fb45142&gt;] __x64_sys_socket+0x73/0xb0 net/socket.c:1647
    [&lt;0000000066999e0e&gt;] do_syscall_x64 arch/x86/entry/common.c:50 [inline]
    [&lt;0000000066999e0e&gt;] do_syscall_64+0x38/0x90 arch/x86/entry/common.c:80
    [&lt;0000000017f238c1&gt;] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888017633a00 (size 240):
  comm "syz-executor392", pid 264, jiffies 4294785440 (age 13.044s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 2d 6d 0c 80 88 ff ff  .........-m.....
  backtrace:
    [&lt;000000002b1c4368&gt;] __alloc_skb+0x229/0x320 net/core/skbuff.c:497
    [&lt;00000000143579a6&gt;] alloc_skb include/linux/skbuff.h:1265 [inline]
    [&lt;00000000143579a6&gt;] sock_omalloc+0xaa/0x190 net/core/sock.c:2596
    [&lt;00000000be626478&gt;] msg_zerocopy_alloc net/core/skbuff.c:1294 [inline]
    [&lt;00000000be626478&gt;]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53489/">CVE-2023-53489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53489">CVE-2023-53489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250829">SUSE bug 1250829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53490" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53490" ref_url="https://www.suse.com/security/cve/CVE-2023-53490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix disconnect vs accept race

Despite commit 0ad529d9fd2b ("mptcp: fix possible divide by zero in
recvmsg()"), the mptcp protocol is still prone to a race between
disconnect() (or shutdown) and accept.

The root cause is that the mentioned commit checks the msk-level
flag, but mptcp_stream_accept() does acquire the msk-level lock,
as it can rely directly on the first subflow lock.

As reported by Christoph than can lead to a race where an msk
socket is accepted after that mptcp_subflow_queue_clean() releases
the listener socket lock and just before it takes destructive
actions leading to the following splat:

BUG: kernel NULL pointer dereference, address: 0000000000000012
PGD 5a4ca067 P4D 5a4ca067 PUD 37d4c067 PMD 0
Oops: 0000 [#1] PREEMPT SMP
CPU: 2 PID: 10955 Comm: syz-executor.5 Not tainted 6.5.0-rc1-gdc7b257ee5dd #37
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
RIP: 0010:mptcp_stream_accept+0x1ee/0x2f0 include/net/inet_sock.h:330
Code: 0a 09 00 48 8b 1b 4c 39 e3 74 07 e8 bc 7c 7f fe eb a1 e8 b5 7c 7f fe 4c 8b 6c 24 08 eb 05 e8 a9 7c 7f fe 49 8b 85 d8 09 00 00 &lt;0f&gt; b6 40 12 88 44 24 07 0f b6 6c 24 07 bf 07 00 00 00 89 ee e8 89
RSP: 0018:ffffc90000d07dc0 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffff888037e8d020 RCX: ffff88803b093300
RDX: 0000000000000000 RSI: ffffffff833822c5 RDI: ffffffff8333896a
RBP: 0000607f82031520 R08: ffff88803b093300 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000003e83 R12: ffff888037e8d020
R13: ffff888037e8c680 R14: ffff888009af7900 R15: ffff888009af6880
FS:  00007fc26d708640(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000012 CR3: 0000000066bc5001 CR4: 0000000000370ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 do_accept+0x1ae/0x260 net/socket.c:1872
 __sys_accept4+0x9b/0x110 net/socket.c:1913
 __do_sys_accept4 net/socket.c:1954 [inline]
 __se_sys_accept4 net/socket.c:1951 [inline]
 __x64_sys_accept4+0x20/0x30 net/socket.c:1951
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x47/0xa0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

Address the issue by temporary removing the pending request socket
from the accept queue, so that racing accept() can't touch them.

After depleting the msk - the ssk still exists, as plain TCP sockets,
re-insert them into the accept queue, so that later inet_csk_listen_stop()
will complete the tcp socket disposal.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53490/">CVE-2023-53490 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53490">CVE-2023-53490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250827">SUSE bug 1250827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53492" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53492" ref_url="https://www.suse.com/security/cve/CVE-2023-53492" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not ignore genmask when looking up chain by id

When adding a rule to a chain referring to its ID, if that chain had been
deleted on the same batch, the rule might end up referring to a deleted
chain.

This will lead to a WARNING like following:

[   33.098431] ------------[ cut here ]------------
[   33.098678] WARNING: CPU: 5 PID: 69 at net/netfilter/nf_tables_api.c:2037 nf_tables_chain_destroy+0x23d/0x260
[   33.099217] Modules linked in:
[   33.099388] CPU: 5 PID: 69 Comm: kworker/5:1 Not tainted 6.4.0+ #409
[   33.099726] Workqueue: events nf_tables_trans_destroy_work
[   33.100018] RIP: 0010:nf_tables_chain_destroy+0x23d/0x260
[   33.100306] Code: 8b 7c 24 68 e8 64 9c ed fe 4c 89 e7 e8 5c 9c ed fe 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 89 c6 89 c7 c3 cc cc cc cc &lt;0f&gt; 0b 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d 31 c0 89 c6 89 c7
[   33.101271] RSP: 0018:ffffc900004ffc48 EFLAGS: 00010202
[   33.101546] RAX: 0000000000000001 RBX: ffff888006fc0a28 RCX: 0000000000000000
[   33.101920] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[   33.102649] RBP: ffffc900004ffc78 R08: 0000000000000000 R09: 0000000000000000
[   33.103018] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880135ef500
[   33.103385] R13: 0000000000000000 R14: dead000000000122 R15: ffff888006fc0a10
[   33.103762] FS:  0000000000000000(0000) GS:ffff888024c80000(0000) knlGS:0000000000000000
[   33.104184] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   33.104493] CR2: 00007fe863b56a50 CR3: 00000000124b0001 CR4: 0000000000770ee0
[   33.104872] PKRU: 55555554
[   33.104999] Call Trace:
[   33.105113]  &lt;TASK&gt;
[   33.105214]  ? show_regs+0x72/0x90
[   33.105371]  ? __warn+0xa5/0x210
[   33.105520]  ? nf_tables_chain_destroy+0x23d/0x260
[   33.105732]  ? report_bug+0x1f2/0x200
[   33.105902]  ? handle_bug+0x46/0x90
[   33.106546]  ? exc_invalid_op+0x19/0x50
[   33.106762]  ? asm_exc_invalid_op+0x1b/0x20
[   33.106995]  ? nf_tables_chain_destroy+0x23d/0x260
[   33.107249]  ? nf_tables_chain_destroy+0x30/0x260
[   33.107506]  nf_tables_trans_destroy_work+0x669/0x680
[   33.107782]  ? mark_held_locks+0x28/0xa0
[   33.107996]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10
[   33.108294]  ? _raw_spin_unlock_irq+0x28/0x70
[   33.108538]  process_one_work+0x68c/0xb70
[   33.108755]  ? lock_acquire+0x17f/0x420
[   33.108977]  ? __pfx_process_one_work+0x10/0x10
[   33.109218]  ? do_raw_spin_lock+0x128/0x1d0
[   33.109435]  ? _raw_spin_lock_irq+0x71/0x80
[   33.109634]  worker_thread+0x2bd/0x700
[   33.109817]  ? __pfx_worker_thread+0x10/0x10
[   33.110254]  kthread+0x18b/0x1d0
[   33.110410]  ? __pfx_kthread+0x10/0x10
[   33.110581]  ret_from_fork+0x29/0x50
[   33.110757]  &lt;/TASK&gt;
[   33.110866] irq event stamp: 1651
[   33.111017] hardirqs last  enabled at (1659): [&lt;ffffffffa206a209&gt;] __up_console_sem+0x79/0xa0
[   33.111379] hardirqs last disabled at (1666): [&lt;ffffffffa206a1ee&gt;] __up_console_sem+0x5e/0xa0
[   33.111740] softirqs last  enabled at (1616): [&lt;ffffffffa1f5d40e&gt;] __irq_exit_rcu+0x9e/0xe0
[   33.112094] softirqs last disabled at (1367): [&lt;ffffffffa1f5d40e&gt;] __irq_exit_rcu+0x9e/0xe0
[   33.112453] ---[ end trace 0000000000000000 ]---

This is due to the nft_chain_lookup_byid ignoring the genmask. After this
change, adding the new rule will fail as it will not find the chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53492/">CVE-2023-53492 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53492">CVE-2023-53492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250823">SUSE bug 1250823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53494" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53494" ref_url="https://www.suse.com/security/cve/CVE-2023-53494" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: xts - Handle EBUSY correctly

As it is xts only handles the special return value of EINPROGRESS,
which means that in all other cases it will free data related to the
request.

However, as the caller of xts may specify MAY_BACKLOG, we also need
to expect EBUSY and treat it in the same way.  Otherwise backlogged
requests will trigger a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53494/">CVE-2023-53494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53494">CVE-2023-53494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250822">SUSE bug 1250822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024764" comment="kernel-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024765" comment="kernel-abi-stablelists-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024766" comment="kernel-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024767" comment="kernel-cross-headers-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024768" comment="kernel-debug-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024769" comment="kernel-debug-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024772" comment="kernel-debug-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024773" comment="kernel-debug-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024774" comment="kernel-debug-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024775" comment="kernel-debug-uki-virt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024778" comment="kernel-doc-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024779" comment="kernel-headers-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024780" comment="kernel-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024781" comment="kernel-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024782" comment="kernel-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024783" comment="kernel-rt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024784" comment="kernel-rt-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024785" comment="kernel-rt-debug-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024786" comment="kernel-rt-debug-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024788" comment="kernel-rt-debug-kvm-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024789" comment="kernel-rt-debug-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024790" comment="kernel-rt-debug-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024791" comment="kernel-rt-debug-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024793" comment="kernel-rt-kvm-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024794" comment="kernel-rt-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024795" comment="kernel-rt-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024796" comment="kernel-rt-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024797" comment="kernel-tools-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024798" comment="kernel-tools-libs-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024800" comment="kernel-uki-virt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024801" comment="kernel-uki-virt-addons-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024802" comment="libperf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024803" comment="perf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024804" comment="python3-perf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024805" comment="rtla-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024806" comment="rv-5.14.0-570.60.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53499" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53499" ref_url="https://www.suse.com/security/cve/CVE-2023-53499" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_net: Fix error unwinding of XDP initialization

When initializing XDP in virtnet_open(), some rq xdp initialization
may hit an error causing net device open failed. However, previous
rqs have already initialized XDP and enabled NAPI, which is not the
expected behavior. Need to roll back the previous rq initialization
to avoid leaks in error unwinding of init code.

Also extract helper functions of disable and enable queue pairs.
Use newly introduced disable helper function in error unwinding and
virtnet_close. Use enable helper function in virtnet_open.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53499/">CVE-2023-53499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53499">CVE-2023-53499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250818">SUSE bug 1250818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53501" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53501" ref_url="https://www.suse.com/security/cve/CVE-2023-53501" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd/iommu_v2: Fix pasid_state refcount dec hit 0 warning on pasid unbind

When unbinding pasid - a race condition exists vs outstanding page faults.

To prevent this, the pasid_state object contains a refcount.
    * set to 1 on pasid bind
    * incremented on each ppr notification start
    * decremented on each ppr notification done
    * decremented on pasid unbind

Since refcount_dec assumes that refcount will never reach 0:
  the current implementation causes the following to be invoked on
  pasid unbind:
        REFCOUNT_WARN("decrement hit 0; leaking memory")

Fix this issue by changing refcount_dec to refcount_dec_and_test
to explicitly handle refcount=1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53501/">CVE-2023-53501 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53501">CVE-2023-53501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250815">SUSE bug 1250815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53510</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53510" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53510" ref_url="https://www.suse.com/security/cve/CVE-2023-53510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix handling of lrbp-&gt;cmd

ufshcd_queuecommand() may be called two times in a row for a SCSI command
before it is completed. Hence make the following changes:

 - In the functions that submit a command, do not check the old value of
   lrbp-&gt;cmd nor clear lrbp-&gt;cmd in error paths.

 - In ufshcd_release_scsi_cmd(), do not clear lrbp-&gt;cmd.

See also scsi_send_eh_cmnd().

This commit prevents that the following appears if a command times out:

WARNING: at drivers/ufs/core/ufshcd.c:2965 ufshcd_queuecommand+0x6f8/0x9a8
Call trace:
 ufshcd_queuecommand+0x6f8/0x9a8
 scsi_send_eh_cmnd+0x2c0/0x960
 scsi_eh_test_devices+0x100/0x314
 scsi_eh_ready_devs+0xd90/0x114c
 scsi_error_handler+0x2b4/0xb70
 kthread+0x16c/0x1e0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53510/">CVE-2023-53510 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53510">CVE-2023-53510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250812">SUSE bug 1250812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53511" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53511" ref_url="https://www.suse.com/security/cve/CVE-2023-53511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix fget leak when fs don't support nowait buffered read

Heming reported a BUG when using io_uring doing link-cp on ocfs2. [1]

Do the following steps can reproduce this BUG:
mount -t ocfs2 /dev/vdc /mnt/ocfs2
cp testfile /mnt/ocfs2/
./link-cp /mnt/ocfs2/testfile /mnt/ocfs2/testfile.1
umount /mnt/ocfs2

Then umount will fail, and it outputs:
umount: /mnt/ocfs2: target is busy.

While tracing umount, it blames mnt_get_count() not return as expected.
Do a deep investigation for fget()/fput() on related code flow, I've
finally found that fget() leaks since ocfs2 doesn't support nowait
buffered read.

io_issue_sqe
|-io_assign_file  // do fget() first
  |-io_read
  |-io_iter_do_read
    |-ocfs2_file_read_iter  // return -EOPNOTSUPP
  |-kiocb_done
    |-io_rw_done
      |-__io_complete_rw_common  // set REQ_F_REISSUE
    |-io_resubmit_prep
      |-io_req_prep_async  // override req-&gt;file, leak happens

This was introduced by commit a196c78b5443 in v5.18. Fix it by don't
re-assign req-&gt;file if it has already been assigned.

[1] https://lore.kernel.org/ocfs2-devel/ab580a75-91c8-d68a-3455-40361be1bfa8@linux.alibaba.com/T/#t
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53511/">CVE-2023-53511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53511">CVE-2023-53511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250913">SUSE bug 1250913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53512</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53512" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53512" ref_url="https://www.suse.com/security/cve/CVE-2023-53512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix a memory leak

Add a forgotten kfree().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53512/">CVE-2023-53512 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53512">CVE-2023-53512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250915">SUSE bug 1250915</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53513</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53513" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53513" ref_url="https://www.suse.com/security/cve/CVE-2023-53513" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: fix incomplete validation of ioctl arg

We tested and found an alarm caused by nbd_ioctl arg without verification.
The UBSAN warning calltrace like below:

UBSAN: Undefined behaviour in fs/buffer.c:1709:35
signed integer overflow:
-9223372036854775808 - 1 cannot be represented in type 'long long int'
CPU: 3 PID: 2523 Comm: syz-executor.0 Not tainted 4.19.90 #1
Hardware name: linux,dummy-virt (DT)
Call trace:
 dump_backtrace+0x0/0x3f0 arch/arm64/kernel/time.c:78
 show_stack+0x28/0x38 arch/arm64/kernel/traps.c:158
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x170/0x1dc lib/dump_stack.c:118
 ubsan_epilogue+0x18/0xb4 lib/ubsan.c:161
 handle_overflow+0x188/0x1dc lib/ubsan.c:192
 __ubsan_handle_sub_overflow+0x34/0x44 lib/ubsan.c:206
 __block_write_full_page+0x94c/0xa20 fs/buffer.c:1709
 block_write_full_page+0x1f0/0x280 fs/buffer.c:2934
 blkdev_writepage+0x34/0x40 fs/block_dev.c:607
 __writepage+0x68/0xe8 mm/page-writeback.c:2305
 write_cache_pages+0x44c/0xc70 mm/page-writeback.c:2240
 generic_writepages+0xdc/0x148 mm/page-writeback.c:2329
 blkdev_writepages+0x2c/0x38 fs/block_dev.c:2114
 do_writepages+0xd4/0x250 mm/page-writeback.c:2344

The reason for triggering this warning is __block_write_full_page()
-&gt; i_size_read(inode) - 1 overflow.
inode-&gt;i_size is assigned in __nbd_ioctl() -&gt; nbd_set_size() -&gt; bytesize.
We think it is necessary to limit the size of arg to prevent errors.

Moreover, __nbd_ioctl() -&gt; nbd_add_socket(), arg will be cast to int.
Assuming the value of arg is 0x80000000000000001) (on a 64-bit machine),
it will become 1 after the coercion, which will return unexpected results.

Fix it by adding checks to prevent passing in too large numbers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53513/">CVE-2023-53513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53513">CVE-2023-53513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250955">SUSE bug 1250955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53517" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53517" ref_url="https://www.suse.com/security/cve/CVE-2023-53517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: do not update mtu if msg_max is too small in mtu negotiation

When doing link mtu negotiation, a malicious peer may send Activate msg
with a very small mtu, e.g. 4 in Shuang's testing, without checking for
the minimum mtu, l-&gt;mtu will be set to 4 in tipc_link_proto_rcv(), then
n-&gt;links[bearer_id].mtu is set to 4294967228, which is a overflow of
'4 - INT_H_SIZE - EMSG_OVERHEAD' in tipc_link_mss().

With tipc_link.mtu = 4, tipc_link_xmit() kept printing the warning:

 tipc: Too large msg, purging xmit list 1 5 0 40 4!
 tipc: Too large msg, purging xmit list 1 15 0 60 4!

And with tipc_link_entry.mtu 4294967228, a huge skb was allocated in
named_distribute(), and when purging it in tipc_link_xmit(), a crash
was even caused:

  general protection fault, probably for non-canonical address 0x2100001011000dd: 0000 [#1] PREEMPT SMP PTI
  CPU: 0 PID: 0 Comm: swapper/0 Kdump: loaded Not tainted 6.3.0.neta #19
  RIP: 0010:kfree_skb_list_reason+0x7e/0x1f0
  Call Trace:
   &lt;IRQ&gt;
   skb_release_data+0xf9/0x1d0
   kfree_skb_reason+0x40/0x100
   tipc_link_xmit+0x57a/0x740 [tipc]
   tipc_node_xmit+0x16c/0x5c0 [tipc]
   tipc_named_node_up+0x27f/0x2c0 [tipc]
   tipc_node_write_unlock+0x149/0x170 [tipc]
   tipc_rcv+0x608/0x740 [tipc]
   tipc_udp_recv+0xdc/0x1f0 [tipc]
   udp_queue_rcv_one_skb+0x33e/0x620
   udp_unicast_rcv_skb.isra.72+0x75/0x90
   __udp4_lib_rcv+0x56d/0xc20
   ip_protocol_deliver_rcu+0x100/0x2d0

This patch fixes it by checking the new mtu against tipc_bearer_min_mtu(),
and not updating mtu if it is too small.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53517/">CVE-2023-53517 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53517">CVE-2023-53517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250919">SUSE bug 1250919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53519" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53519" ref_url="https://www.suse.com/security/cve/CVE-2023-53519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-mem2mem: add lock to protect parameter num_rdy

Getting below error when using KCSAN to check the driver. Adding lock to
protect parameter num_rdy when getting the value with function:
v4l2_m2m_num_src_bufs_ready/v4l2_m2m_num_dst_bufs_ready.

kworker/u16:3: [name:report&amp;]BUG: KCSAN: data-race in v4l2_m2m_buf_queue
kworker/u16:3: [name:report&amp;]

kworker/u16:3: [name:report&amp;]read-write to 0xffffff8105f35b94 of 1 bytes by task 20865 on cpu 7:
kworker/u16:3:   v4l2_m2m_buf_queue+0xd8/0x10c
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53519/">CVE-2023-53519 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53519">CVE-2023-53519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250964">SUSE bug 1250964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53521" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53521" ref_url="https://www.suse.com/security/cve/CVE-2023-53521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix slab-out-of-bounds in ses_intf_remove()

A fix for:

BUG: KASAN: slab-out-of-bounds in ses_intf_remove+0x23f/0x270 [ses]
Read of size 8 at addr ffff88a10d32e5d8 by task rmmod/12013

When edev-&gt;components is zero, accessing edev-&gt;component[0] members is
wrong.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53521/">CVE-2023-53521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53521">CVE-2023-53521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250965">SUSE bug 1250965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53524</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53524" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53524" ref_url="https://www.suse.com/security/cve/CVE-2023-53524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: pcie: Fix integer overflow in iwl_write_to_user_buf

An integer overflow occurs in the iwl_write_to_user_buf() function,
which is called by the iwl_dbgfs_monitor_data_read() function.

static bool iwl_write_to_user_buf(char __user *user_buf, ssize_t count,
				  void *buf, ssize_t *size,
				  ssize_t *bytes_copied)
{
	int buf_size_left = count - *bytes_copied;

	buf_size_left = buf_size_left - (buf_size_left % sizeof(u32));
	if (*size &gt; buf_size_left)
		*size = buf_size_left;

If the user passes a SIZE_MAX value to the "ssize_t count" parameter,
the ssize_t count parameter is assigned to "int buf_size_left".
Then compare "*size" with "buf_size_left" . Here, "buf_size_left" is a
negative number, so "*size" is assigned "buf_size_left" and goes into
the third argument of the copy_to_user function, causing a heap overflow.

This is not a security vulnerability because iwl_dbgfs_monitor_data_read()
is a debugfs operation with 0400 privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53524/">CVE-2023-53524 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53524">CVE-2023-53524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250953">SUSE bug 1250953</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53525</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53525" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53525" ref_url="https://www.suse.com/security/cve/CVE-2023-53525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Allow UD qp_type to join multicast only

As for multicast:
- The SIDR is the only mode that makes sense;
- Besides PS_UDP, other port spaces like PS_IB is also allowed, as it is
  UD compatible. In this case qkey also needs to be set [1].

This patch allows only UD qp_type to join multicast, and set qkey to
default if it's not set, to fix an uninit-value error: the ib-&gt;rec.qkey
field is accessed without being initialized.

=====================================================
BUG: KMSAN: uninit-value in cma_set_qkey drivers/infiniband/core/cma.c:510 [inline]
BUG: KMSAN: uninit-value in cma_make_mc_event+0xb73/0xe00 drivers/infiniband/core/cma.c:4570
 cma_set_qkey drivers/infiniband/core/cma.c:510 [inline]
 cma_make_mc_event+0xb73/0xe00 drivers/infiniband/core/cma.c:4570
 cma_iboe_join_multicast drivers/infiniband/core/cma.c:4782 [inline]
 rdma_join_multicast+0x2b83/0x30a0 drivers/infiniband/core/cma.c:4814
 ucma_process_join+0xa76/0xf60 drivers/infiniband/core/ucma.c:1479
 ucma_join_multicast+0x1e3/0x250 drivers/infiniband/core/ucma.c:1546
 ucma_write+0x639/0x6d0 drivers/infiniband/core/ucma.c:1732
 vfs_write+0x8ce/0x2030 fs/read_write.c:588
 ksys_write+0x28c/0x520 fs/read_write.c:643
 __do_sys_write fs/read_write.c:655 [inline]
 __se_sys_write fs/read_write.c:652 [inline]
 __ia32_sys_write+0xdb/0x120 fs/read_write.c:652
 do_syscall_32_irqs_on arch/x86/entry/common.c:114 [inline]
 __do_fast_syscall_32+0x96/0xf0 arch/x86/entry/common.c:180
 do_fast_syscall_32+0x34/0x70 arch/x86/entry/common.c:205
 do_SYSENTER_32+0x1b/0x20 arch/x86/entry/common.c:248
 entry_SYSENTER_compat_after_hwframe+0x4d/0x5c

Local variable ib.i created at:
cma_iboe_join_multicast drivers/infiniband/core/cma.c:4737 [inline]
rdma_join_multicast+0x586/0x30a0 drivers/infiniband/core/cma.c:4814
ucma_process_join+0xa76/0xf60 drivers/infiniband/core/ucma.c:1479

CPU: 0 PID: 29874 Comm: syz-executor.3 Not tainted 5.16.0-rc3-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
=====================================================

[1] https://lore.kernel.org/linux-rdma/20220117183832.GD84788@nvidia.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53525/">CVE-2023-53525 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53525">CVE-2023-53525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250927">SUSE bug 1250927</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53527" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53527" ref_url="https://www.suse.com/security/cve/CVE-2023-53527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Fix memory leak in tb_handle_dp_bandwidth_request()

The memory allocated in tb_queue_dp_bandwidth_request() needs to be
released once the request is handled to avoid leaking it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53527/">CVE-2023-53527 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53527">CVE-2023-53527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250929">SUSE bug 1250929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53530" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53530" ref_url="https://www.suse.com/security/cve/CVE-2023-53530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Use raw_smp_processor_id() instead of smp_processor_id()

The following call trace was observed:

localhost kernel: nvme nvme0: NVME-FC{0}: controller connect complete
localhost kernel: BUG: using smp_processor_id() in preemptible [00000000] code: kworker/u129:4/75092
localhost kernel: nvme nvme0: NVME-FC{0}: new ctrl: NQN "nqn.1992-08.com.netapp:sn.b42d198afb4d11ecad6d00a098d6abfa:subsystem.PR_Channel2022_RH84_subsystem_291"
localhost kernel: caller is qla_nvme_post_cmd+0x216/0x1380 [qla2xxx]
localhost kernel: CPU: 6 PID: 75092 Comm: kworker/u129:4 Kdump: loaded Tainted: G    B   W  OE    --------- ---  5.14.0-70.22.1.el9_0.x86_64+debug #1
localhost kernel: Hardware name: HPE ProLiant XL420 Gen10/ProLiant XL420 Gen10, BIOS U39 01/13/2022
localhost kernel: Workqueue: nvme-wq nvme_async_event_work [nvme_core]
localhost kernel: Call Trace:
localhost kernel: dump_stack_lvl+0x57/0x7d
localhost kernel: check_preemption_disabled+0xc8/0xd0
localhost kernel: qla_nvme_post_cmd+0x216/0x1380 [qla2xxx]

Use raw_smp_processor_id() instead of smp_processor_id().

Also use queue_work() across the driver instead of queue_work_on() thus
avoiding usage of smp_processor_id() when CONFIG_DEBUG_PREEMPT is enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53530/">CVE-2023-53530 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53530">CVE-2023-53530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250949">SUSE bug 1250949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53532</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53532" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53532" ref_url="https://www.suse.com/security/cve/CVE-2023-53532" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix deinitialization of firmware resources

Currently, in ath11k_ahb_fw_resources_init(), iommu domain
mapping is done only for the chipsets having fixed firmware
memory. Also, for such chipsets, mapping is done only if it
does not have TrustZone support.

During deinitialization, only if TrustZone support is not there,
iommu is unmapped back. However, for non fixed firmware memory
chipsets, TrustZone support is not there and this makes the
condition check to true and it tries to unmap the memory which
was not mapped during initialization.

This leads to the following trace -

[   83.198790] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
[   83.259537] Modules linked in: ath11k_ahb ath11k qmi_helpers
.. snip ..
[   83.280286] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   83.287228] pc : __iommu_unmap+0x30/0x140
[   83.293907] lr : iommu_unmap+0x5c/0xa4
[   83.298072] sp : ffff80000b3abad0
.. snip ..
[   83.369175] Call trace:
[   83.376282]  __iommu_unmap+0x30/0x140
[   83.378541]  iommu_unmap+0x5c/0xa4
[   83.382360]  ath11k_ahb_fw_resource_deinit.part.12+0x2c/0xac [ath11k_ahb]
[   83.385666]  ath11k_ahb_free_resources+0x140/0x17c [ath11k_ahb]
[   83.392521]  ath11k_ahb_shutdown+0x34/0x40 [ath11k_ahb]
[   83.398248]  platform_shutdown+0x20/0x2c
[   83.403455]  device_shutdown+0x16c/0x1c4
[   83.407621]  kernel_restart_prepare+0x34/0x3c
[   83.411529]  kernel_restart+0x14/0x74
[   83.415781]  __do_sys_reboot+0x1c4/0x22c
[   83.419427]  __arm64_sys_reboot+0x1c/0x24
[   83.423420]  invoke_syscall+0x44/0xfc
[   83.427326]  el0_svc_common.constprop.3+0xac/0xe8
[   83.430974]  do_el0_svc+0xa0/0xa8
[   83.435659]  el0_svc+0x1c/0x44
[   83.438957]  el0t_64_sync_handler+0x60/0x144
[   83.441910]  el0t_64_sync+0x15c/0x160
[   83.446343] Code: aa0103f4 f9400001 f90027a1 d2800001 (f94006a0)
[   83.449903] ---[ end trace 0000000000000000 ]---

This can be reproduced by probing an AHB chipset which is not
having a fixed memory region. During reboot (or rmmod) trace
can be seen.

Fix this issue by adding a condition check on firmware fixed memory
hw_param as done in the counter initialization function.

Tested-on: IPQ8074 hw2.0 AHB WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53532/">CVE-2023-53532 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53532">CVE-2023-53532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250932">SUSE bug 1250932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53536" ref_url="https://www.suse.com/security/cve/CVE-2023-53536" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-crypto: make blk_crypto_evict_key() more robust

If blk_crypto_evict_key() sees that the key is still in-use (due to a
bug) or that -&gt;keyslot_evict failed, it currently just returns while
leaving the key linked into the keyslot management structures.

However, blk_crypto_evict_key() is only called in contexts such as inode
eviction where failure is not an option.  So actually the caller
proceeds with freeing the blk_crypto_key regardless of the return value
of blk_crypto_evict_key().

These two assumptions don't match, and the result is that there can be a
use-after-free in blk_crypto_reprogram_all_keys() after one of these
errors occurs.  (Note, these errors *shouldn't* happen; we're just
talking about what happens if they do anyway.)

Fix this by making blk_crypto_evict_key() unlink the key from the
keyslot management structures even on failure.

Also improve some comments.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53536/">CVE-2023-53536 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53536">CVE-2023-53536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251033">SUSE bug 1251033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53539" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53539" ref_url="https://www.suse.com/security/cve/CVE-2023-53539" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22801" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix incomplete state save in rxe_requester

If a send packet is dropped by the IP layer in rxe_requester()
the call to rxe_xmit_packet() can fail with err == -EAGAIN.
To recover, the state of the wqe is restored to the state before
the packet was sent so it can be resent. However, the routines
that save and restore the state miss a significnt part of the
variable state in the wqe, the dma struct which is used to process
through the sge table. And, the state is not saved before the packet
is built which modifies the dma struct.

Under heavy stress testing with many QPs on a fast node sending
large messages to a slow node dropped packets are observed and
the resent packets are corrupted because the dma struct was not
restored. This patch fixes this behavior and allows the test cases
to succeed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53539/">CVE-2023-53539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53539">CVE-2023-53539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251060">SUSE bug 1251060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53544" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53544" ref_url="https://www.suse.com/security/cve/CVE-2023-53544" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: davinci: Fix clk use after free

The remove function first frees the clks and only then calls
cpufreq_unregister_driver(). If one of the cpufreq callbacks is called
just before cpufreq_unregister_driver() is run, the freed clks might be
used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53544/">CVE-2023-53544 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53544">CVE-2023-53544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251075">SUSE bug 1251075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53545</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53545" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53545" ref_url="https://www.suse.com/security/cve/CVE-2023-53545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: unmap and remove csa_va properly

Root PD BO should be reserved before unmap and remove
a bo_va from VM otherwise lockdep will complain.

v2: check fpriv-&gt;csa_va is not NULL instead of amdgpu_mcbp (christian)

[14616.936827] WARNING: CPU: 6 PID: 1711 at drivers/gpu/drm/amd/amdgpu/amdgpu_vm.c:1762 amdgpu_vm_bo_del+0x399/0x3f0 [amdgpu]
[14616.937096] Call Trace:
[14616.937097]  &lt;TASK&gt;
[14616.937102]  amdgpu_driver_postclose_kms+0x249/0x2f0 [amdgpu]
[14616.937187]  drm_file_free+0x1d6/0x300 [drm]
[14616.937207]  drm_close_helper.isra.0+0x62/0x70 [drm]
[14616.937220]  drm_release+0x5e/0x100 [drm]
[14616.937234]  __fput+0x9f/0x280
[14616.937239]  ____fput+0xe/0x20
[14616.937241]  task_work_run+0x61/0x90
[14616.937246]  exit_to_user_mode_prepare+0x215/0x220
[14616.937251]  syscall_exit_to_user_mode+0x2a/0x60
[14616.937254]  do_syscall_64+0x48/0x90
[14616.937257]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53545/">CVE-2023-53545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53545">CVE-2023-53545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251084">SUSE bug 1251084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53546" ref_url="https://www.suse.com/security/cve/CVE-2023-53546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx

when mlx5_cmd_exec failed in mlx5dr_cmd_create_reformat_ctx, the memory
pointed by 'in' is not released, which will cause memory leak. Move memory
release after mlx5_cmd_exec.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53546/">CVE-2023-53546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53546">CVE-2023-53546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251079">SUSE bug 1251079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53547" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53547" ref_url="https://www.suse.com/security/cve/CVE-2023-53547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix sdma v4 sw fini error

Fix sdma v4 sw fini error for sdma 4.2.2 to
solve the following general protection fault

[  +0.108196] general protection fault, probably for non-canonical
address 0xd5e5a4ae79d24a32: 0000 [#1] PREEMPT SMP PTI
[  +0.000018] RIP: 0010:free_fw_priv+0xd/0x70
[  +0.000022] Call Trace:
[  +0.000012]  &lt;TASK&gt;
[  +0.000011]  release_firmware+0x55/0x80
[  +0.000021]  amdgpu_ucode_release+0x11/0x20 [amdgpu]
[  +0.000415]  amdgpu_sdma_destroy_inst_ctx+0x4f/0x90 [amdgpu]
[  +0.000360]  sdma_v4_0_sw_fini+0xce/0x110 [amdgpu]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53547/">CVE-2023-53547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53547">CVE-2023-53547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251221">SUSE bug 1251221</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53549" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53549" ref_url="https://www.suse.com/security/cve/CVE-2023-53549" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: Rework long task execution when adding/deleting entries

When adding/deleting large number of elements in one step in ipset, it can
take a reasonable amount of time and can result in soft lockup errors. The
patch 5f7b51bf09ba ("netfilter: ipset: Limit the maximal range of
consecutive elements to add/delete") tried to fix it by limiting the max
elements to process at all. However it was not enough, it is still possible
that we get hung tasks. Lowering the limit is not reasonable, so the
approach in this patch is as follows: rely on the method used at resizing
sets and save the state when we reach a smaller internal batch limit,
unlock/lock and proceed from the saved state. Thus we can avoid long
continuous tasks and at the same time removed the limit to add/delete large
number of elements in one step.

The nfnl mutex is held during the whole operation which prevents one to
issue other ipset commands in parallel.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53549/">CVE-2023-53549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53549">CVE-2023-53549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251070">SUSE bug 1251070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53552" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53552" ref_url="https://www.suse.com/security/cve/CVE-2023-53552" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: mark requests for GuC virtual engines to avoid use-after-free

References to i915_requests may be trapped by userspace inside a
sync_file or dmabuf (dma-resv) and held indefinitely across different
proceses. To counter-act the memory leaks, we try to not to keep
references from the request past their completion.
On the other side on fence release we need to know if rq-&gt;engine
is valid and points to hw engine (true for non-virtual requests).
To make it possible extra bit has been added to rq-&gt;execution_mask,
for marking virtual engines.

(cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53552/">CVE-2023-53552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53552">CVE-2023-53552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251065">SUSE bug 1251065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53553</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53553" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53553" ref_url="https://www.suse.com/security/cve/CVE-2023-53553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hyperv: avoid struct memcpy overrun warning

A previous patch addressed the fortified memcpy warning for most
builds, but I still see this one with gcc-9:

In file included from include/linux/string.h:254,
                 from drivers/hid/hid-hyperv.c:8:
In function 'fortify_memcpy_chk',
    inlined from 'mousevsc_on_receive' at drivers/hid/hid-hyperv.c:272:3:
include/linux/fortify-string.h:583:4: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning]
  583 |    __write_overflow_field(p_size_field, size);
      |    ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

My guess is that the WARN_ON() itself is what confuses gcc, so it no
longer sees that there is a correct range check. Rework the code in a
way that helps readability and avoids the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53553/">CVE-2023-53553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53553">CVE-2023-53553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251068">SUSE bug 1251068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53555" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53555" ref_url="https://www.suse.com/security/cve/CVE-2023-53555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/core: initialize damo_filter-&gt;list from damos_new_filter()

damos_new_filter() is not initializing the list field of newly allocated
filter object.  However, DAMON sysfs interface and DAMON_RECLAIM are not
initializing it after calling damos_new_filter().  As a result, accessing
uninitialized memory is possible.  Actually, adding multiple DAMOS filters
via DAMON sysfs interface caused NULL pointer dereferencing.  Initialize
the field just after the allocation from damos_new_filter().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53555/">CVE-2023-53555 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53555">CVE-2023-53555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251056">SUSE bug 1251056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53556" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53556" ref_url="https://www.suse.com/security/cve/CVE-2023-53556" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: Fix use-after-free in free_netdev

We do netif_napi_add() for all allocated q_vectors[], but potentially
do netif_napi_del() for part of them, then kfree q_vectors and leave
invalid pointers at dev-&gt;napi_list.

Reproducer:

  [root@host ~]# cat repro.sh
  #!/bin/bash

  pf_dbsf="0000:41:00.0"
  vf0_dbsf="0000:41:02.0"
  g_pids=()

  function do_set_numvf()
  {
      echo 2 &gt;/sys/bus/pci/devices/${pf_dbsf}/sriov_numvfs
      sleep $((RANDOM%3+1))
      echo 0 &gt;/sys/bus/pci/devices/${pf_dbsf}/sriov_numvfs
      sleep $((RANDOM%3+1))
  }

  function do_set_channel()
  {
      local nic=$(ls -1 --indicator-style=none /sys/bus/pci/devices/${vf0_dbsf}/net/)
      [ -z "$nic" ] &amp;&amp; { sleep $((RANDOM%3)) ; return 1; }
      ifconfig $nic 192.168.18.5 netmask 255.255.255.0
      ifconfig $nic up
      ethtool -L $nic combined 1
      ethtool -L $nic combined 4
      sleep $((RANDOM%3))
  }

  function on_exit()
  {
      local pid
      for pid in "${g_pids[@]}"; do
          kill -0 "$pid" &amp;&gt;/dev/null &amp;&amp; kill "$pid" &amp;&gt;/dev/null
      done
      g_pids=()
  }

  trap "on_exit; exit" EXIT

  while :; do do_set_numvf ; done &amp;
  g_pids+=($!)
  while :; do do_set_channel ; done &amp;
  g_pids+=($!)

  wait

Result:

[ 4093.900222] ==================================================================
[ 4093.900230] BUG: KASAN: use-after-free in free_netdev+0x308/0x390
[ 4093.900232] Read of size 8 at addr ffff88b4dc145640 by task repro.sh/6699
[ 4093.900233]
[ 4093.900236] CPU: 10 PID: 6699 Comm: repro.sh Kdump: loaded Tainted: G           O     --------- -t - 4.18.0 #1
[ 4093.900238] Hardware name: Powerleader PR2008AL/H12DSi-N6, BIOS 2.0 04/09/2021
[ 4093.900239] Call Trace:
[ 4093.900244]  dump_stack+0x71/0xab
[ 4093.900249]  print_address_description+0x6b/0x290
[ 4093.900251]  ? free_netdev+0x308/0x390
[ 4093.900252]  kasan_report+0x14a/0x2b0
[ 4093.900254]  free_netdev+0x308/0x390
[ 4093.900261]  iavf_remove+0x825/0xd20 [iavf]
[ 4093.900265]  pci_device_remove+0xa8/0x1f0
[ 4093.900268]  device_release_driver_internal+0x1c6/0x460
[ 4093.900271]  pci_stop_bus_device+0x101/0x150
[ 4093.900273]  pci_stop_and_remove_bus_device+0xe/0x20
[ 4093.900275]  pci_iov_remove_virtfn+0x187/0x420
[ 4093.900277]  ? pci_iov_add_virtfn+0xe10/0xe10
[ 4093.900278]  ? pci_get_subsys+0x90/0x90
[ 4093.900280]  sriov_disable+0xed/0x3e0
[ 4093.900282]  ? bus_find_device+0x12d/0x1a0
[ 4093.900290]  i40e_free_vfs+0x754/0x1210 [i40e]
[ 4093.900298]  ? i40e_reset_all_vfs+0x880/0x880 [i40e]
[ 4093.900299]  ? pci_get_device+0x7c/0x90
[ 4093.900300]  ? pci_get_subsys+0x90/0x90
[ 4093.900306]  ? pci_vfs_assigned.part.7+0x144/0x210
[ 4093.900309]  ? __mutex_lock_slowpath+0x10/0x10
[ 4093.900315]  i40e_pci_sriov_configure+0x1fa/0x2e0 [i40e]
[ 4093.900318]  sriov_numvfs_store+0x214/0x290
[ 4093.900320]  ? sriov_totalvfs_show+0x30/0x30
[ 4093.900321]  ? __mutex_lock_slowpath+0x10/0x10
[ 4093.900323]  ? __check_object_size+0x15a/0x350
[ 4093.900326]  kernfs_fop_write+0x280/0x3f0
[ 4093.900329]  vfs_write+0x145/0x440
[ 4093.900330]  ksys_write+0xab/0x160
[ 4093.900332]  ? __ia32_sys_read+0xb0/0xb0
[ 4093.900334]  ? fput_many+0x1a/0x120
[ 4093.900335]  ? filp_close+0xf0/0x130
[ 4093.900338]  do_syscall_64+0xa0/0x370
[ 4093.900339]  ? page_fault+0x8/0x30
[ 4093.900341]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[ 4093.900357] RIP: 0033:0x7f16ad4d22c0
[ 4093.900359] Code: 73 01 c3 48 8b 0d d8 cb 2c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 24 2d 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 fe dd 01 00 48 89 04 24
[ 4093.900360] RSP: 002b:00007ffd6491b7f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 4093.900362] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f16ad4d22c0
[ 4093.900363] RDX: 0000000000000002 RSI: 0000000001a41408 RDI: 0000000000000001
[ 4093.900364] RBP: 0000000001a41408 R08: 00007f16ad7a1780 R09: 00007f16ae1f2700
[ 4093.9003
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53556/">CVE-2023-53556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53556">CVE-2023-53556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251059">SUSE bug 1251059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53559" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53559" ref_url="https://www.suse.com/security/cve/CVE-2023-53559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip_vti: fix potential slab-use-after-free in decode_session6

When ip_vti device is set to the qdisc of the sfb type, the cb field
of the sent skb may be modified during enqueuing. Then,
slab-use-after-free may occur when ip_vti device sends IPv6 packets.
As commit f855691975bb ("xfrm6: Fix the nexthdr offset in
_decode_session6.") showed, xfrm_decode_session was originally intended
only for the receive path. IP6CB(skb)-&gt;nhoff is not set during
transmission. Therefore, set the cb field in the skb to 0 before
sending packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53559/">CVE-2023-53559 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53559">CVE-2023-53559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251052">SUSE bug 1251052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53561</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53561" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53561" ref_url="https://www.suse.com/security/cve/CVE-2023-53561" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: iosm: fix NULL pointer dereference when removing device

In suspend and resume cycle, the removal and rescan of device ends
up in NULL pointer dereference.

During driver initialization, if the ipc_imem_wwan_channel_init()
fails to get the valid device capabilities it returns an error and
further no resource (wwan struct) will be allocated. Now in this
situation if driver removal procedure is initiated it would result
in NULL pointer exception since unallocated wwan struct is dereferenced
inside ipc_wwan_deinit().

ipc_imem_run_state_worker() to handle the called functions return value
and to release the resource in failure case. It also reports the link
down event in failure cases. The user space application can handle this
event to do a device reset for restoring the device communication.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53561/">CVE-2023-53561 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53561">CVE-2023-53561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251050">SUSE bug 1251050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53563</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53563" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53563" ref_url="https://www.suse.com/security/cve/CVE-2023-53563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver

After loading the amd-pstate-ut driver, amd_pstate_ut_check_perf()
and amd_pstate_ut_check_freq() use cpufreq_cpu_get() to get the policy
of the CPU and mark it as busy.

In these functions, cpufreq_cpu_put() should be used to release the
policy, but it is not, so any other entity trying to access the policy
is blocked indefinitely.

One such scenario is when amd_pstate mode is changed, leading to the
following splat:

[ 1332.103727] INFO: task bash:2929 blocked for more than 120 seconds.
[ 1332.110001]       Not tainted 6.5.0-rc2-amd-pstate-ut #5
[ 1332.115315] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 1332.123140] task:bash            state:D stack:0     pid:2929  ppid:2873   flags:0x00004006
[ 1332.123143] Call Trace:
[ 1332.123145]  &lt;TASK&gt;
[ 1332.123148]  __schedule+0x3c1/0x16a0
[ 1332.123154]  ? _raw_read_lock_irqsave+0x2d/0x70
[ 1332.123157]  schedule+0x6f/0x110
[ 1332.123160]  schedule_timeout+0x14f/0x160
[ 1332.123162]  ? preempt_count_add+0x86/0xd0
[ 1332.123165]  __wait_for_common+0x92/0x190
[ 1332.123168]  ? __pfx_schedule_timeout+0x10/0x10
[ 1332.123170]  wait_for_completion+0x28/0x30
[ 1332.123173]  cpufreq_policy_put_kobj+0x4d/0x90
[ 1332.123177]  cpufreq_policy_free+0x157/0x1d0
[ 1332.123178]  ? preempt_count_add+0x58/0xd0
[ 1332.123180]  cpufreq_remove_dev+0xb6/0x100
[ 1332.123182]  subsys_interface_unregister+0x114/0x120
[ 1332.123185]  ? preempt_count_add+0x58/0xd0
[ 1332.123187]  ? __pfx_amd_pstate_change_driver_mode+0x10/0x10
[ 1332.123190]  cpufreq_unregister_driver+0x3b/0xd0
[ 1332.123192]  amd_pstate_change_driver_mode+0x1e/0x50
[ 1332.123194]  store_status+0xe9/0x180
[ 1332.123197]  dev_attr_store+0x1b/0x30
[ 1332.123199]  sysfs_kf_write+0x42/0x50
[ 1332.123202]  kernfs_fop_write_iter+0x143/0x1d0
[ 1332.123204]  vfs_write+0x2df/0x400
[ 1332.123208]  ksys_write+0x6b/0xf0
[ 1332.123210]  __x64_sys_write+0x1d/0x30
[ 1332.123213]  do_syscall_64+0x60/0x90
[ 1332.123216]  ? fpregs_assert_state_consistent+0x2e/0x50
[ 1332.123219]  ? exit_to_user_mode_prepare+0x49/0x1a0
[ 1332.123223]  ? irqentry_exit_to_user_mode+0xd/0x20
[ 1332.123225]  ? irqentry_exit+0x3f/0x50
[ 1332.123226]  ? exc_page_fault+0x8e/0x190
[ 1332.123228]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[ 1332.123232] RIP: 0033:0x7fa74c514a37
[ 1332.123234] RSP: 002b:00007ffe31dd0788 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 1332.123238] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007fa74c514a37
[ 1332.123239] RDX: 0000000000000008 RSI: 000055e27c447aa0 RDI: 0000000000000001
[ 1332.123241] RBP: 000055e27c447aa0 R08: 00007fa74c5d1460 R09: 000000007fffffff
[ 1332.123242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008
[ 1332.123244] R13: 00007fa74c61a780 R14: 00007fa74c616600 R15: 00007fa74c615a00
[ 1332.123247]  &lt;/TASK&gt;

Fix this by calling cpufreq_cpu_put() wherever necessary.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53563/">CVE-2023-53563 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53563">CVE-2023-53563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251038">SUSE bug 1251038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53566" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53566" ref_url="https://www.suse.com/security/cve/CVE-2023-53566" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_rbtree: fix null deref on element insertion

There is no guarantee that rb_prev() will not return NULL in nft_rbtree_gc_elem():

general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
 nft_add_set_elem+0x14b0/0x2990
  nf_tables_newsetelem+0x528/0xb30

Furthermore, there is a possible use-after-free while iterating,
'node' can be free'd so we need to cache the next value to use.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53566/">CVE-2023-53566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53566">CVE-2023-53566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251040">SUSE bug 1251040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53568" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53568" ref_url="https://www.suse.com/security/cve/CVE-2023-53568" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/zcrypt: don't leak memory if dev_set_name() fails

When dev_set_name() fails, zcdn_create() doesn't free the newly
allocated resources. Do it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53568/">CVE-2023-53568 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53568">CVE-2023-53568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251035">SUSE bug 1251035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53570" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53570" ref_url="https://www.suse.com/security/cve/CVE-2023-53570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems()

nl80211_parse_mbssid_elems() uses a u8 variable num_elems to count the
number of MBSSID elements in the nested netlink attribute attrs, which can
lead to an integer overflow if a user of the nl80211 interface specifies
256 or more elements in the corresponding attribute in userspace. The
integer overflow can lead to a heap buffer overflow as num_elems determines
the size of the trailing array in elems, and this array is thereafter
written to for each element in attrs.

Note that this vulnerability only affects devices with the
wiphy-&gt;mbssid_max_interfaces member set for the wireless physical device
struct in the device driver, and can only be triggered by a process with
CAP_NET_ADMIN capabilities.

Fix this by checking for a maximum of 255 elements in attrs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53570/">CVE-2023-53570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53570">CVE-2023-53570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251031">SUSE bug 1251031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53575" ref_url="https://www.suse.com/security/cve/CVE-2023-53575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: fix potential array out of bounds access

Account for IWL_SEC_WEP_KEY_OFFSET when needed while verifying
key_len size in iwl_mvm_sec_key_add().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53575/">CVE-2023-53575 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53575">CVE-2023-53575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251067">SUSE bug 1251067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53576</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53576" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53576" ref_url="https://www.suse.com/security/cve/CVE-2023-53576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

null_blk: Always check queue mode setting from configfs

Make sure to check device queue mode in the null_validate_conf() and
return error for NULL_Q_RQ as we don't allow legacy I/O path, without
this patch we get OOPs when queue mode is set to 1 from configfs,
following are repro steps :-

modprobe null_blk nr_devices=0
mkdir config/nullb/nullb0
echo 1 &gt; config/nullb/nullb0/memory_backed
echo 4096 &gt; config/nullb/nullb0/blocksize
echo 20480 &gt; config/nullb/nullb0/size
echo 1 &gt; config/nullb/nullb0/queue_mode
echo 1 &gt; config/nullb/nullb0/power

Entering kdb (current=0xffff88810acdd080, pid 2372) on processor 42 Oops: (null)
due to oops @ 0xffffffffc041c329
CPU: 42 PID: 2372 Comm: sh Tainted: G           O     N 6.3.0-rc5lblk+ #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
RIP: 0010:null_add_dev.part.0+0xd9/0x720 [null_blk]
Code: 01 00 00 85 d2 0f 85 a1 03 00 00 48 83 bb 08 01 00 00 00 0f 85 f7 03 00 00 80 bb 62 01 00 00 00 48 8b 75 20 0f 85 6d 02 00 00 &lt;48&gt; 89 6e 60 48 8b 75 20 bf 06 00 00 00 e8 f5 37 2c c1 48 8b 75 20
RSP: 0018:ffffc900052cbde0 EFLAGS: 00010246
RAX: 0000000000000001 RBX: ffff88811084d800 RCX: 0000000000000001
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888100042e00
RBP: ffff8881053d8200 R08: ffffc900052cbd68 R09: ffff888105db2000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000002
R13: ffff888104765200 R14: ffff88810eec1748 R15: ffff88810eec1740
FS:  00007fd445fd1740(0000) GS:ffff8897dfc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000060 CR3: 0000000166a00000 CR4: 0000000000350ee0
DR0: ffffffff8437a488 DR1: ffffffff8437a489 DR2: ffffffff8437a48a
DR3: ffffffff8437a48b DR6: 00000000ffff0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 nullb_device_power_store+0xd1/0x120 [null_blk]
 configfs_write_iter+0xb4/0x120
 vfs_write+0x2ba/0x3c0
 ksys_write+0x5f/0xe0
 do_syscall_64+0x3b/0x90
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7fd4460c57a7
Code: 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
RSP: 002b:00007ffd3792a4a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fd4460c57a7
RDX: 0000000000000002 RSI: 000055b43c02e4c0 RDI: 0000000000000001
RBP: 000055b43c02e4c0 R08: 000000000000000a R09: 00007fd44615b4e0
R10: 00007fd44615b3e0 R11: 0000000000000246 R12: 0000000000000002
R13: 00007fd446198520 R14: 0000000000000002 R15: 00007fd446198700
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53576/">CVE-2023-53576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53576">CVE-2023-53576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251064">SUSE bug 1251064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53577" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53577" ref_url="https://www.suse.com/security/cve/CVE-2023-53577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, cpumap: Make sure kthread is running before map update returns

The following warning was reported when running stress-mode enabled
xdp_redirect_cpu with some RT threads:

  ------------[ cut here ]------------
  WARNING: CPU: 4 PID: 65 at kernel/bpf/cpumap.c:135
  CPU: 4 PID: 65 Comm: kworker/4:1 Not tainted 6.5.0-rc2+ #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
  Workqueue: events cpu_map_kthread_stop
  RIP: 0010:put_cpu_map_entry+0xda/0x220
  ......
  Call Trace:
   &lt;TASK&gt;
   ? show_regs+0x65/0x70
   ? __warn+0xa5/0x240
   ......
   ? put_cpu_map_entry+0xda/0x220
   cpu_map_kthread_stop+0x41/0x60
   process_one_work+0x6b0/0xb80
   worker_thread+0x96/0x720
   kthread+0x1a5/0x1f0
   ret_from_fork+0x3a/0x70
   ret_from_fork_asm+0x1b/0x30
   &lt;/TASK&gt;

The root cause is the same as commit 436901649731 ("bpf: cpumap: Fix memory
leak in cpu_map_update_elem"). The kthread is stopped prematurely by
kthread_stop() in cpu_map_kthread_stop(), and kthread() doesn't call
cpu_map_kthread_run() at all but XDP program has already queued some
frames or skbs into ptr_ring. So when __cpu_map_ring_cleanup() checks
the ptr_ring, it will find it was not emptied and report a warning.

An alternative fix is to use __cpu_map_ring_cleanup() to drop these
pending frames or skbs when kthread_stop() returns -EINTR, but it may
confuse the user, because these frames or skbs have been handled
correctly by XDP program. So instead of dropping these frames or skbs,
just make sure the per-cpu kthread is running before
__cpu_map_entry_alloc() returns.

After apply the fix, the error handle for kthread_stop() will be
unnecessary because it will always return 0, so just remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53577/">CVE-2023-53577 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53577">CVE-2023-53577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251028">SUSE bug 1251028</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53578</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53578" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53578" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53578" ref_url="https://www.suse.com/security/cve/CVE-2023-53578" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()

Syzbot reported a bug as following:

=====================================================
BUG: KMSAN: uninit-value in qrtr_tx_resume+0x185/0x1f0 net/qrtr/af_qrtr.c:230
 qrtr_tx_resume+0x185/0x1f0 net/qrtr/af_qrtr.c:230
 qrtr_endpoint_post+0xf85/0x11b0 net/qrtr/af_qrtr.c:519
 qrtr_tun_write_iter+0x270/0x400 net/qrtr/tun.c:108
 call_write_iter include/linux/fs.h:2189 [inline]
 aio_write+0x63a/0x950 fs/aio.c:1600
 io_submit_one+0x1d1c/0x3bf0 fs/aio.c:2019
 __do_sys_io_submit fs/aio.c:2078 [inline]
 __se_sys_io_submit+0x293/0x770 fs/aio.c:2048
 __x64_sys_io_submit+0x92/0xd0 fs/aio.c:2048
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:766 [inline]
 slab_alloc_node mm/slub.c:3452 [inline]
 __kmem_cache_alloc_node+0x71f/0xce0 mm/slub.c:3491
 __do_kmalloc_node mm/slab_common.c:967 [inline]
 __kmalloc_node_track_caller+0x114/0x3b0 mm/slab_common.c:988
 kmalloc_reserve net/core/skbuff.c:492 [inline]
 __alloc_skb+0x3af/0x8f0 net/core/skbuff.c:565
 __netdev_alloc_skb+0x120/0x7d0 net/core/skbuff.c:630
 qrtr_endpoint_post+0xbd/0x11b0 net/qrtr/af_qrtr.c:446
 qrtr_tun_write_iter+0x270/0x400 net/qrtr/tun.c:108
 call_write_iter include/linux/fs.h:2189 [inline]
 aio_write+0x63a/0x950 fs/aio.c:1600
 io_submit_one+0x1d1c/0x3bf0 fs/aio.c:2019
 __do_sys_io_submit fs/aio.c:2078 [inline]
 __se_sys_io_submit+0x293/0x770 fs/aio.c:2048
 __x64_sys_io_submit+0x92/0xd0 fs/aio.c:2048
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

It is because that skb-&gt;len requires at least sizeof(struct qrtr_ctrl_pkt)
in qrtr_tx_resume(). And skb-&gt;len equals to size in qrtr_endpoint_post().
But size is less than sizeof(struct qrtr_ctrl_pkt) when qrtr_cb-&gt;type
equals to QRTR_TYPE_RESUME_TX in qrtr_endpoint_post() under the syzbot
scenario. This triggers the uninit variable access bug.

Add size check when qrtr_cb-&gt;type equals to QRTR_TYPE_RESUME_TX in
qrtr_endpoint_post() to fix the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53578/">CVE-2023-53578 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53578">CVE-2023-53578 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251174">SUSE bug 1251174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53580" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53580" ref_url="https://www.suse.com/security/cve/CVE-2023-53580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: Gadget: core: Help prevent panic during UVC unconfigure

Avichal Rakesh reported a kernel panic that occurred when the UVC
gadget driver was removed from a gadget's configuration.  The panic
involves a somewhat complicated interaction between the kernel driver
and a userspace component (as described in the Link tag below), but
the analysis did make one thing clear: The Gadget core should
accomodate gadget drivers calling usb_gadget_deactivate() as part of
their unbind procedure.

Currently this doesn't work.  gadget_unbind_driver() calls
driver-&gt;unbind() while holding the udc-&gt;connect_lock mutex, and
usb_gadget_deactivate() attempts to acquire that mutex, which will
result in a deadlock.

The simple fix is for gadget_unbind_driver() to release the mutex when
invoking the -&gt;unbind() callback.  There is no particular reason for
it to be holding the mutex at that time, and the mutex isn't held
while the -&gt;bind() callback is invoked.  So we'll drop the mutex
before performing the unbind callback and reacquire it afterward.

We'll also add a couple of comments to usb_gadget_activate() and
usb_gadget_deactivate().  Because they run in process context they
must not be called from a gadget driver's -&gt;disconnect() callback,
which (according to the kerneldoc for struct usb_gadget_driver in
include/linux/usb/gadget.h) may run in interrupt context.  This may
help prevent similar bugs from arising in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53580/">CVE-2023-53580 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53580">CVE-2023-53580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251105">SUSE bug 1251105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53581" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53581" ref_url="https://www.suse.com/security/cve/CVE-2023-53581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Check for NOT_READY flag state after locking

Currently the check for NOT_READY flag is performed before obtaining the
necessary lock. This opens a possibility for race condition when the flow
is concurrently removed from unready_flows list by the workqueue task,
which causes a double-removal from the list and a crash[0]. Fix the issue
by moving the flag check inside the section protected by
uplink_priv-&gt;unready_flows_lock mutex.

[0]:
[44376.389654] general protection fault, probably for non-canonical address 0xdead000000000108: 0000 [#1] SMP
[44376.391665] CPU: 7 PID: 59123 Comm: tc Not tainted 6.4.0-rc4+ #1
[44376.392984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[44376.395342] RIP: 0010:mlx5e_tc_del_fdb_flow+0xb3/0x340 [mlx5_core]
[44376.396857] Code: 00 48 8b b8 68 ce 02 00 e8 8a 4d 02 00 4c 8d a8 a8 01 00 00 4c 89 ef e8 8b 79 88 e1 48 8b 83 98 06 00 00 48 8b 93 90 06 00 00 &lt;48&gt; 89 42 08 48 89 10 48 b8 00 01 00 00 00 00 ad de 48 89 83 90 06
[44376.399167] RSP: 0018:ffff88812cc97570 EFLAGS: 00010246
[44376.399680] RAX: dead000000000122 RBX: ffff8881088e3800 RCX: ffff8881881bac00
[44376.400337] RDX: dead000000000100 RSI: ffff88812cc97500 RDI: ffff8881242f71b0
[44376.401001] RBP: ffff88811cbb0940 R08: 0000000000000400 R09: 0000000000000001
[44376.401663] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88812c944000
[44376.402342] R13: ffff8881242f71a8 R14: ffff8881222b4000 R15: 0000000000000000
[44376.402999] FS:  00007f0451104800(0000) GS:ffff88852cb80000(0000) knlGS:0000000000000000
[44376.403787] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[44376.404343] CR2: 0000000000489108 CR3: 0000000123a79003 CR4: 0000000000370ea0
[44376.405004] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[44376.405665] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[44376.406339] Call Trace:
[44376.406651]  &lt;TASK&gt;
[44376.406939]  ? die_addr+0x33/0x90
[44376.407311]  ? exc_general_protection+0x192/0x390
[44376.407795]  ? asm_exc_general_protection+0x22/0x30
[44376.408292]  ? mlx5e_tc_del_fdb_flow+0xb3/0x340 [mlx5_core]
[44376.408876]  __mlx5e_tc_del_fdb_peer_flow+0xbc/0xe0 [mlx5_core]
[44376.409482]  mlx5e_tc_del_flow+0x42/0x210 [mlx5_core]
[44376.410055]  mlx5e_flow_put+0x25/0x50 [mlx5_core]
[44376.410529]  mlx5e_delete_flower+0x24b/0x350 [mlx5_core]
[44376.411043]  tc_setup_cb_reoffload+0x22/0x80
[44376.411462]  fl_reoffload+0x261/0x2f0 [cls_flower]
[44376.411907]  ? mlx5e_rep_indr_setup_ft_cb+0x160/0x160 [mlx5_core]
[44376.412481]  ? mlx5e_rep_indr_setup_ft_cb+0x160/0x160 [mlx5_core]
[44376.413044]  tcf_block_playback_offloads+0x76/0x170
[44376.413497]  tcf_block_unbind+0x7b/0xd0
[44376.413881]  tcf_block_setup+0x17d/0x1c0
[44376.414269]  tcf_block_offload_cmd.isra.0+0xf1/0x130
[44376.414725]  tcf_block_offload_unbind+0x43/0x70
[44376.415153]  __tcf_block_put+0x82/0x150
[44376.415532]  ingress_destroy+0x22/0x30 [sch_ingress]
[44376.415986]  qdisc_destroy+0x3b/0xd0
[44376.416343]  qdisc_graft+0x4d0/0x620
[44376.416706]  tc_get_qdisc+0x1c9/0x3b0
[44376.417074]  rtnetlink_rcv_msg+0x29c/0x390
[44376.419978]  ? rep_movs_alternative+0x3a/0xa0
[44376.420399]  ? rtnl_calcit.isra.0+0x120/0x120
[44376.420813]  netlink_rcv_skb+0x54/0x100
[44376.421192]  netlink_unicast+0x1f6/0x2c0
[44376.421573]  netlink_sendmsg+0x232/0x4a0
[44376.421980]  sock_sendmsg+0x38/0x60
[44376.422328]  ____sys_sendmsg+0x1d0/0x1e0
[44376.422709]  ? copy_msghdr_from_user+0x6d/0xa0
[44376.423127]  ___sys_sendmsg+0x80/0xc0
[44376.423495]  ? ___sys_recvmsg+0x8b/0xc0
[44376.423869]  __sys_sendmsg+0x51/0x90
[44376.424226]  do_syscall_64+0x3d/0x90
[44376.424587]  entry_SYSCALL_64_after_hwframe+0x46/0xb0
[44376.425046] RIP: 0033:0x7f045134f887
[44376.425403] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53581/">CVE-2023-53581 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53581">CVE-2023-53581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251106">SUSE bug 1251106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53582" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53582" ref_url="https://www.suse.com/security/cve/CVE-2023-53582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds

Fix a stack-out-of-bounds read in brcmfmac that occurs
when 'buf' that is not null-terminated is passed as an argument of
strreplace() in brcmf_c_preinit_dcmds(). This buffer is filled with
a CLM version string by memcpy() in brcmf_fil_iovar_data_get().
Ensure buf is null-terminated.

Found by a modified version of syzkaller.

[   33.004414][ T1896] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available
[   33.013486][ T1896] brcmfmac: brcmf_c_preinit_dcmds: Firmware: BCM43236/3 wl0: Nov 30 2011 17:33:42 version 5.90.188.22
[   33.021554][ T1896] ==================================================================
[   33.022379][ T1896] BUG: KASAN: stack-out-of-bounds in strreplace+0xf2/0x110
[   33.023122][ T1896] Read of size 1 at addr ffffc90001d6efc8 by task kworker/0:2/1896
[   33.023852][ T1896]
[   33.024096][ T1896] CPU: 0 PID: 1896 Comm: kworker/0:2 Tainted: G           O      5.14.0+ #132
[   33.024927][ T1896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
[   33.026065][ T1896] Workqueue: usb_hub_wq hub_event
[   33.026581][ T1896] Call Trace:
[   33.026896][ T1896]  dump_stack_lvl+0x57/0x7d
[   33.027372][ T1896]  print_address_description.constprop.0.cold+0xf/0x334
[   33.028037][ T1896]  ? strreplace+0xf2/0x110
[   33.028403][ T1896]  ? strreplace+0xf2/0x110
[   33.028807][ T1896]  kasan_report.cold+0x83/0xdf
[   33.029283][ T1896]  ? strreplace+0xf2/0x110
[   33.029666][ T1896]  strreplace+0xf2/0x110
[   33.029966][ T1896]  brcmf_c_preinit_dcmds+0xab1/0xc40
[   33.030351][ T1896]  ? brcmf_c_set_joinpref_default+0x100/0x100
[   33.030787][ T1896]  ? rcu_read_lock_sched_held+0xa1/0xd0
[   33.031223][ T1896]  ? rcu_read_lock_bh_held+0xb0/0xb0
[   33.031661][ T1896]  ? lock_acquire+0x19d/0x4e0
[   33.032091][ T1896]  ? find_held_lock+0x2d/0x110
[   33.032605][ T1896]  ? brcmf_usb_deq+0x1a7/0x260
[   33.033087][ T1896]  ? brcmf_usb_rx_fill_all+0x5a/0xf0
[   33.033582][ T1896]  brcmf_attach+0x246/0xd40
[   33.034022][ T1896]  ? wiphy_new_nm+0x1476/0x1d50
[   33.034383][ T1896]  ? kmemdup+0x30/0x40
[   33.034722][ T1896]  brcmf_usb_probe+0x12de/0x1690
[   33.035223][ T1896]  ? brcmf_usbdev_qinit.constprop.0+0x470/0x470
[   33.035833][ T1896]  usb_probe_interface+0x25f/0x710
[   33.036315][ T1896]  really_probe+0x1be/0xa90
[   33.036656][ T1896]  __driver_probe_device+0x2ab/0x460
[   33.037026][ T1896]  ? usb_match_id.part.0+0x88/0xc0
[   33.037383][ T1896]  driver_probe_device+0x49/0x120
[   33.037790][ T1896]  __device_attach_driver+0x18a/0x250
[   33.038300][ T1896]  ? driver_allows_async_probing+0x120/0x120
[   33.038986][ T1896]  bus_for_each_drv+0x123/0x1a0
[   33.039906][ T1896]  ? bus_rescan_devices+0x20/0x20
[   33.041412][ T1896]  ? lockdep_hardirqs_on_prepare+0x273/0x3e0
[   33.041861][ T1896]  ? trace_hardirqs_on+0x1c/0x120
[   33.042330][ T1896]  __device_attach+0x207/0x330
[   33.042664][ T1896]  ? device_bind_driver+0xb0/0xb0
[   33.043026][ T1896]  ? kobject_uevent_env+0x230/0x12c0
[   33.043515][ T1896]  bus_probe_device+0x1a2/0x260
[   33.043914][ T1896]  device_add+0xa61/0x1ce0
[   33.044227][ T1896]  ? __mutex_unlock_slowpath+0xe7/0x660
[   33.044891][ T1896]  ? __fw_devlink_link_to_suppliers+0x550/0x550
[   33.045531][ T1896]  usb_set_configuration+0x984/0x1770
[   33.046051][ T1896]  ? kernfs_create_link+0x175/0x230
[   33.046548][ T1896]  usb_generic_driver_probe+0x69/0x90
[   33.046931][ T1896]  usb_probe_device+0x9c/0x220
[   33.047434][ T1896]  really_probe+0x1be/0xa90
[   33.047760][ T1896]  __driver_probe_device+0x2ab/0x460
[   33.048134][ T1896]  driver_probe_device+0x49/0x120
[   33.048516][ T1896]  __device_attach_driver+0x18a/0x250
[   33.048910][ T1896]  ? driver_allows_async_probing+0x120/0x120
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53582/">CVE-2023-53582 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53582">CVE-2023-53582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251061">SUSE bug 1251061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53585" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53585" ref_url="https://www.suse.com/security/cve/CVE-2023-53585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: reject unhashed sockets in bpf_sk_assign

The semantics for bpf_sk_assign are as follows:

    sk = some_lookup_func()
    bpf_sk_assign(skb, sk)
    bpf_sk_release(sk)

That is, the sk is not consumed by bpf_sk_assign. The function
therefore needs to make sure that sk lives long enough to be
consumed from __inet_lookup_skb. The path through the stack for a
TCPv4 packet is roughly:

  netif_receive_skb_core: takes RCU read lock
    __netif_receive_skb_core:
      sch_handle_ingress:
        tcf_classify:
          bpf_sk_assign()
      deliver_ptype_list_skb:
        deliver_skb:
          ip_packet_type-&gt;func == ip_rcv:
            ip_rcv_core:
            ip_rcv_finish_core:
              dst_input:
                ip_local_deliver:
                  ip_local_deliver_finish:
                    ip_protocol_deliver_rcu:
                      tcp_v4_rcv:
                        __inet_lookup_skb:
                          skb_steal_sock

The existing helper takes advantage of the fact that everything
happens in the same RCU critical section: for sockets with
SOCK_RCU_FREE set bpf_sk_assign never takes a reference.
skb_steal_sock then checks SOCK_RCU_FREE again and does sock_put
if necessary.

This approach assumes that SOCK_RCU_FREE is never set on a sk
between bpf_sk_assign and skb_steal_sock, but this invariant is
violated by unhashed UDP sockets. A new UDP socket is created
in TCP_CLOSE state but without SOCK_RCU_FREE set. That flag is only
added in udp_lib_get_port() which happens when a socket is bound.

When bpf_sk_assign was added it wasn't possible to access unhashed
UDP sockets from BPF, so this wasn't a problem. This changed
in commit 0c48eefae712 ("sock_map: Lift socket state restriction
for datagram sockets"), but the helper wasn't adjusted accordingly.
The following sequence of events will therefore lead to a refcount
leak:

1. Add socket(AF_INET, SOCK_DGRAM) to a sockmap.
2. Pull socket out of sockmap and bpf_sk_assign it. Since
   SOCK_RCU_FREE is not set we increment the refcount.
3. bind() or connect() the socket, setting SOCK_RCU_FREE.
4. skb_steal_sock will now set refcounted = false due to
   SOCK_RCU_FREE.
5. tcp_v4_rcv() skips sock_put().

Fix the problem by rejecting unhashed sockets in bpf_sk_assign().
This matches the behaviour of __inet_lookup_skb which is ultimately
the goal of bpf_sk_assign().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53585/">CVE-2023-53585 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53585">CVE-2023-53585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251126">SUSE bug 1251126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53586</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53586" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53586" ref_url="https://www.suse.com/security/cve/CVE-2023-53586" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: Fix multiple LUN_RESET handling

This fixes a bug where an initiator thinks a LUN_RESET has cleaned up
running commands when it hasn't. The bug was added in commit 51ec502a3266
("target: Delete tmr from list before processing").

The problem occurs when:

 1. We have N I/O cmds running in the target layer spread over 2 sessions.

 2. The initiator sends a LUN_RESET for each session.

 3. session1's LUN_RESET loops over all the running commands from both
    sessions and moves them to its local drain_task_list.

 4. session2's LUN_RESET does not see the LUN_RESET from session1 because
    the commit above has it remove itself. session2 also does not see any
    commands since the other reset moved them off the state lists.

 5. sessions2's LUN_RESET will then complete with a successful response.

 6. sessions2's inititor believes the running commands on its session are
    now cleaned up due to the successful response and cleans up the running
    commands from its side. It then restarts them.

 7. The commands do eventually complete on the backend and the target
    starts to return aborted task statuses for them. The initiator will
    either throw a invalid ITT error or might accidentally lookup a new
    task if the ITT has been reallocated already.

Fix the bug by reverting the patch, and serialize the execution of
LUN_RESETs and Preempt and Aborts.

Also prevent us from waiting on LUN_RESETs in core_tmr_drain_tmr_list,
because it turns out the original patch fixed a bug that was not
mentioned. For LUN_RESET1 core_tmr_drain_tmr_list can see a second
LUN_RESET and wait on it. Then the second reset will run
core_tmr_drain_tmr_list and see the first reset and wait on it resulting in
a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53586/">CVE-2023-53586 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53586">CVE-2023-53586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251127">SUSE bug 1251127</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53591</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53591" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53591" ref_url="https://www.suse.com/security/cve/CVE-2023-53591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix deadlock in tc route query code

Cited commit causes ABBA deadlock[0] when peer flows are created while
holding the devcom rw semaphore. Due to peer flows offload implementation
the lock is taken much higher up the call chain and there is no obvious way
to easily fix the deadlock. Instead, since tc route query code needs the
peer eswitch structure only to perform a lookup in xarray and doesn't
perform any sleeping operations with it, refactor the code for lockless
execution in following ways:

- RCUify the devcom 'data' pointer. When resetting the pointer
synchronously wait for RCU grace period before returning. This is fine
since devcom is currently only used for synchronization of
pairing/unpairing of eswitches which is rare and already expensive as-is.

- Wrap all usages of 'paired' boolean in {READ|WRITE}_ONCE(). The flag has
already been used in some unlocked contexts without proper
annotations (e.g. users of mlx5_devcom_is_paired() function), but it wasn't
an issue since all relevant code paths checked it again after obtaining the
devcom semaphore. Now it is also used by mlx5_devcom_get_peer_data_rcu() as
"best effort" check to return NULL when devcom is being unpaired. Note that
while RCU read lock doesn't prevent the unpaired flag from being changed
concurrently it still guarantees that reader can continue to use 'data'.

- Refactor mlx5e_tc_query_route_vport() function to use new
mlx5_devcom_get_peer_data_rcu() API which fixes the deadlock.

[0]:

[  164.599612] ======================================================
[  164.600142] WARNING: possible circular locking dependency detected
[  164.600667] 6.3.0-rc3+ #1 Not tainted
[  164.601021] ------------------------------------------------------
[  164.601557] handler1/3456 is trying to acquire lock:
[  164.601998] ffff88811f1714b0 (&amp;esw-&gt;offloads.encap_tbl_lock){+.+.}-{3:3}, at: mlx5e_attach_encap+0xd8/0x8b0 [mlx5_core]
[  164.603078]
               but task is already holding lock:
[  164.603617] ffff88810137fc98 (&amp;comp-&gt;sem){++++}-{3:3}, at: mlx5_devcom_get_peer_data+0x37/0x80 [mlx5_core]
[  164.604459]
               which lock already depends on the new lock.

[  164.605190]
               the existing dependency chain (in reverse order) is:
[  164.605848]
               -&gt; #1 (&amp;comp-&gt;sem){++++}-{3:3}:
[  164.606380]        down_read+0x39/0x50
[  164.606772]        mlx5_devcom_get_peer_data+0x37/0x80 [mlx5_core]
[  164.607336]        mlx5e_tc_query_route_vport+0x86/0xc0 [mlx5_core]
[  164.607914]        mlx5e_tc_tun_route_lookup+0x1a4/0x1d0 [mlx5_core]
[  164.608495]        mlx5e_attach_decap_route+0xc6/0x1e0 [mlx5_core]
[  164.609063]        mlx5e_tc_add_fdb_flow+0x1ea/0x360 [mlx5_core]
[  164.609627]        __mlx5e_add_fdb_flow+0x2d2/0x430 [mlx5_core]
[  164.610175]        mlx5e_configure_flower+0x952/0x1a20 [mlx5_core]
[  164.610741]        tc_setup_cb_add+0xd4/0x200
[  164.611146]        fl_hw_replace_filter+0x14c/0x1f0 [cls_flower]
[  164.611661]        fl_change+0xc95/0x18a0 [cls_flower]
[  164.612116]        tc_new_tfilter+0x3fc/0xd20
[  164.612516]        rtnetlink_rcv_msg+0x418/0x5b0
[  164.612936]        netlink_rcv_skb+0x54/0x100
[  164.613339]        netlink_unicast+0x190/0x250
[  164.613746]        netlink_sendmsg+0x245/0x4a0
[  164.614150]        sock_sendmsg+0x38/0x60
[  164.614522]        ____sys_sendmsg+0x1d0/0x1e0
[  164.614934]        ___sys_sendmsg+0x80/0xc0
[  164.615320]        __sys_sendmsg+0x51/0x90
[  164.615701]        do_syscall_64+0x3d/0x90
[  164.616083]        entry_SYSCALL_64_after_hwframe+0x46/0xb0
[  164.616568]
               -&gt; #0 (&amp;esw-&gt;offloads.encap_tbl_lock){+.+.}-{3:3}:
[  164.617210]        __lock_acquire+0x159e/0x26e0
[  164.617638]        lock_acquire+0xc2/0x2a0
[  164.618018]        __mutex_lock+0x92/0xcd0
[  164.618401]        mlx5e_attach_encap+0xd8/0x8b0 [mlx5_core]
[  164.618943]        post_process_attr+0x153/0x2d0 [
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53591/">CVE-2023-53591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53591">CVE-2023-53591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251167">SUSE bug 1251167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53594" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53594" ref_url="https://www.suse.com/security/cve/CVE-2023-53594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: fix resource leak in device_add()

When calling kobject_add() failed in device_add(), it will call
cleanup_glue_dir() to free resource. But in kobject_add(),
dev-&gt;kobj.parent has been set to NULL. This will cause resource leak.

The process is as follows:
device_add()
	get_device_parent()
		class_dir_create_and_add()
			kobject_add()		//kobject_get()
	...
	dev-&gt;kobj.parent = kobj;
	...
	kobject_add()		//failed, but set dev-&gt;kobj.parent = NULL
	...
	glue_dir = get_glue_dir(dev)	//glue_dir = NULL, and goto
					//"Error" label
	...
	cleanup_glue_dir()	//becaues glue_dir is NULL, not call
				//kobject_put()

The preceding problem may cause insmod mac80211_hwsim.ko to failed.
sysfs: cannot create duplicate filename '/devices/virtual/mac80211_hwsim'
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x8e/0xd1
sysfs_warn_dup.cold+0x1c/0x29
sysfs_create_dir_ns+0x224/0x280
kobject_add_internal+0x2aa/0x880
kobject_add+0x135/0x1a0
get_device_parent+0x3d7/0x590
device_add+0x2aa/0x1cb0
device_create_groups_vargs+0x1eb/0x260
device_create+0xdc/0x110
mac80211_hwsim_new_radio+0x31e/0x4790 [mac80211_hwsim]
init_mac80211_hwsim+0x48d/0x1000 [mac80211_hwsim]
do_one_initcall+0x10f/0x630
do_init_module+0x19f/0x5e0
load_module+0x64b7/0x6eb0
__do_sys_finit_module+0x140/0x200
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x46/0xb0
&lt;/TASK&gt;
kobject_add_internal failed for mac80211_hwsim with -EEXIST, don't try to
register things with the same name in the same directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53594/">CVE-2023-53594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53594">CVE-2023-53594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251166">SUSE bug 1251166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53595" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53595" ref_url="https://www.suse.com/security/cve/CVE-2023-53595" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: mcs: Fix NULL pointer dereferences

When system is rebooted after creating macsec interface
below NULL pointer dereference crashes occurred. This
patch fixes those crashes by using correct order of teardown

[ 3324.406942] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[ 3324.415726] Mem abort info:
[ 3324.418510]   ESR = 0x96000006
[ 3324.421557]   EC = 0x25: DABT (current EL), IL = 32 bits
[ 3324.426865]   SET = 0, FnV = 0
[ 3324.429913]   EA = 0, S1PTW = 0
[ 3324.433047] Data abort info:
[ 3324.435921]   ISV = 0, ISS = 0x00000006
[ 3324.439748]   CM = 0, WnR = 0
....
[ 3324.575915] Call trace:
[ 3324.578353]  cn10k_mdo_del_secy+0x24/0x180
[ 3324.582440]  macsec_common_dellink+0xec/0x120
[ 3324.586788]  macsec_notify+0x17c/0x1c0
[ 3324.590529]  raw_notifier_call_chain+0x50/0x70
[ 3324.594965]  call_netdevice_notifiers_info+0x34/0x7c
[ 3324.599921]  rollback_registered_many+0x354/0x5bc
[ 3324.604616]  unregister_netdevice_queue+0x88/0x10c
[ 3324.609399]  unregister_netdev+0x20/0x30
[ 3324.613313]  otx2_remove+0x8c/0x310
[ 3324.616794]  pci_device_shutdown+0x30/0x70
[ 3324.620882]  device_shutdown+0x11c/0x204

[  966.664930] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[  966.673712] Mem abort info:
[  966.676497]   ESR = 0x96000006
[  966.679543]   EC = 0x25: DABT (current EL), IL = 32 bits
[  966.684848]   SET = 0, FnV = 0
[  966.687895]   EA = 0, S1PTW = 0
[  966.691028] Data abort info:
[  966.693900]   ISV = 0, ISS = 0x00000006
[  966.697729]   CM = 0, WnR = 0
[  966.833467] Call trace:
[  966.835904]  cn10k_mdo_stop+0x20/0xa0
[  966.839557]  macsec_dev_stop+0xe8/0x11c
[  966.843384]  __dev_close_many+0xbc/0x140
[  966.847298]  dev_close_many+0x84/0x120
[  966.851039]  rollback_registered_many+0x114/0x5bc
[  966.855735]  unregister_netdevice_many.part.0+0x14/0xa0
[  966.860952]  unregister_netdevice_many+0x18/0x24
[  966.865560]  macsec_notify+0x1ac/0x1c0
[  966.869303]  raw_notifier_call_chain+0x50/0x70
[  966.873738]  call_netdevice_notifiers_info+0x34/0x7c
[  966.878694]  rollback_registered_many+0x354/0x5bc
[  966.883390]  unregister_netdevice_queue+0x88/0x10c
[  966.888173]  unregister_netdev+0x20/0x30
[  966.892090]  otx2_remove+0x8c/0x310
[  966.895571]  pci_device_shutdown+0x30/0x70
[  966.899660]  device_shutdown+0x11c/0x204
[  966.903574]  __do_sys_reboot+0x208/0x290
[  966.907487]  __arm64_sys_reboot+0x20/0x30
[  966.911489]  el0_svc_handler+0x80/0x1c0
[  966.915316]  el0_svc+0x8/0x180
[  966.918362] Code: f9400000 f9400a64 91220014 f94b3403 (f9400060)
[  966.924448] ---[ end trace 341778e799c3d8d7 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53595/">CVE-2023-53595 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53595">CVE-2023-53595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251073">SUSE bug 1251073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53598" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53598" ref_url="https://www.suse.com/security/cve/CVE-2023-53598" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Range check CHDBOFF and ERDBOFF

If the value read from the CHDBOFF and ERDBOFF registers is outside the
range of the MHI register space then an invalid address might be computed
which later causes a kernel panic.  Range check the read value to prevent
a crash due to bad data from the device.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53598/">CVE-2023-53598 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53598">CVE-2023-53598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251162">SUSE bug 1251162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53602" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53602" ref_url="https://www.suse.com/security/cve/CVE-2023-53602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix memory leak in WMI firmware stats

Memory allocated for firmware pdev, vdev and beacon statistics
are not released during rmmod.

Fix it by calling ath11k_fw_stats_free() function before hardware
unregister.

While at it, avoid calling ath11k_fw_stats_free() while processing
the firmware stats received in the WMI event because the local list
is getting spliced and reinitialised and hence there are no elements
in the list after splicing.

Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53602/">CVE-2023-53602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53602">CVE-2023-53602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251076">SUSE bug 1251076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53605" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53605" ref_url="https://www.suse.com/security/cve/CVE-2023-53605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: amd: display: Fix memory leakage

This commit fixes memory leakage in dc_construct_ctx() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53605/">CVE-2023-53605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53605">CVE-2023-53605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251149">SUSE bug 1251149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53606</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53606" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53606" ref_url="https://www.suse.com/security/cve/CVE-2023-53606" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: clean up potential nfsd_file refcount leaks in COPY codepath

There are two different flavors of the nfsd4_copy struct. One is
embedded in the compound and is used directly in synchronous copies. The
other is dynamically allocated, refcounted and tracked in the client
struture. For the embedded one, the cleanup just involves releasing any
nfsd_files held on its behalf. For the async one, the cleanup is a bit
more involved, and we need to dequeue it from lists, unhash it, etc.

There is at least one potential refcount leak in this code now. If the
kthread_create call fails, then both the src and dst nfsd_files in the
original nfsd4_copy object are leaked.

The cleanup in this codepath is also sort of weird. In the async copy
case, we'll have up to four nfsd_file references (src and dst for both
flavors of copy structure). They are both put at the end of
nfsd4_do_async_copy, even though the ones held on behalf of the embedded
one outlive that structure.

Change it so that we always clean up the nfsd_file refs held by the
embedded copy structure before nfsd4_copy returns. Rework
cleanup_async_copy to handle both inter and intra copies. Eliminate
nfsd4_cleanup_intra_ssc since it now becomes a no-op.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53606/">CVE-2023-53606 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53606">CVE-2023-53606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251220">SUSE bug 1251220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53607</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53607" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53607" ref_url="https://www.suse.com/security/cve/CVE-2023-53607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ymfpci: Fix BUG_ON in probe function

The snd_dma_buffer.bytes field now contains the aligned size, which this
snd_BUG_ON() did not account for, resulting in the following:

[    9.625915] ------------[ cut here ]------------
[    9.633440] WARNING: CPU: 0 PID: 126 at sound/pci/ymfpci/ymfpci_main.c:2168 snd_ymfpci_create+0x681/0x698 [snd_ymfpci]
[    9.648926] Modules linked in: snd_ymfpci(+) snd_intel_dspcfg kvm(+) snd_intel_sdw_acpi snd_ac97_codec snd_mpu401_uart snd_opl3_lib irqbypass snd_hda_codec gameport snd_rawmidi crct10dif_pclmul crc32_pclmul cfg80211 snd_hda_core polyval_clmulni polyval_generic gf128mul snd_seq_device ghash_clmulni_intel snd_hwdep ac97_bus sha512_ssse3 rfkill snd_pcm aesni_intel tg3 snd_timer crypto_simd snd mxm_wmi libphy cryptd k10temp fam15h_power pcspkr soundcore sp5100_tco wmi acpi_cpufreq mac_hid dm_multipath sg loop fuse dm_mod bpf_preload ip_tables x_tables ext4 crc32c_generic crc16 mbcache jbd2 sr_mod cdrom ata_generic pata_acpi firewire_ohci crc32c_intel firewire_core xhci_pci crc_itu_t pata_via xhci_pci_renesas floppy
[    9.711849] CPU: 0 PID: 126 Comm: kworker/0:2 Not tainted 6.1.21-1-lts #1 08d2e5ece03136efa7c6aeea9a9c40916b1bd8da
[    9.722200] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./990FX Extreme4, BIOS P2.70 06/05/2014
[    9.732204] Workqueue: events work_for_cpu_fn
[    9.736580] RIP: 0010:snd_ymfpci_create+0x681/0x698 [snd_ymfpci]
[    9.742594] Code: 8c c0 4c 89 e2 48 89 df 48 c7 c6 92 c6 8c c0 e8 15 d0 e9 ff 48 83 c4 08 44 89 e8 5b 5d 41 5c 41 5d 41 5e 41 5f e9 d3 7a 33 e3 &lt;0f&gt; 0b e9 cb fd ff ff 41 bd fb ff ff ff eb db 41 bd f4 ff ff ff eb
[    9.761358] RSP: 0018:ffffab64804e7da0 EFLAGS: 00010287
[    9.766594] RAX: ffff8fa2df06c400 RBX: ffff8fa3073a8000 RCX: ffff8fa303fbc4a8
[    9.773734] RDX: ffff8fa2df06d000 RSI: 0000000000000010 RDI: 0000000000000020
[    9.780876] RBP: ffff8fa300b5d0d0 R08: ffff8fa3073a8e50 R09: 00000000df06bf00
[    9.788018] R10: ffff8fa2df06bf00 R11: 00000000df068200 R12: ffff8fa3073a8918
[    9.795159] R13: 0000000000000000 R14: 0000000000000080 R15: ffff8fa2df068200
[    9.802317] FS:  0000000000000000(0000) GS:ffff8fa9fec00000(0000) knlGS:0000000000000000
[    9.810414] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    9.816158] CR2: 000055febaf66500 CR3: 0000000101a2e000 CR4: 00000000000406f0
[    9.823301] Call Trace:
[    9.825747]  &lt;TASK&gt;
[    9.827889]  snd_card_ymfpci_probe+0x194/0x950 [snd_ymfpci b78a5fe64b5663a6390a909c67808567e3e73615]
[    9.837030]  ? finish_task_switch.isra.0+0x90/0x2d0
[    9.841918]  local_pci_probe+0x45/0x80
[    9.845680]  work_for_cpu_fn+0x1a/0x30
[    9.849431]  process_one_work+0x1c7/0x380
[    9.853464]  worker_thread+0x1af/0x390
[    9.857225]  ? rescuer_thread+0x3b0/0x3b0
[    9.861254]  kthread+0xde/0x110
[    9.864414]  ? kthread_complete_and_exit+0x20/0x20
[    9.869210]  ret_from_fork+0x22/0x30
[    9.872792]  &lt;/TASK&gt;
[    9.874985] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53607/">CVE-2023-53607 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53607">CVE-2023-53607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251136">SUSE bug 1251136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53609" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53609" ref_url="https://www.suse.com/security/cve/CVE-2023-53609" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed"

The "atomic_inc(&amp;cmd-&gt;device-&gt;iorequest_cnt)" in scsi_queue_rq() would
cause kernel panic because cmd-&gt;device may be freed after returning from
scsi_dispatch_cmd().

This reverts commit cfee29ffb45b1c9798011b19d454637d1b0fe87d.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53609/">CVE-2023-53609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53609">CVE-2023-53609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251131">SUSE bug 1251131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53611" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53611" ref_url="https://www.suse.com/security/cve/CVE-2023-53611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi_si: fix a memleak in try_smi_init()

Kmemleak reported the following leak info in try_smi_init():

unreferenced object 0xffff00018ecf9400 (size 1024):
  comm "modprobe", pid 2707763, jiffies 4300851415 (age 773.308s)
  backtrace:
    [&lt;000000004ca5b312&gt;] __kmalloc+0x4b8/0x7b0
    [&lt;00000000953b1072&gt;] try_smi_init+0x148/0x5dc [ipmi_si]
    [&lt;000000006460d325&gt;] 0xffff800081b10148
    [&lt;0000000039206ea5&gt;] do_one_initcall+0x64/0x2a4
    [&lt;00000000601399ce&gt;] do_init_module+0x50/0x300
    [&lt;000000003c12ba3c&gt;] load_module+0x7a8/0x9e0
    [&lt;00000000c246fffe&gt;] __se_sys_init_module+0x104/0x180
    [&lt;00000000eea99093&gt;] __arm64_sys_init_module+0x24/0x30
    [&lt;0000000021b1ef87&gt;] el0_svc_common.constprop.0+0x94/0x250
    [&lt;0000000070f4f8b7&gt;] do_el0_svc+0x48/0xe0
    [&lt;000000005a05337f&gt;] el0_svc+0x24/0x3c
    [&lt;000000005eb248d6&gt;] el0_sync_handler+0x160/0x164
    [&lt;0000000030a59039&gt;] el0_sync+0x160/0x180

The problem was that when an error occurred before handlers registration
and after allocating `new_smi-&gt;si_sm`, the variable wouldn't be freed in
the error handling afterwards since `shutdown_smi()` hadn't been
registered yet. Fix it by adding a `kfree()` in the error handling path
in `try_smi_init()`.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53611/">CVE-2023-53611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53611">CVE-2023-53611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251123">SUSE bug 1251123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53612</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53612" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53612" ref_url="https://www.suse.com/security/cve/CVE-2023-53612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) Simplify platform device handling

Coretemp's platform driver is unconventional. All the real work is done
globally by the initcall and CPU hotplug notifiers, while the "driver"
effectively just wraps an allocation and the registration of the hwmon
interface in a long-winded round-trip through the driver core.  The whole
logic of dynamically creating and destroying platform devices to bring
the interfaces up and down is error prone, since it assumes
platform_device_add() will synchronously bind the driver and set drvdata
before it returns, thus results in a NULL dereference if drivers_autoprobe
is turned off for the platform bus. Furthermore, the unusual approach of
doing that from within a CPU hotplug notifier, already commented in the
code that it deadlocks suspend, also causes lockdep issues for other
drivers or subsystems which may want to legitimately register a CPU
hotplug notifier from a platform bus notifier.

All of these issues can be solved by ripping this unusual behaviour out
completely, simply tying the platform devices to the lifetime of the
module itself, and directly managing the hwmon interfaces from the
hotplug notifiers. There is a slight user-visible change in that
/sys/bus/platform/drivers/coretemp will no longer appear, and
/sys/devices/platform/coretemp.n will remain present if package n is
hotplugged off, but hwmon users should really only be looking for the
presence of the hwmon interfaces, whose behaviour remains unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53612/">CVE-2023-53612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53612">CVE-2023-53612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251218">SUSE bug 1251218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53615" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53615" ref_url="https://www.suse.com/security/cve/CVE-2023-53615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix deletion race condition

System crash when using debug kernel due to link list corruption. The cause
of the link list corruption is due to session deletion was allowed to queue
up twice.  Here's the internal trace that show the same port was allowed to
double queue for deletion on different cpu.

20808683956 015 qla2xxx [0000:13:00.1]-e801:4: Scheduling sess ffff93ebf9306800 for deletion 50:06:0e:80:12:48:ff:50 fc4_type 1
20808683957 027 qla2xxx [0000:13:00.1]-e801:4: Scheduling sess ffff93ebf9306800 for deletion 50:06:0e:80:12:48:ff:50 fc4_type 1

Move the clearing/setting of deleted flag lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53615/">CVE-2023-53615 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53615">CVE-2023-53615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251113">SUSE bug 1251113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53620</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53620" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53620" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53620" ref_url="https://www.suse.com/security/cve/CVE-2023-53620" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix soft lockup in status_resync

status_resync() will calculate 'curr_resync - recovery_active' to show
user a progress bar like following:

[============&gt;........]  resync = 61.4%

'curr_resync' and 'recovery_active' is updated in md_do_sync(), and
status_resync() can read them concurrently, hence it's possible that
'curr_resync - recovery_active' can overflow to a huge number. In this
case status_resync() will be stuck in the loop to print a large amount
of '=', which will end up soft lockup.

Fix the problem by setting 'resync' to MD_RESYNC_ACTIVE in this case,
this way resync in progress will be reported to user.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53620/">CVE-2023-53620 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53620">CVE-2023-53620 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251318">SUSE bug 1251318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53621</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53621" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53621" ref_url="https://www.suse.com/security/cve/CVE-2023-53621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memcontrol: ensure memcg acquired by id is properly set up

In the eviction recency check, we attempt to retrieve the memcg to which
the folio belonged when it was evicted, by the memcg id stored in the
shadow entry.  However, there is a chance that the retrieved memcg is not
the original memcg that has been killed, but a new one which happens to
have the same id.

This is a somewhat unfortunate, but acceptable and rare inaccuracy in the
heuristics.  However, if we retrieve this new memcg between its allocation
and when it is properly attached to the memcg hierarchy, we could run into
the following NULL pointer exception during the memcg hierarchy traversal
done in mem_cgroup_get_nr_swap_pages():

[ 155757.793456] BUG: kernel NULL pointer dereference, address: 00000000000000c0
[ 155757.807568] #PF: supervisor read access in kernel mode
[ 155757.818024] #PF: error_code(0x0000) - not-present page
[ 155757.828482] PGD 401f77067 P4D 401f77067 PUD 401f76067 PMD 0
[ 155757.839985] Oops: 0000 [#1] SMP
[ 155757.887870] RIP: 0010:mem_cgroup_get_nr_swap_pages+0x3d/0xb0
[ 155757.899377] Code: 29 19 4a 02 48 39 f9 74 63 48 8b 97 c0 00 00 00 48 8b b7 58 02 00 00 48 2b b7 c0 01 00 00 48 39 f0 48 0f 4d c6 48 39 d1 74 42 &lt;48&gt; 8b b2 c0 00 00 00 48 8b ba 58 02 00 00 48 2b ba c0 01 00 00 48
[ 155757.937125] RSP: 0018:ffffc9002ecdfbc8 EFLAGS: 00010286
[ 155757.947755] RAX: 00000000003a3b1c RBX: 000007ffffffffff RCX: ffff888280183000
[ 155757.962202] RDX: 0000000000000000 RSI: 0007ffffffffffff RDI: ffff888bbc2d1000
[ 155757.976648] RBP: 0000000000000001 R08: 000000000000000b R09: ffff888ad9cedba0
[ 155757.991094] R10: ffffea0039c07900 R11: 0000000000000010 R12: ffff888b23a7b000
[ 155758.005540] R13: 0000000000000000 R14: ffff888bbc2d1000 R15: 000007ffffc71354
[ 155758.019991] FS:  00007f6234c68640(0000) GS:ffff88903f9c0000(0000) knlGS:0000000000000000
[ 155758.036356] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 155758.048023] CR2: 00000000000000c0 CR3: 0000000a83eb8004 CR4: 00000000007706e0
[ 155758.062473] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 155758.076924] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 155758.091376] PKRU: 55555554
[ 155758.096957] Call Trace:
[ 155758.102016]  &lt;TASK&gt;
[ 155758.106502]  ? __die+0x78/0xc0
[ 155758.112793]  ? page_fault_oops+0x286/0x380
[ 155758.121175]  ? exc_page_fault+0x5d/0x110
[ 155758.129209]  ? asm_exc_page_fault+0x22/0x30
[ 155758.137763]  ? mem_cgroup_get_nr_swap_pages+0x3d/0xb0
[ 155758.148060]  workingset_test_recent+0xda/0x1b0
[ 155758.157133]  workingset_refault+0xca/0x1e0
[ 155758.165508]  filemap_add_folio+0x4d/0x70
[ 155758.173538]  page_cache_ra_unbounded+0xed/0x190
[ 155758.182919]  page_cache_sync_ra+0xd6/0x1e0
[ 155758.191738]  filemap_read+0x68d/0xdf0
[ 155758.199495]  ? mlx5e_napi_poll+0x123/0x940
[ 155758.207981]  ? __napi_schedule+0x55/0x90
[ 155758.216095]  __x64_sys_pread64+0x1d6/0x2c0
[ 155758.224601]  do_syscall_64+0x3d/0x80
[ 155758.232058]  entry_SYSCALL_64_after_hwframe+0x46/0xb0
[ 155758.242473] RIP: 0033:0x7f62c29153b5
[ 155758.249938] Code: e8 48 89 75 f0 89 7d f8 48 89 4d e0 e8 b4 e6 f7 ff 41 89 c0 4c 8b 55 e0 48 8b 55 e8 48 8b 75 f0 8b 7d f8 b8 11 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 33 44 89 c7 48 89 45 f8 e8 e7 e6 f7 ff 48 8b
[ 155758.288005] RSP: 002b:00007f6234c5ffd0 EFLAGS: 00000293 ORIG_RAX: 0000000000000011
[ 155758.303474] RAX: ffffffffffffffda RBX: 00007f628c4e70c0 RCX: 00007f62c29153b5
[ 155758.318075] RDX: 000000000003c041 RSI: 00007f61d2986000 RDI: 0000000000000076
[ 155758.332678] RBP: 00007f6234c5fff0 R08: 0000000000000000 R09: 0000000064d5230c
[ 155758.347452] R10: 000000000027d450 R11: 0000000000000293 R12: 000000000003c041
[ 155758.362044] R13: 00007f61d2986000 R14: 00007f629e11b060 R15: 000000000027d450
[ 155758.376661]  &lt;/TASK&gt;

This patch fixes the issue by moving the memcg's id publication from the
alloc stage to 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53621/">CVE-2023-53621 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53621">CVE-2023-53621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251323">SUSE bug 1251323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53623" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53623" ref_url="https://www.suse.com/security/cve/CVE-2023-53623" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/swap: fix swap_info_struct race between swapoff and get_swap_pages()

The si-&gt;lock must be held when deleting the si from the available list. 
Otherwise, another thread can re-add the si to the available list, which
can lead to memory corruption.  The only place we have found where this
happens is in the swapoff path.  This case can be described as below:

core 0                       core 1
swapoff

del_from_avail_list(si)      waiting

try lock si-&gt;lock            acquire swap_avail_lock
                             and re-add si into
                             swap_avail_head

acquire si-&gt;lock but missing si already being added again, and continuing
to clear SWP_WRITEOK, etc.

It can be easily found that a massive warning messages can be triggered
inside get_swap_pages() by some special cases, for example, we call
madvise(MADV_PAGEOUT) on blocks of touched memory concurrently, meanwhile,
run much swapon-swapoff operations (e.g.  stress-ng-swap).

However, in the worst case, panic can be caused by the above scene.  In
swapoff(), the memory used by si could be kept in swap_info[] after
turning off a swap.  This means memory corruption will not be caused
immediately until allocated and reset for a new swap in the swapon path. 
A panic message caused: (with CONFIG_PLIST_DEBUG enabled)

------------[ cut here ]------------
top: 00000000e58a3003, n: 0000000013e75cda, p: 000000008cd4451a
prev: 0000000035b1e58a, n: 000000008cd4451a, p: 000000002150ee8d
next: 000000008cd4451a, n: 000000008cd4451a, p: 000000008cd4451a
WARNING: CPU: 21 PID: 1843 at lib/plist.c:60 plist_check_prev_next_node+0x50/0x70
Modules linked in: rfkill(E) crct10dif_ce(E)...
CPU: 21 PID: 1843 Comm: stress-ng Kdump: ... 5.10.134+
Hardware name: Alibaba Cloud ECS, BIOS 0.0.0 02/06/2015
pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)
pc : plist_check_prev_next_node+0x50/0x70
lr : plist_check_prev_next_node+0x50/0x70
sp : ffff0018009d3c30
x29: ffff0018009d3c40 x28: ffff800011b32a98
x27: 0000000000000000 x26: ffff001803908000
x25: ffff8000128ea088 x24: ffff800011b32a48
x23: 0000000000000028 x22: ffff001800875c00
x21: ffff800010f9e520 x20: ffff001800875c00
x19: ffff001800fdc6e0 x18: 0000000000000030
x17: 0000000000000000 x16: 0000000000000000
x15: 0736076307640766 x14: 0730073007380731
x13: 0736076307640766 x12: 0730073007380731
x11: 000000000004058d x10: 0000000085a85b76
x9 : ffff8000101436e4 x8 : ffff800011c8ce08
x7 : 0000000000000000 x6 : 0000000000000001
x5 : ffff0017df9ed338 x4 : 0000000000000001
x3 : ffff8017ce62a000 x2 : ffff0017df9ed340
x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 plist_check_prev_next_node+0x50/0x70
 plist_check_head+0x80/0xf0
 plist_add+0x28/0x140
 add_to_avail_list+0x9c/0xf0
 _enable_swap_info+0x78/0xb4
 __do_sys_swapon+0x918/0xa10
 __arm64_sys_swapon+0x20/0x30
 el0_svc_common+0x8c/0x220
 do_el0_svc+0x2c/0x90
 el0_svc+0x1c/0x30
 el0_sync_handler+0xa8/0xb0
 el0_sync+0x148/0x180
irq event stamp: 2082270

Now, si-&gt;lock locked before calling 'del_from_avail_list()' to make sure
other thread see the si had been deleted and SWP_WRITEOK cleared together,
will not reinsert again.

This problem exists in versions after stable 5.10.y.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53623/">CVE-2023-53623 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53623">CVE-2023-53623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251335">SUSE bug 1251335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53624" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53624" ref_url="https://www.suse.com/security/cve/CVE-2023-53624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_fq: fix integer overflow of "credit"

if sch_fq is configured with "initial quantum" having values greater than
INT_MAX, the first assignment of "credit" does signed integer overflow to
a very negative value.
In this situation, the syzkaller script provided by Cristoph triggers the
CPU soft-lockup warning even with few sockets. It's not an infinite loop,
but "credit" wasn't probably meant to be minus 2Gb for each new flow.
Capping "initial quantum" to INT_MAX proved to fix the issue.

v2: validation of "initial quantum" is done in fq_policy, instead of open
    coding in fq_change() _ suggested by Jakub Kicinski
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53624/">CVE-2023-53624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53624">CVE-2023-53624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251333">SUSE bug 1251333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53625" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53625" ref_url="https://www.suse.com/security/cve/CVE-2023-53625" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gvt: fix vgpu debugfs clean in remove

Check carefully on root debugfs available when destroying vgpu,
e.g in remove case drm minor's debugfs root might already be destroyed,
which led to kernel oops like below.

Console: switching to colour dummy device 80x25
i915 0000:00:02.0: MDEV: Unregistering
intel_vgpu_mdev b1338b2d-a709-4c23-b766-cc436c36cdf0: Removing from iommu group 14
BUG: kernel NULL pointer dereference, address: 0000000000000150
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP
CPU: 3 PID: 1046 Comm: driverctl Not tainted 6.1.0-rc2+ #6
Hardware name: HP HP ProDesk 600 G3 MT/829D, BIOS P02 Ver. 02.44 09/13/2022
RIP: 0010:__lock_acquire+0x5e2/0x1f90
Code: 87 ad 09 00 00 39 05 e1 1e cc 02 0f 82 f1 09 00 00 ba 01 00 00 00 48 83 c4 48 89 d0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 45 31 ff &lt;48&gt; 81 3f 60 9e c2 b6 45 0f 45 f8 83 fe 01 0f 87 55 fa ff ff 89 f0
RSP: 0018:ffff9f770274f948 EFLAGS: 00010046
RAX: 0000000000000003 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000150
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: ffff8895d1173300 R11: 0000000000000001 R12: 0000000000000000
R13: 0000000000000150 R14: 0000000000000000 R15: 0000000000000000
FS:  00007fc9b2ba0740(0000) GS:ffff889cdfcc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000150 CR3: 000000010fd93005 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 lock_acquire+0xbf/0x2b0
 ? simple_recursive_removal+0xa5/0x2b0
 ? lock_release+0x13d/0x2d0
 down_write+0x2a/0xd0
 ? simple_recursive_removal+0xa5/0x2b0
 simple_recursive_removal+0xa5/0x2b0
 ? start_creating.part.0+0x110/0x110
 ? _raw_spin_unlock+0x29/0x40
 debugfs_remove+0x40/0x60
 intel_gvt_debugfs_remove_vgpu+0x15/0x30 [kvmgt]
 intel_gvt_destroy_vgpu+0x60/0x100 [kvmgt]
 intel_vgpu_release_dev+0xe/0x20 [kvmgt]
 device_release+0x30/0x80
 kobject_put+0x79/0x1b0
 device_release_driver_internal+0x1b8/0x230
 bus_remove_device+0xec/0x160
 device_del+0x189/0x400
 ? up_write+0x9c/0x1b0
 ? mdev_device_remove_common+0x60/0x60 [mdev]
 mdev_device_remove_common+0x22/0x60 [mdev]
 mdev_device_remove_cb+0x17/0x20 [mdev]
 device_for_each_child+0x56/0x80
 mdev_unregister_parent+0x5a/0x81 [mdev]
 intel_gvt_clean_device+0x2d/0xe0 [kvmgt]
 intel_gvt_driver_remove+0x2e/0xb0 [i915]
 i915_driver_remove+0xac/0x100 [i915]
 i915_pci_remove+0x1a/0x30 [i915]
 pci_device_remove+0x31/0xa0
 device_release_driver_internal+0x1b8/0x230
 unbind_store+0xd8/0x100
 kernfs_fop_write_iter+0x156/0x210
 vfs_write+0x236/0x4a0
 ksys_write+0x61/0xd0
 do_syscall_64+0x55/0x80
 ? find_held_lock+0x2b/0x80
 ? lock_release+0x13d/0x2d0
 ? up_read+0x17/0x20
 ? lock_is_held_type+0xe3/0x140
 ? asm_exc_page_fault+0x22/0x30
 ? lockdep_hardirqs_on+0x7d/0x100
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033:0x7fc9b2c9e0c4
Code: 15 71 7d 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 80 3d 3d 05 0e 00 00 74 13 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 48 89 54 24 18 48
RSP: 002b:00007ffec29c81c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000000000d RCX: 00007fc9b2c9e0c4
RDX: 000000000000000d RSI: 0000559f8b5f48a0 RDI: 0000000000000001
RBP: 0000559f8b5f48a0 R08: 0000559f8b5f3540 R09: 00007fc9b2d76d30
R10: 0000000000000000 R11: 0000000000000202 R12: 000000000000000d
R13: 00007fc9b2d77780 R14: 000000000000000d R15: 00007fc9b2d72a00
 &lt;/TASK&gt;
Modules linked in: sunrpc intel_rapl_msr intel_rapl_common intel_pmc_core_pltdrv intel_pmc_core intel_tcc_cooling x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel ee1004 igbvf rapl vfat fat intel_cstate intel_uncore pktcdvd i2c_i801 pcspkr wmi_bmof i2c_smbus acpi_pad vfio_pci vfio_pci_core vfio_virqfd zram fuse dm
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53625/">CVE-2023-53625 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53625">CVE-2023-53625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251324">SUSE bug 1251324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53626" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53626" ref_url="https://www.suse.com/security/cve/CVE-2023-53626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix possible double unlock when moving a directory
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53626/">CVE-2023-53626 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53626">CVE-2023-53626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251775">SUSE bug 1251775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53628</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53628" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53628" ref_url="https://www.suse.com/security/cve/CVE-2023-53628" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: drop gfx_v11_0_cp_ecc_error_irq_funcs

The gfx.cp_ecc_error_irq is retired in gfx11. In gfx_v11_0_hw_fini still
use amdgpu_irq_put to disable this interrupt, which caused the call trace
in this function.

[  102.873958] Call Trace:
[  102.873959]  &lt;TASK&gt;
[  102.873961]  gfx_v11_0_hw_fini+0x23/0x1e0 [amdgpu]
[  102.874019]  gfx_v11_0_suspend+0xe/0x20 [amdgpu]
[  102.874072]  amdgpu_device_ip_suspend_phase2+0x240/0x460 [amdgpu]
[  102.874122]  amdgpu_device_ip_suspend+0x3d/0x80 [amdgpu]
[  102.874172]  amdgpu_device_pre_asic_reset+0xd9/0x490 [amdgpu]
[  102.874223]  amdgpu_device_gpu_recover.cold+0x548/0xce6 [amdgpu]
[  102.874321]  amdgpu_debugfs_reset_work+0x4c/0x70 [amdgpu]
[  102.874375]  process_one_work+0x21f/0x3f0
[  102.874377]  worker_thread+0x200/0x3e0
[  102.874378]  ? process_one_work+0x3f0/0x3f0
[  102.874379]  kthread+0xfd/0x130
[  102.874380]  ? kthread_complete_and_exit+0x20/0x20
[  102.874381]  ret_from_fork+0x22/0x30

v2:
- Handle umc and gfx ras cases in separated patch
- Retired the gfx_v11_0_cp_ecc_error_irq_funcs in gfx11

v3:
- Improve the subject and code comments
- Add judgment on gfx11 in the function of amdgpu_gfx_ras_late_init

v4:
- Drop the define of CP_ME1_PIPE_INST_ADDR_INTERVAL and
SET_ECC_ME_PIPE_STATE which using in gfx_v11_0_set_cp_ecc_error_state
- Check cp_ecc_error_irq.funcs rather than ip version for a more
sustainable life

v5:
- Simplify judgment conditions
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53628/">CVE-2023-53628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53628">CVE-2023-53628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251774">SUSE bug 1251774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5363" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5363" ref_url="https://www.suse.com/security/cve/CVE-2023-5363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016834.html" source="SUSE-SU"/>
    <description>
    Issue summary: A bug has been identified in the processing of key and
initialisation vector (IV) lengths.  This can lead to potential truncation
or overruns during the initialisation of some symmetric ciphers.

Impact summary: A truncation in the IV can result in non-uniqueness,
which could result in loss of confidentiality for some cipher modes.

When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or
EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after
the key and IV have been established.  Any alterations to the key length,
via the "keylen" parameter or the IV length, via the "ivlen" parameter,
within the OSSL_PARAM array will not take effect as intended, potentially
causing truncation or overreading of these values.  The following ciphers
and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.

For the CCM, GCM and OCB cipher modes, truncation of the IV can result in
loss of confidentiality.  For example, when following NIST's SP 800-38D
section 8.2.1 guidance for constructing a deterministic IV for AES in
GCM mode, truncation of the counter portion could lead to IV reuse.

Both truncations and overruns of the key and overruns of the IV will
produce incorrect results and could, in some cases, trigger a memory
exception.  However, these issues are not currently assessed as security
critical.

Changing the key and/or IV lengths is not considered to be a common operation
and the vulnerable API was recently introduced. Furthermore it is likely that
application developers will have spotted this problem during testing since
decryption would fail unless both peers in the communication were similarly
vulnerable. For these reasons we expect the probability of an application being
vulnerable to this to be quite low. However if an application is vulnerable then
this issue is considered very serious. For these reasons we have assessed this
issue as Moderate severity overall.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because
the issue lies outside of the FIPS provider boundary.

OpenSSL 3.1 and 3.0 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5363/">CVE-2023-5363 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5363">CVE-2023-5363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216163">SUSE bug 1216163</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844796" comment="openssl-3.0.7-25.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844797" comment="openssl-devel-3.0.7-25.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844798" comment="openssl-libs-3.0.7-25.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844799" comment="openssl-perl-3.0.7-25.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53632" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53632" ref_url="https://www.suse.com/security/cve/CVE-2023-53632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Take RTNL lock when needed before calling xdp_set_features()

Hold RTNL lock when calling xdp_set_features() with a registered netdev,
as the call triggers the netdev notifiers. This could happen when
switching from uplink rep to nic profile for example.

This resolves the following call trace:

RTNL: assertion failed at net/core/dev.c (1953)
WARNING: CPU: 6 PID: 112670 at net/core/dev.c:1953 call_netdevice_notifiers_info+0x7c/0x80
Modules linked in: sch_mqprio sch_mqprio_lib act_tunnel_key act_mirred act_skbedit cls_matchall nfnetlink_cttimeout act_gact cls_flower sch_ingress bonding ib_umad ip_gre rdma_ucm mlx5_vfio_pci ipip tunnel4 ip6_gre gre mlx5_ib vfio_pci vfio_pci_core vfio_iommu_type1 ib_uverbs vfio mlx5_core ib_ipoib geneve nf_tables ip6_tunnel tunnel6 iptable_raw openvswitch nsh rpcrdma ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm ib_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay zram zsmalloc fuse [last unloaded: ib_uverbs]
CPU: 6 PID: 112670 Comm: devlink Not tainted 6.4.0-rc7_for_upstream_min_debug_2023_06_28_17_02 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:call_netdevice_notifiers_info+0x7c/0x80
Code: 90 ff 80 3d 2d 6b f7 00 00 75 c5 ba a1 07 00 00 48 c7 c6 e4 ce 0b 82 48 c7 c7 c8 f4 04 82 c6 05 11 6b f7 00 01 e8 a4 7c 8e ff &lt;0f&gt; 0b eb a2 0f 1f 44 00 00 55 48 89 e5 41 54 48 83 e4 f0 48 83 ec
RSP: 0018:ffff8882a21c3948 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffffffff82e6f880 RCX: 0000000000000027
RDX: ffff88885f99b5c8 RSI: 0000000000000001 RDI: ffff88885f99b5c0
RBP: 0000000000000028 R08: ffff88887ffabaa8 R09: 0000000000000003
R10: ffff88887fecbac0 R11: ffff88887ff7bac0 R12: ffff8882a21c3968
R13: ffff88811c018940 R14: 0000000000000000 R15: ffff8881274401a0
FS:  00007fe141c81800(0000) GS:ffff88885f980000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f787c28b948 CR3: 000000014bcf3005 CR4: 0000000000370ea0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x79/0x120
 ? call_netdevice_notifiers_info+0x7c/0x80
 ? report_bug+0x17c/0x190
 ? handle_bug+0x3c/0x60
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 ? call_netdevice_notifiers_info+0x7c/0x80
 ? call_netdevice_notifiers_info+0x7c/0x80
 call_netdevice_notifiers+0x2e/0x50
 mlx5e_set_xdp_feature+0x21/0x50 [mlx5_core]
 mlx5e_nic_init+0xf1/0x1a0 [mlx5_core]
 mlx5e_netdev_init_profile+0x76/0x110 [mlx5_core]
 mlx5e_netdev_attach_profile+0x1f/0x90 [mlx5_core]
 mlx5e_netdev_change_profile+0x92/0x160 [mlx5_core]
 mlx5e_netdev_attach_nic_profile+0x1b/0x30 [mlx5_core]
 mlx5e_vport_rep_unload+0xaa/0xc0 [mlx5_core]
 __esw_offloads_unload_rep+0x52/0x60 [mlx5_core]
 mlx5_esw_offloads_rep_unload+0x52/0x70 [mlx5_core]
 esw_offloads_unload_rep+0x34/0x70 [mlx5_core]
 esw_offloads_disable+0x2b/0x90 [mlx5_core]
 mlx5_eswitch_disable_locked+0x1b9/0x210 [mlx5_core]
 mlx5_devlink_eswitch_mode_set+0xf5/0x630 [mlx5_core]
 ? devlink_get_from_attrs_lock+0x9e/0x110
 devlink_nl_cmd_eswitch_set_doit+0x60/0xe0
 genl_family_rcv_msg_doit.isra.0+0xc2/0x110
 genl_rcv_msg+0x17d/0x2b0
 ? devlink_get_from_attrs_lock+0x110/0x110
 ? devlink_nl_cmd_eswitch_get_doit+0x290/0x290
 ? devlink_pernet_pre_exit+0xf0/0xf0
 ? genl_family_rcv_msg_doit.isra.0+0x110/0x110
 netlink_rcv_skb+0x54/0x100
 genl_rcv+0x24/0x40
 netlink_unicast+0x1f6/0x2c0
 netlink_sendmsg+0x232/0x4a0
 sock_sendmsg+0x38/0x60
 ? _copy_from_user+0x2a/0x60
 __sys_sendto+0x110/0x160
 ? __count_memcg_events+0x48/0x90
 ? handle_mm_fault+0x161/0x260
 ? do_user_addr_fault+0x278/0x6e0
 __x64_sys_sendto+0x20/0x30
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
RIP: 0033
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53632/">CVE-2023-53632 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53632">CVE-2023-53632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251269">SUSE bug 1251269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53634</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53634" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53634" ref_url="https://www.suse.com/security/cve/CVE-2023-53634" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, arm64: Fixed a BTI error on returning to patched function

When BPF_TRAMP_F_CALL_ORIG is set, BPF trampoline uses BLR to jump
back to the instruction next to call site to call the patched function.
For BTI-enabled kernel, the instruction next to call site is usually
PACIASP, in this case, it's safe to jump back with BLR. But when
the call site is not followed by a PACIASP or bti, a BTI exception
is triggered.

Here is a fault log:

 Unhandled 64-bit el1h sync exception on CPU0, ESR 0x0000000034000002 -- BTI
 CPU: 0 PID: 263 Comm: test_progs Tainted: GF
 Hardware name: linux,dummy-virt (DT)
 pstate: 40400805 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=-c)
 pc : bpf_fentry_test1+0xc/0x30
 lr : bpf_trampoline_6442573892_0+0x48/0x1000
 sp : ffff80000c0c3a50
 x29: ffff80000c0c3a90 x28: ffff0000c2e6c080 x27: 0000000000000000
 x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000050
 x23: 0000000000000000 x22: 0000ffffcfd2a7f0 x21: 000000000000000a
 x20: 0000ffffcfd2a7f0 x19: 0000000000000000 x18: 0000000000000000
 x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffcfd2a7f0
 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
 x11: 0000000000000000 x10: ffff80000914f5e4 x9 : ffff8000082a1528
 x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0101010101010101
 x5 : 0000000000000000 x4 : 00000000fffffff2 x3 : 0000000000000001
 x2 : ffff8001f4b82000 x1 : 0000000000000000 x0 : 0000000000000001
 Kernel panic - not syncing: Unhandled exception
 CPU: 0 PID: 263 Comm: test_progs Tainted: GF
 Hardware name: linux,dummy-virt (DT)
 Call trace:
  dump_backtrace+0xec/0x144
  show_stack+0x24/0x7c
  dump_stack_lvl+0x8c/0xb8
  dump_stack+0x18/0x34
  panic+0x1cc/0x3ec
  __el0_error_handler_common+0x0/0x130
  el1h_64_sync_handler+0x60/0xd0
  el1h_64_sync+0x78/0x7c
  bpf_fentry_test1+0xc/0x30
  bpf_fentry_test1+0xc/0x30
  bpf_prog_test_run_tracing+0xdc/0x2a0
  __sys_bpf+0x438/0x22a0
  __arm64_sys_bpf+0x30/0x54
  invoke_syscall+0x78/0x110
  el0_svc_common.constprop.0+0x6c/0x1d0
  do_el0_svc+0x38/0xe0
  el0_svc+0x30/0xd0
  el0t_64_sync_handler+0x1ac/0x1b0
  el0t_64_sync+0x1a0/0x1a4
 Kernel Offset: disabled
 CPU features: 0x0000,00034c24,f994fdab
 Memory Limit: none

And the instruction next to call site of bpf_fentry_test1 is ADD,
not PACIASP:

&lt;bpf_fentry_test1&gt;:
	bti     c
	nop
	nop
	add     w0, w0, #0x1
	paciasp

For BPF prog, JIT always puts a PACIASP after call site for BTI-enabled
kernel, so there is no problem. To fix it, replace BLR with RET to bypass
the branch target check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53634/">CVE-2023-53634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53634">CVE-2023-53634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251526">SUSE bug 1251526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53635</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53635" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53635" ref_url="https://www.suse.com/security/cve/CVE-2023-53635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: fix wrong ct-&gt;timeout value

(struct nf_conn)-&gt;timeout is an interval before the conntrack
confirmed.  After confirmed, it becomes a timestamp.

It is observed that timeout of an unconfirmed conntrack:
- Set by calling ctnetlink_change_timeout(). As a result,
  `nfct_time_stamp` was wrongly added to `ct-&gt;timeout` twice.
- Get by calling ctnetlink_dump_timeout(). As a result,
  `nfct_time_stamp` was wrongly subtracted.

Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl
 ctnetlink_dump_timeout
 __ctnetlink_glue_build
 ctnetlink_glue_build
 __nfqnl_enqueue_packet
 nf_queue
 nf_hook_slow
 ip_mc_output
 ? __pfx_ip_finish_output
 ip_send_skb
 ? __pfx_dst_output
 udp_send_skb
 udp_sendmsg
 ? __pfx_ip_generic_getfrag
 sock_sendmsg

Separate the 2 cases in:
- Setting `ct-&gt;timeout` in __nf_ct_set_timeout().
- Getting `ct-&gt;timeout` in ctnetlink_dump_timeout().

Pablo appends:

Update ctnetlink to set up the timeout _after_ the IPS_CONFIRMED flag is
set on, otherwise conntrack creation via ctnetlink breaks.

Note that the problem described in this patch occurs since the
introduction of the nfnetlink_queue conntrack support, select a
sufficiently old Fixes: tag for -stable kernel to pick up this fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53635/">CVE-2023-53635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53635">CVE-2023-53635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251524">SUSE bug 1251524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53639</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53639" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53639" ref_url="https://www.suse.com/security/cve/CVE-2023-53639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath6kl: reduce WARN to dev_dbg() in callback

The warn is triggered on a known race condition, documented in the code above
the test, that is correctly handled.  Using WARN() hinders automated testing.
Reducing severity.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53639/">CVE-2023-53639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53639">CVE-2023-53639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251521">SUSE bug 1251521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53640" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53640" ref_url="https://www.suse.com/security/cve/CVE-2023-53640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: lpass: Fix for KASAN use_after_free out of bounds

When we run syzkaller we get below Out of Bounds error.

"KASAN: slab-out-of-bounds Read in regcache_flat_read"

Below is the backtrace of the issue:

BUG: KASAN: slab-out-of-bounds in regcache_flat_read+0x10c/0x110
Read of size 4 at addr ffffff8088fbf714 by task syz-executor.4/14144
CPU: 6 PID: 14144 Comm: syz-executor.4 Tainted: G        W
Hardware name: Qualcomm Technologies, Inc. sc7280 CRD platform (rev5+) (DT)
Call trace:
dump_backtrace+0x0/0x4ec
show_stack+0x34/0x50
dump_stack_lvl+0xdc/0x11c
print_address_description+0x30/0x2d8
kasan_report+0x178/0x1e4
__asan_report_load4_noabort+0x44/0x50
regcache_flat_read+0x10c/0x110
regcache_read+0xf8/0x5a0
_regmap_read+0x45c/0x86c
_regmap_update_bits+0x128/0x290
regmap_update_bits_base+0xc0/0x15c
snd_soc_component_update_bits+0xa8/0x22c
snd_soc_component_write_field+0x68/0xd4
tx_macro_put_dec_enum+0x1d0/0x268
snd_ctl_elem_write+0x288/0x474

By Error checking and checking valid values issue gets rectifies.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53640/">CVE-2023-53640 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53640">CVE-2023-53640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251327">SUSE bug 1251327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253761">SUSE bug 1253761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53641</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53641" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53641" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53641" ref_url="https://www.suse.com/security/cve/CVE-2023-53641" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: hif_usb: fix memory leak of remain_skbs

hif_dev-&gt;remain_skb is allocated and used exclusively in
ath9k_hif_usb_rx_stream(). It is implied that an allocated remain_skb is
processed and subsequently freed (in error paths) only during the next
call of ath9k_hif_usb_rx_stream().

So, if the urbs are deallocated between those two calls due to the device
deinitialization or suspend, it is possible that ath9k_hif_usb_rx_stream()
is not called next time and the allocated remain_skb is leaked. Our local
Syzkaller instance was able to trigger that.

remain_skb makes sense when receiving two consecutive urbs which are
logically linked together, i.e. a specific data field from the first skb
indicates a cached skb to be allocated, memcpy'd with some data and
subsequently processed in the next call to ath9k_hif_usb_rx_stream(). Urbs
deallocation supposedly makes that link irrelevant so we need to free the
cached skb in those cases.

Fix the leak by introducing a function to explicitly free remain_skb (if
it is not NULL) when the rx urbs have been deallocated. remain_skb is NULL
when it has not been allocated at all (hif_dev struct is kzalloced) or
when it has been processed in next call to ath9k_hif_usb_rx_stream().

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53641/">CVE-2023-53641 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53641">CVE-2023-53641 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251728">SUSE bug 1251728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53643" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53643" ref_url="https://www.suse.com/security/cve/CVE-2023-53643" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: don't access released socket during error recovery

While the error recovery work is temporarily failing reconnect attempts,
running the 'nvme list' command causes a kernel NULL pointer dereference
by calling getsockname() with a released socket.

During error recovery work, the nvme tcp socket is released and a new one
created, so it is not safe to access the socket without proper check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53643/">CVE-2023-53643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53643">CVE-2023-53643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251724">SUSE bug 1251724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53645" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53645" ref_url="https://www.suse.com/security/cve/CVE-2023-53645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Make bpf_refcount_acquire fallible for non-owning refs

This patch fixes an incorrect assumption made in the original
bpf_refcount series [0], specifically that the BPF program calling
bpf_refcount_acquire on some node can always guarantee that the node is
alive. In that series, the patch adding failure behavior to rbtree_add
and list_push_{front, back} breaks this assumption for non-owning
references.

Consider the following program:

  n = bpf_kptr_xchg(&amp;mapval, NULL);
  /* skip error checking */

  bpf_spin_lock(&amp;l);
  if(bpf_rbtree_add(&amp;t, &amp;n-&gt;rb, less)) {
    bpf_refcount_acquire(n);
    /* Failed to add, do something else with the node */
  }
  bpf_spin_unlock(&amp;l);

It's incorrect to assume that bpf_refcount_acquire will always succeed in this
scenario. bpf_refcount_acquire is being called in a critical section
here, but the lock being held is associated with rbtree t, which isn't
necessarily the lock associated with the tree that the node is already
in. So after bpf_rbtree_add fails to add the node and calls bpf_obj_drop
in it, the program has no ownership of the node's lifetime. Therefore
the node's refcount can be decr'd to 0 at any time after the failing
rbtree_add. If this happens before the refcount_acquire above, the node
might be free'd, and regardless refcount_acquire will be incrementing a
0 refcount.

Later patches in the series exercise this scenario, resulting in the
expected complaint from the kernel (without this patch's changes):

  refcount_t: addition on 0; use-after-free.
  WARNING: CPU: 1 PID: 207 at lib/refcount.c:25 refcount_warn_saturate+0xbc/0x110
  Modules linked in: bpf_testmod(O)
  CPU: 1 PID: 207 Comm: test_progs Tainted: G           O       6.3.0-rc7-02231-g723de1a718a2-dirty #371
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014
  RIP: 0010:refcount_warn_saturate+0xbc/0x110
  Code: 6f 64 f6 02 01 e8 84 a3 5c ff 0f 0b eb 9d 80 3d 5e 64 f6 02 00 75 94 48 c7 c7 e0 13 d2 82 c6 05 4e 64 f6 02 01 e8 64 a3 5c ff &lt;0f&gt; 0b e9 7a ff ff ff 80 3d 38 64 f6 02 00 0f 85 6d ff ff ff 48 c7
  RSP: 0018:ffff88810b9179b0 EFLAGS: 00010082
  RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000
  RDX: 0000000000000202 RSI: 0000000000000008 RDI: ffffffff857c3680
  RBP: ffff88810027d3c0 R08: ffffffff8125f2a4 R09: ffff88810b9176e7
  R10: ffffed1021722edc R11: 746e756f63666572 R12: ffff88810027d388
  R13: ffff88810027d3c0 R14: ffffc900005fe030 R15: ffffc900005fe048
  FS:  00007fee0584a700(0000) GS:ffff88811b280000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00005634a96f6c58 CR3: 0000000108ce9002 CR4: 0000000000770ee0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   &lt;TASK&gt;
   bpf_refcount_acquire_impl+0xb5/0xc0

  (rest of output snipped)

The patch addresses this by changing bpf_refcount_acquire_impl to use
refcount_inc_not_zero instead of refcount_inc and marking
bpf_refcount_acquire KF_RET_NULL.

For owning references, though, we know the above scenario is not possible
and thus that bpf_refcount_acquire will always succeed. Some verifier
bookkeeping is added to track "is input owning ref?" for bpf_refcount_acquire
calls and return false from is_kfunc_ret_null for bpf_refcount_acquire on
owning refs despite it being marked KF_RET_NULL.

Existing selftests using bpf_refcount_acquire are modified where
necessary to NULL-check its return value.

  [0]: https://lore.kernel.org/bpf/20230415201811.343116-1-davemarchevsky@fb.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53645/">CVE-2023-53645 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53645">CVE-2023-53645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251321">SUSE bug 1251321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53646" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53646" ref_url="https://www.suse.com/security/cve/CVE-2023-53646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/perf: add sentinel to xehp_oa_b_counters

Arrays passed to reg_in_range_table should end with empty record.

The patch solves KASAN detected bug with signature:
BUG: KASAN: global-out-of-bounds in xehp_is_valid_b_counter_addr+0x2c7/0x350 [i915]
Read of size 4 at addr ffffffffa1555d90 by task perf/1518

CPU: 4 PID: 1518 Comm: perf Tainted: G U 6.4.0-kasan_438-g3303d06107f3+ #1
Hardware name: Intel Corporation Meteor Lake Client Platform/MTL-P DDR5 SODIMM SBS RVP, BIOS MTLPFWI1.R00.3223.D80.2305311348 05/31/2023
Call Trace:
&lt;TASK&gt;
...
xehp_is_valid_b_counter_addr+0x2c7/0x350 [i915]

(cherry picked from commit 2f42c5afb34b5696cf5fe79e744f99be9b218798)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53646/">CVE-2023-53646 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53646">CVE-2023-53646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251742">SUSE bug 1251742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53647" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53647" ref_url="https://www.suse.com/security/cve/CVE-2023-53647" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Drivers: hv: vmbus: Don't dereference ACPI root object handle

Since the commit referenced in the Fixes: tag below the VMBus client driver
is walking the ACPI namespace up from the VMBus ACPI device to the ACPI
namespace root object trying to find Hyper-V MMIO ranges.

However, if it is not able to find them it ends trying to walk resources of
the ACPI namespace root object itself.
This object has all-ones handle, which causes a NULL pointer dereference
in the ACPI code (from dereferencing this pointer with an offset).

This in turn causes an oops on boot with VMBus host implementations that do
not provide Hyper-V MMIO ranges in their VMBus ACPI device or its
ancestors.
The QEMU VMBus implementation is an example of such implementation.

I guess providing these ranges is optional, since all tested Windows
versions seem to be able to use VMBus devices without them.

Fix this by explicitly terminating the lookup at the ACPI namespace root
object.

Note that Linux guests under KVM/QEMU do not use the Hyper-V PV interface
by default - they only do so if the KVM PV interface is missing or
disabled.

Example stack trace of such oops:
[ 3.710827] ? __die+0x1f/0x60
[ 3.715030] ? page_fault_oops+0x159/0x460
[ 3.716008] ? exc_page_fault+0x73/0x170
[ 3.716959] ? asm_exc_page_fault+0x22/0x30
[ 3.717957] ? acpi_ns_lookup+0x7a/0x4b0
[ 3.718898] ? acpi_ns_internalize_name+0x79/0xc0
[ 3.720018] acpi_ns_get_node_unlocked+0xb5/0xe0
[ 3.721120] ? acpi_ns_check_object_type+0xfe/0x200
[ 3.722285] ? acpi_rs_convert_aml_to_resource+0x37/0x6e0
[ 3.723559] ? down_timeout+0x3a/0x60
[ 3.724455] ? acpi_ns_get_node+0x3a/0x60
[ 3.725412] acpi_ns_get_node+0x3a/0x60
[ 3.726335] acpi_ns_evaluate+0x1c3/0x2c0
[ 3.727295] acpi_ut_evaluate_object+0x64/0x1b0
[ 3.728400] acpi_rs_get_method_data+0x2b/0x70
[ 3.729476] ? vmbus_platform_driver_probe+0x1d0/0x1d0 [hv_vmbus]
[ 3.730940] ? vmbus_platform_driver_probe+0x1d0/0x1d0 [hv_vmbus]
[ 3.732411] acpi_walk_resources+0x78/0xd0
[ 3.733398] vmbus_platform_driver_probe+0x9f/0x1d0 [hv_vmbus]
[ 3.734802] platform_probe+0x3d/0x90
[ 3.735684] really_probe+0x19b/0x400
[ 3.736570] ? __device_attach_driver+0x100/0x100
[ 3.737697] __driver_probe_device+0x78/0x160
[ 3.738746] driver_probe_device+0x1f/0x90
[ 3.739743] __driver_attach+0xc2/0x1b0
[ 3.740671] bus_for_each_dev+0x70/0xc0
[ 3.741601] bus_add_driver+0x10e/0x210
[ 3.742527] driver_register+0x55/0xf0
[ 3.744412] ? 0xffffffffc039a000
[ 3.745207] hv_acpi_init+0x3c/0x1000 [hv_vmbus]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53647/">CVE-2023-53647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53647">CVE-2023-53647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251732">SUSE bug 1251732</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53649</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53649" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53649" ref_url="https://www.suse.com/security/cve/CVE-2023-53649" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf trace: Really free the evsel-&gt;priv area

In 3cb4d5e00e037c70 ("perf trace: Free syscall tp fields in
evsel-&gt;priv") it only was freeing if strcmp(evsel-&gt;tp_format-&gt;system,
"syscalls") returned zero, while the corresponding initialization of
evsel-&gt;priv was being performed if it was _not_ zero, i.e. if the tp
system wasn't 'syscalls'.

Just stop looking for that and free it if evsel-&gt;priv was set, which
should be equivalent.

Also use the pre-existing evsel_trace__delete() function.

This resolves these leaks, detected with:

  $ make EXTRA_CFLAGS="-fsanitize=address" BUILD_BPF_SKEL=1 CORESIGHT=1 O=/tmp/build/perf-tools-next -C tools/perf install-bin

  =================================================================
  ==481565==ERROR: LeakSanitizer: detected memory leaks

  Direct leak of 40 byte(s) in 1 object(s) allocated from:
      #0 0x7f7343cba097 in calloc (/lib64/libasan.so.8+0xba097)
      #1 0x987966 in zalloc (/home/acme/bin/perf+0x987966)
      #2 0x52f9b9 in evsel_trace__new /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:307
      #3 0x52f9b9 in evsel__syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:333
      #4 0x52f9b9 in evsel__init_raw_syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:458
      #5 0x52f9b9 in perf_evsel__raw_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:480
      #6 0x540e8b in trace__add_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3212
      #7 0x540e8b in trace__run /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3891
      #8 0x540e8b in cmd_trace /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:5156
      #9 0x5ef262 in run_builtin /home/acme/git/perf-tools-next/tools/perf/perf.c:323
      #10 0x4196da in handle_internal_command /home/acme/git/perf-tools-next/tools/perf/perf.c:377
      #11 0x4196da in run_argv /home/acme/git/perf-tools-next/tools/perf/perf.c:421
      #12 0x4196da in main /home/acme/git/perf-tools-next/tools/perf/perf.c:537
      #13 0x7f7342c4a50f in __libc_start_call_main (/lib64/libc.so.6+0x2750f)

  Direct leak of 40 byte(s) in 1 object(s) allocated from:
      #0 0x7f7343cba097 in calloc (/lib64/libasan.so.8+0xba097)
      #1 0x987966 in zalloc (/home/acme/bin/perf+0x987966)
      #2 0x52f9b9 in evsel_trace__new /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:307
      #3 0x52f9b9 in evsel__syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:333
      #4 0x52f9b9 in evsel__init_raw_syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:458
      #5 0x52f9b9 in perf_evsel__raw_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:480
      #6 0x540dd1 in trace__add_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3205
      #7 0x540dd1 in trace__run /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3891
      #8 0x540dd1 in cmd_trace /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:5156
      #9 0x5ef262 in run_builtin /home/acme/git/perf-tools-next/tools/perf/perf.c:323
      #10 0x4196da in handle_internal_command /home/acme/git/perf-tools-next/tools/perf/perf.c:377
      #11 0x4196da in run_argv /home/acme/git/perf-tools-next/tools/perf/perf.c:421
      #12 0x4196da in main /home/acme/git/perf-tools-next/tools/perf/perf.c:537
      #13 0x7f7342c4a50f in __libc_start_call_main (/lib64/libc.so.6+0x2750f)

  SUMMARY: AddressSanitizer: 80 byte(s) leaked in 2 allocation(s).
  [root@quaco ~]#

With this we plug all leaks with "perf trace sleep 1".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53649/">CVE-2023-53649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53649">CVE-2023-53649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251749">SUSE bug 1251749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53652" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53652" ref_url="https://www.suse.com/security/cve/CVE-2023-53652" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa: Add features attr to vdpa_nl_policy for nlattr length check

The vdpa_nl_policy structure is used to validate the nlattr when parsing
the incoming nlmsg. It will ensure the attribute being described produces
a valid nlattr pointer in info-&gt;attrs before entering into each handler
in vdpa_nl_ops.

That is to say, the missing part in vdpa_nl_policy may lead to illegal
nlattr after parsing, which could lead to OOB read just like CVE-2023-3773.

This patch adds the missing nla_policy for vdpa features attr to avoid
such bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53652/">CVE-2023-53652 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53652">CVE-2023-53652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251754">SUSE bug 1251754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53654" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53654" ref_url="https://www.suse.com/security/cve/CVE-2023-53654" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Add validation before accessing cgx and lmac

with the addition of new MAC blocks like CN10K RPM and CN10KB
RPM_USX, LMACs are noncontiguous and CGX blocks are also
noncontiguous. But during RVU driver initialization, the driver
is assuming they are contiguous and trying to access
cgx or lmac with their id which is resulting in kernel panic.

This patch fixes the issue by adding proper checks.

[   23.219150] pc : cgx_lmac_read+0x38/0x70
[   23.219154] lr : rvu_program_channels+0x3f0/0x498
[   23.223852] sp : ffff000100d6fc80
[   23.227158] x29: ffff000100d6fc80 x28: ffff00010009f880 x27:
000000000000005a
[   23.234288] x26: ffff000102586768 x25: 0000000000002500 x24:
fffffffffff0f000
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53654/">CVE-2023-53654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53654">CVE-2023-53654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251756">SUSE bug 1251756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53655" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53655" ref_url="https://www.suse.com/security/cve/CVE-2023-53655" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed

Registering a kprobe on __rcu_irq_enter_check_tick() can cause kernel
stack overflow as shown below. This issue can be reproduced by enabling
CONFIG_NO_HZ_FULL and booting the kernel with argument "nohz_full=",
and then giving the following commands at the shell prompt:

  # cd /sys/kernel/tracing/
  # echo 'p:mp1 __rcu_irq_enter_check_tick' &gt;&gt; kprobe_events
  # echo 1 &gt; events/kprobes/enable

This commit therefore adds __rcu_irq_enter_check_tick() to the kprobes
blacklist using NOKPROBE_SYMBOL().

Insufficient stack space to handle exception!
ESR: 0x00000000f2000004 -- BRK (AArch64)
FAR: 0x0000ffffccf3e510
Task stack:     [0xffff80000ad30000..0xffff80000ad38000]
IRQ stack:      [0xffff800008050000..0xffff800008058000]
Overflow stack: [0xffff089c36f9f310..0xffff089c36fa0310]
CPU: 5 PID: 190 Comm: bash Not tainted 6.2.0-rc2-00320-g1f5abbd77e2c #19
Hardware name: linux,dummy-virt (DT)
pstate: 400003c5 (nZcv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __rcu_irq_enter_check_tick+0x0/0x1b8
lr : ct_nmi_enter+0x11c/0x138
sp : ffff80000ad30080
x29: ffff80000ad30080 x28: ffff089c82e20000 x27: 0000000000000000
x26: 0000000000000000 x25: ffff089c02a8d100 x24: 0000000000000000
x23: 00000000400003c5 x22: 0000ffffccf3e510 x21: ffff089c36fae148
x20: ffff80000ad30120 x19: ffffa8da8fcce148 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: ffffa8da8e44ea6c
x14: ffffa8da8e44e968 x13: ffffa8da8e03136c x12: 1fffe113804d6809
x11: ffff6113804d6809 x10: 0000000000000a60 x9 : dfff800000000000
x8 : ffff089c026b404f x7 : 00009eec7fb297f7 x6 : 0000000000000001
x5 : ffff80000ad30120 x4 : dfff800000000000 x3 : ffffa8da8e3016f4
x2 : 0000000000000003 x1 : 0000000000000000 x0 : 0000000000000000
Kernel panic - not syncing: kernel stack overflow
CPU: 5 PID: 190 Comm: bash Not tainted 6.2.0-rc2-00320-g1f5abbd77e2c #19
Hardware name: linux,dummy-virt (DT)
Call trace:
 dump_backtrace+0xf8/0x108
 show_stack+0x20/0x30
 dump_stack_lvl+0x68/0x84
 dump_stack+0x1c/0x38
 panic+0x214/0x404
 add_taint+0x0/0xf8
 panic_bad_stack+0x144/0x160
 handle_bad_stack+0x38/0x58
 __bad_stack+0x78/0x7c
 __rcu_irq_enter_check_tick+0x0/0x1b8
 arm64_enter_el1_dbg.isra.0+0x14/0x20
 el1_dbg+0x2c/0x90
 el1h_64_sync_handler+0xcc/0xe8
 el1h_64_sync+0x64/0x68
 __rcu_irq_enter_check_tick+0x0/0x1b8
 arm64_enter_el1_dbg.isra.0+0x14/0x20
 el1_dbg+0x2c/0x90
 el1h_64_sync_handler+0xcc/0xe8
 el1h_64_sync+0x64/0x68
 __rcu_irq_enter_check_tick+0x0/0x1b8
 arm64_enter_el1_dbg.isra.0+0x14/0x20
 el1_dbg+0x2c/0x90
 el1h_64_sync_handler+0xcc/0xe8
 el1h_64_sync+0x64/0x68
 __rcu_irq_enter_check_tick+0x0/0x1b8
 [...]
 el1_dbg+0x2c/0x90
 el1h_64_sync_handler+0xcc/0xe8
 el1h_64_sync+0x64/0x68
 __rcu_irq_enter_check_tick+0x0/0x1b8
 arm64_enter_el1_dbg.isra.0+0x14/0x20
 el1_dbg+0x2c/0x90
 el1h_64_sync_handler+0xcc/0xe8
 el1h_64_sync+0x64/0x68
 __rcu_irq_enter_check_tick+0x0/0x1b8
 arm64_enter_el1_dbg.isra.0+0x14/0x20
 el1_dbg+0x2c/0x90
 el1h_64_sync_handler+0xcc/0xe8
 el1h_64_sync+0x64/0x68
 __rcu_irq_enter_check_tick+0x0/0x1b8
 el1_interrupt+0x28/0x60
 el1h_64_irq_handler+0x18/0x28
 el1h_64_irq+0x64/0x68
 __ftrace_set_clr_event_nolock+0x98/0x198
 __ftrace_set_clr_event+0x58/0x80
 system_enable_write+0x144/0x178
 vfs_write+0x174/0x738
 ksys_write+0xd0/0x188
 __arm64_sys_write+0x4c/0x60
 invoke_syscall+0x64/0x180
 el0_svc_common.constprop.0+0x84/0x160
 do_el0_svc+0x48/0xe8
 el0_svc+0x34/0xd0
 el0t_64_sync_handler+0xb8/0xc0
 el0t_64_sync+0x190/0x194
SMP: stopping secondary CPUs
Kernel Offset: 0x28da86000000 from 0xffff800008000000
PHYS_OFFSET: 0xfffff76600000000
CPU features: 0x00000,01a00100,0000421b
Memory Limit: none
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53655/">CVE-2023-53655 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53655">CVE-2023-53655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251757">SUSE bug 1251757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53656</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53656" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53656" ref_url="https://www.suse.com/security/cve/CVE-2023-53656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/perf: hisi: Don't migrate perf to the CPU going to teardown

The driver needs to migrate the perf context if the current using CPU going
to teardown. By the time calling the cpuhp::teardown() callback the
cpu_online_mask() hasn't updated yet and still includes the CPU going to
teardown. In current driver's implementation we may migrate the context
to the teardown CPU and leads to the below calltrace:

...
[  368.104662][  T932] task:cpuhp/0         state:D stack:    0 pid:   15 ppid:     2 flags:0x00000008
[  368.113699][  T932] Call trace:
[  368.116834][  T932]  __switch_to+0x7c/0xbc
[  368.120924][  T932]  __schedule+0x338/0x6f0
[  368.125098][  T932]  schedule+0x50/0xe0
[  368.128926][  T932]  schedule_preempt_disabled+0x18/0x24
[  368.134229][  T932]  __mutex_lock.constprop.0+0x1d4/0x5dc
[  368.139617][  T932]  __mutex_lock_slowpath+0x1c/0x30
[  368.144573][  T932]  mutex_lock+0x50/0x60
[  368.148579][  T932]  perf_pmu_migrate_context+0x84/0x2b0
[  368.153884][  T932]  hisi_pcie_pmu_offline_cpu+0x90/0xe0 [hisi_pcie_pmu]
[  368.160579][  T932]  cpuhp_invoke_callback+0x2a0/0x650
[  368.165707][  T932]  cpuhp_thread_fun+0xe4/0x190
[  368.170316][  T932]  smpboot_thread_fn+0x15c/0x1a0
[  368.175099][  T932]  kthread+0x108/0x13c
[  368.179012][  T932]  ret_from_fork+0x10/0x18
...

Use function cpumask_any_but() to find one correct active cpu to fixes
this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53656/">CVE-2023-53656 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53656">CVE-2023-53656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251758">SUSE bug 1251758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53657</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53657" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53657" ref_url="https://www.suse.com/security/cve/CVE-2023-53657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Don't tx before switchdev is fully configured

There is possibility that ice_eswitch_port_start_xmit might be
called while some resources are still not allocated which might
cause NULL pointer dereference. Fix this by checking if switchdev
configuration was finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53657/">CVE-2023-53657 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53657">CVE-2023-53657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251319">SUSE bug 1251319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53660</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53660" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53660" ref_url="https://www.suse.com/security/cve/CVE-2023-53660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, cpumap: Handle skb as well when clean up ptr_ring

The following warning was reported when running xdp_redirect_cpu with
both skb-mode and stress-mode enabled:

  ------------[ cut here ]------------
  Incorrect XDP memory type (-2128176192) usage
  WARNING: CPU: 7 PID: 1442 at net/core/xdp.c:405
  Modules linked in:
  CPU: 7 PID: 1442 Comm: kworker/7:0 Tainted: G  6.5.0-rc2+ #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
  Workqueue: events __cpu_map_entry_free
  RIP: 0010:__xdp_return+0x1e4/0x4a0
  ......
  Call Trace:
   &lt;TASK&gt;
   ? show_regs+0x65/0x70
   ? __warn+0xa5/0x240
   ? __xdp_return+0x1e4/0x4a0
   ......
   xdp_return_frame+0x4d/0x150
   __cpu_map_entry_free+0xf9/0x230
   process_one_work+0x6b0/0xb80
   worker_thread+0x96/0x720
   kthread+0x1a5/0x1f0
   ret_from_fork+0x3a/0x70
   ret_from_fork_asm+0x1b/0x30
   &lt;/TASK&gt;

The reason for the warning is twofold. One is due to the kthread
cpu_map_kthread_run() is stopped prematurely. Another one is
__cpu_map_ring_cleanup() doesn't handle skb mode and treats skbs in
ptr_ring as XDP frames.

Prematurely-stopped kthread will be fixed by the preceding patch and
ptr_ring will be empty when __cpu_map_ring_cleanup() is called. But
as the comments in __cpu_map_ring_cleanup() said, handling and freeing
skbs in ptr_ring as well to "catch any broken behaviour gracefully".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53660/">CVE-2023-53660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53660">CVE-2023-53660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251721">SUSE bug 1251721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53661" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53661" ref_url="https://www.suse.com/security/cve/CVE-2023-53661" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt: avoid overflow in bnxt_get_nvram_directory()

The value of an arithmetic expression is subject
of possible overflow due to a failure to cast operands to a larger data
type before performing arithmetic. Used macro for multiplication instead
operator for avoiding overflow.

Found by Security Code and Linux Verification
Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53661/">CVE-2023-53661 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53661">CVE-2023-53661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251320">SUSE bug 1251320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53663" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53663" ref_url="https://www.suse.com/security/cve/CVE-2023-53663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: nSVM: Check instead of asserting on nested TSC scaling support

Check for nested TSC scaling support on nested SVM VMRUN instead of
asserting that TSC scaling is exposed to L1 if L1's MSR_AMD64_TSC_RATIO
has diverged from KVM's default.  Userspace can trigger the WARN at will
by writing the MSR and then updating guest CPUID to hide the feature
(modifying guest CPUID is allowed anytime before KVM_RUN).  E.g. hacking
KVM's state_test selftest to do

		vcpu_set_msr(vcpu, MSR_AMD64_TSC_RATIO, 0);
		vcpu_clear_cpuid_feature(vcpu, X86_FEATURE_TSCRATEMSR);

after restoring state in a new VM+vCPU yields an endless supply of:

  ------------[ cut here ]------------
  WARNING: CPU: 164 PID: 62565 at arch/x86/kvm/svm/nested.c:699
           nested_vmcb02_prepare_control+0x3d6/0x3f0 [kvm_amd]
  Call Trace:
   &lt;TASK&gt;
   enter_svm_guest_mode+0x114/0x560 [kvm_amd]
   nested_svm_vmrun+0x260/0x330 [kvm_amd]
   vmrun_interception+0x29/0x30 [kvm_amd]
   svm_invoke_exit_handler+0x35/0x100 [kvm_amd]
   svm_handle_exit+0xe7/0x180 [kvm_amd]
   kvm_arch_vcpu_ioctl_run+0x1eab/0x2570 [kvm]
   kvm_vcpu_ioctl+0x4c9/0x5b0 [kvm]
   __se_sys_ioctl+0x7a/0xc0
   __x64_sys_ioctl+0x21/0x30
   do_syscall_64+0x41/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
  RIP: 0033:0x45ca1b

Note, the nested #VMEXIT path has the same flaw, but needs a different
fix and will be handled separately.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53663/">CVE-2023-53663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53663">CVE-2023-53663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251290">SUSE bug 1251290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53664" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53664" ref_url="https://www.suse.com/security/cve/CVE-2023-53664" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

OPP: Fix potential null ptr dereference in dev_pm_opp_get_required_pstate()

"opp" pointer is dereferenced before the IS_ERR_OR_NULL() check. Fix it by
removing the dereference to cache opp_table and dereference it directly
where opp_table is used.

This fixes the following smatch warning:

drivers/opp/core.c:232 dev_pm_opp_get_required_pstate() warn: variable
dereferenced before IS_ERR check 'opp' (see line 230)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53664/">CVE-2023-53664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53664">CVE-2023-53664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251287">SUSE bug 1251287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53665</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53665" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53665" ref_url="https://www.suse.com/security/cve/CVE-2023-53665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: don't dereference mddev after export_rdev()

Except for initial reference, mddev-&gt;kobject is referenced by
rdev-&gt;kobject, and if the last rdev is freed, there is no guarantee that
mddev is still valid. Hence mddev should not be used anymore after
export_rdev().

This problem can be triggered by following test for mdadm at very
low rate:

New file: mdadm/tests/23rdev-lifetime

devname=${dev0##*/}
devt=`cat /sys/block/$devname/dev`
pid=""
runtime=2

clean_up_test() {
        pill -9 $pid
        echo clear &gt; /sys/block/md0/md/array_state
}

trap 'clean_up_test' EXIT

add_by_sysfs() {
        while true; do
                echo $devt &gt; /sys/block/md0/md/new_dev
        done
}

remove_by_sysfs(){
        while true; do
                echo remove &gt; /sys/block/md0/md/dev-${devname}/state
        done
}

echo md0 &gt; /sys/module/md_mod/parameters/new_array || die "create md0 failed"

add_by_sysfs &amp;
pid="$pid $!"

remove_by_sysfs &amp;
pid="$pid $!"

sleep $runtime
exit 0

Test cmd:

./test --save-logs --logdir=/tmp/ --keep-going --dev=loop --tests=23rdev-lifetime

Test result:

general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6bcb: 0000 [#4] PREEMPT SMP
CPU: 0 PID: 1292 Comm: test Tainted: G      D W          6.5.0-rc2-00121-g01e55c376936 #562
RIP: 0010:md_wakeup_thread+0x9e/0x320 [md_mod]
Call Trace:
 &lt;TASK&gt;
 mddev_unlock+0x1b6/0x310 [md_mod]
 rdev_attr_store+0xec/0x190 [md_mod]
 sysfs_kf_write+0x52/0x70
 kernfs_fop_write_iter+0x19a/0x2a0
 vfs_write+0x3b5/0x770
 ksys_write+0x74/0x150
 __x64_sys_write+0x22/0x30
 do_syscall_64+0x40/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Fix this problem by don't dereference mddev after export_rdev().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53665/">CVE-2023-53665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53665">CVE-2023-53665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251270">SUSE bug 1251270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53666" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53666" ref_url="https://www.suse.com/security/cve/CVE-2023-53666" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd938x: fix missing mbhc init error handling

MBHC initialisation can fail so add the missing error handling to avoid
dereferencing an error pointer when later configuring the jack:

    Unable to handle kernel paging request at virtual address fffffffffffffff8

    pc : wcd_mbhc_start+0x28/0x380 [snd_soc_wcd_mbhc]
    lr : wcd938x_codec_set_jack+0x28/0x48 [snd_soc_wcd938x]

    Call trace:
     wcd_mbhc_start+0x28/0x380 [snd_soc_wcd_mbhc]
     wcd938x_codec_set_jack+0x28/0x48 [snd_soc_wcd938x]
     snd_soc_component_set_jack+0x28/0x8c [snd_soc_core]
     qcom_snd_wcd_jack_setup+0x7c/0x19c [snd_soc_qcom_common]
     sc8280xp_snd_init+0x20/0x2c [snd_soc_sc8280xp]
     snd_soc_link_init+0x28/0x90 [snd_soc_core]
     snd_soc_bind_card+0x628/0xbfc [snd_soc_core]
     snd_soc_register_card+0xec/0x104 [snd_soc_core]
     devm_snd_soc_register_card+0x4c/0xa4 [snd_soc_core]
     sc8280xp_platform_probe+0xf0/0x108 [snd_soc_sc8280xp]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53666/">CVE-2023-53666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53666">CVE-2023-53666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251760">SUSE bug 1251760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53669" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53669" ref_url="https://www.suse.com/security/cve/CVE-2023-53669" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: fix skb_copy_ubufs() vs BIG TCP

David Ahern reported crashes in skb_copy_ubufs() caused by TCP tx zerocopy
using hugepages, and skb length bigger than ~68 KB.

skb_copy_ubufs() assumed it could copy all payload using up to
MAX_SKB_FRAGS order-0 pages.

This assumption broke when BIG TCP was able to put up to 512 KB per skb.

We did not hit this bug at Google because we use CONFIG_MAX_SKB_FRAGS=45
and limit gso_max_size to 180000.

A solution is to use higher order pages if needed.

v2: add missing __GFP_COMP, or we leak memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53669/">CVE-2023-53669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53669">CVE-2023-53669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251739">SUSE bug 1251739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5367" ref_url="https://www.suse.com/security/cve/CVE-2023-5367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3DLU3SRCIDHQQAZA4SYMSJKDW6AWQV4B/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016985.html" source="SUSE-SU"/>
    <description>
    A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5367/">CVE-2023-5367 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5367">CVE-2023-5367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216135">SUSE bug 1216135</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217447">SUSE bug 1217447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818848" comment="tigervnc-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818849" comment="tigervnc-icons-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818850" comment="tigervnc-license-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818851" comment="tigervnc-selinux-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818852" comment="tigervnc-server-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818853" comment="tigervnc-server-minimal-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818854" comment="tigervnc-server-module-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53670</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53670" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53670" ref_url="https://www.suse.com/security/cve/CVE-2023-53670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-core: fix dev_pm_qos memleak

Call dev_pm_qos_hide_latency_tolerance() in the error unwind patch to
avoid following kmemleak:-

blktests (master) # kmemleak-clear; ./check nvme/044;
blktests (master) # kmemleak-scan ; kmemleak-show
nvme/044 (Test bi-directional authentication)                [passed]
    runtime  2.111s  ...  2.124s
unreferenced object 0xffff888110c46240 (size 96):
  comm "nvme", pid 33461, jiffies 4345365353 (age 75.586s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [&lt;0000000069ac2cec&gt;] kmalloc_trace+0x25/0x90
    [&lt;000000006acc66d5&gt;] dev_pm_qos_update_user_latency_tolerance+0x6f/0x100
    [&lt;00000000cc376ea7&gt;] nvme_init_ctrl+0x38e/0x410 [nvme_core]
    [&lt;000000007df61b4b&gt;] 0xffffffffc05e88b3
    [&lt;00000000d152b985&gt;] 0xffffffffc05744cb
    [&lt;00000000f04a4041&gt;] vfs_write+0xc5/0x3c0
    [&lt;00000000f9491baf&gt;] ksys_write+0x5f/0xe0
    [&lt;000000001c46513d&gt;] do_syscall_64+0x3b/0x90
    [&lt;00000000ecf348fe&gt;] entry_SYSCALL_64_after_hwframe+0x72/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53670/">CVE-2023-53670 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53670">CVE-2023-53670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251762">SUSE bug 1251762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53671" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53671" ref_url="https://www.suse.com/security/cve/CVE-2023-53671" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

srcu: Delegate work to the boot cpu if using SRCU_SIZE_SMALL

Commit 994f706872e6 ("srcu: Make Tree SRCU able to operate without
snp_node array") assumes that cpu 0 is always online.  However, there
really are situations when some other CPU is the boot CPU, for example,
when booting a kdump kernel with the maxcpus=1 boot parameter.

On PowerPC, the kdump kernel can hang as follows:
...
[    1.740036] systemd[1]: Hostname set to &lt;xyz.com&gt;
[  243.686240] INFO: task systemd:1 blocked for more than 122 seconds.
[  243.686264]       Not tainted 6.1.0-rc1 #1
[  243.686272] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  243.686281] task:systemd         state:D stack:0     pid:1     ppid:0      flags:0x00042000
[  243.686296] Call Trace:
[  243.686301] [c000000016657640] [c000000016657670] 0xc000000016657670 (unreliable)
[  243.686317] [c000000016657830] [c00000001001dec0] __switch_to+0x130/0x220
[  243.686333] [c000000016657890] [c000000010f607b8] __schedule+0x1f8/0x580
[  243.686347] [c000000016657940] [c000000010f60bb4] schedule+0x74/0x140
[  243.686361] [c0000000166579b0] [c000000010f699b8] schedule_timeout+0x168/0x1c0
[  243.686374] [c000000016657a80] [c000000010f61de8] __wait_for_common+0x148/0x360
[  243.686387] [c000000016657b20] [c000000010176bb0] __flush_work.isra.0+0x1c0/0x3d0
[  243.686401] [c000000016657bb0] [c0000000105f2768] fsnotify_wait_marks_destroyed+0x28/0x40
[  243.686415] [c000000016657bd0] [c0000000105f21b8] fsnotify_destroy_group+0x68/0x160
[  243.686428] [c000000016657c40] [c0000000105f6500] inotify_release+0x30/0xa0
[  243.686440] [c000000016657cb0] [c0000000105751a8] __fput+0xc8/0x350
[  243.686452] [c000000016657d00] [c00000001017d524] task_work_run+0xe4/0x170
[  243.686464] [c000000016657d50] [c000000010020e94] do_notify_resume+0x134/0x140
[  243.686478] [c000000016657d80] [c00000001002eb18] interrupt_exit_user_prepare_main+0x198/0x270
[  243.686493] [c000000016657de0] [c00000001002ec60] syscall_exit_prepare+0x70/0x180
[  243.686505] [c000000016657e10] [c00000001000bf7c] system_call_vectored_common+0xfc/0x280
[  243.686520] --- interrupt: 3000 at 0x7fffa47d5ba4
[  243.686528] NIP:  00007fffa47d5ba4 LR: 0000000000000000 CTR: 0000000000000000
[  243.686538] REGS: c000000016657e80 TRAP: 3000   Not tainted  (6.1.0-rc1)
[  243.686548] MSR:  800000000000d033 &lt;SF,EE,PR,ME,IR,DR,RI,LE&gt;  CR: 42044440  XER: 00000000
[  243.686572] IRQMASK: 0
[  243.686572] GPR00: 0000000000000006 00007ffffa606710 00007fffa48e7200 0000000000000000
[  243.686572] GPR04: 0000000000000002 000000000000000a 0000000000000000 0000000000000001
[  243.686572] GPR08: 000001000c172dd0 0000000000000000 0000000000000000 0000000000000000
[  243.686572] GPR12: 0000000000000000 00007fffa4ff4bc0 0000000000000000 0000000000000000
[  243.686572] GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
[  243.686572] GPR20: 0000000132dfdc50 000000000000000e 0000000000189375 0000000000000000
[  243.686572] GPR24: 00007ffffa606ae0 0000000000000005 000001000c185490 000001000c172570
[  243.686572] GPR28: 000001000c172990 000001000c184850 000001000c172e00 00007fffa4fedd98
[  243.686683] NIP [00007fffa47d5ba4] 0x7fffa47d5ba4
[  243.686691] LR [0000000000000000] 0x0
[  243.686698] --- interrupt: 3000
[  243.686708] INFO: task kworker/u16:1:24 blocked for more than 122 seconds.
[  243.686717]       Not tainted 6.1.0-rc1 #1
[  243.686724] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[  243.686733] task:kworker/u16:1   state:D stack:0     pid:24    ppid:2      flags:0x00000800
[  243.686747] Workqueue: events_unbound fsnotify_mark_destroy_workfn
[  243.686758] Call Trace:
[  243.686762] [c0000000166736e0] [c00000004fd91000] 0xc00000004fd91000 (unreliable)
[  243.686775] [c0000000166738d0] [c00000001001dec0] __switch_to+0x130/0x220
[  243.686788] [c000000016673930] [c000000010f607b8] __schedule+0x1f8/0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53671/">CVE-2023-53671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53671">CVE-2023-53671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251731">SUSE bug 1251731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53673" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53673" ref_url="https://www.suse.com/security/cve/CVE-2023-53673" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: call disconnect callback before deleting conn

In hci_cs_disconnect, we do hci_conn_del even if disconnection failed.

ISO, L2CAP and SCO connections refer to the hci_conn without
hci_conn_get, so disconn_cfm must be called so they can clean up their
conn, otherwise use-after-free occurs.

ISO:
==========================================================
iso_sock_connect:880: sk 00000000eabd6557
iso_connect_cis:356: 70:1a:b8:98:ff:a2 -&gt; 28:3d:c2:4a:7e:da
...
iso_conn_add:140: hcon 000000001696f1fd conn 00000000b6251073
hci_dev_put:1487: hci0 orig refcnt 17
__iso_chan_add:214: conn 00000000b6251073
iso_sock_clear_timer:117: sock 00000000eabd6557 state 3
...
hci_rx_work:4085: hci0 Event packet
hci_event_packet:7601: hci0: event 0x0f
hci_cmd_status_evt:4346: hci0: opcode 0x0406
hci_cs_disconnect:2760: hci0: status 0x0c
hci_sent_cmd_data:3107: hci0 opcode 0x0406
hci_conn_del:1151: hci0 hcon 000000001696f1fd handle 2560
hci_conn_unlink:1102: hci0: hcon 000000001696f1fd
hci_conn_drop:1451: hcon 00000000d8521aaf orig refcnt 2
hci_chan_list_flush:2780: hcon 000000001696f1fd
hci_dev_put:1487: hci0 orig refcnt 21
hci_dev_put:1487: hci0 orig refcnt 20
hci_req_cmd_complete:3978: opcode 0x0406 status 0x0c
... &lt;no iso_* activity on sk/conn&gt; ...
iso_sock_sendmsg:1098: sock 00000000dea5e2e0, sk 00000000eabd6557
BUG: kernel NULL pointer dereference, address: 0000000000000668
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP PTI
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014
RIP: 0010:iso_sock_sendmsg (net/bluetooth/iso.c:1112) bluetooth
==========================================================

L2CAP:
==================================================================
hci_cmd_status_evt:4359: hci0: opcode 0x0406
hci_cs_disconnect:2760: hci0: status 0x0c
hci_sent_cmd_data:3085: hci0 opcode 0x0406
hci_conn_del:1151: hci0 hcon ffff88800c999000 handle 3585
hci_conn_unlink:1102: hci0: hcon ffff88800c999000
hci_chan_list_flush:2780: hcon ffff88800c999000
hci_chan_del:2761: hci0 hcon ffff88800c999000 chan ffff888018ddd280
...
BUG: KASAN: slab-use-after-free in hci_send_acl+0x2d/0x540 [bluetooth]
Read of size 8 at addr ffff888018ddd298 by task bluetoothd/1175

CPU: 0 PID: 1175 Comm: bluetoothd Tainted: G            E      6.4.0-rc4+ #2
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x5b/0x90
 print_report+0xcf/0x670
 ? __virt_addr_valid+0xf8/0x180
 ? hci_send_acl+0x2d/0x540 [bluetooth]
 kasan_report+0xa8/0xe0
 ? hci_send_acl+0x2d/0x540 [bluetooth]
 hci_send_acl+0x2d/0x540 [bluetooth]
 ? __pfx___lock_acquire+0x10/0x10
 l2cap_chan_send+0x1fd/0x1300 [bluetooth]
 ? l2cap_sock_sendmsg+0xf2/0x170 [bluetooth]
 ? __pfx_l2cap_chan_send+0x10/0x10 [bluetooth]
 ? lock_release+0x1d5/0x3c0
 ? mark_held_locks+0x1a/0x90
 l2cap_sock_sendmsg+0x100/0x170 [bluetooth]
 sock_write_iter+0x275/0x280
 ? __pfx_sock_write_iter+0x10/0x10
 ? __pfx___lock_acquire+0x10/0x10
 do_iter_readv_writev+0x176/0x220
 ? __pfx_do_iter_readv_writev+0x10/0x10
 ? find_held_lock+0x83/0xa0
 ? selinux_file_permission+0x13e/0x210
 do_iter_write+0xda/0x340
 vfs_writev+0x1b4/0x400
 ? __pfx_vfs_writev+0x10/0x10
 ? __seccomp_filter+0x112/0x750
 ? populate_seccomp_data+0x182/0x220
 ? __fget_light+0xdf/0x100
 ? do_writev+0x19d/0x210
 do_writev+0x19d/0x210
 ? __pfx_do_writev+0x10/0x10
 ? mark_held_locks+0x1a/0x90
 do_syscall_64+0x60/0x90
 ? lockdep_hardirqs_on_prepare+0x149/0x210
 ? do_syscall_64+0x6c/0x90
 ? lockdep_hardirqs_on_prepare+0x149/0x210
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7ff45cb23e64
Code: 15 d1 1f 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d 9d a7 0d 00 00 74 13 b8 14 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
RSP: 002b:00007fff21ae09b8 EFLAGS: 00000202 ORIG_RAX: 0000000000000014
RAX: ffffffffffffffda RBX: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53673/">CVE-2023-53673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53673">CVE-2023-53673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251763">SUSE bug 1251763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251983">SUSE bug 1251983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53675" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53675" ref_url="https://www.suse.com/security/cve/CVE-2023-53675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix possible desc_ptr out-of-bounds accesses

Sanitize possible desc_ptr out-of-bounds accesses in
ses_enclosure_data_process().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53675/">CVE-2023-53675 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53675">CVE-2023-53675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251325">SUSE bug 1251325</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53677</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53677" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53677" ref_url="https://www.suse.com/security/cve/CVE-2023-53677" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix memory leaks in i915 selftests

This patch fixes memory leaks on error escapes in function fake_get_pages

(cherry picked from commit 8bfbdadce85c4c51689da10f39c805a7106d4567)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53677/">CVE-2023-53677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53677">CVE-2023-53677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251765">SUSE bug 1251765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53678</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53678" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53678" ref_url="https://www.suse.com/security/cve/CVE-2023-53678" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix system suspend without fbdev being initialized

If fbdev is not initialized for some reason - in practice on platforms
without display - suspending fbdev should be skipped during system
suspend, fix this up. While at it add an assert that suspending fbdev
only happens with the display present.

This fixes the following:

[   91.227923] PM: suspend entry (s2idle)
[   91.254598] Filesystems sync: 0.025 seconds
[   91.270518] Freezing user space processes
[   91.272266] Freezing user space processes completed (elapsed 0.001 seconds)
[   91.272686] OOM killer disabled.
[   91.272872] Freezing remaining freezable tasks
[   91.274295] Freezing remaining freezable tasks completed (elapsed 0.001 seconds)
[   91.659622] BUG: kernel NULL pointer dereference, address: 00000000000001c8
[   91.659981] #PF: supervisor write access in kernel mode
[   91.660252] #PF: error_code(0x0002) - not-present page
[   91.660511] PGD 0 P4D 0
[   91.660647] Oops: 0002 [#1] PREEMPT SMP NOPTI
[   91.660875] CPU: 4 PID: 917 Comm: bash Not tainted 6.2.0-rc7+ #54
[   91.661185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20221117gitfff6d81270b5-9.fc37 unknown
[   91.661680] RIP: 0010:mutex_lock+0x19/0x30
[   91.661914] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 53 48 89 fb e8 62 d3 ff ff 31 c0 65 48 8b 14 25 00 15 03 00 &lt;f0&gt; 48 0f b1 13 75 06 5b c3 cc cc cc cc 48 89 df 5b eb b4 0f 1f 40
[   91.662840] RSP: 0018:ffffa1e8011ffc08 EFLAGS: 00010246
[   91.663087] RAX: 0000000000000000 RBX: 00000000000001c8 RCX: 0000000000000000
[   91.663440] RDX: ffff8be455eb0000 RSI: 0000000000000001 RDI: 00000000000001c8
[   91.663802] RBP: ffff8be459440000 R08: ffff8be459441f08 R09: ffffffff8e1432c0
[   91.664167] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001
[   91.664532] R13: 00000000000001c8 R14: 0000000000000000 R15: ffff8be442f4fb20
[   91.664905] FS:  00007f28ffc16740(0000) GS:ffff8be4bb900000(0000) knlGS:0000000000000000
[   91.665334] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   91.665626] CR2: 00000000000001c8 CR3: 0000000114926006 CR4: 0000000000770ee0
[   91.665988] PKRU: 55555554
[   91.666131] Call Trace:
[   91.666265]  &lt;TASK&gt;
[   91.666381]  intel_fbdev_set_suspend+0x97/0x1b0 [i915]
[   91.666738]  i915_drm_suspend+0xb9/0x100 [i915]
[   91.667029]  pci_pm_suspend+0x78/0x170
[   91.667234]  ? __pfx_pci_pm_suspend+0x10/0x10
[   91.667461]  dpm_run_callback+0x47/0x150
[   91.667673]  __device_suspend+0x10a/0x4e0
[   91.667880]  dpm_suspend+0x134/0x270
[   91.668069]  dpm_suspend_start+0x79/0x80
[   91.668272]  suspend_devices_and_enter+0x11b/0x890
[   91.668526]  pm_suspend.cold+0x270/0x2fc
[   91.668737]  state_store+0x46/0x90
[   91.668916]  kernfs_fop_write_iter+0x11b/0x200
[   91.669153]  vfs_write+0x1e1/0x3a0
[   91.669336]  ksys_write+0x53/0xd0
[   91.669510]  do_syscall_64+0x58/0xc0
[   91.669699]  ? syscall_exit_to_user_mode_prepare+0x18e/0x1c0
[   91.669980]  ? syscall_exit_to_user_mode_prepare+0x18e/0x1c0
[   91.670278]  ? syscall_exit_to_user_mode+0x17/0x40
[   91.670524]  ? do_syscall_64+0x67/0xc0
[   91.670717]  ? __irq_exit_rcu+0x3d/0x140
[   91.670931]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
[   91.671202] RIP: 0033:0x7f28ffd14284

v2: CC stable. (Jani)

References: https://gitlab.freedesktop.org/drm/intel/-/issues/8015
(cherry picked from commit 9542d708409a41449e99c9a464deb5e062c4bee2)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53678/">CVE-2023-53678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53678">CVE-2023-53678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251766">SUSE bug 1251766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53679" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53679" ref_url="https://www.suse.com/security/cve/CVE-2023-53679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt7601u: fix an integer underflow

Fix an integer underflow that leads to a null pointer dereference in
'mt7601u_rx_skb_from_seg()'. The variable 'dma_len' in the URB packet
could be manipulated, which could trigger an integer underflow of
'seg_len' in 'mt7601u_rx_process_seg()'. This underflow subsequently
causes the 'bad_frame' checks in 'mt7601u_rx_skb_from_seg()' to be
bypassed, eventually leading to a dereference of the pointer 'p', which
is a null pointer.

Ensure that 'dma_len' is greater than 'min_seg_len'.

Found by a modified version of syzkaller.

KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 0 PID: 12 Comm: ksoftirqd/0 Tainted: G        W  O      5.14.0+
#139
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014
RIP: 0010:skb_add_rx_frag+0x143/0x370
Code: e2 07 83 c2 03 38 ca 7c 08 84 c9 0f 85 86 01 00 00 4c 8d 7d 08 44
89 68 08 48 b8 00 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02
00 0f 85 cd 01 00 00 48 8b 45 08 a8 01 0f 85 3d 01 00 00
RSP: 0018:ffffc900000cfc90 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: ffff888115520dc0 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffff8881118430c0 RDI: ffff8881118430f8
RBP: 0000000000000000 R08: 0000000000000e09 R09: 0000000000000010
R10: ffff888111843017 R11: ffffed1022308602 R12: 0000000000000000
R13: 0000000000000e09 R14: 0000000000000010 R15: 0000000000000008
FS:  0000000000000000(0000) GS:ffff88811a800000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000004035af40 CR3: 00000001157f2000 CR4: 0000000000750ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 mt7601u_rx_tasklet+0xc73/0x1270
 ? mt7601u_submit_rx_buf.isra.0+0x510/0x510
 ? tasklet_action_common.isra.0+0x79/0x2f0
 tasklet_action_common.isra.0+0x206/0x2f0
 __do_softirq+0x1b5/0x880
 ? tasklet_unlock+0x30/0x30
 run_ksoftirqd+0x26/0x50
 smpboot_thread_fn+0x34f/0x7d0
 ? smpboot_register_percpu_thread+0x370/0x370
 kthread+0x3a1/0x480
 ? set_kthread_struct+0x120/0x120
 ret_from_fork+0x1f/0x30
Modules linked in: 88XXau(O) 88x2bu(O)
---[ end trace 57f34f93b4da0f9b ]---
RIP: 0010:skb_add_rx_frag+0x143/0x370
Code: e2 07 83 c2 03 38 ca 7c 08 84 c9 0f 85 86 01 00 00 4c 8d 7d 08 44
89 68 08 48 b8 00 00 00 00 00 fc ff df 4c 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02
00 0f 85 cd 01 00 00 48 8b 45 08 a8 01 0f 85 3d 01 00 00
RSP: 0018:ffffc900000cfc90 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: ffff888115520dc0 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffff8881118430c0 RDI: ffff8881118430f8
RBP: 0000000000000000 R08: 0000000000000e09 R09: 0000000000000010
R10: ffff888111843017 R11: ffffed1022308602 R12: 0000000000000000
R13: 0000000000000e09 R14: 0000000000000010 R15: 0000000000000008
FS:  0000000000000000(0000) GS:ffff88811a800000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000004035af40 CR3: 00000001157f2000 CR4: 0000000000750ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53679/">CVE-2023-53679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-53679">CVE-2023-53679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251785">SUSE bug 1251785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53696" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53696" ref_url="https://www.suse.com/security/cve/CVE-2023-53696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix memory leak in qla2x00_probe_one()

There is a memory leak reported by kmemleak:

  unreferenced object 0xffffc900003f0000 (size 12288):
    comm "modprobe", pid 19117, jiffies 4299751452 (age 42490.264s)
    hex dump (first 32 bytes):
      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    backtrace:
      [&lt;00000000629261a8&gt;] __vmalloc_node_range+0xe56/0x1110
      [&lt;0000000001906886&gt;] __vmalloc_node+0xbd/0x150
      [&lt;000000005bb4dc34&gt;] vmalloc+0x25/0x30
      [&lt;00000000a2dc1194&gt;] qla2x00_create_host+0x7a0/0xe30 [qla2xxx]
      [&lt;0000000062b14b47&gt;] qla2x00_probe_one+0x2eb8/0xd160 [qla2xxx]
      [&lt;00000000641ccc04&gt;] local_pci_probe+0xeb/0x1a0

The root cause is traced to an error-handling path in qla2x00_probe_one()
when the adapter "base_vha" initialize failed. The fab_scan_rp "scan.l" is
used to record the port information and it is allocated in
qla2x00_create_host(). However, it is not released in the error handling
path "probe_failed".

Fix this by freeing the memory of "scan.l" when an error occurs in the
adapter initialization process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53696/">CVE-2023-53696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53696">CVE-2023-53696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252513">SUSE bug 1252513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53705" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53705" ref_url="https://www.suse.com/security/cve/CVE-2023-53705" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix out-of-bounds access in ipv6_find_tlv()

optlen is fetched without checking whether there is more than one byte to parse.
It can lead to out-of-bounds access.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53705/">CVE-2023-53705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53705">CVE-2023-53705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252554">SUSE bug 1252554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53706</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53706" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53706" ref_url="https://www.suse.com/security/cve/CVE-2023-53706" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmemmap/devdax: fix kernel crash when probing devdax devices

commit 4917f55b4ef9 ("mm/sparse-vmemmap: improve memory savings for
compound devmaps") added support for using optimized vmmemap for devdax
devices.  But how vmemmap mappings are created are architecture specific. 
For example, powerpc with hash translation doesn't have vmemmap mappings
in init_mm page table instead they are bolted table entries in the
hardware page table

vmemmap_populate_compound_pages() used by vmemmap optimization code is not
aware of these architecture-specific mapping.  Hence allow architecture to
opt for this feature.  I selected architectures supporting
HUGETLB_PAGE_OPTIMIZE_VMEMMAP option as also supporting this feature.

This patch fixes the below crash on ppc64.

BUG: Unable to handle kernel data access on write at 0xc00c000100400038
Faulting instruction address: 0xc000000001269d90
Oops: Kernel access of bad area, sig: 11 [#1]
LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA pSeries
Modules linked in:
CPU: 7 PID: 1 Comm: swapper/0 Not tainted 6.3.0-rc5-150500.34-default+ #2 5c90a668b6bbd142599890245c2fb5de19d7d28a
Hardware name: IBM,9009-42G POWER9 (raw) 0x4e0202 0xf000005 of:IBM,FW950.40 (VL950_099) hv:phyp pSeries
NIP:  c000000001269d90 LR: c0000000004c57d4 CTR: 0000000000000000
REGS: c000000003632c30 TRAP: 0300   Not tainted  (6.3.0-rc5-150500.34-default+)
MSR:  8000000000009033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 24842228  XER: 00000000
CFAR: c0000000004c57d0 DAR: c00c000100400038 DSISR: 42000000 IRQMASK: 0
....
NIP [c000000001269d90] __init_single_page.isra.74+0x14/0x4c
LR [c0000000004c57d4] __init_zone_device_page+0x44/0xd0
Call Trace:
[c000000003632ed0] [c000000003632f60] 0xc000000003632f60 (unreliable)
[c000000003632f10] [c0000000004c5ca0] memmap_init_zone_device+0x170/0x250
[c000000003632fe0] [c0000000005575f8] memremap_pages+0x2c8/0x7f0
[c0000000036330c0] [c000000000557b5c] devm_memremap_pages+0x3c/0xa0
[c000000003633100] [c000000000d458a8] dev_dax_probe+0x108/0x3e0
[c0000000036331a0] [c000000000d41430] dax_bus_probe+0xb0/0x140
[c0000000036331d0] [c000000000cef27c] really_probe+0x19c/0x520
[c000000003633260] [c000000000cef6b4] __driver_probe_device+0xb4/0x230
[c0000000036332e0] [c000000000cef888] driver_probe_device+0x58/0x120
[c000000003633320] [c000000000cefa6c] __device_attach_driver+0x11c/0x1e0
[c0000000036333a0] [c000000000cebc58] bus_for_each_drv+0xa8/0x130
[c000000003633400] [c000000000ceefcc] __device_attach+0x15c/0x250
[c0000000036334a0] [c000000000ced458] bus_probe_device+0x108/0x110
[c0000000036334f0] [c000000000ce92dc] device_add+0x7fc/0xa10
[c0000000036335b0] [c000000000d447c8] devm_create_dev_dax+0x1d8/0x530
[c000000003633640] [c000000000d46b60] __dax_pmem_probe+0x200/0x270
[c0000000036337b0] [c000000000d46bf0] dax_pmem_probe+0x20/0x70
[c0000000036337d0] [c000000000d2279c] nvdimm_bus_probe+0xac/0x2b0
[c000000003633860] [c000000000cef27c] really_probe+0x19c/0x520
[c0000000036338f0] [c000000000cef6b4] __driver_probe_device+0xb4/0x230
[c000000003633970] [c000000000cef888] driver_probe_device+0x58/0x120
[c0000000036339b0] [c000000000cefd08] __driver_attach+0x1d8/0x240
[c000000003633a30] [c000000000cebb04] bus_for_each_dev+0xb4/0x130
[c000000003633a90] [c000000000cee564] driver_attach+0x34/0x50
[c000000003633ab0] [c000000000ced878] bus_add_driver+0x218/0x300
[c000000003633b40] [c000000000cf1144] driver_register+0xa4/0x1b0
[c000000003633bb0] [c000000000d21a0c] __nd_driver_register+0x5c/0x100
[c000000003633c10] [c00000000206a2e8] dax_pmem_init+0x34/0x48
[c000000003633c30] [c0000000000132d0] do_one_initcall+0x60/0x320
[c000000003633d00] [c0000000020051b0] kernel_init_freeable+0x360/0x400
[c000000003633de0] [c000000000013764] kernel_init+0x34/0x1d0
[c000000003633e50] [c00000000000de14] ret_from_kernel_thread+0x5c/0x64
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53706/">CVE-2023-53706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53706">CVE-2023-53706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252530">SUSE bug 1252530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53709" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53709" ref_url="https://www.suse.com/security/cve/CVE-2023-53709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Handle race between rb_move_tail and rb_check_pages

It seems a data race between ring_buffer writing and integrity check.
That is, RB_FLAG of head_page is been updating, while at same time
RB_FLAG was cleared when doing integrity check rb_check_pages():

  rb_check_pages()            rb_handle_head_page():
  --------                    --------
  rb_head_page_deactivate()
                              rb_head_page_set_normal()
  rb_head_page_activate()

We do intergrity test of the list to check if the list is corrupted and
it is still worth doing it. So, let's refactor rb_check_pages() such that
we no longer clear and set flag during the list sanity checking.

[1] and [2] are the test to reproduce and the crash report respectively.

1:
``` read_trace.sh
  while true;
  do
    # the "trace" file is closed after read
    head -1 /sys/kernel/tracing/trace &gt; /dev/null
  done
```
``` repro.sh
  sysctl -w kernel.panic_on_warn=1
  # function tracer will writing enough data into ring_buffer
  echo function &gt; /sys/kernel/tracing/current_tracer
  ./read_trace.sh &amp;
  ./read_trace.sh &amp;
  ./read_trace.sh &amp;
  ./read_trace.sh &amp;
  ./read_trace.sh &amp;
  ./read_trace.sh &amp;
  ./read_trace.sh &amp;
  ./read_trace.sh &amp;
```

2:
------------[ cut here ]------------
WARNING: CPU: 9 PID: 62 at kernel/trace/ring_buffer.c:2653
rb_move_tail+0x450/0x470
Modules linked in:
CPU: 9 PID: 62 Comm: ksoftirqd/9 Tainted: G        W          6.2.0-rc6+
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
rel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014
RIP: 0010:rb_move_tail+0x450/0x470
Code: ff ff 4c 89 c8 f0 4d 0f b1 02 48 89 c2 48 83 e2 fc 49 39 d0 75 24
83 e0 03 83 f8 02 0f 84 e1 fb ff ff 48 8b 57 10 f0 ff 42 08 &lt;0f&gt; 0b 83
f8 02 0f 84 ce fb ff ff e9 db
RSP: 0018:ffffb5564089bd00 EFLAGS: 00000203
RAX: 0000000000000000 RBX: ffff9db385a2bf81 RCX: ffffb5564089bd18
RDX: ffff9db281110100 RSI: 0000000000000fe4 RDI: ffff9db380145400
RBP: ffff9db385a2bf80 R08: ffff9db385a2bfc0 R09: ffff9db385a2bfc2
R10: ffff9db385a6c000 R11: ffff9db385a2bf80 R12: 0000000000000000
R13: 00000000000003e8 R14: ffff9db281110100 R15: ffffffffbb006108
FS:  0000000000000000(0000) GS:ffff9db3bdcc0000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005602323024c8 CR3: 0000000022e0c000 CR4: 00000000000006e0
Call Trace:
 &lt;TASK&gt;
 ring_buffer_lock_reserve+0x136/0x360
 ? __do_softirq+0x287/0x2df
 ? __pfx_rcu_softirq_qs+0x10/0x10
 trace_function+0x21/0x110
 ? __pfx_rcu_softirq_qs+0x10/0x10
 ? __do_softirq+0x287/0x2df
 function_trace_call+0xf6/0x120
 0xffffffffc038f097
 ? rcu_softirq_qs+0x5/0x140
 rcu_softirq_qs+0x5/0x140
 __do_softirq+0x287/0x2df
 run_ksoftirqd+0x2a/0x30
 smpboot_thread_fn+0x188/0x220
 ? __pfx_smpboot_thread_fn+0x10/0x10
 kthread+0xe7/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2c/0x50
 &lt;/TASK&gt;
---[ end trace 0000000000000000 ]---

[ crash report and test reproducer credit goes to Zheng Yejian]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53709/">CVE-2023-53709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53709">CVE-2023-53709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252532">SUSE bug 1252532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53710" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53710" ref_url="https://www.suse.com/security/cve/CVE-2023-53710" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read

Kernel NULL pointer dereference when ACPI SAR table isn't implemented well.
Fix the error code of return to mark the ACPI SAR table as invalid.

[    5.077128] mt7921e 0000:06:00.0: sar cnt = 0
[    5.077381] BUG: kernel NULL pointer dereference, address:
0000000000000004
[    5.077630] #PF: supervisor read access in kernel mode
[    5.077883] #PF: error_code(0x0000) - not-present page
[    5.078138] PGD 0 P4D 0
[    5.078398] Oops: 0000 [#1] PREEMPT SMP NOPTI
[    5.079202] RIP: 0010:mt7921_init_acpi_sar+0x106/0x220
[mt7921_common]
...
[    5.080786] Call Trace:
[    5.080786]  &lt;TASK&gt;
[    5.080786]  mt7921_register_device+0x37d/0x490 [mt7921_common]
[    5.080786]  mt7921_pci_probe.part.0+0x2ee/0x310 [mt7921e]
[    5.080786]  mt7921_pci_probe+0x52/0x70 [mt7921e]
[    5.080786]  local_pci_probe+0x47/0x90
[    5.080786]  pci_call_probe+0x55/0x190
[    5.080786]  pci_device_probe+0x84/0x120
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53710/">CVE-2023-53710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53710">CVE-2023-53710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252493">SUSE bug 1252493</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53711" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53711" ref_url="https://www.suse.com/security/cve/CVE-2023-53711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a potential data corruption

We must ensure that the subrequests are joined back into the head before
we can retransmit a request. If the head was not on the commit lists,
because the server wrote it synchronously, we still need to add it back
to the retransmission list.
Add a call that mirrors the effect of nfs_cancel_remove_inode() for
O_DIRECT.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53711/">CVE-2023-53711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53711">CVE-2023-53711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252536">SUSE bug 1252536</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53713" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53713" ref_url="https://www.suse.com/security/cve/CVE-2023-53713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: sme: Use STR P to clear FFR context field in streaming SVE mode

The FFR is a predicate register which can vary between 16 and 256 bits
in size depending upon the configured vector length. When saving the
SVE state in streaming SVE mode, the FFR register is inaccessible and
so commit 9f5848665788 ("arm64/sve: Make access to FFR optional") simply
clears the FFR field of the in-memory context structure. Unfortunately,
it achieves this using an unconditional 8-byte store and so if the SME
vector length is anything other than 64 bytes in size we will either
fail to clear the entire field or, worse, we will corrupt memory
immediately following the structure. This has led to intermittent kfence
splats in CI [1] and can trigger kmalloc Redzone corruption messages
when running the 'fp-stress' kselftest:

 | =============================================================================
 | BUG kmalloc-1k (Not tainted): kmalloc Redzone overwritten
 | -----------------------------------------------------------------------------
 |
 | 0xffff000809bf1e22-0xffff000809bf1e27 @offset=7714. First byte 0x0 instead of 0xcc
 | Allocated in do_sme_acc+0x9c/0x220 age=2613 cpu=1 pid=531
 |  __kmalloc+0x8c/0xcc
 |  do_sme_acc+0x9c/0x220
 |  ...

Replace the 8-byte store with a store of a predicate register which has
been zero-initialised with PFALSE, ensuring that the entire field is
cleared in memory.

[1] https://lore.kernel.org/r/CA+G9fYtU7HsV0R0dp4XEH5xXHSJFw8KyDf5VQrLLfMxWfxQkag@mail.gmail.com
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53713/">CVE-2023-53713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53713">CVE-2023-53713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252559">SUSE bug 1252559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253760">SUSE bug 1253760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53716</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53716" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53716" ref_url="https://www.suse.com/security/cve/CVE-2023-53716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix skb leak in __skb_tstamp_tx()

Commit 50749f2dd685 ("tcp/udp: Fix memleaks of sk and zerocopy skbs with
TX timestamp.") added a call to skb_orphan_frags_rx() to fix leaks with
zerocopy skbs. But it ended up adding a leak of its own. When
skb_orphan_frags_rx() fails, the function just returns, leaking the skb
it just cloned. Free it before returning.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53716/">CVE-2023-53716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53716">CVE-2023-53716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252494">SUSE bug 1252494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53717" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53717" ref_url="https://www.suse.com/security/cve/CVE-2023-53717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback()

Fix a stack-out-of-bounds write that occurs in a WMI response callback
function that is called after a timeout occurs in ath9k_wmi_cmd().
The callback writes to wmi-&gt;cmd_rsp_buf, a stack-allocated buffer that
could no longer be valid when a timeout occurs. Set wmi-&gt;last_seq_id to
0 when a timeout occurred.

Found by a modified version of syzkaller.

BUG: KASAN: stack-out-of-bounds in ath9k_wmi_ctrl_rx
Write of size 4
Call Trace:
 memcpy
 ath9k_wmi_ctrl_rx
 ath9k_htc_rx_msg
 ath9k_hif_usb_reg_in_cb
 __usb_hcd_giveback_urb
 usb_hcd_giveback_urb
 dummy_timer
 call_timer_fn
 run_timer_softirq
 __do_softirq
 irq_exit_rcu
 sysvec_apic_timer_interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53717/">CVE-2023-53717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53717">CVE-2023-53717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252560">SUSE bug 1252560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252563">SUSE bug 1252563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53722</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53722" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53722" ref_url="https://www.suse.com/security/cve/CVE-2023-53722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: raid1: fix potential OOB in raid1_remove_disk()

If rddev-&gt;raid_disk is greater than mddev-&gt;raid_disks, there will be
an out-of-bounds in raid1_remove_disk(). We have already found
similar reports as follows:

1) commit d17f744e883b ("md-raid10: fix KASAN warning")
2) commit 1ebc2cec0b7d ("dm raid: fix KASAN warning in raid5_remove_disk")

Fix this bug by checking whether the "number" variable is
valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53722/">CVE-2023-53722 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53722">CVE-2023-53722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252499">SUSE bug 1252499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252500">SUSE bug 1252500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53726</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53726" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53726" ref_url="https://www.suse.com/security/cve/CVE-2023-53726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: csum: Fix OoB access in IP checksum code for negative lengths

Although commit c2c24edb1d9c ("arm64: csum: Fix pathological zero-length
calls") added an early return for zero-length input, syzkaller has
popped up with an example of a _negative_ length which causes an
undefined shift and an out-of-bounds read:

 | BUG: KASAN: slab-out-of-bounds in do_csum+0x44/0x254 arch/arm64/lib/csum.c:39
 | Read of size 4294966928 at addr ffff0000d7ac0170 by task syz-executor412/5975
 |
 | CPU: 0 PID: 5975 Comm: syz-executor412 Not tainted 6.4.0-rc4-syzkaller-g908f31f2a05b #0
 | Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/25/2023
 | Call trace:
 |  dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:233
 |  show_stack+0x2c/0x44 arch/arm64/kernel/stacktrace.c:240
 |  __dump_stack lib/dump_stack.c:88 [inline]
 |  dump_stack_lvl+0xd0/0x124 lib/dump_stack.c:106
 |  print_address_description mm/kasan/report.c:351 [inline]
 |  print_report+0x174/0x514 mm/kasan/report.c:462
 |  kasan_report+0xd4/0x130 mm/kasan/report.c:572
 |  kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:187
 |  __kasan_check_read+0x20/0x30 mm/kasan/shadow.c:31
 |  do_csum+0x44/0x254 arch/arm64/lib/csum.c:39
 |  csum_partial+0x30/0x58 lib/checksum.c:128
 |  gso_make_checksum include/linux/skbuff.h:4928 [inline]
 |  __udp_gso_segment+0xaf4/0x1bc4 net/ipv4/udp_offload.c:332
 |  udp6_ufo_fragment+0x540/0xca0 net/ipv6/udp_offload.c:47
 |  ipv6_gso_segment+0x5cc/0x1760 net/ipv6/ip6_offload.c:119
 |  skb_mac_gso_segment+0x2b4/0x5b0 net/core/gro.c:141
 |  __skb_gso_segment+0x250/0x3d0 net/core/dev.c:3401
 |  skb_gso_segment include/linux/netdevice.h:4859 [inline]
 |  validate_xmit_skb+0x364/0xdbc net/core/dev.c:3659
 |  validate_xmit_skb_list+0x94/0x130 net/core/dev.c:3709
 |  sch_direct_xmit+0xe8/0x548 net/sched/sch_generic.c:327
 |  __dev_xmit_skb net/core/dev.c:3805 [inline]
 |  __dev_queue_xmit+0x147c/0x3318 net/core/dev.c:4210
 |  dev_queue_xmit include/linux/netdevice.h:3085 [inline]
 |  packet_xmit+0x6c/0x318 net/packet/af_packet.c:276
 |  packet_snd net/packet/af_packet.c:3081 [inline]
 |  packet_sendmsg+0x376c/0x4c98 net/packet/af_packet.c:3113
 |  sock_sendmsg_nosec net/socket.c:724 [inline]
 |  sock_sendmsg net/socket.c:747 [inline]
 |  __sys_sendto+0x3b4/0x538 net/socket.c:2144

Extend the early return to reject negative lengths as well, aligning our
implementation with the generic code in lib/checksum.c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53726/">CVE-2023-53726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53726">CVE-2023-53726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252565">SUSE bug 1252565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53730" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53730" ref_url="https://www.suse.com/security/cve/CVE-2023-53730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost

adjust_inuse_and_calc_cost() use spin_lock_irq() and IRQ will be enabled
when unlock. DEADLOCK might happen if we have held other locks and disabled
IRQ before invoking it.

Fix it by using spin_lock_irqsave() instead, which can keep IRQ state
consistent with before when unlock.

  ================================
  WARNING: inconsistent lock state
  5.10.0-02758-g8e5f91fd772f #26 Not tainted
  --------------------------------
  inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage.
  kworker/2:3/388 [HC0[0]:SC0[0]:HE0:SE1] takes:
  ffff888118c00c28 (&amp;bfqd-&gt;lock){?.-.}-{2:2}, at: spin_lock_irq
  ffff888118c00c28 (&amp;bfqd-&gt;lock){?.-.}-{2:2}, at: bfq_bio_merge+0x141/0x390
  {IN-HARDIRQ-W} state was registered at:
    __lock_acquire+0x3d7/0x1070
    lock_acquire+0x197/0x4a0
    __raw_spin_lock_irqsave
    _raw_spin_lock_irqsave+0x3b/0x60
    bfq_idle_slice_timer_body
    bfq_idle_slice_timer+0x53/0x1d0
    __run_hrtimer+0x477/0xa70
    __hrtimer_run_queues+0x1c6/0x2d0
    hrtimer_interrupt+0x302/0x9e0
    local_apic_timer_interrupt
    __sysvec_apic_timer_interrupt+0xfd/0x420
    run_sysvec_on_irqstack_cond
    sysvec_apic_timer_interrupt+0x46/0xa0
    asm_sysvec_apic_timer_interrupt+0x12/0x20
  irq event stamp: 837522
  hardirqs last  enabled at (837521): [&lt;ffffffff84b9419d&gt;] __raw_spin_unlock_irqrestore
  hardirqs last  enabled at (837521): [&lt;ffffffff84b9419d&gt;] _raw_spin_unlock_irqrestore+0x3d/0x40
  hardirqs last disabled at (837522): [&lt;ffffffff84b93fa3&gt;] __raw_spin_lock_irq
  hardirqs last disabled at (837522): [&lt;ffffffff84b93fa3&gt;] _raw_spin_lock_irq+0x43/0x50
  softirqs last  enabled at (835852): [&lt;ffffffff84e00558&gt;] __do_softirq+0x558/0x8ec
  softirqs last disabled at (835845): [&lt;ffffffff84c010ff&gt;] asm_call_irq_on_stack+0xf/0x20

  other info that might help us debug this:
   Possible unsafe locking scenario:

         CPU0
         ----
    lock(&amp;bfqd-&gt;lock);
    &lt;Interrupt&gt;
      lock(&amp;bfqd-&gt;lock);

   *** DEADLOCK ***

  3 locks held by kworker/2:3/388:
   #0: ffff888107af0f38 ((wq_completion)kthrotld){+.+.}-{0:0}, at: process_one_work+0x742/0x13f0
   #1: ffff8881176bfdd8 ((work_completion)(&amp;td-&gt;dispatch_work)){+.+.}-{0:0}, at: process_one_work+0x777/0x13f0
   #2: ffff888118c00c28 (&amp;bfqd-&gt;lock){?.-.}-{2:2}, at: spin_lock_irq
   #2: ffff888118c00c28 (&amp;bfqd-&gt;lock){?.-.}-{2:2}, at: bfq_bio_merge+0x141/0x390

  stack backtrace:
  CPU: 2 PID: 388 Comm: kworker/2:3 Not tainted 5.10.0-02758-g8e5f91fd772f #26
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
  Workqueue: kthrotld blk_throtl_dispatch_work_fn
  Call Trace:
   __dump_stack lib/dump_stack.c:77 [inline]
   dump_stack+0x107/0x167
   print_usage_bug
   valid_state
   mark_lock_irq.cold+0x32/0x3a
   mark_lock+0x693/0xbc0
   mark_held_locks+0x9e/0xe0
   __trace_hardirqs_on_caller
   lockdep_hardirqs_on_prepare.part.0+0x151/0x360
   trace_hardirqs_on+0x5b/0x180
   __raw_spin_unlock_irq
   _raw_spin_unlock_irq+0x24/0x40
   spin_unlock_irq
   adjust_inuse_and_calc_cost+0x4fb/0x970
   ioc_rqos_merge+0x277/0x740
   __rq_qos_merge+0x62/0xb0
   rq_qos_merge
   bio_attempt_back_merge+0x12c/0x4a0
   blk_mq_sched_try_merge+0x1b6/0x4d0
   bfq_bio_merge+0x24a/0x390
   __blk_mq_sched_bio_merge+0xa6/0x460
   blk_mq_sched_bio_merge
   blk_mq_submit_bio+0x2e7/0x1ee0
   __submit_bio_noacct_mq+0x175/0x3b0
   submit_bio_noacct+0x1fb/0x270
   blk_throtl_dispatch_work_fn+0x1ef/0x2b0
   process_one_work+0x83e/0x13f0
   process_scheduled_works
   worker_thread+0x7e3/0xd80
   kthread+0x353/0x470
   ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53730/">CVE-2023-53730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53730">CVE-2023-53730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252495">SUSE bug 1252495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53743" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53743" ref_url="https://www.suse.com/security/cve/CVE-2023-53743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Free released resource after coalescing

release_resource() doesn't actually free the resource or resource list
entry so free the resource list entry to avoid a leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53743/">CVE-2023-53743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53743">CVE-2023-53743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254782">SUSE bug 1254782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53746" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53746" ref_url="https://www.suse.com/security/cve/CVE-2023-53746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/vfio-ap: fix memory leak in vfio_ap device driver

The device release callback function invoked to release the matrix device
uses the dev_get_drvdata(device *dev) function to retrieve the
pointer to the vfio_matrix_dev object in order to free its storage. The
problem is, this object is not stored as drvdata with the device; since the
kfree function will accept a NULL pointer, the memory for the
vfio_matrix_dev object is never freed.

Since the device being released is contained within the vfio_matrix_dev
object, the container_of macro will be used to retrieve its pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53746/">CVE-2023-53746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53746">CVE-2023-53746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254617">SUSE bug 1254617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53751" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53751" ref_url="https://www.suse.com/security/cve/CVE-2023-53751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname

TCP_Server_Info::hostname may be updated once or many times during
reconnect, so protect its access outside reconnect path as well and
then prevent any potential use-after-free bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53751/">CVE-2023-53751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53751">CVE-2023-53751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254986">SUSE bug 1254986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254988">SUSE bug 1254988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53753" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53753" ref_url="https://www.suse.com/security/cve/CVE-2023-53753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix mapping to non-allocated address

[Why]
There is an issue mapping non-allocated location of memory.
It would allocate gpio registers from an array out of bounds.

[How]
Patch correct numbers of bounds for using.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53753/">CVE-2023-53753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53753">CVE-2023-53753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254910">SUSE bug 1254910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53755</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53755" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53755" ref_url="https://www.suse.com/security/cve/CVE-2023-53755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ptdma: check for null desc before calling pt_cmd_callback

Resolves a panic that can occur on AMD systems, typically during host
shutdown, after the PTDMA driver had been exercised. The issue was
the pt_issue_pending() function is mistakenly assuming that there will
be at least one descriptor in the Submitted queue when the function
is called. However, it is possible that both the Submitted and Issued
queues could be empty, which could result in pt_cmd_callback() being
mistakenly called with a NULL pointer.
Ref: Bugzilla Bug 216856.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53755/">CVE-2023-53755 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53755">CVE-2023-53755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254608">SUSE bug 1254608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53756" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53756" ref_url="https://www.suse.com/security/cve/CVE-2023-53756" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Fix crash due to uninitialized current_vmcs

KVM enables 'Enlightened VMCS' and 'Enlightened MSR Bitmap' when running as
a nested hypervisor on top of Hyper-V. When MSR bitmap is updated,
evmcs_touch_msr_bitmap function uses current_vmcs per-cpu variable to mark
that the msr bitmap was changed.

vmx_vcpu_create() modifies the msr bitmap via vmx_disable_intercept_for_msr
-&gt; vmx_msr_bitmap_l01_changed which in the end calls this function. The
function checks for current_vmcs if it is null but the check is
insufficient because current_vmcs is not initialized. Because of this, the
code might incorrectly write to the structure pointed by current_vmcs value
left by another task. Preemption is not disabled, the current task can be
preempted and moved to another CPU while current_vmcs is accessed multiple
times from evmcs_touch_msr_bitmap() which leads to crash.

The manipulation of MSR bitmaps by callers happens only for vmcs01 so the
solution is to use vmx-&gt;vmcs01.vmcs instead of current_vmcs.

  BUG: kernel NULL pointer dereference, address: 0000000000000338
  PGD 4e1775067 P4D 0
  Oops: 0002 [#1] PREEMPT SMP NOPTI
  ...
  RIP: 0010:vmx_msr_bitmap_l01_changed+0x39/0x50 [kvm_intel]
  ...
  Call Trace:
   vmx_disable_intercept_for_msr+0x36/0x260 [kvm_intel]
   vmx_vcpu_create+0xe6/0x540 [kvm_intel]
   kvm_arch_vcpu_create+0x1d1/0x2e0 [kvm]
   kvm_vm_ioctl_create_vcpu+0x178/0x430 [kvm]
   kvm_vm_ioctl+0x53f/0x790 [kvm]
   __x64_sys_ioctl+0x8a/0xc0
   do_syscall_64+0x5c/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53756/">CVE-2023-53756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53756">CVE-2023-53756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254822">SUSE bug 1254822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53760" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53760" ref_url="https://www.suse.com/security/cve/CVE-2023-53760" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: mcq: Fix &amp;hwq-&gt;cq_lock deadlock issue

When ufshcd_err_handler() is executed, CQ event interrupt can enter waiting
for the same lock. This can happen in ufshcd_handle_mcq_cq_events() and
also in ufs_mtk_mcq_intr(). The following warning message will be generated
when &amp;hwq-&gt;cq_lock is used in IRQ context with IRQ enabled. Use
ufshcd_mcq_poll_cqe_lock() with spin_lock_irqsave instead of spin_lock to
resolve the deadlock issue.

[name:lockdep&amp;]WARNING: inconsistent lock state
[name:lockdep&amp;]--------------------------------
[name:lockdep&amp;]inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage.
[name:lockdep&amp;]kworker/u16:4/260 [HC0[0]:SC0[0]:HE1:SE1] takes:
  ffffff8028444600 (&amp;hwq-&gt;cq_lock){?.-.}-{2:2}, at:
ufshcd_mcq_poll_cqe_lock+0x30/0xe0
[name:lockdep&amp;]{IN-HARDIRQ-W} state was registered at:
  lock_acquire+0x17c/0x33c
  _raw_spin_lock+0x5c/0x7c
  ufshcd_mcq_poll_cqe_lock+0x30/0xe0
  ufs_mtk_mcq_intr+0x60/0x1bc [ufs_mediatek_mod]
  __handle_irq_event_percpu+0x140/0x3ec
  handle_irq_event+0x50/0xd8
  handle_fasteoi_irq+0x148/0x2b0
  generic_handle_domain_irq+0x4c/0x6c
  gic_handle_irq+0x58/0x134
  call_on_irq_stack+0x40/0x74
  do_interrupt_handler+0x84/0xe4
  el1_interrupt+0x3c/0x78
&lt;snip&gt;

Possible unsafe locking scenario:
       CPU0
       ----
  lock(&amp;hwq-&gt;cq_lock);
  &lt;Interrupt&gt;
    lock(&amp;hwq-&gt;cq_lock);
  *** DEADLOCK ***
2 locks held by kworker/u16:4/260:

[name:lockdep&amp;]
 stack backtrace:
CPU: 7 PID: 260 Comm: kworker/u16:4 Tainted: G S      W  OE
6.1.17-mainline-android14-2-g277223301adb #1
Workqueue: ufs_eh_wq_0 ufshcd_err_handler

 Call trace:
  dump_backtrace+0x10c/0x160
  show_stack+0x20/0x30
  dump_stack_lvl+0x98/0xd8
  dump_stack+0x20/0x60
  print_usage_bug+0x584/0x76c
  mark_lock_irq+0x488/0x510
  mark_lock+0x1ec/0x25c
  __lock_acquire+0x4d8/0xffc
  lock_acquire+0x17c/0x33c
  _raw_spin_lock+0x5c/0x7c
  ufshcd_mcq_poll_cqe_lock+0x30/0xe0
  ufshcd_poll+0x68/0x1b0
  ufshcd_transfer_req_compl+0x9c/0xc8
  ufshcd_err_handler+0x3bc/0xea0
  process_one_work+0x2f4/0x7e8
  worker_thread+0x234/0x450
  kthread+0x110/0x134
  ret_from_fork+0x10/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53760/">CVE-2023-53760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53760">CVE-2023-53760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254603">SUSE bug 1254603</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53761" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53761" ref_url="https://www.suse.com/security/cve/CVE-2023-53761" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: usbtmc: Fix direction for 0-length ioctl control messages

The syzbot fuzzer found a problem in the usbtmc driver: When a user
submits an ioctl for a 0-length control transfer, the driver does not
check that the direction is set to OUT:

------------[ cut here ]------------
usb 3-1: BOGUS control dir, pipe 80000b80 doesn't match bRequestType fd
WARNING: CPU: 0 PID: 5100 at drivers/usb/core/urb.c:411 usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411
Modules linked in:
CPU: 0 PID: 5100 Comm: syz-executor428 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023
RIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411
Code: 7c 24 40 e8 1b 13 5c fb 48 8b 7c 24 40 e8 21 1d f0 fe 45 89 e8 44 89 f1 4c 89 e2 48 89 c6 48 c7 c7 e0 b5 fc 8a e8 19 c8 23 fb &lt;0f&gt; 0b e9 9f ee ff ff e8 ed 12 5c fb 0f b6 1d 12 8a 3c 08 31 ff 41
RSP: 0018:ffffc90003d2fb00 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff8880789e9058 RCX: 0000000000000000
RDX: ffff888029593b80 RSI: ffffffff814c1447 RDI: 0000000000000001
RBP: ffff88801ea742f8 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff88802915e528
R13: 00000000000000fd R14: 0000000080000b80 R15: ffff8880222b3100
FS:  0000555556ca63c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f9ef4d18150 CR3: 0000000073e5b000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58
 usb_internal_control_msg drivers/usb/core/message.c:102 [inline]
 usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153
 usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1954 [inline]
 usbtmc_ioctl+0x1b3d/0x2840 drivers/usb/class/usbtmc.c:2097

To fix this, we must override the direction in the bRequestType field
of the control request structure when the length is 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53761/">CVE-2023-53761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53761">CVE-2023-53761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255002">SUSE bug 1255002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255003">SUSE bug 1255003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53762" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53762" ref_url="https://www.suse.com/security/cve/CVE-2023-53762" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync

Use-after-free can occur in hci_disconnect_all_sync if a connection is
deleted by concurrent processing of a controller event.

To prevent this the code now tries to iterate over the list backwards
to ensure the links are cleanup before its parents, also it no longer
relies on a cursor, instead it always uses the last element since
hci_abort_conn_sync is guaranteed to call hci_conn_del.

UAF crash log:
==================================================================
BUG: KASAN: slab-use-after-free in hci_set_powered_sync
(net/bluetooth/hci_sync.c:5424) [bluetooth]
Read of size 8 at addr ffff888009d9c000 by task kworker/u9:0/124

CPU: 0 PID: 124 Comm: kworker/u9:0 Tainted: G        W
6.5.0-rc1+ #10
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
1.16.2-1.fc38 04/01/2014
Workqueue: hci0 hci_cmd_sync_work [bluetooth]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x5b/0x90
 print_report+0xcf/0x670
 ? __virt_addr_valid+0xdd/0x160
 ? hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]
 kasan_report+0xa6/0xe0
 ? hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]
 ? __pfx_set_powered_sync+0x10/0x10 [bluetooth]
 hci_set_powered_sync+0x2c9/0x4a0 [bluetooth]
 ? __pfx_hci_set_powered_sync+0x10/0x10 [bluetooth]
 ? __pfx_lock_release+0x10/0x10
 ? __pfx_set_powered_sync+0x10/0x10 [bluetooth]
 hci_cmd_sync_work+0x137/0x220 [bluetooth]
 process_one_work+0x526/0x9d0
 ? __pfx_process_one_work+0x10/0x10
 ? __pfx_do_raw_spin_lock+0x10/0x10
 ? mark_held_locks+0x1a/0x90
 worker_thread+0x92/0x630
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x196/0x1e0
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2c/0x50
 &lt;/TASK&gt;

Allocated by task 1782:
 kasan_save_stack+0x33/0x60
 kasan_set_track+0x25/0x30
 __kasan_kmalloc+0x8f/0xa0
 hci_conn_add+0xa5/0xa80 [bluetooth]
 hci_bind_cis+0x881/0x9b0 [bluetooth]
 iso_connect_cis+0x121/0x520 [bluetooth]
 iso_sock_connect+0x3f6/0x790 [bluetooth]
 __sys_connect+0x109/0x130
 __x64_sys_connect+0x40/0x50
 do_syscall_64+0x60/0x90
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

Freed by task 695:
 kasan_save_stack+0x33/0x60
 kasan_set_track+0x25/0x30
 kasan_save_free_info+0x2b/0x50
 __kasan_slab_free+0x10a/0x180
 __kmem_cache_free+0x14d/0x2e0
 device_release+0x5d/0xf0
 kobject_put+0xdf/0x270
 hci_disconn_complete_evt+0x274/0x3a0 [bluetooth]
 hci_event_packet+0x579/0x7e0 [bluetooth]
 hci_rx_work+0x287/0xaa0 [bluetooth]
 process_one_work+0x526/0x9d0
 worker_thread+0x92/0x630
 kthread+0x196/0x1e0
 ret_from_fork+0x2c/0x50
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53762/">CVE-2023-53762 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53762">CVE-2023-53762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254606">SUSE bug 1254606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53764" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53764" ref_url="https://www.suse.com/security/cve/CVE-2023-53764" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Handle lock during peer_id find

ath12k_peer_find_by_id() requires that the caller hold the
ab-&gt;base_lock. Currently the WBM error path does not hold
the lock and calling that function, leads to the
following lockdep_assert()in QCN9274:

[105162.160893] ------------[ cut here ]------------
[105162.160916] WARNING: CPU: 3 PID: 0 at drivers/net/wireless/ath/ath12k/peer.c:71 ath12k_peer_find_by_id+0x52/0x60 [ath12k]
[105162.160933] Modules linked in: ath12k(O) qrtr_mhi qrtr mac80211 cfg80211 mhi qmi_helpers libarc4 nvme nvme_core [last unloaded: ath12k(O)]
[105162.160967] CPU: 3 PID: 0 Comm: swapper/3 Tainted: G        W  O       6.1.0-rc2+ #3
[105162.160972] Hardware name: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0056.2019.0506.1527 05/06/2019
[105162.160977] RIP: 0010:ath12k_peer_find_by_id+0x52/0x60 [ath12k]
[105162.160990] Code: 07 eb 0f 39 68 24 74 0a 48 8b 00 48 39 f8 75 f3 31 c0 5b 5d c3 48 8d bf b0 f2 00 00 be ff ff ff ff e8 22 20 c4 e2 85 c0 75 bf &lt;0f&gt; 0b eb bb 66 2e 0f 1f 84 00 00 00 00 00 41 54 4c 8d a7 98 f2 00
[105162.160996] RSP: 0018:ffffa223001acc60 EFLAGS: 00010246
[105162.161003] RAX: 0000000000000000 RBX: ffff9f0573940000 RCX: 0000000000000000
[105162.161008] RDX: 0000000000000001 RSI: ffffffffa3951c8e RDI: ffffffffa39a96d7
[105162.161013] RBP: 000000000000000a R08: 0000000000000000 R09: 0000000000000000
[105162.161017] R10: ffffa223001acb40 R11: ffffffffa3d57c60 R12: ffff9f057394f2e0
[105162.161022] R13: ffff9f0573940000 R14: ffff9f04ecd659c0 R15: ffff9f04d5a9b040
[105162.161026] FS:  0000000000000000(0000) GS:ffff9f0575600000(0000) knlGS:0000000000000000
[105162.161031] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[105162.161036] CR2: 00001d5c8277a008 CR3: 00000001e6224006 CR4: 00000000003706e0
[105162.161041] Call Trace:
[105162.161046]  &lt;IRQ&gt;
[105162.161051]  ath12k_dp_rx_process_wbm_err+0x6da/0xaf0 [ath12k]
[105162.161072]  ? ath12k_dp_rx_process_err+0x80e/0x15a0 [ath12k]
[105162.161084]  ? __lock_acquire+0x4ca/0x1a60
[105162.161104]  ath12k_dp_service_srng+0x263/0x310 [ath12k]
[105162.161120]  ath12k_pci_ext_grp_napi_poll+0x1c/0x70 [ath12k]
[105162.161133]  __napi_poll+0x22/0x260
[105162.161141]  net_rx_action+0x2f8/0x380
[105162.161153]  __do_softirq+0xd0/0x4c9
[105162.161162]  irq_exit_rcu+0x88/0xe0
[105162.161169]  common_interrupt+0xa5/0xc0
[105162.161174]  &lt;/IRQ&gt;
[105162.161179]  &lt;TASK&gt;
[105162.161184]  asm_common_interrupt+0x22/0x40

Handle spin lock/unlock in WBM error path to hold the necessary lock
expected by ath12k_peer_find_by_id().

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0-03171-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53764/">CVE-2023-53764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53764">CVE-2023-53764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254913">SUSE bug 1254913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53765</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53765" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53765" ref_url="https://www.suse.com/security/cve/CVE-2023-53765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: free background tracker's queued work in btracker_destroy

Otherwise the kernel can BUG with:

[ 2245.426978] =============================================================================
[ 2245.435155] BUG bt_work (Tainted: G    B   W         ): Objects remaining in bt_work on __kmem_cache_shutdown()
[ 2245.445233] -----------------------------------------------------------------------------
[ 2245.445233]
[ 2245.454879] Slab 0x00000000b0ce2b30 objects=64 used=2 fp=0x000000000a3c6a4e flags=0x17ffffc0000200(slab|node=0|zone=2|lastcpupid=0x1fffff)
[ 2245.467300] CPU: 7 PID: 10805 Comm: lvm Kdump: loaded Tainted: G    B   W          6.0.0-rc2 #19
[ 2245.476078] Hardware name: Dell Inc. PowerEdge R7525/0590KW, BIOS 2.5.6 10/06/2021
[ 2245.483646] Call Trace:
[ 2245.486100]  &lt;TASK&gt;
[ 2245.488206]  dump_stack_lvl+0x34/0x48
[ 2245.491878]  slab_err+0x95/0xcd
[ 2245.495028]  __kmem_cache_shutdown.cold+0x31/0x136
[ 2245.499821]  kmem_cache_destroy+0x49/0x130
[ 2245.503928]  btracker_destroy+0x12/0x20 [dm_cache]
[ 2245.508728]  smq_destroy+0x15/0x60 [dm_cache_smq]
[ 2245.513435]  dm_cache_policy_destroy+0x12/0x20 [dm_cache]
[ 2245.518834]  destroy+0xc0/0x110 [dm_cache]
[ 2245.522933]  dm_table_destroy+0x5c/0x120 [dm_mod]
[ 2245.527649]  __dm_destroy+0x10e/0x1c0 [dm_mod]
[ 2245.532102]  dev_remove+0x117/0x190 [dm_mod]
[ 2245.536384]  ctl_ioctl+0x1a2/0x290 [dm_mod]
[ 2245.540579]  dm_ctl_ioctl+0xa/0x20 [dm_mod]
[ 2245.544773]  __x64_sys_ioctl+0x8a/0xc0
[ 2245.548524]  do_syscall_64+0x5c/0x90
[ 2245.552104]  ? syscall_exit_to_user_mode+0x12/0x30
[ 2245.556897]  ? do_syscall_64+0x69/0x90
[ 2245.560648]  ? do_syscall_64+0x69/0x90
[ 2245.564394]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[ 2245.569447] RIP: 0033:0x7fe52583ec6b
...
[ 2245.646771] ------------[ cut here ]------------
[ 2245.651395] kmem_cache_destroy bt_work: Slab cache still has objects when called from btracker_destroy+0x12/0x20 [dm_cache]
[ 2245.651408] WARNING: CPU: 7 PID: 10805 at mm/slab_common.c:478 kmem_cache_destroy+0x128/0x130

Found using: lvm2-testsuite --only "cache-single-split.sh"

Ben bisected and found that commit 0495e337b703 ("mm/slab_common:
Deleting kobject in kmem_cache_destroy() without holding
slab_mutex/cpu_hotplug_lock") first exposed dm-cache's incomplete
cleanup of its background tracker work objects.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53765/">CVE-2023-53765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53765">CVE-2023-53765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254912">SUSE bug 1254912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53767" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53767" ref_url="https://www.suse.com/security/cve/CVE-2023-53767" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work()

Currently the buffer pointed by event is not freed in case
ATH12K_FLAG_UNREGISTERING bit is set, this causes memory leak.

Add a goto skip instead of return, to ensure event and all the
list entries are freed properly.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53767/">CVE-2023-53767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53767">CVE-2023-53767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254919">SUSE bug 1254919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53769" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53769" ref_url="https://www.suse.com/security/cve/CVE-2023-53769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virt/coco/sev-guest: Double-buffer messages

The encryption algorithms read and write directly to shared unencrypted
memory, which may leak information as well as permit the host to tamper
with the message integrity. Instead, copy whole messages in or out as
needed before doing any computation on them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53769/">CVE-2023-53769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53769">CVE-2023-53769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254601">SUSE bug 1254601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806816" comment="bpftool-7.0.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806817" comment="kernel-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806818" comment="kernel-abi-stablelists-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806819" comment="kernel-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806820" comment="kernel-cross-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806821" comment="kernel-debug-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806822" comment="kernel-debug-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806825" comment="kernel-debug-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806826" comment="kernel-debug-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806827" comment="kernel-debug-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806828" comment="kernel-debug-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806831" comment="kernel-doc-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806832" comment="kernel-headers-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806833" comment="kernel-modules-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806834" comment="kernel-modules-core-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806835" comment="kernel-modules-extra-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806836" comment="kernel-tools-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806837" comment="kernel-tools-libs-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806839" comment="kernel-uki-virt-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806840" comment="perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806841" comment="python3-perf-5.14.0-284.30.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806842" comment="rtla-5.14.0-284.30.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53780</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53780" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53780" ref_url="https://www.suse.com/security/cve/CVE-2023-53780" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix FCLK pstate change underflow

[Why]
Currently we set FCLK p-state change
watermark calculated based on dummy
p-state latency when UCLK p-state is
not supported

[How]
Calculate FCLK p-state change watermark
based on on FCLK pstate change latency
in case UCLK p-state is not supported
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-53780/">CVE-2023-53780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53780">CVE-2023-53780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254911">SUSE bug 1254911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53784" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53784" ref_url="https://www.suse.com/security/cve/CVE-2023-53784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: dw_hdmi: fix connector access for scdc

Commit 5d844091f237 ("drm/scdc-helper: Pimp SCDC debugs") changed the scdc
interface to pick up an i2c adapter from a connector instead. However, in
the case of dw-hdmi, the wrong connector was being used to pass i2c adapter
information, since dw-hdmi's embedded connector structure is only populated
when the bridge attachment callback explicitly asks for it.

drm-meson is handling connector creation, so this won't happen, leading to
a NULL pointer dereference.

Fix it by having scdc functions access dw-hdmi's current connector pointer
instead, which is assigned during the bridge enablement stage.

[narmstrong: moved Fixes tag before first S-o-b and added Reported-by tag]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53784/">CVE-2023-53784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53784">CVE-2023-53784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254765">SUSE bug 1254765</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53786" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53786" ref_url="https://www.suse.com/security/cve/CVE-2023-53786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm flakey: fix a crash with invalid table line

This command will crash with NULL pointer dereference:
 dmsetup create flakey --table \
  "0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512"

Fix the crash by checking if arg_name is non-NULL before comparing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53786/">CVE-2023-53786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53786">CVE-2023-53786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254916">SUSE bug 1254916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53789" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53789" ref_url="https://www.suse.com/security/cve/CVE-2023-53789" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Improve page fault error reporting

If IOMMU domain for device group is not setup properly then we may hit
IOMMU page fault. Current page fault handler assumes that domain is
always setup and it will hit NULL pointer derefence (see below sample log).

Lets check whether domain is setup or not and log appropriate message.

Sample log:
----------
 amdgpu 0000:00:01.0: amdgpu: SE 1, SH per SE 1, CU per SH 8, active_cu_number 6
 BUG: kernel NULL pointer dereference, address: 0000000000000058
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 2 PID: 56 Comm: irq/24-AMD-Vi Not tainted 6.2.0-rc2+ #89
 Hardware name: xxx
 RIP: 0010:report_iommu_fault+0x11/0x90
 [...]
 Call Trace:
  &lt;TASK&gt;
  amd_iommu_int_thread+0x60c/0x760
  ? __pfx_irq_thread_fn+0x10/0x10
  irq_thread_fn+0x1f/0x60
  irq_thread+0xea/0x1a0
  ? preempt_count_add+0x6a/0xa0
  ? __pfx_irq_thread_dtor+0x10/0x10
  ? __pfx_irq_thread+0x10/0x10
  kthread+0xe9/0x110
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x2c/0x50
  &lt;/TASK&gt;

[joro: Edit commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53789/">CVE-2023-53789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53789">CVE-2023-53789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255162">SUSE bug 1255162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53791" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53791" ref_url="https://www.suse.com/security/cve/CVE-2023-53791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix warning for holder mismatch from export_rdev()

Commit a1d767191096 ("md: use mddev-&gt;external to select holder in
export_rdev()") fix the problem that 'claim_rdev' is used for
blkdev_get_by_dev() while 'rdev' is used for blkdev_put().

However, if mddev-&gt;external is changed from 0 to 1, then 'rdev' is used
for blkdev_get_by_dev() while 'claim_rdev' is used for blkdev_put(). And
this problem can be reporduced reliably by following:

New file: mdadm/tests/23rdev-lifetime

devname=${dev0##*/}
devt=`cat /sys/block/$devname/dev`
pid=""
runtime=2

clean_up_test() {
        pill -9 $pid
        echo clear &gt; /sys/block/md0/md/array_state
}

trap 'clean_up_test' EXIT

add_by_sysfs() {
        while true; do
                echo $devt &gt; /sys/block/md0/md/new_dev
        done
}

remove_by_sysfs(){
        while true; do
                echo remove &gt; /sys/block/md0/md/dev-${devname}/state
        done
}

echo md0 &gt; /sys/module/md_mod/parameters/new_array || die "create md0 failed"

add_by_sysfs &amp;
pid="$pid $!"

remove_by_sysfs &amp;
pid="$pid $!"

sleep $runtime
exit 0

Test cmd:

./test --save-logs --logdir=/tmp/ --keep-going --dev=loop --tests=23rdev-lifetime

Test result:

------------[ cut here ]------------
WARNING: CPU: 0 PID: 960 at block/bdev.c:618 blkdev_put+0x27c/0x330
Modules linked in: multipath md_mod loop
CPU: 0 PID: 960 Comm: test Not tainted 6.5.0-rc2-00121-g01e55c376936-dirty #50
RIP: 0010:blkdev_put+0x27c/0x330
Call Trace:
 &lt;TASK&gt;
 export_rdev.isra.23+0x50/0xa0 [md_mod]
 mddev_unlock+0x19d/0x300 [md_mod]
 rdev_attr_store+0xec/0x190 [md_mod]
 sysfs_kf_write+0x52/0x70
 kernfs_fop_write_iter+0x19a/0x2a0
 vfs_write+0x3b5/0x770
 ksys_write+0x74/0x150
 __x64_sys_write+0x22/0x30
 do_syscall_64+0x40/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Fix the problem by recording if 'rdev' is used as holder.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53791/">CVE-2023-53791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53791">CVE-2023-53791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254742">SUSE bug 1254742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53792" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53792" ref_url="https://www.suse.com/security/cve/CVE-2023-53792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-core: fix memory leak in dhchap_ctrl_secret

Free dhchap_secret in nvme_ctrl_dhchap_ctrl_secret_store() before we
return when nvme_auth_generate_key() returns error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53792/">CVE-2023-53792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53792">CVE-2023-53792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254743">SUSE bug 1254743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53795" ref_url="https://www.suse.com/security/cve/CVE-2023-53795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: IOMMUFD_DESTROY should not increase the refcount

syzkaller found a race where IOMMUFD_DESTROY increments the refcount:

       obj = iommufd_get_object(ucmd-&gt;ictx, cmd-&gt;id, IOMMUFD_OBJ_ANY);
       if (IS_ERR(obj))
               return PTR_ERR(obj);
       iommufd_ref_to_users(obj);
       /* See iommufd_ref_to_users() */
       if (!iommufd_object_destroy_user(ucmd-&gt;ictx, obj))

As part of the sequence to join the two existing primitives together.

Allowing the refcount the be elevated without holding the destroy_rwsem
violates the assumption that all temporary refcount elevations are
protected by destroy_rwsem. Racing IOMMUFD_DESTROY with
iommufd_object_destroy_user() will cause spurious failures:

  WARNING: CPU: 0 PID: 3076 at drivers/iommu/iommufd/device.c:477 iommufd_access_destroy+0x18/0x20 drivers/iommu/iommufd/device.c:478
  Modules linked in:
  CPU: 0 PID: 3076 Comm: syz-executor.0 Not tainted 6.3.0-rc1-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/03/2023
  RIP: 0010:iommufd_access_destroy+0x18/0x20 drivers/iommu/iommufd/device.c:477
  Code: e8 3d 4e 00 00 84 c0 74 01 c3 0f 0b c3 0f 1f 44 00 00 f3 0f 1e fa 48 89 fe 48 8b bf a8 00 00 00 e8 1d 4e 00 00 84 c0 74 01 c3 &lt;0f&gt; 0b c3 0f 1f 44 00 00 41 57 41 56 41 55 4c 8d ae d0 00 00 00 41
  RSP: 0018:ffffc90003067e08 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff888109ea0300 RCX: 0000000000000000
  RDX: 0000000000000001 RSI: 0000000000000000 RDI: 00000000ffffffff
  RBP: 0000000000000004 R08: 0000000000000000 R09: ffff88810bbb3500
  R10: ffff88810bbb3e48 R11: 0000000000000000 R12: ffffc90003067e88
  R13: ffffc90003067ea8 R14: ffff888101249800 R15: 00000000fffffffe
  FS:  00007ff7254fe6c0(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000555557262da8 CR3: 000000010a6fd000 CR4: 0000000000350ef0
  Call Trace:
   &lt;TASK&gt;
   iommufd_test_create_access drivers/iommu/iommufd/selftest.c:596 [inline]
   iommufd_test+0x71c/0xcf0 drivers/iommu/iommufd/selftest.c:813
   iommufd_fops_ioctl+0x10f/0x1b0 drivers/iommu/iommufd/main.c:337
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:870 [inline]
   __se_sys_ioctl fs/ioctl.c:856 [inline]
   __x64_sys_ioctl+0x84/0xc0 fs/ioctl.c:856
   do_syscall_x64 arch/x86/entry/common.c:50 [inline]
   do_syscall_64+0x38/0x80 arch/x86/entry/common.c:80
   entry_SYSCALL_64_after_hwframe+0x63/0xcd

The solution is to not increment the refcount on the IOMMUFD_DESTROY path
at all. Instead use the xa_lock to serialize everything. The refcount
check == 1 and xa_erase can be done under a single critical region. This
avoids the need for any refcount incrementing.

It has the downside that if userspace races destroy with other operations
it will get an EBUSY instead of waiting, but this is kind of racing is
already dangerous.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53795/">CVE-2023-53795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53795">CVE-2023-53795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254737">SUSE bug 1254737</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5380</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5380" ref_url="https://www.suse.com/security/cve/CVE-2023-5380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016985.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5380/">CVE-2023-5380 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5380">CVE-2023-5380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216133">SUSE bug 1216133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866669" comment="tigervnc-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866670" comment="tigervnc-icons-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866671" comment="tigervnc-license-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866672" comment="tigervnc-selinux-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866673" comment="tigervnc-server-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866674" comment="tigervnc-server-minimal-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866675" comment="tigervnc-server-module-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53803" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53803" ref_url="https://www.suse.com/security/cve/CVE-2023-53803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()

A fix for:

BUG: KASAN: slab-out-of-bounds in ses_enclosure_data_process+0x949/0xe30 [ses]
Read of size 1 at addr ffff88a1b043a451 by task systemd-udevd/3271

Checking after (and before in next loop) addl_desc_ptr[1] is sufficient, we
expect the size to be sanitized before first access to addl_desc_ptr[1].
Make sure we don't walk beyond end of page.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53803/">CVE-2023-53803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53803">CVE-2023-53803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255165">SUSE bug 1255165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53806" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53806" ref_url="https://www.suse.com/security/cve/CVE-2023-53806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: populate subvp cmd info only for the top pipe

[Why]
System restart observed while changing the display resolution
to 8k with extended mode. Sytem restart was caused by a page fault.

[How]
When the driver populates subvp info it did it for both the pipes using
vblank which caused an outof bounds array access causing the page fault.
added checks to allow the top pipe only to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53806/">CVE-2023-53806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53806">CVE-2023-53806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254979">SUSE bug 1254979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254985">SUSE bug 1254985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53809" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53809" ref_url="https://www.suse.com/security/cve/CVE-2023-53809" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

l2tp: Avoid possible recursive deadlock in l2tp_tunnel_register()

When a file descriptor of pppol2tp socket is passed as file descriptor
of UDP socket, a recursive deadlock occurs in l2tp_tunnel_register().
This situation is reproduced by the following program:

int main(void)
{
	int sock;
	struct sockaddr_pppol2tp addr;

	sock = socket(AF_PPPOX, SOCK_DGRAM, PX_PROTO_OL2TP);
	if (sock &lt; 0) {
		perror("socket");
		return 1;
	}

	addr.sa_family = AF_PPPOX;
	addr.sa_protocol = PX_PROTO_OL2TP;
	addr.pppol2tp.pid = 0;
	addr.pppol2tp.fd = sock;
	addr.pppol2tp.addr.sin_family = PF_INET;
	addr.pppol2tp.addr.sin_port = htons(0);
	addr.pppol2tp.addr.sin_addr.s_addr = inet_addr("192.168.0.1");
	addr.pppol2tp.s_tunnel = 1;
	addr.pppol2tp.s_session = 0;
	addr.pppol2tp.d_tunnel = 0;
	addr.pppol2tp.d_session = 0;

	if (connect(sock, (const struct sockaddr *)&amp;addr, sizeof(addr)) &lt; 0) {
		perror("connect");
		return 1;
	}

	return 0;
}

This program causes the following lockdep warning:

 ============================================
 WARNING: possible recursive locking detected
 6.2.0-rc5-00205-gc96618275234 #56 Not tainted
 --------------------------------------------
 repro/8607 is trying to acquire lock:
 ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: l2tp_tunnel_register+0x2b7/0x11c0

 but task is already holding lock:
 ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0xa82/0x1a30

 other info that might help us debug this:
  Possible unsafe locking scenario:

        CPU0
        ----
   lock(sk_lock-AF_PPPOX);
   lock(sk_lock-AF_PPPOX);

  *** DEADLOCK ***

  May be due to missing lock nesting notation

 1 lock held by repro/8607:
  #0: ffff8880213c8130 (sk_lock-AF_PPPOX){+.+.}-{0:0}, at: pppol2tp_connect+0xa82/0x1a30

 stack backtrace:
 CPU: 0 PID: 8607 Comm: repro Not tainted 6.2.0-rc5-00205-gc96618275234 #56
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x100/0x178
  __lock_acquire.cold+0x119/0x3b9
  ? lockdep_hardirqs_on_prepare+0x410/0x410
  lock_acquire+0x1e0/0x610
  ? l2tp_tunnel_register+0x2b7/0x11c0
  ? lock_downgrade+0x710/0x710
  ? __fget_files+0x283/0x3e0
  lock_sock_nested+0x3a/0xf0
  ? l2tp_tunnel_register+0x2b7/0x11c0
  l2tp_tunnel_register+0x2b7/0x11c0
  ? sprintf+0xc4/0x100
  ? l2tp_tunnel_del_work+0x6b0/0x6b0
  ? debug_object_deactivate+0x320/0x320
  ? lockdep_init_map_type+0x16d/0x7a0
  ? lockdep_init_map_type+0x16d/0x7a0
  ? l2tp_tunnel_create+0x2bf/0x4b0
  ? l2tp_tunnel_create+0x3c6/0x4b0
  pppol2tp_connect+0x14e1/0x1a30
  ? pppol2tp_put_sk+0xd0/0xd0
  ? aa_sk_perm+0x2b7/0xa80
  ? aa_af_perm+0x260/0x260
  ? bpf_lsm_socket_connect+0x9/0x10
  ? pppol2tp_put_sk+0xd0/0xd0
  __sys_connect_file+0x14f/0x190
  __sys_connect+0x133/0x160
  ? __sys_connect_file+0x190/0x190
  ? lockdep_hardirqs_on+0x7d/0x100
  ? ktime_get_coarse_real_ts64+0x1b7/0x200
  ? ktime_get_coarse_real_ts64+0x147/0x200
  ? __audit_syscall_entry+0x396/0x500
  __x64_sys_connect+0x72/0xb0
  do_syscall_64+0x38/0xb0
  entry_SYSCALL_64_after_hwframe+0x63/0xcd

This patch fixes the issue by getting/creating the tunnel before
locking the pppol2tp socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53809/">CVE-2023-53809 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53809">CVE-2023-53809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254722">SUSE bug 1254722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53810" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53810" ref_url="https://www.suse.com/security/cve/CVE-2023-53810" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: release crypto keyslot before reporting I/O complete

Once all I/O using a blk_crypto_key has completed, filesystems can call
blk_crypto_evict_key().  However, the block layer currently doesn't call
blk_crypto_put_keyslot() until the request is being freed, which happens
after upper layers have been told (via bio_endio()) the I/O has
completed.  This causes a race condition where blk_crypto_evict_key()
can see 'slot_refs != 0' without there being an actual bug.

This makes __blk_crypto_evict_key() hit the
'WARN_ON_ONCE(atomic_read(&amp;slot-&gt;slot_refs) != 0)' and return without
doing anything, eventually causing a use-after-free in
blk_crypto_reprogram_all_keys().  (This is a very rare bug and has only
been seen when per-file keys are being used with fscrypt.)

There are two options to fix this: either release the keyslot before
bio_endio() is called on the request's last bio, or make
__blk_crypto_evict_key() ignore slot_refs.  Let's go with the first
solution, since it preserves the ability to report bugs (via
WARN_ON_ONCE) where a key is evicted while still in-use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53810/">CVE-2023-53810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53810">CVE-2023-53810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254721">SUSE bug 1254721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53811" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53811" ref_url="https://www.suse.com/security/cve/CVE-2023-53811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Cap MSIX used to online CPUs + 1

The irdma driver can use a maximum number of msix vectors equal
to num_online_cpus() + 1 and the kernel warning stack below is shown
if that number is exceeded.

The kernel throws a warning as the driver tries to update the affinity
hint with a CPU mask greater than the max CPU IDs. Fix this by capping
the MSIX vectors to num_online_cpus() + 1.

 WARNING: CPU: 7 PID: 23655 at include/linux/cpumask.h:106 irdma_cfg_ceq_vector+0x34c/0x3f0 [irdma]
 RIP: 0010:irdma_cfg_ceq_vector+0x34c/0x3f0 [irdma]
 Call Trace:
 irdma_rt_init_hw+0xa62/0x1290 [irdma]
 ? irdma_alloc_local_mac_entry+0x1a0/0x1a0 [irdma]
 ? __is_kernel_percpu_address+0x63/0x310
 ? rcu_read_lock_held_common+0xe/0xb0
 ? irdma_lan_unregister_qset+0x280/0x280 [irdma]
 ? irdma_request_reset+0x80/0x80 [irdma]
 ? ice_get_qos_params+0x84/0x390 [ice]
 irdma_probe+0xa40/0xfc0 [irdma]
 ? rcu_read_lock_bh_held+0xd0/0xd0
 ? irdma_remove+0x140/0x140 [irdma]
 ? rcu_read_lock_sched_held+0x62/0xe0
 ? down_write+0x187/0x3d0
 ? auxiliary_match_id+0xf0/0x1a0
 ? irdma_remove+0x140/0x140 [irdma]
 auxiliary_bus_probe+0xa6/0x100
 __driver_probe_device+0x4a4/0xd50
 ? __device_attach_driver+0x2c0/0x2c0
 driver_probe_device+0x4a/0x110
 __driver_attach+0x1aa/0x350
 bus_for_each_dev+0x11d/0x1b0
 ? subsys_dev_iter_init+0xe0/0xe0
 bus_add_driver+0x3b1/0x610
 driver_register+0x18e/0x410
 ? 0xffffffffc0b88000
 irdma_init_module+0x50/0xaa [irdma]
 do_one_initcall+0x103/0x5f0
 ? perf_trace_initcall_level+0x420/0x420
 ? do_init_module+0x4e/0x700
 ? __kasan_kmalloc+0x7d/0xa0
 ? kmem_cache_alloc_trace+0x188/0x2b0
 ? kasan_unpoison+0x21/0x50
 do_init_module+0x1d1/0x700
 load_module+0x3867/0x5260
 ? layout_and_allocate+0x3990/0x3990
 ? rcu_read_lock_held_common+0xe/0xb0
 ? rcu_read_lock_sched_held+0x62/0xe0
 ? rcu_read_lock_bh_held+0xd0/0xd0
 ? __vmalloc_node_range+0x46b/0x890
 ? lock_release+0x5c8/0xba0
 ? alloc_vm_area+0x120/0x120
 ? selinux_kernel_module_from_file+0x2a5/0x300
 ? __inode_security_revalidate+0xf0/0xf0
 ? __do_sys_init_module+0x1db/0x260
 __do_sys_init_module+0x1db/0x260
 ? load_module+0x5260/0x5260
 ? do_syscall_64+0x22/0x450
 do_syscall_64+0xa5/0x450
 entry_SYSCALL_64_after_hwframe+0x66/0xdb
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53811/">CVE-2023-53811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53811">CVE-2023-53811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254716">SUSE bug 1254716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53813" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53813" ref_url="https://www.suse.com/security/cve/CVE-2023-53813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix rbtree traversal bug in ext4_mb_use_preallocated

During allocations, while looking for preallocations(PA) in the per
inode rbtree, we can't do a direct traversal of the tree because
ext4_mb_discard_group_preallocation() can paralelly mark the pa deleted
and that can cause direct traversal to skip some entries. This was
leading to a BUG_ON() being hit [1] when we missed a PA that could satisfy
our request and ultimately tried to create a new PA that would overlap
with the missed one.

To makes sure we handle that case while still keeping the performance of
the rbtree, we make use of the fact that the only pa that could possibly
overlap the original goal start is the one that satisfies the below
conditions:

  1. It must have it's logical start immediately to the left of
  (ie less than) original logical start.

  2. It must not be deleted

To find this pa we use the following traversal method:

1. Descend into the rbtree normally to find the immediate neighboring
PA. Here we keep descending irrespective of if the PA is deleted or if
it overlaps with our request etc. The goal is to find an immediately
adjacent PA.

2. If the found PA is on right of original goal, use rb_prev() to find
the left adjacent PA.

3. Check if this PA is deleted and keep moving left with rb_prev() until
a non deleted PA is found.

4. This is the PA we are looking for. Now we can check if it can satisfy
the original request and proceed accordingly.

This approach also takes care of having deleted PAs in the tree.

(While we are at it, also fix a possible overflow bug in calculating the
end of a PA)

[1] https://lore.kernel.org/linux-ext4/CA+G9fYv2FRpLqBZf34ZinR8bU2_ZRAUOjKAD3+tKRFaEQHtt8Q@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53813/">CVE-2023-53813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53813">CVE-2023-53813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254717">SUSE bug 1254717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53814" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53814" ref_url="https://www.suse.com/security/cve/CVE-2023-53814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix dropping valid root bus resources with .end = zero

On r8a7791/koelsch:

  kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
  # cat /sys/kernel/debug/kmemleak
  unreferenced object 0xc3a34e00 (size 64):
    comm "swapper/0", pid 1, jiffies 4294937460 (age 199.080s)
    hex dump (first 32 bytes):
      b4 5d 81 f0 b4 5d 81 f0 c0 b0 a2 c3 00 00 00 00  .]...]..........
      00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    backtrace:
      [&lt;fe3aa979&gt;] __kmalloc+0xf0/0x140
      [&lt;34bd6bc0&gt;] resource_list_create_entry+0x18/0x38
      [&lt;767046bc&gt;] pci_add_resource_offset+0x20/0x68
      [&lt;b3f3edf2&gt;] devm_of_pci_get_host_bridge_resources.constprop.0+0xb0/0x390

When coalescing two resources for a contiguous aperture, the second
resource is enlarged to cover the full contiguous range, while the first
resource is marked invalid.  This invalidation is done by clearing the
flags, start, and end members.

When adding the initial resources to the bus later, invalid resources are
skipped.  Unfortunately, the check for an invalid resource considers only
the end member, causing false positives.

E.g. on r8a7791/koelsch, root bus resource 0 ("bus 00") is skipped, and no
longer registered with pci_bus_insert_busn_res() (causing the memory leak),
nor printed:

   pci-rcar-gen2 ee090000.pci: host bridge /soc/pci@ee090000 ranges:
   pci-rcar-gen2 ee090000.pci:      MEM 0x00ee080000..0x00ee08ffff -&gt; 0x00ee080000
   pci-rcar-gen2 ee090000.pci: PCI: revision 11
   pci-rcar-gen2 ee090000.pci: PCI host bridge to bus 0000:00
  -pci_bus 0000:00: root bus resource [bus 00]
   pci_bus 0000:00: root bus resource [mem 0xee080000-0xee08ffff]

Fix this by only skipping resources where all of the flags, start, and end
members are zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53814/">CVE-2023-53814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53814">CVE-2023-53814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254713">SUSE bug 1254713</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53816" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53816" ref_url="https://www.suse.com/security/cve/CVE-2023-53816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: fix potential kgd_mem UAFs

kgd_mem pointers returned by kfd_process_device_translate_handle are
only guaranteed to be valid while p-&gt;mutex is held. As soon as the mutex
is unlocked, another thread can free the BO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2023-53816/">CVE-2023-53816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53816">CVE-2023-53816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254958">SUSE bug 1254958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53819" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53819" ref_url="https://www.suse.com/security/cve/CVE-2023-53819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amdgpu: validate offset_in_bo of drm_amdgpu_gem_va

This is motivated by OOB access in amdgpu_vm_update_range when
offset_in_bo+map_size overflows.

v2: keep the validations in amdgpu_vm_bo_map
v3: add the validations to amdgpu_vm_bo_map/amdgpu_vm_bo_replace_map
    rather than to amdgpu_gem_va_ioctl
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53819/">CVE-2023-53819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53819">CVE-2023-53819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254712">SUSE bug 1254712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53821" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53821" ref_url="https://www.suse.com/security/cve/CVE-2023-53821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_vti: fix slab-use-after-free in decode_session6

When ipv6_vti device is set to the qdisc of the sfb type, the cb field
of the sent skb may be modified during enqueuing. Then,
slab-use-after-free may occur when ipv6_vti device sends IPv6 packets.

The stack information is as follows:
BUG: KASAN: slab-use-after-free in decode_session6+0x103f/0x1890
Read of size 1 at addr ffff88802e08edc2 by task swapper/0/0
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.4.0-next-20230707-00001-g84e2cad7f979 #410
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33 04/01/2014
Call Trace:
&lt;IRQ&gt;
dump_stack_lvl+0xd9/0x150
print_address_description.constprop.0+0x2c/0x3c0
kasan_report+0x11d/0x130
decode_session6+0x103f/0x1890
__xfrm_decode_session+0x54/0xb0
vti6_tnl_xmit+0x3e6/0x1ee0
dev_hard_start_xmit+0x187/0x700
sch_direct_xmit+0x1a3/0xc30
__qdisc_run+0x510/0x17a0
__dev_queue_xmit+0x2215/0x3b10
neigh_connected_output+0x3c2/0x550
ip6_finish_output2+0x55a/0x1550
ip6_finish_output+0x6b9/0x1270
ip6_output+0x1f1/0x540
ndisc_send_skb+0xa63/0x1890
ndisc_send_rs+0x132/0x6f0
addrconf_rs_timer+0x3f1/0x870
call_timer_fn+0x1a0/0x580
expire_timers+0x29b/0x4b0
run_timer_softirq+0x326/0x910
__do_softirq+0x1d4/0x905
irq_exit_rcu+0xb7/0x120
sysvec_apic_timer_interrupt+0x97/0xc0
&lt;/IRQ&gt;
Allocated by task 9176:
kasan_save_stack+0x22/0x40
kasan_set_track+0x25/0x30
__kasan_slab_alloc+0x7f/0x90
kmem_cache_alloc_node+0x1cd/0x410
kmalloc_reserve+0x165/0x270
__alloc_skb+0x129/0x330
netlink_sendmsg+0x9b1/0xe30
sock_sendmsg+0xde/0x190
____sys_sendmsg+0x739/0x920
___sys_sendmsg+0x110/0x1b0
__sys_sendmsg+0xf7/0x1c0
do_syscall_64+0x39/0xb0
entry_SYSCALL_64_after_hwframe+0x63/0xcd
Freed by task 9176:
kasan_save_stack+0x22/0x40
kasan_set_track+0x25/0x30
kasan_save_free_info+0x2b/0x40
____kasan_slab_free+0x160/0x1c0
slab_free_freelist_hook+0x11b/0x220
kmem_cache_free+0xf0/0x490
skb_free_head+0x17f/0x1b0
skb_release_data+0x59c/0x850
consume_skb+0xd2/0x170
netlink_unicast+0x54f/0x7f0
netlink_sendmsg+0x926/0xe30
sock_sendmsg+0xde/0x190
____sys_sendmsg+0x739/0x920
___sys_sendmsg+0x110/0x1b0
__sys_sendmsg+0xf7/0x1c0
do_syscall_64+0x39/0xb0
entry_SYSCALL_64_after_hwframe+0x63/0xcd
The buggy address belongs to the object at ffff88802e08ed00
which belongs to the cache skbuff_small_head of size 640
The buggy address is located 194 bytes inside of
freed 640-byte region [ffff88802e08ed00, ffff88802e08ef80)

As commit f855691975bb ("xfrm6: Fix the nexthdr offset in
_decode_session6.") showed, xfrm_decode_session was originally intended
only for the receive path. IP6CB(skb)-&gt;nhoff is not set during
transmission. Therefore, set the cb field in the skb to 0 before
sending packets.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53821/">CVE-2023-53821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53821">CVE-2023-53821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254669">SUSE bug 1254669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53823" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53823" ref_url="https://www.suse.com/security/cve/CVE-2023-53823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block/rq_qos: protect rq_qos apis with a new lock

commit 50e34d78815e ("block: disable the elevator int del_gendisk")
move rq_qos_exit() from disk_release() to del_gendisk(), this will
introduce some problems:

1) If rq_qos_add() is triggered by enabling iocost/iolatency through
   cgroupfs, then it can concurrent with del_gendisk(), it's not safe to
   write 'q-&gt;rq_qos' concurrently.

2) Activate cgroup policy that is relied on rq_qos will call
   rq_qos_add() and blkcg_activate_policy(), and if rq_qos_exit() is
   called in the middle, null-ptr-dereference will be triggered in
   blkcg_activate_policy().

3) blkg_conf_open_bdev() can call blkdev_get_no_open() first to find the
   disk, then if rq_qos_exit() from del_gendisk() is done before
   rq_qos_add(), then memory will be leaked.

This patch add a new disk level mutex 'rq_qos_mutex':

1) The lock will protect rq_qos_exit() directly.

2) For wbt that doesn't relied on blk-cgroup, rq_qos_add() can only be
   called from disk initialization for now because wbt can't be
   destructed until rq_qos_exit(), so it's safe not to protect wbt for
   now. Hoever, in case that rq_qos dynamically destruction is supported
   in the furture, this patch also protect rq_qos_add() from wbt_init()
   directly, this is enough because blk-sysfs already synchronize
   writers with disk removal.

3) For iocost and iolatency, in order to synchronize disk removal and
   cgroup configuration, the lock is held after blkdev_get_no_open()
   from blkg_conf_open_bdev(), and is released in blkg_conf_exit().
   In order to fix the above memory leak, disk_live() is checked after
   holding the new lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53823/">CVE-2023-53823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53823">CVE-2023-53823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254691">SUSE bug 1254691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53832</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53832" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53832" ref_url="https://www.suse.com/security/cve/CVE-2023-53832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix null-ptr-deref in raid10_sync_request

init_resync() inits mempool and sets conf-&gt;have_replacemnt at the beginning
of sync, close_sync() frees the mempool when sync is completed.

After [1] recovery might be skipped and init_resync() is called but
close_sync() is not. null-ptr-deref occurs with r10bio-&gt;dev[i].repl_bio.

The following is one way to reproduce the issue.

  1) create a array, wait for resync to complete, mddev-&gt;recovery_cp is set
     to MaxSector.
  2) recovery is woken and it is skipped. conf-&gt;have_replacement is set to
     0 in init_resync(). close_sync() not called.
  3) some io errors and rdev A is set to WantReplacement.
  4) a new device is added and set to A's replacement.
  5) recovery is woken, A have replacement, but conf-&gt;have_replacemnt is
     0. r10bio-&gt;dev[i].repl_bio will not be alloced and null-ptr-deref
     occurs.

Fix it by not calling init_resync() if recovery skipped.

[1] commit 7e83ccbecd60 ("md/raid10: Allow skipping recovery when clean arrays are assembled")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53832/">CVE-2023-53832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53832">CVE-2023-53832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254671">SUSE bug 1254671</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53833</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53833" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53833" ref_url="https://www.suse.com/security/cve/CVE-2023-53833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix NULL ptr deref by checking new_crtc_state

intel_atomic_get_new_crtc_state can return NULL, unless crtc state wasn't
obtained previously with intel_atomic_get_crtc_state, so we must check it
for NULLness here, just as in many other places, where we can't guarantee
that intel_atomic_get_crtc_state was called.
We are currently getting NULL ptr deref because of that, so this fix was
confirmed to help.

(cherry picked from commit 1d5b09f8daf859247a1ea65b0d732a24d88980d8)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53833/">CVE-2023-53833 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53833">CVE-2023-53833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254681">SUSE bug 1254681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53842</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53842" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53842" ref_url="https://www.suse.com/security/cve/CVE-2023-53842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove

The MBHC resources must be released on component probe failure and
removal so can not be tied to the lifetime of the component device.

This is specifically needed to allow probe deferrals of the sound card
which otherwise fails when reprobing the codec component:

    snd-sc8280xp sound: ASoC: failed to instantiate card -517
    genirq: Flags mismatch irq 299. 00002001 (mbhc sw intr) vs. 00002001 (mbhc sw intr)
    wcd938x_codec audio-codec: Failed to request mbhc interrupts -16
    wcd938x_codec audio-codec: mbhc initialization failed
    wcd938x_codec audio-codec: ASoC: error at snd_soc_component_probe on audio-codec: -16
    snd-sc8280xp sound: ASoC: failed to instantiate card -16
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53842/">CVE-2023-53842 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53842">CVE-2023-53842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254690">SUSE bug 1254690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53843" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53843" ref_url="https://www.suse.com/security/cve/CVE-2023-53843" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: reject negative ifindex

Recent changes in net-next (commit 759ab1edb56c ("net: store netdevs
in an xarray")) refactored the handling of pre-assigned ifindexes
and let syzbot surface a latent problem in ovs. ovs does not validate
ifindex, making it possible to create netdev ports with negative
ifindex values. It's easy to repro with YNL:

$ ./cli.py --spec netlink/specs/ovs_datapath.yaml \
         --do new \
	 --json '{"upcall-pid": 1, "name":"my-dp"}'
$ ./cli.py --spec netlink/specs/ovs_vport.yaml \
	 --do new \
	 --json '{"upcall-pid": "00000001", "name": "some-port0", "dp-ifindex":3,"ifindex":4294901760,"type":2}'

$ ip link show
-65536: some-port0: &lt;BROADCAST,MULTICAST&gt; mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000
    link/ether 7a:48:21:ad:0b:fb brd ff:ff:ff:ff:ff:ff
...

Validate the inputs. Now the second command correctly returns:

$ ./cli.py --spec netlink/specs/ovs_vport.yaml \
	 --do new \
	 --json '{"upcall-pid": "00000001", "name": "some-port0", "dp-ifindex":3,"ifindex":4294901760,"type":2}'

lib.ynl.NlError: Netlink error: Numerical result out of range
nl_len = 108 (92) nl_flags = 0x300 nl_type = 2
	error: -34	extack: {'msg': 'integer out of range', 'unknown': [[type:4 len:36] b'\x0c\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0c\x00\x03\x00\xff\xff\xff\x7f\x00\x00\x00\x00\x08\x00\x01\x00\x08\x00\x00\x00'], 'bad-attr': '.ifindex'}

Accept 0 since it used to be silently ignored.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53843/">CVE-2023-53843 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53843">CVE-2023-53843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254705">SUSE bug 1254705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53844" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53844" ref_url="https://www.suse.com/security/cve/CVE-2023-53844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Don't leak a resource on swapout move error

If moving the bo to system for swapout failed, we were leaking
a resource. Fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53844/">CVE-2023-53844 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53844">CVE-2023-53844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254649">SUSE bug 1254649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53847</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53847" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53847" ref_url="https://www.suse.com/security/cve/CVE-2023-53847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb-storage: alauda: Fix uninit-value in alauda_check_media()

Syzbot got KMSAN to complain about access to an uninitialized value in
the alauda subdriver of usb-storage:

BUG: KMSAN: uninit-value in alauda_transport+0x462/0x57f0
drivers/usb/storage/alauda.c:1137
CPU: 0 PID: 12279 Comm: usb-storage Not tainted 5.3.0-rc7+ #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 01/01/2011
Call Trace:
  __dump_stack lib/dump_stack.c:77 [inline]
  dump_stack+0x191/0x1f0 lib/dump_stack.c:113
  kmsan_report+0x13a/0x2b0 mm/kmsan/kmsan_report.c:108
  __msan_warning+0x73/0xe0 mm/kmsan/kmsan_instr.c:250
  alauda_check_media+0x344/0x3310 drivers/usb/storage/alauda.c:460

The problem is that alauda_check_media() doesn't verify that its USB
transfer succeeded before trying to use the received data.  What
should happen if the transfer fails isn't entirely clear, but a
reasonably conservative approach is to pretend that no media is
present.

A similar problem exists in a usb_stor_dbg() call in
alauda_get_media_status().  In this case, when an error occurs the
call is redundant, because usb_stor_ctrl_transfer() already will print
a debugging message.

Finally, unrelated to the uninitialized memory access, is the fact
that alauda_check_media() performs DMA to a buffer on the stack.
Fortunately usb-storage provides a general purpose DMA-able buffer for
uses like this.  We'll use it instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53847/">CVE-2023-53847 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53847">CVE-2023-53847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254698">SUSE bug 1254698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53848" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53848" ref_url="https://www.suse.com/security/cve/CVE-2023-53848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5-cache: fix a deadlock in r5l_exit_log()

Commit b13015af94cf ("md/raid5-cache: Clear conf-&gt;log after finishing
work") introduce a new problem:

// caller hold reconfig_mutex
r5l_exit_log
 flush_work(&amp;log-&gt;disable_writeback_work)
			r5c_disable_writeback_async
			 wait_event
			  /*
			   * conf-&gt;log is not NULL, and mddev_trylock()
			   * will fail, wait_event() can never pass.
			   */
 conf-&gt;log = NULL

Fix this problem by setting 'config-&gt;log' to NULL before wake_up() as it
used to be, so that wait_event() from r5c_disable_writeback_async() can
exist. In the meantime, move forward md_unregister_thread() so that
null-ptr-deref this commit fixed can still be fixed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53848/">CVE-2023-53848 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53848">CVE-2023-53848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254753">SUSE bug 1254753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53852" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53852" ref_url="https://www.suse.com/security/cve/CVE-2023-53852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-core: fix memory leak in dhchap_secret_store

Free dhchap_secret in nvme_ctrl_dhchap_secret_store() before we return
fix following kmemleack:-

unreferenced object 0xffff8886376ea800 (size 64):
  comm "check", pid 22048, jiffies 4344316705 (age 92.199s)
  hex dump (first 32 bytes):
    44 48 48 43 2d 31 3a 30 30 3a 6e 78 72 35 4b 67  DHHC-1:00:nxr5Kg
    75 58 34 75 6f 41 78 73 4a 61 34 63 2f 68 75 4c  uX4uoAxsJa4c/huL
  backtrace:
    [&lt;0000000030ce5d4b&gt;] __kmalloc+0x4b/0x130
    [&lt;000000009be1cdc1&gt;] nvme_ctrl_dhchap_secret_store+0x8f/0x160 [nvme_core]
    [&lt;00000000ac06c96a&gt;] kernfs_fop_write_iter+0x12b/0x1c0
    [&lt;00000000437e7ced&gt;] vfs_write+0x2ba/0x3c0
    [&lt;00000000f9491baf&gt;] ksys_write+0x5f/0xe0
    [&lt;000000001c46513d&gt;] do_syscall_64+0x3b/0x90
    [&lt;00000000ecf348fe&gt;] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff8886376eaf00 (size 64):
  comm "check", pid 22048, jiffies 4344316736 (age 92.168s)
  hex dump (first 32 bytes):
    44 48 48 43 2d 31 3a 30 30 3a 6e 78 72 35 4b 67  DHHC-1:00:nxr5Kg
    75 58 34 75 6f 41 78 73 4a 61 34 63 2f 68 75 4c  uX4uoAxsJa4c/huL
  backtrace:
    [&lt;0000000030ce5d4b&gt;] __kmalloc+0x4b/0x130
    [&lt;000000009be1cdc1&gt;] nvme_ctrl_dhchap_secret_store+0x8f/0x160 [nvme_core]
    [&lt;00000000ac06c96a&gt;] kernfs_fop_write_iter+0x12b/0x1c0
    [&lt;00000000437e7ced&gt;] vfs_write+0x2ba/0x3c0
    [&lt;00000000f9491baf&gt;] ksys_write+0x5f/0xe0
    [&lt;000000001c46513d&gt;] do_syscall_64+0x3b/0x90
    [&lt;00000000ecf348fe&gt;] entry_SYSCALL_64_after_hwframe+0x72/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53852/">CVE-2023-53852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53852">CVE-2023-53852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254653">SUSE bug 1254653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53857" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53857" ref_url="https://www.suse.com/security/cve/CVE-2023-53857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: bpf_sk_storage: Fix invalid wait context lockdep report

'./test_progs -t test_local_storage' reported a splat:

[   27.137569] =============================
[   27.138122] [ BUG: Invalid wait context ]
[   27.138650] 6.5.0-03980-gd11ae1b16b0a #247 Tainted: G           O
[   27.139542] -----------------------------
[   27.140106] test_progs/1729 is trying to lock:
[   27.140713] ffff8883ef047b88 (stock_lock){-.-.}-{3:3}, at: local_lock_acquire+0x9/0x130
[   27.141834] other info that might help us debug this:
[   27.142437] context-{5:5}
[   27.142856] 2 locks held by test_progs/1729:
[   27.143352]  #0: ffffffff84bcd9c0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x4/0x40
[   27.144492]  #1: ffff888107deb2c0 (&amp;storage-&gt;lock){..-.}-{2:2}, at: bpf_local_storage_update+0x39e/0x8e0
[   27.145855] stack backtrace:
[   27.146274] CPU: 0 PID: 1729 Comm: test_progs Tainted: G           O       6.5.0-03980-gd11ae1b16b0a #247
[   27.147550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
[   27.149127] Call Trace:
[   27.149490]  &lt;TASK&gt;
[   27.149867]  dump_stack_lvl+0x130/0x1d0
[   27.152609]  dump_stack+0x14/0x20
[   27.153131]  __lock_acquire+0x1657/0x2220
[   27.153677]  lock_acquire+0x1b8/0x510
[   27.157908]  local_lock_acquire+0x29/0x130
[   27.159048]  obj_cgroup_charge+0xf4/0x3c0
[   27.160794]  slab_pre_alloc_hook+0x28e/0x2b0
[   27.161931]  __kmem_cache_alloc_node+0x51/0x210
[   27.163557]  __kmalloc+0xaa/0x210
[   27.164593]  bpf_map_kzalloc+0xbc/0x170
[   27.165147]  bpf_selem_alloc+0x130/0x510
[   27.166295]  bpf_local_storage_update+0x5aa/0x8e0
[   27.167042]  bpf_fd_sk_storage_update_elem+0xdb/0x1a0
[   27.169199]  bpf_map_update_value+0x415/0x4f0
[   27.169871]  map_update_elem+0x413/0x550
[   27.170330]  __sys_bpf+0x5e9/0x640
[   27.174065]  __x64_sys_bpf+0x80/0x90
[   27.174568]  do_syscall_64+0x48/0xa0
[   27.175201]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[   27.175932] RIP: 0033:0x7effb40e41ad
[   27.176357] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d8
[   27.179028] RSP: 002b:00007ffe64c21fc8 EFLAGS: 00000202 ORIG_RAX: 0000000000000141
[   27.180088] RAX: ffffffffffffffda RBX: 00007ffe64c22768 RCX: 00007effb40e41ad
[   27.181082] RDX: 0000000000000020 RSI: 00007ffe64c22008 RDI: 0000000000000002
[   27.182030] RBP: 00007ffe64c21ff0 R08: 0000000000000000 R09: 00007ffe64c22788
[   27.183038] R10: 0000000000000064 R11: 0000000000000202 R12: 0000000000000000
[   27.184006] R13: 00007ffe64c22788 R14: 00007effb42a1000 R15: 0000000000000000
[   27.184958]  &lt;/TASK&gt;

It complains about acquiring a local_lock while holding a raw_spin_lock.
It means it should not allocate memory while holding a raw_spin_lock
since it is not safe for RT.

raw_spin_lock is needed because bpf_local_storage supports tracing
context. In particular for task local storage, it is easy to
get a "current" task PTR_TO_BTF_ID in tracing bpf prog.
However, task (and cgroup) local storage has already been moved to
bpf mem allocator which can be used after raw_spin_lock.

The splat is for the sk storage. For sk (and inode) storage,
it has not been moved to bpf mem allocator. Using raw_spin_lock or not,
kzalloc(GFP_ATOMIC) could theoretically be unsafe in tracing context.
However, the local storage helper requires a verifier accepted
sk pointer (PTR_TO_BTF_ID), it is hypothetical if that (mean running
a bpf prog in a kzalloc unsafe context and also able to hold a verifier
accepted sk pointer) could happen.

This patch avoids kzalloc after raw_spin_lock to silent the splat.
There is an existing kzalloc before the raw_spin_lock. At that point,
a kzalloc is very likely required because a lookup has just been done
before. Thus, this patch always does the kzalloc before acq
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53857/">CVE-2023-53857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53857">CVE-2023-53857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254648">SUSE bug 1254648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53859</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53859" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53859" ref_url="https://www.suse.com/security/cve/CVE-2023-53859" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/idle: mark arch_cpu_idle() noinstr

linux-next commit ("cpuidle: tracing: Warn about !rcu_is_watching()")
adds a new warning which hits on s390's arch_cpu_idle() function:

RCU not on for: arch_cpu_idle+0x0/0x28
WARNING: CPU: 2 PID: 0 at include/linux/trace_recursion.h:162 arch_ftrace_ops_list_func+0x24c/0x258
Modules linked in:
CPU: 2 PID: 0 Comm: swapper/2 Not tainted 6.2.0-rc6-next-20230202 #4
Hardware name: IBM 8561 T01 703 (z/VM 7.3.0)
Krnl PSW : 0404d00180000000 00000000002b55c0 (arch_ftrace_ops_list_func+0x250/0x258)
           R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3
Krnl GPRS: c0000000ffffbfff 0000000080000002 0000000000000026 0000000000000000
           0000037ffffe3a28 0000037ffffe3a20 0000000000000000 0000000000000000
           0000000000000000 0000000000f4acf6 00000000001044f0 0000037ffffe3cb0
           0000000000000000 0000000000000000 00000000002b55bc 0000037ffffe3bb8
Krnl Code: 00000000002b55b0: c02000840051        larl    %r2,0000000001335652
           00000000002b55b6: c0e5fff512d1        brasl   %r14,0000000000157b58
          #00000000002b55bc: af000000            mc      0,0
          &gt;00000000002b55c0: a7f4ffe7            brc     15,00000000002b558e
           00000000002b55c4: 0707                bcr     0,%r7
           00000000002b55c6: 0707                bcr     0,%r7
           00000000002b55c8: eb6ff0480024        stmg    %r6,%r15,72(%r15)
           00000000002b55ce: b90400ef            lgr     %r14,%r15
Call Trace:
 [&lt;00000000002b55c0&gt;] arch_ftrace_ops_list_func+0x250/0x258
([&lt;00000000002b55bc&gt;] arch_ftrace_ops_list_func+0x24c/0x258)
 [&lt;0000000000f5f0fc&gt;] ftrace_common+0x1c/0x20
 [&lt;00000000001044f6&gt;] arch_cpu_idle+0x6/0x28
 [&lt;0000000000f4acf6&gt;] default_idle_call+0x76/0x128
 [&lt;00000000001cc374&gt;] do_idle+0xf4/0x1b0
 [&lt;00000000001cc6ce&gt;] cpu_startup_entry+0x36/0x40
 [&lt;0000000000119d00&gt;] smp_start_secondary+0x140/0x150
 [&lt;0000000000f5d2ae&gt;] restart_int_handler+0x6e/0x90

Mark arch_cpu_idle() noinstr like all other architectures with
CONFIG_ARCH_WANTS_NO_INSTR (should) have it to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53859/">CVE-2023-53859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53859">CVE-2023-53859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255168">SUSE bug 1255168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53860</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53860" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53860" ref_url="https://www.suse.com/security/cve/CVE-2023-53860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: don't attempt to queue IO under RCU protection

dm looks up the table for IO based on the request type, with an
assumption that if the request is marked REQ_NOWAIT, it's fine to
attempt to submit that IO while under RCU read lock protection. This
is not OK, as REQ_NOWAIT just means that we should not be sleeping
waiting on other IO, it does not mean that we can't potentially
schedule.

A simple test case demonstrates this quite nicely:

int main(int argc, char *argv[])
{
        struct iovec iov;
        int fd;

        fd = open("/dev/dm-0", O_RDONLY | O_DIRECT);
        posix_memalign(&amp;iov.iov_base, 4096, 4096);
        iov.iov_len = 4096;
        preadv2(fd, &amp;iov, 1, 0, RWF_NOWAIT);
        return 0;
}

which will instantly spew:

BUG: sleeping function called from invalid context at include/linux/sched/mm.h:306
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5580, name: dm-nowait
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
INFO: lockdep is turned off.
CPU: 7 PID: 5580 Comm: dm-nowait Not tainted 6.6.0-rc1-g39956d2dcd81 #132
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x11d/0x1b0
 __might_resched+0x3c3/0x5e0
 ? preempt_count_sub+0x150/0x150
 mempool_alloc+0x1e2/0x390
 ? mempool_resize+0x7d0/0x7d0
 ? lock_sync+0x190/0x190
 ? lock_release+0x4b7/0x670
 ? internal_get_user_pages_fast+0x868/0x2d40
 bio_alloc_bioset+0x417/0x8c0
 ? bvec_alloc+0x200/0x200
 ? internal_get_user_pages_fast+0xb8c/0x2d40
 bio_alloc_clone+0x53/0x100
 dm_submit_bio+0x27f/0x1a20
 ? lock_release+0x4b7/0x670
 ? blk_try_enter_queue+0x1a0/0x4d0
 ? dm_dax_direct_access+0x260/0x260
 ? rcu_is_watching+0x12/0xb0
 ? blk_try_enter_queue+0x1cc/0x4d0
 __submit_bio+0x239/0x310
 ? __bio_queue_enter+0x700/0x700
 ? kvm_clock_get_cycles+0x40/0x60
 ? ktime_get+0x285/0x470
 submit_bio_noacct_nocheck+0x4d9/0xb80
 ? should_fail_request+0x80/0x80
 ? preempt_count_sub+0x150/0x150
 ? lock_release+0x4b7/0x670
 ? __bio_add_page+0x143/0x2d0
 ? iov_iter_revert+0x27/0x360
 submit_bio_noacct+0x53e/0x1b30
 submit_bio_wait+0x10a/0x230
 ? submit_bio_wait_endio+0x40/0x40
 __blkdev_direct_IO_simple+0x4f8/0x780
 ? blkdev_bio_end_io+0x4c0/0x4c0
 ? stack_trace_save+0x90/0xc0
 ? __bio_clone+0x3c0/0x3c0
 ? lock_release+0x4b7/0x670
 ? lock_sync+0x190/0x190
 ? atime_needs_update+0x3bf/0x7e0
 ? timestamp_truncate+0x21b/0x2d0
 ? inode_owner_or_capable+0x240/0x240
 blkdev_direct_IO.part.0+0x84a/0x1810
 ? rcu_is_watching+0x12/0xb0
 ? lock_release+0x4b7/0x670
 ? blkdev_read_iter+0x40d/0x530
 ? reacquire_held_locks+0x4e0/0x4e0
 ? __blkdev_direct_IO_simple+0x780/0x780
 ? rcu_is_watching+0x12/0xb0
 ? __mark_inode_dirty+0x297/0xd50
 ? preempt_count_add+0x72/0x140
 blkdev_read_iter+0x2a4/0x530
 do_iter_readv_writev+0x2f2/0x3c0
 ? generic_copy_file_range+0x1d0/0x1d0
 ? fsnotify_perm.part.0+0x25d/0x630
 ? security_file_permission+0xd8/0x100
 do_iter_read+0x31b/0x880
 ? import_iovec+0x10b/0x140
 vfs_readv+0x12d/0x1a0
 ? vfs_iter_read+0xb0/0xb0
 ? rcu_is_watching+0x12/0xb0
 ? rcu_is_watching+0x12/0xb0
 ? lock_release+0x4b7/0x670
 do_preadv+0x1b3/0x260
 ? do_readv+0x370/0x370
 __x64_sys_preadv2+0xef/0x150
 do_syscall_64+0x39/0xb0
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f5af41ad806
Code: 41 54 41 89 fc 55 44 89 c5 53 48 89 cb 48 83 ec 18 80 3d e4 dd 0d 00 00 74 7a 45 89 c1 49 89 ca 45 31 c0 b8 47 01 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 0f 87 be 00 00 00 48 85 c0 79 4a 48 8b 0d da 55
RSP: 002b:00007ffd3145c7f0 EFLAGS: 00000246 ORIG_RAX: 0000000000000147
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5af41ad806
RDX: 0000000000000001 RSI: 00007ffd3145c850 RDI: 0000000000000003
RBP: 0000000000000008 R08: 0000000000000000 R09: 0000000000000008
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003
R13: 00007ffd3145c850 R14: 000055f5f0431dd8 R15: 0000000000000001
 &lt;/TASK&gt;

where in fact it is
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53860/">CVE-2023-53860 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53860">CVE-2023-53860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254626">SUSE bug 1254626</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53863" ref_url="https://www.suse.com/security/cve/CVE-2023-53863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: do not hard code device address lenth in fdb dumps

syzbot reports that some netdev devices do not have a six bytes
address [1]

Replace ETH_ALEN by dev-&gt;addr_len.

[1] (Case of a device where dev-&gt;addr_len = 4)

BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak in copyout+0xb8/0x100 lib/iov_iter.c:169
instrument_copy_to_user include/linux/instrumented.h:114 [inline]
copyout+0xb8/0x100 lib/iov_iter.c:169
_copy_to_iter+0x6d8/0x1d00 lib/iov_iter.c:536
copy_to_iter include/linux/uio.h:206 [inline]
simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:513
__skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:419
skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:527
skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]
netlink_recvmsg+0x4ae/0x15a0 net/netlink/af_netlink.c:1970
sock_recvmsg_nosec net/socket.c:1019 [inline]
sock_recvmsg net/socket.c:1040 [inline]
____sys_recvmsg+0x283/0x7f0 net/socket.c:2722
___sys_recvmsg+0x223/0x840 net/socket.c:2764
do_recvmmsg+0x4f9/0xfd0 net/socket.c:2858
__sys_recvmmsg net/socket.c:2937 [inline]
__do_sys_recvmmsg net/socket.c:2960 [inline]
__se_sys_recvmmsg net/socket.c:2953 [inline]
__x64_sys_recvmmsg+0x397/0x490 net/socket.c:2953
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was stored to memory at:
__nla_put lib/nlattr.c:1009 [inline]
nla_put+0x1c6/0x230 lib/nlattr.c:1067
nlmsg_populate_fdb_fill+0x2b8/0x600 net/core/rtnetlink.c:4071
nlmsg_populate_fdb net/core/rtnetlink.c:4418 [inline]
ndo_dflt_fdb_dump+0x616/0x840 net/core/rtnetlink.c:4456
rtnl_fdb_dump+0x14ff/0x1fc0 net/core/rtnetlink.c:4629
netlink_dump+0x9d1/0x1310 net/netlink/af_netlink.c:2268
netlink_recvmsg+0xc5c/0x15a0 net/netlink/af_netlink.c:1995
sock_recvmsg_nosec+0x7a/0x120 net/socket.c:1019
____sys_recvmsg+0x664/0x7f0 net/socket.c:2720
___sys_recvmsg+0x223/0x840 net/socket.c:2764
do_recvmmsg+0x4f9/0xfd0 net/socket.c:2858
__sys_recvmmsg net/socket.c:2937 [inline]
__do_sys_recvmmsg net/socket.c:2960 [inline]
__se_sys_recvmmsg net/socket.c:2953 [inline]
__x64_sys_recvmmsg+0x397/0x490 net/socket.c:2953
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
slab_post_alloc_hook+0x12d/0xb60 mm/slab.h:716
slab_alloc_node mm/slub.c:3451 [inline]
__kmem_cache_alloc_node+0x4ff/0x8b0 mm/slub.c:3490
kmalloc_trace+0x51/0x200 mm/slab_common.c:1057
kmalloc include/linux/slab.h:559 [inline]
__hw_addr_create net/core/dev_addr_lists.c:60 [inline]
__hw_addr_add_ex+0x2e5/0x9e0 net/core/dev_addr_lists.c:118
__dev_mc_add net/core/dev_addr_lists.c:867 [inline]
dev_mc_add+0x9a/0x130 net/core/dev_addr_lists.c:885
igmp6_group_added+0x267/0xbc0 net/ipv6/mcast.c:680
ipv6_mc_up+0x296/0x3b0 net/ipv6/mcast.c:2754
ipv6_mc_remap+0x1e/0x30 net/ipv6/mcast.c:2708
addrconf_type_change net/ipv6/addrconf.c:3731 [inline]
addrconf_notify+0x4d3/0x1d90 net/ipv6/addrconf.c:3699
notifier_call_chain kernel/notifier.c:93 [inline]
raw_notifier_call_chain+0xe4/0x430 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1935 [inline]
call_netdevice_notifiers_extack net/core/dev.c:1973 [inline]
call_netdevice_notifiers+0x1ee/0x2d0 net/core/dev.c:1987
bond_enslave+0xccd/0x53f0 drivers/net/bonding/bond_main.c:1906
do_set_master net/core/rtnetlink.c:2626 [inline]
rtnl_newlink_create net/core/rtnetlink.c:3460 [inline]
__rtnl_newlink net/core/rtnetlink.c:3660 [inline]
rtnl_newlink+0x378c/0x40e0 net/core/rtnetlink.c:3673
rtnetlink_rcv_msg+0x16a6/0x1840 net/core/rtnetlink.c:6395
netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2546
rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6413
netlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]
netlink_unicast+0xf28/0x1230 net/netlink/af_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53863/">CVE-2023-53863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53863">CVE-2023-53863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254657">SUSE bug 1254657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53866" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53866" ref_url="https://www.suse.com/security/cve/CVE-2023-53866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-compress: Reposition and add pcm_mutex

If panic_on_warn is set and compress stream(DPCM) is started,
then kernel panic occurred because card-&gt;pcm_mutex isn't held appropriately.
In the following functions, warning were issued at this line
"snd_soc_dpcm_mutex_assert_held".

static int dpcm_be_connect(struct snd_soc_pcm_runtime *fe,
		struct snd_soc_pcm_runtime *be, int stream)
{
	...
	snd_soc_dpcm_mutex_assert_held(fe);
	...
}

void dpcm_be_disconnect(struct snd_soc_pcm_runtime *fe, int stream)
{
	...
	snd_soc_dpcm_mutex_assert_held(fe);
	...
}

void snd_soc_runtime_action(struct snd_soc_pcm_runtime *rtd,
			    int stream, int action)
{
	...
	snd_soc_dpcm_mutex_assert_held(rtd);
	...
}

int dpcm_dapm_stream_event(struct snd_soc_pcm_runtime *fe, int dir,
	int event)
{
	...
	snd_soc_dpcm_mutex_assert_held(fe);
	...
}

These functions are called by soc_compr_set_params_fe, soc_compr_open_fe
and soc_compr_free_fe
without pcm_mutex locking. And this is call stack.

[  414.527841][ T2179] pc : dpcm_process_paths+0x5a4/0x750
[  414.527848][ T2179] lr : dpcm_process_paths+0x37c/0x750
[  414.527945][ T2179] Call trace:
[  414.527949][ T2179]  dpcm_process_paths+0x5a4/0x750
[  414.527955][ T2179]  soc_compr_open_fe+0xb0/0x2cc
[  414.527972][ T2179]  snd_compr_open+0x180/0x248
[  414.527981][ T2179]  snd_open+0x15c/0x194
[  414.528003][ T2179]  chrdev_open+0x1b0/0x220
[  414.528023][ T2179]  do_dentry_open+0x30c/0x594
[  414.528045][ T2179]  vfs_open+0x34/0x44
[  414.528053][ T2179]  path_openat+0x914/0xb08
[  414.528062][ T2179]  do_filp_open+0xc0/0x170
[  414.528068][ T2179]  do_sys_openat2+0x94/0x18c
[  414.528076][ T2179]  __arm64_sys_openat+0x78/0xa4
[  414.528084][ T2179]  invoke_syscall+0x48/0x10c
[  414.528094][ T2179]  el0_svc_common+0xbc/0x104
[  414.528099][ T2179]  do_el0_svc+0x34/0xd8
[  414.528103][ T2179]  el0_svc+0x34/0xc4
[  414.528125][ T2179]  el0t_64_sync_handler+0x8c/0xfc
[  414.528133][ T2179]  el0t_64_sync+0x1a0/0x1a4
[  414.528142][ T2179] Kernel panic - not syncing: panic_on_warn set ...

So, I reposition and add pcm_mutex to resolve lockdep error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53866/">CVE-2023-53866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53866">CVE-2023-53866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255060">SUSE bug 1255060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53867" ref_url="https://www.suse.com/security/cve/CVE-2023-53867" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix potential use-after-free bug when trimming caps

When trimming the caps and just after the 'session-&gt;s_cap_lock' is
released in ceph_iterate_session_caps() the cap maybe removed by
another thread, and when using the stale cap memory in the callbacks
it will trigger use-after-free crash.

We need to check the existence of the cap just after the 'ci-&gt;i_ceph_lock'
being acquired. And do nothing if it's already removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53867/">CVE-2023-53867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53867">CVE-2023-53867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256055">SUSE bug 1256055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5388</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5388" ref_url="https://www.suse.com/security/cve/CVE-2023-5388" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2024:2564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:2684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021346.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5388/">CVE-2023-5388 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5388">CVE-2023-5388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216198">SUSE bug 1216198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844491" comment="nspr-4.35.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844492" comment="nspr-devel-4.35.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844493" comment="nss-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844494" comment="nss-devel-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844495" comment="nss-softokn-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844496" comment="nss-softokn-devel-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844497" comment="nss-softokn-freebl-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844498" comment="nss-softokn-freebl-devel-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844499" comment="nss-sysinit-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844500" comment="nss-tools-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844501" comment="nss-util-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844502" comment="nss-util-devel-3.90.0-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53989" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53989" ref_url="https://www.suse.com/security/cve/CVE-2023-53989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: mm: fix VA-range sanity check

Both create_mapping_noalloc() and update_mapping_prot() sanity-check
their 'virt' parameter, but the check itself doesn't make much sense.
The condition used today appears to be a historical accident.

The sanity-check condition:

	if ((virt &gt;= PAGE_END) &amp;&amp; (virt &lt; VMALLOC_START)) {
		[ ... warning here ... ]
		return;
	}

... can only be true for the KASAN shadow region or the module region,
and there's no reason to exclude these specifically for creating and
updateing mappings.

When arm64 support was first upstreamed in commit:

  c1cc1552616d0f35 ("arm64: MMU initialisation")

... the condition was:

	if (virt &lt; VMALLOC_START) {
		[ ... warning here ... ]
		return;
	}

At the time, VMALLOC_START was the lowest kernel address, and this was
checking whether 'virt' would be translated via TTBR1.

Subsequently in commit:

  14c127c957c1c607 ("arm64: mm: Flip kernel VA space")

... the condition was changed to:

	if ((virt &gt;= VA_START) &amp;&amp; (virt &lt; VMALLOC_START)) {
		[ ... warning here ... ]
		return;
	}

This appear to have been a thinko. The commit moved the linear map to
the bottom of the kernel address space, with VMALLOC_START being at the
halfway point. The old condition would warn for changes to the linear
map below this, and at the time VA_START was the end of the linear map.

Subsequently we cleaned up the naming of VA_START in commit:

  77ad4ce69321abbe ("arm64: memory: rename VA_START to PAGE_END")

... keeping the erroneous condition as:

	if ((virt &gt;= PAGE_END) &amp;&amp; (virt &lt; VMALLOC_START)) {
		[ ... warning here ... ]
		return;
	}

Correct the condition to check against the start of the TTBR1 address
space, which is currently PAGE_OFFSET. This simplifies the logic, and
more clearly matches the "outside kernel range" message in the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53989/">CVE-2023-53989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53989">CVE-2023-53989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256302">SUSE bug 1256302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53990</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53990" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53990" ref_url="https://www.suse.com/security/cve/CVE-2023-53990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SMB3: Add missing locks to protect deferred close file list

cifs_del_deferred_close function has a critical section which modifies
the deferred close file list. We must acquire deferred_lock before
calling cifs_del_deferred_close function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53990/">CVE-2023-53990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53990">CVE-2023-53990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255560">SUSE bug 1255560</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53992" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53992" ref_url="https://www.suse.com/security/cve/CVE-2023-53992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: ocb: don't leave if not joined

If there's no OCB state, don't ask the driver/mac80211 to
leave, since that's just confusing. Since set/clear the
chandef state, that's a simple check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53992/">CVE-2023-53992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53992">CVE-2023-53992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256058">SUSE bug 1256058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53993" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53993" ref_url="https://www.suse.com/security/cve/CVE-2023-53993" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y

After a pci_doe_task completes, its work_struct needs to be destroyed
to avoid a memory leak with CONFIG_DEBUG_OBJECTS=y.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53993/">CVE-2023-53993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53993">CVE-2023-53993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255606">SUSE bug 1255606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53995</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53995" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53995" ref_url="https://www.suse.com/security/cve/CVE-2023-53995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv4: fix one memleak in __inet_del_ifa()

I got the below warning when do fuzzing test:
unregister_netdevice: waiting for bond0 to become free. Usage count = 2

It can be repoduced via:

ip link add bond0 type bond
sysctl -w net.ipv4.conf.bond0.promote_secondaries=1
ip addr add 4.117.174.103/0 scope 0x40 dev bond0
ip addr add 192.168.100.111/255.255.255.254 scope 0 dev bond0
ip addr add 0.0.0.4/0 scope 0x40 secondary dev bond0
ip addr del 4.117.174.103/0 scope 0x40 dev bond0
ip link delete bond0 type bond

In this reproduction test case, an incorrect 'last_prim' is found in
__inet_del_ifa(), as a result, the secondary address(0.0.0.4/0 scope 0x40)
is lost. The memory of the secondary address is leaked and the reference of
in_device and net_device is leaked.

Fix this problem:
Look for 'last_prim' starting at location of the deleted IP and inserting
the promoted IP into the location of 'last_prim'.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53995/">CVE-2023-53995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53995">CVE-2023-53995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255616">SUSE bug 1255616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53996</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53996" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53996" ref_url="https://www.suse.com/security/cve/CVE-2023-53996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sev: Make enc_dec_hypercall() accept a size instead of npages

enc_dec_hypercall() accepted a page count instead of a size, which
forced its callers to round up. As a result, non-page aligned
vaddrs caused pages to be spuriously marked as decrypted via the
encryption status hypercall, which in turn caused consistent
corruption of pages during live migration. Live migration requires
accurate encryption status information to avoid migrating pages
from the wrong perspective.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-53996/">CVE-2023-53996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53996">CVE-2023-53996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255618">SUSE bug 1255618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009816058" comment="bpftool-7.2.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816059" comment="kernel-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816060" comment="kernel-abi-stablelists-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816061" comment="kernel-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816062" comment="kernel-cross-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816063" comment="kernel-debug-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816064" comment="kernel-debug-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816067" comment="kernel-debug-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816068" comment="kernel-debug-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816069" comment="kernel-debug-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816070" comment="kernel-debug-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816073" comment="kernel-doc-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816074" comment="kernel-headers-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816075" comment="kernel-modules-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816076" comment="kernel-modules-core-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816077" comment="kernel-modules-extra-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816078" comment="kernel-tools-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816079" comment="kernel-tools-libs-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816081" comment="kernel-uki-virt-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816082" comment="libperf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816083" comment="perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816084" comment="python3-perf-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816085" comment="rtla-5.14.0-362.13.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816086" comment="rv-5.14.0-362.13.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202353999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-53999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-53999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53999" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-53999" ref_url="https://www.suse.com/security/cve/CVE-2023-53999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: TC, Fix internal port memory leak

The flow rule can be splited, and the extra post_act rules are added
to post_act table. It's possible to trigger memleak when the rule
forwards packets from internal port and over tunnel, in the case that,
for example, CT 'new' state offload is allowed. As int_port object is
assigned to the flow attribute of post_act rule, and its refcnt is
incremented by mlx5e_tc_int_port_get(), but mlx5e_tc_int_port_put() is
not called, the refcnt is never decremented, then int_port is never
freed.

The kmemleak reports the following error:
unreferenced object 0xffff888128204b80 (size 64):
  comm "handler20", pid 50121, jiffies 4296973009 (age 642.932s)
  hex dump (first 32 bytes):
    01 00 00 00 19 00 00 00 03 f0 00 00 04 00 00 00  ................
    98 77 67 41 81 88 ff ff 98 77 67 41 81 88 ff ff  .wgA.....wgA....
  backtrace:
    [&lt;00000000e992680d&gt;] kmalloc_trace+0x27/0x120
    [&lt;000000009e945a98&gt;] mlx5e_tc_int_port_get+0x3f3/0xe20 [mlx5_core]
    [&lt;0000000035a537f0&gt;] mlx5e_tc_add_fdb_flow+0x473/0xcf0 [mlx5_core]
    [&lt;0000000070c2cec6&gt;] __mlx5e_add_fdb_flow+0x7cf/0xe90 [mlx5_core]
    [&lt;000000005cc84048&gt;] mlx5e_configure_flower+0xd40/0x4c40 [mlx5_core]
    [&lt;000000004f8a2031&gt;] mlx5e_rep_indr_offload.isra.0+0x10e/0x1c0 [mlx5_core]
    [&lt;000000007df797dc&gt;] mlx5e_rep_indr_setup_tc_cb+0x90/0x130 [mlx5_core]
    [&lt;0000000016c15cc3&gt;] tc_setup_cb_add+0x1cf/0x410
    [&lt;00000000a63305b4&gt;] fl_hw_replace_filter+0x38f/0x670 [cls_flower]
    [&lt;000000008bc9e77c&gt;] fl_change+0x1fd5/0x4430 [cls_flower]
    [&lt;00000000e7f766e4&gt;] tc_new_tfilter+0x867/0x2010
    [&lt;00000000e101c0ef&gt;] rtnetlink_rcv_msg+0x6fc/0x9f0
    [&lt;00000000e1111d44&gt;] netlink_rcv_skb+0x12c/0x360
    [&lt;0000000082dd6c8b&gt;] netlink_unicast+0x438/0x710
    [&lt;00000000fc568f70&gt;] netlink_sendmsg+0x794/0xc50
    [&lt;0000000016e92590&gt;] sock_sendmsg+0xc5/0x190

So fix this by moving int_port cleanup code to the flow attribute
free helper, which is used by all the attribute free cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-53999/">CVE-2023-53999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-53999">CVE-2023-53999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255621">SUSE bug 1255621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54003</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54003" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54003" ref_url="https://www.suse.com/security/cve/CVE-2023-54003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Fix GID entry ref leak when create_ah fails

If AH create request fails, release sgid_attr to avoid GID entry
referrence leak reported while releasing GID table
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54003/">CVE-2023-54003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54003">CVE-2023-54003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255619">SUSE bug 1255619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54004" ref_url="https://www.suse.com/security/cve/CVE-2023-54004" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udplite: Fix NULL pointer dereference in __sk_mem_raise_allocated().

syzbot reported [0] a null-ptr-deref in sk_get_rmem0() while using
IPPROTO_UDPLITE (0x88):

  14:25:52 executing program 1:
  r0 = socket$inet6(0xa, 0x80002, 0x88)

We had a similar report [1] for probably sk_memory_allocated_add()
in __sk_mem_raise_allocated(), and commit c915fe13cbaa ("udplite: fix
NULL pointer dereference") fixed it by setting .memory_allocated for
udplite_prot and udplitev6_prot.

To fix the variant, we need to set either .sysctl_wmem_offset or
.sysctl_rmem.

Now UDP and UDPLITE share the same value for .memory_allocated, so we
use the same .sysctl_wmem_offset for UDP and UDPLITE.

[0]:
general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 0 PID: 6829 Comm: syz-executor.1 Not tainted 6.4.0-rc2-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/28/2023
RIP: 0010:sk_get_rmem0 include/net/sock.h:2907 [inline]
RIP: 0010:__sk_mem_raise_allocated+0x806/0x17a0 net/core/sock.c:3006
Code: c1 ea 03 80 3c 02 00 0f 85 23 0f 00 00 48 8b 44 24 08 48 8b 98 38 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 &lt;0f&gt; b6 14 02 48 89 d8 83 e0 07 83 c0 03 38 d0 0f 8d 6f 0a 00 00 8b
RSP: 0018:ffffc90005d7f450 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004d92000
RDX: 0000000000000000 RSI: ffffffff88066482 RDI: ffffffff8e2ccbb8
RBP: ffff8880173f7000 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000030000
R13: 0000000000000001 R14: 0000000000000340 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9800000(0063) knlGS:00000000f7f1cb40
CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 000000002e82f000 CR3: 0000000034ff0000 CR4: 00000000003506f0
Call Trace:
 &lt;TASK&gt;
 __sk_mem_schedule+0x6c/0xe0 net/core/sock.c:3077
 udp_rmem_schedule net/ipv4/udp.c:1539 [inline]
 __udp_enqueue_schedule_skb+0x776/0xb30 net/ipv4/udp.c:1581
 __udpv6_queue_rcv_skb net/ipv6/udp.c:666 [inline]
 udpv6_queue_rcv_one_skb+0xc39/0x16c0 net/ipv6/udp.c:775
 udpv6_queue_rcv_skb+0x194/0xa10 net/ipv6/udp.c:793
 __udp6_lib_mcast_deliver net/ipv6/udp.c:906 [inline]
 __udp6_lib_rcv+0x1bda/0x2bd0 net/ipv6/udp.c:1013
 ip6_protocol_deliver_rcu+0x2e7/0x1250 net/ipv6/ip6_input.c:437
 ip6_input_finish+0x150/0x2f0 net/ipv6/ip6_input.c:482
 NF_HOOK include/linux/netfilter.h:303 [inline]
 NF_HOOK include/linux/netfilter.h:297 [inline]
 ip6_input+0xa0/0xd0 net/ipv6/ip6_input.c:491
 ip6_mc_input+0x40b/0xf50 net/ipv6/ip6_input.c:585
 dst_input include/net/dst.h:468 [inline]
 ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]
 NF_HOOK include/linux/netfilter.h:303 [inline]
 NF_HOOK include/linux/netfilter.h:297 [inline]
 ipv6_rcv+0x250/0x380 net/ipv6/ip6_input.c:309
 __netif_receive_skb_one_core+0x114/0x180 net/core/dev.c:5491
 __netif_receive_skb+0x1f/0x1c0 net/core/dev.c:5605
 netif_receive_skb_internal net/core/dev.c:5691 [inline]
 netif_receive_skb+0x133/0x7a0 net/core/dev.c:5750
 tun_rx_batched+0x4b3/0x7a0 drivers/net/tun.c:1553
 tun_get_user+0x2452/0x39c0 drivers/net/tun.c:1989
 tun_chr_write_iter+0xdf/0x200 drivers/net/tun.c:2035
 call_write_iter include/linux/fs.h:1868 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x945/0xd50 fs/read_write.c:584
 ksys_write+0x12b/0x250 fs/read_write.c:637
 do_syscall_32_irqs_on arch/x86/entry/common.c:112 [inline]
 __do_fast_syscall_32+0x65/0xf0 arch/x86/entry/common.c:178
 do_fast_syscall_32+0x33/0x70 arch/x86/entry/common.c:203
 entry_SYSENTER_compat_after_hwframe+0x70/0x82
RIP: 0023:0xf7f21579
Code: b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 00 00 00 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 &lt;5d&gt; 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54004/">CVE-2023-54004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54004">CVE-2023-54004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255573">SUSE bug 1255573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54006" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54006" ref_url="https://www.suse.com/security/cve/CVE-2023-54006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix data-race around unix_tot_inflight.

unix_tot_inflight is changed under spin_lock(unix_gc_lock), but
unix_release_sock() reads it locklessly.

Let's use READ_ONCE() for unix_tot_inflight.

Note that the writer side was marked by commit 9d6d7f1cb67c ("af_unix:
annote lockless accesses to unix_tot_inflight &amp; gc_in_progress")

BUG: KCSAN: data-race in unix_inflight / unix_release_sock

write (marked) to 0xffffffff871852b8 of 4 bytes by task 123 on cpu 1:
 unix_inflight+0x130/0x180 net/unix/scm.c:64
 unix_attach_fds+0x137/0x1b0 net/unix/scm.c:123
 unix_scm_to_skb net/unix/af_unix.c:1832 [inline]
 unix_dgram_sendmsg+0x46a/0x14f0 net/unix/af_unix.c:1955
 sock_sendmsg_nosec net/socket.c:724 [inline]
 sock_sendmsg+0x148/0x160 net/socket.c:747
 ____sys_sendmsg+0x4e4/0x610 net/socket.c:2493
 ___sys_sendmsg+0xc6/0x140 net/socket.c:2547
 __sys_sendmsg+0x94/0x140 net/socket.c:2576
 __do_sys_sendmsg net/socket.c:2585 [inline]
 __se_sys_sendmsg net/socket.c:2583 [inline]
 __x64_sys_sendmsg+0x45/0x50 net/socket.c:2583
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

read to 0xffffffff871852b8 of 4 bytes by task 4891 on cpu 0:
 unix_release_sock+0x608/0x910 net/unix/af_unix.c:671
 unix_release+0x59/0x80 net/unix/af_unix.c:1058
 __sock_release+0x7d/0x170 net/socket.c:653
 sock_close+0x19/0x30 net/socket.c:1385
 __fput+0x179/0x5e0 fs/file_table.c:321
 ____fput+0x15/0x20 fs/file_table.c:349
 task_work_run+0x116/0x1a0 kernel/task_work.c:179
 resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:171 [inline]
 exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204
 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]
 syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297
 do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86
 entry_SYSCALL_64_after_hwframe+0x72/0xdc

value changed: 0x00000000 -&gt; 0x00000001

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 4891 Comm: systemd-coredum Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #5
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54006/">CVE-2023-54006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54006">CVE-2023-54006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255591">SUSE bug 1255591</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54008" ref_url="https://www.suse.com/security/cve/CVE-2023-54008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_vdpa: build affinity masks conditionally

We try to build affinity mask via create_affinity_masks()
unconditionally which may lead several issues:

- the affinity mask is not used for parent without affinity support
  (only VDUSE support the affinity now)
- the logic of create_affinity_masks() might not work for devices
  other than block. For example it's not rare in the networking device
  where the number of queues could exceed the number of CPUs. Such
  case breaks the current affinity logic which is based on
  group_cpus_evenly() who assumes the number of CPUs are not less than
  the number of groups. This can trigger a warning[1]:

	if (ret &gt;= 0)
		WARN_ON(nr_present + nr_others &lt; numgrps);

Fixing this by only build the affinity masks only when

- Driver passes affinity descriptor, driver like virtio-blk can make
  sure to limit the number of queues when it exceeds the number of CPUs
- Parent support affinity setting config ops

This help to avoid the warning. More optimizations could be done on
top.

[1]
[  682.146655] WARNING: CPU: 6 PID: 1550 at lib/group_cpus.c:400 group_cpus_evenly+0x1aa/0x1c0
[  682.146668] CPU: 6 PID: 1550 Comm: vdpa Not tainted 6.5.0-rc5jason+ #79
[  682.146671] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014
[  682.146673] RIP: 0010:group_cpus_evenly+0x1aa/0x1c0
[  682.146676] Code: 4c 89 e0 5b 5d 41 5c 41 5d 41 5e c3 cc cc cc cc e8 1b c4 74 ff 48 89 ef e8 13 ac 98 ff 4c 89 e7 45 31 e4 e8 08 ac 98 ff eb c2 &lt;0f&gt; 0b eb b6 e8 fd 05 c3 00 45 31 e4 eb e5 cc cc cc cc cc cc cc cc
[  682.146679] RSP: 0018:ffffc9000215f498 EFLAGS: 00010293
[  682.146682] RAX: 000000000001f1e0 RBX: 0000000000000041 RCX: 0000000000000000
[  682.146684] RDX: ffff888109922058 RSI: 0000000000000041 RDI: 0000000000000030
[  682.146686] RBP: ffff888109922058 R08: ffffc9000215f498 R09: ffffc9000215f4a0
[  682.146687] R10: 00000000000198d0 R11: 0000000000000030 R12: ffff888107e02800
[  682.146689] R13: 0000000000000030 R14: 0000000000000030 R15: 0000000000000041
[  682.146692] FS:  00007fef52315740(0000) GS:ffff888237380000(0000) knlGS:0000000000000000
[  682.146695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  682.146696] CR2: 00007fef52509000 CR3: 0000000110dbc004 CR4: 0000000000370ee0
[  682.146698] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  682.146700] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  682.146701] Call Trace:
[  682.146703]  &lt;TASK&gt;
[  682.146705]  ? __warn+0x7b/0x130
[  682.146709]  ? group_cpus_evenly+0x1aa/0x1c0
[  682.146712]  ? report_bug+0x1c8/0x1e0
[  682.146717]  ? handle_bug+0x3c/0x70
[  682.146721]  ? exc_invalid_op+0x14/0x70
[  682.146723]  ? asm_exc_invalid_op+0x16/0x20
[  682.146727]  ? group_cpus_evenly+0x1aa/0x1c0
[  682.146729]  ? group_cpus_evenly+0x15c/0x1c0
[  682.146731]  create_affinity_masks+0xaf/0x1a0
[  682.146735]  virtio_vdpa_find_vqs+0x83/0x1d0
[  682.146738]  ? __pfx_default_calc_sets+0x10/0x10
[  682.146742]  virtnet_find_vqs+0x1f0/0x370
[  682.146747]  virtnet_probe+0x501/0xcd0
[  682.146749]  ? vp_modern_get_status+0x12/0x20
[  682.146751]  ? get_cap_addr.isra.0+0x10/0xc0
[  682.146754]  virtio_dev_probe+0x1af/0x260
[  682.146759]  really_probe+0x1a5/0x410
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54008/">CVE-2023-54008 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54008">CVE-2023-54008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255630">SUSE bug 1255630</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54011" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54011" ref_url="https://www.suse.com/security/cve/CVE-2023-54011" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix an issue found by KASAN

Write only correct size (32 instead of 64 bytes).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54011/">CVE-2023-54011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54011">CVE-2023-54011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255597">SUSE bug 1255597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54014" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54014" ref_url="https://www.suse.com/security/cve/CVE-2023-54014" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Check valid rport returned by fc_bsg_to_rport()

Klocwork reported warning of rport maybe NULL and will be dereferenced.
rport returned by call to fc_bsg_to_rport() could be NULL and dereferenced.

Check valid rport returned by fc_bsg_to_rport().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54014/">CVE-2023-54014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54014">CVE-2023-54014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256300">SUSE bug 1256300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54015" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54015" ref_url="https://www.suse.com/security/cve/CVE-2023-54015" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device

In case devcom allocation is failed, mlx5 is always freeing the priv.
However, this priv might have been allocated by a different thread,
and freeing it might lead to use-after-free bugs.
Fix it by freeing the priv only in case it was allocated by the
running thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54015/">CVE-2023-54015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54015">CVE-2023-54015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255562">SUSE bug 1255562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54016" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54016" ref_url="https://www.suse.com/security/cve/CVE-2023-54016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix memory leak in rx_desc and tx_desc

Currently when ath12k_dp_cc_desc_init() is called we allocate
memory to rx_descs and tx_descs. In ath12k_dp_cc_cleanup(), during
descriptor cleanup rx_descs and tx_descs memory is not freed.

This is cause of memory leak. These allocated memory should be
freed in ath12k_dp_cc_cleanup.

In ath12k_dp_cc_desc_init(), we can save base address of rx_descs
and tx_descs. In ath12k_dp_cc_cleanup(), we can free rx_descs and
tx_descs memory using their base address.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54016/">CVE-2023-54016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54016">CVE-2023-54016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256279">SUSE bug 1256279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54021</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54021" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54021" ref_url="https://www.suse.com/security/cve/CVE-2023-54021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: set goal start correctly in ext4_mb_normalize_request

We need to set ac_g_ex to notify the goal start used in
ext4_mb_find_by_goal. Set ac_g_ex instead of ac_f_ex in
ext4_mb_normalize_request.
Besides we should assure goal start is in range [first_data_block,
blocks_count) as ext4_mb_initialize_context does.

[ Added a check to make sure size is less than ar-&gt;pright; otherwise
  we could end up passing an underflowed value of ar-&gt;pright - size to
  ext4_get_group_no_and_offset(), which will trigger a BUG_ON later on.
  - TYT ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54021/">CVE-2023-54021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54021">CVE-2023-54021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255600">SUSE bug 1255600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54022" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54022" ref_url="https://www.suse.com/security/cve/CVE-2023-54022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential memory leaks at error path for UMP open

The allocation and initialization errors at alloc_midi_urbs() that is
called at MIDI 2.0 / UMP device are supposed to be handled at the
caller side by invoking free_midi_urbs().  However, free_midi_urbs()
loops only for ep-&gt;num_urbs entries, and since ep-&gt;num_entries wasn't
updated yet at the allocation / init error in alloc_midi_urbs(), this
entry won't be released.

The intention of free_midi_urbs() is to release the whole elements, so
change the loop size to NUM_URBS to scan over all elements for fixing
the missed releases.

Also, the call of free_midi_urbs() is missing at
snd_usb_midi_v2_open().  Although it'll be released later at
reopen/close or disconnection, it's better to release immediately at
the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54022/">CVE-2023-54022 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54022">CVE-2023-54022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255545">SUSE bug 1255545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54024" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54024" ref_url="https://www.suse.com/security/cve/CVE-2023-54024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Destroy target device if coalesced MMIO unregistration fails

Destroy and free the target coalesced MMIO device if unregistering said
device fails.  As clearly noted in the code, kvm_io_bus_unregister_dev()
does not destroy the target device.

  BUG: memory leak
  unreferenced object 0xffff888112a54880 (size 64):
    comm "syz-executor.2", pid 5258, jiffies 4297861402 (age 14.129s)
    hex dump (first 32 bytes):
      38 c7 67 15 00 c9 ff ff 38 c7 67 15 00 c9 ff ff  8.g.....8.g.....
      e0 c7 e1 83 ff ff ff ff 00 30 67 15 00 c9 ff ff  .........0g.....
    backtrace:
      [&lt;0000000006995a8a&gt;] kmalloc include/linux/slab.h:556 [inline]
      [&lt;0000000006995a8a&gt;] kzalloc include/linux/slab.h:690 [inline]
      [&lt;0000000006995a8a&gt;] kvm_vm_ioctl_register_coalesced_mmio+0x8e/0x3d0 arch/x86/kvm/../../../virt/kvm/coalesced_mmio.c:150
      [&lt;00000000022550c2&gt;] kvm_vm_ioctl+0x47d/0x1600 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3323
      [&lt;000000008a75102f&gt;] vfs_ioctl fs/ioctl.c:46 [inline]
      [&lt;000000008a75102f&gt;] file_ioctl fs/ioctl.c:509 [inline]
      [&lt;000000008a75102f&gt;] do_vfs_ioctl+0xbab/0x1160 fs/ioctl.c:696
      [&lt;0000000080e3f669&gt;] ksys_ioctl+0x76/0xa0 fs/ioctl.c:713
      [&lt;0000000059ef4888&gt;] __do_sys_ioctl fs/ioctl.c:720 [inline]
      [&lt;0000000059ef4888&gt;] __se_sys_ioctl fs/ioctl.c:718 [inline]
      [&lt;0000000059ef4888&gt;] __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:718
      [&lt;000000006444fa05&gt;] do_syscall_64+0x9f/0x4e0 arch/x86/entry/common.c:290
      [&lt;000000009a4ed50b&gt;] entry_SYSCALL_64_after_hwframe+0x49/0xbe

  BUG: leak checking failed
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54024/">CVE-2023-54024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54024">CVE-2023-54024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255609">SUSE bug 1255609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54026" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54026" ref_url="https://www.suse.com/security/cve/CVE-2023-54026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

opp: Fix use-after-free in lazy_opp_tables after probe deferral

When dev_pm_opp_of_find_icc_paths() in _allocate_opp_table() returns
-EPROBE_DEFER, the opp_table is freed again, to wait until all the
interconnect paths are available.

However, if the OPP table is using required-opps then it may already
have been added to the global lazy_opp_tables list. The error path
does not remove the opp_table from the list again.

This can cause crashes later when the provider of the required-opps
is added, since we will iterate over OPP tables that have already been
freed. E.g.:

  Unable to handle kernel NULL pointer dereference when read
  CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.4.0-rc3
  PC is at _of_add_opp_table_v2 (include/linux/of.h:949
  drivers/opp/of.c:98 drivers/opp/of.c:344 drivers/opp/of.c:404
  drivers/opp/of.c:1032) -&gt; lazy_link_required_opp_table()

Fix this by calling _of_clear_opp_table() to remove the opp_table from
the list and clear other allocated resources. While at it, also add the
missing mutex_destroy() calls in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54026/">CVE-2023-54026 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54026">CVE-2023-54026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255549">SUSE bug 1255549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54028" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54028" ref_url="https://www.suse.com/security/cve/CVE-2023-54028" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"

In the function rxe_create_qp(), rxe_qp_from_init() is called to
initialize qp, internally things like rxe_init_task are not setup until
rxe_qp_init_req().

If an error occurred before this point then the unwind will call
rxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()
which will oops when trying to access the uninitialized spinlock.

If rxe_init_task is not executed, rxe_cleanup_task will not be called.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54028/">CVE-2023-54028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54028">CVE-2023-54028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255546">SUSE bug 1255546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54029" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54029" ref_url="https://www.suse.com/security/cve/CVE-2023-54029" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-54029/">CVE-2023-54029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54029">CVE-2023-54029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256298">SUSE bug 1256298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54030</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54030" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54030" ref_url="https://www.suse.com/security/cve/CVE-2023-54030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: don't overflow multishot recv

Don't allow overflowing multishot recv CQEs, it might get out of
hand, hurt performance, and in the worst case scenario OOM the task.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54030/">CVE-2023-54030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54030">CVE-2023-54030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255691">SUSE bug 1255691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54031</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54031" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54031" ref_url="https://www.suse.com/security/cve/CVE-2023-54031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check

The vdpa_nl_policy structure is used to validate the nlattr when parsing
the incoming nlmsg. It will ensure the attribute being described produces
a valid nlattr pointer in info-&gt;attrs before entering into each handler
in vdpa_nl_ops.

That is to say, the missing part in vdpa_nl_policy may lead to illegal
nlattr after parsing, which could lead to OOB read just like CVE-2023-3773.

This patch adds the missing nla_policy for vdpa queue index attr to avoid
such bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54031/">CVE-2023-54031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54031">CVE-2023-54031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255583">SUSE bug 1255583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54033" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54033" ref_url="https://www.suse.com/security/cve/CVE-2023-54033" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: fix a memory leak in the LRU and LRU_PERCPU hash maps

The LRU and LRU_PERCPU maps allocate a new element on update before locking the
target hash table bucket. Right after that the maps try to lock the bucket.
If this fails, then maps return -EBUSY to the caller without releasing the
allocated element. This makes the element untracked: it doesn't belong to
either of free lists, and it doesn't belong to the hash table, so can't be
re-used; this eventually leads to the permanent -ENOMEM on LRU map updates,
which is unexpected. Fix this by returning the element to the local free list
if bucket locking fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54033/">CVE-2023-54033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54033">CVE-2023-54033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255543">SUSE bug 1255543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54034" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54034" ref_url="https://www.suse.com/security/cve/CVE-2023-54034" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Make sure to zero vfio_iommu_type1_info before copying to user

Missed a zero initialization here. Most of the struct is filled with
a copy_from_user(), however minsz for that copy is smaller than the
actual struct by 8 bytes, thus we don't fill the padding.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54034/">CVE-2023-54034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54034">CVE-2023-54034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255559">SUSE bug 1255559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54035</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54035" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54035" ref_url="https://www.suse.com/security/cve/CVE-2023-54035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix underflow in chain reference counter

Set element addition error path decrements reference counter on chains
twice: once on element release and again via nft_data_release().

Then, d6b478666ffa ("netfilter: nf_tables: fix underflow in object
reference counter") incorrectly fixed this by removing the stateful
object reference count decrement.

Restore the stateful object decrement as in b91d90368837 ("netfilter:
nf_tables: fix leaking object reference count") and let
nft_data_release() decrement the chain reference counter, so this is
done only once.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54035/">CVE-2023-54035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54035">CVE-2023-54035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255563">SUSE bug 1255563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54036</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54036" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54036" ref_url="https://www.suse.com/security/cve/CVE-2023-54036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl8xxxu: Fix memory leaks with RTL8723BU, RTL8192EU

The wifi + bluetooth combo chip RTL8723BU can leak memory (especially?)
when it's connected to a bluetooth audio device. The busy bluetooth
traffic generates lots of C2H (card to host) messages, which are not
freed correctly.

To fix this, move the dev_kfree_skb() call in rtl8xxxu_c2hcmd_callback()
inside the loop where skb_dequeue() is called.

The RTL8192EU leaks memory because the C2H messages are added to the
queue and left there forever. (This was fine in the past because it
probably wasn't sending any C2H messages until commit e542e66b7c2e
("wifi: rtl8xxxu: gen2: Turn on the rate control"). Since that commit
it sends a C2H message when the TX rate changes.)

To fix this, delete the check for rf_paths &gt; 1 and the goto. Let the
function process the C2H messages from RTL8192EU like the ones from
the other chips.

Theoretically the RTL8188FU could also leak like RTL8723BU, but it
most likely doesn't send C2H messages frequently enough.

This change was tested with RTL8723BU by Erhard F. I tested it with
RTL8188FU and RTL8192EU.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54036/">CVE-2023-54036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54036">CVE-2023-54036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255528">SUSE bug 1255528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54037</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54037" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54037" ref_url="https://www.suse.com/security/cve/CVE-2023-54037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: prevent NULL pointer deref during reload

Calling ethtool during reload can lead to call trace, because VSI isn't
configured for some time, but netdev is alive.

To fix it add rtnl lock for VSI deconfig and config. Set ::num_q_vectors
to 0 after freeing and add a check for ::tx/rx_rings in ring related
ethtool ops.

Add proper unroll of filters in ice_start_eth().

Reproduction:
$watch -n 0.1 -d 'ethtool -g enp24s0f0np0'
$devlink dev reload pci/0000:18:00.0 action driver_reinit

Call trace before fix:
[66303.926205] BUG: kernel NULL pointer dereference, address: 0000000000000000
[66303.926259] #PF: supervisor read access in kernel mode
[66303.926286] #PF: error_code(0x0000) - not-present page
[66303.926311] PGD 0 P4D 0
[66303.926332] Oops: 0000 [#1] PREEMPT SMP PTI
[66303.926358] CPU: 4 PID: 933821 Comm: ethtool Kdump: loaded Tainted: G           OE      6.4.0-rc5+ #1
[66303.926400] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.00.01.0014.070920180847 07/09/2018
[66303.926446] RIP: 0010:ice_get_ringparam+0x22/0x50 [ice]
[66303.926649] Code: 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 48 8b 87 c0 09 00 00 c7 46 04 e0 1f 00 00 c7 46 10 e0 1f 00 00 48 8b 50 20 &lt;48&gt; 8b 12 0f b7 52 3a 89 56 14 48 8b 40 28 48 8b 00 0f b7 40 58 48
[66303.926722] RSP: 0018:ffffad40472f39c8 EFLAGS: 00010246
[66303.926749] RAX: ffff98a8ada05828 RBX: ffff98a8c46dd060 RCX: ffffad40472f3b48
[66303.926781] RDX: 0000000000000000 RSI: ffff98a8c46dd068 RDI: ffff98a8b23c4000
[66303.926811] RBP: ffffad40472f3b48 R08: 00000000000337b0 R09: 0000000000000000
[66303.926843] R10: 0000000000000001 R11: 0000000000000100 R12: ffff98a8b23c4000
[66303.926874] R13: ffff98a8c46dd060 R14: 000000000000000f R15: ffffad40472f3a50
[66303.926906] FS:  00007f6397966740(0000) GS:ffff98b390900000(0000) knlGS:0000000000000000
[66303.926941] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[66303.926967] CR2: 0000000000000000 CR3: 000000011ac20002 CR4: 00000000007706e0
[66303.926999] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[66303.927029] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[66303.927060] PKRU: 55555554
[66303.927075] Call Trace:
[66303.927094]  &lt;TASK&gt;
[66303.927111]  ? __die+0x23/0x70
[66303.927140]  ? page_fault_oops+0x171/0x4e0
[66303.927176]  ? exc_page_fault+0x7f/0x180
[66303.927209]  ? asm_exc_page_fault+0x26/0x30
[66303.927244]  ? ice_get_ringparam+0x22/0x50 [ice]
[66303.927433]  rings_prepare_data+0x62/0x80
[66303.927469]  ethnl_default_doit+0xe2/0x350
[66303.927501]  genl_family_rcv_msg_doit.isra.0+0xe3/0x140
[66303.927538]  genl_rcv_msg+0x1b1/0x2c0
[66303.927561]  ? __pfx_ethnl_default_doit+0x10/0x10
[66303.927590]  ? __pfx_genl_rcv_msg+0x10/0x10
[66303.927615]  netlink_rcv_skb+0x58/0x110
[66303.927644]  genl_rcv+0x28/0x40
[66303.927665]  netlink_unicast+0x19e/0x290
[66303.927691]  netlink_sendmsg+0x254/0x4d0
[66303.927717]  sock_sendmsg+0x93/0xa0
[66303.927743]  __sys_sendto+0x126/0x170
[66303.927780]  __x64_sys_sendto+0x24/0x30
[66303.928593]  do_syscall_64+0x5d/0x90
[66303.929370]  ? __count_memcg_events+0x60/0xa0
[66303.930146]  ? count_memcg_events.constprop.0+0x1a/0x30
[66303.930920]  ? handle_mm_fault+0x9e/0x350
[66303.931688]  ? do_user_addr_fault+0x258/0x740
[66303.932452]  ? exc_page_fault+0x7f/0x180
[66303.933193]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54037/">CVE-2023-54037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54037">CVE-2023-54037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255557">SUSE bug 1255557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54038</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54038" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54038" ref_url="https://www.suse.com/security/cve/CVE-2023-54038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_conn: return ERR_PTR instead of NULL when there is no link

hci_connect_sco currently returns NULL when there is no link (i.e. when
hci_conn_link() returns NULL).

sco_connect() expects an ERR_PTR in case of any error (see line 266 in
sco.c). Thus, hcon set as NULL passes through to sco_conn_add(), which
tries to get hcon-&gt;hdev, resulting in dereferencing a NULL pointer as
reported by syzkaller.

The same issue exists for iso_connect_cis() calling hci_connect_cis().

Thus, make hci_connect_sco() and hci_connect_cis() return ERR_PTR
instead of NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54038/">CVE-2023-54038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54038">CVE-2023-54038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255540">SUSE bug 1255540</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54040</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54040" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54040" ref_url="https://www.suse.com/security/cve/CVE-2023-54040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix wrong fallback logic for FDIR

When adding a FDIR filter, if ice_vc_fdir_set_irq_ctx returns failure,
the inserted fdir entry will not be removed and if ice_vc_fdir_write_fltr
returns failure, the fdir context info for irq handler will not be cleared
which may lead to inconsistent or memory leak issue. This patch refines
failure cases to resolve this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54040/">CVE-2023-54040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54040">CVE-2023-54040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255554">SUSE bug 1255554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54041" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54041" ref_url="https://www.suse.com/security/cve/CVE-2023-54041" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix memory leak when removing provided buffers

When removing provided buffers, io_buffer structs are not being disposed
of, leading to a memory leak. They can't be freed individually, because
they are allocated in page-sized groups. They need to be added to some
free list instead, such as io_buffers_cache. All callers already hold
the lock protecting it, apart from when destroying buffers, so had to
extend the lock there.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54041/">CVE-2023-54041 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54041">CVE-2023-54041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255532">SUSE bug 1255532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54043</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54043" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54043" ref_url="https://www.suse.com/security/cve/CVE-2023-54043" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Do not add the same hwpt to the ioas-&gt;hwpt_list twice

The hwpt is added to the hwpt_list only during its creation, it is never
added again. This hunk is some missed leftover from rework. Adding it
twice will corrupt the linked list in some cases.

It effects HWPT specific attachment, which is something the test suite
cannot cover until we can create a legitimate struct device with a
non-system iommu "driver" (ie we need the bus removed from the iommu code)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54043/">CVE-2023-54043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54043">CVE-2023-54043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256293">SUSE bug 1256293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54048" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54048" ref_url="https://www.suse.com/security/cve/CVE-2023-54048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Prevent handling any completions after qp destroy

HW may generate completions that indicates QP is destroyed.
Driver should not be scheduling any more completion handlers
for this QP, after the QP is destroyed. Since CQs are active
during the QP destroy, driver may still schedule completion
handlers. This can cause a race where the destroy_cq and poll_cq
running simultaneously.

Snippet of kernel panic while doing bnxt_re driver load unload in loop.
This indicates a poll after the CQ is freed.  

[77786.481636] Call Trace:
[77786.481640]   &lt;TASK&gt;
[77786.481644]   bnxt_re_poll_cq+0x14a/0x620 [bnxt_re]
[77786.481658]   ? kvm_clock_read+0x14/0x30
[77786.481693]   __ib_process_cq+0x57/0x190 [ib_core]
[77786.481728]   ib_cq_poll_work+0x26/0x80 [ib_core]
[77786.481761]   process_one_work+0x1e5/0x3f0
[77786.481768]   worker_thread+0x50/0x3a0
[77786.481785]   ? __pfx_worker_thread+0x10/0x10
[77786.481790]   kthread+0xe2/0x110
[77786.481794]   ? __pfx_kthread+0x10/0x10
[77786.481797]   ret_from_fork+0x2c/0x50

To avoid this, complete all completion handlers before returning the
destroy QP. If free_cq is called soon after destroy_qp,  IB stack
will cancel the CQ work before invoking the destroy_cq verb and
this will prevent any race mentioned.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54048/">CVE-2023-54048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54048">CVE-2023-54048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256395">SUSE bug 1256395</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54052" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54052" ref_url="https://www.suse.com/security/cve/CVE-2023-54052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921: fix skb leak by txs missing in AMSDU

txs may be dropped if the frame is aggregated in AMSDU. When the problem
shows up, some SKBs would be hold in driver to cause network stopped
temporarily. Even if the problem can be recovered by txs timeout handling,
mt7921 still need to disable txs in AMSDU to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54052/">CVE-2023-54052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54052">CVE-2023-54052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256387">SUSE bug 1256387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54053" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54053" ref_url="https://www.suse.com/security/cve/CVE-2023-54053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: pcie: fix possible NULL pointer dereference

It is possible that iwl_pci_probe() will fail and free the trans,
then afterwards iwl_pci_remove() will be called and crash by trying
to access trans which is already freed, fix it.

iwlwifi 0000:01:00.0: Detected crf-id 0xa5a5a5a2, cnv-id 0xa5a5a5a2
		      wfpm id 0xa5a5a5a2
iwlwifi 0000:01:00.0: Can't find a correct rfid for crf id 0x5a2
...
BUG: kernel NULL pointer dereference, address: 0000000000000028
...
RIP: 0010:iwl_pci_remove+0x12/0x30 [iwlwifi]
pci_device_remove+0x3e/0xb0
device_release_driver_internal+0x103/0x1f0
driver_detach+0x4c/0x90
bus_remove_driver+0x5c/0xd0
driver_unregister+0x31/0x50
pci_unregister_driver+0x40/0x90
iwl_pci_unregister_driver+0x15/0x20 [iwlwifi]
__exit_compat+0x9/0x98 [iwlwifi]
__x64_sys_delete_module+0x147/0x260
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54053/">CVE-2023-54053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54053">CVE-2023-54053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256388">SUSE bug 1256388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54055" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54055" ref_url="https://www.suse.com/security/cve/CVE-2023-54055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix memory leak of PBLE objects

On rmmod of irdma, the PBLE object memory is not being freed. PBLE object
memory are not statically pre-allocated at function initialization time
unlike other HMC objects. PBLEs objects and the Segment Descriptors (SD)
for it can be dynamically allocated during scale up and SD's remain
allocated till function deinitialization.

Fix this leak by adding IRDMA_HMC_IW_PBLE to the iw_hmc_obj_types[] table
and skip pbles in irdma_create_hmc_obj but not in irdma_del_hmc_objects().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54055/">CVE-2023-54055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54055">CVE-2023-54055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256384">SUSE bug 1256384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54057" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54057" ref_url="https://www.suse.com/security/cve/CVE-2023-54057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Add a length limitation for the ivrs_acpihid command-line parameter

The 'acpiid' buffer in the parse_ivrs_acpihid function may overflow,
because the string specifier in the format string sscanf()
has no width limitation.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54057/">CVE-2023-54057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54057">CVE-2023-54057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256381">SUSE bug 1256381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54060" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54060" ref_url="https://www.suse.com/security/cve/CVE-2023-54060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Set end correctly when doing batch carry

Even though the test suite covers this it somehow became obscured that
this wasn't working.

The test iommufd_ioas.mock_domain.access_domain_destory would blow up
rarely.

end should be set to 1 because this just pushed an item, the carry, to the
pfns list.

Sometimes the test would blow up with:

  BUG: kernel NULL pointer dereference, address: 0000000000000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP
  CPU: 5 PID: 584 Comm: iommufd Not tainted 6.5.0-rc1-dirty #1236
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  RIP: 0010:batch_unpin+0xa2/0x100 [iommufd]
  Code: 17 48 81 fe ff ff 07 00 77 70 48 8b 15 b7 be 97 e2 48 85 d2 74 14 48 8b 14 fa 48 85 d2 74 0b 40 0f b6 f6 48 c1 e6 04 48 01 f2 &lt;48&gt; 8b 3a 48 c1 e0 06 89 ca 48 89 de 48 83 e7 f0 48 01 c7 e8 96 dc
  RSP: 0018:ffffc90001677a58 EFLAGS: 00010246
  RAX: 00007f7e2646f000 RBX: 0000000000000000 RCX: 0000000000000001
  RDX: 0000000000000000 RSI: 00000000fefc4c8d RDI: 0000000000fefc4c
  RBP: ffffc90001677a80 R08: 0000000000000048 R09: 0000000000000200
  R10: 0000000000030b98 R11: ffffffff81f3bb40 R12: 0000000000000001
  R13: ffff888101f75800 R14: ffffc90001677ad0 R15: 00000000000001fe
  FS:  00007f9323679740(0000) GS:ffff8881ba540000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000105ede003 CR4: 00000000003706a0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  Call Trace:
   &lt;TASK&gt;
   ? show_regs+0x5c/0x70
   ? __die+0x1f/0x60
   ? page_fault_oops+0x15d/0x440
   ? lock_release+0xbc/0x240
   ? exc_page_fault+0x4a4/0x970
   ? asm_exc_page_fault+0x27/0x30
   ? batch_unpin+0xa2/0x100 [iommufd]
   ? batch_unpin+0xba/0x100 [iommufd]
   __iopt_area_unfill_domain+0x198/0x430 [iommufd]
   ? __mutex_lock+0x8c/0xb80
   ? __mutex_lock+0x6aa/0xb80
   ? xa_erase+0x28/0x30
   ? iopt_table_remove_domain+0x162/0x320 [iommufd]
   ? lock_release+0xbc/0x240
   iopt_area_unfill_domain+0xd/0x10 [iommufd]
   iopt_table_remove_domain+0x195/0x320 [iommufd]
   iommufd_hw_pagetable_destroy+0xb3/0x110 [iommufd]
   iommufd_object_destroy_user+0x8e/0xf0 [iommufd]
   iommufd_device_detach+0xc5/0x140 [iommufd]
   iommufd_selftest_destroy+0x1f/0x70 [iommufd]
   iommufd_object_destroy_user+0x8e/0xf0 [iommufd]
   iommufd_destroy+0x3a/0x50 [iommufd]
   iommufd_fops_ioctl+0xfb/0x170 [iommufd]
   __x64_sys_ioctl+0x40d/0x9a0
   do_syscall_64+0x3c/0x80
   entry_SYSCALL_64_after_hwframe+0x46/0xb0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54060/">CVE-2023-54060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54060">CVE-2023-54060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256379">SUSE bug 1256379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54062</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54062" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54062" ref_url="https://www.suse.com/security/cve/CVE-2023-54062" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix invalid free tracking in ext4_xattr_move_to_block()

In ext4_xattr_move_to_block(), the value of the extended attribute
which we need to move to an external block may be allocated by
kvmalloc() if the value is stored in an external inode.  So at the end
of the function the code tried to check if this was the case by
testing entry-&gt;e_value_inum.

However, at this point, the pointer to the xattr entry is no longer
valid, because it was removed from the original location where it had
been stored.  So we could end up calling kvfree() on a pointer which
was not allocated by kvmalloc(); or we could also potentially leak
memory by not freeing the buffer when it should be freed.  Fix this by
storing whether it should be freed in a separate variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54062/">CVE-2023-54062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54062">CVE-2023-54062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256289">SUSE bug 1256289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54064" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54064" ref_url="https://www.suse.com/security/cve/CVE-2023-54064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi:ssif: Fix a memory leak when scanning for an adapter

The adapter scan ssif_info_find() sets info-&gt;adapter_name if the adapter
info came from SMBIOS, as it's not set in that case.  However, this
function can be called more than once, and it will leak the adapter name
if it had already been set.  So check for NULL before setting it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54064/">CVE-2023-54064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54064">CVE-2023-54064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256375">SUSE bug 1256375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54069</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54069" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54069" ref_url="https://www.suse.com/security/cve/CVE-2023-54069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix BUG in ext4_mb_new_inode_pa() due to overflow

When we calculate the end position of ext4_free_extent, this position may
be exactly where ext4_lblk_t (i.e. uint) overflows. For example, if
ac_g_ex.fe_logical is 4294965248 and ac_orig_goal_len is 2048, then the
computed end is 0x100000000, which is 0. If ac-&gt;ac_o_ex.fe_logical is not
the first case of adjusting the best extent, that is, new_bex_end &gt; 0, the
following BUG_ON will be triggered:

=========================================================
kernel BUG at fs/ext4/mballoc.c:5116!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
CPU: 3 PID: 673 Comm: xfs_io Tainted: G E 6.5.0-rc1+ #279
RIP: 0010:ext4_mb_new_inode_pa+0xc5/0x430
Call Trace:
 &lt;TASK&gt;
 ext4_mb_use_best_found+0x203/0x2f0
 ext4_mb_try_best_found+0x163/0x240
 ext4_mb_regular_allocator+0x158/0x1550
 ext4_mb_new_blocks+0x86a/0xe10
 ext4_ext_map_blocks+0xb0c/0x13a0
 ext4_map_blocks+0x2cd/0x8f0
 ext4_iomap_begin+0x27b/0x400
 iomap_iter+0x222/0x3d0
 __iomap_dio_rw+0x243/0xcb0
 iomap_dio_rw+0x16/0x80
=========================================================

A simple reproducer demonstrating the problem:

	mkfs.ext4 -F /dev/sda -b 4096 100M
	mount /dev/sda /tmp/test
	fallocate -l1M /tmp/test/tmp
	fallocate -l10M /tmp/test/file
	fallocate -i -o 1M -l16777203M /tmp/test/file
	fsstress -d /tmp/test -l 0 -n 100000 -p 8 &amp;
	sleep 10 &amp;&amp; killall -9 fsstress
	rm -f /tmp/test/tmp
	xfs_io -c "open -ad /tmp/test/file" -c "pwrite -S 0xff 0 8192"

We simply refactor the logic for adjusting the best extent by adding
a temporary ext4_free_extent ex and use extent_logical_end() to avoid
overflow, which also simplifies the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54069/">CVE-2023-54069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54069">CVE-2023-54069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256371">SUSE bug 1256371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54070" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54070" ref_url="https://www.suse.com/security/cve/CVE-2023-54070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: clean up in all error paths when enabling SR-IOV

After commit 50f303496d92 ("igb: Enable SR-IOV after reinit"), removing
the igb module could hang or crash (depending on the machine) when the
module has been loaded with the max_vfs parameter set to some value != 0.

In case of one test machine with a dual port 82580, this hang occurred:

[  232.480687] igb 0000:41:00.1: removed PHC on enp65s0f1
[  233.093257] igb 0000:41:00.1: IOV Disabled
[  233.329969] pcieport 0000:40:01.0: AER: Multiple Uncorrected (Non-Fatal) err0
[  233.340302] igb 0000:41:00.0: PCIe Bus Error: severity=Uncorrected (Non-Fata)
[  233.352248] igb 0000:41:00.0:   device [8086:1516] error status/mask=00100000
[  233.361088] igb 0000:41:00.0:    [20] UnsupReq               (First)
[  233.368183] igb 0000:41:00.0: AER:   TLP Header: 40000001 0000040f cdbfc00c c
[  233.376846] igb 0000:41:00.1: PCIe Bus Error: severity=Uncorrected (Non-Fata)
[  233.388779] igb 0000:41:00.1:   device [8086:1516] error status/mask=00100000
[  233.397629] igb 0000:41:00.1:    [20] UnsupReq               (First)
[  233.404736] igb 0000:41:00.1: AER:   TLP Header: 40000001 0000040f cdbfc00c c
[  233.538214] pci 0000:41:00.1: AER: can't recover (no error_detected callback)
[  233.538401] igb 0000:41:00.0: removed PHC on enp65s0f0
[  233.546197] pcieport 0000:40:01.0: AER: device recovery failed
[  234.157244] igb 0000:41:00.0: IOV Disabled
[  371.619705] INFO: task irq/35-aerdrv:257 blocked for more than 122 seconds.
[  371.627489]       Not tainted 6.4.0-dirty #2
[  371.632257] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this.
[  371.641000] task:irq/35-aerdrv   state:D stack:0     pid:257   ppid:2      f0
[  371.650330] Call Trace:
[  371.653061]  &lt;TASK&gt;
[  371.655407]  __schedule+0x20e/0x660
[  371.659313]  schedule+0x5a/0xd0
[  371.662824]  schedule_preempt_disabled+0x11/0x20
[  371.667983]  __mutex_lock.constprop.0+0x372/0x6c0
[  371.673237]  ? __pfx_aer_root_reset+0x10/0x10
[  371.678105]  report_error_detected+0x25/0x1c0
[  371.682974]  ? __pfx_report_normal_detected+0x10/0x10
[  371.688618]  pci_walk_bus+0x72/0x90
[  371.692519]  pcie_do_recovery+0xb2/0x330
[  371.696899]  aer_process_err_devices+0x117/0x170
[  371.702055]  aer_isr+0x1c0/0x1e0
[  371.705661]  ? __set_cpus_allowed_ptr+0x54/0xa0
[  371.710723]  ? __pfx_irq_thread_fn+0x10/0x10
[  371.715496]  irq_thread_fn+0x20/0x60
[  371.719491]  irq_thread+0xe6/0x1b0
[  371.723291]  ? __pfx_irq_thread_dtor+0x10/0x10
[  371.728255]  ? __pfx_irq_thread+0x10/0x10
[  371.732731]  kthread+0xe2/0x110
[  371.736243]  ? __pfx_kthread+0x10/0x10
[  371.740430]  ret_from_fork+0x2c/0x50
[  371.744428]  &lt;/TASK&gt;

The reproducer was a simple script:

  #!/bin/sh
  for i in `seq 1 5`; do
    modprobe -rv igb
    modprobe -v igb max_vfs=1
    sleep 1
    modprobe -rv igb
  done

It turned out that this could only be reproduce on 82580 (quad and
dual-port), but not on 82576, i350 and i210.  Further debugging showed
that igb_enable_sriov()'s call to pci_enable_sriov() is failing, because
dev-&gt;is_physfn is 0 on 82580.

Prior to commit 50f303496d92 ("igb: Enable SR-IOV after reinit"),
igb_enable_sriov() jumped into the "err_out" cleanup branch.  After this
commit it only returned the error code.

So the cleanup didn't take place, and the incorrect VF setup in the
igb_adapter structure fooled the igb driver into assuming that VFs have
been set up where no VF actually existed.

Fix this problem by cleaning up again if pci_enable_sriov() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54070/">CVE-2023-54070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54070">CVE-2023-54070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256364">SUSE bug 1256364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54071</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54071" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54071" ref_url="https://www.suse.com/security/cve/CVE-2023-54071" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: use work to update rate to avoid RCU warning

The ieee80211_ops::sta_rc_update must be atomic, because
ieee80211_chan_bw_change() holds rcu_read lock while calling
drv_sta_rc_update(), so create a work to do original things.

 Voluntary context switch within RCU read-side critical section!
 WARNING: CPU: 0 PID: 4621 at kernel/rcu/tree_plugin.h:318
 rcu_note_context_switch+0x571/0x5d0
 CPU: 0 PID: 4621 Comm: kworker/u16:2 Tainted: G        W  OE
 Workqueue: phy3 ieee80211_chswitch_work [mac80211]
 RIP: 0010:rcu_note_context_switch+0x571/0x5d0
 Call Trace:
  &lt;TASK&gt;
  __schedule+0xb0/0x1460
  ? __mod_timer+0x116/0x360
  schedule+0x5a/0xc0
  schedule_timeout+0x87/0x150
  ? trace_raw_output_tick_stop+0x60/0x60
  wait_for_completion_timeout+0x7b/0x140
  usb_start_wait_urb+0x82/0x160 [usbcore
  usb_control_msg+0xe3/0x140 [usbcore
  rtw_usb_read+0x88/0xe0 [rtw_usb
  rtw_usb_read8+0xf/0x10 [rtw_usb
  rtw_fw_send_h2c_command+0xa0/0x170 [rtw_core
  rtw_fw_send_ra_info+0xc9/0xf0 [rtw_core
  drv_sta_rc_update+0x7c/0x160 [mac80211
  ieee80211_chan_bw_change+0xfb/0x110 [mac80211
  ieee80211_change_chanctx+0x38/0x130 [mac80211
  ieee80211_vif_use_reserved_switch+0x34e/0x900 [mac80211
  ieee80211_link_use_reserved_context+0x88/0xe0 [mac80211
  ieee80211_chswitch_work+0x95/0x170 [mac80211
  process_one_work+0x201/0x410
  worker_thread+0x4a/0x3b0
  ? process_one_work+0x410/0x410
  kthread+0xe1/0x110
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54071/">CVE-2023-54071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54071">CVE-2023-54071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256365">SUSE bug 1256365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54072</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54072" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54072" ref_url="https://www.suse.com/security/cve/CVE-2023-54072" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Fix potential data race at PCM memory allocation helpers

The PCM memory allocation helpers have a sanity check against too many
buffer allocations.  However, the check is performed without a proper
lock and the allocation isn't serialized; this allows user to allocate
more memories than predefined max size.

Practically seen, this isn't really a big problem, as it's more or
less some "soft limit" as a sanity check, and it's not possible to
allocate unlimitedly.  But it's still better to address this for more
consistent behavior.

The patch covers the size check in do_alloc_pages() with the
card-&gt;memory_mutex, and increases the allocated size there for
preventing the further overflow.  When the actual allocation fails,
the size is decreased accordingly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54072/">CVE-2023-54072 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54072">CVE-2023-54072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256291">SUSE bug 1256291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54073</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54073" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54073" ref_url="https://www.suse.com/security/cve/CVE-2023-54073" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site

The following crash was reported:

[ 1950.279393] list_del corruption, ffff99560d485790-&gt;next is NULL
[ 1950.279400] ------------[ cut here ]------------
[ 1950.279401] kernel BUG at lib/list_debug.c:49!
[ 1950.279405] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[ 1950.279407] CPU: 11 PID: 5886 Comm: modprobe Tainted: G O 6.2.8_1 #1
[ 1950.279409] Hardware name: Gigabyte Technology Co., Ltd. B550M AORUS PRO-P/B550M AORUS PRO-P,
BIOS F15c 05/11/2022
[ 1950.279410] RIP: 0010:__list_del_entry_valid+0x59/0xc0
[ 1950.279415] Code: 48 8b 01 48 39 f8 75 5a 48 8b 72 08 48 39 c6 75 65 b8 01 00 00 00 c3 cc cc cc
cc 48 89 fe 48 c7 c7 08 a8 13 9e e8 b7 0a bc ff &lt;0f&gt; 0b 48 89 fe 48 c7 c7 38 a8 13 9e e8 a6 0a bc
ff 0f 0b 48 89 fe
[ 1950.279416] RSP: 0018:ffffa96d05647e08 EFLAGS: 00010246
[ 1950.279418] RAX: 0000000000000033 RBX: ffff99560d485750 RCX: 0000000000000000
[ 1950.279419] RDX: 0000000000000000 RSI: ffffffff9e107c59 RDI: 00000000ffffffff
[ 1950.279420] RBP: ffffffffc19c5168 R08: 0000000000000000 R09: ffffa96d05647cc8
[ 1950.279421] R10: 0000000000000003 R11: ffffffff9ea2a568 R12: 0000000000000000
[ 1950.279422] R13: ffff99560140a2e0 R14: ffff99560127d2e0 R15: 0000000000000000
[ 1950.279422] FS: 00007f67da795380(0000) GS:ffff995d1f0c0000(0000) knlGS:0000000000000000
[ 1950.279424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1950.279424] CR2: 00007f67da7e65c0 CR3: 00000001feed2000 CR4: 0000000000750ee0
[ 1950.279426] PKRU: 55555554
[ 1950.279426] Call Trace:
[ 1950.279428] &lt;TASK&gt;
[ 1950.279430] hwrng_unregister+0x28/0xe0 [rng_core]
[ 1950.279436] tpm_chip_unregister+0xd5/0xf0 [tpm]

Add the forgotten !tpm_amd_is_rng_defective() invariant to the
hwrng_unregister() call site inside tpm_chip_unregister().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54073/">CVE-2023-54073 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54073">CVE-2023-54073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256362">SUSE bug 1256362</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54074" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54074" ref_url="https://www.suse.com/security/cve/CVE-2023-54074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Use correct encap attribute during invalidation

With introduction of post action infrastructure most of the users of encap
attribute had been modified in order to obtain the correct attribute by
calling mlx5e_tc_get_encap_attr() helper instead of assuming encap action
is always on default attribute. However, the cited commit didn't modify
mlx5e_invalidate_encap() which prevents it from destroying correct modify
header action which leads to a warning [0]. Fix the issue by using correct
attribute.

[0]:

Feb 21 09:47:35 c-237-177-40-045 kernel: WARNING: CPU: 17 PID: 654 at drivers/net/ethernet/mellanox/mlx5/core/en_tc.c:684 mlx5e_tc_attach_mod_hdr+0x1cc/0x230 [mlx5_core]
Feb 21 09:47:35 c-237-177-40-045 kernel: RIP: 0010:mlx5e_tc_attach_mod_hdr+0x1cc/0x230 [mlx5_core]
Feb 21 09:47:35 c-237-177-40-045 kernel: Call Trace:
Feb 21 09:47:35 c-237-177-40-045 kernel:  &lt;TASK&gt;
Feb 21 09:47:35 c-237-177-40-045 kernel:  mlx5e_tc_fib_event_work+0x8e3/0x1f60 [mlx5_core]
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? mlx5e_take_all_encap_flows+0xe0/0xe0 [mlx5_core]
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? lock_downgrade+0x6d0/0x6d0
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? lockdep_hardirqs_on_prepare+0x273/0x3f0
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? lockdep_hardirqs_on_prepare+0x273/0x3f0
Feb 21 09:47:35 c-237-177-40-045 kernel:  process_one_work+0x7c2/0x1310
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? lockdep_hardirqs_on_prepare+0x3f0/0x3f0
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? pwq_dec_nr_in_flight+0x230/0x230
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? rwlock_bug.part.0+0x90/0x90
Feb 21 09:47:35 c-237-177-40-045 kernel:  worker_thread+0x59d/0xec0
Feb 21 09:47:35 c-237-177-40-045 kernel:  ? __kthread_parkme+0xd9/0x1d0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54074/">CVE-2023-54074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54074">CVE-2023-54074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256363">SUSE bug 1256363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54076" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54076" ref_url="https://www.suse.com/security/cve/CVE-2023-54076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix missed ses refcounting

Use new cifs_smb_ses_inc_refcount() helper to get an active reference
of @ses and @ses-&gt;dfs_root_ses (if set).  This will prevent
@ses-&gt;dfs_root_ses of being put in the next call to cifs_put_smb_ses()
and thus potentially causing an use-after-free bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54076/">CVE-2023-54076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54076">CVE-2023-54076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256335">SUSE bug 1256335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256450">SUSE bug 1256450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54085" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54085" ref_url="https://www.suse.com/security/cve/CVE-2023-54085" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix NULL pointer dereference on fastopen early fallback

In case of early fallback to TCP, subflow_syn_recv_sock() deletes
the subflow context before returning the newly allocated sock to
the caller.

The fastopen path does not cope with the above unconditionally
dereferencing the subflow context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54085/">CVE-2023-54085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54085">CVE-2023-54085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256222">SUSE bug 1256222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54088" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54088" ref_url="https://www.suse.com/security/cve/CVE-2023-54088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: hold queue_lock when removing blkg-&gt;q_node

When blkg is removed from q-&gt;blkg_list from blkg_free_workfn(), queue_lock
has to be held, otherwise, all kinds of bugs(list corruption, hard lockup,
..) can be triggered from blkg_destroy_all().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54088/">CVE-2023-54088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54088">CVE-2023-54088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256263">SUSE bug 1256263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54089" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54089" ref_url="https://www.suse.com/security/cve/CVE-2023-54089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_pmem: add the missing REQ_OP_WRITE for flush bio

When doing mkfs.xfs on a pmem device, the following warning was

 ------------[ cut here ]------------
 WARNING: CPU: 2 PID: 384 at block/blk-core.c:751 submit_bio_noacct
 Modules linked in:
 CPU: 2 PID: 384 Comm: mkfs.xfs Not tainted 6.4.0-rc7+ #154
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
 RIP: 0010:submit_bio_noacct+0x340/0x520
 ......
 Call Trace:
  &lt;TASK&gt;
  ? submit_bio_noacct+0xd5/0x520
  submit_bio+0x37/0x60
  async_pmem_flush+0x79/0xa0
  nvdimm_flush+0x17/0x40
  pmem_submit_bio+0x370/0x390
  __submit_bio+0xbc/0x190
  submit_bio_noacct_nocheck+0x14d/0x370
  submit_bio_noacct+0x1ef/0x520
  submit_bio+0x55/0x60
  submit_bio_wait+0x5a/0xc0
  blkdev_issue_flush+0x44/0x60

The root cause is that submit_bio_noacct() needs bio_op() is either
WRITE or ZONE_APPEND for flush bio and async_pmem_flush() doesn't assign
REQ_OP_WRITE when allocating flush bio, so submit_bio_noacct just fail
the flush bio.

Simply fix it by adding the missing REQ_OP_WRITE for flush bio. And we
could fix the flush order issue and do flush optimization later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54089/">CVE-2023-54089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54089">CVE-2023-54089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256268">SUSE bug 1256268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54090" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54090" ref_url="https://www.suse.com/security/cve/CVE-2023-54090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: Fix panic during XDP_TX with &gt; 64 CPUs

Commit 4fe815850bdc ("ixgbe: let the xdpdrv work with more than 64 cpus")
adds support to allow XDP programs to run on systems with more than
64 CPUs by locking the XDP TX rings and indexing them using cpu % 64
(IXGBE_MAX_XDP_QS).

Upon trying this out patch on a system with more than 64 cores,
the kernel paniced with an array-index-out-of-bounds at the return in
ixgbe_determine_xdp_ring in ixgbe.h, which means ixgbe_determine_xdp_q_idx
was just returning the cpu instead of cpu % IXGBE_MAX_XDP_QS.  An example
splat:

 ==========================================================================
 UBSAN: array-index-out-of-bounds in
 /var/lib/dkms/ixgbe/5.18.6+focal-1/build/src/ixgbe.h:1147:26
 index 65 is out of range for type 'ixgbe_ring *[64]'
 ==========================================================================
 BUG: kernel NULL pointer dereference, address: 0000000000000058
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] SMP NOPTI
 CPU: 65 PID: 408 Comm: ksoftirqd/65
 Tainted: G          IOE     5.15.0-48-generic #54~20.04.1-Ubuntu
 Hardware name: Dell Inc. PowerEdge R640/0W23H8, BIOS 2.5.4 01/13/2020
 RIP: 0010:ixgbe_xmit_xdp_ring+0x1b/0x1c0 [ixgbe]
 Code: 3b 52 d4 cf e9 42 f2 ff ff 66 0f 1f 44 00 00 0f 1f 44 00 00 55 b9
 00 00 00 00 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 08 &lt;44&gt; 0f b7
 47 58 0f b7 47 5a 0f b7 57 54 44 0f b7 76 08 66 41 39 c0
 RSP: 0018:ffffbc3fcd88fcb0 EFLAGS: 00010282
 RAX: ffff92a253260980 RBX: ffffbc3fe68b00a0 RCX: 0000000000000000
 RDX: ffff928b5f659000 RSI: ffff928b5f659000 RDI: 0000000000000000
 RBP: ffffbc3fcd88fce0 R08: ffff92b9dfc20580 R09: 0000000000000001
 R10: 3d3d3d3d3d3d3d3d R11: 3d3d3d3d3d3d3d3d R12: 0000000000000000
 R13: ffff928b2f0fa8c0 R14: ffff928b9be20050 R15: 000000000000003c
 FS:  0000000000000000(0000) GS:ffff92b9dfc00000(0000)
 knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000058 CR3: 000000011dd6a002 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ixgbe_poll+0x103e/0x1280 [ixgbe]
  ? sched_clock_cpu+0x12/0xe0
  __napi_poll+0x30/0x160
  net_rx_action+0x11c/0x270
  __do_softirq+0xda/0x2ee
  run_ksoftirqd+0x2f/0x50
  smpboot_thread_fn+0xb7/0x150
  ? sort_range+0x30/0x30
  kthread+0x127/0x150
  ? set_kthread_struct+0x50/0x50
  ret_from_fork+0x1f/0x30
  &lt;/TASK&gt;

I think this is how it happens:

Upon loading the first XDP program on a system with more than 64 CPUs,
ixgbe_xdp_locking_key is incremented in ixgbe_xdp_setup.  However,
immediately after this, the rings are reconfigured by ixgbe_setup_tc.
ixgbe_setup_tc calls ixgbe_clear_interrupt_scheme which calls
ixgbe_free_q_vectors which calls ixgbe_free_q_vector in a loop.
ixgbe_free_q_vector decrements ixgbe_xdp_locking_key once per call if
it is non-zero.  Commenting out the decrement in ixgbe_free_q_vector
stopped my system from panicing.

I suspect to make the original patch work, I would need to load an XDP
program and then replace it in order to get ixgbe_xdp_locking_key back
above 0 since ixgbe_setup_tc is only called when transitioning between
XDP and non-XDP ring configurations, while ixgbe_xdp_locking_key is
incremented every time ixgbe_xdp_setup is called.

Also, ixgbe_setup_tc can be called via ethtool --set-channels, so this
becomes another path to decrement ixgbe_xdp_locking_key to 0 on systems
with more than 64 CPUs.

Since ixgbe_xdp_locking_key only protects the XDP_TX path and is tied
to the number of CPUs present, there is no reason to disable it upon
unloading an XDP program.  To avoid confusion, I have moved enabling
ixgbe_xdp_locking_key into ixgbe_sw_init, which is part of the probe path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54090/">CVE-2023-54090 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54090">CVE-2023-54090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256269">SUSE bug 1256269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54091" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54091" ref_url="https://www.suse.com/security/cve/CVE-2023-54091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/client: Fix memory leak in drm_client_target_cloned

dmt_mode is allocated and never freed in this function.
It was found with the ast driver, but most drivers using generic fbdev
setup are probably affected.

This fixes the following kmemleak report:
  backtrace:
    [&lt;00000000b391296d&gt;] drm_mode_duplicate+0x45/0x220 [drm]
    [&lt;00000000e45bb5b3&gt;] drm_client_target_cloned.constprop.0+0x27b/0x480 [drm]
    [&lt;00000000ed2d3a37&gt;] drm_client_modeset_probe+0x6bd/0xf50 [drm]
    [&lt;0000000010e5cc9d&gt;] __drm_fb_helper_initial_config_and_unlock+0xb4/0x2c0 [drm_kms_helper]
    [&lt;00000000909f82ca&gt;] drm_fbdev_client_hotplug+0x2bc/0x4d0 [drm_kms_helper]
    [&lt;00000000063a69aa&gt;] drm_client_register+0x169/0x240 [drm]
    [&lt;00000000a8c61525&gt;] ast_pci_probe+0x142/0x190 [ast]
    [&lt;00000000987f19bb&gt;] local_pci_probe+0xdc/0x180
    [&lt;000000004fca231b&gt;] work_for_cpu_fn+0x4e/0xa0
    [&lt;0000000000b85301&gt;] process_one_work+0x8b7/0x1540
    [&lt;000000003375b17c&gt;] worker_thread+0x70a/0xed0
    [&lt;00000000b0d43cd9&gt;] kthread+0x29f/0x340
    [&lt;000000008d770833&gt;] ret_from_fork+0x1f/0x30
unreferenced object 0xff11000333089a00 (size 128):
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54091/">CVE-2023-54091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54091">CVE-2023-54091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256274">SUSE bug 1256274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54092" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54092" ref_url="https://www.suse.com/security/cve/CVE-2023-54092" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: s390: pv: fix index value of replaced ASCE

The index field of the struct page corresponding to a guest ASCE should
be 0. When replacing the ASCE in s390_replace_asce(), the index of the
new ASCE should also be set to 0.

Having the wrong index might lead to the wrong addresses being passed
around when notifying pte invalidations, and eventually to validity
intercepts (VM crash) if the prefix gets unmapped and the notifier gets
called with the wrong address.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54092/">CVE-2023-54092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54092">CVE-2023-54092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256370">SUSE bug 1256370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54096" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54096" ref_url="https://www.suse.com/security/cve/CVE-2023-54096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soundwire: fix enumeration completion

The soundwire subsystem uses two completion structures that allow
drivers to wait for soundwire device to become enumerated on the bus and
initialised by their drivers, respectively.

The code implementing the signalling is currently broken as it does not
signal all current and future waiters and also uses the wrong
reinitialisation function, which can potentially lead to memory
corruption if there are still waiters on the queue.

Not signalling future waiters specifically breaks sound card probe
deferrals as codec drivers can not tell that the soundwire device is
already attached when being reprobed. Some codec runtime PM
implementations suffer from similar problems as waiting for enumeration
during resume can also timeout despite the device already having been
enumerated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54096/">CVE-2023-54096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54096">CVE-2023-54096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256178">SUSE bug 1256178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54097" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54097" ref_url="https://www.suse.com/security/cve/CVE-2023-54097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: stm32-pwr: fix of_iomap leak

Smatch reports:
drivers/regulator/stm32-pwr.c:166 stm32_pwr_regulator_probe() warn:
'base' from of_iomap() not released on lines: 151,166.

In stm32_pwr_regulator_probe(), base is not released
when devm_kzalloc() fails to allocate memory or
devm_regulator_register() fails to register a new regulator device,
which may cause a leak.

To fix this issue, replace of_iomap() with
devm_platform_ioremap_resource(). devm_platform_ioremap_resource()
is a specialized function for platform devices.
It allows 'base' to be automatically released whether the probe
function succeeds or fails.

Besides, use IS_ERR(base) instead of !base
as the return value of devm_platform_ioremap_resource()
can either be a pointer to the remapped memory or
an ERR_PTR() encoded error code if the operation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54097/">CVE-2023-54097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54097">CVE-2023-54097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256179">SUSE bug 1256179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54098" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54098" ref_url="https://www.suse.com/security/cve/CVE-2023-54098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gvt: fix gvt debugfs destroy

When gvt debug fs is destroyed, need to have a sane check if drm
minor's debugfs root is still available or not, otherwise in case like
device remove through unbinding, drm minor's debugfs directory has
already been removed, then intel_gvt_debugfs_clean() would act upon
dangling pointer like below oops.

i915 0000:00:02.0: Direct firmware load for i915/gvt/vid_0x8086_did_0x1926_rid_0x0a.golden_hw_state failed with error -2
i915 0000:00:02.0: MDEV: Registered
Console: switching to colour dummy device 80x25
i915 0000:00:02.0: MDEV: Unregistering
BUG: kernel NULL pointer dereference, address: 00000000000000a0
PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 2 PID: 2486 Comm: gfx-unbind.sh Tainted: G          I        6.1.0-rc8+ #15
Hardware name: Dell Inc. XPS 13 9350/0JXC1H, BIOS 1.13.0 02/10/2020
RIP: 0010:down_write+0x1f/0x90
Code: 1d ff ff 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 53 48 89 fb e8 62 c0 ff ff bf 01 00 00 00 e8 28 5e 31 ff 31 c0 ba 01 00 00 00 &lt;f0&gt; 48 0f b1 13 75 33 65 48 8b 04 25 c0 bd 01 00 48 89 43 08 bf 01
RSP: 0018:ffff9eb3036ffcc8 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 00000000000000a0 RCX: ffffff8100000000
RDX: 0000000000000001 RSI: 0000000000000064 RDI: ffffffffa48787a8
RBP: ffff9eb3036ffd30 R08: ffffeb1fc45a0608 R09: ffffeb1fc45a05c0
R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000
R13: ffff91acc33fa328 R14: ffff91acc033f080 R15: ffff91acced533e0
FS:  00007f6947bba740(0000) GS:ffff91ae36d00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000a0 CR3: 00000001133a2002 CR4: 00000000003706e0
Call Trace:
 &lt;TASK&gt;
 simple_recursive_removal+0x9f/0x2a0
 ? start_creating.part.0+0x120/0x120
 ? _raw_spin_lock+0x13/0x40
 debugfs_remove+0x40/0x60
 intel_gvt_debugfs_clean+0x15/0x30 [kvmgt]
 intel_gvt_clean_device+0x49/0xe0 [kvmgt]
 intel_gvt_driver_remove+0x2f/0xb0
 i915_driver_remove+0xa4/0xf0
 i915_pci_remove+0x1a/0x30
 pci_device_remove+0x33/0xa0
 device_release_driver_internal+0x1b2/0x230
 unbind_store+0xe0/0x110
 kernfs_fop_write_iter+0x11b/0x1f0
 vfs_write+0x203/0x3d0
 ksys_write+0x63/0xe0
 do_syscall_64+0x37/0x90
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f6947cb5190
Code: 40 00 48 8b 15 71 9c 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d 51 24 0e 00 00 74 17 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89
RSP: 002b:00007ffcbac45a28 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 000000000000000d RCX: 00007f6947cb5190
RDX: 000000000000000d RSI: 0000555e35c866a0 RDI: 0000000000000001
RBP: 0000555e35c866a0 R08: 0000000000000002 R09: 0000555e358cb97c
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001
R13: 000000000000000d R14: 0000000000000000 R15: 0000555e358cb8e0
 &lt;/TASK&gt;
Modules linked in: kvmgt
CR2: 00000000000000a0
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54098/">CVE-2023-54098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54098">CVE-2023-54098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256185">SUSE bug 1256185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54100" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54100" ref_url="https://www.suse.com/security/cve/CVE-2023-54100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedi: Fix use after free bug in qedi_remove()

In qedi_probe() we call __qedi_probe() which initializes
&amp;qedi-&gt;recovery_work with qedi_recovery_handler() and
&amp;qedi-&gt;board_disable_work with qedi_board_disable_work().

When qedi_schedule_recovery_handler() is called, schedule_delayed_work()
will finally start the work.

In qedi_remove(), which is called to remove the driver, the following
sequence may be observed:

Fix this by finishing the work before cleanup in qedi_remove().

CPU0                  CPU1

                     |qedi_recovery_handler
qedi_remove          |
  __qedi_remove      |
iscsi_host_free      |
scsi_host_put        |
//free shost         |
                     |iscsi_host_for_each_session
                     |//use qedi-&gt;shost

Cancel recovery_work and board_disable_work in __qedi_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54100/">CVE-2023-54100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54100">CVE-2023-54100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256152">SUSE bug 1256152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54102" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54102" ref_url="https://www.suse.com/security/cve/CVE-2023-54102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Prevent lpfc_debugfs_lockstat_write() buffer overflow

A static code analysis tool flagged the possibility of buffer overflow when
using copy_from_user() for a debugfs entry.

Currently, it is possible that copy_from_user() copies more bytes than what
would fit in the mybuf char array.  Add a min() restriction check between
sizeof(mybuf) - 1 and nbytes passed from the userspace buffer to protect
against buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54102/">CVE-2023-54102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54102">CVE-2023-54102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256173">SUSE bug 1256173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54106" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54106" ref_url="https://www.suse.com/security/cve/CVE-2023-54106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fix potential memory leak in mlx5e_init_rep_rx

The memory pointed to by the priv-&gt;rx_res pointer is not freed in the error
path of mlx5e_init_rep_rx, which can lead to a memory leak. Fix by freeing
the memory in the error path, thereby making the error path identical to
mlx5e_cleanup_rep_rx().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54106/">CVE-2023-54106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54106">CVE-2023-54106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256358">SUSE bug 1256358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54108</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54108" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54108" ref_url="https://www.suse.com/security/cve/CVE-2023-54108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix DMA-API call trace on NVMe LS requests

The following message and call trace was seen with debug kernels:

DMA-API: qla2xxx 0000:41:00.0: device driver failed to check map
error [device address=0x00000002a3ff38d8] [size=1024 bytes] [mapped as
single]
WARNING: CPU: 0 PID: 2930 at kernel/dma/debug.c:1017
	 check_unmap+0xf42/0x1990

Call Trace:
	debug_dma_unmap_page+0xc9/0x100
	qla_nvme_ls_unmap+0x141/0x210 [qla2xxx]

Remove DMA mapping from the driver altogether, as it is already done by FC
layer. This prevents the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54108/">CVE-2023-54108 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54108">CVE-2023-54108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256355">SUSE bug 1256355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54117" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54117" ref_url="https://www.suse.com/security/cve/CVE-2023-54117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/dcssblk: fix kernel crash with list_add corruption

Commit fb08a1908cb1 ("dax: simplify the dax_device &lt;-&gt; gendisk
association") introduced new logic for gendisk association, requiring
drivers to explicitly call dax_add_host() and dax_remove_host().

For dcssblk driver, some dax_remove_host() calls were missing, e.g. in
device remove path. The commit also broke error handling for out_dax case
in device add path, resulting in an extra put_device() w/o the previous
get_device() in that case.

This lead to stale xarray entries after device add / remove cycles. In the
case when a previously used struct gendisk pointer (xarray index) would be
used again, because blk_alloc_disk() happened to return such a pointer, the
xa_insert() in dax_add_host() would fail and go to out_dax, doing the extra
put_device() in the error path. In combination with an already flawed error
handling in dcssblk (device_register() cleanup), which needs to be
addressed in a separate patch, this resulted in a missing device_del() /
klist_del(), and eventually in the kernel crash with list_add corruption on
a subsequent device_add() / klist_add().

Fix this by adding the missing dax_remove_host() calls, and also move the
put_device() in the error path to restore the previous logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54117/">CVE-2023-54117 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54117">CVE-2023-54117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256348">SUSE bug 1256348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54120" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54120" ref_url="https://www.suse.com/security/cve/CVE-2023-54120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix race condition in hidp_session_thread

There is a potential race condition in hidp_session_thread that may
lead to use-after-free. For instance, the timer is active while
hidp_del_timer is called in hidp_session_thread(). After hidp_session_put,
then 'session' will be freed, causing kernel panic when hidp_idle_timeout
is running.

The solution is to use del_timer_sync instead of del_timer.

Here is the call trace:

? hidp_session_probe+0x780/0x780
call_timer_fn+0x2d/0x1e0
__run_timers.part.0+0x569/0x940
hidp_session_probe+0x780/0x780
call_timer_fn+0x1e0/0x1e0
ktime_get+0x5c/0xf0
lapic_next_deadline+0x2c/0x40
clockevents_program_event+0x205/0x320
run_timer_softirq+0xa9/0x1b0
__do_softirq+0x1b9/0x641
__irq_exit_rcu+0xdc/0x190
irq_exit_rcu+0xe/0x20
sysvec_apic_timer_interrupt+0xa1/0xc0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54120/">CVE-2023-54120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54120">CVE-2023-54120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256133">SUSE bug 1256133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54123" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54123" ref_url="https://www.suse.com/security/cve/CVE-2023-54123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix memleak for 'conf-&gt;bio_split'

In the error path of raid10_run(), 'conf' need be freed, however,
'conf-&gt;bio_split' is missed and memory will be leaked.

Since there are 3 places to free 'conf', factor out a helper to fix the
problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54123/">CVE-2023-54123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54123">CVE-2023-54123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256142">SUSE bug 1256142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54129" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54129" ref_url="https://www.suse.com/security/cve/CVE-2023-54129" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Add validation for lmac type

Upon physical link change, firmware reports to the kernel about the
change along with the details like speed, lmac_type_id, etc.
Kernel derives lmac_type based on lmac_type_id received from firmware.

In a few scenarios, firmware returns an invalid lmac_type_id, which
is resulting in below kernel panic. This patch adds the missing
validation of the lmac_type_id field.

Internal error: Oops: 96000005 [#1] PREEMPT SMP
[   35.321595] Modules linked in:
[   35.328982] CPU: 0 PID: 31 Comm: kworker/0:1 Not tainted
5.4.210-g2e3169d8e1bc-dirty #17
[   35.337014] Hardware name: Marvell CN103XX board (DT)
[   35.344297] Workqueue: events work_for_cpu_fn
[   35.352730] pstate: 40400089 (nZcv daIf +PAN -UAO)
[   35.360267] pc : strncpy+0x10/0x30
[   35.366595] lr : cgx_link_change_handler+0x90/0x180
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54129/">CVE-2023-54129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54129">CVE-2023-54129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256113">SUSE bug 1256113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54131" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54131" ref_url="https://www.suse.com/security/cve/CVE-2023-54131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rt2x00: Fix memory leak when handling surveys

When removing a rt2x00 device, its associated channel surveys
are not freed, causing a memory leak observable with kmemleak:

unreferenced object 0xffff9620f0881a00 (size 512):
  comm "systemd-udevd", pid 2290, jiffies 4294906974 (age 33.768s)
  hex dump (first 32 bytes):
    70 44 12 00 00 00 00 00 92 8a 00 00 00 00 00 00  pD..............
    00 00 00 00 00 00 00 00 ab 87 01 00 00 00 00 00  ................
  backtrace:
    [&lt;ffffffffb0ed858b&gt;] __kmalloc+0x4b/0x130
    [&lt;ffffffffc1b0f29b&gt;] rt2800_probe_hw+0xc2b/0x1380 [rt2800lib]
    [&lt;ffffffffc1a9496e&gt;] rt2800usb_probe_hw+0xe/0x60 [rt2800usb]
    [&lt;ffffffffc1ae491a&gt;] rt2x00lib_probe_dev+0x21a/0x7d0 [rt2x00lib]
    [&lt;ffffffffc1b3b83e&gt;] rt2x00usb_probe+0x1be/0x980 [rt2x00usb]
    [&lt;ffffffffc05981e2&gt;] usb_probe_interface+0xe2/0x310 [usbcore]
    [&lt;ffffffffb13be2d5&gt;] really_probe+0x1a5/0x410
    [&lt;ffffffffb13be5c8&gt;] __driver_probe_device+0x78/0x180
    [&lt;ffffffffb13be6fe&gt;] driver_probe_device+0x1e/0x90
    [&lt;ffffffffb13be972&gt;] __driver_attach+0xd2/0x1c0
    [&lt;ffffffffb13bbc57&gt;] bus_for_each_dev+0x77/0xd0
    [&lt;ffffffffb13bd2a2&gt;] bus_add_driver+0x112/0x210
    [&lt;ffffffffb13bfc6c&gt;] driver_register+0x5c/0x120
    [&lt;ffffffffc0596ae8&gt;] usb_register_driver+0x88/0x150 [usbcore]
    [&lt;ffffffffb0c011c4&gt;] do_one_initcall+0x44/0x220
    [&lt;ffffffffb0d6134c&gt;] do_init_module+0x4c/0x220

Fix this by freeing the channel surveys on device removal.

Tested with a RT3070 based USB wireless adapter.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54131/">CVE-2023-54131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54131">CVE-2023-54131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256115">SUSE bug 1256115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54135" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54135" ref_url="https://www.suse.com/security/cve/CVE-2023-54135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

maple_tree: fix potential out-of-bounds access in mas_wr_end_piv()

Check the write offset end bounds before using it as the offset into the
pivot array.  This avoids a possible out-of-bounds access on the pivot
array if the write extends to the last slot in the node, in which case the
node maximum should be used as the end pivot.

akpm: this doesn't affect any current callers, but new users of mapletree
may encounter this problem if backported into earlier kernels, so let's
fix it in -stable kernels in case of this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54135/">CVE-2023-54135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54135">CVE-2023-54135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256107">SUSE bug 1256107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54137</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54137" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54137" ref_url="https://www.suse.com/security/cve/CVE-2023-54137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/type1: fix cap_migration information leak

Fix an information leak where an uninitialized hole in struct
vfio_iommu_type1_info_cap_migration on the stack is exposed to userspace.

The definition of struct vfio_iommu_type1_info_cap_migration contains a hole as
shown in this pahole(1) output:

  struct vfio_iommu_type1_info_cap_migration {
          struct vfio_info_cap_header header;              /*     0     8 */
          __u32                      flags;                /*     8     4 */

          /* XXX 4 bytes hole, try to pack */

          __u64                      pgsize_bitmap;        /*    16     8 */
          __u64                      max_dirty_bitmap_size; /*    24     8 */

          /* size: 32, cachelines: 1, members: 4 */
          /* sum members: 28, holes: 1, sum holes: 4 */
          /* last cacheline: 32 bytes */
  };

The cap_mig variable is filled in without initializing the hole:

  static int vfio_iommu_migration_build_caps(struct vfio_iommu *iommu,
                         struct vfio_info_cap *caps)
  {
      struct vfio_iommu_type1_info_cap_migration cap_mig;

      cap_mig.header.id = VFIO_IOMMU_TYPE1_INFO_CAP_MIGRATION;
      cap_mig.header.version = 1;

      cap_mig.flags = 0;
      /* support minimum pgsize */
      cap_mig.pgsize_bitmap = (size_t)1 &lt;&lt; __ffs(iommu-&gt;pgsize_bitmap);
      cap_mig.max_dirty_bitmap_size = DIRTY_BITMAP_SIZE_MAX;

      return vfio_info_add_capability(caps, &amp;cap_mig.header, sizeof(cap_mig));
  }

The structure is then copied to a temporary location on the heap. At this point
it's already too late and ioctl(VFIO_IOMMU_GET_INFO) copies it to userspace
later:

  int vfio_info_add_capability(struct vfio_info_cap *caps,
                   struct vfio_info_cap_header *cap, size_t size)
  {
      struct vfio_info_cap_header *header;

      header = vfio_info_cap_add(caps, size, cap-&gt;id, cap-&gt;version);
      if (IS_ERR(header))
          return PTR_ERR(header);

      memcpy(header + 1, cap + 1, size - sizeof(*header));

      return 0;
  }

This issue was found by code inspection.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54137/">CVE-2023-54137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54137">CVE-2023-54137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256100">SUSE bug 1256100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54141" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54141" ref_url="https://www.suse.com/security/cve/CVE-2023-54141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: Add missing hw_ops-&gt;get_ring_selector() for IPQ5018

During sending data after clients connected, hw_ops-&gt;get_ring_selector()
will be called. But for IPQ5018, this member isn't set, and the
following NULL pointer exception will be occurred:

	[   38.840478] 8&lt;--- cut here ---
	[   38.840517] Unable to handle kernel NULL pointer dereference at virtual address 00000000
	...
	[   38.923161] PC is at 0x0
	[   38.927930] LR is at ath11k_dp_tx+0x70/0x730 [ath11k]
	...
	[   39.063264] Process hostapd (pid: 1034, stack limit = 0x801ceb3d)
	[   39.068994] Stack: (0x856a9a68 to 0x856aa000)
	...
	[   39.438467] [&lt;7f323804&gt;] (ath11k_dp_tx [ath11k]) from [&lt;7f314e6c&gt;] (ath11k_mac_op_tx+0x80/0x190 [ath11k])
	[   39.446607] [&lt;7f314e6c&gt;] (ath11k_mac_op_tx [ath11k]) from [&lt;7f17dbe0&gt;] (ieee80211_handle_wake_tx_queue+0x7c/0xc0 [mac80211])
	[   39.456162] [&lt;7f17dbe0&gt;] (ieee80211_handle_wake_tx_queue [mac80211]) from [&lt;7f174450&gt;] (ieee80211_probereq_get+0x584/0x704 [mac80211])
	[   39.467443] [&lt;7f174450&gt;] (ieee80211_probereq_get [mac80211]) from [&lt;7f178c40&gt;] (ieee80211_tx_prepare_skb+0x1f8/0x248 [mac80211])
	[   39.479334] [&lt;7f178c40&gt;] (ieee80211_tx_prepare_skb [mac80211]) from [&lt;7f179e28&gt;] (__ieee80211_subif_start_xmit+0x32c/0x3d4 [mac80211])
	[   39.491053] [&lt;7f179e28&gt;] (__ieee80211_subif_start_xmit [mac80211]) from [&lt;7f17af08&gt;] (ieee80211_tx_control_port+0x19c/0x288 [mac80211])
	[   39.502946] [&lt;7f17af08&gt;] (ieee80211_tx_control_port [mac80211]) from [&lt;7f0fc704&gt;] (nl80211_tx_control_port+0x174/0x1d4 [cfg80211])
	[   39.515017] [&lt;7f0fc704&gt;] (nl80211_tx_control_port [cfg80211]) from [&lt;808ceac4&gt;] (genl_rcv_msg+0x154/0x340)
	[   39.526814] [&lt;808ceac4&gt;] (genl_rcv_msg) from [&lt;808cdb74&gt;] (netlink_rcv_skb+0xb8/0x11c)
	[   39.536446] [&lt;808cdb74&gt;] (netlink_rcv_skb) from [&lt;808ce1d0&gt;] (genl_rcv+0x28/0x34)
	[   39.544344] [&lt;808ce1d0&gt;] (genl_rcv) from [&lt;808cd234&gt;] (netlink_unicast+0x174/0x274)
	[   39.551895] [&lt;808cd234&gt;] (netlink_unicast) from [&lt;808cd510&gt;] (netlink_sendmsg+0x1dc/0x440)
	[   39.559362] [&lt;808cd510&gt;] (netlink_sendmsg) from [&lt;808596e0&gt;] (____sys_sendmsg+0x1a8/0x1fc)
	[   39.567697] [&lt;808596e0&gt;] (____sys_sendmsg) from [&lt;8085b1a8&gt;] (___sys_sendmsg+0xa4/0xdc)
	[   39.575941] [&lt;8085b1a8&gt;] (___sys_sendmsg) from [&lt;8085b310&gt;] (sys_sendmsg+0x44/0x74)
	[   39.583841] [&lt;8085b310&gt;] (sys_sendmsg) from [&lt;80300060&gt;] (ret_fast_syscall+0x0/0x40)
	...
	[   39.620734] Code: bad PC value
	[   39.625869] ---[ end trace 8aef983ad3cbc032 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54141/">CVE-2023-54141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54141">CVE-2023-54141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256094">SUSE bug 1256094</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54144" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54144" ref_url="https://www.suse.com/security/cve/CVE-2023-54144" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix kernel warning during topology setup

This patch fixes the following kernel warning seen during
driver load by correctly initializing the p2plink attr before
creating the sysfs file:

[  +0.002865] ------------[ cut here ]------------
[  +0.002327] kobject: '(null)' (0000000056260cfb): is not initialized, yet kobject_put() is being called.
[  +0.004780] WARNING: CPU: 32 PID: 1006 at lib/kobject.c:718 kobject_put+0xaa/0x1c0
[  +0.001361] Call Trace:
[  +0.001234]  &lt;TASK&gt;
[  +0.001067]  kfd_remove_sysfs_node_entry+0x24a/0x2d0 [amdgpu]
[  +0.003147]  kfd_topology_update_sysfs+0x3d/0x750 [amdgpu]
[  +0.002890]  kfd_topology_add_device+0xbd7/0xc70 [amdgpu]
[  +0.002844]  ? lock_release+0x13c/0x2e0
[  +0.001936]  ? smu_cmn_send_smc_msg_with_param+0x1e8/0x2d0 [amdgpu]
[  +0.003313]  ? amdgpu_dpm_get_mclk+0x54/0x60 [amdgpu]
[  +0.002703]  kgd2kfd_device_init.cold+0x39f/0x4ed [amdgpu]
[  +0.002930]  amdgpu_amdkfd_device_init+0x13d/0x1f0 [amdgpu]
[  +0.002944]  amdgpu_device_init.cold+0x1464/0x17b4 [amdgpu]
[  +0.002970]  ? pci_bus_read_config_word+0x43/0x80
[  +0.002380]  amdgpu_driver_load_kms+0x15/0x100 [amdgpu]
[  +0.002744]  amdgpu_pci_probe+0x147/0x370 [amdgpu]
[  +0.002522]  local_pci_probe+0x40/0x80
[  +0.001896]  work_for_cpu_fn+0x10/0x20
[  +0.001892]  process_one_work+0x26e/0x5a0
[  +0.002029]  worker_thread+0x1fd/0x3e0
[  +0.001890]  ? process_one_work+0x5a0/0x5a0
[  +0.002115]  kthread+0xea/0x110
[  +0.001618]  ? kthread_complete_and_exit+0x20/0x20
[  +0.002422]  ret_from_fork+0x1f/0x30
[  +0.001808]  &lt;/TASK&gt;
[  +0.001103] irq event stamp: 59837
[  +0.001718] hardirqs last  enabled at (59849): [&lt;ffffffffb30fab12&gt;] __up_console_sem+0x52/0x60
[  +0.004414] hardirqs last disabled at (59860): [&lt;ffffffffb30faaf7&gt;] __up_console_sem+0x37/0x60
[  +0.004414] softirqs last  enabled at (59654): [&lt;ffffffffb307d9c7&gt;] irq_exit_rcu+0xd7/0x130
[  +0.004205] softirqs last disabled at (59649): [&lt;ffffffffb307d9c7&gt;] irq_exit_rcu+0xd7/0x130
[  +0.004203] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54144/">CVE-2023-54144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54144">CVE-2023-54144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256088">SUSE bug 1256088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54145" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54145" ref_url="https://www.suse.com/security/cve/CVE-2023-54145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: drop unnecessary user-triggerable WARN_ONCE in verifierl log

It's trivial for user to trigger "verifier log line truncated" warning,
as verifier has a fixed-sized buffer of 1024 bytes (as of now), and there are at
least two pieces of user-provided information that can be output through
this buffer, and both can be arbitrarily sized by user:
  - BTF names;
  - BTF.ext source code lines strings.

Verifier log buffer should be properly sized for typical verifier state
output. But it's sort-of expected that this buffer won't be long enough
in some circumstances. So let's drop the check. In any case code will
work correctly, at worst truncating a part of a single line output.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54145/">CVE-2023-54145 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54145">CVE-2023-54145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256090">SUSE bug 1256090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54148</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54148" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54148" ref_url="https://www.suse.com/security/cve/CVE-2023-54148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Move representor neigh cleanup to profile cleanup_tx

For IP tunnel encapsulation in ECMP (Equal-Cost Multipath) mode, as
the flow is duplicated to the peer eswitch, the related neighbour
information on the peer uplink representor is created as well.

In the cited commit, eswitch devcom unpair is moved to uplink unload
API, specifically the profile-&gt;cleanup_tx. If there is a encap rule
offloaded in ECMP mode, when one eswitch does unpair (because of
unloading the driver, for instance), and the peer rule from the peer
eswitch is going to be deleted, the use-after-free error is triggered
while accessing neigh info, as it is already cleaned up in uplink's
profile-&gt;disable, which is before its profile-&gt;cleanup_tx.

To fix this issue, move the neigh cleanup to profile's cleanup_tx
callback, and after mlx5e_cleanup_uplink_rep_tx is called. The neigh
init is moved to init_tx for symmeter.

[ 2453.376299] BUG: KASAN: slab-use-after-free in mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]
[ 2453.379125] Read of size 4 at addr ffff888127af9008 by task modprobe/2496

[ 2453.381542] CPU: 7 PID: 2496 Comm: modprobe Tainted: G    B              6.4.0-rc7+ #15
[ 2453.383386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 2453.384335] Call Trace:
[ 2453.384625]  &lt;TASK&gt;
[ 2453.384891]  dump_stack_lvl+0x33/0x50
[ 2453.385285]  print_report+0xc2/0x610
[ 2453.385667]  ? __virt_addr_valid+0xb1/0x130
[ 2453.386091]  ? mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]
[ 2453.386757]  kasan_report+0xae/0xe0
[ 2453.387123]  ? mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]
[ 2453.387798]  mlx5e_rep_neigh_entry_release+0x109/0x3a0 [mlx5_core]
[ 2453.388465]  mlx5e_rep_encap_entry_detach+0xa6/0xe0 [mlx5_core]
[ 2453.389111]  mlx5e_encap_dealloc+0xa7/0x100 [mlx5_core]
[ 2453.389706]  mlx5e_tc_tun_encap_dests_unset+0x61/0xb0 [mlx5_core]
[ 2453.390361]  mlx5_free_flow_attr_actions+0x11e/0x340 [mlx5_core]
[ 2453.391015]  ? complete_all+0x43/0xd0
[ 2453.391398]  ? free_flow_post_acts+0x38/0x120 [mlx5_core]
[ 2453.392004]  mlx5e_tc_del_fdb_flow+0x4ae/0x690 [mlx5_core]
[ 2453.392618]  mlx5e_tc_del_fdb_peers_flow+0x308/0x370 [mlx5_core]
[ 2453.393276]  mlx5e_tc_clean_fdb_peer_flows+0xf5/0x140 [mlx5_core]
[ 2453.393925]  mlx5_esw_offloads_unpair+0x86/0x540 [mlx5_core]
[ 2453.394546]  ? mlx5_esw_offloads_set_ns_peer.isra.0+0x180/0x180 [mlx5_core]
[ 2453.395268]  ? down_write+0xaa/0x100
[ 2453.395652]  mlx5_esw_offloads_devcom_event+0x203/0x530 [mlx5_core]
[ 2453.396317]  mlx5_devcom_send_event+0xbb/0x190 [mlx5_core]
[ 2453.396917]  mlx5_esw_offloads_devcom_cleanup+0xb0/0xd0 [mlx5_core]
[ 2453.397582]  mlx5e_tc_esw_cleanup+0x42/0x120 [mlx5_core]
[ 2453.398182]  mlx5e_rep_tc_cleanup+0x15/0x30 [mlx5_core]
[ 2453.398768]  mlx5e_cleanup_rep_tx+0x6c/0x80 [mlx5_core]
[ 2453.399367]  mlx5e_detach_netdev+0xee/0x120 [mlx5_core]
[ 2453.399957]  mlx5e_netdev_change_profile+0x84/0x170 [mlx5_core]
[ 2453.400598]  mlx5e_vport_rep_unload+0xe0/0xf0 [mlx5_core]
[ 2453.403781]  mlx5_eswitch_unregister_vport_reps+0x15e/0x190 [mlx5_core]
[ 2453.404479]  ? mlx5_eswitch_register_vport_reps+0x200/0x200 [mlx5_core]
[ 2453.405170]  ? up_write+0x39/0x60
[ 2453.405529]  ? kernfs_remove_by_name_ns+0xb7/0xe0
[ 2453.405985]  auxiliary_bus_remove+0x2e/0x40
[ 2453.406405]  device_release_driver_internal+0x243/0x2d0
[ 2453.406900]  ? kobject_put+0x42/0x2d0
[ 2453.407284]  bus_remove_device+0x128/0x1d0
[ 2453.407687]  device_del+0x240/0x550
[ 2453.408053]  ? waiting_for_supplier_show+0xe0/0xe0
[ 2453.408511]  ? kobject_put+0xfa/0x2d0
[ 2453.408889]  ? __kmem_cache_free+0x14d/0x280
[ 2453.409310]  mlx5_rescan_drivers_locked.part.0+0xcd/0x2b0 [mlx5_core]
[ 2453.409973]  mlx5_unregister_device+0x40/0x50 [mlx5_core]
[ 2453.410561]  mlx5_uninit_one+0x3d/0x110 [mlx5_core]
[ 2453.411111]  remove_one+0x89/0x130 [mlx5_core]
[ 24
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54148/">CVE-2023-54148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54148">CVE-2023-54148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256084">SUSE bug 1256084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54153" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54153" ref_url="https://www.suse.com/security/cve/CVE-2023-54153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: turn quotas off if mount failed after enabling quotas

Yi found during a review of the patch "ext4: don't BUG on inconsistent
journal feature" that when ext4_mark_recovery_complete() returns an error
value, the error handling path does not turn off the enabled quotas,
which triggers the following kmemleak:

================================================================
unreferenced object 0xffff8cf68678e7c0 (size 64):
comm "mount", pid 746, jiffies 4294871231 (age 11.540s)
hex dump (first 32 bytes):
00 90 ef 82 f6 8c ff ff 00 00 00 00 41 01 00 00  ............A...
c7 00 00 00 bd 00 00 00 0a 00 00 00 48 00 00 00  ............H...
backtrace:
[&lt;00000000c561ef24&gt;] __kmem_cache_alloc_node+0x4d4/0x880
[&lt;00000000d4e621d7&gt;] kmalloc_trace+0x39/0x140
[&lt;00000000837eee74&gt;] v2_read_file_info+0x18a/0x3a0
[&lt;0000000088f6c877&gt;] dquot_load_quota_sb+0x2ed/0x770
[&lt;00000000340a4782&gt;] dquot_load_quota_inode+0xc6/0x1c0
[&lt;0000000089a18bd5&gt;] ext4_enable_quotas+0x17e/0x3a0 [ext4]
[&lt;000000003a0268fa&gt;] __ext4_fill_super+0x3448/0x3910 [ext4]
[&lt;00000000b0f2a8a8&gt;] ext4_fill_super+0x13d/0x340 [ext4]
[&lt;000000004a9489c4&gt;] get_tree_bdev+0x1dc/0x370
[&lt;000000006e723bf1&gt;] ext4_get_tree+0x1d/0x30 [ext4]
[&lt;00000000c7cb663d&gt;] vfs_get_tree+0x31/0x160
[&lt;00000000320e1bed&gt;] do_new_mount+0x1d5/0x480
[&lt;00000000c074654c&gt;] path_mount+0x22e/0xbe0
[&lt;0000000003e97a8e&gt;] do_mount+0x95/0xc0
[&lt;000000002f3d3736&gt;] __x64_sys_mount+0xc4/0x160
[&lt;0000000027d2140c&gt;] do_syscall_64+0x3f/0x90
================================================================

To solve this problem, we add a "failed_mount10" tag, and call
ext4_quota_off_umount() in this tag to release the enabled qoutas.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54153/">CVE-2023-54153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54153">CVE-2023-54153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256081">SUSE bug 1256081</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54154" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54154" ref_url="https://www.suse.com/security/cve/CVE-2023-54154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Fix target_cmd_counter leak

The target_cmd_counter struct allocated via target_alloc_cmd_counter() is
never freed, resulting in leaks across various transport types, e.g.:

 unreferenced object 0xffff88801f920120 (size 96):
  comm "sh", pid 102, jiffies 4294892535 (age 713.412s)
  hex dump (first 32 bytes):
    07 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 38 01 92 1f 80 88 ff ff  ........8.......
  backtrace:
    [&lt;00000000e58a6252&gt;] kmalloc_trace+0x11/0x20
    [&lt;0000000043af4b2f&gt;] target_alloc_cmd_counter+0x17/0x90 [target_core_mod]
    [&lt;000000007da2dfa7&gt;] target_setup_session+0x2d/0x140 [target_core_mod]
    [&lt;0000000068feef86&gt;] tcm_loop_tpg_nexus_store+0x19b/0x350 [tcm_loop]
    [&lt;000000006a80e021&gt;] configfs_write_iter+0xb1/0x120
    [&lt;00000000e9f4d860&gt;] vfs_write+0x2e4/0x3c0
    [&lt;000000008143433b&gt;] ksys_write+0x80/0xb0
    [&lt;00000000a7df29b2&gt;] do_syscall_64+0x42/0x90
    [&lt;0000000053f45fb8&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0xd8

Free the structure alongside the corresponding iscsit_conn / se_sess
parent.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54154/">CVE-2023-54154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54154">CVE-2023-54154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256082">SUSE bug 1256082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54155" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54155" ref_url="https://www.suse.com/security/cve/CVE-2023-54155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail()

Syzkaller reported the following issue:
=======================================
Too BIG xdp-&gt;frame_sz = 131072
WARNING: CPU: 0 PID: 5020 at net/core/filter.c:4121
  ____bpf_xdp_adjust_tail net/core/filter.c:4121 [inline]
WARNING: CPU: 0 PID: 5020 at net/core/filter.c:4121
  bpf_xdp_adjust_tail+0x466/0xa10 net/core/filter.c:4103
...
Call Trace:
 &lt;TASK&gt;
 bpf_prog_4add87e5301a4105+0x1a/0x1c
 __bpf_prog_run include/linux/filter.h:600 [inline]
 bpf_prog_run_xdp include/linux/filter.h:775 [inline]
 bpf_prog_run_generic_xdp+0x57e/0x11e0 net/core/dev.c:4721
 netif_receive_generic_xdp net/core/dev.c:4807 [inline]
 do_xdp_generic+0x35c/0x770 net/core/dev.c:4866
 tun_get_user+0x2340/0x3ca0 drivers/net/tun.c:1919
 tun_chr_write_iter+0xe8/0x210 drivers/net/tun.c:2043
 call_write_iter include/linux/fs.h:1871 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x650/0xe40 fs/read_write.c:584
 ksys_write+0x12f/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

xdp-&gt;frame_sz &gt; PAGE_SIZE check was introduced in commit c8741e2bfe87
("xdp: Allow bpf_xdp_adjust_tail() to grow packet size"). But Jesper
Dangaard Brouer &lt;jbrouer@redhat.com&gt; noted that after introducing the
xdp_init_buff() which all XDP driver use - it's safe to remove this
check. The original intend was to catch cases where XDP drivers have
not been updated to use xdp.frame_sz, but that is not longer a concern
(since xdp_init_buff).

Running the initial syzkaller repro it was discovered that the
contiguous physical memory allocation is used for both xdp paths in
tun_get_user(), e.g. tun_build_skb() and tun_alloc_skb(). It was also
stated by Jesper Dangaard Brouer &lt;jbrouer@redhat.com&gt; that XDP can
work on higher order pages, as long as this is contiguous physical
memory (e.g. a page).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54155/">CVE-2023-54155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54155">CVE-2023-54155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256083">SUSE bug 1256083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54156" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54156" ref_url="https://www.suse.com/security/cve/CVE-2023-54156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sfc: fix crash when reading stats while NIC is resetting

efx_net_stats() (.ndo_get_stats64) can be called during an ethtool
 selftest, during which time nic_data-&gt;mc_stats is NULL as the NIC has
 been fini'd.  In this case do not attempt to fetch the latest stats
 from the hardware, else we will crash on a NULL dereference:
    BUG: kernel NULL pointer dereference, address: 0000000000000038
    RIP efx_nic_update_stats
    abridged calltrace:
    efx_ef10_update_stats_pf
    efx_net_stats
    dev_get_stats
    dev_seq_printf_stats
Skipping the read is safe, we will simply give out stale stats.
To ensure that the free in efx_ef10_fini_nic() does not race against
 efx_ef10_update_stats_pf(), which could cause a TOCTTOU bug, take the
 efx-&gt;stats_lock in fini_nic (it is already held across update_stats).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54156/">CVE-2023-54156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54156">CVE-2023-54156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255704">SUSE bug 1255704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54160" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54160" ref_url="https://www.suse.com/security/cve/CVE-2023-54160" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_sdei: Fix sleep from invalid context BUG

Running a preempt-rt (v6.2-rc3-rt1) based kernel on an Ampere Altra
triggers:

  BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46
  in_atomic(): 0, irqs_disabled(): 128, non_block: 0, pid: 24, name: cpuhp/0
  preempt_count: 0, expected: 0
  RCU nest depth: 0, expected: 0
  3 locks held by cpuhp/0/24:
    #0: ffffda30217c70d0 (cpu_hotplug_lock){++++}-{0:0}, at: cpuhp_thread_fun+0x5c/0x248
    #1: ffffda30217c7120 (cpuhp_state-up){+.+.}-{0:0}, at: cpuhp_thread_fun+0x5c/0x248
    #2: ffffda3021c711f0 (sdei_list_lock){....}-{3:3}, at: sdei_cpuhp_up+0x3c/0x130
  irq event stamp: 36
  hardirqs last  enabled at (35): [&lt;ffffda301e85b7bc&gt;] finish_task_switch+0xb4/0x2b0
  hardirqs last disabled at (36): [&lt;ffffda301e812fec&gt;] cpuhp_thread_fun+0x21c/0x248
  softirqs last  enabled at (0): [&lt;ffffda301e80b184&gt;] copy_process+0x63c/0x1ac0
  softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
  CPU: 0 PID: 24 Comm: cpuhp/0 Not tainted 5.19.0-rc3-rt5-[...]
  Hardware name: WIWYNN Mt.Jade Server [...]
  Call trace:
    dump_backtrace+0x114/0x120
    show_stack+0x20/0x70
    dump_stack_lvl+0x9c/0xd8
    dump_stack+0x18/0x34
    __might_resched+0x188/0x228
    rt_spin_lock+0x70/0x120
    sdei_cpuhp_up+0x3c/0x130
    cpuhp_invoke_callback+0x250/0xf08
    cpuhp_thread_fun+0x120/0x248
    smpboot_thread_fn+0x280/0x320
    kthread+0x130/0x140
    ret_from_fork+0x10/0x20

sdei_cpuhp_up() is called in the STARTING hotplug section,
which runs with interrupts disabled. Use a CPUHP_AP_ONLINE_DYN entry
instead to execute the cpuhp cb later, with preemption enabled.

SDEI originally got its own cpuhp slot to allow interacting
with perf. It got superseded by pNMI and this early slot is not
relevant anymore. [1]

Some SDEI calls (e.g. SDEI_1_0_FN_SDEI_PE_MASK) take actions on the
calling CPU. It is checked that preemption is disabled for them.
_ONLINE cpuhp cb are executed in the 'per CPU hotplug thread'.
Preemption is enabled in those threads, but their cpumask is limited
to 1 CPU.
Move 'WARN_ON_ONCE(preemptible())' statements so that SDEI cpuhp cb
don't trigger them.

Also add a check for the SDEI_1_0_FN_SDEI_PRIVATE_RESET SDEI call
which acts on the calling CPU.

[1]:
https://lore.kernel.org/all/5813b8c5-ae3e-87fd-fccc-94c9cd08816d@arm.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54160/">CVE-2023-54160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54160">CVE-2023-54160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256077">SUSE bug 1256077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54166" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54166" ref_url="https://www.suse.com/security/cve/CVE-2023-54166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: Fix Kernel Panic during ndo_tx_timeout callback

The Xeon validation group has been carrying out some loaded tests
with various HW configurations, and they have seen some transmit
queue time out happening during the test. This will cause the
reset adapter function to be called by igc_tx_timeout().
Similar race conditions may arise when the interface is being brought
down and up in igc_reinit_locked(), an interrupt being generated, and
igc_clean_tx_irq() being called to complete the TX.

When the igc_tx_timeout() function is invoked, this patch will turn
off all TX ring HW queues during igc_down() process. TX ring HW queues
will be activated again during the igc_configure_tx_ring() process
when performing the igc_up() procedure later.

This patch also moved existing igc_disable_tx_ring_hw() to avoid using
forward declaration.

Kernel trace:
[ 7678.747813] ------------[ cut here ]------------
[ 7678.757914] NETDEV WATCHDOG: enp1s0 (igc): transmit queue 2 timed out
[ 7678.770117] WARNING: CPU: 0 PID: 13 at net/sched/sch_generic.c:525 dev_watchdog+0x1ae/0x1f0
[ 7678.784459] Modules linked in: xt_conntrack nft_chain_nat xt_MASQUERADE xt_addrtype nft_compat
nf_tables nfnetlink br_netfilter bridge stp llc overlay dm_mod emrcha(PO) emriio(PO) rktpm(PO)
cegbuf_mod(PO) patch_update(PO) se(PO) sgx_tgts(PO) mktme(PO) keylocker(PO) svtdx(PO) svfs_pci_hotplug(PO)
vtd_mod(PO) davemem(PO) svmabort(PO) svindexio(PO) usbx2(PO) ehci_sched(PO) svheartbeat(PO) ioapic(PO)
sv8259(PO) svintr(PO) lt(PO) pcierootport(PO) enginefw_mod(PO) ata(PO) smbus(PO) spiflash_cdf(PO) arden(PO)
dsa_iax(PO) oobmsm_punit(PO) cpm(PO) svkdb(PO) ebg_pch(PO) pch(PO) sviotargets(PO) svbdf(PO) svmem(PO)
svbios(PO) dram(PO) svtsc(PO) targets(PO) superio(PO) svkernel(PO) cswitch(PO) mcf(PO) pentiumIII_mod(PO)
fs_svfs(PO) mdevdefdb(PO) svfs_os_services(O) ixgbe mdio mdio_devres libphy emeraldrapids_svdefs(PO)
regsupport(O) libnvdimm nls_cp437 snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_intel
snd_intel_dspcfg snd_hda_codec snd_hwdep x86_pkg_temp_thermal snd_hda_core snd_pcm snd_timer isst_if_mbox_pci
[ 7678.784496]  input_leds isst_if_mmio sg snd isst_if_common soundcore wmi button sad9(O) drm fuse backlight
configfs efivarfs ip_tables x_tables vmd sdhci led_class rtl8150 r8152 hid_generic pegasus mmc_block usbhid
mmc_core hid megaraid_sas ixgb igb i2c_algo_bit ice i40e hpsa scsi_transport_sas e1000e e1000 e100 ax88179_178a
usbnet xhci_pci sd_mod xhci_hcd t10_pi crc32c_intel crc64_rocksoft igc crc64 crc_t10dif usbcore
crct10dif_generic ptp crct10dif_common usb_common pps_core
[ 7679.200403] RIP: 0010:dev_watchdog+0x1ae/0x1f0
[ 7679.210201] Code: 28 e9 53 ff ff ff 4c 89 e7 c6 05 06 42 b9 00 01 e8 17 d1 fb ff 44 89 e9 4c
89 e6 48 c7 c7 40 ad fb 81 48 89 c2 e8 52 62 82 ff &lt;0f&gt; 0b e9 72 ff ff ff 65 8b 05 80 7d 7c 7e
89 c0 48 0f a3 05 0a c1
[ 7679.245438] RSP: 0018:ffa00000001f7d90 EFLAGS: 00010282
[ 7679.256021] RAX: 0000000000000000 RBX: ff11000109938440 RCX: 0000000000000000
[ 7679.268710] RDX: ff11000361e26cd8 RSI: ff11000361e1b880 RDI: ff11000361e1b880
[ 7679.281314] RBP: ffa00000001f7da8 R08: ff1100035f8fffe8 R09: 0000000000027ffb
[ 7679.293840] R10: 0000000000001f0a R11: ff1100035f840000 R12: ff11000109938000
[ 7679.306276] R13: 0000000000000002 R14: dead000000000122 R15: ffa00000001f7e18
[ 7679.318648] FS:  0000000000000000(0000) GS:ff11000361e00000(0000) knlGS:0000000000000000
[ 7679.332064] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 7679.342757] CR2: 00007ffff7fca168 CR3: 000000013b08a006 CR4: 0000000000471ef8
[ 7679.354984] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 7679.367207] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 7679.379370] PKRU: 55555554
[ 7679.386446] Call Trace:
[ 7679.393152]  &lt;TASK&gt;
[ 7679.399363]  ? __pfx_dev_watchdog+0x10/0x10
[ 7679.407870]  call_timer_fn+0x31/0x110
[ 7679.415698]  e
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54166/">CVE-2023-54166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54166">CVE-2023-54166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256074">SUSE bug 1256074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54169" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54169" ref_url="https://www.suse.com/security/cve/CVE-2023-54169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: fix memory leak in mlx5e_ptp_open

When kvzalloc_node or kvzalloc failed in mlx5e_ptp_open, the memory
pointed by "c" or "cparams" is not freed, which can lead to a memory
leak. Fix by freeing the array in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54169/">CVE-2023-54169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54169">CVE-2023-54169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256050">SUSE bug 1256050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54170</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54170" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54170" ref_url="https://www.suse.com/security/cve/CVE-2023-54170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

keys: Fix linking a duplicate key to a keyring's assoc_array

When making a DNS query inside the kernel using dns_query(), the request
code can in rare cases end up creating a duplicate index key in the
assoc_array of the destination keyring. It is eventually found by
a BUG_ON() check in the assoc_array implementation and results in
a crash.

Example report:
[2158499.700025] kernel BUG at ../lib/assoc_array.c:652!
[2158499.700039] invalid opcode: 0000 [#1] SMP PTI
[2158499.700065] CPU: 3 PID: 31985 Comm: kworker/3:1 Kdump: loaded Not tainted 5.3.18-150300.59.90-default #1 SLE15-SP3
[2158499.700096] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
[2158499.700351] Workqueue: cifsiod cifs_resolve_server [cifs]
[2158499.700380] RIP: 0010:assoc_array_insert+0x85f/0xa40
[2158499.700401] Code: ff 74 2b 48 8b 3b 49 8b 45 18 4c 89 e6 48 83 e7 fe e8 95 ec 74 00 3b 45 88 7d db 85 c0 79 d4 0f 0b 0f 0b 0f 0b e8 41 f2 be ff &lt;0f&gt; 0b 0f 0b 81 7d 88 ff ff ff 7f 4c 89 eb 4c 8b ad 58 ff ff ff 0f
[2158499.700448] RSP: 0018:ffffc0bd6187faf0 EFLAGS: 00010282
[2158499.700470] RAX: ffff9f1ea7da2fe8 RBX: ffff9f1ea7da2fc1 RCX: 0000000000000005
[2158499.700492] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000000
[2158499.700515] RBP: ffffc0bd6187fbb0 R08: ffff9f185faf1100 R09: 0000000000000000
[2158499.700538] R10: ffff9f1ea7da2cc0 R11: 000000005ed8cec8 R12: ffffc0bd6187fc28
[2158499.700561] R13: ffff9f15feb8d000 R14: ffff9f1ea7da2fc0 R15: ffff9f168dc0d740
[2158499.700585] FS:  0000000000000000(0000) GS:ffff9f185fac0000(0000) knlGS:0000000000000000
[2158499.700610] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[2158499.700630] CR2: 00007fdd94fca238 CR3: 0000000809d8c006 CR4: 00000000003706e0
[2158499.700702] Call Trace:
[2158499.700741]  ? key_alloc+0x447/0x4b0
[2158499.700768]  ? __key_link_begin+0x43/0xa0
[2158499.700790]  __key_link_begin+0x43/0xa0
[2158499.700814]  request_key_and_link+0x2c7/0x730
[2158499.700847]  ? dns_resolver_read+0x20/0x20 [dns_resolver]
[2158499.700873]  ? key_default_cmp+0x20/0x20
[2158499.700898]  request_key_tag+0x43/0xa0
[2158499.700926]  dns_query+0x114/0x2ca [dns_resolver]
[2158499.701127]  dns_resolve_server_name_to_ip+0x194/0x310 [cifs]
[2158499.701164]  ? scnprintf+0x49/0x90
[2158499.701190]  ? __switch_to_asm+0x40/0x70
[2158499.701211]  ? __switch_to_asm+0x34/0x70
[2158499.701405]  reconn_set_ipaddr_from_hostname+0x81/0x2a0 [cifs]
[2158499.701603]  cifs_resolve_server+0x4b/0xd0 [cifs]
[2158499.701632]  process_one_work+0x1f8/0x3e0
[2158499.701658]  worker_thread+0x2d/0x3f0
[2158499.701682]  ? process_one_work+0x3e0/0x3e0
[2158499.701703]  kthread+0x10d/0x130
[2158499.701723]  ? kthread_park+0xb0/0xb0
[2158499.701746]  ret_from_fork+0x1f/0x40

The situation occurs as follows:
* Some kernel facility invokes dns_query() to resolve a hostname, for
  example, "abcdef". The function registers its global DNS resolver
  cache as current-&gt;cred.thread_keyring and passes the query to
  request_key_net() -&gt; request_key_tag() -&gt; request_key_and_link().
* Function request_key_and_link() creates a keyring_search_context
  object. Its match_data.cmp method gets set via a call to
  type-&gt;match_preparse() (resolves to dns_resolver_match_preparse()) to
  dns_resolver_cmp().
* Function request_key_and_link() continues and invokes
  search_process_keyrings_rcu() which returns that a given key was not
  found. The control is then passed to request_key_and_link() -&gt;
  construct_alloc_key().
* Concurrently to that, a second task similarly makes a DNS query for
  "abcdef." and its result gets inserted into the DNS resolver cache.
* Back on the first task, function construct_alloc_key() first runs
  __key_link_begin() to determine an assoc_array_edit operation to
  insert a new key. Index keys in the array are compared exactly as-is,
  using keyring_compare_object(). The operation 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54170/">CVE-2023-54170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54170">CVE-2023-54170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256045">SUSE bug 1256045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54173</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54173" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54173" ref_url="https://www.suse.com/security/cve/CVE-2023-54173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Disable preemption in bpf_event_output

We received report [1] of kernel crash, which is caused by
using nesting protection without disabled preemption.

The bpf_event_output can be called by programs executed by
bpf_prog_run_array_cg function that disabled migration but
keeps preemption enabled.

This can cause task to be preempted by another one inside the
nesting protection and lead eventually to two tasks using same
perf_sample_data buffer and cause crashes like:

  BUG: kernel NULL pointer dereference, address: 0000000000000001
  #PF: supervisor instruction fetch in kernel mode
  #PF: error_code(0x0010) - not-present page
  ...
  ? perf_output_sample+0x12a/0x9a0
  ? finish_task_switch.isra.0+0x81/0x280
  ? perf_event_output+0x66/0xa0
  ? bpf_event_output+0x13a/0x190
  ? bpf_event_output_data+0x22/0x40
  ? bpf_prog_dfc84bbde731b257_cil_sock4_connect+0x40a/0xacb
  ? xa_load+0x87/0xe0
  ? __cgroup_bpf_run_filter_sock_addr+0xc1/0x1a0
  ? release_sock+0x3e/0x90
  ? sk_setsockopt+0x1a1/0x12f0
  ? udp_pre_connect+0x36/0x50
  ? inet_dgram_connect+0x93/0xa0
  ? __sys_connect+0xb4/0xe0
  ? udp_setsockopt+0x27/0x40
  ? __pfx_udp_push_pending_frames+0x10/0x10
  ? __sys_setsockopt+0xdf/0x1a0
  ? __x64_sys_connect+0xf/0x20
  ? do_syscall_64+0x3a/0x90
  ? entry_SYSCALL_64_after_hwframe+0x72/0xdc

Fixing this by disabling preemption in bpf_event_output.

[1] https://github.com/cilium/cilium/issues/26756
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54173/">CVE-2023-54173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54173">CVE-2023-54173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255996">SUSE bug 1255996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54174</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54174" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54174" ref_url="https://www.suse.com/security/cve/CVE-2023-54174" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio: Fix NULL pointer dereference caused by uninitialized group-&gt;iommufd

group-&gt;iommufd is not initialized for the iommufd_ctx_put()

[20018.331541] BUG: kernel NULL pointer dereference, address: 0000000000000000
[20018.377508] RIP: 0010:iommufd_ctx_put+0x5/0x10 [iommufd]
...
[20018.476483] Call Trace:
[20018.479214]  &lt;TASK&gt;
[20018.481555]  vfio_group_fops_unl_ioctl+0x506/0x690 [vfio]
[20018.487586]  __x64_sys_ioctl+0x6a/0xb0
[20018.491773]  ? trace_hardirqs_on+0xc5/0xe0
[20018.496347]  do_syscall_64+0x67/0x90
[20018.500340]  entry_SYSCALL_64_after_hwframe+0x4b/0xb5
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54174/">CVE-2023-54174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54174">CVE-2023-54174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255997">SUSE bug 1255997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54176" ref_url="https://www.suse.com/security/cve/CVE-2023-54176" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: stricter state check in mptcp_worker

As reported by Christoph, the mptcp protocol can run the
worker when the relevant msk socket is in an unexpected state:

connect()
// incoming reset + fastclose
// the mptcp worker is scheduled
mptcp_disconnect()
// msk is now CLOSED
listen()
mptcp_worker()

Leading to the following splat:

divide error: 0000 [#1] PREEMPT SMP
CPU: 1 PID: 21 Comm: kworker/1:0 Not tainted 6.3.0-rc1-gde5e8fd0123c #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
Workqueue: events mptcp_worker
RIP: 0010:__tcp_select_window+0x22c/0x4b0 net/ipv4/tcp_output.c:3018
RSP: 0018:ffffc900000b3c98 EFLAGS: 00010293
RAX: 000000000000ffd7 RBX: 000000000000ffd7 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffffffff8214ce97 RDI: 0000000000000004
RBP: 000000000000ffd7 R08: 0000000000000004 R09: 0000000000010000
R10: 000000000000ffd7 R11: ffff888005afa148 R12: 000000000000ffd7
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88803ed00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000405270 CR3: 000000003011e006 CR4: 0000000000370ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 tcp_select_window net/ipv4/tcp_output.c:262 [inline]
 __tcp_transmit_skb+0x356/0x1280 net/ipv4/tcp_output.c:1345
 tcp_transmit_skb net/ipv4/tcp_output.c:1417 [inline]
 tcp_send_active_reset+0x13e/0x320 net/ipv4/tcp_output.c:3459
 mptcp_check_fastclose net/mptcp/protocol.c:2530 [inline]
 mptcp_worker+0x6c7/0x800 net/mptcp/protocol.c:2705
 process_one_work+0x3bd/0x950 kernel/workqueue.c:2390
 worker_thread+0x5b/0x610 kernel/workqueue.c:2537
 kthread+0x138/0x170 kernel/kthread.c:376
 ret_from_fork+0x2c/0x50 arch/x86/entry/entry_64.S:308
 &lt;/TASK&gt;

This change addresses the issue explicitly checking for bad states
before running the mptcp worker.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54176/">CVE-2023-54176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54176">CVE-2023-54176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255999">SUSE bug 1255999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54179" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54179" ref_url="https://www.suse.com/security/cve/CVE-2023-54179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Array index may go out of bound

Klocwork reports array 'vha-&gt;host_str' of size 16 may use index value(s)
16..19.  Use snprintf() instead of sprintf().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54179/">CVE-2023-54179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54179">CVE-2023-54179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255994">SUSE bug 1255994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54184" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54184" ref_url="https://www.suse.com/security/cve/CVE-2023-54184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsit: Free cmds before session free

Commands from recovery entries are freed after session has been closed.
That leads to use-after-free at command free or NPE with such call trace:

Time2Retain timer expired for SID: 1, cleaning up iSCSI session.
BUG: kernel NULL pointer dereference, address: 0000000000000140
RIP: 0010:sbitmap_queue_clear+0x3a/0xa0
Call Trace:
 target_release_cmd_kref+0xd1/0x1f0 [target_core_mod]
 transport_generic_free_cmd+0xd1/0x180 [target_core_mod]
 iscsit_free_cmd+0x53/0xd0 [iscsi_target_mod]
 iscsit_free_connection_recovery_entries+0x29d/0x320 [iscsi_target_mod]
 iscsit_close_session+0x13a/0x140 [iscsi_target_mod]
 iscsit_check_post_dataout+0x440/0x440 [iscsi_target_mod]
 call_timer_fn+0x24/0x140

Move cleanup of recovery enrties to before session freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54184/">CVE-2023-54184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54184">CVE-2023-54184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255991">SUSE bug 1255991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54186</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54186" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54186" ref_url="https://www.suse.com/security/cve/CVE-2023-54186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: fix pin_assignment_show

This patch fixes negative indexing of buf array in pin_assignment_show
when get_current_pin_assignments returns 0 i.e. no compatible pin
assignments are found.

BUG: KASAN: use-after-free in pin_assignment_show+0x26c/0x33c
...
Call trace:
dump_backtrace+0x110/0x204
dump_stack_lvl+0x84/0xbc
print_report+0x358/0x974
kasan_report+0x9c/0xfc
__do_kernel_fault+0xd4/0x2d4
do_bad_area+0x48/0x168
do_tag_check_fault+0x24/0x38
do_mem_abort+0x6c/0x14c
el1_abort+0x44/0x68
el1h_64_sync_handler+0x64/0xa4
el1h_64_sync+0x78/0x7c
pin_assignment_show+0x26c/0x33c
dev_attr_show+0x50/0xc0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54186/">CVE-2023-54186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54186">CVE-2023-54186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255985">SUSE bug 1255985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54191" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54191" ref_url="https://www.suse.com/security/cve/CVE-2023-54191" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: fix memory leak in mt7996_mcu_exit

Always purge mcu skb queues in mt7996_mcu_exit routine even if
mt7996_firmware_state fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54191/">CVE-2023-54191 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54191">CVE-2023-54191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255980">SUSE bug 1255980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54195" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54195" ref_url="https://www.suse.com/security/cve/CVE-2023-54195" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix timeout of a call that hasn't yet been granted a channel

afs_make_call() calls rxrpc_kernel_begin_call() to begin a call (which may
get stalled in the background waiting for a connection to become
available); it then calls rxrpc_kernel_set_max_life() to set the timeouts -
but that starts the call timer so the call timer might then expire before
we get a connection assigned - leading to the following oops if the call
stalled:

	BUG: kernel NULL pointer dereference, address: 0000000000000000
	...
	CPU: 1 PID: 5111 Comm: krxrpcio/0 Not tainted 6.3.0-rc7-build3+ #701
	RIP: 0010:rxrpc_alloc_txbuf+0xc0/0x157
	...
	Call Trace:
	 &lt;TASK&gt;
	 rxrpc_send_ACK+0x50/0x13b
	 rxrpc_input_call_event+0x16a/0x67d
	 rxrpc_io_thread+0x1b6/0x45f
	 ? _raw_spin_unlock_irqrestore+0x1f/0x35
	 ? rxrpc_input_packet+0x519/0x519
	 kthread+0xe7/0xef
	 ? kthread_complete_and_exit+0x1b/0x1b
	 ret_from_fork+0x22/0x30

Fix this by noting the timeouts in struct rxrpc_call when the call is
created.  The timer will be started when the first packet is transmitted.

It shouldn't be possible to trigger this directly from userspace through
AF_RXRPC as sendmsg() will return EBUSY if the call is in the
waiting-for-conn state if it dropped out of the wait due to a signal.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54195/">CVE-2023-54195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54195">CVE-2023-54195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255975">SUSE bug 1255975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54197" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54197" ref_url="https://www.suse.com/security/cve/CVE-2023-54197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "Bluetooth: btsdio: fix use after free bug in btsdio_remove due to unfinished work"

This reverts commit 1e9ac114c4428fdb7ff4635b45d4f46017e8916f.

This patch introduces a possible null-ptr-def problem. Revert it. And the
fixed bug by this patch have resolved by commit 73f7b171b7c0 ("Bluetooth:
btsdio: fix use after free bug in btsdio_remove due to race condition").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54197/">CVE-2023-54197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54197">CVE-2023-54197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255969">SUSE bug 1255969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54200" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54200" ref_url="https://www.suse.com/security/cve/CVE-2023-54200" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: always release netdev hooks from notifier

This reverts "netfilter: nf_tables: skip netdev events generated on netns removal".

The problem is that when a veth device is released, the veth release
callback will also queue the peer netns device for removal.

Its possible that the peer netns is also slated for removal.  In this
case, the device memory is already released before the pre_exit hook of
the peer netns runs:

BUG: KASAN: slab-use-after-free in nf_hook_entry_head+0x1b8/0x1d0
Read of size 8 at addr ffff88812c0124f0 by task kworker/u8:1/45
Workqueue: netns cleanup_net
Call Trace:
 nf_hook_entry_head+0x1b8/0x1d0
 __nf_unregister_net_hook+0x76/0x510
 nft_netdev_unregister_hooks+0xa0/0x220
 __nft_release_hook+0x184/0x490
 nf_tables_pre_exit_net+0x12f/0x1b0
 ..

Order is:
1. First netns is released, veth_dellink() queues peer netns device
   for removal
2. peer netns is queued for removal
3. peer netns device is released, unreg event is triggered
4. unreg event is ignored because netns is going down
5. pre_exit hook calls nft_netdev_unregister_hooks but device memory
   might be free'd already.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54200/">CVE-2023-54200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54200">CVE-2023-54200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255972">SUSE bug 1255972</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54201" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54201" ref_url="https://www.suse.com/security/cve/CVE-2023-54201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/efa: Fix wrong resources deallocation order

When trying to destroy QP or CQ, we first decrease the refcount and
potentially free memory regions allocated for the object and then
request the device to destroy the object. If the device fails, the
object isn't fully destroyed so the user/IB core can try to destroy the
object again which will lead to underflow when trying to decrease an
already zeroed refcount.

Deallocate resources in reverse order of allocating them to safely free
them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54201/">CVE-2023-54201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54201">CVE-2023-54201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255964">SUSE bug 1255964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54202</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54202" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54202" ref_url="https://www.suse.com/security/cve/CVE-2023-54202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: fix race condition UAF in i915_perf_add_config_ioctl

Userspace can guess the id value and try to race oa_config object creation
with config remove, resulting in a use-after-free if we dereference the
object after unlocking the metrics_lock.  For that reason, unlocking the
metrics_lock must be done after we are done dereferencing the object.

[tursulin: Manually added stable tag.]
(cherry picked from commit 49f6f6483b652108bcb73accd0204a464b922395)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-54202/">CVE-2023-54202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54202">CVE-2023-54202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255880">SUSE bug 1255880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54206" ref_url="https://www.suse.com/security/cve/CVE-2023-54206" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: flower: fix filter idr initialization

The cited commit moved idr initialization too early in fl_change() which
allows concurrent users to access the filter that is still being
initialized and is in inconsistent state, which, in turn, can cause NULL
pointer dereference [0]. Since there is no obvious way to fix the ordering
without reverting the whole cited commit, alternative approach taken to
first insert NULL pointer into idr in order to allocate the handle but
still cause fl_get() to return NULL and prevent concurrent users from
seeing the filter while providing miss-to-action infrastructure with valid
handle id early in fl_change().

[  152.434728] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN
[  152.436163] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[  152.437269] CPU: 4 PID: 3877 Comm: tc Not tainted 6.3.0-rc4+ #5
[  152.438110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  152.439644] RIP: 0010:fl_dump_key+0x8b/0x1d10 [cls_flower]
[  152.440461] Code: 01 f2 02 f2 c7 40 08 04 f2 04 f2 c7 40 0c 04 f3 f3 f3 65 48 8b 04 25 28 00 00 00 48 89 84 24 00 01 00 00 48 89 c8 48 c1 e8 03 &lt;0f&gt; b6 04 10 84 c0 74 08 3c 03 0f 8e 98 19 00 00 8b 13 85 d2 74 57
[  152.442885] RSP: 0018:ffff88817a28f158 EFLAGS: 00010246
[  152.443851] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  152.444826] RDX: dffffc0000000000 RSI: ffffffff8500ae80 RDI: ffff88810a987900
[  152.445791] RBP: ffff888179d88240 R08: ffff888179d8845c R09: ffff888179d88240
[  152.446780] R10: ffffed102f451e48 R11: 00000000fffffff2 R12: ffff88810a987900
[  152.447741] R13: ffffffff8500ae80 R14: ffff88810a987900 R15: ffff888149b3c738
[  152.448756] FS:  00007f5eb2a34800(0000) GS:ffff88881ec00000(0000) knlGS:0000000000000000
[  152.449888] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  152.450685] CR2: 000000000046ad19 CR3: 000000010b0bd006 CR4: 0000000000370ea0
[  152.451641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  152.452628] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  152.453588] Call Trace:
[  152.454032]  &lt;TASK&gt;
[  152.454447]  ? netlink_sendmsg+0x7a1/0xcb0
[  152.455109]  ? sock_sendmsg+0xc5/0x190
[  152.455689]  ? ____sys_sendmsg+0x535/0x6b0
[  152.456320]  ? ___sys_sendmsg+0xeb/0x170
[  152.456916]  ? do_syscall_64+0x3d/0x90
[  152.457529]  ? entry_SYSCALL_64_after_hwframe+0x46/0xb0
[  152.458321]  ? ___sys_sendmsg+0xeb/0x170
[  152.458958]  ? __sys_sendmsg+0xb5/0x140
[  152.459564]  ? do_syscall_64+0x3d/0x90
[  152.460122]  ? entry_SYSCALL_64_after_hwframe+0x46/0xb0
[  152.460852]  ? fl_dump_key_options.part.0+0xea0/0xea0 [cls_flower]
[  152.461710]  ? _raw_spin_lock+0x7a/0xd0
[  152.462299]  ? _raw_read_lock_irq+0x30/0x30
[  152.462924]  ? nla_put+0x15e/0x1c0
[  152.463480]  fl_dump+0x228/0x650 [cls_flower]
[  152.464112]  ? fl_tmplt_dump+0x210/0x210 [cls_flower]
[  152.464854]  ? __kmem_cache_alloc_node+0x1a7/0x330
[  152.465592]  ? nla_put+0x15e/0x1c0
[  152.466160]  tcf_fill_node+0x515/0x9a0
[  152.466766]  ? tc_setup_offload_action+0xf0/0xf0
[  152.467463]  ? __alloc_skb+0x13c/0x2a0
[  152.468067]  ? __build_skb_around+0x330/0x330
[  152.468814]  ? fl_get+0x107/0x1a0 [cls_flower]
[  152.469503]  tc_del_tfilter+0x718/0x1330
[  152.470115]  ? is_bpf_text_address+0xa/0x20
[  152.470765]  ? tc_ctl_chain+0xee0/0xee0
[  152.471335]  ? __kernel_text_address+0xe/0x30
[  152.471948]  ? unwind_get_return_address+0x56/0xa0
[  152.472639]  ? __thaw_task+0x150/0x150
[  152.473218]  ? arch_stack_walk+0x98/0xf0
[  152.473839]  ? __stack_depot_save+0x35/0x4c0
[  152.474501]  ? stack_trace_save+0x91/0xc0
[  152.475119]  ? security_capable+0x51/0x90
[  152.475741]  rtnetlink_rcv_msg+0x2c1/0x9d0
[  152.476387]  ? rtnl_calcit.isra.0+0x2b0/0x2b0
[  152.477042]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54206/">CVE-2023-54206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54206">CVE-2023-54206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255958">SUSE bug 1255958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54214" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54214" ref_url="https://www.suse.com/security/cve/CVE-2023-54214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix potential user-after-free

This fixes all instances of which requires to allocate a buffer calling
alloc_skb which may release the chan lock and reacquire later which
makes it possible that the chan is disconnected in the meantime.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54214/">CVE-2023-54214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54214">CVE-2023-54214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255954">SUSE bug 1255954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54215" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54215" ref_url="https://www.suse.com/security/cve/CVE-2023-54215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs()

Free the cpumask allocated by create_affinity_masks() before returning
from the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54215/">CVE-2023-54215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54215">CVE-2023-54215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255957">SUSE bug 1255957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54216" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54216" ref_url="https://www.suse.com/security/cve/CVE-2023-54216" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: TC, Fix using eswitch mapping in nic mode

Cited patch is using the eswitch object mapping pool while
in nic mode where it isn't initialized. This results in the
trace below [0].

Fix that by using either nic or eswitch object mapping pool
depending if eswitch is enabled or not.

[0]:
[  826.446057] ==================================================================
[  826.446729] BUG: KASAN: slab-use-after-free in mlx5_add_flow_rules+0x30/0x490 [mlx5_core]
[  826.447515] Read of size 8 at addr ffff888194485830 by task tc/6233

[  826.448243] CPU: 16 PID: 6233 Comm: tc Tainted: G        W          6.3.0-rc6+ #1
[  826.448890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  826.449785] Call Trace:
[  826.450052]  &lt;TASK&gt;
[  826.450302]  dump_stack_lvl+0x33/0x50
[  826.450650]  print_report+0xc2/0x610
[  826.450998]  ? __virt_addr_valid+0xb1/0x130
[  826.451385]  ? mlx5_add_flow_rules+0x30/0x490 [mlx5_core]
[  826.451935]  kasan_report+0xae/0xe0
[  826.452276]  ? mlx5_add_flow_rules+0x30/0x490 [mlx5_core]
[  826.452829]  mlx5_add_flow_rules+0x30/0x490 [mlx5_core]
[  826.453368]  ? __kmalloc_node+0x5a/0x120
[  826.453733]  esw_add_restore_rule+0x20f/0x270 [mlx5_core]
[  826.454288]  ? mlx5_eswitch_add_send_to_vport_meta_rule+0x260/0x260 [mlx5_core]
[  826.455011]  ? mutex_unlock+0x80/0xd0
[  826.455361]  ? __mutex_unlock_slowpath.constprop.0+0x210/0x210
[  826.455862]  ? mapping_add+0x2cb/0x440 [mlx5_core]
[  826.456425]  mlx5e_tc_action_miss_mapping_get+0x139/0x180 [mlx5_core]
[  826.457058]  ? mlx5e_tc_update_skb_nic+0xb0/0xb0 [mlx5_core]
[  826.457636]  ? __kasan_kmalloc+0x77/0x90
[  826.458000]  ? __kmalloc+0x57/0x120
[  826.458336]  mlx5_tc_ct_flow_offload+0x325/0xe40 [mlx5_core]
[  826.458916]  ? ct_kernel_enter.constprop.0+0x48/0xa0
[  826.459360]  ? mlx5_tc_ct_parse_action+0xf0/0xf0 [mlx5_core]
[  826.459933]  ? mlx5e_mod_hdr_attach+0x491/0x520 [mlx5_core]
[  826.460507]  ? mlx5e_mod_hdr_get+0x12/0x20 [mlx5_core]
[  826.461046]  ? mlx5e_tc_attach_mod_hdr+0x154/0x170 [mlx5_core]
[  826.461635]  mlx5e_configure_flower+0x969/0x2110 [mlx5_core]
[  826.462217]  ? _raw_spin_lock_bh+0x85/0xe0
[  826.462597]  ? __mlx5e_add_fdb_flow+0x750/0x750 [mlx5_core]
[  826.463163]  ? kasan_save_stack+0x2e/0x40
[  826.463534]  ? down_read+0x115/0x1b0
[  826.463878]  ? down_write_killable+0x110/0x110
[  826.464288]  ? tc_setup_action.part.0+0x9f/0x3b0
[  826.464701]  ? mlx5e_is_uplink_rep+0x4c/0x90 [mlx5_core]
[  826.465253]  ? mlx5e_tc_reoffload_flows_work+0x130/0x130 [mlx5_core]
[  826.465878]  tc_setup_cb_add+0x112/0x250
[  826.466247]  fl_hw_replace_filter+0x230/0x310 [cls_flower]
[  826.466724]  ? fl_hw_destroy_filter+0x1a0/0x1a0 [cls_flower]
[  826.467212]  fl_change+0x14e1/0x2030 [cls_flower]
[  826.467636]  ? sock_def_readable+0x89/0x120
[  826.468019]  ? fl_tmplt_create+0x2d0/0x2d0 [cls_flower]
[  826.468509]  ? kasan_unpoison+0x23/0x50
[  826.468873]  ? get_random_u16+0x180/0x180
[  826.469244]  ? __radix_tree_lookup+0x2b/0x130
[  826.469640]  ? fl_get+0x7b/0x140 [cls_flower]
[  826.470042]  ? fl_mask_put+0x200/0x200 [cls_flower]
[  826.470478]  ? __mutex_unlock_slowpath.constprop.0+0x210/0x210
[  826.470973]  ? fl_tmplt_create+0x2d0/0x2d0 [cls_flower]
[  826.471427]  tc_new_tfilter+0x644/0x1050
[  826.471795]  ? tc_get_tfilter+0x860/0x860
[  826.472170]  ? __thaw_task+0x130/0x130
[  826.472525]  ? arch_stack_walk+0x98/0xf0
[  826.472892]  ? cap_capable+0x9f/0xd0
[  826.473235]  ? security_capable+0x47/0x60
[  826.473608]  rtnetlink_rcv_msg+0x1d5/0x550
[  826.473985]  ? rtnl_calcit.isra.0+0x1f0/0x1f0
[  826.474383]  ? __stack_depot_save+0x35/0x4c0
[  826.474779]  ? kasan_save_stack+0x2e/0x40
[  826.475149]  ? kasan_save_stack+0x1e/0x40
[  826.475518]  ? __kasan_record_aux_stack+0x9f/0xb0
[  826.475939]  ? task_work_add+0x77/0x1c0
[  826.476305]  netlink_rcv_skb+0xe0/0x210
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54216/">CVE-2023-54216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54216">CVE-2023-54216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255948">SUSE bug 1255948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54221" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54221" ref_url="https://www.suse.com/security/cve/CVE-2023-54221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe

In function probe(), it returns directly without unregistered hws
when error occurs.

Fix this by adding 'goto unregister_hws;' on line 295 and
line 310.

Use devm_kzalloc() instead of kzalloc() to automatically
free the memory using devm_kfree() when error occurs.

Replace of_iomap() with devm_of_iomap() to automatically
handle the unused ioremap region and delete 'iounmap(anatop_base);'
in unregister_hws.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54221/">CVE-2023-54221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54221">CVE-2023-54221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255842">SUSE bug 1255842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54229" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54229" ref_url="https://www.suse.com/security/cve/CVE-2023-54229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix registration of 6Ghz-only phy without the full channel range

Because of what seems to be a typo, a 6Ghz-only phy for which the BDF
does not allow the 7115Mhz channel will fail to register:

  WARNING: CPU: 2 PID: 106 at net/wireless/core.c:907 wiphy_register+0x914/0x954
  Modules linked in: ath11k_pci sbsa_gwdt
  CPU: 2 PID: 106 Comm: kworker/u8:5 Not tainted 6.3.0-rc7-next-20230418-00549-g1e096a17625a-dirty #9
  Hardware name: Freebox V7R Board (DT)
  Workqueue: ath11k_qmi_driver_event ath11k_qmi_driver_event_work
  pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : wiphy_register+0x914/0x954
  lr : ieee80211_register_hw+0x67c/0xc10
  sp : ffffff800b123aa0
  x29: ffffff800b123aa0 x28: 0000000000000000 x27: 0000000000000000
  x26: 0000000000000000 x25: 0000000000000006 x24: ffffffc008d51418
  x23: ffffffc008cb0838 x22: ffffff80176c2460 x21: 0000000000000168
  x20: ffffff80176c0000 x19: ffffff80176c03e0 x18: 0000000000000014
  x17: 00000000cbef338c x16: 00000000d2a26f21 x15: 00000000ad6bb85f
  x14: 0000000000000020 x13: 0000000000000020 x12: 00000000ffffffbd
  x11: 0000000000000208 x10: 00000000fffffdf7 x9 : ffffffc009394718
  x8 : ffffff80176c0528 x7 : 000000007fffffff x6 : 0000000000000006
  x5 : 0000000000000005 x4 : ffffff800b304284 x3 : ffffff800b304284
  x2 : ffffff800b304d98 x1 : 0000000000000000 x0 : 0000000000000000
  Call trace:
   wiphy_register+0x914/0x954
   ieee80211_register_hw+0x67c/0xc10
   ath11k_mac_register+0x7c4/0xe10
   ath11k_core_qmi_firmware_ready+0x1f4/0x570
   ath11k_qmi_driver_event_work+0x198/0x590
   process_one_work+0x1b8/0x328
   worker_thread+0x6c/0x414
   kthread+0x100/0x104
   ret_from_fork+0x10/0x20
  ---[ end trace 0000000000000000 ]---
  ath11k_pci 0002:01:00.0: ieee80211 registration failed: -22
  ath11k_pci 0002:01:00.0: failed register the radio with mac80211: -22
  ath11k_pci 0002:01:00.0: failed to create pdev core: -22
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54229/">CVE-2023-54229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54229">CVE-2023-54229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255924">SUSE bug 1255924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54230" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54230" ref_url="https://www.suse.com/security/cve/CVE-2023-54230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amba: bus: fix refcount leak

commit 5de1540b7bc4 ("drivers/amba: create devices from device tree")
increases the refcount of of_node, but not releases it in
amba_device_release, so there is refcount leak. By using of_node_put
to avoid refcount leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54230/">CVE-2023-54230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54230">CVE-2023-54230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255925">SUSE bug 1255925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54233" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54233" ref_url="https://www.suse.com/security/cve/CVE-2023-54233" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: avoid a NULL dereference with unsupported widgets

If an IPC4 topology contains an unsupported widget, its .module_info
field won't be set, then sof_ipc4_route_setup() will cause a kernel
Oops trying to dereference it. Add a check for such cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54233/">CVE-2023-54233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54233">CVE-2023-54233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255840">SUSE bug 1255840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54234</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54234" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54234" ref_url="https://www.suse.com/security/cve/CVE-2023-54234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Fix missing mrioc-&gt;evtack_cmds initialization

Commit c1af985d27da ("scsi: mpi3mr: Add Event acknowledgment logic")
introduced an array mrioc-&gt;evtack_cmds but initialization of the array
elements was missed. They are just zero cleared. The function
mpi3mr_complete_evt_ack() refers host_tag field of the elements. Due to the
zero value of the host_tag field, the function calls clear_bit() for
mrico-&gt;evtack_cmds_bitmap with wrong bit index. This results in memory
access to invalid address and "BUG: KASAN: use-after-free". This BUG was
observed at eHBA-9600 firmware update to version 8.3.1.0. To fix it, add
the missing initialization of mrioc-&gt;evtack_cmds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54234/">CVE-2023-54234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54234">CVE-2023-54234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255920">SUSE bug 1255920</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54235" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54235" ref_url="https://www.suse.com/security/cve/CVE-2023-54235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/DOE: Fix destroy_work_on_stack() race

The following debug object splat was observed in testing:

  ODEBUG: free active (active state 0) object: 0000000097d23782 object type: work_struct hint: doe_statemachine_work+0x0/0x510
  WARNING: CPU: 1 PID: 71 at lib/debugobjects.c:514 debug_print_object+0x7d/0xb0
  ...
  Workqueue: pci 0000:36:00.0 DOE [1 doe_statemachine_work
  RIP: 0010:debug_print_object+0x7d/0xb0
  ...
  Call Trace:
   ? debug_print_object+0x7d/0xb0
   ? __pfx_doe_statemachine_work+0x10/0x10
   debug_object_free.part.0+0x11b/0x150
   doe_statemachine_work+0x45e/0x510
   process_one_work+0x1d4/0x3c0

This occurs because destroy_work_on_stack() was called after signaling
the completion in the calling thread.  This creates a race between
destroy_work_on_stack() and the task-&gt;work struct going out of scope in
pci_doe().

Signal the work complete after destroying the work struct.  This is safe
because signal_task_complete() is the final thing the work item does and
the workqueue code is careful not to access the work struct after.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54235/">CVE-2023-54235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54235">CVE-2023-54235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255921">SUSE bug 1255921</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54238" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54238" ref_url="https://www.suse.com/security/cve/CVE-2023-54238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlx5: fix skb leak while fifo resync and push

During ptp resync operation SKBs were poped from the fifo but were never
freed neither by napi_consume nor by dev_kfree_skb_any. Add call to
napi_consume_skb to properly free SKBs.

Another leak was happening because mlx5e_skb_fifo_has_room() had an error
in the check. Comparing free running counters works well unless C promotes
the types to something wider than the counter. In this case counters are
u16 but the result of the substraction is promouted to int and it causes
wrong result (negative value) of the check when producer have already
overlapped but consumer haven't yet. Explicit cast to u16 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54238/">CVE-2023-54238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54238">CVE-2023-54238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255916">SUSE bug 1255916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54239" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54239" ref_url="https://www.suse.com/security/cve/CVE-2023-54239" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Check for uptr overflow

syzkaller found that setting up a map with a user VA that wraps past zero
can trigger WARN_ONs, particularly from pin_user_pages weirdly returning 0
due to invalid arguments.

Prevent creating a pages with a uptr and size that would math overflow.

  WARNING: CPU: 0 PID: 518 at drivers/iommu/iommufd/pages.c:793 pfn_reader_user_pin+0x2e6/0x390
  Modules linked in:
  CPU: 0 PID: 518 Comm: repro Not tainted 6.3.0-rc2-eeac8ede1755+ #1
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
  RIP: 0010:pfn_reader_user_pin+0x2e6/0x390
  Code: b1 11 e9 25 fe ff ff e8 28 e4 0f ff 31 ff 48 89 de e8 2e e6 0f ff 48 85 db 74 0a e8 14 e4 0f ff e9 4d ff ff ff e8 0a e4 0f ff &lt;0f&gt; 0b bb f2 ff ff ff e9 3c ff ff ff e8 f9 e3 0f ff ba 01 00 00 00
  RSP: 0018:ffffc90000f9fa30 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff821e2b72
  RDX: 0000000000000000 RSI: ffff888014184680 RDI: 0000000000000002
  RBP: ffffc90000f9fa78 R08: 00000000000000ff R09: 0000000079de6f4e
  R10: ffffc90000f9f790 R11: ffff888014185418 R12: ffffc90000f9fc60
  R13: 0000000000000002 R14: ffff888007879800 R15: 0000000000000000
  FS:  00007f4227555740(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000020000043 CR3: 000000000e748005 CR4: 0000000000770ef0
  PKRU: 55555554
  Call Trace:
   &lt;TASK&gt;
   pfn_reader_next+0x14a/0x7b0
   ? interval_tree_double_span_iter_update+0x11a/0x140
   pfn_reader_first+0x140/0x1b0
   iopt_pages_rw_slow+0x71/0x280
   ? __this_cpu_preempt_check+0x20/0x30
   iopt_pages_rw_access+0x2b2/0x5b0
   iommufd_access_rw+0x19f/0x2f0
   iommufd_test+0xd11/0x16f0
   ? write_comp_data+0x2f/0x90
   iommufd_fops_ioctl+0x206/0x330
   __x64_sys_ioctl+0x10e/0x160
   ? __pfx_iommufd_fops_ioctl+0x10/0x10
   do_syscall_64+0x3b/0x90
   entry_SYSCALL_64_after_hwframe+0x72/0xdc
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54239/">CVE-2023-54239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54239">CVE-2023-54239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255917">SUSE bug 1255917</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54242</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54242" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54242" ref_url="https://www.suse.com/security/cve/CVE-2023-54242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: Fix division by zero error on zero wsum

When the weighted sum is zero the calculation of limit causes
a division by zero error. Fix this by continuing to the next level.

This was discovered by running as root:

stress-ng --ioprio 0

Fixes divison by error oops:

[  521.450556] divide error: 0000 [#1] SMP NOPTI
[  521.450766] CPU: 2 PID: 2684464 Comm: stress-ng-iopri Not tainted 6.2.1-1280.native #1
[  521.451117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.1-0-g3208b098f51a-prebuilt.qemu.org 04/01/2014
[  521.451627] RIP: 0010:bfqq_request_over_limit+0x207/0x400
[  521.451875] Code: 01 48 8d 0c c8 74 0b 48 8b 82 98 00 00 00 48 8d 0c c8 8b 85 34 ff ff ff 48 89 ca 41 0f af 41 50 48 d1 ea 48 98 48 01 d0 31 d2 &lt;48&gt; f7 f1 41 39 41 48 89 85 34 ff ff ff 0f 8c 7b 01 00 00 49 8b 44
[  521.452699] RSP: 0018:ffffb1af84eb3948 EFLAGS: 00010046
[  521.452938] RAX: 000000000000003c RBX: 0000000000000000 RCX: 0000000000000000
[  521.453262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb1af84eb3978
[  521.453584] RBP: ffffb1af84eb3a30 R08: 0000000000000001 R09: ffff8f88ab8a4ba0
[  521.453905] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8f88ab8a4b18
[  521.454224] R13: ffff8f8699093000 R14: 0000000000000001 R15: ffffb1af84eb3970
[  521.454549] FS:  00005640b6b0b580(0000) GS:ffff8f88b3880000(0000) knlGS:0000000000000000
[  521.454912] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  521.455170] CR2: 00007ffcbcae4e38 CR3: 00000002e46de001 CR4: 0000000000770ee0
[  521.455491] PKRU: 55555554
[  521.455619] Call Trace:
[  521.455736]  &lt;TASK&gt;
[  521.455837]  ? bfq_request_merge+0x3a/0xc0
[  521.456027]  ? elv_merge+0x115/0x140
[  521.456191]  bfq_limit_depth+0xc8/0x240
[  521.456366]  __blk_mq_alloc_requests+0x21a/0x2c0
[  521.456577]  blk_mq_submit_bio+0x23c/0x6c0
[  521.456766]  __submit_bio+0xb8/0x140
[  521.457236]  submit_bio_noacct_nocheck+0x212/0x300
[  521.457748]  submit_bio_noacct+0x1a6/0x580
[  521.458220]  submit_bio+0x43/0x80
[  521.458660]  ext4_io_submit+0x23/0x80
[  521.459116]  ext4_do_writepages+0x40a/0xd00
[  521.459596]  ext4_writepages+0x65/0x100
[  521.460050]  do_writepages+0xb7/0x1c0
[  521.460492]  __filemap_fdatawrite_range+0xa6/0x100
[  521.460979]  file_write_and_wait_range+0xbf/0x140
[  521.461452]  ext4_sync_file+0x105/0x340
[  521.461882]  __x64_sys_fsync+0x67/0x100
[  521.462305]  ? syscall_exit_to_user_mode+0x2c/0x1c0
[  521.462768]  do_syscall_64+0x3b/0xc0
[  521.463165]  entry_SYSCALL_64_after_hwframe+0x5a/0xc4
[  521.463621] RIP: 0033:0x5640b6c56590
[  521.464006] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 80 3d 71 70 0e 00 00 74 17 b8 4a 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54242/">CVE-2023-54242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54242">CVE-2023-54242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255919">SUSE bug 1255919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54245</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54245" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54245" ref_url="https://www.suse.com/security/cve/CVE-2023-54245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: tx-macro: Fix for KASAN: slab-out-of-bounds

When we run syzkaller we get below Out of Bound.
    "KASAN: slab-out-of-bounds Read in regcache_flat_read"

    Below is the backtrace of the issue:

    dump_backtrace+0x0/0x4c8
    show_stack+0x34/0x44
    dump_stack_lvl+0xd8/0x118
    print_address_description+0x30/0x2d8
    kasan_report+0x158/0x198
    __asan_report_load4_noabort+0x44/0x50
    regcache_flat_read+0x10c/0x110
    regcache_read+0xf4/0x180
    _regmap_read+0xc4/0x278
    _regmap_update_bits+0x130/0x290
    regmap_update_bits_base+0xc0/0x15c
    snd_soc_component_update_bits+0xa8/0x22c
    snd_soc_component_write_field+0x68/0xd4
    tx_macro_digital_mute+0xec/0x140

    Actually There is no need to have decimator with 32 bits.
    By limiting the variable with short type u8 issue is resolved.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54245/">CVE-2023-54245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54245">CVE-2023-54245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255912">SUSE bug 1255912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54251" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54251" ref_url="https://www.suse.com/security/cve/CVE-2023-54251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX.

syzkaller found zero division error [0] in div_s64_rem() called from
get_cycle_time_elapsed(), where sched-&gt;cycle_time is the divisor.

We have tests in parse_taprio_schedule() so that cycle_time will never
be 0, and actually cycle_time is not 0 in get_cycle_time_elapsed().

The problem is that the types of divisor are different; cycle_time is
s64, but the argument of div_s64_rem() is s32.

syzkaller fed this input and 0x100000000 is cast to s32 to be 0.

  @TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME={0xc, 0x8, 0x100000000}

We use s64 for cycle_time to cast it to ktime_t, so let's keep it and
set max for cycle_time.

While at it, we prevent overflow in setup_txtime() and add another
test in parse_taprio_schedule() to check if cycle_time overflows.

Also, we add a new tdc test case for this issue.

[0]:
divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 1 PID: 103 Comm: kworker/1:3 Not tainted 6.5.0-rc1-00330-g60cc1f7d0605 #3
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Workqueue: ipv6_addrconf addrconf_dad_work
RIP: 0010:div_s64_rem include/linux/math64.h:42 [inline]
RIP: 0010:get_cycle_time_elapsed net/sched/sch_taprio.c:223 [inline]
RIP: 0010:find_entry_to_transmit+0x252/0x7e0 net/sched/sch_taprio.c:344
Code: 3c 02 00 0f 85 5e 05 00 00 48 8b 4c 24 08 4d 8b bd 40 01 00 00 48 8b 7c 24 48 48 89 c8 4c 29 f8 48 63 f7 48 99 48 89 74 24 70 &lt;48&gt; f7 fe 48 29 d1 48 8d 04 0f 49 89 cc 48 89 44 24 20 49 8d 85 10
RSP: 0018:ffffc90000acf260 EFLAGS: 00010206
RAX: 177450e0347560cf RBX: 0000000000000000 RCX: 177450e0347560cf
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000100000000
RBP: 0000000000000056 R08: 0000000000000000 R09: ffffed10020a0934
R10: ffff8880105049a7 R11: ffff88806cf3a520 R12: ffff888010504800
R13: ffff88800c00d800 R14: ffff8880105049a0 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f0edf84f0e8 CR3: 000000000d73c002 CR4: 0000000000770ee0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 get_packet_txtime net/sched/sch_taprio.c:508 [inline]
 taprio_enqueue_one+0x900/0xff0 net/sched/sch_taprio.c:577
 taprio_enqueue+0x378/0xae0 net/sched/sch_taprio.c:658
 dev_qdisc_enqueue+0x46/0x170 net/core/dev.c:3732
 __dev_xmit_skb net/core/dev.c:3821 [inline]
 __dev_queue_xmit+0x1b2f/0x3000 net/core/dev.c:4169
 dev_queue_xmit include/linux/netdevice.h:3088 [inline]
 neigh_resolve_output net/core/neighbour.c:1552 [inline]
 neigh_resolve_output+0x4a7/0x780 net/core/neighbour.c:1532
 neigh_output include/net/neighbour.h:544 [inline]
 ip6_finish_output2+0x924/0x17d0 net/ipv6/ip6_output.c:135
 __ip6_finish_output+0x620/0xaa0 net/ipv6/ip6_output.c:196
 ip6_finish_output net/ipv6/ip6_output.c:207 [inline]
 NF_HOOK_COND include/linux/netfilter.h:292 [inline]
 ip6_output+0x206/0x410 net/ipv6/ip6_output.c:228
 dst_output include/net/dst.h:458 [inline]
 NF_HOOK.constprop.0+0xea/0x260 include/linux/netfilter.h:303
 ndisc_send_skb+0x872/0xe80 net/ipv6/ndisc.c:508
 ndisc_send_ns+0xb5/0x130 net/ipv6/ndisc.c:666
 addrconf_dad_work+0xc14/0x13f0 net/ipv6/addrconf.c:4175
 process_one_work+0x92c/0x13a0 kernel/workqueue.c:2597
 worker_thread+0x60f/0x1240 kernel/workqueue.c:2748
 kthread+0x2fe/0x3f0 kernel/kthread.c:389
 ret_from_fork+0x2c/0x50 arch/x86/entry/entry_64.S:308
 &lt;/TASK&gt;
Modules linked in:
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54251/">CVE-2023-54251 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54251">CVE-2023-54251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255888">SUSE bug 1255888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54254" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54254" ref_url="https://www.suse.com/security/cve/CVE-2023-54254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Don't leak a resource on eviction error

On eviction errors other than -EMULTIHOP we were leaking a resource.
Fix.

v2:
- Avoid yet another goto (Andi Shyti)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54254/">CVE-2023-54254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54254">CVE-2023-54254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255890">SUSE bug 1255890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54259</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54259" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54259" ref_url="https://www.suse.com/security/cve/CVE-2023-54259" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soundwire: bus: Fix unbalanced pm_runtime_put() causing usage count underflow

This reverts commit
443a98e649b4 ("soundwire: bus: use pm_runtime_resume_and_get()")

Change calls to pm_runtime_resume_and_get() back to pm_runtime_get_sync().
This fixes a usage count underrun caused by doing a pm_runtime_put() even
though pm_runtime_resume_and_get() returned an error.

The three affected functions ignore -EACCES error from trying to get
pm_runtime, and carry on, including a put at the end of the function.
But pm_runtime_resume_and_get() does not increment the usage count if it
returns an error. So in the -EACCES case you must not call
pm_runtime_put().

The documentation for pm_runtime_get_sync() says:
 "Consider using pm_runtime_resume_and_get() ...  as this is likely to
 result in cleaner code."

In this case I don't think it results in cleaner code because the
pm_runtime_put() at the end of the function would have to be conditional on
the return value from pm_runtime_resume_and_get() at the top of the
function.

pm_runtime_get_sync() doesn't have this problem because it always
increments the count, so always needs a put. The code can just flow through
and do the pm_runtime_put() unconditionally.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54259/">CVE-2023-54259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54259">CVE-2023-54259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255887">SUSE bug 1255887</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54260</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54260" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54260" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54260" ref_url="https://www.suse.com/security/cve/CVE-2023-54260" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix lost destroy smbd connection when MR allocate failed

If the MR allocate failed, the smb direct connection info is NULL,
then smbd_destroy() will directly return, then the connection info
will be leaked.

Let's set the smb direct connection info to the server before call
smbd_destroy().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54260/">CVE-2023-54260 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54260">CVE-2023-54260 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255878">SUSE bug 1255878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54261</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54261" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54261" ref_url="https://www.suse.com/security/cve/CVE-2023-54261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Add missing gfx11 MQD manager callbacks

mqd_stride function was introduced in commit 2f77b9a242a2
("drm/amdkfd: Update MQD management on multi XCC setup")
but not assigned for gfx11. Fixes a NULL dereference in debugfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54261/">CVE-2023-54261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54261">CVE-2023-54261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255879">SUSE bug 1255879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54262</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54262" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54262" ref_url="https://www.suse.com/security/cve/CVE-2023-54262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Don't clone flow post action attributes second time

The code already clones post action attributes in
mlx5e_clone_flow_attr_for_post_act(). Creating another copy in
mlx5e_tc_post_act_add() is a erroneous leftover from original
implementation. Instead, assign handle-&gt;attribute to post_attr provided by
the caller. Note that cloning the attribute second time is not just
wasteful but also causes issues like second copy not being properly updated
in neigh update code which leads to following use-after-free:

Feb 21 09:02:00 c-237-177-40-045 kernel: BUG: KASAN: use-after-free in mlx5_cmd_set_fte+0x200d/0x24c0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_report+0xbb/0x1a0
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_stack+0x1e/0x40
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_set_track+0x21/0x30
Feb 21 09:02:00 c-237-177-40-045 kernel:  __kasan_kmalloc+0x7a/0x90
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_stack+0x1e/0x40
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_set_track+0x21/0x30
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_free_info+0x2a/0x40
Feb 21 09:02:00 c-237-177-40-045 kernel:  ____kasan_slab_free+0x11a/0x1b0
Feb 21 09:02:00 c-237-177-40-045 kernel: page dumped because: kasan: bad access detected
Feb 21 09:02:00 c-237-177-40-045 kernel: mlx5_core 0000:08:00.0: mlx5_cmd_out_err:803:(pid 8833): SET_FLOW_TABLE_ENTRY(0x936) op_mod(0x0) failed, status bad resource state(0x9), syndrome (0xf2ff71), err(-22)
Feb 21 09:02:00 c-237-177-40-045 kernel: mlx5_core 0000:08:00.0 enp8s0f0: Failed to add post action rule
Feb 21 09:02:00 c-237-177-40-045 kernel: mlx5_core 0000:08:00.0: mlx5e_tc_encap_flows_add:190:(pid 8833): Failed to update flow post acts, -22
Feb 21 09:02:00 c-237-177-40-045 kernel: Call Trace:
Feb 21 09:02:00 c-237-177-40-045 kernel:  &lt;TASK&gt;
Feb 21 09:02:00 c-237-177-40-045 kernel:  dump_stack_lvl+0x57/0x7d
Feb 21 09:02:00 c-237-177-40-045 kernel:  print_report+0x170/0x471
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? mlx5_cmd_set_fte+0x200d/0x24c0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_report+0xbb/0x1a0
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? mlx5_cmd_set_fte+0x200d/0x24c0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5_cmd_set_fte+0x200d/0x24c0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? __module_address.part.0+0x62/0x200
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? mlx5_cmd_stub_create_flow_table+0xd0/0xd0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  ? __raw_spin_lock_init+0x3b/0x110
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5_cmd_create_fte+0x80/0xb0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  add_rule_fg+0xe80/0x19c0 [mlx5_core]
--
Feb 21 09:02:00 c-237-177-40-045 kernel: Allocated by task 13476:
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_stack+0x1e/0x40
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_set_track+0x21/0x30
Feb 21 09:02:00 c-237-177-40-045 kernel:  __kasan_kmalloc+0x7a/0x90
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5_packet_reformat_alloc+0x7b/0x230 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_tc_tun_create_header_ipv4+0x977/0xf10 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_attach_encap+0x15b4/0x1e10 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  post_process_attr+0x305/0xa30 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_tc_add_fdb_flow+0x4c0/0xcf0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  __mlx5e_add_fdb_flow+0x7cf/0xe90 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_configure_flower+0xcaa/0x4b90 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_rep_setup_tc_cls_flower+0x99/0x1b0 [mlx5_core]
Feb 21 09:02:00 c-237-177-40-045 kernel:  mlx5e_rep_setup_tc_cb+0x133/0x1e0 [mlx5_core]
--
Feb 21 09:02:00 c-237-177-40-045 kernel: Freed by task 8833:
Feb 21 09:02:00 c-237-177-40-045 kernel:  kasan_save_s
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54262/">CVE-2023-54262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54262">CVE-2023-54262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255881">SUSE bug 1255881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255882">SUSE bug 1255882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54263" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54263" ref_url="https://www.suse.com/security/cve/CVE-2023-54263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP

Fixes OOPS on boards with ANX9805 DP encoders.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54263/">CVE-2023-54263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54263">CVE-2023-54263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255883">SUSE bug 1255883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54265" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54265" ref_url="https://www.suse.com/security/cve/CVE-2023-54265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix an uninit variable access bug in __ip6_make_skb()

Syzbot reported a bug as following:

=====================================================
BUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline]
BUG: KMSAN: uninit-value in arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline]
BUG: KMSAN: uninit-value in atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline]
BUG: KMSAN: uninit-value in __ip6_make_skb+0x2f37/0x30f0 net/ipv6/ip6_output.c:1956
 arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline]
 arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline]
 atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline]
 __ip6_make_skb+0x2f37/0x30f0 net/ipv6/ip6_output.c:1956
 ip6_finish_skb include/net/ipv6.h:1122 [inline]
 ip6_push_pending_frames+0x10e/0x550 net/ipv6/ip6_output.c:1987
 rawv6_push_pending_frames+0xb12/0xb90 net/ipv6/raw.c:579
 rawv6_sendmsg+0x297e/0x2e60 net/ipv6/raw.c:922
 inet_sendmsg+0x101/0x180 net/ipv4/af_inet.c:827
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0xa8e/0xe70 net/socket.c:2476
 ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2530
 __sys_sendmsg net/socket.c:2559 [inline]
 __do_sys_sendmsg net/socket.c:2568 [inline]
 __se_sys_sendmsg net/socket.c:2566 [inline]
 __x64_sys_sendmsg+0x367/0x540 net/socket.c:2566
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Uninit was created at:
 slab_post_alloc_hook mm/slab.h:766 [inline]
 slab_alloc_node mm/slub.c:3452 [inline]
 __kmem_cache_alloc_node+0x71f/0xce0 mm/slub.c:3491
 __do_kmalloc_node mm/slab_common.c:967 [inline]
 __kmalloc_node_track_caller+0x114/0x3b0 mm/slab_common.c:988
 kmalloc_reserve net/core/skbuff.c:492 [inline]
 __alloc_skb+0x3af/0x8f0 net/core/skbuff.c:565
 alloc_skb include/linux/skbuff.h:1270 [inline]
 __ip6_append_data+0x51c1/0x6bb0 net/ipv6/ip6_output.c:1684
 ip6_append_data+0x411/0x580 net/ipv6/ip6_output.c:1854
 rawv6_sendmsg+0x2882/0x2e60 net/ipv6/raw.c:915
 inet_sendmsg+0x101/0x180 net/ipv4/af_inet.c:827
 sock_sendmsg_nosec net/socket.c:714 [inline]
 sock_sendmsg net/socket.c:734 [inline]
 ____sys_sendmsg+0xa8e/0xe70 net/socket.c:2476
 ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2530
 __sys_sendmsg net/socket.c:2559 [inline]
 __do_sys_sendmsg net/socket.c:2568 [inline]
 __se_sys_sendmsg net/socket.c:2566 [inline]
 __x64_sys_sendmsg+0x367/0x540 net/socket.c:2566
 do_syscall_x64 arch/x86/entry/common.c:50 [inline]
 do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

It is because icmp6hdr does not in skb linear region under the scenario
of SOCK_RAW socket. Access icmp6_hdr(skb)-&gt;icmp6_type directly will
trigger the uninit variable access bug.

Use a local variable icmp6_type to carry the correct value in different
scenarios.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54265/">CVE-2023-54265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54265">CVE-2023-54265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255874">SUSE bug 1255874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54269" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54269" ref_url="https://www.suse.com/security/cve/CVE-2023-54269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: double free xprt_ctxt while still in use

When an RPC request is deferred, the rq_xprt_ctxt pointer is moved out
of the svc_rqst into the svc_deferred_req.
When the deferred request is revisited, the pointer is copied into
the new svc_rqst - and also remains in the svc_deferred_req.

In the (rare?) case that the request is deferred a second time, the old
svc_deferred_req is reused - it still has all the correct content.
However in that case the rq_xprt_ctxt pointer is NOT cleared so that
when xpo_release_xprt is called, the ctxt is freed (UDP) or possible
added to a free list (RDMA).
When the deferred request is revisited for a second time, it will
reference this ctxt which may be invalid, and the free the object a
second time which is likely to oops.

So change svc_defer() to *always* clear rq_xprt_ctxt, and assert that
the value is now stored in the svc_deferred_req.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54269/">CVE-2023-54269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54269">CVE-2023-54269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255876">SUSE bug 1255876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54270</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54270" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54270" ref_url="https://www.suse.com/security/cve/CVE-2023-54270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: usb: siano: Fix use after free bugs caused by do_submit_urb

There are UAF bugs caused by do_submit_urb(). One of the KASan reports
is shown below:

[   36.403605] BUG: KASAN: use-after-free in worker_thread+0x4a2/0x890
[   36.406105] Read of size 8 at addr ffff8880059600e8 by task kworker/0:2/49
[   36.408316]
[   36.408867] CPU: 0 PID: 49 Comm: kworker/0:2 Not tainted 6.2.0-rc3-15798-g5a41237ad1d4-dir8
[   36.411696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g15584
[   36.416157] Workqueue:  0x0 (events)
[   36.417654] Call Trace:
[   36.418546]  &lt;TASK&gt;
[   36.419320]  dump_stack_lvl+0x96/0xd0
[   36.420522]  print_address_description+0x75/0x350
[   36.421992]  print_report+0x11b/0x250
[   36.423174]  ? _raw_spin_lock_irqsave+0x87/0xd0
[   36.424806]  ? __virt_addr_valid+0xcf/0x170
[   36.426069]  ? worker_thread+0x4a2/0x890
[   36.427355]  kasan_report+0x131/0x160
[   36.428556]  ? worker_thread+0x4a2/0x890
[   36.430053]  worker_thread+0x4a2/0x890
[   36.431297]  ? worker_clr_flags+0x90/0x90
[   36.432479]  kthread+0x166/0x190
[   36.433493]  ? kthread_blkcg+0x50/0x50
[   36.434669]  ret_from_fork+0x22/0x30
[   36.435923]  &lt;/TASK&gt;
[   36.436684]
[   36.437215] Allocated by task 24:
[   36.438289]  kasan_set_track+0x50/0x80
[   36.439436]  __kasan_kmalloc+0x89/0xa0
[   36.440566]  smsusb_probe+0x374/0xc90
[   36.441920]  usb_probe_interface+0x2d1/0x4c0
[   36.443253]  really_probe+0x1d5/0x580
[   36.444539]  __driver_probe_device+0xe3/0x130
[   36.446085]  driver_probe_device+0x49/0x220
[   36.447423]  __device_attach_driver+0x19e/0x1b0
[   36.448931]  bus_for_each_drv+0xcb/0x110
[   36.450217]  __device_attach+0x132/0x1f0
[   36.451470]  bus_probe_device+0x59/0xf0
[   36.452563]  device_add+0x4ec/0x7b0
[   36.453830]  usb_set_configuration+0xc63/0xe10
[   36.455230]  usb_generic_driver_probe+0x3b/0x80
[   36.456166] printk: console [ttyGS0] disabled
[   36.456569]  usb_probe_device+0x90/0x110
[   36.459523]  really_probe+0x1d5/0x580
[   36.461027]  __driver_probe_device+0xe3/0x130
[   36.462465]  driver_probe_device+0x49/0x220
[   36.463847]  __device_attach_driver+0x19e/0x1b0
[   36.465229]  bus_for_each_drv+0xcb/0x110
[   36.466466]  __device_attach+0x132/0x1f0
[   36.467799]  bus_probe_device+0x59/0xf0
[   36.469010]  device_add+0x4ec/0x7b0
[   36.470125]  usb_new_device+0x863/0xa00
[   36.471374]  hub_event+0x18c7/0x2220
[   36.472746]  process_one_work+0x34c/0x5b0
[   36.474041]  worker_thread+0x4b7/0x890
[   36.475216]  kthread+0x166/0x190
[   36.476267]  ret_from_fork+0x22/0x30
[   36.477447]
[   36.478160] Freed by task 24:
[   36.479239]  kasan_set_track+0x50/0x80
[   36.480512]  kasan_save_free_info+0x2b/0x40
[   36.481808]  ____kasan_slab_free+0x122/0x1a0
[   36.483173]  __kmem_cache_free+0xc4/0x200
[   36.484563]  smsusb_term_device+0xcd/0xf0
[   36.485896]  smsusb_probe+0xc85/0xc90
[   36.486976]  usb_probe_interface+0x2d1/0x4c0
[   36.488303]  really_probe+0x1d5/0x580
[   36.489498]  __driver_probe_device+0xe3/0x130
[   36.491140]  driver_probe_device+0x49/0x220
[   36.492475]  __device_attach_driver+0x19e/0x1b0
[   36.493988]  bus_for_each_drv+0xcb/0x110
[   36.495171]  __device_attach+0x132/0x1f0
[   36.496617]  bus_probe_device+0x59/0xf0
[   36.497875]  device_add+0x4ec/0x7b0
[   36.498972]  usb_set_configuration+0xc63/0xe10
[   36.500264]  usb_generic_driver_probe+0x3b/0x80
[   36.501740]  usb_probe_device+0x90/0x110
[   36.503084]  really_probe+0x1d5/0x580
[   36.504241]  __driver_probe_device+0xe3/0x130
[   36.505548]  driver_probe_device+0x49/0x220
[   36.506766]  __device_attach_driver+0x19e/0x1b0
[   36.508368]  bus_for_each_drv+0xcb/0x110
[   36.509646]  __device_attach+0x132/0x1f0
[   36.510911]  bus_probe_device+0x59/0xf0
[   36.512103]  device_add+0x4ec/0x7b0
[   36.513215]  usb_new_device+0x863/0xa00
[   36.514736]  hub_event+0x18c7/0x2220
[   36.516130]  process_one_work+
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54270/">CVE-2023-54270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54270">CVE-2023-54270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255901">SUSE bug 1255901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54273" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54273" ref_url="https://www.suse.com/security/cve/CVE-2023-54273" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: Fix leak of dev tracker

At the stage of direction checks, the netdev reference tracker is
already initialized, but released with wrong *_put() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54273/">CVE-2023-54273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54273">CVE-2023-54273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255904">SUSE bug 1255904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54274</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54274" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54274" ref_url="https://www.suse.com/security/cve/CVE-2023-54274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/srpt: Add a check for valid 'mad_agent' pointer

When unregistering MAD agent, srpt module has a non-null check
for 'mad_agent' pointer before invoking ib_unregister_mad_agent().
This check can pass if 'mad_agent' variable holds an error value.
The 'mad_agent' can have an error value for a short window when
srpt_add_one() and srpt_remove_one() is executed simultaneously.

In srpt module, added a valid pointer check for 'sport-&gt;mad_agent'
before unregistering MAD agent.

This issue can hit when RoCE driver unregisters ib_device

Stack Trace:
------------
BUG: kernel NULL pointer dereference, address: 000000000000004d
PGD 145003067 P4D 145003067 PUD 2324fe067 PMD 0
Oops: 0002 [#1] PREEMPT SMP NOPTI
CPU: 10 PID: 4459 Comm: kworker/u80:0 Kdump: loaded Tainted: P
Hardware name: Dell Inc. PowerEdge R640/06NR82, BIOS 2.5.4 01/13/2020
Workqueue: bnxt_re bnxt_re_task [bnxt_re]
RIP: 0010:_raw_spin_lock_irqsave+0x19/0x40
Call Trace:
  ib_unregister_mad_agent+0x46/0x2f0 [ib_core]
  IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
  ? __schedule+0x20b/0x560
  srpt_unregister_mad_agent+0x93/0xd0 [ib_srpt]
  srpt_remove_one+0x20/0x150 [ib_srpt]
  remove_client_context+0x88/0xd0 [ib_core]
  bond0: (slave p2p1): link status definitely up, 100000 Mbps full duplex
  disable_device+0x8a/0x160 [ib_core]
  bond0: active interface up!
  ? kernfs_name_hash+0x12/0x80
 (NULL device *): Bonding Info Received: rdev: 000000006c0b8247
  __ib_unregister_device+0x42/0xb0 [ib_core]
 (NULL device *):         Master: mode: 4 num_slaves:2
  ib_unregister_device+0x22/0x30 [ib_core]
 (NULL device *):         Slave: id: 105069936 name:p2p1 link:0 state:0
  bnxt_re_stopqps_and_ib_uninit+0x83/0x90 [bnxt_re]
  bnxt_re_alloc_lag+0x12e/0x4e0 [bnxt_re]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54274/">CVE-2023-54274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54274">CVE-2023-54274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255905">SUSE bug 1255905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54275" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54275" ref_url="https://www.suse.com/security/cve/CVE-2023-54275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: Fix memory leak in ath11k_peer_rx_frag_setup

crypto_alloc_shash() allocates resources, which should be released by
crypto_free_shash(). When ath11k_peer_find() fails, there has memory
leak. Add missing crypto_free_shash() to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54275/">CVE-2023-54275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54275">CVE-2023-54275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255906">SUSE bug 1255906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54276</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54276" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54276" ref_url="https://www.suse.com/security/cve/CVE-2023-54276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: move init of percpu reply_cache_stats counters back to nfsd_init_net

Commit f5f9d4a314da ("nfsd: move reply cache initialization into nfsd
startup") moved the initialization of the reply cache into nfsd startup,
but didn't account for the stats counters, which can be accessed before
nfsd is ever started. The result can be a NULL pointer dereference when
someone accesses /proc/fs/nfsd/reply_cache_stats while nfsd is still
shut down.

This is a regression and a user-triggerable oops in the right situation:

- non-x86_64 arch
- /proc/fs/nfsd is mounted in the namespace
- nfsd is not started in the namespace
- unprivileged user calls "cat /proc/fs/nfsd/reply_cache_stats"

Although this is easy to trigger on some arches (like aarch64), on
x86_64, calling this_cpu_ptr(NULL) evidently returns a pointer to the
fixed_percpu_data. That struct looks just enough like a newly
initialized percpu var to allow nfsd_reply_cache_stats_show to access
it without Oopsing.

Move the initialization of the per-net+per-cpu reply-cache counters
back into nfsd_init_net, while leaving the rest of the reply cache
allocations to be done at nfsd startup time.

Kudos to Eirik who did most of the legwork to track this down.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54276/">CVE-2023-54276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54276">CVE-2023-54276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255907">SUSE bug 1255907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54278</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54278" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54278" ref_url="https://www.suse.com/security/cve/CVE-2023-54278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/vmem: split pages when debug pagealloc is enabled

Since commit bb1520d581a3 ("s390/mm: start kernel with DAT enabled")
the kernel crashes early during boot when debug pagealloc is enabled:

mem auto-init: stack:off, heap alloc:off, heap free:off
addressing exception: 0005 ilc:2 [#1] SMP DEBUG_PAGEALLOC
Modules linked in:
CPU: 0 PID: 0 Comm: swapper Not tainted 6.5.0-rc3-09759-gc5666c912155 #630
[..]
Krnl Code: 00000000001325f6: ec5600248064 cgrj %r5,%r6,8,000000000013263e
           00000000001325fc: eb880002000c srlg %r8,%r8,2
          #0000000000132602: b2210051     ipte %r5,%r1,%r0,0
          &gt;0000000000132606: b90400d1     lgr %r13,%r1
           000000000013260a: 41605008     la %r6,8(%r5)
           000000000013260e: a7db1000     aghi %r13,4096
           0000000000132612: b221006d     ipte %r6,%r13,%r0,0
           0000000000132616: e3d0d0000171 lay %r13,4096(%r13)

Call Trace:
 __kernel_map_pages+0x14e/0x320
 __free_pages_ok+0x23a/0x5a8)
 free_low_memory_core_early+0x214/0x2c8
 memblock_free_all+0x28/0x58
 mem_init+0xb6/0x228
 mm_core_init+0xb6/0x3b0
 start_kernel+0x1d2/0x5a8
 startup_continue+0x36/0x40
Kernel panic - not syncing: Fatal exception: panic_on_oops

This is caused by using large mappings on machines with EDAT1/EDAT2. Add
the code to split the mappings into 4k pages if debug pagealloc is enabled
by CONFIG_DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc kernel
command line option.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54278/">CVE-2023-54278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54278">CVE-2023-54278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255911">SUSE bug 1255911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54283" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54283" ref_url="https://www.suse.com/security/cve/CVE-2023-54283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Address KCSAN report on bpf_lru_list

KCSAN reported a data-race when accessing node-&gt;ref.
Although node-&gt;ref does not have to be accurate,
take this chance to use a more common READ_ONCE() and WRITE_ONCE()
pattern instead of data_race().

There is an existing bpf_lru_node_is_ref() and bpf_lru_node_set_ref().
This patch also adds bpf_lru_node_clear_ref() to do the
WRITE_ONCE(node-&gt;ref, 0) also.

==================================================================
BUG: KCSAN: data-race in __bpf_lru_list_rotate / __htab_lru_percpu_map_update_elem

write to 0xffff888137038deb of 1 bytes by task 11240 on cpu 1:
__bpf_lru_node_move kernel/bpf/bpf_lru_list.c:113 [inline]
__bpf_lru_list_rotate_active kernel/bpf/bpf_lru_list.c:149 [inline]
__bpf_lru_list_rotate+0x1bf/0x750 kernel/bpf/bpf_lru_list.c:240
bpf_lru_list_pop_free_to_local kernel/bpf/bpf_lru_list.c:329 [inline]
bpf_common_lru_pop_free kernel/bpf/bpf_lru_list.c:447 [inline]
bpf_lru_pop_free+0x638/0xe20 kernel/bpf/bpf_lru_list.c:499
prealloc_lru_pop kernel/bpf/hashtab.c:290 [inline]
__htab_lru_percpu_map_update_elem+0xe7/0x820 kernel/bpf/hashtab.c:1316
bpf_percpu_hash_update+0x5e/0x90 kernel/bpf/hashtab.c:2313
bpf_map_update_value+0x2a9/0x370 kernel/bpf/syscall.c:200
generic_map_update_batch+0x3ae/0x4f0 kernel/bpf/syscall.c:1687
bpf_map_do_batch+0x2d9/0x3d0 kernel/bpf/syscall.c:4534
__sys_bpf+0x338/0x810
__do_sys_bpf kernel/bpf/syscall.c:5096 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5094 [inline]
__x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

read to 0xffff888137038deb of 1 bytes by task 11241 on cpu 0:
bpf_lru_node_set_ref kernel/bpf/bpf_lru_list.h:70 [inline]
__htab_lru_percpu_map_update_elem+0x2f1/0x820 kernel/bpf/hashtab.c:1332
bpf_percpu_hash_update+0x5e/0x90 kernel/bpf/hashtab.c:2313
bpf_map_update_value+0x2a9/0x370 kernel/bpf/syscall.c:200
generic_map_update_batch+0x3ae/0x4f0 kernel/bpf/syscall.c:1687
bpf_map_do_batch+0x2d9/0x3d0 kernel/bpf/syscall.c:4534
__sys_bpf+0x338/0x810
__do_sys_bpf kernel/bpf/syscall.c:5096 [inline]
__se_sys_bpf kernel/bpf/syscall.c:5094 [inline]
__x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5094
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

value changed: 0x01 -&gt; 0x00

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 PID: 11241 Comm: syz-executor.3 Not tainted 6.3.0-rc7-syzkaller-00136-g6a66fdd29ea1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/30/2023
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54283/">CVE-2023-54283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54283">CVE-2023-54283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255809">SUSE bug 1255809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54286" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54286" ref_url="https://www.suse.com/security/cve/CVE-2023-54286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: dvm: Fix memcpy: detected field-spanning write backtrace

A received TKIP key may be up to 32 bytes because it may contain
MIC rx/tx keys too. These are not used by iwl and copying these
over overflows the iwl_keyinfo.key field.

Add a check to not copy more data to iwl_keyinfo.key then will fit.

This fixes backtraces like this one:

 memcpy: detected field-spanning write (size 32) of single field "sta_cmd.key.key" at drivers/net/wireless/intel/iwlwifi/dvm/sta.c:1103 (size 16)
 WARNING: CPU: 1 PID: 946 at drivers/net/wireless/intel/iwlwifi/dvm/sta.c:1103 iwlagn_send_sta_key+0x375/0x390 [iwldvm]
 &lt;snip&gt;
 Hardware name: Dell Inc. Latitude E6430/0H3MT5, BIOS A21 05/08/2017
 RIP: 0010:iwlagn_send_sta_key+0x375/0x390 [iwldvm]
 &lt;snip&gt;
 Call Trace:
  &lt;TASK&gt;
  iwl_set_dynamic_key+0x1f0/0x220 [iwldvm]
  iwlagn_mac_set_key+0x1e4/0x280 [iwldvm]
  drv_set_key+0xa4/0x1b0 [mac80211]
  ieee80211_key_enable_hw_accel+0xa8/0x2d0 [mac80211]
  ieee80211_key_replace+0x22d/0x8e0 [mac80211]
 &lt;snip&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54286/">CVE-2023-54286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54286">CVE-2023-54286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255803">SUSE bug 1255803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54289</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54289" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54289" ref_url="https://www.suse.com/security/cve/CVE-2023-54289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Fix NULL dereference in error handling

Smatch reported:

drivers/scsi/qedf/qedf_main.c:3056 qedf_alloc_global_queues()
warn: missing unwind goto?

At this point in the function, nothing has been allocated so we can return
directly. In particular the "qedf-&gt;global_queues" have not been allocated
so calling qedf_free_global_queues() will lead to a NULL dereference when
we check if (!gl[i]) and "gl" is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54289/">CVE-2023-54289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54289">CVE-2023-54289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255806">SUSE bug 1255806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54292</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54292" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54292" ref_url="https://www.suse.com/security/cve/CVE-2023-54292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix data race on CQP request done

KCSAN detects a data race on cqp_request-&gt;request_done memory location
which is accessed locklessly in irdma_handle_cqp_op while being
updated in irdma_cqp_ce_handler.

Annotate lockless intent with READ_ONCE/WRITE_ONCE to avoid any
compiler optimizations like load fusing and/or KCSAN warning.

[222808.417128] BUG: KCSAN: data-race in irdma_cqp_ce_handler [irdma] / irdma_wait_event [irdma]

[222808.417532] write to 0xffff8e44107019dc of 1 bytes by task 29658 on cpu 5:
[222808.417610]  irdma_cqp_ce_handler+0x21e/0x270 [irdma]
[222808.417725]  cqp_compl_worker+0x1b/0x20 [irdma]
[222808.417827]  process_one_work+0x4d1/0xa40
[222808.417835]  worker_thread+0x319/0x700
[222808.417842]  kthread+0x180/0x1b0
[222808.417852]  ret_from_fork+0x22/0x30

[222808.417918] read to 0xffff8e44107019dc of 1 bytes by task 29688 on cpu 1:
[222808.417995]  irdma_wait_event+0x1e2/0x2c0 [irdma]
[222808.418099]  irdma_handle_cqp_op+0xae/0x170 [irdma]
[222808.418202]  irdma_cqp_cq_destroy_cmd+0x70/0x90 [irdma]
[222808.418308]  irdma_puda_dele_rsrc+0x46d/0x4d0 [irdma]
[222808.418411]  irdma_rt_deinit_hw+0x179/0x1d0 [irdma]
[222808.418514]  irdma_ib_dealloc_device+0x11/0x40 [irdma]
[222808.418618]  ib_dealloc_device+0x2a/0x120 [ib_core]
[222808.418823]  __ib_unregister_device+0xde/0x100 [ib_core]
[222808.418981]  ib_unregister_device+0x22/0x40 [ib_core]
[222808.419142]  irdma_ib_unregister_device+0x70/0x90 [irdma]
[222808.419248]  i40iw_close+0x6f/0xc0 [irdma]
[222808.419352]  i40e_client_device_unregister+0x14a/0x180 [i40e]
[222808.419450]  i40iw_remove+0x21/0x30 [irdma]
[222808.419554]  auxiliary_bus_remove+0x31/0x50
[222808.419563]  device_remove+0x69/0xb0
[222808.419572]  device_release_driver_internal+0x293/0x360
[222808.419582]  driver_detach+0x7c/0xf0
[222808.419592]  bus_remove_driver+0x8c/0x150
[222808.419600]  driver_unregister+0x45/0x70
[222808.419610]  auxiliary_driver_unregister+0x16/0x30
[222808.419618]  irdma_exit_module+0x18/0x1e [irdma]
[222808.419733]  __do_sys_delete_module.constprop.0+0x1e2/0x310
[222808.419745]  __x64_sys_delete_module+0x1b/0x30
[222808.419755]  do_syscall_64+0x39/0x90
[222808.419763]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

[222808.419829] value changed: 0x01 -&gt; 0x03
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54292/">CVE-2023-54292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54292">CVE-2023-54292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255800">SUSE bug 1255800</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54294" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54294" ref_url="https://www.suse.com/security/cve/CVE-2023-54294" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix memleak of md thread

In raid10_run(), if setup_conf() succeed and raid10_run() failed before
setting 'mddev-&gt;thread', then in the error path 'conf-&gt;thread' is not
freed.

Fix the problem by setting 'mddev-&gt;thread' right after setup_conf().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54294/">CVE-2023-54294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54294">CVE-2023-54294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255802">SUSE bug 1255802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54296</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54296" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54296" ref_url="https://www.suse.com/security/cve/CVE-2023-54296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration

Fix a goof where KVM tries to grab source vCPUs from the destination VM
when doing intrahost migration.  Grabbing the wrong vCPU not only hoses
the guest, it also crashes the host due to the VMSA pointer being left
NULL.

  BUG: unable to handle page fault for address: ffffe38687000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP NOPTI
  CPU: 39 PID: 17143 Comm: sev_migrate_tes Tainted: GO       6.5.0-smp--fff2e47e6c3b-next #151
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.28.0 07/10/2023
  RIP: 0010:__free_pages+0x15/0xd0
  RSP: 0018:ffff923fcf6e3c78 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffffe38687000000 RCX: 0000000000000100
  RDX: 0000000000000100 RSI: 0000000000000000 RDI: ffffe38687000000
  RBP: ffff923fcf6e3c88 R08: ffff923fcafb0000 R09: 0000000000000000
  R10: 0000000000000000 R11: ffffffff83619b90 R12: ffff923fa9540000
  R13: 0000000000080007 R14: ffff923f6d35d000 R15: 0000000000000000
  FS:  0000000000000000(0000) GS:ffff929d0d7c0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffe38687000000 CR3: 0000005224c34005 CR4: 0000000000770ee0
  PKRU: 55555554
  Call Trace:
   &lt;TASK&gt;
   sev_free_vcpu+0xcb/0x110 [kvm_amd]
   svm_vcpu_free+0x75/0xf0 [kvm_amd]
   kvm_arch_vcpu_destroy+0x36/0x140 [kvm]
   kvm_destroy_vcpus+0x67/0x100 [kvm]
   kvm_arch_destroy_vm+0x161/0x1d0 [kvm]
   kvm_put_kvm+0x276/0x560 [kvm]
   kvm_vm_release+0x25/0x30 [kvm]
   __fput+0x106/0x280
   ____fput+0x12/0x20
   task_work_run+0x86/0xb0
   do_exit+0x2e3/0x9c0
   do_group_exit+0xb1/0xc0
   __x64_sys_exit_group+0x1b/0x20
   do_syscall_64+0x41/0x90
   entry_SYSCALL_64_after_hwframe+0x63/0xcd
   &lt;/TASK&gt;
  CR2: ffffe38687000000
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54296/">CVE-2023-54296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54296">CVE-2023-54296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255793">SUSE bug 1255793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54300</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54300" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54300" ref_url="https://www.suse.com/security/cve/CVE-2023-54300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx

For the reasons also described in commit b383e8abed41 ("wifi: ath9k: avoid
uninit memory read in ath9k_htc_rx_msg()"), ath9k_htc_rx_msg() should
validate pkt_len before accessing the SKB.

For example, the obtained SKB may have been badly constructed with
pkt_len = 8. In this case, the SKB can only contain a valid htc_frame_hdr
but after being processed in ath9k_htc_rx_msg() and passed to
ath9k_wmi_ctrl_rx() endpoint RX handler, it is expected to have a WMI
command header which should be located inside its data payload.

Implement sanity checking inside ath9k_wmi_ctrl_rx(). Otherwise, uninit
memory can be referenced.

Tested on Qualcomm Atheros Communications AR9271 802.11n .

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54300/">CVE-2023-54300 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54300">CVE-2023-54300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255790">SUSE bug 1255790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54302" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54302" ref_url="https://www.suse.com/security/cve/CVE-2023-54302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: Fix data race on CQP completion stats

CQP completion statistics is read lockesly in irdma_wait_event and
irdma_check_cqp_progress while it can be updated in the completion
thread irdma_sc_ccq_get_cqe_info on another CPU as KCSAN reports.

Make completion statistics an atomic variable to reflect coherent updates
to it. This will also avoid load/store tearing logic bug potentially
possible by compiler optimizations.

[77346.170861] BUG: KCSAN: data-race in irdma_handle_cqp_op [irdma] / irdma_sc_ccq_get_cqe_info [irdma]

[77346.171383] write to 0xffff8a3250b108e0 of 8 bytes by task 9544 on cpu 4:
[77346.171483]  irdma_sc_ccq_get_cqe_info+0x27a/0x370 [irdma]
[77346.171658]  irdma_cqp_ce_handler+0x164/0x270 [irdma]
[77346.171835]  cqp_compl_worker+0x1b/0x20 [irdma]
[77346.172009]  process_one_work+0x4d1/0xa40
[77346.172024]  worker_thread+0x319/0x700
[77346.172037]  kthread+0x180/0x1b0
[77346.172054]  ret_from_fork+0x22/0x30

[77346.172136] read to 0xffff8a3250b108e0 of 8 bytes by task 9838 on cpu 2:
[77346.172234]  irdma_handle_cqp_op+0xf4/0x4b0 [irdma]
[77346.172413]  irdma_cqp_aeq_cmd+0x75/0xa0 [irdma]
[77346.172592]  irdma_create_aeq+0x390/0x45a [irdma]
[77346.172769]  irdma_rt_init_hw.cold+0x212/0x85d [irdma]
[77346.172944]  irdma_probe+0x54f/0x620 [irdma]
[77346.173122]  auxiliary_bus_probe+0x66/0xa0
[77346.173137]  really_probe+0x140/0x540
[77346.173154]  __driver_probe_device+0xc7/0x220
[77346.173173]  driver_probe_device+0x5f/0x140
[77346.173190]  __driver_attach+0xf0/0x2c0
[77346.173208]  bus_for_each_dev+0xa8/0xf0
[77346.173225]  driver_attach+0x29/0x30
[77346.173240]  bus_add_driver+0x29c/0x2f0
[77346.173255]  driver_register+0x10f/0x1a0
[77346.173272]  __auxiliary_driver_register+0xbc/0x140
[77346.173287]  irdma_init_module+0x55/0x1000 [irdma]
[77346.173460]  do_one_initcall+0x7d/0x410
[77346.173475]  do_init_module+0x81/0x2c0
[77346.173491]  load_module+0x1232/0x12c0
[77346.173506]  __do_sys_finit_module+0x101/0x180
[77346.173522]  __x64_sys_finit_module+0x3c/0x50
[77346.173538]  do_syscall_64+0x39/0x90
[77346.173553]  entry_SYSCALL_64_after_hwframe+0x63/0xcd

[77346.173634] value changed: 0x0000000000000094 -&gt; 0x0000000000000095
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54302/">CVE-2023-54302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54302">CVE-2023-54302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255792">SUSE bug 1255792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54303</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54303" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54303" ref_url="https://www.suse.com/security/cve/CVE-2023-54303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Disable preemption in bpf_perf_event_output

The nesting protection in bpf_perf_event_output relies on disabled
preemption, which is guaranteed for kprobes and tracepoints.

However bpf_perf_event_output can be also called from uprobes context
through bpf_prog_run_array_sleepable function which disables migration,
but keeps preemption enabled.

This can cause task to be preempted by another one inside the nesting
protection and lead eventually to two tasks using same perf_sample_data
buffer and cause crashes like:

  kernel tried to execute NX-protected page - exploit attempt? (uid: 0)
  BUG: unable to handle page fault for address: ffffffff82be3eea
  ...
  Call Trace:
   ? __die+0x1f/0x70
   ? page_fault_oops+0x176/0x4d0
   ? exc_page_fault+0x132/0x230
   ? asm_exc_page_fault+0x22/0x30
   ? perf_output_sample+0x12b/0x910
   ? perf_event_output+0xd0/0x1d0
   ? bpf_perf_event_output+0x162/0x1d0
   ? bpf_prog_c6271286d9a4c938_krava1+0x76/0x87
   ? __uprobe_perf_func+0x12b/0x540
   ? uprobe_dispatcher+0x2c4/0x430
   ? uprobe_notify_resume+0x2da/0xce0
   ? atomic_notifier_call_chain+0x7b/0x110
   ? exit_to_user_mode_prepare+0x13e/0x290
   ? irqentry_exit_to_user_mode+0x5/0x30
   ? asm_exc_int3+0x35/0x40

Fixing this by disabling preemption in bpf_perf_event_output.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54303/">CVE-2023-54303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54303">CVE-2023-54303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255785">SUSE bug 1255785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54306</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54306" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54306" ref_url="https://www.suse.com/security/cve/CVE-2023-54306" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tls: avoid hanging tasks on the tx_lock

syzbot sent a hung task report and Eric explains that adversarial
receiver may keep RWIN at 0 for a long time, so we are not guaranteed
to make forward progress. Thread which took tx_lock and went to sleep
may not release tx_lock for hours. Use interruptible sleep where
possible and reschedule the work if it can't take the lock.

Testing: existing selftest passes
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54306/">CVE-2023-54306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54306">CVE-2023-54306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255788">SUSE bug 1255788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54308</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54308" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54308" ref_url="https://www.suse.com/security/cve/CVE-2023-54308" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ymfpci: Create card with device-managed snd_devm_card_new()

snd_card_ymfpci_remove() was removed in commit c6e6bb5eab74 ("ALSA:
ymfpci: Allocate resources with device-managed APIs"), but the call to
snd_card_new() was not replaced with snd_devm_card_new().

Since there was no longer a call to snd_card_free, unloading the module
would eventually result in Oops:

[697561.532887] BUG: unable to handle page fault for address: ffffffffc0924480
[697561.532893] #PF: supervisor read access in kernel mode
[697561.532896] #PF: error_code(0x0000) - not-present page
[697561.532899] PGD ae1e15067 P4D ae1e15067 PUD ae1e17067 PMD 11a8f5067 PTE 0
[697561.532905] Oops: 0000 [#1] PREEMPT SMP NOPTI
[697561.532909] CPU: 21 PID: 5080 Comm: wireplumber Tainted: G        W  OE      6.2.7 #1
[697561.532914] Hardware name: System manufacturer System Product Name/TUF GAMING X570-PLUS, BIOS 4408 10/28/2022
[697561.532916] RIP: 0010:try_module_get.part.0+0x1a/0xe0
[697561.532924] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 41 55 41 54 49 89 fc bf 01 00 00 00 e8 56 3c f8 ff &lt;41&gt; 83 3c 24 02 0f 84 96 00 00 00 41 8b 84 24 30 03 00 00 85 c0 0f
[697561.532927] RSP: 0018:ffffbe9b858c3bd8 EFLAGS: 00010246
[697561.532930] RAX: ffff9815d14f1900 RBX: ffff9815c14e6000 RCX: 0000000000000000
[697561.532933] RDX: 0000000000000000 RSI: ffffffffc055092c RDI: ffffffffb3778c1a
[697561.532935] RBP: ffffbe9b858c3be8 R08: 0000000000000040 R09: ffff981a1a741380
[697561.532937] R10: ffffbe9b858c3c80 R11: 00000009d56533a6 R12: ffffffffc0924480
[697561.532939] R13: ffff9823439d8500 R14: 0000000000000025 R15: ffff9815cd109f80
[697561.532942] FS:  00007f13084f1f80(0000) GS:ffff9824aef40000(0000) knlGS:0000000000000000
[697561.532945] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[697561.532947] CR2: ffffffffc0924480 CR3: 0000000145344000 CR4: 0000000000350ee0
[697561.532949] Call Trace:
[697561.532951]  &lt;TASK&gt;
[697561.532955]  try_module_get+0x13/0x30
[697561.532960]  snd_ctl_open+0x61/0x1c0 [snd]
[697561.532976]  snd_open+0xb4/0x1e0 [snd]
[697561.532989]  chrdev_open+0xc7/0x240
[697561.532995]  ? fsnotify_perm.part.0+0x6e/0x160
[697561.533000]  ? __pfx_chrdev_open+0x10/0x10
[697561.533005]  do_dentry_open+0x169/0x440
[697561.533009]  vfs_open+0x2d/0x40
[697561.533012]  path_openat+0xa9d/0x10d0
[697561.533017]  ? debug_smp_processor_id+0x17/0x20
[697561.533022]  ? trigger_load_balance+0x65/0x370
[697561.533026]  do_filp_open+0xb2/0x160
[697561.533032]  ? _raw_spin_unlock+0x19/0x40
[697561.533036]  ? alloc_fd+0xa9/0x190
[697561.533040]  do_sys_openat2+0x9f/0x160
[697561.533044]  __x64_sys_openat+0x55/0x90
[697561.533048]  do_syscall_64+0x3b/0x90
[697561.533052]  entry_SYSCALL_64_after_hwframe+0x72/0xdc
[697561.533056] RIP: 0033:0x7f1308a40db4
[697561.533059] Code: 24 20 eb 8f 66 90 44 89 54 24 0c e8 46 68 f8 ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 32 44 89 c7 89 44 24 0c e8 78 68 f8 ff 8b 44
[697561.533062] RSP: 002b:00007ffcce664450 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[697561.533066] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f1308a40db4
[697561.533068] RDX: 0000000000080000 RSI: 00007ffcce664690 RDI: 00000000ffffff9c
[697561.533070] RBP: 00007ffcce664690 R08: 0000000000000000 R09: 0000000000000012
[697561.533072] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000080000
[697561.533074] R13: 00007f13054b069b R14: 0000565209f83200 R15: 0000000000000000
[697561.533078]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54308/">CVE-2023-54308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54308">CVE-2023-54308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255779">SUSE bug 1255779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54309</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54309" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54309" ref_url="https://www.suse.com/security/cve/CVE-2023-54309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: tpm_vtpm_proxy: fix a race condition in /dev/vtpmx creation

/dev/vtpmx is made visible before 'workqueue' is initialized, which can
lead to a memory corruption in the worst case scenario.

Address this by initializing 'workqueue' as the very first step of the
driver initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54309/">CVE-2023-54309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54309">CVE-2023-54309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255780">SUSE bug 1255780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54312</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54312" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54312" ref_url="https://www.suse.com/security/cve/CVE-2023-54312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

samples/bpf: Fix buffer overflow in tcp_basertt

Using sizeof(nv) or strlen(nv)+1 is correct.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54312/">CVE-2023-54312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54312">CVE-2023-54312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255774">SUSE bug 1255774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54313" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54313" ref_url="https://www.suse.com/security/cve/CVE-2023-54313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix null pointer dereference in ovl_get_acl_rcu()

Following process:
         P1                     P2
 path_openat
  link_path_walk
   may_lookup
    inode_permission(rcu)
     ovl_permission
      acl_permission_check
       check_acl
        get_cached_acl_rcu
	 ovl_get_inode_acl
	  realinode = ovl_inode_real(ovl_inode)
	                      drop_cache
		               __dentry_kill(ovl_dentry)
				iput(ovl_inode)
		                 ovl_destroy_inode(ovl_inode)
		                  dput(oi-&gt;__upperdentry)
		                   dentry_kill(upperdentry)
		                    dentry_unlink_inode
				     upperdentry-&gt;d_inode = NULL
	    ovl_inode_upper
	     upperdentry = ovl_i_dentry_upper(ovl_inode)
	     d_inode(upperdentry) // returns NULL
	  IS_POSIXACL(realinode) // NULL pointer dereference
, will trigger an null pointer dereference at realinode:
  [  205.472797] BUG: kernel NULL pointer dereference, address:
                 0000000000000028
  [  205.476701] CPU: 2 PID: 2713 Comm: ls Not tainted
                 6.3.0-12064-g2edfa098e750-dirty #1216
  [  205.478754] RIP: 0010:do_ovl_get_acl+0x5d/0x300
  [  205.489584] Call Trace:
  [  205.489812]  &lt;TASK&gt;
  [  205.490014]  ovl_get_inode_acl+0x26/0x30
  [  205.490466]  get_cached_acl_rcu+0x61/0xa0
  [  205.490908]  generic_permission+0x1bf/0x4e0
  [  205.491447]  ovl_permission+0x79/0x1b0
  [  205.491917]  inode_permission+0x15e/0x2c0
  [  205.492425]  link_path_walk+0x115/0x550
  [  205.493311]  path_lookupat.isra.0+0xb2/0x200
  [  205.493803]  filename_lookup+0xda/0x240
  [  205.495747]  vfs_fstatat+0x7b/0xb0

Fetch a reproducer in [Link].

Use the helper ovl_i_path_realinode() to get realinode and then do
non-nullptr checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54313/">CVE-2023-54313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54313">CVE-2023-54313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255775">SUSE bug 1255775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54316</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54316" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54316" ref_url="https://www.suse.com/security/cve/CVE-2023-54316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

refscale: Fix uninitalized use of wait_queue_head_t

Running the refscale test occasionally crashes the kernel with the
following error:

[ 8569.952896] BUG: unable to handle page fault for address: ffffffffffffffe8
[ 8569.952900] #PF: supervisor read access in kernel mode
[ 8569.952902] #PF: error_code(0x0000) - not-present page
[ 8569.952904] PGD c4b048067 P4D c4b049067 PUD c4b04b067 PMD 0
[ 8569.952910] Oops: 0000 [#1] PREEMPT_RT SMP NOPTI
[ 8569.952916] Hardware name: Dell Inc. PowerEdge R750/0WMWCR, BIOS 1.2.4 05/28/2021
[ 8569.952917] RIP: 0010:prepare_to_wait_event+0x101/0x190
  :
[ 8569.952940] Call Trace:
[ 8569.952941]  &lt;TASK&gt;
[ 8569.952944]  ref_scale_reader+0x380/0x4a0 [refscale]
[ 8569.952959]  kthread+0x10e/0x130
[ 8569.952966]  ret_from_fork+0x1f/0x30
[ 8569.952973]  &lt;/TASK&gt;

The likely cause is that init_waitqueue_head() is called after the call to
the torture_create_kthread() function that creates the ref_scale_reader
kthread.  Although this init_waitqueue_head() call will very likely
complete before this kthread is created and starts running, it is
possible that the calling kthread will be delayed between the calls to
torture_create_kthread() and init_waitqueue_head().  In this case, the
new kthread will use the waitqueue head before it is properly initialized,
which is not good for the kernel's health and well-being.

The above crash happened here:

	static inline void __add_wait_queue(...)
	{
		:
		if (!(wq-&gt;flags &amp; WQ_FLAG_PRIORITY)) &lt;=== Crash here

The offset of flags from list_head entry in wait_queue_entry is
-0x18. If reader_tasks[i].wq.head.next is NULL as allocated reader_task
structure is zero initialized, the instruction will try to access address
0xffffffffffffffe8, which is exactly the fault address listed above.

This commit therefore invokes init_waitqueue_head() before creating
the kthread.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54316/">CVE-2023-54316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54316">CVE-2023-54316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255770">SUSE bug 1255770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54317</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54317" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54317" ref_url="https://www.suse.com/security/cve/CVE-2023-54317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm flakey: don't corrupt the zero page

When we need to zero some range on a block device, the function
__blkdev_issue_zero_pages submits a write bio with the bio vector pointing
to the zero page. If we use dm-flakey with corrupt bio writes option, it
will corrupt the content of the zero page which results in crashes of
various userspace programs. Glibc assumes that memory returned by mmap is
zeroed and it uses it for calloc implementation; if the newly mapped
memory is not zeroed, calloc will return non-zeroed memory.

Fix this bug by testing if the page is equal to ZERO_PAGE(0) and
avoiding the corruption in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54317/">CVE-2023-54317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54317">CVE-2023-54317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255771">SUSE bug 1255771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54320</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54320" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54320" ref_url="https://www.suse.com/security/cve/CVE-2023-54320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd: pmc: Fix memory leak in amd_pmc_stb_debugfs_open_v2()

Function amd_pmc_stb_debugfs_open_v2() may be called when the STB
debug mechanism enabled.

When amd_pmc_send_cmd() fails, the 'buf' needs to be released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54320/">CVE-2023-54320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54320">CVE-2023-54320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255761">SUSE bug 1255761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54321" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54321" ref_url="https://www.suse.com/security/cve/CVE-2023-54321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: fix potential null-ptr-deref in device_add()

I got the following null-ptr-deref report while doing fault injection test:

BUG: kernel NULL pointer dereference, address: 0000000000000058
CPU: 2 PID: 278 Comm: 37-i2c-ds2482 Tainted: G    B   W        N 6.1.0-rc3+
RIP: 0010:klist_put+0x2d/0xd0
Call Trace:
 &lt;TASK&gt;
 klist_remove+0xf1/0x1c0
 device_release_driver_internal+0x196/0x210
 bus_remove_device+0x1bd/0x240
 device_add+0xd3d/0x1100
 w1_add_master_device+0x476/0x490 [wire]
 ds2482_probe+0x303/0x3e0 [ds2482]

This is how it happened:

w1_alloc_dev()
  // The dev-&gt;driver is set to w1_master_driver.
  memcpy(&amp;dev-&gt;dev, device, sizeof(struct device));
  device_add()
    bus_add_device()
    dpm_sysfs_add() // It fails, calls bus_remove_device.

    // error path
    bus_remove_device()
      // The dev-&gt;driver is not null, but driver is not bound.
      __device_release_driver()
        klist_remove(&amp;dev-&gt;p-&gt;knode_driver) &lt;-- It causes null-ptr-deref.

    // normal path
    bus_probe_device() // It's not called yet.
      device_bind_driver()

If dev-&gt;driver is set, in the error path after calling bus_add_device()
in device_add(), bus_remove_device() is called, then the device will be
detached from driver. But device_bind_driver() is not called yet, so it
causes null-ptr-deref while access the 'knode_driver'. To fix this, set
dev-&gt;driver to null in the error path before calling bus_remove_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54321/">CVE-2023-54321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-54321">CVE-2023-54321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255762">SUSE bug 1255762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54322" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54322" ref_url="https://www.suse.com/security/cve/CVE-2023-54322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: set __exception_irq_entry with __irq_entry as a default

filter_irq_stacks() is supposed to cut entries which are related irq entries
from its call stack.
And in_irqentry_text() which is called by filter_irq_stacks()
uses __irqentry_text_start/end symbol to find irq entries in callstack.

But it doesn't work correctly as without "CONFIG_FUNCTION_GRAPH_TRACER",
arm64 kernel doesn't include gic_handle_irq which is entry point of arm64 irq
between __irqentry_text_start and __irqentry_text_end as we discussed in below link.
https://lore.kernel.org/all/CACT4Y+aReMGLYua2rCLHgFpS9io5cZC04Q8GLs-uNmrn1ezxYQ@mail.gmail.com/#t

This problem can makes unintentional deep call stack entries especially
in KASAN enabled situation as below.

[ 2479.383395]I[0:launcher-loader: 1719] Stack depot reached limit capacity
[ 2479.383538]I[0:launcher-loader: 1719] WARNING: CPU: 0 PID: 1719 at lib/stackdepot.c:129 __stack_depot_save+0x464/0x46c
[ 2479.385693]I[0:launcher-loader: 1719] pstate: 624000c5 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--)
[ 2479.385724]I[0:launcher-loader: 1719] pc : __stack_depot_save+0x464/0x46c
[ 2479.385751]I[0:launcher-loader: 1719] lr : __stack_depot_save+0x460/0x46c
[ 2479.385774]I[0:launcher-loader: 1719] sp : ffffffc0080073c0
[ 2479.385793]I[0:launcher-loader: 1719] x29: ffffffc0080073e0 x28: ffffffd00b78a000 x27: 0000000000000000
[ 2479.385839]I[0:launcher-loader: 1719] x26: 000000000004d1dd x25: ffffff891474f000 x24: 00000000ca64d1dd
[ 2479.385882]I[0:launcher-loader: 1719] x23: 0000000000000200 x22: 0000000000000220 x21: 0000000000000040
[ 2479.385925]I[0:launcher-loader: 1719] x20: ffffffc008007440 x19: 0000000000000000 x18: 0000000000000000
[ 2479.385969]I[0:launcher-loader: 1719] x17: 2065726568207475 x16: 000000000000005e x15: 2d2d2d2d2d2d2d20
[ 2479.386013]I[0:launcher-loader: 1719] x14: 5d39313731203a72 x13: 00000000002f6b30 x12: 00000000002f6af8
[ 2479.386057]I[0:launcher-loader: 1719] x11: 00000000ffffffff x10: ffffffb90aacf000 x9 : e8a74a6c16008800
[ 2479.386101]I[0:launcher-loader: 1719] x8 : e8a74a6c16008800 x7 : 00000000002f6b30 x6 : 00000000002f6af8
[ 2479.386145]I[0:launcher-loader: 1719] x5 : ffffffc0080070c8 x4 : ffffffd00b192380 x3 : ffffffd0092b313c
[ 2479.386189]I[0:launcher-loader: 1719] x2 : 0000000000000001 x1 : 0000000000000004 x0 : 0000000000000022
[ 2479.386231]I[0:launcher-loader: 1719] Call trace:
[ 2479.386248]I[0:launcher-loader: 1719]  __stack_depot_save+0x464/0x46c
[ 2479.386273]I[0:launcher-loader: 1719]  kasan_save_stack+0x58/0x70
[ 2479.386303]I[0:launcher-loader: 1719]  save_stack_info+0x34/0x138
[ 2479.386331]I[0:launcher-loader: 1719]  kasan_save_free_info+0x18/0x24
[ 2479.386358]I[0:launcher-loader: 1719]  ____kasan_slab_free+0x16c/0x170
[ 2479.386385]I[0:launcher-loader: 1719]  __kasan_slab_free+0x10/0x20
[ 2479.386410]I[0:launcher-loader: 1719]  kmem_cache_free+0x238/0x53c
[ 2479.386435]I[0:launcher-loader: 1719]  mempool_free_slab+0x1c/0x28
[ 2479.386460]I[0:launcher-loader: 1719]  mempool_free+0x7c/0x1a0
[ 2479.386484]I[0:launcher-loader: 1719]  bvec_free+0x34/0x80
[ 2479.386514]I[0:launcher-loader: 1719]  bio_free+0x60/0x98
[ 2479.386540]I[0:launcher-loader: 1719]  bio_put+0x50/0x21c
[ 2479.386567]I[0:launcher-loader: 1719]  f2fs_write_end_io+0x4ac/0x4d0
[ 2479.386594]I[0:launcher-loader: 1719]  bio_endio+0x2dc/0x300
[ 2479.386622]I[0:launcher-loader: 1719]  __dm_io_complete+0x324/0x37c
[ 2479.386650]I[0:launcher-loader: 1719]  dm_io_dec_pending+0x60/0xa4
[ 2479.386676]I[0:launcher-loader: 1719]  clone_endio+0xf8/0x2f0
[ 2479.386700]I[0:launcher-loader: 1719]  bio_endio+0x2dc/0x300
[ 2479.386727]I[0:launcher-loader: 1719]  blk_update_request+0x258/0x63c
[ 2479.386754]I[0:launcher-loader: 1719]  scsi_end_request+0x50/0x304
[ 2479.386782]I[0:launcher-loader: 1719]  scsi_io_completion+0x88/0x160
[ 2479.386808]I[0:launcher-loader: 1719]  scsi_finish_command+0x17c/0x194
[ 2479.386833]I
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54322/">CVE-2023-54322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54322">CVE-2023-54322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255763">SUSE bug 1255763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54324</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54324" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54324" ref_url="https://www.suse.com/security/cve/CVE-2023-54324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix a race condition in retrieve_deps

There's a race condition in the multipath target when retrieve_deps
races with multipath_message calling dm_get_device and dm_put_device.
retrieve_deps walks the list of open devices without holding any lock
but multipath may add or remove devices to the list while it is
running. The end result may be memory corruption or use-after-free
memory access.

See this description of a UAF with multipath_message():
https://listman.redhat.com/archives/dm-devel/2022-October/052373.html

Fix this bug by introducing a new rw semaphore "devices_lock". We grab
devices_lock for read in retrieve_deps and we grab it for write in
dm_get_device and dm_put_device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54324/">CVE-2023-54324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54324">CVE-2023-54324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255759">SUSE bug 1255759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54325</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54325" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54325" ref_url="https://www.suse.com/security/cve/CVE-2023-54325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - fix out-of-bounds read

When preparing an AER-CTR request, the driver copies the key provided by
the user into a data structure that is accessible by the firmware.
If the target device is QAT GEN4, the key size is rounded up by 16 since
a rounded up size is expected by the device.
If the key size is rounded up before the copy, the size used for copying
the key might be bigger than the size of the region containing the key,
causing an out-of-bounds read.

Fix by doing the copy first and then update the keylen.

This is to fix the following warning reported by KASAN:

	[  138.150574] BUG: KASAN: global-out-of-bounds in qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]
	[  138.150641] Read of size 32 at addr ffffffff88c402c0 by task cryptomgr_test/2340

	[  138.150651] CPU: 15 PID: 2340 Comm: cryptomgr_test Not tainted 6.2.0-rc1+ #45
	[  138.150659] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.86B.0087.D13.2208261706 08/26/2022
	[  138.150663] Call Trace:
	[  138.150668]  &lt;TASK&gt;
	[  138.150922]  kasan_check_range+0x13a/0x1c0
	[  138.150931]  memcpy+0x1f/0x60
	[  138.150940]  qat_alg_skcipher_init_com.isra.0+0x197/0x250 [intel_qat]
	[  138.151006]  qat_alg_skcipher_init_sessions+0xc1/0x240 [intel_qat]
	[  138.151073]  crypto_skcipher_setkey+0x82/0x160
	[  138.151085]  ? prepare_keybuf+0xa2/0xd0
	[  138.151095]  test_skcipher_vec_cfg+0x2b8/0x800
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54325/">CVE-2023-54325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54325">CVE-2023-54325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255757">SUSE bug 1255757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806521" comment="kernel-cross-headers-5.14.0-284.18.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202354326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-54326</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-54326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-54326" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-54326" ref_url="https://www.suse.com/security/cve/CVE-2023-54326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: pci_endpoint_test: Free IRQs before removing the device

In pci_endpoint_test_remove(), freeing the IRQs after removing the device
creates a small race window for IRQs to be received with the test device
memory already released, causing the IRQ handler to access invalid memory,
resulting in an oops.

Free the device IRQs before removing the device to avoid this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-54326/">CVE-2023-54326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-54326">CVE-2023-54326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255758">SUSE bug 1255758</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5455" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5455" ref_url="https://www.suse.com/security/cve/CVE-2023-5455" source="SUSE CVE"/>
    <description>
    A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2025-07-24"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-5455/">CVE-2023-5455 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5455">CVE-2023-5455 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009819534" comment="ipa-client-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819535" comment="ipa-client-common-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819536" comment="ipa-client-epn-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819537" comment="ipa-client-samba-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819538" comment="ipa-common-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819539" comment="ipa-selinux-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819540" comment="ipa-server-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819541" comment="ipa-server-common-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819542" comment="ipa-server-dns-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819543" comment="ipa-server-trust-ad-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819544" comment="python3-ipaclient-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819545" comment="python3-ipalib-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819546" comment="python3-ipaserver-4.10.2-5.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819547" comment="python3-ipatests-4.10.2-5.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5517" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5517" ref_url="https://www.suse.com/security/cve/CVE-2023-5517" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
    <description>
    A flaw in query-handling code can cause `named` to exit prematurely with an assertion failure when:

  - `nxdomain-redirect &lt;domain&gt;;` is configured, and
  - the resolver receives a PTR query for an RFC 1918 address that would normally result in an authoritative NXDOMAIN response.
This issue affects BIND 9 versions 9.12.0 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5517/">CVE-2023-5517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5517">CVE-2023-5517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219852">SUSE bug 1219852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867223" comment="bind-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867224" comment="bind-chroot-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867225" comment="bind-devel-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867226" comment="bind-dnssec-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867227" comment="bind-dnssec-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867228" comment="bind-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867229" comment="bind-dyndb-ldap-11.9-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867230" comment="bind-libs-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867231" comment="bind-license-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867232" comment="bind-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867233" comment="python3-bind-9.16.23-18.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5557</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5557" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5557" ref_url="https://www.suse.com/security/cve/CVE-2023-5557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017422.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the tracker-miners package. A weakness in the sandbox allows a maliciously-crafted file to execute code outside the sandbox if the tracker-extract process has first been compromised by a separate vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-15"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2023-5557/">CVE-2023-5557 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5557">CVE-2023-5557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216199">SUSE bug 1216199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816418" comment="tracker-miners-3.1.2-4.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5574" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5574" ref_url="https://www.suse.com/security/cve/CVE-2023-5574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4306-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3DLU3SRCIDHQQAZA4SYMSJKDW6AWQV4B/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/016985.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5574/">CVE-2023-5574 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5574">CVE-2023-5574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216261">SUSE bug 1216261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217447">SUSE bug 1217447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866669" comment="tigervnc-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866670" comment="tigervnc-icons-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866671" comment="tigervnc-license-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866672" comment="tigervnc-selinux-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866673" comment="tigervnc-server-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866674" comment="tigervnc-server-minimal-1.13.1-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866675" comment="tigervnc-server-module-1.13.1-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5633" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5633" ref_url="https://www.suse.com/security/cve/CVE-2023-5633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
    <description>
    The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5633/">CVE-2023-5633 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5633">CVE-2023-5633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216527">SUSE bug 1216527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216645">SUSE bug 1216645</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5678</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5678" ref_url="https://www.suse.com/security/cve/CVE-2023-5678" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-November/032948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:846-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2023:847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L36X5ULOS5QNIFLF2MJDCWBUWN5DSPKV/#L36X5ULOS5QNIFLF2MJDCWBUWN5DSPKV" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017499.html" source="SUSE-SU"/>
    <description>
    Issue summary: Generating excessively long X9.42 DH keys or checking
excessively long X9.42 DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_generate_key() to
generate an X9.42 DH key may experience long delays.  Likewise, applications
that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
Where the key or parameters that are being checked have been obtained from
an untrusted source this may lead to a Denial of Service.

While DH_check() performs all the necessary checks (as of CVE-2023-3817),
DH_check_pub_key() doesn't make any of these checks, and is therefore
vulnerable for excessively large P and Q parameters.

Likewise, while DH_generate_key() performs a check for an excessively large
P, it doesn't check for an excessively large Q.

An application that calls DH_generate_key() or DH_check_pub_key() and
supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.

DH_generate_key() and DH_check_pub_key() are also called by a number of
other OpenSSL functions.  An application calling any of those other
functions may similarly be affected.  The other functions affected by this
are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().

Also vulnerable are the OpenSSL pkey command line application when using the
"-pubcheck" option, as well as the OpenSSL genpkey command line application.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5678/">CVE-2023-5678 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5678">CVE-2023-5678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216922">SUSE bug 1216922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217151">SUSE bug 1217151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219091">SUSE bug 1219091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219092">SUSE bug 1219092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219415">SUSE bug 1219415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219417">SUSE bug 1219417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219472">SUSE bug 1219472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219712">SUSE bug 1219712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220016">SUSE bug 1220016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867976" comment="openssl-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867977" comment="openssl-devel-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867978" comment="openssl-fips-provider-3.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867979" comment="openssl-libs-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867980" comment="openssl-perl-3.0.7-27.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5679" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5679" ref_url="https://www.suse.com/security/cve/CVE-2023-5679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
    <description>
    A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion failure during recursive resolution, when both of these features are enabled.
This issue affects BIND 9 versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5679/">CVE-2023-5679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-5679">CVE-2023-5679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219853">SUSE bug 1219853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867223" comment="bind-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867224" comment="bind-chroot-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867225" comment="bind-devel-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867226" comment="bind-dnssec-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867227" comment="bind-dnssec-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867228" comment="bind-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867229" comment="bind-dyndb-ldap-11.9-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867230" comment="bind-libs-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867231" comment="bind-license-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867232" comment="bind-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867233" comment="python3-bind-9.16.23-18.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5717" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5717" ref_url="https://www.suse.com/security/cve/CVE-2023-5717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.

If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.

We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5717/">CVE-2023-5717 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5717">CVE-2023-5717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216584">SUSE bug 1216584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1216644">SUSE bug 1216644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217557">SUSE bug 1217557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219697">SUSE bug 1219697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5721" ref_url="https://www.suse.com/security/cve/CVE-2023-5721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5721/">CVE-2023-5721 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5721">CVE-2023-5721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808826" comment="firefox-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808827" comment="firefox-x11-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009809033" comment="thunderbird-115.4.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5724" ref_url="https://www.suse.com/security/cve/CVE-2023-5724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5724/">CVE-2023-5724 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5724">CVE-2023-5724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808826" comment="firefox-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808827" comment="firefox-x11-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009809033" comment="thunderbird-115.4.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5725" ref_url="https://www.suse.com/security/cve/CVE-2023-5725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5725/">CVE-2023-5725 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5725">CVE-2023-5725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808826" comment="firefox-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808827" comment="firefox-x11-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009809033" comment="thunderbird-115.4.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5728" ref_url="https://www.suse.com/security/cve/CVE-2023-5728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5728/">CVE-2023-5728 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5728">CVE-2023-5728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808826" comment="firefox-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808827" comment="firefox-x11-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009809033" comment="thunderbird-115.4.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5730" ref_url="https://www.suse.com/security/cve/CVE-2023-5730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-October/032388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 119, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5730/">CVE-2023-5730 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5730">CVE-2023-5730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808826" comment="firefox-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808827" comment="firefox-x11-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009809033" comment="thunderbird-115.4.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5732" ref_url="https://www.suse.com/security/cve/CVE-2023-5732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-October/016943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017199.html" source="SUSE-SU"/>
    <description>
    An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. This vulnerability affects Firefox &lt; 117, Firefox ESR &lt; 115.4, and Thunderbird &lt; 115.4.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-5732/">CVE-2023-5732 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5732">CVE-2023-5732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216338">SUSE bug 1216338</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009808826" comment="firefox-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009808827" comment="firefox-x11-115.4.0-1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009809033" comment="thunderbird-115.4.1-1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5824" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5824" ref_url="https://www.suse.com/security/cve/CVE-2023-5824" source="SUSE CVE"/>
    <description>
    A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-11-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5824/">CVE-2023-5824 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5824">CVE-2023-5824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216496">SUSE bug 1216496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813389" comment="squid-5.5-6.el9_3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5841</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5841" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5841" ref_url="https://www.suse.com/security/cve/CVE-2023-5841" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8800" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9548" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000560.html" source="SUSE-SU"/>
    <description>
    Due to a failure in validating the number of scanline samples of a OpenEXR file containing deep scanline data, Academy Software Foundation OpenEX  image parsing library version 3.2.1 and prior is susceptible to a heap-based buffer overflow vulnerability. This issue was resolved as of versions  v3.2.2 and v3.1.12 of the affected library.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-5841/">CVE-2023-5841 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5841">CVE-2023-5841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219498">SUSE bug 1219498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953931" comment="openexr-3.1.1-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953932" comment="openexr-devel-3.1.1-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953933" comment="openexr-libs-3.1.1-2.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5868" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5868" ref_url="https://www.suse.com/security/cve/CVE-2023-5868" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017657.html" source="SUSE-SU"/>
    <description>
    A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5868/">CVE-2023-5868 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5868">CVE-2023-5868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216962">SUSE bug 1216962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816725" comment="postgresql-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816726" comment="postgresql-contrib-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816727" comment="postgresql-docs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816728" comment="postgresql-plperl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816729" comment="postgresql-plpython3-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816730" comment="postgresql-pltcl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816731" comment="postgresql-private-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816732" comment="postgresql-private-libs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816733" comment="postgresql-server-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816734" comment="postgresql-server-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816735" comment="postgresql-static-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816736" comment="postgresql-test-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816737" comment="postgresql-test-rpm-macros-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816738" comment="postgresql-upgrade-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816739" comment="postgresql-upgrade-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5869" ref_url="https://www.suse.com/security/cve/CVE-2023-5869" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017657.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-16"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-5869/">CVE-2023-5869 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5869">CVE-2023-5869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216961">SUSE bug 1216961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816725" comment="postgresql-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816726" comment="postgresql-contrib-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816727" comment="postgresql-docs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816728" comment="postgresql-plperl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816729" comment="postgresql-plpython3-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816730" comment="postgresql-pltcl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816731" comment="postgresql-private-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816732" comment="postgresql-private-libs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816733" comment="postgresql-server-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816734" comment="postgresql-server-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816735" comment="postgresql-static-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816736" comment="postgresql-test-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816737" comment="postgresql-test-rpm-macros-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816738" comment="postgresql-upgrade-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816739" comment="postgresql-upgrade-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5870" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5870" ref_url="https://www.suse.com/security/cve/CVE-2023-5870" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:3807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:3823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017657.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-5870/">CVE-2023-5870 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5870">CVE-2023-5870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216960">SUSE bug 1216960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816725" comment="postgresql-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816726" comment="postgresql-contrib-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816727" comment="postgresql-docs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816728" comment="postgresql-plperl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816729" comment="postgresql-plpython3-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816730" comment="postgresql-pltcl-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816731" comment="postgresql-private-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816732" comment="postgresql-private-libs-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816733" comment="postgresql-server-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816734" comment="postgresql-server-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816735" comment="postgresql-static-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816736" comment="postgresql-test-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816737" comment="postgresql-test-rpm-macros-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816738" comment="postgresql-upgrade-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009816739" comment="postgresql-upgrade-devel-15.5-1.module+el9.2.0.z+20667+a2d2a8a9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5871" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5871" ref_url="https://www.suse.com/security/cve/CVE-2023-5871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017056.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-5871/">CVE-2023-5871 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5871">CVE-2023-5871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1216769">SUSE bug 1216769</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866509" comment="libnbd-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866510" comment="libnbd-bash-completion-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866511" comment="libnbd-devel-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866512" comment="nbdfuse-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866513" comment="ocaml-libnbd-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866514" comment="ocaml-libnbd-devel-1.18.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866515" comment="python3-libnbd-1.18.1-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5981" ref_url="https://www.suse.com/security/cve/CVE-2023-5981" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2023:4333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-5981/">CVE-2023-5981 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5981">CVE-2023-5981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217277">SUSE bug 1217277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218865">SUSE bug 1218865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844803" comment="gnutls-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844804" comment="gnutls-c++-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844805" comment="gnutls-dane-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844806" comment="gnutls-devel-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844807" comment="gnutls-utils-3.7.6-23.el9_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20235992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-5992</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-5992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5992" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-5992" ref_url="https://www.suse.com/security/cve/CVE-2023-5992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1402-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1402-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20530-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041631.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-01"/>
	<updated date="2025-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-5992/">CVE-2023-5992 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-5992">CVE-2023-5992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219386">SUSE bug 1219386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849490" comment="opensc-0.23.0-4.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6004" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6004" ref_url="https://www.suse.com/security/cve/CVE-2023-6004" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6004/">CVE-2023-6004 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6004">CVE-2023-6004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218209">SUSE bug 1218209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866745" comment="libssh-0.10.4-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866746" comment="libssh-config-0.10.4-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866747" comment="libssh-devel-0.10.4-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6040</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6040" ref_url="https://www.suse.com/security/cve/CVE-2023-6040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: Reject tables of unsupported family); While creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6040/">CVE-2023-6040 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6040">CVE-2023-6040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218752">SUSE bug 1218752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6121" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6121" ref_url="https://www.suse.com/security/cve/CVE-2023-6121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2023-6121/">CVE-2023-6121 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6121">CVE-2023-6121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217250">SUSE bug 1217250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6129" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6129" ref_url="https://www.suse.com/security/cve/CVE-2023-6129" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017939.html" source="SUSE-SU"/>
    <description>
    Issue summary: The POLY1305 MAC (message authentication code) implementation
contains a bug that might corrupt the internal state of applications running
on PowerPC CPU based platforms if the CPU provides vector instructions.

Impact summary: If an attacker can influence whether the POLY1305 MAC
algorithm is used, the application state might be corrupted with various
application dependent consequences.

The POLY1305 MAC (message authentication code) implementation in OpenSSL for
PowerPC CPUs restores the contents of vector registers in a different order
than they are saved. Thus the contents of some of these vector registers
are corrupted when returning to the caller. The vulnerable code is used only
on newer PowerPC processors supporting the PowerISA 2.07 instructions.

The consequences of this kind of internal application state corruption can
be various - from no consequences, if the calling application does not
depend on the contents of non-volatile XMM registers at all, to the worst
consequences, where the attacker could get complete control of the application
process. However unless the compiler uses the vector registers for storing
pointers, the most likely consequence, if any, would be an incorrect result
of some application dependent calculations or a crash leading to a denial of
service.

The POLY1305 MAC algorithm is most frequently used as part of the
CHACHA20-POLY1305 AEAD (authenticated encryption with associated data)
algorithm. The most common usage of this AEAD cipher is with TLS protocol
versions 1.2 and 1.3. If this cipher is enabled on the server a malicious
client can influence whether this AEAD cipher is used. This implies that
TLS server applications using OpenSSL can be potentially impacted. However
we are currently not aware of any concrete application that would be affected
by this issue therefore we consider this a Low severity security issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6129/">CVE-2023-6129 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6129">CVE-2023-6129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218690">SUSE bug 1218690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953529" comment="edk2-ovmf-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953530" comment="edk2-tools-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953531" comment="edk2-tools-doc-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867976" comment="openssl-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867977" comment="openssl-devel-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867978" comment="openssl-fips-provider-3.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867979" comment="openssl-libs-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867980" comment="openssl-perl-3.0.7-27.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6135" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6135" ref_url="https://www.suse.com/security/cve/CVE-2023-6135" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key. This vulnerability affects Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6135/">CVE-2023-6135 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6135">CVE-2023-6135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009848261" comment="nspr-4.35.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848262" comment="nspr-devel-4.35.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848263" comment="nss-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848264" comment="nss-devel-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848265" comment="nss-softokn-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848266" comment="nss-softokn-devel-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848267" comment="nss-softokn-freebl-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848268" comment="nss-softokn-freebl-devel-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848269" comment="nss-sysinit-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848270" comment="nss-tools-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848271" comment="nss-util-3.90.0-6.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848272" comment="nss-util-devel-3.90.0-6.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6176" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6176" ref_url="https://www.suse.com/security/cve/CVE-2023-6176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2023-December/033074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017890.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6176/">CVE-2023-6176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6176">CVE-2023-6176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217332">SUSE bug 1217332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217522">SUSE bug 1217522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6204" ref_url="https://www.suse.com/security/cve/CVE-2023-6204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    On some systems-depending on the graphics settings and drivers-it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-02"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6204/">CVE-2023-6204 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6204">CVE-2023-6204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009814544" comment="firefox-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814545" comment="firefox-x11-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814342" comment="thunderbird-115.5.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6205" ref_url="https://www.suse.com/security/cve/CVE-2023-6205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6205/">CVE-2023-6205 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6205">CVE-2023-6205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009814544" comment="firefox-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814545" comment="firefox-x11-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814342" comment="thunderbird-115.5.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6206" ref_url="https://www.suse.com/security/cve/CVE-2023-6206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6206/">CVE-2023-6206 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6206">CVE-2023-6206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009814544" comment="firefox-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814545" comment="firefox-x11-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814342" comment="thunderbird-115.5.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6207" ref_url="https://www.suse.com/security/cve/CVE-2023-6207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Ownership mismanagement led to a use-after-free in ReadableByteStreams This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6207/">CVE-2023-6207 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6207">CVE-2023-6207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009814544" comment="firefox-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814545" comment="firefox-x11-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814342" comment="thunderbird-115.5.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6208" ref_url="https://www.suse.com/security/cve/CVE-2023-6208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.
*This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6208/">CVE-2023-6208 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6208">CVE-2023-6208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009814544" comment="firefox-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814545" comment="firefox-x11-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814342" comment="thunderbird-115.5.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6209</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6209" ref_url="https://www.suse.com/security/cve/CVE-2023-6209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal "/../" part in the path could be used to override the specified host. This could contribute to security problems in web sites. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6209/">CVE-2023-6209 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6209">CVE-2023-6209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009814544" comment="firefox-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814545" comment="firefox-x11-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814342" comment="thunderbird-115.5.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6212" ref_url="https://www.suse.com/security/cve/CVE-2023-6212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 120, Firefox ESR &lt; 115.5.0, and Thunderbird &lt; 115.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2023-12-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6212/">CVE-2023-6212 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6212">CVE-2023-6212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217230">SUSE bug 1217230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009814544" comment="firefox-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814545" comment="firefox-x11-115.5.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009814342" comment="thunderbird-115.5.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6228</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6228" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6228" ref_url="https://www.suse.com/security/cve/CVE-2023-6228" source="SUSE CVE"/>
    <description>
    An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6228/">CVE-2023-6228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6228">CVE-2023-6228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217356">SUSE bug 1217356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866653" comment="libtiff-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866654" comment="libtiff-devel-4.4.0-12.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866655" comment="libtiff-tools-4.4.0-12.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6237" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6237" ref_url="https://www.suse.com/security/cve/CVE-2023-6237" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017939.html" source="SUSE-SU"/>
    <description>
    Issue summary: Checking excessively long invalid RSA public keys may take
a long time.

Impact summary: Applications that use the function EVP_PKEY_public_check()
to check RSA public keys may experience long delays. Where the key that
is being checked has been obtained from an untrusted source this may lead
to a Denial of Service.

When function EVP_PKEY_public_check() is called on RSA public keys,
a computation is done to confirm that the RSA modulus, n, is composite.
For valid RSA keys, n is a product of two or more large primes and this
computation completes quickly. However, if n is an overly large prime,
then this computation would take a long time.

An application that calls EVP_PKEY_public_check() and supplies an RSA key
obtained from an untrusted source could be vulnerable to a Denial of Service
attack.

The function EVP_PKEY_public_check() is not called from other OpenSSL
functions however it is called from the OpenSSL pkey command line
application. For that reason that application is also vulnerable if used
with the '-pubin' and '-check' options on untrusted data.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6237/">CVE-2023-6237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6237">CVE-2023-6237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218810">SUSE bug 1218810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953529" comment="edk2-ovmf-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953530" comment="edk2-tools-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953531" comment="edk2-tools-doc-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867976" comment="openssl-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867977" comment="openssl-devel-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867978" comment="openssl-fips-provider-3.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867979" comment="openssl-libs-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867980" comment="openssl-perl-3.0.7-27.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6240" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6240" ref_url="https://www.suse.com/security/cve/CVE-2023-6240" source="SUSE CVE"/>
    <description>
    A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2023-6240/">CVE-2023-6240 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6240">CVE-2023-6240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219556">SUSE bug 1219556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870083" comment="bpftool-7.3.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870084" comment="kernel-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870085" comment="kernel-abi-stablelists-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870086" comment="kernel-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870087" comment="kernel-cross-headers-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870088" comment="kernel-debug-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870089" comment="kernel-debug-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870092" comment="kernel-debug-modules-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870093" comment="kernel-debug-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870094" comment="kernel-debug-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870095" comment="kernel-debug-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870098" comment="kernel-doc-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870099" comment="kernel-headers-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870100" comment="kernel-modules-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870101" comment="kernel-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870102" comment="kernel-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870103" comment="kernel-tools-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870104" comment="kernel-tools-libs-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870106" comment="kernel-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870107" comment="libperf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870108" comment="perf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870109" comment="python3-perf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870110" comment="rtla-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870111" comment="rv-5.14.0-427.16.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6356" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6356" ref_url="https://www.suse.com/security/cve/CVE-2023-6356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver and causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6356/">CVE-2023-6356 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6356">CVE-2023-6356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217987">SUSE bug 1217987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6377</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6377" ref_url="https://www.suse.com/security/cve/CVE-2023-6377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017528.html" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6377/">CVE-2023-6377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6377">CVE-2023-6377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217765">SUSE bug 1217765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818848" comment="tigervnc-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818849" comment="tigervnc-icons-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818850" comment="tigervnc-license-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818851" comment="tigervnc-selinux-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818852" comment="tigervnc-server-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818853" comment="tigervnc-server-minimal-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818854" comment="tigervnc-server-module-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6478</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6478" ref_url="https://www.suse.com/security/cve/CVE-2023-6478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017327.html" source="SUSE-SU"/>
    <description>
    A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6478/">CVE-2023-6478 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6478">CVE-2023-6478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217766">SUSE bug 1217766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222096">SUSE bug 1222096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818848" comment="tigervnc-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818849" comment="tigervnc-icons-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818850" comment="tigervnc-license-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818851" comment="tigervnc-selinux-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818852" comment="tigervnc-server-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818853" comment="tigervnc-server-minimal-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818854" comment="tigervnc-server-module-1.13.1-3.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6516</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6516" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6516" ref_url="https://www.suse.com/security/cve/CVE-2023-6516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035606.html" source="SUSE-SU"/>
    <description>
    To keep its cache database efficient, `named` running as a recursive resolver occasionally attempts to clean up the database. It uses several methods, including some that are asynchronous: a small chunk of memory pointing to the cache element that can be cleaned up is first allocated and then queued for later processing. It was discovered that if the resolver is continuously processing query patterns triggering this type of cache-database maintenance, `named` may not be able to handle the cleanup events in a timely manner. This in turn enables the list of queued cleanup events to grow infinitely large over time, allowing the configured `max-cache-size` limit to be significantly exceeded.
This issue affects BIND 9 versions 9.16.0 through 9.16.45 and 9.16.8-S1 through 9.16.45-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6516/">CVE-2023-6516 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6516">CVE-2023-6516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219854">SUSE bug 1219854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867223" comment="bind-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867224" comment="bind-chroot-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867225" comment="bind-devel-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867226" comment="bind-dnssec-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867227" comment="bind-dnssec-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867228" comment="bind-doc-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867229" comment="bind-dyndb-ldap-11.9-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867230" comment="bind-libs-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867231" comment="bind-license-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867232" comment="bind-utils-9.16.23-18.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867233" comment="python3-bind-9.16.23-18.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6531" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6531" ref_url="https://www.suse.com/security/cve/CVE-2023-6531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in the Linux Kernel due to a race problem in the unix garbage collector's deletion of SKB races with unix_stream_read_generic() on the socket that the SKB is queued on.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6531/">CVE-2023-6531 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6531">CVE-2023-6531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218447">SUSE bug 1218447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218487">SUSE bug 1218487</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6535" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6535" ref_url="https://www.suse.com/security/cve/CVE-2023-6535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6535/">CVE-2023-6535 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6535">CVE-2023-6535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217988">SUSE bug 1217988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6536" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6536" ref_url="https://www.suse.com/security/cve/CVE-2023-6536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Linux kernel's NVMe driver. This issue may allow an unauthenticated malicious actor to send a set of crafted TCP packages when using NVMe over TCP, leading the NVMe driver to a NULL pointer dereference in the NVMe driver, causing kernel panic and a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6536/">CVE-2023-6536 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6536">CVE-2023-6536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217989">SUSE bug 1217989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6546" ref_url="https://www.suse.com/security/cve/CVE-2023-6546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="TID000021437" ref_url="https://www.suse.com/support/kb/doc/?id=000021437" source="SUSE-SU"/>
    <description>
    A race condition was found in the GSM 0710 tty multiplexor in the Linux kernel. This issue occurs when two threads execute the GSMIOC_SETCONF ioctl on the same tty file descriptor with the gsm line discipline enabled, and can lead to a use-after-free problem on a struct gsm_dlci while restarting the gsm mux. This could allow a local unprivileged user to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6546/">CVE-2023-6546 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6546">CVE-2023-6546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218335">SUSE bug 1218335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222685">SUSE bug 1222685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6597" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6597" ref_url="https://www.suse.com/security/cve/CVE-2023-6597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0782-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
    <description>
    An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.

The tempfile.TemporaryDirectory class would dereference symlinks during cleanup of permissions-related errors. This means users which can run privileged programs are potentially able to modify permissions of files referenced by symlinks in some circumstances.

    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6597/">CVE-2023-6597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-6597">CVE-2023-6597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219666">SUSE bug 1219666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224879">SUSE bug 1224879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225185">SUSE bug 1225185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869946" comment="python-unversioned-command-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869947" comment="python3-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869948" comment="python3-debug-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869949" comment="python3-devel-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869950" comment="python3-idle-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869951" comment="python3-libs-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869952" comment="python3-test-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869953" comment="python3-tkinter-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869939" comment="python3.11-3.11.7-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869940" comment="python3.11-debug-3.11.7-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869941" comment="python3.11-devel-3.11.7-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869942" comment="python3.11-idle-3.11.7-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869943" comment="python3.11-libs-3.11.7-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869944" comment="python3.11-test-3.11.7-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869945" comment="python3.11-tkinter-3.11.7-1.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6606</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6606" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6606" ref_url="https://www.suse.com/security/cve/CVE-2023-6606" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in smbCalcSize in fs/smb/client/netmisc.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6606/">CVE-2023-6606 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6606">CVE-2023-6606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217947">SUSE bug 1217947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6610</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6610" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6610" ref_url="https://www.suse.com/security/cve/CVE-2023-6610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in smb2_dump_detail in fs/smb/client/smb2ops.c in the Linux Kernel. This issue could allow a local attacker to crash the system or leak internal kernel information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6610/">CVE-2023-6610 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6610">CVE-2023-6610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217946">SUSE bug 1217946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6622" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6622" ref_url="https://www.suse.com/security/cve/CVE-2023-6622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the Linux kernel. This issue may allow a local attacker with CAP_NET_ADMIN user privilege to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6622/">CVE-2023-6622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6622">CVE-2023-6622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217938">SUSE bug 1217938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6679" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6679" ref_url="https://www.suse.com/security/cve/CVE-2023-6679" source="SUSE CVE"/>
    <description>
    A null pointer dereference vulnerability was found in dpll_pin_parent_pin_set() in drivers/dpll/dpll_netlink.c in the Digital Phase Locked Loop (DPLL) subsystem in the  Linux kernel. This issue could be exploited to trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-08"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6679/">CVE-2023-6679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6679">CVE-2023-6679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217944">SUSE bug 1217944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845886" comment="bpftool-7.2.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845887" comment="kernel-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845888" comment="kernel-abi-stablelists-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845889" comment="kernel-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846368" comment="kernel-cross-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845890" comment="kernel-debug-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845891" comment="kernel-debug-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845894" comment="kernel-debug-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845895" comment="kernel-debug-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845896" comment="kernel-debug-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845897" comment="kernel-debug-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845900" comment="kernel-doc-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845901" comment="kernel-headers-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845902" comment="kernel-modules-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845903" comment="kernel-modules-core-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845904" comment="kernel-modules-extra-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845905" comment="kernel-tools-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845906" comment="kernel-tools-libs-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845907" comment="kernel-uki-virt-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846370" comment="libperf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845908" comment="perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845909" comment="python3-perf-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845910" comment="rtla-5.14.0-362.18.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845911" comment="rv-5.14.0-362.18.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6681</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6681" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6681" ref_url="https://www.suse.com/security/cve/CVE-2023-6681" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000529.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in JWCrypto. This flaw allows an attacker to cause a denial of service (DoS) attack and possible password brute-force and dictionary attacks to be more resource-intensive. This issue can result in a large amount of computational consumption, causing a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6681/">CVE-2023-6681 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6681">CVE-2023-6681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219837">SUSE bug 1219837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953695" comment="python3-jwcrypto-1.5.6-2.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6683</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6683" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6683" ref_url="https://www.suse.com/security/cve/CVE-2023-6683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6683/">CVE-2023-6683 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6683">CVE-2023-6683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218889">SUSE bug 1218889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872275" comment="qemu-guest-agent-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872276" comment="qemu-img-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872277" comment="qemu-kvm-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872278" comment="qemu-kvm-audio-pa-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872279" comment="qemu-kvm-block-blkio-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872280" comment="qemu-kvm-block-curl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872281" comment="qemu-kvm-block-rbd-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872282" comment="qemu-kvm-common-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872283" comment="qemu-kvm-core-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872284" comment="qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872285" comment="qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872286" comment="qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872287" comment="qemu-kvm-device-usb-host-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872288" comment="qemu-kvm-device-usb-redirect-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872289" comment="qemu-kvm-docs-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872290" comment="qemu-kvm-tools-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872291" comment="qemu-kvm-ui-egl-headless-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872292" comment="qemu-kvm-ui-opengl-8.2.0-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872293" comment="qemu-pr-helper-8.2.0-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6693" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6693" ref_url="https://www.suse.com/security/cve/CVE-2023-6693" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4492" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019428.html" source="SUSE-SU"/>
    <description>
    A stack based buffer overflow was found in the virtio-net device of QEMU. This issue occurs when flushing TX in the virtio_net_flush_tx function if guest features VIRTIO_NET_F_HASH_REPORT, VIRTIO_F_VERSION_1 and VIRTIO_NET_F_MRG_RXBUF are enabled. This could allow a malicious user to overwrite local variables allocated on the stack. Specifically, the `out_sg` variable could be used to read a part of process memory and send it to the wire, causing an information leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-15"/>
	<updated date="2025-05-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-6693/">CVE-2023-6693 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6693">CVE-2023-6693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218484">SUSE bug 1218484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009981936" comment="qemu-guest-agent-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981937" comment="qemu-img-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981938" comment="qemu-kvm-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981939" comment="qemu-kvm-audio-pa-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981940" comment="qemu-kvm-block-blkio-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981941" comment="qemu-kvm-block-curl-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981942" comment="qemu-kvm-block-rbd-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981943" comment="qemu-kvm-common-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981944" comment="qemu-kvm-core-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981945" comment="qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981946" comment="qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981947" comment="qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981948" comment="qemu-kvm-device-usb-host-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981949" comment="qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981950" comment="qemu-kvm-docs-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981951" comment="qemu-kvm-tools-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981952" comment="qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981953" comment="qemu-kvm-ui-opengl-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981954" comment="qemu-pr-helper-9.0.0-10.el9_5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6710" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6710" ref_url="https://www.suse.com/security/cve/CVE-2023-6710" source="SUSE CVE"/>
    <description>
    A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6710/">CVE-2023-6710 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6710">CVE-2023-6710 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866720" comment="mod_jk-1.2.49-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866721" comment="mod_proxy_cluster-1.3.20-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6816</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6816" ref_url="https://www.suse.com/security/cve/CVE-2023-6816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6816/">CVE-2023-6816 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6816">CVE-2023-6816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218582">SUSE bug 1218582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846318" comment="tigervnc-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846319" comment="tigervnc-icons-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846320" comment="tigervnc-license-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846321" comment="tigervnc-selinux-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846322" comment="tigervnc-server-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846323" comment="tigervnc-server-minimal-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846324" comment="tigervnc-server-module-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6817" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6817" ref_url="https://www.suse.com/security/cve/CVE-2023-6817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free.

We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6817/">CVE-2023-6817 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6817">CVE-2023-6817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218195">SUSE bug 1218195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6856" ref_url="https://www.suse.com/security/cve/CVE-2023-6856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver.  This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6856/">CVE-2023-6856 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6856">CVE-2023-6856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6857" ref_url="https://www.suse.com/security/cve/CVE-2023-6857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. 
*This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6857/">CVE-2023-6857 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6857">CVE-2023-6857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6858" ref_url="https://www.suse.com/security/cve/CVE-2023-6858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox was susceptible to a heap buffer overflow in `nsTextFragment` due to insufficient OOM handling. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6858/">CVE-2023-6858 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6858">CVE-2023-6858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6859</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6859" ref_url="https://www.suse.com/security/cve/CVE-2023-6859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6859/">CVE-2023-6859 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6859">CVE-2023-6859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6860</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6860" ref_url="https://www.suse.com/security/cve/CVE-2023-6860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The `VideoBridge` allowed any content process to use textures produced by remote decoders.  This could be abused to escape the sandbox. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6860/">CVE-2023-6860 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6860">CVE-2023-6860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6861" ref_url="https://www.suse.com/security/cve/CVE-2023-6861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The `nsWindow::PickerOpen(void)` method was susceptible to a heap buffer overflow when running in headless mode. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6861/">CVE-2023-6861 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6861">CVE-2023-6861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6862" ref_url="https://www.suse.com/security/cve/CVE-2023-6862" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
    <description>
    A use-after-free was identified in the `nsDNSService::Init`.  This issue appears to manifest rarely during start-up. This vulnerability affects Firefox ESR &lt; 115.6 and Thunderbird &lt; 115.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6862/">CVE-2023-6862 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6862">CVE-2023-6862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6863" ref_url="https://www.suse.com/security/cve/CVE-2023-6863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6863/">CVE-2023-6863 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6863">CVE-2023-6863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6864" ref_url="https://www.suse.com/security/cve/CVE-2023-6864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017601.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6864/">CVE-2023-6864 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6864">CVE-2023-6864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818847" comment="thunderbird-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6865" ref_url="https://www.suse.com/security/cve/CVE-2023-6865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    `EncryptingOutputStream` was susceptible to exposing uninitialized data.  This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR &lt; 115.6 and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6865/">CVE-2023-6865 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6865">CVE-2023-6865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6867" ref_url="https://www.suse.com/security/cve/CVE-2023-6867" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017505.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox ESR &lt; 115.6 and Firefox &lt; 121.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-06"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-6867/">CVE-2023-6867 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6867">CVE-2023-6867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217974">SUSE bug 1217974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009818855" comment="firefox-115.6.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009818856" comment="firefox-x11-115.6.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6915</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6915" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6915" ref_url="https://www.suse.com/security/cve/CVE-2023-6915" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
    <description>
    A Null pointer dereference problem was found in ida_free in lib/idr.c in the Linux Kernel. This issue may allow an attacker using this library to cause a denial of service problem due to a missing check at a function return.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2023-6915/">CVE-2023-6915 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6915">CVE-2023-6915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218804">SUSE bug 1218804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6917</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6917" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6917" ref_url="https://www.suse.com/security/cve/CVE-2023-6917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021087.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6917/">CVE-2023-6917 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6917">CVE-2023-6917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217826">SUSE bug 1217826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872738" comment="pcp-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872739" comment="pcp-conf-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872740" comment="pcp-devel-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872741" comment="pcp-doc-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872742" comment="pcp-export-pcp2elasticsearch-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872743" comment="pcp-export-pcp2graphite-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872744" comment="pcp-export-pcp2influxdb-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872745" comment="pcp-export-pcp2json-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872746" comment="pcp-export-pcp2spark-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872747" comment="pcp-export-pcp2xml-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872748" comment="pcp-export-pcp2zabbix-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872749" comment="pcp-export-zabbix-agent-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872750" comment="pcp-geolocate-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872751" comment="pcp-gui-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872752" comment="pcp-import-collectl2pcp-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872753" comment="pcp-import-ganglia2pcp-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872754" comment="pcp-import-iostat2pcp-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872755" comment="pcp-import-mrtg2pcp-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872756" comment="pcp-import-sar2pcp-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872757" comment="pcp-libs-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872758" comment="pcp-libs-devel-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872759" comment="pcp-pmda-activemq-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872760" comment="pcp-pmda-apache-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872761" comment="pcp-pmda-bash-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872762" comment="pcp-pmda-bcc-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872763" comment="pcp-pmda-bind2-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872764" comment="pcp-pmda-bonding-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872765" comment="pcp-pmda-bpf-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872766" comment="pcp-pmda-bpftrace-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872767" comment="pcp-pmda-cifs-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872768" comment="pcp-pmda-cisco-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872769" comment="pcp-pmda-dbping-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872770" comment="pcp-pmda-denki-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872771" comment="pcp-pmda-dm-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872772" comment="pcp-pmda-docker-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872773" comment="pcp-pmda-ds389-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872774" comment="pcp-pmda-ds389log-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872775" comment="pcp-pmda-elasticsearch-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872776" comment="pcp-pmda-farm-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872777" comment="pcp-pmda-gfs2-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872778" comment="pcp-pmda-gluster-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872779" comment="pcp-pmda-gpfs-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872780" comment="pcp-pmda-gpsd-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872781" comment="pcp-pmda-hacluster-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872782" comment="pcp-pmda-haproxy-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872783" comment="pcp-pmda-infiniband-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872784" comment="pcp-pmda-json-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872785" comment="pcp-pmda-libvirt-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872786" comment="pcp-pmda-lio-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872787" comment="pcp-pmda-lmsensors-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872788" comment="pcp-pmda-logger-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872789" comment="pcp-pmda-lustre-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872790" comment="pcp-pmda-lustrecomm-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872791" comment="pcp-pmda-mailq-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872792" comment="pcp-pmda-memcache-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872793" comment="pcp-pmda-mic-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872794" comment="pcp-pmda-mongodb-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872795" comment="pcp-pmda-mounts-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872796" comment="pcp-pmda-mssql-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872797" comment="pcp-pmda-mysql-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872798" comment="pcp-pmda-named-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872799" comment="pcp-pmda-netcheck-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872800" comment="pcp-pmda-netfilter-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872801" comment="pcp-pmda-news-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872802" comment="pcp-pmda-nfsclient-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872803" comment="pcp-pmda-nginx-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872804" comment="pcp-pmda-nvidia-gpu-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872805" comment="pcp-pmda-openmetrics-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872806" comment="pcp-pmda-openvswitch-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872807" comment="pcp-pmda-oracle-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872808" comment="pcp-pmda-pdns-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872809" comment="pcp-pmda-perfevent-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872810" comment="pcp-pmda-podman-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872811" comment="pcp-pmda-postfix-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872812" comment="pcp-pmda-postgresql-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872813" comment="pcp-pmda-rabbitmq-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872814" comment="pcp-pmda-redis-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872815" comment="pcp-pmda-resctrl-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872816" comment="pcp-pmda-roomtemp-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872817" comment="pcp-pmda-rsyslog-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872818" comment="pcp-pmda-samba-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872819" comment="pcp-pmda-sendmail-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872820" comment="pcp-pmda-shping-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872821" comment="pcp-pmda-slurm-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872822" comment="pcp-pmda-smart-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872823" comment="pcp-pmda-snmp-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872824" comment="pcp-pmda-sockets-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872825" comment="pcp-pmda-statsd-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872826" comment="pcp-pmda-summary-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872827" comment="pcp-pmda-systemd-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872828" comment="pcp-pmda-trace-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872829" comment="pcp-pmda-unbound-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872830" comment="pcp-pmda-weblog-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872831" comment="pcp-pmda-zimbra-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872832" comment="pcp-pmda-zswap-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872833" comment="pcp-selinux-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872834" comment="pcp-system-tools-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872835" comment="pcp-zeroconf-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872836" comment="perl-PCP-LogImport-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872837" comment="perl-PCP-LogSummary-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872838" comment="perl-PCP-MMV-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872839" comment="perl-PCP-PMDA-6.2.0-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872840" comment="python3-pcp-6.2.0-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6918" ref_url="https://www.suse.com/security/cve/CVE-2023-6918" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libssh implements abstract layer for message digest (MD) operations implemented by different supported crypto backends. The return values from these were not properly checked, which could cause low-memory situations failures, NULL dereferences, crashes, or usage of the uninitialized memory as an input for the KDF. In this case, non-matching keys will result in decryption/integrity failures, terminating the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-6918/">CVE-2023-6918 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6918">CVE-2023-6918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218186">SUSE bug 1218186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866745" comment="libssh-0.10.4-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866746" comment="libssh-config-0.10.4-13.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866747" comment="libssh-devel-0.10.4-13.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6931" ref_url="https://www.suse.com/security/cve/CVE-2023-6931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035738.html" source="SUSE-SU"/>
    <description>
    A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.

A perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().

We recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6931/">CVE-2023-6931 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6931">CVE-2023-6931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214158">SUSE bug 1214158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218258">SUSE bug 1218258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20236932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-6932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-6932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-6932" ref_url="https://www.suse.com/security/cve/CVE-2023-6932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017889.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's ipv4: igmp component can be exploited to achieve local privilege escalation.

A race condition can be exploited to cause a timer be mistakenly registered on a RCU read locked object which is freed by another thread.

We recommend upgrading past commit e2b706c691905fe78468c361aaabc719d0a496f1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2023-6932/">CVE-2023-6932 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-6932">CVE-2023-6932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218253">SUSE bug 1218253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218255">SUSE bug 1218255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220015">SUSE bug 1220015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220191">SUSE bug 1220191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221578">SUSE bug 1221578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221598">SUSE bug 1221598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7008" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7008" ref_url="https://www.suse.com/security/cve/CVE-2023-7008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019374.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-7008/">CVE-2023-7008 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7008">CVE-2023-7008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218297">SUSE bug 1218297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866732" comment="rhel-net-naming-sysattrs-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866733" comment="systemd-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866734" comment="systemd-boot-unsigned-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866735" comment="systemd-container-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866736" comment="systemd-devel-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866737" comment="systemd-journal-remote-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866738" comment="systemd-libs-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866739" comment="systemd-oomd-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866740" comment="systemd-pam-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866741" comment="systemd-resolved-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866742" comment="systemd-rpm-macros-252-32.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866743" comment="systemd-udev-252-32.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7104" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7104" ref_url="https://www.suse.com/security/cve/CVE-2023-7104" source="SUSE CVE"/>
    <description>
    A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-7104/">CVE-2023-7104 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2023-7104">CVE-2023-7104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218453">SUSE bug 1218453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844800" comment="sqlite-3.34.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844801" comment="sqlite-devel-3.34.1-7.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844802" comment="sqlite-libs-3.34.1-7.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20237250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-7250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-7250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7250" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-7250" ref_url="https://www.suse.com/security/cve/CVE-2023-7250" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9185" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000593.html" source="SUSE-SU"/>
    <description>
    A flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-7250/">CVE-2023-7250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-7250">CVE-2023-7250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221555">SUSE bug 1221555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953661" comment="iperf3-3.9-13.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0056" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0056" ref_url="https://www.suse.com/security/cve/CVE-2024-0056" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0056/">CVE-2024-0056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0056">CVE-2024-0056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009819673" comment="aspnetcore-runtime-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872189" comment="aspnetcore-runtime-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819548" comment="aspnetcore-runtime-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819674" comment="aspnetcore-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872190" comment="aspnetcore-targeting-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819549" comment="aspnetcore-targeting-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819675" comment="dotnet-apphost-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872191" comment="dotnet-apphost-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819550" comment="dotnet-apphost-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819551" comment="dotnet-host-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819676" comment="dotnet-hostfxr-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872192" comment="dotnet-hostfxr-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819552" comment="dotnet-hostfxr-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819677" comment="dotnet-runtime-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872193" comment="dotnet-runtime-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819553" comment="dotnet-runtime-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819678" comment="dotnet-sdk-6.0-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819679" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872194" comment="dotnet-sdk-7.0-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872195" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819554" comment="dotnet-sdk-8.0-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819555" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819680" comment="dotnet-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872196" comment="dotnet-targeting-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819556" comment="dotnet-targeting-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819681" comment="dotnet-templates-6.0-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872197" comment="dotnet-templates-7.0-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819557" comment="dotnet-templates-8.0-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819558" comment="netstandard-targeting-pack-2.1-8.0.101-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0057" ref_url="https://www.suse.com/security/cve/CVE-2024-0057" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0057/">CVE-2024-0057 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0057">CVE-2024-0057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009819673" comment="aspnetcore-runtime-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872189" comment="aspnetcore-runtime-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819548" comment="aspnetcore-runtime-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819674" comment="aspnetcore-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872190" comment="aspnetcore-targeting-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819549" comment="aspnetcore-targeting-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819675" comment="dotnet-apphost-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872191" comment="dotnet-apphost-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819550" comment="dotnet-apphost-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819551" comment="dotnet-host-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819676" comment="dotnet-hostfxr-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872192" comment="dotnet-hostfxr-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819552" comment="dotnet-hostfxr-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819677" comment="dotnet-runtime-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872193" comment="dotnet-runtime-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819553" comment="dotnet-runtime-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819678" comment="dotnet-sdk-6.0-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819679" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872194" comment="dotnet-sdk-7.0-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872195" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819554" comment="dotnet-sdk-8.0-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819555" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819680" comment="dotnet-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872196" comment="dotnet-targeting-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819556" comment="dotnet-targeting-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819681" comment="dotnet-templates-6.0-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872197" comment="dotnet-templates-7.0-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819557" comment="dotnet-templates-8.0-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819558" comment="netstandard-targeting-pack-2.1-8.0.101-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0193" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0193" ref_url="https://www.suse.com/security/cve/CVE-2024-0193" source="SUSE CVE"/>
    <description>
    A use-after-free flaw was found in the netfilter subsystem of the Linux kernel. If the catchall element is garbage-collected when the pipapo set is removed, the element can be deactivated twice. This can cause a use-after-free issue on an NFT_CHAIN object or NFT_OBJECT object, allowing a local unprivileged user with CAP_NET_ADMIN capability to escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0193/">CVE-2024-0193 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0193">CVE-2024-0193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218495">SUSE bug 1218495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218496">SUSE bug 1218496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0229" ref_url="https://www.suse.com/security/cve/CVE-2024-0229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0229/">CVE-2024-0229 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0229">CVE-2024-0229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218583">SUSE bug 1218583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846318" comment="tigervnc-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846319" comment="tigervnc-icons-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846320" comment="tigervnc-license-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846321" comment="tigervnc-selinux-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846322" comment="tigervnc-server-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846323" comment="tigervnc-server-minimal-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846324" comment="tigervnc-server-module-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0397" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0397" ref_url="https://www.suse.com/security/cve/CVE-2024-0397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024203.html" source="SUSE-SU"/>
    <description>
    A defect was discovered in the Python “ssl” module where there is a memory
race condition with the ssl.SSLContext methods “cert_store_stats()” and
“get_ca_certs()”. The race condition can be triggered if the methods are
called at the same time as certificates are loaded into the SSLContext,
such as during the TLS handshake with a certificate directory configured.
This issue is fixed in CPython 3.10.14, 3.11.9, 3.12.3, and 3.13.0a5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-0397/">CVE-2024-0397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0397">CVE-2024-0397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226447">SUSE bug 1226447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957530" comment="python-unversioned-command-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957531" comment="python3-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957532" comment="python3-debug-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957533" comment="python3-devel-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957534" comment="python3-idle-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957535" comment="python3-libs-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957536" comment="python3-test-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957537" comment="python3-tkinter-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951961" comment="python3.11-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951962" comment="python3.11-debug-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951963" comment="python3.11-devel-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951964" comment="python3.11-idle-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951965" comment="python3.11-libs-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951966" comment="python3.11-test-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951967" comment="python3.11-tkinter-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953669" comment="python3.12-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953670" comment="python3.12-debug-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953671" comment="python3.12-devel-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953672" comment="python3.12-idle-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953673" comment="python3.12-libs-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953674" comment="python3.12-test-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953675" comment="python3.12-tkinter-3.12.5-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0408</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0408" ref_url="https://www.suse.com/security/cve/CVE-2024-0408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0408/">CVE-2024-0408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0408">CVE-2024-0408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218845">SUSE bug 1218845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0409" ref_url="https://www.suse.com/security/cve/CVE-2024-0409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017767.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-0409/">CVE-2024-0409 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0409">CVE-2024-0409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218846">SUSE bug 1218846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0443" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0443" ref_url="https://www.suse.com/security/cve/CVE-2024-0443" source="SUSE CVE"/>
    <description>
    A flaw was found in the blkgs destruction path in block/blk-cgroup.c in the Linux kernel, leading to a cgroup blkio memory leakage problem. When a cgroup is being destroyed, cgroup_rstat_flush() is only called at css_release_work_fn(), which is called when the blkcg reference count reaches 0. This circular dependency will prevent blkcg and some blkgs from being freed after they are made offline. This issue may allow an attacker with a local access to cause system instability, such as an out of memory error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0443/">CVE-2024-0443 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0443">CVE-2024-0443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218767">SUSE bug 1218767</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0444</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0444" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0444" ref_url="https://www.suse.com/security/cve/CVE-2024-0444" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7178" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001598.html" source="SUSE-SU"/>
    <description>
    GStreamer AV1 Video Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of tile list data within AV1-encoded video files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22873.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0444/">CVE-2024-0444 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0444">CVE-2024-0444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219453">SUSE bug 1219453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985811" comment="gstreamer1-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985812" comment="gstreamer1-devel-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985813" comment="gstreamer1-plugins-bad-free-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985814" comment="gstreamer1-plugins-bad-free-devel-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985815" comment="gstreamer1-plugins-bad-free-libs-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985816" comment="gstreamer1-plugins-ugly-free-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985817" comment="gstreamer1-rtsp-server-1.22.12-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0450</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0450" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0450" ref_url="https://www.suse.com/security/cve/CVE-2024-0450" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000514.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9192" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1556-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024203.html" source="SUSE-SU"/>
    <description>
    An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior.

The zipfile module is vulnerable to “quoted-overlap” zip-bombs which exploit the zip format to create a zip-bomb with a high compression ratio. The fixed versions of CPython makes the zipfile module reject zip archives which overlap entries in the archive.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0450/">CVE-2024-0450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-0450">CVE-2024-0450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221854">SUSE bug 1221854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869946" comment="python-unversioned-command-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869947" comment="python3-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869948" comment="python3-debug-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869949" comment="python3-devel-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869950" comment="python3-idle-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869951" comment="python3-libs-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869952" comment="python3-test-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869953" comment="python3-tkinter-3.9.18-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951961" comment="python3.11-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951962" comment="python3.11-debug-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951963" comment="python3.11-devel-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951964" comment="python3.11-idle-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951965" comment="python3.11-libs-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951966" comment="python3.11-test-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951967" comment="python3.11-tkinter-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953669" comment="python3.12-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953670" comment="python3.12-debug-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953671" comment="python3.12-devel-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953672" comment="python3.12-idle-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953673" comment="python3.12-libs-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953674" comment="python3.12-test-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953675" comment="python3.12-tkinter-3.12.5-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0553</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0553" ref_url="https://www.suse.com/security/cve/CVE-2024-0553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0638-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0553/">CVE-2024-0553 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0553">CVE-2024-0553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218865">SUSE bug 1218865</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844803" comment="gnutls-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844804" comment="gnutls-c++-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844805" comment="gnutls-dane-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844806" comment="gnutls-devel-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844807" comment="gnutls-utils-3.7.6-23.el9_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0565</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0565" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0565" ref_url="https://www.suse.com/security/cve/CVE-2024-0565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1246-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the SMB Client sub-component in the Linux Kernel. This issue occurs due to integer underflow on the memcpy length, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0565/">CVE-2024-0565 at SUSE</cve>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0565">CVE-2024-0565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218832">SUSE bug 1218832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219078">SUSE bug 1219078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0567" ref_url="https://www.suse.com/security/cve/CVE-2024-0567" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0638-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034915.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0567/">CVE-2024-0567 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0567">CVE-2024-0567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218862">SUSE bug 1218862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844803" comment="gnutls-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844804" comment="gnutls-c++-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844805" comment="gnutls-dane-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844806" comment="gnutls-devel-3.7.6-23.el9_3.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844807" comment="gnutls-utils-3.7.6-23.el9_3.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0646" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0646" ref_url="https://www.suse.com/security/cve/CVE-2024-0646" source="SUSE CVE"/>
    <description>
    An out-of-bounds memory write flaw was found in the Linux kernel's Transport Layer Security functionality in how a user calls a function splice with a ktls socket as the destination. This flaw allows a local user to crash or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0646/">CVE-2024-0646 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0646">CVE-2024-0646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218941">SUSE bug 1218941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218942">SUSE bug 1218942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851394" comment="bpftool-7.2.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851395" comment="kernel-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851396" comment="kernel-abi-stablelists-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851397" comment="kernel-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851398" comment="kernel-cross-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851399" comment="kernel-debug-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851400" comment="kernel-debug-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851403" comment="kernel-debug-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851404" comment="kernel-debug-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851405" comment="kernel-debug-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851406" comment="kernel-debug-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851409" comment="kernel-doc-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851410" comment="kernel-headers-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851411" comment="kernel-modules-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851412" comment="kernel-modules-core-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851413" comment="kernel-modules-extra-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851414" comment="kernel-tools-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851415" comment="kernel-tools-libs-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851417" comment="kernel-uki-virt-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851418" comment="libperf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851419" comment="perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851420" comment="python3-perf-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851421" comment="rtla-5.14.0-362.24.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851422" comment="rv-5.14.0-362.24.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0690" ref_url="https://www.suse.com/security/cve/CVE-2024-0690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14537-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2Y6RFLPB54N7XR7AP7A2DEXGLBEDEQJU/" source="SUSE-SU"/>
    <description>
    An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0690/">CVE-2024-0690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0690">CVE-2024-0690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219002">SUSE bug 1219002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876437" comment="ansible-core-2.14.14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876438" comment="ansible-test-2.14.14-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0727" ref_url="https://www.suse.com/security/cve/CVE-2024-0727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018143.html" source="SUSE-SU"/>
    <description>
    Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL
to crash leading to a potential Denial of Service attack

Impact summary: Applications loading files in the PKCS12 format from untrusted
sources might terminate abruptly.

A file in PKCS12 format can contain certificates and keys and may come from an
untrusted source. The PKCS12 specification allows certain fields to be NULL, but
OpenSSL does not correctly check for this case. This can lead to a NULL pointer
dereference that results in OpenSSL crashing. If an application processes PKCS12
files from an untrusted source using the OpenSSL APIs then that application will
be vulnerable to this issue.

OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
and PKCS12_newpass().

We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
function is related to writing data we do not consider it security significant.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-19"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-0727/">CVE-2024-0727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0727">CVE-2024-0727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219243">SUSE bug 1219243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953529" comment="edk2-ovmf-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953530" comment="edk2-tools-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953531" comment="edk2-tools-doc-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867976" comment="openssl-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867977" comment="openssl-devel-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867978" comment="openssl-fips-provider-3.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867979" comment="openssl-libs-3.0.7-27.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867980" comment="openssl-perl-3.0.7-27.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0741" ref_url="https://www.suse.com/security/cve/CVE-2024-0741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0741/">CVE-2024-0741 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0741">CVE-2024-0741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0742" ref_url="https://www.suse.com/security/cve/CVE-2024-0742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0742/">CVE-2024-0742 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0742">CVE-2024-0742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0743" ref_url="https://www.suse.com/security/cve/CVE-2024-0743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An unchecked return value in TLS handshake code could have caused a potentially exploitable crash. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0743/">CVE-2024-0743 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0743">CVE-2024-0743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0746" ref_url="https://www.suse.com/security/cve/CVE-2024-0746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A Linux user opening the print preview dialog could have caused the browser to crash. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0746/">CVE-2024-0746 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0746">CVE-2024-0746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0747</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0747" ref_url="https://www.suse.com/security/cve/CVE-2024-0747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When a parent page loaded a child in an iframe with `unsafe-inline`, the parent Content Security Policy could have overridden the child Content Security Policy. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0747/">CVE-2024-0747 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0747">CVE-2024-0747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0749" ref_url="https://www.suse.com/security/cve/CVE-2024-0749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. This vulnerability affects Firefox &lt; 122 and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0749/">CVE-2024-0749 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0749">CVE-2024-0749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0750" ref_url="https://www.suse.com/security/cve/CVE-2024-0750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0750/">CVE-2024-0750 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0750">CVE-2024-0750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0751" ref_url="https://www.suse.com/security/cve/CVE-2024-0751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious devtools extension could have been used to escalate privileges. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0751/">CVE-2024-0751 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0751">CVE-2024-0751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0753" ref_url="https://www.suse.com/security/cve/CVE-2024-0753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0753/">CVE-2024-0753 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0753">CVE-2024-0753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0755</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0755" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0755" ref_url="https://www.suse.com/security/cve/CVE-2024-0755" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 122, Firefox ESR &lt; 115.7, and Thunderbird &lt; 115.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-02"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0755/">CVE-2024-0755 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0755">CVE-2024-0755 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218955">SUSE bug 1218955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009845168" comment="firefox-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845169" comment="firefox-x11-115.7.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845293" comment="thunderbird-115.7.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0841</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0841" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0841" ref_url="https://www.suse.com/security/cve/CVE-2024-0841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-0841/">CVE-2024-0841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0841">CVE-2024-0841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219264">SUSE bug 1219264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0914" ref_url="https://www.suse.com/security/cve/CVE-2024-0914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018865.html" source="SUSE-SU"/>
    <description>
    A timing side-channel vulnerability has been discovered in the opencryptoki package while processing RSA PKCS#1 v1.5 padded ciphertexts. This flaw could potentially enable unauthorized RSA ciphertext decryption or signing, even without access to the corresponding private key.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-0914/">CVE-2024-0914 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0914">CVE-2024-0914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219217">SUSE bug 1219217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851389" comment="opencryptoki-3.21.0-9.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851390" comment="opencryptoki-devel-3.21.0-9.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851391" comment="opencryptoki-icsftok-3.21.0-9.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851392" comment="opencryptoki-libs-3.21.0-9.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851393" comment="opencryptoki-swtok-3.21.0-9.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0985" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0985" ref_url="https://www.suse.com/security/cve/CVE-2024-0985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0542-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017966.html" source="SUSE-SU"/>
    <description>
    Late privilege drop in REFRESH MATERIALIZED VIEW CONCURRENTLY in PostgreSQL allows an object creator to execute arbitrary SQL functions as the command issuer. The command intends to run SQL functions as the owner of the materialized view, enabling safe refresh of untrusted materialized views. The victim is a superuser or member of one of the attacker's roles. The attack requires luring the victim into running REFRESH MATERIALIZED VIEW CONCURRENTLY on the attacker's materialized view. Versions before PostgreSQL 16.2, 15.6, 14.11, 13.14, and 12.18 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-27"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-0985/">CVE-2024-0985 at SUSE</cve>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0985">CVE-2024-0985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219679">SUSE bug 1219679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806688" comment="pg_repack-1.4.8-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806689" comment="pgaudit-1.7.0-1.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806690" comment="postgres-decoderbufs-1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848886" comment="postgresql-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848887" comment="postgresql-contrib-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848888" comment="postgresql-docs-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848889" comment="postgresql-plperl-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848890" comment="postgresql-plpython3-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848891" comment="postgresql-pltcl-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848892" comment="postgresql-private-devel-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848893" comment="postgresql-private-libs-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848894" comment="postgresql-server-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848895" comment="postgresql-server-devel-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848896" comment="postgresql-static-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848897" comment="postgresql-test-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848898" comment="postgresql-test-rpm-macros-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848899" comment="postgresql-upgrade-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009848900" comment="postgresql-upgrade-devel-15.6-1.module+el9.3.0+21283+b0ea34b6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10306</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10306" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10306" ref_url="https://www.suse.com/security/cve/CVE-2024-10306" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001688.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in mod_proxy_cluster. The issue is that the &lt;Directory&gt; directive should be replaced by the &lt;Location&gt; directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-06-27"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10306/">CVE-2024-10306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10306">CVE-2024-10306 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996936" comment="mod_proxy_cluster-1.3.22-1.el9_6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10458" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10458" ref_url="https://www.suse.com/security/cve/CVE-2024-10458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A permission leak could have occurred from a trusted site to an untrusted site via `embed` or `object` elements. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Firefox ESR &lt; 115.17, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10458/">CVE-2024-10458 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10458">CVE-2024-10458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10459" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10459" ref_url="https://www.suse.com/security/cve/CVE-2024-10459" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could have caused a use-after-free when accessibility was enabled, leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Firefox ESR &lt; 115.17, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10459/">CVE-2024-10459 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10459">CVE-2024-10459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10460" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10460" ref_url="https://www.suse.com/security/cve/CVE-2024-10460" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The origin of an external protocol handler prompt could have been obscured using a data: URL within an `iframe`. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10460/">CVE-2024-10460 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10460">CVE-2024-10460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10461" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10461" ref_url="https://www.suse.com/security/cve/CVE-2024-10461" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header was not respected and did not force a download, which could allow XSS attacks. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10461/">CVE-2024-10461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10461">CVE-2024-10461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10462" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10462" ref_url="https://www.suse.com/security/cve/CVE-2024-10462" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Truncation of a long URL could have allowed origin spoofing in a permission prompt. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10462/">CVE-2024-10462 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10462">CVE-2024-10462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10463</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10463" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10463" ref_url="https://www.suse.com/security/cve/CVE-2024-10463" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Firefox ESR &lt; 115.17, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10463/">CVE-2024-10463 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10463">CVE-2024-10463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10464" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10464" ref_url="https://www.suse.com/security/cve/CVE-2024-10464" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10464/">CVE-2024-10464 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10464">CVE-2024-10464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10465" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10465" ref_url="https://www.suse.com/security/cve/CVE-2024-10465" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A clipboard "paste" button could persist across tabs which allowed a spoofing attack. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10465/">CVE-2024-10465 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10465">CVE-2024-10465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10466" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10466" ref_url="https://www.suse.com/security/cve/CVE-2024-10466" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10466/">CVE-2024-10466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10466">CVE-2024-10466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10467" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10467" ref_url="https://www.suse.com/security/cve/CVE-2024-10467" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000162.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14438-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKGXW7DPNDYB4LMICKFHXVP4VGGAXSIO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14461-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CCWATMIG62O32XUBJEQYUSP2IIXEHEMF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14483-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7YVKQ6WWYB42JWYJ7PEQFEGG53I2RDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 132, Firefox ESR &lt; 128.4, Thunderbird &lt; 128.4, and Thunderbird &lt; 132.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-05"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10467/">CVE-2024-10467 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10467">CVE-2024-10467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231879">SUSE bug 1231879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1048" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1048" ref_url="https://www.suse.com/security/cve/CVE-2024-1048" source="SUSE CVE"/>
    <description>
    A flaw was found in the grub2-set-bootflag utility of grub2. After the fix of CVE-2019-14865, grub2-set-bootflag will create a temporary file with the new grubenv content and rename it to the original grubenv file. If the program is killed before the rename operation, the temporary file will not be removed and may fill the filesystem when invoked multiple times, resulting in a filesystem out of free inodes or blocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1048/">CVE-2024-1048 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1048">CVE-2024-1048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219669">SUSE bug 1219669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872294" comment="grub2-common-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872295" comment="grub2-efi-x64-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872296" comment="grub2-efi-x64-cdboot-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872297" comment="grub2-efi-x64-modules-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872298" comment="grub2-pc-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872299" comment="grub2-pc-modules-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872300" comment="grub2-tools-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872301" comment="grub2-tools-efi-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872302" comment="grub2-tools-extra-2.06-77.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872303" comment="grub2-tools-minimal-2.06-77.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10573" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10573" ref_url="https://www.suse.com/security/cve/CVE-2024-10573" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000696.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000709.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10573/">CVE-2024-10573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10573">CVE-2024-10573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232659">SUSE bug 1232659</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958880" comment="mpg123-1.32.9-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958881" comment="mpg123-devel-1.32.9-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958882" comment="mpg123-libs-1.32.9-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958883" comment="mpg123-plugins-pulseaudio-1.32.9-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1085" ref_url="https://www.suse.com/security/cve/CVE-2024-1085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1312-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018369.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_setelem_catchall_deactivate() function checks whether the catch-all set element is active in the current generation instead of the next generation before freeing it, but only flags it inactive in the next generation, making it possible to free the element multiple times, leading to a double free vulnerability.

We recommend upgrading past commit b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7.


    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1085/">CVE-2024-1085 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1085">CVE-2024-1085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219429">SUSE bug 1219429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219432">SUSE bug 1219432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1086" ref_url="https://www.suse.com/security/cve/CVE-2024-1086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0468-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1386-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1558-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018504.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.

The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.

We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1086/">CVE-2024-1086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1086">CVE-2024-1086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219434">SUSE bug 1219434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219435">SUSE bug 1219435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226066">SUSE bug 1226066</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10963</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10963" ref_url="https://www.suse.com/security/cve/CVE-2024-10963" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10244" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000616.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10379" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14563-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FPNEWJX6P4O6Q76SQV4R46NCDSSTXLFJ/" source="SUSE-SU"/>
    <description>
    A flaw was found in pam_access, where certain rules in its configuration file are mistakenly treated as hostnames. This vulnerability allows attackers to trick the system by pretending to be a trusted hostname, gaining unauthorized access. This issue poses a risk for systems that rely on this feature to control who can access certain services or terminals.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-10963/">CVE-2024-10963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-10963">CVE-2024-10963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233078">SUSE bug 1233078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955016" comment="pam-1.5.1-22.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955017" comment="pam-devel-1.5.1-22.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955018" comment="pam-docs-1.5.1-22.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10976" ref_url="https://www.suse.com/security/cve/CVE-2024-10976" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10791" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000717.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10831" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01799-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14502-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKWDFN2C7BDHNEIL7UAMUE2QLH322LIK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RB4KENPNXIDYL7D4OSLN7SICCC2ASXXP/" source="SUSE-SU"/>
    <description>
    Incomplete tracking in PostgreSQL of tables with row security allows a reused query to view or change different rows from those intended.  CVE-2023-2455 and CVE-2016-2193 fixed most interaction between row security and user ID changes.  They missed cases where a subquery, WITH query, security invoker view, or SQL-language function references a table with a row-level security policy.  This has the same consequences as the two earlier CVEs.  That is to say, it leads to potentially incorrect policies being applied in cases where role-specific policies are used and a given query is planned under one role and then executed under other roles.  This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs.  Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications.  This affects only databases that have used CREATE POLICY to define a row security policy.  An attacker must tailor an attack to a particular application's pattern of query plan reuse, user ID changes, and role-specific row security policies.  Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-06-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10976/">CVE-2024-10976 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10976">CVE-2024-10976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233323">SUSE bug 1233323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958991" comment="postgresql-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958992" comment="postgresql-contrib-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958993" comment="postgresql-docs-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958994" comment="postgresql-plperl-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958995" comment="postgresql-plpython3-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958996" comment="postgresql-pltcl-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958997" comment="postgresql-private-devel-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958998" comment="postgresql-private-libs-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958999" comment="postgresql-server-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959000" comment="postgresql-server-devel-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959001" comment="postgresql-static-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959002" comment="postgresql-test-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959003" comment="postgresql-test-rpm-macros-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959004" comment="postgresql-upgrade-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959005" comment="postgresql-upgrade-devel-13.18-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10978" ref_url="https://www.suse.com/security/cve/CVE-2024-10978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10791" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000717.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10831" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01799-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14502-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKWDFN2C7BDHNEIL7UAMUE2QLH322LIK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RB4KENPNXIDYL7D4OSLN7SICCC2ASXXP/" source="SUSE-SU"/>
    <description>
    Incorrect privilege assignment in PostgreSQL allows a less-privileged application user to view or change different rows from those intended.  An attack requires the application to use SET ROLE, SET SESSION AUTHORIZATION, or an equivalent feature.  The problem arises when an application query uses parameters from the attacker or conveys query results to the attacker.  If that query reacts to current_setting('role') or the current user ID, it may modify or return data as though the session had not used SET ROLE or SET SESSION AUTHORIZATION.  The attacker does not control which incorrect user ID applies.  Query text from less-privileged sources is not a concern here, because SET ROLE and SET SESSION AUTHORIZATION are not sandboxes for unvetted queries.  Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-06-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-10978/">CVE-2024-10978 at SUSE</cve>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10978">CVE-2024-10978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233326">SUSE bug 1233326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958991" comment="postgresql-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958992" comment="postgresql-contrib-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958993" comment="postgresql-docs-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958994" comment="postgresql-plperl-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958995" comment="postgresql-plpython3-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958996" comment="postgresql-pltcl-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958997" comment="postgresql-private-devel-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958998" comment="postgresql-private-libs-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958999" comment="postgresql-server-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959000" comment="postgresql-server-devel-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959001" comment="postgresql-static-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959002" comment="postgresql-test-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959003" comment="postgresql-test-rpm-macros-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959004" comment="postgresql-upgrade-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959005" comment="postgresql-upgrade-devel-13.18-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10979" ref_url="https://www.suse.com/security/cve/CVE-2024-10979" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10791" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000717.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10831" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000639.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10882" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01799-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14502-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AKWDFN2C7BDHNEIL7UAMUE2QLH322LIK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14505-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RB4KENPNXIDYL7D4OSLN7SICCC2ASXXP/" source="SUSE-SU"/>
    <description>
    Incorrect control of environment variables in PostgreSQL PL/Perl allows an unprivileged database user to change sensitive process environment variables (e.g. PATH).  That often suffices to enable arbitrary code execution, even if the attacker lacks a database server operating system user.  Versions before PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-06-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-10979/">CVE-2024-10979 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10979">CVE-2024-10979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233327">SUSE bug 1233327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958991" comment="postgresql-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958992" comment="postgresql-contrib-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958993" comment="postgresql-docs-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958994" comment="postgresql-plperl-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958995" comment="postgresql-plpython3-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958996" comment="postgresql-pltcl-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958997" comment="postgresql-private-devel-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958998" comment="postgresql-private-libs-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958999" comment="postgresql-server-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959000" comment="postgresql-server-devel-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959001" comment="postgresql-static-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959002" comment="postgresql-test-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959003" comment="postgresql-test-rpm-macros-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959004" comment="postgresql-upgrade-13.18-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959005" comment="postgresql-upgrade-devel-13.18-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11029" ref_url="https://www.suse.com/security/cve/CVE-2024-11029" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000765.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the FreeIPA API audit, where it sends the whole FreeIPA command line to journalctl. As a consequence, during the FreeIPA installation process, it inadvertently leaks the administrative user credentials, including the administrator password, to the journal database. In the worst-case scenario, where the journal log is centralized, users with access to it can have improper access to the FreeIPA administrator credentials.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-11029/">CVE-2024-11029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11029">CVE-2024-11029 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961436" comment="ipa-client-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961437" comment="ipa-client-common-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961438" comment="ipa-client-epn-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961439" comment="ipa-client-samba-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961440" comment="ipa-common-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961441" comment="ipa-selinux-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961442" comment="ipa-selinux-luna-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961443" comment="ipa-selinux-nfast-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961444" comment="ipa-server-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961445" comment="ipa-server-common-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961446" comment="ipa-server-dns-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961447" comment="ipa-server-trust-ad-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961448" comment="python3-ipaclient-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961449" comment="python3-ipalib-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961450" comment="python3-ipaserver-4.12.2-1.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960791" comment="python3-ipatests-4.12.2-1.el9_5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11053" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11053" ref_url="https://www.suse.com/security/cve/CVE-2024-11053" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4284-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021084.html" source="SUSE-SU"/>
    <description>
    When asked to both use a `.netrc` file for credentials and to follow HTTP
redirects, curl could leak the password used for the first host to the
followed-to host under certain circumstances.

This flaw only manifests itself if the netrc file has an entry that matches
the redirect target hostname but the entry either omits just the password or
omits both login and password.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-11053/">CVE-2024-11053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11053">CVE-2024-11053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234068">SUSE bug 1234068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11159" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11159" ref_url="https://www.suse.com/security/cve/CVE-2024-11159" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10591" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000646.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10592" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019842.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14497-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3X76ET6XFDVZFIEPLQZ5MQHJMM244MCL/" source="SUSE-SU"/>
    <description>
    Using remote content in OpenPGP encrypted messages can lead to the disclosure of plaintext. This vulnerability affects Thunderbird &lt; 128.4.3 and Thunderbird &lt; 132.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11159/">CVE-2024-11159 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11159">CVE-2024-11159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233355">SUSE bug 1233355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955691" comment="thunderbird-128.5.0-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11168" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11168" ref_url="https://www.suse.com/security/cve/CVE-2024-11168" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10779" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000637.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000664.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020622.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14508-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B2HCTIBVAOGECETVMI4RBFWZPH6DY5N6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14535-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EEJNNKXKTAJNDYH5NTOP4ZQCJ6DHJQWE/" source="SUSE-SU"/>
    <description>
    The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-12-20"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-11168/">CVE-2024-11168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11168">CVE-2024-11168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233307">SUSE bug 1233307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957530" comment="python-unversioned-command-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957531" comment="python3-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957532" comment="python3-debug-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957533" comment="python3-devel-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957534" comment="python3-idle-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957535" comment="python3-libs-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957536" comment="python3-test-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957537" comment="python3-tkinter-3.9.21-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11187</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11187" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11187" ref_url="https://www.suse.com/security/cve/CVE-2024-11187" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1675" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000905.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000906.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000889.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1718" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020309.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14719-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U3SN2G4DQTD5LI632EWUNITUPW44ZK6V/" source="SUSE-SU"/>
    <description>
    It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11187/">CVE-2024-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11187">CVE-2024-11187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236596">SUSE bug 1236596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965101" comment="bind-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965102" comment="bind-chroot-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965103" comment="bind-devel-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965104" comment="bind-dnssec-doc-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965105" comment="bind-dnssec-utils-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965106" comment="bind-doc-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965107" comment="bind-libs-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965108" comment="bind-license-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965109" comment="bind-utils-9.16.23-24.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965110" comment="python3-bind-9.16.23-24.el9_5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11218</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11218" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11218" ref_url="https://www.suse.com/security/cve/CVE-2024-11218" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0923" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in `podman build` and `buildah.` This issue occurs in a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. SELinux might mitigate it, but even with SELinux on, it still allows the enumeration of files and directories on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-11218/">CVE-2024-11218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11218">CVE-2024-11218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236269">SUSE bug 1236269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009962427" comment="buildah-1.37.6-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962428" comment="buildah-tests-1.37.6-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962422" comment="podman-5.2.2-13.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962423" comment="podman-docker-5.2.2-13.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962424" comment="podman-plugins-5.2.2-13.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962425" comment="podman-remote-5.2.2-13.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962426" comment="podman-tests-5.2.2-13.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11233</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11233" ref_url="https://www.suse.com/security/cve/CVE-2024-11233" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15687" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001091.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14521-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROEYTIBLUXYCMCC2T25PTAXMN2GIRPJV/" source="SUSE-SU"/>
    <description>
    In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in  convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11233/">CVE-2024-11233 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11233">CVE-2024-11233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233702">SUSE bug 1233702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985419" comment="php-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985420" comment="php-bcmath-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985421" comment="php-cli-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985422" comment="php-common-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985423" comment="php-dba-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985424" comment="php-dbg-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985425" comment="php-devel-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985426" comment="php-embedded-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985427" comment="php-enchant-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985428" comment="php-ffi-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985429" comment="php-fpm-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985430" comment="php-gd-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985431" comment="php-gmp-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985432" comment="php-intl-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985433" comment="php-ldap-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985434" comment="php-mbstring-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985435" comment="php-mysqlnd-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985436" comment="php-odbc-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985437" comment="php-opcache-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985438" comment="php-pdo-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985439" comment="php-pgsql-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985440" comment="php-process-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985441" comment="php-snmp-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985442" comment="php-soap-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985443" comment="php-xml-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11234</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11234" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11234" ref_url="https://www.suse.com/security/cve/CVE-2024-11234" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15687" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001091.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14521-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROEYTIBLUXYCMCC2T25PTAXMN2GIRPJV/" source="SUSE-SU"/>
    <description>
    In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11234/">CVE-2024-11234 at SUSE</cve>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11234">CVE-2024-11234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233703">SUSE bug 1233703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985419" comment="php-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985420" comment="php-bcmath-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985421" comment="php-cli-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985422" comment="php-common-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985423" comment="php-dba-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985424" comment="php-dbg-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985425" comment="php-devel-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985426" comment="php-embedded-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985427" comment="php-enchant-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985428" comment="php-ffi-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985429" comment="php-fpm-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985430" comment="php-gd-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985431" comment="php-gmp-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985432" comment="php-intl-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985433" comment="php-ldap-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985434" comment="php-mbstring-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985435" comment="php-mysqlnd-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985436" comment="php-odbc-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985437" comment="php-opcache-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985438" comment="php-pdo-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985439" comment="php-pgsql-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985440" comment="php-process-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985441" comment="php-snmp-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985442" comment="php-soap-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985443" comment="php-xml-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11235" ref_url="https://www.suse.com/security/cve/CVE-2024-11235" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7418" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14895-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7LU4U7HP6TCMKUSW3XOAH6TARUKTOSU/" source="SUSE-SU"/>
    <description>
    In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=    operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11235/">CVE-2024-11235 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11235">CVE-2024-11235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239666">SUSE bug 1239666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985383" comment="php-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985384" comment="php-bcmath-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985385" comment="php-cli-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985386" comment="php-common-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985387" comment="php-dba-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985388" comment="php-dbg-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985389" comment="php-devel-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985390" comment="php-embedded-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985391" comment="php-enchant-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985392" comment="php-ffi-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985393" comment="php-fpm-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985394" comment="php-gd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985395" comment="php-gmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985396" comment="php-intl-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985397" comment="php-ldap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985398" comment="php-mbstring-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985399" comment="php-mysqlnd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985400" comment="php-odbc-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985401" comment="php-opcache-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985402" comment="php-pdo-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985409" comment="php-pgsql-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985410" comment="php-process-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985411" comment="php-snmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985412" comment="php-soap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985413" comment="php-xml-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11614" ref_url="https://www.suse.com/security/cve/CVE-2024-11614" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000743.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0222" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023754.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14631-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/435QSQNZEO4ZG5R4FS2BUVQD34CAKL6D/" source="SUSE-SU"/>
    <description>
    An out-of-bounds read vulnerability was found in DPDK's Vhost library checksum offload feature. This issue enables an untrusted or compromised guest to crash the hypervisor's vSwitch by forging Virtio descriptors to cause out-of-bounds reads. This flaw allows an attacker with a malicious VM using a virtio driver to cause the vhost-user side to crash by sending a packet with a Tx checksum offload request and an invalid csum_start offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-11"/>
	<updated date="2026-01-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-11614/">CVE-2024-11614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11614">CVE-2024-11614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234718">SUSE bug 1234718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959725" comment="dpdk-23.11-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959726" comment="dpdk-devel-23.11-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959727" comment="dpdk-doc-23.11-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959728" comment="dpdk-tools-23.11-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11692" ref_url="https://www.suse.com/security/cve/CVE-2024-11692" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10591" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000646.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10592" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000628.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000651.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14542-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HIP7LBABDEHTEPO7WYQ5CHI542PJGK5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E36UEIBGR7762V7PR7XV5YQMCH76YVFN/" source="SUSE-SU"/>
    <description>
    An attacker could cause a select dropdown to be shown over another tab; this could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 133, Firefox ESR &lt; 128.5, Thunderbird &lt; 133, and Thunderbird &lt; 128.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2026-01-10"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11692/">CVE-2024-11692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11692">CVE-2024-11692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233695">SUSE bug 1233695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957245" comment="firefox-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957246" comment="firefox-x11-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955691" comment="thunderbird-128.5.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11694</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11694" ref_url="https://www.suse.com/security/cve/CVE-2024-11694" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10591" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000646.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10592" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000628.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000651.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14542-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HIP7LBABDEHTEPO7WYQ5CHI542PJGK5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E36UEIBGR7762V7PR7XV5YQMCH76YVFN/" source="SUSE-SU"/>
    <description>
    Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox &lt; 133, Firefox ESR &lt; 128.5, Firefox ESR &lt; 115.18, Thunderbird &lt; 133, Thunderbird &lt; 128.5, and Thunderbird &lt; 115.18.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2026-01-10"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-11694/">CVE-2024-11694 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11694">CVE-2024-11694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233695">SUSE bug 1233695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957245" comment="firefox-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957246" comment="firefox-x11-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955691" comment="thunderbird-128.5.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11695" ref_url="https://www.suse.com/security/cve/CVE-2024-11695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10591" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000646.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10592" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000628.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000651.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14542-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HIP7LBABDEHTEPO7WYQ5CHI542PJGK5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E36UEIBGR7762V7PR7XV5YQMCH76YVFN/" source="SUSE-SU"/>
    <description>
    A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox &lt; 133, Firefox ESR &lt; 128.5, Thunderbird &lt; 133, and Thunderbird &lt; 128.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2026-01-10"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11695/">CVE-2024-11695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11695">CVE-2024-11695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233695">SUSE bug 1233695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957245" comment="firefox-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957246" comment="firefox-x11-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955691" comment="thunderbird-128.5.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11696" ref_url="https://www.suse.com/security/cve/CVE-2024-11696" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10591" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000646.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10592" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000628.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000651.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14542-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HIP7LBABDEHTEPO7WYQ5CHI542PJGK5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E36UEIBGR7762V7PR7XV5YQMCH76YVFN/" source="SUSE-SU"/>
    <description>
    The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed.  Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox &lt; 133, Firefox ESR &lt; 128.5, Thunderbird &lt; 133, and Thunderbird &lt; 128.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2026-01-10"/>
	<severity>Critical</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11696/">CVE-2024-11696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11696">CVE-2024-11696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233695">SUSE bug 1233695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957245" comment="firefox-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957246" comment="firefox-x11-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955691" comment="thunderbird-128.5.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11697</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11697" ref_url="https://www.suse.com/security/cve/CVE-2024-11697" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10591" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000646.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10592" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000628.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000651.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14542-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HIP7LBABDEHTEPO7WYQ5CHI542PJGK5L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E36UEIBGR7762V7PR7XV5YQMCH76YVFN/" source="SUSE-SU"/>
    <description>
    When handling keypress events, an attacker may have been able to trick a user into bypassing the "Open Executable File?" confirmation dialog. This could have led to malicious code execution. This vulnerability affects Firefox &lt; 133, Firefox ESR &lt; 128.5, Thunderbird &lt; 133, and Thunderbird &lt; 128.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2026-01-10"/>
	<severity>Critical</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-11697/">CVE-2024-11697 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11697">CVE-2024-11697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233695">SUSE bug 1233695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957245" comment="firefox-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957246" comment="firefox-x11-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955691" comment="thunderbird-128.5.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11699" ref_url="https://www.suse.com/security/cve/CVE-2024-11699" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10591" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000646.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10592" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000628.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000651.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019900.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14583-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/E36UEIBGR7762V7PR7XV5YQMCH76YVFN/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird 128.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 133, Firefox ESR &lt; 128.5, Thunderbird &lt; 133, and Thunderbird &lt; 128.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2026-01-10"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-11699/">CVE-2024-11699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11699">CVE-2024-11699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233695">SUSE bug 1233695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957245" comment="firefox-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957246" comment="firefox-x11-128.5.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955691" comment="thunderbird-128.5.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11831</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11831" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11831" ref_url="https://www.suse.com/security/cve/CVE-2024-11831" source="SUSE CVE"/>
    <description>
    A flaw was found in npm-serialize-javascript. The vulnerability occurs because the serialize-javascript module does not properly sanitize certain inputs, such as regex or other JavaScript object types, allowing an attacker to inject malicious code. This code could be executed when deserialized by a web browser, causing Cross-site scripting (XSS) attacks. This issue is critical in environments where serialized data is sent to web clients, potentially compromising the security of the website or web application using this package.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11831/">CVE-2024-11831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-11831">CVE-2024-11831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236969">SUSE bug 1236969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053885" comment="aspnetcore-runtime-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053886" comment="aspnetcore-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053887" comment="aspnetcore-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053888" comment="dotnet-apphost-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053889" comment="dotnet-hostfxr-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053890" comment="dotnet-runtime-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053891" comment="dotnet-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053892" comment="dotnet-sdk-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053893" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053894" comment="dotnet-sdk-dbg-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053895" comment="dotnet-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053896" comment="dotnet-templates-8.0-8.0.112-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12085" ref_url="https://www.suse.com/security/cve/CVE-2024-12085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0324" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000762.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0325" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000761.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0714" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021107.html" source="SUSE-SU"/>
    <description>
    A flaw was found in rsync which could be triggered when rsync compares file checksums. This flaw allows an attacker to manipulate the checksum length (s2length) to cause a comparison between a checksum and uninitialized memory and leak one byte of uninitialized stack data at a time.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12085/">CVE-2024-12085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12085">CVE-2024-12085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233760">SUSE bug 1233760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234101">SUSE bug 1234101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960346" comment="rsync-3.2.3-20.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960347" comment="rsync-daemon-3.2.3-20.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12087" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12087" ref_url="https://www.suse.com/security/cve/CVE-2024-12087" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23415" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002302.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2600" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000939.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7050" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021107.html" source="SUSE-SU"/>
    <description>
    A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-12-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12087/">CVE-2024-12087 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12087">CVE-2024-12087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233760">SUSE bug 1233760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234103">SUSE bug 1234103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983873" comment="rsync-3.2.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983874" comment="rsync-daemon-3.2.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983875" comment="rsync-rrsync-3.2.5-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12088" ref_url="https://www.suse.com/security/cve/CVE-2024-12088" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2600" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000939.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7050" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0118-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0120-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0121-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0122-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1330-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021107.html" source="SUSE-SU"/>
    <description>
    A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12088/">CVE-2024-12088 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-12088">CVE-2024-12088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233760">SUSE bug 1233760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234104">SUSE bug 1234104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983873" comment="rsync-3.2.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983874" comment="rsync-daemon-3.2.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983875" comment="rsync-rrsync-3.2.5-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12133" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12133" ref_url="https://www.suse.com/security/cve/CVE-2024-12133" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001074.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7077" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021046.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14756-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LSN5NMZ5HY5PR3Z4GCPRWQVI55PNV6WY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSDPXBEBCXFVTR7ITHZRLUVKRYPT5CV4/" source="SUSE-SU"/>
    <description>
    A flaw in libtasn1 causes inefficient handling of specific certificate data. When processing a large number of elements in a certificate, libtasn1 takes much longer than expected, which can slow down or even crash the system. This flaw allows an attacker to send a specially crafted certificate, causing a denial of service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12133/">CVE-2024-12133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12133">CVE-2024-12133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236878">SUSE bug 1236878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985328" comment="libtasn1-4.16.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985329" comment="libtasn1-devel-4.16.0-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985330" comment="libtasn1-tools-4.16.0-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12243" ref_url="https://www.suse.com/security/cve/CVE-2024-12243" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4051" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001057.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7076" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021034.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14835-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSDPXBEBCXFVTR7ITHZRLUVKRYPT5CV4/" source="SUSE-SU"/>
    <description>
    A flaw was found in GnuTLS, which relies on libtasn1 for ASN.1 data processing. Due to an inefficient algorithm in libtasn1, decoding certain DER-encoded certificate data can take excessive time, leading to increased resource consumption. This flaw allows a remote attacker to send a specially crafted certificate, causing GnuTLS to become unresponsive or slow, resulting in a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-06-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12243/">CVE-2024-12243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12243">CVE-2024-12243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236974">SUSE bug 1236974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985323" comment="gnutls-3.8.3-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985324" comment="gnutls-c++-3.8.3-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985325" comment="gnutls-dane-3.8.3-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985326" comment="gnutls-devel-3.8.3-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985327" comment="gnutls-utils-3.8.3-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12254" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12254" ref_url="https://www.suse.com/security/cve/CVE-2024-12254" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10978" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000663.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10980" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020339.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14581-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ISOWT6LAVQJGGZIVXB2VE32LIUJZ5SHC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14998-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PXX7J56STECCADEPVF5ZNR6YWJNV4HZ/" source="SUSE-SU"/>
    <description>
    Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines()
 method would not "pause" writing and signal to the Protocol to drain 
the buffer to the wire once the write buffer reached the "high-water 
mark". Because of this, Protocols would not periodically drain the write
 buffer potentially leading to memory exhaustion.





This
 vulnerability likely impacts a small number of users, you must be using
 Python 3.12.0 or later, on macOS or Linux, using the asyncio module 
with protocols, and using .writelines() method which had new 
zero-copy-on-write behavior in Python 3.12.0 and later. If not all of 
these factors are true then your usage of Python is unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-06-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-12254/">CVE-2024-12254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12254">CVE-2024-12254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234290">SUSE bug 1234290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957523" comment="python3.12-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957524" comment="python3.12-debug-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957525" comment="python3.12-devel-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957526" comment="python3.12-idle-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957527" comment="python3.12-libs-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957528" comment="python3.12-test-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957529" comment="python3.12-tkinter-3.12.5-2.el9_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12718" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12718" ref_url="https://www.suse.com/security/cve/CVE-2024-12718" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001745.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10031" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001732.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001750.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001756.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001757.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001758.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02049-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023842.html" source="SUSE-SU"/>
    <description>
    Allows modifying some file metadata (e.g. last modified) with filter="data"  or file permissions (chmod) with filter="tar"  of files outside the extraction directory.
You are affected by this vulnerability if using the tarfile  module to extract untrusted tar archives using TarFile.extractall()  or TarFile.extract()  using the filter=  parameter with a value of "data"  or "tar". See the tarfile  extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter   for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature.

Note that for Python 3.14 or later the default value of filter=  changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected.

Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-01-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-12718/">CVE-2024-12718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12718">CVE-2024-12718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244056">SUSE bug 1244056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998057" comment="python-unversioned-command-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998058" comment="python3-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998059" comment="python3-debug-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998060" comment="python3-devel-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998061" comment="python3-idle-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998062" comment="python3-libs-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998063" comment="python3-test-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998064" comment="python3-tkinter-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998168" comment="python3.11-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998169" comment="python3.11-debug-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998170" comment="python3.11-devel-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998171" comment="python3.11-idle-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998172" comment="python3.11-libs-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998173" comment="python3.11-test-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998174" comment="python3.11-tkinter-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998065" comment="python3.12-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998066" comment="python3.12-debug-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998067" comment="python3.12-devel-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998068" comment="python3.12-idle-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998069" comment="python3.12-libs-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998070" comment="python3.12-test-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998071" comment="python3.12-tkinter-3.12.9-1.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12747</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12747" ref_url="https://www.suse.com/security/cve/CVE-2024-12747" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2600" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000939.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7050" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021107.html" source="SUSE-SU"/>
    <description>
    A flaw was found in rsync. This vulnerability arises from a race condition during rsync's handling of symbolic links. Rsync's default behavior when encountering symbolic links is to skip them. If an attacker replaced a regular file with a symbolic link at the right time, it was possible to bypass the default behavior and traverse symbolic links. Depending on the privileges of the rsync process, an attacker could leak sensitive information, potentially leading to privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12747/">CVE-2024-12747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12747">CVE-2024-12747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233760">SUSE bug 1233760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235475">SUSE bug 1235475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983873" comment="rsync-3.2.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983874" comment="rsync-daemon-3.2.5-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983875" comment="rsync-rrsync-3.2.5-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12797" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12797" ref_url="https://www.suse.com/security/cve/CVE-2024-12797" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1330" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02042-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040404.html" source="SUSE-SU"/>
    <description>
    Issue summary: Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a
server may fail to notice that the server was not authenticated, because
handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode
is set.

Impact summary: TLS and DTLS connections using raw public keys may be
vulnerable to man-in-middle attacks when server authentication failure is not
detected by clients.

RPKs are disabled by default in both TLS clients and TLS servers.  The issue
only arises when TLS clients explicitly enable RPK use by the server, and the
server, likewise, enables sending of an RPK instead of an X.509 certificate
chain.  The affected clients are those that then rely on the handshake to
fail when the server's RPK fails to match one of the expected public keys,
by setting the verification mode to SSL_VERIFY_PEER.

Clients that enable server-side raw public keys can still find out that raw
public key verification failed by calling SSL_get_verify_result(), and those
that do, and take appropriate action, are not affected.  This issue was
introduced in the initial implementation of RPK support in OpenSSL 3.2.

The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2025-06-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12797/">CVE-2024-12797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12797">CVE-2024-12797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236599">SUSE bug 1236599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963384" comment="openssl-3.2.2-6.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963385" comment="openssl-devel-3.2.2-6.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963386" comment="openssl-libs-3.2.2-6.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963387" comment="openssl-perl-3.2.2-6.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1298</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1298" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1298" ref_url="https://www.suse.com/security/cve/CVE-2024-1298" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020334.html" source="SUSE-SU"/>
    <description>
    EDK2 contains a vulnerability when S3 sleep is activated where an Attacker may cause a Division-By-Zero due to a UNIT32 overflow via local access. A successful exploit of this vulnerability may lead to a loss of Availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1298/">CVE-2024-1298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1298">CVE-2024-1298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225889">SUSE bug 1225889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953529" comment="edk2-ovmf-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953530" comment="edk2-tools-20240524-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953531" comment="edk2-tools-doc-20240524-6.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1313" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1313" ref_url="https://www.suse.com/security/cve/CVE-2024-1313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1508-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1530-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1530-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035402.html" source="SUSE-SU"/>
    <description>
    It is possible for a user in a different organization from the owner of a snapshot to bypass authorization and delete a snapshot by issuing a DELETE request to /api/snapshots/&lt;key&gt; using its view key. This functionality is intended to only be available to individuals with the permission to write/edit to the snapshot in question, but due to a bug in the authorization logic, deletion requests issued by an unprivileged user in a different organization than the snapshot owner are treated as authorized.

Grafana Labs would like to thank Ravid Mazon and Jay Chen of Palo 
Alto Research for discovering and disclosing this vulnerability.

This issue affects Grafana: from 9.5.0 before 9.5.18, from 10.0.0 before 10.0.13, from 10.1.0 before 10.1.9, from 10.2.0 before 10.2.6, from 10.3.0 before 10.3.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-1313/">CVE-2024-1313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1313">CVE-2024-1313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222155">SUSE bug 1222155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866767" comment="grafana-9.2.10-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866768" comment="grafana-selinux-9.2.10-16.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1394" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1394" ref_url="https://www.suse.com/security/cve/CVE-2024-1394" source="SUSE CVE"/>
    <description>
    A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey and ctx. That function uses named return parameters to free pkey and ctx if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey and ctx will be nil inside the deferred function that should free them.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1394/">CVE-2024-1394 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1394">CVE-2024-1394 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009874026" comment="buildah-1.33.7-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874027" comment="buildah-tests-1.33.7-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877106" comment="containernetworking-plugins-1.4.0-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866758" comment="go-toolset-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866759" comment="golang-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866760" comment="golang-bin-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866761" comment="golang-docs-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866762" comment="golang-misc-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866763" comment="golang-src-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866764" comment="golang-tests-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866767" comment="grafana-9.2.10-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866769" comment="grafana-pcp-5.1.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866768" comment="grafana-selinux-9.2.10-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874033" comment="gvisor-tap-vsock-0.7.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874028" comment="podman-4.9.4-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874029" comment="podman-docker-4.9.4-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874030" comment="podman-plugins-4.9.4-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874031" comment="podman-remote-4.9.4-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874032" comment="podman-tests-4.9.4-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877107" comment="runc-1.1.12-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872993" comment="skopeo-1.14.3-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872994" comment="skopeo-tests-1.14.3-3.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1441</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1441" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1441" ref_url="https://www.suse.com/security/cve/CVE-2024-1441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034896.html" source="SUSE-SU"/>
    <description>
    An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-1441/">CVE-2024-1441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1441">CVE-2024-1441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221237">SUSE bug 1221237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868756" comment="libvirt-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868757" comment="libvirt-client-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868758" comment="libvirt-client-qemu-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868759" comment="libvirt-daemon-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868760" comment="libvirt-daemon-common-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868761" comment="libvirt-daemon-config-network-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868762" comment="libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868763" comment="libvirt-daemon-driver-interface-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868764" comment="libvirt-daemon-driver-network-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868765" comment="libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868766" comment="libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868767" comment="libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868768" comment="libvirt-daemon-driver-secret-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868769" comment="libvirt-daemon-driver-storage-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868770" comment="libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868771" comment="libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868772" comment="libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868773" comment="libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868774" comment="libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868775" comment="libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868776" comment="libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868777" comment="libvirt-daemon-kvm-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868778" comment="libvirt-daemon-lock-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868779" comment="libvirt-daemon-log-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868780" comment="libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868781" comment="libvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868782" comment="libvirt-daemon-proxy-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868783" comment="libvirt-devel-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868784" comment="libvirt-docs-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868785" comment="libvirt-libs-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868786" comment="libvirt-nss-10.0.0-6.2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1481</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1481" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1481" ref_url="https://www.suse.com/security/cve/CVE-2024-1481" source="SUSE CVE"/>
    <description>
    A flaw was found in FreeIPA. This issue may allow a remote attacker to craft a HTTP request with parameters that can be interpreted as command arguments to kinit on the FreeIPA server, which can lead to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-26"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1481/">CVE-2024-1481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1481">CVE-2024-1481 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868940" comment="ipa-client-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868941" comment="ipa-client-common-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868942" comment="ipa-client-epn-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868943" comment="ipa-client-samba-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868944" comment="ipa-common-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868945" comment="ipa-selinux-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868946" comment="ipa-server-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868947" comment="ipa-server-common-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868948" comment="ipa-server-dns-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868949" comment="ipa-server-trust-ad-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868950" comment="python3-ipaclient-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868951" comment="python3-ipalib-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868952" comment="python3-ipaserver-4.11.0-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868953" comment="python3-ipatests-4.11.0-9.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1488</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1488" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1488" ref_url="https://www.suse.com/security/cve/CVE-2024-1488" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0837" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000806.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-12"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1488/">CVE-2024-1488 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1488">CVE-2024-1488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219963">SUSE bug 1219963</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009854107" comment="python3-unbound-1.16.2-3.el9_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854108" comment="unbound-1.16.2-3.el9_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854109" comment="unbound-devel-1.16.2-3.el9_3.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009854110" comment="unbound-libs-1.16.2-3.el9_3.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1546" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1546" ref_url="https://www.suse.com/security/cve/CVE-2024-1546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-04-03"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1546/">CVE-2024-1546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1546">CVE-2024-1546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1547" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1547" ref_url="https://www.suse.com/security/cve/CVE-2024-1547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown). This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-04-04"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1547/">CVE-2024-1547 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1547">CVE-2024-1547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1548</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1548" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1548" ref_url="https://www.suse.com/security/cve/CVE-2024-1548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-04-04"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1548/">CVE-2024-1548 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1548">CVE-2024-1548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1549" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1549" ref_url="https://www.suse.com/security/cve/CVE-2024-1549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-04-04"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1549/">CVE-2024-1549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1549">CVE-2024-1549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1550" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1550" ref_url="https://www.suse.com/security/cve/CVE-2024-1550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A malicious website could have used a combination of exiting fullscreen mode and `requestPointerLock` to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-04-03"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1550/">CVE-2024-1550 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1550">CVE-2024-1550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1551" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1551" ref_url="https://www.suse.com/security/cve/CVE-2024-1551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-04-03"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1551/">CVE-2024-1551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1551">CVE-2024-1551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1552</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1552" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1552" ref_url="https://www.suse.com/security/cve/CVE-2024-1552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior.*Note:* This issue only affects 32-bit ARM devices. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-04-06"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1552/">CVE-2024-1552 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1552">CVE-2024-1552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1553</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1553" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1553" ref_url="https://www.suse.com/security/cve/CVE-2024-1553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 123, Firefox ESR &lt; 115.8, and Thunderbird &lt; 115.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-04-04"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-1553/">CVE-2024-1553 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1553">CVE-2024-1553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220048">SUSE bug 1220048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849200" comment="firefox-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849201" comment="firefox-x11-115.8.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849711" comment="thunderbird-115.8.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1597" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1597" ref_url="https://www.suse.com/security/cve/CVE-2024-1597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018094.html" source="SUSE-SU"/>
    <description>
    pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-23"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1597/">CVE-2024-1597 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-1597">CVE-2024-1597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220644">SUSE bug 1220644</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851819" comment="postgresql-jdbc-42.2.28-1.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1737" ref_url="https://www.suse.com/security/cve/CVE-2024-1737" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7349" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000100.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019165.html" source="SUSE-SU"/>
    <description>
    Resolver caches and authoritative zone databases that hold significant numbers of RRs for the same hostname (of any RTYPE) can suffer from degraded performance as content is being added or updated, and also when handling client queries for this name.
This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.4-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1737/">CVE-2024-1737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1737">CVE-2024-1737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228256">SUSE bug 1228256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879121" comment="bind-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879122" comment="bind-chroot-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879123" comment="bind-devel-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879124" comment="bind-dnssec-doc-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879125" comment="bind-dnssec-utils-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879126" comment="bind-doc-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879127" comment="bind-dyndb-ldap-11.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879128" comment="bind-libs-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879129" comment="bind-license-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879130" comment="bind-utils-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879131" comment="python3-bind-9.16.23-18.el9_4.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1753" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1753" ref_url="https://www.suse.com/security/cve/CVE-2024-1753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1146-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-27"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1753/">CVE-2024-1753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1753">CVE-2024-1753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221677">SUSE bug 1221677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858073" comment="buildah-1.31.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858074" comment="buildah-tests-1.31.5-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867218" comment="podman-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867219" comment="podman-docker-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867220" comment="podman-plugins-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867221" comment="podman-remote-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867222" comment="podman-tests-4.9.4-3.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1936" ref_url="https://www.suse.com/security/cve/CVE-2024-1936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018174.html" source="SUSE-SU"/>
    <description>
    The encrypted subject of an email message could be incorrectly and permanently assigned to an arbitrary other email message in Thunderbird's local cache. Consequently, when replying to the contaminated email message, the user might accidentally leak the confidential subject to a third-party. While this update fixes the bug and avoids future message contamination, it does not automatically repair existing contaminations. Users are advised to use the repair folder functionality, which is available from the context menu of email folders, which will erase incorrect subject assignments. This vulnerability affects Thunderbird &lt; 115.8.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-1936/">CVE-2024-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1936">CVE-2024-1936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221054">SUSE bug 1221054</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20241975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-1975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-1975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-1975" ref_url="https://www.suse.com/security/cve/CVE-2024-1975" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7349" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000100.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019165.html" source="SUSE-SU"/>
    <description>
    If a server hosts a zone containing a "KEY" Resource Record, or a resolver DNSSEC-validates a "KEY" Resource Record from a DNSSEC-signed domain in cache, a client can exhaust resolver CPU resources by sending a stream of SIG(0) signed requests.
This issue affects BIND 9 versions 9.0.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.49-S1, and 9.18.11-S1 through 9.18.27-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-1975/">CVE-2024-1975 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-1975">CVE-2024-1975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228257">SUSE bug 1228257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879121" comment="bind-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879122" comment="bind-chroot-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879123" comment="bind-devel-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879124" comment="bind-dnssec-doc-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879125" comment="bind-dnssec-utils-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879126" comment="bind-doc-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879127" comment="bind-dyndb-ldap-11.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879128" comment="bind-libs-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879129" comment="bind-license-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879130" comment="bind-utils-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879131" comment="python3-bind-9.16.23-18.el9_4.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20918" ref_url="https://www.suse.com/security/cve/CVE-2024-20918" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-21"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20918/">CVE-2024-20918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20918">CVE-2024-20918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218907">SUSE bug 1218907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844464" comment="java-1.8.0-openjdk-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844465" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844466" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844467" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844468" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844469" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844470" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844471" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844472" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844473" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844474" comment="java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844475" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844476" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844477" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844478" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844479" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844480" comment="java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844481" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844482" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844483" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845119" comment="java-11-openjdk-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845120" comment="java-11-openjdk-demo-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845121" comment="java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845122" comment="java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845123" comment="java-11-openjdk-devel-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845124" comment="java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845125" comment="java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845126" comment="java-11-openjdk-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845127" comment="java-11-openjdk-headless-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845128" comment="java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845129" comment="java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845130" comment="java-11-openjdk-javadoc-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845131" comment="java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845132" comment="java-11-openjdk-jmods-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845133" comment="java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845134" comment="java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845135" comment="java-11-openjdk-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845136" comment="java-11-openjdk-src-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845137" comment="java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845138" comment="java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845139" comment="java-11-openjdk-static-libs-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845140" comment="java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845141" comment="java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849165" comment="java-17-openjdk-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849166" comment="java-17-openjdk-demo-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849167" comment="java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849168" comment="java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849169" comment="java-17-openjdk-devel-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849170" comment="java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849171" comment="java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849172" comment="java-17-openjdk-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849173" comment="java-17-openjdk-headless-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849174" comment="java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849175" comment="java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849176" comment="java-17-openjdk-javadoc-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849177" comment="java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849178" comment="java-17-openjdk-jmods-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849179" comment="java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849180" comment="java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849181" comment="java-17-openjdk-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849182" comment="java-17-openjdk-src-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849183" comment="java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849184" comment="java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849185" comment="java-17-openjdk-static-libs-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849186" comment="java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849187" comment="java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819996" comment="java-21-openjdk-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819997" comment="java-21-openjdk-demo-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819998" comment="java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819999" comment="java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820000" comment="java-21-openjdk-devel-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820001" comment="java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820002" comment="java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820003" comment="java-21-openjdk-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820004" comment="java-21-openjdk-headless-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820005" comment="java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820006" comment="java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820007" comment="java-21-openjdk-javadoc-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820008" comment="java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820009" comment="java-21-openjdk-jmods-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820010" comment="java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820011" comment="java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820012" comment="java-21-openjdk-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820013" comment="java-21-openjdk-src-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820014" comment="java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820015" comment="java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820016" comment="java-21-openjdk-static-libs-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820017" comment="java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820018" comment="java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20919" ref_url="https://www.suse.com/security/cve/CVE-2024-20919" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20919/">CVE-2024-20919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20919">CVE-2024-20919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218903">SUSE bug 1218903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844464" comment="java-1.8.0-openjdk-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844465" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844466" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844467" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844468" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844469" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844470" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844471" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844472" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844473" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844474" comment="java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844475" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844476" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844477" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844478" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844479" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844480" comment="java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844481" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844482" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844483" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845119" comment="java-11-openjdk-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845120" comment="java-11-openjdk-demo-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845121" comment="java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845122" comment="java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845123" comment="java-11-openjdk-devel-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845124" comment="java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845125" comment="java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845126" comment="java-11-openjdk-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845127" comment="java-11-openjdk-headless-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845128" comment="java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845129" comment="java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845130" comment="java-11-openjdk-javadoc-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845131" comment="java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845132" comment="java-11-openjdk-jmods-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845133" comment="java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845134" comment="java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845135" comment="java-11-openjdk-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845136" comment="java-11-openjdk-src-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845137" comment="java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845138" comment="java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845139" comment="java-11-openjdk-static-libs-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845140" comment="java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845141" comment="java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849165" comment="java-17-openjdk-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849166" comment="java-17-openjdk-demo-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849167" comment="java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849168" comment="java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849169" comment="java-17-openjdk-devel-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849170" comment="java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849171" comment="java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849172" comment="java-17-openjdk-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849173" comment="java-17-openjdk-headless-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849174" comment="java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849175" comment="java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849176" comment="java-17-openjdk-javadoc-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849177" comment="java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849178" comment="java-17-openjdk-jmods-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849179" comment="java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849180" comment="java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849181" comment="java-17-openjdk-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849182" comment="java-17-openjdk-src-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849183" comment="java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849184" comment="java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849185" comment="java-17-openjdk-static-libs-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849186" comment="java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849187" comment="java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819996" comment="java-21-openjdk-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819997" comment="java-21-openjdk-demo-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819998" comment="java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819999" comment="java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820000" comment="java-21-openjdk-devel-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820001" comment="java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820002" comment="java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820003" comment="java-21-openjdk-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820004" comment="java-21-openjdk-headless-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820005" comment="java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820006" comment="java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820007" comment="java-21-openjdk-javadoc-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820008" comment="java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820009" comment="java-21-openjdk-jmods-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820010" comment="java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820011" comment="java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820012" comment="java-21-openjdk-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820013" comment="java-21-openjdk-src-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820014" comment="java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820015" comment="java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820016" comment="java-21-openjdk-static-libs-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820017" comment="java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820018" comment="java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20921" ref_url="https://www.suse.com/security/cve/CVE-2024-20921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20921/">CVE-2024-20921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20921">CVE-2024-20921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218905">SUSE bug 1218905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844464" comment="java-1.8.0-openjdk-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844465" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844466" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844467" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844468" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844469" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844470" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844471" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844472" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844473" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844474" comment="java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844475" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844476" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844477" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844478" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844479" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844480" comment="java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844481" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844482" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844483" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845119" comment="java-11-openjdk-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845120" comment="java-11-openjdk-demo-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845121" comment="java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845122" comment="java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845123" comment="java-11-openjdk-devel-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845124" comment="java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845125" comment="java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845126" comment="java-11-openjdk-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845127" comment="java-11-openjdk-headless-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845128" comment="java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845129" comment="java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845130" comment="java-11-openjdk-javadoc-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845131" comment="java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845132" comment="java-11-openjdk-jmods-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845133" comment="java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845134" comment="java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845135" comment="java-11-openjdk-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845136" comment="java-11-openjdk-src-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845137" comment="java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845138" comment="java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845139" comment="java-11-openjdk-static-libs-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845140" comment="java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845141" comment="java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849165" comment="java-17-openjdk-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849166" comment="java-17-openjdk-demo-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849167" comment="java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849168" comment="java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849169" comment="java-17-openjdk-devel-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849170" comment="java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849171" comment="java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849172" comment="java-17-openjdk-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849173" comment="java-17-openjdk-headless-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849174" comment="java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849175" comment="java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849176" comment="java-17-openjdk-javadoc-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849177" comment="java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849178" comment="java-17-openjdk-jmods-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849179" comment="java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849180" comment="java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849181" comment="java-17-openjdk-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849182" comment="java-17-openjdk-src-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849183" comment="java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849184" comment="java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849185" comment="java-17-openjdk-static-libs-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849186" comment="java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849187" comment="java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819996" comment="java-21-openjdk-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819997" comment="java-21-openjdk-demo-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819998" comment="java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819999" comment="java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820000" comment="java-21-openjdk-devel-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820001" comment="java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820002" comment="java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820003" comment="java-21-openjdk-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820004" comment="java-21-openjdk-headless-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820005" comment="java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820006" comment="java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820007" comment="java-21-openjdk-javadoc-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820008" comment="java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820009" comment="java-21-openjdk-jmods-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820010" comment="java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820011" comment="java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820012" comment="java-21-openjdk-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820013" comment="java-21-openjdk-src-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820014" comment="java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820015" comment="java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820016" comment="java-21-openjdk-static-libs-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820017" comment="java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820018" comment="java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20926</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20926" ref_url="https://www.suse.com/security/cve/CVE-2024-20926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-26"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20926/">CVE-2024-20926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20926">CVE-2024-20926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218906">SUSE bug 1218906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844464" comment="java-1.8.0-openjdk-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844465" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844466" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844467" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844468" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844469" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844470" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844471" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844472" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844473" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844474" comment="java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844475" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844476" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844477" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844478" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844479" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844480" comment="java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844481" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844482" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844483" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845119" comment="java-11-openjdk-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845120" comment="java-11-openjdk-demo-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845121" comment="java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845122" comment="java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845123" comment="java-11-openjdk-devel-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845124" comment="java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845125" comment="java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845126" comment="java-11-openjdk-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845127" comment="java-11-openjdk-headless-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845128" comment="java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845129" comment="java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845130" comment="java-11-openjdk-javadoc-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845131" comment="java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845132" comment="java-11-openjdk-jmods-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845133" comment="java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845134" comment="java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845135" comment="java-11-openjdk-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845136" comment="java-11-openjdk-src-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845137" comment="java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845138" comment="java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845139" comment="java-11-openjdk-static-libs-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845140" comment="java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845141" comment="java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20932" ref_url="https://www.suse.com/security/cve/CVE-2024-20932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-29"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20932/">CVE-2024-20932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20932">CVE-2024-20932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218908">SUSE bug 1218908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009849165" comment="java-17-openjdk-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849166" comment="java-17-openjdk-demo-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849167" comment="java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849168" comment="java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849169" comment="java-17-openjdk-devel-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849170" comment="java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849171" comment="java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849172" comment="java-17-openjdk-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849173" comment="java-17-openjdk-headless-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849174" comment="java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849175" comment="java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849176" comment="java-17-openjdk-javadoc-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849177" comment="java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849178" comment="java-17-openjdk-jmods-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849179" comment="java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849180" comment="java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849181" comment="java-17-openjdk-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849182" comment="java-17-openjdk-src-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849183" comment="java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849184" comment="java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849185" comment="java-17-openjdk-static-libs-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849186" comment="java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849187" comment="java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20945" ref_url="https://www.suse.com/security/cve/CVE-2024-20945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-20945/">CVE-2024-20945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20945">CVE-2024-20945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218909">SUSE bug 1218909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844464" comment="java-1.8.0-openjdk-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844465" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844466" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844467" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844468" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844469" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844470" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844471" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844472" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844473" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844474" comment="java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844475" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844476" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844477" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844478" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844479" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844480" comment="java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844481" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844482" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844483" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845119" comment="java-11-openjdk-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845120" comment="java-11-openjdk-demo-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845121" comment="java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845122" comment="java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845123" comment="java-11-openjdk-devel-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845124" comment="java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845125" comment="java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845126" comment="java-11-openjdk-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845127" comment="java-11-openjdk-headless-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845128" comment="java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845129" comment="java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845130" comment="java-11-openjdk-javadoc-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845131" comment="java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845132" comment="java-11-openjdk-jmods-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845133" comment="java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845134" comment="java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845135" comment="java-11-openjdk-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845136" comment="java-11-openjdk-src-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845137" comment="java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845138" comment="java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845139" comment="java-11-openjdk-static-libs-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845140" comment="java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845141" comment="java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849165" comment="java-17-openjdk-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849166" comment="java-17-openjdk-demo-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849167" comment="java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849168" comment="java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849169" comment="java-17-openjdk-devel-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849170" comment="java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849171" comment="java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849172" comment="java-17-openjdk-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849173" comment="java-17-openjdk-headless-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849174" comment="java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849175" comment="java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849176" comment="java-17-openjdk-javadoc-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849177" comment="java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849178" comment="java-17-openjdk-jmods-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849179" comment="java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849180" comment="java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849181" comment="java-17-openjdk-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849182" comment="java-17-openjdk-src-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849183" comment="java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849184" comment="java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849185" comment="java-17-openjdk-static-libs-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849186" comment="java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849187" comment="java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819996" comment="java-21-openjdk-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819997" comment="java-21-openjdk-demo-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819998" comment="java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819999" comment="java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820000" comment="java-21-openjdk-devel-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820001" comment="java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820002" comment="java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820003" comment="java-21-openjdk-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820004" comment="java-21-openjdk-headless-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820005" comment="java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820006" comment="java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820007" comment="java-21-openjdk-javadoc-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820008" comment="java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820009" comment="java-21-openjdk-jmods-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820010" comment="java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820011" comment="java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820012" comment="java-21-openjdk-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820013" comment="java-21-openjdk-src-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820014" comment="java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820015" comment="java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820016" comment="java-21-openjdk-static-libs-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820017" comment="java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820018" comment="java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20952" ref_url="https://www.suse.com/security/cve/CVE-2024-20952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0321-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018149.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-21"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-20952/">CVE-2024-20952 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20952">CVE-2024-20952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218911">SUSE bug 1218911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219843">SUSE bug 1219843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009844464" comment="java-1.8.0-openjdk-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844465" comment="java-1.8.0-openjdk-accessibility-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844466" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844467" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.402.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844468" comment="java-1.8.0-openjdk-demo-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844469" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844470" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844471" comment="java-1.8.0-openjdk-devel-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844472" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844473" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844474" comment="java-1.8.0-openjdk-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844475" comment="java-1.8.0-openjdk-headless-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844476" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844477" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844478" comment="java-1.8.0-openjdk-javadoc-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844479" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844480" comment="java-1.8.0-openjdk-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844481" comment="java-1.8.0-openjdk-src-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844482" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009844483" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.402.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845119" comment="java-11-openjdk-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845120" comment="java-11-openjdk-demo-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845121" comment="java-11-openjdk-demo-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845122" comment="java-11-openjdk-demo-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845123" comment="java-11-openjdk-devel-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845124" comment="java-11-openjdk-devel-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845125" comment="java-11-openjdk-devel-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845126" comment="java-11-openjdk-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845127" comment="java-11-openjdk-headless-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845128" comment="java-11-openjdk-headless-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845129" comment="java-11-openjdk-headless-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845130" comment="java-11-openjdk-javadoc-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845131" comment="java-11-openjdk-javadoc-zip-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845132" comment="java-11-openjdk-jmods-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845133" comment="java-11-openjdk-jmods-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845134" comment="java-11-openjdk-jmods-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845135" comment="java-11-openjdk-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845136" comment="java-11-openjdk-src-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845137" comment="java-11-openjdk-src-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845138" comment="java-11-openjdk-src-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845139" comment="java-11-openjdk-static-libs-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845140" comment="java-11-openjdk-static-libs-fastdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845141" comment="java-11-openjdk-static-libs-slowdebug-11.0.22.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849165" comment="java-17-openjdk-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849166" comment="java-17-openjdk-demo-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849167" comment="java-17-openjdk-demo-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849168" comment="java-17-openjdk-demo-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849169" comment="java-17-openjdk-devel-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849170" comment="java-17-openjdk-devel-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849171" comment="java-17-openjdk-devel-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849172" comment="java-17-openjdk-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849173" comment="java-17-openjdk-headless-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849174" comment="java-17-openjdk-headless-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849175" comment="java-17-openjdk-headless-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849176" comment="java-17-openjdk-javadoc-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849177" comment="java-17-openjdk-javadoc-zip-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849178" comment="java-17-openjdk-jmods-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849179" comment="java-17-openjdk-jmods-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849180" comment="java-17-openjdk-jmods-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849181" comment="java-17-openjdk-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849182" comment="java-17-openjdk-src-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849183" comment="java-17-openjdk-src-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849184" comment="java-17-openjdk-src-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849185" comment="java-17-openjdk-static-libs-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849186" comment="java-17-openjdk-static-libs-fastdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009849187" comment="java-17-openjdk-static-libs-slowdebug-17.0.10.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819996" comment="java-21-openjdk-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819997" comment="java-21-openjdk-demo-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819998" comment="java-21-openjdk-demo-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819999" comment="java-21-openjdk-demo-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820000" comment="java-21-openjdk-devel-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820001" comment="java-21-openjdk-devel-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820002" comment="java-21-openjdk-devel-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820003" comment="java-21-openjdk-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820004" comment="java-21-openjdk-headless-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820005" comment="java-21-openjdk-headless-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820006" comment="java-21-openjdk-headless-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820007" comment="java-21-openjdk-javadoc-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820008" comment="java-21-openjdk-javadoc-zip-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820009" comment="java-21-openjdk-jmods-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820010" comment="java-21-openjdk-jmods-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820011" comment="java-21-openjdk-jmods-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820012" comment="java-21-openjdk-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820013" comment="java-21-openjdk-src-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820014" comment="java-21-openjdk-src-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820015" comment="java-21-openjdk-src-slowdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820016" comment="java-21-openjdk-static-libs-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820017" comment="java-21-openjdk-static-libs-fastdebug-21.0.2.0.13-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009820018" comment="java-21-openjdk-static-libs-slowdebug-21.0.2.0.13-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20960" ref_url="https://www.suse.com/security/cve/CVE-2024-20960" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20960/">CVE-2024-20960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20960">CVE-2024-20960 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20961" ref_url="https://www.suse.com/security/cve/CVE-2024-20961" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20961/">CVE-2024-20961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20961">CVE-2024-20961 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20962" ref_url="https://www.suse.com/security/cve/CVE-2024-20962" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20962/">CVE-2024-20962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20962">CVE-2024-20962 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20963</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20963" ref_url="https://www.suse.com/security/cve/CVE-2024-20963" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20963/">CVE-2024-20963 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20963">CVE-2024-20963 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20964" ref_url="https://www.suse.com/security/cve/CVE-2024-20964" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20964/">CVE-2024-20964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20964">CVE-2024-20964 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20965" ref_url="https://www.suse.com/security/cve/CVE-2024-20965" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20965/">CVE-2024-20965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20965">CVE-2024-20965 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20966" ref_url="https://www.suse.com/security/cve/CVE-2024-20966" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20966/">CVE-2024-20966 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20966">CVE-2024-20966 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20967" ref_url="https://www.suse.com/security/cve/CVE-2024-20967" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20967/">CVE-2024-20967 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20967">CVE-2024-20967 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20968" ref_url="https://www.suse.com/security/cve/CVE-2024-20968" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20968/">CVE-2024-20968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20968">CVE-2024-20968 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20969" ref_url="https://www.suse.com/security/cve/CVE-2024-20969" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20969/">CVE-2024-20969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20969">CVE-2024-20969 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20970</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20970" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20970" ref_url="https://www.suse.com/security/cve/CVE-2024-20970" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20970/">CVE-2024-20970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20970">CVE-2024-20970 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20971" ref_url="https://www.suse.com/security/cve/CVE-2024-20971" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20971/">CVE-2024-20971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20971">CVE-2024-20971 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20972</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20972" ref_url="https://www.suse.com/security/cve/CVE-2024-20972" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20972/">CVE-2024-20972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20972">CVE-2024-20972 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20973" ref_url="https://www.suse.com/security/cve/CVE-2024-20973" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20973/">CVE-2024-20973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20973">CVE-2024-20973 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20974" ref_url="https://www.suse.com/security/cve/CVE-2024-20974" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20974/">CVE-2024-20974 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20974">CVE-2024-20974 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20976" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20976" ref_url="https://www.suse.com/security/cve/CVE-2024-20976" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20976/">CVE-2024-20976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20976">CVE-2024-20976 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20977" ref_url="https://www.suse.com/security/cve/CVE-2024-20977" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20977/">CVE-2024-20977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20977">CVE-2024-20977 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20978" ref_url="https://www.suse.com/security/cve/CVE-2024-20978" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20978/">CVE-2024-20978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20978">CVE-2024-20978 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20981" ref_url="https://www.suse.com/security/cve/CVE-2024-20981" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20981/">CVE-2024-20981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20981">CVE-2024-20981 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20982" ref_url="https://www.suse.com/security/cve/CVE-2024-20982" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20982/">CVE-2024-20982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20982">CVE-2024-20982 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20983" ref_url="https://www.suse.com/security/cve/CVE-2024-20983" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20983/">CVE-2024-20983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20983">CVE-2024-20983 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20984" ref_url="https://www.suse.com/security/cve/CVE-2024-20984" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20984/">CVE-2024-20984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20984">CVE-2024-20984 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20985" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20985" ref_url="https://www.suse.com/security/cve/CVE-2024-20985" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-05-01"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20985/">CVE-2024-20985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20985">CVE-2024-20985 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202420993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-20993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-20993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-20993" ref_url="https://www.suse.com/security/cve/CVE-2024-20993" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-20993/">CVE-2024-20993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-20993">CVE-2024-20993 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21011" ref_url="https://www.suse.com/security/cve/CVE-2024-21011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-21"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21011/">CVE-2024-21011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21011">CVE-2024-21011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222979">SUSE bug 1222979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858428" comment="java-1.8.0-openjdk-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858429" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859962" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859963" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858430" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858431" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858432" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858433" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858434" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858435" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858436" comment="java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858437" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858438" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858439" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858440" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858441" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858442" comment="java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858443" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858444" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858445" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856130" comment="java-11-openjdk-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856131" comment="java-11-openjdk-demo-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856132" comment="java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856133" comment="java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856134" comment="java-11-openjdk-devel-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856135" comment="java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856136" comment="java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856137" comment="java-11-openjdk-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856138" comment="java-11-openjdk-headless-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856139" comment="java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856140" comment="java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856141" comment="java-11-openjdk-javadoc-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856142" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856143" comment="java-11-openjdk-jmods-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856144" comment="java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856145" comment="java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856146" comment="java-11-openjdk-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856147" comment="java-11-openjdk-src-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856148" comment="java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856149" comment="java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856150" comment="java-11-openjdk-static-libs-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856151" comment="java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856152" comment="java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855576" comment="java-17-openjdk-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855577" comment="java-17-openjdk-demo-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855578" comment="java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855579" comment="java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855580" comment="java-17-openjdk-devel-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855581" comment="java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855582" comment="java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855583" comment="java-17-openjdk-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855584" comment="java-17-openjdk-headless-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855585" comment="java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855586" comment="java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855587" comment="java-17-openjdk-javadoc-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855588" comment="java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855589" comment="java-17-openjdk-jmods-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855590" comment="java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855591" comment="java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855592" comment="java-17-openjdk-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855593" comment="java-17-openjdk-src-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855594" comment="java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855595" comment="java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855596" comment="java-17-openjdk-static-libs-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855597" comment="java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855598" comment="java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855697" comment="java-21-openjdk-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855698" comment="java-21-openjdk-demo-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855699" comment="java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855700" comment="java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855701" comment="java-21-openjdk-devel-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855702" comment="java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855703" comment="java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855704" comment="java-21-openjdk-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855705" comment="java-21-openjdk-headless-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855706" comment="java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855707" comment="java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855708" comment="java-21-openjdk-javadoc-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855709" comment="java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855710" comment="java-21-openjdk-jmods-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855711" comment="java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855712" comment="java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855713" comment="java-21-openjdk-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855714" comment="java-21-openjdk-src-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855715" comment="java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855716" comment="java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855717" comment="java-21-openjdk-static-libs-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855718" comment="java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855719" comment="java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21012" ref_url="https://www.suse.com/security/cve/CVE-2024-21012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-21"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21012/">CVE-2024-21012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21012">CVE-2024-21012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222987">SUSE bug 1222987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856130" comment="java-11-openjdk-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856131" comment="java-11-openjdk-demo-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856132" comment="java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856133" comment="java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856134" comment="java-11-openjdk-devel-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856135" comment="java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856136" comment="java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856137" comment="java-11-openjdk-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856138" comment="java-11-openjdk-headless-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856139" comment="java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856140" comment="java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856141" comment="java-11-openjdk-javadoc-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856142" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856143" comment="java-11-openjdk-jmods-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856144" comment="java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856145" comment="java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856146" comment="java-11-openjdk-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856147" comment="java-11-openjdk-src-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856148" comment="java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856149" comment="java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856150" comment="java-11-openjdk-static-libs-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856151" comment="java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856152" comment="java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855576" comment="java-17-openjdk-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855577" comment="java-17-openjdk-demo-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855578" comment="java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855579" comment="java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855580" comment="java-17-openjdk-devel-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855581" comment="java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855582" comment="java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855583" comment="java-17-openjdk-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855584" comment="java-17-openjdk-headless-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855585" comment="java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855586" comment="java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855587" comment="java-17-openjdk-javadoc-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855588" comment="java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855589" comment="java-17-openjdk-jmods-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855590" comment="java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855591" comment="java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855592" comment="java-17-openjdk-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855593" comment="java-17-openjdk-src-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855594" comment="java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855595" comment="java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855596" comment="java-17-openjdk-static-libs-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855597" comment="java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855598" comment="java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855697" comment="java-21-openjdk-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855698" comment="java-21-openjdk-demo-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855699" comment="java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855700" comment="java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855701" comment="java-21-openjdk-devel-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855702" comment="java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855703" comment="java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855704" comment="java-21-openjdk-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855705" comment="java-21-openjdk-headless-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855706" comment="java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855707" comment="java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855708" comment="java-21-openjdk-javadoc-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855709" comment="java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855710" comment="java-21-openjdk-jmods-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855711" comment="java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855712" comment="java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855713" comment="java-21-openjdk-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855714" comment="java-21-openjdk-src-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855715" comment="java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855716" comment="java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855717" comment="java-21-openjdk-static-libs-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855718" comment="java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855719" comment="java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21049" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21049" ref_url="https://www.suse.com/security/cve/CVE-2024-21049" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21049/">CVE-2024-21049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21049">CVE-2024-21049 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21050" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21050" ref_url="https://www.suse.com/security/cve/CVE-2024-21050" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21050/">CVE-2024-21050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21050">CVE-2024-21050 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21051" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21051" ref_url="https://www.suse.com/security/cve/CVE-2024-21051" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21051/">CVE-2024-21051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21051">CVE-2024-21051 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21052" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21052" ref_url="https://www.suse.com/security/cve/CVE-2024-21052" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21052/">CVE-2024-21052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21052">CVE-2024-21052 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21053" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21053" ref_url="https://www.suse.com/security/cve/CVE-2024-21053" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21053/">CVE-2024-21053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21053">CVE-2024-21053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21055" ref_url="https://www.suse.com/security/cve/CVE-2024-21055" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21055/">CVE-2024-21055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21055">CVE-2024-21055 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21056" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21056" ref_url="https://www.suse.com/security/cve/CVE-2024-21056" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21056/">CVE-2024-21056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21056">CVE-2024-21056 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21057" ref_url="https://www.suse.com/security/cve/CVE-2024-21057" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21057/">CVE-2024-21057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21057">CVE-2024-21057 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21061</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21061" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21061" ref_url="https://www.suse.com/security/cve/CVE-2024-21061" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21061/">CVE-2024-21061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21061">CVE-2024-21061 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21068" ref_url="https://www.suse.com/security/cve/CVE-2024-21068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-21"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21068/">CVE-2024-21068 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21068">CVE-2024-21068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222983">SUSE bug 1222983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858428" comment="java-1.8.0-openjdk-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858429" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859962" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859963" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858430" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858431" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858432" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858433" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858434" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858435" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858436" comment="java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858437" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858438" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858439" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858440" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858441" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858442" comment="java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858443" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858444" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858445" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856130" comment="java-11-openjdk-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856131" comment="java-11-openjdk-demo-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856132" comment="java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856133" comment="java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856134" comment="java-11-openjdk-devel-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856135" comment="java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856136" comment="java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856137" comment="java-11-openjdk-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856138" comment="java-11-openjdk-headless-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856139" comment="java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856140" comment="java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856141" comment="java-11-openjdk-javadoc-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856142" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856143" comment="java-11-openjdk-jmods-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856144" comment="java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856145" comment="java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856146" comment="java-11-openjdk-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856147" comment="java-11-openjdk-src-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856148" comment="java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856149" comment="java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856150" comment="java-11-openjdk-static-libs-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856151" comment="java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856152" comment="java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855576" comment="java-17-openjdk-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855577" comment="java-17-openjdk-demo-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855578" comment="java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855579" comment="java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855580" comment="java-17-openjdk-devel-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855581" comment="java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855582" comment="java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855583" comment="java-17-openjdk-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855584" comment="java-17-openjdk-headless-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855585" comment="java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855586" comment="java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855587" comment="java-17-openjdk-javadoc-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855588" comment="java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855589" comment="java-17-openjdk-jmods-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855590" comment="java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855591" comment="java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855592" comment="java-17-openjdk-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855593" comment="java-17-openjdk-src-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855594" comment="java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855595" comment="java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855596" comment="java-17-openjdk-static-libs-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855597" comment="java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855598" comment="java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855697" comment="java-21-openjdk-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855698" comment="java-21-openjdk-demo-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855699" comment="java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855700" comment="java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855701" comment="java-21-openjdk-devel-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855702" comment="java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855703" comment="java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855704" comment="java-21-openjdk-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855705" comment="java-21-openjdk-headless-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855706" comment="java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855707" comment="java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855708" comment="java-21-openjdk-javadoc-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855709" comment="java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855710" comment="java-21-openjdk-jmods-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855711" comment="java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855712" comment="java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855713" comment="java-21-openjdk-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855714" comment="java-21-openjdk-src-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855715" comment="java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855716" comment="java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855717" comment="java-21-openjdk-static-libs-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855718" comment="java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855719" comment="java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21085" ref_url="https://www.suse.com/security/cve/CVE-2024-21085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21085/">CVE-2024-21085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21085">CVE-2024-21085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222984">SUSE bug 1222984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858428" comment="java-1.8.0-openjdk-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858429" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859962" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859963" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858430" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858431" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858432" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858433" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858434" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858435" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858436" comment="java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858437" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858438" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858439" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858440" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858441" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858442" comment="java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858443" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858444" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858445" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856130" comment="java-11-openjdk-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856131" comment="java-11-openjdk-demo-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856132" comment="java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856133" comment="java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856134" comment="java-11-openjdk-devel-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856135" comment="java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856136" comment="java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856137" comment="java-11-openjdk-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856138" comment="java-11-openjdk-headless-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856139" comment="java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856140" comment="java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856141" comment="java-11-openjdk-javadoc-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856142" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856143" comment="java-11-openjdk-jmods-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856144" comment="java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856145" comment="java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856146" comment="java-11-openjdk-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856147" comment="java-11-openjdk-src-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856148" comment="java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856149" comment="java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856150" comment="java-11-openjdk-static-libs-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856151" comment="java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856152" comment="java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21094" ref_url="https://www.suse.com/security/cve/CVE-2024-21094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1498-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1499-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1845-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019263.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-21"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21094/">CVE-2024-21094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21094">CVE-2024-21094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222986">SUSE bug 1222986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858428" comment="java-1.8.0-openjdk-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858429" comment="java-1.8.0-openjdk-accessibility-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859962" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009859963" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.412.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858430" comment="java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858431" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858432" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858433" comment="java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858434" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858435" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858436" comment="java-1.8.0-openjdk-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858437" comment="java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858438" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858439" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858440" comment="java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858441" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858442" comment="java-1.8.0-openjdk-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858443" comment="java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858444" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858445" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.412.b08-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856130" comment="java-11-openjdk-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856131" comment="java-11-openjdk-demo-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856132" comment="java-11-openjdk-demo-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856133" comment="java-11-openjdk-demo-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856134" comment="java-11-openjdk-devel-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856135" comment="java-11-openjdk-devel-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856136" comment="java-11-openjdk-devel-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856137" comment="java-11-openjdk-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856138" comment="java-11-openjdk-headless-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856139" comment="java-11-openjdk-headless-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856140" comment="java-11-openjdk-headless-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856141" comment="java-11-openjdk-javadoc-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856142" comment="java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856143" comment="java-11-openjdk-jmods-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856144" comment="java-11-openjdk-jmods-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856145" comment="java-11-openjdk-jmods-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856146" comment="java-11-openjdk-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856147" comment="java-11-openjdk-src-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856148" comment="java-11-openjdk-src-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856149" comment="java-11-openjdk-src-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856150" comment="java-11-openjdk-static-libs-11.0.23.0.9-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856151" comment="java-11-openjdk-static-libs-fastdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856152" comment="java-11-openjdk-static-libs-slowdebug-11.0.23.0.9-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855576" comment="java-17-openjdk-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855577" comment="java-17-openjdk-demo-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855578" comment="java-17-openjdk-demo-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855579" comment="java-17-openjdk-demo-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855580" comment="java-17-openjdk-devel-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855581" comment="java-17-openjdk-devel-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855582" comment="java-17-openjdk-devel-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855583" comment="java-17-openjdk-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855584" comment="java-17-openjdk-headless-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855585" comment="java-17-openjdk-headless-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855586" comment="java-17-openjdk-headless-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855587" comment="java-17-openjdk-javadoc-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855588" comment="java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855589" comment="java-17-openjdk-jmods-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855590" comment="java-17-openjdk-jmods-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855591" comment="java-17-openjdk-jmods-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855592" comment="java-17-openjdk-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855593" comment="java-17-openjdk-src-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855594" comment="java-17-openjdk-src-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855595" comment="java-17-openjdk-src-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855596" comment="java-17-openjdk-static-libs-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855597" comment="java-17-openjdk-static-libs-fastdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855598" comment="java-17-openjdk-static-libs-slowdebug-17.0.11.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855697" comment="java-21-openjdk-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855698" comment="java-21-openjdk-demo-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855699" comment="java-21-openjdk-demo-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855700" comment="java-21-openjdk-demo-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855701" comment="java-21-openjdk-devel-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855702" comment="java-21-openjdk-devel-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855703" comment="java-21-openjdk-devel-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855704" comment="java-21-openjdk-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855705" comment="java-21-openjdk-headless-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855706" comment="java-21-openjdk-headless-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855707" comment="java-21-openjdk-headless-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855708" comment="java-21-openjdk-javadoc-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855709" comment="java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855710" comment="java-21-openjdk-jmods-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855711" comment="java-21-openjdk-jmods-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855712" comment="java-21-openjdk-jmods-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855713" comment="java-21-openjdk-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855714" comment="java-21-openjdk-src-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855715" comment="java-21-openjdk-src-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855716" comment="java-21-openjdk-src-slowdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855717" comment="java-21-openjdk-static-libs-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855718" comment="java-21-openjdk-static-libs-fastdebug-21.0.3.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009855719" comment="java-21-openjdk-static-libs-slowdebug-21.0.3.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21096" ref_url="https://www.suse.com/security/cve/CVE-2024-21096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0737" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0739" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002085.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0912" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000829.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036679.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-10-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-21096/">CVE-2024-21096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21096">CVE-2024-21096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225983">SUSE bug 1225983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009962391" comment="galera-26.4.20-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962392" comment="mariadb-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962393" comment="mariadb-backup-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962394" comment="mariadb-common-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962395" comment="mariadb-devel-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962396" comment="mariadb-embedded-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962397" comment="mariadb-embedded-devel-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962398" comment="mariadb-errmsg-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962399" comment="mariadb-gssapi-server-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962400" comment="mariadb-oqgraph-engine-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962401" comment="mariadb-pam-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962402" comment="mariadb-server-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962403" comment="mariadb-server-galera-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962404" comment="mariadb-server-utils-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962405" comment="mariadb-test-10.11.10-1.module+el9.5.0+22578+dc54e53f is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21131" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21131" ref_url="https://www.suse.com/security/cve/CVE-2024-21131" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21131/">CVE-2024-21131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21131">CVE-2024-21131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228046">SUSE bug 1228046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876076" comment="java-1.8.0-openjdk-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876077" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876078" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876079" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876080" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876081" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876082" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876083" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876084" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876085" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876086" comment="java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876087" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876088" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876089" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876090" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876091" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876092" comment="java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876093" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876094" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876095" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876330" comment="java-11-openjdk-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876331" comment="java-11-openjdk-demo-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876355" comment="java-11-openjdk-demo-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876356" comment="java-11-openjdk-demo-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876334" comment="java-11-openjdk-devel-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876358" comment="java-11-openjdk-devel-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876359" comment="java-11-openjdk-devel-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876360" comment="java-11-openjdk-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876338" comment="java-11-openjdk-headless-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876362" comment="java-11-openjdk-headless-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876363" comment="java-11-openjdk-headless-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876341" comment="java-11-openjdk-javadoc-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876342" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876343" comment="java-11-openjdk-jmods-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876367" comment="java-11-openjdk-jmods-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876368" comment="java-11-openjdk-jmods-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876369" comment="java-11-openjdk-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876347" comment="java-11-openjdk-src-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876371" comment="java-11-openjdk-src-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876372" comment="java-11-openjdk-src-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876350" comment="java-11-openjdk-static-libs-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876374" comment="java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876375" comment="java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876096" comment="java-17-openjdk-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876097" comment="java-17-openjdk-demo-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876098" comment="java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876099" comment="java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876100" comment="java-17-openjdk-devel-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876101" comment="java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876102" comment="java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876103" comment="java-17-openjdk-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876104" comment="java-17-openjdk-headless-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876105" comment="java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876106" comment="java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876107" comment="java-17-openjdk-javadoc-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876108" comment="java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876109" comment="java-17-openjdk-jmods-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876110" comment="java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876111" comment="java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876112" comment="java-17-openjdk-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876113" comment="java-17-openjdk-src-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876114" comment="java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876115" comment="java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876116" comment="java-17-openjdk-static-libs-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876117" comment="java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876118" comment="java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874669" comment="java-21-openjdk-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874670" comment="java-21-openjdk-demo-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874671" comment="java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874672" comment="java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874673" comment="java-21-openjdk-devel-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874674" comment="java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874675" comment="java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874676" comment="java-21-openjdk-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874677" comment="java-21-openjdk-headless-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874678" comment="java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874679" comment="java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874680" comment="java-21-openjdk-javadoc-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874681" comment="java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874682" comment="java-21-openjdk-jmods-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874683" comment="java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874684" comment="java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874685" comment="java-21-openjdk-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874686" comment="java-21-openjdk-src-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874687" comment="java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874688" comment="java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874689" comment="java-21-openjdk-static-libs-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874690" comment="java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874691" comment="java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21137</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21137" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21137" ref_url="https://www.suse.com/security/cve/CVE-2024-21137" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21137/">CVE-2024-21137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21137">CVE-2024-21137 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21138</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21138" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21138" ref_url="https://www.suse.com/security/cve/CVE-2024-21138" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-11-22"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21138/">CVE-2024-21138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21138">CVE-2024-21138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228047">SUSE bug 1228047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876076" comment="java-1.8.0-openjdk-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876077" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876078" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876079" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876080" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876081" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876082" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876083" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876084" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876085" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876086" comment="java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876087" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876088" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876089" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876090" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876091" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876092" comment="java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876093" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876094" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876095" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876330" comment="java-11-openjdk-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876331" comment="java-11-openjdk-demo-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876355" comment="java-11-openjdk-demo-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876356" comment="java-11-openjdk-demo-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876334" comment="java-11-openjdk-devel-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876358" comment="java-11-openjdk-devel-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876359" comment="java-11-openjdk-devel-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876360" comment="java-11-openjdk-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876338" comment="java-11-openjdk-headless-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876362" comment="java-11-openjdk-headless-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876363" comment="java-11-openjdk-headless-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876341" comment="java-11-openjdk-javadoc-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876342" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876343" comment="java-11-openjdk-jmods-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876367" comment="java-11-openjdk-jmods-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876368" comment="java-11-openjdk-jmods-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876369" comment="java-11-openjdk-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876347" comment="java-11-openjdk-src-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876371" comment="java-11-openjdk-src-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876372" comment="java-11-openjdk-src-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876350" comment="java-11-openjdk-static-libs-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876374" comment="java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876375" comment="java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876096" comment="java-17-openjdk-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876097" comment="java-17-openjdk-demo-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876098" comment="java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876099" comment="java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876100" comment="java-17-openjdk-devel-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876101" comment="java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876102" comment="java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876103" comment="java-17-openjdk-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876104" comment="java-17-openjdk-headless-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876105" comment="java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876106" comment="java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876107" comment="java-17-openjdk-javadoc-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876108" comment="java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876109" comment="java-17-openjdk-jmods-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876110" comment="java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876111" comment="java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876112" comment="java-17-openjdk-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876113" comment="java-17-openjdk-src-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876114" comment="java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876115" comment="java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876116" comment="java-17-openjdk-static-libs-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876117" comment="java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876118" comment="java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874669" comment="java-21-openjdk-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874670" comment="java-21-openjdk-demo-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874671" comment="java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874672" comment="java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874673" comment="java-21-openjdk-devel-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874674" comment="java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874675" comment="java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874676" comment="java-21-openjdk-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874677" comment="java-21-openjdk-headless-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874678" comment="java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874679" comment="java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874680" comment="java-21-openjdk-javadoc-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874681" comment="java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874682" comment="java-21-openjdk-jmods-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874683" comment="java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874684" comment="java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874685" comment="java-21-openjdk-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874686" comment="java-21-openjdk-src-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874687" comment="java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874688" comment="java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874689" comment="java-21-openjdk-static-libs-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874690" comment="java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874691" comment="java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21140</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21140" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21140" ref_url="https://www.suse.com/security/cve/CVE-2024-21140" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21140/">CVE-2024-21140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21140">CVE-2024-21140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228048">SUSE bug 1228048</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876076" comment="java-1.8.0-openjdk-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876077" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876078" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876079" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876080" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876081" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876082" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876083" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876084" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876085" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876086" comment="java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876087" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876088" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876089" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876090" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876091" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876092" comment="java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876093" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876094" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876095" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876330" comment="java-11-openjdk-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876331" comment="java-11-openjdk-demo-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876355" comment="java-11-openjdk-demo-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876356" comment="java-11-openjdk-demo-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876334" comment="java-11-openjdk-devel-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876358" comment="java-11-openjdk-devel-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876359" comment="java-11-openjdk-devel-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876360" comment="java-11-openjdk-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876338" comment="java-11-openjdk-headless-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876362" comment="java-11-openjdk-headless-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876363" comment="java-11-openjdk-headless-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876341" comment="java-11-openjdk-javadoc-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876342" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876343" comment="java-11-openjdk-jmods-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876367" comment="java-11-openjdk-jmods-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876368" comment="java-11-openjdk-jmods-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876369" comment="java-11-openjdk-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876347" comment="java-11-openjdk-src-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876371" comment="java-11-openjdk-src-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876372" comment="java-11-openjdk-src-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876350" comment="java-11-openjdk-static-libs-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876374" comment="java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876375" comment="java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876096" comment="java-17-openjdk-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876097" comment="java-17-openjdk-demo-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876098" comment="java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876099" comment="java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876100" comment="java-17-openjdk-devel-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876101" comment="java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876102" comment="java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876103" comment="java-17-openjdk-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876104" comment="java-17-openjdk-headless-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876105" comment="java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876106" comment="java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876107" comment="java-17-openjdk-javadoc-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876108" comment="java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876109" comment="java-17-openjdk-jmods-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876110" comment="java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876111" comment="java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876112" comment="java-17-openjdk-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876113" comment="java-17-openjdk-src-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876114" comment="java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876115" comment="java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876116" comment="java-17-openjdk-static-libs-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876117" comment="java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876118" comment="java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874669" comment="java-21-openjdk-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874670" comment="java-21-openjdk-demo-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874671" comment="java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874672" comment="java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874673" comment="java-21-openjdk-devel-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874674" comment="java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874675" comment="java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874676" comment="java-21-openjdk-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874677" comment="java-21-openjdk-headless-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874678" comment="java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874679" comment="java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874680" comment="java-21-openjdk-javadoc-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874681" comment="java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874682" comment="java-21-openjdk-jmods-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874683" comment="java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874684" comment="java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874685" comment="java-21-openjdk-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874686" comment="java-21-openjdk-src-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874687" comment="java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874688" comment="java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874689" comment="java-21-openjdk-static-libs-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874690" comment="java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874691" comment="java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21144" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21144" ref_url="https://www.suse.com/security/cve/CVE-2024-21144" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2025-11-22"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-21144/">CVE-2024-21144 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21144">CVE-2024-21144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228050">SUSE bug 1228050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876076" comment="java-1.8.0-openjdk-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876077" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876078" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876079" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876080" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876081" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876082" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876083" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876084" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876085" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876086" comment="java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876087" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876088" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876089" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876090" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876091" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876092" comment="java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876093" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876094" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876095" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876330" comment="java-11-openjdk-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876331" comment="java-11-openjdk-demo-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876355" comment="java-11-openjdk-demo-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876356" comment="java-11-openjdk-demo-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876334" comment="java-11-openjdk-devel-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876358" comment="java-11-openjdk-devel-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876359" comment="java-11-openjdk-devel-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876360" comment="java-11-openjdk-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876338" comment="java-11-openjdk-headless-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876362" comment="java-11-openjdk-headless-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876363" comment="java-11-openjdk-headless-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876341" comment="java-11-openjdk-javadoc-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876342" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876343" comment="java-11-openjdk-jmods-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876367" comment="java-11-openjdk-jmods-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876368" comment="java-11-openjdk-jmods-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876369" comment="java-11-openjdk-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876347" comment="java-11-openjdk-src-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876371" comment="java-11-openjdk-src-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876372" comment="java-11-openjdk-src-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876350" comment="java-11-openjdk-static-libs-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876374" comment="java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876375" comment="java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-3.el8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21145</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21145" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21145" ref_url="https://www.suse.com/security/cve/CVE-2024-21145" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-21145/">CVE-2024-21145 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21145">CVE-2024-21145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228051">SUSE bug 1228051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876076" comment="java-1.8.0-openjdk-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876077" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876078" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876079" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876080" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876081" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876082" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876083" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876084" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876085" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876086" comment="java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876087" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876088" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876089" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876090" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876091" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876092" comment="java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876093" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876094" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876095" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876330" comment="java-11-openjdk-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876331" comment="java-11-openjdk-demo-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876355" comment="java-11-openjdk-demo-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876356" comment="java-11-openjdk-demo-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876334" comment="java-11-openjdk-devel-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876358" comment="java-11-openjdk-devel-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876359" comment="java-11-openjdk-devel-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876360" comment="java-11-openjdk-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876338" comment="java-11-openjdk-headless-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876362" comment="java-11-openjdk-headless-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876363" comment="java-11-openjdk-headless-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876341" comment="java-11-openjdk-javadoc-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876342" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876343" comment="java-11-openjdk-jmods-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876367" comment="java-11-openjdk-jmods-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876368" comment="java-11-openjdk-jmods-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876369" comment="java-11-openjdk-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876347" comment="java-11-openjdk-src-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876371" comment="java-11-openjdk-src-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876372" comment="java-11-openjdk-src-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876350" comment="java-11-openjdk-static-libs-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876374" comment="java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876375" comment="java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876096" comment="java-17-openjdk-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876097" comment="java-17-openjdk-demo-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876098" comment="java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876099" comment="java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876100" comment="java-17-openjdk-devel-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876101" comment="java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876102" comment="java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876103" comment="java-17-openjdk-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876104" comment="java-17-openjdk-headless-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876105" comment="java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876106" comment="java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876107" comment="java-17-openjdk-javadoc-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876108" comment="java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876109" comment="java-17-openjdk-jmods-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876110" comment="java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876111" comment="java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876112" comment="java-17-openjdk-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876113" comment="java-17-openjdk-src-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876114" comment="java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876115" comment="java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876116" comment="java-17-openjdk-static-libs-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876117" comment="java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876118" comment="java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874669" comment="java-21-openjdk-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874670" comment="java-21-openjdk-demo-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874671" comment="java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874672" comment="java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874673" comment="java-21-openjdk-devel-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874674" comment="java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874675" comment="java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874676" comment="java-21-openjdk-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874677" comment="java-21-openjdk-headless-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874678" comment="java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874679" comment="java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874680" comment="java-21-openjdk-javadoc-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874681" comment="java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874682" comment="java-21-openjdk-jmods-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874683" comment="java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874684" comment="java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874685" comment="java-21-openjdk-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874686" comment="java-21-openjdk-src-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874687" comment="java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874688" comment="java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874689" comment="java-21-openjdk-static-libs-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874690" comment="java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874691" comment="java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21147</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21147" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21147" ref_url="https://www.suse.com/security/cve/CVE-2024-21147" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4564" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036834.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-21147/">CVE-2024-21147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21147">CVE-2024-21147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228052">SUSE bug 1228052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876076" comment="java-1.8.0-openjdk-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876077" comment="java-1.8.0-openjdk-accessibility-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876078" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876079" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.422.b05-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876080" comment="java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876081" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876082" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876083" comment="java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876084" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876085" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876086" comment="java-1.8.0-openjdk-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876087" comment="java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876088" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876089" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876090" comment="java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876091" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876092" comment="java-1.8.0-openjdk-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876093" comment="java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876094" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876095" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.422.b05-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876330" comment="java-11-openjdk-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876331" comment="java-11-openjdk-demo-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876355" comment="java-11-openjdk-demo-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876356" comment="java-11-openjdk-demo-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876334" comment="java-11-openjdk-devel-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876358" comment="java-11-openjdk-devel-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876359" comment="java-11-openjdk-devel-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876360" comment="java-11-openjdk-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876338" comment="java-11-openjdk-headless-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876362" comment="java-11-openjdk-headless-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876363" comment="java-11-openjdk-headless-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876341" comment="java-11-openjdk-javadoc-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876342" comment="java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876343" comment="java-11-openjdk-jmods-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876367" comment="java-11-openjdk-jmods-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876368" comment="java-11-openjdk-jmods-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876369" comment="java-11-openjdk-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876347" comment="java-11-openjdk-src-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876371" comment="java-11-openjdk-src-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876372" comment="java-11-openjdk-src-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876350" comment="java-11-openjdk-static-libs-11.0.24.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876374" comment="java-11-openjdk-static-libs-fastdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876375" comment="java-11-openjdk-static-libs-slowdebug-11.0.24.0.8-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876096" comment="java-17-openjdk-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876097" comment="java-17-openjdk-demo-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876098" comment="java-17-openjdk-demo-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876099" comment="java-17-openjdk-demo-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876100" comment="java-17-openjdk-devel-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876101" comment="java-17-openjdk-devel-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876102" comment="java-17-openjdk-devel-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876103" comment="java-17-openjdk-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876104" comment="java-17-openjdk-headless-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876105" comment="java-17-openjdk-headless-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876106" comment="java-17-openjdk-headless-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876107" comment="java-17-openjdk-javadoc-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876108" comment="java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876109" comment="java-17-openjdk-jmods-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876110" comment="java-17-openjdk-jmods-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876111" comment="java-17-openjdk-jmods-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876112" comment="java-17-openjdk-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876113" comment="java-17-openjdk-src-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876114" comment="java-17-openjdk-src-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876115" comment="java-17-openjdk-src-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876116" comment="java-17-openjdk-static-libs-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876117" comment="java-17-openjdk-static-libs-fastdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876118" comment="java-17-openjdk-static-libs-slowdebug-17.0.12.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874669" comment="java-21-openjdk-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874670" comment="java-21-openjdk-demo-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874671" comment="java-21-openjdk-demo-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874672" comment="java-21-openjdk-demo-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874673" comment="java-21-openjdk-devel-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874674" comment="java-21-openjdk-devel-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874675" comment="java-21-openjdk-devel-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874676" comment="java-21-openjdk-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874677" comment="java-21-openjdk-headless-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874678" comment="java-21-openjdk-headless-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874679" comment="java-21-openjdk-headless-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874680" comment="java-21-openjdk-javadoc-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874681" comment="java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874682" comment="java-21-openjdk-jmods-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874683" comment="java-21-openjdk-jmods-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874684" comment="java-21-openjdk-jmods-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874685" comment="java-21-openjdk-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874686" comment="java-21-openjdk-src-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874687" comment="java-21-openjdk-src-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874688" comment="java-21-openjdk-src-slowdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874689" comment="java-21-openjdk-static-libs-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874690" comment="java-21-openjdk-static-libs-fastdebug-21.0.4.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874691" comment="java-21-openjdk-static-libs-slowdebug-21.0.4.0.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21193" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21193" ref_url="https://www.suse.com/security/cve/CVE-2024-21193" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21193/">CVE-2024-21193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21193">CVE-2024-21193 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21194" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21194" ref_url="https://www.suse.com/security/cve/CVE-2024-21194" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21194/">CVE-2024-21194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21194">CVE-2024-21194 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21196</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21196" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21196" ref_url="https://www.suse.com/security/cve/CVE-2024-21196" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21196/">CVE-2024-21196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21196">CVE-2024-21196 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21197" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21197" ref_url="https://www.suse.com/security/cve/CVE-2024-21197" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21197/">CVE-2024-21197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21197">CVE-2024-21197 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21198</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21198" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21198" ref_url="https://www.suse.com/security/cve/CVE-2024-21198" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21198/">CVE-2024-21198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21198">CVE-2024-21198 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21199" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21199" ref_url="https://www.suse.com/security/cve/CVE-2024-21199" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21199/">CVE-2024-21199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21199">CVE-2024-21199 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21200" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21200" ref_url="https://www.suse.com/security/cve/CVE-2024-21200" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21200/">CVE-2024-21200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21200">CVE-2024-21200 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009858487" comment="mysql-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858488" comment="mysql-common-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858489" comment="mysql-devel-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858490" comment="mysql-errmsg-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858491" comment="mysql-libs-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858492" comment="mysql-server-8.0.36-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009858493" comment="mysql-test-8.0.36-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21201" ref_url="https://www.suse.com/security/cve/CVE-2024-21201" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21201/">CVE-2024-21201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21201">CVE-2024-21201 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21203" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21203" ref_url="https://www.suse.com/security/cve/CVE-2024-21203" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21203/">CVE-2024-21203 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21203">CVE-2024-21203 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21208" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21208" ref_url="https://www.suse.com/security/cve/CVE-2024-21208" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8117" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8124" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8127" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDGJD2OULS4GVLFGY4DZH6L7TX3XS7RK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14449-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYPS4PNCRNNFM3OYJLTXOMYVAPX5WDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14465-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKGLVFB244SXCHDTKBD64C7SBDSC7V7W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7KZSNPFAS32QHPRWSJGI2D4QTO3KWTH/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21208/">CVE-2024-21208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21208">CVE-2024-21208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231702">SUSE bug 1231702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947853" comment="java-1.8.0-openjdk-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947854" comment="java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947855" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947856" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947857" comment="java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947858" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947859" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947860" comment="java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947861" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947862" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947863" comment="java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947864" comment="java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947865" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947866" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947867" comment="java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947868" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947869" comment="java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947870" comment="java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947871" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947872" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947743" comment="java-11-openjdk-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947744" comment="java-11-openjdk-demo-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947745" comment="java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947746" comment="java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947747" comment="java-11-openjdk-devel-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947748" comment="java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947749" comment="java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947750" comment="java-11-openjdk-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947751" comment="java-11-openjdk-headless-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947752" comment="java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947753" comment="java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947754" comment="java-11-openjdk-javadoc-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947755" comment="java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947756" comment="java-11-openjdk-jmods-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947757" comment="java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947758" comment="java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947759" comment="java-11-openjdk-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947760" comment="java-11-openjdk-src-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947761" comment="java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947762" comment="java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947763" comment="java-11-openjdk-static-libs-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947764" comment="java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947765" comment="java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947873" comment="java-17-openjdk-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947874" comment="java-17-openjdk-demo-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947875" comment="java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947876" comment="java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947877" comment="java-17-openjdk-devel-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947878" comment="java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947879" comment="java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947880" comment="java-17-openjdk-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947881" comment="java-17-openjdk-headless-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947882" comment="java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947883" comment="java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947884" comment="java-17-openjdk-javadoc-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947885" comment="java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947886" comment="java-17-openjdk-jmods-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947887" comment="java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947888" comment="java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947889" comment="java-17-openjdk-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947890" comment="java-17-openjdk-src-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947891" comment="java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947892" comment="java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947893" comment="java-17-openjdk-static-libs-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947894" comment="java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947895" comment="java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948242" comment="java-21-openjdk-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948243" comment="java-21-openjdk-demo-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948244" comment="java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948245" comment="java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948246" comment="java-21-openjdk-devel-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948247" comment="java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948248" comment="java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948249" comment="java-21-openjdk-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948250" comment="java-21-openjdk-headless-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948251" comment="java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948252" comment="java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948253" comment="java-21-openjdk-javadoc-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948254" comment="java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948255" comment="java-21-openjdk-jmods-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948256" comment="java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948257" comment="java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948258" comment="java-21-openjdk-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948259" comment="java-21-openjdk-src-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948260" comment="java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948261" comment="java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948262" comment="java-21-openjdk-static-libs-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948263" comment="java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948264" comment="java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21210</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21210" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21210" ref_url="https://www.suse.com/security/cve/CVE-2024-21210" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8117" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8124" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8127" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDGJD2OULS4GVLFGY4DZH6L7TX3XS7RK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14449-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYPS4PNCRNNFM3OYJLTXOMYVAPX5WDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14465-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKGLVFB244SXCHDTKBD64C7SBDSC7V7W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2025-08-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21210/">CVE-2024-21210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21210">CVE-2024-21210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231711">SUSE bug 1231711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947853" comment="java-1.8.0-openjdk-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947854" comment="java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947855" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947856" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947857" comment="java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947858" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947859" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947860" comment="java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947861" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947862" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947863" comment="java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947864" comment="java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947865" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947866" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947867" comment="java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947868" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947869" comment="java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947870" comment="java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947871" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947872" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947743" comment="java-11-openjdk-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947744" comment="java-11-openjdk-demo-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947745" comment="java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947746" comment="java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947747" comment="java-11-openjdk-devel-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947748" comment="java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947749" comment="java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947750" comment="java-11-openjdk-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947751" comment="java-11-openjdk-headless-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947752" comment="java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947753" comment="java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947754" comment="java-11-openjdk-javadoc-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947755" comment="java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947756" comment="java-11-openjdk-jmods-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947757" comment="java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947758" comment="java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947759" comment="java-11-openjdk-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947760" comment="java-11-openjdk-src-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947761" comment="java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947762" comment="java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947763" comment="java-11-openjdk-static-libs-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947764" comment="java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947765" comment="java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947873" comment="java-17-openjdk-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947874" comment="java-17-openjdk-demo-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947875" comment="java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947876" comment="java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947877" comment="java-17-openjdk-devel-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947878" comment="java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947879" comment="java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947880" comment="java-17-openjdk-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947881" comment="java-17-openjdk-headless-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947882" comment="java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947883" comment="java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947884" comment="java-17-openjdk-javadoc-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947885" comment="java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947886" comment="java-17-openjdk-jmods-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947887" comment="java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947888" comment="java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947889" comment="java-17-openjdk-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947890" comment="java-17-openjdk-src-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947891" comment="java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947892" comment="java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947893" comment="java-17-openjdk-static-libs-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947894" comment="java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947895" comment="java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948242" comment="java-21-openjdk-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948243" comment="java-21-openjdk-demo-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948244" comment="java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948245" comment="java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948246" comment="java-21-openjdk-devel-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948247" comment="java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948248" comment="java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948249" comment="java-21-openjdk-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948250" comment="java-21-openjdk-headless-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948251" comment="java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948252" comment="java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948253" comment="java-21-openjdk-javadoc-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948254" comment="java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948255" comment="java-21-openjdk-jmods-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948256" comment="java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948257" comment="java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948258" comment="java-21-openjdk-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948259" comment="java-21-openjdk-src-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948260" comment="java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948261" comment="java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948262" comment="java-21-openjdk-static-libs-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948263" comment="java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948264" comment="java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21212" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21212" ref_url="https://www.suse.com/security/cve/CVE-2024-21212" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21212/">CVE-2024-21212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21212">CVE-2024-21212 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21213" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21213" ref_url="https://www.suse.com/security/cve/CVE-2024-21213" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21213/">CVE-2024-21213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21213">CVE-2024-21213 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21217" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21217" ref_url="https://www.suse.com/security/cve/CVE-2024-21217" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8117" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8124" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8127" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDGJD2OULS4GVLFGY4DZH6L7TX3XS7RK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14449-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYPS4PNCRNNFM3OYJLTXOMYVAPX5WDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14465-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKGLVFB244SXCHDTKBD64C7SBDSC7V7W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7KZSNPFAS32QHPRWSJGI2D4QTO3KWTH/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21217/">CVE-2024-21217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21217">CVE-2024-21217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231716">SUSE bug 1231716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947853" comment="java-1.8.0-openjdk-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947854" comment="java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947855" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947856" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947857" comment="java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947858" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947859" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947860" comment="java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947861" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947862" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947863" comment="java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947864" comment="java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947865" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947866" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947867" comment="java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947868" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947869" comment="java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947870" comment="java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947871" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947872" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947743" comment="java-11-openjdk-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947744" comment="java-11-openjdk-demo-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947745" comment="java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947746" comment="java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947747" comment="java-11-openjdk-devel-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947748" comment="java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947749" comment="java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947750" comment="java-11-openjdk-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947751" comment="java-11-openjdk-headless-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947752" comment="java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947753" comment="java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947754" comment="java-11-openjdk-javadoc-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947755" comment="java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947756" comment="java-11-openjdk-jmods-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947757" comment="java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947758" comment="java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947759" comment="java-11-openjdk-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947760" comment="java-11-openjdk-src-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947761" comment="java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947762" comment="java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947763" comment="java-11-openjdk-static-libs-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947764" comment="java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947765" comment="java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947873" comment="java-17-openjdk-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947874" comment="java-17-openjdk-demo-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947875" comment="java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947876" comment="java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947877" comment="java-17-openjdk-devel-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947878" comment="java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947879" comment="java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947880" comment="java-17-openjdk-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947881" comment="java-17-openjdk-headless-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947882" comment="java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947883" comment="java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947884" comment="java-17-openjdk-javadoc-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947885" comment="java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947886" comment="java-17-openjdk-jmods-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947887" comment="java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947888" comment="java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947889" comment="java-17-openjdk-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947890" comment="java-17-openjdk-src-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947891" comment="java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947892" comment="java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947893" comment="java-17-openjdk-static-libs-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947894" comment="java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947895" comment="java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948242" comment="java-21-openjdk-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948243" comment="java-21-openjdk-demo-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948244" comment="java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948245" comment="java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948246" comment="java-21-openjdk-devel-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948247" comment="java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948248" comment="java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948249" comment="java-21-openjdk-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948250" comment="java-21-openjdk-headless-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948251" comment="java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948252" comment="java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948253" comment="java-21-openjdk-javadoc-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948254" comment="java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948255" comment="java-21-openjdk-jmods-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948256" comment="java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948257" comment="java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948258" comment="java-21-openjdk-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948259" comment="java-21-openjdk-src-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948260" comment="java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948261" comment="java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948262" comment="java-21-openjdk-static-libs-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948263" comment="java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948264" comment="java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21218</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21218" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21218" ref_url="https://www.suse.com/security/cve/CVE-2024-21218" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21218/">CVE-2024-21218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21218">CVE-2024-21218 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21219</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21219" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21219" ref_url="https://www.suse.com/security/cve/CVE-2024-21219" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21219/">CVE-2024-21219 at SUSE</cve>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21219">CVE-2024-21219 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21230" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21230" ref_url="https://www.suse.com/security/cve/CVE-2024-21230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21230/">CVE-2024-21230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21230">CVE-2024-21230 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21231" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21231" ref_url="https://www.suse.com/security/cve/CVE-2024-21231" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21231/">CVE-2024-21231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21231">CVE-2024-21231 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21235" ref_url="https://www.suse.com/security/cve/CVE-2024-21235" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8117" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8124" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8127" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020317.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14448-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KDGJD2OULS4GVLFGY4DZH6L7TX3XS7RK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14449-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CYPS4PNCRNNFM3OYJLTXOMYVAPX5WDWV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14465-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKGLVFB244SXCHDTKBD64C7SBDSC7V7W/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-21235/">CVE-2024-21235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21235">CVE-2024-21235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231719">SUSE bug 1231719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947853" comment="java-1.8.0-openjdk-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947854" comment="java-1.8.0-openjdk-accessibility-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947855" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947856" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.432.b06-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947857" comment="java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947858" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947859" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947860" comment="java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947861" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947862" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947863" comment="java-1.8.0-openjdk-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947864" comment="java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947865" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947866" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947867" comment="java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947868" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947869" comment="java-1.8.0-openjdk-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947870" comment="java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947871" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947872" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.432.b06-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947743" comment="java-11-openjdk-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947744" comment="java-11-openjdk-demo-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947745" comment="java-11-openjdk-demo-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947746" comment="java-11-openjdk-demo-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947747" comment="java-11-openjdk-devel-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947748" comment="java-11-openjdk-devel-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947749" comment="java-11-openjdk-devel-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947750" comment="java-11-openjdk-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947751" comment="java-11-openjdk-headless-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947752" comment="java-11-openjdk-headless-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947753" comment="java-11-openjdk-headless-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947754" comment="java-11-openjdk-javadoc-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947755" comment="java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947756" comment="java-11-openjdk-jmods-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947757" comment="java-11-openjdk-jmods-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947758" comment="java-11-openjdk-jmods-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947759" comment="java-11-openjdk-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947760" comment="java-11-openjdk-src-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947761" comment="java-11-openjdk-src-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947762" comment="java-11-openjdk-src-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947763" comment="java-11-openjdk-static-libs-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947764" comment="java-11-openjdk-static-libs-fastdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947765" comment="java-11-openjdk-static-libs-slowdebug-11.0.25.0.9-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947873" comment="java-17-openjdk-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947874" comment="java-17-openjdk-demo-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947875" comment="java-17-openjdk-demo-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947876" comment="java-17-openjdk-demo-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947877" comment="java-17-openjdk-devel-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947878" comment="java-17-openjdk-devel-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947879" comment="java-17-openjdk-devel-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947880" comment="java-17-openjdk-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947881" comment="java-17-openjdk-headless-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947882" comment="java-17-openjdk-headless-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947883" comment="java-17-openjdk-headless-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947884" comment="java-17-openjdk-javadoc-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947885" comment="java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947886" comment="java-17-openjdk-jmods-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947887" comment="java-17-openjdk-jmods-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947888" comment="java-17-openjdk-jmods-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947889" comment="java-17-openjdk-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947890" comment="java-17-openjdk-src-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947891" comment="java-17-openjdk-src-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947892" comment="java-17-openjdk-src-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947893" comment="java-17-openjdk-static-libs-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947894" comment="java-17-openjdk-static-libs-fastdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947895" comment="java-17-openjdk-static-libs-slowdebug-17.0.13.0.11-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948242" comment="java-21-openjdk-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948243" comment="java-21-openjdk-demo-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948244" comment="java-21-openjdk-demo-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948245" comment="java-21-openjdk-demo-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948246" comment="java-21-openjdk-devel-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948247" comment="java-21-openjdk-devel-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948248" comment="java-21-openjdk-devel-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948249" comment="java-21-openjdk-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948250" comment="java-21-openjdk-headless-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948251" comment="java-21-openjdk-headless-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948252" comment="java-21-openjdk-headless-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948253" comment="java-21-openjdk-javadoc-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948254" comment="java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948255" comment="java-21-openjdk-jmods-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948256" comment="java-21-openjdk-jmods-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948257" comment="java-21-openjdk-jmods-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948258" comment="java-21-openjdk-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948259" comment="java-21-openjdk-src-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948260" comment="java-21-openjdk-src-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948261" comment="java-21-openjdk-src-slowdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948262" comment="java-21-openjdk-static-libs-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948263" comment="java-21-openjdk-static-libs-fastdebug-21.0.5.0.10-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948264" comment="java-21-openjdk-static-libs-slowdebug-21.0.5.0.10-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21236" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21236" ref_url="https://www.suse.com/security/cve/CVE-2024-21236" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21236/">CVE-2024-21236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21236">CVE-2024-21236 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21237" ref_url="https://www.suse.com/security/cve/CVE-2024-21237" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21237/">CVE-2024-21237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21237">CVE-2024-21237 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21238" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21238" ref_url="https://www.suse.com/security/cve/CVE-2024-21238" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21238/">CVE-2024-21238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21238">CVE-2024-21238 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21239" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21239" ref_url="https://www.suse.com/security/cve/CVE-2024-21239" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21239/">CVE-2024-21239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21239">CVE-2024-21239 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21241" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21241" ref_url="https://www.suse.com/security/cve/CVE-2024-21241" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21241/">CVE-2024-21241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21241">CVE-2024-21241 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21247</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21247" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21247" ref_url="https://www.suse.com/security/cve/CVE-2024-21247" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21247/">CVE-2024-21247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21247">CVE-2024-21247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21319</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21319" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21319" ref_url="https://www.suse.com/security/cve/CVE-2024-21319" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-01-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21319/">CVE-2024-21319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21319">CVE-2024-21319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223422">SUSE bug 1223422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009819673" comment="aspnetcore-runtime-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872189" comment="aspnetcore-runtime-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819548" comment="aspnetcore-runtime-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819674" comment="aspnetcore-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872190" comment="aspnetcore-targeting-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819549" comment="aspnetcore-targeting-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819675" comment="dotnet-apphost-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872191" comment="dotnet-apphost-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819550" comment="dotnet-apphost-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819551" comment="dotnet-host-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819676" comment="dotnet-hostfxr-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872192" comment="dotnet-hostfxr-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819552" comment="dotnet-hostfxr-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819677" comment="dotnet-runtime-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872193" comment="dotnet-runtime-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819553" comment="dotnet-runtime-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819678" comment="dotnet-sdk-6.0-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819679" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872194" comment="dotnet-sdk-7.0-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872195" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819554" comment="dotnet-sdk-8.0-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819555" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819680" comment="dotnet-targeting-pack-6.0-6.0.26-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872196" comment="dotnet-targeting-pack-7.0-7.0.15-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819556" comment="dotnet-targeting-pack-8.0-8.0.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819681" comment="dotnet-templates-6.0-6.0.126-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872197" comment="dotnet-templates-7.0-7.0.115-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819557" comment="dotnet-templates-8.0-8.0.101-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009819558" comment="netstandard-targeting-pack-2.1-8.0.101-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21386" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21386" ref_url="https://www.suse.com/security/cve/CVE-2024-21386" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21386/">CVE-2024-21386 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21386">CVE-2024-21386 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846371" comment="aspnetcore-runtime-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053980" comment="aspnetcore-runtime-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872211" comment="aspnetcore-runtime-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872212" comment="aspnetcore-runtime-dbg-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846372" comment="aspnetcore-targeting-pack-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053981" comment="aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872213" comment="aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846373" comment="dotnet-apphost-pack-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053982" comment="dotnet-apphost-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872214" comment="dotnet-apphost-pack-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872215" comment="dotnet-host-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846374" comment="dotnet-hostfxr-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053983" comment="dotnet-hostfxr-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872216" comment="dotnet-hostfxr-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846375" comment="dotnet-runtime-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053984" comment="dotnet-runtime-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872217" comment="dotnet-runtime-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872218" comment="dotnet-runtime-dbg-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846376" comment="dotnet-sdk-6.0-6.0.127-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846377" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053985" comment="dotnet-sdk-7.0-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872318" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872219" comment="dotnet-sdk-8.0-8.0.102-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872220" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872221" comment="dotnet-sdk-dbg-8.0-8.0.102-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846378" comment="dotnet-targeting-pack-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053986" comment="dotnet-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872222" comment="dotnet-targeting-pack-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846379" comment="dotnet-templates-6.0-6.0.127-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053987" comment="dotnet-templates-7.0-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872223" comment="dotnet-templates-8.0-8.0.102-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872224" comment="netstandard-targeting-pack-2.1-8.0.102-2.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21392" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21392" ref_url="https://www.suse.com/security/cve/CVE-2024-21392" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21392/">CVE-2024-21392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21392">CVE-2024-21392 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872225" comment="aspnetcore-runtime-7.0-7.0.17-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872234" comment="aspnetcore-runtime-8.0-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872235" comment="aspnetcore-runtime-dbg-8.0-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872226" comment="aspnetcore-targeting-pack-7.0-7.0.17-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872236" comment="aspnetcore-targeting-pack-8.0-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872227" comment="dotnet-apphost-pack-7.0-7.0.17-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872237" comment="dotnet-apphost-pack-8.0-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872238" comment="dotnet-host-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872228" comment="dotnet-hostfxr-7.0-7.0.17-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872239" comment="dotnet-hostfxr-8.0-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872229" comment="dotnet-runtime-7.0-7.0.17-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872240" comment="dotnet-runtime-8.0-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872241" comment="dotnet-runtime-dbg-8.0-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872230" comment="dotnet-sdk-7.0-7.0.117-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872231" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.117-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872242" comment="dotnet-sdk-8.0-8.0.103-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872243" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.103-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872244" comment="dotnet-sdk-dbg-8.0-8.0.103-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872232" comment="dotnet-targeting-pack-7.0-7.0.17-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872245" comment="dotnet-targeting-pack-8.0-8.0.3-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872233" comment="dotnet-templates-7.0-7.0.117-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872246" comment="dotnet-templates-8.0-8.0.103-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872247" comment="netstandard-targeting-pack-2.1-8.0.103-2.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21404" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21404" ref_url="https://www.suse.com/security/cve/CVE-2024-21404" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-21404/">CVE-2024-21404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21404">CVE-2024-21404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846371" comment="aspnetcore-runtime-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053980" comment="aspnetcore-runtime-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872211" comment="aspnetcore-runtime-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872212" comment="aspnetcore-runtime-dbg-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846372" comment="aspnetcore-targeting-pack-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053981" comment="aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872213" comment="aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846373" comment="dotnet-apphost-pack-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053982" comment="dotnet-apphost-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872214" comment="dotnet-apphost-pack-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872215" comment="dotnet-host-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846374" comment="dotnet-hostfxr-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053983" comment="dotnet-hostfxr-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872216" comment="dotnet-hostfxr-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846375" comment="dotnet-runtime-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053984" comment="dotnet-runtime-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872217" comment="dotnet-runtime-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872218" comment="dotnet-runtime-dbg-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846376" comment="dotnet-sdk-6.0-6.0.127-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846377" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.127-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053985" comment="dotnet-sdk-7.0-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872318" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872219" comment="dotnet-sdk-8.0-8.0.102-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872220" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.102-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872221" comment="dotnet-sdk-dbg-8.0-8.0.102-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846378" comment="dotnet-targeting-pack-6.0-6.0.27-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053986" comment="dotnet-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872222" comment="dotnet-targeting-pack-8.0-8.0.2-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846379" comment="dotnet-templates-6.0-6.0.127-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053987" comment="dotnet-templates-7.0-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872223" comment="dotnet-templates-8.0-8.0.102-2.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872224" comment="netstandard-targeting-pack-2.1-8.0.102-2.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21626</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21626" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21626" ref_url="https://www.suse.com/security/cve/CVE-2024-21626" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0027" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001077.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2024:0037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0459-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017910.html" source="SUSE-SU"/>
		<reference ref_id="TID000021363" ref_url="https://www.suse.com/support/kb/doc/?id=000021363" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MFFSKUX256PEK52RLQGT33MIN3ZQO27D/" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. In runc 1.1.11 and earlier, due to an internal file descriptor leak, an attacker could cause a newly-spawned container process (from runc exec) to have a working directory in the host filesystem namespace, allowing for a container escape by giving access to the host filesystem ("attack 2"). The same attack could be used by a malicious image to allow a container process to gain access to the host filesystem through runc run ("attack 1"). Variants of attacks 1 and 2 could be also be used to overwrite semi-arbitrary host binaries, allowing for complete container escapes ("attack 3a" and "attack 3b"). runc 1.1.12 includes patches for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-06"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21626/">CVE-2024-21626 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21626">CVE-2024-21626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218894">SUSE bug 1218894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009845594" comment="runc-1.1.12-1.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21823" ref_url="https://www.suse.com/security/cve/CVE-2024-21823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-21823/">CVE-2024-21823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21823">CVE-2024-21823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223625">SUSE bug 1223625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21885" ref_url="https://www.suse.com/security/cve/CVE-2024-21885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
    <description>
    A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21885/">CVE-2024-21885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21885">CVE-2024-21885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218584">SUSE bug 1218584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846318" comment="tigervnc-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846319" comment="tigervnc-icons-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846320" comment="tigervnc-license-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846321" comment="tigervnc-selinux-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846322" comment="tigervnc-server-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846323" comment="tigervnc-server-minimal-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846324" comment="tigervnc-server-module-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21886</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21886" ref_url="https://www.suse.com/security/cve/CVE-2024-21886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017712.html" source="SUSE-SU"/>
    <description>
    A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-02-14"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21886/">CVE-2024-21886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-21886">CVE-2024-21886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218585">SUSE bug 1218585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1221590">SUSE bug 1221590</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009846318" comment="tigervnc-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846319" comment="tigervnc-icons-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846320" comment="tigervnc-license-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846321" comment="tigervnc-selinux-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846322" comment="tigervnc-server-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846323" comment="tigervnc-server-minimal-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009846324" comment="tigervnc-server-module-1.13.1-3.el9_3.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866492" comment="xorg-x11-server-Xdmx-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866493" comment="xorg-x11-server-Xephyr-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866494" comment="xorg-x11-server-Xnest-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866495" comment="xorg-x11-server-Xorg-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866496" comment="xorg-x11-server-Xvfb-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866500" comment="xorg-x11-server-Xwayland-22.1.9-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866497" comment="xorg-x11-server-common-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866498" comment="xorg-x11-server-devel-1.20.11-24.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866499" comment="xorg-x11-server-source-1.20.11-24.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21890" ref_url="https://www.suse.com/security/cve/CVE-2024-21890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
    <description>
    The Node.js Permission Model does not clarify in the documentation that wildcards should be only used as the last character of a file path. For example:
```
 --allow-fs-read=/home/node/.ssh/*.pub
```

will ignore `pub` and give access to everything after `.ssh/`.

This misleading documentation affects all users using the experimental permission model in Node.js 20 and Node.js 21.

Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21890/">CVE-2024-21890 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21890">CVE-2024-21890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219999">SUSE bug 1219999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009853717" comment="nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853718" comment="nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853719" comment="nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853720" comment="nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853724" comment="npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21891</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21891" ref_url="https://www.suse.com/security/cve/CVE-2024-21891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
    <description>
    Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.
This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21891/">CVE-2024-21891 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21891">CVE-2024-21891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219998">SUSE bug 1219998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009853717" comment="nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853718" comment="nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853719" comment="nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853720" comment="nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853724" comment="npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21892</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21892" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21892" ref_url="https://www.suse.com/security/cve/CVE-2024-21892" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034494.html" source="SUSE-SU"/>
    <description>
    On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE.
Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set.
This allows unprivileged users to inject code that inherits the process's elevated privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21892/">CVE-2024-21892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21892">CVE-2024-21892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219992">SUSE bug 1219992</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009853717" comment="nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853718" comment="nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853719" comment="nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853720" comment="nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853724" comment="npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202421896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-21896</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-21896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-21896" ref_url="https://www.suse.com/security/cve/CVE-2024-21896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
    <description>
    The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve(). By monkey-patching Buffer internals, namely, Buffer.prototype.utf8Write, the application can modify the result of path.resolve(), which leads to a path traversal vulnerability.
This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-21896/">CVE-2024-21896 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-21896">CVE-2024-21896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219994">SUSE bug 1219994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009853717" comment="nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853718" comment="nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853719" comment="nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853720" comment="nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853724" comment="npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2199" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2199" ref_url="https://www.suse.com/security/cve/CVE-2024-2199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019745.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2199/">CVE-2024-2199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2199">CVE-2024-2199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225507">SUSE bug 1225507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867065" comment="389-ds-base-2.4.5-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867066" comment="389-ds-base-libs-2.4.5-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867067" comment="python3-lib389-2.4.5-8.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2201" ref_url="https://www.suse.com/security/cve/CVE-2024-2201" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6994" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="TID000021421" ref_url="https://www.suse.com/support/kb/doc/?id=000021421" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2201/">CVE-2024-2201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2201">CVE-2024-2201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1212111">SUSE bug 1212111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1217339">SUSE bug 1217339</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22017</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22017" ref_url="https://www.suse.com/security/cve/CVE-2024-22017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
    <description>
    setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid().
This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid().
This vulnerability affects all users using version greater or equal than Node.js 18.18.0, Node.js 20.4.0 and Node.js 21.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22017/">CVE-2024-22017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22017">CVE-2024-22017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219995">SUSE bug 1219995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009853717" comment="nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853718" comment="nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853719" comment="nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853720" comment="nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853724" comment="npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22018" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22018" ref_url="https://www.suse.com/security/cve/CVE-2024-22018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2574-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OWCPL7VTEVIGUDVKLEV2D2ITNTWKC4AZ/" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used.
This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to.
This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21.
Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-22018/">CVE-2024-22018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22018">CVE-2024-22018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227562">SUSE bug 1227562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881076" comment="nodejs-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881077" comment="nodejs-devel-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881078" comment="nodejs-docs-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881079" comment="nodejs-full-i18n-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881080" comment="npm-10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22019" ref_url="https://www.suse.com/security/cve/CVE-2024-22019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018074.html" source="SUSE-SU"/>
    <description>
    A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-26"/>
	<updated date="2025-04-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22019/">CVE-2024-22019 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22019">CVE-2024-22019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219993">SUSE bug 1219993</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009853717" comment="nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853718" comment="nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853719" comment="nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853720" comment="nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851941" comment="nodejs-libs-16.20.2-4.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853724" comment="npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22020" ref_url="https://www.suse.com/security/cve/CVE-2024-22020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2574-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OWCPL7VTEVIGUDVKLEV2D2ITNTWKC4AZ/" source="SUSE-SU"/>
    <description>
    A security flaw in Node.js  allows a bypass of network import restrictions.
By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security.
Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports.
Exploiting this flaw can violate network import security, posing a risk to developers and servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22020/">CVE-2024-22020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22020">CVE-2024-22020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227554">SUSE bug 1227554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881076" comment="nodejs-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881077" comment="nodejs-devel-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881078" comment="nodejs-docs-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881079" comment="nodejs-full-i18n-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881080" comment="npm-10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22025</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22025" ref_url="https://www.suse.com/security/cve/CVE-2024-22025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018074.html" source="SUSE-SU"/>
    <description>
    A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL.
The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL.
An attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-22025/">CVE-2024-22025 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22025">CVE-2024-22025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220014">SUSE bug 1220014</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868797" comment="nodejs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868798" comment="nodejs-devel-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868799" comment="nodejs-docs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868800" comment="nodejs-full-i18n-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866784" comment="nodejs-libs-16.20.2-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868801" comment="npm-10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22195" ref_url="https://www.suse.com/security/cve/CVE-2024-22195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021356.html" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax. It is possible to inject arbitrary HTML attributes into the rendered HTML template, potentially leading to Cross-Site Scripting (XSS). The Jinja `xmlattr` filter can be abused to inject arbitrary HTML attribute keys and values, bypassing the auto escaping mechanism and potentially leading to XSS. It may also be possible to bypass attribute validation checks if they are blacklist-based.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-22195/">CVE-2024-22195 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22195">CVE-2024-22195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218722">SUSE bug 1218722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866430" comment="fence-agents-aliyun-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866431" comment="fence-agents-all-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866432" comment="fence-agents-amt-ws-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866433" comment="fence-agents-apc-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866434" comment="fence-agents-apc-snmp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866435" comment="fence-agents-aws-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866436" comment="fence-agents-azure-arm-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866437" comment="fence-agents-bladecenter-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866438" comment="fence-agents-brocade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866439" comment="fence-agents-cisco-mds-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866440" comment="fence-agents-cisco-ucs-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866441" comment="fence-agents-common-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866442" comment="fence-agents-compute-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866443" comment="fence-agents-drac5-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866444" comment="fence-agents-eaton-snmp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866445" comment="fence-agents-emerson-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866446" comment="fence-agents-eps-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866447" comment="fence-agents-gce-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866448" comment="fence-agents-heuristics-ping-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866449" comment="fence-agents-hpblade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866450" comment="fence-agents-ibm-powervs-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866451" comment="fence-agents-ibm-vpc-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866452" comment="fence-agents-ibmblade-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866453" comment="fence-agents-ifmib-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866454" comment="fence-agents-ilo-moonshot-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866455" comment="fence-agents-ilo-mp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866456" comment="fence-agents-ilo-ssh-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866457" comment="fence-agents-ilo2-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866458" comment="fence-agents-intelmodular-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866459" comment="fence-agents-ipdu-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866460" comment="fence-agents-ipmilan-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866461" comment="fence-agents-kdump-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866462" comment="fence-agents-kubevirt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866463" comment="fence-agents-mpath-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866464" comment="fence-agents-openstack-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866465" comment="fence-agents-redfish-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866466" comment="fence-agents-rhevm-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866467" comment="fence-agents-rsa-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866468" comment="fence-agents-rsb-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866469" comment="fence-agents-sbd-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866470" comment="fence-agents-scsi-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866471" comment="fence-agents-virsh-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866472" comment="fence-agents-vmware-rest-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866473" comment="fence-agents-vmware-soap-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866474" comment="fence-agents-wti-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866475" comment="fence-virt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866476" comment="fence-virtd-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866477" comment="fence-virtd-cpg-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866478" comment="fence-virtd-libvirt-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866479" comment="fence-virtd-multicast-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866480" comment="fence-virtd-serial-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866481" comment="fence-virtd-tcp-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866482" comment="ha-cloud-support-4.10.0-62.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866682" comment="python3-jinja2-2.11.3-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22211" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22211" ref_url="https://www.suse.com/security/cve/CVE-2024-22211" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffers are used to display an image. This issue has been addressed in version 2.11.5 and 3.2.0. Users are advised to upgrade. there are no know workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-22211/">CVE-2024-22211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22211">CVE-2024-22211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219049">SUSE bug 1219049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2236" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2236" ref_url="https://www.suse.com/security/cve/CVE-2024-2236" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9404" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02464-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02752-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041116.html" source="SUSE-SU"/>
    <description>
    A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-08-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2236/">CVE-2024-2236 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2236">CVE-2024-2236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221107">SUSE bug 1221107</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953749" comment="libgcrypt-1.10.0-11.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953750" comment="libgcrypt-devel-1.10.0-11.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22365" ref_url="https://www.suse.com/security/cve/CVE-2024-22365" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2024:242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0136-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017680.html" source="SUSE-SU"/>
    <description>
    linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-22365/">CVE-2024-22365 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22365">CVE-2024-22365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218475">SUSE bug 1218475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866729" comment="pam-1.5.1-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866730" comment="pam-devel-1.5.1-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866731" comment="pam-docs-1.5.1-19.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2313</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2313" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2313" ref_url="https://www.suse.com/security/cve/CVE-2024-2313" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8830" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000184.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000508.html" source="SUSE-SU"/>
    <description>
    If kernel headers need to be extracted, bpftrace will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2313/">CVE-2024-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2313">CVE-2024-2313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221220">SUSE bug 1221220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953668" comment="bpftrace-0.21.1-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2314</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2314" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2314" ref_url="https://www.suse.com/security/cve/CVE-2024-2314" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8831" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000565.html" source="SUSE-SU"/>
    <description>
    If kernel headers need to be extracted, bcc will attempt to load them from a temporary directory. An unprivileged attacker could use this to force bcc to load compromised linux headers. Linux distributions which provide kernel headers by default are not affected by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-08-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2314/">CVE-2024-2314 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2314">CVE-2024-2314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221229">SUSE bug 1221229</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953662" comment="bcc-0.30.0-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953663" comment="bcc-devel-0.30.0-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953664" comment="bcc-doc-0.30.0-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953665" comment="bcc-tools-0.30.0-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953666" comment="libbpf-tools-0.30.0-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953667" comment="python3-bcc-0.30.0-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23184" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23184" ref_url="https://www.suse.com/security/cve/CVE-2024-23184" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6529" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000025.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6973" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" source="SUSE-SU"/>
    <description>
    Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-23184/">CVE-2024-23184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23184">CVE-2024-23184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229184">SUSE bug 1229184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942252" comment="dovecot-2.3.16-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942253" comment="dovecot-devel-2.3.16-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942254" comment="dovecot-mysql-2.3.16-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942255" comment="dovecot-pgsql-2.3.16-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942256" comment="dovecot-pigeonhole-2.3.16-11.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23185" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23185" ref_url="https://www.suse.com/security/cve/CVE-2024-23185" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6529" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000025.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6973" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036753.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14715-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KZSDCZ5LA6IHY7KXVSL6ULAJVP6OFT2M/" source="SUSE-SU"/>
    <description>
    Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up "full_value" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn't matter whether it's a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot's vsz_limit. So attackers probably can't DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-08-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23185/">CVE-2024-23185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23185">CVE-2024-23185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229183">SUSE bug 1229183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942252" comment="dovecot-2.3.16-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942253" comment="dovecot-devel-2.3.16-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942254" comment="dovecot-mysql-2.3.16-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942255" comment="dovecot-pgsql-2.3.16-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942256" comment="dovecot-pigeonhole-2.3.16-11.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23222</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23222" ref_url="https://www.suse.com/security/cve/CVE-2024-23222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved checks. This issue is fixed in Safari 17.3, iOS 15.8.7 and iPadOS 15.8.7, iOS 16.7.5 and iPadOS 16.7.5, iOS 17.3 and iPadOS 17.3, macOS Monterey 12.7.3, macOS Sonoma 14.3, macOS Ventura 13.6.4, tvOS 17.3, visionOS 1.0.2. Processing maliciously crafted web content may lead to arbitrary code execution. This fix associated with the Coruna exploit was shipped in iOS 17.3 on January 22, 2024. This update brings that fix to devices that cannot update to the latest iOS version.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23222/">CVE-2024-23222 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23222">CVE-2024-23222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219113">SUSE bug 1219113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1219604">SUSE bug 1219604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23252" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23252" ref_url="https://www.suse.com/security/cve/CVE-2024-23252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23252/">CVE-2024-23252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23252">CVE-2024-23252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23254</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23254" ref_url="https://www.suse.com/security/cve/CVE-2024-23254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved UI handling. This issue is fixed in Safari 17.4, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. A malicious website may exfiltrate audio data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23254/">CVE-2024-23254 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23254">CVE-2024-23254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23263" ref_url="https://www.suse.com/security/cve/CVE-2024-23263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved validation. This issue is fixed in Safari 17.4, iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23263/">CVE-2024-23263 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23263">CVE-2024-23263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23271" ref_url="https://www.suse.com/security/cve/CVE-2024-23271" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved checks. This issue is fixed in Safari 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, tvOS 17.3, watchOS 10.3. A malicious website may cause unexpected cross-origin behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-23271/">CVE-2024-23271 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23271">CVE-2024-23271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866426" comment="webkit2gtk3-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866427" comment="webkit2gtk3-devel-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866428" comment="webkit2gtk3-jsc-2.42.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866429" comment="webkit2gtk3-jsc-devel-2.42.5-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23280</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23280" ref_url="https://www.suse.com/security/cve/CVE-2024-23280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
    <description>
    An injection issue was addressed with improved validation. This issue is fixed in Safari 17.4, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, watchOS 10.4. A maliciously crafted webpage may be able to fingerprint the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-23280/">CVE-2024-23280 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23280">CVE-2024-23280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23284</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23284" ref_url="https://www.suse.com/security/cve/CVE-2024-23284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved state management. This issue is fixed in Safari 17.4, iOS 16.7.6 and iPadOS 16.7.6, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-23284/">CVE-2024-23284 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23284">CVE-2024-23284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222010">SUSE bug 1222010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23301</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23301" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23301" ref_url="https://www.suse.com/security/cve/CVE-2024-23301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018062.html" source="SUSE-SU"/>
    <description>
    Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable initrd when using GRUB_RESCUE=y. This allows local attackers to gain access to system secrets otherwise only readable by root.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-09"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-23301/">CVE-2024-23301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23301">CVE-2024-23301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218728">SUSE bug 1218728</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009850290" comment="rear-2.6-21.el9_3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23337" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23337" ref_url="https://www.suse.com/security/cve/CVE-2024-23337" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10585" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001772.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10618" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022370.html" source="SUSE-SU"/>
    <description>
    jq is a command-line JSON processor. In versions up to and including 1.7.1, an integer overflow arises when assigning value using an index of 2147483647, the signed integer limit. This causes a denial of service. Commit de21386681c0df0104a99d9d09db23a9b2a78b1e contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-08-30"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-23337/">CVE-2024-23337 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23337">CVE-2024-23337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243450">SUSE bug 1243450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999228" comment="jq-1.6-17.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999229" comment="jq-devel-1.6-17.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2357</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2357" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2357" ref_url="https://www.suse.com/security/cve/CVE-2024-2357" source="SUSE CVE"/>
    <description>
    The Libreswan Project was notified of an issue causing libreswan to restart under some IKEv2 retransmit scenarios when a connection is configured to use PreSharedKeys (authby=secret) and the connection cannot find a matching configured secret. When such a connection is automatically added on startup using the auto= keyword, it can cause repeated crashes leading to a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-27"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2357/">CVE-2024-2357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2357">CVE-2024-2357 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866766" comment="libreswan-4.12-2.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23638</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23638" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23638" ref_url="https://www.suse.com/security/cve/CVE-2024-23638" source="SUSE CVE"/>
		<reference ref_id="GHSA-j49p-553x-48rx" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-j49p-553x-48rx" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9644" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017906.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. Due to an expired pointer reference bug, Squid prior to version 6.6 is vulnerable to a Denial of Service attack against Cache Manager error responses. This problem allows a trusted client to perform Denial of Service when generating error pages for Client Manager reports. Squid older than 5.0.5 have not been tested and should be assumed to be vulnerable. All Squid-5.x up to and including 5.9 are vulnerable. All Squid-6.x up to and including 6.5 are vulnerable. This bug is fixed by Squid version 6.6. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. As a workaround, prevent access to Cache Manager using Squid's main access control: `http_access deny manager`.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-27"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23638/">CVE-2024-23638 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-23638">CVE-2024-23638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219131">SUSE bug 1219131</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876376" comment="squid-5.5-13.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202423672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-23672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-23672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23672" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-23672" ref_url="https://www.suse.com/security/cve/CVE-2024-23672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Denial of Service via incomplete cleanup vulnerability in Apache Tomcat. It was possible for WebSocket clients to keep WebSocket connections open leading to increased resource consumption.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.

Older, EOL versions may also be affected.


Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-23672/">CVE-2024-23672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-23672">CVE-2024-23672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221385">SUSE bug 1221385</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866786" comment="tomcat-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866787" comment="tomcat-admin-webapps-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866788" comment="tomcat-docs-webapp-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866789" comment="tomcat-el-3.0-api-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866790" comment="tomcat-jsp-2.3-api-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866791" comment="tomcat-lib-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866792" comment="tomcat-servlet-4.0-api-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866793" comment="tomcat-webapps-9.0.87-1.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2398" ref_url="https://www.suse.com/security/cve/CVE-2024-2398" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1151-3" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021336.html" source="SUSE-SU"/>
    <description>
    When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory.  Further, this error condition fails silently and is therefore not easily detected by an application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-20"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2398/">CVE-2024-2398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2398">CVE-2024-2398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221667">SUSE bug 1221667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009880234" comment="curl-7.76.1-29.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880235" comment="curl-minimal-7.76.1-29.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880236" comment="libcurl-7.76.1-29.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880237" comment="libcurl-devel-7.76.1-29.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880238" comment="libcurl-minimal-7.76.1-29.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24258" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24258" ref_url="https://www.suse.com/security/cve/CVE-2024-24258" source="SUSE CVE"/>
    <description>
    freeglut 3.4.0 was discovered to contain a memory leak via the menuEntry variable in the glutAddSubMenu function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24258/">CVE-2024-24258 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24258">CVE-2024-24258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219606">SUSE bug 1219606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866714" comment="freeglut-3.2.1-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866715" comment="freeglut-devel-3.2.1-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24259</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24259" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24259" ref_url="https://www.suse.com/security/cve/CVE-2024-24259" source="SUSE CVE"/>
    <description>
    freeglut through 3.4.0 was discovered to contain a memory leak via the menuEntry variable in the glutAddMenuEntry function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24259/">CVE-2024-24259 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24259">CVE-2024-24259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219607">SUSE bug 1219607</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866714" comment="freeglut-3.2.1-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866715" comment="freeglut-devel-3.2.1-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24549" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24549" ref_url="https://www.suse.com/security/cve/CVE-2024-24549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.  Other, older, EOL versions may also be affected.

Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24549/">CVE-2024-24549 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24549">CVE-2024-24549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221386">SUSE bug 1221386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866786" comment="tomcat-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866787" comment="tomcat-admin-webapps-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866788" comment="tomcat-docs-webapp-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866789" comment="tomcat-el-3.0-api-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866790" comment="tomcat-jsp-2.3-api-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866791" comment="tomcat-lib-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866792" comment="tomcat-servlet-4.0-api-9.0.87-1.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866793" comment="tomcat-webapps-9.0.87-1.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24582" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24582" ref_url="https://www.suse.com/security/cve/CVE-2024-24582" source="SUSE CVE"/>
    <description>
    Improper input validation in XmlCli feature for UEFI firmware for some Intel(R) processors may allow privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-24582/">CVE-2024-24582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24582">CVE-2024-24582 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053952" comment="microcode_ctl-20240910-1.20250211.1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24783" ref_url="https://www.suse.com/security/cve/CVE-2024-24783" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6186" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000012.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000014.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000018.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000015.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6194" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6195" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000020.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6969" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
    <description>
    Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24783/">CVE-2024-24783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24783">CVE-2024-24783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220999">SUSE bug 1220999</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941967" comment="buildah-1.33.7-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941968" comment="buildah-tests-1.33.7-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941964" comment="containernetworking-plugins-1.4.0-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866780" comment="git-lfs-3.4.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866758" comment="go-toolset-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866759" comment="golang-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866760" comment="golang-bin-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866761" comment="golang-docs-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866762" comment="golang-misc-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866763" comment="golang-src-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866764" comment="golang-tests-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941965" comment="gvisor-tap-vsock-0.7.3-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941970" comment="podman-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941971" comment="podman-docker-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941972" comment="podman-plugins-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941973" comment="podman-remote-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941974" comment="podman-tests-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941966" comment="runc-1.1.12-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941975" comment="skopeo-1.14.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941976" comment="skopeo-tests-1.14.5-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24784" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24784" ref_url="https://www.suse.com/security/cve/CVE-2024-24784" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6969" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
    <description>
    The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24784/">CVE-2024-24784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24784">CVE-2024-24784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221002">SUSE bug 1221002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866758" comment="go-toolset-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866759" comment="golang-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866760" comment="golang-bin-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866761" comment="golang-docs-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866762" comment="golang-misc-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866763" comment="golang-src-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866764" comment="golang-tests-1.21.9-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24785</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24785" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24785" ref_url="https://www.suse.com/security/cve/CVE-2024-24785" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
    <description>
    If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-03-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24785/">CVE-2024-24785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24785">CVE-2024-24785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221003">SUSE bug 1221003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866758" comment="go-toolset-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866759" comment="golang-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866760" comment="golang-bin-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866761" comment="golang-docs-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866762" comment="golang-misc-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866763" comment="golang-src-1.21.9-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866764" comment="golang-tests-1.21.9-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24786" ref_url="https://www.suse.com/security/cve/CVE-2024-24786" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3098-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24786/">CVE-2024-24786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24786">CVE-2024-24786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226136">SUSE bug 1226136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866755" comment="buildah-1.33.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866756" comment="buildah-tests-1.33.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867218" comment="podman-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867219" comment="podman-docker-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867220" comment="podman-plugins-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867221" comment="podman-remote-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867222" comment="podman-tests-4.9.4-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868754" comment="skopeo-1.14.3-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868755" comment="skopeo-tests-1.14.3-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24788" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24788" ref_url="https://www.suse.com/security/cve/CVE-2024-24788" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6969" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000554.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9098" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000553.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9115" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000590.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9200" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000591.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9277" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000566.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7256" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1573-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
    <description>
    A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24788/">CVE-2024-24788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24788">CVE-2024-24788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224018">SUSE bug 1224018</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953532" comment="containernetworking-plugins-1.5.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983915" comment="git-lfs-3.6.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053877" comment="go-toolset-1.21.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053878" comment="golang-1.21.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053879" comment="golang-bin-1.21.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053880" comment="golang-docs-1.21.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053881" comment="golang-misc-1.21.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053882" comment="golang-src-1.21.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053883" comment="golang-tests-1.21.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953574" comment="grafana-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953575" comment="grafana-selinux-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953694" comment="oci-seccomp-bpf-hook-1.2.10-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953684" comment="runc-1.1.13-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953542" comment="skopeo-1.16.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953543" comment="skopeo-tests-1.16.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24789" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24789" ref_url="https://www.suse.com/security/cve/CVE-2024-24789" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000516.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9115" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
    <description>
    The archive/zip package's handling of certain types of invalid zip files differs from the behavior of most zip implementations. This misalignment could be exploited to create an zip file with contents that vary depending on the implementation reading the file. The archive/zip package now rejects files containing these errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-10"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-24789/">CVE-2024-24789 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24789">CVE-2024-24789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225973">SUSE bug 1225973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009871865" comment="go-toolset-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871866" comment="golang-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871867" comment="golang-bin-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871868" comment="golang-docs-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871869" comment="golang-misc-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871870" comment="golang-src-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871871" comment="golang-tests-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953574" comment="grafana-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953575" comment="grafana-selinux-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953544" comment="podman-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953545" comment="podman-docker-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953546" comment="podman-plugins-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953547" comment="podman-remote-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953548" comment="podman-tests-5.2.2-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24790" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24790" ref_url="https://www.suse.com/security/cve/CVE-2024-24790" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8876" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000196.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9115" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000590.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7256" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020273.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14723-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L4UHTGLKMBMDBNJOV6DAPYNIXJL3CMXB/" source="SUSE-SU"/>
    <description>
    The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-10"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-24790/">CVE-2024-24790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24790">CVE-2024-24790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225974">SUSE bug 1225974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983915" comment="git-lfs-3.6.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871865" comment="go-toolset-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871866" comment="golang-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871867" comment="golang-bin-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871868" comment="golang-docs-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871869" comment="golang-misc-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871870" comment="golang-src-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871871" comment="golang-tests-1.21.11-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953574" comment="grafana-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953575" comment="grafana-selinux-10.2.6-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24791" ref_url="https://www.suse.com/security/cve/CVE-2024-24791" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6908" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6913" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000058.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6969" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7349" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000100.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000554.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9098" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000553.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000516.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9115" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000590.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7256" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
    <description>
    The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail. An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24791/">CVE-2024-24791 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24791">CVE-2024-24791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227314">SUSE bug 1227314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953540" comment="buildah-1.37.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953541" comment="buildah-tests-1.37.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953532" comment="containernetworking-plugins-1.5.1-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983915" comment="git-lfs-3.6.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944120" comment="go-toolset-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944121" comment="golang-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944122" comment="golang-bin-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944123" comment="golang-docs-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944124" comment="golang-misc-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944125" comment="golang-src-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944126" comment="golang-tests-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953574" comment="grafana-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953575" comment="grafana-selinux-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953544" comment="podman-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953545" comment="podman-docker-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953546" comment="podman-plugins-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953547" comment="podman-remote-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953548" comment="podman-tests-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953542" comment="skopeo-1.16.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953543" comment="skopeo-tests-1.16.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24795" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24795" ref_url="https://www.suse.com/security/cve/CVE-2024-24795" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZWV2MVSBRL4AIHT5O6LIOEUFMOC3TUBS/" source="SUSE-SU"/>
		<reference ref_id="TID000021486" ref_url="https://www.suse.com/support/kb/doc/?id=000021486" source="SUSE-SU"/>
    <description>
    HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack.

Users are recommended to upgrade to version 2.4.59, which fixes this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-24795/">CVE-2024-24795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24795">CVE-2024-24795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222332">SUSE bug 1222332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953701" comment="httpd-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953702" comment="httpd-core-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953703" comment="httpd-devel-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953704" comment="httpd-filesystem-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953705" comment="httpd-manual-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953706" comment="httpd-tools-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953707" comment="mod_ldap-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953708" comment="mod_lua-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953709" comment="mod_proxy_html-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953710" comment="mod_session-2.4.62-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953711" comment="mod_ssl-2.4.62-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24806" ref_url="https://www.suse.com/security/cve/CVE-2024-24806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-February/034494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019873.html" source="SUSE-SU"/>
    <description>
    libuv is a multi-platform support library with a focus on asynchronous I/O. The `uv_getaddrinfo` function in `src/unix/getaddrinfo.c` (and its windows counterpart `src/win/getaddrinfo.c`), truncates hostnames to 256 characters before calling `getaddrinfo`. This behavior can be exploited to create addresses like `0x00007f000001`, which are considered valid by `getaddrinfo` and could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks. The vulnerability arises due to how the `hostname_ascii` variable (with a length of 256 bytes) is handled in `uv_getaddrinfo` and subsequently in `uv__idna_toascii`. When the hostname exceeds 256 characters, it gets truncated without a terminating null byte. As a result attackers may be able to access internal APIs or for websites (similar to MySpace) that allows users to have `username.example.com` pages. Internal services that crawl or cache these user pages can be exposed to SSRF attacks if a malicious user chooses a long vulnerable username. This issue has been addressed in release version 1.48.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24806/">CVE-2024-24806 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24806">CVE-2024-24806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219724">SUSE bug 1219724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220056">SUSE bug 1220056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877073" comment="libuv-1.42.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877074" comment="libuv-devel-1.42.0-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24814</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24814" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24814" ref_url="https://www.suse.com/security/cve/CVE-2024-24814" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023659.html" source="SUSE-SU"/>
    <description>
    mod_auth_openidc is an OpenID Certified(tm) authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. In affected versions missing input validation on mod_auth_openidc_session_chunks cookie value makes the server vulnerable to a denial of service (DoS) attack. An internal security audit has been conducted and the reviewers found that if they manipulated the value of the mod_auth_openidc_session_chunks cookie to a very large integer, like 99999999, the server struggles with the request for a long time and finally gets back with a 500 error. Making a few requests of this kind caused our server to become unresponsive. Attackers can craft requests that would make the server work very hard (and possibly become unresponsive) and/or crash with minimal effort. This issue has been addressed in version 2.4.15.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-12-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-24814/">CVE-2024-24814 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24814">CVE-2024-24814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219911">SUSE bug 1219911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953652" comment="mod_auth_openidc-2.4.10-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2494" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2494" ref_url="https://www.suse.com/security/cve/CVE-2024-2494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034895.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2494/">CVE-2024-2494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2494">CVE-2024-2494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221815">SUSE bug 1221815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868756" comment="libvirt-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868757" comment="libvirt-client-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868758" comment="libvirt-client-qemu-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868759" comment="libvirt-daemon-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868760" comment="libvirt-daemon-common-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868761" comment="libvirt-daemon-config-network-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868762" comment="libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868763" comment="libvirt-daemon-driver-interface-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868764" comment="libvirt-daemon-driver-network-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868765" comment="libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868766" comment="libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868767" comment="libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868768" comment="libvirt-daemon-driver-secret-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868769" comment="libvirt-daemon-driver-storage-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868770" comment="libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868771" comment="libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868772" comment="libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868773" comment="libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868774" comment="libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868775" comment="libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868776" comment="libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868777" comment="libvirt-daemon-kvm-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868778" comment="libvirt-daemon-lock-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868779" comment="libvirt-daemon-log-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868780" comment="libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868781" comment="libvirt-daemon-plugin-sanlock-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868782" comment="libvirt-daemon-proxy-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868783" comment="libvirt-devel-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868784" comment="libvirt-docs-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868785" comment="libvirt-libs-10.0.0-6.2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868786" comment="libvirt-nss-10.0.0-6.2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2496</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2496" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2496" ref_url="https://www.suse.com/security/cve/CVE-2024-2496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034896.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the udevConnectListAllInterfaces() function in libvirt. This issue can occur when detaching a host interface while at the same time collecting the list of interfaces via virConnectListAllInterfaces API. This flaw could be used to perform a denial of service attack by causing the libvirt daemon to crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-25"/>
	<updated date="2025-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2496/">CVE-2024-2496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2496">CVE-2024-2496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221468">SUSE bug 1221468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868719" comment="libvirt-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868720" comment="libvirt-client-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868721" comment="libvirt-client-qemu-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868722" comment="libvirt-daemon-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868723" comment="libvirt-daemon-common-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868724" comment="libvirt-daemon-config-network-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868725" comment="libvirt-daemon-config-nwfilter-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868726" comment="libvirt-daemon-driver-interface-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868727" comment="libvirt-daemon-driver-network-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868728" comment="libvirt-daemon-driver-nodedev-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868729" comment="libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868730" comment="libvirt-daemon-driver-qemu-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868731" comment="libvirt-daemon-driver-secret-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868732" comment="libvirt-daemon-driver-storage-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868733" comment="libvirt-daemon-driver-storage-core-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868734" comment="libvirt-daemon-driver-storage-disk-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868735" comment="libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868736" comment="libvirt-daemon-driver-storage-logical-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868737" comment="libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868738" comment="libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868739" comment="libvirt-daemon-driver-storage-scsi-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868740" comment="libvirt-daemon-kvm-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868741" comment="libvirt-daemon-lock-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868742" comment="libvirt-daemon-log-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868743" comment="libvirt-daemon-plugin-lockd-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868744" comment="libvirt-daemon-plugin-sanlock-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868745" comment="libvirt-daemon-proxy-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868746" comment="libvirt-devel-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868747" comment="libvirt-docs-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868748" comment="libvirt-libs-10.0.0-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868749" comment="libvirt-nss-10.0.0-6.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25062</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25062" ref_url="https://www.suse.com/security/cve/CVE-2024-25062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0461-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0613-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035534.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25062/">CVE-2024-25062 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25062">CVE-2024-25062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219575">SUSE bug 1219575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866777" comment="libxml2-2.9.13-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866778" comment="libxml2-devel-2.9.13-6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866779" comment="python3-libxml2-2.9.13-6.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25081" ref_url="https://www.suse.com/security/cve/CVE-2024-25081" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4267" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9439" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018156.html" source="SUSE-SU"/>
    <description>
    Splinefont in FontForge through 20230101 allows command injection via crafted filenames.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25081/">CVE-2024-25081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25081">CVE-2024-25081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220404">SUSE bug 1220404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953764" comment="fontforge-20201107-6.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25082" ref_url="https://www.suse.com/security/cve/CVE-2024-25082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4267" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9439" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018156.html" source="SUSE-SU"/>
    <description>
    Splinefont in FontForge through 20230101 allows command injection via crafted archives or compressed files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25082/">CVE-2024-25082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25082">CVE-2024-25082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220405">SUSE bug 1220405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953764" comment="fontforge-20201107-6.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2511</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2511" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2511" ref_url="https://www.suse.com/security/cve/CVE-2024-2511" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html" source="SUSE-SU"/>
    <description>
    Issue summary: Some non-default TLS server configurations can cause unbounded
memory growth when processing TLSv1.3 sessions

Impact summary: An attacker may exploit certain server configurations to trigger
unbounded memory growth that would lead to a Denial of Service

This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is
being used (but not if early_data support is also configured and the default
anti-replay protection is in use). In this case, under certain conditions, the
session cache can get into an incorrect state and it will fail to flush properly
as it fills. The session cache will continue to grow in an unbounded manner. A
malicious client could deliberately create the scenario for this failure to
force a Denial of Service. It may also happen by accident in normal operation.

This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS
clients.

The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL
1.0.2 is also not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-2511/">CVE-2024-2511 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2511">CVE-2024-2511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222548">SUSE bug 1222548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953743" comment="openssl-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953744" comment="openssl-devel-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953745" comment="openssl-fips-provider-3.0.7-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953746" comment="openssl-fips-provider-so-3.0.7-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953747" comment="openssl-libs-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953748" comment="openssl-perl-3.2.2-6.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25111" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25111" ref_url="https://www.suse.com/security/cve/CVE-2024-25111" source="SUSE CVE"/>
		<reference ref_id="GHSA-72c2-c3wm-8qxc" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-72c2-c3wm-8qxc" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034845.html" source="SUSE-SU"/>
    <description>
    Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-21"/>
	<updated date="2025-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25111/">CVE-2024-25111 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25111">CVE-2024-25111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221139">SUSE bug 1221139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851786" comment="squid-5.5-6.el9_3.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25126" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25126" ref_url="https://www.suse.com/security/cve/CVE-2024-25126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034891.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLQ74D2IZAJC5KD6QXVUZAQ6O5LNAWZX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOZFATD6SCQREBY3SZW5KQJPN6KN7A6D/" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. Carefully crafted content type headers can cause Rack's media type parser to take much longer than expected, leading to a possible denial of service vulnerability (ReDos 2nd degree polynomial). This vulnerability is patched in 3.0.9.1 and 2.2.8.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25126/">CVE-2024-25126 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25126">CVE-2024-25126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220239">SUSE bug 1220239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866424" comment="pcs-0.11.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866425" comment="pcs-snmp-0.11.7-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25580" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25580" ref_url="https://www.suse.com/security/cve/CVE-2024-25580" source="SUSE CVE"/>
    <description>
    An issue was discovered in gui/util/qktxhandler.cpp in Qt before 5.15.17, 6.x before 6.2.12, 6.3.x through 6.5.x before 6.5.5, and 6.6.x before 6.6.2. A buffer overflow and application crash can occur via a crafted KTX image file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25580/">CVE-2024-25580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25580">CVE-2024-25580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219996">SUSE bug 1219996</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866630" comment="qt5-qtbase-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866631" comment="qt5-qtbase-common-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866632" comment="qt5-qtbase-devel-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866633" comment="qt5-qtbase-examples-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866634" comment="qt5-qtbase-gui-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866635" comment="qt5-qtbase-mysql-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866636" comment="qt5-qtbase-odbc-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866637" comment="qt5-qtbase-postgresql-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866638" comment="qt5-qtbase-private-devel-5.15.9-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866639" comment="qt5-qtbase-static-5.15.9-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25617</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25617" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25617" ref_url="https://www.suse.com/security/cve/CVE-2024-25617" source="SUSE CVE"/>
		<reference ref_id="GHSA-h5x6-w8mv-xfpr" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-h5x6-w8mv-xfpr" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1114-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034845.html" source="SUSE-SU"/>
    <description>
    Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-21"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25617/">CVE-2024-25617 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25617">CVE-2024-25617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219960">SUSE bug 1219960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851786" comment="squid-5.5-6.el9_3.8 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25629" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25629" ref_url="https://www.suse.com/security/cve/CVE-2024-25629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1136-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035974.html" source="SUSE-SU"/>
    <description>
    c-ares is a C library for asynchronous DNS requests. `ares__read_line()` is used to parse local configuration files such as `/etc/resolv.conf`, `/etc/nsswitch.conf`, the `HOSTALIASES` file, and if using a c-ares version prior to 1.27.0, the `/etc/hosts` file. If any of these configuration files has an embedded `NULL` character as the first character in a new line, it can lead to attempting to read memory prior to the start of the given buffer which may result in a crash. This issue is fixed in c-ares 1.27.0. No known workarounds exist.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25629/">CVE-2024-25629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25629">CVE-2024-25629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220279">SUSE bug 1220279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870286" comment="c-ares-1.19.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870287" comment="c-ares-devel-1.19.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868797" comment="nodejs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868798" comment="nodejs-devel-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868799" comment="nodejs-docs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868800" comment="nodejs-full-i18n-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866784" comment="nodejs-libs-16.20.2-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868801" comment="npm-10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25742" ref_url="https://www.suse.com/security/cve/CVE-2024-25742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25742/">CVE-2024-25742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25742">CVE-2024-25742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870083" comment="bpftool-7.3.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870084" comment="kernel-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870085" comment="kernel-abi-stablelists-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870086" comment="kernel-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870087" comment="kernel-cross-headers-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870088" comment="kernel-debug-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870089" comment="kernel-debug-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870092" comment="kernel-debug-modules-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870093" comment="kernel-debug-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870094" comment="kernel-debug-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870095" comment="kernel-debug-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870098" comment="kernel-doc-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870099" comment="kernel-headers-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870100" comment="kernel-modules-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870101" comment="kernel-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870102" comment="kernel-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870103" comment="kernel-tools-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870104" comment="kernel-tools-libs-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870106" comment="kernel-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870107" comment="libperf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870108" comment="perf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870109" comment="python3-perf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870110" comment="rtla-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870111" comment="rv-5.14.0-427.16.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25743" ref_url="https://www.suse.com/security/cve/CVE-2024-25743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel through 6.9, an untrusted hypervisor can inject virtual interrupts 0 and 14 at any point in time and can trigger the SIGFPE signal handler in userspace applications. This affects AMD SEV-SNP and AMD SEV-ES.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-25743/">CVE-2024-25743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25743">CVE-2024-25743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221725">SUSE bug 1221725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223307">SUSE bug 1223307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870083" comment="bpftool-7.3.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870084" comment="kernel-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870085" comment="kernel-abi-stablelists-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870086" comment="kernel-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870087" comment="kernel-cross-headers-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870088" comment="kernel-debug-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870089" comment="kernel-debug-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870092" comment="kernel-debug-modules-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870093" comment="kernel-debug-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870094" comment="kernel-debug-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870095" comment="kernel-debug-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870098" comment="kernel-doc-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870099" comment="kernel-headers-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870100" comment="kernel-modules-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870101" comment="kernel-modules-core-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870102" comment="kernel-modules-extra-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870103" comment="kernel-tools-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870104" comment="kernel-tools-libs-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870106" comment="kernel-uki-virt-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870107" comment="libperf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870108" comment="perf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870109" comment="python3-perf-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870110" comment="rtla-5.14.0-427.16.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870111" comment="rv-5.14.0-427.16.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25744" ref_url="https://www.suse.com/security/cve/CVE-2024-25744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel before 6.6.7, an untrusted VMM can trigger int80 syscall handling at any given point. This is related to arch/x86/coco/tdx/tdx.c and arch/x86/mm/mem_encrypt_amd.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-25744/">CVE-2024-25744 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25744">CVE-2024-25744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217927">SUSE bug 1217927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220314">SUSE bug 1220314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2607</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2607" ref_url="https://www.suse.com/security/cve/CVE-2024-2607" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2607/">CVE-2024-2607 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2607">CVE-2024-2607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2608</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2608" ref_url="https://www.suse.com/security/cve/CVE-2024-2608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    `AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2608/">CVE-2024-2608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2608">CVE-2024-2608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2609" ref_url="https://www.suse.com/security/cve/CVE-2024-2609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2609/">CVE-2024-2609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2609">CVE-2024-2609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2610</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2610" ref_url="https://www.suse.com/security/cve/CVE-2024-2610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-2610/">CVE-2024-2610 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2610">CVE-2024-2610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2611" ref_url="https://www.suse.com/security/cve/CVE-2024-2611" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-2611/">CVE-2024-2611 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2611">CVE-2024-2611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2612</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2612" ref_url="https://www.suse.com/security/cve/CVE-2024-2612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2612/">CVE-2024-2612 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2612">CVE-2024-2612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26130" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26130" ref_url="https://www.suse.com/security/cve/CVE-2024-26130" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15608" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2138-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035679.html" source="SUSE-SU"/>
    <description>
    cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Starting in version 38.0.0 and prior to version 42.0.4, if `pkcs12.serialize_key_and_certificates` is called with both a certificate whose public key did not match the provided private key and an `encryption_algorithm` with `hmac_hash` set (via `PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)`, then a NULL pointer dereference would occur, crashing the Python process. This has been resolved in version 42.0.4, the first version in which a `ValueError` is properly raised.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-12"/>
	<updated date="2025-09-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26130/">CVE-2024-26130 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26130">CVE-2024-26130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220210">SUSE bug 1220210</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017700" comment="python3.12-cryptography-41.0.7-2.el9_6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2614" ref_url="https://www.suse.com/security/cve/CVE-2024-2614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2614/">CVE-2024-2614 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2614">CVE-2024-2614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851988" comment="thunderbird-115.9.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26141" ref_url="https://www.suse.com/security/cve/CVE-2024-26141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034891.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLQ74D2IZAJC5KD6QXVUZAQ6O5LNAWZX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOZFATD6SCQREBY3SZW5KQJPN6KN7A6D/" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26141/">CVE-2024-26141 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26141">CVE-2024-26141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220242">SUSE bug 1220242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866424" comment="pcs-0.11.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866425" comment="pcs-snmp-0.11.7-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26146</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26146" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26146" ref_url="https://www.suse.com/security/cve/CVE-2024-26146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034891.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14811-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLQ74D2IZAJC5KD6QXVUZAQ6O5LNAWZX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14875-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MOZFATD6SCQREBY3SZW5KQJPN6KN7A6D/" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. Carefully crafted headers can cause header parsing in Rack to take longer than expected resulting in a possible denial of service issue. Accept and Forwarded headers are impacted. Ruby 3.2 has mitigations for this problem, so Rack applications using Ruby 3.2 or newer are unaffected. This vulnerability is fixed in 2.0.9.4, 2.1.4.4, 2.2.8.1, and 3.0.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26146/">CVE-2024-26146 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26146">CVE-2024-26146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220248">SUSE bug 1220248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227310">SUSE bug 1227310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866424" comment="pcs-0.11.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866425" comment="pcs-snmp-0.11.7-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2616" ref_url="https://www.suse.com/security/cve/CVE-2024-2616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1147-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034875.html" source="SUSE-SU"/>
    <description>
    To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue. This vulnerability affects Firefox ESR &lt; 115.9 and Thunderbird &lt; 115.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-26"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-2616/">CVE-2024-2616 at SUSE</cve>
	<cve impact="low" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-2616">CVE-2024-2616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221327">SUSE bug 1221327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26306</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26306" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26306" ref_url="https://www.suse.com/security/cve/CVE-2024-26306" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9185" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024198.html" source="SUSE-SU"/>
    <description>
    iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26306/">CVE-2024-26306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26306">CVE-2024-26306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224262">SUSE bug 1224262</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953661" comment="iperf3-3.9-13.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26327</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26327" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26327" ref_url="https://www.suse.com/security/cve/CVE-2024-26327" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034892.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in QEMU 7.1.0 through 8.2.1. register_vfs in hw/pci/pcie_sriov.c mishandles the situation where a guest writes NumVFs greater than TotalVFs, leading to a buffer overflow in VF implementations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-05-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26327/">CVE-2024-26327 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26327">CVE-2024-26327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220062">SUSE bug 1220062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953616" comment="qemu-guest-agent-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953617" comment="qemu-img-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953618" comment="qemu-kvm-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953619" comment="qemu-kvm-audio-pa-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953620" comment="qemu-kvm-block-blkio-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953621" comment="qemu-kvm-block-curl-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953622" comment="qemu-kvm-block-rbd-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953623" comment="qemu-kvm-common-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953624" comment="qemu-kvm-core-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953625" comment="qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953626" comment="qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953627" comment="qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953628" comment="qemu-kvm-device-usb-host-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953629" comment="qemu-kvm-device-usb-redirect-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953630" comment="qemu-kvm-docs-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953631" comment="qemu-kvm-tools-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953632" comment="qemu-kvm-ui-egl-headless-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953633" comment="qemu-kvm-ui-opengl-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953634" comment="qemu-pr-helper-9.0.0-10.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26458" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26458" ref_url="https://www.suse.com/security/cve/CVE-2024-26458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024200.html" source="SUSE-SU"/>
    <description>
    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak in /krb5/src/lib/rpc/pmap_rmt.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26458/">CVE-2024-26458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26458">CVE-2024-26458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953736" comment="krb5-devel-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953737" comment="krb5-libs-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953738" comment="krb5-pkinit-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953739" comment="krb5-server-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953740" comment="krb5-server-ldap-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953741" comment="krb5-workstation-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953742" comment="libkadm5-1.21.1-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26461" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26461" ref_url="https://www.suse.com/security/cve/CVE-2024-26461" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024200.html" source="SUSE-SU"/>
    <description>
    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/lib/gssapi/krb5/k5sealv3.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-02-14"/>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26461/">CVE-2024-26461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26461">CVE-2024-26461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220771">SUSE bug 1220771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953736" comment="krb5-devel-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953737" comment="krb5-libs-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953738" comment="krb5-pkinit-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953739" comment="krb5-server-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953740" comment="krb5-server-ldap-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953741" comment="krb5-workstation-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953742" comment="libkadm5-1.21.1-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26462" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26462" ref_url="https://www.suse.com/security/cve/CVE-2024-26462" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-March/034770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024200.html" source="SUSE-SU"/>
    <description>
    Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26462/">CVE-2024-26462 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26462">CVE-2024-26462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220770">SUSE bug 1220770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220772">SUSE bug 1220772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953736" comment="krb5-devel-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953737" comment="krb5-libs-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953738" comment="krb5-pkinit-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953739" comment="krb5-server-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953740" comment="krb5-server-ldap-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953741" comment="krb5-workstation-1.21.1-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953742" comment="libkadm5-1.21.1-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26581" ref_url="https://www.suse.com/security/cve/CVE-2024-26581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_rbtree: skip end interval element from gc

rbtree lazy gc on insert might collect an end interval element that has
been just added in this transactions, skip end interval elements that
are not yet active.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26581/">CVE-2024-26581 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26581">CVE-2024-26581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220144">SUSE bug 1220144</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26582" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26582" ref_url="https://www.suse.com/security/cve/CVE-2024-26582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tls: fix use-after-free with partial reads and async decrypt

tls_decrypt_sg doesn't take a reference on the pages from clear_skb,
so the put_page() in tls_decrypt_done releases them, and we trigger
a use-after-free in process_rx_list when we try to read from the
partially-read skb.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26582/">CVE-2024-26582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26582">CVE-2024-26582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220214">SUSE bug 1220214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226329">SUSE bug 1226329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26583</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26583" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26583" ref_url="https://www.suse.com/security/cve/CVE-2024-26583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix race between async notify and socket close

The submitting thread (one which called recvmsg/sendmsg)
may exit as soon as the async crypto handler calls complete()
so any code past that point risks touching already freed data.

Try to avoid the locking and extra flags altogether.
Have the main thread hold an extra reference, this way
we can depend solely on the atomic ref counter for
synchronization.

Don't futz with reiniting the completion, either, we are now
tightly controlling when completion fires.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26583/">CVE-2024-26583 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26583">CVE-2024-26583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220185">SUSE bug 1220185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26584" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26584" ref_url="https://www.suse.com/security/cve/CVE-2024-26584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tls: handle backlogging of crypto requests

Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our
requests to the crypto API, crypto_aead_{encrypt,decrypt} can return
 -EBUSY instead of -EINPROGRESS in valid situations. For example, when
the cryptd queue for AESNI is full (easy to trigger with an
artificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued
to the backlog but still processed. In that case, the async callback
will also be called twice: first with err == -EINPROGRESS, which it
seems we can just ignore, then with err == 0.

Compared to Sabrina's original patch this version uses the new
tls_*crypt_async_wait() helpers and converts the EBUSY to
EINPROGRESS to avoid having to modify all the error handling
paths. The handling is identical.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26584/">CVE-2024-26584 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26584">CVE-2024-26584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220186">SUSE bug 1220186</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26585" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26585" ref_url="https://www.suse.com/security/cve/CVE-2024-26585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1757-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix race between tx work scheduling and socket close

Similarly to previous commit, the submitting thread (recvmsg/sendmsg)
may exit as soon as the async crypto handler calls complete().
Reorder scheduling the work before calling complete().
This seems more logical in the first place, as it's
the inverse order of what the submitting thread will do.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26585/">CVE-2024-26585 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26585">CVE-2024-26585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220187">SUSE bug 1220187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1220211">SUSE bug 1220211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224298">SUSE bug 1224298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224878">SUSE bug 1224878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26586</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26586" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26586" ref_url="https://www.suse.com/security/cve/CVE-2024-26586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix stack corruption

When tc filters are first added to a net device, the corresponding local
port gets bound to an ACL group in the device. The group contains a list
of ACLs. In turn, each ACL points to a different TCAM region where the
filters are stored. During forwarding, the ACLs are sequentially
evaluated until a match is found.

One reason to place filters in different regions is when they are added
with decreasing priorities and in an alternating order so that two
consecutive filters can never fit in the same region because of their
key usage.

In Spectrum-2 and newer ASICs the firmware started to report that the
maximum number of ACLs in a group is more than 16, but the layout of the
register that configures ACL groups (PAGT) was not updated to account
for that. It is therefore possible to hit stack corruption [1] in the
rare case where more than 16 ACLs in a group are required.

Fix by limiting the maximum ACL group size to the minimum between what
the firmware reports and the maximum ACLs that fit in the PAGT register.

Add a test case to make sure the machine does not crash when this
condition is hit.

[1]
Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: mlxsw_sp_acl_tcam_group_update+0x116/0x120
[...]
 dump_stack_lvl+0x36/0x50
 panic+0x305/0x330
 __stack_chk_fail+0x15/0x20
 mlxsw_sp_acl_tcam_group_update+0x116/0x120
 mlxsw_sp_acl_tcam_group_region_attach+0x69/0x110
 mlxsw_sp_acl_tcam_vchunk_get+0x492/0xa20
 mlxsw_sp_acl_tcam_ventry_add+0x25/0xe0
 mlxsw_sp_acl_rule_add+0x47/0x240
 mlxsw_sp_flower_replace+0x1a9/0x1d0
 tc_setup_cb_add+0xdc/0x1c0
 fl_hw_replace_filter+0x146/0x1f0
 fl_change+0xc17/0x1360
 tc_new_tfilter+0x472/0xb90
 rtnetlink_rcv_msg+0x313/0x3b0
 netlink_rcv_skb+0x58/0x100
 netlink_unicast+0x244/0x390
 netlink_sendmsg+0x1e4/0x440
 ____sys_sendmsg+0x164/0x260
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x7a/0xc0
 do_syscall_64+0x40/0xe0
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26586/">CVE-2024-26586 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26586">CVE-2024-26586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220243">SUSE bug 1220243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26593" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26593" ref_url="https://www.suse.com/security/cve/CVE-2024-26593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: i801: Fix block process call transactions

According to the Intel datasheets, software must reset the block
buffer index twice for block process call transactions: once before
writing the outgoing data to the buffer, and once again before
reading the incoming data from the buffer.

The driver is currently missing the second reset, causing the wrong
portion of the block buffer to be read.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26593/">CVE-2024-26593 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26593">CVE-2024-26593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220009">SUSE bug 1220009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26600" ref_url="https://www.suse.com/security/cve/CVE-2024-26600" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: ti: phy-omap-usb2: Fix NULL pointer dereference for SRP

If the external phy working together with phy-omap-usb2 does not implement
send_srp(), we may still attempt to call it. This can happen on an idle
Ethernet gadget triggering a wakeup for example:

configfs-gadget.g1 gadget.0: ECM Suspend
configfs-gadget.g1 gadget.0: Port suspended. Triggering wakeup
...
Unable to handle kernel NULL pointer dereference at virtual address
00000000 when execute
...
PC is at 0x0
LR is at musb_gadget_wakeup+0x1d4/0x254 [musb_hdrc]
...
musb_gadget_wakeup [musb_hdrc] from usb_gadget_wakeup+0x1c/0x3c [udc_core]
usb_gadget_wakeup [udc_core] from eth_start_xmit+0x3b0/0x3d4 [u_ether]
eth_start_xmit [u_ether] from dev_hard_start_xmit+0x94/0x24c
dev_hard_start_xmit from sch_direct_xmit+0x104/0x2e4
sch_direct_xmit from __dev_queue_xmit+0x334/0xd88
__dev_queue_xmit from arp_solicit+0xf0/0x268
arp_solicit from neigh_probe+0x54/0x7c
neigh_probe from __neigh_event_send+0x22c/0x47c
__neigh_event_send from neigh_resolve_output+0x14c/0x1c0
neigh_resolve_output from ip_finish_output2+0x1c8/0x628
ip_finish_output2 from ip_send_skb+0x40/0xd8
ip_send_skb from udp_send_skb+0x124/0x340
udp_send_skb from udp_sendmsg+0x780/0x984
udp_sendmsg from __sys_sendto+0xd8/0x158
__sys_sendto from ret_fast_syscall+0x0/0x58

Let's fix the issue by checking for send_srp() and set_vbus() before
calling them. For USB peripheral only cases these both could be NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26600/">CVE-2024-26600 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26600">CVE-2024-26600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220340">SUSE bug 1220340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26602" ref_url="https://www.suse.com/security/cve/CVE-2024-26602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0900-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0926-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/membarrier: reduce the ability to hammer on sys_membarrier

On some systems, sys_membarrier can be very expensive, causing overall
slowdowns for everything.  So put a lock on the path in order to
serialize the accesses to prevent the ability for this to be called at
too high of a frequency and saturate the machine.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-26602/">CVE-2024-26602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26602">CVE-2024-26602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220398">SUSE bug 1220398</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26609" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26609" ref_url="https://www.suse.com/security/cve/CVE-2024-26609" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26609/">CVE-2024-26609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26609">CVE-2024-26609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221290">SUSE bug 1221290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26615" ref_url="https://www.suse.com/security/cve/CVE-2024-26615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix illegal rmb_desc access in SMC-D connection dump

A crash was found when dumping SMC-D connections. It can be reproduced
by following steps:

- run nginx/wrk test:
  smc_run nginx
  smc_run wrk -t 16 -c 1000 -d &lt;duration&gt; -H 'Connection: Close' &lt;URL&gt;

- continuously dump SMC-D connections in parallel:
  watch -n 1 'smcss -D'

 BUG: kernel NULL pointer dereference, address: 0000000000000030
 CPU: 2 PID: 7204 Comm: smcss Kdump: loaded Tainted: G	E      6.7.0+ #55
 RIP: 0010:__smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x24/0x70
  ? page_fault_oops+0x66/0x150
  ? exc_page_fault+0x69/0x140
  ? asm_exc_page_fault+0x26/0x30
  ? __smc_diag_dump.constprop.0+0x5e5/0x620 [smc_diag]
  ? __kmalloc_node_track_caller+0x35d/0x430
  ? __alloc_skb+0x77/0x170
  smc_diag_dump_proto+0xd0/0xf0 [smc_diag]
  smc_diag_dump+0x26/0x60 [smc_diag]
  netlink_dump+0x19f/0x320
  __netlink_dump_start+0x1dc/0x300
  smc_diag_handler_dump+0x6a/0x80 [smc_diag]
  ? __pfx_smc_diag_dump+0x10/0x10 [smc_diag]
  sock_diag_rcv_msg+0x121/0x140
  ? __pfx_sock_diag_rcv_msg+0x10/0x10
  netlink_rcv_skb+0x5a/0x110
  sock_diag_rcv+0x28/0x40
  netlink_unicast+0x22a/0x330
  netlink_sendmsg+0x1f8/0x420
  __sock_sendmsg+0xb0/0xc0
  ____sys_sendmsg+0x24e/0x300
  ? copy_msghdr_from_user+0x62/0x80
  ___sys_sendmsg+0x7c/0xd0
  ? __do_fault+0x34/0x160
  ? do_read_fault+0x5f/0x100
  ? do_fault+0xb0/0x110
  ? __handle_mm_fault+0x2b0/0x6c0
  __sys_sendmsg+0x4d/0x80
  do_syscall_64+0x69/0x180
  entry_SYSCALL_64_after_hwframe+0x6e/0x76

It is possible that the connection is in process of being established
when we dump it. Assumed that the connection has been registered in a
link group by smc_conn_create() but the rmb_desc has not yet been
initialized by smc_buf_create(), thus causing the illegal access to
conn-&gt;rmb_desc. So fix it by checking before dump.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26615/">CVE-2024-26615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26615">CVE-2024-26615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220942">SUSE bug 1220942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957437" comment="bpftool-7.4.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957438" comment="kernel-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957439" comment="kernel-abi-stablelists-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957440" comment="kernel-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957441" comment="kernel-cross-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957442" comment="kernel-debug-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957443" comment="kernel-debug-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957446" comment="kernel-debug-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957447" comment="kernel-debug-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957448" comment="kernel-debug-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957449" comment="kernel-debug-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957452" comment="kernel-doc-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957453" comment="kernel-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957454" comment="kernel-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957455" comment="kernel-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957456" comment="kernel-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957457" comment="kernel-tools-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957458" comment="kernel-tools-libs-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957460" comment="kernel-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957461" comment="kernel-uki-virt-addons-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957462" comment="libperf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957463" comment="perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957464" comment="python3-perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957465" comment="rtla-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957466" comment="rv-5.14.0-503.16.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26629</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26629" ref_url="https://www.suse.com/security/cve/CVE-2024-26629" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix RELEASE_LOCKOWNER

The test on so_count in nfsd4_release_lockowner() is nonsense and
harmful.  Revert to using check_for_locks(), changing that to not sleep.

First: harmful.
As is documented in the kdoc comment for nfsd4_release_lockowner(), the
test on so_count can transiently return a false positive resulting in a
return of NFS4ERR_LOCKS_HELD when in fact no locks are held.  This is
clearly a protocol violation and with the Linux NFS client it can cause
incorrect behaviour.

If RELEASE_LOCKOWNER is sent while some other thread is still
processing a LOCK request which failed because, at the time that request
was received, the given owner held a conflicting lock, then the nfsd
thread processing that LOCK request can hold a reference (conflock) to
the lock owner that causes nfsd4_release_lockowner() to return an
incorrect error.

The Linux NFS client ignores that NFS4ERR_LOCKS_HELD error because it
never sends NFS4_RELEASE_LOCKOWNER without first releasing any locks, so
it knows that the error is impossible.  It assumes the lock owner was in
fact released so it feels free to use the same lock owner identifier in
some later locking request.

When it does reuse a lock owner identifier for which a previous RELEASE
failed, it will naturally use a lock_seqid of zero.  However the server,
which didn't release the lock owner, will expect a larger lock_seqid and
so will respond with NFS4ERR_BAD_SEQID.

So clearly it is harmful to allow a false positive, which testing
so_count allows.

The test is nonsense because ... well... it doesn't mean anything.

so_count is the sum of three different counts.
1/ the set of states listed on so_stateids
2/ the set of active vfs locks owned by any of those states
3/ various transient counts such as for conflicting locks.

When it is tested against '2' it is clear that one of these is the
transient reference obtained by find_lockowner_str_locked().  It is not
clear what the other one is expected to be.

In practice, the count is often 2 because there is precisely one state
on so_stateids.  If there were more, this would fail.

In my testing I see two circumstances when RELEASE_LOCKOWNER is called.
In one case, CLOSE is called before RELEASE_LOCKOWNER.  That results in
all the lock states being removed, and so the lockowner being discarded
(it is removed when there are no more references which usually happens
when the lock state is discarded).  When nfsd4_release_lockowner() finds
that the lock owner doesn't exist, it returns success.

The other case shows an so_count of '2' and precisely one state listed
in so_stateid.  It appears that the Linux client uses a separate lock
owner for each file resulting in one lock state per lock owner, so this
test on '2' is safe.  For another client it might not be safe.

So this patch changes check_for_locks() to use the (newish)
find_any_file_locked() so that it doesn't take a reference on the
nfs4_file and so never calls nfsd_file_put(), and so never sleeps.  With
this check is it safe to restore the use of check_for_locks() rather
than testing so_count against the mysterious '2'.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26629/">CVE-2024-26629 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26629">CVE-2024-26629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221379">SUSE bug 1221379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26630" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26630" ref_url="https://www.suse.com/security/cve/CVE-2024-26630" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: cachestat: fix folio read-after-free in cache walk

In cachestat, we access the folio from the page cache's xarray to compute
its page offset, and check for its dirty and writeback flags.  However, we
do not hold a reference to the folio before performing these actions,
which means the folio can concurrently be released and reused as another
folio/page/slab.

Get around this altogether by just using xarray's existing machinery for
the folio page offsets and dirty/writeback states.

This changes behavior for tmpfs files to now always report zeroes in their
dirty and writeback counters.  This is okay as tmpfs doesn't follow
conventional writeback cache behavior: its pages get "cleaned" during
swapout, after which they're no longer resident etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26630/">CVE-2024-26630 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26630">CVE-2024-26630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221380">SUSE bug 1221380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26633" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26633" ref_url="https://www.suse.com/security/cve/CVE-2024-26633" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()

syzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken.

Reading frag_off can only be done if we pulled enough bytes
to skb-&gt;head. Currently we might access garbage.

[1]
BUG: KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0
ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0
ipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]
ip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
neigh_connected_output+0x569/0x660 net/core/neighbour.c:1592
neigh_output include/net/neighbour.h:542 [inline]
ip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137
ip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222
NF_HOOK_COND include/linux/netfilter.h:303 [inline]
ip6_output+0x323/0x610 net/ipv6/ip6_output.c:243
dst_output include/net/dst.h:451 [inline]
ip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155
ip6_send_skb net/ipv6/ip6_output.c:1952 [inline]
ip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972
rawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582
rawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920
inet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b

Uninit was created at:
slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768
slab_alloc_node mm/slub.c:3478 [inline]
__kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517
__do_kmalloc_node mm/slab_common.c:1006 [inline]
__kmalloc_node_track_caller+0x118/0x3c0 mm/slab_common.c:1027
kmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582
pskb_expand_head+0x226/0x1a00 net/core/skbuff.c:2098
__pskb_pull_tail+0x13b/0x2310 net/core/skbuff.c:2655
pskb_may_pull_reason include/linux/skbuff.h:2673 [inline]
pskb_may_pull include/linux/skbuff.h:2681 [inline]
ip6_tnl_parse_tlv_enc_lim+0x901/0xbb0 net/ipv6/ip6_tunnel.c:408
ipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]
ip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432
__netdev_start_xmit include/linux/netdevice.h:4940 [inline]
netdev_start_xmit include/linux/netdevice.h:4954 [inline]
xmit_one net/core/dev.c:3548 [inline]
dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564
__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349
dev_queue_xmit include/linux/netdevice.h:3134 [inline]
neigh_connected_output+0x569/0x660 net/core/neighbour.c:1592
neigh_output include/net/neighbour.h:542 [inline]
ip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137
ip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222
NF_HOOK_COND include/linux/netfilter.h:303 [inline]
ip6_output+0x323/0x610 net/ipv6/ip6_output.c:243
dst_output include/net/dst.h:451 [inline]
ip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155
ip6_send_skb net/ipv6/ip6_output.c:1952 [inline]
ip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972
rawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582
rawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920
inet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendms
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26633/">CVE-2024-26633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26633">CVE-2024-26633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221647">SUSE bug 1221647</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26640</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26640" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26640" ref_url="https://www.suse.com/security/cve/CVE-2024-26640" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: add sanity checks to rx zerocopy

TCP rx zerocopy intent is to map pages initially allocated
from NIC drivers, not pages owned by a fs.

This patch adds to can_map_frag() these additional checks:

- Page must not be a compound one.
- page-&gt;mapping must be NULL.

This fixes the panic reported by ZhangPeng.

syzbot was able to loopback packets built with sendfile(),
mapping pages owned by an ext4 file to TCP rx zerocopy.

r3 = socket$inet_tcp(0x2, 0x1, 0x0)
mmap(&amp;(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0)
r4 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r4, &amp;(0x7f0000000000)={0x2, 0x4e24, @multicast1}, 0x10)
connect$inet(r4, &amp;(0x7f00000006c0)={0x2, 0x4e24, @empty}, 0x10)
r5 = openat$dir(0xffffffffffffff9c, &amp;(0x7f00000000c0)='./file0\x00',
    0x181e42, 0x0)
fallocate(r5, 0x0, 0x0, 0x85b8)
sendfile(r4, r5, 0x0, 0x8ba0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23,
    &amp;(0x7f00000001c0)={&amp;(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0,
    0x0, 0x0, 0x0, 0x0}, &amp;(0x7f0000000440)=0x40)
r6 = openat$dir(0xffffffffffffff9c, &amp;(0x7f00000000c0)='./file0\x00',
    0x181e42, 0x0)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26640/">CVE-2024-26640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26640">CVE-2024-26640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221650">SUSE bug 1221650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26642" ref_url="https://www.suse.com/security/cve/CVE-2024-26642" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow anonymous set with timeout flag

Anonymous sets are never used with timeout from userspace, reject this.
Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26642/">CVE-2024-26642 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26642">CVE-2024-26642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221830">SUSE bug 1221830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870112" comment="bpftool-7.3.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870113" comment="kernel-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870114" comment="kernel-abi-stablelists-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870115" comment="kernel-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870116" comment="kernel-cross-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870117" comment="kernel-debug-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870118" comment="kernel-debug-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870121" comment="kernel-debug-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870122" comment="kernel-debug-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870123" comment="kernel-debug-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870124" comment="kernel-debug-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870127" comment="kernel-doc-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870128" comment="kernel-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870129" comment="kernel-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870130" comment="kernel-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870131" comment="kernel-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870132" comment="kernel-tools-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870133" comment="kernel-tools-libs-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870135" comment="kernel-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870136" comment="libperf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870137" comment="perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870138" comment="python3-perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870139" comment="rtla-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870140" comment="rv-5.14.0-427.18.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26643</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26643" ref_url="https://www.suse.com/security/cve/CVE-2024-26643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout

While the rhashtable set gc runs asynchronously, a race allows it to
collect elements from anonymous sets with timeouts while it is being
released from the commit path.

Mingi Cho originally reported this issue in a different path in 6.1.x
with a pipapo set with low timeouts which is not possible upstream since
7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set
element timeout").

Fix this by setting on the dead flag for anonymous sets to skip async gc
in this case.

According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on
transaction abort"), Florian plans to accelerate abort path by releasing
objects via workqueue, therefore, this sets on the dead flag for abort
path too.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26643/">CVE-2024-26643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26643">CVE-2024-26643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221829">SUSE bug 1221829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870112" comment="bpftool-7.3.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870113" comment="kernel-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870114" comment="kernel-abi-stablelists-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870115" comment="kernel-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870116" comment="kernel-cross-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870117" comment="kernel-debug-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870118" comment="kernel-debug-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870121" comment="kernel-debug-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870122" comment="kernel-debug-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870123" comment="kernel-debug-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870124" comment="kernel-debug-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870127" comment="kernel-doc-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870128" comment="kernel-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870129" comment="kernel-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870130" comment="kernel-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870131" comment="kernel-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870132" comment="kernel-tools-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870133" comment="kernel-tools-libs-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870135" comment="kernel-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870136" comment="libperf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870137" comment="perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870138" comment="python3-perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870139" comment="rtla-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870140" comment="rv-5.14.0-427.18.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26649</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26649" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26649" ref_url="https://www.suse.com/security/cve/CVE-2024-26649" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix the null pointer when load rlc firmware

If the RLC firmware is invalid because of wrong header size,
the pointer to the rlc firmware is released in function
amdgpu_ucode_request. There will be a null pointer error
in subsequent use. So skip validation to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26649/">CVE-2024-26649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26649">CVE-2024-26649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222055">SUSE bug 1222055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26664" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26664" ref_url="https://www.suse.com/security/cve/CVE-2024-26664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1322-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1332-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (coretemp) Fix out-of-bounds memory access

Fix a bug that pdata-&gt;cpu_map[] is set before out-of-bounds check.
The problem might be triggered on systems with more than 128 cores per
package.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26664/">CVE-2024-26664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26664">CVE-2024-26664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222355">SUSE bug 1222355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010030742" comment="bpftool-7.3.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030743" comment="kernel-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030744" comment="kernel-abi-stablelists-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030745" comment="kernel-core-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030746" comment="kernel-cross-headers-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030747" comment="kernel-debug-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030748" comment="kernel-debug-core-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030751" comment="kernel-debug-modules-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030752" comment="kernel-debug-modules-core-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030753" comment="kernel-debug-modules-extra-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030754" comment="kernel-debug-uki-virt-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030757" comment="kernel-doc-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030758" comment="kernel-headers-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030759" comment="kernel-modules-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030760" comment="kernel-modules-core-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030761" comment="kernel-modules-extra-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030762" comment="kernel-tools-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030763" comment="kernel-tools-libs-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030765" comment="kernel-uki-virt-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030766" comment="libperf-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030767" comment="perf-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030768" comment="python3-perf-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030769" comment="rtla-5.14.0-427.22.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010030770" comment="rv-5.14.0-427.22.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26668" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26668" ref_url="https://www.suse.com/security/cve/CVE-2024-26668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_limit: reject configurations that cause integer overflow

Reject bogus configs where internal token counter wraps around.
This only occurs with very very large requests, such as 17gbyte/s.

Its better to reject this rather than having incorrect ratelimit.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26668/">CVE-2024-26668 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26668">CVE-2024-26668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222335">SUSE bug 1222335</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26671" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26671" ref_url="https://www.suse.com/security/cve/CVE-2024-26671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: fix IO hang from sbitmap wakeup race

In blk_mq_mark_tag_wait(), __add_wait_queue() may be re-ordered
with the following blk_mq_get_driver_tag() in case of getting driver
tag failure.

Then in __sbitmap_queue_wake_up(), waitqueue_active() may not observe
the added waiter in blk_mq_mark_tag_wait() and wake up nothing, meantime
blk_mq_mark_tag_wait() can't get driver tag successfully.

This issue can be reproduced by running the following test in loop, and
fio hang can be observed in &lt; 30min when running it on my test VM
in laptop.

	modprobe -r scsi_debug
	modprobe scsi_debug delay=0 dev_size_mb=4096 max_queue=1 host_max_queue=1 submit_queues=4
	dev=`ls -d /sys/bus/pseudo/drivers/scsi_debug/adapter*/host*/target*/*/block/* | head -1 | xargs basename`
	fio --filename=/dev/"$dev" --direct=1 --rw=randrw --bs=4k --iodepth=1 \
       		--runtime=100 --numjobs=40 --time_based --name=test \
        	--ioengine=libaio

Fix the issue by adding one explicit barrier in blk_mq_mark_tag_wait(), which
is just fine in case of running out of tag.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26671/">CVE-2024-26671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26671">CVE-2024-26671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222357">SUSE bug 1222357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26673" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26673" ref_url="https://www.suse.com/security/cve/CVE-2024-26673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations

- Disallow families other than NFPROTO_{IPV4,IPV6,INET}.
- Disallow layer 4 protocol with no ports, since destination port is a
  mandatory attribute for this object.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26673/">CVE-2024-26673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26673">CVE-2024-26673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222368">SUSE bug 1222368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870112" comment="bpftool-7.3.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870113" comment="kernel-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870114" comment="kernel-abi-stablelists-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870115" comment="kernel-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870116" comment="kernel-cross-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870117" comment="kernel-debug-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870118" comment="kernel-debug-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870121" comment="kernel-debug-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870122" comment="kernel-debug-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870123" comment="kernel-debug-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870124" comment="kernel-debug-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870127" comment="kernel-doc-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870128" comment="kernel-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870129" comment="kernel-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870130" comment="kernel-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870131" comment="kernel-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870132" comment="kernel-tools-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870133" comment="kernel-tools-libs-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870135" comment="kernel-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870136" comment="libperf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870137" comment="perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870138" comment="python3-perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870139" comment="rtla-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870140" comment="rv-5.14.0-427.18.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26720</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26720" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26720" ref_url="https://www.suse.com/security/cve/CVE-2024-26720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-26720/">CVE-2024-26720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26720">CVE-2024-26720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26735" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26735" ref_url="https://www.suse.com/security/cve/CVE-2024-26735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: fix possible use-after-free and null-ptr-deref

The pernet operations structure for the subsystem must be registered
before registering the generic netlink family.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26735/">CVE-2024-26735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26735">CVE-2024-26735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222372">SUSE bug 1222372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870141" comment="bpftool-7.3.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870142" comment="kernel-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870143" comment="kernel-abi-stablelists-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870144" comment="kernel-core-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870145" comment="kernel-cross-headers-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870146" comment="kernel-debug-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870147" comment="kernel-debug-core-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870150" comment="kernel-debug-modules-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870151" comment="kernel-debug-modules-core-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870152" comment="kernel-debug-modules-extra-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870153" comment="kernel-debug-uki-virt-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870156" comment="kernel-doc-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870157" comment="kernel-headers-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870158" comment="kernel-modules-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870159" comment="kernel-modules-core-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870160" comment="kernel-modules-extra-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870161" comment="kernel-tools-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870162" comment="kernel-tools-libs-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870164" comment="kernel-uki-virt-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870165" comment="libperf-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870166" comment="perf-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870167" comment="python3-perf-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870168" comment="rtla-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870169" comment="rv-5.14.0-427.20.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26737" ref_url="https://www.suse.com/security/cve/CVE-2024-26737" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel

The following race is possible between bpf_timer_cancel_and_free
and bpf_timer_cancel. It will lead a UAF on the timer-&gt;timer.

bpf_timer_cancel();
	spin_lock();
	t = timer-&gt;time;
	spin_unlock();

					bpf_timer_cancel_and_free();
						spin_lock();
						t = timer-&gt;timer;
						timer-&gt;timer = NULL;
						spin_unlock();
						hrtimer_cancel(&amp;t-&gt;timer);
						kfree(t);

	/* UAF on t */
	hrtimer_cancel(&amp;t-&gt;timer);

In bpf_timer_cancel_and_free, this patch frees the timer-&gt;timer
after a rcu grace period. This requires a rcu_head addition
to the "struct bpf_hrtimer". Another kfree(t) happens in bpf_timer_init,
this does not need a kfree_rcu because it is still under the
spin_lock and timer-&gt;timer has not been visible by others yet.

In bpf_timer_cancel, rcu_read_lock() is added because this helper
can be used in a non rcu critical section context (e.g. from
a sleepable bpf prog). Other timer-&gt;timer usages in helpers.c
have been audited, bpf_timer_cancel() is the only place where
timer-&gt;timer is used outside of the spin_lock.

Another solution considered is to mark a t-&gt;flag in bpf_timer_cancel
and clear it after hrtimer_cancel() is done.  In bpf_timer_cancel_and_free,
it busy waits for the flag to be cleared before kfree(t). This patch
goes with a straight forward solution and frees timer-&gt;timer after
a rcu grace period.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26737/">CVE-2024-26737 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26737">CVE-2024-26737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222557">SUSE bug 1222557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26739" ref_url="https://www.suse.com/security/cve/CVE-2024-26739" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_mirred: don't override retval if we already lost the skb

If we're redirecting the skb, and haven't called tcf_mirred_forward(),
yet, we need to tell the core to drop the skb by setting the retcode
to SHOT. If we have called tcf_mirred_forward(), however, the skb
is out of our hands and returning SHOT will lead to UaF.

Move the retval override to the error path which actually need it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26739/">CVE-2024-26739 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26739">CVE-2024-26739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222559">SUSE bug 1222559</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26773</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26773" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26773" ref_url="https://www.suse.com/security/cve/CVE-2024-26773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1641-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()

Determine if the group block bitmap is corrupted before using ac_b_ex in
ext4_mb_try_best_found() to avoid allocating blocks from a group with a
corrupted block bitmap in the following concurrency and making the
situation worse.

ext4_mb_regular_allocator
  ext4_lock_group(sb, group)
  ext4_mb_good_group
   // check if the group bbitmap is corrupted
  ext4_mb_complex_scan_group
   // Scan group gets ac_b_ex but doesn't use it
  ext4_unlock_group(sb, group)
                           ext4_mark_group_bitmap_corrupted(group)
                           // The block bitmap was corrupted during
                           // the group unlock gap.
  ext4_mb_try_best_found
    ext4_lock_group(ac-&gt;ac_sb, group)
    ext4_mb_use_best_found
      mb_mark_used
      // Allocating blocks in block bitmap corrupted group
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26773/">CVE-2024-26773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26773">CVE-2024-26773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222618">SUSE bug 1222618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26783" ref_url="https://www.suse.com/security/cve/CVE-2024-26783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmscan: fix a bug calling wakeup_kswapd() with a wrong zone index

With numa balancing on, when a numa system is running where a numa node
doesn't have its local memory so it has no managed zones, the following
oops has been observed.  It's because wakeup_kswapd() is called with a
wrong zone index, -1.  Fixed it by checking the index before calling
wakeup_kswapd().

&gt; BUG: unable to handle page fault for address: 00000000000033f3
&gt; #PF: supervisor read access in kernel mode
&gt; #PF: error_code(0x0000) - not-present page
&gt; PGD 0 P4D 0
&gt; Oops: 0000 [#1] PREEMPT SMP NOPTI
&gt; CPU: 2 PID: 895 Comm: masim Not tainted 6.6.0-dirty #255
&gt; Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
&gt;    rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
&gt; RIP: 0010:wakeup_kswapd (./linux/mm/vmscan.c:7812)
&gt; Code: (omitted)
&gt; RSP: 0000:ffffc90004257d58 EFLAGS: 00010286
&gt; RAX: ffffffffffffffff RBX: ffff88883fff0480 RCX: 0000000000000003
&gt; RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff88883fff0480
&gt; RBP: ffffffffffffffff R08: ff0003ffffffffff R09: ffffffffffffffff
&gt; R10: ffff888106c95540 R11: 0000000055555554 R12: 0000000000000003
&gt; R13: 0000000000000000 R14: 0000000000000000 R15: ffff88883fff0940
&gt; FS:  00007fc4b8124740(0000) GS:ffff888827c00000(0000) knlGS:0000000000000000
&gt; CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&gt; CR2: 00000000000033f3 CR3: 000000026cc08004 CR4: 0000000000770ee0
&gt; DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
&gt; DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
&gt; PKRU: 55555554
&gt; Call Trace:
&gt;  &lt;TASK&gt;
&gt; ? __die
&gt; ? page_fault_oops
&gt; ? __pte_offset_map_lock
&gt; ? exc_page_fault
&gt; ? asm_exc_page_fault
&gt; ? wakeup_kswapd
&gt; migrate_misplaced_page
&gt; __handle_mm_fault
&gt; handle_mm_fault
&gt; do_user_addr_fault
&gt; exc_page_fault
&gt; asm_exc_page_fault
&gt; RIP: 0033:0x55b897ba0808
&gt; Code: (omitted)
&gt; RSP: 002b:00007ffeefa821a0 EFLAGS: 00010287
&gt; RAX: 000055b89983acd0 RBX: 00007ffeefa823f8 RCX: 000055b89983acd0
&gt; RDX: 00007fc2f8122010 RSI: 0000000000020000 RDI: 000055b89983acd0
&gt; RBP: 00007ffeefa821a0 R08: 0000000000000037 R09: 0000000000000075
&gt; R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
&gt; R13: 00007ffeefa82410 R14: 000055b897ba5dd8 R15: 00007fc4b8340000
&gt;  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26783/">CVE-2024-26783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26783">CVE-2024-26783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222615">SUSE bug 1222615</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26801" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26801" ref_url="https://www.suse.com/security/cve/CVE-2024-26801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Avoid potential use-after-free in hci_error_reset

While handling the HCI_EV_HARDWARE_ERROR event, if the underlying
BT controller is not responding, the GPIO reset mechanism would
free the hci_dev and lead to a use-after-free in hci_error_reset.

Here's the call trace observed on a ChromeOS device with Intel AX201:
   queue_work_on+0x3e/0x6c
   __hci_cmd_sync_sk+0x2ee/0x4c0 [bluetooth &lt;HASH:3b4a6&gt;]
   ? init_wait_entry+0x31/0x31
   __hci_cmd_sync+0x16/0x20 [bluetooth &lt;HASH:3b4a 6&gt;]
   hci_error_reset+0x4f/0xa4 [bluetooth &lt;HASH:3b4a 6&gt;]
   process_one_work+0x1d8/0x33f
   worker_thread+0x21b/0x373
   kthread+0x13a/0x152
   ? pr_cont_work+0x54/0x54
   ? kthread_blkcg+0x31/0x31
    ret_from_fork+0x1f/0x30

This patch holds the reference count on the hci_dev while processing
a HCI_EV_HARDWARE_ERROR event to avoid potential crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26801/">CVE-2024-26801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26801">CVE-2024-26801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222413">SUSE bug 1222413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26804" ref_url="https://www.suse.com/security/cve/CVE-2024-26804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ip_tunnel: prevent perpetual headroom growth

syzkaller triggered following kasan splat:
BUG: KASAN: use-after-free in __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
Read of size 1 at addr ffff88812fb4000e by task syz-executor183/5191
[..]
 kasan_report+0xda/0x110 mm/kasan/report.c:588
 __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170
 skb_flow_dissect_flow_keys include/linux/skbuff.h:1514 [inline]
 ___skb_get_hash net/core/flow_dissector.c:1791 [inline]
 __skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856
 skb_get_hash include/linux/skbuff.h:1556 [inline]
 ip_tunnel_xmit+0x1855/0x33c0 net/ipv4/ip_tunnel.c:748
 ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349
 dev_queue_xmit include/linux/netdevice.h:3134 [inline]
 neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592
 ...
 ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235
 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c:323
 ..
 iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82
 ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831
 ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665
 __netdev_start_xmit include/linux/netdevice.h:4940 [inline]
 netdev_start_xmit include/linux/netdevice.h:4954 [inline]
 xmit_one net/core/dev.c:3548 [inline]
 dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564
 ...

The splat occurs because skb-&gt;data points past skb-&gt;head allocated area.
This is because neigh layer does:
  __skb_pull(skb, skb_network_offset(skb));

... but skb_network_offset() returns a negative offset and __skb_pull()
arg is unsigned.  IOW, we skb-&gt;data gets "adjusted" by a huge value.

The negative value is returned because skb-&gt;head and skb-&gt;data distance is
more than 64k and skb-&gt;network_header (u16) has wrapped around.

The bug is in the ip_tunnel infrastructure, which can cause
dev-&gt;needed_headroom to increment ad infinitum.

The syzkaller reproducer consists of packets getting routed via a gre
tunnel, and route of gre encapsulated packets pointing at another (ipip)
tunnel.  The ipip encapsulation finds gre0 as next output device.

This results in the following pattern:

1). First packet is to be sent out via gre0.
Route lookup found an output device, ipip0.

2).
ip_tunnel_xmit for gre0 bumps gre0-&gt;needed_headroom based on the future
output device, rt.dev-&gt;needed_headroom (ipip0).

3).
ip output / start_xmit moves skb on to ipip0. which runs the same
code path again (xmit recursion).

4).
Routing step for the post-gre0-encap packet finds gre0 as output device
to use for ipip0 encapsulated packet.

tunl0-&gt;needed_headroom is then incremented based on the (already bumped)
gre0 device headroom.

This repeats for every future packet:

gre0-&gt;needed_headroom gets inflated because previous packets' ipip0 step
incremented rt-&gt;dev (gre0) headroom, and ipip0 incremented because gre0
needed_headroom was increased.

For each subsequent packet, gre/ipip0-&gt;needed_headroom grows until
post-expand-head reallocations result in a skb-&gt;head/data distance of
more than 64k.

Once that happens, skb-&gt;network_header (u16) wraps around when
pskb_expand_head tries to make sure that skb_network_offset() is unchanged
after the headroom expansion/reallocation.

After this skb_network_offset(skb) returns a different (and negative)
result post headroom expansion.

The next trip to neigh layer (or anything else that would __skb_pull the
network header) makes skb-&gt;data point to a memory location outside
skb-&gt;head area.

v2: Cap the needed_headroom update to an arbitarily chosen upperlimit to
prevent perpetual increase instead of dropping the headroom increment
completely.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26804/">CVE-2024-26804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26804">CVE-2024-26804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222629">SUSE bug 1222629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870112" comment="bpftool-7.3.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870113" comment="kernel-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870114" comment="kernel-abi-stablelists-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870115" comment="kernel-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870116" comment="kernel-cross-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870117" comment="kernel-debug-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870118" comment="kernel-debug-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870121" comment="kernel-debug-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870122" comment="kernel-debug-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870123" comment="kernel-debug-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870124" comment="kernel-debug-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870127" comment="kernel-doc-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870128" comment="kernel-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870129" comment="kernel-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870130" comment="kernel-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870131" comment="kernel-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870132" comment="kernel-tools-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870133" comment="kernel-tools-libs-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870135" comment="kernel-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870136" comment="libperf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870137" comment="perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870138" comment="python3-perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870139" comment="rtla-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870140" comment="rv-5.14.0-427.18.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26808</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26808" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26808" ref_url="https://www.suse.com/security/cve/CVE-2024-26808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain

Remove netdevice from inet/ingress basechain in case NETDEV_UNREGISTER
event is reported, otherwise a stale reference to netdevice remains in
the hook list.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26808/">CVE-2024-26808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26808">CVE-2024-26808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222634">SUSE bug 1222634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245772">SUSE bug 1245772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26810" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26810" ref_url="https://www.suse.com/security/cve/CVE-2024-26810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Lock external INTx masking ops

Mask operations through config space changes to DisINTx may race INTx
configuration changes via ioctl.  Create wrappers that add locking for
paths outside of the core interrupt code.

In particular, irq_type is updated holding igate, therefore testing
is_intx() requires holding igate.  For example clearing DisINTx from
config space can otherwise race changes of the interrupt configuration.

This aligns interfaces which may trigger the INTx eventfd into two
camps, one side serialized by igate and the other only enabled while
INTx is configured.  A subsequent patch introduces synchronization for
the latter flows.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26810/">CVE-2024-26810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26810">CVE-2024-26810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222803">SUSE bug 1222803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26826" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26826" ref_url="https://www.suse.com/security/cve/CVE-2024-26826" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix data re-injection from stale subflow

When the MPTCP PM detects that a subflow is stale, all the packet
scheduler must re-inject all the mptcp-level unacked data. To avoid
acquiring unneeded locks, it first try to check if any unacked data
is present at all in the RTX queue, but such check is currently
broken, as it uses TCP-specific helper on an MPTCP socket.

Funnily enough fuzzers and static checkers are happy, as the accessed
memory still belongs to the mptcp_sock struct, and even from a
functional perspective the recovery completed successfully, as
the short-cut test always failed.

A recent unrelated TCP change - commit d5fed5addb2b ("tcp: reorganize
tcp_sock fast path variables") - exposed the issue, as the tcp field
reorganization makes the mptcp code always skip the re-inection.

Fix the issue dropping the bogus call: we are on a slow path, the early
optimization proved once again to be evil.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26826/">CVE-2024-26826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26826">CVE-2024-26826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223010">SUSE bug 1223010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26828" ref_url="https://www.suse.com/security/cve/CVE-2024-26828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: fix underflow in parse_server_interfaces()

In this loop, we step through the buffer and after each item we check
if the size_left is greater than the minimum size we need.  However,
the problem is that "bytes_left" is type ssize_t while sizeof() is type
size_t.  That means that because of type promotion, the comparison is
done as an unsigned and if we have negative bytes left the loop
continues instead of ending.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26828/">CVE-2024-26828 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26828">CVE-2024-26828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223084">SUSE bug 1223084</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223363">SUSE bug 1223363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26830" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26830" ref_url="https://www.suse.com/security/cve/CVE-2024-26830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Do not allow untrusted VF to remove administratively set MAC

Currently when PF administratively sets VF's MAC address and the VF
is put down (VF tries to delete all MACs) then the MAC is removed
from MAC filters and primary VF MAC is zeroed.

Do not allow untrusted VF to remove primary MAC when it was set
administratively by PF.

Reproducer:
1) Create VF
2) Set VF interface up
3) Administratively set the VF's MAC
4) Put VF interface down

[root@host ~]# echo 1 &gt; /sys/class/net/enp2s0f0/device/sriov_numvfs
[root@host ~]# ip link set enp2s0f0v0 up
[root@host ~]# ip link set enp2s0f0 vf 0 mac fe:6c:b5:da:c7:7d
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether fe:6c:b5:da:c7:7d brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
[root@host ~]# ip link set enp2s0f0v0 down
[root@host ~]# ip link show enp2s0f0
23: enp2s0f0: &lt;BROADCAST,MULTICAST,UP,LOWER_UP&gt; mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000
    link/ether 3c:ec:ef:b7:dd:04 brd ff:ff:ff:ff:ff:ff
    vf 0     link/ether 00:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff, spoof checking on, link-state auto, trust off
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26830/">CVE-2024-26830 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26830">CVE-2024-26830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223012">SUSE bug 1223012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26852" ref_url="https://www.suse.com/security/cve/CVE-2024-26852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: avoid possible UAF in ip6_route_mpath_notify()

syzbot found another use-after-free in ip6_route_mpath_notify() [1]

Commit f7225172f25a ("net/ipv6: prevent use after free in
ip6_route_mpath_notify") was not able to fix the root cause.

We need to defer the fib6_info_release() calls after
ip6_route_mpath_notify(), in the cleanup phase.

[1]
BUG: KASAN: slab-use-after-free in rt6_fill_node+0x1460/0x1ac0
Read of size 4 at addr ffff88809a07fc64 by task syz-executor.2/23037

CPU: 0 PID: 23037 Comm: syz-executor.2 Not tainted 6.8.0-rc4-syzkaller-01035-gea7f3cfaa588 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x1e7/0x2e0 lib/dump_stack.c:106
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x167/0x540 mm/kasan/report.c:488
  kasan_report+0x142/0x180 mm/kasan/report.c:601
 rt6_fill_node+0x1460/0x1ac0
  inet6_rt_notify+0x13b/0x290 net/ipv6/route.c:6184
  ip6_route_mpath_notify net/ipv6/route.c:5198 [inline]
  ip6_route_multipath_add net/ipv6/route.c:5404 [inline]
  inet6_rtm_newroute+0x1d0f/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f73dd87dda9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f73de6550c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f73dd9ac050 RCX: 00007f73dd87dda9
RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000005
RBP: 00007f73dd8ca47a R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000006e R14: 00007f73dd9ac050 R15: 00007ffdbdeb7858
 &lt;/TASK&gt;

Allocated by task 23037:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:372 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:389
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:3981 [inline]
  __kmalloc+0x22e/0x490 mm/slub.c:3994
  kmalloc include/linux/slab.h:594 [inline]
  kzalloc include/linux/slab.h:711 [inline]
  fib6_info_alloc+0x2e/0xf0 net/ipv6/ip6_fib.c:155
  ip6_route_info_create+0x445/0x12b0 net/ipv6/route.c:3758
  ip6_route_multipath_add net/ipv6/route.c:5298 [inline]
  inet6_rtm_newroute+0x744/0x2300 net/ipv6/route.c:5517
  rtnetlink_rcv_msg+0x885/0x1040 net/core/rtnetlink.c:6597
  netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543
  netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
  netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367
  netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x221/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584
  ___sys_sendmsg net/socket.c:2638 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667
 do_syscall_64+0xf9/0x240
 entry_SYSCALL_64_after_hwframe+0x6f/0x77

Freed by task 16:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x4e/0x60 mm/kasan/generic.c:640
  poison_slab_object+0xa6/0xe0 m
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26852/">CVE-2024-26852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26852">CVE-2024-26852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223057">SUSE bug 1223057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223059">SUSE bug 1223059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26853" ref_url="https://www.suse.com/security/cve/CVE-2024-26853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: avoid returning frame twice in XDP_REDIRECT

When a frame can not be transmitted in XDP_REDIRECT
(e.g. due to a full queue), it is necessary to free
it by calling xdp_return_frame_rx_napi.

However, this is the responsibility of the caller of
the ndo_xdp_xmit (see for example bq_xmit_all in
kernel/bpf/devmap.c) and thus calling it inside
igc_xdp_xmit (which is the ndo_xdp_xmit of the igc
driver) as well will lead to memory corruption.

In fact, bq_xmit_all expects that it can return all
frames after the last successfully transmitted one.
Therefore, break for the first not transmitted frame,
but do not call xdp_return_frame_rx_napi in igc_xdp_xmit.
This is equally implemented in other Intel drivers
such as the igb.

There are two alternatives to this that were rejected:
1. Return num_frames as all the frames would have been
   transmitted and release them inside igc_xdp_xmit.
   While it might work technically, it is not what
   the return value is meant to represent (i.e. the
   number of SUCCESSFULLY transmitted packets).
2. Rework kernel/bpf/devmap.c and all drivers to
   support non-consecutively dropped packets.
   Besides being complex, it likely has a negative
   performance impact without a significant gain
   since it is anyway unlikely that the next frame
   can be transmitted if the previous one was dropped.

The memory corruption can be reproduced with
the following script which leads to a kernel panic
after a few seconds.  It basically generates more
traffic than a i225 NIC can transmit and pushes it
via XDP_REDIRECT from a virtual interface to the
physical interface where frames get dropped.

   #!/bin/bash
   INTERFACE=enp4s0
   INTERFACE_IDX=`cat /sys/class/net/$INTERFACE/ifindex`

   sudo ip link add dev veth1 type veth peer name veth2
   sudo ip link set up $INTERFACE
   sudo ip link set up veth1
   sudo ip link set up veth2

   cat &lt;&lt; EOF &gt; redirect.bpf.c

   SEC("prog")
   int redirect(struct xdp_md *ctx)
   {
       return bpf_redirect($INTERFACE_IDX, 0);
   }

   char _license[] SEC("license") = "GPL";
   EOF
   clang -O2 -g -Wall -target bpf -c redirect.bpf.c -o redirect.bpf.o
   sudo ip link set veth2 xdp obj redirect.bpf.o

   cat &lt;&lt; EOF &gt; pass.bpf.c

   SEC("prog")
   int pass(struct xdp_md *ctx)
   {
       return XDP_PASS;
   }

   char _license[] SEC("license") = "GPL";
   EOF
   clang -O2 -g -Wall -target bpf -c pass.bpf.c -o pass.bpf.o
   sudo ip link set $INTERFACE xdp obj pass.bpf.o

   cat &lt;&lt; EOF &gt; trafgen.cfg

   {
     /* Ethernet Header */
     0xe8, 0x6a, 0x64, 0x41, 0xbf, 0x46,
     0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
     const16(ETH_P_IP),

     /* IPv4 Header */
     0b01000101, 0,   # IPv4 version, IHL, TOS
     const16(1028),   # IPv4 total length (UDP length + 20 bytes (IP header))
     const16(2),      # IPv4 ident
     0b01000000, 0,   # IPv4 flags, fragmentation off
     64,              # IPv4 TTL
     17,              # Protocol UDP
     csumip(14, 33),  # IPv4 checksum

     /* UDP Header */
     10,  0, 1, 1,    # IP Src - adapt as needed
     10,  0, 1, 2,    # IP Dest - adapt as needed
     const16(6666),   # UDP Src Port
     const16(6666),   # UDP Dest Port
     const16(1008),   # UDP length (UDP header 8 bytes + payload length)
     csumudp(14, 34), # UDP checksum

     /* Payload */
     fill('W', 1000),
   }
   EOF

   sudo trafgen -i trafgen.cfg -b3000MB -o veth1 --cpp
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26853/">CVE-2024-26853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26853">CVE-2024-26853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223061">SUSE bug 1223061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26855" ref_url="https://www.suse.com/security/cve/CVE-2024-26855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ice: Fix potential NULL pointer dereference in ice_bridge_setlink()

The function ice_bridge_setlink() may encounter a NULL pointer dereference
if nlmsg_find_attr() returns NULL and br_spec is dereferenced subsequently
in nla_for_each_nested(). To address this issue, add a check to ensure that
br_spec is not NULL before proceeding with the nested attribute iteration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26855/">CVE-2024-26855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26855">CVE-2024-26855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223051">SUSE bug 1223051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26858" ref_url="https://www.suse.com/security/cve/CVE-2024-26858" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Use a memory barrier to enforce PTP WQ xmit submission tracking occurs after populating the metadata_map

Just simply reordering the functions mlx5e_ptp_metadata_map_put and
mlx5e_ptpsq_track_metadata in the mlx5e_txwqe_complete context is not good
enough since both the compiler and CPU are free to reorder these two
functions. If reordering does occur, the issue that was supposedly fixed by
7e3f3ba97e6c ("net/mlx5e: Track xmit submission to PTP WQ after populating
metadata map") will be seen. This will lead to NULL pointer dereferences in
mlx5e_ptpsq_mark_ts_cqes_undelivered in the NAPI polling context due to the
tracking list being populated before the metadata map.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26858/">CVE-2024-26858 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26858">CVE-2024-26858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223020">SUSE bug 1223020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26868</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26868" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26868" ref_url="https://www.suse.com/security/cve/CVE-2024-26868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: fix panic when nfs4_ff_layout_prepare_ds() fails

We've been seeing the following panic in production

BUG: kernel NULL pointer dereference, address: 0000000000000065
PGD 2f485f067 P4D 2f485f067 PUD 2cc5d8067 PMD 0
RIP: 0010:ff_layout_cancel_io+0x3a/0x90 [nfs_layout_flexfiles]
Call Trace:
 &lt;TASK&gt;
 ? __die+0x78/0xc0
 ? page_fault_oops+0x286/0x380
 ? __rpc_execute+0x2c3/0x470 [sunrpc]
 ? rpc_new_task+0x42/0x1c0 [sunrpc]
 ? exc_page_fault+0x5d/0x110
 ? asm_exc_page_fault+0x22/0x30
 ? ff_layout_free_layoutreturn+0x110/0x110 [nfs_layout_flexfiles]
 ? ff_layout_cancel_io+0x3a/0x90 [nfs_layout_flexfiles]
 ? ff_layout_cancel_io+0x6f/0x90 [nfs_layout_flexfiles]
 pnfs_mark_matching_lsegs_return+0x1b0/0x360 [nfsv4]
 pnfs_error_mark_layout_for_return+0x9e/0x110 [nfsv4]
 ? ff_layout_send_layouterror+0x50/0x160 [nfs_layout_flexfiles]
 nfs4_ff_layout_prepare_ds+0x11f/0x290 [nfs_layout_flexfiles]
 ff_layout_pg_init_write+0xf0/0x1f0 [nfs_layout_flexfiles]
 __nfs_pageio_add_request+0x154/0x6c0 [nfs]
 nfs_pageio_add_request+0x26b/0x380 [nfs]
 nfs_do_writepage+0x111/0x1e0 [nfs]
 nfs_writepages_callback+0xf/0x30 [nfs]
 write_cache_pages+0x17f/0x380
 ? nfs_pageio_init_write+0x50/0x50 [nfs]
 ? nfs_writepages+0x6d/0x210 [nfs]
 ? nfs_writepages+0x6d/0x210 [nfs]
 nfs_writepages+0x125/0x210 [nfs]
 do_writepages+0x67/0x220
 ? generic_perform_write+0x14b/0x210
 filemap_fdatawrite_wbc+0x5b/0x80
 file_write_and_wait_range+0x6d/0xc0
 nfs_file_fsync+0x81/0x170 [nfs]
 ? nfs_file_mmap+0x60/0x60 [nfs]
 __x64_sys_fsync+0x53/0x90
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0

Inspecting the core with drgn I was able to pull this

  &gt;&gt;&gt; prog.crashed_thread().stack_trace()[0]
  #0 at 0xffffffffa079657a (ff_layout_cancel_io+0x3a/0x84) in ff_layout_cancel_io at fs/nfs/flexfilelayout/flexfilelayout.c:2021:27
  &gt;&gt;&gt; prog.crashed_thread().stack_trace()[0]['idx']
  (u32)1
  &gt;&gt;&gt; prog.crashed_thread().stack_trace()[0]['flseg'].mirror_array[1].mirror_ds
  (struct nfs4_ff_layout_ds *)0xffffffffffffffed

This is clear from the stack trace, we call nfs4_ff_layout_prepare_ds()
which could error out initializing the mirror_ds, and then we go to
clean it all up and our check is only for if (!mirror-&gt;mirror_ds).  This
is inconsistent with the rest of the users of mirror_ds, which have

  if (IS_ERR_OR_NULL(mirror_ds))

to keep from tripping over this exact scenario.  Fix this up in
ff_layout_cancel_io() to make sure we don't panic when we get an error.
I also spot checked all the other instances of checking mirror_ds and we
appear to be doing the correct checks everywhere, only unconditionally
dereferencing mirror_ds when we know it would be valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26868/">CVE-2024-26868 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26868">CVE-2024-26868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223038">SUSE bug 1223038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26880" ref_url="https://www.suse.com/security/cve/CVE-2024-26880" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: call the resume method on internal suspend

There is this reported crash when experimenting with the lvm2 testsuite.
The list corruption is caused by the fact that the postsuspend and resume
methods were not paired correctly; there were two consecutive calls to the
origin_postsuspend function. The second call attempts to remove the
"hash_list" entry from a list, while it was already removed by the first
call.

Fix __dm_internal_resume so that it calls the preresume and resume
methods of the table's targets.

If a preresume method of some target fails, we are in a tricky situation.
We can't return an error because dm_internal_resume isn't supposed to
return errors. We can't return success, because then the "resume" and
"postsuspend" methods would not be paired correctly. So, we set the
DMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace
tools, but it won't cause a kernel crash.

------------[ cut here ]------------
kernel BUG at lib/list_debug.c:56!
invalid opcode: 0000 [#1] PREEMPT SMP
CPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014
RIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0
&lt;snip&gt;
RSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282
RAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff
RBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058
R10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001
R13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0
FS:  00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000
CS:  0010 DS: 002b ES: 002b CR0: 0000000080050033
CR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0
Call Trace:
 &lt;TASK&gt;
 ? die+0x2d/0x80
 ? do_trap+0xeb/0xf0
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? do_error_trap+0x60/0x80
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? exc_invalid_op+0x49/0x60
 ? __list_del_entry_valid_or_report+0x77/0xc0
 ? asm_exc_invalid_op+0x16/0x20
 ? table_deps+0x1b0/0x1b0 [dm_mod]
 ? __list_del_entry_valid_or_report+0x77/0xc0
 origin_postsuspend+0x1a/0x50 [dm_snapshot]
 dm_table_postsuspend_targets+0x34/0x50 [dm_mod]
 dm_suspend+0xd8/0xf0 [dm_mod]
 dev_suspend+0x1f2/0x2f0 [dm_mod]
 ? table_deps+0x1b0/0x1b0 [dm_mod]
 ctl_ioctl+0x300/0x5f0 [dm_mod]
 dm_compat_ctl_ioctl+0x7/0x10 [dm_mod]
 __x64_compat_sys_ioctl+0x104/0x170
 do_syscall_64+0x184/0x1b0
 entry_SYSCALL_64_after_hwframe+0x46/0x4e
RIP: 0033:0xf7e6aead
&lt;snip&gt;
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26880/">CVE-2024-26880 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26880">CVE-2024-26880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223188">SUSE bug 1223188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26886</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26886" ref_url="https://www.suse.com/security/cve/CVE-2024-26886" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: af_bluetooth: Fix deadlock

Attemting to do sock_lock on .recvmsg may cause a deadlock as shown
bellow, so instead of using sock_sock this uses sk_receive_queue.lock
on bt_sock_ioctl to avoid the UAF:

INFO: task kworker/u9:1:121 blocked for more than 30 seconds.
      Not tainted 6.7.6-lemon #183
Workqueue: hci0 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __schedule+0x37d/0xa00
 schedule+0x32/0xe0
 __lock_sock+0x68/0xa0
 ? __pfx_autoremove_wake_function+0x10/0x10
 lock_sock_nested+0x43/0x50
 l2cap_sock_recv_cb+0x21/0xa0
 l2cap_recv_frame+0x55b/0x30a0
 ? psi_task_switch+0xeb/0x270
 ? finish_task_switch.isra.0+0x93/0x2a0
 hci_rx_work+0x33a/0x3f0
 process_one_work+0x13a/0x2f0
 worker_thread+0x2f0/0x410
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe0/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2c/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26886/">CVE-2024-26886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26886">CVE-2024-26886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223044">SUSE bug 1223044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26897" ref_url="https://www.suse.com/security/cve/CVE-2024-26897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: delay all of ath9k_wmi_event_tasklet() until init is complete

The ath9k_wmi_event_tasklet() used in ath9k_htc assumes that all the data
structures have been fully initialised by the time it runs. However, because of
the order in which things are initialised, this is not guaranteed to be the
case, because the device is exposed to the USB subsystem before the ath9k driver
initialisation is completed.

We already committed a partial fix for this in commit:
8b3046abc99e ("ath9k_htc: fix NULL pointer dereference at ath9k_htc_tx_get_packet()")

However, that commit only aborted the WMI_TXSTATUS_EVENTID command in the event
tasklet, pairing it with an "initialisation complete" bit in the TX struct. It
seems syzbot managed to trigger the race for one of the other commands as well,
so let's just move the existing synchronisation bit to cover the whole
tasklet (setting it at the end of ath9k_htc_probe_device() instead of inside
ath9k_tx_init()).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26897/">CVE-2024-26897 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26897">CVE-2024-26897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223323">SUSE bug 1223323</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26908</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26908" ref_url="https://www.suse.com/security/cve/CVE-2024-26908" source="SUSE CVE"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26908/">CVE-2024-26908 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26908">CVE-2024-26908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223201">SUSE bug 1223201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26923</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26923" ref_url="https://www.suse.com/security/cve/CVE-2024-26923" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2357-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2410-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2797-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Fix garbage collector racing against connect()

Garbage collector does not take into account the risk of embryo getting
enqueued during the garbage collection. If such embryo has a peer that
carries SCM_RIGHTS, two consecutive passes of scan_children() may see a
different set of children. Leading to an incorrectly elevated inflight
count, and then a dangling pointer within the gc_inflight_list.

sockets are AF_UNIX/SOCK_STREAM
S is an unconnected socket
L is a listening in-flight socket bound to addr, not in fdtable
V's fd will be passed via sendmsg(), gets inflight count bumped

connect(S, addr)	sendmsg(S, [V]); close(V)	__unix_gc()
----------------	-------------------------	-----------

NS = unix_create1()
skb1 = sock_wmalloc(NS)
L = unix_find_other(addr)
unix_state_lock(L)
unix_peer(S) = NS
			// V count=1 inflight=0

 			NS = unix_peer(S)
 			skb2 = sock_alloc()
			skb_queue_tail(NS, skb2[V])

			// V became in-flight
			// V count=2 inflight=1

			close(V)

			// V count=1 inflight=1
			// GC candidate condition met

						for u in gc_inflight_list:
						  if (total_refs == inflight_refs)
						    add u to gc_candidates

						// gc_candidates={L, V}

						for u in gc_candidates:
						  scan_children(u, dec_inflight)

						// embryo (skb1) was not
						// reachable from L yet, so V's
						// inflight remains unchanged
__skb_queue_tail(L, skb1)
unix_state_unlock(L)
						for u in gc_candidates:
						  if (u.inflight)
						    scan_children(u, inc_inflight_move_tail)

						// V count=1 inflight=2 (!)

If there is a GC-candidate listening socket, lock/unlock its state. This
makes GC wait until the end of any ongoing connect() to that socket. After
flipping the lock, a possibly SCM-laden embryo is already enqueued. And if
there is another embryo coming, it can not possibly carry SCM_RIGHTS. At
this point, unix_inflight() can not happen because unix_gc_lock is already
taken. Inflight graph remains unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26923/">CVE-2024-26923 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26923">CVE-2024-26923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223384">SUSE bug 1223384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223683">SUSE bug 1223683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26925" ref_url="https://www.suse.com/security/cve/CVE-2024-26925" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path

The commit mutex should not be released during the critical section
between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC
worker could collect expired objects and get the released commit lock
within the same GC sequence.

nf_tables_module_autoload() temporarily releases the mutex to load
module dependencies, then it goes back to replay the transaction again.
Move it at the end of the abort phase after nft_gc_seq_end() is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26925/">CVE-2024-26925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26925">CVE-2024-26925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223390">SUSE bug 1223390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224175">SUSE bug 1224175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26929" ref_url="https://www.suse.com/security/cve/CVE-2024-26929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26929/">CVE-2024-26929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26929">CVE-2024-26929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223715">SUSE bug 1223715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223716">SUSE bug 1223716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26930</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26930" ref_url="https://www.suse.com/security/cve/CVE-2024-26930" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2447-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix double free of the ha-&gt;vp_map pointer

Coverity scan reported potential risk of double free of the pointer
ha-&gt;vp_map.  ha-&gt;vp_map was freed in qla2x00_mem_alloc(), and again freed
in function qla2x00_mem_free(ha).

Assign NULL to vp_map and kfree take care of NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-26930/">CVE-2024-26930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26930">CVE-2024-26930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223626">SUSE bug 1223626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223681">SUSE bug 1223681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26931" ref_url="https://www.suse.com/security/cve/CVE-2024-26931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix command flush on cable pull

System crash due to command failed to flush back to SCSI layer.

 BUG: unable to handle kernel NULL pointer dereference at 0000000000000000
 PGD 0 P4D 0
 Oops: 0000 [#1] SMP NOPTI
 CPU: 27 PID: 793455 Comm: kworker/u130:6 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-372.9.1.el8.x86_64 #1
 Hardware name: HPE ProLiant DL360 Gen10/ProLiant DL360 Gen10, BIOS U32 09/03/2021
 Workqueue: nvme-wq nvme_fc_connect_ctrl_work [nvme_fc]
 RIP: 0010:__wake_up_common+0x4c/0x190
 Code: 24 10 4d 85 c9 74 0a 41 f6 01 04 0f 85 9d 00 00 00 48 8b 43 08 48 83 c3 08 4c 8d 48 e8 49 8d 41 18 48 39 c3 0f 84 f0 00 00 00 &lt;49&gt; 8b 41 18 89 54 24 08 31 ed 4c 8d 70 e8 45 8b 29 41 f6 c5 04 75
 RSP: 0018:ffff95f3e0cb7cd0 EFLAGS: 00010086
 RAX: 0000000000000000 RBX: ffff8b08d3b26328 RCX: 0000000000000000
 RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffff8b08d3b26320
 RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffe8
 R10: 0000000000000000 R11: ffff95f3e0cb7a60 R12: ffff95f3e0cb7d20
 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000000000
 FS:  0000000000000000(0000) GS:ffff8b2fdf6c0000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 0000002f1e410002 CR4: 00000000007706e0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  __wake_up_common_lock+0x7c/0xc0
  qla_nvme_ls_req+0x355/0x4c0 [qla2xxx]
 qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae1407ca000 from port 21:32:00:02:ac:07:ee:b8 loop_id 0x02 s_id 01:02:00 logout 1 keep 0 els_logo 0
 ? __nvme_fc_send_ls_req+0x260/0x380 [nvme_fc]
 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:00:02:ac:07:ee:b8 state transitioned from ONLINE to LOST - portid=010200.
  ? nvme_fc_send_ls_req.constprop.42+0x1a/0x45 [nvme_fc]
 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320002ac07eeb8. rport ffff8ae598122000 roles 1
 ? nvme_fc_connect_ctrl_work.cold.63+0x1e3/0xa7d [nvme_fc]
 qla2xxx [0000:12:00.1]-f084:3: qlt_free_session_done: se_sess 0000000000000000 / sess ffff8ae14801e000 from port 21:32:01:02:ad:f7:ee:b8 loop_id 0x04 s_id 01:02:01 logout 1 keep 0 els_logo 0
  ? __switch_to+0x10c/0x450
 ? process_one_work+0x1a7/0x360
 qla2xxx [0000:12:00.1]-207d:3: FCPort 21:32:01:02:ad:f7:ee:b8 state transitioned from ONLINE to LOST - portid=010201.
  ? worker_thread+0x1ce/0x390
  ? create_worker+0x1a0/0x1a0
 qla2xxx [0000:12:00.1]-2109:3: qla2x00_schedule_rport_del 21320102adf7eeb8. rport ffff8ae3b2312800 roles 70
  ? kthread+0x10a/0x120
 qla2xxx [0000:12:00.1]-2112:3: qla_nvme_unregister_remote_port: unregister remoteport on ffff8ae14801e000 21320102adf7eeb8
  ? set_kthread_struct+0x40/0x40
 qla2xxx [0000:12:00.1]-2110:3: remoteport_delete of ffff8ae14801e000 21320102adf7eeb8 completed.
  ? ret_from_fork+0x1f/0x40
 qla2xxx [0000:12:00.1]-f086:3: qlt_free_session_done: waiting for sess ffff8ae14801e000 logout

The system was under memory stress where driver was not able to allocate an
SRB to carry out error recovery of cable pull.  The failure to flush causes
upper layer to start modifying scsi_cmnd.  When the system frees up some
memory, the subsequent cable pull trigger another command flush. At this
point the driver access a null pointer when attempting to DMA unmap the
SGL.

Add a check to make sure commands are flush back on session tear down to
prevent the null pointer access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26931/">CVE-2024-26931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26931">CVE-2024-26931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223627">SUSE bug 1223627</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26935" ref_url="https://www.suse.com/security/cve/CVE-2024-26935" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1068" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix unremoved procfs host directory regression

Commit fc663711b944 ("scsi: core: Remove the /proc/scsi/${proc_name}
directory earlier") fixed a bug related to modules loading/unloading, by
adding a call to scsi_proc_hostdir_rm() on scsi_remove_host(). But that led
to a potential duplicate call to the hostdir_rm() routine, since it's also
called from scsi_host_dev_release(). That triggered a regression report,
which was then fixed by commit be03df3d4bfe ("scsi: core: Fix a procfs host
directory removal regression"). The fix just dropped the hostdir_rm() call
from dev_release().

But it happens that this proc directory is created on scsi_host_alloc(),
and that function "pairs" with scsi_host_dev_release(), while
scsi_remove_host() pairs with scsi_add_host(). In other words, it seems the
reason for removing the proc directory on dev_release() was meant to cover
cases in which a SCSI host structure was allocated, but the call to
scsi_add_host() didn't happen. And that pattern happens to exist in some
error paths, for example.

Syzkaller causes that by using USB raw gadget device, error'ing on
usb-storage driver, at usb_stor_probe2(). By checking that path, we can see
that the BadDevice label leads to a scsi_host_put() after a SCSI host
allocation, but there's no call to scsi_add_host() in such path. That leads
to messages like this in dmesg (and a leak of the SCSI host proc
structure):

usb-storage 4-1:87.51: USB Mass Storage device detected
proc_dir_entry 'scsi/usb-storage' already registered
WARNING: CPU: 1 PID: 3519 at fs/proc/generic.c:377 proc_register+0x347/0x4e0 fs/proc/generic.c:376

The proper fix seems to still call scsi_proc_hostdir_rm() on dev_release(),
but guard that with the state check for SHOST_CREATED; there is even a
comment in scsi_host_dev_release() detailing that: such conditional is
meant for cases where the SCSI host was allocated but there was no calls to
{add,remove}_host(), like the usb-storage case.

This is what we propose here and with that, the error path of usb-storage
does not trigger the warning anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26935/">CVE-2024-26935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26935">CVE-2024-26935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223675">SUSE bug 1223675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26946</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26946" ref_url="https://www.suse.com/security/cve/CVE-2024-26946" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address

Read from an unsafe address with copy_from_kernel_nofault() in
arch_adjust_kprobe_addr() because this function is used before checking
the address is in text or not. Syzcaller bot found a bug and reported
the case if user specifies inaccessible data area,
arch_adjust_kprobe_addr() will cause a kernel panic.

[ mingo: Clarified the comment. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26946/">CVE-2024-26946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26946">CVE-2024-26946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223669">SUSE bug 1223669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26947</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26947" ref_url="https://www.suse.com/security/cve/CVE-2024-26947" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ARM: 9359/1: flush: check if the folio is reserved for no-mapping addresses

Since commit a4d5613c4dc6 ("arm: extend pfn_valid to take into account
freed memory map alignment") changes the semantics of pfn_valid() to check
presence of the memory map for a PFN. A valid page for an address which
is reserved but not mapped by the kernel[1], the system crashed during
some uio test with the following memory layout:

 node   0: [mem 0x00000000c0a00000-0x00000000cc8fffff]
 node   0: [mem 0x00000000d0000000-0x00000000da1fffff]
 the uio layout is:0xc0900000, 0x100000

the crash backtrace like:

  Unable to handle kernel paging request at virtual address bff00000
  [...]
  CPU: 1 PID: 465 Comm: startapp.bin Tainted: G           O      5.10.0 #1
  Hardware name: Generic DT based system
  PC is at b15_flush_kern_dcache_area+0x24/0x3c
  LR is at __sync_icache_dcache+0x6c/0x98
  [...]
   (b15_flush_kern_dcache_area) from (__sync_icache_dcache+0x6c/0x98)
   (__sync_icache_dcache) from (set_pte_at+0x28/0x54)
   (set_pte_at) from (remap_pfn_range+0x1a0/0x274)
   (remap_pfn_range) from (uio_mmap+0x184/0x1b8 [uio])
   (uio_mmap [uio]) from (__mmap_region+0x264/0x5f4)
   (__mmap_region) from (__do_mmap_mm+0x3ec/0x440)
   (__do_mmap_mm) from (do_mmap+0x50/0x58)
   (do_mmap) from (vm_mmap_pgoff+0xfc/0x188)
   (vm_mmap_pgoff) from (ksys_mmap_pgoff+0xac/0xc4)
   (ksys_mmap_pgoff) from (ret_fast_syscall+0x0/0x5c)
  Code: e0801001 e2423001 e1c00003 f57ff04f (ee070f3e)
  ---[ end trace 09cf0734c3805d52 ]---
  Kernel panic - not syncing: Fatal exception

So check if PG_reserved was set to solve this issue.

[1]: https://lore.kernel.org/lkml/Zbtdue57RO0QScJM@linux.ibm.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26947/">CVE-2024-26947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26947">CVE-2024-26947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223662">SUSE bug 1223662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26961" ref_url="https://www.suse.com/security/cve/CVE-2024-26961" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mac802154: fix llsec key resources release in mac802154_llsec_key_del

mac802154_llsec_key_del() can free resources of a key directly without
following the RCU rules for waiting before the end of a grace period. This
may lead to use-after-free in case llsec_lookup_key() is traversing the
list of keys in parallel with a key deletion:

refcount_t: addition on 0; use-after-free.
WARNING: CPU: 4 PID: 16000 at lib/refcount.c:25 refcount_warn_saturate+0x162/0x2a0
Modules linked in:
CPU: 4 PID: 16000 Comm: wpan-ping Not tainted 6.7.0 #19
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:refcount_warn_saturate+0x162/0x2a0
Call Trace:
 &lt;TASK&gt;
 llsec_lookup_key.isra.0+0x890/0x9e0
 mac802154_llsec_encrypt+0x30c/0x9c0
 ieee802154_subif_start_xmit+0x24/0x1e0
 dev_hard_start_xmit+0x13e/0x690
 sch_direct_xmit+0x2ae/0xbc0
 __dev_queue_xmit+0x11dd/0x3c20
 dgram_sendmsg+0x90b/0xd60
 __sys_sendto+0x466/0x4c0
 __x64_sys_sendto+0xe0/0x1c0
 do_syscall_64+0x45/0xf0
 entry_SYSCALL_64_after_hwframe+0x6e/0x76

Also, ieee802154_llsec_key_entry structures are not freed by
mac802154_llsec_key_del():

unreferenced object 0xffff8880613b6980 (size 64):
  comm "iwpan", pid 2176, jiffies 4294761134 (age 60.475s)
  hex dump (first 32 bytes):
    78 0d 8f 18 80 88 ff ff 22 01 00 00 00 00 ad de  x.......".......
    00 00 00 00 00 00 00 00 03 00 cd ab 00 00 00 00  ................
  backtrace:
    [&lt;ffffffff81dcfa62&gt;] __kmem_cache_alloc_node+0x1e2/0x2d0
    [&lt;ffffffff81c43865&gt;] kmalloc_trace+0x25/0xc0
    [&lt;ffffffff88968b09&gt;] mac802154_llsec_key_add+0xac9/0xcf0
    [&lt;ffffffff8896e41a&gt;] ieee802154_add_llsec_key+0x5a/0x80
    [&lt;ffffffff8892adc6&gt;] nl802154_add_llsec_key+0x426/0x5b0
    [&lt;ffffffff86ff293e&gt;] genl_family_rcv_msg_doit+0x1fe/0x2f0
    [&lt;ffffffff86ff46d1&gt;] genl_rcv_msg+0x531/0x7d0
    [&lt;ffffffff86fee7a9&gt;] netlink_rcv_skb+0x169/0x440
    [&lt;ffffffff86ff1d88&gt;] genl_rcv+0x28/0x40
    [&lt;ffffffff86fec15c&gt;] netlink_unicast+0x53c/0x820
    [&lt;ffffffff86fecd8b&gt;] netlink_sendmsg+0x93b/0xe60
    [&lt;ffffffff86b91b35&gt;] ____sys_sendmsg+0xac5/0xca0
    [&lt;ffffffff86b9c3dd&gt;] ___sys_sendmsg+0x11d/0x1c0
    [&lt;ffffffff86b9c65a&gt;] __sys_sendmsg+0xfa/0x1d0
    [&lt;ffffffff88eadbf5&gt;] do_syscall_64+0x45/0xf0
    [&lt;ffffffff890000ea&gt;] entry_SYSCALL_64_after_hwframe+0x6e/0x76

Handle the proper resource release in the RCU callback function
mac802154_llsec_key_del_rcu().

Note that if llsec_lookup_key() finds a key, it gets a refcount via
llsec_key_get() and locally copies key id from key_entry (which is a
list element). So it's safe to call llsec_key_put() and free the list
entry after the RCU grace period elapses.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26961/">CVE-2024-26961 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26961">CVE-2024-26961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223652">SUSE bug 1223652</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26974" ref_url="https://www.suse.com/security/cve/CVE-2024-26974" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - resolve race condition during AER recovery

During the PCI AER system's error recovery process, the kernel driver
may encounter a race condition with freeing the reset_data structure's
memory. If the device restart will take more than 10 seconds the function
scheduling that restart will exit due to a timeout, and the reset_data
structure will be freed. However, this data structure is used for
completion notification after the restart is completed, which leads
to a UAF bug.

This results in a KFENCE bug notice.

  BUG: KFENCE: use-after-free read in adf_device_reset_worker+0x38/0xa0 [intel_qat]
  Use-after-free read at 0x00000000bc56fddf (in kfence-#142):
  adf_device_reset_worker+0x38/0xa0 [intel_qat]
  process_one_work+0x173/0x340

To resolve this race condition, the memory associated to the container
of the work_struct is freed on the worker if the timeout expired,
otherwise on the function that schedules the worker.
The timeout detection can be done by checking if the caller is
still waiting for completion or not by using completion_done() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26974/">CVE-2024-26974 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26974">CVE-2024-26974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223638">SUSE bug 1223638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2698" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2698" ref_url="https://www.suse.com/security/cve/CVE-2024-2698" source="SUSE CVE"/>
    <description>
    A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request.

In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-2698/">CVE-2024-2698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2698">CVE-2024-2698 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009871308" comment="ipa-client-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871309" comment="ipa-client-common-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871310" comment="ipa-client-epn-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871311" comment="ipa-client-samba-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871312" comment="ipa-common-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871313" comment="ipa-selinux-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871314" comment="ipa-server-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871315" comment="ipa-server-common-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871316" comment="ipa-server-dns-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871317" comment="ipa-server-trust-ad-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871318" comment="python3-ipaclient-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871319" comment="python3-ipalib-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871320" comment="python3-ipaserver-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871321" comment="python3-ipatests-4.11.0-15.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26982" ref_url="https://www.suse.com/security/cve/CVE-2024-26982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check the inode number is not the invalid value of zero

Syskiller has produced an out of bounds access in fill_meta_index().

That out of bounds access is ultimately caused because the inode
has an inode number with the invalid value of zero, which was not checked.

The reason this causes the out of bounds access is due to following
sequence of events:

1. Fill_meta_index() is called to allocate (via empty_meta_index())
   and fill a metadata index.  It however suffers a data read error
   and aborts, invalidating the newly returned empty metadata index.
   It does this by setting the inode number of the index to zero,
   which means unused (zero is not a valid inode number).

2. When fill_meta_index() is subsequently called again on another
   read operation, locate_meta_index() returns the previous index
   because it matches the inode number of 0.  Because this index
   has been returned it is expected to have been filled, and because
   it hasn't been, an out of bounds access is performed.

This patch adds a sanity check which checks that the inode number
is not zero when the inode is created and returns -EINVAL if it is.

[phillip@squashfs.org.uk: whitespace fix]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26982/">CVE-2024-26982 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26982">CVE-2024-26982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223634">SUSE bug 1223634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26991</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26991" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26991" ref_url="https://www.suse.com/security/cve/CVE-2024-26991" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/mmu: x86: Don't overflow lpage_info when checking attributes

Fix KVM_SET_MEMORY_ATTRIBUTES to not overflow lpage_info array and trigger
KASAN splat, as seen in the private_mem_conversions_test selftest.

When memory attributes are set on a GFN range, that range will have
specific properties applied to the TDP. A huge page cannot be used when
the attributes are inconsistent, so they are disabled for those the
specific huge pages. For internal KVM reasons, huge pages are also not
allowed to span adjacent memslots regardless of whether the backing memory
could be mapped as huge.

What GFNs support which huge page sizes is tracked by an array of arrays
'lpage_info' on the memslot, of 'kvm_lpage_info' structs. Each index of
lpage_info contains a vmalloc allocated array of these for a specific
supported page size. The kvm_lpage_info denotes whether a specific huge
page (GFN and page size) on the memslot is supported. These arrays include
indices for unaligned head and tail huge pages.

Preventing huge pages from spanning adjacent memslot is covered by
incrementing the count in head and tail kvm_lpage_info when the memslot is
allocated, but disallowing huge pages for memory that has mixed attributes
has to be done in a more complicated way. During the
KVM_SET_MEMORY_ATTRIBUTES ioctl KVM updates lpage_info for each memslot in
the range that has mismatched attributes. KVM does this a memslot at a
time, and marks a special bit, KVM_LPAGE_MIXED_FLAG, in the kvm_lpage_info
for any huge page. This bit is essentially a permanently elevated count.
So huge pages will not be mapped for the GFN at that page size if the
count is elevated in either case: a huge head or tail page unaligned to
the memslot or if KVM_LPAGE_MIXED_FLAG is set because it has mixed
attributes.

To determine whether a huge page has consistent attributes, the
KVM_SET_MEMORY_ATTRIBUTES operation checks an xarray to make sure it
consistently has the incoming attribute. Since level - 1 huge pages are
aligned to level huge pages, it employs an optimization. As long as the
level - 1 huge pages are checked first, it can just check these and assume
that if each level - 1 huge page contained within the level sized huge
page is not mixed, then the level size huge page is not mixed. This
optimization happens in the helper hugepage_has_attrs().

Unfortunately, although the kvm_lpage_info array representing page size
'level' will contain an entry for an unaligned tail page of size level,
the array for level - 1  will not contain an entry for each GFN at page
size level. The level - 1 array will only contain an index for any
unaligned region covered by level - 1 huge page size, which can be a
smaller region. So this causes the optimization to overflow the level - 1
kvm_lpage_info and perform a vmalloc out of bounds read.

In some cases of head and tail pages where an overflow could happen,
callers skip the operation completely as KVM_LPAGE_MIXED_FLAG is not
required to prevent huge pages as discussed earlier. But for memslots that
are smaller than the 1GB page size, it does call hugepage_has_attrs(). In
this case the huge page is both the head and tail page. The issue can be
observed simply by compiling the kernel with CONFIG_KASAN_VMALLOC and
running the selftest “private_mem_conversions_test”, which produces the
output like the following:

BUG: KASAN: vmalloc-out-of-bounds in hugepage_has_attrs+0x7e/0x110
Read of size 4 at addr ffffc900000a3008 by task private_mem_con/169
Call Trace:
  dump_stack_lvl
  print_report
  ? __virt_addr_valid
  ? hugepage_has_attrs
  ? hugepage_has_attrs
  kasan_report
  ? hugepage_has_attrs
  hugepage_has_attrs
  kvm_arch_post_set_memory_attributes
  kvm_vm_ioctl

It is a little ambiguous whether the unaligned head page (in the bug case
also the tail page) should be expected to have KVM_LPAGE_MIXED_FLAG set.
It is not functionally required, as the unal
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-26991/">CVE-2024-26991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-26991">CVE-2024-26991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223695">SUSE bug 1223695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26993" ref_url="https://www.suse.com/security/cve/CVE-2024-26993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: sysfs: Fix reference leak in sysfs_break_active_protection()

The sysfs_break_active_protection() routine has an obvious reference
leak in its error path.  If the call to kernfs_find_and_get() fails then
kn will be NULL, so the companion sysfs_unbreak_active_protection()
routine won't get called (and would only cause an access violation by
trying to dereference kn-&gt;parent if it was called).  As a result, the
reference to kobj acquired at the start of the function will never be
released.

Fix the leak by adding an explicit kobject_put() call when kn is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-26993/">CVE-2024-26993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26993">CVE-2024-26993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223693">SUSE bug 1223693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870141" comment="bpftool-7.3.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870142" comment="kernel-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870143" comment="kernel-abi-stablelists-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870144" comment="kernel-core-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870145" comment="kernel-cross-headers-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870146" comment="kernel-debug-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870147" comment="kernel-debug-core-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870150" comment="kernel-debug-modules-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870151" comment="kernel-debug-modules-core-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870152" comment="kernel-debug-modules-extra-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870153" comment="kernel-debug-uki-virt-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870156" comment="kernel-doc-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870157" comment="kernel-headers-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870158" comment="kernel-modules-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870159" comment="kernel-modules-core-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870160" comment="kernel-modules-extra-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870161" comment="kernel-tools-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870162" comment="kernel-tools-libs-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870164" comment="kernel-uki-virt-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870165" comment="libperf-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870166" comment="perf-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870167" comment="python3-perf-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870168" comment="rtla-5.14.0-427.20.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870169" comment="rv-5.14.0-427.20.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27008" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27008" ref_url="https://www.suse.com/security/cve/CVE-2024-27008" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: nv04: Fix out of bounds access

When Output Resource (dcb-&gt;or) value is assigned in
fabricate_dcb_output(), there may be out of bounds access to
dac_users array in case dcb-&gt;or is zero because ffs(dcb-&gt;or) is
used as index there.
The 'or' argument of fabricate_dcb_output() must be interpreted as a
number of bit to set, not value.

Utilize macros from 'enum nouveau_or' in calls instead of hardcoding.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27008/">CVE-2024-27008 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27008">CVE-2024-27008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223802">SUSE bug 1223802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27016" ref_url="https://www.suse.com/security/cve/CVE-2024-27016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: validate pppoe header

Ensure there is sufficient room to access the protocol field of the
PPPoe header. Validate it once before the flowtable lookup, then use a
helper function to access protocol field.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27016/">CVE-2024-27016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27016">CVE-2024-27016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223807">SUSE bug 1223807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27019" ref_url="https://www.suse.com/security/cve/CVE-2024-27019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()

nft_unregister_obj() can concurrent with __nft_obj_type_get(),
and there is not any protection when iterate over nf_tables_objects
list in __nft_obj_type_get(). Therefore, there is potential data-race
of nf_tables_objects list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_objects
list in __nft_obj_type_get(), and use rcu_read_lock() in the caller
nft_obj_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27019/">CVE-2024-27019 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27019">CVE-2024-27019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223813">SUSE bug 1223813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27020" ref_url="https://www.suse.com/security/cve/CVE-2024-27020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()

nft_unregister_expr() can concurrent with __nft_expr_type_get(),
and there is not any protection when iterate over nf_tables_expressions
list in __nft_expr_type_get(). Therefore, there is potential data-race
of nf_tables_expressions list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_expressions
list in __nft_expr_type_get(), and use rcu_read_lock() in the caller
nft_expr_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27020/">CVE-2024-27020 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27020">CVE-2024-27020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223815">SUSE bug 1223815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27022" ref_url="https://www.suse.com/security/cve/CVE-2024-27022" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fork: defer linking file vma until vma is fully initialized

Thorvald reported a WARNING [1]. And the root cause is below race:

 CPU 1					CPU 2
 fork					hugetlbfs_fallocate
  dup_mmap				 hugetlbfs_punch_hole
   i_mmap_lock_write(mapping);
   vma_interval_tree_insert_after -- Child vma is visible through i_mmap tree.
   i_mmap_unlock_write(mapping);
   hugetlb_dup_vma_private -- Clear vma_lock outside i_mmap_rwsem!
					 i_mmap_lock_write(mapping);
   					 hugetlb_vmdelete_list
					  vma_interval_tree_foreach
					   hugetlb_vma_trylock_write -- Vma_lock is cleared.
   tmp-&gt;vm_ops-&gt;open -- Alloc new vma_lock outside i_mmap_rwsem!
					   hugetlb_vma_unlock_write -- Vma_lock is assigned!!!
					 i_mmap_unlock_write(mapping);

hugetlb_dup_vma_private() and hugetlb_vm_op_open() are called outside
i_mmap_rwsem lock while vma lock can be used in the same time.  Fix this
by deferring linking file vma until vma is fully initialized.  Those vmas
should be initialized first before they can be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27022/">CVE-2024-27022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27022">CVE-2024-27022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223774">SUSE bug 1223774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27030</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27030" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27030" ref_url="https://www.suse.com/security/cve/CVE-2024-27030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: Use separate handlers for interrupts

For PF to AF interrupt vector and VF to AF vector same
interrupt handler is registered which is causing race condition.
When two interrupts are raised to two CPUs at same time
then two cores serve same event corrupting the data.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27030/">CVE-2024-27030 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27030">CVE-2024-27030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223790">SUSE bug 1223790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27046" ref_url="https://www.suse.com/security/cve/CVE-2024-27046" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1644-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1648-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1659-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1870-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: flower: handle acti_netdevs allocation failure

The kmalloc_array() in nfp_fl_lag_do_work() will return null, if
the physical memory has run out. As a result, if we dereference
the acti_netdevs, the null pointer dereference bugs will happen.

This patch adds a check to judge whether allocation failure occurs.
If it happens, the delayed work will be rescheduled and try again.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27046/">CVE-2024-27046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27046">CVE-2024-27046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223827">SUSE bug 1223827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27049" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27049" ref_url="https://www.suse.com/security/cve/CVE-2024-27049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925e: fix use-after-free in free_irq()

From commit a304e1b82808 ("[PATCH] Debug shared irqs"), there is a test
to make sure the shared irq handler should be able to handle the unexpected
event after deregistration. For this case, let's apply MT76_REMOVED flag to
indicate the device was removed and do not run into the resource access
anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27049/">CVE-2024-27049 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27049">CVE-2024-27049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223763">SUSE bug 1223763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231063">SUSE bug 1231063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27052" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27052" ref_url="https://www.suse.com/security/cve/CVE-2024-27052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work

The workqueue might still be running, when the driver is stopped. To
avoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27052/">CVE-2024-27052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27052">CVE-2024-27052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223829">SUSE bug 1223829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27065</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27065" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27065" ref_url="https://www.suse.com/security/cve/CVE-2024-27065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not compare internal table flags on updates

Restore skipping transaction if table update does not modify flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27065/">CVE-2024-27065 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27065">CVE-2024-27065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223836">SUSE bug 1223836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27280</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27280" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27280" ref_url="https://www.suse.com/security/cve/CVE-2024-27280" source="SUSE CVE"/>
    <description>
    A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27280/">CVE-2024-27280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27280">CVE-2024-27280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221851">SUSE bug 1221851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009874712" comment="ruby-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874713" comment="ruby-bundled-gems-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874714" comment="ruby-default-gems-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874715" comment="ruby-devel-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874716" comment="ruby-doc-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874717" comment="ruby-libs-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874718" comment="rubygem-bigdecimal-3.1.5-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874719" comment="rubygem-bundler-2.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874720" comment="rubygem-io-console-0.7.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874721" comment="rubygem-irb-1.11.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874722" comment="rubygem-json-2.7.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874723" comment="rubygem-minitest-5.20.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874728" comment="rubygem-power_assert-2.0.3-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874729" comment="rubygem-psych-5.1.2-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874730" comment="rubygem-racc-1.7.3-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874731" comment="rubygem-rake-13.1.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874732" comment="rubygem-rbs-3.4.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874733" comment="rubygem-rdoc-6.6.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874734" comment="rubygem-rexml-3.2.6-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874735" comment="rubygem-rss-0.3.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874736" comment="rubygem-test-unit-3.6.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874737" comment="rubygem-typeprof-0.21.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874738" comment="rubygems-3.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874739" comment="rubygems-devel-3.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27281" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27281" ref_url="https://www.suse.com/security/cve/CVE-2024-27281" source="SUSE CVE"/>
    <description>
    An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-27281/">CVE-2024-27281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27281">CVE-2024-27281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221852">SUSE bug 1221852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009874712" comment="ruby-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874713" comment="ruby-bundled-gems-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874714" comment="ruby-default-gems-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874715" comment="ruby-devel-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874716" comment="ruby-doc-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874717" comment="ruby-libs-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874718" comment="rubygem-bigdecimal-3.1.5-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874719" comment="rubygem-bundler-2.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874720" comment="rubygem-io-console-0.7.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874721" comment="rubygem-irb-1.11.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874722" comment="rubygem-json-2.7.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874723" comment="rubygem-minitest-5.20.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874728" comment="rubygem-power_assert-2.0.3-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874729" comment="rubygem-psych-5.1.2-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874730" comment="rubygem-racc-1.7.3-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874731" comment="rubygem-rake-13.1.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874732" comment="rubygem-rbs-3.4.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874733" comment="rubygem-rdoc-6.6.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874734" comment="rubygem-rexml-3.2.6-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874735" comment="rubygem-rss-0.3.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874736" comment="rubygem-test-unit-3.6.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874737" comment="rubygem-typeprof-0.21.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874738" comment="rubygems-3.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874739" comment="rubygems-devel-3.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27282</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27282" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27282" ref_url="https://www.suse.com/security/cve/CVE-2024-27282" source="SUSE CVE"/>
    <description>
    An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-27282/">CVE-2024-27282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27282">CVE-2024-27282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223314">SUSE bug 1223314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009874712" comment="ruby-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874713" comment="ruby-bundled-gems-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874714" comment="ruby-default-gems-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874715" comment="ruby-devel-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874716" comment="ruby-doc-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874717" comment="ruby-libs-3.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874718" comment="rubygem-bigdecimal-3.1.5-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874719" comment="rubygem-bundler-2.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874720" comment="rubygem-io-console-0.7.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874721" comment="rubygem-irb-1.11.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874722" comment="rubygem-json-2.7.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874723" comment="rubygem-minitest-5.20.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874728" comment="rubygem-power_assert-2.0.3-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874729" comment="rubygem-psych-5.1.2-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874730" comment="rubygem-racc-1.7.3-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874731" comment="rubygem-rake-13.1.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874732" comment="rubygem-rbs-3.4.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874733" comment="rubygem-rdoc-6.6.3.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874734" comment="rubygem-rexml-3.2.6-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874735" comment="rubygem-rss-0.3.0-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874736" comment="rubygem-test-unit-3.6.1-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874737" comment="rubygem-typeprof-0.21.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874738" comment="rubygems-3.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874739" comment="rubygems-devel-3.5.9-2.module+el9.4.0+21859+16f07581 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27316</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27316" ref_url="https://www.suse.com/security/cve/CVE-2024-27316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1963-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018665.html" source="SUSE-SU"/>
    <description>
    HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27316/">CVE-2024-27316 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27316">CVE-2024-27316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221401">SUSE bug 1221401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866765" comment="mod_http2-2.0.26-2.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27393" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27393" ref_url="https://www.suse.com/security/cve/CVE-2024-27393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen-netfront: Add missing skb_mark_for_recycle

Notice that skb_mark_for_recycle() is introduced later than fixes tag in
commit 6a5bcd84e886 ("page_pool: Allow drivers to hint on SKB recycling").

It is believed that fixes tag were missing a call to page_pool_release_page()
between v5.9 to v5.14, after which is should have used skb_mark_for_recycle().
Since v6.6 the call page_pool_release_page() were removed (in
commit 535b9c61bdef ("net: page_pool: hide page_pool_release_page()")
and remaining callers converted (in commit 6bfef2ec0172 ("Merge branch
'net-page_pool-remove-page_pool_release_page'")).

This leak became visible in v6.8 via commit dba1b8a7ab68 ("mm/page_pool: catch
page_pool memory leaks").
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27393/">CVE-2024-27393 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27393">CVE-2024-27393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224076">SUSE bug 1224076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27397" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27397" ref_url="https://www.suse.com/security/cve/CVE-2024-27397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: use timestamp to check for set element timeout

Add a timestamp field at the beginning of the transaction, store it
in the nftables per-netns area.

Update set backend .insert, .deactivate and sync gc path to use the
timestamp, this avoids that an element expires while control plane
transaction is still unfinished.

.lookup and .update, which are used from packet path, still use the
current time to check if the element has expired. And .get path and dump
also since this runs lockless under rcu read size lock. Then, there is
async gc which also needs to check the current time since it runs
asynchronously from a workqueue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27397/">CVE-2024-27397 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27397">CVE-2024-27397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224095">SUSE bug 1224095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27398" ref_url="https://www.suse.com/security/cve/CVE-2024-27398" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2792-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2793-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2822-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2843-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3320-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix use-after-free bugs caused by sco_sock_timeout

When the sco connection is established and then, the sco socket
is releasing, timeout_work will be scheduled to judge whether
the sco disconnection is timeout. The sock will be deallocated
later, but it is dereferenced again in sco_sock_timeout. As a
result, the use-after-free bugs will happen. The root cause is
shown below:

    Cleanup Thread               |      Worker Thread
sco_sock_release                 |
  sco_sock_close                 |
    __sco_sock_close             |
      sco_sock_set_timer         |
        schedule_delayed_work    |
  sco_sock_kill                  |    (wait a time)
    sock_put(sk) //FREE          |  sco_sock_timeout
                                 |    sock_hold(sk) //USE

The KASAN report triggered by POC is shown below:

[   95.890016] ==================================================================
[   95.890496] BUG: KASAN: slab-use-after-free in sco_sock_timeout+0x5e/0x1c0
[   95.890755] Write of size 4 at addr ffff88800c388080 by task kworker/0:0/7
...
[   95.890755] Workqueue: events sco_sock_timeout
[   95.890755] Call Trace:
[   95.890755]  &lt;TASK&gt;
[   95.890755]  dump_stack_lvl+0x45/0x110
[   95.890755]  print_address_description+0x78/0x390
[   95.890755]  print_report+0x11b/0x250
[   95.890755]  ? __virt_addr_valid+0xbe/0xf0
[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0
[   95.890755]  kasan_report+0x139/0x170
[   95.890755]  ? update_load_avg+0xe5/0x9f0
[   95.890755]  ? sco_sock_timeout+0x5e/0x1c0
[   95.890755]  kasan_check_range+0x2c3/0x2e0
[   95.890755]  sco_sock_timeout+0x5e/0x1c0
[   95.890755]  process_one_work+0x561/0xc50
[   95.890755]  worker_thread+0xab2/0x13c0
[   95.890755]  ? pr_cont_work+0x490/0x490
[   95.890755]  kthread+0x279/0x300
[   95.890755]  ? pr_cont_work+0x490/0x490
[   95.890755]  ? kthread_blkcg+0xa0/0xa0
[   95.890755]  ret_from_fork+0x34/0x60
[   95.890755]  ? kthread_blkcg+0xa0/0xa0
[   95.890755]  ret_from_fork_asm+0x11/0x20
[   95.890755]  &lt;/TASK&gt;
[   95.890755]
[   95.890755] Allocated by task 506:
[   95.890755]  kasan_save_track+0x3f/0x70
[   95.890755]  __kasan_kmalloc+0x86/0x90
[   95.890755]  __kmalloc+0x17f/0x360
[   95.890755]  sk_prot_alloc+0xe1/0x1a0
[   95.890755]  sk_alloc+0x31/0x4e0
[   95.890755]  bt_sock_alloc+0x2b/0x2a0
[   95.890755]  sco_sock_create+0xad/0x320
[   95.890755]  bt_sock_create+0x145/0x320
[   95.890755]  __sock_create+0x2e1/0x650
[   95.890755]  __sys_socket+0xd0/0x280
[   95.890755]  __x64_sys_socket+0x75/0x80
[   95.890755]  do_syscall_64+0xc4/0x1b0
[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   95.890755]
[   95.890755] Freed by task 506:
[   95.890755]  kasan_save_track+0x3f/0x70
[   95.890755]  kasan_save_free_info+0x40/0x50
[   95.890755]  poison_slab_object+0x118/0x180
[   95.890755]  __kasan_slab_free+0x12/0x30
[   95.890755]  kfree+0xb2/0x240
[   95.890755]  __sk_destruct+0x317/0x410
[   95.890755]  sco_sock_release+0x232/0x280
[   95.890755]  sock_close+0xb2/0x210
[   95.890755]  __fput+0x37f/0x770
[   95.890755]  task_work_run+0x1ae/0x210
[   95.890755]  get_signal+0xe17/0xf70
[   95.890755]  arch_do_signal_or_restart+0x3f/0x520
[   95.890755]  syscall_exit_to_user_mode+0x55/0x120
[   95.890755]  do_syscall_64+0xd1/0x1b0
[   95.890755]  entry_SYSCALL_64_after_hwframe+0x67/0x6f
[   95.890755]
[   95.890755] The buggy address belongs to the object at ffff88800c388000
[   95.890755]  which belongs to the cache kmalloc-1k of size 1024
[   95.890755] The buggy address is located 128 bytes inside of
[   95.890755]  freed 1024-byte region [ffff88800c388000, ffff88800c388400)
[   95.890755]
[   95.890755] The buggy address belongs to the physical page:
[   95.890755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88800c38a800 pfn:0xc388
[   95.890755] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   95.890755] ano
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27398/">CVE-2024-27398 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27398">CVE-2024-27398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224174">SUSE bug 1224174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225013">SUSE bug 1225013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27403" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27403" ref_url="https://www.suse.com/security/cve/CVE-2024-27403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_flow_offload: reset dst in route object after setting up flow

dst is transferred to the flow object, route object does not own it
anymore.  Reset dst in route object, otherwise if flow_offload_add()
fails, error path releases dst twice, leading to a refcount underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27403/">CVE-2024-27403 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27403">CVE-2024-27403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224415">SUSE bug 1224415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27415" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27415" ref_url="https://www.suse.com/security/cve/CVE-2024-27415" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: bridge: confirm multicast packets before passing them up the stack

conntrack nf_confirm logic cannot handle cloned skbs referencing
the same nf_conn entry, which will happen for multicast (broadcast)
frames on bridges.

 Example:
    macvlan0
       |
      br0
     /  \
  ethX    ethY

 ethX (or Y) receives a L2 multicast or broadcast packet containing
 an IP packet, flow is not yet in conntrack table.

 1. skb passes through bridge and fake-ip (br_netfilter)Prerouting.
    -&gt; skb-&gt;_nfct now references a unconfirmed entry
 2. skb is broad/mcast packet. bridge now passes clones out on each bridge
    interface.
 3. skb gets passed up the stack.
 4. In macvlan case, macvlan driver retains clone(s) of the mcast skb
    and schedules a work queue to send them out on the lower devices.

    The clone skb-&gt;_nfct is not a copy, it is the same entry as the
    original skb.  The macvlan rx handler then returns RX_HANDLER_PASS.
 5. Normal conntrack hooks (in NF_INET_LOCAL_IN) confirm the orig skb.

The Macvlan broadcast worker and normal confirm path will race.

This race will not happen if step 2 already confirmed a clone. In that
case later steps perform skb_clone() with skb-&gt;_nfct already confirmed (in
hash table).  This works fine.

But such confirmation won't happen when eb/ip/nftables rules dropped the
packets before they reached the nf_confirm step in postrouting.

Pablo points out that nf_conntrack_bridge doesn't allow use of stateful
nat, so we can safely discard the nf_conn entry and let inet call
conntrack again.

This doesn't work for bridge netfilter: skb could have a nat
transformation. Also bridge nf prevents re-invocation of inet prerouting
via 'sabotage_in' hook.

Work around this problem by explicit confirmation of the entry at LOCAL_IN
time, before upper layer has a chance to clone the unconfirmed entry.

The downside is that this disables NAT and conntrack helpers.

Alternative fix would be to add locking to all code parts that deal with
unconfirmed packets, but even if that could be done in a sane way this
opens up other problems, for example:

-m physdev --physdev-out eth0 -j SNAT --snat-to 1.2.3.4
-m physdev --physdev-out eth1 -j SNAT --snat-to 1.2.3.5

For multicast case, only one of such conflicting mappings will be
created, conntrack only handles 1:1 NAT mappings.

Users should set create a setup that explicitly marks such traffic
NOTRACK (conntrack bypass) to avoid this, but we cannot auto-bypass
them, ruleset might have accept rules for untracked traffic already,
so user-visible behaviour would change.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-27415/">CVE-2024-27415 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27415">CVE-2024-27415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224757">SUSE bug 1224757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27417</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27417" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27417" ref_url="https://www.suse.com/security/cve/CVE-2024-27417" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix potential "struct net" leak in inet6_rtm_getaddr()

It seems that if userspace provides a correct IFA_TARGET_NETNSID value
but no IFA_ADDRESS and IFA_LOCAL attributes, inet6_rtm_getaddr()
returns -EINVAL with an elevated "struct net" refcount.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27417/">CVE-2024-27417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27417">CVE-2024-27417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224721">SUSE bug 1224721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27434" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27434" ref_url="https://www.suse.com/security/cve/CVE-2024-27434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't set the MFP flag for the GTK

The firmware doesn't need the MFP flag for the GTK, it can even make the
firmware crash. in case the AP is configured with: group cipher TKIP and
MFPC. We would send the GTK with cipher = TKIP and MFP which is of course
not possible.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27434/">CVE-2024-27434 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27434">CVE-2024-27434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224710">SUSE bug 1224710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27435</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27435" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27435" ref_url="https://www.suse.com/security/cve/CVE-2024-27435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: fix reconnection fail due to reserved tag allocation

We found a issue on production environment while using NVMe over RDMA,
admin_q reconnect failed forever while remote target and network is ok.
After dig into it, we found it may caused by a ABBA deadlock due to tag
allocation. In my case, the tag was hold by a keep alive request
waiting inside admin_q, as we quiesced admin_q while reset ctrl, so the
request maked as idle and will not process before reset success. As
fabric_q shares tagset with admin_q, while reconnect remote target, we
need a tag for connect command, but the only one reserved tag was held
by keep alive command which waiting inside admin_q. As a result, we
failed to reconnect admin_q forever. In order to fix this issue, I
think we should keep two reserved tags for admin queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27435/">CVE-2024-27435 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27435">CVE-2024-27435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224717">SUSE bug 1224717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2756" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2756" ref_url="https://www.suse.com/security/cve/CVE-2024-2756" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000656.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035602.html" source="SUSE-SU"/>
    <description>
    Due to an incomplete fix to  CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host-  or __Secure-  cookie by PHP applications.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-2756/">CVE-2024-2756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2756">CVE-2024-2756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222857">SUSE bug 1222857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957468" comment="php-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957469" comment="php-bcmath-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957470" comment="php-cli-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957471" comment="php-common-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957472" comment="php-dba-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957473" comment="php-dbg-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957474" comment="php-devel-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957475" comment="php-embedded-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957476" comment="php-enchant-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957477" comment="php-ffi-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957478" comment="php-fpm-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957479" comment="php-gd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957480" comment="php-gmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957481" comment="php-intl-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957482" comment="php-ldap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957483" comment="php-mbstring-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957484" comment="php-mysqlnd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957485" comment="php-odbc-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957486" comment="php-opcache-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957487" comment="php-pdo-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957493" comment="php-pgsql-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957494" comment="php-process-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957495" comment="php-snmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957496" comment="php-soap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957497" comment="php-xml-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27808</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27808" ref_url="https://www.suse.com/security/cve/CVE-2024-27808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 17.5, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27808/">CVE-2024-27808 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27808">CVE-2024-27808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27820" ref_url="https://www.suse.com/security/cve/CVE-2024-27820" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. Processing web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27820/">CVE-2024-27820 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27820">CVE-2024-27820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27833</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27833" ref_url="https://www.suse.com/security/cve/CVE-2024-27833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
    <description>
    An integer overflow was addressed with improved input validation. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, tvOS 17.5, visionOS 1.2. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27833/">CVE-2024-27833 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27833">CVE-2024-27833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27834" ref_url="https://www.suse.com/security/cve/CVE-2024-27834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2065-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, watchOS 10.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27834/">CVE-2024-27834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27834">CVE-2024-27834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225071">SUSE bug 1225071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27838</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27838" ref_url="https://www.suse.com/security/cve/CVE-2024-27838" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
    <description>
    The issue was addressed by adding additional logic. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. A maliciously crafted webpage may be able to fingerprint the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-27838/">CVE-2024-27838 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27838">CVE-2024-27838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27851</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27851" ref_url="https://www.suse.com/security/cve/CVE-2024-27851" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved bounds checks. This issue is fixed in Safari 17.5, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. Processing maliciously crafted web content may lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-27851/">CVE-2024-27851 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27851">CVE-2024-27851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27856" ref_url="https://www.suse.com/security/cve/CVE-2024-27856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 17.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Sonoma 14.5, tvOS 17.5, visionOS 1.2, watchOS 10.5. Processing a file may lead to unexpected app termination or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-27856/">CVE-2024-27856 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-27856">CVE-2024-27856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236946">SUSE bug 1236946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953935" comment="webkit2gtk3-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953936" comment="webkit2gtk3-devel-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953937" comment="webkit2gtk3-jsc-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953938" comment="webkit2gtk3-jsc-devel-2.46.3-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27982" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27982" ref_url="https://www.suse.com/security/cve/CVE-2024-27982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018385.html" source="SUSE-SU"/>
    <description>
    The team has identified a critical vulnerability in the http server of the most recent version of Node, where malformed headers can lead to HTTP request smuggling. Specifically, if a space is placed before a content-length header, it is not interpreted correctly, enabling attackers to smuggle in a second request within the body of the first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-27982/">CVE-2024-27982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27982">CVE-2024-27982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222384">SUSE bug 1222384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868797" comment="nodejs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868798" comment="nodejs-devel-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868799" comment="nodejs-docs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868800" comment="nodejs-full-i18n-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866784" comment="nodejs-libs-16.20.2-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868801" comment="npm-10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202427983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-27983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-27983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-27983" ref_url="https://www.suse.com/security/cve/CVE-2024-27983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1305-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018385.html" source="SUSE-SU"/>
    <description>
    An attacker can make the Node.js HTTP/2 server completely unavailable by sending a small amount of HTTP/2 frames packets with a few HTTP/2 frames inside. It is possible to leave some data in nghttp2 memory after reset when headers with HTTP/2 CONTINUATION frame are sent to the server and then a TCP connection is abruptly closed by the client triggering the Http2Session destructor while header frames are still being processed (and stored in memory) causing a race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-27983/">CVE-2024-27983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-27983">CVE-2024-27983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222244">SUSE bug 1222244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868797" comment="nodejs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868798" comment="nodejs-devel-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868799" comment="nodejs-docs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868800" comment="nodejs-full-i18n-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866784" comment="nodejs-libs-16.20.2-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868801" comment="npm-10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28047" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28047" ref_url="https://www.suse.com/security/cve/CVE-2024-28047" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001287.html" source="SUSE-SU"/>
    <description>
    Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28047/">CVE-2024-28047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28047">CVE-2024-28047 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984837" comment="microcode_ctl-20250211-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28102" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28102" ref_url="https://www.suse.com/security/cve/CVE-2024-28102" source="SUSE CVE"/>
    <description>
    JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28102/">CVE-2024-28102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28102">CVE-2024-28102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221230">SUSE bug 1221230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866757" comment="python3-jwcrypto-0.8-5.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28127" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28127" ref_url="https://www.suse.com/security/cve/CVE-2024-28127" source="SUSE CVE"/>
    <description>
    Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28127/">CVE-2024-28127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28127">CVE-2024-28127 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053952" comment="microcode_ctl-20240910-1.20250211.1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28176" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28176" ref_url="https://www.suse.com/security/cve/CVE-2024-28176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000564.html" source="SUSE-SU"/>
    <description>
    jose is JavaScript module for JSON Object Signing and Encryption, providing support for JSON Web Tokens (JWT), JSON Web Signature (JWS), JSON Web Encryption (JWE), JSON Web Key (JWK), JSON Web Key Set (JWKS), and more. A vulnerability has 
 been identified in the JSON Web Encryption (JWE) decryption interfaces, specifically related to the support for decompressing plaintext after its decryption. Under certain conditions it is possible to have the user's environment consume unreasonable amount of CPU time or memory during JWE Decryption operations. This issue has been patched in versions 2.0.7 and 4.15.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28176/">CVE-2024-28176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28176">CVE-2024-28176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867063" comment="buildah-1.33.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867064" comment="buildah-tests-1.33.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953653" comment="jose-14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953654" comment="libjose-14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953655" comment="libjose-devel-14-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867234" comment="podman-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867235" comment="podman-docker-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867236" comment="podman-plugins-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867237" comment="podman-remote-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867238" comment="podman-tests-4.9.4-4.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O3WPJO3GKMRSPM2EPUNFU5AXM6YFRQAN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234984">SUSE bug 1234984</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867063" comment="buildah-1.33.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867064" comment="buildah-tests-1.33.7-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867234" comment="podman-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867235" comment="podman-docker-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867236" comment="podman-plugins-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867237" comment="podman-remote-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867238" comment="podman-tests-4.9.4-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868754" comment="skopeo-1.14.3-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868755" comment="skopeo-tests-1.14.3-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28182" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28182" ref_url="https://www.suse.com/security/cve/CVE-2024-28182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1167-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1167-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021393.html" source="SUSE-SU"/>
    <description>
    nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. The nghttp2 library prior to version 1.61.0 keeps reading the unbounded number of HTTP/2 CONTINUATION frames even after a stream is reset to keep HPACK context in sync.  This causes excessive CPU usage to decode HPACK stream. nghttp2 v1.61.0 mitigates this vulnerability by limiting the number of CONTINUATION frames it accepts per stream. There is no workaround for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28182/">CVE-2024-28182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28182">CVE-2024-28182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221399">SUSE bug 1221399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872319" comment="libnghttp2-1.43.0-5.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872320" comment="libnghttp2-devel-1.43.0-5.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872321" comment="nghttp2-1.43.0-5.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868797" comment="nodejs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868798" comment="nodejs-devel-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868799" comment="nodejs-docs-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868800" comment="nodejs-full-i18n-20.12.2-2.module+el9.4.0+21731+46b5b8a7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866784" comment="nodejs-libs-16.20.2-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868801" comment="npm-10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28757" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28757" ref_url="https://www.suse.com/security/cve/CVE-2024-28757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1129-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
    <description>
    libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28757/">CVE-2024-28757 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-28757">CVE-2024-28757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221289">SUSE bug 1221289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053875" comment="expat-2.5.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053876" comment="expat-devel-2.5.0-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28834" ref_url="https://www.suse.com/security/cve/CVE-2024-28834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021349.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-28834/">CVE-2024-28834 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28834">CVE-2024-28834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221746">SUSE bug 1221746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868787" comment="gnutls-3.8.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868788" comment="gnutls-c++-3.8.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868789" comment="gnutls-dane-3.8.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868790" comment="gnutls-devel-3.8.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868791" comment="gnutls-utils-3.8.3-4.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28835" ref_url="https://www.suse.com/security/cve/CVE-2024-28835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1271-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021349.html" source="SUSE-SU"/>
    <description>
    A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-19"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-28835/">CVE-2024-28835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28835">CVE-2024-28835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221747">SUSE bug 1221747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009868787" comment="gnutls-3.8.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868788" comment="gnutls-c++-3.8.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868789" comment="gnutls-dane-3.8.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868790" comment="gnutls-devel-3.8.3-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009868791" comment="gnutls-utils-3.8.3-4.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28863" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28863" ref_url="https://www.suse.com/security/cve/CVE-2024-28863" source="SUSE CVE"/>
    <description>
    node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2025-02-16"/>
	<severity>Not set</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-28863/">CVE-2024-28863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28863">CVE-2024-28863 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009940517" comment="nodejs-18.20.4-1.module+el9.4.0+22195+c221878e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940518" comment="nodejs-devel-18.20.4-1.module+el9.4.0+22195+c221878e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940519" comment="nodejs-docs-18.20.4-1.module+el9.4.0+22195+c221878e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940520" comment="nodejs-full-i18n-18.20.4-1.module+el9.4.0+22195+c221878e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851983" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0+19762+d716bf3b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805113" comment="nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805114" comment="nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940521" comment="npm-10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28956" ref_url="https://www.suse.com/security/cve/CVE-2024-28956" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001787.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10991" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001789.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
		<reference ref_id="TID000021845" ref_url="https://www.suse.com/support/kb/doc/?id=000021845" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15086-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ANGNTGSZ5LTAKIQQHL254Y6BCBTC33W2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15142-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KEACKX57LEHS2YKZ4PO5DYNOQRGQSDO2/" source="SUSE-SU"/>
    <description>
    Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28956/">CVE-2024-28956 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28956">CVE-2024-28956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053953" comment="microcode_ctl-20250211-1.20250512.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29038</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29038" ref_url="https://www.suse.com/security/cve/CVE-2024-29038" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9424" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021188.html" source="SUSE-SU"/>
    <description>
    tpm2-tools is the source repository for the Trusted Platform Module (TPM2.0) tools. A malicious attacker can generate arbitrary quote data which is not detected by `tpm2 checkquote`. This issue was patched in version 5.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-10-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29038/">CVE-2024-29038 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29038">CVE-2024-29038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223687">SUSE bug 1223687</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953762" comment="tpm2-tools-5.2-4.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29039" ref_url="https://www.suse.com/security/cve/CVE-2024-29039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9424" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1636-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021188.html" source="SUSE-SU"/>
    <description>
    tpm2 is the source repository for the Trusted Platform Module (TPM2.0) tools. This vulnerability allows attackers to manipulate tpm2_checkquote outputs by altering the TPML_PCR_SELECTION in the PCR input file.  As a result, digest values are incorrectly mapped to PCR slots and banks, providing a misleading picture of the TPM state. This issue has been patched in version 5.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-10-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-29039/">CVE-2024-29039 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-29039">CVE-2024-29039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223689">SUSE bug 1223689</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953762" comment="tpm2-tools-5.2-4.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29214</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29214" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29214" ref_url="https://www.suse.com/security/cve/CVE-2024-29214" source="SUSE CVE"/>
    <description>
    Improper input validation in UEFI firmware CseVariableStorageSmm for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-29214/">CVE-2024-29214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29214">CVE-2024-29214 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053952" comment="microcode_ctl-20240910-1.20250211.1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2947</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2947" ref_url="https://www.suse.com/security/cve/CVE-2024-2947" source="SUSE CVE"/>
    <description>
    A flaw was found in Cockpit. Deleting a sosreport with a crafted name via the Cockpit web interface can lead to a command injection vulnerability, resulting in privilege escalation. This issue affects Cockpit versions 270 and newer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2947/">CVE-2024-2947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2947">CVE-2024-2947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222125">SUSE bug 1222125</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009871325" comment="cockpit-311.2-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871326" comment="cockpit-bridge-311.2-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871327" comment="cockpit-doc-311.2-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871328" comment="cockpit-packagekit-311.2-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871329" comment="cockpit-pcp-311.2-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871330" comment="cockpit-storaged-311.2-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871331" comment="cockpit-system-311.2-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871332" comment="cockpit-ws-311.2-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29510</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29510" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29510" ref_url="https://www.suse.com/security/cve/CVE-2024-29510" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6197" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035810.html" source="SUSE-SU"/>
    <description>
    Artifex Ghostscript before 10.03.1 allows memory corruption, and SAFER sandbox bypass, via format string injection with a uniprint device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-29510/">CVE-2024-29510 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29510">CVE-2024-29510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226945">SUSE bug 1226945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942234" comment="ghostscript-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942235" comment="ghostscript-doc-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942236" comment="ghostscript-tools-dvipdf-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942237" comment="ghostscript-tools-fonts-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942238" comment="ghostscript-tools-printing-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942239" comment="ghostscript-x11-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942240" comment="libgs-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942241" comment="libgs-devel-9.54.0-17.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2961" ref_url="https://www.suse.com/security/cve/CVE-2024-2961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0081-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/472PX6IZ26ALBE66YKBJD3XTN7M34U4L/" source="SUSE-SU"/>
    <description>
    The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-2961/">CVE-2024-2961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2961">CVE-2024-2961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223019">SUSE bug 1223019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866794" comment="glibc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866795" comment="glibc-all-langpacks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866796" comment="glibc-benchtests-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866797" comment="glibc-common-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866798" comment="glibc-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866799" comment="glibc-doc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866800" comment="glibc-gconv-extra-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866801" comment="glibc-headers-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866802" comment="glibc-langpack-aa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866803" comment="glibc-langpack-af-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866804" comment="glibc-langpack-agr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866805" comment="glibc-langpack-ak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866806" comment="glibc-langpack-am-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866807" comment="glibc-langpack-an-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866808" comment="glibc-langpack-anp-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866809" comment="glibc-langpack-ar-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866810" comment="glibc-langpack-as-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866811" comment="glibc-langpack-ast-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866812" comment="glibc-langpack-ayc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866813" comment="glibc-langpack-az-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866814" comment="glibc-langpack-be-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866815" comment="glibc-langpack-bem-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866816" comment="glibc-langpack-ber-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866817" comment="glibc-langpack-bg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866818" comment="glibc-langpack-bhb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866819" comment="glibc-langpack-bho-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866820" comment="glibc-langpack-bi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866821" comment="glibc-langpack-bn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866822" comment="glibc-langpack-bo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866823" comment="glibc-langpack-br-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866824" comment="glibc-langpack-brx-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866825" comment="glibc-langpack-bs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866826" comment="glibc-langpack-byn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866827" comment="glibc-langpack-ca-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866828" comment="glibc-langpack-ce-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866829" comment="glibc-langpack-chr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866830" comment="glibc-langpack-ckb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866831" comment="glibc-langpack-cmn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866832" comment="glibc-langpack-crh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866833" comment="glibc-langpack-cs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866834" comment="glibc-langpack-csb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866835" comment="glibc-langpack-cv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866836" comment="glibc-langpack-cy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866837" comment="glibc-langpack-da-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866838" comment="glibc-langpack-de-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866839" comment="glibc-langpack-doi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866840" comment="glibc-langpack-dsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866841" comment="glibc-langpack-dv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866842" comment="glibc-langpack-dz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866843" comment="glibc-langpack-el-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866844" comment="glibc-langpack-en-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866845" comment="glibc-langpack-eo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866846" comment="glibc-langpack-es-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866847" comment="glibc-langpack-et-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866848" comment="glibc-langpack-eu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866849" comment="glibc-langpack-fa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866850" comment="glibc-langpack-ff-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866851" comment="glibc-langpack-fi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866852" comment="glibc-langpack-fil-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866853" comment="glibc-langpack-fo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866854" comment="glibc-langpack-fr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866855" comment="glibc-langpack-fur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866856" comment="glibc-langpack-fy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866857" comment="glibc-langpack-ga-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866858" comment="glibc-langpack-gd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866859" comment="glibc-langpack-gez-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866860" comment="glibc-langpack-gl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866861" comment="glibc-langpack-gu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866862" comment="glibc-langpack-gv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866863" comment="glibc-langpack-ha-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866864" comment="glibc-langpack-hak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866865" comment="glibc-langpack-he-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866866" comment="glibc-langpack-hi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866867" comment="glibc-langpack-hif-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866868" comment="glibc-langpack-hne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866869" comment="glibc-langpack-hr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866870" comment="glibc-langpack-hsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866871" comment="glibc-langpack-ht-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866872" comment="glibc-langpack-hu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866873" comment="glibc-langpack-hy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866874" comment="glibc-langpack-ia-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866875" comment="glibc-langpack-id-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866876" comment="glibc-langpack-ig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866877" comment="glibc-langpack-ik-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866878" comment="glibc-langpack-is-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866879" comment="glibc-langpack-it-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866880" comment="glibc-langpack-iu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866881" comment="glibc-langpack-ja-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866882" comment="glibc-langpack-ka-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866883" comment="glibc-langpack-kab-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866884" comment="glibc-langpack-kk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866885" comment="glibc-langpack-kl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866886" comment="glibc-langpack-km-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866887" comment="glibc-langpack-kn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866888" comment="glibc-langpack-ko-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866889" comment="glibc-langpack-kok-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866890" comment="glibc-langpack-ks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866891" comment="glibc-langpack-ku-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866892" comment="glibc-langpack-kw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866893" comment="glibc-langpack-ky-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866894" comment="glibc-langpack-lb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866895" comment="glibc-langpack-lg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866896" comment="glibc-langpack-li-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866897" comment="glibc-langpack-lij-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866898" comment="glibc-langpack-ln-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866899" comment="glibc-langpack-lo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866900" comment="glibc-langpack-lt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866901" comment="glibc-langpack-lv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866902" comment="glibc-langpack-lzh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866903" comment="glibc-langpack-mag-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866904" comment="glibc-langpack-mai-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866905" comment="glibc-langpack-mfe-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866906" comment="glibc-langpack-mg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866907" comment="glibc-langpack-mhr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866908" comment="glibc-langpack-mi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866909" comment="glibc-langpack-miq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866910" comment="glibc-langpack-mjw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866911" comment="glibc-langpack-mk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866912" comment="glibc-langpack-ml-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866913" comment="glibc-langpack-mn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866914" comment="glibc-langpack-mni-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866915" comment="glibc-langpack-mnw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866916" comment="glibc-langpack-mr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866917" comment="glibc-langpack-ms-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866918" comment="glibc-langpack-mt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866919" comment="glibc-langpack-my-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866920" comment="glibc-langpack-nan-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866921" comment="glibc-langpack-nb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866922" comment="glibc-langpack-nds-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866923" comment="glibc-langpack-ne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866924" comment="glibc-langpack-nhn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866925" comment="glibc-langpack-niu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866926" comment="glibc-langpack-nl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866927" comment="glibc-langpack-nn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866928" comment="glibc-langpack-nr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866929" comment="glibc-langpack-nso-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866930" comment="glibc-langpack-oc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866931" comment="glibc-langpack-om-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866932" comment="glibc-langpack-or-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866933" comment="glibc-langpack-os-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866934" comment="glibc-langpack-pa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866935" comment="glibc-langpack-pap-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866936" comment="glibc-langpack-pl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866937" comment="glibc-langpack-ps-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866938" comment="glibc-langpack-pt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866939" comment="glibc-langpack-quz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866940" comment="glibc-langpack-raj-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866941" comment="glibc-langpack-ro-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866942" comment="glibc-langpack-ru-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866943" comment="glibc-langpack-rw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866944" comment="glibc-langpack-sa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866945" comment="glibc-langpack-sah-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866946" comment="glibc-langpack-sat-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866947" comment="glibc-langpack-sc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866948" comment="glibc-langpack-sd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866949" comment="glibc-langpack-se-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866950" comment="glibc-langpack-sgs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866951" comment="glibc-langpack-shn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866952" comment="glibc-langpack-shs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866953" comment="glibc-langpack-si-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866954" comment="glibc-langpack-sid-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866955" comment="glibc-langpack-sk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866956" comment="glibc-langpack-sl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866957" comment="glibc-langpack-sm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866958" comment="glibc-langpack-so-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866959" comment="glibc-langpack-sq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866960" comment="glibc-langpack-sr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866961" comment="glibc-langpack-ss-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866962" comment="glibc-langpack-st-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866963" comment="glibc-langpack-sv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866964" comment="glibc-langpack-sw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866965" comment="glibc-langpack-szl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866966" comment="glibc-langpack-ta-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866967" comment="glibc-langpack-tcy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866968" comment="glibc-langpack-te-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866969" comment="glibc-langpack-tg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866970" comment="glibc-langpack-th-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866971" comment="glibc-langpack-the-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866972" comment="glibc-langpack-ti-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866973" comment="glibc-langpack-tig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866974" comment="glibc-langpack-tk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866975" comment="glibc-langpack-tl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866976" comment="glibc-langpack-tn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866977" comment="glibc-langpack-to-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866978" comment="glibc-langpack-tpi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866979" comment="glibc-langpack-tr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866980" comment="glibc-langpack-ts-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866981" comment="glibc-langpack-tt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866982" comment="glibc-langpack-ug-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866983" comment="glibc-langpack-uk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866984" comment="glibc-langpack-unm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866985" comment="glibc-langpack-ur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866986" comment="glibc-langpack-uz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866987" comment="glibc-langpack-ve-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866988" comment="glibc-langpack-vi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866989" comment="glibc-langpack-wa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866990" comment="glibc-langpack-wae-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866991" comment="glibc-langpack-wal-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866992" comment="glibc-langpack-wo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866993" comment="glibc-langpack-xh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866994" comment="glibc-langpack-yi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866995" comment="glibc-langpack-yo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866996" comment="glibc-langpack-yue-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866997" comment="glibc-langpack-yuw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866998" comment="glibc-langpack-zh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866999" comment="glibc-langpack-zu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867000" comment="glibc-locale-source-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867001" comment="glibc-minimal-langpack-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867002" comment="glibc-nss-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867003" comment="glibc-static-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867004" comment="glibc-utils-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867005" comment="libnsl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867006" comment="nscd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867007" comment="nss_db-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867008" comment="nss_hesiod-2.34-100.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202429944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-29944</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-29944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29944" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-29944" ref_url="https://www.suse.com/security/cve/CVE-2024-29944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018221.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. Note: This vulnerability affects Desktop Firefox only, it does not affect mobile versions of Firefox. This vulnerability affects Firefox &lt; 124.0.1 and Firefox ESR &lt; 115.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-03-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-29944/">CVE-2024-29944 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-29944">CVE-2024-29944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221850">SUSE bug 1221850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009851986" comment="firefox-115.9.1-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009851987" comment="firefox-x11-115.9.1-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202430045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-30045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-30045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30045" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-30045" ref_url="https://www.suse.com/security/cve/CVE-2024-30045" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30045/">CVE-2024-30045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30045">CVE-2024-30045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053980" comment="aspnetcore-runtime-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872304" comment="aspnetcore-runtime-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872305" comment="aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053981" comment="aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872306" comment="aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053982" comment="dotnet-apphost-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872307" comment="dotnet-apphost-pack-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872308" comment="dotnet-host-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053983" comment="dotnet-hostfxr-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872309" comment="dotnet-hostfxr-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053984" comment="dotnet-runtime-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872310" comment="dotnet-runtime-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872311" comment="dotnet-runtime-dbg-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053985" comment="dotnet-sdk-7.0-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872318" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872312" comment="dotnet-sdk-8.0-8.0.105-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872313" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872314" comment="dotnet-sdk-dbg-8.0-8.0.105-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053986" comment="dotnet-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872315" comment="dotnet-targeting-pack-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053987" comment="dotnet-templates-7.0-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872316" comment="dotnet-templates-8.0-8.0.105-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872317" comment="netstandard-targeting-pack-2.1-8.0.105-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202430046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-30046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-30046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-30046" ref_url="https://www.suse.com/security/cve/CVE-2024-30046" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30046/">CVE-2024-30046 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30046">CVE-2024-30046 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053980" comment="aspnetcore-runtime-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872304" comment="aspnetcore-runtime-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872305" comment="aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053981" comment="aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872306" comment="aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053982" comment="dotnet-apphost-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872307" comment="dotnet-apphost-pack-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872308" comment="dotnet-host-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053983" comment="dotnet-hostfxr-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872309" comment="dotnet-hostfxr-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053984" comment="dotnet-runtime-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872310" comment="dotnet-runtime-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872311" comment="dotnet-runtime-dbg-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053985" comment="dotnet-sdk-7.0-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872318" comment="dotnet-sdk-7.0-source-built-artifacts-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872312" comment="dotnet-sdk-8.0-8.0.105-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872313" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.105-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872314" comment="dotnet-sdk-dbg-8.0-8.0.105-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053986" comment="dotnet-targeting-pack-7.0-7.0.19-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872315" comment="dotnet-targeting-pack-8.0-8.0.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053987" comment="dotnet-templates-7.0-7.0.119-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872316" comment="dotnet-templates-8.0-8.0.105-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872317" comment="netstandard-targeting-pack-2.1-8.0.105-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202430105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-30105</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-30105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30105" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-30105" ref_url="https://www.suse.com/security/cve/CVE-2024-30105" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30105/">CVE-2024-30105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30105">CVE-2024-30105 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872973" comment="aspnetcore-runtime-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872974" comment="aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872975" comment="aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872976" comment="dotnet-apphost-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872977" comment="dotnet-host-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872978" comment="dotnet-hostfxr-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872979" comment="dotnet-runtime-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872980" comment="dotnet-runtime-dbg-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872981" comment="dotnet-sdk-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872982" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872983" comment="dotnet-sdk-dbg-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872984" comment="dotnet-targeting-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872985" comment="dotnet-templates-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872986" comment="netstandard-targeting-pack-2.1-8.0.107-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202430156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-30156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-30156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30156" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-30156" ref_url="https://www.suse.com/security/cve/CVE-2024-30156" source="SUSE CVE"/>
    <description>
    Varnish Cache before 7.3.2 and 7.4.x before 7.4.3 (and before 6.0.13 LTS), and Varnish Enterprise 6 before 6.0.12r6, allows credits exhaustion for an HTTP/2 connection control flow window, aka a Broke Window Attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-10"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-30156/">CVE-2024-30156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30156">CVE-2024-30156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221942">SUSE bug 1221942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009853725" comment="varnish-6.6.2-4.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853726" comment="varnish-devel-6.6.2-4.el9_3.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853727" comment="varnish-docs-6.6.2-4.el9_3.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3019" ref_url="https://www.suse.com/security/cve/CVE-2024-3019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03233-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021087.html" source="SUSE-SU"/>
    <description>
    A flaw was found in PCP. The default pmproxy configuration exposes the Redis server backend to the local network, allowing remote command execution with the privileges of the Redis user. This issue can only be exploited when pmproxy is running. By default, pmproxy is not running and needs to be started manually. The pmproxy service is usually started from the 'Metrics settings' page of the Cockpit web interface. This flaw affects PCP versions 4.3.4 and newer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2025-09-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3019/">CVE-2024-3019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3019">CVE-2024-3019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222121">SUSE bug 1222121</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872841" comment="pcp-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872842" comment="pcp-conf-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872843" comment="pcp-devel-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872844" comment="pcp-doc-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872845" comment="pcp-export-pcp2elasticsearch-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872846" comment="pcp-export-pcp2graphite-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872847" comment="pcp-export-pcp2influxdb-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872848" comment="pcp-export-pcp2json-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872849" comment="pcp-export-pcp2spark-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872850" comment="pcp-export-pcp2xml-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872851" comment="pcp-export-pcp2zabbix-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872852" comment="pcp-export-zabbix-agent-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872853" comment="pcp-geolocate-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872854" comment="pcp-gui-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872855" comment="pcp-import-collectl2pcp-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872856" comment="pcp-import-ganglia2pcp-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872857" comment="pcp-import-iostat2pcp-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872858" comment="pcp-import-mrtg2pcp-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872859" comment="pcp-import-sar2pcp-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872860" comment="pcp-libs-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872861" comment="pcp-libs-devel-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872862" comment="pcp-pmda-activemq-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872863" comment="pcp-pmda-apache-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872864" comment="pcp-pmda-bash-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872865" comment="pcp-pmda-bcc-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872866" comment="pcp-pmda-bind2-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872867" comment="pcp-pmda-bonding-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872868" comment="pcp-pmda-bpf-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872869" comment="pcp-pmda-bpftrace-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872870" comment="pcp-pmda-cifs-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872871" comment="pcp-pmda-cisco-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872872" comment="pcp-pmda-dbping-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872873" comment="pcp-pmda-denki-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872874" comment="pcp-pmda-dm-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872875" comment="pcp-pmda-docker-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872876" comment="pcp-pmda-ds389-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872877" comment="pcp-pmda-ds389log-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872878" comment="pcp-pmda-elasticsearch-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872879" comment="pcp-pmda-farm-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872880" comment="pcp-pmda-gfs2-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872881" comment="pcp-pmda-gluster-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872882" comment="pcp-pmda-gpfs-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872883" comment="pcp-pmda-gpsd-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872884" comment="pcp-pmda-hacluster-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872885" comment="pcp-pmda-haproxy-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872886" comment="pcp-pmda-infiniband-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872887" comment="pcp-pmda-json-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872888" comment="pcp-pmda-libvirt-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872889" comment="pcp-pmda-lio-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872890" comment="pcp-pmda-lmsensors-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872891" comment="pcp-pmda-logger-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872892" comment="pcp-pmda-lustre-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872893" comment="pcp-pmda-lustrecomm-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872894" comment="pcp-pmda-mailq-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872895" comment="pcp-pmda-memcache-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872896" comment="pcp-pmda-mic-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872897" comment="pcp-pmda-mongodb-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872898" comment="pcp-pmda-mounts-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872899" comment="pcp-pmda-mssql-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872900" comment="pcp-pmda-mysql-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872901" comment="pcp-pmda-named-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872902" comment="pcp-pmda-netcheck-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872903" comment="pcp-pmda-netfilter-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872904" comment="pcp-pmda-news-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872905" comment="pcp-pmda-nfsclient-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872906" comment="pcp-pmda-nginx-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872907" comment="pcp-pmda-nvidia-gpu-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872908" comment="pcp-pmda-openmetrics-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872909" comment="pcp-pmda-openvswitch-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872910" comment="pcp-pmda-oracle-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872911" comment="pcp-pmda-pdns-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872912" comment="pcp-pmda-perfevent-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872913" comment="pcp-pmda-podman-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872914" comment="pcp-pmda-postfix-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872915" comment="pcp-pmda-postgresql-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872916" comment="pcp-pmda-rabbitmq-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872917" comment="pcp-pmda-redis-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872918" comment="pcp-pmda-resctrl-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872919" comment="pcp-pmda-roomtemp-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872920" comment="pcp-pmda-rsyslog-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872921" comment="pcp-pmda-samba-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872922" comment="pcp-pmda-sendmail-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872923" comment="pcp-pmda-shping-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872924" comment="pcp-pmda-slurm-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872925" comment="pcp-pmda-smart-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872926" comment="pcp-pmda-snmp-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872927" comment="pcp-pmda-sockets-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872928" comment="pcp-pmda-statsd-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872929" comment="pcp-pmda-summary-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872930" comment="pcp-pmda-systemd-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872931" comment="pcp-pmda-trace-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872932" comment="pcp-pmda-unbound-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872933" comment="pcp-pmda-weblog-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872934" comment="pcp-pmda-zimbra-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872935" comment="pcp-pmda-zswap-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872936" comment="pcp-selinux-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872937" comment="pcp-system-tools-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872938" comment="pcp-zeroconf-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872939" comment="perl-PCP-LogImport-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872940" comment="perl-PCP-LogSummary-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872941" comment="perl-PCP-MMV-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872942" comment="perl-PCP-PMDA-6.2.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872943" comment="python3-pcp-6.2.0-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202430203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-30203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-30203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30203" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-30203" ref_url="https://www.suse.com/security/cve/CVE-2024-30203" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6987" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000085.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018866.html" source="SUSE-SU"/>
    <description>
    In Emacs before 29.3, Gnus treats inline MIME contents as trusted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30203/">CVE-2024-30203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30203">CVE-2024-30203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222053">SUSE bug 1222053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953696" comment="emacs-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953697" comment="emacs-common-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953698" comment="emacs-filesystem-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953699" comment="emacs-lucid-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953700" comment="emacs-nox-27.2-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202430204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-30204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-30204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30204" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-30204" ref_url="https://www.suse.com/security/cve/CVE-2024-30204" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018866.html" source="SUSE-SU"/>
    <description>
    In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30204/">CVE-2024-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30204">CVE-2024-30204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222052">SUSE bug 1222052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953696" comment="emacs-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953697" comment="emacs-common-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953698" comment="emacs-filesystem-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953699" comment="emacs-lucid-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953700" comment="emacs-nox-27.2-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202430205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-30205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-30205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30205" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-30205" ref_url="https://www.suse.com/security/cve/CVE-2024-30205" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6987" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000085.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018866.html" source="SUSE-SU"/>
    <description>
    In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-30205/">CVE-2024-30205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-30205">CVE-2024-30205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222050">SUSE bug 1222050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953696" comment="emacs-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953697" comment="emacs-common-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953698" comment="emacs-filesystem-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953699" comment="emacs-lucid-27.2-10.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953700" comment="emacs-nox-27.2-10.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3096" ref_url="https://www.suse.com/security/cve/CVE-2024-3096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000656.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035602.html" source="SUSE-SU"/>
    <description>
    In PHP   version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if  a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3096/">CVE-2024-3096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3096">CVE-2024-3096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222858">SUSE bug 1222858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957468" comment="php-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957469" comment="php-bcmath-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957470" comment="php-cli-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957471" comment="php-common-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957472" comment="php-dba-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957473" comment="php-dbg-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957474" comment="php-devel-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957475" comment="php-embedded-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957476" comment="php-enchant-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957477" comment="php-ffi-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957478" comment="php-fpm-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957479" comment="php-gd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957480" comment="php-gmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957481" comment="php-intl-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957482" comment="php-ldap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957483" comment="php-mbstring-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957484" comment="php-mysqlnd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957485" comment="php-odbc-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957486" comment="php-opcache-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957487" comment="php-pdo-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957493" comment="php-pgsql-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957494" comment="php-process-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957495" comment="php-snmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957496" comment="php-soap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957497" comment="php-xml-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31080" ref_url="https://www.suse.com/security/cve/CVE-2024-31080" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9093" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000596.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31080/">CVE-2024-31080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31080">CVE-2024-31080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222309">SUSE bug 1222309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866770" comment="tigervnc-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866771" comment="tigervnc-icons-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866772" comment="tigervnc-license-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866773" comment="tigervnc-selinux-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866774" comment="tigervnc-server-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866775" comment="tigervnc-server-minimal-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866776" comment="tigervnc-server-module-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953576" comment="xorg-x11-server-Xdmx-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953577" comment="xorg-x11-server-Xephyr-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953578" comment="xorg-x11-server-Xnest-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953579" comment="xorg-x11-server-Xorg-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953580" comment="xorg-x11-server-Xvfb-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953538" comment="xorg-x11-server-Xwayland-23.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953539" comment="xorg-x11-server-Xwayland-devel-23.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953581" comment="xorg-x11-server-common-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953582" comment="xorg-x11-server-devel-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953583" comment="xorg-x11-server-source-1.20.11-26.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31081" ref_url="https://www.suse.com/security/cve/CVE-2024-31081" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9093" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000596.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-31081/">CVE-2024-31081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31081">CVE-2024-31081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222310">SUSE bug 1222310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866770" comment="tigervnc-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866771" comment="tigervnc-icons-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866772" comment="tigervnc-license-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866773" comment="tigervnc-selinux-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866774" comment="tigervnc-server-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866775" comment="tigervnc-server-minimal-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866776" comment="tigervnc-server-module-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953576" comment="xorg-x11-server-Xdmx-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953577" comment="xorg-x11-server-Xephyr-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953578" comment="xorg-x11-server-Xnest-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953579" comment="xorg-x11-server-Xorg-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953580" comment="xorg-x11-server-Xvfb-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953538" comment="xorg-x11-server-Xwayland-23.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953539" comment="xorg-x11-server-Xwayland-devel-23.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953581" comment="xorg-x11-server-common-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953582" comment="xorg-x11-server-devel-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953583" comment="xorg-x11-server-source-1.20.11-26.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31083" ref_url="https://www.suse.com/security/cve/CVE-2024-31083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9093" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000596.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/034958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31083/">CVE-2024-31083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31083">CVE-2024-31083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222312">SUSE bug 1222312</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866770" comment="tigervnc-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866771" comment="tigervnc-icons-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866772" comment="tigervnc-license-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866773" comment="tigervnc-selinux-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866774" comment="tigervnc-server-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866775" comment="tigervnc-server-minimal-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866776" comment="tigervnc-server-module-1.13.1-8.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953576" comment="xorg-x11-server-Xdmx-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953577" comment="xorg-x11-server-Xephyr-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953578" comment="xorg-x11-server-Xnest-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953579" comment="xorg-x11-server-Xorg-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953580" comment="xorg-x11-server-Xvfb-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953538" comment="xorg-x11-server-Xwayland-23.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953539" comment="xorg-x11-server-Xwayland-devel-23.2.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953581" comment="xorg-x11-server-common-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953582" comment="xorg-x11-server-devel-1.20.11-26.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953583" comment="xorg-x11-server-source-1.20.11-26.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31157</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31157" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31157" ref_url="https://www.suse.com/security/cve/CVE-2024-31157" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001287.html" source="SUSE-SU"/>
    <description>
    Improper initialization in UEFI firmware OutOfBandXML module in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-31157/">CVE-2024-31157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31157">CVE-2024-31157 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984837" comment="microcode_ctl-20250211-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31227</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31227" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31227" ref_url="https://www.suse.com/security/cve/CVE-2024-31227" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3549-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037165.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FC3R4QUTZLEWJMAPH3UHB3OKNYMNYUZM/" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-07"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31227/">CVE-2024-31227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-31227">CVE-2024-31227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231266">SUSE bug 1231266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009956891" comment="redis-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956892" comment="redis-devel-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956893" comment="redis-doc-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31228</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31228" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31228" ref_url="https://www.suse.com/security/cve/CVE-2024-31228" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000638.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0595" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000798.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3549-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FC3R4QUTZLEWJMAPH3UHB3OKNYMNYUZM/" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-07"/>
	<updated date="2025-09-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-31228/">CVE-2024-31228 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31228">CVE-2024-31228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231265">SUSE bug 1231265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009956891" comment="redis-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956892" comment="redis-devel-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956893" comment="redis-doc-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202431449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-31449</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-31449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31449" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-31449" ref_url="https://www.suse.com/security/cve/CVE-2024-31449" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000638.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0595" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000798.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3549-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14412-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FC3R4QUTZLEWJMAPH3UHB3OKNYMNYUZM/" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-07"/>
	<updated date="2025-09-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-31449/">CVE-2024-31449 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-31449">CVE-2024-31449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231264">SUSE bug 1231264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009956891" comment="redis-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956892" comment="redis-devel-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009956893" comment="redis-doc-7.2.6-1.module+el9.5.0+22422+63e067d8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3183" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3183" ref_url="https://www.suse.com/security/cve/CVE-2024-3183" source="SUSE CVE"/>
    <description>
    A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client's session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user's password.

If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal's password).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-04"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3183/">CVE-2024-3183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3183">CVE-2024-3183 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009871308" comment="ipa-client-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871309" comment="ipa-client-common-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871310" comment="ipa-client-epn-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871311" comment="ipa-client-samba-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871312" comment="ipa-common-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871313" comment="ipa-selinux-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871314" comment="ipa-server-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871315" comment="ipa-server-common-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871316" comment="ipa-server-dns-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871317" comment="ipa-server-trust-ad-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871318" comment="python3-ipaclient-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871319" comment="python3-ipalib-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871320" comment="python3-ipaserver-4.11.0-15.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871321" comment="python3-ipatests-4.11.0-15.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32002" ref_url="https://www.suse.com/security/cve/CVE-2024-32002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021288.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32002/">CVE-2024-32002 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32002">CVE-2024-32002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224168">SUSE bug 1224168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224170">SUSE bug 1224170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869954" comment="git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869955" comment="git-all-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869956" comment="git-core-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869957" comment="git-core-doc-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869958" comment="git-credential-libsecret-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869959" comment="git-daemon-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869960" comment="git-email-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869961" comment="git-gui-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869962" comment="git-instaweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869963" comment="git-subtree-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869964" comment="git-svn-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869965" comment="gitk-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869966" comment="gitweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869967" comment="perl-Git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869968" comment="perl-Git-SVN-2.43.5-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32004" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32004" ref_url="https://www.suse.com/security/cve/CVE-2024-32004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021288.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, an attacker can prepare a local repository in such a way that, when cloned, will execute arbitrary code during the operation. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid cloning repositories from untrusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2026-01-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32004/">CVE-2024-32004 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32004">CVE-2024-32004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224170">SUSE bug 1224170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869954" comment="git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869955" comment="git-all-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869956" comment="git-core-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869957" comment="git-core-doc-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869958" comment="git-credential-libsecret-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869959" comment="git-daemon-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869960" comment="git-email-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869961" comment="git-gui-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869962" comment="git-instaweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869963" comment="git-subtree-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869964" comment="git-svn-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869965" comment="gitk-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869966" comment="gitweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869967" comment="perl-Git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869968" comment="perl-Git-SVN-2.43.5-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32020" ref_url="https://www.suse.com/security/cve/CVE-2024-32020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021288.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2026-01-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32020/">CVE-2024-32020 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32020">CVE-2024-32020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224171">SUSE bug 1224171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869954" comment="git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869955" comment="git-all-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869956" comment="git-core-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869957" comment="git-core-doc-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869958" comment="git-credential-libsecret-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869959" comment="git-daemon-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869960" comment="git-email-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869961" comment="git-gui-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869962" comment="git-instaweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869963" comment="git-subtree-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869964" comment="git-svn-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869965" comment="gitk-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869966" comment="gitweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869967" comment="perl-Git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869968" comment="perl-Git-SVN-2.43.5-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32021</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32021" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32021" ref_url="https://www.suse.com/security/cve/CVE-2024-32021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021288.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over the filesystem may creating hardlinks to arbitrary user-owned files on the same filesystem in the target Git repository's `objects/` directory. When cloning a repository over the filesystem (without explicitly specifying the `file://` protocol or `--no-local`), the optimizations for local cloning
will be used, which include attempting to hard link the object files instead of copying them. While the code includes checks against symbolic links in the source repository, which were added during the fix for CVE-2022-39253, these checks can still be raced because the hard link operation ultimately follows symlinks. If the object on the filesystem appears as a file during the check, and then a symlink during the operation, this will allow the adversary to bypass the check and create hardlinks in the destination objects directory to arbitrary, user-readable files. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-32021/">CVE-2024-32021 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32021">CVE-2024-32021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224172">SUSE bug 1224172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869954" comment="git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869955" comment="git-all-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869956" comment="git-core-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869957" comment="git-core-doc-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869958" comment="git-credential-libsecret-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869959" comment="git-daemon-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869960" comment="git-email-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869961" comment="git-gui-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869962" comment="git-instaweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869963" comment="git-subtree-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869964" comment="git-svn-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869965" comment="gitk-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869966" comment="gitweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869967" comment="perl-Git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869968" comment="perl-Git-SVN-2.43.5-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32039" ref_url="https://www.suse.com/security/cve/CVE-2024-32039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32039/">CVE-2024-32039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32039">CVE-2024-32039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223293">SUSE bug 1223293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32040</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32040" ref_url="https://www.suse.com/security/cve/CVE-2024-32040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32040/">CVE-2024-32040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32040">CVE-2024-32040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223294">SUSE bug 1223294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32041" ref_url="https://www.suse.com/security/cve/CVE-2024-32041" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32041/">CVE-2024-32041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32041">CVE-2024-32041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223295">SUSE bug 1223295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32458" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32458" ref_url="https://www.suse.com/security/cve/CVE-2024-32458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32458/">CVE-2024-32458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32458">CVE-2024-32458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223296">SUSE bug 1223296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32459" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32459" ref_url="https://www.suse.com/security/cve/CVE-2024-32459" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32459/">CVE-2024-32459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32459">CVE-2024-32459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223297">SUSE bug 1223297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32460" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32460" ref_url="https://www.suse.com/security/cve/CVE-2024-32460" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32460/">CVE-2024-32460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32460">CVE-2024-32460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223298">SUSE bug 1223298</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32462" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32462" ref_url="https://www.suse.com/security/cve/CVE-2024-32462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1535-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1803-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2067-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035613.html" source="SUSE-SU"/>
    <description>
    Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. in versions before 1.10.9, 1.12.9, 1.14.6, and 1.15.8, a malicious or compromised Flatpak app could execute arbitrary code outside its sandbox. Normally, the `--command` argument of `flatpak run` expects to be given a command to run in the specified Flatpak app, optionally along with some arguments. However it is possible to instead pass `bwrap` arguments to `--command=`, such as `--bind`. It's possible to pass an arbitrary `commandline` to the portal interface `org.freedesktop.portal.Background.RequestBackground` from within a Flatpak app. When this is converted into a `--command` and arguments, it achieves the same effect of passing arguments directly to `bwrap`, and thus can be used for a sandbox escape. The solution is to pass the `--` argument to `bwrap`, which makes it stop processing options. This has been supported since bubblewrap 0.3.0. All supported versions of Flatpak require at least that version of bubblewrap. xdg-desktop-portal version 1.18.4 will mitigate this vulnerability by only allowing Flatpak apps to create .desktop files for commands that do not start with --. The vulnerability is patched in 1.15.8, 1.10.9, 1.12.9, and 1.14.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-32462/">CVE-2024-32462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32462">CVE-2024-32462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223110">SUSE bug 1223110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869924" comment="flatpak-1.12.9-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869925" comment="flatpak-devel-1.12.9-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869926" comment="flatpak-libs-1.12.9-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869927" comment="flatpak-selinux-1.12.9-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869928" comment="flatpak-session-helper-1.12.9-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32465" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32465" ref_url="https://www.suse.com/security/cve/CVE-2024-32465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1807-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021288.html" source="SUSE-SU"/>
    <description>
    Git is a revision control system. The Git project recommends to avoid working in untrusted repositories, and instead to clone it first with `git clone --no-local` to obtain a clean copy. Git has specific protections to make that a safe operation even with an untrusted source repository, but vulnerabilities allow those protections to be bypassed. In the context of cloning local repositories owned by other users, this vulnerability has been covered in CVE-2024-32004. But there are circumstances where the fixes for CVE-2024-32004 are not enough: For example, when obtaining a `.zip` file containing a full copy of a Git repository, it should not be trusted by default to be safe, as e.g. hooks could be configured to run within the context of that repository. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid using Git in repositories that have been obtained via archives from untrusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2026-01-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32465/">CVE-2024-32465 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32465">CVE-2024-32465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224170">SUSE bug 1224170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1224173">SUSE bug 1224173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869954" comment="git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869955" comment="git-all-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869956" comment="git-core-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869957" comment="git-core-doc-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869958" comment="git-credential-libsecret-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869959" comment="git-daemon-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869960" comment="git-email-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869961" comment="git-gui-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869962" comment="git-instaweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869963" comment="git-subtree-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869964" comment="git-svn-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869965" comment="gitk-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869966" comment="gitweb-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869967" comment="perl-Git-2.43.5-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869968" comment="perl-Git-SVN-2.43.5-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32487" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32487" ref_url="https://www.suse.com/security/cve/CVE-2024-32487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1598-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040305.html" source="SUSE-SU"/>
    <description>
    less through 653 allows OS command execution via a newline character in the name of a file, because quoting is mishandled in filename.c. Exploitation typically requires use with attacker-controlled file names, such as the files extracted from an untrusted archive. Exploitation also requires the LESSOPEN environment variable, but this is set by default in many common cases.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-06-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32487/">CVE-2024-32487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-32487">CVE-2024-32487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222849">SUSE bug 1222849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867009" comment="less-590-4.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32658" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32658" ref_url="https://www.suse.com/security/cve/CVE-2024-32658" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32658/">CVE-2024-32658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32658">CVE-2024-32658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223353">SUSE bug 1223353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32659</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32659" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32659" ref_url="https://www.suse.com/security/cve/CVE-2024-32659" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32659/">CVE-2024-32659 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32659">CVE-2024-32659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223346">SUSE bug 1223346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32660</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32660" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32660" ref_url="https://www.suse.com/security/cve/CVE-2024-32660" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32660/">CVE-2024-32660 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32660">CVE-2024-32660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223347">SUSE bug 1223347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32661" ref_url="https://www.suse.com/security/cve/CVE-2024-32661" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32661/">CVE-2024-32661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32661">CVE-2024-32661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223348">SUSE bug 1223348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32662" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32662" ref_url="https://www.suse.com/security/cve/CVE-2024-32662" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. This occurs when `WCHAR` string is read with twice the size it has and converted to `UTF-8`, `base64` decoded. The string is only used to compare against the redirection server certificate. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32662/">CVE-2024-32662 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32662">CVE-2024-32662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223350">SUSE bug 1223350</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953533" comment="freerdp-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953534" comment="freerdp-devel-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953535" comment="freerdp-libs-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953536" comment="libwinpr-2.11.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953537" comment="libwinpr-devel-2.11.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3302" ref_url="https://www.suse.com/security/cve/CVE-2024-3302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-3302/">CVE-2024-3302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3302">CVE-2024-3302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33599" ref_url="https://www.suse.com/security/cve/CVE-2024-33599" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
    <description>
    nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow.  This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-33599/">CVE-2024-33599 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33599">CVE-2024-33599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223423">SUSE bug 1223423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223530">SUSE bug 1223530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866794" comment="glibc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866795" comment="glibc-all-langpacks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866796" comment="glibc-benchtests-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866797" comment="glibc-common-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866798" comment="glibc-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866799" comment="glibc-doc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866800" comment="glibc-gconv-extra-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866801" comment="glibc-headers-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866802" comment="glibc-langpack-aa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866803" comment="glibc-langpack-af-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866804" comment="glibc-langpack-agr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866805" comment="glibc-langpack-ak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866806" comment="glibc-langpack-am-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866807" comment="glibc-langpack-an-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866808" comment="glibc-langpack-anp-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866809" comment="glibc-langpack-ar-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866810" comment="glibc-langpack-as-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866811" comment="glibc-langpack-ast-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866812" comment="glibc-langpack-ayc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866813" comment="glibc-langpack-az-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866814" comment="glibc-langpack-be-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866815" comment="glibc-langpack-bem-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866816" comment="glibc-langpack-ber-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866817" comment="glibc-langpack-bg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866818" comment="glibc-langpack-bhb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866819" comment="glibc-langpack-bho-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866820" comment="glibc-langpack-bi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866821" comment="glibc-langpack-bn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866822" comment="glibc-langpack-bo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866823" comment="glibc-langpack-br-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866824" comment="glibc-langpack-brx-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866825" comment="glibc-langpack-bs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866826" comment="glibc-langpack-byn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866827" comment="glibc-langpack-ca-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866828" comment="glibc-langpack-ce-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866829" comment="glibc-langpack-chr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866830" comment="glibc-langpack-ckb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866831" comment="glibc-langpack-cmn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866832" comment="glibc-langpack-crh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866833" comment="glibc-langpack-cs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866834" comment="glibc-langpack-csb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866835" comment="glibc-langpack-cv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866836" comment="glibc-langpack-cy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866837" comment="glibc-langpack-da-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866838" comment="glibc-langpack-de-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866839" comment="glibc-langpack-doi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866840" comment="glibc-langpack-dsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866841" comment="glibc-langpack-dv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866842" comment="glibc-langpack-dz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866843" comment="glibc-langpack-el-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866844" comment="glibc-langpack-en-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866845" comment="glibc-langpack-eo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866846" comment="glibc-langpack-es-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866847" comment="glibc-langpack-et-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866848" comment="glibc-langpack-eu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866849" comment="glibc-langpack-fa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866850" comment="glibc-langpack-ff-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866851" comment="glibc-langpack-fi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866852" comment="glibc-langpack-fil-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866853" comment="glibc-langpack-fo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866854" comment="glibc-langpack-fr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866855" comment="glibc-langpack-fur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866856" comment="glibc-langpack-fy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866857" comment="glibc-langpack-ga-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866858" comment="glibc-langpack-gd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866859" comment="glibc-langpack-gez-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866860" comment="glibc-langpack-gl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866861" comment="glibc-langpack-gu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866862" comment="glibc-langpack-gv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866863" comment="glibc-langpack-ha-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866864" comment="glibc-langpack-hak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866865" comment="glibc-langpack-he-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866866" comment="glibc-langpack-hi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866867" comment="glibc-langpack-hif-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866868" comment="glibc-langpack-hne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866869" comment="glibc-langpack-hr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866870" comment="glibc-langpack-hsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866871" comment="glibc-langpack-ht-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866872" comment="glibc-langpack-hu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866873" comment="glibc-langpack-hy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866874" comment="glibc-langpack-ia-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866875" comment="glibc-langpack-id-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866876" comment="glibc-langpack-ig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866877" comment="glibc-langpack-ik-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866878" comment="glibc-langpack-is-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866879" comment="glibc-langpack-it-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866880" comment="glibc-langpack-iu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866881" comment="glibc-langpack-ja-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866882" comment="glibc-langpack-ka-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866883" comment="glibc-langpack-kab-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866884" comment="glibc-langpack-kk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866885" comment="glibc-langpack-kl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866886" comment="glibc-langpack-km-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866887" comment="glibc-langpack-kn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866888" comment="glibc-langpack-ko-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866889" comment="glibc-langpack-kok-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866890" comment="glibc-langpack-ks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866891" comment="glibc-langpack-ku-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866892" comment="glibc-langpack-kw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866893" comment="glibc-langpack-ky-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866894" comment="glibc-langpack-lb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866895" comment="glibc-langpack-lg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866896" comment="glibc-langpack-li-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866897" comment="glibc-langpack-lij-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866898" comment="glibc-langpack-ln-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866899" comment="glibc-langpack-lo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866900" comment="glibc-langpack-lt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866901" comment="glibc-langpack-lv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866902" comment="glibc-langpack-lzh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866903" comment="glibc-langpack-mag-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866904" comment="glibc-langpack-mai-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866905" comment="glibc-langpack-mfe-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866906" comment="glibc-langpack-mg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866907" comment="glibc-langpack-mhr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866908" comment="glibc-langpack-mi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866909" comment="glibc-langpack-miq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866910" comment="glibc-langpack-mjw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866911" comment="glibc-langpack-mk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866912" comment="glibc-langpack-ml-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866913" comment="glibc-langpack-mn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866914" comment="glibc-langpack-mni-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866915" comment="glibc-langpack-mnw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866916" comment="glibc-langpack-mr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866917" comment="glibc-langpack-ms-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866918" comment="glibc-langpack-mt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866919" comment="glibc-langpack-my-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866920" comment="glibc-langpack-nan-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866921" comment="glibc-langpack-nb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866922" comment="glibc-langpack-nds-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866923" comment="glibc-langpack-ne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866924" comment="glibc-langpack-nhn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866925" comment="glibc-langpack-niu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866926" comment="glibc-langpack-nl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866927" comment="glibc-langpack-nn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866928" comment="glibc-langpack-nr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866929" comment="glibc-langpack-nso-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866930" comment="glibc-langpack-oc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866931" comment="glibc-langpack-om-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866932" comment="glibc-langpack-or-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866933" comment="glibc-langpack-os-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866934" comment="glibc-langpack-pa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866935" comment="glibc-langpack-pap-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866936" comment="glibc-langpack-pl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866937" comment="glibc-langpack-ps-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866938" comment="glibc-langpack-pt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866939" comment="glibc-langpack-quz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866940" comment="glibc-langpack-raj-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866941" comment="glibc-langpack-ro-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866942" comment="glibc-langpack-ru-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866943" comment="glibc-langpack-rw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866944" comment="glibc-langpack-sa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866945" comment="glibc-langpack-sah-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866946" comment="glibc-langpack-sat-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866947" comment="glibc-langpack-sc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866948" comment="glibc-langpack-sd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866949" comment="glibc-langpack-se-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866950" comment="glibc-langpack-sgs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866951" comment="glibc-langpack-shn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866952" comment="glibc-langpack-shs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866953" comment="glibc-langpack-si-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866954" comment="glibc-langpack-sid-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866955" comment="glibc-langpack-sk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866956" comment="glibc-langpack-sl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866957" comment="glibc-langpack-sm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866958" comment="glibc-langpack-so-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866959" comment="glibc-langpack-sq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866960" comment="glibc-langpack-sr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866961" comment="glibc-langpack-ss-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866962" comment="glibc-langpack-st-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866963" comment="glibc-langpack-sv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866964" comment="glibc-langpack-sw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866965" comment="glibc-langpack-szl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866966" comment="glibc-langpack-ta-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866967" comment="glibc-langpack-tcy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866968" comment="glibc-langpack-te-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866969" comment="glibc-langpack-tg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866970" comment="glibc-langpack-th-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866971" comment="glibc-langpack-the-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866972" comment="glibc-langpack-ti-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866973" comment="glibc-langpack-tig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866974" comment="glibc-langpack-tk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866975" comment="glibc-langpack-tl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866976" comment="glibc-langpack-tn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866977" comment="glibc-langpack-to-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866978" comment="glibc-langpack-tpi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866979" comment="glibc-langpack-tr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866980" comment="glibc-langpack-ts-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866981" comment="glibc-langpack-tt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866982" comment="glibc-langpack-ug-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866983" comment="glibc-langpack-uk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866984" comment="glibc-langpack-unm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866985" comment="glibc-langpack-ur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866986" comment="glibc-langpack-uz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866987" comment="glibc-langpack-ve-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866988" comment="glibc-langpack-vi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866989" comment="glibc-langpack-wa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866990" comment="glibc-langpack-wae-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866991" comment="glibc-langpack-wal-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866992" comment="glibc-langpack-wo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866993" comment="glibc-langpack-xh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866994" comment="glibc-langpack-yi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866995" comment="glibc-langpack-yo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866996" comment="glibc-langpack-yue-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866997" comment="glibc-langpack-yuw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866998" comment="glibc-langpack-zh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866999" comment="glibc-langpack-zu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867000" comment="glibc-locale-source-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867001" comment="glibc-minimal-langpack-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867002" comment="glibc-nss-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867003" comment="glibc-static-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867004" comment="glibc-utils-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867005" comment="libnsl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867006" comment="nscd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867007" comment="nss_db-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867008" comment="nss_hesiod-2.34-100.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33600" ref_url="https://www.suse.com/security/cve/CVE-2024-33600" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
    <description>
    nscd: Null pointer crashes after notfound response

If the Name Service Cache Daemon's (nscd) cache fails to add a not-found
netgroup response to the cache, the client request can result in a null
pointer dereference.  This flaw was introduced in glibc 2.15 when the
cache was added to nscd.

This vulnerability is only present in the nscd binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33600/">CVE-2024-33600 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33600">CVE-2024-33600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222992">SUSE bug 1222992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223424">SUSE bug 1223424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1223589">SUSE bug 1223589</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866794" comment="glibc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866795" comment="glibc-all-langpacks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866796" comment="glibc-benchtests-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866797" comment="glibc-common-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866798" comment="glibc-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866799" comment="glibc-doc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866800" comment="glibc-gconv-extra-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866801" comment="glibc-headers-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866802" comment="glibc-langpack-aa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866803" comment="glibc-langpack-af-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866804" comment="glibc-langpack-agr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866805" comment="glibc-langpack-ak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866806" comment="glibc-langpack-am-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866807" comment="glibc-langpack-an-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866808" comment="glibc-langpack-anp-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866809" comment="glibc-langpack-ar-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866810" comment="glibc-langpack-as-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866811" comment="glibc-langpack-ast-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866812" comment="glibc-langpack-ayc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866813" comment="glibc-langpack-az-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866814" comment="glibc-langpack-be-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866815" comment="glibc-langpack-bem-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866816" comment="glibc-langpack-ber-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866817" comment="glibc-langpack-bg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866818" comment="glibc-langpack-bhb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866819" comment="glibc-langpack-bho-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866820" comment="glibc-langpack-bi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866821" comment="glibc-langpack-bn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866822" comment="glibc-langpack-bo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866823" comment="glibc-langpack-br-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866824" comment="glibc-langpack-brx-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866825" comment="glibc-langpack-bs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866826" comment="glibc-langpack-byn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866827" comment="glibc-langpack-ca-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866828" comment="glibc-langpack-ce-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866829" comment="glibc-langpack-chr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866830" comment="glibc-langpack-ckb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866831" comment="glibc-langpack-cmn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866832" comment="glibc-langpack-crh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866833" comment="glibc-langpack-cs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866834" comment="glibc-langpack-csb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866835" comment="glibc-langpack-cv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866836" comment="glibc-langpack-cy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866837" comment="glibc-langpack-da-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866838" comment="glibc-langpack-de-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866839" comment="glibc-langpack-doi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866840" comment="glibc-langpack-dsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866841" comment="glibc-langpack-dv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866842" comment="glibc-langpack-dz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866843" comment="glibc-langpack-el-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866844" comment="glibc-langpack-en-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866845" comment="glibc-langpack-eo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866846" comment="glibc-langpack-es-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866847" comment="glibc-langpack-et-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866848" comment="glibc-langpack-eu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866849" comment="glibc-langpack-fa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866850" comment="glibc-langpack-ff-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866851" comment="glibc-langpack-fi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866852" comment="glibc-langpack-fil-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866853" comment="glibc-langpack-fo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866854" comment="glibc-langpack-fr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866855" comment="glibc-langpack-fur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866856" comment="glibc-langpack-fy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866857" comment="glibc-langpack-ga-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866858" comment="glibc-langpack-gd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866859" comment="glibc-langpack-gez-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866860" comment="glibc-langpack-gl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866861" comment="glibc-langpack-gu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866862" comment="glibc-langpack-gv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866863" comment="glibc-langpack-ha-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866864" comment="glibc-langpack-hak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866865" comment="glibc-langpack-he-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866866" comment="glibc-langpack-hi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866867" comment="glibc-langpack-hif-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866868" comment="glibc-langpack-hne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866869" comment="glibc-langpack-hr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866870" comment="glibc-langpack-hsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866871" comment="glibc-langpack-ht-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866872" comment="glibc-langpack-hu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866873" comment="glibc-langpack-hy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866874" comment="glibc-langpack-ia-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866875" comment="glibc-langpack-id-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866876" comment="glibc-langpack-ig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866877" comment="glibc-langpack-ik-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866878" comment="glibc-langpack-is-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866879" comment="glibc-langpack-it-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866880" comment="glibc-langpack-iu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866881" comment="glibc-langpack-ja-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866882" comment="glibc-langpack-ka-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866883" comment="glibc-langpack-kab-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866884" comment="glibc-langpack-kk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866885" comment="glibc-langpack-kl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866886" comment="glibc-langpack-km-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866887" comment="glibc-langpack-kn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866888" comment="glibc-langpack-ko-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866889" comment="glibc-langpack-kok-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866890" comment="glibc-langpack-ks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866891" comment="glibc-langpack-ku-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866892" comment="glibc-langpack-kw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866893" comment="glibc-langpack-ky-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866894" comment="glibc-langpack-lb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866895" comment="glibc-langpack-lg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866896" comment="glibc-langpack-li-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866897" comment="glibc-langpack-lij-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866898" comment="glibc-langpack-ln-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866899" comment="glibc-langpack-lo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866900" comment="glibc-langpack-lt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866901" comment="glibc-langpack-lv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866902" comment="glibc-langpack-lzh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866903" comment="glibc-langpack-mag-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866904" comment="glibc-langpack-mai-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866905" comment="glibc-langpack-mfe-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866906" comment="glibc-langpack-mg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866907" comment="glibc-langpack-mhr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866908" comment="glibc-langpack-mi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866909" comment="glibc-langpack-miq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866910" comment="glibc-langpack-mjw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866911" comment="glibc-langpack-mk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866912" comment="glibc-langpack-ml-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866913" comment="glibc-langpack-mn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866914" comment="glibc-langpack-mni-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866915" comment="glibc-langpack-mnw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866916" comment="glibc-langpack-mr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866917" comment="glibc-langpack-ms-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866918" comment="glibc-langpack-mt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866919" comment="glibc-langpack-my-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866920" comment="glibc-langpack-nan-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866921" comment="glibc-langpack-nb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866922" comment="glibc-langpack-nds-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866923" comment="glibc-langpack-ne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866924" comment="glibc-langpack-nhn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866925" comment="glibc-langpack-niu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866926" comment="glibc-langpack-nl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866927" comment="glibc-langpack-nn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866928" comment="glibc-langpack-nr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866929" comment="glibc-langpack-nso-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866930" comment="glibc-langpack-oc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866931" comment="glibc-langpack-om-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866932" comment="glibc-langpack-or-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866933" comment="glibc-langpack-os-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866934" comment="glibc-langpack-pa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866935" comment="glibc-langpack-pap-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866936" comment="glibc-langpack-pl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866937" comment="glibc-langpack-ps-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866938" comment="glibc-langpack-pt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866939" comment="glibc-langpack-quz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866940" comment="glibc-langpack-raj-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866941" comment="glibc-langpack-ro-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866942" comment="glibc-langpack-ru-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866943" comment="glibc-langpack-rw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866944" comment="glibc-langpack-sa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866945" comment="glibc-langpack-sah-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866946" comment="glibc-langpack-sat-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866947" comment="glibc-langpack-sc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866948" comment="glibc-langpack-sd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866949" comment="glibc-langpack-se-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866950" comment="glibc-langpack-sgs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866951" comment="glibc-langpack-shn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866952" comment="glibc-langpack-shs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866953" comment="glibc-langpack-si-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866954" comment="glibc-langpack-sid-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866955" comment="glibc-langpack-sk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866956" comment="glibc-langpack-sl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866957" comment="glibc-langpack-sm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866958" comment="glibc-langpack-so-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866959" comment="glibc-langpack-sq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866960" comment="glibc-langpack-sr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866961" comment="glibc-langpack-ss-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866962" comment="glibc-langpack-st-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866963" comment="glibc-langpack-sv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866964" comment="glibc-langpack-sw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866965" comment="glibc-langpack-szl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866966" comment="glibc-langpack-ta-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866967" comment="glibc-langpack-tcy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866968" comment="glibc-langpack-te-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866969" comment="glibc-langpack-tg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866970" comment="glibc-langpack-th-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866971" comment="glibc-langpack-the-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866972" comment="glibc-langpack-ti-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866973" comment="glibc-langpack-tig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866974" comment="glibc-langpack-tk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866975" comment="glibc-langpack-tl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866976" comment="glibc-langpack-tn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866977" comment="glibc-langpack-to-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866978" comment="glibc-langpack-tpi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866979" comment="glibc-langpack-tr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866980" comment="glibc-langpack-ts-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866981" comment="glibc-langpack-tt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866982" comment="glibc-langpack-ug-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866983" comment="glibc-langpack-uk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866984" comment="glibc-langpack-unm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866985" comment="glibc-langpack-ur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866986" comment="glibc-langpack-uz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866987" comment="glibc-langpack-ve-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866988" comment="glibc-langpack-vi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866989" comment="glibc-langpack-wa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866990" comment="glibc-langpack-wae-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866991" comment="glibc-langpack-wal-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866992" comment="glibc-langpack-wo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866993" comment="glibc-langpack-xh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866994" comment="glibc-langpack-yi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866995" comment="glibc-langpack-yo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866996" comment="glibc-langpack-yue-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866997" comment="glibc-langpack-yuw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866998" comment="glibc-langpack-zh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866999" comment="glibc-langpack-zu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867000" comment="glibc-locale-source-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867001" comment="glibc-minimal-langpack-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867002" comment="glibc-nss-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867003" comment="glibc-static-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867004" comment="glibc-utils-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867005" comment="libnsl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867006" comment="nscd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867007" comment="nss_db-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867008" comment="nss_hesiod-2.34-100.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33601" ref_url="https://www.suse.com/security/cve/CVE-2024-33601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
    <description>
    nscd: netgroup cache may terminate daemon on memory allocation failure

The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or
xrealloc and these functions may terminate the process due to a memory
allocation failure resulting in a denial of service to the clients.  The
flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33601/">CVE-2024-33601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33601">CVE-2024-33601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223426">SUSE bug 1223426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866794" comment="glibc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866795" comment="glibc-all-langpacks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866796" comment="glibc-benchtests-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866797" comment="glibc-common-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866798" comment="glibc-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866799" comment="glibc-doc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866800" comment="glibc-gconv-extra-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866801" comment="glibc-headers-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866802" comment="glibc-langpack-aa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866803" comment="glibc-langpack-af-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866804" comment="glibc-langpack-agr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866805" comment="glibc-langpack-ak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866806" comment="glibc-langpack-am-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866807" comment="glibc-langpack-an-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866808" comment="glibc-langpack-anp-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866809" comment="glibc-langpack-ar-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866810" comment="glibc-langpack-as-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866811" comment="glibc-langpack-ast-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866812" comment="glibc-langpack-ayc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866813" comment="glibc-langpack-az-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866814" comment="glibc-langpack-be-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866815" comment="glibc-langpack-bem-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866816" comment="glibc-langpack-ber-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866817" comment="glibc-langpack-bg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866818" comment="glibc-langpack-bhb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866819" comment="glibc-langpack-bho-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866820" comment="glibc-langpack-bi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866821" comment="glibc-langpack-bn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866822" comment="glibc-langpack-bo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866823" comment="glibc-langpack-br-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866824" comment="glibc-langpack-brx-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866825" comment="glibc-langpack-bs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866826" comment="glibc-langpack-byn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866827" comment="glibc-langpack-ca-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866828" comment="glibc-langpack-ce-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866829" comment="glibc-langpack-chr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866830" comment="glibc-langpack-ckb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866831" comment="glibc-langpack-cmn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866832" comment="glibc-langpack-crh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866833" comment="glibc-langpack-cs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866834" comment="glibc-langpack-csb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866835" comment="glibc-langpack-cv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866836" comment="glibc-langpack-cy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866837" comment="glibc-langpack-da-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866838" comment="glibc-langpack-de-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866839" comment="glibc-langpack-doi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866840" comment="glibc-langpack-dsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866841" comment="glibc-langpack-dv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866842" comment="glibc-langpack-dz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866843" comment="glibc-langpack-el-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866844" comment="glibc-langpack-en-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866845" comment="glibc-langpack-eo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866846" comment="glibc-langpack-es-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866847" comment="glibc-langpack-et-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866848" comment="glibc-langpack-eu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866849" comment="glibc-langpack-fa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866850" comment="glibc-langpack-ff-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866851" comment="glibc-langpack-fi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866852" comment="glibc-langpack-fil-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866853" comment="glibc-langpack-fo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866854" comment="glibc-langpack-fr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866855" comment="glibc-langpack-fur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866856" comment="glibc-langpack-fy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866857" comment="glibc-langpack-ga-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866858" comment="glibc-langpack-gd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866859" comment="glibc-langpack-gez-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866860" comment="glibc-langpack-gl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866861" comment="glibc-langpack-gu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866862" comment="glibc-langpack-gv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866863" comment="glibc-langpack-ha-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866864" comment="glibc-langpack-hak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866865" comment="glibc-langpack-he-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866866" comment="glibc-langpack-hi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866867" comment="glibc-langpack-hif-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866868" comment="glibc-langpack-hne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866869" comment="glibc-langpack-hr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866870" comment="glibc-langpack-hsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866871" comment="glibc-langpack-ht-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866872" comment="glibc-langpack-hu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866873" comment="glibc-langpack-hy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866874" comment="glibc-langpack-ia-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866875" comment="glibc-langpack-id-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866876" comment="glibc-langpack-ig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866877" comment="glibc-langpack-ik-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866878" comment="glibc-langpack-is-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866879" comment="glibc-langpack-it-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866880" comment="glibc-langpack-iu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866881" comment="glibc-langpack-ja-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866882" comment="glibc-langpack-ka-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866883" comment="glibc-langpack-kab-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866884" comment="glibc-langpack-kk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866885" comment="glibc-langpack-kl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866886" comment="glibc-langpack-km-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866887" comment="glibc-langpack-kn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866888" comment="glibc-langpack-ko-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866889" comment="glibc-langpack-kok-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866890" comment="glibc-langpack-ks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866891" comment="glibc-langpack-ku-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866892" comment="glibc-langpack-kw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866893" comment="glibc-langpack-ky-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866894" comment="glibc-langpack-lb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866895" comment="glibc-langpack-lg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866896" comment="glibc-langpack-li-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866897" comment="glibc-langpack-lij-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866898" comment="glibc-langpack-ln-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866899" comment="glibc-langpack-lo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866900" comment="glibc-langpack-lt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866901" comment="glibc-langpack-lv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866902" comment="glibc-langpack-lzh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866903" comment="glibc-langpack-mag-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866904" comment="glibc-langpack-mai-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866905" comment="glibc-langpack-mfe-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866906" comment="glibc-langpack-mg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866907" comment="glibc-langpack-mhr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866908" comment="glibc-langpack-mi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866909" comment="glibc-langpack-miq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866910" comment="glibc-langpack-mjw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866911" comment="glibc-langpack-mk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866912" comment="glibc-langpack-ml-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866913" comment="glibc-langpack-mn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866914" comment="glibc-langpack-mni-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866915" comment="glibc-langpack-mnw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866916" comment="glibc-langpack-mr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866917" comment="glibc-langpack-ms-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866918" comment="glibc-langpack-mt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866919" comment="glibc-langpack-my-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866920" comment="glibc-langpack-nan-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866921" comment="glibc-langpack-nb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866922" comment="glibc-langpack-nds-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866923" comment="glibc-langpack-ne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866924" comment="glibc-langpack-nhn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866925" comment="glibc-langpack-niu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866926" comment="glibc-langpack-nl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866927" comment="glibc-langpack-nn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866928" comment="glibc-langpack-nr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866929" comment="glibc-langpack-nso-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866930" comment="glibc-langpack-oc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866931" comment="glibc-langpack-om-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866932" comment="glibc-langpack-or-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866933" comment="glibc-langpack-os-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866934" comment="glibc-langpack-pa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866935" comment="glibc-langpack-pap-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866936" comment="glibc-langpack-pl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866937" comment="glibc-langpack-ps-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866938" comment="glibc-langpack-pt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866939" comment="glibc-langpack-quz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866940" comment="glibc-langpack-raj-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866941" comment="glibc-langpack-ro-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866942" comment="glibc-langpack-ru-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866943" comment="glibc-langpack-rw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866944" comment="glibc-langpack-sa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866945" comment="glibc-langpack-sah-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866946" comment="glibc-langpack-sat-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866947" comment="glibc-langpack-sc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866948" comment="glibc-langpack-sd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866949" comment="glibc-langpack-se-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866950" comment="glibc-langpack-sgs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866951" comment="glibc-langpack-shn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866952" comment="glibc-langpack-shs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866953" comment="glibc-langpack-si-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866954" comment="glibc-langpack-sid-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866955" comment="glibc-langpack-sk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866956" comment="glibc-langpack-sl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866957" comment="glibc-langpack-sm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866958" comment="glibc-langpack-so-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866959" comment="glibc-langpack-sq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866960" comment="glibc-langpack-sr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866961" comment="glibc-langpack-ss-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866962" comment="glibc-langpack-st-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866963" comment="glibc-langpack-sv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866964" comment="glibc-langpack-sw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866965" comment="glibc-langpack-szl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866966" comment="glibc-langpack-ta-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866967" comment="glibc-langpack-tcy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866968" comment="glibc-langpack-te-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866969" comment="glibc-langpack-tg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866970" comment="glibc-langpack-th-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866971" comment="glibc-langpack-the-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866972" comment="glibc-langpack-ti-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866973" comment="glibc-langpack-tig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866974" comment="glibc-langpack-tk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866975" comment="glibc-langpack-tl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866976" comment="glibc-langpack-tn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866977" comment="glibc-langpack-to-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866978" comment="glibc-langpack-tpi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866979" comment="glibc-langpack-tr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866980" comment="glibc-langpack-ts-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866981" comment="glibc-langpack-tt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866982" comment="glibc-langpack-ug-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866983" comment="glibc-langpack-uk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866984" comment="glibc-langpack-unm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866985" comment="glibc-langpack-ur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866986" comment="glibc-langpack-uz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866987" comment="glibc-langpack-ve-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866988" comment="glibc-langpack-vi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866989" comment="glibc-langpack-wa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866990" comment="glibc-langpack-wae-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866991" comment="glibc-langpack-wal-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866992" comment="glibc-langpack-wo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866993" comment="glibc-langpack-xh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866994" comment="glibc-langpack-yi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866995" comment="glibc-langpack-yo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866996" comment="glibc-langpack-yue-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866997" comment="glibc-langpack-yuw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866998" comment="glibc-langpack-zh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866999" comment="glibc-langpack-zu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867000" comment="glibc-locale-source-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867001" comment="glibc-minimal-langpack-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867002" comment="glibc-nss-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867003" comment="glibc-static-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867004" comment="glibc-utils-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867005" comment="libnsl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867006" comment="nscd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867007" comment="nss_db-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867008" comment="nss_hesiod-2.34-100.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33602" ref_url="https://www.suse.com/security/cve/CVE-2024-33602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1895-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021353.html" source="SUSE-SU"/>
    <description>
    nscd: netgroup cache assumes NSS callback uses in-buffer strings

The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory
when the NSS callback does not store all strings in the provided buffer.
The flaw was introduced in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33602/">CVE-2024-33602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33602">CVE-2024-33602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223425">SUSE bug 1223425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009866794" comment="glibc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866795" comment="glibc-all-langpacks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866796" comment="glibc-benchtests-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866797" comment="glibc-common-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866798" comment="glibc-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866799" comment="glibc-doc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866800" comment="glibc-gconv-extra-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866801" comment="glibc-headers-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866802" comment="glibc-langpack-aa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866803" comment="glibc-langpack-af-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866804" comment="glibc-langpack-agr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866805" comment="glibc-langpack-ak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866806" comment="glibc-langpack-am-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866807" comment="glibc-langpack-an-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866808" comment="glibc-langpack-anp-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866809" comment="glibc-langpack-ar-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866810" comment="glibc-langpack-as-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866811" comment="glibc-langpack-ast-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866812" comment="glibc-langpack-ayc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866813" comment="glibc-langpack-az-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866814" comment="glibc-langpack-be-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866815" comment="glibc-langpack-bem-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866816" comment="glibc-langpack-ber-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866817" comment="glibc-langpack-bg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866818" comment="glibc-langpack-bhb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866819" comment="glibc-langpack-bho-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866820" comment="glibc-langpack-bi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866821" comment="glibc-langpack-bn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866822" comment="glibc-langpack-bo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866823" comment="glibc-langpack-br-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866824" comment="glibc-langpack-brx-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866825" comment="glibc-langpack-bs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866826" comment="glibc-langpack-byn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866827" comment="glibc-langpack-ca-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866828" comment="glibc-langpack-ce-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866829" comment="glibc-langpack-chr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866830" comment="glibc-langpack-ckb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866831" comment="glibc-langpack-cmn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866832" comment="glibc-langpack-crh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866833" comment="glibc-langpack-cs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866834" comment="glibc-langpack-csb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866835" comment="glibc-langpack-cv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866836" comment="glibc-langpack-cy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866837" comment="glibc-langpack-da-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866838" comment="glibc-langpack-de-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866839" comment="glibc-langpack-doi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866840" comment="glibc-langpack-dsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866841" comment="glibc-langpack-dv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866842" comment="glibc-langpack-dz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866843" comment="glibc-langpack-el-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866844" comment="glibc-langpack-en-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866845" comment="glibc-langpack-eo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866846" comment="glibc-langpack-es-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866847" comment="glibc-langpack-et-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866848" comment="glibc-langpack-eu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866849" comment="glibc-langpack-fa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866850" comment="glibc-langpack-ff-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866851" comment="glibc-langpack-fi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866852" comment="glibc-langpack-fil-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866853" comment="glibc-langpack-fo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866854" comment="glibc-langpack-fr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866855" comment="glibc-langpack-fur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866856" comment="glibc-langpack-fy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866857" comment="glibc-langpack-ga-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866858" comment="glibc-langpack-gd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866859" comment="glibc-langpack-gez-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866860" comment="glibc-langpack-gl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866861" comment="glibc-langpack-gu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866862" comment="glibc-langpack-gv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866863" comment="glibc-langpack-ha-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866864" comment="glibc-langpack-hak-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866865" comment="glibc-langpack-he-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866866" comment="glibc-langpack-hi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866867" comment="glibc-langpack-hif-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866868" comment="glibc-langpack-hne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866869" comment="glibc-langpack-hr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866870" comment="glibc-langpack-hsb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866871" comment="glibc-langpack-ht-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866872" comment="glibc-langpack-hu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866873" comment="glibc-langpack-hy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866874" comment="glibc-langpack-ia-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866875" comment="glibc-langpack-id-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866876" comment="glibc-langpack-ig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866877" comment="glibc-langpack-ik-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866878" comment="glibc-langpack-is-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866879" comment="glibc-langpack-it-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866880" comment="glibc-langpack-iu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866881" comment="glibc-langpack-ja-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866882" comment="glibc-langpack-ka-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866883" comment="glibc-langpack-kab-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866884" comment="glibc-langpack-kk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866885" comment="glibc-langpack-kl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866886" comment="glibc-langpack-km-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866887" comment="glibc-langpack-kn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866888" comment="glibc-langpack-ko-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866889" comment="glibc-langpack-kok-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866890" comment="glibc-langpack-ks-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866891" comment="glibc-langpack-ku-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866892" comment="glibc-langpack-kw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866893" comment="glibc-langpack-ky-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866894" comment="glibc-langpack-lb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866895" comment="glibc-langpack-lg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866896" comment="glibc-langpack-li-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866897" comment="glibc-langpack-lij-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866898" comment="glibc-langpack-ln-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866899" comment="glibc-langpack-lo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866900" comment="glibc-langpack-lt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866901" comment="glibc-langpack-lv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866902" comment="glibc-langpack-lzh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866903" comment="glibc-langpack-mag-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866904" comment="glibc-langpack-mai-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866905" comment="glibc-langpack-mfe-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866906" comment="glibc-langpack-mg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866907" comment="glibc-langpack-mhr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866908" comment="glibc-langpack-mi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866909" comment="glibc-langpack-miq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866910" comment="glibc-langpack-mjw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866911" comment="glibc-langpack-mk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866912" comment="glibc-langpack-ml-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866913" comment="glibc-langpack-mn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866914" comment="glibc-langpack-mni-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866915" comment="glibc-langpack-mnw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866916" comment="glibc-langpack-mr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866917" comment="glibc-langpack-ms-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866918" comment="glibc-langpack-mt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866919" comment="glibc-langpack-my-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866920" comment="glibc-langpack-nan-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866921" comment="glibc-langpack-nb-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866922" comment="glibc-langpack-nds-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866923" comment="glibc-langpack-ne-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866924" comment="glibc-langpack-nhn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866925" comment="glibc-langpack-niu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866926" comment="glibc-langpack-nl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866927" comment="glibc-langpack-nn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866928" comment="glibc-langpack-nr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866929" comment="glibc-langpack-nso-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866930" comment="glibc-langpack-oc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866931" comment="glibc-langpack-om-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866932" comment="glibc-langpack-or-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866933" comment="glibc-langpack-os-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866934" comment="glibc-langpack-pa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866935" comment="glibc-langpack-pap-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866936" comment="glibc-langpack-pl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866937" comment="glibc-langpack-ps-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866938" comment="glibc-langpack-pt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866939" comment="glibc-langpack-quz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866940" comment="glibc-langpack-raj-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866941" comment="glibc-langpack-ro-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866942" comment="glibc-langpack-ru-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866943" comment="glibc-langpack-rw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866944" comment="glibc-langpack-sa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866945" comment="glibc-langpack-sah-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866946" comment="glibc-langpack-sat-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866947" comment="glibc-langpack-sc-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866948" comment="glibc-langpack-sd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866949" comment="glibc-langpack-se-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866950" comment="glibc-langpack-sgs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866951" comment="glibc-langpack-shn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866952" comment="glibc-langpack-shs-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866953" comment="glibc-langpack-si-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866954" comment="glibc-langpack-sid-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866955" comment="glibc-langpack-sk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866956" comment="glibc-langpack-sl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866957" comment="glibc-langpack-sm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866958" comment="glibc-langpack-so-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866959" comment="glibc-langpack-sq-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866960" comment="glibc-langpack-sr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866961" comment="glibc-langpack-ss-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866962" comment="glibc-langpack-st-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866963" comment="glibc-langpack-sv-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866964" comment="glibc-langpack-sw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866965" comment="glibc-langpack-szl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866966" comment="glibc-langpack-ta-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866967" comment="glibc-langpack-tcy-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866968" comment="glibc-langpack-te-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866969" comment="glibc-langpack-tg-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866970" comment="glibc-langpack-th-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866971" comment="glibc-langpack-the-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866972" comment="glibc-langpack-ti-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866973" comment="glibc-langpack-tig-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866974" comment="glibc-langpack-tk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866975" comment="glibc-langpack-tl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866976" comment="glibc-langpack-tn-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866977" comment="glibc-langpack-to-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866978" comment="glibc-langpack-tpi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866979" comment="glibc-langpack-tr-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866980" comment="glibc-langpack-ts-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866981" comment="glibc-langpack-tt-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866982" comment="glibc-langpack-ug-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866983" comment="glibc-langpack-uk-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866984" comment="glibc-langpack-unm-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866985" comment="glibc-langpack-ur-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866986" comment="glibc-langpack-uz-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866987" comment="glibc-langpack-ve-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866988" comment="glibc-langpack-vi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866989" comment="glibc-langpack-wa-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866990" comment="glibc-langpack-wae-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866991" comment="glibc-langpack-wal-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866992" comment="glibc-langpack-wo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866993" comment="glibc-langpack-xh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866994" comment="glibc-langpack-yi-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866995" comment="glibc-langpack-yo-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866996" comment="glibc-langpack-yue-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866997" comment="glibc-langpack-yuw-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866998" comment="glibc-langpack-zh-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009866999" comment="glibc-langpack-zu-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867000" comment="glibc-locale-source-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867001" comment="glibc-minimal-langpack-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867002" comment="glibc-nss-devel-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867003" comment="glibc-static-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867004" comment="glibc-utils-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867005" comment="libnsl-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867006" comment="nscd-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867007" comment="nss_db-2.34-100.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867008" comment="nss_hesiod-2.34-100.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33621</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33621" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33621" ref_url="https://www.suse.com/security/cve/CVE-2024-33621" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvlan: Dont Use skb-&gt;sk in ipvlan_process_v{4,6}_outbound

Raw packet from PF_PACKET socket ontop of an IPv6-backed ipvlan device will
hit WARN_ON_ONCE() in sk_mc_loop() through sch_direct_xmit() path.

WARNING: CPU: 2 PID: 0 at net/core/sock.c:775 sk_mc_loop+0x2d/0x70
Modules linked in: sch_netem ipvlan rfkill cirrus drm_shmem_helper sg drm_kms_helper
CPU: 2 PID: 0 Comm: swapper/2 Kdump: loaded Not tainted 6.9.0+ #279
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
RIP: 0010:sk_mc_loop+0x2d/0x70
Code: fa 0f 1f 44 00 00 65 0f b7 15 f7 96 a3 4f 31 c0 66 85 d2 75 26 48 85 ff 74 1c
RSP: 0018:ffffa9584015cd78 EFLAGS: 00010212
RAX: 0000000000000011 RBX: ffff91e585793e00 RCX: 0000000002c6a001
RDX: 0000000000000000 RSI: 0000000000000040 RDI: ffff91e589c0f000
RBP: ffff91e5855bd100 R08: 0000000000000000 R09: 3d00545216f43d00
R10: ffff91e584fdcc50 R11: 00000060dd8616f4 R12: ffff91e58132d000
R13: ffff91e584fdcc68 R14: ffff91e5869ce800 R15: ffff91e589c0f000
FS:  0000000000000000(0000) GS:ffff91e898100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f788f7c44c0 CR3: 0000000008e1a000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;IRQ&gt;
 ? __warn (kernel/panic.c:693)
 ? sk_mc_loop (net/core/sock.c:760)
 ? report_bug (lib/bug.c:201 lib/bug.c:219)
 ? handle_bug (arch/x86/kernel/traps.c:239)
 ? exc_invalid_op (arch/x86/kernel/traps.c:260 (discriminator 1))
 ? asm_exc_invalid_op (./arch/x86/include/asm/idtentry.h:621)
 ? sk_mc_loop (net/core/sock.c:760)
 ip6_finish_output2 (net/ipv6/ip6_output.c:83 (discriminator 1))
 ? nf_hook_slow (net/netfilter/core.c:626)
 ip6_finish_output (net/ipv6/ip6_output.c:222)
 ? __pfx_ip6_finish_output (net/ipv6/ip6_output.c:215)
 ipvlan_xmit_mode_l3 (drivers/net/ipvlan/ipvlan_core.c:602) ipvlan
 ipvlan_start_xmit (drivers/net/ipvlan/ipvlan_main.c:226) ipvlan
 dev_hard_start_xmit (net/core/dev.c:3594)
 sch_direct_xmit (net/sched/sch_generic.c:343)
 __qdisc_run (net/sched/sch_generic.c:416)
 net_tx_action (net/core/dev.c:5286)
 handle_softirqs (kernel/softirq.c:555)
 __irq_exit_rcu (kernel/softirq.c:589)
 sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1043)

The warning triggers as this:
packet_sendmsg
   packet_snd //skb-&gt;sk is packet sk
      __dev_queue_xmit
         __dev_xmit_skb //q-&gt;enqueue is not NULL
             __qdisc_run
               sch_direct_xmit
                 dev_hard_start_xmit
                   ipvlan_start_xmit
                      ipvlan_xmit_mode_l3 //l3 mode
                        ipvlan_process_outbound //vepa flag
                          ipvlan_process_v6_outbound
                            ip6_local_out
                                __ip6_finish_output
                                  ip6_finish_output2 //multicast packet
                                    sk_mc_loop //sk-&gt;sk_family is AF_PACKET

Call ip{6}_local_out() with NULL sk in ipvlan as other tunnels to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-33621/">CVE-2024-33621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-33621">CVE-2024-33621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226770">SUSE bug 1226770</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33869" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33869" ref_url="https://www.suse.com/security/cve/CVE-2024-33869" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6197" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035810.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 10.03.1. Path traversal and command execution can occur (via a crafted PostScript document) because of path reduction in base/gpmisc.c. For example, restrictions on use of %pipe% can be bypassed via the aa/../%pipe%command# output filename.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-33869/">CVE-2024-33869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33869">CVE-2024-33869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226946">SUSE bug 1226946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942234" comment="ghostscript-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942235" comment="ghostscript-doc-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942236" comment="ghostscript-tools-dvipdf-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942237" comment="ghostscript-tools-fonts-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942238" comment="ghostscript-tools-printing-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942239" comment="ghostscript-x11-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942240" comment="libgs-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942241" comment="libgs-devel-9.54.0-17.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33870" ref_url="https://www.suse.com/security/cve/CVE-2024-33870" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6197" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2292-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035810.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 10.03.1. There is path traversal (via a crafted PostScript document) to arbitrary files if the current directory is in the permitted paths. For example, there can be a transformation of ../../foo to ./../../foo and this will grant access if ./ is permitted.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-33870/">CVE-2024-33870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33870">CVE-2024-33870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226944">SUSE bug 1226944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942234" comment="ghostscript-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942235" comment="ghostscript-doc-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942236" comment="ghostscript-tools-dvipdf-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942237" comment="ghostscript-tools-fonts-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942238" comment="ghostscript-tools-printing-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942239" comment="ghostscript-x11-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942240" comment="libgs-9.54.0-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942241" comment="libgs-devel-9.54.0-17.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202433871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-33871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-33871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-33871" ref_url="https://www.suse.com/security/cve/CVE-2024-33871" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4549" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035725.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 10.03.1. contrib/opvp/gdevopvp.c allows arbitrary code execution via a custom Driver library, exploitable via a crafted PostScript document. This occurs because the Driver parameter for opvp (and oprp) devices can have an arbitrary name for a dynamic library; this library is then loaded.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-33871/">CVE-2024-33871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-33871">CVE-2024-33871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225491">SUSE bug 1225491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869929" comment="ghostscript-9.54.0-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869930" comment="ghostscript-doc-9.54.0-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869931" comment="ghostscript-tools-dvipdf-9.54.0-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869932" comment="ghostscript-tools-fonts-9.54.0-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869933" comment="ghostscript-tools-printing-9.54.0-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869934" comment="ghostscript-x11-9.54.0-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869935" comment="libgs-9.54.0-16.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869936" comment="libgs-devel-9.54.0-16.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34055" ref_url="https://www.suse.com/security/cve/CVE-2024-34055" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9195" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000570.html" source="SUSE-SU"/>
    <description>
    Cyrus IMAP before 3.8.3 and 3.10.x before 3.10.0-rc1 allows authenticated attackers to cause unbounded memory allocation by sending many LITERALs in a single command.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-34055/">CVE-2024-34055 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-34055">CVE-2024-34055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225990">SUSE bug 1225990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953680" comment="cyrus-imapd-3.4.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953681" comment="cyrus-imapd-libs-3.4.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953682" comment="cyrus-imapd-utils-3.4.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953683" comment="perl-Cyrus-3.4.8-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34064" ref_url="https://www.suse.com/security/cve/CVE-2024-34064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9150" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1863-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021356.html" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `&gt;`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34064/">CVE-2024-34064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34064">CVE-2024-34064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223980">SUSE bug 1223980</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867010" comment="fence-agents-aliyun-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867011" comment="fence-agents-all-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867012" comment="fence-agents-amt-ws-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867013" comment="fence-agents-apc-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867014" comment="fence-agents-apc-snmp-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867015" comment="fence-agents-aws-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867016" comment="fence-agents-azure-arm-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867017" comment="fence-agents-bladecenter-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867018" comment="fence-agents-brocade-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867019" comment="fence-agents-cisco-mds-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867020" comment="fence-agents-cisco-ucs-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867021" comment="fence-agents-common-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867022" comment="fence-agents-compute-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867023" comment="fence-agents-drac5-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867024" comment="fence-agents-eaton-snmp-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867025" comment="fence-agents-emerson-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867026" comment="fence-agents-eps-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867027" comment="fence-agents-gce-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867028" comment="fence-agents-heuristics-ping-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867029" comment="fence-agents-hpblade-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867030" comment="fence-agents-ibm-powervs-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867031" comment="fence-agents-ibm-vpc-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867032" comment="fence-agents-ibmblade-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867033" comment="fence-agents-ifmib-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867034" comment="fence-agents-ilo-moonshot-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867035" comment="fence-agents-ilo-mp-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867036" comment="fence-agents-ilo-ssh-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867037" comment="fence-agents-ilo2-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867038" comment="fence-agents-intelmodular-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867039" comment="fence-agents-ipdu-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867040" comment="fence-agents-ipmilan-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867041" comment="fence-agents-kdump-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867042" comment="fence-agents-kubevirt-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867043" comment="fence-agents-mpath-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867044" comment="fence-agents-openstack-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867045" comment="fence-agents-redfish-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867046" comment="fence-agents-rhevm-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867047" comment="fence-agents-rsa-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867048" comment="fence-agents-rsb-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867049" comment="fence-agents-sbd-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867050" comment="fence-agents-scsi-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867051" comment="fence-agents-virsh-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867052" comment="fence-agents-vmware-rest-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867053" comment="fence-agents-vmware-soap-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867054" comment="fence-agents-wti-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867055" comment="fence-virt-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867056" comment="fence-virtd-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867057" comment="fence-virtd-cpg-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867058" comment="fence-virtd-libvirt-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867059" comment="fence-virtd-multicast-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867060" comment="fence-virtd-serial-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867061" comment="fence-virtd-tcp-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867062" comment="ha-cloud-support-4.10.0-62.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953639" comment="python3-jinja2-2.11.3-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34155" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34155" ref_url="https://www.suse.com/security/cve/CVE-2024-34155" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6908" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6913" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000058.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8038" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8112" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3196-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3197-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14392-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VKQV4GKNNP3RDIDOADDTNIWK2GWHEQ46/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
    <description>
    Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34155/">CVE-2024-34155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34155">CVE-2024-34155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230252">SUSE bug 1230252</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953901" comment="buildah-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953902" comment="buildah-tests-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944120" comment="go-toolset-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944121" comment="golang-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944122" comment="golang-bin-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944123" comment="golang-docs-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944124" comment="golang-misc-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944125" comment="golang-src-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944126" comment="golang-tests-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953894" comment="podman-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953895" comment="podman-docker-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953896" comment="podman-plugins-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953897" comment="podman-remote-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953898" comment="podman-tests-5.2.2-9.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34156" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34156" ref_url="https://www.suse.com/security/cve/CVE-2024-34156" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000679.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11217" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000673.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6908" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6913" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000058.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6946" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000078.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000082.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7135" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000088.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8038" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000148.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8112" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9472" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000502.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000507.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3773" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3196-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3197-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14375-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZMSEM4GQKCTA66A2WTUQKWOAH2KZYDUP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14520-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M2XL2GIFLLA5UEYWJGZCWOIWYC4LD5JE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
    <description>
    Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2025-04-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34156/">CVE-2024-34156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34156">CVE-2024-34156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230253">SUSE bug 1230253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953901" comment="buildah-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953902" comment="buildah-tests-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958544" comment="containernetworking-plugins-1.5.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974982" comment="delve-1.24.1-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944793" comment="git-lfs-3.4.1-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974983" comment="go-toolset-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974984" comment="golang-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974985" comment="golang-bin-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974986" comment="golang-docs-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974987" comment="golang-misc-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974988" comment="golang-race-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974989" comment="golang-src-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974990" comment="golang-tests-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953920" comment="grafana-10.2.6-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953919" comment="grafana-pcp-5.1.1-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953921" comment="grafana-selinux-10.2.6-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953894" comment="podman-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953895" comment="podman-docker-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953896" comment="podman-plugins-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953897" comment="podman-remote-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953898" comment="podman-tests-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958545" comment="skopeo-1.16.1-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958546" comment="skopeo-tests-1.16.1-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34158" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34158" ref_url="https://www.suse.com/security/cve/CVE-2024-34158" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6908" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6913" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000058.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8038" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8112" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3196-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3197-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019791.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
    <description>
    Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-24"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34158/">CVE-2024-34158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34158">CVE-2024-34158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230254">SUSE bug 1230254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953901" comment="buildah-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953902" comment="buildah-tests-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944120" comment="go-toolset-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944121" comment="golang-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944122" comment="golang-bin-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944123" comment="golang-docs-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944124" comment="golang-misc-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944125" comment="golang-src-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944126" comment="golang-tests-1.21.13-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953894" comment="podman-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953895" comment="podman-docker-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953896" comment="podman-plugins-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953897" comment="podman-remote-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953898" comment="podman-tests-5.2.2-9.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34397" ref_url="https://www.suse.com/security/cve/CVE-2024-34397" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11327" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1830-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021344.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in GNOME GLib before 2.78.5, and 2.79.x and 2.80.x before 2.80.1. When a GDBus-based client subscribes to signals from a trusted system service such as NetworkManager on a shared computer, other users of the same computer can send spoofed D-Bus signals that the GDBus-based client will wrongly interpret as having been sent by the trusted system service. This could lead to the GDBus-based client behaving incorrectly, with an application-dependent impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-10"/>
	<updated date="2025-07-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-34397/">CVE-2024-34397 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34397">CVE-2024-34397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224044">SUSE bug 1224044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941597" comment="glib2-2.68.4-14.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941598" comment="glib2-devel-2.68.4-14.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941599" comment="glib2-doc-2.68.4-14.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941600" comment="glib2-static-2.68.4-14.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941601" comment="glib2-tests-2.68.4-14.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953765" comment="mingw32-glib2-2.78.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953766" comment="mingw32-glib2-static-2.78.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953767" comment="mingw64-glib2-2.78.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953768" comment="mingw64-glib2-static-2.78.6-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3446</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3446" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3446" ref_url="https://www.suse.com/security/cve/CVE-2024-3446" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1438-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021354.html" source="SUSE-SU"/>
    <description>
    A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3446/">CVE-2024-3446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3446">CVE-2024-3446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222843">SUSE bug 1222843</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953616" comment="qemu-guest-agent-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953617" comment="qemu-img-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953618" comment="qemu-kvm-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953619" comment="qemu-kvm-audio-pa-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953620" comment="qemu-kvm-block-blkio-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953621" comment="qemu-kvm-block-curl-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953622" comment="qemu-kvm-block-rbd-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953623" comment="qemu-kvm-common-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953624" comment="qemu-kvm-core-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953625" comment="qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953626" comment="qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953627" comment="qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953628" comment="qemu-kvm-device-usb-host-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953629" comment="qemu-kvm-device-usb-redirect-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953630" comment="qemu-kvm-docs-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953631" comment="qemu-kvm-tools-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953632" comment="qemu-kvm-ui-egl-headless-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953633" comment="qemu-kvm-ui-opengl-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953634" comment="qemu-pr-helper-9.0.0-10.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202434750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-34750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-34750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-34750" ref_url="https://www.suse.com/security/cve/CVE-2024-34750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89.

The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100.  Other EOL versions may also be affected.


Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-23"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-34750/">CVE-2024-34750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750">CVE-2024-34750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227399">SUSE bug 1227399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009880871" comment="tomcat-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880872" comment="tomcat-admin-webapps-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880873" comment="tomcat-docs-webapp-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880874" comment="tomcat-el-3.0-api-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880875" comment="tomcat-jsp-2.3-api-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880876" comment="tomcat-lib-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880877" comment="tomcat-servlet-4.0-api-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880878" comment="tomcat-webapps-9.0.87-1.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35195" ref_url="https://www.suse.com/security/cve/CVE-2024-35195" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0012" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000734.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3599-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2024:3600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1880-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1880-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1937-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1938-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021223.html" source="SUSE-SU"/>
    <description>
    Requests is a HTTP library. Prior to 2.32.0, when making requests through a Requests `Session`, if the first request is made with `verify=False` to disable cert verification, all subsequent requests to the same host will continue to ignore cert verification regardless of changes to the value of `verify`. This behavior will continue for the lifecycle of the connection in the connection pool. This vulnerability is fixed in 2.32.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-35195/">CVE-2024-35195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35195">CVE-2024-35195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224788">SUSE bug 1224788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983870" comment="python3-requests-2.25.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983871" comment="python3-requests+security-2.25.1-9.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983872" comment="python3-requests+socks-2.25.1-9.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35235" ref_url="https://www.suse.com/security/cve/CVE-2024-35235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2003-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021226.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2025-09-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35235/">CVE-2024-35235 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35235">CVE-2024-35235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225365">SUSE bug 1225365</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877132" comment="cups-2.3.3op2-27.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877133" comment="cups-client-2.3.3op2-27.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877134" comment="cups-devel-2.3.3op2-27.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877135" comment="cups-filesystem-2.3.3op2-27.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877136" comment="cups-ipptool-2.3.3op2-27.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877137" comment="cups-libs-2.3.3op2-27.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877138" comment="cups-lpd-2.3.3op2-27.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877139" comment="cups-printerapp-2.3.3op2-27.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35264</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35264" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35264" ref_url="https://www.suse.com/security/cve/CVE-2024-35264" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-35264/">CVE-2024-35264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35264">CVE-2024-35264 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872973" comment="aspnetcore-runtime-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872974" comment="aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872975" comment="aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872976" comment="dotnet-apphost-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872977" comment="dotnet-host-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872978" comment="dotnet-hostfxr-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872979" comment="dotnet-runtime-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872980" comment="dotnet-runtime-dbg-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872981" comment="dotnet-sdk-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872982" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872983" comment="dotnet-sdk-dbg-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872984" comment="dotnet-targeting-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872985" comment="dotnet-templates-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872986" comment="netstandard-targeting-pack-2.1-8.0.107-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3567</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3567" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3567" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3567" ref_url="https://www.suse.com/security/cve/CVE-2024-3567" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4492" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021354.html" source="SUSE-SU"/>
    <description>
    A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-15"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3567/">CVE-2024-3567 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3567">CVE-2024-3567 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222841">SUSE bug 1222841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009981936" comment="qemu-guest-agent-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981937" comment="qemu-img-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981938" comment="qemu-kvm-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981939" comment="qemu-kvm-audio-pa-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981940" comment="qemu-kvm-block-blkio-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981941" comment="qemu-kvm-block-curl-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981942" comment="qemu-kvm-block-rbd-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981943" comment="qemu-kvm-common-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981944" comment="qemu-kvm-core-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981945" comment="qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981946" comment="qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981947" comment="qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981948" comment="qemu-kvm-device-usb-host-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981949" comment="qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981950" comment="qemu-kvm-docs-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981951" comment="qemu-kvm-tools-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981952" comment="qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981953" comment="qemu-kvm-ui-opengl-9.0.0-10.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009981954" comment="qemu-pr-helper-9.0.0-10.el9_5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35789" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35789" ref_url="https://www.suse.com/security/cve/CVE-2024-35789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes

When moving a station out of a VLAN and deleting the VLAN afterwards, the
fast_rx entry still holds a pointer to the VLAN's netdev, which can cause
use-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx
after the VLAN change.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-35789/">CVE-2024-35789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35789">CVE-2024-35789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224749">SUSE bug 1224749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227320">SUSE bug 1227320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35791" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35791" ref_url="https://www.suse.com/security/cve/CVE-2024-35791" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Flush pages under kvm-&gt;lock to fix UAF in svm_register_enc_region()

Do the cache flush of converted pages in svm_register_enc_region() before
dropping kvm-&gt;lock to fix use-after-free issues where region and/or its
array of pages could be freed by a different task, e.g. if userspace has
__unregister_enc_region_locked() already queued up for the region.

Note, the "obvious" alternative of using local variables doesn't fully
resolve the bug, as region-&gt;pages is also dynamically allocated.  I.e. the
region structure itself would be fine, but region-&gt;pages could be freed.

Flushing multiple pages under kvm-&gt;lock is unfortunate, but the entire
flow is a rare slow path, and the manual flush is only needed on CPUs that
lack coherency for encrypted memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35791/">CVE-2024-35791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35791">CVE-2024-35791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224725">SUSE bug 1224725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35797" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35797" ref_url="https://www.suse.com/security/cve/CVE-2024-35797" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: cachestat: fix two shmem bugs

When cachestat on shmem races with swapping and invalidation, there
are two possible bugs:

1) A swapin error can have resulted in a poisoned swap entry in the
   shmem inode's xarray. Calling get_shadow_from_swap_cache() on it
   will result in an out-of-bounds access to swapper_spaces[].

   Validate the entry with non_swap_entry() before going further.

2) When we find a valid swap entry in the shmem's inode, the shadow
   entry in the swapcache might not exist yet: swap IO is still in
   progress and we're before __remove_mapping; swapin, invalidation,
   or swapoff have removed the shadow from swapcache after we saw the
   shmem swap entry.

   This will send a NULL to workingset_test_recent(). The latter
   purely operates on pointer bits, so it won't crash - node 0, memcg
   ID 0, eviction timestamp 0, etc. are all valid inputs - but it's a
   bogus test. In theory that could result in a false "recently
   evicted" count.

   Such a false positive wouldn't be the end of the world. But for
   code clarity and (future) robustness, be explicit about this case.

   Bail on get_shadow_from_swap_cache() returning NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35797/">CVE-2024-35797 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35797">CVE-2024-35797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224635">SUSE bug 1224635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35800" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35800" ref_url="https://www.suse.com/security/cve/CVE-2024-35800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: fix panic in kdump kernel

Check if get_next_variable() is actually valid pointer before
calling it. In kdump kernel this method is set to NULL that causes
panic during the kexec-ed kernel boot.

Tested with QEMU and OVMF firmware.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35800/">CVE-2024-35800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35800">CVE-2024-35800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224507">SUSE bug 1224507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35823" ref_url="https://www.suse.com/security/cve/CVE-2024-35823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vt: fix unicode buffer corruption when deleting characters

This is the same issue that was fixed for the VGA text buffer in commit
39cdb68c64d8 ("vt: fix memory overlapping when deleting chars in the
buffer"). The cure is also the same i.e. replace memcpy() with memmove()
due to the overlaping buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35823/">CVE-2024-35823 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35823">CVE-2024-35823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224692">SUSE bug 1224692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35839" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35839" ref_url="https://www.suse.com/security/cve/CVE-2024-35839" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: bridge: replace physindev with physinif in nf_bridge_info

An skb can be added to a neigh-&gt;arp_queue while waiting for an arp
reply. Where original skb's skb-&gt;dev can be different to neigh's
neigh-&gt;dev. For instance in case of bridging dnated skb from one veth to
another, the skb would be added to a neigh-&gt;arp_queue of the bridge.

As skb-&gt;dev can be reset back to nf_bridge-&gt;physindev and used, and as
there is no explicit mechanism that prevents this physindev from been
freed under us (for instance neigh_flush_dev doesn't cleanup skbs from
different device's neigh queue) we can crash on e.g. this stack:

arp_process
  neigh_update
    skb = __skb_dequeue(&amp;neigh-&gt;arp_queue)
      neigh_resolve_output(..., skb)
        ...
          br_nf_dev_xmit
            br_nf_pre_routing_finish_bridge_slow
              skb-&gt;dev = nf_bridge-&gt;physindev
              br_handle_frame_finish

Let's use plain ifindex instead of net_device link. To peek into the
original net_device we will use dev_get_by_index_rcu(). Thus either we
get device and are safe to use it or we don't get it and drop skb.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35839/">CVE-2024-35839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35839">CVE-2024-35839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224726">SUSE bug 1224726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35845</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35845" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35845" ref_url="https://www.suse.com/security/cve/CVE-2024-35845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: dbg-tlv: ensure NUL termination

The iwl_fw_ini_debug_info_tlv is used as a string, so we must
ensure the string is terminated correctly before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35845/">CVE-2024-35845 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35845">CVE-2024-35845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224731">SUSE bug 1224731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35848" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35848" ref_url="https://www.suse.com/security/cve/CVE-2024-35848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eeprom: at24: fix memory corruption race condition

If the eeprom is not accessible, an nvmem device will be registered, the
read will fail, and the device will be torn down. If another driver
accesses the nvmem device after the teardown, it will reference
invalid memory.

Move the failure point before registering the nvmem device.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35848/">CVE-2024-35848 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35848">CVE-2024-35848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224612">SUSE bug 1224612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35852" ref_url="https://www.suse.com/security/cve/CVE-2024-35852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work

The rehash delayed work is rescheduled with a delay if the number of
credits at end of the work is not negative as supposedly it means that
the migration ended. Otherwise, it is rescheduled immediately.

After "mlxsw: spectrum_acl_tcam: Fix possible use-after-free during
rehash" the above is no longer accurate as a non-negative number of
credits is no longer indicative of the migration being done. It can also
happen if the work encountered an error in which case the migration will
resume the next time the work is scheduled.

The significance of the above is that it is possible for the work to be
pending and associated with hints that were allocated when the migration
started. This leads to the hints being leaked [1] when the work is
canceled while pending as part of ACL region dismantle.

Fix by freeing the hints if hints are associated with a work that was
canceled while pending.

Blame the original commit since the reliance on not having a pending
work associated with hints is fragile.

[1]
unreferenced object 0xffff88810e7c3000 (size 256):
  comm "kworker/0:16", pid 176, jiffies 4295460353
  hex dump (first 32 bytes):
    00 30 95 11 81 88 ff ff 61 00 00 00 00 00 00 80  .0......a.......
    00 00 61 00 40 00 00 00 00 00 00 00 04 00 00 00  ..a.@...........
  backtrace (crc 2544ddb9):
    [&lt;00000000cf8cfab3&gt;] kmalloc_trace+0x23f/0x2a0
    [&lt;000000004d9a1ad9&gt;] objagg_hints_get+0x42/0x390
    [&lt;000000000b143cf3&gt;] mlxsw_sp_acl_erp_rehash_hints_get+0xca/0x400
    [&lt;0000000059bdb60a&gt;] mlxsw_sp_acl_tcam_vregion_rehash_work+0x868/0x1160
    [&lt;00000000e81fd734&gt;] process_one_work+0x59c/0xf20
    [&lt;00000000ceee9e81&gt;] worker_thread+0x799/0x12c0
    [&lt;00000000bda6fe39&gt;] kthread+0x246/0x300
    [&lt;0000000070056d23&gt;] ret_from_fork+0x34/0x70
    [&lt;00000000dea2b93e&gt;] ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35852/">CVE-2024-35852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35852">CVE-2024-35852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224502">SUSE bug 1224502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35857" ref_url="https://www.suse.com/security/cve/CVE-2024-35857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

icmp: prevent possible NULL dereferences from icmp_build_probe()

First problem is a double call to __in_dev_get_rcu(), because
the second one could return NULL.

if (__in_dev_get_rcu(dev) &amp;&amp; __in_dev_get_rcu(dev)-&gt;ifa_list)

Second problem is a read from dev-&gt;ip6_ptr with no NULL check:

if (!list_empty(&amp;rcu_dereference(dev-&gt;ip6_ptr)-&gt;addr_list))

Use the correct RCU API to fix these.

v2: add missing include &lt;net/addrconf.h&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35857/">CVE-2024-35857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35857">CVE-2024-35857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224619">SUSE bug 1224619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35870" ref_url="https://www.suse.com/security/cve/CVE-2024-35870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in smb2_reconnect_server()

The UAF bug is due to smb2_reconnect_server() accessing a session that
is already being teared down by another thread that is executing
__cifs_put_smb_ses().  This can happen when (a) the client has
connection to the server but no session or (b) another thread ends up
setting @ses-&gt;ses_status again to something different than
SES_EXITING.

To fix this, we need to make sure to unconditionally set
@ses-&gt;ses_status to SES_EXITING and prevent any other threads from
setting a new status while we're still tearing it down.

The following can be reproduced by adding some delay to right after
the ipc is freed in __cifs_put_smb_ses() - which will give
smb2_reconnect_server() worker a chance to run and then accessing
@ses-&gt;ipc:

kinit ...
mount.cifs //srv/share /mnt/1 -o sec=krb5,nohandlecache,echo_interval=10
[disconnect srv]
ls /mnt/1 &amp;&gt;/dev/null
sleep 30
kdestroy
[reconnect srv]
sleep 10
umount /mnt/1
...
CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed
CIFS: VFS: \\srv Send error in SessSetup = -126
CIFS: VFS: Verify user has a krb5 ticket and keyutils is installed
CIFS: VFS: \\srv Send error in SessSetup = -126
general protection fault, probably for non-canonical address
0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc2 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39
04/01/2014
Workqueue: cifsiod smb2_reconnect_server [cifs]
RIP: 0010:__list_del_entry_valid_or_report+0x33/0xf0
Code: 4f 08 48 85 d2 74 42 48 85 c9 74 59 48 b8 00 01 00 00 00 00 ad
de 48 39 c2 74 61 48 b8 22 01 00 00 00 00 74 69 &lt;48&gt; 8b 01 48 39 f8 75
7b 48 8b 72 08 48 39 c6 0f 85 88 00 00 00 b8
RSP: 0018:ffffc900001bfd70 EFLAGS: 00010a83
RAX: dead000000000122 RBX: ffff88810da53838 RCX: 6b6b6b6b6b6b6b6b
RDX: 6b6b6b6b6b6b6b6b RSI: ffffffffc02f6878 RDI: ffff88810da53800
RBP: ffff88810da53800 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff88810c064000
R13: 0000000000000001 R14: ffff88810c064000 R15: ffff8881039cc000
FS: 0000000000000000(0000) GS:ffff888157c00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe3728b1000 CR3: 000000010caa4000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? die_addr+0x36/0x90
 ? exc_general_protection+0x1c1/0x3f0
 ? asm_exc_general_protection+0x26/0x30
 ? __list_del_entry_valid_or_report+0x33/0xf0
 __cifs_put_smb_ses+0x1ae/0x500 [cifs]
 smb2_reconnect_server+0x4ed/0x710 [cifs]
 process_one_work+0x205/0x6b0
 worker_thread+0x191/0x360
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xe2/0x110
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35870/">CVE-2024-35870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35870">CVE-2024-35870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224672">SUSE bug 1224672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35875</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35875" ref_url="https://www.suse.com/security/cve/CVE-2024-35875" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/coco: Require seeding RNG with RDRAND on CoCo systems

There are few uses of CoCo that don't rely on working cryptography and
hence a working RNG. Unfortunately, the CoCo threat model means that the
VM host cannot be trusted and may actively work against guests to
extract secrets or manipulate computation. Since a malicious host can
modify or observe nearly all inputs to guests, the only remaining source
of entropy for CoCo guests is RDRAND.

If RDRAND is broken -- due to CPU hardware fault -- the RNG as a whole
is meant to gracefully continue on gathering entropy from other sources,
but since there aren't other sources on CoCo, this is catastrophic.
This is mostly a concern at boot time when initially seeding the RNG, as
after that the consequences of a broken RDRAND are much more
theoretical.

So, try at boot to seed the RNG using 256 bits of RDRAND output. If this
fails, panic(). This will also trigger if the system is booted without
RDRAND, as RDRAND is essential for a safe CoCo boot.

Add this deliberately to be "just a CoCo x86 driver feature" and not
part of the RNG itself. Many device drivers and platforms have some
desire to contribute something to the RNG, and add_device_randomness()
is specifically meant for this purpose.

Any driver can call it with seed data of any quality, or even garbage
quality, and it can only possibly make the quality of the RNG better or
have no effect, but can never make it worse.

Rather than trying to build something into the core of the RNG, consider
the particular CoCo issue just a CoCo issue, and therefore separate it
all out into driver (well, arch/platform) code.

  [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35875/">CVE-2024-35875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35875">CVE-2024-35875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224665">SUSE bug 1224665</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35885" ref_url="https://www.suse.com/security/cve/CVE-2024-35885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxbf_gige: stop interface during shutdown

The mlxbf_gige driver intermittantly encounters a NULL pointer
exception while the system is shutting down via "reboot" command.
The mlxbf_driver will experience an exception right after executing
its shutdown() method.  One example of this exception is:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000070
Mem abort info:
  ESR = 0x0000000096000004
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x04: level 0 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000004
  CM = 0, WnR = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=000000011d373000
[0000000000000070] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 96000004 [#1] SMP
CPU: 0 PID: 13 Comm: ksoftirqd/0 Tainted: G S         OE     5.15.0-bf.6.gef6992a #1
Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS 4.0.2.12669 Apr 21 2023
pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige]
lr : mlxbf_gige_poll+0x54/0x160 [mlxbf_gige]
sp : ffff8000080d3c10
x29: ffff8000080d3c10 x28: ffffcce72cbb7000 x27: ffff8000080d3d58
x26: ffff0000814e7340 x25: ffff331cd1a05000 x24: ffffcce72c4ea008
x23: ffff0000814e4b40 x22: ffff0000814e4d10 x21: ffff0000814e4128
x20: 0000000000000000 x19: ffff0000814e4a80 x18: ffffffffffffffff
x17: 000000000000001c x16: ffffcce72b4553f4 x15: ffff80008805b8a7
x14: 0000000000000000 x13: 0000000000000030 x12: 0101010101010101
x11: 7f7f7f7f7f7f7f7f x10: c2ac898b17576267 x9 : ffffcce720fa5404
x8 : ffff000080812138 x7 : 0000000000002e9a x6 : 0000000000000080
x5 : ffff00008de3b000 x4 : 0000000000000000 x3 : 0000000000000001
x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
Call trace:
 mlxbf_gige_handle_tx_complete+0xc8/0x170 [mlxbf_gige]
 mlxbf_gige_poll+0x54/0x160 [mlxbf_gige]
 __napi_poll+0x40/0x1c8
 net_rx_action+0x314/0x3a0
 __do_softirq+0x128/0x334
 run_ksoftirqd+0x54/0x6c
 smpboot_thread_fn+0x14c/0x190
 kthread+0x10c/0x110
 ret_from_fork+0x10/0x20
Code: 8b070000 f9000ea0 f95056c0 f86178a1 (b9407002)
---[ end trace 7cc3941aa0d8e6a4 ]---
Kernel panic - not syncing: Oops: Fatal exception in interrupt
Kernel Offset: 0x4ce722520000 from 0xffff800008000000
PHYS_OFFSET: 0x80000000
CPU features: 0x000005c1,a3330e5a
Memory Limit: none
---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

During system shutdown, the mlxbf_gige driver's shutdown() is always executed.
However, the driver's stop() method will only execute if networking interface
configuration logic within the Linux distribution has been setup to do so.

If shutdown() executes but stop() does not execute, NAPI remains enabled
and this can lead to an exception if NAPI is scheduled while the hardware
interface has only been partially deinitialized.

The networking interface managed by the mlxbf_gige driver must be properly
stopped during system shutdown so that IFF_UP is cleared, the hardware
interface is put into a clean state, and NAPI is fully deinitialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35885/">CVE-2024-35885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35885">CVE-2024-35885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224519">SUSE bug 1224519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35890" ref_url="https://www.suse.com/security/cve/CVE-2024-35890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gro: fix ownership transfer

If packets are GROed with fraglist they might be segmented later on and
continue their journey in the stack. In skb_segment_list those skbs can
be reused as-is. This is an issue as their destructor was removed in
skb_gro_receive_list but not the reference to their socket, and then
they can't be orphaned. Fix this by also removing the reference to the
socket.

For example this could be observed,

  kernel BUG at include/linux/skbuff.h:3131!  (skb_orphan)
  RIP: 0010:ip6_rcv_core+0x11bc/0x19a0
  Call Trace:
   ipv6_list_rcv+0x250/0x3f0
   __netif_receive_skb_list_core+0x49d/0x8f0
   netif_receive_skb_list_internal+0x634/0xd40
   napi_complete_done+0x1d2/0x7d0
   gro_cell_poll+0x118/0x1f0

A similar construction is found in skb_gro_receive, apply the same
change there.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35890/">CVE-2024-35890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35890">CVE-2024-35890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224516">SUSE bug 1224516</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870112" comment="bpftool-7.3.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870113" comment="kernel-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870114" comment="kernel-abi-stablelists-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870115" comment="kernel-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870116" comment="kernel-cross-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870117" comment="kernel-debug-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870118" comment="kernel-debug-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870121" comment="kernel-debug-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870122" comment="kernel-debug-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870123" comment="kernel-debug-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870124" comment="kernel-debug-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870127" comment="kernel-doc-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870128" comment="kernel-headers-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870129" comment="kernel-modules-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870130" comment="kernel-modules-core-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870131" comment="kernel-modules-extra-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870132" comment="kernel-tools-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870133" comment="kernel-tools-libs-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870135" comment="kernel-uki-virt-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870136" comment="libperf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870137" comment="perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870138" comment="python3-perf-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870139" comment="rtla-5.14.0-427.18.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870140" comment="rv-5.14.0-427.18.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35891</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35891" ref_url="https://www.suse.com/security/cve/CVE-2024-35891" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: micrel: Fix potential null pointer dereference

In lan8814_get_sig_rx() and lan8814_get_sig_tx() ptp_parse_header() may
return NULL as ptp_header due to abnormal packet type or corrupted packet.
Fix this bug by adding ptp_header check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35891/">CVE-2024-35891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35891">CVE-2024-35891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224513">SUSE bug 1224513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35895</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35895" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35895" ref_url="https://www.suse.com/security/cve/CVE-2024-35895" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2183-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Prevent lock inversion deadlock in map delete elem

syzkaller started using corpuses where a BPF tracing program deletes
elements from a sockmap/sockhash map. Because BPF tracing programs can be
invoked from any interrupt context, locks taken during a map_delete_elem
operation must be hardirq-safe. Otherwise a deadlock due to lock inversion
is possible, as reported by lockdep:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;htab-&gt;buckets[i].lock);
                               local_irq_disable();
                               lock(&amp;host-&gt;lock);
                               lock(&amp;htab-&gt;buckets[i].lock);
  &lt;Interrupt&gt;
    lock(&amp;host-&gt;lock);

Locks in sockmap are hardirq-unsafe by design. We expects elements to be
deleted from sockmap/sockhash only in task (normal) context with interrupts
enabled, or in softirq context.

Detect when map_delete_elem operation is invoked from a context which is
_not_ hardirq-unsafe, that is interrupts are disabled, and bail out with an
error.

Note that map updates are not affected by this issue. BPF verifier does not
allow updating sockmap/sockhash from a BPF tracing program today.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35895/">CVE-2024-35895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35895">CVE-2024-35895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224511">SUSE bug 1224511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35896</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35896" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35896" ref_url="https://www.suse.com/security/cve/CVE-2024-35896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: validate user input for expected length

I got multiple syzbot reports showing old bugs exposed
by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc
in cgroup/{s,g}etsockopt")

setsockopt() @optlen argument should be taken into account
before copying data.

 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
 BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
 BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
 BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
Read of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238

CPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105
  copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
  copy_from_sockptr include/linux/sockptr.h:55 [inline]
  do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
  do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
  nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101
  do_sock_setsockopt+0x3af/0x720 net/socket.c:2311
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x72/0x7a
RIP: 0033:0x7fd22067dde9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8
 &lt;/TASK&gt;

Allocated by task 7238:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
  __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
  kasan_kmalloc include/linux/kasan.h:211 [inline]
  __do_kmalloc_node mm/slub.c:4069 [inline]
  __kmalloc_noprof+0x200/0x410 mm/slub.c:4082
  kmalloc_noprof include/linux/slab.h:664 [inline]
  __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869
  do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293
  __sys_setsockopt+0x1ae/0x250 net/socket.c:2334
  __do_sys_setsockopt net/socket.c:2343 [inline]
  __se_sys_setsockopt net/socket.c:2340 [inline]
  __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x72/0x7a

The buggy address belongs to the object at ffff88802cd73da0
 which belongs to the cache kmalloc-8 of size 8
The buggy address is located 0 bytes inside of
 allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)

The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73
flags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)
page_type: 0xffffefff(slab)
raw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122
raw: ffff88802cd73020 000000008080007f 00000001ffffefff 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35896/">CVE-2024-35896 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35896">CVE-2024-35896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224662">SUSE bug 1224662</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35897" ref_url="https://www.suse.com/security/cve/CVE-2024-35897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: discard table flag update with pending basechain deletion

Hook unregistration is deferred to the commit phase, same occurs with
hook updates triggered by the table dormant flag. When both commands are
combined, this results in deleting a basechain while leaving its hook
still registered in the core.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35897/">CVE-2024-35897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35897">CVE-2024-35897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224510">SUSE bug 1224510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35898" ref_url="https://www.suse.com/security/cve/CVE-2024-35898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()

nft_unregister_flowtable_type() within nf_flow_inet_module_exit() can
concurrent with __nft_flowtable_type_get() within nf_tables_newflowtable().
And thhere is not any protection when iterate over nf_tables_flowtables
list in __nft_flowtable_type_get(). Therefore, there is pertential
data-race of nf_tables_flowtables list entry.

Use list_for_each_entry_rcu() to iterate over nf_tables_flowtables list
in __nft_flowtable_type_get(), and use rcu_read_lock() in the caller
nft_flowtable_type_get() to protect the entire type query process.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35898/">CVE-2024-35898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35898">CVE-2024-35898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224498">SUSE bug 1224498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35899</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35899" ref_url="https://www.suse.com/security/cve/CVE-2024-35899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: flush pending destroy work before exit_net release

Similar to 2c9f0293280e ("netfilter: nf_tables: flush pending destroy
work before netlink notifier") to address a race between exit_net and
the destroy workqueue.

The trace below shows an element to be released via destroy workqueue
while exit_net path (triggered via module removal) has already released
the set that is used in such transaction.

[ 1360.547789] BUG: KASAN: slab-use-after-free in nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.547861] Read of size 8 at addr ffff888140500cc0 by task kworker/4:1/152465
[ 1360.547870] CPU: 4 PID: 152465 Comm: kworker/4:1 Not tainted 6.8.0+ #359
[ 1360.547882] Workqueue: events nf_tables_trans_destroy_work [nf_tables]
[ 1360.547984] Call Trace:
[ 1360.547991]  &lt;TASK&gt;
[ 1360.547998]  dump_stack_lvl+0x53/0x70
[ 1360.548014]  print_report+0xc4/0x610
[ 1360.548026]  ? __virt_addr_valid+0xba/0x160
[ 1360.548040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[ 1360.548054]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548176]  kasan_report+0xae/0xe0
[ 1360.548189]  ? nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548312]  nf_tables_trans_destroy_work+0x3f5/0x590 [nf_tables]
[ 1360.548447]  ? __pfx_nf_tables_trans_destroy_work+0x10/0x10 [nf_tables]
[ 1360.548577]  ? _raw_spin_unlock_irq+0x18/0x30
[ 1360.548591]  process_one_work+0x2f1/0x670
[ 1360.548610]  worker_thread+0x4d3/0x760
[ 1360.548627]  ? __pfx_worker_thread+0x10/0x10
[ 1360.548640]  kthread+0x16b/0x1b0
[ 1360.548653]  ? __pfx_kthread+0x10/0x10
[ 1360.548665]  ret_from_fork+0x2f/0x50
[ 1360.548679]  ? __pfx_kthread+0x10/0x10
[ 1360.548690]  ret_from_fork_asm+0x1a/0x30
[ 1360.548707]  &lt;/TASK&gt;

[ 1360.548719] Allocated by task 192061:
[ 1360.548726]  kasan_save_stack+0x20/0x40
[ 1360.548739]  kasan_save_track+0x14/0x30
[ 1360.548750]  __kasan_kmalloc+0x8f/0xa0
[ 1360.548760]  __kmalloc_node+0x1f1/0x450
[ 1360.548771]  nf_tables_newset+0x10c7/0x1b50 [nf_tables]
[ 1360.548883]  nfnetlink_rcv_batch+0xbc4/0xdc0 [nfnetlink]
[ 1360.548909]  nfnetlink_rcv+0x1a8/0x1e0 [nfnetlink]
[ 1360.548927]  netlink_unicast+0x367/0x4f0
[ 1360.548935]  netlink_sendmsg+0x34b/0x610
[ 1360.548944]  ____sys_sendmsg+0x4d4/0x510
[ 1360.548953]  ___sys_sendmsg+0xc9/0x120
[ 1360.548961]  __sys_sendmsg+0xbe/0x140
[ 1360.548971]  do_syscall_64+0x55/0x120
[ 1360.548982]  entry_SYSCALL_64_after_hwframe+0x55/0x5d

[ 1360.548994] Freed by task 192222:
[ 1360.548999]  kasan_save_stack+0x20/0x40
[ 1360.549009]  kasan_save_track+0x14/0x30
[ 1360.549019]  kasan_save_free_info+0x3b/0x60
[ 1360.549028]  poison_slab_object+0x100/0x180
[ 1360.549036]  __kasan_slab_free+0x14/0x30
[ 1360.549042]  kfree+0xb6/0x260
[ 1360.549049]  __nft_release_table+0x473/0x6a0 [nf_tables]
[ 1360.549131]  nf_tables_exit_net+0x170/0x240 [nf_tables]
[ 1360.549221]  ops_exit_list+0x50/0xa0
[ 1360.549229]  free_exit_list+0x101/0x140
[ 1360.549236]  unregister_pernet_operations+0x107/0x160
[ 1360.549245]  unregister_pernet_subsys+0x1c/0x30
[ 1360.549254]  nf_tables_module_exit+0x43/0x80 [nf_tables]
[ 1360.549345]  __do_sys_delete_module+0x253/0x370
[ 1360.549352]  do_syscall_64+0x55/0x120
[ 1360.549360]  entry_SYSCALL_64_after_hwframe+0x55/0x5d

(gdb) list *__nft_release_table+0x473
0x1e033 is in __nft_release_table (net/netfilter/nf_tables_api.c:11354).
11349           list_for_each_entry_safe(flowtable, nf, &amp;table-&gt;flowtables, list) {
11350                   list_del(&amp;flowtable-&gt;list);
11351                   nft_use_dec(&amp;table-&gt;use);
11352                   nf_tables_flowtable_destroy(flowtable);
11353           }
11354           list_for_each_entry_safe(set, ns, &amp;table-&gt;sets, list) {
11355                   list_del(&amp;set-&gt;list);
11356                   nft_use_dec(&amp;table-&gt;use);
11357                   if (set-&gt;flags &amp; (NFT_SET_MAP | NFT_SET_OBJECT))
11358                           nft_map_deactivat
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35899/">CVE-2024-35899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35899">CVE-2024-35899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224499">SUSE bug 1224499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35907</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35907" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35907" ref_url="https://www.suse.com/security/cve/CVE-2024-35907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxbf_gige: call request_irq() after NAPI initialized

The mlxbf_gige driver encounters a NULL pointer exception in
mlxbf_gige_open() when kdump is enabled.  The sequence to reproduce
the exception is as follows:
a) enable kdump
b) trigger kdump via "echo c &gt; /proc/sysrq-trigger"
c) kdump kernel executes
d) kdump kernel loads mlxbf_gige module
e) the mlxbf_gige module runs its open() as the
   the "oob_net0" interface is brought up
f) mlxbf_gige module will experience an exception
   during its open(), something like:

     Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
     Mem abort info:
       ESR = 0x0000000086000004
       EC = 0x21: IABT (current EL), IL = 32 bits
       SET = 0, FnV = 0
       EA = 0, S1PTW = 0
       FSC = 0x04: level 0 translation fault
     user pgtable: 4k pages, 48-bit VAs, pgdp=00000000e29a4000
     [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
     Internal error: Oops: 0000000086000004 [#1] SMP
     CPU: 0 PID: 812 Comm: NetworkManager Tainted: G           OE     5.15.0-1035-bluefield #37-Ubuntu
     Hardware name: https://www.mellanox.com BlueField-3 SmartNIC Main Card/BlueField-3 SmartNIC Main Card, BIOS 4.6.0.13024 Jan 19 2024
     pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
     pc : 0x0
     lr : __napi_poll+0x40/0x230
     sp : ffff800008003e00
     x29: ffff800008003e00 x28: 0000000000000000 x27: 00000000ffffffff
     x26: ffff000066027238 x25: ffff00007cedec00 x24: ffff800008003ec8
     x23: 000000000000012c x22: ffff800008003eb7 x21: 0000000000000000
     x20: 0000000000000001 x19: ffff000066027238 x18: 0000000000000000
     x17: ffff578fcb450000 x16: ffffa870b083c7c0 x15: 0000aaab010441d0
     x14: 0000000000000001 x13: 00726f7272655f65 x12: 6769675f6662786c
     x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa870b0842398
     x8 : 0000000000000004 x7 : fe5a48b9069706ea x6 : 17fdb11fc84ae0d2
     x5 : d94a82549d594f35 x4 : 0000000000000000 x3 : 0000000000400100
     x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000066027238
     Call trace:
      0x0
      net_rx_action+0x178/0x360
      __do_softirq+0x15c/0x428
      __irq_exit_rcu+0xac/0xec
      irq_exit+0x18/0x2c
      handle_domain_irq+0x6c/0xa0
      gic_handle_irq+0xec/0x1b0
      call_on_irq_stack+0x20/0x2c
      do_interrupt_handler+0x5c/0x70
      el1_interrupt+0x30/0x50
      el1h_64_irq_handler+0x18/0x2c
      el1h_64_irq+0x7c/0x80
      __setup_irq+0x4c0/0x950
      request_threaded_irq+0xf4/0x1bc
      mlxbf_gige_request_irqs+0x68/0x110 [mlxbf_gige]
      mlxbf_gige_open+0x5c/0x170 [mlxbf_gige]
      __dev_open+0x100/0x220
      __dev_change_flags+0x16c/0x1f0
      dev_change_flags+0x2c/0x70
      do_setlink+0x220/0xa40
      __rtnl_newlink+0x56c/0x8a0
      rtnl_newlink+0x58/0x84
      rtnetlink_rcv_msg+0x138/0x3c4
      netlink_rcv_skb+0x64/0x130
      rtnetlink_rcv+0x20/0x30
      netlink_unicast+0x2ec/0x360
      netlink_sendmsg+0x278/0x490
      __sock_sendmsg+0x5c/0x6c
      ____sys_sendmsg+0x290/0x2d4
      ___sys_sendmsg+0x84/0xd0
      __sys_sendmsg+0x70/0xd0
      __arm64_sys_sendmsg+0x2c/0x40
      invoke_syscall+0x78/0x100
      el0_svc_common.constprop.0+0x54/0x184
      do_el0_svc+0x30/0xac
      el0_svc+0x48/0x160
      el0t_64_sync_handler+0xa4/0x12c
      el0t_64_sync+0x1a4/0x1a8
     Code: bad PC value
     ---[ end trace 7d1c3f3bf9d81885 ]---
     Kernel panic - not syncing: Oops: Fatal exception in interrupt
     Kernel Offset: 0x2870a7a00000 from 0xffff800008000000
     PHYS_OFFSET: 0x80000000
     CPU features: 0x0,000005c1,a3332a5a
     Memory Limit: none
     ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

The exception happens because there is a pending RX interrupt before the
call to request_irq(RX IRQ) executes.  Then, the RX IRQ handler fires
immediately after this request_irq() completes. The
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35907/">CVE-2024-35907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35907">CVE-2024-35907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224492">SUSE bug 1224492</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35911" ref_url="https://www.suse.com/security/cve/CVE-2024-35911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix memory corruption bug with suspend and rebuild

The ice driver would previously panic after suspend. This is caused
from the driver *only* calling the ice_vsi_free_q_vectors() function by
itself, when it is suspending. Since commit b3e7b3a6ee92 ("ice: prevent
NULL pointer deref during reload") the driver has zeroed out
num_q_vectors, and only restored it in ice_vsi_cfg_def().

This further causes the ice_rebuild() function to allocate a zero length
buffer, after which num_q_vectors is updated, and then the new value of
num_q_vectors is used to index into the zero length buffer, which
corrupts memory.

The fix entails making sure all the code referencing num_q_vectors only
does so after it has been reset via ice_vsi_cfg_def().

I didn't perform a full bisect, but I was able to test against 6.1.77
kernel and that ice driver works fine for suspend/resume with no panic,
so sometime since then, this problem was introduced.

Also clean up an un-needed init of a local variable in the function
being modified.

PANIC from 6.8.0-rc1:

[1026674.915596] PM: suspend exit
[1026675.664697] ice 0000:17:00.1: PTP reset successful
[1026675.664707] ice 0000:17:00.1: 2755 msecs passed between update to cached PHC time
[1026675.667660] ice 0000:b1:00.0: PTP reset successful
[1026675.675944] ice 0000:b1:00.0: 2832 msecs passed between update to cached PHC time
[1026677.137733] ixgbe 0000:31:00.0 ens787: NIC Link is Up 1 Gbps, Flow Control: None
[1026677.190201] BUG: kernel NULL pointer dereference, address: 0000000000000010
[1026677.192753] ice 0000:17:00.0: PTP reset successful
[1026677.192764] ice 0000:17:00.0: 4548 msecs passed between update to cached PHC time
[1026677.197928] #PF: supervisor read access in kernel mode
[1026677.197933] #PF: error_code(0x0000) - not-present page
[1026677.197937] PGD 1557a7067 P4D 0
[1026677.212133] ice 0000:b1:00.1: PTP reset successful
[1026677.212143] ice 0000:b1:00.1: 4344 msecs passed between update to cached PHC time
[1026677.212575]
[1026677.243142] Oops: 0000 [#1] PREEMPT SMP NOPTI
[1026677.247918] CPU: 23 PID: 42790 Comm: kworker/23:0 Kdump: loaded Tainted: G        W          6.8.0-rc1+ #1
[1026677.257989] Hardware name: Intel Corporation M50CYP2SBSTD/M50CYP2SBSTD, BIOS SE5C620.86B.01.01.0005.2202160810 02/16/2022
[1026677.269367] Workqueue: ice ice_service_task [ice]
[1026677.274592] RIP: 0010:ice_vsi_rebuild_set_coalesce+0x130/0x1e0 [ice]
[1026677.281421] Code: 0f 84 3a ff ff ff 41 0f b7 74 ec 02 66 89 b0 22 02 00 00 81 e6 ff 1f 00 00 e8 ec fd ff ff e9 35 ff ff ff 48 8b 43 30 49 63 ed &lt;41&gt; 0f b7 34 24 41 83 c5 01 48 8b 3c e8 66 89 b7 aa 02 00 00 81 e6
[1026677.300877] RSP: 0018:ff3be62a6399bcc0 EFLAGS: 00010202
[1026677.306556] RAX: ff28691e28980828 RBX: ff28691e41099828 RCX: 0000000000188000
[1026677.314148] RDX: 0000000000000000 RSI: 0000000000000010 RDI: ff28691e41099828
[1026677.321730] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
[1026677.329311] R10: 0000000000000007 R11: ffffffffffffffc0 R12: 0000000000000010
[1026677.336896] R13: 0000000000000000 R14: 0000000000000000 R15: ff28691e0eaa81a0
[1026677.344472] FS:  0000000000000000(0000) GS:ff28693cbffc0000(0000) knlGS:0000000000000000
[1026677.353000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[1026677.359195] CR2: 0000000000000010 CR3: 0000000128df4001 CR4: 0000000000771ef0
[1026677.366779] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[1026677.374369] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[1026677.381952] PKRU: 55555554
[1026677.385116] Call Trace:
[1026677.388023]  &lt;TASK&gt;
[1026677.390589]  ? __die+0x20/0x70
[1026677.394105]  ? page_fault_oops+0x82/0x160
[1026677.398576]  ? do_user_addr_fault+0x65/0x6a0
[1026677.403307]  ? exc_page_fault+0x6a/0x150
[1026677.407694]  ? asm_exc_page_fault+0x22/0x30
[1026677.412349]  ? ice_vsi_rebuild_set_coalesce+0x130/0x1e0 [ice]
[1026677.4186
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35911/">CVE-2024-35911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35911">CVE-2024-35911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224486">SUSE bug 1224486</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35933" ref_url="https://www.suse.com/security/cve/CVE-2024-35933" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btintel: Fix null ptr deref in btintel_read_version

If hci_cmd_sync_complete() is triggered and skb is NULL, then
hdev-&gt;req_skb is NULL, which will cause this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35933/">CVE-2024-35933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35933">CVE-2024-35933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224640">SUSE bug 1224640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35934" ref_url="https://www.suse.com/security/cve/CVE-2024-35934" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list()

Many syzbot reports show extreme rtnl pressure, and many of them hint
that smc acquires rtnl in netns creation for no good reason [1]

This patch returns early from smc_pnet_net_init()
if there is no netdevice yet.

I am not even sure why smc_pnet_create_pnetids_list() even exists,
because smc_pnet_netdev_event() is also calling
smc_pnet_add_base_pnetid() when handling NETDEV_UP event.

[1] extract of typical syzbot reports

2 locks held by syz-executor.3/12252:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.4/12253:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.1/12257:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.2/12261:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.0/12265:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.3/12268:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.4/12271:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.1/12274:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
2 locks held by syz-executor.2/12280:
  #0: ffffffff8f369610 (pernet_ops_rwsem){++++}-{3:3}, at: copy_net_ns+0x4c7/0x7b0 net/core/net_namespace.c:491
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_create_pnetids_list net/smc/smc_pnet.c:809 [inline]
  #1: ffffffff8f375b88 (rtnl_mutex){+.+.}-{3:3}, at: smc_pnet_net_init+0x10a/0x1e0 net/smc/smc_pnet.c:878
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35934/">CVE-2024-35934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35934">CVE-2024-35934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224641">SUSE bug 1224641</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35937" ref_url="https://www.suse.com/security/cve/CVE-2024-35937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: check A-MSDU format more carefully

If it looks like there's another subframe in the A-MSDU
but the header isn't fully there, we can end up reading
data out of bounds, only to discard later. Make this a
bit more careful and check if the subframe header can
even be present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-35937/">CVE-2024-35937 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35937">CVE-2024-35937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224526">SUSE bug 1224526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35952" ref_url="https://www.suse.com/security/cve/CVE-2024-35952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ast: Fix soft lockup

There is a while-loop in ast_dp_set_on_off() that could lead to
infinite-loop. This is because the register, VGACRI-Dx, checked in
this API is a scratch register actually controlled by a MCU, named
DPMCU, in BMC.

These scratch registers are protected by scu-lock. If suc-lock is not
off, DPMCU can not update these registers and then host will have soft
lockup due to never updated status.

DPMCU is used to control DP and relative registers to handshake with
host's VGA driver. Even the most time-consuming task, DP's link
training, is less than 100ms. 200ms should be enough.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35952/">CVE-2024-35952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35952">CVE-2024-35952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224705">SUSE bug 1224705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35958" ref_url="https://www.suse.com/security/cve/CVE-2024-35958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ena: Fix incorrect descriptor free behavior

ENA has two types of TX queues:
- queues which only process TX packets arriving from the network stack
- queues which only process TX packets forwarded to it by XDP_REDIRECT
  or XDP_TX instructions

The ena_free_tx_bufs() cycles through all descriptors in a TX queue
and unmaps + frees every descriptor that hasn't been acknowledged yet
by the device (uncompleted TX transactions).
The function assumes that the processed TX queue is necessarily from
the first category listed above and ends up using napi_consume_skb()
for descriptors belonging to an XDP specific queue.

This patch solves a bug in which, in case of a VF reset, the
descriptors aren't freed correctly, leading to crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35958/">CVE-2024-35958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35958">CVE-2024-35958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224677">SUSE bug 1224677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3596" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3596" ref_url="https://www.suse.com/security/cve/CVE-2024-3596" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0650" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000163.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8788" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000634.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8860" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000199.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9474" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2361-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2366-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2367-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035870.html" source="SUSE-SU"/>
    <description>
    RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen-prefix collision attack against MD5 Response Authenticator signature.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-3596/">CVE-2024-3596 at SUSE</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3596">CVE-2024-3596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223414">SUSE bug 1223414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877798" comment="freeradius-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877799" comment="freeradius-devel-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877800" comment="freeradius-doc-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877801" comment="freeradius-krb5-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877802" comment="freeradius-ldap-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877803" comment="freeradius-mysql-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877804" comment="freeradius-perl-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877805" comment="freeradius-postgresql-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877806" comment="freeradius-rest-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877807" comment="freeradius-sqlite-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877808" comment="freeradius-unixODBC-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877809" comment="freeradius-utils-3.0.21-40.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953922" comment="krb5-devel-1.21.1-4.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953923" comment="krb5-libs-1.21.1-4.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953924" comment="krb5-pkinit-1.21.1-4.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953925" comment="krb5-server-1.21.1-4.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953926" comment="krb5-server-ldap-1.21.1-4.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953927" comment="krb5-workstation-1.21.1-4.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953928" comment="libkadm5-1.21.1-4.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877810" comment="python3-freeradius-3.0.21-40.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35960" ref_url="https://www.suse.com/security/cve/CVE-2024-35960" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Properly link new fs rules into the tree

Previously, add_rule_fg would only add newly created rules from the
handle into the tree when they had a refcount of 1. On the other hand,
create_flow_handle tries hard to find and reference already existing
identical rules instead of creating new ones.

These two behaviors can result in a situation where create_flow_handle
1) creates a new rule and references it, then
2) in a subsequent step during the same handle creation references it
   again,
resulting in a rule with a refcount of 2 that is not linked into the
tree, will have a NULL parent and root and will result in a crash when
the flow group is deleted because del_sw_hw_rule, invoked on rule
deletion, assumes node-&gt;parent is != NULL.

This happened in the wild, due to another bug related to incorrect
handling of duplicate pkt_reformat ids, which lead to the code in
create_flow_handle incorrectly referencing a just-added rule in the same
flow handle, resulting in the problem described above. Full details are
at [1].

This patch changes add_rule_fg to add new rules without parents into
the tree, properly initializing them and avoiding the crash. This makes
it more consistent with how rules are added to an FTE in
create_flow_handle.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35960/">CVE-2024-35960 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35960">CVE-2024-35960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224588">SUSE bug 1224588</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872944" comment="bpftool-7.3.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872945" comment="kernel-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872946" comment="kernel-abi-stablelists-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872947" comment="kernel-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872948" comment="kernel-cross-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872949" comment="kernel-debug-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872950" comment="kernel-debug-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872953" comment="kernel-debug-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872954" comment="kernel-debug-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872955" comment="kernel-debug-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872956" comment="kernel-debug-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872959" comment="kernel-doc-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872960" comment="kernel-headers-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872961" comment="kernel-modules-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872962" comment="kernel-modules-core-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872963" comment="kernel-modules-extra-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872964" comment="kernel-tools-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872965" comment="kernel-tools-libs-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872967" comment="kernel-uki-virt-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872968" comment="libperf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872969" comment="perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872970" comment="python3-perf-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872971" comment="rtla-5.14.0-427.24.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872972" comment="rv-5.14.0-427.24.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35962" ref_url="https://www.suse.com/security/cve/CVE-2024-35962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: complete validation of user input

In my recent commit, I missed that do_replace() handlers
use copy_from_sockptr() (which I fixed), followed
by unsafe copy_from_sockptr_offset() calls.

In all functions, we can perform the @optlen validation
before even calling xt_alloc_table_info() with the following
check:

if ((u64)optlen &lt; (u64)tmp.size + sizeof(tmp))
        return -EINVAL;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35962/">CVE-2024-35962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35962">CVE-2024-35962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224583">SUSE bug 1224583</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35963</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35963" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35963" ref_url="https://www.suse.com/security/cve/CVE-2024-35963" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sock: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-35963/">CVE-2024-35963 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35963">CVE-2024-35963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224582">SUSE bug 1224582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35964" ref_url="https://www.suse.com/security/cve/CVE-2024-35964" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35964/">CVE-2024-35964 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35964">CVE-2024-35964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224581">SUSE bug 1224581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35965" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35965" ref_url="https://www.suse.com/security/cve/CVE-2024-35965" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix not validating setsockopt user input

Check user input length before copying data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35965/">CVE-2024-35965 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35965">CVE-2024-35965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224579">SUSE bug 1224579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35966" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35966" ref_url="https://www.suse.com/security/cve/CVE-2024-35966" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: Fix not validating setsockopt user input

syzbot reported rfcomm_sock_setsockopt_old() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt_old
net/bluetooth/rfcomm/sock.c:632 [inline]
BUG: KASAN: slab-out-of-bounds in rfcomm_sock_setsockopt+0x893/0xa70
net/bluetooth/rfcomm/sock.c:673
Read of size 4 at addr ffff8880209a8bc3 by task syz-executor632/5064
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35966/">CVE-2024-35966 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35966">CVE-2024-35966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224576">SUSE bug 1224576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35967" ref_url="https://www.suse.com/security/cve/CVE-2024-35967" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix not validating setsockopt user input

syzbot reported sco_sock_setsockopt() is copying data without
checking user input length.

BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset
include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr
include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in sco_sock_setsockopt+0xc0b/0xf90
net/bluetooth/sco.c:893
Read of size 4 at addr ffff88805f7b15a3 by task syz-executor.5/12578
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35967/">CVE-2024-35967 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35967">CVE-2024-35967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224587">SUSE bug 1224587</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35969" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35969" ref_url="https://www.suse.com/security/cve/CVE-2024-35969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix race condition between ipv6_get_ifaddr and ipv6_del_addr

Although ipv6_get_ifaddr walks inet6_addr_lst under the RCU lock, it
still means hlist_for_each_entry_rcu can return an item that got removed
from the list. The memory itself of such item is not freed thanks to RCU
but nothing guarantees the actual content of the memory is sane.

In particular, the reference count can be zero. This can happen if
ipv6_del_addr is called in parallel. ipv6_del_addr removes the entry
from inet6_addr_lst (hlist_del_init_rcu(&amp;ifp-&gt;addr_lst)) and drops all
references (__in6_ifa_put(ifp) + in6_ifa_put(ifp)). With bad enough
timing, this can happen:

1. In ipv6_get_ifaddr, hlist_for_each_entry_rcu returns an entry.

2. Then, the whole ipv6_del_addr is executed for the given entry. The
   reference count drops to zero and kfree_rcu is scheduled.

3. ipv6_get_ifaddr continues and tries to increments the reference count
   (in6_ifa_hold).

4. The rcu is unlocked and the entry is freed.

5. The freed entry is returned.

Prevent increasing of the reference count in such case. The name
in6_ifa_hold_safe is chosen to mimic the existing fib6_info_hold_safe.

[   41.506330] refcount_t: addition on 0; use-after-free.
[   41.506760] WARNING: CPU: 0 PID: 595 at lib/refcount.c:25 refcount_warn_saturate+0xa5/0x130
[   41.507413] Modules linked in: veth bridge stp llc
[   41.507821] CPU: 0 PID: 595 Comm: python3 Not tainted 6.9.0-rc2.main-00208-g49563be82afa #14
[   41.508479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
[   41.509163] RIP: 0010:refcount_warn_saturate+0xa5/0x130
[   41.509586] Code: ad ff 90 0f 0b 90 90 c3 cc cc cc cc 80 3d c0 30 ad 01 00 75 a0 c6 05 b7 30 ad 01 01 90 48 c7 c7 38 cc 7a 8c e8 cc 18 ad ff 90 &lt;0f&gt; 0b 90 90 c3 cc cc cc cc 80 3d 98 30 ad 01 00 0f 85 75 ff ff ff
[   41.510956] RSP: 0018:ffffbda3c026baf0 EFLAGS: 00010282
[   41.511368] RAX: 0000000000000000 RBX: ffff9e9c46914800 RCX: 0000000000000000
[   41.511910] RDX: ffff9e9c7ec29c00 RSI: ffff9e9c7ec1c900 RDI: ffff9e9c7ec1c900
[   41.512445] RBP: ffff9e9c43660c9c R08: 0000000000009ffb R09: 00000000ffffdfff
[   41.512998] R10: 00000000ffffdfff R11: ffffffff8ca58a40 R12: ffff9e9c4339a000
[   41.513534] R13: 0000000000000001 R14: ffff9e9c438a0000 R15: ffffbda3c026bb48
[   41.514086] FS:  00007fbc4cda1740(0000) GS:ffff9e9c7ec00000(0000) knlGS:0000000000000000
[   41.514726] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   41.515176] CR2: 000056233b337d88 CR3: 000000000376e006 CR4: 0000000000370ef0
[   41.515713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   41.516252] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   41.516799] Call Trace:
[   41.517037]  &lt;TASK&gt;
[   41.517249]  ? __warn+0x7b/0x120
[   41.517535]  ? refcount_warn_saturate+0xa5/0x130
[   41.517923]  ? report_bug+0x164/0x190
[   41.518240]  ? handle_bug+0x3d/0x70
[   41.518541]  ? exc_invalid_op+0x17/0x70
[   41.520972]  ? asm_exc_invalid_op+0x1a/0x20
[   41.521325]  ? refcount_warn_saturate+0xa5/0x130
[   41.521708]  ipv6_get_ifaddr+0xda/0xe0
[   41.522035]  inet6_rtm_getaddr+0x342/0x3f0
[   41.522376]  ? __pfx_inet6_rtm_getaddr+0x10/0x10
[   41.522758]  rtnetlink_rcv_msg+0x334/0x3d0
[   41.523102]  ? netlink_unicast+0x30f/0x390
[   41.523445]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[   41.523832]  netlink_rcv_skb+0x53/0x100
[   41.524157]  netlink_unicast+0x23b/0x390
[   41.524484]  netlink_sendmsg+0x1f2/0x440
[   41.524826]  __sys_sendto+0x1d8/0x1f0
[   41.525145]  __x64_sys_sendto+0x1f/0x30
[   41.525467]  do_syscall_64+0xa5/0x1b0
[   41.525794]  entry_SYSCALL_64_after_hwframe+0x72/0x7a
[   41.526213] RIP: 0033:0x7fbc4cfcea9a
[   41.526528] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89
[   41.527942] RSP: 002b:00007f
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35969/">CVE-2024-35969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35969">CVE-2024-35969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224580">SUSE bug 1224580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35978" ref_url="https://www.suse.com/security/cve/CVE-2024-35978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix memory leak in hci_req_sync_complete()

In 'hci_req_sync_complete()', always free the previous sync
request state before assigning reference to a new one.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35978/">CVE-2024-35978 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-35978">CVE-2024-35978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224571">SUSE bug 1224571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202435989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-35989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-35989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-35989" ref_url="https://www.suse.com/security/cve/CVE-2024-35989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix oops during rmmod on single-CPU platforms

During the removal of the idxd driver, registered offline callback is
invoked as part of the clean up process. However, on systems with only
one CPU online, no valid target is available to migrate the
perf context, resulting in a kernel oops:

    BUG: unable to handle page fault for address: 000000000002a2b8
    #PF: supervisor write access in kernel mode
    #PF: error_code(0x0002) - not-present page
    PGD 1470e1067 P4D 0
    Oops: 0002 [#1] PREEMPT SMP NOPTI
    CPU: 0 PID: 20 Comm: cpuhp/0 Not tainted 6.8.0-rc6-dsa+ #57
    Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023
    RIP: 0010:mutex_lock+0x2e/0x50
    ...
    Call Trace:
    &lt;TASK&gt;
    __die+0x24/0x70
    page_fault_oops+0x82/0x160
    do_user_addr_fault+0x65/0x6b0
    __pfx___rdmsr_safe_on_cpu+0x10/0x10
    exc_page_fault+0x7d/0x170
    asm_exc_page_fault+0x26/0x30
    mutex_lock+0x2e/0x50
    mutex_lock+0x1e/0x50
    perf_pmu_migrate_context+0x87/0x1f0
    perf_event_cpu_offline+0x76/0x90 [idxd]
    cpuhp_invoke_callback+0xa2/0x4f0
    __pfx_perf_event_cpu_offline+0x10/0x10 [idxd]
    cpuhp_thread_fun+0x98/0x150
    smpboot_thread_fn+0x27/0x260
    smpboot_thread_fn+0x1af/0x260
    __pfx_smpboot_thread_fn+0x10/0x10
    kthread+0x103/0x140
    __pfx_kthread+0x10/0x10
    ret_from_fork+0x31/0x50
    __pfx_kthread+0x10/0x10
    ret_from_fork_asm+0x1b/0x30
    &lt;TASK&gt;

Fix the issue by preventing the migration of the perf context to an
invalid target.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-35989/">CVE-2024-35989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-35989">CVE-2024-35989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224558">SUSE bug 1224558</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36000</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36000" ref_url="https://www.suse.com/security/cve/CVE-2024-36000" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix missing hugetlb_lock for resv uncharge

There is a recent report on UFFDIO_COPY over hugetlb:

https://lore.kernel.org/all/000000000000ee06de0616177560@google.com/

350:	lockdep_assert_held(&amp;hugetlb_lock);

Should be an issue in hugetlb but triggered in an userfault context, where
it goes into the unlikely path where two threads modifying the resv map
together.  Mike has a fix in that path for resv uncharge but it looks like
the locking criteria was overlooked: hugetlb_cgroup_uncharge_folio_rsvd()
will update the cgroup pointer, so it requires to be called with the lock
held.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36000/">CVE-2024-36000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36000">CVE-2024-36000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224548">SUSE bug 1224548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36003</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36003" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36003" ref_url="https://www.suse.com/security/cve/CVE-2024-36003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix LAG and VF lock dependency in ice_reset_vf()

9f74a3dfcf83 ("ice: Fix VF Reset paths when interface in a failed over
aggregate"), the ice driver has acquired the LAG mutex in ice_reset_vf().
The commit placed this lock acquisition just prior to the acquisition of
the VF configuration lock.

If ice_reset_vf() acquires the configuration lock via the ICE_VF_RESET_LOCK
flag, this could deadlock with ice_vc_cfg_qs_msg() because it always
acquires the locks in the order of the VF configuration lock and then the
LAG mutex.

Lockdep reports this violation almost immediately on creating and then
removing 2 VF:

======================================================
WARNING: possible circular locking dependency detected
6.8.0-rc6 #54 Tainted: G        W  O
------------------------------------------------------
kworker/60:3/6771 is trying to acquire lock:
ff40d43e099380a0 (&amp;vf-&gt;cfg_lock){+.+.}-{3:3}, at: ice_reset_vf+0x22f/0x4d0 [ice]

but task is already holding lock:
ff40d43ea1961210 (&amp;pf-&gt;lag_mutex){+.+.}-{3:3}, at: ice_reset_vf+0xb7/0x4d0 [ice]

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #1 (&amp;pf-&gt;lag_mutex){+.+.}-{3:3}:
       __lock_acquire+0x4f8/0xb40
       lock_acquire+0xd4/0x2d0
       __mutex_lock+0x9b/0xbf0
       ice_vc_cfg_qs_msg+0x45/0x690 [ice]
       ice_vc_process_vf_msg+0x4f5/0x870 [ice]
       __ice_clean_ctrlq+0x2b5/0x600 [ice]
       ice_service_task+0x2c9/0x480 [ice]
       process_one_work+0x1e9/0x4d0
       worker_thread+0x1e1/0x3d0
       kthread+0x104/0x140
       ret_from_fork+0x31/0x50
       ret_from_fork_asm+0x1b/0x30

-&gt; #0 (&amp;vf-&gt;cfg_lock){+.+.}-{3:3}:
       check_prev_add+0xe2/0xc50
       validate_chain+0x558/0x800
       __lock_acquire+0x4f8/0xb40
       lock_acquire+0xd4/0x2d0
       __mutex_lock+0x9b/0xbf0
       ice_reset_vf+0x22f/0x4d0 [ice]
       ice_process_vflr_event+0x98/0xd0 [ice]
       ice_service_task+0x1cc/0x480 [ice]
       process_one_work+0x1e9/0x4d0
       worker_thread+0x1e1/0x3d0
       kthread+0x104/0x140
       ret_from_fork+0x31/0x50
       ret_from_fork_asm+0x1b/0x30

other info that might help us debug this:
 Possible unsafe locking scenario:
       CPU0                    CPU1
       ----                    ----
  lock(&amp;pf-&gt;lag_mutex);
                               lock(&amp;vf-&gt;cfg_lock);
                               lock(&amp;pf-&gt;lag_mutex);
  lock(&amp;vf-&gt;cfg_lock);

 *** DEADLOCK ***
4 locks held by kworker/60:3/6771:
 #0: ff40d43e05428b38 ((wq_completion)ice){+.+.}-{0:0}, at: process_one_work+0x176/0x4d0
 #1: ff50d06e05197e58 ((work_completion)(&amp;pf-&gt;serv_task)){+.+.}-{0:0}, at: process_one_work+0x176/0x4d0
 #2: ff40d43ea1960e50 (&amp;pf-&gt;vfs.table_lock){+.+.}-{3:3}, at: ice_process_vflr_event+0x48/0xd0 [ice]
 #3: ff40d43ea1961210 (&amp;pf-&gt;lag_mutex){+.+.}-{3:3}, at: ice_reset_vf+0xb7/0x4d0 [ice]

stack backtrace:
CPU: 60 PID: 6771 Comm: kworker/60:3 Tainted: G        W  O       6.8.0-rc6 #54
Hardware name:
Workqueue: ice ice_service_task [ice]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x4a/0x80
 check_noncircular+0x12d/0x150
 check_prev_add+0xe2/0xc50
 ? save_trace+0x59/0x230
 ? add_chain_cache+0x109/0x450
 validate_chain+0x558/0x800
 __lock_acquire+0x4f8/0xb40
 ? lockdep_hardirqs_on+0x7d/0x100
 lock_acquire+0xd4/0x2d0
 ? ice_reset_vf+0x22f/0x4d0 [ice]
 ? lock_is_held_type+0xc7/0x120
 __mutex_lock+0x9b/0xbf0
 ? ice_reset_vf+0x22f/0x4d0 [ice]
 ? ice_reset_vf+0x22f/0x4d0 [ice]
 ? rcu_is_watching+0x11/0x50
 ? ice_reset_vf+0x22f/0x4d0 [ice]
 ice_reset_vf+0x22f/0x4d0 [ice]
 ? process_one_work+0x176/0x4d0
 ice_process_vflr_event+0x98/0xd0 [ice]
 ice_service_task+0x1cc/0x480 [ice]
 process_one_work+0x1e9/0x4d0
 worker_thread+0x1e1/0x3d0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x104/0x140
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x31/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

To avoid deadlock, we must acquire the LAG 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36003/">CVE-2024-36003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36003">CVE-2024-36003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224544">SUSE bug 1224544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36005" ref_url="https://www.suse.com/security/cve/CVE-2024-36005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: honor table dormant flag from netdev release event path

Check for table dormant flag otherwise netdev release event path tries
to unregister an already unregistered hook.

[524854.857999] ------------[ cut here ]------------
[524854.858010] WARNING: CPU: 0 PID: 3386599 at net/netfilter/core.c:501 __nf_unregister_net_hook+0x21a/0x260
[...]
[524854.858848] CPU: 0 PID: 3386599 Comm: kworker/u32:2 Not tainted 6.9.0-rc3+ #365
[524854.858869] Workqueue: netns cleanup_net
[524854.858886] RIP: 0010:__nf_unregister_net_hook+0x21a/0x260
[524854.858903] Code: 24 e8 aa 73 83 ff 48 63 43 1c 83 f8 01 0f 85 3d ff ff ff e8 98 d1 f0 ff 48 8b 3c 24 e8 8f 73 83 ff 48 63 43 1c e9 26 ff ff ff &lt;0f&gt; 0b 48 83 c4 18 48 c7 c7 00 68 e9 82 5b 5d 41 5c 41 5d 41 5e 41
[524854.858914] RSP: 0018:ffff8881e36d79e0 EFLAGS: 00010246
[524854.858926] RAX: 0000000000000000 RBX: ffff8881339ae790 RCX: ffffffff81ba524a
[524854.858936] RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff8881c8a16438
[524854.858945] RBP: ffff8881c8a16438 R08: 0000000000000001 R09: ffffed103c6daf34
[524854.858954] R10: ffff8881e36d79a7 R11: 0000000000000000 R12: 0000000000000005
[524854.858962] R13: ffff8881c8a16000 R14: 0000000000000000 R15: ffff8881351b5a00
[524854.858971] FS:  0000000000000000(0000) GS:ffff888390800000(0000) knlGS:0000000000000000
[524854.858982] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[524854.858991] CR2: 00007fc9be0f16f4 CR3: 00000001437cc004 CR4: 00000000001706f0
[524854.859000] Call Trace:
[524854.859006]  &lt;TASK&gt;
[524854.859013]  ? __warn+0x9f/0x1a0
[524854.859027]  ? __nf_unregister_net_hook+0x21a/0x260
[524854.859044]  ? report_bug+0x1b1/0x1e0
[524854.859060]  ? handle_bug+0x3c/0x70
[524854.859071]  ? exc_invalid_op+0x17/0x40
[524854.859083]  ? asm_exc_invalid_op+0x1a/0x20
[524854.859100]  ? __nf_unregister_net_hook+0x6a/0x260
[524854.859116]  ? __nf_unregister_net_hook+0x21a/0x260
[524854.859135]  nf_tables_netdev_event+0x337/0x390 [nf_tables]
[524854.859304]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]
[524854.859461]  ? packet_notifier+0xb3/0x360
[524854.859476]  ? _raw_spin_unlock_irqrestore+0x11/0x40
[524854.859489]  ? dcbnl_netdevice_event+0x35/0x140
[524854.859507]  ? __pfx_nf_tables_netdev_event+0x10/0x10 [nf_tables]
[524854.859661]  notifier_call_chain+0x7d/0x140
[524854.859677]  unregister_netdevice_many_notify+0x5e1/0xae0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36005/">CVE-2024-36005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36005">CVE-2024-36005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224539">SUSE bug 1224539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36011" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36011" ref_url="https://www.suse.com/security/cve/CVE-2024-36011" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: HCI: Fix potential null-ptr-deref

Fix potential null-ptr-deref in hci_le_big_sync_established_evt().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36011/">CVE-2024-36011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36011">CVE-2024-36011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225579">SUSE bug 1225579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36012" ref_url="https://www.suse.com/security/cve/CVE-2024-36012" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: msft: fix slab-use-after-free in msft_do_close()

Tying the msft-&gt;data lifetime to hdev by freeing it in
hci_release_dev() to fix the following case:

[use]
msft_do_close()
  msft = hdev-&gt;msft_data;
  if (!msft)                      ...(1) &lt;- passed.
    return;
  mutex_lock(&amp;msft-&gt;filter_lock); ...(4) &lt;- used after freed.

[free]
msft_unregister()
  msft = hdev-&gt;msft_data;
  hdev-&gt;msft_data = NULL;         ...(2)
  kfree(msft);                    ...(3) &lt;- msft is freed.

==================================================================
BUG: KASAN: slab-use-after-free in __mutex_lock_common
kernel/locking/mutex.c:587 [inline]
BUG: KASAN: slab-use-after-free in __mutex_lock+0x8f/0xc30
kernel/locking/mutex.c:752
Read of size 8 at addr ffff888106cbbca8 by task kworker/u5:2/309
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36012/">CVE-2024-36012 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36012">CVE-2024-36012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225502">SUSE bug 1225502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36013" ref_url="https://www.suse.com/security/cve/CVE-2024-36013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix slab-use-after-free in l2cap_connect()

Extend a critical section to prevent chan from early freeing.
Also make the l2cap_connect() return type void. Nothing is using the
returned value but it is ugly to return a potentially freed pointer.
Making it void will help with backports because earlier kernels did use
the return value. Now the compile will break for kernels where this
patch is not a complete fix.

Call stack summary:

[use]
l2cap_bredr_sig_cmd
  l2cap_connect
    mutex_lock(&amp;conn-&gt;chan_lock);
  | chan = pchan-&gt;ops-&gt;new_connection(pchan); &lt;- alloc chan
  | __l2cap_chan_add(conn, chan);
  |   l2cap_chan_hold(chan);
  |   list_add(&amp;chan-&gt;list, &amp;conn-&gt;chan_l);   ... (1)
    mutex_unlock(&amp;conn-&gt;chan_lock);
    chan-&gt;conf_state              ... (4) &lt;- use after free

[free]
l2cap_conn_del
  mutex_lock(&amp;conn-&gt;chan_lock);
| foreach chan in conn-&gt;chan_l:            ... (2)
|   l2cap_chan_put(chan);
|     l2cap_chan_destroy
|       kfree(chan)               ... (3) &lt;- chan freed
  mutex_unlock(&amp;conn-&gt;chan_lock);

==================================================================
BUG: KASAN: slab-use-after-free in instrument_atomic_read
include/linux/instrumented.h:68 [inline]
BUG: KASAN: slab-use-after-free in _test_bit
include/asm-generic/bitops/instrumented-non-atomic.h:141 [inline]
BUG: KASAN: slab-use-after-free in l2cap_connect+0xa67/0x11a0
net/bluetooth/l2cap_core.c:4260
Read of size 8 at addr ffff88810bf040a0 by task kworker/u3:1/311
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36013/">CVE-2024-36013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36013">CVE-2024-36013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225578">SUSE bug 1225578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36016" ref_url="https://www.suse.com/security/cve/CVE-2024-36016" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: fix possible out-of-bounds in gsm0_receive()

Assuming the following:
- side A configures the n_gsm in basic option mode
- side B sends the header of a basic option mode frame with data length 1
- side A switches to advanced option mode
- side B sends 2 data bytes which exceeds gsm-&gt;len
  Reason: gsm-&gt;len is not used in advanced option mode.
- side A switches to basic option mode
- side B keeps sending until gsm0_receive() writes past gsm-&gt;buf
  Reason: Neither gsm-&gt;state nor gsm-&gt;len have been reset after
  reconfiguration.

Fix this by changing gsm-&gt;count to gsm-&gt;len comparison from equal to less
than. Also add upper limit checks against the constant MAX_MRU in
gsm0_receive() and gsm1_receive() to harden against memory corruption of
gsm-&gt;len and gsm-&gt;mru.

All other checks remain as we still need to limit the data according to the
user configuration and actual payload size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36016/">CVE-2024-36016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36016">CVE-2024-36016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225642">SUSE bug 1225642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36017</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36017" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36017" ref_url="https://www.suse.com/security/cve/CVE-2024-36017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation

Each attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a
struct ifla_vf_vlan_info so the size of such attribute needs to be at least
of sizeof(struct ifla_vf_vlan_info) which is 14 bytes.
The current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)
which is less than sizeof(struct ifla_vf_vlan_info) so this validation
is not enough and a too small attribute might be cast to a
struct ifla_vf_vlan_info, this might result in an out of bands
read access when accessing the saved (casted) entry in ivvl.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36017/">CVE-2024-36017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36017">CVE-2024-36017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225681">SUSE bug 1225681</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36019" ref_url="https://www.suse.com/security/cve/CVE-2024-36019" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: maple: Fix cache corruption in regcache_maple_drop()

When keeping the upper end of a cache block entry, the entry[] array
must be indexed by the offset from the base register of the block,
i.e. max - mas.index.

The code was indexing entry[] by only the register address, leading
to an out-of-bounds access that copied some part of the kernel
memory over the cache contents.

This bug was not detected by the regmap KUnit test because it only
tests with a block of registers starting at 0, so mas.index == 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36019/">CVE-2024-36019 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36019">CVE-2024-36019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225695">SUSE bug 1225695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36020" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36020" ref_url="https://www.suse.com/security/cve/CVE-2024-36020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix vf may be used uninitialized in this function warning

To fix the regression introduced by commit 52424f974bc5, which causes
servers hang in very hard to reproduce conditions with resets races.
Using two sources for the information is the root cause.
In this function before the fix bumping v didn't mean bumping vf
pointer. But the code used this variables interchangeably, so stale vf
could point to different/not intended vf.

Remove redundant "v" variable and iterate via single VF pointer across
whole function instead to guarantee VF pointer validity.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36020/">CVE-2024-36020 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36020">CVE-2024-36020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225698">SUSE bug 1225698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36025</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36025" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36025" ref_url="https://www.suse.com/security/cve/CVE-2024-36025" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix off by one in qla_edif_app_getstats()

The app_reply-&gt;elem[] array is allocated earlier in this function and it
has app_req.num_ports elements.  Thus this &gt; comparison needs to be &gt;= to
prevent memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36025/">CVE-2024-36025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36025">CVE-2024-36025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225704">SUSE bug 1225704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36039" ref_url="https://www.suse.com/security/cve/CVE-2024-36039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000518.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9194" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1925-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018656.html" source="SUSE-SU"/>
    <description>
    PyMySQL through 1.1.0 allows SQL injection if used with untrusted JSON input because keys are not escaped by escape_dict.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36039/">CVE-2024-36039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36039">CVE-2024-36039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225070">SUSE bug 1225070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953678" comment="python3.11-PyMySQL-1.0.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953679" comment="python3.11-PyMySQL+rsa-1.0.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953676" comment="python3.12-PyMySQL-1.1.0-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953677" comment="python3.12-PyMySQL+rsa-1.1.0-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36137</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36137" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36137" ref_url="https://www.suse.com/security/cve/CVE-2024-36137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2574-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036101.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14435-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OWCPL7VTEVIGUDVKLEV2D2ITNTWKC4AZ/" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used.

Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-27"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36137/">CVE-2024-36137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36137">CVE-2024-36137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227561">SUSE bug 1227561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881076" comment="nodejs-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881077" comment="nodejs-devel-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881078" comment="nodejs-docs-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881079" comment="nodejs-full-i18n-20.16.0-1.module+el9.4.0+22197+9e60f127 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853721" comment="nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853722" comment="nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009853723" comment="nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881080" comment="npm-10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36244" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36244" ref_url="https://www.suse.com/security/cve/CVE-2024-36244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: extend minimum interval restriction to entire cycle too

It is possible for syzbot to side-step the restriction imposed by the
blamed commit in the Fixes: tag, because the taprio UAPI permits a
cycle-time different from (and potentially shorter than) the sum of
entry intervals.

We need one more restriction, which is that the cycle time itself must
be larger than N * ETH_ZLEN bit times, where N is the number of schedule
entries. This restriction needs to apply regardless of whether the cycle
time came from the user or was the implicit, auto-calculated value, so
we move the existing "cycle == 0" check outside the "if "(!new-&gt;cycle_time)"
branch. This way covers both conditions and scenarios.

Add a selftest which illustrates the issue triggered by syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36244/">CVE-2024-36244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36244">CVE-2024-36244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226797">SUSE bug 1226797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36270</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36270" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36270" ref_url="https://www.suse.com/security/cve/CVE-2024-36270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: tproxy: bail out if IP has been disabled on the device

syzbot reports:
general protection fault, probably for non-canonical address 0xdffffc0000000003: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
[..]
RIP: 0010:nf_tproxy_laddr4+0xb7/0x340 net/ipv4/netfilter/nf_tproxy_ipv4.c:62
Call Trace:
 nft_tproxy_eval_v4 net/netfilter/nft_tproxy.c:56 [inline]
 nft_tproxy_eval+0xa9a/0x1a00 net/netfilter/nft_tproxy.c:168

__in_dev_get_rcu() can return NULL, so check for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36270/">CVE-2024-36270 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36270">CVE-2024-36270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226798">SUSE bug 1226798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36350</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36350" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36350" ref_url="https://www.suse.com/security/cve/CVE-2024-36350" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-36350/">CVE-2024-36350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36350">CVE-2024-36350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238896">SUSE bug 1238896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053912" comment="iwl100-firmware-39.31.5.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053913" comment="iwl1000-firmware-39.31.5.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053914" comment="iwl105-firmware-18.168.6.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053915" comment="iwl135-firmware-18.168.6.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053916" comment="iwl2000-firmware-18.168.6.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053917" comment="iwl2030-firmware-18.168.6.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053918" comment="iwl3160-firmware-25.30.13.0-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053919" comment="iwl5000-firmware-8.83.5.1_1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053920" comment="iwl5150-firmware-8.24.2.2-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053921" comment="iwl6000g2a-firmware-18.168.6.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053922" comment="iwl6000g2b-firmware-18.168.6.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053923" comment="iwl6050-firmware-41.28.5.1-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053924" comment="iwl7260-firmware-25.30.13.0-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025630" comment="kernel-rt-debug-kvm-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025635" comment="kernel-rt-kvm-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053925" comment="libertas-sd8787-firmware-20250716-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053926" comment="linux-firmware-20250716-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053927" comment="linux-firmware-whence-20250716-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053928" comment="netronome-firmware-20250716-151.3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36357</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36357" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36357" ref_url="https://www.suse.com/security/cve/CVE-2024-36357" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-36357/">CVE-2024-36357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36357">CVE-2024-36357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238896">SUSE bug 1238896</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053929" comment="iwl100-firmware-39.31.5.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053930" comment="iwl1000-firmware-39.31.5.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053931" comment="iwl105-firmware-18.168.6.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053932" comment="iwl135-firmware-18.168.6.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053933" comment="iwl2000-firmware-18.168.6.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053934" comment="iwl2030-firmware-18.168.6.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053935" comment="iwl3160-firmware-25.30.13.0-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053936" comment="iwl5000-firmware-8.83.5.1_1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053937" comment="iwl5150-firmware-8.24.2.2-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053938" comment="iwl6000g2a-firmware-18.168.6.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053939" comment="iwl6000g2b-firmware-18.168.6.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053940" comment="iwl6050-firmware-41.28.5.1-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053941" comment="iwl7260-firmware-25.30.13.0-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025630" comment="kernel-rt-debug-kvm-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025635" comment="kernel-rt-kvm-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053942" comment="libertas-sd8787-firmware-20250812-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053943" comment="linux-firmware-20250812-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053944" comment="linux-firmware-whence-20250812-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053945" comment="netronome-firmware-20250812-151.4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36387" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36387" ref_url="https://www.suse.com/security/cve/CVE-2024-36387" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8680" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2597-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036107.html" source="SUSE-SU"/>
    <description>
    Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-01"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36387/">CVE-2024-36387 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36387">CVE-2024-36387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227272">SUSE bug 1227272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950377" comment="mod_http2-2.0.26-2.el9_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36472" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36472" ref_url="https://www.suse.com/security/cve/CVE-2024-36472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9114" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2576-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019053.html" source="SUSE-SU"/>
    <description>
    In GNOME Shell through 45.7, a portal helper can be launched automatically (without user confirmation) based on network responses provided by an adversary (e.g., an adversary who controls the local Wi-Fi network), and subsequently loads untrusted JavaScript code, which may lead to resource consumption or other impacts depending on the JavaScript code's behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36472/">CVE-2024-36472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-36472">CVE-2024-36472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225567">SUSE bug 1225567</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953549" comment="gnome-classic-session-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953550" comment="gnome-shell-40.10-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953551" comment="gnome-shell-extension-apps-menu-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953552" comment="gnome-shell-extension-auto-move-windows-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953553" comment="gnome-shell-extension-classification-banner-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953554" comment="gnome-shell-extension-common-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953555" comment="gnome-shell-extension-custom-menu-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953556" comment="gnome-shell-extension-dash-to-dock-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953557" comment="gnome-shell-extension-dash-to-panel-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953558" comment="gnome-shell-extension-desktop-icons-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953559" comment="gnome-shell-extension-drive-menu-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953560" comment="gnome-shell-extension-gesture-inhibitor-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953561" comment="gnome-shell-extension-heads-up-display-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953562" comment="gnome-shell-extension-launch-new-instance-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953563" comment="gnome-shell-extension-native-window-placement-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953564" comment="gnome-shell-extension-panel-favorites-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953565" comment="gnome-shell-extension-places-menu-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953566" comment="gnome-shell-extension-screenshot-window-sizer-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953567" comment="gnome-shell-extension-systemMonitor-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953568" comment="gnome-shell-extension-top-icons-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953569" comment="gnome-shell-extension-updates-dialog-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953570" comment="gnome-shell-extension-user-theme-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953571" comment="gnome-shell-extension-window-list-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953572" comment="gnome-shell-extension-windowsNavigator-40.7-19.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953573" comment="gnome-shell-extension-workspace-indicator-40.7-19.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36489</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36489" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36489" ref_url="https://www.suse.com/security/cve/CVE-2024-36489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix missing memory barrier in tls_init

In tls_init(), a write memory barrier is missing, and store-store
reordering may cause NULL dereference in tls_{setsockopt,getsockopt}.

CPU0                               CPU1
-----                              -----
// In tls_init()
// In tls_ctx_create()
ctx = kzalloc()
ctx-&gt;sk_proto = READ_ONCE(sk-&gt;sk_prot) -(1)

// In update_sk_prot()
WRITE_ONCE(sk-&gt;sk_prot, tls_prots)     -(2)

                                   // In sock_common_setsockopt()
                                   READ_ONCE(sk-&gt;sk_prot)-&gt;setsockopt()

                                   // In tls_{setsockopt,getsockopt}()
                                   ctx-&gt;sk_proto-&gt;setsockopt()    -(3)

In the above scenario, when (1) and (2) are reordered, (3) can observe
the NULL value of ctx-&gt;sk_proto, causing NULL dereference.

To fix it, we rely on rcu_assign_pointer() which implies the release
barrier semantic. By moving rcu_assign_pointer() after ctx-&gt;sk_proto is
initialized, we can ensure that ctx-&gt;sk_proto are visible when
changing sk-&gt;sk_prot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36489/">CVE-2024-36489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36489">CVE-2024-36489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226874">SUSE bug 1226874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3651</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3651" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3651" ref_url="https://www.suse.com/security/cve/CVE-2024-3651" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8365" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1439-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1939-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
    <description>
    A vulnerability was identified in the kjd/idna library, specifically within the `idna.encode()` function, affecting version 3.6. The issue arises from the function's handling of crafted input strings, which can lead to quadratic complexity and consequently, a denial of service condition. This vulnerability is triggered by a crafted input that causes the `idna.encode()` function to process the input with considerable computational load, significantly increasing the processing time in a quadratic manner relative to the input size.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3651/">CVE-2024-3651 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3651">CVE-2024-3651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222842">SUSE bug 1222842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867068" comment="python3-idna-2.10-7.el9_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3652" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3652" ref_url="https://www.suse.com/security/cve/CVE-2024-3652" source="SUSE CVE"/>
    <description>
    The Libreswan Project was notified of an issue causing libreswan to restart when using IKEv1 without specifying an esp= line. When the peer requests AES-GMAC, libreswan's default proposal handler causes an assertion failure and crashes and restarts. IKEv2 connections are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3652/">CVE-2024-3652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3652">CVE-2024-3652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222661">SUSE bug 1222661</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869938" comment="libreswan-4.12-2.el9_4.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3657</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3657" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3657" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3657" ref_url="https://www.suse.com/security/cve/CVE-2024-3657" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019745.html" source="SUSE-SU"/>
    <description>
    A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-16"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-3657/">CVE-2024-3657 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3657">CVE-2024-3657 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225512">SUSE bug 1225512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009867065" comment="389-ds-base-2.4.5-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867066" comment="389-ds-base-libs-2.4.5-8.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009867067" comment="python3-lib389-2.4.5-8.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3661" ref_url="https://www.suse.com/security/cve/CVE-2024-3661" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0288" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000755.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000766.html" source="SUSE-SU"/>
    <description>
    DHCP can add routes to a client's routing table via the classless static route option (121). VPN-based security solutions that rely on routes to redirect traffic can be forced to leak traffic over the physical interface. An attacker on the same local network can read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-22"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-3661/">CVE-2024-3661 at SUSE</cve>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3661">CVE-2024-3661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224052">SUSE bug 1224052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960792" comment="NetworkManager-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960793" comment="NetworkManager-adsl-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960794" comment="NetworkManager-bluetooth-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960795" comment="NetworkManager-cloud-setup-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960796" comment="NetworkManager-config-connectivity-suse-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960797" comment="NetworkManager-config-server-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960798" comment="NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960799" comment="NetworkManager-initscripts-updown-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960800" comment="NetworkManager-libnm-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960801" comment="NetworkManager-libnm-devel-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960802" comment="NetworkManager-ovs-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960803" comment="NetworkManager-ppp-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960804" comment="NetworkManager-team-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960805" comment="NetworkManager-tui-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960806" comment="NetworkManager-wifi-1.48.10-5.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960807" comment="NetworkManager-wwan-1.48.10-5.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36880" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36880" ref_url="https://www.suse.com/security/cve/CVE-2024-36880" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: qca: add missing firmware sanity checks

Add the missing sanity checks when parsing the firmware files before
downloading them to avoid accessing and corrupting memory beyond the
vmalloced buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-36880/">CVE-2024-36880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36880">CVE-2024-36880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225722">SUSE bug 1225722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36883" ref_url="https://www.suse.com/security/cve/CVE-2024-36883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix out-of-bounds access in ops_init

net_alloc_generic is called by net_alloc, which is called without any
locking. It reads max_gen_ptrs, which is changed under pernet_ops_rwsem. It
is read twice, first to allocate an array, then to set s.len, which is
later used to limit the bounds of the array access.

It is possible that the array is allocated and another thread is
registering a new pernet ops, increments max_gen_ptrs, which is then used
to set s.len with a larger than allocated length for the variable array.

Fix it by reading max_gen_ptrs only once in net_alloc_generic. If
max_gen_ptrs is later incremented, it will be caught in net_assign_generic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36883/">CVE-2024-36883 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36883">CVE-2024-36883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225725">SUSE bug 1225725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36886</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36886" ref_url="https://www.suse.com/security/cve/CVE-2024-36886" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix UAF in error path

Sam Page (sam4k) working with Trend Micro Zero Day Initiative reported
a UAF in the tipc_buf_append() error path:

BUG: KASAN: slab-use-after-free in kfree_skb_list_reason+0x47e/0x4c0
linux/net/core/skbuff.c:1183
Read of size 8 at addr ffff88804d2a7c80 by task poc/8034

CPU: 1 PID: 8034 Comm: poc Not tainted 6.8.2 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.0-debian-1.16.0-5 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 __dump_stack linux/lib/dump_stack.c:88
 dump_stack_lvl+0xd9/0x1b0 linux/lib/dump_stack.c:106
 print_address_description linux/mm/kasan/report.c:377
 print_report+0xc4/0x620 linux/mm/kasan/report.c:488
 kasan_report+0xda/0x110 linux/mm/kasan/report.c:601
 kfree_skb_list_reason+0x47e/0x4c0 linux/net/core/skbuff.c:1183
 skb_release_data+0x5af/0x880 linux/net/core/skbuff.c:1026
 skb_release_all linux/net/core/skbuff.c:1094
 __kfree_skb linux/net/core/skbuff.c:1108
 kfree_skb_reason+0x12d/0x210 linux/net/core/skbuff.c:1144
 kfree_skb linux/./include/linux/skbuff.h:1244
 tipc_buf_append+0x425/0xb50 linux/net/tipc/msg.c:186
 tipc_link_input+0x224/0x7c0 linux/net/tipc/link.c:1324
 tipc_link_rcv+0x76e/0x2d70 linux/net/tipc/link.c:1824
 tipc_rcv+0x45f/0x10f0 linux/net/tipc/node.c:2159
 tipc_udp_recv+0x73b/0x8f0 linux/net/tipc/udp_media.c:390
 udp_queue_rcv_one_skb+0xad2/0x1850 linux/net/ipv4/udp.c:2108
 udp_queue_rcv_skb+0x131/0xb00 linux/net/ipv4/udp.c:2186
 udp_unicast_rcv_skb+0x165/0x3b0 linux/net/ipv4/udp.c:2346
 __udp4_lib_rcv+0x2594/0x3400 linux/net/ipv4/udp.c:2422
 ip_protocol_deliver_rcu+0x30c/0x4e0 linux/net/ipv4/ip_input.c:205
 ip_local_deliver_finish+0x2e4/0x520 linux/net/ipv4/ip_input.c:233
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_local_deliver+0x18e/0x1f0 linux/net/ipv4/ip_input.c:254
 dst_input linux/./include/net/dst.h:461
 ip_rcv_finish linux/net/ipv4/ip_input.c:449
 NF_HOOK linux/./include/linux/netfilter.h:314
 NF_HOOK linux/./include/linux/netfilter.h:308
 ip_rcv+0x2c5/0x5d0 linux/net/ipv4/ip_input.c:569
 __netif_receive_skb_one_core+0x199/0x1e0 linux/net/core/dev.c:5534
 __netif_receive_skb+0x1f/0x1c0 linux/net/core/dev.c:5648
 process_backlog+0x101/0x6b0 linux/net/core/dev.c:5976
 __napi_poll.constprop.0+0xba/0x550 linux/net/core/dev.c:6576
 napi_poll linux/net/core/dev.c:6645
 net_rx_action+0x95a/0xe90 linux/net/core/dev.c:6781
 __do_softirq+0x21f/0x8e7 linux/kernel/softirq.c:553
 do_softirq linux/kernel/softirq.c:454
 do_softirq+0xb2/0xf0 linux/kernel/softirq.c:441
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip+0x100/0x120 linux/kernel/softirq.c:381
 local_bh_enable linux/./include/linux/bottom_half.h:33
 rcu_read_unlock_bh linux/./include/linux/rcupdate.h:851
 __dev_queue_xmit+0x871/0x3ee0 linux/net/core/dev.c:4378
 dev_queue_xmit linux/./include/linux/netdevice.h:3169
 neigh_hh_output linux/./include/net/neighbour.h:526
 neigh_output linux/./include/net/neighbour.h:540
 ip_finish_output2+0x169f/0x2550 linux/net/ipv4/ip_output.c:235
 __ip_finish_output linux/net/ipv4/ip_output.c:313
 __ip_finish_output+0x49e/0x950 linux/net/ipv4/ip_output.c:295
 ip_finish_output+0x31/0x310 linux/net/ipv4/ip_output.c:323
 NF_HOOK_COND linux/./include/linux/netfilter.h:303
 ip_output+0x13b/0x2a0 linux/net/ipv4/ip_output.c:433
 dst_output linux/./include/net/dst.h:451
 ip_local_out linux/net/ipv4/ip_output.c:129
 ip_send_skb+0x3e5/0x560 linux/net/ipv4/ip_output.c:1492
 udp_send_skb+0x73f/0x1530 linux/net/ipv4/udp.c:963
 udp_sendmsg+0x1a36/0x2b40 linux/net/ipv4/udp.c:1250
 inet_sendmsg+0x105/0x140 linux/net/ipv4/af_inet.c:850
 sock_sendmsg_nosec linux/net/socket.c:730
 __sock_sendmsg linux/net/socket.c:745
 __sys_sendto+0x42c/0x4e0 linux/net/socket.c:2191
 __do_sys_sendto linux/net/socket.c:2203
 __se_sys_sendto linux/net/socket.c:2199
 __x64_sys_sendto+0xe0/0x1c0 linux/net/socket.c:2199
 do_syscall_x64 linux/arch/x86/entry/common.c:52
 do_syscall_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36886/">CVE-2024-36886 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36886">CVE-2024-36886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225730">SUSE bug 1225730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36889</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36889" ref_url="https://www.suse.com/security/cve/CVE-2024-36889" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure snd_nxt is properly initialized on connect

Christoph reported a splat hinting at a corrupted snd_una:

  WARNING: CPU: 1 PID: 38 at net/mptcp/protocol.c:1005 __mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005
  Modules linked in:
  CPU: 1 PID: 38 Comm: kworker/1:1 Not tainted 6.9.0-rc1-gbbeac67456c9 #59
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.11.0-2.el7 04/01/2014
  Workqueue: events mptcp_worker
  RIP: 0010:__mptcp_clean_una+0x4b3/0x620 net/mptcp/protocol.c:1005
  Code: be 06 01 00 00 bf 06 01 00 00 e8 a8 12 e7 fe e9 00 fe ff ff e8
  	8e 1a e7 fe 0f b7 ab 3e 02 00 00 e9 d3 fd ff ff e8 7d 1a e7 fe
  	&lt;0f&gt; 0b 4c 8b bb e0 05 00 00 e9 74 fc ff ff e8 6a 1a e7 fe 0f 0b e9
  RSP: 0018:ffffc9000013fd48 EFLAGS: 00010293
  RAX: 0000000000000000 RBX: ffff8881029bd280 RCX: ffffffff82382fe4
  RDX: ffff8881003cbd00 RSI: ffffffff823833c3 RDI: 0000000000000001
  RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
  R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888138ba8000
  R13: 0000000000000106 R14: ffff8881029bd908 R15: ffff888126560000
  FS:  0000000000000000(0000) GS:ffff88813bd00000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f604a5dae38 CR3: 0000000101dac002 CR4: 0000000000170ef0
  Call Trace:
   &lt;TASK&gt;
   __mptcp_clean_una_wakeup net/mptcp/protocol.c:1055 [inline]
   mptcp_clean_una_wakeup net/mptcp/protocol.c:1062 [inline]
   __mptcp_retrans+0x7f/0x7e0 net/mptcp/protocol.c:2615
   mptcp_worker+0x434/0x740 net/mptcp/protocol.c:2767
   process_one_work+0x1e0/0x560 kernel/workqueue.c:3254
   process_scheduled_works kernel/workqueue.c:3335 [inline]
   worker_thread+0x3c7/0x640 kernel/workqueue.c:3416
   kthread+0x121/0x170 kernel/kthread.c:388
   ret_from_fork+0x44/0x50 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
   &lt;/TASK&gt;

When fallback to TCP happens early on a client socket, snd_nxt
is not yet initialized and any incoming ack will copy such value
into snd_una. If the mptcp worker (dumbly) tries mptcp-level
re-injection after such ack, that would unconditionally trigger a send
buffer cleanup using 'bad' snd_una values.

We could easily disable re-injection for fallback sockets, but such
dumb behavior already helped catching a few subtle issues and a very
low to zero impact in practice.

Instead address the issue always initializing snd_nxt (and write_seq,
for consistency) at connect time.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-36889/">CVE-2024-36889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36889">CVE-2024-36889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225746">SUSE bug 1225746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36899</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36899" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36899" ref_url="https://www.suse.com/security/cve/CVE-2024-36899" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: cdev: Fix use after free in lineinfo_changed_notify

The use-after-free issue occurs as follows: when the GPIO chip device file
is being closed by invoking gpio_chrdev_release(), watched_lines is freed
by bitmap_free(), but the unregistration of lineinfo_changed_nb notifier
chain failed due to waiting write rwsem. Additionally, one of the GPIO
chip's lines is also in the release process and holds the notifier chain's
read rwsem. Consequently, a race condition leads to the use-after-free of
watched_lines.

Here is the typical stack when issue happened:

[free]
gpio_chrdev_release()
  --&gt; bitmap_free(cdev-&gt;watched_lines)                  &lt;-- freed
  --&gt; blocking_notifier_chain_unregister()
    --&gt; down_write(&amp;nh-&gt;rwsem)                          &lt;-- waiting rwsem
          --&gt; __down_write_common()
            --&gt; rwsem_down_write_slowpath()
                  --&gt; schedule_preempt_disabled()
                    --&gt; schedule()

[use]
st54spi_gpio_dev_release()
  --&gt; gpio_free()
    --&gt; gpiod_free()
      --&gt; gpiod_free_commit()
        --&gt; gpiod_line_state_notify()
          --&gt; blocking_notifier_call_chain()
            --&gt; down_read(&amp;nh-&gt;rwsem);                  &lt;-- held rwsem
            --&gt; notifier_call_chain()
              --&gt; lineinfo_changed_notify()
                --&gt; test_bit(xxxx, cdev-&gt;watched_lines) &lt;-- use after free

The side effect of the use-after-free issue is that a GPIO line event is
being generated for userspace where it shouldn't. However, since the chrdev
is being closed, userspace won't have the chance to read that event anyway.

To fix the issue, call the bitmap_free() function after the unregistration
of lineinfo_changed_nb notifier chain.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36899/">CVE-2024-36899 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36899">CVE-2024-36899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225737">SUSE bug 1225737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225739">SUSE bug 1225739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36903" ref_url="https://www.suse.com/security/cve/CVE-2024-36903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix potential uninit-value access in __ip6_make_skb()

As it was done in commit fc1092f51567 ("ipv4: Fix uninit-value access in
__ip_make_skb()") for IPv4, check FLOWI_FLAG_KNOWN_NH on fl6-&gt;flowi6_flags
instead of testing HDRINCL on the socket to avoid a race condition which
causes uninit-value access.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-36903/">CVE-2024-36903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36903">CVE-2024-36903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225741">SUSE bug 1225741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36904</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36904" ref_url="https://www.suse.com/security/cve/CVE-2024-36904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Use refcount_inc_not_zero() in tcp_twsk_unique().

Anderson Nascimento reported a use-after-free splat in tcp_twsk_unique()
with nice analysis.

Since commit ec94c2696f0b ("tcp/dccp: avoid one atomic operation for
timewait hashdance"), inet_twsk_hashdance() sets TIME-WAIT socket's
sk_refcnt after putting it into ehash and releasing the bucket lock.

Thus, there is a small race window where other threads could try to
reuse the port during connect() and call sock_hold() in tcp_twsk_unique()
for the TIME-WAIT socket with zero refcnt.

If that happens, the refcnt taken by tcp_twsk_unique() is overwritten
and sock_put() will cause underflow, triggering a real use-after-free
somewhere else.

To avoid the use-after-free, we need to use refcount_inc_not_zero() in
tcp_twsk_unique() and give up on reusing the port if it returns false.

[0]:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110
CPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1
Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023
RIP: 0010:refcount_warn_saturate+0xe5/0x110
Code: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff &lt;0f&gt; 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8
RSP: 0018:ffffc90006b43b60 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027
RDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0
RBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0
R10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84
R13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0
FS:  00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? refcount_warn_saturate+0xe5/0x110
 ? __warn+0x81/0x130
 ? refcount_warn_saturate+0xe5/0x110
 ? report_bug+0x171/0x1a0
 ? refcount_warn_saturate+0xe5/0x110
 ? handle_bug+0x3c/0x80
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? refcount_warn_saturate+0xe5/0x110
 tcp_twsk_unique+0x186/0x190
 __inet_check_established+0x176/0x2d0
 __inet_hash_connect+0x74/0x7d0
 ? __pfx___inet_check_established+0x10/0x10
 tcp_v4_connect+0x278/0x530
 __inet_stream_connect+0x10f/0x3d0
 inet_stream_connect+0x3a/0x60
 __sys_connect+0xa8/0xd0
 __x64_sys_connect+0x18/0x20
 do_syscall_64+0x83/0x170
 entry_SYSCALL_64_after_hwframe+0x78/0x80
RIP: 0033:0x7f62c11a885d
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d
RDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003
RBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0
R13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36904/">CVE-2024-36904 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36904">CVE-2024-36904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225732">SUSE bug 1225732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225733">SUSE bug 1225733</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36921" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36921" ref_url="https://www.suse.com/security/cve/CVE-2024-36921" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: guard against invalid STA ID on removal

Guard against invalid station IDs in iwl_mvm_mld_rm_sta_id as that would
result in out-of-bounds array accesses. This prevents issues should the
driver get into a bad state during error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36921/">CVE-2024-36921 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36921">CVE-2024-36921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225769">SUSE bug 1225769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225850">SUSE bug 1225850</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36922" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36922" ref_url="https://www.suse.com/security/cve/CVE-2024-36922" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: read txq-&gt;read_ptr under lock

If we read txq-&gt;read_ptr without lock, we can read the same
value twice, then obtain the lock, and reclaim from there
to two different places, but crucially reclaim the same
entry twice, resulting in the WARN_ONCE() a little later.
Fix that by reading txq-&gt;read_ptr under lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36922/">CVE-2024-36922 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36922">CVE-2024-36922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225805">SUSE bug 1225805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36924" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36924" ref_url="https://www.suse.com/security/cve/CVE-2024-36924" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up()

lpfc_worker_wake_up() calls the lpfc_work_done() routine, which takes the
hbalock.  Thus, lpfc_worker_wake_up() should not be called while holding the
hbalock to avoid potential deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36924/">CVE-2024-36924 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36924">CVE-2024-36924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225820">SUSE bug 1225820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36929" ref_url="https://www.suse.com/security/cve/CVE-2024-36929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: core: reject skb_copy(_expand) for fraglist GSO skbs

SKB_GSO_FRAGLIST skbs must not be linearized, otherwise they become
invalid. Return NULL if such an skb is passed to skb_copy or
skb_copy_expand, in order to prevent a crash on a potential later
call to skb_gso_segment.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36929/">CVE-2024-36929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36929">CVE-2024-36929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225814">SUSE bug 1225814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36941</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36941" ref_url="https://www.suse.com/security/cve/CVE-2024-36941" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: don't free NULL coalescing rule

If the parsing fails, we can dereference a NULL pointer here.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36941/">CVE-2024-36941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36941">CVE-2024-36941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225835">SUSE bug 1225835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36952" ref_url="https://www.suse.com/security/cve/CVE-2024-36952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Move NPIV's transport unregistration to after resource clean up

There are cases after NPIV deletion where the fabric switch still believes
the NPIV is logged into the fabric.  This occurs when a vport is
unregistered before the Remove All DA_ID CT and LOGO ELS are sent to the
fabric.

Currently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including
the fabric D_ID, removes the last ndlp reference and frees the ndlp rport
object.  This sometimes causes the race condition where the final DA_ID and
LOGO are skipped from being sent to the fabric switch.

Fix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID
and LOGO are sent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36952/">CVE-2024-36952 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36952">CVE-2024-36952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225898">SUSE bug 1225898</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36957</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36957" ref_url="https://www.suse.com/security/cve/CVE-2024-36957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-af: avoid off-by-one read from userspace

We try to access count + 1 byte from userspace with memdup_user(buffer,
count + 1). However, the userspace only provides buffer of count bytes and
only these count bytes are verified to be okay to access. To ensure the
copied buffer is NUL terminated, we use memdup_user_nul instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-36957/">CVE-2024-36957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36957">CVE-2024-36957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225762">SUSE bug 1225762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36968" ref_url="https://www.suse.com/security/cve/CVE-2024-36968" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()

l2cap_le_flowctl_init() can cause both div-by-zero and an integer
overflow since hdev-&gt;le_mtu may not fall in the valid range.

Move MTU from hci_dev to hci_conn to validate MTU and stop the connection
process earlier if MTU is invalid.
Also, add a missing validation in read_buffer_size() and make it return
an error value if the validation fails.
Now hci_conn_add() returns ERR_PTR() as it can fail due to the both a
kzalloc failure and invalid MTU value.

divide error: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 0 PID: 67 Comm: kworker/u5:0 Tainted: G        W          6.9.0-rc5+ #20
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: hci0 hci_rx_work
RIP: 0010:l2cap_le_flowctl_init+0x19e/0x3f0 net/bluetooth/l2cap_core.c:547
Code: e8 17 17 0c 00 66 41 89 9f 84 00 00 00 bf 01 00 00 00 41 b8 02 00 00 00 4c
89 fe 4c 89 e2 89 d9 e8 27 17 0c 00 44 89 f0 31 d2 &lt;66&gt; f7 f3 89 c3 ff c3 4d 8d
b7 88 00 00 00 4c 89 f0 48 c1 e8 03 42
RSP: 0018:ffff88810bc0f858 EFLAGS: 00010246
RAX: 00000000000002a0 RBX: 0000000000000000 RCX: dffffc0000000000
RDX: 0000000000000000 RSI: ffff88810bc0f7c0 RDI: ffffc90002dcb66f
RBP: ffff88810bc0f880 R08: aa69db2dda70ff01 R09: 0000ffaaaaaaaaaa
R10: 0084000000ffaaaa R11: 0000000000000000 R12: ffff88810d65a084
R13: dffffc0000000000 R14: 00000000000002a0 R15: ffff88810d65a000
FS:  0000000000000000(0000) GS:ffff88811ac00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000100 CR3: 0000000103268003 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 l2cap_le_connect_req net/bluetooth/l2cap_core.c:4902 [inline]
 l2cap_le_sig_cmd net/bluetooth/l2cap_core.c:5420 [inline]
 l2cap_le_sig_channel net/bluetooth/l2cap_core.c:5486 [inline]
 l2cap_recv_frame+0xe59d/0x11710 net/bluetooth/l2cap_core.c:6809
 l2cap_recv_acldata+0x544/0x10a0 net/bluetooth/l2cap_core.c:7506
 hci_acldata_packet net/bluetooth/hci_core.c:3939 [inline]
 hci_rx_work+0x5e5/0xb20 net/bluetooth/hci_core.c:4176
 process_one_work kernel/workqueue.c:3254 [inline]
 process_scheduled_works+0x90f/0x1530 kernel/workqueue.c:3335
 worker_thread+0x926/0xe70 kernel/workqueue.c:3416
 kthread+0x2e3/0x380 kernel/kthread.c:388
 ret_from_fork+0x5c/0x90 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;
Modules linked in:
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-36968/">CVE-2024-36968 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36968">CVE-2024-36968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226130">SUSE bug 1226130</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36971" ref_url="https://www.suse.com/security/cve/CVE-2024-36971" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0618" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
		<reference ref_id="TID000021562" ref_url="https://www.suse.com/support/kb/doc/?id=000021562" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix __dst_negative_advice() race

__dst_negative_advice() does not enforce proper RCU rules when
sk-&gt;dst_cache must be cleared, leading to possible UAF.

RCU rules are that we must first clear sk-&gt;sk_dst_cache,
then call dst_release(old_dst).

Note that sk_dst_reset(sk) is implementing this protocol correctly,
while __dst_negative_advice() uses the wrong order.

Given that ip6_negative_advice() has special logic
against RTF_CACHE, this means each of the three -&gt;negative_advice()
existing methods must perform the sk_dst_reset() themselves.

Note the check against NULL dst is centralized in
__dst_negative_advice(), there is no need to duplicate
it in various callbacks.

Many thanks to Clement Lecigne for tracking this issue.

This old bug became visible after the blamed commit, using UDP sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36971/">CVE-2024-36971 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36971">CVE-2024-36971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226145">SUSE bug 1226145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226324">SUSE bug 1226324</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36978" ref_url="https://www.suse.com/security/cve/CVE-2024-36978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02909-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: sch_multiq: fix possible OOB write in multiq_tune()

q-&gt;bands will be assigned to qopt-&gt;bands to execute subsequent code logic
after kmalloc. So the old q-&gt;bands should not be used in kmalloc.
Otherwise, an out-of-bounds write will occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36978/">CVE-2024-36978 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36978">CVE-2024-36978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226514">SUSE bug 1226514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1244631">SUSE bug 1244631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202436979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-36979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-36979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36979" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-36979" ref_url="https://www.suse.com/security/cve/CVE-2024-36979" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: mst: fix vlan use-after-free

syzbot reported a suspicious rcu usage[1] in bridge's mst code. While
fixing it I noticed that nothing prevents a vlan to be freed while
walking the list from the same path (br forward delay timer). Fix the rcu
usage and also make sure we are not accessing freed memory by making
br_mst_vlan_set_state use rcu read lock.

[1]
 WARNING: suspicious RCU usage
 6.9.0-rc6-syzkaller #0 Not tainted
 -----------------------------
 net/bridge/br_private.h:1599 suspicious rcu_dereference_protected() usage!
 ...
 stack backtrace:
 CPU: 1 PID: 8017 Comm: syz-executor.1 Not tainted 6.9.0-rc6-syzkaller #0
 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
 Call Trace:
  &lt;IRQ&gt;
  __dump_stack lib/dump_stack.c:88 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
  lockdep_rcu_suspicious+0x221/0x340 kernel/locking/lockdep.c:6712
  nbp_vlan_group net/bridge/br_private.h:1599 [inline]
  br_mst_set_state+0x1ea/0x650 net/bridge/br_mst.c:105
  br_set_state+0x28a/0x7b0 net/bridge/br_stp.c:47
  br_forward_delay_timer_expired+0x176/0x440 net/bridge/br_stp_timer.c:88
  call_timer_fn+0x18e/0x650 kernel/time/timer.c:1793
  expire_timers kernel/time/timer.c:1844 [inline]
  __run_timers kernel/time/timer.c:2418 [inline]
  __run_timer_base+0x66a/0x8e0 kernel/time/timer.c:2429
  run_timer_base kernel/time/timer.c:2438 [inline]
  run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2448
  __do_softirq+0x2c6/0x980 kernel/softirq.c:554
  invoke_softirq kernel/softirq.c:428 [inline]
  __irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633
  irq_exit_rcu+0x9/0x30 kernel/softirq.c:645
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
  sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
  &lt;/IRQ&gt;
  &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
 RIP: 0010:lock_acquire+0x264/0x550 kernel/locking/lockdep.c:5758
 Code: 2b 00 74 08 4c 89 f7 e8 ba d1 84 00 f6 44 24 61 02 0f 85 85 01 00 00 41 f7 c7 00 02 00 00 74 01 fb 48 c7 44 24 40 0e 36 e0 45 &lt;4b&gt; c7 44 25 00 00 00 00 00 43 c7 44 25 09 00 00 00 00 43 c7 44 25
 RSP: 0018:ffffc90013657100 EFLAGS: 00000206
 RAX: 0000000000000001 RBX: 1ffff920026cae2c RCX: 0000000000000001
 RDX: dffffc0000000000 RSI: ffffffff8bcaca00 RDI: ffffffff8c1eaa60
 RBP: ffffc90013657260 R08: ffffffff92efe507 R09: 1ffffffff25dfca0
 R10: dffffc0000000000 R11: fffffbfff25dfca1 R12: 1ffff920026cae28
 R13: dffffc0000000000 R14: ffffc90013657160 R15: 0000000000000246
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-36979/">CVE-2024-36979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-36979">CVE-2024-36979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226604">SUSE bug 1226604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227369">SUSE bug 1227369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3727" ref_url="https://www.suse.com/security/cve/CVE-2024-3727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9098" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000553.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0244-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BEJQC6TDQZLJ4YE746IHLCFJFUQ2JKQ/" source="SUSE-SU"/>
    <description>
    A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-06-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3727/">CVE-2024-3727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3727">CVE-2024-3727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224112">SUSE bug 1224112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953540" comment="buildah-1.37.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953541" comment="buildah-tests-1.37.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953544" comment="podman-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953545" comment="podman-docker-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953546" comment="podman-plugins-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953547" comment="podman-remote-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953548" comment="podman-tests-5.2.2-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953542" comment="skopeo-1.16.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953543" comment="skopeo-tests-1.16.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37298</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37298" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37298" ref_url="https://www.suse.com/security/cve/CVE-2024-37298" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6194" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000019.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    gorilla/schema converts structs to and from form values. Prior to version 1.4.1 Running `schema.Decoder.Decode()` on a struct that has a field of type `[]struct{...}` opens it up to malicious attacks regarding memory allocations, taking advantage of the sparse slice functionality. Any use of `schema.Decoder.Decode()` on a struct with arrays of other structs could be vulnerable to this memory exhaustion vulnerability. Version 1.4.1 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-37298/">CVE-2024-37298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37298">CVE-2024-37298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227309">SUSE bug 1227309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941970" comment="podman-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941971" comment="podman-docker-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941972" comment="podman-plugins-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941973" comment="podman-remote-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941974" comment="podman-tests-4.9.4-10.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37353</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37353" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37353" ref_url="https://www.suse.com/security/cve/CVE-2024-37353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-37353/">CVE-2024-37353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37353">CVE-2024-37353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226875">SUSE bug 1226875</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37356" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37356" ref_url="https://www.suse.com/security/cve/CVE-2024-37356" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Fix shift-out-of-bounds in dctcp_update_alpha().

In dctcp_update_alpha(), we use a module parameter dctcp_shift_g
as follows:

  alpha -= min_not_zero(alpha, alpha &gt;&gt; dctcp_shift_g);
  ...
  delivered_ce &lt;&lt;= (10 - dctcp_shift_g);

It seems syzkaller started fuzzing module parameters and triggered
shift-out-of-bounds [0] by setting 100 to dctcp_shift_g:

  memcpy((void*)0x20000080,
         "/sys/module/tcp_dctcp/parameters/dctcp_shift_g\000", 47);
  res = syscall(__NR_openat, /*fd=*/0xffffffffffffff9cul, /*file=*/0x20000080ul,
                /*flags=*/2ul, /*mode=*/0ul);
  memcpy((void*)0x20000000, "100\000", 4);
  syscall(__NR_write, /*fd=*/r[0], /*val=*/0x20000000ul, /*len=*/4ul);

Let's limit the max value of dctcp_shift_g by param_set_uint_minmax().

With this patch:

  # echo 10 &gt; /sys/module/tcp_dctcp/parameters/dctcp_shift_g
  # cat /sys/module/tcp_dctcp/parameters/dctcp_shift_g
  10
  # echo 11 &gt; /sys/module/tcp_dctcp/parameters/dctcp_shift_g
  -bash: echo: write error: Invalid argument

[0]:
UBSAN: shift-out-of-bounds in net/ipv4/tcp_dctcp.c:143:12
shift exponent 100 is too large for 32-bit type 'u32' (aka 'unsigned int')
CPU: 0 PID: 8083 Comm: syz-executor345 Not tainted 6.9.0-05151-g1b294a1f3561 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x201/0x300 lib/dump_stack.c:114
 ubsan_epilogue lib/ubsan.c:231 [inline]
 __ubsan_handle_shift_out_of_bounds+0x346/0x3a0 lib/ubsan.c:468
 dctcp_update_alpha+0x540/0x570 net/ipv4/tcp_dctcp.c:143
 tcp_in_ack_event net/ipv4/tcp_input.c:3802 [inline]
 tcp_ack+0x17b1/0x3bc0 net/ipv4/tcp_input.c:3948
 tcp_rcv_state_process+0x57a/0x2290 net/ipv4/tcp_input.c:6711
 tcp_v4_do_rcv+0x764/0xc40 net/ipv4/tcp_ipv4.c:1937
 sk_backlog_rcv include/net/sock.h:1106 [inline]
 __release_sock+0x20f/0x350 net/core/sock.c:2983
 release_sock+0x61/0x1f0 net/core/sock.c:3549
 mptcp_subflow_shutdown+0x3d0/0x620 net/mptcp/protocol.c:2907
 mptcp_check_send_data_fin+0x225/0x410 net/mptcp/protocol.c:2976
 __mptcp_close+0x238/0xad0 net/mptcp/protocol.c:3072
 mptcp_close+0x2a/0x1a0 net/mptcp/protocol.c:3127
 inet_release+0x190/0x1f0 net/ipv4/af_inet.c:437
 __sock_release net/socket.c:659 [inline]
 sock_close+0xc0/0x240 net/socket.c:1421
 __fput+0x41b/0x890 fs/file_table.c:422
 task_work_run+0x23b/0x300 kernel/task_work.c:180
 exit_task_work include/linux/task_work.h:38 [inline]
 do_exit+0x9c8/0x2540 kernel/exit.c:878
 do_group_exit+0x201/0x2b0 kernel/exit.c:1027
 __do_sys_exit_group kernel/exit.c:1038 [inline]
 __se_sys_exit_group kernel/exit.c:1036 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1036
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xe4/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x67/0x6f
RIP: 0033:0x7f6c2b5005b6
Code: Unable to access opcode bytes at 0x7f6c2b50058c.
RSP: 002b:00007ffe883eb948 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007f6c2b5862f0 RCX: 00007f6c2b5005b6
RDX: 0000000000000001 RSI: 000000000000003c RDI: 0000000000000001
RBP: 0000000000000001 R08: 00000000000000e7 R09: ffffffffffffffc0
R10: 0000000000000006 R11: 0000000000000246 R12: 00007f6c2b5862f0
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37356/">CVE-2024-37356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37356">CVE-2024-37356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226833">SUSE bug 1226833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37370</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37370" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37370" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37370" ref_url="https://www.suse.com/security/cve/CVE-2024-37370" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:5076" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000004.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6166" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024200.html" source="SUSE-SU"/>
    <description>
    In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can modify the plaintext Extra Count field of a confidential GSS krb5 wrap token, causing the unwrapped token to appear truncated to the application.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-37370/">CVE-2024-37370 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37370">CVE-2024-37370 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227186">SUSE bug 1227186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227187">SUSE bug 1227187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941954" comment="krb5-devel-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941955" comment="krb5-libs-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941956" comment="krb5-pkinit-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941957" comment="krb5-server-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941958" comment="krb5-server-ldap-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941959" comment="krb5-workstation-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941960" comment="libkadm5-1.21.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37371</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37371" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37371" ref_url="https://www.suse.com/security/cve/CVE-2024-37371" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:5076" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000004.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6166" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000010.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024200.html" source="SUSE-SU"/>
    <description>
    In MIT Kerberos 5 (aka krb5) before 1.21.3, an attacker can cause invalid memory reads during GSS message token handling by sending message tokens with invalid length fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37371/">CVE-2024-37371 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37371">CVE-2024-37371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227186">SUSE bug 1227186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227187">SUSE bug 1227187</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941954" comment="krb5-devel-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941955" comment="krb5-libs-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941956" comment="krb5-pkinit-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941957" comment="krb5-server-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941958" comment="krb5-server-ldap-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941959" comment="krb5-workstation-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941960" comment="libkadm5-1.21.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37891</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37891" ref_url="https://www.suse.com/security/cve/CVE-2024-37891" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000008.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000021.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6311" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000192.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8843" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000200.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9457" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000512.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2879-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
    <description>
     urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2026-01-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-37891/">CVE-2024-37891 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-37891">CVE-2024-37891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226469">SUSE bug 1226469</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942600" comment="fence-agents-aliyun-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942601" comment="fence-agents-all-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942602" comment="fence-agents-amt-ws-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942603" comment="fence-agents-apc-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942604" comment="fence-agents-apc-snmp-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942605" comment="fence-agents-aws-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942606" comment="fence-agents-azure-arm-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942607" comment="fence-agents-bladecenter-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942608" comment="fence-agents-brocade-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942609" comment="fence-agents-cisco-mds-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942610" comment="fence-agents-cisco-ucs-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875438" comment="fence-agents-common-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875439" comment="fence-agents-compute-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942611" comment="fence-agents-drac5-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942612" comment="fence-agents-eaton-snmp-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942613" comment="fence-agents-emerson-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942614" comment="fence-agents-eps-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942615" comment="fence-agents-gce-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942616" comment="fence-agents-heuristics-ping-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942617" comment="fence-agents-hpblade-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875440" comment="fence-agents-ibm-powervs-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875441" comment="fence-agents-ibm-vpc-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942618" comment="fence-agents-ibmblade-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942619" comment="fence-agents-ifmib-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942620" comment="fence-agents-ilo-moonshot-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942621" comment="fence-agents-ilo-mp-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942622" comment="fence-agents-ilo-ssh-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942623" comment="fence-agents-ilo2-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942624" comment="fence-agents-intelmodular-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942625" comment="fence-agents-ipdu-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942626" comment="fence-agents-ipmilan-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942627" comment="fence-agents-kdump-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875442" comment="fence-agents-kubevirt-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942628" comment="fence-agents-mpath-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942629" comment="fence-agents-openstack-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942630" comment="fence-agents-redfish-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942631" comment="fence-agents-rhevm-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942632" comment="fence-agents-rsa-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942633" comment="fence-agents-rsb-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942634" comment="fence-agents-sbd-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942635" comment="fence-agents-scsi-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875443" comment="fence-agents-virsh-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942636" comment="fence-agents-vmware-rest-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942637" comment="fence-agents-vmware-soap-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942638" comment="fence-agents-wti-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875444" comment="fence-virt-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875445" comment="fence-virtd-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875446" comment="fence-virtd-cpg-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875447" comment="fence-virtd-libvirt-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875448" comment="fence-virtd-multicast-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875449" comment="fence-virtd-serial-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875450" comment="fence-virtd-tcp-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942639" comment="ha-cloud-support-4.10.0-62.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941953" comment="python3-urllib3-1.26.5-5.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953900" comment="python3.11-urllib3-1.26.12-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953899" comment="python3.12-urllib3-1.26.18-2.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202437894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-37894</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-37894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-37894" ref_url="https://www.suse.com/security/cve/CVE-2024-37894" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042059.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-27"/>
	<updated date="2025-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-37894/">CVE-2024-37894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-37894">CVE-2024-37894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227086">SUSE bug 1227086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876376" comment="squid-5.5-13.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38095" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38095" ref_url="https://www.suse.com/security/cve/CVE-2024-38095" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38095/">CVE-2024-38095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38095">CVE-2024-38095 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875451" comment="aspnetcore-runtime-6.0-6.0.32-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872973" comment="aspnetcore-runtime-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872974" comment="aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875452" comment="aspnetcore-targeting-pack-6.0-6.0.32-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872975" comment="aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875453" comment="dotnet-apphost-pack-6.0-6.0.32-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872976" comment="dotnet-apphost-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872977" comment="dotnet-host-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875454" comment="dotnet-hostfxr-6.0-6.0.32-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872978" comment="dotnet-hostfxr-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875455" comment="dotnet-runtime-6.0-6.0.32-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872979" comment="dotnet-runtime-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872980" comment="dotnet-runtime-dbg-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875456" comment="dotnet-sdk-6.0-6.0.132-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875457" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.132-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872981" comment="dotnet-sdk-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872982" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872983" comment="dotnet-sdk-dbg-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875458" comment="dotnet-targeting-pack-6.0-6.0.32-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872984" comment="dotnet-targeting-pack-8.0-8.0.7-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875459" comment="dotnet-templates-6.0-6.0.132-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872985" comment="dotnet-templates-8.0-8.0.107-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872986" comment="netstandard-targeting-pack-2.1-8.0.107-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38167</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38167" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38167" ref_url="https://www.suse.com/security/cve/CVE-2024-38167" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38167/">CVE-2024-38167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38167">CVE-2024-38167 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881370" comment="aspnetcore-runtime-8.0-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881371" comment="aspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881372" comment="aspnetcore-targeting-pack-8.0-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881373" comment="dotnet-apphost-pack-8.0-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881374" comment="dotnet-host-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881375" comment="dotnet-hostfxr-8.0-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881376" comment="dotnet-runtime-8.0-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881377" comment="dotnet-runtime-dbg-8.0-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881378" comment="dotnet-sdk-8.0-8.0.108-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881379" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.108-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881380" comment="dotnet-sdk-dbg-8.0-8.0.108-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881381" comment="dotnet-targeting-pack-8.0-8.0.8-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881382" comment="dotnet-templates-8.0-8.0.108-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881383" comment="netstandard-targeting-pack-2.1-8.0.108-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38229" ref_url="https://www.suse.com/security/cve/CVE-2024-38229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7868" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000122.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000123.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-38229/">CVE-2024-38229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38229">CVE-2024-38229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009946458" comment="aspnetcore-runtime-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946459" comment="aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946460" comment="aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946461" comment="dotnet-apphost-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946462" comment="dotnet-host-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946463" comment="dotnet-hostfxr-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946464" comment="dotnet-runtime-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946465" comment="dotnet-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946466" comment="dotnet-sdk-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946467" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946468" comment="dotnet-sdk-dbg-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946469" comment="dotnet-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946470" comment="dotnet-templates-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946471" comment="netstandard-targeting-pack-2.1-8.0.110-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38286</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38286" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38286" ref_url="https://www.suse.com/security/cve/CVE-2024-38286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.13 through 9.0.89.


The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.35 through 8.5.100 and 7.0.92 through 7.0.109.  Other EOL versions may also be affected.


Users are recommended to upgrade to version 11.0.0-M21, 10.1.25, or 9.0.90, which fixes the issue.



Apache Tomcat, under certain configurations on any platform, allows an attacker to cause an OutOfMemoryError by abusing the TLS handshake process.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-38286/">CVE-2024-38286 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38286">CVE-2024-38286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230986">SUSE bug 1230986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009880871" comment="tomcat-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880872" comment="tomcat-admin-webapps-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880873" comment="tomcat-docs-webapp-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880874" comment="tomcat-el-3.0-api-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880875" comment="tomcat-jsp-2.3-api-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880876" comment="tomcat-lib-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880877" comment="tomcat-servlet-4.0-api-9.0.87-1.el9_4.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880878" comment="tomcat-webapps-9.0.87-1.el9_4.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38391</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38391" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38391" ref_url="https://www.suse.com/security/cve/CVE-2024-38391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38391/">CVE-2024-38391 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38391">CVE-2024-38391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226894">SUSE bug 1226894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38428</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38428" ref_url="https://www.suse.com/security/cve/CVE-2024-38428" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6192" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2174-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021357.html" source="SUSE-SU"/>
    <description>
    url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38428/">CVE-2024-38428 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38428">CVE-2024-38428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226419">SUSE bug 1226419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941969" comment="wget-1.21.1-8.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38473" ref_url="https://www.suse.com/security/cve/CVE-2024-38473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3172-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036816.html" source="SUSE-SU"/>
    <description>
    Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-38473/">CVE-2024-38473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38473">CVE-2024-38473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227276">SUSE bug 1227276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876215" comment="httpd-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876216" comment="httpd-core-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876217" comment="httpd-devel-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876218" comment="httpd-filesystem-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876219" comment="httpd-manual-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876220" comment="httpd-tools-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876221" comment="mod_ldap-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876222" comment="mod_lua-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876223" comment="mod_proxy_html-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876224" comment="mod_session-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876225" comment="mod_ssl-2.4.57-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38474</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38474" ref_url="https://www.suse.com/security/cve/CVE-2024-38474" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0620" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3172-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036816.html" source="SUSE-SU"/>
    <description>
    Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in
directories permitted by the configuration but not directly reachable by any  URL or source disclosure of scripts meant to only to be executed as CGI.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.

Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38474/">CVE-2024-38474 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38474">CVE-2024-38474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227278">SUSE bug 1227278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876215" comment="httpd-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876216" comment="httpd-core-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876217" comment="httpd-devel-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876218" comment="httpd-filesystem-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876219" comment="httpd-manual-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876220" comment="httpd-tools-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876221" comment="mod_ldap-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876222" comment="mod_lua-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876223" comment="mod_proxy_html-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876224" comment="mod_session-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876225" comment="mod_ssl-2.4.57-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38475</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38475" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38475" ref_url="https://www.suse.com/security/cve/CVE-2024-38475" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0620" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2597-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" source="SUSE-SU"/>
    <description>
    Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are  permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. 

Substitutions in  server context that use a backreferences or variables as the first segment of the substitution are affected.   Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-38475/">CVE-2024-38475 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38475">CVE-2024-38475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227268">SUSE bug 1227268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876215" comment="httpd-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876216" comment="httpd-core-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876217" comment="httpd-devel-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876218" comment="httpd-filesystem-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876219" comment="httpd-manual-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876220" comment="httpd-tools-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876221" comment="mod_ldap-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876222" comment="mod_lua-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876223" comment="mod_proxy_html-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876224" comment="mod_session-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876225" comment="mod_ssl-2.4.57-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38476" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38476" ref_url="https://www.suse.com/security/cve/CVE-2024-38476" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0630" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2597-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" source="SUSE-SU"/>
    <description>
    Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via  backend applications whose response headers are malicious or exploitable.

Users are recommended to upgrade to version 2.4.60, which fixes this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-38476/">CVE-2024-38476 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38476">CVE-2024-38476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227269">SUSE bug 1227269</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879110" comment="httpd-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879111" comment="httpd-core-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879112" comment="httpd-devel-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879113" comment="httpd-filesystem-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879114" comment="httpd-manual-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879115" comment="httpd-tools-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879116" comment="mod_ldap-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879117" comment="mod_lua-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879118" comment="mod_proxy_html-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879119" comment="mod_session-2.4.57-11.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879120" comment="mod_ssl-2.4.57-11.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38477</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38477" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38477" ref_url="https://www.suse.com/security/cve/CVE-2024-38477" source="SUSE CVE"/>
		<reference ref_id="ESSA-2024:0620" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:4943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02241-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040632.html" source="SUSE-SU"/>
    <description>
    null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38477/">CVE-2024-38477 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38477">CVE-2024-38477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227270">SUSE bug 1227270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876215" comment="httpd-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876216" comment="httpd-core-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876217" comment="httpd-devel-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876218" comment="httpd-filesystem-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876219" comment="httpd-manual-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876220" comment="httpd-tools-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876221" comment="mod_ldap-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876222" comment="mod_lua-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876223" comment="mod_proxy_html-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876224" comment="mod_session-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876225" comment="mod_ssl-2.4.57-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3852" ref_url="https://www.suse.com/security/cve/CVE-2024-3852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3852/">CVE-2024-3852 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3852">CVE-2024-3852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38538" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38538" ref_url="https://www.suse.com/security/cve/CVE-2024-38538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: xmit: make sure we have at least eth header len bytes

syzbot triggered an uninit value[1] error in bridge device's xmit path
by sending a short (less than ETH_HLEN bytes) skb. To fix it check if
we can actually pull that amount instead of assuming.

Tested with dropwatch:
 drop at: br_dev_xmit+0xb93/0x12d0 [bridge] (0xffffffffc06739b3)
 origin: software
 timestamp: Mon May 13 11:31:53 2024 778214037 nsec
 protocol: 0x88a8
 length: 2
 original length: 2
 drop reason: PKT_TOO_SMALL

[1]
BUG: KMSAN: uninit-value in br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 br_dev_xmit+0x61d/0x1cb0 net/bridge/br_device.c:65
 __netdev_start_xmit include/linux/netdevice.h:4903 [inline]
 netdev_start_xmit include/linux/netdevice.h:4917 [inline]
 xmit_one net/core/dev.c:3531 [inline]
 dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3547
 __dev_queue_xmit+0x34db/0x5350 net/core/dev.c:4341
 dev_queue_xmit include/linux/netdevice.h:3091 [inline]
 __bpf_tx_skb net/core/filter.c:2136 [inline]
 __bpf_redirect_common net/core/filter.c:2180 [inline]
 __bpf_redirect+0x14a6/0x1620 net/core/filter.c:2187
 ____bpf_clone_redirect net/core/filter.c:2460 [inline]
 bpf_clone_redirect+0x328/0x470 net/core/filter.c:2432
 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997
 __bpf_prog_run512+0xb5/0xe0 kernel/bpf/core.c:2238
 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline]
 __bpf_prog_run include/linux/filter.h:657 [inline]
 bpf_prog_run include/linux/filter.h:664 [inline]
 bpf_test_run+0x499/0xc30 net/bpf/test_run.c:425
 bpf_prog_test_run_skb+0x14ea/0x1f20 net/bpf/test_run.c:1058
 bpf_prog_test_run+0x6b7/0xad0 kernel/bpf/syscall.c:4269
 __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5678
 __do_sys_bpf kernel/bpf/syscall.c:5767 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5765 [inline]
 __x64_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5765
 x64_sys_call+0x96b/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38538/">CVE-2024-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38538">CVE-2024-38538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226606">SUSE bug 1226606</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3854</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3854" ref_url="https://www.suse.com/security/cve/CVE-2024-3854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3854/">CVE-2024-3854 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3854">CVE-2024-3854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38540" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38540" ref_url="https://www.suse.com/security/cve/CVE-2024-38540" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_re: avoid shift undefined behavior in bnxt_qplib_alloc_init_hwq

Undefined behavior is triggered when bnxt_qplib_alloc_init_hwq is called
with hwq_attr-&gt;aux_depth != 0 and hwq_attr-&gt;aux_stride == 0.
In that case, "roundup_pow_of_two(hwq_attr-&gt;aux_stride)" gets called.
roundup_pow_of_two is documented as undefined for 0.

Fix it in the one caller that had this combination.

The undefined behavior was detected by UBSAN:
  UBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13
  shift exponent 64 is too large for 64-bit type 'long unsigned int'
  CPU: 24 PID: 1075 Comm: (udev-worker) Not tainted 6.9.0-rc6+ #4
  Hardware name: Abacus electric, s.r.o. - servis@abacus.cz Super Server/H12SSW-iN, BIOS 2.7 10/25/2023
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x5d/0x80
   ubsan_epilogue+0x5/0x30
   __ubsan_handle_shift_out_of_bounds.cold+0x61/0xec
   __roundup_pow_of_two+0x25/0x35 [bnxt_re]
   bnxt_qplib_alloc_init_hwq+0xa1/0x470 [bnxt_re]
   bnxt_qplib_create_qp+0x19e/0x840 [bnxt_re]
   bnxt_re_create_qp+0x9b1/0xcd0 [bnxt_re]
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? __kmalloc+0x1b6/0x4f0
   ? create_qp.part.0+0x128/0x1c0 [ib_core]
   ? __pfx_bnxt_re_create_qp+0x10/0x10 [bnxt_re]
   create_qp.part.0+0x128/0x1c0 [ib_core]
   ib_create_qp_kernel+0x50/0xd0 [ib_core]
   create_mad_qp+0x8e/0xe0 [ib_core]
   ? __pfx_qp_event_handler+0x10/0x10 [ib_core]
   ib_mad_init_device+0x2be/0x680 [ib_core]
   add_client_context+0x10d/0x1a0 [ib_core]
   enable_device_and_get+0xe0/0x1d0 [ib_core]
   ib_register_device+0x53c/0x630 [ib_core]
   ? srso_alias_return_thunk+0x5/0xfbef5
   bnxt_re_probe+0xbd8/0xe50 [bnxt_re]
   ? __pfx_bnxt_re_probe+0x10/0x10 [bnxt_re]
   auxiliary_bus_probe+0x49/0x80
   ? driver_sysfs_add+0x57/0xc0
   really_probe+0xde/0x340
   ? pm_runtime_barrier+0x54/0x90
   ? __pfx___driver_attach+0x10/0x10
   __driver_probe_device+0x78/0x110
   driver_probe_device+0x1f/0xa0
   __driver_attach+0xba/0x1c0
   bus_for_each_dev+0x8f/0xe0
   bus_add_driver+0x146/0x220
   driver_register+0x72/0xd0
   __auxiliary_driver_register+0x6e/0xd0
   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]
   bnxt_re_mod_init+0x3e/0xff0 [bnxt_re]
   ? __pfx_bnxt_re_mod_init+0x10/0x10 [bnxt_re]
   do_one_initcall+0x5b/0x310
   do_init_module+0x90/0x250
   init_module_from_file+0x86/0xc0
   idempotent_init_module+0x121/0x2b0
   __x64_sys_finit_module+0x5e/0xb0
   do_syscall_64+0x82/0x160
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? syscall_exit_to_user_mode_prepare+0x149/0x170
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? syscall_exit_to_user_mode+0x75/0x230
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? do_syscall_64+0x8e/0x160
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? __count_memcg_events+0x69/0x100
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? count_memcg_events.constprop.0+0x1a/0x30
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? handle_mm_fault+0x1f0/0x300
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? do_user_addr_fault+0x34e/0x640
   ? srso_alias_return_thunk+0x5/0xfbef5
   ? srso_alias_return_thunk+0x5/0xfbef5
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f4e5132821d
  Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d e3 db 0c 00 f7 d8 64 89 01 48
  RSP: 002b:00007ffca9c906a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
  RAX: ffffffffffffffda RBX: 0000563ec8a8f130 RCX: 00007f4e5132821d
  RDX: 0000000000000000 RSI: 00007f4e518fa07d RDI: 000000000000003b
  RBP: 00007ffca9c90760 R08: 00007f4e513f6b20 R09: 00007ffca9c906f0
  R10: 0000563ec8a8faa0 R11: 0000000000000246 R12: 00007f4e518fa07d
  R13: 0000000000020000 R14: 0000563ec8409e90 R15: 0000563ec8a8fa60
   &lt;/TASK&gt;
  ---[ end trace ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38540/">CVE-2024-38540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38540">CVE-2024-38540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226582">SUSE bug 1226582</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38541" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38541" ref_url="https://www.suse.com/security/cve/CVE-2024-38541" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: module: add buffer overflow check in of_modalias()

In of_modalias(), if the buffer happens to be too small even for the 1st
snprintf() call, the len parameter will become negative and str parameter
(if not NULL initially) will point beyond the buffer's end. Add the buffer
overflow check after the 1st snprintf() call and fix such check after the
strlen() call (accounting for the terminating NUL char).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38541/">CVE-2024-38541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38541">CVE-2024-38541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226587">SUSE bug 1226587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227496">SUSE bug 1227496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38543" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38543" ref_url="https://www.suse.com/security/cve/CVE-2024-38543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/test_hmm.c: handle src_pfns and dst_pfns allocation failure

The kcalloc() in dmirror_device_evict_chunk() will return null if the
physical memory has run out.  As a result, if src_pfns or dst_pfns is
dereferenced, the null pointer dereference bug will happen.

Moreover, the device is going away.  If the kcalloc() fails, the pages
mapping a chunk could not be evicted.  So add a __GFP_NOFAIL flag in
kcalloc().

Finally, as there is no need to have physically contiguous memory, Switch
kcalloc() to kvcalloc() in order to avoid failing allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38543/">CVE-2024-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38543">CVE-2024-38543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226594">SUSE bug 1226594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38544" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38544" ref_url="https://www.suse.com/security/cve/CVE-2024-38544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt

In rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the
resp_pkts queue and then a decision is made whether to run the completer
task inline or schedule it. Finally the skb is dereferenced to bump a 'hw'
performance counter. This is wrong because if the completer task is
already running in a separate thread it may have already processed the skb
and freed it which can cause a seg fault.  This has been observed
infrequently in testing at high scale.

This patch fixes this by changing the order of enqueuing the packet until
after the counter is accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38544/">CVE-2024-38544 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38544">CVE-2024-38544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226597">SUSE bug 1226597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38556" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38556" ref_url="https://www.suse.com/security/cve/CVE-2024-38556" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Add a timeout to acquire the command queue semaphore

Prevent forced completion handling on an entry that has not yet been
assigned an index, causing an out of bounds access on idx = -22.
Instead of waiting indefinitely for the sem, blocking flow now waits for
index to be allocated or a sem acquisition timeout before beginning the
timer for FW completion.

Kernel log example:
mlx5_core 0000:06:00.0: wait_func_handle_exec_timeout:1128:(pid 185911): cmd[-22]: CREATE_UCTX(0xa04) No done completion
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38556/">CVE-2024-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38556">CVE-2024-38556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226774">SUSE bug 1226774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38558" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38558" ref_url="https://www.suse.com/security/cve/CVE-2024-38558" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix overwriting ct original tuple for ICMPv6

OVS_PACKET_CMD_EXECUTE has 3 main attributes:
 - OVS_PACKET_ATTR_KEY - Packet metadata in a netlink format.
 - OVS_PACKET_ATTR_PACKET - Binary packet content.
 - OVS_PACKET_ATTR_ACTIONS - Actions to execute on the packet.

OVS_PACKET_ATTR_KEY is parsed first to populate sw_flow_key structure
with the metadata like conntrack state, input port, recirculation id,
etc.  Then the packet itself gets parsed to populate the rest of the
keys from the packet headers.

Whenever the packet parsing code starts parsing the ICMPv6 header, it
first zeroes out fields in the key corresponding to Neighbor Discovery
information even if it is not an ND packet.

It is an 'ipv6.nd' field.  However, the 'ipv6' is a union that shares
the space between 'nd' and 'ct_orig' that holds the original tuple
conntrack metadata parsed from the OVS_PACKET_ATTR_KEY.

ND packets should not normally have conntrack state, so it's fine to
share the space, but normal ICMPv6 Echo packets or maybe other types of
ICMPv6 can have the state attached and it should not be overwritten.

The issue results in all but the last 4 bytes of the destination
address being wiped from the original conntrack tuple leading to
incorrect packet matching and potentially executing wrong actions
in case this packet recirculates within the datapath or goes back
to userspace.

ND fields should not be accessed in non-ND packets, so not clearing
them should be fine.  Executing memset() only for actual ND packets to
avoid the issue.

Initializing the whole thing before parsing is needed because ND packet
may not contain all the options.

The issue only affects the OVS_PACKET_CMD_EXECUTE path and doesn't
affect packets entering OVS datapath from network interfaces, because
in this case CT metadata is populated from skb after the packet is
already parsed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-38558/">CVE-2024-38558 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38558">CVE-2024-38558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226783">SUSE bug 1226783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38559" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38559" ref_url="https://www.suse.com/security/cve/CVE-2024-38559" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2365-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Ensure the copied buf is NUL terminated

Currently, we allocate a count-sized kernel buffer and copy count from
userspace to that buffer. Later, we use kstrtouint on this buffer but we
don't ensure that the string is terminated inside the buffer, this can
lead to OOB read when using kstrtouint. Fix this issue by using
memdup_user_nul instead of memdup_user.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38559/">CVE-2024-38559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38559">CVE-2024-38559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226785">SUSE bug 1226785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227495">SUSE bug 1227495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38562" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38562" ref_url="https://www.suse.com/security/cve/CVE-2024-38562" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: Avoid address calculations via out of bounds array indexing

Before request-&gt;channels[] can be used, request-&gt;n_channels must be set.
Additionally, address calculations for memory after the "channels" array
need to be calculated from the allocation base ("request") rather than
via the first "out of bounds" index of "channels", otherwise run-time
bounds checking will throw a warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38562/">CVE-2024-38562 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38562">CVE-2024-38562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226788">SUSE bug 1226788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3857</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3857" ref_url="https://www.suse.com/security/cve/CVE-2024-3857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3857/">CVE-2024-3857 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3857">CVE-2024-3857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38570" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38570" ref_url="https://www.suse.com/security/cve/CVE-2024-38570" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix potential glock use-after-free on unmount

When a DLM lockspace is released and there ares still locks in that
lockspace, DLM will unlock those locks automatically.  Commit
fb6791d100d1b started exploiting this behavior to speed up filesystem
unmount: gfs2 would simply free glocks it didn't want to unlock and then
release the lockspace.  This didn't take the bast callbacks for
asynchronous lock contention notifications into account, which remain
active until until a lock is unlocked or its lockspace is released.

To prevent those callbacks from accessing deallocated objects, put the
glocks that should not be unlocked on the sd_dead_glocks list, release
the lockspace, and only then free those glocks.

As an additional measure, ignore unexpected ast and bast callbacks if
the receiving glock is dead.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-38570/">CVE-2024-38570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38570">CVE-2024-38570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226775">SUSE bug 1226775</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38573" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38573" ref_url="https://www.suse.com/security/cve/CVE-2024-38573" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cppc_cpufreq: Fix possible null pointer dereference

cppc_cpufreq_get_rate() and hisi_cppc_cpufreq_get_rate() can be called from
different places with various parameters. So cpufreq_cpu_get() can return
null as 'policy' in some circumstances.
Fix this bug by adding null return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38573/">CVE-2024-38573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38573">CVE-2024-38573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226739">SUSE bug 1226739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38575" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38575" ref_url="https://www.suse.com/security/cve/CVE-2024-38575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: pcie: handle randbuf allocation failure

The kzalloc() in brcmf_pcie_download_fw_nvram() will return null
if the physical memory has run out. As a result, if we use
get_random_bytes() to generate random bytes in the randbuf, the
null pointer dereference bug will happen.

In order to prevent allocation failure, this patch adds a separate
function using buffer on kernel stack to generate random bytes in
the randbuf, which could prevent the kernel stack from overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38575/">CVE-2024-38575 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38575">CVE-2024-38575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226612">SUSE bug 1226612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38579</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38579" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38579" ref_url="https://www.suse.com/security/cve/CVE-2024-38579" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: bcm - Fix pointer arithmetic

In spu2_dump_omd() value of ptr is increased by ciph_key_len
instead of hash_iv_len which could lead to going beyond the
buffer boundaries.
Fix this bug by changing ciph_key_len to hash_iv_len.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38579/">CVE-2024-38579 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38579">CVE-2024-38579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226637">SUSE bug 1226637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38580" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38580" ref_url="https://www.suse.com/security/cve/CVE-2024-38580" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

epoll: be better about file lifetimes

epoll can call out to vfs_poll() with a file pointer that may race with
the last 'fput()'. That would make f_count go down to zero, and while
the ep-&gt;mtx locking means that the resulting file pointer tear-down will
be blocked until the poll returns, it means that f_count is already
dead, and any use of it won't actually get a reference to the file any
more: it's dead regardless.

Make sure we have a valid ref on the file pointer before we call down to
vfs_poll() from the epoll routines.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-01"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38580/">CVE-2024-38580 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38580">CVE-2024-38580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226610">SUSE bug 1226610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877811" comment="bpftool-7.3.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877812" comment="kernel-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877813" comment="kernel-abi-stablelists-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877814" comment="kernel-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877815" comment="kernel-cross-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877816" comment="kernel-debug-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877817" comment="kernel-debug-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877820" comment="kernel-debug-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877821" comment="kernel-debug-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877822" comment="kernel-debug-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877823" comment="kernel-debug-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877826" comment="kernel-doc-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877827" comment="kernel-headers-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877828" comment="kernel-modules-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877829" comment="kernel-modules-core-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877830" comment="kernel-modules-extra-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877831" comment="kernel-tools-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877832" comment="kernel-tools-libs-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877834" comment="kernel-uki-virt-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877835" comment="libperf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877836" comment="perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877837" comment="python3-perf-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877838" comment="rtla-5.14.0-427.28.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877839" comment="rv-5.14.0-427.28.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38586</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38586" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38586" ref_url="https://www.suse.com/security/cve/CVE-2024-38586" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

r8169: Fix possible ring buffer corruption on fragmented Tx packets.

An issue was found on the RTL8125b when transmitting small fragmented
packets, whereby invalid entries were inserted into the transmit ring
buffer, subsequently leading to calls to dma_unmap_single() with a null
address.

This was caused by rtl8169_start_xmit() not noticing changes to nr_frags
which may occur when small packets are padded (to work around hardware
quirks) in rtl8169_tso_csum_v2().

To fix this, postpone inspecting nr_frags until after any padding has been
applied.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38586/">CVE-2024-38586 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38586">CVE-2024-38586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226750">SUSE bug 1226750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3859</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3859" ref_url="https://www.suse.com/security/cve/CVE-2024-3859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3859/">CVE-2024-3859 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3859">CVE-2024-3859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38593</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38593" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38593" ref_url="https://www.suse.com/security/cve/CVE-2024-38593" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: micrel: Fix receiving the timestamp in the frame for lan8841

The blamed commit started to use the ptp workqueue to get the second
part of the timestamp. And when the port was set down, then this
workqueue is stopped. But if the config option NETWORK_PHY_TIMESTAMPING
is not enabled, then the ptp_clock is not initialized so then it would
crash when it would try to access the delayed work.
So then basically by setting up and then down the port, it would crash.
The fix consists in checking if the ptp_clock is initialized and only
then cancel the delayed work.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38593/">CVE-2024-38593 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38593">CVE-2024-38593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226726">SUSE bug 1226726</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38601" ref_url="https://www.suse.com/security/cve/CVE-2024-38601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix a race between readers and resize checks

The reader code in rb_get_reader_page() swaps a new reader page into the
ring buffer by doing cmpxchg on old-&gt;list.prev-&gt;next to point it to the
new page. Following that, if the operation is successful,
old-&gt;list.next-&gt;prev gets updated too. This means the underlying
doubly-linked list is temporarily inconsistent, page-&gt;prev-&gt;next or
page-&gt;next-&gt;prev might not be equal back to page for some page in the
ring buffer.

The resize operation in ring_buffer_resize() can be invoked in parallel.
It calls rb_check_pages() which can detect the described inconsistency
and stop further tracing:

[  190.271762] ------------[ cut here ]------------
[  190.271771] WARNING: CPU: 1 PID: 6186 at kernel/trace/ring_buffer.c:1467 rb_check_pages.isra.0+0x6a/0xa0
[  190.271789] Modules linked in: [...]
[  190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1 skx_edac(E):1
[  190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump: loaded Tainted: G            E      6.9.0-rc6-default #5 158d3e1e6d0b091c34c3b96bfd99a1c58306d79f
[  190.272011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014
[  190.272015] RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0
[  190.272023] Code: [...]
[  190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206
[  190.272034] RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80
[  190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI: ffff8eba0004c700
[  190.272042] RBP: ffff8eba0004c700 R08: 0000000000010002 R09: 0000000000000000
[  190.272045] R10: 00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720
[  190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15: ffff8eba067a8000
[  190.272053] FS:  00007f1bd64752c0(0000) GS:ffff8eba7f680000(0000) knlGS:0000000000000000
[  190.272057] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  190.272061] CR2: 00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0
[  190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  190.272073] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  190.272077] Call Trace:
[  190.272098]  &lt;TASK&gt;
[  190.272189]  ring_buffer_resize+0x2ab/0x460
[  190.272199]  __tracing_resize_ring_buffer.part.0+0x23/0xa0
[  190.272206]  tracing_resize_ring_buffer+0x65/0x90
[  190.272216]  tracing_entries_write+0x74/0xc0
[  190.272225]  vfs_write+0xf5/0x420
[  190.272248]  ksys_write+0x67/0xe0
[  190.272256]  do_syscall_64+0x82/0x170
[  190.272363]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  190.272373] RIP: 0033:0x7f1bd657d263
[  190.272381] Code: [...]
[  190.272385] RSP: 002b:00007ffe72b643f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  190.272391] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1bd657d263
[  190.272395] RDX: 0000000000000002 RSI: 0000555a6eb538e0 RDI: 0000000000000001
[  190.272398] RBP: 0000555a6eb538e0 R08: 000000000000000a R09: 0000000000000000
[  190.272401] R10: 0000555a6eb55190 R11: 0000000000000246 R12: 00007f1bd6662500
[  190.272404] R13: 0000000000000002 R14: 00007f1bd6667c00 R15: 0000000000000002
[  190.272412]  &lt;/TASK&gt;
[  190.272414] ---[ end trace 0000000000000000 ]---

Note that ring_buffer_resize() calls rb_check_pages() only if the parent
trace_buffer has recording disabled. Recent commit d78ab792705c
("tracing: Stop current tracer when resizing buffer") causes that it is
now always the case which makes it more likely to experience this issue.

The window to hit this race is nonetheless very small. To help
reproducing it, one can add a delay loop in rb_get_reader_page():

 ret = rb_head_page_replace(reader, cpu_buffer-&gt;reader_page);
 if (!ret)
 	goto spin;
 for (unsigned i = 0; i &lt; 1U &lt;&lt; 26; i++)  /* inserted delay loop */
 	__asm__ __volatile__ ("" : : : "memory");
 rb_list_head(reader-&gt;list.next)-&gt;prev = &amp;cpu_buffer-&gt;reader_page-&gt;list;

.. 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38601/">CVE-2024-38601 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38601">CVE-2024-38601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226876">SUSE bug 1226876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38608</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38608" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38608" ref_url="https://www.suse.com/security/cve/CVE-2024-38608" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix netif state handling

mlx5e_suspend cleans resources only if netif_device_present() returns
true. However, mlx5e_resume changes the state of netif, via
mlx5e_nic_enable, only if reg_state == NETREG_REGISTERED.
In the below case, the above leads to NULL-ptr Oops[1] and memory
leaks:

mlx5e_probe
 _mlx5e_resume
  mlx5e_attach_netdev
   mlx5e_nic_enable  &lt;-- netdev not reg, not calling netif_device_attach()
  register_netdev &lt;-- failed for some reason.
ERROR_FLOW:
 _mlx5e_suspend &lt;-- netif_device_present return false, resources aren't freed :(

Hence, clean resources in this case as well.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0010 [#1] SMP
CPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at0xffffffffffffffd6.
RSP: 0018:ffff888178aaf758 EFLAGS: 00010246
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x14c/0x3c0
 ? exc_page_fault+0x75/0x140
 ? asm_exc_page_fault+0x22/0x30
 notifier_call_chain+0x35/0xb0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
 mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core]
 mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib]
 mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib]
 __mlx5_ib_add+0x34/0xd0 [mlx5_ib]
 mlx5r_probe+0xe1/0x210 [mlx5_ib]
 ? auxiliary_match_id+0x6a/0x90
 auxiliary_bus_probe+0x38/0x80
 ? driver_sysfs_add+0x51/0x80
 really_probe+0xc9/0x3e0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 bus_probe_device+0x86/0xa0
 device_add+0x637/0x840
 __auxiliary_device_add+0x3b/0xa0
 add_adev+0xc9/0x140 [mlx5_core]
 mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core]
 mlx5_register_device+0x53/0xa0 [mlx5_core]
 mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core]
 mlx5_init_one+0x3b/0x60 [mlx5_core]
 probe_one+0x44c/0x730 [mlx5_core]
 local_pci_probe+0x3e/0x90
 pci_device_probe+0xbf/0x210
 ? kernfs_create_link+0x5d/0xa0
 ? sysfs_do_create_link_sd+0x60/0xc0
 really_probe+0xc9/0x3e0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 pci_bus_add_device+0x54/0x80
 pci_iov_add_virtfn+0x2e6/0x320
 sriov_enable+0x208/0x420
 mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core]
 sriov_numvfs_store+0xae/0x1a0
 kernfs_fop_write_iter+0x10c/0x1a0
 vfs_write+0x291/0x3c0
 ksys_write+0x5f/0xe0
 do_syscall_64+0x3d/0x90
 entry_SYSCALL_64_after_hwframe+0x46/0xb0
 CR2: 0000000000000000
 ---[ end trace 0000000000000000  ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-38608/">CVE-2024-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38608">CVE-2024-38608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226746">SUSE bug 1226746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3861" ref_url="https://www.suse.com/security/cve/CVE-2024-3861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-3861/">CVE-2024-3861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3861">CVE-2024-3861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38615" ref_url="https://www.suse.com/security/cve/CVE-2024-38615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: exit() callback is optional

The exit() callback is optional and shouldn't be called without checking
a valid pointer first.

Also, we must clear freq_table pointer even if the exit() callback isn't
present.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38615/">CVE-2024-38615 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38615">CVE-2024-38615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226592">SUSE bug 1226592</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38619</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38619" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38619" ref_url="https://www.suse.com/security/cve/CVE-2024-38619" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2372-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2394-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb-storage: alauda: Check whether the media is initialized

The member "uzonesize" of struct alauda_info will remain 0
if alauda_init_media() fails, potentially causing divide errors
in alauda_read_data() and alauda_write_lba().
- Add a member "media_initialized" to struct alauda_info.
- Change a condition in alauda_check_media() to ensure the
  first initialization.
- Add an error check for the return value of alauda_init_media().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38619/">CVE-2024-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38619">CVE-2024-38619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226861">SUSE bug 1226861</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3864" ref_url="https://www.suse.com/security/cve/CVE-2024-3864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-April/018382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-04-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-3864/">CVE-2024-3864 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3864">CVE-2024-3864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222535">SUSE bug 1222535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009856159" comment="firefox-115.10.0-1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009856160" comment="firefox-x11-115.10.0-1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38663" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38663" ref_url="https://www.suse.com/security/cve/CVE-2024-38663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: fix list corruption from resetting io stat

Since commit 3b8cc6298724 ("blk-cgroup: Optimize blkcg_rstat_flush()"),
each iostat instance is added to blkcg percpu list, so blkcg_reset_stats()
can't reset the stat instance by memset(), otherwise the llist may be
corrupted.

Fix the issue by only resetting the counter part.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-38663/">CVE-2024-38663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-38663">CVE-2024-38663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226939">SUSE bug 1226939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876186" comment="bpftool-7.3.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876187" comment="kernel-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876188" comment="kernel-abi-stablelists-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876189" comment="kernel-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876190" comment="kernel-cross-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876191" comment="kernel-debug-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876192" comment="kernel-debug-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876195" comment="kernel-debug-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876196" comment="kernel-debug-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876197" comment="kernel-debug-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876198" comment="kernel-debug-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876201" comment="kernel-doc-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876202" comment="kernel-headers-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876203" comment="kernel-modules-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876204" comment="kernel-modules-core-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876205" comment="kernel-modules-extra-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876206" comment="kernel-tools-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876207" comment="kernel-tools-libs-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876209" comment="kernel-uki-virt-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876210" comment="libperf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876211" comment="perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876212" comment="python3-perf-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876213" comment="rtla-5.14.0-427.26.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876214" comment="rv-5.14.0-427.26.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202438796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-38796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-38796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38796" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-38796" ref_url="https://www.suse.com/security/cve/CVE-2024-38796" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11185" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000693.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11219" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000738.html" source="SUSE-SU"/>
    <description>
    EDK2 contains a vulnerability in the PeCoffLoaderRelocateImage(). An Attacker may cause memory corruption due to an overflow via an adjacent network. A successful exploit of this vulnerability may lead to a loss of Confidentiality, Integrity, and/or Availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-07"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-38796/">CVE-2024-38796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-38796">CVE-2024-38796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231143">SUSE bug 1231143</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959121" comment="edk2-tools-20240524-6.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959122" comment="edk2-tools-doc-20240524-6.el9_5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39279</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39279" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39279" ref_url="https://www.suse.com/security/cve/CVE-2024-39279" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001287.html" source="SUSE-SU"/>
    <description>
    Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-39279/">CVE-2024-39279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39279">CVE-2024-39279 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984837" comment="microcode_ctl-20250211-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39331</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39331" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39331" ref_url="https://www.suse.com/security/cve/CVE-2024-39331" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6510" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000023.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6987" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019003.html" source="SUSE-SU"/>
    <description>
    In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39331/">CVE-2024-39331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39331">CVE-2024-39331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226957">SUSE bug 1226957</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942247" comment="emacs-27.2-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942248" comment="emacs-common-27.2-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942249" comment="emacs-filesystem-27.2-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942250" comment="emacs-lucid-27.2-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942251" comment="emacs-nox-27.2-10.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39472" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39472" ref_url="https://www.suse.com/security/cve/CVE-2024-39472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix log recovery buffer allocation for the legacy h_size fixup

Commit a70f9fe52daa ("xfs: detect and handle invalid iclog size set by
mkfs") added a fixup for incorrect h_size values used for the initial
umount record in old xfsprogs versions.  Later commit 0c771b99d6c9
("xfs: clean up calculation of LR header blocks") cleaned up the log
reover buffer calculation, but stoped using the fixed up h_size value
to size the log recovery buffer, which can lead to an out of bounds
access when the incorrect h_size does not come from the old mkfs
tool, but a fuzzer.

Fix this by open coding xlog_logrec_hblks and taking the fixed h_size
into account for this calculation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-39472/">CVE-2024-39472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39472">CVE-2024-39472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227432">SUSE bug 1227432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39476</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39476" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39476" ref_url="https://www.suse.com/security/cve/CVE-2024-39476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: fix deadlock that raid5d() wait for itself to clear MD_SB_CHANGE_PENDING

Xiao reported that lvm2 test lvconvert-raid-takeover.sh can hang with
small possibility, the root cause is exactly the same as commit
bed9e27baf52 ("Revert "md/raid5: Wait for MD_SB_CHANGE_PENDING in raid5d"")

However, Dan reported another hang after that, and junxiao investigated
the problem and found out that this is caused by plugged bio can't issue
from raid5d().

Current implementation in raid5d() has a weird dependence:

1) md_check_recovery() from raid5d() must hold 'reconfig_mutex' to clear
   MD_SB_CHANGE_PENDING;
2) raid5d() handles IO in a deadloop, until all IO are issued;
3) IO from raid5d() must wait for MD_SB_CHANGE_PENDING to be cleared;

This behaviour is introduce before v2.6, and for consequence, if other
context hold 'reconfig_mutex', and md_check_recovery() can't update
super_block, then raid5d() will waste one cpu 100% by the deadloop, until
'reconfig_mutex' is released.

Refer to the implementation from raid1 and raid10, fix this problem by
skipping issue IO if MD_SB_CHANGE_PENDING is still set after
md_check_recovery(), daemon thread will be woken up when 'reconfig_mutex'
is released. Meanwhile, the hang problem will be fixed as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39476/">CVE-2024-39476 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39476">CVE-2024-39476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227437">SUSE bug 1227437</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39483</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39483" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39483" ref_url="https://www.suse.com/security/cve/CVE-2024-39483" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: WARN on vNMI + NMI window iff NMIs are outright masked

When requesting an NMI window, WARN on vNMI support being enabled if and
only if NMIs are actually masked, i.e. if the vCPU is already handling an
NMI.  KVM's ABI for NMIs that arrive simultanesouly (from KVM's point of
view) is to inject one NMI and pend the other.  When using vNMI, KVM pends
the second NMI simply by setting V_NMI_PENDING, and lets the CPU do the
rest (hardware automatically sets V_NMI_BLOCKING when an NMI is injected).

However, if KVM can't immediately inject an NMI, e.g. because the vCPU is
in an STI shadow or is running with GIF=0, then KVM will request an NMI
window and trigger the WARN (but still function correctly).

Whether or not the GIF=0 case makes sense is debatable, as the intent of
KVM's behavior is to provide functionality that is as close to real
hardware as possible.  E.g. if two NMIs are sent in quick succession, the
probability of both NMIs arriving in an STI shadow is infinitesimally low
on real hardware, but significantly larger in a virtual environment, e.g.
if the vCPU is preempted in the STI shadow.  For GIF=0, the argument isn't
as clear cut, because the window where two NMIs can collide is much larger
in bare metal (though still small).

That said, KVM should not have divergent behavior for the GIF=0 case based
on whether or not vNMI support is enabled.  And KVM has allowed
simultaneous NMIs with GIF=0 for over a decade, since commit 7460fb4a3400
("KVM: Fix simultaneous NMIs").  I.e. KVM's GIF=0 handling shouldn't be
modified without a *really* good reason to do so, and if KVM's behavior
were to be modified, it should be done irrespective of vNMI support.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39483/">CVE-2024-39483 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39483">CVE-2024-39483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227494">SUSE bug 1227494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39487" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39487" ref_url="https://www.suse.com/security/cve/CVE-2024-39487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set()

In function bond_option_arp_ip_targets_set(), if newval-&gt;string is an
empty string, newval-&gt;string+1 will point to the byte after the
string, causing an out-of-bound read.

BUG: KASAN: slab-out-of-bounds in strlen+0x7d/0xa0 lib/string.c:418
Read of size 1 at addr ffff8881119c4781 by task syz-executor665/8107
CPU: 1 PID: 8107 Comm: syz-executor665 Not tainted 6.7.0-rc7 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x150 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:364 [inline]
 print_report+0xc1/0x5e0 mm/kasan/report.c:475
 kasan_report+0xbe/0xf0 mm/kasan/report.c:588
 strlen+0x7d/0xa0 lib/string.c:418
 __fortify_strlen include/linux/fortify-string.h:210 [inline]
 in4_pton+0xa3/0x3f0 net/core/utils.c:130
 bond_option_arp_ip_targets_set+0xc2/0x910
drivers/net/bonding/bond_options.c:1201
 __bond_opt_set+0x2a4/0x1030 drivers/net/bonding/bond_options.c:767
 __bond_opt_set_notify+0x48/0x150 drivers/net/bonding/bond_options.c:792
 bond_opt_tryset_rtnl+0xda/0x160 drivers/net/bonding/bond_options.c:817
 bonding_sysfs_store_option+0xa1/0x120 drivers/net/bonding/bond_sysfs.c:156
 dev_attr_store+0x54/0x80 drivers/base/core.c:2366
 sysfs_kf_write+0x114/0x170 fs/sysfs/file.c:136
 kernfs_fop_write_iter+0x337/0x500 fs/kernfs/file.c:334
 call_write_iter include/linux/fs.h:2020 [inline]
 new_sync_write fs/read_write.c:491 [inline]
 vfs_write+0x96a/0xd80 fs/read_write.c:584
 ksys_write+0x122/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
---[ end trace ]---

Fix it by adding a check of string length before using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39487/">CVE-2024-39487 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39487">CVE-2024-39487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227573">SUSE bug 1227573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39500" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39500" ref_url="https://www.suse.com/security/cve/CVE-2024-39500" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sock_map: avoid race between sock_map_close and sk_psock_put

sk_psock_get will return NULL if the refcount of psock has gone to 0, which
will happen when the last call of sk_psock_put is done. However,
sk_psock_drop may not have finished yet, so the close callback will still
point to sock_map_close despite psock being NULL.

This can be reproduced with a thread deleting an element from the sock map,
while the second one creates a socket, adds it to the map and closes it.

That will trigger the WARN_ON_ONCE:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 7220 at net/core/sock_map.c:1701 sock_map_close+0x2a2/0x2d0 net/core/sock_map.c:1701
Modules linked in:
CPU: 1 PID: 7220 Comm: syz-executor380 Not tainted 6.9.0-syzkaller-07726-g3c999d1ae3c7 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
RIP: 0010:sock_map_close+0x2a2/0x2d0 net/core/sock_map.c:1701
Code: df e8 92 29 88 f8 48 8b 1b 48 89 d8 48 c1 e8 03 42 80 3c 20 00 74 08 48 89 df e8 79 29 88 f8 4c 8b 23 eb 89 e8 4f 15 23 f8 90 &lt;0f&gt; 0b 90 48 83 c4 08 5b 41 5c 41 5d 41 5e 41 5f 5d e9 13 26 3d 02
RSP: 0018:ffffc9000441fda8 EFLAGS: 00010293
RAX: ffffffff89731ae1 RBX: ffffffff94b87540 RCX: ffff888029470000
RDX: 0000000000000000 RSI: ffffffff8bcab5c0 RDI: ffffffff8c1faba0
RBP: 0000000000000000 R08: ffffffff92f9b61f R09: 1ffffffff25f36c3
R10: dffffc0000000000 R11: fffffbfff25f36c4 R12: ffffffff89731840
R13: ffff88804b587000 R14: ffff88804b587000 R15: ffffffff89731870
FS:  000055555e080380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000207d4000 CR4: 0000000000350ef0
Call Trace:
 &lt;TASK&gt;
 unix_release+0x87/0xc0 net/unix/af_unix.c:1048
 __sock_release net/socket.c:659 [inline]
 sock_close+0xbe/0x240 net/socket.c:1421
 __fput+0x42b/0x8a0 fs/file_table.c:422
 __do_sys_close fs/open.c:1556 [inline]
 __se_sys_close fs/open.c:1541 [inline]
 __x64_sys_close+0x7f/0x110 fs/open.c:1541
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fb37d618070
Code: 00 00 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d4 e8 10 2c 00 00 80 3d 31 f0 07 00 00 74 17 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c
RSP: 002b:00007ffcd4a525d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000003
RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fb37d618070
RDX: 0000000000000010 RSI: 00000000200001c0 RDI: 0000000000000004
RBP: 0000000000000000 R08: 0000000100000000 R09: 0000000100000000
R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Use sk_psock, which will only check that the pointer is not been set to
NULL yet, which should only happen after the callbacks are restored. If,
then, a reference can still be gotten, we may call sk_psock_stop and cancel
psock-&gt;work.

As suggested by Paolo Abeni, reorder the condition so the control flow is
less convoluted.

After that change, the reproducer does not trigger the WARN_ON_ONCE
anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39500/">CVE-2024-39500 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39500">CVE-2024-39500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227724">SUSE bug 1227724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39502" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39502" ref_url="https://www.suse.com/security/cve/CVE-2024-39502" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ionic: fix use after netif_napi_del()

When queues are started, netif_napi_add() and napi_enable() are called.
If there are 4 queues and only 3 queues are used for the current
configuration, only 3 queues' napi should be registered and enabled.
The ionic_qcq_enable() checks whether the .poll pointer is not NULL for
enabling only the using queue' napi. Unused queues' napi will not be
registered by netif_napi_add(), so the .poll pointer indicates NULL.
But it couldn't distinguish whether the napi was unregistered or not
because netif_napi_del() doesn't reset the .poll pointer to NULL.
So, ionic_qcq_enable() calls napi_enable() for the queue, which was
unregistered by netif_napi_del().

Reproducer:
   ethtool -L &lt;interface name&gt; rx 1 tx 1 combined 0
   ethtool -L &lt;interface name&gt; rx 0 tx 0 combined 1
   ethtool -L &lt;interface name&gt; rx 0 tx 0 combined 4

Splat looks like:
kernel BUG at net/core/dev.c:6666!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 1057 Comm: kworker/3:3 Not tainted 6.10.0-rc2+ #16
Workqueue: events ionic_lif_deferred_work [ionic]
RIP: 0010:napi_enable+0x3b/0x40
Code: 48 89 c2 48 83 e2 f6 80 b9 61 09 00 00 00 74 0d 48 83 bf 60 01 00 00 00 74 03 80 ce 01 f0 4f
RSP: 0018:ffffb6ed83227d48 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff97560cda0828 RCX: 0000000000000029
RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff97560cda0a28
RBP: ffffb6ed83227d50 R08: 0000000000000400 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000
R13: ffff97560ce3c1a0 R14: 0000000000000000 R15: ffff975613ba0a20
FS:  0000000000000000(0000) GS:ffff975d5f780000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8f734ee200 CR3: 0000000103e50000 CR4: 00000000007506f0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? die+0x33/0x90
 ? do_trap+0xd9/0x100
 ? napi_enable+0x3b/0x40
 ? do_error_trap+0x83/0xb0
 ? napi_enable+0x3b/0x40
 ? napi_enable+0x3b/0x40
 ? exc_invalid_op+0x4e/0x70
 ? napi_enable+0x3b/0x40
 ? asm_exc_invalid_op+0x16/0x20
 ? napi_enable+0x3b/0x40
 ionic_qcq_enable+0xb7/0x180 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_start_queues+0xc4/0x290 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_link_status_check+0x11c/0x170 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 ionic_lif_deferred_work+0x129/0x280 [ionic 59bdfc8a035436e1c4224ff7d10789e3f14643f8]
 process_one_work+0x145/0x360
 worker_thread+0x2bb/0x3d0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0xcc/0x100
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2d/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-39502/">CVE-2024-39502 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39502">CVE-2024-39502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227755">SUSE bug 1227755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39504</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39504" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39504" ref_url="https://www.suse.com/security/cve/CVE-2024-39504" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_inner: validate mandatory meta and payload

Check for mandatory netlink attributes in payload and meta expression
when used embedded from the inner expression, otherwise NULL pointer
dereference is possible from userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-39504/">CVE-2024-39504 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39504">CVE-2024-39504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227757">SUSE bug 1227757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39573</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39573" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39573" ref_url="https://www.suse.com/security/cve/CVE-2024-39573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02241-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040632.html" source="SUSE-SU"/>
    <description>
    Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-26"/>
	<updated date="2025-07-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-39573/">CVE-2024-39573 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39573">CVE-2024-39573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227271">SUSE bug 1227271</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009876215" comment="httpd-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876216" comment="httpd-core-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876217" comment="httpd-devel-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876218" comment="httpd-filesystem-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876219" comment="httpd-manual-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876220" comment="httpd-tools-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876221" comment="mod_ldap-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876222" comment="mod_lua-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876223" comment="mod_proxy_html-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876224" comment="mod_session-2.4.57-11.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009876225" comment="mod_ssl-2.4.57-11.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39908</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39908" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39908" ref_url="https://www.suse.com/security/cve/CVE-2024-39908" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6784" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000050.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000053.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/" source="SUSE-SU"/>
    <description>
     REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some DoS vulnerabilities when it parses an XML that has many specific characters such as `&lt;`, `0` and `%&gt;`. If you need to parse untrusted XMLs, you many be impacted to these vulnerabilities. The REXML gem 3.3.2 or later include the patches to fix these vulnerabilities. Users are advised to upgrade. Users unable to upgrade should avoid parsing untrusted XML strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-21"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39908/">CVE-2024-39908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-39908">CVE-2024-39908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228072">SUSE bug 1228072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943818" comment="ruby-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943819" comment="ruby-bundled-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943820" comment="ruby-default-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943821" comment="ruby-devel-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943822" comment="ruby-doc-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943823" comment="ruby-libs-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943824" comment="rubygem-bigdecimal-3.1.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943825" comment="rubygem-bundler-2.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943826" comment="rubygem-io-console-0.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943827" comment="rubygem-irb-1.13.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943828" comment="rubygem-json-2.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943829" comment="rubygem-minitest-5.20.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943830" comment="rubygem-power_assert-2.0.3-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943831" comment="rubygem-psych-5.1.2-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943832" comment="rubygem-racc-1.7.3-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943833" comment="rubygem-rake-13.1.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943834" comment="rubygem-rbs-3.4.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943835" comment="rubygem-rdoc-6.6.3.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977574" comment="rubygem-rexml-3.3.9-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977575" comment="rubygem-rss-0.3.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943838" comment="rubygem-test-unit-3.6.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943839" comment="rubygem-typeprof-0.21.9-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943840" comment="rubygems-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943841" comment="rubygems-devel-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39936" ref_url="https://www.suse.com/security/cve/CVE-2024-39936" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:4647" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036479.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3. Code to make security-relevant decisions about an established connection may execute too early, because the encrypted() signal has not yet been emitted and processed..
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-39936/">CVE-2024-39936 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39936">CVE-2024-39936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227426">SUSE bug 1227426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009874740" comment="qt5-qtbase-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874741" comment="qt5-qtbase-common-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874742" comment="qt5-qtbase-devel-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874743" comment="qt5-qtbase-examples-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874744" comment="qt5-qtbase-gui-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874745" comment="qt5-qtbase-mysql-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874746" comment="qt5-qtbase-odbc-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874747" comment="qt5-qtbase-postgresql-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874748" comment="qt5-qtbase-private-devel-5.15.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874749" comment="qt5-qtbase-static-5.15.9-10.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4032" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4032" ref_url="https://www.suse.com/security/cve/CVE-2024-4032" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000077.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000079.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2959-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024203.html" source="SUSE-SU"/>
    <description>
    The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn't be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.

CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4032/">CVE-2024-4032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4032">CVE-2024-4032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226448">SUSE bug 1226448</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877140" comment="python-unversioned-command-3.9.18-3.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877141" comment="python3-3.9.18-3.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877142" comment="python3-debug-3.9.18-3.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877143" comment="python3-devel-3.9.18-3.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877144" comment="python3-idle-3.9.18-3.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877145" comment="python3-libs-3.9.18-3.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877146" comment="python3-test-3.9.18-3.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877147" comment="python3-tkinter-3.9.18-3.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877108" comment="python3.11-3.11.7-1.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877109" comment="python3.11-debug-3.11.7-1.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877110" comment="python3.11-devel-3.11.7-1.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877111" comment="python3.11-idle-3.11.7-1.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877112" comment="python3.11-libs-3.11.7-1.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877113" comment="python3.11-test-3.11.7-1.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877114" comment="python3.11-tkinter-3.11.7-1.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953669" comment="python3.12-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953670" comment="python3.12-debug-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953671" comment="python3.12-devel-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953672" comment="python3.12-idle-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953673" comment="python3.12-libs-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953674" comment="python3.12-test-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953675" comment="python3.12-tkinter-3.12.5-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4076" ref_url="https://www.suse.com/security/cve/CVE-2024-4076" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7349" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036388.html" source="SUSE-SU"/>
    <description>
    Client queries that trigger serving stale data and that also require lookups in local authoritative zone data may result in an assertion failure.
This issue affects BIND 9 versions 9.16.13 through 9.16.50, 9.18.0 through 9.18.27, 9.19.0 through 9.19.24, 9.11.33-S1 through 9.11.37-S1, 9.16.13-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.27-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-14"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4076/">CVE-2024-4076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4076">CVE-2024-4076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228258">SUSE bug 1228258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879121" comment="bind-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879122" comment="bind-chroot-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879123" comment="bind-devel-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879124" comment="bind-dnssec-doc-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879125" comment="bind-dnssec-utils-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879126" comment="bind-doc-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879127" comment="bind-dyndb-ldap-11.9-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879128" comment="bind-libs-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879129" comment="bind-license-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879130" comment="bind-utils-9.16.23-18.el9_4.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879131" comment="python3-bind-9.16.23-18.el9_4.6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40776" ref_url="https://www.suse.com/security/cve/CVE-2024-40776" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036763.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 17.6, iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-40776/">CVE-2024-40776 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40776">CVE-2024-40776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228613">SUSE bug 1228613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40779" ref_url="https://www.suse.com/security/cve/CVE-2024-40779" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020177.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Safari 17.6, iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40779/">CVE-2024-40779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40779">CVE-2024-40779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228693">SUSE bug 1228693</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40780</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40780" ref_url="https://www.suse.com/security/cve/CVE-2024-40780" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036763.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Safari 17.6, iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40780/">CVE-2024-40780 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40780">CVE-2024-40780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228694">SUSE bug 1228694</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40782" ref_url="https://www.suse.com/security/cve/CVE-2024-40782" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036763.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 17.6, iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40782/">CVE-2024-40782 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40782">CVE-2024-40782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228695">SUSE bug 1228695</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40789" ref_url="https://www.suse.com/security/cve/CVE-2024-40789" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036763.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in Safari 17.6, iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40789/">CVE-2024-40789 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40789">CVE-2024-40789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228697">SUSE bug 1228697</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40866" ref_url="https://www.suse.com/security/cve/CVE-2024-40866" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000595.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved UI. This issue is fixed in Safari 18, macOS Sequoia 15. Visiting a malicious website may lead to address bar spoofing.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-40866/">CVE-2024-40866 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40866">CVE-2024-40866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953935" comment="webkit2gtk3-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953936" comment="webkit2gtk3-devel-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953937" comment="webkit2gtk3-jsc-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953938" comment="webkit2gtk3-jsc-devel-2.46.3-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40897</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40897" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40897" ref_url="https://www.suse.com/security/cve/CVE-2024-40897" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021048.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow vulnerability exists in orcparse.c of ORC versions prior to 0.4.39. If a developer is tricked to process a specially crafted file with the affected ORC compiler, an arbitrary code may be executed on the developer's build environment. This may lead to compromise of developer machines or CI build environments.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40897/">CVE-2024-40897 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40897">CVE-2024-40897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228184">SUSE bug 1228184</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941961" comment="orc-0.4.31-7.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941962" comment="orc-compiler-0.4.31-7.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941963" comment="orc-devel-0.4.31-7.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40904</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40904" ref_url="https://www.suse.com/security/cve/CVE-2024-40904" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages

The syzbot fuzzer found that the interrupt-URB completion callback in
the cdc-wdm driver was taking too long, and the driver's immediate
resubmission of interrupt URBs with -EPROTO status combined with the
dummy-hcd emulation to cause a CPU lockup:

cdc_wdm 1-1:1.0: nonzero urb status received: -71
cdc_wdm 1-1:1.0: wdm_int_callback - 0 bytes
watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz-executor782:6625]
CPU#0 Utilization every 4s during lockup:
	#1:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#2:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#3:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#4:  98% system,	  0% softirq,	  3% hardirq,	  0% idle
	#5:  98% system,	  1% softirq,	  3% hardirq,	  0% idle
Modules linked in:
irq event stamp: 73096
hardirqs last  enabled at (73095): [&lt;ffff80008037bc00&gt;] console_emit_next_record kernel/printk/printk.c:2935 [inline]
hardirqs last  enabled at (73095): [&lt;ffff80008037bc00&gt;] console_flush_all+0x650/0xb74 kernel/printk/printk.c:2994
hardirqs last disabled at (73096): [&lt;ffff80008af10b00&gt;] __el1_irq arch/arm64/kernel/entry-common.c:533 [inline]
hardirqs last disabled at (73096): [&lt;ffff80008af10b00&gt;] el1_interrupt+0x24/0x68 arch/arm64/kernel/entry-common.c:551
softirqs last  enabled at (73048): [&lt;ffff8000801ea530&gt;] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last  enabled at (73048): [&lt;ffff8000801ea530&gt;] handle_softirqs+0xa60/0xc34 kernel/softirq.c:582
softirqs last disabled at (73043): [&lt;ffff800080020de8&gt;] __do_softirq+0x14/0x20 kernel/softirq.c:588
CPU: 0 PID: 6625 Comm: syz-executor782 Tainted: G        W          6.10.0-rc2-syzkaller-g8867bbd4a056 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024

Testing showed that the problem did not occur if the two error
messages -- the first two lines above -- were removed; apparently adding
material to the kernel log takes a surprisingly large amount of time.

In any case, the best approach for preventing these lockups and to
avoid spamming the log with thousands of error messages per second is
to ratelimit the two dev_err() calls.  Therefore we replace them with
dev_err_ratelimited().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40904/">CVE-2024-40904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40904">CVE-2024-40904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227772">SUSE bug 1227772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40905" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40905" ref_url="https://www.suse.com/security/cve/CVE-2024-40905" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible race in __fib6_drop_pcpu_from()

syzbot found a race in __fib6_drop_pcpu_from() [1]

If compiler reads more than once (*ppcpu_rt),
second read could read NULL, if another cpu clears
the value in rt6_get_pcpu_route().

Add a READ_ONCE() to prevent this race.

Also add rcu_read_lock()/rcu_read_unlock() because
we rely on RCU protection while dereferencing pcpu_rt.

[1]

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000012: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000090-0x0000000000000097]
CPU: 0 PID: 7543 Comm: kworker/u8:17 Not tainted 6.10.0-rc1-syzkaller-00013-g2bfcfd584ff5 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: netns cleanup_net
 RIP: 0010:__fib6_drop_pcpu_from.part.0+0x10a/0x370 net/ipv6/ip6_fib.c:984
Code: f8 48 c1 e8 03 80 3c 28 00 0f 85 16 02 00 00 4d 8b 3f 4d 85 ff 74 31 e8 74 a7 fa f7 49 8d bf 90 00 00 00 48 89 f8 48 c1 e8 03 &lt;80&gt; 3c 28 00 0f 85 1e 02 00 00 49 8b 87 90 00 00 00 48 8b 0c 24 48
RSP: 0018:ffffc900040df070 EFLAGS: 00010206
RAX: 0000000000000012 RBX: 0000000000000001 RCX: ffffffff89932e16
RDX: ffff888049dd1e00 RSI: ffffffff89932d7c RDI: 0000000000000091
RBP: dffffc0000000000 R08: 0000000000000005 R09: 0000000000000007
R10: 0000000000000001 R11: 0000000000000006 R12: ffff88807fa080b8
R13: fffffbfff1a9a07d R14: ffffed100ff41022 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8880b9200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b32c26000 CR3: 000000005d56e000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  __fib6_drop_pcpu_from net/ipv6/ip6_fib.c:966 [inline]
  fib6_drop_pcpu_from net/ipv6/ip6_fib.c:1027 [inline]
  fib6_purge_rt+0x7f2/0x9f0 net/ipv6/ip6_fib.c:1038
  fib6_del_route net/ipv6/ip6_fib.c:1998 [inline]
  fib6_del+0xa70/0x17b0 net/ipv6/ip6_fib.c:2043
  fib6_clean_node+0x426/0x5b0 net/ipv6/ip6_fib.c:2205
  fib6_walk_continue+0x44f/0x8d0 net/ipv6/ip6_fib.c:2127
  fib6_walk+0x182/0x370 net/ipv6/ip6_fib.c:2175
  fib6_clean_tree+0xd7/0x120 net/ipv6/ip6_fib.c:2255
  __fib6_clean_all+0x100/0x2d0 net/ipv6/ip6_fib.c:2271
  rt6_sync_down_dev net/ipv6/route.c:4906 [inline]
  rt6_disable_ip+0x7ed/0xa00 net/ipv6/route.c:4911
  addrconf_ifdown.isra.0+0x117/0x1b40 net/ipv6/addrconf.c:3855
  addrconf_notify+0x223/0x19e0 net/ipv6/addrconf.c:3778
  notifier_call_chain+0xb9/0x410 kernel/notifier.c:93
  call_netdevice_notifiers_info+0xbe/0x140 net/core/dev.c:1992
  call_netdevice_notifiers_extack net/core/dev.c:2030 [inline]
  call_netdevice_notifiers net/core/dev.c:2044 [inline]
  dev_close_many+0x333/0x6a0 net/core/dev.c:1585
  unregister_netdevice_many_notify+0x46d/0x19f0 net/core/dev.c:11193
  unregister_netdevice_many net/core/dev.c:11276 [inline]
  default_device_exit_batch+0x85b/0xae0 net/core/dev.c:11759
  ops_exit_list+0x128/0x180 net/core/net_namespace.c:178
  cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640
  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
  process_scheduled_works kernel/workqueue.c:3312 [inline]
  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
  kthread+0x2c1/0x3a0 kernel/kthread.c:389
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40905/">CVE-2024-40905 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40905">CVE-2024-40905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227761">SUSE bug 1227761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40911" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40911" ref_url="https://www.suse.com/security/cve/CVE-2024-40911" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Lock wiphy in cfg80211_get_station

Wiphy should be locked before calling rdev_get_station() (see lockdep
assert in ieee80211_get_station()).

This fixes the following kernel NULL dereference:

 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050
 Mem abort info:
   ESR = 0x0000000096000006
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x06: level 2 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000006
   CM = 0, WnR = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=0000000003001000
 [0000000000000050] pgd=0800000002dca003, p4d=0800000002dca003, pud=08000000028e9003, pmd=0000000000000000
 Internal error: Oops: 0000000096000006 [#1] SMP
 Modules linked in: netconsole dwc3_meson_g12a dwc3_of_simple dwc3 ip_gre gre ath10k_pci ath10k_core ath9k ath9k_common ath9k_hw ath
 CPU: 0 PID: 1091 Comm: kworker/u8:0 Not tainted 6.4.0-02144-g565f9a3a7911-dirty #705
 Hardware name: RPT (r1) (DT)
 Workqueue: bat_events batadv_v_elp_throughput_metric_update
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : ath10k_sta_statistics+0x10/0x2dc [ath10k_core]
 lr : sta_set_sinfo+0xcc/0xbd4
 sp : ffff000007b43ad0
 x29: ffff000007b43ad0 x28: ffff0000071fa900 x27: ffff00000294ca98
 x26: ffff000006830880 x25: ffff000006830880 x24: ffff00000294c000
 x23: 0000000000000001 x22: ffff000007b43c90 x21: ffff800008898acc
 x20: ffff00000294c6e8 x19: ffff000007b43c90 x18: 0000000000000000
 x17: 445946354d552d78 x16: 62661f7200000000 x15: 57464f445946354d
 x14: 0000000000000000 x13: 00000000000000e3 x12: d5f0acbcebea978e
 x11: 00000000000000e3 x10: 000000010048fe41 x9 : 0000000000000000
 x8 : ffff000007b43d90 x7 : 000000007a1e2125 x6 : 0000000000000000
 x5 : ffff0000024e0900 x4 : ffff800000a0250c x3 : ffff000007b43c90
 x2 : ffff00000294ca98 x1 : ffff000006831920 x0 : 0000000000000000
 Call trace:
  ath10k_sta_statistics+0x10/0x2dc [ath10k_core]
  sta_set_sinfo+0xcc/0xbd4
  ieee80211_get_station+0x2c/0x44
  cfg80211_get_station+0x80/0x154
  batadv_v_elp_get_throughput+0x138/0x1fc
  batadv_v_elp_throughput_metric_update+0x1c/0xa4
  process_one_work+0x1ec/0x414
  worker_thread+0x70/0x46c
  kthread+0xdc/0xe0
  ret_from_fork+0x10/0x20
 Code: a9bb7bfd 910003fd a90153f3 f9411c40 (f9402814)

This happens because STA has time to disconnect and reconnect before
batadv_v_elp_throughput_metric_update() delayed work gets scheduled. In
this situation, ath10k_sta_state() can be in the middle of resetting
arsta data when the work queue get chance to be scheduled and ends up
accessing it. Locking wiphy prevents that.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40911/">CVE-2024-40911 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40911">CVE-2024-40911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227792">SUSE bug 1227792</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40912</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40912" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40912" ref_url="https://www.suse.com/security/cve/CVE-2024-40912" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup()

The ieee80211_sta_ps_deliver_wakeup() function takes sta-&gt;ps_lock to
synchronizes with ieee80211_tx_h_unicast_ps_buf() which is called from
softirq context. However using only spin_lock() to get sta-&gt;ps_lock in
ieee80211_sta_ps_deliver_wakeup() does not prevent softirq to execute
on this same CPU, to run ieee80211_tx_h_unicast_ps_buf() and try to
take this same lock ending in deadlock. Below is an example of rcu stall
that arises in such situation.

 rcu: INFO: rcu_sched self-detected stall on CPU
 rcu:    2-....: (42413413 ticks this GP) idle=b154/1/0x4000000000000000 softirq=1763/1765 fqs=21206996
 rcu:    (t=42586894 jiffies g=2057 q=362405 ncpus=4)
 CPU: 2 PID: 719 Comm: wpa_supplicant Tainted: G        W          6.4.0-02158-g1b062f552873 #742
 Hardware name: RPT (r1) (DT)
 pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : queued_spin_lock_slowpath+0x58/0x2d0
 lr : invoke_tx_handlers_early+0x5b4/0x5c0
 sp : ffff00001ef64660
 x29: ffff00001ef64660 x28: ffff000009bc1070 x27: ffff000009bc0ad8
 x26: ffff000009bc0900 x25: ffff00001ef647a8 x24: 0000000000000000
 x23: ffff000009bc0900 x22: ffff000009bc0900 x21: ffff00000ac0e000
 x20: ffff00000a279e00 x19: ffff00001ef646e8 x18: 0000000000000000
 x17: ffff800016468000 x16: ffff00001ef608c0 x15: 0010533c93f64f80
 x14: 0010395c9faa3946 x13: 0000000000000000 x12: 00000000fa83b2da
 x11: 000000012edeceea x10: ffff0000010fbe00 x9 : 0000000000895440
 x8 : 000000000010533c x7 : ffff00000ad8b740 x6 : ffff00000c350880
 x5 : 0000000000000007 x4 : 0000000000000001 x3 : 0000000000000000
 x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffff00000ac0e0e8
 Call trace:
  queued_spin_lock_slowpath+0x58/0x2d0
  ieee80211_tx+0x80/0x12c
  ieee80211_tx_pending+0x110/0x278
  tasklet_action_common.constprop.0+0x10c/0x144
  tasklet_action+0x20/0x28
  _stext+0x11c/0x284
  ____do_softirq+0xc/0x14
  call_on_irq_stack+0x24/0x34
  do_softirq_own_stack+0x18/0x20
  do_softirq+0x74/0x7c
  __local_bh_enable_ip+0xa0/0xa4
  _ieee80211_wake_txqs+0x3b0/0x4b8
  __ieee80211_wake_queue+0x12c/0x168
  ieee80211_add_pending_skbs+0xec/0x138
  ieee80211_sta_ps_deliver_wakeup+0x2a4/0x480
  ieee80211_mps_sta_status_update.part.0+0xd8/0x11c
  ieee80211_mps_sta_status_update+0x18/0x24
  sta_apply_parameters+0x3bc/0x4c0
  ieee80211_change_station+0x1b8/0x2dc
  nl80211_set_station+0x444/0x49c
  genl_family_rcv_msg_doit.isra.0+0xa4/0xfc
  genl_rcv_msg+0x1b0/0x244
  netlink_rcv_skb+0x38/0x10c
  genl_rcv+0x34/0x48
  netlink_unicast+0x254/0x2bc
  netlink_sendmsg+0x190/0x3b4
  ____sys_sendmsg+0x1e8/0x218
  ___sys_sendmsg+0x68/0x8c
  __sys_sendmsg+0x44/0x84
  __arm64_sys_sendmsg+0x20/0x28
  do_el0_svc+0x6c/0xe8
  el0_svc+0x14/0x48
  el0t_64_sync_handler+0xb0/0xb4
  el0t_64_sync+0x14c/0x150

Using spin_lock_bh()/spin_unlock_bh() instead prevents softirq to raise
on the same CPU that is holding the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40912/">CVE-2024-40912 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40912">CVE-2024-40912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227790">SUSE bug 1227790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40914" ref_url="https://www.suse.com/security/cve/CVE-2024-40914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: don't unpoison huge_zero_folio

When I did memory failure tests recently, below panic occurs:

 kernel BUG at include/linux/mm.h:1135!
 invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 9 PID: 137 Comm: kswapd1 Not tainted 6.9.0-rc4-00491-gd5ce28f156fe-dirty #14
 RIP: 0010:shrink_huge_zero_page_scan+0x168/0x1a0
 RSP: 0018:ffff9933c6c57bd0 EFLAGS: 00000246
 RAX: 000000000000003e RBX: 0000000000000000 RCX: ffff88f61fc5c9c8
 RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff88f61fc5c9c0
 RBP: ffffcd7c446b0000 R08: ffffffff9a9405f0 R09: 0000000000005492
 R10: 00000000000030ea R11: ffffffff9a9405f0 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: ffff88e703c4ac00
 FS:  0000000000000000(0000) GS:ffff88f61fc40000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000055f4da6e9878 CR3: 0000000c71048000 CR4: 00000000000006f0
 Call Trace:
  &lt;TASK&gt;
  do_shrink_slab+0x14f/0x6a0
  shrink_slab+0xca/0x8c0
  shrink_node+0x2d0/0x7d0
  balance_pgdat+0x33a/0x720
  kswapd+0x1f3/0x410
  kthread+0xd5/0x100
  ret_from_fork+0x2f/0x50
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;
 Modules linked in: mce_inject hwpoison_inject
 ---[ end trace 0000000000000000 ]---
 RIP: 0010:shrink_huge_zero_page_scan+0x168/0x1a0
 RSP: 0018:ffff9933c6c57bd0 EFLAGS: 00000246
 RAX: 000000000000003e RBX: 0000000000000000 RCX: ffff88f61fc5c9c8
 RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff88f61fc5c9c0
 RBP: ffffcd7c446b0000 R08: ffffffff9a9405f0 R09: 0000000000005492
 R10: 00000000000030ea R11: ffffffff9a9405f0 R12: 0000000000000000
 R13: 0000000000000000 R14: 0000000000000000 R15: ffff88e703c4ac00
 FS:  0000000000000000(0000) GS:ffff88f61fc40000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000055f4da6e9878 CR3: 0000000c71048000 CR4: 00000000000006f0

The root cause is that HWPoison flag will be set for huge_zero_folio
without increasing the folio refcnt.  But then unpoison_memory() will
decrease the folio refcnt unexpectedly as it appears like a successfully
hwpoisoned folio leading to VM_BUG_ON_PAGE(page_ref_count(page) == 0) when
releasing huge_zero_folio.

Skip unpoisoning huge_zero_folio in unpoison_memory() to fix this issue. 
We're not prepared to unpoison huge_zero_folio yet.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40914/">CVE-2024-40914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40914">CVE-2024-40914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227842">SUSE bug 1227842</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40927" ref_url="https://www.suse.com/security/cve/CVE-2024-40927" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: Handle TD clearing for multiple streams case

When multiple streams are in use, multiple TDs might be in flight when
an endpoint is stopped. We need to issue a Set TR Dequeue Pointer for
each, to ensure everything is reset properly and the caches cleared.
Change the logic so that any N&gt;1 TDs found active for different streams
are deferred until after the first one is processed, calling
xhci_invalidate_cancelled_tds() again from xhci_handle_cmd_set_deq() to
queue another command until we are done with all of them. Also change
the error/"should never happen" paths to ensure we at least clear any
affected TDs, even if we can't issue a command to clear the hardware
cache, and complain loudly with an xhci_warn() if this ever happens.

This problem case dates back to commit e9df17eb1408 ("USB: xhci: Correct
assumptions about number of rings per endpoint.") early on in the XHCI
driver's life, when stream support was first added.
It was then identified but not fixed nor made into a warning in commit
674f8438c121 ("xhci: split handling halted endpoints into two steps"),
which added a FIXME comment for the problem case (without materially
changing the behavior as far as I can tell, though the new logic made
the problem more obvious).

Then later, in commit 94f339147fc3 ("xhci: Fix failure to give back some
cached cancelled URBs."), it was acknowledged again.

[Mathias: commit 94f339147fc3 ("xhci: Fix failure to give back some cached
cancelled URBs.") was a targeted regression fix to the previously mentioned
patch. Users reported issues with usb stuck after unmounting/disconnecting
UAS devices. This rolled back the TD clearing of multiple streams to its
original state.]

Apparently the commit author was aware of the problem (yet still chose
to submit it): It was still mentioned as a FIXME, an xhci_dbg() was
added to log the problem condition, and the remaining issue was mentioned
in the commit description. The choice of making the log type xhci_dbg()
for what is, at this point, a completely unhandled and known broken
condition is puzzling and unfortunate, as it guarantees that no actual
users would see the log in production, thereby making it nigh
undebuggable (indeed, even if you turn on DEBUG, the message doesn't
really hint at there being a problem at all).

It took me *months* of random xHC crashes to finally find a reliable
repro and be able to do a deep dive debug session, which could all have
been avoided had this unhandled, broken condition been actually reported
with a warning, as it should have been as a bug intentionally left in
unfixed (never mind that it shouldn't have been left in at all).

&gt; Another fix to solve clearing the caches of all stream rings with
&gt; cancelled TDs is needed, but not as urgent.

3 years after that statement and 14 years after the original bug was
introduced, I think it's finally time to fix it. And maybe next time
let's not leave bugs unfixed (that are actually worse than the original
bug), and let's actually get people to review kernel commits please.

Fixes xHC crashes and IOMMU faults with UAS devices when handling
errors/faults. Easiest repro is to use `hdparm` to mark an early sector
(e.g. 1024) on a disk as bad, then `cat /dev/sdX &gt; /dev/null` in a loop.
At least in the case of JMicron controllers, the read errors end up
having to cancel two TDs (for two queued requests to different streams)
and the one that didn't get cleared properly ends up faulting the xHC
entirely when it tries to access DMA pages that have since been unmapped,
referred to by the stale TDs. This normally happens quickly (after two
or three loops). After this fix, I left the `cat` in a loop running
overnight and experienced no xHC failures, with all read errors
recovered properly. Repro'd and tested on an Apple M1 Mac Mini
(dwc3 host).

On systems without an IOMMU, this bug would instead silently corrupt
freed memory, making this a
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40927/">CVE-2024-40927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40927">CVE-2024-40927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227816">SUSE bug 1227816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40928" ref_url="https://www.suse.com/security/cve/CVE-2024-40928" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethtool: fix the error condition in ethtool_get_phy_stats_ethtool()

Clang static checker (scan-build) warning:
net/ethtool/ioctl.c:line 2233, column 2
Called function pointer is null (null dereference).

Return '-EOPNOTSUPP' when 'ops-&gt;get_ethtool_phy_stats' is NULL to fix
this typo error.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40928/">CVE-2024-40928 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40928">CVE-2024-40928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227788">SUSE bug 1227788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40929" ref_url="https://www.suse.com/security/cve/CVE-2024-40929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: check n_ssids before accessing the ssids

In some versions of cfg80211, the ssids poinet might be a valid one even
though n_ssids is 0. Accessing the pointer in this case will cuase an
out-of-bound access. Fix this by checking n_ssids first.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40929/">CVE-2024-40929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40929">CVE-2024-40929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227774">SUSE bug 1227774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40931" ref_url="https://www.suse.com/security/cve/CVE-2024-40931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: ensure snd_una is properly initialized on connect

This is strictly related to commit fb7a0d334894 ("mptcp: ensure snd_nxt
is properly initialized on connect"). It turns out that syzkaller can
trigger the retransmit after fallback and before processing any other
incoming packet - so that snd_una is still left uninitialized.

Address the issue explicitly initializing snd_una together with snd_nxt
and write_seq.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-40931/">CVE-2024-40931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40931">CVE-2024-40931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227780">SUSE bug 1227780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40936" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40936" ref_url="https://www.suse.com/security/cve/CVE-2024-40936" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/region: Fix memregion leaks in devm_cxl_add_region()

Move the mode verification to __create_region() before allocating the
memregion to avoid the memregion leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-40936/">CVE-2024-40936 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40936">CVE-2024-40936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227833">SUSE bug 1227833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40939" ref_url="https://www.suse.com/security/cve/CVE-2024-40939" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: iosm: Fix tainted pointer delete is case of region creation fail

In case of region creation fail in ipc_devlink_create_region(), previously
created regions delete process starts from tainted pointer which actually
holds error code value.
Fix this bug by decreasing region index before delete.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40939/">CVE-2024-40939 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40939">CVE-2024-40939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227799">SUSE bug 1227799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40941</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40941" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40941" ref_url="https://www.suse.com/security/cve/CVE-2024-40941" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't read past the mfuart notifcation

In case the firmware sends a notification that claims it has more data
than it has, we will read past that was allocated for the notification.
Remove the print of the buffer, we won't see it by default. If needed,
we can see the content with tracing.

This was reported by KFENCE.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40941/">CVE-2024-40941 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40941">CVE-2024-40941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227771">SUSE bug 1227771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40954</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40954" ref_url="https://www.suse.com/security/cve/CVE-2024-40954" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3631-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3670-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019631.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3706-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: do not leave a dangling sk pointer, when socket creation fails

It is possible to trigger a use-after-free by:
  * attaching an fentry probe to __sock_release() and the probe calling the
    bpf_get_socket_cookie() helper
  * running traceroute -I 1.1.1.1 on a freshly booted VM

A KASAN enabled kernel will log something like below (decoded and stripped):
==================================================================
BUG: KASAN: slab-use-after-free in __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
Read of size 8 at addr ffff888007110dd8 by task traceroute/299

CPU: 2 PID: 299 Comm: traceroute Tainted: G            E      6.10.0-rc2+ #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
Call Trace:
 &lt;TASK&gt;
dump_stack_lvl (lib/dump_stack.c:117 (discriminator 1))
print_report (mm/kasan/report.c:378 mm/kasan/report.c:488)
? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
kasan_report (mm/kasan/report.c:603)
? __sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
kasan_check_range (mm/kasan/generic.c:183 mm/kasan/generic.c:189)
__sock_gen_cookie (./arch/x86/include/asm/atomic64_64.h:15 ./include/linux/atomic/atomic-arch-fallback.h:2583 ./include/linux/atomic/atomic-instrumented.h:1611 net/core/sock_diag.c:29)
bpf_get_socket_ptr_cookie (./arch/x86/include/asm/preempt.h:94 ./include/linux/sock_diag.h:42 net/core/filter.c:5094 net/core/filter.c:5092)
bpf_prog_875642cf11f1d139___sock_release+0x6e/0x8e
bpf_trampoline_6442506592+0x47/0xaf
__sock_release (net/socket.c:652)
__sock_create (net/socket.c:1601)
...
Allocated by task 299 on cpu 2 at 78.328492s:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (mm/kasan/common.c:68)
__kasan_slab_alloc (mm/kasan/common.c:312 mm/kasan/common.c:338)
kmem_cache_alloc_noprof (mm/slub.c:3941 mm/slub.c:4000 mm/slub.c:4007)
sk_prot_alloc (net/core/sock.c:2075)
sk_alloc (net/core/sock.c:2134)
inet_create (net/ipv4/af_inet.c:327 net/ipv4/af_inet.c:252)
__sock_create (net/socket.c:1572)
__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)
__x64_sys_socket (net/socket.c:1718)
do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Freed by task 299 on cpu 2 at 78.328502s:
kasan_save_stack (mm/kasan/common.c:48)
kasan_save_track (mm/kasan/common.c:68)
kasan_save_free_info (mm/kasan/generic.c:582)
poison_slab_object (mm/kasan/common.c:242)
__kasan_slab_free (mm/kasan/common.c:256)
kmem_cache_free (mm/slub.c:4437 mm/slub.c:4511)
__sk_destruct (net/core/sock.c:2117 net/core/sock.c:2208)
inet_create (net/ipv4/af_inet.c:397 net/ipv4/af_inet.c:252)
__sock_create (net/socket.c:1572)
__sys_socket (net/socket.c:1660 net/socket.c:1644 net/socket.c:1706)
__x64_sys_socket (net/socket.c:1718)
do_syscall_64 (arch/x86/entry/common.c:52 arch/x86/entry/common.c:83)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

Fix this by clearing the struct socket reference in sk_common_release() to cover
all protocol families create functions, which may already attached the
reference to the sk object with sock_init_data().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40954/">CVE-2024-40954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40954">CVE-2024-40954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227808">SUSE bug 1227808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228786">SUSE bug 1228786</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40956" ref_url="https://www.suse.com/security/cve/CVE-2024-40956" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list

Use list_for_each_entry_safe() to allow iterating through the list and
deleting the entry in the iteration process. The descriptor is freed via
idxd_desc_complete() and there's a slight chance may cause issue for
the list iterator when the descriptor is reused by another thread
without it being deleted from the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-40956/">CVE-2024-40956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40956">CVE-2024-40956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227810">SUSE bug 1227810</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228585">SUSE bug 1228585</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40957</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40957" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40957" ref_url="https://www.suse.com/security/cve/CVE-2024-40957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

seg6: fix parameter passing when calling NF_HOOK() in End.DX4 and End.DX6 behaviors

input_action_end_dx4() and input_action_end_dx6() are called NF_HOOK() for
PREROUTING hook, in PREROUTING hook, we should passing a valid indev,
and a NULL outdev to NF_HOOK(), otherwise may trigger a NULL pointer
dereference, as below:

    [74830.647293] BUG: kernel NULL pointer dereference, address: 0000000000000090
    [74830.655633] #PF: supervisor read access in kernel mode
    [74830.657888] #PF: error_code(0x0000) - not-present page
    [74830.659500] PGD 0 P4D 0
    [74830.660450] Oops: 0000 [#1] PREEMPT SMP PTI
    ...
    [74830.664953] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011
    [74830.666569] RIP: 0010:rpfilter_mt+0x44/0x15e [ipt_rpfilter]
    ...
    [74830.689725] Call Trace:
    [74830.690402]  &lt;IRQ&gt;
    [74830.690953]  ? show_trace_log_lvl+0x1c4/0x2df
    [74830.692020]  ? show_trace_log_lvl+0x1c4/0x2df
    [74830.693095]  ? ipt_do_table+0x286/0x710 [ip_tables]
    [74830.694275]  ? __die_body.cold+0x8/0xd
    [74830.695205]  ? page_fault_oops+0xac/0x140
    [74830.696244]  ? exc_page_fault+0x62/0x150
    [74830.697225]  ? asm_exc_page_fault+0x22/0x30
    [74830.698344]  ? rpfilter_mt+0x44/0x15e [ipt_rpfilter]
    [74830.699540]  ipt_do_table+0x286/0x710 [ip_tables]
    [74830.700758]  ? ip6_route_input+0x19d/0x240
    [74830.701752]  nf_hook_slow+0x3f/0xb0
    [74830.702678]  input_action_end_dx4+0x19b/0x1e0
    [74830.703735]  ? input_action_end_t+0xe0/0xe0
    [74830.704734]  seg6_local_input_core+0x2d/0x60
    [74830.705782]  lwtunnel_input+0x5b/0xb0
    [74830.706690]  __netif_receive_skb_one_core+0x63/0xa0
    [74830.707825]  process_backlog+0x99/0x140
    [74830.709538]  __napi_poll+0x2c/0x160
    [74830.710673]  net_rx_action+0x296/0x350
    [74830.711860]  __do_softirq+0xcb/0x2ac
    [74830.713049]  do_softirq+0x63/0x90

input_action_end_dx4() passing a NULL indev to NF_HOOK(), and finally
trigger a NULL dereference in rpfilter_mt()-&gt;rpfilter_is_loopback():

    static bool
    rpfilter_is_loopback(const struct sk_buff *skb,
          	       const struct net_device *in)
    {
            // in is NULL
            return skb-&gt;pkt_type == PACKET_LOOPBACK ||
          	 in-&gt;flags &amp; IFF_LOOPBACK;
    }
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40957/">CVE-2024-40957 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40957">CVE-2024-40957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227811">SUSE bug 1227811</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40958" ref_url="https://www.suse.com/security/cve/CVE-2024-40958" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netns: Make get_net_ns() handle zero refcount net

Syzkaller hit a warning:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0
Modules linked in:
CPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
RIP: 0010:refcount_warn_saturate+0xdf/0x1d0
Code: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 &lt;0f&gt; 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1
RSP: 0018:ffff8881067b7da0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac
RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001
RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139
R10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4
R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040
FS:  00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0xa3/0xc0
 ? __warn+0xa5/0x1c0
 ? refcount_warn_saturate+0xdf/0x1d0
 ? report_bug+0x1fc/0x2d0
 ? refcount_warn_saturate+0xdf/0x1d0
 ? handle_bug+0xa1/0x110
 ? exc_invalid_op+0x3c/0xb0
 ? asm_exc_invalid_op+0x1f/0x30
 ? __warn_printk+0xcc/0x140
 ? __warn_printk+0xd5/0x140
 ? refcount_warn_saturate+0xdf/0x1d0
 get_net_ns+0xa4/0xc0
 ? __pfx_get_net_ns+0x10/0x10
 open_related_ns+0x5a/0x130
 __tun_chr_ioctl+0x1616/0x2370
 ? __sanitizer_cov_trace_switch+0x58/0xa0
 ? __sanitizer_cov_trace_const_cmp2+0x1c/0x30
 ? __pfx_tun_chr_ioctl+0x10/0x10
 tun_chr_ioctl+0x2f/0x40
 __x64_sys_ioctl+0x11b/0x160
 x64_sys_call+0x1211/0x20d0
 do_syscall_64+0x9e/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5b28f165d7
Code: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8
RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7
RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0
R10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730
R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;
Kernel panic - not syncing: kernel: panic_on_warn set ...

This is trigger as below:
          ns0                                    ns1
tun_set_iff() //dev is tun0
   tun-&gt;dev = dev
//ip link set tun0 netns ns1
                                       put_net() //ref is 0
__tun_chr_ioctl() //TUNGETDEVNETNS
   net = dev_net(tun-&gt;dev);
   open_related_ns(&amp;net-&gt;ns, get_net_ns); //ns1
     get_net_ns()
        get_net() //addition on 0

Use maybe_get_net() in get_net_ns in case net's ref is zero to fix this
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40958/">CVE-2024-40958 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40958">CVE-2024-40958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227812">SUSE bug 1227812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40959</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40959" ref_url="https://www.suse.com/security/cve/CVE-2024-40959" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr()

ip6_dst_idev() can return NULL, xfrm6_get_saddr() must act accordingly.

syzbot reported:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 PID: 12 Comm: kworker/u8:1 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker
 RIP: 0010:xfrm6_get_saddr+0x93/0x130 net/ipv6/xfrm6_policy.c:64
Code: df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 97 00 00 00 4c 8b ab d8 00 00 00 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 86 00 00 00 4d 8b 6d 00 e8 ca 13 47 01 48 b8 00
RSP: 0018:ffffc90000117378 EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff88807b079dc0 RCX: ffffffff89a0d6d7
RDX: 0000000000000000 RSI: ffffffff89a0d6e9 RDI: ffff88807b079e98
RBP: ffff88807ad73248 R08: 0000000000000007 R09: fffffffffffff000
R10: ffff88807b079dc0 R11: 0000000000000007 R12: ffffc90000117480
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4586d00440 CR3: 0000000079042000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  xfrm_get_saddr net/xfrm/xfrm_policy.c:2452 [inline]
  xfrm_tmpl_resolve_one net/xfrm/xfrm_policy.c:2481 [inline]
  xfrm_tmpl_resolve+0xa26/0xf10 net/xfrm/xfrm_policy.c:2541
  xfrm_resolve_and_create_bundle+0x140/0x2570 net/xfrm/xfrm_policy.c:2835
  xfrm_bundle_lookup net/xfrm/xfrm_policy.c:3070 [inline]
  xfrm_lookup_with_ifid+0x4d1/0x1e60 net/xfrm/xfrm_policy.c:3201
  xfrm_lookup net/xfrm/xfrm_policy.c:3298 [inline]
  xfrm_lookup_route+0x3b/0x200 net/xfrm/xfrm_policy.c:3309
  ip6_dst_lookup_flow+0x15c/0x1d0 net/ipv6/ip6_output.c:1256
  send6+0x611/0xd20 drivers/net/wireguard/socket.c:139
  wg_socket_send_skb_to_peer+0xf9/0x220 drivers/net/wireguard/socket.c:178
  wg_socket_send_buffer_to_peer+0x12b/0x190 drivers/net/wireguard/socket.c:200
  wg_packet_send_handshake_initiation+0x227/0x360 drivers/net/wireguard/send.c:40
  wg_packet_handshake_send_worker+0x1c/0x30 drivers/net/wireguard/send.c:51
  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
  process_scheduled_works kernel/workqueue.c:3312 [inline]
  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
  kthread+0x2c1/0x3a0 kernel/kthread.c:389
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40959/">CVE-2024-40959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40959">CVE-2024-40959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227884">SUSE bug 1227884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40960" ref_url="https://www.suse.com/security/cve/CVE-2024-40960" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible NULL dereference in rt6_probe()

syzbot caught a NULL dereference in rt6_probe() [1]

Bail out if  __in6_dev_get() returns NULL.

[1]
Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cb: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000658-0x000000000000065f]
CPU: 1 PID: 22444 Comm: syz-executor.0 Not tainted 6.10.0-rc2-syzkaller-00383-gb8481381d4e2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
 RIP: 0010:rt6_probe net/ipv6/route.c:656 [inline]
 RIP: 0010:find_match+0x8c4/0xf50 net/ipv6/route.c:758
Code: 14 fd f7 48 8b 85 38 ff ff ff 48 c7 45 b0 00 00 00 00 48 8d b8 5c 06 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;0f&gt; b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 19
RSP: 0018:ffffc900034af070 EFLAGS: 00010203
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90004521000
RDX: 00000000000000cb RSI: ffffffff8990d0cd RDI: 000000000000065c
RBP: ffffc900034af150 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000002 R12: 000000000000000a
R13: 1ffff92000695e18 R14: ffff8880244a1d20 R15: 0000000000000000
FS:  00007f4844a5a6c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b31b27000 CR3: 000000002d42c000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  rt6_nh_find_match+0xfa/0x1a0 net/ipv6/route.c:784
  nexthop_for_each_fib6_nh+0x26d/0x4a0 net/ipv4/nexthop.c:1496
  __find_rr_leaf+0x6e7/0xe00 net/ipv6/route.c:825
  find_rr_leaf net/ipv6/route.c:853 [inline]
  rt6_select net/ipv6/route.c:897 [inline]
  fib6_table_lookup+0x57e/0xa30 net/ipv6/route.c:2195
  ip6_pol_route+0x1cd/0x1150 net/ipv6/route.c:2231
  pol_lookup_func include/net/ip6_fib.h:616 [inline]
  fib6_rule_lookup+0x386/0x720 net/ipv6/fib6_rules.c:121
  ip6_route_output_flags_noref net/ipv6/route.c:2639 [inline]
  ip6_route_output_flags+0x1d0/0x640 net/ipv6/route.c:2651
  ip6_dst_lookup_tail.constprop.0+0x961/0x1760 net/ipv6/ip6_output.c:1147
  ip6_dst_lookup_flow+0x99/0x1d0 net/ipv6/ip6_output.c:1250
  rawv6_sendmsg+0xdab/0x4340 net/ipv6/raw.c:898
  inet_sendmsg+0x119/0x140 net/ipv4/af_inet.c:853
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg net/socket.c:745 [inline]
  sock_write_iter+0x4b8/0x5c0 net/socket.c:1160
  new_sync_write fs/read_write.c:497 [inline]
  vfs_write+0x6b6/0x1140 fs/read_write.c:590
  ksys_write+0x1f8/0x260 fs/read_write.c:643
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40960/">CVE-2024-40960 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40960">CVE-2024-40960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227813">SUSE bug 1227813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40961" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40961" ref_url="https://www.suse.com/security/cve/CVE-2024-40961" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent possible NULL deref in fib6_nh_init()

syzbot reminds us that in6_dev_get() can return NULL.

fib6_nh_init()
    ip6_validate_gw(  &amp;idev  )
        ip6_route_check_nh(  idev  )
            *idev = in6_dev_get(dev); // can be NULL

Oops: general protection fault, probably for non-canonical address 0xdffffc00000000bc: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x00000000000005e0-0x00000000000005e7]
CPU: 0 PID: 11237 Comm: syz-executor.3 Not tainted 6.10.0-rc2-syzkaller-00249-gbe27b8965297 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
 RIP: 0010:fib6_nh_init+0x640/0x2160 net/ipv6/route.c:3606
Code: 00 00 fc ff df 4c 8b 64 24 58 48 8b 44 24 28 4c 8b 74 24 30 48 89 c1 48 89 44 24 28 48 8d 98 e0 05 00 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 0f b6 04 38 84 c0 0f 85 b3 17 00 00 8b 1b 31 ff 89 de e8 b8 8b
RSP: 0018:ffffc900032775a0 EFLAGS: 00010202
RAX: 00000000000000bc RBX: 00000000000005e0 RCX: 0000000000000000
RDX: 0000000000000010 RSI: ffffc90003277a54 RDI: ffff88802b3a08d8
RBP: ffffc900032778b0 R08: 00000000000002fc R09: 0000000000000000
R10: 00000000000002fc R11: 0000000000000000 R12: ffff88802b3a08b8
R13: 1ffff9200064eec8 R14: ffffc90003277a00 R15: dffffc0000000000
FS:  00007f940feb06c0(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 00000000245e8000 CR4: 00000000003506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  ip6_route_info_create+0x99e/0x12b0 net/ipv6/route.c:3809
  ip6_route_add+0x28/0x160 net/ipv6/route.c:3853
  ipv6_route_ioctl+0x588/0x870 net/ipv6/route.c:4483
  inet6_ioctl+0x21a/0x280 net/ipv6/af_inet6.c:579
  sock_do_ioctl+0x158/0x460 net/socket.c:1222
  sock_ioctl+0x629/0x8e0 net/socket.c:1341
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f940f07cea9
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40961/">CVE-2024-40961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40961">CVE-2024-40961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227814">SUSE bug 1227814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879629" comment="bpftool-7.3.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879630" comment="kernel-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879631" comment="kernel-abi-stablelists-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879632" comment="kernel-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879633" comment="kernel-cross-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879634" comment="kernel-debug-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879635" comment="kernel-debug-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879638" comment="kernel-debug-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879639" comment="kernel-debug-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879640" comment="kernel-debug-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879641" comment="kernel-debug-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879644" comment="kernel-doc-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879645" comment="kernel-headers-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879646" comment="kernel-modules-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879647" comment="kernel-modules-core-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879648" comment="kernel-modules-extra-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879649" comment="kernel-tools-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879650" comment="kernel-tools-libs-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879652" comment="kernel-uki-virt-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879653" comment="libperf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879654" comment="perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879655" comment="python3-perf-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879656" comment="rtla-5.14.0-427.31.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879657" comment="rv-5.14.0-427.31.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40972</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40972" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40972" ref_url="https://www.suse.com/security/cve/CVE-2024-40972" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: do not create EA inode under buffer lock

ext4_xattr_set_entry() creates new EA inodes while holding buffer lock
on the external xattr block. This is problematic as it nests all the
allocation locking (which acquires locks on other buffers) under the
buffer lock. This can even deadlock when the filesystem is corrupted and
e.g. quota file is setup to contain xattr block as data block. Move the
allocation of EA inode out of ext4_xattr_set_entry() into the callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40972/">CVE-2024-40972 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40972">CVE-2024-40972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227910">SUSE bug 1227910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40977" ref_url="https://www.suse.com/security/cve/CVE-2024-40977" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7921s: fix potential hung tasks during chip recovery

During chip recovery (e.g. chip reset), there is a possible situation that
kernel worker reset_work is holding the lock and waiting for kernel thread
stat_worker to be parked, while stat_worker is waiting for the release of
the same lock.
It causes a deadlock resulting in the dumping of hung tasks messages and
possible rebooting of the device.

This patch prevents the execution of stat_worker during the chip recovery.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40977/">CVE-2024-40977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40977">CVE-2024-40977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227950">SUSE bug 1227950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40978</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40978" ref_url="https://www.suse.com/security/cve/CVE-2024-40978" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qedi: Fix crash while reading debugfs attribute

The qedi_dbg_do_not_recover_cmd_read() function invokes sprintf() directly
on a __user pointer, which results into the crash.

To fix this issue, use a small local stack buffer for sprintf() and then
call simple_read_from_buffer(), which in turns make the copy_to_user()
call.

BUG: unable to handle page fault for address: 00007f4801111000
PGD 8000000864df6067 P4D 8000000864df6067 PUD 864df7067 PMD 846028067 PTE 0
Oops: 0002 [#1] PREEMPT SMP PTI
Hardware name: HPE ProLiant DL380 Gen10/ProLiant DL380 Gen10, BIOS U30 06/15/2023
RIP: 0010:memcpy_orig+0xcd/0x130
RSP: 0018:ffffb7a18c3ffc40 EFLAGS: 00010202
RAX: 00007f4801111000 RBX: 00007f4801111000 RCX: 000000000000000f
RDX: 000000000000000f RSI: ffffffffc0bfd7a0 RDI: 00007f4801111000
RBP: ffffffffc0bfd7a0 R08: 725f746f6e5f6f64 R09: 3d7265766f636572
R10: ffffb7a18c3ffd08 R11: 0000000000000000 R12: 00007f4881110fff
R13: 000000007fffffff R14: ffffb7a18c3ffca0 R15: ffffffffc0bfd7af
FS:  00007f480118a740(0000) GS:ffff98e38af00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4801111000 CR3: 0000000864b8e001 CR4: 00000000007706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1a/0x60
 ? page_fault_oops+0x183/0x510
 ? exc_page_fault+0x69/0x150
 ? asm_exc_page_fault+0x22/0x30
 ? memcpy_orig+0xcd/0x130
 vsnprintf+0x102/0x4c0
 sprintf+0x51/0x80
 qedi_dbg_do_not_recover_cmd_read+0x2f/0x50 [qedi 6bcfdeeecdea037da47069eca2ba717c84a77324]
 full_proxy_read+0x50/0x80
 vfs_read+0xa5/0x2e0
 ? folio_add_new_anon_rmap+0x44/0xa0
 ? set_pte_at+0x15/0x30
 ? do_pte_missing+0x426/0x7f0
 ksys_read+0xa5/0xe0
 do_syscall_64+0x58/0x80
 ? __count_memcg_events+0x46/0x90
 ? count_memcg_event_mm+0x3d/0x60
 ? handle_mm_fault+0x196/0x2f0
 ? do_user_addr_fault+0x267/0x890
 ? exc_page_fault+0x69/0x150
 entry_SYSCALL_64_after_hwframe+0x72/0xdc
RIP: 0033:0x7f4800f20b4d
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40978/">CVE-2024-40978 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40978">CVE-2024-40978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227929">SUSE bug 1227929</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40983" ref_url="https://www.suse.com/security/cve/CVE-2024-40983" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: force a dst refcount before doing decryption

As it says in commit 3bc07321ccc2 ("xfrm: Force a dst refcount before
entering the xfrm type handlers"):

"Crypto requests might return asynchronous. In this case we leave the
 rcu protected region, so force a refcount on the skb's destination
 entry before we enter the xfrm type input/output handlers."

On TIPC decryption path it has the same problem, and skb_dst_force()
should be called before doing decryption to avoid a possible crash.

Shuang reported this issue when this warning is triggered:

  [] WARNING: include/net/dst.h:337 tipc_sk_rcv+0x1055/0x1ea0 [tipc]
  [] Kdump: loaded Tainted: G W --------- - - 4.18.0-496.el8.x86_64+debug
  [] Workqueue: crypto cryptd_queue_worker
  [] RIP: 0010:tipc_sk_rcv+0x1055/0x1ea0 [tipc]
  [] Call Trace:
  [] tipc_sk_mcast_rcv+0x548/0xea0 [tipc]
  [] tipc_rcv+0xcf5/0x1060 [tipc]
  [] tipc_aead_decrypt_done+0x215/0x2e0 [tipc]
  [] cryptd_aead_crypt+0xdb/0x190
  [] cryptd_queue_worker+0xed/0x190
  [] process_one_work+0x93d/0x17e0
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40983/">CVE-2024-40983 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40983">CVE-2024-40983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227819">SUSE bug 1227819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40984" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40984" ref_url="https://www.suse.com/security/cve/CVE-2024-40984" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Revert "ACPICA: avoid Info: mapping multiple BARs. Your kernel is fine."

Undo the modifications made in commit d410ee5109a1 ("ACPICA: avoid
"Info: mapping multiple BARs. Your kernel is fine.""). The initial
purpose of this commit was to stop memory mappings for operation
regions from overlapping page boundaries, as it can trigger warnings
if different page attributes are present.

However, it was found that when this situation arises, mapping
continues until the boundary's end, but there is still an attempt to
read/write the entire length of the map, leading to a NULL pointer
deference. For example, if a four-byte mapping request is made but
only one byte is mapped because it hits the current page boundary's
end, a four-byte read/write attempt is still made, resulting in a NULL
pointer deference.

Instead, map the entire length, as the ACPI specification does not
mandate that it must be within the same page boundary. It is
permissible for it to be mapped across different regions.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40984/">CVE-2024-40984 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40984">CVE-2024-40984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227820">SUSE bug 1227820</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40995</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40995" ref_url="https://www.suse.com/security/cve/CVE-2024-40995" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc()

syzbot found hanging tasks waiting on rtnl_lock [1]

A reproducer is available in the syzbot bug.

When a request to add multiple actions with the same index is sent, the
second request will block forever on the first request. This holds
rtnl_lock, and causes tasks to hang.

Return -EAGAIN to prevent infinite looping, while keeping documented
behavior.

[1]

INFO: task kworker/1:0:5088 blocked for more than 143 seconds.
Not tainted 6.9.0-rc4-syzkaller-00173-g3cdb45594619 #0
"echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:D stack:23744 pid:5088 tgid:5088 ppid:2 flags:0x00004000
Workqueue: events_power_efficient reg_check_chans_work
Call Trace:
&lt;TASK&gt;
context_switch kernel/sched/core.c:5409 [inline]
__schedule+0xf15/0x5d00 kernel/sched/core.c:6746
__schedule_loop kernel/sched/core.c:6823 [inline]
schedule+0xe7/0x350 kernel/sched/core.c:6838
schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6895
__mutex_lock_common kernel/locking/mutex.c:684 [inline]
__mutex_lock+0x5b8/0x9c0 kernel/locking/mutex.c:752
wiphy_lock include/net/cfg80211.h:5953 [inline]
reg_leave_invalid_chans net/wireless/reg.c:2466 [inline]
reg_check_chans_work+0x10a/0x10e0 net/wireless/reg.c:2481
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40995/">CVE-2024-40995 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40995">CVE-2024-40995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227830">SUSE bug 1227830</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202440998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-40998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-40998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-40998" ref_url="https://www.suse.com/security/cve/CVE-2024-40998" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix uninitialized ratelimit_state-&gt;lock access in __ext4_fill_super()

In the following concurrency we will access the uninitialized rs-&gt;lock:

ext4_fill_super
  ext4_register_sysfs
   // sysfs registered msg_ratelimit_interval_ms
                             // Other processes modify rs-&gt;interval to
                             // non-zero via msg_ratelimit_interval_ms
  ext4_orphan_cleanup
    ext4_msg(sb, KERN_INFO, "Errors on filesystem, "
      __ext4_msg
        ___ratelimit(&amp;(EXT4_SB(sb)-&gt;s_msg_ratelimit_state)
          if (!rs-&gt;interval)  // do nothing if interval is 0
            return 1;
          raw_spin_trylock_irqsave(&amp;rs-&gt;lock, flags)
            raw_spin_trylock(lock)
              _raw_spin_trylock
                __raw_spin_trylock
                  spin_acquire(&amp;lock-&gt;dep_map, 0, 1, _RET_IP_)
                    lock_acquire
                      __lock_acquire
                        register_lock_class
                          assign_lock_key
                            dump_stack();
  ratelimit_state_init(&amp;sbi-&gt;s_msg_ratelimit_state, 5 * HZ, 10);
    raw_spin_lock_init(&amp;rs-&gt;lock);
    // init rs-&gt;lock here

and get the following dump_stack:

=========================================================
INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 12 PID: 753 Comm: mount Tainted: G E 6.7.0-rc6-next-20231222 #504
[...]
Call Trace:
 dump_stack_lvl+0xc5/0x170
 dump_stack+0x18/0x30
 register_lock_class+0x740/0x7c0
 __lock_acquire+0x69/0x13a0
 lock_acquire+0x120/0x450
 _raw_spin_trylock+0x98/0xd0
 ___ratelimit+0xf6/0x220
 __ext4_msg+0x7f/0x160 [ext4]
 ext4_orphan_cleanup+0x665/0x740 [ext4]
 __ext4_fill_super+0x21ea/0x2b10 [ext4]
 ext4_fill_super+0x14d/0x360 [ext4]
[...]
=========================================================

Normally interval is 0 until s_msg_ratelimit_state is initialized, so
___ratelimit() does nothing. But registering sysfs precedes initializing
rs-&gt;lock, so it is possible to change rs-&gt;interval to a non-zero value
via the msg_ratelimit_interval_ms interface of sysfs while rs-&gt;lock is
uninitialized, and then a call to ext4_msg triggers the problem by
accessing an uninitialized rs-&gt;lock. Therefore register sysfs after all
initializations are complete to avoid such problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-40998/">CVE-2024-40998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-40998">CVE-2024-40998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227866">SUSE bug 1227866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41005" ref_url="https://www.suse.com/security/cve/CVE-2024-41005" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netpoll: Fix race condition in netpoll_owner_active

KCSAN detected a race condition in netpoll:

	BUG: KCSAN: data-race in net_rx_action / netpoll_send_skb
	write (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:
	net_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)
&lt;snip&gt;
	read to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:
	netpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)
	netpoll_send_udp (net/core/netpoll.c:?)
&lt;snip&gt;
	value changed: 0x0000000a -&gt; 0xffffffff

This happens because netpoll_owner_active() needs to check if the
current CPU is the owner of the lock, touching napi-&gt;poll_owner
non atomically. The -&gt;poll_owner field contains the current CPU holding
the lock.

Use an atomic read to check if the poll owner is the current CPU.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41005/">CVE-2024-41005 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41005">CVE-2024-41005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227858">SUSE bug 1227858</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41009" ref_url="https://www.suse.com/security/cve/CVE-2024-41009" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10274" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000615.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix overrunning reservations in ringbuf

The BPF ring buffer internally is implemented as a power-of-2 sized circular
buffer, with two logical and ever-increasing counters: consumer_pos is the
consumer counter to show which logical position the consumer consumed the
data, and producer_pos which is the producer counter denoting the amount of
data reserved by all producers.

Each time a record is reserved, the producer that "owns" the record will
successfully advance producer counter. In user space each time a record is
read, the consumer of the data advanced the consumer counter once it finished
processing. Both counters are stored in separate pages so that from user
space, the producer counter is read-only and the consumer counter is read-write.

One aspect that simplifies and thus speeds up the implementation of both
producers and consumers is how the data area is mapped twice contiguously
back-to-back in the virtual memory, allowing to not take any special measures
for samples that have to wrap around at the end of the circular buffer data
area, because the next page after the last data page would be first data page
again, and thus the sample will still appear completely contiguous in virtual
memory.

Each record has a struct bpf_ringbuf_hdr { u32 len; u32 pg_off; } header for
book-keeping the length and offset, and is inaccessible to the BPF program.
Helpers like bpf_ringbuf_reserve() return `(void *)hdr + BPF_RINGBUF_HDR_SZ`
for the BPF program to use. Bing-Jhong and Muhammad reported that it is however
possible to make a second allocated memory chunk overlapping with the first
chunk and as a result, the BPF program is now able to edit first chunk's
header.

For example, consider the creation of a BPF_MAP_TYPE_RINGBUF map with size
of 0x4000. Next, the consumer_pos is modified to 0x3000 /before/ a call to
bpf_ringbuf_reserve() is made. This will allocate a chunk A, which is in
[0x0,0x3008], and the BPF program is able to edit [0x8,0x3008]. Now, lets
allocate a chunk B with size 0x3000. This will succeed because consumer_pos
was edited ahead of time to pass the `new_prod_pos - cons_pos &gt; rb-&gt;mask`
check. Chunk B will be in range [0x3008,0x6010], and the BPF program is able
to edit [0x3010,0x6010]. Due to the ring buffer memory layout mentioned
earlier, the ranges [0x0,0x4000] and [0x4000,0x8000] point to the same data
pages. This means that chunk B at [0x4000,0x4008] is chunk A's header.
bpf_ringbuf_submit() / bpf_ringbuf_discard() use the header's pg_off to then
locate the bpf_ringbuf itself via bpf_ringbuf_restore_from_rec(). Once chunk
B modified chunk A's header, then bpf_ringbuf_commit() refers to the wrong
page and could cause a crash.

Fix it by calculating the oldest pending_pos and check whether the range
from the oldest outstanding record to the newest would span beyond the ring
buffer size. If that is the case, then reject the request. We've tested with
the ring buffer benchmark in BPF selftests (./benchs/run_bench_ringbufs.sh)
before/after the fix and while it seems a bit slower on some benchmarks, it
is still not significantly enough to matter.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41009/">CVE-2024-41009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41009">CVE-2024-41009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228020">SUSE bug 1228020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245988">SUSE bug 1245988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955019" comment="bpftool-7.4.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955020" comment="kernel-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955021" comment="kernel-abi-stablelists-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955022" comment="kernel-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955023" comment="kernel-cross-headers-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955024" comment="kernel-debug-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955025" comment="kernel-debug-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955028" comment="kernel-debug-modules-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955029" comment="kernel-debug-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955030" comment="kernel-debug-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955031" comment="kernel-debug-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955034" comment="kernel-doc-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955035" comment="kernel-headers-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955036" comment="kernel-modules-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955037" comment="kernel-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955038" comment="kernel-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955039" comment="kernel-tools-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955040" comment="kernel-tools-libs-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955042" comment="kernel-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955043" comment="kernel-uki-virt-addons-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955044" comment="libperf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955045" comment="perf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955046" comment="python3-perf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955047" comment="rtla-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955048" comment="rv-5.14.0-503.15.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41010" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41010" ref_url="https://www.suse.com/security/cve/CVE-2024-41010" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix too early release of tcx_entry

Pedro Pinto and later independently also Hyunwoo Kim and Wongi Lee reported
an issue that the tcx_entry can be released too early leading to a use
after free (UAF) when an active old-style ingress or clsact qdisc with a
shared tc block is later replaced by another ingress or clsact instance.

Essentially, the sequence to trigger the UAF (one example) can be as follows:

  1. A network namespace is created
  2. An ingress qdisc is created. This allocates a tcx_entry, and
     &amp;tcx_entry-&gt;miniq is stored in the qdisc's miniqp-&gt;p_miniq. At the
     same time, a tcf block with index 1 is created.
  3. chain0 is attached to the tcf block. chain0 must be connected to
     the block linked to the ingress qdisc to later reach the function
     tcf_chain0_head_change_cb_del() which triggers the UAF.
  4. Create and graft a clsact qdisc. This causes the ingress qdisc
     created in step 1 to be removed, thus freeing the previously linked
     tcx_entry:

     rtnetlink_rcv_msg()
       =&gt; tc_modify_qdisc()
         =&gt; qdisc_create()
           =&gt; clsact_init() [a]
         =&gt; qdisc_graft()
           =&gt; qdisc_destroy()
             =&gt; __qdisc_destroy()
               =&gt; ingress_destroy() [b]
                 =&gt; tcx_entry_free()
                   =&gt; kfree_rcu() // tcx_entry freed

  5. Finally, the network namespace is closed. This registers the
     cleanup_net worker, and during the process of releasing the
     remaining clsact qdisc, it accesses the tcx_entry that was
     already freed in step 4, causing the UAF to occur:

     cleanup_net()
       =&gt; ops_exit_list()
         =&gt; default_device_exit_batch()
           =&gt; unregister_netdevice_many()
             =&gt; unregister_netdevice_many_notify()
               =&gt; dev_shutdown()
                 =&gt; qdisc_put()
                   =&gt; clsact_destroy() [c]
                     =&gt; tcf_block_put_ext()
                       =&gt; tcf_chain0_head_change_cb_del()
                         =&gt; tcf_chain_head_change_item()
                           =&gt; clsact_chain_head_change()
                             =&gt; mini_qdisc_pair_swap() // UAF

There are also other variants, the gist is to add an ingress (or clsact)
qdisc with a specific shared block, then to replace that qdisc, waiting
for the tcx_entry kfree_rcu() to be executed and subsequently accessing
the current active qdisc's miniq one way or another.

The correct fix is to turn the miniq_active boolean into a counter. What
can be observed, at step 2 above, the counter transitions from 0-&gt;1, at
step [a] from 1-&gt;2 (in order for the miniq object to remain active during
the replacement), then in [b] from 2-&gt;1 and finally [c] 1-&gt;0 with the
eventual release. The reference counter in general ranges from [0,2] and
it does not need to be atomic since all access to the counter is protected
by the rtnl mutex. With this in place, there is no longer a UAF happening
and the tcx_entry is freed at the correct time.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41010/">CVE-2024-41010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41010">CVE-2024-41010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228021">SUSE bug 1228021</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41013" ref_url="https://www.suse.com/security/cve/CVE-2024-41013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: don't walk off the end of a directory data block

This adds sanity checks for xfs_dir2_data_unused and xfs_dir2_data_entry
to make sure don't stray beyond valid memory region. Before patching, the
loop simply checks that the start offset of the dup and dep is within the
range. So in a crafted image, if last entry is xfs_dir2_data_unused, we
can change dup-&gt;length to dup-&gt;length-1 and leave 1 byte of space. In the
next traversal, this space will be considered as dup or dep. We may
encounter an out of bound read when accessing the fixed members.

In the patch, we make sure that the remaining bytes large enough to hold
an unused entry before accessing xfs_dir2_data_unused and
xfs_dir2_data_unused is XFS_DIR2_DATA_ALIGN byte aligned. We also make
sure that the remaining bytes large enough to hold a dirent with a
single-byte name before accessing xfs_dir2_data_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41013/">CVE-2024-41013 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41013">CVE-2024-41013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228405">SUSE bug 1228405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41014" ref_url="https://www.suse.com/security/cve/CVE-2024-41014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: add bounds checking to xlog_recover_process_data

There is a lack of verification of the space occupied by fixed members
of xlog_op_header in the xlog_recover_process_data.

We can create a crafted image to trigger an out of bounds read by
following these steps:
    1) Mount an image of xfs, and do some file operations to leave records
    2) Before umounting, copy the image for subsequent steps to simulate
       abnormal exit. Because umount will ensure that tail_blk and
       head_blk are the same, which will result in the inability to enter
       xlog_recover_process_data
    3) Write a tool to parse and modify the copied image in step 2
    4) Make the end of the xlog_op_header entries only 1 byte away from
       xlog_rec_header-&gt;h_size
    5) xlog_rec_header-&gt;h_num_logops++
    6) Modify xlog_rec_header-&gt;h_crc

Fix:
Add a check to make sure there is sufficient space to access fixed members
of xlog_op_header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41014/">CVE-2024-41014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41014">CVE-2024-41014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228408">SUSE bug 1228408</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009950334" comment="bpftool-7.3.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950335" comment="kernel-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950336" comment="kernel-abi-stablelists-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950337" comment="kernel-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950338" comment="kernel-cross-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950339" comment="kernel-debug-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950340" comment="kernel-debug-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950343" comment="kernel-debug-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950344" comment="kernel-debug-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950345" comment="kernel-debug-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950346" comment="kernel-debug-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950349" comment="kernel-doc-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950350" comment="kernel-headers-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950351" comment="kernel-modules-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950352" comment="kernel-modules-core-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950353" comment="kernel-modules-extra-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950354" comment="kernel-tools-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950355" comment="kernel-tools-libs-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950357" comment="kernel-uki-virt-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950358" comment="libperf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950359" comment="perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950360" comment="python3-perf-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950361" comment="rtla-5.14.0-427.42.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950362" comment="rv-5.14.0-427.42.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41040</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41040" ref_url="https://www.suse.com/security/cve/CVE-2024-41040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Fix UAF when resolving a clash

KASAN reports the following UAF:

 BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]
 Read of size 1 at addr ffff888c07603600 by task handler130/6469

 Call Trace:
  &lt;IRQ&gt;
  dump_stack_lvl+0x48/0x70
  print_address_description.constprop.0+0x33/0x3d0
  print_report+0xc0/0x2b0
  kasan_report+0xd0/0x120
  __asan_load1+0x6c/0x80
  tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct]
  tcf_ct_act+0x886/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491
  __irq_exit_rcu+0x82/0xc0
  irq_exit_rcu+0xe/0x20
  common_interrupt+0xa1/0xb0
  &lt;/IRQ&gt;
  &lt;TASK&gt;
  asm_common_interrupt+0x27/0x40

 Allocated by task 6469:
  kasan_save_stack+0x38/0x70
  kasan_set_track+0x25/0x40
  kasan_save_alloc_info+0x1e/0x40
  __kasan_krealloc+0x133/0x190
  krealloc+0xaa/0x130
  nf_ct_ext_add+0xed/0x230 [nf_conntrack]
  tcf_ct_act+0x1095/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491

 Freed by task 6469:
  kasan_save_stack+0x38/0x70
  kasan_set_track+0x25/0x40
  kasan_save_free_info+0x2b/0x60
  ____kasan_slab_free+0x180/0x1f0
  __kasan_slab_free+0x12/0x30
  slab_free_freelist_hook+0xd2/0x1a0
  __kmem_cache_free+0x1a2/0x2f0
  kfree+0x78/0x120
  nf_conntrack_free+0x74/0x130 [nf_conntrack]
  nf_ct_destroy+0xb2/0x140 [nf_conntrack]
  __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack]
  nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack]
  __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack]
  tcf_ct_act+0x12ad/0x1350 [act_ct]
  tcf_action_exec+0xf8/0x1f0
  fl_classify+0x355/0x360 [cls_flower]
  __tcf_classify+0x1fd/0x330
  tcf_classify+0x21c/0x3c0
  sch_handle_ingress.constprop.0+0x2c5/0x500
  __netif_receive_skb_core.constprop.0+0xb25/0x1510
  __netif_receive_skb_list_core+0x220/0x4c0
  netif_receive_skb_list_internal+0x446/0x620
  napi_complete_done+0x157/0x3d0
  gro_cell_poll+0xcf/0x100
  __napi_poll+0x65/0x310
  net_rx_action+0x30c/0x5c0
  __do_softirq+0x14f/0x491

The ct may be dropped if a clash has been resolved but is still passed to
the tcf_ct_flow_table_process_conn function for further usage. This issue
can be fixed by retrieving ct from skb again after confirming conntrack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41040/">CVE-2024-41040 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41040">CVE-2024-41040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228518">SUSE bug 1228518</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41041</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41041" ref_url="https://www.suse.com/security/cve/CVE-2024-41041" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().

syzkaller triggered the warning [0] in udp_v4_early_demux().

In udp_v[46]_early_demux() and sk_lookup(), we do not touch the refcount
of the looked-up sk and use sock_pfree() as skb-&gt;destructor, so we check
SOCK_RCU_FREE to ensure that the sk is safe to access during the RCU grace
period.

Currently, SOCK_RCU_FREE is flagged for a bound socket after being put
into the hash table.  Moreover, the SOCK_RCU_FREE check is done too early
in udp_v[46]_early_demux() and sk_lookup(), so there could be a small race
window:

  CPU1                                 CPU2
  ----                                 ----
  udp_v4_early_demux()                 udp_lib_get_port()
  |                                    |- hlist_add_head_rcu()
  |- sk = __udp4_lib_demux_lookup()    |
  |- DEBUG_NET_WARN_ON_ONCE(sk_is_refcounted(sk));
                                       `- sock_set_flag(sk, SOCK_RCU_FREE)

We had the same bug in TCP and fixed it in commit 871019b22d1b ("net:
set SOCK_RCU_FREE before inserting socket into hashtable").

Let's apply the same fix for UDP.

[0]:
WARNING: CPU: 0 PID: 11198 at net/ipv4/udp.c:2599 udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599
Modules linked in:
CPU: 0 PID: 11198 Comm: syz-executor.1 Not tainted 6.9.0-g93bda33046e7 #13
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:udp_v4_early_demux+0x481/0xb70 net/ipv4/udp.c:2599
Code: c5 7a 15 fe bb 01 00 00 00 44 89 e9 31 ff d3 e3 81 e3 bf ef ff ff 89 de e8 2c 74 15 fe 85 db 0f 85 02 06 00 00 e8 9f 7a 15 fe &lt;0f&gt; 0b e8 98 7a 15 fe 49 8d 7e 60 e8 4f 39 2f fe 49 c7 46 60 20 52
RSP: 0018:ffffc9000ce3fa58 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff8318c92c
RDX: ffff888036ccde00 RSI: ffffffff8318c2f1 RDI: 0000000000000001
RBP: ffff88805a2dd6e0 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0001ffffffffffff R12: ffff88805a2dd680
R13: 0000000000000007 R14: ffff88800923f900 R15: ffff88805456004e
FS:  00007fc449127640(0000) GS:ffff88807dc00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fc449126e38 CR3: 000000003de4b002 CR4: 0000000000770ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ip_rcv_finish_core.constprop.0+0xbdd/0xd20 net/ipv4/ip_input.c:349
 ip_rcv_finish+0xda/0x150 net/ipv4/ip_input.c:447
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 ip_rcv+0x16c/0x180 net/ipv4/ip_input.c:569
 __netif_receive_skb_one_core+0xb3/0xe0 net/core/dev.c:5624
 __netif_receive_skb+0x21/0xd0 net/core/dev.c:5738
 netif_receive_skb_internal net/core/dev.c:5824 [inline]
 netif_receive_skb+0x271/0x300 net/core/dev.c:5884
 tun_rx_batched drivers/net/tun.c:1549 [inline]
 tun_get_user+0x24db/0x2c50 drivers/net/tun.c:2002
 tun_chr_write_iter+0x107/0x1a0 drivers/net/tun.c:2048
 new_sync_write fs/read_write.c:497 [inline]
 vfs_write+0x76f/0x8d0 fs/read_write.c:590
 ksys_write+0xbf/0x190 fs/read_write.c:643
 __do_sys_write fs/read_write.c:655 [inline]
 __se_sys_write fs/read_write.c:652 [inline]
 __x64_sys_write+0x41/0x50 fs/read_write.c:652
 x64_sys_call+0xe66/0x1990 arch/x86/include/generated/asm/syscalls_64.h:2
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x4b/0x110 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7fc44a68bc1f
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 e9 cf f5 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 3c d0 f5 ff 48
RSP: 002b:00007fc449126c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00000000004bc050 RCX: 00007fc44a68bc1f
R
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-41041/">CVE-2024-41041 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41041">CVE-2024-41041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228520">SUSE bug 1228520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41044" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41044" ref_url="https://www.suse.com/security/cve/CVE-2024-41044" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: reject claimed-as-LCP but actually malformed packets

Since 'ppp_async_encode()' assumes valid LCP packets (with code
from 1 to 7 inclusive), add 'ppp_check_packet()' to ensure that
LCP packet has an actual body beyond PPP_LCP header bytes, and
reject claimed-as-LCP but actually malformed data otherwise.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-41044/">CVE-2024-41044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41044">CVE-2024-41044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228530">SUSE bug 1228530</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41055" ref_url="https://www.suse.com/security/cve/CVE-2024-41055" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: prevent derefencing NULL ptr in pfn_section_valid()

Commit 5ec8e8ea8b77 ("mm/sparsemem: fix race in accessing
memory_section-&gt;usage") changed pfn_section_valid() to add a READ_ONCE()
call around "ms-&gt;usage" to fix a race with section_deactivate() where
ms-&gt;usage can be cleared.  The READ_ONCE() call, by itself, is not enough
to prevent NULL pointer dereference.  We need to check its value before
dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41055/">CVE-2024-41055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41055">CVE-2024-41055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228521">SUSE bug 1228521</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41062</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41062" ref_url="https://www.suse.com/security/cve/CVE-2024-41062" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1064-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1104-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bluetooth/l2cap: sync sock recv cb and release

The problem occurs between the system call to close the sock and hci_rx_work,
where the former releases the sock and the latter accesses it without lock protection.

           CPU0                       CPU1
           ----                       ----
           sock_close                 hci_rx_work
	   l2cap_sock_release         hci_acldata_packet
	   l2cap_sock_kill            l2cap_recv_frame
	   sk_free                    l2cap_conless_channel
	                              l2cap_sock_recv_cb

If hci_rx_work processes the data that needs to be received before the sock is
closed, then everything is normal; Otherwise, the work thread may access the
released sock when receiving data.

Add a chan mutex in the rx callback of the sock to achieve synchronization between
the sock release and recv cb.

Sock is dead, so set chan data to NULL, avoid others use invalid sock pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41062/">CVE-2024-41062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41062">CVE-2024-41062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228576">SUSE bug 1228576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228578">SUSE bug 1228578</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41071</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41071" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41071" ref_url="https://www.suse.com/security/cve/CVE-2024-41071" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6994" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-41071/">CVE-2024-41071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41071">CVE-2024-41071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228625">SUSE bug 1228625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41073</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41073" ref_url="https://www.suse.com/security/cve/CVE-2024-41073" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: avoid double free special payload

If a discard request needs to be retried, and that retry may fail before
a new special payload is added, a double free will result. Clear the
RQF_SPECIAL_LOAD when the request is cleaned.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-41073/">CVE-2024-41073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41073">CVE-2024-41073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228635">SUSE bug 1228635</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41076" ref_url="https://www.suse.com/security/cve/CVE-2024-41076" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Fix memory leak in nfs4_set_security_label

We leak nfs_fattr and nfs4_label every time we set a security xattr.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-41076/">CVE-2024-41076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41076">CVE-2024-41076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228649">SUSE bug 1228649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41090" ref_url="https://www.suse.com/security/cve/CVE-2024-41090" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tap: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tap_get_user_xdp() path, which could cause a corrupted skb to be
sent downstack. Even before the skb is transmitted, the
tap_get_user_xdp()--&gt;skb_set_network_header() may assume the size is more
than ETH_HLEN. Once transmitted, this could either cause out-of-bound
access beyond the actual length, or confuse the underlayer with incorrect
or inconsistent header length in the skb metadata.

In the alternative path, tap_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted.

This is to drop any frame shorter than the Ethernet header size just like
how tap_get_user() does.

CVE: CVE-2024-41090
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41090/">CVE-2024-41090 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41090">CVE-2024-41090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228328">SUSE bug 1228328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1228714">SUSE bug 1228714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41091" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41091" ref_url="https://www.suse.com/security/cve/CVE-2024-41091" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044014.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tun: add missing verification for short frame

The cited commit missed to check against the validity of the frame length
in the tun_xdp_one() path, which could cause a corrupted skb to be sent
downstack. Even before the skb is transmitted, the
tun_xdp_one--&gt;eth_type_trans() may access the Ethernet header although it
can be less than ETH_HLEN. Once transmitted, this could either cause
out-of-bound access beyond the actual length, or confuse the underlayer
with incorrect or inconsistent header length in the skb metadata.

In the alternative path, tun_get_user() already prohibits short frame which
has the length less than Ethernet header size from being transmitted for
IFF_TAP.

This is to drop any frame shorter than the Ethernet header size just like
how tun_get_user() does.

CVE: CVE-2024-41091
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41091/">CVE-2024-41091 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41091">CVE-2024-41091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228327">SUSE bug 1228327</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41096" ref_url="https://www.suse.com/security/cve/CVE-2024-41096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/MSI: Fix UAF in msi_capability_init

KFENCE reports the following UAF:

 BUG: KFENCE: use-after-free read in __pci_enable_msi_range+0x2c0/0x488

 Use-after-free read at 0x0000000024629571 (in kfence-#12):
  __pci_enable_msi_range+0x2c0/0x488
  pci_alloc_irq_vectors_affinity+0xec/0x14c
  pci_alloc_irq_vectors+0x18/0x28

 kfence-#12: 0x0000000008614900-0x00000000e06c228d, size=104, cache=kmalloc-128

 allocated by task 81 on cpu 7 at 10.808142s:
  __kmem_cache_alloc_node+0x1f0/0x2bc
  kmalloc_trace+0x44/0x138
  msi_alloc_desc+0x3c/0x9c
  msi_domain_insert_msi_desc+0x30/0x78
  msi_setup_msi_desc+0x13c/0x184
  __pci_enable_msi_range+0x258/0x488
  pci_alloc_irq_vectors_affinity+0xec/0x14c
  pci_alloc_irq_vectors+0x18/0x28

 freed by task 81 on cpu 7 at 10.811436s:
  msi_domain_free_descs+0xd4/0x10c
  msi_domain_free_locked.part.0+0xc0/0x1d8
  msi_domain_alloc_irqs_all_locked+0xb4/0xbc
  pci_msi_setup_msi_irqs+0x30/0x4c
  __pci_enable_msi_range+0x2a8/0x488
  pci_alloc_irq_vectors_affinity+0xec/0x14c
  pci_alloc_irq_vectors+0x18/0x28

Descriptor allocation done in:
__pci_enable_msi_range
    msi_capability_init
        msi_setup_msi_desc
            msi_insert_msi_desc
                msi_domain_insert_msi_desc
                    msi_alloc_desc
                        ...

Freed in case of failure in __msi_domain_alloc_locked()
__pci_enable_msi_range
    msi_capability_init
        pci_msi_setup_msi_irqs
            msi_domain_alloc_irqs_all_locked
                msi_domain_alloc_locked
                    __msi_domain_alloc_locked =&gt; fails
                    msi_domain_free_locked
                        ...

That failure propagates back to pci_msi_setup_msi_irqs() in
msi_capability_init() which accesses the descriptor for unmasking in the
error exit path.

Cure it by copying the descriptor and using the copy for the error exit path
unmask operation.

[ tglx: Massaged change log ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-41096/">CVE-2024-41096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41096">CVE-2024-41096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228479">SUSE bug 1228479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41123" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41123" ref_url="https://www.suse.com/security/cve/CVE-2024-41123" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6670" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6784" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000050.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000053.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/" source="SUSE-SU"/>
    <description>
    REXML is an XML toolkit for Ruby. The REXML gem before 3.3.2 has some DoS vulnerabilities when it parses an XML that has many specific characters such as whitespace character, `&gt;]` and `]&gt;`. The REXML gem 3.3.3 or later include the patches to fix these vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-21"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41123/">CVE-2024-41123 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41123">CVE-2024-41123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228794">SUSE bug 1228794</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943818" comment="ruby-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943819" comment="ruby-bundled-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943820" comment="ruby-default-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943821" comment="ruby-devel-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943822" comment="ruby-doc-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943823" comment="ruby-libs-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943824" comment="rubygem-bigdecimal-3.1.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943825" comment="rubygem-bundler-2.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943826" comment="rubygem-io-console-0.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943827" comment="rubygem-irb-1.13.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943828" comment="rubygem-json-2.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943829" comment="rubygem-minitest-5.20.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943830" comment="rubygem-power_assert-2.0.3-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943831" comment="rubygem-psych-5.1.2-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943832" comment="rubygem-racc-1.7.3-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943833" comment="rubygem-rake-13.1.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943834" comment="rubygem-rbs-3.4.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943835" comment="rubygem-rdoc-6.6.3.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977574" comment="rubygem-rexml-3.3.9-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977575" comment="rubygem-rss-0.3.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943838" comment="rubygem-test-unit-3.6.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943839" comment="rubygem-typeprof-0.21.9-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943840" comment="rubygems-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943841" comment="rubygems-devel-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41184</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41184" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41184" ref_url="https://www.suse.com/security/cve/CVE-2024-41184" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000788.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3658-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021345.html" source="SUSE-SU"/>
    <description>
    In the vrrp_ipsets_handler handler (fglobal_parser.c) of keepalived through 2.3.1, an integer overflow can occur. NOTE: this CVE Record might not be worthwhile because an empty ipset name must be configured by the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-41184/">CVE-2024-41184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-41184">CVE-2024-41184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228123">SUSE bug 1228123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962421" comment="keepalived-2.2.8-4.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202441946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-41946</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-41946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-41946" ref_url="https://www.suse.com/security/cve/CVE-2024-41946" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6670" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6784" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000050.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000053.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/" source="SUSE-SU"/>
    <description>
    REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-21"/>
	<updated date="2025-05-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-41946/">CVE-2024-41946 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-41946">CVE-2024-41946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228799">SUSE bug 1228799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943818" comment="ruby-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943819" comment="ruby-bundled-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943820" comment="ruby-default-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943821" comment="ruby-devel-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943822" comment="ruby-doc-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943823" comment="ruby-libs-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943824" comment="rubygem-bigdecimal-3.1.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943825" comment="rubygem-bundler-2.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943826" comment="rubygem-io-console-0.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943827" comment="rubygem-irb-1.13.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943828" comment="rubygem-json-2.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943829" comment="rubygem-minitest-5.20.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943830" comment="rubygem-power_assert-2.0.3-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943831" comment="rubygem-psych-5.1.2-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943832" comment="rubygem-racc-1.7.3-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943833" comment="rubygem-rake-13.1.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943834" comment="rubygem-rbs-3.4.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943835" comment="rubygem-rdoc-6.6.3.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977574" comment="rubygem-rexml-3.3.9-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977575" comment="rubygem-rss-0.3.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943838" comment="rubygem-test-unit-3.6.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943839" comment="rubygem-typeprof-0.21.9-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943840" comment="rubygems-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943841" comment="rubygems-devel-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42079" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42079" ref_url="https://www.suse.com/security/cve/CVE-2024-42079" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix NULL pointer dereference in gfs2_log_flush

In gfs2_jindex_free(), set sdp-&gt;sd_jdesc to NULL under the log flush
lock to provide exclusion against gfs2_log_flush().

In gfs2_log_flush(), check if sdp-&gt;sd_jdesc is non-NULL before
dereferencing it.  Otherwise, we could run into a NULL pointer
dereference when outstanding glock work races with an unmount
(glock_work_func -&gt; run_queue -&gt; do_xmote -&gt; inode_go_sync -&gt;
gfs2_log_flush).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42079/">CVE-2024-42079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42079">CVE-2024-42079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228672">SUSE bug 1228672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42082" ref_url="https://www.suse.com/security/cve/CVE-2024-42082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp: Remove WARN() from __xdp_reg_mem_model()

syzkaller reports a warning in __xdp_reg_mem_model().

The warning occurs only if __mem_id_init_hash_table() returns an error. It
returns the error in two cases:

  1. memory allocation fails;
  2. rhashtable_init() fails when some fields of rhashtable_params
     struct are not initialized properly.

The second case cannot happen since there is a static const rhashtable_params
struct with valid fields. So, warning is only triggered when there is a
problem with memory allocation.

Thus, there is no sense in using WARN() to handle this error and it can be
safely removed.

WARNING: CPU: 0 PID: 5065 at net/core/xdp.c:299 __xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299

CPU: 0 PID: 5065 Comm: syz-executor883 Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
RIP: 0010:__xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299

Call Trace:
 xdp_reg_mem_model+0x22/0x40 net/core/xdp.c:344
 xdp_test_run_setup net/bpf/test_run.c:188 [inline]
 bpf_test_run_xdp_live+0x365/0x1e90 net/bpf/test_run.c:377
 bpf_prog_test_run_xdp+0x813/0x11b0 net/bpf/test_run.c:1267
 bpf_prog_test_run+0x33a/0x3b0 kernel/bpf/syscall.c:4240
 __sys_bpf+0x48d/0x810 kernel/bpf/syscall.c:5649
 __do_sys_bpf kernel/bpf/syscall.c:5738 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5736 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736
 do_syscall_64+0xfb/0x240
 entry_SYSCALL_64_after_hwframe+0x6d/0x75

Found by Linux Verification Center (linuxtesting.org) with syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42082/">CVE-2024-42082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42082">CVE-2024-42082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228482">SUSE bug 1228482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42094" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42094" ref_url="https://www.suse.com/security/cve/CVE-2024-42094" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/iucv: Avoid explicit cpumask var allocation on stack

For CONFIG_CPUMASK_OFFSTACK=y kernel, explicit allocation of cpumask
variable on stack is not recommended since it can cause potential stack
overflow.

Instead, kernel code should always use *cpumask_var API(s) to allocate
cpumask var in config-neutral way, leaving allocation strategy to
CONFIG_CPUMASK_OFFSTACK.

Use *cpumask_var API(s) to address it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2024-42094/">CVE-2024-42094 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42094">CVE-2024-42094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228679">SUSE bug 1228679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42096" ref_url="https://www.suse.com/security/cve/CVE-2024-42096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2901-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86: stop playing stack games in profile_pc()

The 'profile_pc()' function is used for timer-based profiling, which
isn't really all that relevant any more to begin with, but it also ends
up making assumptions based on the stack layout that aren't necessarily
valid.

Basically, the code tries to account the time spent in spinlocks to the
caller rather than the spinlock, and while I support that as a concept,
it's not worth the code complexity or the KASAN warnings when no serious
profiling is done using timers anyway these days.

And the code really does depend on stack layout that is only true in the
simplest of cases.  We've lost the comment at some point (I think when
the 32-bit and 64-bit code was unified), but it used to say:

	Assume the lock function has either no stack frame or a copy
	of eflags from PUSHF.

which explains why it just blindly loads a word or two straight off the
stack pointer and then takes a minimal look at the values to just check
if they might be eflags or the return pc:

	Eflags always has bits 22 and up cleared unlike kernel addresses

but that basic stack layout assumption assumes that there isn't any lock
debugging etc going on that would complicate the code and cause a stack
frame.

It causes KASAN unhappiness reported for years by syzkaller [1] and
others [2].

With no real practical reason for this any more, just remove the code.

Just for historical interest, here's some background commits relating to
this code from 2006:

  0cb91a229364 ("i386: Account spinlocks to the caller during profiling for !FP kernels")
  31679f38d886 ("Simplify profile_pc on x86-64")

and a code unification from 2009:

  ef4512882dbe ("x86: time_32/64.c unify profile_pc")

but the basics of this thing actually goes back to before the git tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42096/">CVE-2024-42096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42096">CVE-2024-42096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228633">SUSE bug 1228633</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42102" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42102" ref_url="https://www.suse.com/security/cve/CVE-2024-42102" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"

Patch series "mm: Avoid possible overflows in dirty throttling".

Dirty throttling logic assumes dirty limits in page units fit into
32-bits.  This patch series makes sure this is true (see patch 2/2 for
more details).


This patch (of 2):

This reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.

The commit is broken in several ways.  Firstly, the removed (u64) cast
from the multiplication will introduce a multiplication overflow on 32-bit
archs if wb_thresh * bg_thresh &gt;= 1&lt;&lt;32 (which is actually common - the
default settings with 4GB of RAM will trigger this).  Secondly, the
div64_u64() is unnecessarily expensive on 32-bit archs.  We have
div64_ul() in case we want to be safe &amp; cheap.  Thirdly, if dirty
thresholds are larger than 1&lt;&lt;32 pages, then dirty balancing is going to
blow up in many other spectacular ways anyway so trying to fix one
possible overflow is just moot.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42102/">CVE-2024-42102 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42102">CVE-2024-42102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222364">SUSE bug 1222364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233132">SUSE bug 1233132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42110" ref_url="https://www.suse.com/security/cve/CVE-2024-42110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ntb_netdev: Move ntb_netdev_rx_handler() to call netif_rx() from __netif_rx()

The following is emitted when using idxd (DSA) dmanegine as the data
mover for ntb_transport that ntb_netdev uses.

[74412.546922] BUG: using smp_processor_id() in preemptible [00000000] code: irq/52-idxd-por/14526
[74412.556784] caller is netif_rx_internal+0x42/0x130
[74412.562282] CPU: 6 PID: 14526 Comm: irq/52-idxd-por Not tainted 6.9.5 #5
[74412.569870] Hardware name: Intel Corporation ArcherCity/ArcherCity, BIOS EGSDCRB1.E9I.1752.P05.2402080856 02/08/2024
[74412.581699] Call Trace:
[74412.584514]  &lt;TASK&gt;
[74412.586933]  dump_stack_lvl+0x55/0x70
[74412.591129]  check_preemption_disabled+0xc8/0xf0
[74412.596374]  netif_rx_internal+0x42/0x130
[74412.600957]  __netif_rx+0x20/0xd0
[74412.604743]  ntb_netdev_rx_handler+0x66/0x150 [ntb_netdev]
[74412.610985]  ntb_complete_rxc+0xed/0x140 [ntb_transport]
[74412.617010]  ntb_rx_copy_callback+0x53/0x80 [ntb_transport]
[74412.623332]  idxd_dma_complete_txd+0xe3/0x160 [idxd]
[74412.628963]  idxd_wq_thread+0x1a6/0x2b0 [idxd]
[74412.634046]  irq_thread_fn+0x21/0x60
[74412.638134]  ? irq_thread+0xa8/0x290
[74412.642218]  irq_thread+0x1a0/0x290
[74412.646212]  ? __pfx_irq_thread_fn+0x10/0x10
[74412.651071]  ? __pfx_irq_thread_dtor+0x10/0x10
[74412.656117]  ? __pfx_irq_thread+0x10/0x10
[74412.660686]  kthread+0x100/0x130
[74412.664384]  ? __pfx_kthread+0x10/0x10
[74412.668639]  ret_from_fork+0x31/0x50
[74412.672716]  ? __pfx_kthread+0x10/0x10
[74412.676978]  ret_from_fork_asm+0x1a/0x30
[74412.681457]  &lt;/TASK&gt;

The cause is due to the idxd driver interrupt completion handler uses
threaded interrupt and the threaded handler is not hard or soft interrupt
context. However __netif_rx() can only be called from interrupt context.
Change the call to netif_rx() in order to allow completion via normal
context for dmaengine drivers that utilize threaded irq handling.

While the following commit changed from netif_rx() to __netif_rx(),
baebdf48c360 ("net: dev: Makes sure netif_rx() can be invoked in any context."),
the change should've been a noop instead. However, the code precedes this
fix should've been using netif_rx_ni() or netif_rx_any_context().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42110/">CVE-2024-42110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42110">CVE-2024-42110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228501">SUSE bug 1228501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42131" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42131" ref_url="https://www.suse.com/security/cve/CVE-2024-42131" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6567" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: avoid overflows in dirty throttling logic

The dirty throttling logic is interspersed with assumptions that dirty
limits in PAGE_SIZE units fit into 32-bit (so that various multiplications
fit into 64-bits).  If limits end up being larger, we will hit overflows,
possible divisions by 0 etc.  Fix these problems by never allowing so
large dirty limits as they have dubious practical value anyway.  For
dirty_bytes / dirty_background_bytes interfaces we can just refuse to set
so large limits.  For dirty_ratio / dirty_background_ratio it isn't so
simple as the dirty limit is computed from the amount of available memory
which can change due to memory hotplug etc.  So when converting dirty
limits from ratios to numbers of pages, we just don't allow the result to
exceed UINT_MAX.

This is root-only triggerable problem which occurs when the operator
sets dirty limits to &gt;16 TB.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42131/">CVE-2024-42131 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42131">CVE-2024-42131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228650">SUSE bug 1228650</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942257" comment="bpftool-7.3.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942258" comment="kernel-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942259" comment="kernel-abi-stablelists-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942260" comment="kernel-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942261" comment="kernel-cross-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942262" comment="kernel-debug-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942263" comment="kernel-debug-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942266" comment="kernel-debug-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942267" comment="kernel-debug-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942268" comment="kernel-debug-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942269" comment="kernel-debug-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942272" comment="kernel-doc-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942273" comment="kernel-headers-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942274" comment="kernel-modules-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942275" comment="kernel-modules-core-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942276" comment="kernel-modules-extra-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942277" comment="kernel-tools-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942278" comment="kernel-tools-libs-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942280" comment="kernel-uki-virt-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942281" comment="libperf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942282" comment="perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942283" comment="python3-perf-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942284" comment="rtla-5.14.0-427.35.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942285" comment="rv-5.14.0-427.35.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42133" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42133" ref_url="https://www.suse.com/security/cve/CVE-2024-42133" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4209-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJP47EXIE7RQJ2MRSR6HYMNI52GICWOP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Ignore too large handle values in BIG

hci_le_big_sync_established_evt is necessary to filter out cases where the
handle value is belonging to ida id range, otherwise ida will be erroneously
released in hci_conn_cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42133/">CVE-2024-42133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42133">CVE-2024-42133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228511">SUSE bug 1228511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231419">SUSE bug 1231419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42152</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42152" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42152" ref_url="https://www.suse.com/security/cve/CVE-2024-42152" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix a possible leak when destroy a ctrl during qp establishment

In nvmet_sq_destroy we capture sq-&gt;ctrl early and if it is non-NULL we
know that a ctrl was allocated (in the admin connect request handler)
and we need to release pending AERs, clear ctrl-&gt;sqs and sq-&gt;ctrl
(for nvme-loop primarily), and drop the final reference on the ctrl.

However, a small window is possible where nvmet_sq_destroy starts (as
a result of the client giving up and disconnecting) concurrently with
the nvme admin connect cmd (which may be in an early stage). But *before*
kill_and_confirm of sq-&gt;ref (i.e. the admin connect managed to get an sq
live reference). In this case, sq-&gt;ctrl was allocated however after it was
captured in a local variable in nvmet_sq_destroy.
This prevented the final reference drop on the ctrl.

Solve this by re-capturing the sq-&gt;ctrl after all inflight request has
completed, where for sure sq-&gt;ctrl reference is final, and move forward
based on that.

This issue was observed in an environment with many hosts connecting
multiple ctrls simoutanuosly, creating a delay in allocating a ctrl
leading up to this race window.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42152/">CVE-2024-42152 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42152">CVE-2024-42152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228724">SUSE bug 1228724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881443" comment="bpftool-7.3.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881444" comment="kernel-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881445" comment="kernel-abi-stablelists-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881446" comment="kernel-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881447" comment="kernel-cross-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881448" comment="kernel-debug-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881449" comment="kernel-debug-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881452" comment="kernel-debug-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881453" comment="kernel-debug-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881454" comment="kernel-debug-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881455" comment="kernel-debug-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881458" comment="kernel-doc-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881459" comment="kernel-headers-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881460" comment="kernel-modules-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881461" comment="kernel-modules-core-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881462" comment="kernel-modules-extra-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881463" comment="kernel-tools-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881464" comment="kernel-tools-libs-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881466" comment="kernel-uki-virt-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881467" comment="libperf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881468" comment="perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881469" comment="python3-perf-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881470" comment="rtla-5.14.0-427.33.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881471" comment="rv-5.14.0-427.33.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42225</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42225" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42225" ref_url="https://www.suse.com/security/cve/CVE-2024-42225" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: replace skb_put with skb_put_zero

Avoid potentially reusing uninitialized data
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42225/">CVE-2024-42225 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42225">CVE-2024-42225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228710">SUSE bug 1228710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42244" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42244" ref_url="https://www.suse.com/security/cve/CVE-2024-42244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10274" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000615.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: serial: mos7840: fix crash on resume

Since commit c49cfa917025 ("USB: serial: use generic method if no
alternative is provided in usb serial layer"), USB serial core calls the
generic resume implementation when the driver has not provided one.

This can trigger a crash on resume with mos7840 since support for
multiple read URBs was added back in 2011. Specifically, both port read
URBs are now submitted on resume for open ports, but the context pointer
of the second URB is left set to the core rather than mos7840 port
structure.

Fix this by implementing dedicated suspend and resume functions for
mos7840.

Tested with Delock 87414 USB 2.0 to 4x serial adapter.

[ johan: analyse crash and rewrite commit message; set busy flag on
         resume; drop bulk-in check; drop unnecessary usb_kill_urb() ]
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42244/">CVE-2024-42244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42244">CVE-2024-42244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228967">SUSE bug 1228967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955019" comment="bpftool-7.4.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955020" comment="kernel-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955021" comment="kernel-abi-stablelists-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955022" comment="kernel-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955023" comment="kernel-cross-headers-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955024" comment="kernel-debug-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955025" comment="kernel-debug-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955028" comment="kernel-debug-modules-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955029" comment="kernel-debug-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955030" comment="kernel-debug-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955031" comment="kernel-debug-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955034" comment="kernel-doc-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955035" comment="kernel-headers-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955036" comment="kernel-modules-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955037" comment="kernel-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955038" comment="kernel-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955039" comment="kernel-tools-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955040" comment="kernel-tools-libs-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955042" comment="kernel-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955043" comment="kernel-uki-virt-addons-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955044" comment="libperf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955045" comment="perf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955046" comment="python3-perf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955047" comment="rtla-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955048" comment="rv-5.14.0-503.15.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42246</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42246" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42246" ref_url="https://www.suse.com/security/cve/CVE-2024-42246" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000081.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net, sunrpc: Remap EPERM in case of connection failure in xs_tcp_setup_socket

When using a BPF program on kernel_connect(), the call can return -EPERM. This
causes xs_tcp_setup_socket() to loop forever, filling up the syslog and causing
the kernel to potentially freeze up.

Neil suggested:

  This will propagate -EPERM up into other layers which might not be ready
  to handle it. It might be safer to map EPERM to an error we would be more
  likely to expect from the network system - such as ECONNREFUSED or ENETDOWN.

ECONNREFUSED as error seems reasonable. For programs setting a different error
can be out of reach (see handling in 4fbac77d2d09) in particular on kernels
which do not have f10d05966196 ("bpf: Make BPF_PROG_RUN_ARRAY return -err
instead of allow boolean"), thus given that it is better to simply remap for
consistent behavior. UDP does handle EPERM in xs_udp_send_request().
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-26"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42246/">CVE-2024-42246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42246">CVE-2024-42246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228989">SUSE bug 1228989</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009944684" comment="bpftool-7.3.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944685" comment="kernel-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944686" comment="kernel-abi-stablelists-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944687" comment="kernel-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944688" comment="kernel-cross-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944689" comment="kernel-debug-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944690" comment="kernel-debug-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944693" comment="kernel-debug-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944694" comment="kernel-debug-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944695" comment="kernel-debug-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944696" comment="kernel-debug-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944699" comment="kernel-doc-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944700" comment="kernel-headers-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944701" comment="kernel-modules-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944702" comment="kernel-modules-core-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944703" comment="kernel-modules-extra-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944704" comment="kernel-tools-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944705" comment="kernel-tools-libs-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944707" comment="kernel-uki-virt-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944708" comment="libperf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944709" comment="perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944710" comment="python3-perf-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944711" comment="rtla-5.14.0-427.37.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009944712" comment="rv-5.14.0-427.37.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42253</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42253" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42253" ref_url="https://www.suse.com/security/cve/CVE-2024-42253" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: pca953x: fix pca953x_irq_bus_sync_unlock race

Ensure that `i2c_lock' is held when setting interrupt latch and mask in
pca953x_irq_bus_sync_unlock() in order to avoid races.

The other (non-probe) call site pca953x_gpio_set_multiple() ensures the
lock is held before calling pca953x_write_regs().

The problem occurred when a request raced against irq_bus_sync_unlock()
approximately once per thousand reboots on an i.MX8MP based system.

 * Normal case

   0-0022: write register AI|3a {03,02,00,00,01} Input latch P0
   0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
   0-0022: write register AI|08 {ff,00,00,00,00} Output P3
   0-0022: write register AI|12 {fc,00,00,00,00} Config P3

 * Race case

   0-0022: write register AI|08 {ff,00,00,00,00} Output P3
   0-0022: write register AI|08 {03,02,00,00,01} *** Wrong register ***
   0-0022: write register AI|12 {fc,00,00,00,00} Config P3
   0-0022: write register AI|49 {fc,fd,ff,ff,fe} Interrupt mask P0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42253/">CVE-2024-42253 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42253">CVE-2024-42253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229005">SUSE bug 1229005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42265" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42265" ref_url="https://www.suse.com/security/cve/CVE-2024-42265" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

protect the fetch of -&gt;fd[fd] in do_dup2() from mispredictions

both callers have verified that fd is not greater than -&gt;max_fds;
however, misprediction might end up with
        tofree = fdt-&gt;fd[fd];
being speculatively executed.  That's wrong for the same reasons
why it's wrong in close_fd()/file_close_fd_locked(); the same
solution applies - array_index_nospec(fd, fdt-&gt;max_fds) could differ
from fd only in case of speculative execution on mispredicted path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-42265/">CVE-2024-42265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42265">CVE-2024-42265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229334">SUSE bug 1229334</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42272" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42272" ref_url="https://www.suse.com/security/cve/CVE-2024-42272" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: act_ct: take care of padding in struct zones_ht_key

Blamed commit increased lookup key size from 2 bytes to 16 bytes,
because zones_ht_key got a struct net pointer.

Make sure rhashtable_lookup() is not using the padding bytes
which are not initialized.

 BUG: KMSAN: uninit-value in rht_ptr_rcu include/linux/rhashtable.h:376 [inline]
 BUG: KMSAN: uninit-value in __rhashtable_lookup include/linux/rhashtable.h:607 [inline]
 BUG: KMSAN: uninit-value in rhashtable_lookup include/linux/rhashtable.h:646 [inline]
 BUG: KMSAN: uninit-value in rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]
 BUG: KMSAN: uninit-value in tcf_ct_flow_table_get+0x611/0x2260 net/sched/act_ct.c:329
  rht_ptr_rcu include/linux/rhashtable.h:376 [inline]
  __rhashtable_lookup include/linux/rhashtable.h:607 [inline]
  rhashtable_lookup include/linux/rhashtable.h:646 [inline]
  rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]
  tcf_ct_flow_table_get+0x611/0x2260 net/sched/act_ct.c:329
  tcf_ct_init+0xa67/0x2890 net/sched/act_ct.c:1408
  tcf_action_init_1+0x6cc/0xb30 net/sched/act_api.c:1425
  tcf_action_init+0x458/0xf00 net/sched/act_api.c:1488
  tcf_action_add net/sched/act_api.c:2061 [inline]
  tc_ctl_action+0x4be/0x19d0 net/sched/act_api.c:2118
  rtnetlink_rcv_msg+0x12fc/0x1410 net/core/rtnetlink.c:6647
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2550
  rtnetlink_rcv+0x34/0x40 net/core/rtnetlink.c:6665
  netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline]
  netlink_unicast+0xf52/0x1260 net/netlink/af_netlink.c:1357
  netlink_sendmsg+0x10da/0x11e0 net/netlink/af_netlink.c:1901
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:745
  ____sys_sendmsg+0x877/0xb60 net/socket.c:2597
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2651
  __sys_sendmsg net/socket.c:2680 [inline]
  __do_sys_sendmsg net/socket.c:2689 [inline]
  __se_sys_sendmsg net/socket.c:2687 [inline]
  __x64_sys_sendmsg+0x307/0x4a0 net/socket.c:2687
  x64_sys_call+0x2dd6/0x3c10 arch/x86/include/generated/asm/syscalls_64.h:47
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Local variable key created at:
  tcf_ct_flow_table_get+0x4a/0x2260 net/sched/act_ct.c:324
  tcf_ct_init+0xa67/0x2890 net/sched/act_ct.c:1408
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42272/">CVE-2024-42272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42272">CVE-2024-42272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229397">SUSE bug 1229397</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42278</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42278" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42278" ref_url="https://www.suse.com/security/cve/CVE-2024-42278" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: TAS2781: Fix tasdev_load_calibrated_data()

This function has a reversed if statement so it's either a no-op or it
leads to a NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42278/">CVE-2024-42278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42278">CVE-2024-42278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229403">SUSE bug 1229403</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42283" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42283" ref_url="https://www.suse.com/security/cve/CVE-2024-42283" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nexthop: Initialize all fields in dumped nexthops

struct nexthop_grp contains two reserved fields that are not initialized by
nla_put_nh_group(), and carry garbage. This can be observed e.g. with
strace (edited for clarity):

    # ip nexthop add id 1 dev lo
    # ip nexthop add id 101 group 1
    # strace -e recvmsg ip nexthop get id 101
    ...
    recvmsg(... [{nla_len=12, nla_type=NHA_GROUP},
                 [{id=1, weight=0, resvd1=0x69, resvd2=0x67}]] ...) = 52

The fields are reserved and therefore not currently used. But as they are, they
leak kernel memory, and the fact they are not just zero complicates repurposing
of the fields for new ends. Initialize the full structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42283/">CVE-2024-42283 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42283">CVE-2024-42283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229383">SUSE bug 1229383</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953945" comment="bpftool-7.4.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953946" comment="kernel-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953947" comment="kernel-abi-stablelists-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953948" comment="kernel-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953949" comment="kernel-cross-headers-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953950" comment="kernel-debug-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953951" comment="kernel-debug-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953954" comment="kernel-debug-modules-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953955" comment="kernel-debug-modules-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953956" comment="kernel-debug-modules-extra-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953957" comment="kernel-debug-uki-virt-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953960" comment="kernel-doc-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953961" comment="kernel-headers-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953962" comment="kernel-modules-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953963" comment="kernel-modules-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953964" comment="kernel-modules-extra-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953965" comment="kernel-tools-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953966" comment="kernel-tools-libs-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953968" comment="kernel-uki-virt-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953969" comment="kernel-uki-virt-addons-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953970" comment="libperf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953971" comment="perf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953972" comment="python3-perf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953973" comment="rtla-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953974" comment="rv-5.14.0-503.14.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42284</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42284" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42284" ref_url="https://www.suse.com/security/cve/CVE-2024-42284" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Return non-zero value from tipc_udp_addr2str() on error

tipc_udp_addr2str() should return non-zero value if the UDP media
address is invalid. Otherwise, a buffer overflow access can occur in
tipc_media_addr_printf(). Fix this by returning 1 on an invalid UDP
media address.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42284/">CVE-2024-42284 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42284">CVE-2024-42284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229382">SUSE bug 1229382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947775" comment="bpftool-7.3.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947776" comment="kernel-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947777" comment="kernel-abi-stablelists-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947778" comment="kernel-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947779" comment="kernel-cross-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947780" comment="kernel-debug-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947781" comment="kernel-debug-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947784" comment="kernel-debug-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947785" comment="kernel-debug-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947786" comment="kernel-debug-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947787" comment="kernel-debug-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947790" comment="kernel-doc-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947791" comment="kernel-headers-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947792" comment="kernel-modules-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947793" comment="kernel-modules-core-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947794" comment="kernel-modules-extra-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947795" comment="kernel-tools-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947796" comment="kernel-tools-libs-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947798" comment="kernel-uki-virt-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947799" comment="libperf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947800" comment="perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947801" comment="python3-perf-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947802" comment="rtla-5.14.0-427.40.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947803" comment="rv-5.14.0-427.40.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42291" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42291" ref_url="https://www.suse.com/security/cve/CVE-2024-42291" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Add a per-VF limit on number of FDIR filters

While the iavf driver adds a s/w limit (128) on the number of FDIR
filters that the VF can request, a malicious VF driver can request more
than that and exhaust the resources for other VFs.

Add a similar limit in ice.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42291/">CVE-2024-42291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42291">CVE-2024-42291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229374">SUSE bug 1229374</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42292</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42292" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42292" ref_url="https://www.suse.com/security/cve/CVE-2024-42292" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kobject_uevent: Fix OOB access within zap_modalias_env()

zap_modalias_env() wrongly calculates size of memory block to move, so
will cause OOB memory access issue if variable MODALIAS is not the last
one within its @env parameter, fixed by correcting size to memmove.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42292/">CVE-2024-42292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42292">CVE-2024-42292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229373">SUSE bug 1229373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977299" comment="bpftool-7.4.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977300" comment="kernel-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977301" comment="kernel-abi-stablelists-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977302" comment="kernel-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977303" comment="kernel-cross-headers-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977304" comment="kernel-debug-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977305" comment="kernel-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977308" comment="kernel-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977309" comment="kernel-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977310" comment="kernel-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977311" comment="kernel-debug-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977314" comment="kernel-doc-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977315" comment="kernel-headers-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977316" comment="kernel-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977317" comment="kernel-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977318" comment="kernel-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977319" comment="kernel-rt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977320" comment="kernel-rt-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977321" comment="kernel-rt-debug-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977322" comment="kernel-rt-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977324" comment="kernel-rt-debug-kvm-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977325" comment="kernel-rt-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977326" comment="kernel-rt-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977327" comment="kernel-rt-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977329" comment="kernel-rt-kvm-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977330" comment="kernel-rt-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977331" comment="kernel-rt-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977332" comment="kernel-rt-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977333" comment="kernel-tools-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977334" comment="kernel-tools-libs-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977336" comment="kernel-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977337" comment="kernel-uki-virt-addons-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977338" comment="libperf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977339" comment="perf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977340" comment="python3-perf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977341" comment="rtla-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977342" comment="rv-5.14.0-503.40.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42294" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42294" ref_url="https://www.suse.com/security/cve/CVE-2024-42294" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix deadlock between sd_remove &amp; sd_release

Our test report the following hung task:

[ 2538.459400] INFO: task "kworker/0:0":7 blocked for more than 188 seconds.
[ 2538.459427] Call trace:
[ 2538.459430]  __switch_to+0x174/0x338
[ 2538.459436]  __schedule+0x628/0x9c4
[ 2538.459442]  schedule+0x7c/0xe8
[ 2538.459447]  schedule_preempt_disabled+0x24/0x40
[ 2538.459453]  __mutex_lock+0x3ec/0xf04
[ 2538.459456]  __mutex_lock_slowpath+0x14/0x24
[ 2538.459459]  mutex_lock+0x30/0xd8
[ 2538.459462]  del_gendisk+0xdc/0x350
[ 2538.459466]  sd_remove+0x30/0x60
[ 2538.459470]  device_release_driver_internal+0x1c4/0x2c4
[ 2538.459474]  device_release_driver+0x18/0x28
[ 2538.459478]  bus_remove_device+0x15c/0x174
[ 2538.459483]  device_del+0x1d0/0x358
[ 2538.459488]  __scsi_remove_device+0xa8/0x198
[ 2538.459493]  scsi_forget_host+0x50/0x70
[ 2538.459497]  scsi_remove_host+0x80/0x180
[ 2538.459502]  usb_stor_disconnect+0x68/0xf4
[ 2538.459506]  usb_unbind_interface+0xd4/0x280
[ 2538.459510]  device_release_driver_internal+0x1c4/0x2c4
[ 2538.459514]  device_release_driver+0x18/0x28
[ 2538.459518]  bus_remove_device+0x15c/0x174
[ 2538.459523]  device_del+0x1d0/0x358
[ 2538.459528]  usb_disable_device+0x84/0x194
[ 2538.459532]  usb_disconnect+0xec/0x300
[ 2538.459537]  hub_event+0xb80/0x1870
[ 2538.459541]  process_scheduled_works+0x248/0x4dc
[ 2538.459545]  worker_thread+0x244/0x334
[ 2538.459549]  kthread+0x114/0x1bc

[ 2538.461001] INFO: task "fsck.":15415 blocked for more than 188 seconds.
[ 2538.461014] Call trace:
[ 2538.461016]  __switch_to+0x174/0x338
[ 2538.461021]  __schedule+0x628/0x9c4
[ 2538.461025]  schedule+0x7c/0xe8
[ 2538.461030]  blk_queue_enter+0xc4/0x160
[ 2538.461034]  blk_mq_alloc_request+0x120/0x1d4
[ 2538.461037]  scsi_execute_cmd+0x7c/0x23c
[ 2538.461040]  ioctl_internal_command+0x5c/0x164
[ 2538.461046]  scsi_set_medium_removal+0x5c/0xb0
[ 2538.461051]  sd_release+0x50/0x94
[ 2538.461054]  blkdev_put+0x190/0x28c
[ 2538.461058]  blkdev_release+0x28/0x40
[ 2538.461063]  __fput+0xf8/0x2a8
[ 2538.461066]  __fput_sync+0x28/0x5c
[ 2538.461070]  __arm64_sys_close+0x84/0xe8
[ 2538.461073]  invoke_syscall+0x58/0x114
[ 2538.461078]  el0_svc_common+0xac/0xe0
[ 2538.461082]  do_el0_svc+0x1c/0x28
[ 2538.461087]  el0_svc+0x38/0x68
[ 2538.461090]  el0t_64_sync_handler+0x68/0xbc
[ 2538.461093]  el0t_64_sync+0x1a8/0x1ac

  T1:				T2:
  sd_remove
  del_gendisk
  __blk_mark_disk_dead
  blk_freeze_queue_start
  ++q-&gt;mq_freeze_depth
  				bdev_release
 				mutex_lock(&amp;disk-&gt;open_mutex)
  				sd_release
 				scsi_execute_cmd
 				blk_queue_enter
 				wait_event(!q-&gt;mq_freeze_depth)
  mutex_lock(&amp;disk-&gt;open_mutex)

SCSI does not set GD_OWNS_QUEUE, so QUEUE_FLAG_DYING is not set in
this scenario. This is a classic ABBA deadlock. To fix the deadlock,
make sure we don't try to acquire disk-&gt;open_mutex after freezing
the queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42294/">CVE-2024-42294 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42294">CVE-2024-42294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229371">SUSE bug 1229371</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42302" ref_url="https://www.suse.com/security/cve/CVE-2024-42302" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/DPC: Fix use-after-free on concurrent DPC and hot-removal

Keith reports a use-after-free when a DPC event occurs concurrently to
hot-removal of the same portion of the hierarchy:

The dpc_handler() awaits readiness of the secondary bus below the
Downstream Port where the DPC event occurred.  To do so, it polls the
config space of the first child device on the secondary bus.  If that
child device is concurrently removed, accesses to its struct pci_dev
cause the kernel to oops.

That's because pci_bridge_wait_for_secondary_bus() neglects to hold a
reference on the child device.  Before v6.3, the function was only
called on resume from system sleep or on runtime resume.  Holding a
reference wasn't necessary back then because the pciehp IRQ thread
could never run concurrently.  (On resume from system sleep, IRQs are
not enabled until after the resume_noirq phase.  And runtime resume is
always awaited before a PCI device is removed.)

However starting with v6.3, pci_bridge_wait_for_secondary_bus() is also
called on a DPC event.  Commit 53b54ad074de ("PCI/DPC: Await readiness
of secondary bus after reset"), which introduced that, failed to
appreciate that pci_bridge_wait_for_secondary_bus() now needs to hold a
reference on the child device because dpc_handler() and pciehp may
indeed run concurrently.  The commit was backported to v5.10+ stable
kernels, so that's the oldest one affected.

Add the missing reference acquisition.

Abridged stack trace:

  BUG: unable to handle page fault for address: 00000000091400c0
  CPU: 15 PID: 2464 Comm: irq/53-pcie-dpc 6.9.0
  RIP: pci_bus_read_config_dword+0x17/0x50
  pci_dev_wait()
  pci_bridge_wait_for_secondary_bus()
  dpc_reset_link()
  pcie_do_recovery()
  dpc_handler()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42302/">CVE-2024-42302 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42302">CVE-2024-42302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229366">SUSE bug 1229366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42304" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42304" ref_url="https://www.suse.com/security/cve/CVE-2024-42304" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: make sure the first directory block is not a hole

The syzbot constructs a directory that has no dirblock but is non-inline,
i.e. the first directory block is a hole. And no errors are reported when
creating files in this directory in the following flow.

    ext4_mknod
     ...
      ext4_add_entry
        // Read block 0
        ext4_read_dirblock(dir, block, DIRENT)
          bh = ext4_bread(NULL, inode, block, 0)
          if (!bh &amp;&amp; (type == INDEX || type == DIRENT_HTREE))
          // The first directory block is a hole
          // But type == DIRENT, so no error is reported.

After that, we get a directory block without '.' and '..' but with a valid
dentry. This may cause some code that relies on dot or dotdot (such as
make_indexed_dir()) to crash.

Therefore when ext4_read_dirblock() finds that the first directory block
is a hole report that the filesystem is corrupted and return an error to
avoid loading corrupted data from disk causing something bad.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42304/">CVE-2024-42304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42304">CVE-2024-42304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229364">SUSE bug 1229364</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42305" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42305" ref_url="https://www.suse.com/security/cve/CVE-2024-42305" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: check dot and dotdot of dx_root before making dir indexed

Syzbot reports a issue as follows:
============================================
BUG: unable to handle page fault for address: ffffed11022e24fe
PGD 23ffee067 P4D 23ffee067 PUD 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 PID: 5079 Comm: syz-executor306 Not tainted 6.10.0-rc5-g55027e689933 #0
Call Trace:
 &lt;TASK&gt;
 make_indexed_dir+0xdaf/0x13c0 fs/ext4/namei.c:2341
 ext4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2451
 ext4_rename fs/ext4/namei.c:3936 [inline]
 ext4_rename2+0x26e5/0x4370 fs/ext4/namei.c:4214
[...]
============================================

The immediate cause of this problem is that there is only one valid dentry
for the block to be split during do_split, so split==0 results in out of
bounds accesses to the map triggering the issue.

    do_split
      unsigned split
      dx_make_map
       count = 1
      split = count/2 = 0;
      continued = hash2 == map[split - 1].hash;
       ---&gt; map[4294967295]

The maximum length of a filename is 255 and the minimum block size is 1024,
so it is always guaranteed that the number of entries is greater than or
equal to 2 when do_split() is called.

But syzbot's crafted image has no dot and dotdot in dir, and the dentry
distribution in dirblock is as follows:

  bus     dentry1          hole           dentry2           free
|xx--|xx-------------|...............|xx-------------|...............|
0   12 (8+248)=256  268     256     524 (8+256)=264 788     236     1024

So when renaming dentry1 increases its name_len length by 1, neither hole
nor free is sufficient to hold the new dentry, and make_indexed_dir() is
called.

In make_indexed_dir() it is assumed that the first two entries of the
dirblock must be dot and dotdot, so bus and dentry1 are left in dx_root
because they are treated as dot and dotdot, and only dentry2 is moved
to the new leaf block. That's why count is equal to 1.

Therefore add the ext4_check_dx_root() helper function to add more sanity
checks to dot and dotdot before starting the conversion to avoid the above
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42305/">CVE-2024-42305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42305">CVE-2024-42305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229363">SUSE bug 1229363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42312</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42312" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42312" ref_url="https://www.suse.com/security/cve/CVE-2024-42312" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysctl: always initialize i_uid/i_gid

Always initialize i_uid/i_gid inside the sysfs core so set_ownership()
can safely skip setting them.

Commit 5ec27ec735ba ("fs/proc/proc_sysctl.c: fix the default values of
i_uid/i_gid on /proc/sys inodes.") added defaults for i_uid/i_gid when
set_ownership() was not implemented. It also missed adjusting
net_ctl_set_ownership() to use the same default values in case the
computation of a better value failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42312/">CVE-2024-42312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42312">CVE-2024-42312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229357">SUSE bug 1229357</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42315</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42315" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42315" ref_url="https://www.suse.com/security/cve/CVE-2024-42315" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix potential deadlock on __exfat_get_dentry_set

When accessing a file with more entries than ES_MAX_ENTRY_NUM, the bh-array
is allocated in __exfat_get_entry_set. The problem is that the bh-array is
allocated with GFP_KERNEL. It does not make sense. In the following cases,
a deadlock for sbi-&gt;s_lock between the two processes may occur.

       CPU0                CPU1
       ----                ----
  kswapd
   balance_pgdat
    lock(fs_reclaim)
                      exfat_iterate
                       lock(&amp;sbi-&gt;s_lock)
                       exfat_readdir
                        exfat_get_uniname_from_ext_entry
                         exfat_get_dentry_set
                          __exfat_get_dentry_set
                           kmalloc_array
                            ...
                            lock(fs_reclaim)
    ...
    evict
     exfat_evict_inode
      lock(&amp;sbi-&gt;s_lock)

To fix this, let's allocate bh-array with GFP_NOFS.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42315/">CVE-2024-42315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42315">CVE-2024-42315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229354">SUSE bug 1229354</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42316</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42316" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42316" ref_url="https://www.suse.com/security/cve/CVE-2024-42316" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mglru: fix div-by-zero in vmpressure_calc_level()

evict_folios() uses a second pass to reclaim folios that have gone through
page writeback and become clean before it finishes the first pass, since
folio_rotate_reclaimable() cannot handle those folios due to the
isolation.

The second pass tries to avoid potential double counting by deducting
scan_control-&gt;nr_scanned.  However, this can result in underflow of
nr_scanned, under a condition where shrink_folio_list() does not increment
nr_scanned, i.e., when folio_trylock() fails.

The underflow can cause the divisor, i.e., scale=scanned+reclaimed in
vmpressure_calc_level(), to become zero, resulting in the following crash:

  [exception RIP: vmpressure_work_fn+101]
  process_one_work at ffffffffa3313f2b

Since scan_control-&gt;nr_scanned has no established semantics, the potential
double counting has minimal risks.  Therefore, fix the problem by not
deducting scan_control-&gt;nr_scanned in evict_folios().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42316/">CVE-2024-42316 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42316">CVE-2024-42316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229353">SUSE bug 1229353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42321" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42321" ref_url="https://www.suse.com/security/cve/CVE-2024-42321" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: flow_dissector: use DEBUG_NET_WARN_ON_ONCE

The following splat is easy to reproduce upstream as well as in -stable
kernels. Florian Westphal provided the following commit:

  d1dab4f71d37 ("net: add and use __skb_get_hash_symmetric_net")

but this complementary fix has been also suggested by Willem de Bruijn
and it can be easily backported to -stable kernel which consists in
using DEBUG_NET_WARN_ON_ONCE instead to silence the following splat
given __skb_get_hash() is used by the nftables tracing infrastructure to
to identify packets in traces.

[69133.561393] ------------[ cut here ]------------
[69133.561404] WARNING: CPU: 0 PID: 43576 at net/core/flow_dissector.c:1104 __skb_flow_dissect+0x134f/
[...]
[69133.561944] CPU: 0 PID: 43576 Comm: socat Not tainted 6.10.0-rc7+ #379
[69133.561959] RIP: 0010:__skb_flow_dissect+0x134f/0x2ad0
[69133.561970] Code: 83 f9 04 0f 84 b3 00 00 00 45 85 c9 0f 84 aa 00 00 00 41 83 f9 02 0f 84 81 fc ff
ff 44 0f b7 b4 24 80 00 00 00 e9 8b f9 ff ff &lt;0f&gt; 0b e9 20 f3 ff ff 41 f6 c6 20 0f 84 e4 ef ff ff 48 8d 7b 12 e8
[69133.561979] RSP: 0018:ffffc90000006fc0 EFLAGS: 00010246
[69133.561988] RAX: 0000000000000000 RBX: ffffffff82f33e20 RCX: ffffffff81ab7e19
[69133.561994] RDX: dffffc0000000000 RSI: ffffc90000007388 RDI: ffff888103a1b418
[69133.562001] RBP: ffffc90000007310 R08: 0000000000000000 R09: 0000000000000000
[69133.562007] R10: ffffc90000007388 R11: ffffffff810cface R12: ffff888103a1b400
[69133.562013] R13: 0000000000000000 R14: ffffffff82f33e2a R15: ffffffff82f33e28
[69133.562020] FS:  00007f40f7131740(0000) GS:ffff888390800000(0000) knlGS:0000000000000000
[69133.562027] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[69133.562033] CR2: 00007f40f7346ee0 CR3: 000000015d200001 CR4: 00000000001706f0
[69133.562040] Call Trace:
[69133.562044]  &lt;IRQ&gt;
[69133.562049]  ? __warn+0x9f/0x1a0
[ 1211.841384]  ? __skb_flow_dissect+0x107e/0x2860
[...]
[ 1211.841496]  ? bpf_flow_dissect+0x160/0x160
[ 1211.841753]  __skb_get_hash+0x97/0x280
[ 1211.841765]  ? __skb_get_hash_symmetric+0x230/0x230
[ 1211.841776]  ? mod_find+0xbf/0xe0
[ 1211.841786]  ? get_stack_info_noinstr+0x12/0xe0
[ 1211.841798]  ? bpf_ksym_find+0x56/0xe0
[ 1211.841807]  ? __rcu_read_unlock+0x2a/0x70
[ 1211.841819]  nft_trace_init+0x1b9/0x1c0 [nf_tables]
[ 1211.841895]  ? nft_trace_notify+0x830/0x830 [nf_tables]
[ 1211.841964]  ? get_stack_info+0x2b/0x80
[ 1211.841975]  ? nft_do_chain_arp+0x80/0x80 [nf_tables]
[ 1211.842044]  nft_do_chain+0x79c/0x850 [nf_tables]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42321/">CVE-2024-42321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42321">CVE-2024-42321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229348">SUSE bug 1229348</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42322" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42322" ref_url="https://www.suse.com/security/cve/CVE-2024-42322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: properly dereference pe in ip_vs_add_service

Use pe directly to resolve sparse warning:

  net/netfilter/ipvs/ip_vs_ctl.c:1471:27: warning: dereference of noderef expression
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-42322/">CVE-2024-42322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-42322">CVE-2024-42322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229347">SUSE bug 1229347</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977299" comment="bpftool-7.4.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977300" comment="kernel-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977301" comment="kernel-abi-stablelists-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977302" comment="kernel-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977303" comment="kernel-cross-headers-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977304" comment="kernel-debug-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977305" comment="kernel-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977308" comment="kernel-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977309" comment="kernel-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977310" comment="kernel-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977311" comment="kernel-debug-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977314" comment="kernel-doc-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977315" comment="kernel-headers-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977316" comment="kernel-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977317" comment="kernel-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977318" comment="kernel-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977319" comment="kernel-rt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977320" comment="kernel-rt-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977321" comment="kernel-rt-debug-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977322" comment="kernel-rt-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977324" comment="kernel-rt-debug-kvm-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977325" comment="kernel-rt-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977326" comment="kernel-rt-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977327" comment="kernel-rt-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977329" comment="kernel-rt-kvm-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977330" comment="kernel-rt-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977331" comment="kernel-rt-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977332" comment="kernel-rt-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977333" comment="kernel-tools-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977334" comment="kernel-tools-libs-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977336" comment="kernel-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977337" comment="kernel-uki-virt-addons-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977338" comment="libperf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977339" comment="perf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977340" comment="python3-perf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977341" comment="rtla-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977342" comment="rv-5.14.0-503.40.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42472" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42472" ref_url="https://www.suse.com/security/cve/CVE-2024-42472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6356" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000024.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000034.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9449" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3104-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019388.html" source="SUSE-SU"/>
    <description>
    Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.14.0 and 1.15.10, a malicious or compromised Flatpak app using persistent directories could access and write files outside of what it would otherwise have access to, which is an attack on integrity and confidentiality.

When `persistent=subdir` is used in the application permissions (represented as `--persist=subdir` in the command-line interface), that means that an application which otherwise doesn't have access to the real user home directory will see an empty home directory with a writeable subdirectory `subdir`. Behind the scenes, this directory is actually a bind mount and the data is stored in the per-application directory as `~/.var/app/$APPID/subdir`. This allows existing apps that are not aware of the per-application directory to still work as intended without general home directory access.

However, the application does have write access to the application directory `~/.var/app/$APPID` where this directory is stored. If the source directory for the `persistent`/`--persist` option is replaced by a symlink, then the next time the application is started, the bind mount will follow the symlink and mount whatever it points to into the sandbox.

Partial protection against this vulnerability can be provided by patching Flatpak using the patches in commits ceec2ffc and 98f79773. However, this leaves a race condition that could be exploited by two instances of a malicious app running in parallel. Closing the race condition requires updating or patching the version of bubblewrap that is used by Flatpak to add the new `--bind-fd` option using the patch and then patching Flatpak to use it. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=bwrap` (1.15.x) or `--with-system-bubblewrap=bwrap` (1.14.x or older), or a similar option, then the version of bubblewrap that needs to be patched is a system copy that is distributed separately, typically `/usr/bin/bwrap`. This configuration is the one that is typically used in Linux distributions. If Flatpak has been configured at build-time with `-Dsystem_bubblewrap=` (1.15.x) or with `--without-system-bubblewrap` (1.14.x or older), then it is the bundled version of bubblewrap that is included with Flatpak that must be patched. This is typically installed as `/usr/libexec/flatpak-bwrap`. This configuration is the default when building from source code.

For the 1.14.x stable branch, these changes are included in Flatpak 1.14.10. The bundled version of bubblewrap included in this release has been updated to 0.6.3. For the 1.15.x development branch, these changes are included in Flatpak 1.15.10. The bundled version of bubblewrap in this release is a Meson "wrap" subproject, which has been updated to 0.10.0. The 1.12.x and 1.10.x branches will not be updated for this vulnerability. Long-term support OS distributions should backport the individual changes into their versions of Flatpak and bubblewrap, or update to newer versions if their stability policy allows it. As a workaround, avoid using applications using the `persistent` (`--persist`) permission.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-12"/>
	<updated date="2025-07-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42472/">CVE-2024-42472 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42472">CVE-2024-42472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229157">SUSE bug 1229157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953769" comment="bubblewrap-0.4.1-8.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953770" comment="flatpak-1.12.9-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953771" comment="flatpak-devel-1.12.9-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953772" comment="flatpak-libs-1.12.9-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953773" comment="flatpak-selinux-1.12.9-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953774" comment="flatpak-session-helper-1.12.9-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202442934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-42934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-42934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-42934" ref_url="https://www.suse.com/security/cve/CVE-2024-42934" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14373-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/W6CPEIEQEMRA5GO62BN7FFSGY3UQLGZP/" source="SUSE-SU"/>
    <description>
    OpenIPMI before 2.0.36 has an out-of-bounds array access (for authentication type) in the ipmi_sim simulator, resulting in denial of service or (with very low probability) authentication bypass or code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-15"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-42934/">CVE-2024-42934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-42934">CVE-2024-42934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229910">SUSE bug 1229910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009947336" comment="OpenIPMI-2.0.32-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947337" comment="OpenIPMI-devel-2.0.32-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947338" comment="OpenIPMI-lanserv-2.0.32-5.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009947339" comment="OpenIPMI-libs-2.0.32-5.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4317</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4317" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4317" ref_url="https://www.suse.com/security/cve/CVE-2024-4317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2262-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2262-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3159-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019677.html" source="SUSE-SU"/>
    <description>
    Missing authorization in PostgreSQL built-in views pg_stats_ext and pg_stats_ext_exprs allows an unprivileged database user to read most common values and other statistics from CREATE STATISTICS commands of other users. The most common values may reveal column values the eavesdropper could not otherwise read or results of functions they cannot execute. Installing an unaffected version only fixes fresh PostgreSQL installations, namely those that are created with the initdb utility after installing that version. Current PostgreSQL installations will remain vulnerable until they follow the instructions in the release notes. Within major versions 14-16, minor versions before PostgreSQL 16.3, 15.7, and 14.12 are affected. Versions before PostgreSQL 14 are unaffected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-4317/">CVE-2024-4317 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4317">CVE-2024-4317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224038">SUSE bug 1224038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881472" comment="pg_repack-1.4.8-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881475" comment="postgresql-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881476" comment="postgresql-contrib-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881477" comment="postgresql-docs-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881478" comment="postgresql-plperl-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881479" comment="postgresql-plpython3-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881480" comment="postgresql-pltcl-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881481" comment="postgresql-private-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881482" comment="postgresql-private-libs-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881483" comment="postgresql-server-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881484" comment="postgresql-server-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881485" comment="postgresql-static-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881486" comment="postgresql-test-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881487" comment="postgresql-test-rpm-macros-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881488" comment="postgresql-upgrade-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881489" comment="postgresql-upgrade-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43398" ref_url="https://www.suse.com/security/cve/CVE-2024-43398" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6670" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6784" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000050.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000053.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019756.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/" source="SUSE-SU"/>
    <description>
    REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-21"/>
	<updated date="2025-05-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43398/">CVE-2024-43398 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43398">CVE-2024-43398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229673">SUSE bug 1229673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943818" comment="ruby-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943819" comment="ruby-bundled-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943820" comment="ruby-default-gems-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943821" comment="ruby-devel-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943822" comment="ruby-doc-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943823" comment="ruby-libs-3.3.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943824" comment="rubygem-bigdecimal-3.1.5-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943825" comment="rubygem-bundler-2.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943826" comment="rubygem-io-console-0.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943827" comment="rubygem-irb-1.13.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943828" comment="rubygem-json-2.7.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943829" comment="rubygem-minitest-5.20.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943830" comment="rubygem-power_assert-2.0.3-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943831" comment="rubygem-psych-5.1.2-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943832" comment="rubygem-racc-1.7.3-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943833" comment="rubygem-rake-13.1.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943834" comment="rubygem-rbs-3.4.0-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943835" comment="rubygem-rdoc-6.6.3.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977574" comment="rubygem-rexml-3.3.9-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977575" comment="rubygem-rss-0.3.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943838" comment="rubygem-test-unit-3.6.1-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943839" comment="rubygem-typeprof-0.21.9-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943840" comment="rubygems-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943841" comment="rubygems-devel-3.5.16-3.module+el9.4.0+22273+463af10f is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43420" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43420" ref_url="https://www.suse.com/security/cve/CVE-2024-43420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel Atom(R) processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-43420/">CVE-2024-43420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43420">CVE-2024-43420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243451">SUSE bug 1243451</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053953" comment="microcode_ctl-20250211-1.20250512.1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43483</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43483" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43483" ref_url="https://www.suse.com/security/cve/CVE-2024-43483" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7851" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000125.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7868" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000122.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000123.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43483/">CVE-2024-43483 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43483">CVE-2024-43483 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009946449" comment="aspnetcore-runtime-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946458" comment="aspnetcore-runtime-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946459" comment="aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946450" comment="aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946460" comment="aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946451" comment="dotnet-apphost-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946461" comment="dotnet-apphost-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946462" comment="dotnet-host-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946452" comment="dotnet-hostfxr-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946463" comment="dotnet-hostfxr-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946453" comment="dotnet-runtime-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946464" comment="dotnet-runtime-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946465" comment="dotnet-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946454" comment="dotnet-sdk-6.0-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946455" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946466" comment="dotnet-sdk-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946467" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946468" comment="dotnet-sdk-dbg-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946456" comment="dotnet-targeting-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946469" comment="dotnet-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946457" comment="dotnet-templates-6.0-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946470" comment="dotnet-templates-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946471" comment="netstandard-targeting-pack-2.1-8.0.110-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43484</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43484" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43484" ref_url="https://www.suse.com/security/cve/CVE-2024-43484" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7851" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000125.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7868" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000122.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000123.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43484/">CVE-2024-43484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43484">CVE-2024-43484 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009946449" comment="aspnetcore-runtime-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946458" comment="aspnetcore-runtime-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946459" comment="aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946450" comment="aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946460" comment="aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946451" comment="dotnet-apphost-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946461" comment="dotnet-apphost-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946462" comment="dotnet-host-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946452" comment="dotnet-hostfxr-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946463" comment="dotnet-hostfxr-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946453" comment="dotnet-runtime-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946464" comment="dotnet-runtime-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946465" comment="dotnet-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946454" comment="dotnet-sdk-6.0-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946455" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946466" comment="dotnet-sdk-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946467" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946468" comment="dotnet-sdk-dbg-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946456" comment="dotnet-targeting-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946469" comment="dotnet-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946457" comment="dotnet-templates-6.0-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946470" comment="dotnet-templates-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946471" comment="netstandard-targeting-pack-2.1-8.0.110-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43485</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43485" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43485" ref_url="https://www.suse.com/security/cve/CVE-2024-43485" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7851" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000125.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7868" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000122.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7869" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000123.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-11"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43485/">CVE-2024-43485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43485">CVE-2024-43485 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009946449" comment="aspnetcore-runtime-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946458" comment="aspnetcore-runtime-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946459" comment="aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946450" comment="aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946460" comment="aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946451" comment="dotnet-apphost-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946461" comment="dotnet-apphost-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946462" comment="dotnet-host-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946452" comment="dotnet-hostfxr-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946463" comment="dotnet-hostfxr-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946453" comment="dotnet-runtime-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946464" comment="dotnet-runtime-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946465" comment="dotnet-runtime-dbg-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946454" comment="dotnet-sdk-6.0-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946455" comment="dotnet-sdk-6.0-source-built-artifacts-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946466" comment="dotnet-sdk-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946467" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946468" comment="dotnet-sdk-dbg-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946456" comment="dotnet-targeting-pack-6.0-6.0.35-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946469" comment="dotnet-targeting-pack-8.0-8.0.10-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946457" comment="dotnet-templates-6.0-6.0.135-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946470" comment="dotnet-templates-8.0-8.0.110-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009946471" comment="netstandard-targeting-pack-2.1-8.0.110-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43498" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43498" ref_url="https://www.suse.com/security/cve/CVE-2024-43498" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9543" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000608.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-07-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43498/">CVE-2024-43498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43498">CVE-2024-43498 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009954005" comment="aspnetcore-runtime-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954006" comment="aspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954007" comment="aspnetcore-targeting-pack-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954008" comment="dotnet-apphost-pack-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954009" comment="dotnet-host-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954010" comment="dotnet-hostfxr-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954011" comment="dotnet-runtime-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954012" comment="dotnet-runtime-dbg-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954013" comment="dotnet-sdk-9.0-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954014" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954015" comment="dotnet-sdk-aot-9.0-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954016" comment="dotnet-sdk-dbg-9.0-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954017" comment="dotnet-targeting-pack-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954018" comment="dotnet-templates-9.0-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954019" comment="netstandard-targeting-pack-2.1-9.0.100-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43499" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43499" ref_url="https://www.suse.com/security/cve/CVE-2024-43499" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9543" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000608.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-23"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-43499/">CVE-2024-43499 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43499">CVE-2024-43499 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009954005" comment="aspnetcore-runtime-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954006" comment="aspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954007" comment="aspnetcore-targeting-pack-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954008" comment="dotnet-apphost-pack-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954009" comment="dotnet-host-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954010" comment="dotnet-hostfxr-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954011" comment="dotnet-runtime-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954012" comment="dotnet-runtime-dbg-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954013" comment="dotnet-sdk-9.0-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954014" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954015" comment="dotnet-sdk-aot-9.0-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954016" comment="dotnet-sdk-dbg-9.0-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954017" comment="dotnet-targeting-pack-9.0-9.0.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954018" comment="dotnet-templates-9.0-9.0.100-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009954019" comment="netstandard-targeting-pack-2.1-9.0.100-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4367" ref_url="https://www.suse.com/security/cve/CVE-2024-4367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4367/">CVE-2024-4367 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4367">CVE-2024-4367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875027" comment="firefox-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875028" comment="firefox-x11-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875029" comment="thunderbird-115.11.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43820" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43820" ref_url="https://www.suse.com/security/cve/CVE-2024-43820" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume

rm-raid devices will occasionally trigger the following warning when
being resumed after a table load because DM_RECOVERY_RUNNING is set:

WARNING: CPU: 7 PID: 5660 at drivers/md/dm-raid.c:4105 raid_resume+0xee/0x100 [dm_raid]

The failing check is:
WARN_ON_ONCE(test_bit(MD_RECOVERY_RUNNING, &amp;mddev-&gt;recovery));

This check is designed to make sure that the sync thread isn't
registered, but md_check_recovery can set MD_RECOVERY_RUNNING without
the sync_thread ever getting registered. Instead of checking if
MD_RECOVERY_RUNNING is set, check if sync_thread is non-NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43820/">CVE-2024-43820 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43820">CVE-2024-43820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229311">SUSE bug 1229311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43821</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43821" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43821" ref_url="https://www.suse.com/security/cve/CVE-2024-43821" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix a possible null pointer dereference

In function lpfc_xcvr_data_show, the memory allocation with kmalloc might
fail, thereby making rdp_context a null pointer. In the following context
and functions that use this pointer, there are dereferencing operations,
leading to null pointer dereference.

To fix this issue, a null pointer check should be added. If it is null,
use scnprintf to notify the user and return len.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43821/">CVE-2024-43821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43821">CVE-2024-43821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229315">SUSE bug 1229315</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43823" ref_url="https://www.suse.com/security/cve/CVE-2024-43823" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: keystone: Fix NULL pointer dereference in case of DT error in ks_pcie_setup_rc_app_regs()

If IORESOURCE_MEM is not provided in Device Tree due to
any error, resource_list_first_type() will return NULL and
pci_parse_request_of_pci_ranges() will just emit a warning.

This will cause a NULL pointer dereference. Fix this bug by adding NULL
return check.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43823/">CVE-2024-43823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43823">CVE-2024-43823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229303">SUSE bug 1229303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43828" ref_url="https://www.suse.com/security/cve/CVE-2024-43828" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix infinite loop when replaying fast_commit

When doing fast_commit replay an infinite loop may occur due to an
uninitialized extent_status struct.  ext4_ext_determine_insert_hole() does
not detect the replay and calls ext4_es_find_extent_range(), which will
return immediately without initializing the 'es' variable.

Because 'es' contains garbage, an integer overflow may happen causing an
infinite loop in this function, easily reproducible using fstest generic/039.

This commit fixes this issue by unconditionally initializing the structure
in function ext4_es_find_extent_range().

Thanks to Zhang Yi, for figuring out the real problem!
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43828/">CVE-2024-43828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43828">CVE-2024-43828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229394">SUSE bug 1229394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43834" ref_url="https://www.suse.com/security/cve/CVE-2024-43834" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xdp: fix invalid wait context of page_pool_destroy()

If the driver uses a page pool, it creates a page pool with
page_pool_create().
The reference count of page pool is 1 as default.
A page pool will be destroyed only when a reference count reaches 0.
page_pool_destroy() is used to destroy page pool, it decreases a
reference count.
When a page pool is destroyed, -&gt;disconnect() is called, which is
mem_allocator_disconnect().
This function internally acquires mutex_lock().

If the driver uses XDP, it registers a memory model with
xdp_rxq_info_reg_mem_model().
The xdp_rxq_info_reg_mem_model() internally increases a page pool
reference count if a memory model is a page pool.
Now the reference count is 2.

To destroy a page pool, the driver should call both page_pool_destroy()
and xdp_unreg_mem_model().
The xdp_unreg_mem_model() internally calls page_pool_destroy().
Only page_pool_destroy() decreases a reference count.

If a driver calls page_pool_destroy() then xdp_unreg_mem_model(), we
will face an invalid wait context warning.
Because xdp_unreg_mem_model() calls page_pool_destroy() with
rcu_read_lock().
The page_pool_destroy() internally acquires mutex_lock().

Splat looks like:
=============================
[ BUG: Invalid wait context ]
6.10.0-rc6+ #4 Tainted: G W
-----------------------------
ethtool/1806 is trying to lock:
ffffffff90387b90 (mem_id_lock){+.+.}-{4:4}, at: mem_allocator_disconnect+0x73/0x150
other info that might help us debug this:
context-{5:5}
3 locks held by ethtool/1806:
stack backtrace:
CPU: 0 PID: 1806 Comm: ethtool Tainted: G W 6.10.0-rc6+ #4 f916f41f172891c800f2fed
Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x7e/0xc0
__lock_acquire+0x1681/0x4de0
? _printk+0x64/0xe0
? __pfx_mark_lock.part.0+0x10/0x10
? __pfx___lock_acquire+0x10/0x10
lock_acquire+0x1b3/0x580
? mem_allocator_disconnect+0x73/0x150
? __wake_up_klogd.part.0+0x16/0xc0
? __pfx_lock_acquire+0x10/0x10
? dump_stack_lvl+0x91/0xc0
__mutex_lock+0x15c/0x1690
? mem_allocator_disconnect+0x73/0x150
? __pfx_prb_read_valid+0x10/0x10
? mem_allocator_disconnect+0x73/0x150
? __pfx_llist_add_batch+0x10/0x10
? console_unlock+0x193/0x1b0
? lockdep_hardirqs_on+0xbe/0x140
? __pfx___mutex_lock+0x10/0x10
? tick_nohz_tick_stopped+0x16/0x90
? __irq_work_queue_local+0x1e5/0x330
? irq_work_queue+0x39/0x50
? __wake_up_klogd.part.0+0x79/0xc0
? mem_allocator_disconnect+0x73/0x150
mem_allocator_disconnect+0x73/0x150
? __pfx_mem_allocator_disconnect+0x10/0x10
? mark_held_locks+0xa5/0xf0
? rcu_is_watching+0x11/0xb0
page_pool_release+0x36e/0x6d0
page_pool_destroy+0xd7/0x440
xdp_unreg_mem_model+0x1a7/0x2a0
? __pfx_xdp_unreg_mem_model+0x10/0x10
? kfree+0x125/0x370
? bnxt_free_ring.isra.0+0x2eb/0x500
? bnxt_free_mem+0x5ac/0x2500
xdp_rxq_info_unreg+0x4a/0xd0
bnxt_free_mem+0x1356/0x2500
bnxt_close_nic+0xf0/0x3b0
? __pfx_bnxt_close_nic+0x10/0x10
? ethnl_parse_bit+0x2c6/0x6d0
? __pfx___nla_validate_parse+0x10/0x10
? __pfx_ethnl_parse_bit+0x10/0x10
bnxt_set_features+0x2a8/0x3e0
__netdev_update_features+0x4dc/0x1370
? ethnl_parse_bitset+0x4ff/0x750
? __pfx_ethnl_parse_bitset+0x10/0x10
? __pfx___netdev_update_features+0x10/0x10
? mark_held_locks+0xa5/0xf0
? _raw_spin_unlock_irqrestore+0x42/0x70
? __pm_runtime_resume+0x7d/0x110
ethnl_set_features+0x32d/0xa20

To fix this problem, it uses rhashtable_lookup_fast() instead of
rhashtable_lookup() with rcu_read_lock().
Using xa without rcu_read_lock() here is safe.
xa is freed by __xdp_mem_allocator_rcu_free() and this is called by
call_rcu() of mem_xa_remove().
The mem_xa_remove() is called by page_pool_destroy() if a reference
count reaches 0.
The xa is already protected by the reference count mechanism well in the
control plane.
So removing rcu_read_lock() for page_pool_destroy() is safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43834/">CVE-2024-43834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43834">CVE-2024-43834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229314">SUSE bug 1229314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43846</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43846" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43846" ref_url="https://www.suse.com/security/cve/CVE-2024-43846" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib: objagg: Fix general protection fault

The library supports aggregation of objects into other objects only if
the parent object does not have a parent itself. That is, nesting is not
supported.

Aggregation happens in two cases: Without and with hints, where hints
are a pre-computed recommendation on how to aggregate the provided
objects.

Nesting is not possible in the first case due to a check that prevents
it, but in the second case there is no check because the assumption is
that nesting cannot happen when creating objects based on hints. The
violation of this assumption leads to various warnings and eventually to
a general protection fault [1].

Before fixing the root cause, error out when nesting happens and warn.

[1]
general protection fault, probably for non-canonical address 0xdead000000000d90: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 1083 Comm: kworker/1:9 Tainted: G        W          6.9.0-rc6-custom-gd9b4f1cca7fb #7
Hardware name: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 01/06/2019
Workqueue: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work
RIP: 0010:mlxsw_sp_acl_erp_bf_insert+0x25/0x80
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_acl_atcam_entry_add+0x256/0x3c0
 mlxsw_sp_acl_tcam_entry_create+0x5e/0xa0
 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270
 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510
 process_one_work+0x151/0x370
 worker_thread+0x2cb/0x3e0
 kthread+0xd0/0x100
 ret_from_fork+0x34/0x50
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43846/">CVE-2024-43846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43846">CVE-2024-43846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229360">SUSE bug 1229360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43853" ref_url="https://www.suse.com/security/cve/CVE-2024-43853" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup/cpuset: Prevent UAF in proc_cpuset_show()

An UAF can happen when /proc/cpuset is read as reported in [1].

This can be reproduced by the following methods:
1.add an mdelay(1000) before acquiring the cgroup_lock In the
 cgroup_path_ns function.
2.$cat /proc/&lt;pid&gt;/cpuset   repeatly.
3.$mount -t cgroup -o cpuset cpuset /sys/fs/cgroup/cpuset/
$umount /sys/fs/cgroup/cpuset/   repeatly.

The race that cause this bug can be shown as below:

(umount)		|	(cat /proc/&lt;pid&gt;/cpuset)
css_release		|	proc_cpuset_show
css_release_work_fn	|	css = task_get_css(tsk, cpuset_cgrp_id);
css_free_rwork_fn	|	cgroup_path_ns(css-&gt;cgroup, ...);
cgroup_destroy_root	|	mutex_lock(&amp;cgroup_mutex);
rebind_subsystems	|
cgroup_free_root 	|
			|	// cgrp was freed, UAF
			|	cgroup_path_ns_locked(cgrp,..);

When the cpuset is initialized, the root node top_cpuset.css.cgrp
will point to &amp;cgrp_dfl_root.cgrp. In cgroup v1, the mount operation will
allocate cgroup_root, and top_cpuset.css.cgrp will point to the allocated
&amp;cgroup_root.cgrp. When the umount operation is executed,
top_cpuset.css.cgrp will be rebound to &amp;cgrp_dfl_root.cgrp.

The problem is that when rebinding to cgrp_dfl_root, there are cases
where the cgroup_root allocated by setting up the root for cgroup v1
is cached. This could lead to a Use-After-Free (UAF) if it is
subsequently freed. The descendant cgroups of cgroup v1 can only be
freed after the css is released. However, the css of the root will never
be released, yet the cgroup_root should be freed when it is unmounted.
This means that obtaining a reference to the css of the root does
not guarantee that css.cgrp-&gt;root will not be freed.

Fix this problem by using rcu_read_lock in proc_cpuset_show().
As cgroup_root is kfree_rcu after commit d23b5c577715
("cgroup: Make operations on the cgroup root_list RCU safe"),
css-&gt;cgroup won't be freed during the critical section.
To call cgroup_path_ns_locked, css_set_lock is needed, so it is safe to
replace task_get_css with task_css.

[1] https://syzkaller.appspot.com/bug?extid=9b1ff7be974a403aa4cd
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43853/">CVE-2024-43853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43853">CVE-2024-43853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229292">SUSE bug 1229292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43854</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43854" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43854" ref_url="https://www.suse.com/security/cve/CVE-2024-43854" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: initialize integrity buffer to zero before writing it to media

Metadata added by bio_integrity_prep is using plain kmalloc, which leads
to random kernel memory being written media.  For PI metadata this is
limited to the app tag that isn't used by kernel generated metadata,
but for non-PI metadata the entire buffer leaks kernel memory.

Fix this by adding the __GFP_ZERO flag to allocations for writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43854/">CVE-2024-43854 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43854">CVE-2024-43854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229345">SUSE bug 1229345</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957437" comment="bpftool-7.4.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957438" comment="kernel-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957439" comment="kernel-abi-stablelists-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957440" comment="kernel-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957441" comment="kernel-cross-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957442" comment="kernel-debug-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957443" comment="kernel-debug-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957446" comment="kernel-debug-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957447" comment="kernel-debug-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957448" comment="kernel-debug-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957449" comment="kernel-debug-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957452" comment="kernel-doc-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957453" comment="kernel-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957454" comment="kernel-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957455" comment="kernel-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957456" comment="kernel-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957457" comment="kernel-tools-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957458" comment="kernel-tools-libs-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957460" comment="kernel-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957461" comment="kernel-uki-virt-addons-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957462" comment="libperf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957463" comment="perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957464" comment="python3-perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957465" comment="rtla-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957466" comment="rv-5.14.0-503.16.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43855" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43855" ref_url="https://www.suse.com/security/cve/CVE-2024-43855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3506" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix deadlock between mddev_suspend and flush bio

Deadlock occurs when mddev is being suspended while some flush bio is in
progress. It is a complex issue.

T1. the first flush is at the ending stage, it clears 'mddev-&gt;flush_bio'
    and tries to submit data, but is blocked because mddev is suspended
    by T4.
T2. the second flush sets 'mddev-&gt;flush_bio', and attempts to queue
    md_submit_flush_data(), which is already running (T1) and won't
    execute again if on the same CPU as T1.
T3. the third flush inc active_io and tries to flush, but is blocked because
    'mddev-&gt;flush_bio' is not NULL (set by T2).
T4. mddev_suspend() is called and waits for active_io dec to 0 which is inc
    by T3.

  T1		T2		T3		T4
  (flush 1)	(flush 2)	(third 3)	(suspend)
  md_submit_flush_data
   mddev-&gt;flush_bio = NULL;
   .
   .	 	md_flush_request
   .	  	 mddev-&gt;flush_bio = bio
   .	  	 queue submit_flushes
   .		 .
   .		 .		md_handle_request
   .		 .		 active_io + 1
   .		 .		 md_flush_request
   .		 .		  wait !mddev-&gt;flush_bio
   .		 .
   .		 .				mddev_suspend
   .		 .				 wait !active_io
   .		 .
   .		 submit_flushes
   .		 queue_work md_submit_flush_data
   .		 //md_submit_flush_data is already running (T1)
   .
   md_handle_request
    wait resume

The root issue is non-atomic inc/dec of active_io during flush process.
active_io is dec before md_submit_flush_data is queued, and inc soon
after md_submit_flush_data() run.
  md_flush_request
    active_io + 1
    submit_flushes
      active_io - 1
      md_submit_flush_data
        md_handle_request
        active_io + 1
          make_request
        active_io - 1

If active_io is dec after md_handle_request() instead of within
submit_flushes(), make_request() can be called directly intead of
md_handle_request() in md_submit_flush_data(), and active_io will
only inc and dec once in the whole flush process. Deadlock will be
fixed.

Additionally, the only difference between fixing the issue and before is
that there is no return error handling of make_request(). But after
previous patch cleaned md_write_start(), make_requst() only return error
in raid5_make_request() by dm-raid, see commit 41425f96d7aa ("dm-raid456,
md/raid456: fix a deadlock for dm-raid456 while io concurrent with
reshape)". Since dm always splits data and flush operation into two
separate io, io size of flush submitted by dm always is 0, make_request()
will not be called in md_submit_flush_data(). To prevent future
modifications from introducing issues, add WARN_ON to ensure
make_request() no error is returned in this context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43855/">CVE-2024-43855 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43855">CVE-2024-43855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229342">SUSE bug 1229342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974395" comment="bpftool-7.4.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974396" comment="kernel-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974397" comment="kernel-abi-stablelists-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974398" comment="kernel-core-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974399" comment="kernel-cross-headers-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974400" comment="kernel-debug-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974401" comment="kernel-debug-core-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974404" comment="kernel-debug-modules-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974405" comment="kernel-debug-modules-core-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974406" comment="kernel-debug-modules-extra-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974407" comment="kernel-debug-uki-virt-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974410" comment="kernel-doc-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974411" comment="kernel-headers-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974412" comment="kernel-modules-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974413" comment="kernel-modules-core-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974414" comment="kernel-modules-extra-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974415" comment="kernel-rt-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974416" comment="kernel-rt-core-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974417" comment="kernel-rt-debug-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974418" comment="kernel-rt-debug-core-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974420" comment="kernel-rt-debug-kvm-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974421" comment="kernel-rt-debug-modules-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974422" comment="kernel-rt-debug-modules-core-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974423" comment="kernel-rt-debug-modules-extra-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974425" comment="kernel-rt-kvm-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974426" comment="kernel-rt-modules-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974427" comment="kernel-rt-modules-core-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974428" comment="kernel-rt-modules-extra-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974429" comment="kernel-tools-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974430" comment="kernel-tools-libs-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974432" comment="kernel-uki-virt-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974433" comment="kernel-uki-virt-addons-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974434" comment="libperf-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974435" comment="perf-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974436" comment="python3-perf-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974437" comment="rtla-5.14.0-503.35.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974438" comment="rv-5.14.0-503.35.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43871" ref_url="https://www.suse.com/security/cve/CVE-2024-43871" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7000" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devres: Fix memory leakage caused by driver API devm_free_percpu()

It will cause memory leakage when use driver API devm_free_percpu()
to free memory allocated by devm_alloc_percpu(), fixed by using
devres_release() instead of devres_destroy() within devm_free_percpu().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43871/">CVE-2024-43871 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43871">CVE-2024-43871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229490">SUSE bug 1229490</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43873" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43873" ref_url="https://www.suse.com/security/cve/CVE-2024-43873" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost/vsock: always initialize seqpacket_allow

There are two issues around seqpacket_allow:
1. seqpacket_allow is not initialized when socket is
   created. Thus if features are never set, it will be
   read uninitialized.
2. if VIRTIO_VSOCK_F_SEQPACKET is set and then cleared,
   then seqpacket_allow will not be cleared appropriately
   (existing apps I know about don't usually do this but
    it's legal and there's no way to be sure no one relies
    on this).

To fix:
	- initialize seqpacket_allow after allocation
	- set it unconditionally in set_features
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43873/">CVE-2024-43873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43873">CVE-2024-43873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229488">SUSE bug 1229488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43882" ref_url="https://www.suse.com/security/cve/CVE-2024-43882" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01692-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exec: Fix ToCToU between perm check and set-uid/gid usage

When opening a file for exec via do_filp_open(), permission checking is
done against the file's metadata at that moment, and on success, a file
pointer is passed back. Much later in the execve() code path, the file
metadata (specifically mode, uid, and gid) is used to determine if/how
to set the uid and gid. However, those values may have changed since the
permissions check, meaning the execution may gain unintended privileges.

For example, if a file could change permissions from executable and not
set-id:

---------x 1 root root 16048 Aug  7 13:16 target

to set-id and non-executable:

---S------ 1 root root 16048 Aug  7 13:16 target

it is possible to gain root privileges when execution should have been
disallowed.

While this race condition is rare in real-world scenarios, it has been
observed (and proven exploitable) when package managers are updating
the setuid bits of installed programs. Such files start with being
world-executable but then are adjusted to be group-exec with a set-uid
bit. For example, "chmod o-x,u+s target" makes "target" executable only
by uid "root" and gid "cdrom", while also becoming setuid-root:

-rwxr-xr-x 1 root cdrom 16048 Aug  7 13:16 target

becomes:

-rwsr-xr-- 1 root cdrom 16048 Aug  7 13:16 target

But racing the chmod means users without group "cdrom" membership can
get the permission to execute "target" just before the chmod, and when
the chmod finishes, the exec reaches brpm_fill_uid(), and performs the
setuid to root, violating the expressed authorization of "only cdrom
group members can setuid to root".

Re-check that we still have execute permissions in case the metadata
has changed. It would be better to keep a copy from the perm-check time,
but until we can do that refactoring, the least-bad option is to do a
full inode_permission() call (under inode lock). It is understood that
this is safe against dead-locks, but hardly optimal.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-43882/">CVE-2024-43882 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43882">CVE-2024-43882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229503">SUSE bug 1229503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229504">SUSE bug 1229504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43884" ref_url="https://www.suse.com/security/cve/CVE-2024-43884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Add error handling to pair_device()

hci_conn_params_add() never checks for a NULL value and could lead to a NULL
pointer dereference causing a crash.

Fixed by adding error handling in the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43884/">CVE-2024-43884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43884">CVE-2024-43884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229739">SUSE bug 1229739</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43889</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43889" ref_url="https://www.suse.com/security/cve/CVE-2024-43889" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: Fix possible divide-by-0 panic in padata_mt_helper()

We are hit with a not easily reproducible divide-by-0 panic in padata.c at
bootup time.

  [   10.017908] Oops: divide error: 0000 1 PREEMPT SMP NOPTI
  [   10.017908] CPU: 26 PID: 2627 Comm: kworker/u1666:1 Not tainted 6.10.0-15.el10.x86_64 #1
  [   10.017908] Hardware name: Lenovo ThinkSystem SR950 [7X12CTO1WW]/[7X12CTO1WW], BIOS [PSE140J-2.30] 07/20/2021
  [   10.017908] Workqueue: events_unbound padata_mt_helper
  [   10.017908] RIP: 0010:padata_mt_helper+0x39/0xb0
    :
  [   10.017963] Call Trace:
  [   10.017968]  &lt;TASK&gt;
  [   10.018004]  ? padata_mt_helper+0x39/0xb0
  [   10.018084]  process_one_work+0x174/0x330
  [   10.018093]  worker_thread+0x266/0x3a0
  [   10.018111]  kthread+0xcf/0x100
  [   10.018124]  ret_from_fork+0x31/0x50
  [   10.018138]  ret_from_fork_asm+0x1a/0x30
  [   10.018147]  &lt;/TASK&gt;

Looking at the padata_mt_helper() function, the only way a divide-by-0
panic can happen is when ps-&gt;chunk_size is 0.  The way that chunk_size is
initialized in padata_do_multithreaded(), chunk_size can be 0 when the
min_chunk in the passed-in padata_mt_job structure is 0.

Fix this divide-by-0 panic by making sure that chunk_size will be at least
1 no matter what the input parameters are.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43889/">CVE-2024-43889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43889">CVE-2024-43889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229743">SUSE bug 1229743</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43898" ref_url="https://www.suse.com/security/cve/CVE-2024-43898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43898/">CVE-2024-43898 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43898">CVE-2024-43898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229753">SUSE bug 1229753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43910</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43910" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43910" ref_url="https://www.suse.com/security/cve/CVE-2024-43910" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: add missing check_func_arg_reg_off() to prevent out-of-bounds memory accesses

Currently, it's possible to pass in a modified CONST_PTR_TO_DYNPTR to
a global function as an argument. The adverse effects of this is that
BPF helpers can continue to make use of this modified
CONST_PTR_TO_DYNPTR from within the context of the global function,
which can unintentionally result in out-of-bounds memory accesses and
therefore compromise overall system stability i.e.

[  244.157771] BUG: KASAN: slab-out-of-bounds in bpf_dynptr_data+0x137/0x140
[  244.161345] Read of size 8 at addr ffff88810914be68 by task test_progs/302
[  244.167151] CPU: 0 PID: 302 Comm: test_progs Tainted: G O E 6.10.0-rc3-00131-g66b586715063 #533
[  244.174318] Call Trace:
[  244.175787]  &lt;TASK&gt;
[  244.177356]  dump_stack_lvl+0x66/0xa0
[  244.179531]  print_report+0xce/0x670
[  244.182314]  ? __virt_addr_valid+0x200/0x3e0
[  244.184908]  kasan_report+0xd7/0x110
[  244.187408]  ? bpf_dynptr_data+0x137/0x140
[  244.189714]  ? bpf_dynptr_data+0x137/0x140
[  244.192020]  bpf_dynptr_data+0x137/0x140
[  244.194264]  bpf_prog_b02a02fdd2bdc5fa_global_call_bpf_dynptr_data+0x22/0x26
[  244.198044]  bpf_prog_b0fe7b9d7dc3abde_callback_adjust_bpf_dynptr_reg_off+0x1f/0x23
[  244.202136]  bpf_user_ringbuf_drain+0x2c7/0x570
[  244.204744]  ? 0xffffffffc0009e58
[  244.206593]  ? __pfx_bpf_user_ringbuf_drain+0x10/0x10
[  244.209795]  bpf_prog_33ab33f6a804ba2d_user_ringbuf_callback_const_ptr_to_dynptr_reg_off+0x47/0x4b
[  244.215922]  bpf_trampoline_6442502480+0x43/0xe3
[  244.218691]  __x64_sys_prlimit64+0x9/0xf0
[  244.220912]  do_syscall_64+0xc1/0x1d0
[  244.223043]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  244.226458] RIP: 0033:0x7ffa3eb8f059
[  244.228582] Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 8f 1d 0d 00 f7 d8 64 89 01 48
[  244.241307] RSP: 002b:00007ffa3e9c6eb8 EFLAGS: 00000206 ORIG_RAX: 000000000000012e
[  244.246474] RAX: ffffffffffffffda RBX: 00007ffa3e9c7cdc RCX: 00007ffa3eb8f059
[  244.250478] RDX: 00007ffa3eb162b4 RSI: 0000000000000000 RDI: 00007ffa3e9c7fb0
[  244.255396] RBP: 00007ffa3e9c6ed0 R08: 00007ffa3e9c76c0 R09: 0000000000000000
[  244.260195] R10: 0000000000000000 R11: 0000000000000206 R12: ffffffffffffff80
[  244.264201] R13: 000000000000001c R14: 00007ffc5d6b4260 R15: 00007ffa3e1c7000
[  244.268303]  &lt;/TASK&gt;

Add a check_func_arg_reg_off() to the path in which the BPF verifier
verifies the arguments of global function arguments, specifically
those which take an argument of type ARG_PTR_TO_DYNPTR |
MEM_RDONLY. Also, process_dynptr_func() doesn't appear to perform any
explicit and strict type matching on the supplied register type, so
let's also enforce that a register either type PTR_TO_STACK or
CONST_PTR_TO_DYNPTR is by the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43910/">CVE-2024-43910 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43910">CVE-2024-43910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229832">SUSE bug 1229832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229835">SUSE bug 1229835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43914" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43914" ref_url="https://www.suse.com/security/cve/CVE-2024-43914" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: avoid BUG_ON() while continue reshape after reassembling

Currently, mdadm support --revert-reshape to abort the reshape while
reassembling, as the test 07revert-grow. However, following BUG_ON()
can be triggerred by the test:

kernel BUG at drivers/md/raid5.c:6278!
invalid opcode: 0000 [#1] PREEMPT SMP PTI
irq event stamp: 158985
CPU: 6 PID: 891 Comm: md0_reshape Not tainted 6.9.0-03335-g7592a0b0049a #94
RIP: 0010:reshape_request+0x3f1/0xe60
Call Trace:
 &lt;TASK&gt;
 raid5_sync_request+0x43d/0x550
 md_do_sync+0xb7a/0x2110
 md_thread+0x294/0x2b0
 kthread+0x147/0x1c0
 ret_from_fork+0x59/0x70
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Root cause is that --revert-reshape update the raid_disks from 5 to 4,
while reshape position is still set, and after reassembling the array,
reshape position will be read from super block, then during reshape the
checking of 'writepos' that is caculated by old reshape position will
fail.

Fix this panic the easy way first, by converting the BUG_ON() to
WARN_ON(), and stop the reshape if checkings fail.

Noted that mdadm must fix --revert-shape as well, and probably md/raid
should enhance metadata validation as well, however this means
reassemble will fail and there must be user tools to fix the wrong
metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-43914/">CVE-2024-43914 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-43914">CVE-2024-43914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229790">SUSE bug 1229790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4418" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4418" ref_url="https://www.suse.com/security/cve/CVE-2024-4418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021361.html" source="SUSE-SU"/>
    <description>
    A race condition leading to a stack use-after-free flaw was found in libvirt. Due to a bad assumption in the virNetClientIOEventLoop() method, the `data` pointer to a stack-allocated virNetClientIOEventData structure ended up being used in the virNetClientIOEventFD callback while the data pointer's stack frame was concurrently being "freed" when returning from virNetClientIOEventLoop(). The 'virtproxyd' daemon can be used to trigger requests. If libvirt is configured with fine-grained access control, this issue, in theory, allows a user to escape their otherwise limited access. This flaw allows a local, unprivileged user to access virtproxyd without authenticating. Remote users would need to authenticate before they could access it.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-4418/">CVE-2024-4418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4418">CVE-2024-4418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223849">SUSE bug 1223849</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009877075" comment="libvirt-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877076" comment="libvirt-client-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877077" comment="libvirt-client-qemu-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877078" comment="libvirt-daemon-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877079" comment="libvirt-daemon-common-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877080" comment="libvirt-daemon-config-network-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877081" comment="libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877082" comment="libvirt-daemon-driver-interface-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877083" comment="libvirt-daemon-driver-network-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877084" comment="libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877085" comment="libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877086" comment="libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877087" comment="libvirt-daemon-driver-secret-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877088" comment="libvirt-daemon-driver-storage-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877089" comment="libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877090" comment="libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877091" comment="libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877092" comment="libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877093" comment="libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877094" comment="libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877095" comment="libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877096" comment="libvirt-daemon-kvm-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877097" comment="libvirt-daemon-lock-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877098" comment="libvirt-daemon-log-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877099" comment="libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877100" comment="libvirt-daemon-plugin-sanlock-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877101" comment="libvirt-daemon-proxy-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877102" comment="libvirt-devel-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877103" comment="libvirt-docs-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877104" comment="libvirt-libs-10.0.0-6.6.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877105" comment="libvirt-nss-10.0.0-6.6.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44185" ref_url="https://www.suse.com/security/cve/CVE-2024-44185" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000595.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040460.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 17.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44185/">CVE-2024-44185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44185">CVE-2024-44185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232747">SUSE bug 1232747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953935" comment="webkit2gtk3-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953936" comment="webkit2gtk3-devel-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953937" comment="webkit2gtk3-jsc-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953938" comment="webkit2gtk3-jsc-devel-2.46.3-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44187</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44187" ref_url="https://www.suse.com/security/cve/CVE-2024-44187" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8180" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000595.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
    <description>
    A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, iOS 18 and iPadOS 18, macOS Sequoia 15, tvOS 18, visionOS 2, watchOS 11. A malicious website may exfiltrate data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-44187/">CVE-2024-44187 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44187">CVE-2024-44187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231039">SUSE bug 1231039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953935" comment="webkit2gtk3-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953936" comment="webkit2gtk3-devel-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953937" comment="webkit2gtk3-jsc-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953938" comment="webkit2gtk3-jsc-devel-2.46.3-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44192</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44192" ref_url="https://www.suse.com/security/cve/CVE-2024-44192" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7387" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1033-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJC3GUPN6T3FGCOPMOLUI52AMJZNNKNX/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1149-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039031.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 18, iOS 18 and iPadOS 18, macOS Sequoia 15, tvOS 18, visionOS 2, watchOS 11. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44192/">CVE-2024-44192 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44192">CVE-2024-44192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239863">SUSE bug 1239863</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983920" comment="webkit2gtk3-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983921" comment="webkit2gtk3-devel-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983922" comment="webkit2gtk3-jsc-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983923" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44244" ref_url="https://www.suse.com/security/cve/CVE-2024-44244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000595.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4079-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040460.html" source="SUSE-SU"/>
    <description>
    A memory corruption issue was addressed with improved input validation. This issue is fixed in Safari 18.1, iOS 18.1 and iPadOS 18.1, macOS Sequoia 15.1, tvOS 18.1, visionOS 2.1, watchOS 11.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44244/">CVE-2024-44244 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44244">CVE-2024-44244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232747">SUSE bug 1232747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953935" comment="webkit2gtk3-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953936" comment="webkit2gtk3-devel-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953937" comment="webkit2gtk3-jsc-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953938" comment="webkit2gtk3-jsc-devel-2.46.3-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44309</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44309" ref_url="https://www.suse.com/security/cve/CVE-2024-44309" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10472" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000625.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
    <description>
    A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, iOS 18.1.1 and iPadOS 18.1.1, macOS Sequoia 15.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-29"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-44309/">CVE-2024-44309 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44309">CVE-2024-44309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233632">SUSE bug 1233632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955240" comment="webkit2gtk3-2.46.3-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955241" comment="webkit2gtk3-devel-2.46.3-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955242" comment="webkit2gtk3-jsc-2.46.3-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955243" comment="webkit2gtk3-jsc-devel-2.46.3-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4453</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4453" ref_url="https://www.suse.com/security/cve/CVE-2024-4453" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9056" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7178" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1882-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1882-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1910-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035499.html" source="SUSE-SU"/>
    <description>
    GStreamer EXIF Metadata Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of EXIF metadata. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-23896.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4453/">CVE-2024-4453 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4453">CVE-2024-4453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224806">SUSE bug 1224806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985811" comment="gstreamer1-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985812" comment="gstreamer1-devel-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985813" comment="gstreamer1-plugins-bad-free-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985814" comment="gstreamer1-plugins-bad-free-devel-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985815" comment="gstreamer1-plugins-bad-free-libs-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985816" comment="gstreamer1-plugins-ugly-free-1.22.12-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985817" comment="gstreamer1-rtsp-server-1.22.12-3.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4467" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4467" ref_url="https://www.suse.com/security/cve/CVE-2024-4467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPDARJICNXP6BQXL6RDWC63AJMWSDEU5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-17"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4467/">CVE-2024-4467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4467">CVE-2024-4467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227322">SUSE bug 1227322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009874007" comment="qemu-guest-agent-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874008" comment="qemu-img-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874009" comment="qemu-kvm-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874010" comment="qemu-kvm-audio-pa-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874011" comment="qemu-kvm-block-blkio-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874012" comment="qemu-kvm-block-curl-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874013" comment="qemu-kvm-block-rbd-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874014" comment="qemu-kvm-common-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874015" comment="qemu-kvm-core-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874016" comment="qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874017" comment="qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874018" comment="qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874019" comment="qemu-kvm-device-usb-host-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874020" comment="qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874021" comment="qemu-kvm-docs-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874022" comment="qemu-kvm-tools-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874023" comment="qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874024" comment="qemu-kvm-ui-opengl-8.2.0-11.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874025" comment="qemu-pr-helper-8.2.0-11.el9_4.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44931" ref_url="https://www.suse.com/security/cve/CVE-2024-44931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: prevent potential speculation leaks in gpio_device_get_desc()

Userspace may trigger a speculative read of an address outside the gpio
descriptor array.
Users can do that by calling gpio_ioctl() with an offset out of range.
Offset is copied from user and then used as an array index to get
the gpio descriptor without sanitization in gpio_device_get_desc().

This change ensures that the offset is sanitized by using
array_index_nospec() to mitigate any possibility of speculative
information leaks.

This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-44931/">CVE-2024-44931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44931">CVE-2024-44931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229837">SUSE bug 1229837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44932" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44932" ref_url="https://www.suse.com/security/cve/CVE-2024-44932" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix UAFs when destroying the queues

The second tagged commit started sometimes (very rarely, but possible)
throwing WARNs from
net/core/page_pool.c:page_pool_disable_direct_recycling().
Turned out idpf frees interrupt vectors with embedded NAPIs *before*
freeing the queues making page_pools' NAPI pointers lead to freed
memory before these pools are destroyed by libeth.
It's not clear whether there are other accesses to the freed vectors
when destroying the queues, but anyway, we usually free queue/interrupt
vectors only when the queues are destroyed and the NAPIs are guaranteed
to not be referenced anywhere.

Invert the allocation and freeing logic making queue/interrupt vectors
be allocated first and freed last. Vectors don't require queues to be
present, so this is safe. Additionally, this change allows to remove
that useless queue-&gt;q_vector pointer cleanup, as vectors are still
valid when freeing the queues (+ both are freed within one function,
so it's not clear why nullify the pointers at all).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44932/">CVE-2024-44932 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44932">CVE-2024-44932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229808">SUSE bug 1229808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44934" ref_url="https://www.suse.com/security/cve/CVE-2024-44934" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: mcast: wait for previous gc cycles when removing port

syzbot hit a use-after-free[1] which is caused because the bridge doesn't
make sure that all previous garbage has been collected when removing a
port. What happens is:
      CPU 1                   CPU 2
 start gc cycle           remove port
                         acquire gc lock first
 wait for lock
                         call br_multicasg_gc() directly
 acquire lock now but    free port
 the port can be freed
 while grp timers still
 running

Make sure all previous gc cycles have finished by using flush_work before
freeing the port.

[1]
  BUG: KASAN: slab-use-after-free in br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861
  Read of size 8 at addr ffff888071d6d000 by task syz.5.1232/9699

  CPU: 1 PID: 9699 Comm: syz.5.1232 Not tainted 6.10.0-rc5-syzkaller-00021-g24ca36a562d6 #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
  Call Trace:
   &lt;IRQ&gt;
   __dump_stack lib/dump_stack.c:88 [inline]
   dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
   print_address_description mm/kasan/report.c:377 [inline]
   print_report+0xc3/0x620 mm/kasan/report.c:488
   kasan_report+0xd9/0x110 mm/kasan/report.c:601
   br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861
   call_timer_fn+0x1a3/0x610 kernel/time/timer.c:1792
   expire_timers kernel/time/timer.c:1843 [inline]
   __run_timers+0x74b/0xaf0 kernel/time/timer.c:2417
   __run_timer_base kernel/time/timer.c:2428 [inline]
   __run_timer_base kernel/time/timer.c:2421 [inline]
   run_timer_base+0x111/0x190 kernel/time/timer.c:2437
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44934/">CVE-2024-44934 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44934">CVE-2024-44934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229809">SUSE bug 1229809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44952" ref_url="https://www.suse.com/security/cve/CVE-2024-44952" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44952/">CVE-2024-44952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44952">CVE-2024-44952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230178">SUSE bug 1230178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44958" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44958" ref_url="https://www.suse.com/security/cve/CVE-2024-44958" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/smt: Fix unbalance sched_smt_present dec/inc

I got the following warn report while doing stress test:

jump label: negative count!
WARNING: CPU: 3 PID: 38 at kernel/jump_label.c:263 static_key_slow_try_dec+0x9d/0xb0
Call Trace:
 &lt;TASK&gt;
 __static_key_slow_dec_cpuslocked+0x16/0x70
 sched_cpu_deactivate+0x26e/0x2a0
 cpuhp_invoke_callback+0x3ad/0x10d0
 cpuhp_thread_fun+0x3f5/0x680
 smpboot_thread_fn+0x56d/0x8d0
 kthread+0x309/0x400
 ret_from_fork+0x41/0x70
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Because when cpuset_cpu_inactive() fails in sched_cpu_deactivate(),
the cpu offline failed, but sched_smt_present is decremented before
calling sched_cpu_deactivate(), it leads to unbalanced dec/inc, so
fix it by incrementing sched_smt_present in the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44958/">CVE-2024-44958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44958">CVE-2024-44958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230179">SUSE bug 1230179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44964" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44964" ref_url="https://www.suse.com/security/cve/CVE-2024-44964" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leaks and crashes while performing a soft reset

The second tagged commit introduced a UAF, as it removed restoring
q_vector-&gt;vport pointers after reinitializating the structures.
This is due to that all queue allocation functions are performed here
with the new temporary vport structure and those functions rewrite
the backpointers to the vport. Then, this new struct is freed and
the pointers start leading to nowhere.

But generally speaking, the current logic is very fragile. It claims
to be more reliable when the system is low on memory, but in fact, it
consumes two times more memory as at the moment of running this
function, there are two vports allocated with their queues and vectors.
Moreover, it claims to prevent the driver from running into "bad state",
but in fact, any error during the rebuild leaves the old vport in the
partially allocated state.
Finally, if the interface is down when the function is called, it always
allocates a new queue set, but when the user decides to enable the
interface later on, vport_open() allocates them once again, IOW there's
a clear memory leak here.

Just don't allocate a new queue set when performing a reset, that solves
crashes and memory leaks. Readd the old queue number and reopen the
interface on rollback - that solves limbo states when the device is left
disabled and/or without HW queues enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44964/">CVE-2024-44964 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44964">CVE-2024-44964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230220">SUSE bug 1230220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44975" ref_url="https://www.suse.com/security/cve/CVE-2024-44975" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cgroup/cpuset: fix panic caused by partcmd_update

We find a bug as below:
BUG: unable to handle page fault for address: 00000003
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 358 Comm: bash Tainted: G        W I        6.6.0-10893-g60d6
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/4
RIP: 0010:partition_sched_domains_locked+0x483/0x600
Code: 01 48 85 d2 74 0d 48 83 05 29 3f f8 03 01 f3 48 0f bc c2 89 c0 48 9
RSP: 0018:ffffc90000fdbc58 EFLAGS: 00000202
RAX: 0000000100000003 RBX: ffff888100b3dfa0 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000002fe80
RBP: ffff888100b3dfb0 R08: 0000000000000001 R09: 0000000000000000
R10: ffffc90000fdbcb0 R11: 0000000000000004 R12: 0000000000000002
R13: ffff888100a92b48 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f44a5425740(0000) GS:ffff888237d80000(0000) knlGS:0000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000100030973 CR3: 000000010722c000 CR4: 00000000000006e0
Call Trace:
 &lt;TASK&gt;
 ? show_regs+0x8c/0xa0
 ? __die_body+0x23/0xa0
 ? __die+0x3a/0x50
 ? page_fault_oops+0x1d2/0x5c0
 ? partition_sched_domains_locked+0x483/0x600
 ? search_module_extables+0x2a/0xb0
 ? search_exception_tables+0x67/0x90
 ? kernelmode_fixup_or_oops+0x144/0x1b0
 ? __bad_area_nosemaphore+0x211/0x360
 ? up_read+0x3b/0x50
 ? bad_area_nosemaphore+0x1a/0x30
 ? exc_page_fault+0x890/0xd90
 ? __lock_acquire.constprop.0+0x24f/0x8d0
 ? __lock_acquire.constprop.0+0x24f/0x8d0
 ? asm_exc_page_fault+0x26/0x30
 ? partition_sched_domains_locked+0x483/0x600
 ? partition_sched_domains_locked+0xf0/0x600
 rebuild_sched_domains_locked+0x806/0xdc0
 update_partition_sd_lb+0x118/0x130
 cpuset_write_resmask+0xffc/0x1420
 cgroup_file_write+0xb2/0x290
 kernfs_fop_write_iter+0x194/0x290
 new_sync_write+0xeb/0x160
 vfs_write+0x16f/0x1d0
 ksys_write+0x81/0x180
 __x64_sys_write+0x21/0x30
 x64_sys_call+0x2f25/0x4630
 do_syscall_64+0x44/0xb0
 entry_SYSCALL_64_after_hwframe+0x78/0xe2
RIP: 0033:0x7f44a553c887

It can be reproduced with cammands:
cd /sys/fs/cgroup/
mkdir test
cd test/
echo +cpuset &gt; ../cgroup.subtree_control
echo root &gt; cpuset.cpus.partition
cat /sys/fs/cgroup/cpuset.cpus.effective
0-3
echo 0-3 &gt; cpuset.cpus // taking away all cpus from root

This issue is caused by the incorrect rebuilding of scheduling domains.
In this scenario, test/cpuset.cpus.partition should be an invalid root
and should not trigger the rebuilding of scheduling domains. When calling
update_parent_effective_cpumask with partcmd_update, if newmask is not
null, it should recheck newmask whether there are cpus is available
for parect/cs that has tasks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="8.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-44975/">CVE-2024-44975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44975">CVE-2024-44975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230237">SUSE bug 1230237</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44987</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44987" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44987" ref_url="https://www.suse.com/security/cve/CVE-2024-44987" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent UAF in ip6_send_skb()

syzbot reported an UAF in ip6_send_skb() [1]

After ip6_local_out() has returned, we no longer can safely
dereference rt, unless we hold rcu_read_lock().

A similar issue has been fixed in commit
a688caa34beb ("ipv6: take rcu lock in rawv6_send_hdrinc()")

Another potential issue in ip6_finish_output2() is handled in a
separate patch.

[1]
 BUG: KASAN: slab-use-after-free in ip6_send_skb+0x18d/0x230 net/ipv6/ip6_output.c:1964
Read of size 8 at addr ffff88806dde4858 by task syz.1.380/6530

CPU: 1 UID: 0 PID: 6530 Comm: syz.1.380 Not tainted 6.11.0-rc3-syzkaller-00306-gdf6cbc62cc9b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:93 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
  print_address_description mm/kasan/report.c:377 [inline]
  print_report+0x169/0x550 mm/kasan/report.c:488
  kasan_report+0x143/0x180 mm/kasan/report.c:601
  ip6_send_skb+0x18d/0x230 net/ipv6/ip6_output.c:1964
  rawv6_push_pending_frames+0x75c/0x9e0 net/ipv6/raw.c:588
  rawv6_sendmsg+0x19c7/0x23c0 net/ipv6/raw.c:926
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x1a6/0x270 net/socket.c:745
  sock_write_iter+0x2dd/0x400 net/socket.c:1160
 do_iter_readv_writev+0x60a/0x890
  vfs_writev+0x37c/0xbb0 fs/read_write.c:971
  do_writev+0x1b1/0x350 fs/read_write.c:1018
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f936bf79e79
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f936cd7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014
RAX: ffffffffffffffda RBX: 00007f936c115f80 RCX: 00007f936bf79e79
RDX: 0000000000000001 RSI: 0000000020000040 RDI: 0000000000000004
RBP: 00007f936bfe7916 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f936c115f80 R15: 00007fff2860a7a8
 &lt;/TASK&gt;

Allocated by task 6530:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  unpoison_slab_object mm/kasan/common.c:312 [inline]
  __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338
  kasan_slab_alloc include/linux/kasan.h:201 [inline]
  slab_post_alloc_hook mm/slub.c:3988 [inline]
  slab_alloc_node mm/slub.c:4037 [inline]
  kmem_cache_alloc_noprof+0x135/0x2a0 mm/slub.c:4044
  dst_alloc+0x12b/0x190 net/core/dst.c:89
  ip6_blackhole_route+0x59/0x340 net/ipv6/route.c:2670
  make_blackhole net/xfrm/xfrm_policy.c:3120 [inline]
  xfrm_lookup_route+0xd1/0x1c0 net/xfrm/xfrm_policy.c:3313
  ip6_dst_lookup_flow+0x13e/0x180 net/ipv6/ip6_output.c:1257
  rawv6_sendmsg+0x1283/0x23c0 net/ipv6/raw.c:898
  sock_sendmsg_nosec net/socket.c:730 [inline]
  __sock_sendmsg+0x1a6/0x270 net/socket.c:745
  ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597
  ___sys_sendmsg net/socket.c:2651 [inline]
  __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2680
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 45:
  kasan_save_stack mm/kasan/common.c:47 [inline]
  kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
  kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
  poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
  __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
  kasan_slab_free include/linux/kasan.h:184 [inline]
  slab_free_hook mm/slub.c:2252 [inline]
  slab_free mm/slub.c:4473 [inline]
  kmem_cache_free+0x145/0x350 mm/slub.c:4548
  dst_destroy+0x2ac/0x460 net/core/dst.c:124
  rcu_do_batch kernel/rcu/tree.c:2569 [inline]
  rcu_core+0xafd/0x1830 kernel/rcu/tree.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-44987/">CVE-2024-44987 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44987">CVE-2024-44987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230185">SUSE bug 1230185</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44989" ref_url="https://www.suse.com/security/cve/CVE-2024-44989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix xfrm real_dev null pointer dereference

We shouldn't set real_dev to NULL because packets can be in transit and
xfrm might call xdo_dev_offload_ok() in parallel. All callbacks assume
real_dev is set.

 Example trace:
 kernel: BUG: unable to handle page fault for address: 0000000000001030
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: #PF: supervisor write access in kernel mode
 kernel: #PF: error_code(0x0002) - not-present page
 kernel: PGD 0 P4D 0
 kernel: Oops: 0002 [#1] PREEMPT SMP
 kernel: CPU: 4 PID: 2237 Comm: ping Not tainted 6.7.7+ #12
 kernel: Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
 kernel: RIP: 0010:nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel: Code: e0 0f 0b 48 83 7f 38 00 74 de 0f 0b 48 8b 47 08 48 8b 37 48 8b 78 40 e9 b2 e5 9a d7 66 90 0f 1f 44 00 00 48 8b 86 80 02 00 00 &lt;83&gt; 80 30 10 00 00 01 b8 01 00 00 00 c3 0f 1f 80 00 00 00 00 0f 1f
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: RSP: 0018:ffffabde81553b98 EFLAGS: 00010246
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:
 kernel: RAX: 0000000000000000 RBX: ffff9eb404e74900 RCX: ffff9eb403d97c60
 kernel: RDX: ffffffffc090de10 RSI: ffff9eb404e74900 RDI: ffff9eb3c5de9e00
 kernel: RBP: ffff9eb3c0a42000 R08: 0000000000000010 R09: 0000000000000014
 kernel: R10: 7974203030303030 R11: 3030303030303030 R12: 0000000000000000
 kernel: R13: ffff9eb3c5de9e00 R14: ffffabde81553cc8 R15: ffff9eb404c53000
 kernel: FS:  00007f2a77a3ad00(0000) GS:ffff9eb43bd00000(0000) knlGS:0000000000000000
 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 kernel: CR2: 0000000000001030 CR3: 00000001122ab000 CR4: 0000000000350ef0
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel: Call Trace:
 kernel:  &lt;TASK&gt;
 kernel:  ? __die+0x1f/0x60
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ? page_fault_oops+0x142/0x4c0
 kernel:  ? do_user_addr_fault+0x65/0x670
 kernel:  ? kvm_read_and_reset_apf_flags+0x3b/0x50
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel:  ? exc_page_fault+0x7b/0x180
 kernel:  ? asm_exc_page_fault+0x22/0x30
 kernel:  ? nsim_bpf_uninit+0x50/0x50 [netdevsim]
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ? nsim_ipsec_offload_ok+0xc/0x20 [netdevsim]
 kernel: bond0: (slave eni0np1): making interface the new active one
 kernel:  bond_ipsec_offload_ok+0x7b/0x90 [bonding]
 kernel:  xfrm_output+0x61/0x3b0
 kernel: bond0: (slave eni0np1): bond_ipsec_add_sa_all: failed to add SA
 kernel:  ip_push_pending_frames+0x56/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44989/">CVE-2024-44989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44989">CVE-2024-44989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230193">SUSE bug 1230193</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44990</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44990" ref_url="https://www.suse.com/security/cve/CVE-2024-44990" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix null pointer deref in bond_ipsec_offload_ok

We must check if there is an active slave before dereferencing the pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44990/">CVE-2024-44990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44990">CVE-2024-44990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230194">SUSE bug 1230194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977299" comment="bpftool-7.4.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977300" comment="kernel-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977301" comment="kernel-abi-stablelists-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977302" comment="kernel-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977303" comment="kernel-cross-headers-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977304" comment="kernel-debug-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977305" comment="kernel-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977308" comment="kernel-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977309" comment="kernel-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977310" comment="kernel-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977311" comment="kernel-debug-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977314" comment="kernel-doc-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977315" comment="kernel-headers-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977316" comment="kernel-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977317" comment="kernel-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977318" comment="kernel-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977319" comment="kernel-rt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977320" comment="kernel-rt-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977321" comment="kernel-rt-debug-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977322" comment="kernel-rt-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977324" comment="kernel-rt-debug-kvm-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977325" comment="kernel-rt-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977326" comment="kernel-rt-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977327" comment="kernel-rt-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977329" comment="kernel-rt-kvm-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977330" comment="kernel-rt-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977331" comment="kernel-rt-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977332" comment="kernel-rt-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977333" comment="kernel-tools-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977334" comment="kernel-tools-libs-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977336" comment="kernel-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977337" comment="kernel-uki-virt-addons-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977338" comment="libperf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977339" comment="perf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977340" comment="python3-perf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977341" comment="rtla-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977342" comment="rv-5.14.0-503.40.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202444994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-44994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-44994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-44994" ref_url="https://www.suse.com/security/cve/CVE-2024-44994" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: Restore lost return in iommu_report_device_fault()

When iommu_report_device_fault gets called with a partial fault it is
supposed to collect the fault into the group and then return.

Instead the return was accidently deleted which results in trying to
process the fault and an eventual crash.

Deleting the return was a typo, put it back.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-44994/">CVE-2024-44994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-44994">CVE-2024-44994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230198">SUSE bug 1230198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957437" comment="bpftool-7.4.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957438" comment="kernel-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957439" comment="kernel-abi-stablelists-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957440" comment="kernel-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957441" comment="kernel-cross-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957442" comment="kernel-debug-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957443" comment="kernel-debug-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957446" comment="kernel-debug-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957447" comment="kernel-debug-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957448" comment="kernel-debug-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957449" comment="kernel-debug-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957452" comment="kernel-doc-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957453" comment="kernel-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957454" comment="kernel-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957455" comment="kernel-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957456" comment="kernel-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957457" comment="kernel-tools-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957458" comment="kernel-tools-libs-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957460" comment="kernel-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957461" comment="kernel-uki-virt-addons-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957462" comment="libperf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957463" comment="perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957464" comment="python3-perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957465" comment="rtla-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957466" comment="rv-5.14.0-503.16.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45000</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45000" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45000" ref_url="https://www.suse.com/security/cve/CVE-2024-45000" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/netfs/fscache_cookie: add missing "n_accesses" check

This fixes a NULL pointer dereference bug due to a data race which
looks like this:

  BUG: kernel NULL pointer dereference, address: 0000000000000008
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: 0000 [#1] SMP PTI
  CPU: 33 PID: 16573 Comm: kworker/u97:799 Not tainted 6.8.7-cm4all1-hp+ #43
  Hardware name: HP ProLiant DL380 Gen9/ProLiant DL380 Gen9, BIOS P89 10/17/2018
  Workqueue: events_unbound netfs_rreq_write_to_cache_work
  RIP: 0010:cachefiles_prepare_write+0x30/0xa0
  Code: 57 41 56 45 89 ce 41 55 49 89 cd 41 54 49 89 d4 55 53 48 89 fb 48 83 ec 08 48 8b 47 08 48 83 7f 10 00 48 89 34 24 48 8b 68 20 &lt;48&gt; 8b 45 08 4c 8b 38 74 45 49 8b 7f 50 e8 4e a9 b0 ff 48 8b 73 10
  RSP: 0018:ffffb4e78113bde0 EFLAGS: 00010286
  RAX: ffff976126be6d10 RBX: ffff97615cdb8438 RCX: 0000000000020000
  RDX: ffff97605e6c4c68 RSI: ffff97605e6c4c60 RDI: ffff97615cdb8438
  RBP: 0000000000000000 R08: 0000000000278333 R09: 0000000000000001
  R10: ffff97605e6c4600 R11: 0000000000000001 R12: ffff97605e6c4c68
  R13: 0000000000020000 R14: 0000000000000001 R15: ffff976064fe2c00
  FS:  0000000000000000(0000) GS:ffff9776dfd40000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000008 CR3: 000000005942c002 CR4: 00000000001706f0
  Call Trace:
   &lt;TASK&gt;
   ? __die+0x1f/0x70
   ? page_fault_oops+0x15d/0x440
   ? search_module_extables+0xe/0x40
   ? fixup_exception+0x22/0x2f0
   ? exc_page_fault+0x5f/0x100
   ? asm_exc_page_fault+0x22/0x30
   ? cachefiles_prepare_write+0x30/0xa0
   netfs_rreq_write_to_cache_work+0x135/0x2e0
   process_one_work+0x137/0x2c0
   worker_thread+0x2e9/0x400
   ? __pfx_worker_thread+0x10/0x10
   kthread+0xcc/0x100
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x30/0x50
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1b/0x30
   &lt;/TASK&gt;
  Modules linked in:
  CR2: 0000000000000008
  ---[ end trace 0000000000000000 ]---

This happened because fscache_cookie_state_machine() was slow and was
still running while another process invoked fscache_unuse_cookie();
this led to a fscache_cookie_lru_do_one() call, setting the
FSCACHE_COOKIE_DO_LRU_DISCARD flag, which was picked up by
fscache_cookie_state_machine(), withdrawing the cookie via
cachefiles_withdraw_cookie(), clearing cookie-&gt;cache_priv.

At the same time, yet another process invoked
cachefiles_prepare_write(), which found a NULL pointer in this code
line:

  struct cachefiles_object *object = cachefiles_cres_object(cres);

The next line crashes, obviously:

  struct cachefiles_cache *cache = object-&gt;volume-&gt;cache;

During cachefiles_prepare_write(), the "n_accesses" counter is
non-zero (via fscache_begin_operation()).  The cookie must not be
withdrawn until it drops to zero.

The counter is checked by fscache_cookie_state_machine() before
switching to FSCACHE_COOKIE_STATE_RELINQUISHING and
FSCACHE_COOKIE_STATE_WITHDRAWING (in "case
FSCACHE_COOKIE_STATE_FAILED"), but not for
FSCACHE_COOKIE_STATE_LRU_DISCARDING ("case
FSCACHE_COOKIE_STATE_ACTIVE").

This patch adds the missing check.  With a non-zero access counter,
the function returns and the next fscache_end_cookie_access() call
will queue another fscache_cookie_state_machine() call to handle the
still-pending FSCACHE_COOKIE_DO_LRU_DISCARD.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45000/">CVE-2024-45000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45000">CVE-2024-45000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230170">SUSE bug 1230170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45009" ref_url="https://www.suse.com/security/cve/CVE-2024-45009" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: only decrement add_addr_accepted for MPJ req

Adding the following warning ...

  WARN_ON_ONCE(msk-&gt;pm.add_addr_accepted == 0)

... before decrementing the add_addr_accepted counter helped to find a
bug when running the "remove single subflow" subtest from the
mptcp_join.sh selftest.

Removing a 'subflow' endpoint will first trigger a RM_ADDR, then the
subflow closure. Before this patch, and upon the reception of the
RM_ADDR, the other peer will then try to decrement this
add_addr_accepted. That's not correct because the attached subflows have
not been created upon the reception of an ADD_ADDR.

A way to solve that is to decrement the counter only if the attached
subflow was an MP_JOIN to a remote id that was not 0, and initiated by
the host receiving the RM_ADDR.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45009/">CVE-2024-45009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45009">CVE-2024-45009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230438">SUSE bug 1230438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45010" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45010" ref_url="https://www.suse.com/security/cve/CVE-2024-45010" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: only mark 'subflow' endp as available

Adding the following warning ...

  WARN_ON_ONCE(msk-&gt;pm.local_addr_used == 0)

... before decrementing the local_addr_used counter helped to find a bug
when running the "remove single address" subtest from the mptcp_join.sh
selftests.

Removing a 'signal' endpoint will trigger the removal of all subflows
linked to this endpoint via mptcp_pm_nl_rm_addr_or_subflow() with
rm_type == MPTCP_MIB_RMSUBFLOW. This will decrement the local_addr_used
counter, which is wrong in this case because this counter is linked to
'subflow' endpoints, and here it is a 'signal' endpoint that is being
removed.

Now, the counter is decremented, only if the ID is being used outside
of mptcp_pm_nl_rm_addr_or_subflow(), only for 'subflow' endpoints, and
if the ID is not 0 -- local_addr_used is not taking into account these
ones. This marking of the ID as being available, and the decrement is
done no matter if a subflow using this ID is currently available,
because the subflow could have been closed before.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-45010/">CVE-2024-45010 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45010">CVE-2024-45010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230439">SUSE bug 1230439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45016" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45016" ref_url="https://www.suse.com/security/cve/CVE-2024-45016" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-February/038342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netem: fix return value if duplicate enqueue fails

There is a bug in netem_enqueue() introduced by
commit 5845f706388a ("net: netem: fix skb length BUG_ON in __skb_to_sgvec")
that can lead to a use-after-free.

This commit made netem_enqueue() always return NET_XMIT_SUCCESS
when a packet is duplicated, which can cause the parent qdisc's q.qlen
to be mistakenly incremented. When this happens qlen_notify() may be
skipped on the parent during destruction, leaving a dangling pointer
for some classful qdiscs like DRR.

There are two ways for the bug happen:

- If the duplicated packet is dropped by rootq-&gt;enqueue() and then
  the original packet is also dropped.
- If rootq-&gt;enqueue() sends the duplicated packet to a different qdisc
  and the original packet is dropped.

In both cases NET_XMIT_SUCCESS is returned even though no packets
are enqueued at the netem qdisc.

The fix is to defer the enqueue of the duplicate packet until after
the original packet has been guaranteed to return NET_XMIT_SUCCESS.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45016/">CVE-2024-45016 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45016">CVE-2024-45016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230429">SUSE bug 1230429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230998">SUSE bug 1230998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45018" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45018" ref_url="https://www.suse.com/security/cve/CVE-2024-45018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: initialise extack before use

Fix missing initialisation of extack in flow offload.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45018/">CVE-2024-45018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45018">CVE-2024-45018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230431">SUSE bug 1230431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957437" comment="bpftool-7.4.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957438" comment="kernel-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957439" comment="kernel-abi-stablelists-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957440" comment="kernel-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957441" comment="kernel-cross-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957442" comment="kernel-debug-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957443" comment="kernel-debug-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957446" comment="kernel-debug-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957447" comment="kernel-debug-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957448" comment="kernel-debug-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957449" comment="kernel-debug-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957452" comment="kernel-doc-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957453" comment="kernel-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957454" comment="kernel-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957455" comment="kernel-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957456" comment="kernel-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957457" comment="kernel-tools-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957458" comment="kernel-tools-libs-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957460" comment="kernel-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957461" comment="kernel-uki-virt-addons-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957462" comment="libperf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957463" comment="perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957464" comment="python3-perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957465" comment="rtla-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957466" comment="rv-5.14.0-503.16.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45022" ref_url="https://www.suse.com/security/cve/CVE-2024-45022" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmalloc: fix page mapping if vm_area_alloc_pages() with high order fallback to order 0

The __vmap_pages_range_noflush() assumes its argument pages** contains
pages with the same page shift.  However, since commit e9c3cda4d86e ("mm,
vmalloc: fix high order __GFP_NOFAIL allocations"), if gfp_flags includes
__GFP_NOFAIL with high order in vm_area_alloc_pages() and page allocation
failed for high order, the pages** may contain two different page shifts
(high order and order-0).  This could lead __vmap_pages_range_noflush() to
perform incorrect mappings, potentially resulting in memory corruption.

Users might encounter this as follows (vmap_allow_huge = true, 2M is for
PMD_SIZE):

kvmalloc(2M, __GFP_NOFAIL|GFP_X)
    __vmalloc_node_range_noprof(vm_flags=VM_ALLOW_HUGE_VMAP)
        vm_area_alloc_pages(order=9) ---&gt; order-9 allocation failed and fallback to order-0
            vmap_pages_range()
                vmap_pages_range_noflush()
                    __vmap_pages_range_noflush(page_shift = 21) ----&gt; wrong mapping happens

We can remove the fallback code because if a high-order allocation fails,
__vmalloc_node_range_noprof() will retry with order-0.  Therefore, it is
unnecessary to fallback to order-0 here.  Therefore, fix this by removing
the fallback code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-45022/">CVE-2024-45022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45022">CVE-2024-45022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230435">SUSE bug 1230435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45321" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45321" ref_url="https://www.suse.com/security/cve/CVE-2024-45321" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10218" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000621.html" source="SUSE-SU"/>
    <description>
    The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45321/">CVE-2024-45321 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45321">CVE-2024-45321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229819">SUSE bug 1229819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955015" comment="perl-App-cpanminus-1.7044-14.1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45332</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45332" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45332" ref_url="https://www.suse.com/security/cve/CVE-2024-45332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="TID000021844" ref_url="https://www.suse.com/support/kb/doc/?id=000021844" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-45332/">CVE-2024-45332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45332">CVE-2024-45332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243180">SUSE bug 1243180</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053953" comment="microcode_ctl-20250211-1.20250512.1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45336</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45336" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45336" ref_url="https://www.suse.com/security/cve/CVE-2024-45336" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3772" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14693-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZW52JECN55QJ6BSQ4PZXG4RAAPBRCVGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3ZTZP3RXZGJRRPGSFEUWJMYPA5WPOPW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRIXY47SJKPKQTDVCPRO6E2DUY5GPEEU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLAZMF6OXHA44LELUVOL3F5GAUV5PW3Y/" source="SUSE-SU"/>
    <description>
    The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-45336/">CVE-2024-45336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45336">CVE-2024-45336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236045">SUSE bug 1236045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236046">SUSE bug 1236046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974982" comment="delve-1.24.1-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974983" comment="go-toolset-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974984" comment="golang-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974985" comment="golang-bin-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974986" comment="golang-docs-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974987" comment="golang-misc-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974988" comment="golang-race-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974989" comment="golang-src-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974990" comment="golang-tests-1.23.6-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45341" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45341" ref_url="https://www.suse.com/security/cve/CVE-2024-45341" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3772" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14693-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZW52JECN55QJ6BSQ4PZXG4RAAPBRCVGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14694-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q3ZTZP3RXZGJRRPGSFEUWJMYPA5WPOPW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14695-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YRIXY47SJKPKQTDVCPRO6E2DUY5GPEEU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLAZMF6OXHA44LELUVOL3F5GAUV5PW3Y/" source="SUSE-SU"/>
    <description>
    A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45341/">CVE-2024-45341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45341">CVE-2024-45341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236045">SUSE bug 1236045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974982" comment="delve-1.24.1-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974983" comment="go-toolset-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974984" comment="golang-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974985" comment="golang-bin-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974986" comment="golang-docs-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974987" comment="golang-misc-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974988" comment="golang-race-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974989" comment="golang-src-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974990" comment="golang-tests-1.23.6-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45490" ref_url="https://www.suse.com/security/cve/CVE-2024-45490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6754" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000045.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6989" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTUXDK3N23TI6WAE5SOEDJKD7NIASPBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TAIATV7O5IGNWF5QEG55GA3DNAVFOJWG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WR4SNIPTL3MVBAVRYUOIK4QCPYAXEF3S/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45490/">CVE-2024-45490 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45490">CVE-2024-45490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229930">SUSE bug 1229930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229962">SUSE bug 1229962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943430" comment="expat-2.5.0-2.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943431" comment="expat-devel-2.5.0-2.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45491" ref_url="https://www.suse.com/security/cve/CVE-2024-45491" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6754" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000045.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6989" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8859" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTUXDK3N23TI6WAE5SOEDJKD7NIASPBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TAIATV7O5IGNWF5QEG55GA3DNAVFOJWG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WR4SNIPTL3MVBAVRYUOIK4QCPYAXEF3S/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45491/">CVE-2024-45491 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45491">CVE-2024-45491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229930">SUSE bug 1229930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229931">SUSE bug 1229931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943430" comment="expat-2.5.0-2.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943431" comment="expat-devel-2.5.0-2.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45492" ref_url="https://www.suse.com/security/cve/CVE-2024-45492" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6754" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000045.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6989" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14379-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NTUXDK3N23TI6WAE5SOEDJKD7NIASPBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14380-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TAIATV7O5IGNWF5QEG55GA3DNAVFOJWG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14381-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WR4SNIPTL3MVBAVRYUOIK4QCPYAXEF3S/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX).
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45492/">CVE-2024-45492 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45492">CVE-2024-45492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229930">SUSE bug 1229930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229932">SUSE bug 1229932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1229964">SUSE bug 1229964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943430" comment="expat-2.5.0-2.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943431" comment="expat-devel-2.5.0-2.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4558" ref_url="https://www.suse.com/security/cve/CVE-2024-4558" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000559.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9636" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019760.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0123-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2S7S4HVABEMIRHPQD4H3O6EA36PLCUCI/" source="SUSE-SU"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-4558/">CVE-2024-4558 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558">CVE-2024-4558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224045">SUSE bug 1224045</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009948274" comment="webkit2gtk3-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948275" comment="webkit2gtk3-devel-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948276" comment="webkit2gtk3-jsc-2.46.1-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009948277" comment="webkit2gtk3-jsc-devel-2.46.1-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45769" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45769" ref_url="https://www.suse.com/security/cve/CVE-2024-45769" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6837" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000055.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000051.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021087.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Performance Co-Pilot (PCP).   This flaw allows an attacker to send specially crafted data to the system, which could cause the program to misbehave or crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-21"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45769/">CVE-2024-45769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45769">CVE-2024-45769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230551">SUSE bug 1230551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953789" comment="pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953790" comment="pcp-conf-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953791" comment="pcp-devel-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953792" comment="pcp-doc-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953793" comment="pcp-export-pcp2elasticsearch-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953794" comment="pcp-export-pcp2graphite-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953795" comment="pcp-export-pcp2influxdb-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953796" comment="pcp-export-pcp2json-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953797" comment="pcp-export-pcp2openmetrics-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953798" comment="pcp-export-pcp2spark-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953799" comment="pcp-export-pcp2xml-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953800" comment="pcp-export-pcp2zabbix-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953801" comment="pcp-export-zabbix-agent-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953802" comment="pcp-geolocate-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953803" comment="pcp-gui-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953804" comment="pcp-import-collectl2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953805" comment="pcp-import-ganglia2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953806" comment="pcp-import-iostat2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953807" comment="pcp-import-mrtg2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953808" comment="pcp-import-sar2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953809" comment="pcp-libs-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953810" comment="pcp-libs-devel-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953811" comment="pcp-pmda-activemq-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953812" comment="pcp-pmda-apache-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953813" comment="pcp-pmda-bash-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953814" comment="pcp-pmda-bcc-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953815" comment="pcp-pmda-bind2-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953816" comment="pcp-pmda-bonding-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953817" comment="pcp-pmda-bpf-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953818" comment="pcp-pmda-bpftrace-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953819" comment="pcp-pmda-cifs-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953820" comment="pcp-pmda-cisco-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953821" comment="pcp-pmda-dbping-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953822" comment="pcp-pmda-denki-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953823" comment="pcp-pmda-dm-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953824" comment="pcp-pmda-docker-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953825" comment="pcp-pmda-ds389-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953826" comment="pcp-pmda-ds389log-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953827" comment="pcp-pmda-elasticsearch-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953828" comment="pcp-pmda-farm-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953829" comment="pcp-pmda-gfs2-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953830" comment="pcp-pmda-gluster-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953831" comment="pcp-pmda-gpfs-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953832" comment="pcp-pmda-gpsd-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953833" comment="pcp-pmda-hacluster-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953834" comment="pcp-pmda-haproxy-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953835" comment="pcp-pmda-infiniband-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953836" comment="pcp-pmda-json-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953837" comment="pcp-pmda-libvirt-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953838" comment="pcp-pmda-lio-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953839" comment="pcp-pmda-lmsensors-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953840" comment="pcp-pmda-logger-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953841" comment="pcp-pmda-lustre-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953842" comment="pcp-pmda-lustrecomm-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953843" comment="pcp-pmda-mailq-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953844" comment="pcp-pmda-memcache-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953845" comment="pcp-pmda-mic-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953846" comment="pcp-pmda-mongodb-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953847" comment="pcp-pmda-mounts-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953848" comment="pcp-pmda-mssql-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953849" comment="pcp-pmda-mysql-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953850" comment="pcp-pmda-named-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953851" comment="pcp-pmda-netcheck-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953852" comment="pcp-pmda-netfilter-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953853" comment="pcp-pmda-news-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953854" comment="pcp-pmda-nfsclient-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953855" comment="pcp-pmda-nginx-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953856" comment="pcp-pmda-nvidia-gpu-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953857" comment="pcp-pmda-openmetrics-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953858" comment="pcp-pmda-openvswitch-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953859" comment="pcp-pmda-oracle-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953860" comment="pcp-pmda-pdns-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953861" comment="pcp-pmda-perfevent-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953862" comment="pcp-pmda-podman-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953863" comment="pcp-pmda-postfix-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953864" comment="pcp-pmda-postgresql-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953865" comment="pcp-pmda-rabbitmq-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953866" comment="pcp-pmda-redis-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953867" comment="pcp-pmda-resctrl-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953868" comment="pcp-pmda-roomtemp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953869" comment="pcp-pmda-rsyslog-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953870" comment="pcp-pmda-samba-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953871" comment="pcp-pmda-sendmail-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953872" comment="pcp-pmda-shping-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953873" comment="pcp-pmda-slurm-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953874" comment="pcp-pmda-smart-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953875" comment="pcp-pmda-snmp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953876" comment="pcp-pmda-sockets-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953877" comment="pcp-pmda-statsd-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953878" comment="pcp-pmda-summary-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953879" comment="pcp-pmda-systemd-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953880" comment="pcp-pmda-trace-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953881" comment="pcp-pmda-unbound-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953882" comment="pcp-pmda-uwsgi-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953883" comment="pcp-pmda-weblog-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953884" comment="pcp-pmda-zimbra-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953885" comment="pcp-pmda-zswap-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953886" comment="pcp-selinux-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953887" comment="pcp-system-tools-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953888" comment="pcp-zeroconf-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953889" comment="perl-PCP-LogImport-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953890" comment="perl-PCP-LogSummary-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953891" comment="perl-PCP-MMV-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953892" comment="perl-PCP-PMDA-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953893" comment="python3-pcp-6.2.2-7.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45770</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45770" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45770" ref_url="https://www.suse.com/security/cve/CVE-2024-45770" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6837" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000055.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000051.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021087.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-21"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45770/">CVE-2024-45770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45770">CVE-2024-45770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217826">SUSE bug 1217826</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953789" comment="pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953790" comment="pcp-conf-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953791" comment="pcp-devel-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953792" comment="pcp-doc-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953793" comment="pcp-export-pcp2elasticsearch-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953794" comment="pcp-export-pcp2graphite-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953795" comment="pcp-export-pcp2influxdb-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953796" comment="pcp-export-pcp2json-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953797" comment="pcp-export-pcp2openmetrics-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953798" comment="pcp-export-pcp2spark-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953799" comment="pcp-export-pcp2xml-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953800" comment="pcp-export-pcp2zabbix-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953801" comment="pcp-export-zabbix-agent-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953802" comment="pcp-geolocate-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953803" comment="pcp-gui-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953804" comment="pcp-import-collectl2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953805" comment="pcp-import-ganglia2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953806" comment="pcp-import-iostat2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953807" comment="pcp-import-mrtg2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953808" comment="pcp-import-sar2pcp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953809" comment="pcp-libs-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953810" comment="pcp-libs-devel-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953811" comment="pcp-pmda-activemq-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953812" comment="pcp-pmda-apache-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953813" comment="pcp-pmda-bash-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953814" comment="pcp-pmda-bcc-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953815" comment="pcp-pmda-bind2-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953816" comment="pcp-pmda-bonding-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953817" comment="pcp-pmda-bpf-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953818" comment="pcp-pmda-bpftrace-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953819" comment="pcp-pmda-cifs-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953820" comment="pcp-pmda-cisco-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953821" comment="pcp-pmda-dbping-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953822" comment="pcp-pmda-denki-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953823" comment="pcp-pmda-dm-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953824" comment="pcp-pmda-docker-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953825" comment="pcp-pmda-ds389-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953826" comment="pcp-pmda-ds389log-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953827" comment="pcp-pmda-elasticsearch-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953828" comment="pcp-pmda-farm-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953829" comment="pcp-pmda-gfs2-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953830" comment="pcp-pmda-gluster-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953831" comment="pcp-pmda-gpfs-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953832" comment="pcp-pmda-gpsd-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953833" comment="pcp-pmda-hacluster-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953834" comment="pcp-pmda-haproxy-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953835" comment="pcp-pmda-infiniband-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953836" comment="pcp-pmda-json-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953837" comment="pcp-pmda-libvirt-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953838" comment="pcp-pmda-lio-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953839" comment="pcp-pmda-lmsensors-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953840" comment="pcp-pmda-logger-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953841" comment="pcp-pmda-lustre-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953842" comment="pcp-pmda-lustrecomm-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953843" comment="pcp-pmda-mailq-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953844" comment="pcp-pmda-memcache-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953845" comment="pcp-pmda-mic-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953846" comment="pcp-pmda-mongodb-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953847" comment="pcp-pmda-mounts-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953848" comment="pcp-pmda-mssql-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953849" comment="pcp-pmda-mysql-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953850" comment="pcp-pmda-named-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953851" comment="pcp-pmda-netcheck-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953852" comment="pcp-pmda-netfilter-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953853" comment="pcp-pmda-news-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953854" comment="pcp-pmda-nfsclient-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953855" comment="pcp-pmda-nginx-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953856" comment="pcp-pmda-nvidia-gpu-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953857" comment="pcp-pmda-openmetrics-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953858" comment="pcp-pmda-openvswitch-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953859" comment="pcp-pmda-oracle-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953860" comment="pcp-pmda-pdns-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953861" comment="pcp-pmda-perfevent-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953862" comment="pcp-pmda-podman-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953863" comment="pcp-pmda-postfix-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953864" comment="pcp-pmda-postgresql-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953865" comment="pcp-pmda-rabbitmq-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953866" comment="pcp-pmda-redis-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953867" comment="pcp-pmda-resctrl-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953868" comment="pcp-pmda-roomtemp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953869" comment="pcp-pmda-rsyslog-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953870" comment="pcp-pmda-samba-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953871" comment="pcp-pmda-sendmail-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953872" comment="pcp-pmda-shping-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953873" comment="pcp-pmda-slurm-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953874" comment="pcp-pmda-smart-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953875" comment="pcp-pmda-snmp-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953876" comment="pcp-pmda-sockets-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953877" comment="pcp-pmda-statsd-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953878" comment="pcp-pmda-summary-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953879" comment="pcp-pmda-systemd-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953880" comment="pcp-pmda-trace-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953881" comment="pcp-pmda-unbound-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953882" comment="pcp-pmda-uwsgi-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953883" comment="pcp-pmda-weblog-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953884" comment="pcp-pmda-zimbra-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953885" comment="pcp-pmda-zswap-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953886" comment="pcp-selinux-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953887" comment="pcp-system-tools-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953888" comment="pcp-zeroconf-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953889" comment="perl-PCP-LogImport-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953890" comment="perl-PCP-LogSummary-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953891" comment="perl-PCP-MMV-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953892" comment="perl-PCP-PMDA-6.2.2-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953893" comment="python3-pcp-6.2.2-7.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45774</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45774" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45774" ref_url="https://www.suse.com/security/cve/CVE-2024-45774" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45774/">CVE-2024-45774 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45774">CVE-2024-45774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233609">SUSE bug 1233609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45775" ref_url="https://www.suse.com/security/cve/CVE-2024-45775" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2 where the grub_extcmd_dispatcher() function calls grub_arg_list_alloc() to allocate memory for the grub's argument list. However, it fails to check in case the memory allocation fails. Once the allocation fails, a NULL point will be processed by the parse_option() function, leading grub to crash or, in some rare scenarios, corrupt the IVT data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45775/">CVE-2024-45775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45775">CVE-2024-45775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233610">SUSE bug 1233610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45776" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45776" ref_url="https://www.suse.com/security/cve/CVE-2024-45776" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    When reading the language .mo file in grub_mofile_open(), grub2 fails to verify an integer overflow when allocating its internal buffer. A crafted .mo file may lead the buffer size calculation to overflow, leading to out-of-bound reads and writes. This flaw allows an attacker to leak sensitive data or overwrite critical data, possibly circumventing secure boot protections.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45776/">CVE-2024-45776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45776">CVE-2024-45776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233612">SUSE bug 1233612</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45777" ref_url="https://www.suse.com/security/cve/CVE-2024-45777" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20532" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45777/">CVE-2024-45777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45777">CVE-2024-45777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233613">SUSE bug 1233613</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054038" comment="grub2-common-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054039" comment="grub2-efi-x64-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054040" comment="grub2-efi-x64-cdboot-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054041" comment="grub2-efi-x64-modules-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054042" comment="grub2-pc-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054043" comment="grub2-pc-modules-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054044" comment="grub2-tools-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054045" comment="grub2-tools-efi-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054046" comment="grub2-tools-extra-2.06-114.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054047" comment="grub2-tools-minimal-2.06-114.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45781" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45781" ref_url="https://www.suse.com/security/cve/CVE-2024-45781" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001028.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45781/">CVE-2024-45781 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45781">CVE-2024-45781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233617">SUSE bug 1233617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45783" ref_url="https://www.suse.com/security/cve/CVE-2024-45783" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2. When failing to mount an HFS+ grub, the hfsplus filesystem driver doesn't properly set an ERRNO value. This issue may lead to a NULL pointer access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45783/">CVE-2024-45783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45783">CVE-2024-45783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233616">SUSE bug 1233616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45802" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45802" ref_url="https://www.suse.com/security/cve/CVE-2024-45802" source="SUSE CVE"/>
		<reference ref_id="GHSA-f975-v7qw-q7hj" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-f975-v7qw-q7hj" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9625" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9644" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000622.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9738" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000647.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14566-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2MQUZAQT5UXLCPYAFDZWWXOJDXWWESAT/" source="SUSE-SU"/>
    <description>
    Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to Input Validation, Premature Release of Resource During Expected Lifetime, and Missing Release of Resource after Effective Lifetime bugs, Squid is vulnerable to Denial of Service attacks by a trusted server against all clients using the proxy. This bug is fixed in the default build configuration of Squid version 6.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-08-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-45802/">CVE-2024-45802 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45802">CVE-2024-45802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232485">SUSE bug 1232485</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953975" comment="squid-5.5-14.el9_5.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4603" ref_url="https://www.suse.com/security/cve/CVE-2024-4603" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2066-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html" source="SUSE-SU"/>
    <description>
    Issue summary: Checking excessively long DSA keys or parameters may be very
slow.

Impact summary: Applications that use the functions EVP_PKEY_param_check()
or EVP_PKEY_public_check() to check a DSA public key or DSA parameters may
experience long delays. Where the key or parameters that are being checked
have been obtained from an untrusted source this may lead to a Denial of
Service.

The functions EVP_PKEY_param_check() or EVP_PKEY_public_check() perform
various checks on DSA parameters. Some of those computations take a long time
if the modulus (`p` parameter) is too large.

Trying to use a very large modulus is slow and OpenSSL will not allow using
public keys with a modulus which is over 10,000 bits in length for signature
verification. However the key and parameter check functions do not limit
the modulus size when performing the checks.

An application that calls EVP_PKEY_param_check() or EVP_PKEY_public_check()
and supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.

These functions are not called by OpenSSL itself on untrusted DSA keys so
only applications that directly call these functions may be vulnerable.

Also vulnerable are the OpenSSL pkey and pkeyparam command line applications
when using the `-check` option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-4603/">CVE-2024-4603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4603">CVE-2024-4603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224388">SUSE bug 1224388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953743" comment="openssl-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953744" comment="openssl-devel-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953745" comment="openssl-fips-provider-3.0.7-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953746" comment="openssl-fips-provider-so-3.0.7-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953747" comment="openssl-libs-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953748" comment="openssl-perl-3.2.2-6.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46673" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46673" ref_url="https://www.suse.com/security/cve/CVE-2024-46673" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: aacraid: Fix double-free on probe failure

aac_probe_one() calls hardware-specific init functions through the
aac_driver_ident::init pointer, all of which eventually call down to
aac_init_adapter().

If aac_init_adapter() fails after allocating memory for aac_dev::queues,
it frees the memory but does not clear that member.

After the hardware-specific init function returns an error,
aac_probe_one() goes down an error path that frees the memory pointed to
by aac_dev::queues, resulting.in a double-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46673/">CVE-2024-46673 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46673">CVE-2024-46673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230506">SUSE bug 1230506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46675" ref_url="https://www.suse.com/security/cve/CVE-2024-46675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: core: Prevent USB core invalid event buffer address access

This commit addresses an issue where the USB core could access an
invalid event buffer address during runtime suspend, potentially causing
SMMU faults and other memory issues in Exynos platforms. The problem
arises from the following sequence.
        1. In dwc3_gadget_suspend, there is a chance of a timeout when
        moving the USB core to the halt state after clearing the
        run/stop bit by software.
        2. In dwc3_core_exit, the event buffer is cleared regardless of
        the USB core's status, which may lead to an SMMU faults and
        other memory issues. if the USB core tries to access the event
        buffer address.

To prevent this hardware quirk on Exynos platforms, this commit ensures
that the event buffer address is not cleared by software  when the USB
core is active during runtime suspend by checking its status before
clearing the buffer address.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46675/">CVE-2024-46675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46675">CVE-2024-46675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230533">SUSE bug 1230533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46679" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46679" ref_url="https://www.suse.com/security/cve/CVE-2024-46679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: check device is present when getting link settings

A sysfs reader can race with a device reset or removal, attempting to
read device state when the device is not actually present. eg:

     [exception RIP: qed_get_current_link+17]
  #8 [ffffb9e4f2907c48] qede_get_link_ksettings at ffffffffc07a994a [qede]
  #9 [ffffb9e4f2907cd8] __rh_call_get_link_ksettings at ffffffff992b01a3
 #10 [ffffb9e4f2907d38] __ethtool_get_link_ksettings at ffffffff992b04e4
 #11 [ffffb9e4f2907d90] duplex_show at ffffffff99260300
 #12 [ffffb9e4f2907e38] dev_attr_show at ffffffff9905a01c
 #13 [ffffb9e4f2907e50] sysfs_kf_seq_show at ffffffff98e0145b
 #14 [ffffb9e4f2907e68] seq_read at ffffffff98d902e3
 #15 [ffffb9e4f2907ec8] vfs_read at ffffffff98d657d1
 #16 [ffffb9e4f2907f00] ksys_read at ffffffff98d65c3f
 #17 [ffffb9e4f2907f38] do_syscall_64 at ffffffff98a052fb

 crash&gt; struct net_device.state ffff9a9d21336000
    state = 5,

state 5 is __LINK_STATE_START (0b1) and __LINK_STATE_NOCARRIER (0b100).
The device is not present, note lack of __LINK_STATE_PRESENT (0b10).

This is the same sort of panic as observed in commit 4224cfd7fb65
("net-sysfs: add check for netdevice being present to speed_show").

There are many other callers of __ethtool_get_link_ksettings() which
don't have a device presence check.

Move this check into ethtool to protect all callers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-46679/">CVE-2024-46679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46679">CVE-2024-46679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230556">SUSE bug 1230556</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955019" comment="bpftool-7.4.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955020" comment="kernel-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955021" comment="kernel-abi-stablelists-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955022" comment="kernel-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955023" comment="kernel-cross-headers-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955024" comment="kernel-debug-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955025" comment="kernel-debug-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955028" comment="kernel-debug-modules-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955029" comment="kernel-debug-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955030" comment="kernel-debug-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955031" comment="kernel-debug-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955034" comment="kernel-doc-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955035" comment="kernel-headers-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955036" comment="kernel-modules-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955037" comment="kernel-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955038" comment="kernel-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955039" comment="kernel-tools-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955040" comment="kernel-tools-libs-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955042" comment="kernel-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955043" comment="kernel-uki-virt-addons-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955044" comment="libperf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955045" comment="perf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955046" comment="python3-perf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955047" comment="rtla-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955048" comment="rv-5.14.0-503.15.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46689</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46689" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46689" ref_url="https://www.suse.com/security/cve/CVE-2024-46689" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: cmd-db: Map shared memory as WC, not WB

Linux does not write into cmd-db region. This region of memory is write
protected by XPU. XPU may sometime falsely detect clean cache eviction
as "write" into the write protected region leading to secure interrupt
which causes an endless loop somewhere in Trust Zone.

The only reason it is working right now is because Qualcomm Hypervisor
maps the same region as Non-Cacheable memory in Stage 2 translation
tables. The issue manifests if we want to use another hypervisor (like
Xen or KVM), which does not know anything about those specific mappings.

Changing the mapping of cmd-db memory from MEMREMAP_WB to MEMREMAP_WT/WC
removes dependency on correct mappings in Stage 2 tables. This patch
fixes the issue by updating the mapping to MEMREMAP_WC.

I tested this on SA8155P with Xen.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46689/">CVE-2024-46689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46689">CVE-2024-46689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230524">SUSE bug 1230524</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46695" ref_url="https://www.suse.com/security/cve/CVE-2024-46695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux,smack: don't bypass permissions check in inode_setsecctx hook

Marek Gresko reports that the root user on an NFS client is able to
change the security labels on files on an NFS filesystem that is
exported with root squashing enabled.

The end of the kerneldoc comment for __vfs_setxattr_noperm() states:

 *  This function requires the caller to lock the inode's i_mutex before it
 *  is executed. It also assumes that the caller will make the appropriate
 *  permission checks.

nfsd_setattr() does do permissions checking via fh_verify() and
nfsd_permission(), but those don't do all the same permissions checks
that are done by security_inode_setxattr() and its related LSM hooks do.

Since nfsd_setattr() is the only consumer of security_inode_setsecctx(),
simplest solution appears to be to replace the call to
__vfs_setxattr_noperm() with a call to __vfs_setxattr_locked().  This
fixes the above issue and has the added benefit of causing nfsd to
recall conflicting delegations on a file when a client tries to change
its security label.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46695/">CVE-2024-46695 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46695">CVE-2024-46695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230519">SUSE bug 1230519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957437" comment="bpftool-7.4.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957438" comment="kernel-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957439" comment="kernel-abi-stablelists-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957440" comment="kernel-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957441" comment="kernel-cross-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957442" comment="kernel-debug-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957443" comment="kernel-debug-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957446" comment="kernel-debug-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957447" comment="kernel-debug-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957448" comment="kernel-debug-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957449" comment="kernel-debug-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957452" comment="kernel-doc-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957453" comment="kernel-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957454" comment="kernel-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957455" comment="kernel-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957456" comment="kernel-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957457" comment="kernel-tools-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957458" comment="kernel-tools-libs-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957460" comment="kernel-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957461" comment="kernel-uki-virt-addons-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957462" comment="libperf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957463" comment="perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957464" comment="python3-perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957465" comment="rtla-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957466" comment="rv-5.14.0-503.16.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46711" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46711" ref_url="https://www.suse.com/security/cve/CVE-2024-46711" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: fix ID 0 endp usage after multiple re-creations

'local_addr_used' and 'add_addr_accepted' are decremented for addresses
not related to the initial subflow (ID0), because the source and
destination addresses of the initial subflows are known from the
beginning: they don't count as "additional local address being used" or
"ADD_ADDR being accepted".

It is then required not to increment them when the entrypoint used by
the initial subflow is removed and re-added during a connection. Without
this modification, this entrypoint cannot be removed and re-added more
than once.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46711/">CVE-2024-46711 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46711">CVE-2024-46711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230542">SUSE bug 1230542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46713" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46713" ref_url="https://www.suse.com/security/cve/CVE-2024-46713" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/aux: Fix AUX buffer serialization

Ole reported that event-&gt;mmap_mutex is strictly insufficient to
serialize the AUX buffer, add a per RB mutex to fully serialize it.

Note that in the lock order comment the perf_event::mmap_mutex order
was already wrong, that is, it nesting under mmap_lock is not new with
this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46713/">CVE-2024-46713 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46713">CVE-2024-46713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230581">SUSE bug 1230581</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959322" comment="bpftool-7.4.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959323" comment="kernel-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959324" comment="kernel-abi-stablelists-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959325" comment="kernel-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959326" comment="kernel-cross-headers-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959327" comment="kernel-debug-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959328" comment="kernel-debug-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959331" comment="kernel-debug-modules-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959332" comment="kernel-debug-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959333" comment="kernel-debug-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959334" comment="kernel-debug-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959337" comment="kernel-doc-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959338" comment="kernel-headers-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959339" comment="kernel-modules-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959340" comment="kernel-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959341" comment="kernel-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959342" comment="kernel-tools-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959343" comment="kernel-tools-libs-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959345" comment="kernel-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959346" comment="kernel-uki-virt-addons-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959347" comment="libperf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959348" comment="perf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959349" comment="python3-perf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959350" comment="rtla-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959351" comment="rv-5.14.0-503.21.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46722</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46722" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46722" ref_url="https://www.suse.com/security/cve/CVE-2024-46722" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix mc_data out-of-bounds read warning

Clear warning that read mc_data[i-1] may out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46722/">CVE-2024-46722 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46722">CVE-2024-46722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230712">SUSE bug 1230712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46723</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46723" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46723" ref_url="https://www.suse.com/security/cve/CVE-2024-46723" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix ucode out-of-bounds read warning

Clear warning that read ucode[] may out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46723/">CVE-2024-46723 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46723">CVE-2024-46723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230702">SUSE bug 1230702</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46724" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46724" ref_url="https://www.suse.com/security/cve/CVE-2024-46724" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number

Check the fb_channel_number range to avoid the array out-of-bounds
read error
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46724/">CVE-2024-46724 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46724">CVE-2024-46724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230725">SUSE bug 1230725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46725</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46725" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46725" ref_url="https://www.suse.com/security/cve/CVE-2024-46725" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds write warning

Check the ring type value to fix the out-of-bounds
write warning
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46725/">CVE-2024-46725 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46725">CVE-2024-46725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230705">SUSE bug 1230705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46743</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46743" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46743" ref_url="https://www.suse.com/security/cve/CVE-2024-46743" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of/irq: Prevent device address out-of-bounds read in interrupt map walk

When of_irq_parse_raw() is invoked with a device address smaller than
the interrupt parent node (from #address-cells property), KASAN detects
the following out-of-bounds read when populating the initial match table
(dyndbg="func of_irq_parse_* +p"):

  OF: of_irq_parse_one: dev=/soc@0/picasso/watchdog, index=0
  OF:  parent=/soc@0/pci@878000000000/gpio0@17,0, intsize=2
  OF:  intspec=4
  OF: of_irq_parse_raw: ipar=/soc@0/pci@878000000000/gpio0@17,0, size=2
  OF:  -&gt; addrsize=3
  ==================================================================
  BUG: KASAN: slab-out-of-bounds in of_irq_parse_raw+0x2b8/0x8d0
  Read of size 4 at addr ffffff81beca5608 by task bash/764

  CPU: 1 PID: 764 Comm: bash Tainted: G           O       6.1.67-484c613561-nokia_sm_arm64 #1
  Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.01-12.24.03-dirty 01/01/2023
  Call trace:
   dump_backtrace+0xdc/0x130
   show_stack+0x1c/0x30
   dump_stack_lvl+0x6c/0x84
   print_report+0x150/0x448
   kasan_report+0x98/0x140
   __asan_load4+0x78/0xa0
   of_irq_parse_raw+0x2b8/0x8d0
   of_irq_parse_one+0x24c/0x270
   parse_interrupts+0xc0/0x120
   of_fwnode_add_links+0x100/0x2d0
   fw_devlink_parse_fwtree+0x64/0xc0
   device_add+0xb38/0xc30
   of_device_add+0x64/0x90
   of_platform_device_create_pdata+0xd0/0x170
   of_platform_bus_create+0x244/0x600
   of_platform_notify+0x1b0/0x254
   blocking_notifier_call_chain+0x9c/0xd0
   __of_changeset_entry_notify+0x1b8/0x230
   __of_changeset_apply_notify+0x54/0xe4
   of_overlay_fdt_apply+0xc04/0xd94
   ...

  The buggy address belongs to the object at ffffff81beca5600
   which belongs to the cache kmalloc-128 of size 128
  The buggy address is located 8 bytes inside of
   128-byte region [ffffff81beca5600, ffffff81beca5680)

  The buggy address belongs to the physical page:
  page:00000000230d3d03 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1beca4
  head:00000000230d3d03 order:1 compound_mapcount:0 compound_pincount:0
  flags: 0x8000000000010200(slab|head|zone=2)
  raw: 8000000000010200 0000000000000000 dead000000000122 ffffff810000c300
  raw: 0000000000000000 0000000000200020 00000001ffffffff 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffffff81beca5500: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
   ffffff81beca5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
  &gt;ffffff81beca5600: 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
                        ^
   ffffff81beca5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
   ffffff81beca5700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
  ==================================================================
  OF:  -&gt; got it !

Prevent the out-of-bounds read by copying the device address into a
buffer of sufficient size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46743/">CVE-2024-46743 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46743">CVE-2024-46743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230756">SUSE bug 1230756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46744</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46744" ref_url="https://www.suse.com/security/cve/CVE-2024-46744" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: sanity check symbolic link size

Syzkiller reports a "KMSAN: uninit-value in pick_link" bug.

This is caused by an uninitialised page, which is ultimately caused
by a corrupted symbolic link size read from disk.

The reason why the corrupted symlink size causes an uninitialised
page is due to the following sequence of events:

1. squashfs_read_inode() is called to read the symbolic
   link from disk.  This assigns the corrupted value
   3875536935 to inode-&gt;i_size.

2. Later squashfs_symlink_read_folio() is called, which assigns
   this corrupted value to the length variable, which being a
   signed int, overflows producing a negative number.

3. The following loop that fills in the page contents checks that
   the copied bytes is less than length, which being negative means
   the loop is skipped, producing an uninitialised page.

This patch adds a sanity check which checks that the symbolic
link size is not larger than expected.

--

V2: fix spelling mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46744/">CVE-2024-46744 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46744">CVE-2024-46744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230747">SUSE bug 1230747</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46745" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46745" ref_url="https://www.suse.com/security/cve/CVE-2024-46745" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - reject requests with unreasonable number of slots


When exercising uinput interface syzkaller may try setting up device
with a really large number of slots, which causes memory allocation
failure in input_mt_init_slots(). While this allocation failure is
handled properly and request is rejected, it results in syzkaller
reports. Additionally, such request may put undue burden on the
system which will try to free a lot of memory for a bogus request.

Fix it by limiting allowed number of slots to 100. This can easily
be extended if we see devices that can track more than 100 contacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46745/">CVE-2024-46745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46745">CVE-2024-46745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230748">SUSE bug 1230748</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46747</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46747" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46747" ref_url="https://www.suse.com/security/cve/CVE-2024-46747" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup

report_fixup for the Cougar 500k Gaming Keyboard was not verifying
that the report descriptor size was correct before accessing it
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46747/">CVE-2024-46747 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46747">CVE-2024-46747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230752">SUSE bug 1230752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46750" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46750" ref_url="https://www.suse.com/security/cve/CVE-2024-46750" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Add missing bridge lock to pci_bus_lock()

One of the true positives that the cfg_access_lock lockdep effort
identified is this sequence:

  WARNING: CPU: 14 PID: 1 at drivers/pci/pci.c:4886 pci_bridge_secondary_bus_reset+0x5d/0x70
  RIP: 0010:pci_bridge_secondary_bus_reset+0x5d/0x70
  Call Trace:
   &lt;TASK&gt;
   ? __warn+0x8c/0x190
   ? pci_bridge_secondary_bus_reset+0x5d/0x70
   ? report_bug+0x1f8/0x200
   ? handle_bug+0x3c/0x70
   ? exc_invalid_op+0x18/0x70
   ? asm_exc_invalid_op+0x1a/0x20
   ? pci_bridge_secondary_bus_reset+0x5d/0x70
   pci_reset_bus+0x1d8/0x270
   vmd_probe+0x778/0xa10
   pci_device_probe+0x95/0x120

Where pci_reset_bus() users are triggering unlocked secondary bus resets.
Ironically pci_bus_reset(), several calls down from pci_reset_bus(), uses
pci_bus_lock() before issuing the reset which locks everything *but* the
bridge itself.

For the same motivation as adding:

  bridge = pci_upstream_bridge(dev);
  if (bridge)
    pci_dev_lock(bridge);

to pci_reset_function() for the "bus" and "cxl_bus" reset cases, add
pci_dev_lock() for @bus-&gt;self to pci_bus_lock().

[bhelgaas: squash in recursive locking deadlock fix from Keith Busch:
https://lore.kernel.org/r/20240711193650.701834-1-kbusch@meta.com]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46750/">CVE-2024-46750 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46750">CVE-2024-46750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230783">SUSE bug 1230783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46754" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46754" ref_url="https://www.suse.com/security/cve/CVE-2024-46754" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Remove tst_run from lwt_seg6local_prog_ops.

The syzbot reported that the lwt_seg6 related BPF ops can be invoked
via bpf_test_run() without without entering input_action_end_bpf()
first.

Martin KaFai Lau said that self test for BPF_PROG_TYPE_LWT_SEG6LOCAL
probably didn't work since it was introduced in commit 04d4b274e2a
("ipv6: sr: Add seg6local action End.BPF"). The reason is that the
per-CPU variable seg6_bpf_srh_states::srh is never assigned in the self
test case but each BPF function expects it.

Remove test_run for BPF_PROG_TYPE_LWT_SEG6LOCAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46754/">CVE-2024-46754 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46754">CVE-2024-46754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230801">SUSE bug 1230801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46756" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46756" ref_url="https://www.suse.com/security/cve/CVE-2024-46756" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46756/">CVE-2024-46756 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46756">CVE-2024-46756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230806">SUSE bug 1230806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46758</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46758" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46758" ref_url="https://www.suse.com/security/cve/CVE-2024-46758" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46758/">CVE-2024-46758 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46758">CVE-2024-46758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230812">SUSE bug 1230812</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46759</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46759" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46759" ref_url="https://www.suse.com/security/cve/CVE-2024-46759" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (adc128d818) Fix underflows seen when writing limit attributes

DIV_ROUND_CLOSEST() after kstrtol() results in an underflow if a large
negative number such as -9223372036854775808 is provided by the user.
Fix it by reordering clamp_val() and DIV_ROUND_CLOSEST() operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46759/">CVE-2024-46759 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46759">CVE-2024-46759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230814">SUSE bug 1230814</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46761" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46761" ref_url="https://www.suse.com/security/cve/CVE-2024-46761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pci/hotplug/pnv_php: Fix hotplug driver crash on Powernv

The hotplug driver for powerpc (pci/hotplug/pnv_php.c) causes a kernel
crash when we try to hot-unplug/disable the PCIe switch/bridge from
the PHB.

The crash occurs because although the MSI data structure has been
released during disable/hot-unplug path and it has been assigned
with NULL, still during unregistration the code was again trying to
explicitly disable the MSI which causes the NULL pointer dereference and
kernel crash.

The patch fixes the check during unregistration path to prevent invoking
pci_disable_msi/msix() since its data structure is already freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46761/">CVE-2024-46761 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46761">CVE-2024-46761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230761">SUSE bug 1230761</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46783" ref_url="https://www.suse.com/security/cve/CVE-2024-46783" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: fix return value of tcp_bpf_sendmsg()

When we cork messages in psock-&gt;cork, the last message triggers the
flushing will result in sending a sk_msg larger than the current
message size. In this case, in tcp_bpf_send_verdict(), 'copied' becomes
negative at least in the following case:

468         case __SK_DROP:
469         default:
470                 sk_msg_free_partial(sk, msg, tosend);
471                 sk_msg_apply_bytes(psock, tosend);
472                 *copied -= (tosend + delta); // &lt;==== HERE
473                 return -EACCES;

Therefore, it could lead to the following BUG with a proper value of
'copied' (thanks to syzbot). We should not use negative 'copied' as a
return value here.

  ------------[ cut here ]------------
  kernel BUG at net/socket.c:733!
  Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
  Modules linked in:
  CPU: 0 UID: 0 PID: 3265 Comm: syz-executor510 Not tainted 6.11.0-rc3-syzkaller-00060-gd07b43284ab3 #0
  Hardware name: linux,dummy-virt (DT)
  pstate: 61400009 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
  pc : sock_sendmsg_nosec net/socket.c:733 [inline]
  pc : sock_sendmsg_nosec net/socket.c:728 [inline]
  pc : __sock_sendmsg+0x5c/0x60 net/socket.c:745
  lr : sock_sendmsg_nosec net/socket.c:730 [inline]
  lr : __sock_sendmsg+0x54/0x60 net/socket.c:745
  sp : ffff800088ea3b30
  x29: ffff800088ea3b30 x28: fbf00000062bc900 x27: 0000000000000000
  x26: ffff800088ea3bc0 x25: ffff800088ea3bc0 x24: 0000000000000000
  x23: f9f00000048dc000 x22: 0000000000000000 x21: ffff800088ea3d90
  x20: f9f00000048dc000 x19: ffff800088ea3d90 x18: 0000000000000001
  x17: 0000000000000000 x16: 0000000000000000 x15: 000000002002ffaf
  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
  x11: 0000000000000000 x10: ffff8000815849c0 x9 : ffff8000815b49c0
  x8 : 0000000000000000 x7 : 000000000000003f x6 : 0000000000000000
  x5 : 00000000000007e0 x4 : fff07ffffd239000 x3 : fbf00000062bc900
  x2 : 0000000000000000 x1 : 0000000000000000 x0 : 00000000fffffdef
  Call trace:
   sock_sendmsg_nosec net/socket.c:733 [inline]
   __sock_sendmsg+0x5c/0x60 net/socket.c:745
   ____sys_sendmsg+0x274/0x2ac net/socket.c:2597
   ___sys_sendmsg+0xac/0x100 net/socket.c:2651
   __sys_sendmsg+0x84/0xe0 net/socket.c:2680
   __do_sys_sendmsg net/socket.c:2689 [inline]
   __se_sys_sendmsg net/socket.c:2687 [inline]
   __arm64_sys_sendmsg+0x24/0x30 net/socket.c:2687
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x48/0x110 arch/arm64/kernel/syscall.c:49
   el0_svc_common.constprop.0+0x40/0xe0 arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x1c/0x28 arch/arm64/kernel/syscall.c:151
   el0_svc+0x34/0xec arch/arm64/kernel/entry-common.c:712
   el0t_64_sync_handler+0x100/0x12c arch/arm64/kernel/entry-common.c:730
   el0t_64_sync+0x19c/0x1a0 arch/arm64/kernel/entry.S:598
  Code: f9404463 d63f0060 3108441f 54fffe81 (d4210000)
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46783/">CVE-2024-46783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46783">CVE-2024-46783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230810">SUSE bug 1230810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46786" ref_url="https://www.suse.com/security/cve/CVE-2024-46786" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fscache: delete fscache_cookie_lru_timer when fscache exits to avoid UAF

The fscache_cookie_lru_timer is initialized when the fscache module
is inserted, but is not deleted when the fscache module is removed.
If timer_reduce() is called before removing the fscache module,
the fscache_cookie_lru_timer will be added to the timer list of
the current cpu. Afterwards, a use-after-free will be triggered
in the softIRQ after removing the fscache module, as follows:

==================================================================
BUG: unable to handle page fault for address: fffffbfff803c9e9
 PF: supervisor read access in kernel mode
 PF: error_code(0x0000) - not-present page
PGD 21ffea067 P4D 21ffea067 PUD 21ffe6067 PMD 110a7c067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G W 6.11.0-rc3 #855
Tainted: [W]=WARN
RIP: 0010:__run_timer_base.part.0+0x254/0x8a0
Call Trace:
 &lt;IRQ&gt;
 tmigr_handle_remote_up+0x627/0x810
 __walk_groups.isra.0+0x47/0x140
 tmigr_handle_remote+0x1fa/0x2f0
 handle_softirqs+0x180/0x590
 irq_exit_rcu+0x84/0xb0
 sysvec_apic_timer_interrupt+0x6e/0x90
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 asm_sysvec_apic_timer_interrupt+0x1a/0x20
RIP: 0010:default_idle+0xf/0x20
 default_idle_call+0x38/0x60
 do_idle+0x2b5/0x300
 cpu_startup_entry+0x54/0x60
 start_secondary+0x20d/0x280
 common_startup_64+0x13e/0x148
 &lt;/TASK&gt;
Modules linked in: [last unloaded: netfs]
==================================================================

Therefore delete fscache_cookie_lru_timer when removing the fscahe module.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46786/">CVE-2024-46786 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46786">CVE-2024-46786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230813">SUSE bug 1230813</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46787" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46787" ref_url="https://www.suse.com/security/cve/CVE-2024-46787" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: fix checks for huge PMDs

Patch series "userfaultfd: fix races around pmd_trans_huge() check", v2.

The pmd_trans_huge() code in mfill_atomic() is wrong in three different
ways depending on kernel version:

1. The pmd_trans_huge() check is racy and can lead to a BUG_ON() (if you hit
   the right two race windows) - I've tested this in a kernel build with
   some extra mdelay() calls. See the commit message for a description
   of the race scenario.
   On older kernels (before 6.5), I think the same bug can even
   theoretically lead to accessing transhuge page contents as a page table
   if you hit the right 5 narrow race windows (I haven't tested this case).
2. As pointed out by Qi Zheng, pmd_trans_huge() is not sufficient for
   detecting PMDs that don't point to page tables.
   On older kernels (before 6.5), you'd just have to win a single fairly
   wide race to hit this.
   I've tested this on 6.1 stable by racing migration (with a mdelay()
   patched into try_to_migrate()) against UFFDIO_ZEROPAGE - on my x86
   VM, that causes a kernel oops in ptlock_ptr().
3. On newer kernels (&gt;=6.5), for shmem mappings, khugepaged is allowed
   to yank page tables out from under us (though I haven't tested that),
   so I think the BUG_ON() checks in mfill_atomic() are just wrong.

I decided to write two separate fixes for these (one fix for bugs 1+2, one
fix for bug 3), so that the first fix can be backported to kernels
affected by bugs 1+2.


This patch (of 2):

This fixes two issues.

I discovered that the following race can occur:

  mfill_atomic                other thread
  ============                ============
                              &lt;zap PMD&gt;
  pmdp_get_lockless() [reads none pmd]
  &lt;bail if trans_huge&gt;
  &lt;if none:&gt;
                              &lt;pagefault creates transhuge zeropage&gt;
    __pte_alloc [no-op]
                              &lt;zap PMD&gt;
  &lt;bail if pmd_trans_huge(*dst_pmd)&gt;
  BUG_ON(pmd_none(*dst_pmd))

I have experimentally verified this in a kernel with extra mdelay() calls;
the BUG_ON(pmd_none(*dst_pmd)) triggers.

On kernels newer than commit 0d940a9b270b ("mm/pgtable: allow
pte_offset_map[_lock]() to fail"), this can't lead to anything worse than
a BUG_ON(), since the page table access helpers are actually designed to
deal with page tables concurrently disappearing; but on older kernels
(&lt;=6.4), I think we could probably theoretically race past the two
BUG_ON() checks and end up treating a hugepage as a page table.

The second issue is that, as Qi Zheng pointed out, there are other types
of huge PMDs that pmd_trans_huge() can't catch: devmap PMDs and swap PMDs
(in particular, migration PMDs).

On &lt;=6.4, this is worse than the first issue: If mfill_atomic() runs on a
PMD that contains a migration entry (which just requires winning a single,
fairly wide race), it will pass the PMD to pte_offset_map_lock(), which
assumes that the PMD points to a page table.

Breakage follows: First, the kernel tries to take the PTE lock (which will
crash or maybe worse if there is no "struct page" for the address bits in
the migration entry PMD - I think at least on X86 there usually is no
corresponding "struct page" thanks to the PTE inversion mitigation, amd64
looks different).

If that didn't crash, the kernel would next try to write a PTE into what
it wrongly thinks is a page table.

As part of fixing these issues, get rid of the check for pmd_trans_huge()
before __pte_alloc() - that's redundant, we're going to have to check for
that after the __pte_alloc() anyway.

Backport note: pmdp_get_lockless() is pmd_read_atomic() in older kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46787/">CVE-2024-46787 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46787">CVE-2024-46787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230815">SUSE bug 1230815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46800" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46800" ref_url="https://www.suse.com/security/cve/CVE-2024-46800" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch/netem: fix use after free in netem_dequeue

If netem_dequeue() enqueues packet to inner qdisc and that qdisc
returns __NET_XMIT_STOLEN. The packet is dropped but
qdisc_tree_reduce_backlog() is not called to update the parent's
q.qlen, leading to the similar use-after-free as Commit
e04991a48dbaf382 ("netem: fix return value if duplicate enqueue
fails")

Commands to trigger KASAN UaF:

ip link add type dummy
ip link set lo up
ip link set dummy0 up
tc qdisc add dev lo parent root handle 1: drr
tc filter add dev lo parent 1: basic classid 1:1
tc class add dev lo classid 1:1 drr
tc qdisc add dev lo parent 1:1 handle 2: netem
tc qdisc add dev lo parent 2: handle 3: drr
tc filter add dev lo parent 3: basic classid 3:1 action mirred egress
redirect dev dummy0
tc class add dev lo classid 3:1 drr
ping -c1 -W0.01 localhost # Trigger bug
tc class del dev lo classid 1:1
tc class add dev lo classid 1:1 drr
ping -c1 -W0.01 localhost # UaF
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46800/">CVE-2024-46800 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46800">CVE-2024-46800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230827">SUSE bug 1230827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46805</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46805" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46805" ref_url="https://www.suse.com/security/cve/CVE-2024-46805" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix the waring dereferencing hive

Check the amdgpu_hive_info *hive that maybe is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46805/">CVE-2024-46805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46805">CVE-2024-46805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231135">SUSE bug 1231135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46806" ref_url="https://www.suse.com/security/cve/CVE-2024-46806" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix the warning division or modulo by zero

Checks the partition mode and returns an error for an invalid mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46806/">CVE-2024-46806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46806">CVE-2024-46806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231136">SUSE bug 1231136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46807</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46807" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46807" ref_url="https://www.suse.com/security/cve/CVE-2024-46807" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/amdgpu: Check tbo resource pointer

Validate tbo resource pointer, skip if NULL
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46807/">CVE-2024-46807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46807">CVE-2024-46807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231138">SUSE bug 1231138</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46819" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46819" ref_url="https://www.suse.com/security/cve/CVE-2024-46819" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: the warning dereferencing obj for nbio_v7_4

if ras_manager obj null, don't print NBIO err data
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46819/">CVE-2024-46819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46819">CVE-2024-46819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231202">SUSE bug 1231202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46820" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46820" ref_url="https://www.suse.com/security/cve/CVE-2024-46820" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/vcn: remove irq disabling in vcn 5 suspend

We do not directly enable/disable VCN IRQ in vcn 5.0.0.
And we do not handle the IRQ state as well. So the calls to
disable IRQ and set state are removed. This effectively gets
rid of the warining of
      "WARN_ON(!amdgpu_irq_enabled(adev, src, type))"
in amdgpu_irq_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-46820/">CVE-2024-46820 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46820">CVE-2024-46820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231168">SUSE bug 1231168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46822</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46822" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46822" ref_url="https://www.suse.com/security/cve/CVE-2024-46822" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry

In a review discussion of the changes to support vCPU hotplug where
a check was added on the GICC being enabled if was online, it was
noted that there is need to map back to the cpu and use that to index
into a cpumask. As such, a valid ID is needed.

If an MPIDR check fails in acpi_map_gic_cpu_interface() it is possible
for the entry in cpu_madt_gicc[cpu] == NULL.  This function would
then cause a NULL pointer dereference.   Whilst a path to trigger
this has not been established, harden this caller against the
possibility.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46822/">CVE-2024-46822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46822">CVE-2024-46822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231120">SUSE bug 1231120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46824</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46824" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46824" ref_url="https://www.suse.com/security/cve/CVE-2024-46824" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000563.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Require drivers to supply the cache_invalidate_user ops

If drivers don't do this then iommufd will oops invalidation ioctls with
something like:

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
  Mem abort info:
    ESR = 0x0000000086000004
    EC = 0x21: IABT (current EL), IL = 32 bits
    SET = 0, FnV = 0
    EA = 0, S1PTW = 0
    FSC = 0x04: level 0 translation fault
  user pgtable: 4k pages, 48-bit VAs, pgdp=0000000101059000
  [0000000000000000] pgd=0000000000000000, p4d=0000000000000000
  Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP
  Modules linked in:
  CPU: 2 PID: 371 Comm: qemu-system-aar Not tainted 6.8.0-rc7-gde77230ac23a #9
  Hardware name: linux,dummy-virt (DT)
  pstate: 81400809 (Nzcv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=-c)
  pc : 0x0
  lr : iommufd_hwpt_invalidate+0xa4/0x204
  sp : ffff800080f3bcc0
  x29: ffff800080f3bcf0 x28: ffff0000c369b300 x27: 0000000000000000
  x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
  x23: 0000000000000000 x22: 00000000c1e334a0 x21: ffff0000c1e334a0
  x20: ffff800080f3bd38 x19: ffff800080f3bd58 x18: 0000000000000000
  x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffff8240d6d8
  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
  x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
  x8 : 0000001000000002 x7 : 0000fffeac1ec950 x6 : 0000000000000000
  x5 : ffff800080f3bd78 x4 : 0000000000000003 x3 : 0000000000000002
  x2 : 0000000000000000 x1 : ffff800080f3bcc8 x0 : ffff0000c6034d80
  Call trace:
   0x0
   iommufd_fops_ioctl+0x154/0x274
   __arm64_sys_ioctl+0xac/0xf0
   invoke_syscall+0x48/0x110
   el0_svc_common.constprop.0+0x40/0xe0
   do_el0_svc+0x1c/0x28
   el0_svc+0x34/0xb4
   el0t_64_sync_handler+0x120/0x12c
   el0t_64_sync+0x190/0x194

All existing drivers implement this op for nesting, this is mostly a
bisection aid.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46824/">CVE-2024-46824 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46824">CVE-2024-46824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231113">SUSE bug 1231113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953945" comment="bpftool-7.4.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953946" comment="kernel-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953947" comment="kernel-abi-stablelists-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953948" comment="kernel-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953949" comment="kernel-cross-headers-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953950" comment="kernel-debug-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953951" comment="kernel-debug-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953954" comment="kernel-debug-modules-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953955" comment="kernel-debug-modules-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953956" comment="kernel-debug-modules-extra-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953957" comment="kernel-debug-uki-virt-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953960" comment="kernel-doc-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953961" comment="kernel-headers-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953962" comment="kernel-modules-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953963" comment="kernel-modules-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953964" comment="kernel-modules-extra-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953965" comment="kernel-tools-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953966" comment="kernel-tools-libs-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953968" comment="kernel-uki-virt-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953969" comment="kernel-uki-virt-addons-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953970" comment="libperf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953971" comment="perf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953972" comment="python3-perf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953973" comment="rtla-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953974" comment="rv-5.14.0-503.14.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46826" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46826" ref_url="https://www.suse.com/security/cve/CVE-2024-46826" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ELF: fix kernel.randomize_va_space double read

ELF loader uses "randomize_va_space" twice. It is sysctl and can change
at any moment, so 2 loads could see 2 different values in theory with
unpredictable consequences.

Issue exactly one load for consistent value across one exec.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46826/">CVE-2024-46826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46826">CVE-2024-46826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231115">SUSE bug 1231115</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977299" comment="bpftool-7.4.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977300" comment="kernel-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977301" comment="kernel-abi-stablelists-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977302" comment="kernel-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977303" comment="kernel-cross-headers-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977304" comment="kernel-debug-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977305" comment="kernel-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977308" comment="kernel-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977309" comment="kernel-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977310" comment="kernel-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977311" comment="kernel-debug-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977314" comment="kernel-doc-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977315" comment="kernel-headers-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977316" comment="kernel-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977317" comment="kernel-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977318" comment="kernel-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977319" comment="kernel-rt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977320" comment="kernel-rt-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977321" comment="kernel-rt-debug-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977322" comment="kernel-rt-debug-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977324" comment="kernel-rt-debug-kvm-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977325" comment="kernel-rt-debug-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977326" comment="kernel-rt-debug-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977327" comment="kernel-rt-debug-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977329" comment="kernel-rt-kvm-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977330" comment="kernel-rt-modules-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977331" comment="kernel-rt-modules-core-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977332" comment="kernel-rt-modules-extra-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977333" comment="kernel-tools-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977334" comment="kernel-tools-libs-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977336" comment="kernel-uki-virt-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977337" comment="kernel-uki-virt-addons-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977338" comment="libperf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977339" comment="perf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977340" comment="python3-perf-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977341" comment="rtla-5.14.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977342" comment="rv-5.14.0-503.40.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46828" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46828" ref_url="https://www.suse.com/security/cve/CVE-2024-46828" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: fix bulk flow accounting logic for host fairness

In sch_cake, we keep track of the count of active bulk flows per host,
when running in dst/src host fairness mode, which is used as the
round-robin weight when iterating through flows. The count of active
bulk flows is updated whenever a flow changes state.

This has a peculiar interaction with the hash collision handling: when a
hash collision occurs (after the set-associative hashing), the state of
the hash bucket is simply updated to match the new packet that collided,
and if host fairness is enabled, that also means assigning new per-host
state to the flow. For this reason, the bulk flow counters of the
host(s) assigned to the flow are decremented, before new state is
assigned (and the counters, which may not belong to the same host
anymore, are incremented again).

Back when this code was introduced, the host fairness mode was always
enabled, so the decrement was unconditional. When the configuration
flags were introduced the *increment* was made conditional, but
the *decrement* was not. Which of course can lead to a spurious
decrement (and associated wrap-around to U16_MAX).

AFAICT, when host fairness is disabled, the decrement and wrap-around
happens as soon as a hash collision occurs (which is not that common in
itself, due to the set-associative hashing). However, in most cases this
is harmless, as the value is only used when host fairness mode is
enabled. So in order to trigger an array overflow, sch_cake has to first
be configured with host fairness disabled, and while running in this
mode, a hash collision has to occur to cause the overflow. Then, the
qdisc has to be reconfigured to enable host fairness, which leads to the
array out-of-bounds because the wrapped-around value is retained and
used as an array index. It seems that syzbot managed to trigger this,
which is quite impressive in its own right.

This patch fixes the issue by introducing the same conditional check on
decrement as is used on increment.

The original bug predates the upstreaming of cake, but the commit listed
in the Fixes tag touched that code, meaning that this patch won't apply
before that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46828/">CVE-2024-46828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46828">CVE-2024-46828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231114">SUSE bug 1231114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46835" ref_url="https://www.suse.com/security/cve/CVE-2024-46835" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix smatch static checker warning

adev-&gt;gfx.imu.funcs could be NULL
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46835/">CVE-2024-46835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46835">CVE-2024-46835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231098">SUSE bug 1231098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46839" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46839" ref_url="https://www.suse.com/security/cve/CVE-2024-46839" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46839/">CVE-2024-46839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46839">CVE-2024-46839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231095">SUSE bug 1231095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46853" ref_url="https://www.suse.com/security/cve/CVE-2024-46853" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: nxp-fspi: fix the KASAN report out-of-bounds bug

Change the memcpy length to fix the out-of-bounds issue when writing the
data that is not 4 byte aligned to TX FIFO.

To reproduce the issue, write 3 bytes data to NOR chip.

dd if=3b of=/dev/mtd0
[   36.926103] ==================================================================
[   36.933409] BUG: KASAN: slab-out-of-bounds in nxp_fspi_exec_op+0x26ec/0x2838
[   36.940514] Read of size 4 at addr ffff00081037c2a0 by task dd/455
[   36.946721]
[   36.948235] CPU: 3 UID: 0 PID: 455 Comm: dd Not tainted 6.11.0-rc5-gc7b0e37c8434 #1070
[   36.956185] Hardware name: Freescale i.MX8QM MEK (DT)
[   36.961260] Call trace:
[   36.963723]  dump_backtrace+0x90/0xe8
[   36.967414]  show_stack+0x18/0x24
[   36.970749]  dump_stack_lvl+0x78/0x90
[   36.974451]  print_report+0x114/0x5cc
[   36.978151]  kasan_report+0xa4/0xf0
[   36.981670]  __asan_report_load_n_noabort+0x1c/0x28
[   36.986587]  nxp_fspi_exec_op+0x26ec/0x2838
[   36.990800]  spi_mem_exec_op+0x8ec/0xd30
[   36.994762]  spi_mem_no_dirmap_read+0x190/0x1e0
[   36.999323]  spi_mem_dirmap_write+0x238/0x32c
[   37.003710]  spi_nor_write_data+0x220/0x374
[   37.007932]  spi_nor_write+0x110/0x2e8
[   37.011711]  mtd_write_oob_std+0x154/0x1f0
[   37.015838]  mtd_write_oob+0x104/0x1d0
[   37.019617]  mtd_write+0xb8/0x12c
[   37.022953]  mtdchar_write+0x224/0x47c
[   37.026732]  vfs_write+0x1e4/0x8c8
[   37.030163]  ksys_write+0xec/0x1d0
[   37.033586]  __arm64_sys_write+0x6c/0x9c
[   37.037539]  invoke_syscall+0x6c/0x258
[   37.041327]  el0_svc_common.constprop.0+0x160/0x22c
[   37.046244]  do_el0_svc+0x44/0x5c
[   37.049589]  el0_svc+0x38/0x78
[   37.052681]  el0t_64_sync_handler+0x13c/0x158
[   37.057077]  el0t_64_sync+0x190/0x194
[   37.060775]
[   37.062274] Allocated by task 455:
[   37.065701]  kasan_save_stack+0x2c/0x54
[   37.069570]  kasan_save_track+0x20/0x3c
[   37.073438]  kasan_save_alloc_info+0x40/0x54
[   37.077736]  __kasan_kmalloc+0xa0/0xb8
[   37.081515]  __kmalloc_noprof+0x158/0x2f8
[   37.085563]  mtd_kmalloc_up_to+0x120/0x154
[   37.089690]  mtdchar_write+0x130/0x47c
[   37.093469]  vfs_write+0x1e4/0x8c8
[   37.096901]  ksys_write+0xec/0x1d0
[   37.100332]  __arm64_sys_write+0x6c/0x9c
[   37.104287]  invoke_syscall+0x6c/0x258
[   37.108064]  el0_svc_common.constprop.0+0x160/0x22c
[   37.112972]  do_el0_svc+0x44/0x5c
[   37.116319]  el0_svc+0x38/0x78
[   37.119401]  el0t_64_sync_handler+0x13c/0x158
[   37.123788]  el0t_64_sync+0x190/0x194
[   37.127474]
[   37.128977] The buggy address belongs to the object at ffff00081037c2a0
[   37.128977]  which belongs to the cache kmalloc-8 of size 8
[   37.141177] The buggy address is located 0 bytes inside of
[   37.141177]  allocated 3-byte region [ffff00081037c2a0, ffff00081037c2a3)
[   37.153465]
[   37.154971] The buggy address belongs to the physical page:
[   37.160559] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x89037c
[   37.168596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.175149] page_type: 0xfdffffff(slab)
[   37.179021] raw: 0bfffe0000000000 ffff000800002500 dead000000000122 0000000000000000
[   37.186788] raw: 0000000000000000 0000000080800080 00000001fdffffff 0000000000000000
[   37.194553] page dumped because: kasan: bad access detected
[   37.200144]
[   37.201647] Memory state around the buggy address:
[   37.206460]  ffff00081037c180: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc
[   37.213701]  ffff00081037c200: fa fc fc fc 05 fc fc fc 03 fc fc fc 02 fc fc fc
[   37.220946] &gt;ffff00081037c280: 06 fc fc fc 03 fc fc fc fc fc fc fc fc fc fc fc
[   37.228186]                                ^
[   37.232473]  ffff00081037c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.239718]  ffff00081037c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.246962] ==============================================================
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46853/">CVE-2024-46853 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46853">CVE-2024-46853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231083">SUSE bug 1231083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46858" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46858" ref_url="https://www.suse.com/security/cve/CVE-2024-46858" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000620.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: Fix uaf in __timer_delete_sync

There are two paths to access mptcp_pm_del_add_timer, result in a race
condition:

     CPU1				CPU2
     ====                               ====
     net_rx_action
     napi_poll                          netlink_sendmsg
     __napi_poll                        netlink_unicast
     process_backlog                    netlink_unicast_kernel
     __netif_receive_skb                genl_rcv
     __netif_receive_skb_one_core       netlink_rcv_skb
     NF_HOOK                            genl_rcv_msg
     ip_local_deliver_finish            genl_family_rcv_msg
     ip_protocol_deliver_rcu            genl_family_rcv_msg_doit
     tcp_v4_rcv                         mptcp_pm_nl_flush_addrs_doit
     tcp_v4_do_rcv                      mptcp_nl_remove_addrs_list
     tcp_rcv_established                mptcp_pm_remove_addrs_and_subflows
     tcp_data_queue                     remove_anno_list_by_saddr
     mptcp_incoming_options             mptcp_pm_del_add_timer
     mptcp_pm_del_add_timer             kfree(entry)

In remove_anno_list_by_saddr(running on CPU2), after leaving the critical
zone protected by "pm.lock", the entry will be released, which leads to the
occurrence of uaf in the mptcp_pm_del_add_timer(running on CPU1).

Keeping a reference to add_timer inside the lock, and calling
sk_stop_timer_sync() with this reference, instead of "entry-&gt;add_timer".

Move list_del(&amp;entry-&gt;list) to mptcp_pm_del_add_timer and inside the pm lock,
do not directly access any members of the entry outside the pm lock, which
can avoid similar "entry-&gt;x" uaf.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46858/">CVE-2024-46858 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46858">CVE-2024-46858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231088">SUSE bug 1231088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953945" comment="bpftool-7.4.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953946" comment="kernel-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953947" comment="kernel-abi-stablelists-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953948" comment="kernel-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953949" comment="kernel-cross-headers-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953950" comment="kernel-debug-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953951" comment="kernel-debug-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953954" comment="kernel-debug-modules-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953955" comment="kernel-debug-modules-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953956" comment="kernel-debug-modules-extra-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953957" comment="kernel-debug-uki-virt-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953960" comment="kernel-doc-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953961" comment="kernel-headers-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953962" comment="kernel-modules-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953963" comment="kernel-modules-core-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953964" comment="kernel-modules-extra-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953965" comment="kernel-tools-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953966" comment="kernel-tools-libs-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953968" comment="kernel-uki-virt-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953969" comment="kernel-uki-virt-addons-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953970" comment="libperf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953971" comment="perf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953972" comment="python3-perf-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953973" comment="rtla-5.14.0-503.14.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953974" comment="rv-5.14.0-503.14.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46864" ref_url="https://www.suse.com/security/cve/CVE-2024-46864" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: fix kexec crash due to VP assist page corruption

commit 9636be85cc5b ("x86/hyperv: Fix hyperv_pcpu_input_arg handling when
CPUs go online/offline") introduces a new cpuhp state for hyperv
initialization.

cpuhp_setup_state() returns the state number if state is
CPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states.
For the hyperv case, since a new cpuhp state was introduced it would
return 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call
is conditioned upon "hyperv_init_cpuhp &gt; 0". This will never be true and
so hv_cpu_die() won't be called on all CPUs. This means the VP assist page
won't be reset. When the kexec kernel tries to setup the VP assist page
again, the hypervisor corrupts the memory region of the old VP assist page
causing a panic in case the kexec kernel is using that memory elsewhere.
This was originally fixed in commit dfe94d4086e4 ("x86/hyperv: Fix kexec
panic/hang issues").

Get rid of hyperv_init_cpuhp entirely since we are no longer using a
dynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with
cpuhp_remove_state().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-46864/">CVE-2024-46864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46864">CVE-2024-46864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231108">SUSE bug 1231108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46871" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46871" ref_url="https://www.suse.com/security/cve/CVE-2024-46871" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Correct the defined value for AMDGPU_DMUB_NOTIFICATION_MAX

[Why &amp; How]
It actually exposes '6' types in enum dmub_notification_type. Not 5. Using smaller
number to create array dmub_callback &amp; dmub_thread_offload has potential to access
item out of array bound. Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46871/">CVE-2024-46871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46871">CVE-2024-46871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231434">SUSE bug 1231434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46951</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46951" ref_url="https://www.suse.com/security/cve/CVE-2024-46951" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4362" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001092.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019787.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in psi/zcolor.c in Artifex Ghostscript before 10.04.0. An unchecked Implementation pointer in Pattern color space could lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46951/">CVE-2024-46951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46951">CVE-2024-46951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232173">SUSE bug 1232173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232265">SUSE bug 1232265</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983964" comment="ghostscript-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983965" comment="ghostscript-doc-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983966" comment="ghostscript-tools-dvipdf-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983967" comment="ghostscript-tools-fonts-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983968" comment="ghostscript-tools-printing-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983969" comment="ghostscript-x11-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983970" comment="libgs-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983971" comment="libgs-devel-9.54.0-18.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46952</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46952" ref_url="https://www.suse.com/security/cve/CVE-2024-46952" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4362" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001092.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001301.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in pdf/pdf_xref.c in Artifex Ghostscript before 10.04.0. There is a buffer overflow during handling of a PDF XRef stream (related to W array values).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46952/">CVE-2024-46952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46952">CVE-2024-46952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232173">SUSE bug 1232173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232266">SUSE bug 1232266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983964" comment="ghostscript-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983965" comment="ghostscript-doc-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983966" comment="ghostscript-tools-dvipdf-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983967" comment="ghostscript-tools-fonts-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983968" comment="ghostscript-tools-printing-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983969" comment="ghostscript-x11-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983970" comment="libgs-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983971" comment="libgs-devel-9.54.0-18.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46953</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46953" ref_url="https://www.suse.com/security/cve/CVE-2024-46953" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4362" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001092.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019787.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in base/gsdevice.c in Artifex Ghostscript before 10.04.0. An integer overflow when parsing the filename format string (for the output filename) results in path truncation, and possible path traversal and code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46953/">CVE-2024-46953 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46953">CVE-2024-46953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232173">SUSE bug 1232173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232267">SUSE bug 1232267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983964" comment="ghostscript-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983965" comment="ghostscript-doc-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983966" comment="ghostscript-tools-dvipdf-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983967" comment="ghostscript-tools-fonts-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983968" comment="ghostscript-tools-printing-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983969" comment="ghostscript-x11-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983970" comment="libgs-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983971" comment="libgs-devel-9.54.0-18.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46954</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46954" ref_url="https://www.suse.com/security/cve/CVE-2024-46954" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4362" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001092.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001301.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in decode_utf8 in base/gp_utf8.c in Artifex Ghostscript before 10.04.0. Overlong UTF-8 encoding leads to possible ../ directory traversal.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-08-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46954/">CVE-2024-46954 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46954">CVE-2024-46954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232173">SUSE bug 1232173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232268">SUSE bug 1232268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983964" comment="ghostscript-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983965" comment="ghostscript-doc-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983966" comment="ghostscript-tools-dvipdf-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983967" comment="ghostscript-tools-fonts-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983968" comment="ghostscript-tools-printing-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983969" comment="ghostscript-x11-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983970" comment="libgs-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983971" comment="libgs-devel-9.54.0-18.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46956</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46956" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46956" ref_url="https://www.suse.com/security/cve/CVE-2024-46956" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4362" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001092.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019787.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in psi/zfile.c in Artifex Ghostscript before 10.04.0. Out-of-bounds data access in filenameforall can lead to arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-46956/">CVE-2024-46956 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46956">CVE-2024-46956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232173">SUSE bug 1232173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232270">SUSE bug 1232270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983964" comment="ghostscript-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983965" comment="ghostscript-doc-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983966" comment="ghostscript-tools-dvipdf-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983967" comment="ghostscript-tools-fonts-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983968" comment="ghostscript-tools-printing-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983969" comment="ghostscript-x11-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983970" comment="libgs-9.54.0-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983971" comment="libgs-devel-9.54.0-18.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46981" ref_url="https://www.suse.com/security/cve/CVE-2024-46981" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0595" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000798.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0692" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000797.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLD77G2NZDF7MPQYA4FONQRDPNFF6QV2/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14638-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGZSR4XROA2QNSJN3D6QEMR3R6FSTFZQ/" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-09-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-46981/">CVE-2024-46981 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-46981">CVE-2024-46981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235387">SUSE bug 1235387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961483" comment="redis-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961484" comment="redis-devel-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961485" comment="redis-doc-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47076</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47076" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47076" ref_url="https://www.suse.com/security/cve/CVE-2024-47076" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000099.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019765.html" source="SUSE-SU"/>
		<reference ref_id="TID000021571" ref_url="https://www.suse.com/support/kb/doc/?id=000021571" source="SUSE-SU"/>
    <description>
    CUPS is a standards-based, open-source printing system, and `libcupsfilters` contains the code of the filters of the former `cups-filters` package as library functions to be used for the data format conversion tasks needed in Printer Applications. The `cfGetPrinterAttributes5` function in `libcupsfilters` does not sanitize IPP attributes returned from an IPP server. When these IPP attributes are used, for instance, to generate a PPD file, this can lead to attacker controlled data to be provided to the rest of the CUPS system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2025-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47076/">CVE-2024-47076 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47076">CVE-2024-47076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230932">SUSE bug 1230932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230937">SUSE bug 1230937</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945283" comment="cups-filters-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945284" comment="cups-filters-devel-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945285" comment="cups-filters-libs-1.28.7-17.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47081" ref_url="https://www.suse.com/security/cve/CVE-2024-47081" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12519" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001863.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13234" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001880.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001952.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14999" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01998-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01999-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02205-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041123.html" source="SUSE-SU"/>
    <description>
    Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-05"/>
	<updated date="2025-09-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47081/">CVE-2024-47081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47081">CVE-2024-47081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244039">SUSE bug 1244039</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011990" comment="python3-requests-2.25.1-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011991" comment="python3-requests+security-2.25.1-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011992" comment="python3-requests+socks-2.25.1-10.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47141" ref_url="https://www.suse.com/security/cve/CVE-2024-47141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinmux: Use sequential access to access desc-&gt;pinmux data

When two client of the same gpio call pinctrl_select_state() for the
same functionality, we are seeing NULL pointer issue while accessing
desc-&gt;mux_owner.

Let's say two processes A, B executing in pin_request() for the same pin
and process A updates the desc-&gt;mux_usecount but not yet updated the
desc-&gt;mux_owner while process B see the desc-&gt;mux_usecount which got
updated by A path and further executes strcmp and while accessing
desc-&gt;mux_owner it crashes with NULL pointer.

Serialize the access to mux related setting with a mutex lock.

	cpu0 (process A)			cpu1(process B)

pinctrl_select_state() {		  pinctrl_select_state() {
  pin_request() {				pin_request() {
  ...
						 ....
    } else {
         desc-&gt;mux_usecount++;
    						desc-&gt;mux_usecount &amp;&amp; strcmp(desc-&gt;mux_owner, owner)) {

         if (desc-&gt;mux_usecount &gt; 1)
               return 0;
         desc-&gt;mux_owner = owner;

  }						}
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47141/">CVE-2024-47141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47141">CVE-2024-47141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235708">SUSE bug 1235708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47175</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47175" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47175" ref_url="https://www.suse.com/security/cve/CVE-2024-47175" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000099.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="TID000021571" ref_url="https://www.suse.com/support/kb/doc/?id=000021571" source="SUSE-SU"/>
    <description>
    CUPS is a standards-based, open-source printing system, and `libppd` can be used for legacy PPD file support. The `libppd` function `ppdCreatePPDFromIPP2` does not sanitize IPP attributes when creating the PPD buffer. When used in combination with other functions such as `cfGetPrinterAttributes5`, can result in user controlled input and ultimately code execution via Foomatic. This vulnerability can be part of an exploit chain leading to remote code execution (RCE), as described in CVE-2024-47176.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2025-10-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47175/">CVE-2024-47175 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47175">CVE-2024-47175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230932">SUSE bug 1230932</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953911" comment="cups-2.3.3op2-31.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953912" comment="cups-client-2.3.3op2-31.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953913" comment="cups-devel-2.3.3op2-31.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953914" comment="cups-filesystem-2.3.3op2-31.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945283" comment="cups-filters-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945284" comment="cups-filters-devel-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945285" comment="cups-filters-libs-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953915" comment="cups-ipptool-2.3.3op2-31.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953916" comment="cups-libs-2.3.3op2-31.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953917" comment="cups-lpd-2.3.3op2-31.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953918" comment="cups-printerapp-2.3.3op2-31.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47176" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47176" ref_url="https://www.suse.com/security/cve/CVE-2024-47176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7346" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000099.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7553" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019654.html" source="SUSE-SU"/>
		<reference ref_id="TID000021571" ref_url="https://www.suse.com/support/kb/doc/?id=000021571" source="SUSE-SU"/>
    <description>
    CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-01"/>
	<updated date="2025-07-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47176/">CVE-2024-47176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47176">CVE-2024-47176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230932">SUSE bug 1230932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1230939">SUSE bug 1230939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945283" comment="cups-filters-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945284" comment="cups-filters-devel-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945285" comment="cups-filters-libs-1.28.7-17.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47252" ref_url="https://www.suse.com/security/cve/CVE-2024-47252" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001981.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001973.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02565-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041070.html" source="SUSE-SU"/>
    <description>
    Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.

In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47252/">CVE-2024-47252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47252">CVE-2024-47252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246303">SUSE bug 1246303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017031" comment="httpd-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017032" comment="httpd-core-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017033" comment="httpd-devel-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017034" comment="httpd-filesystem-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017035" comment="httpd-manual-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017036" comment="httpd-tools-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017037" comment="mod_ldap-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017038" comment="mod_lua-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017039" comment="mod_proxy_html-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017040" comment="mod_session-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017041" comment="mod_ssl-2.4.62-4.el9_6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4741" ref_url="https://www.suse.com/security/cve/CVE-2024-4741" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2036-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-June/018732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2051-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2066-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2197-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling the OpenSSL API function SSL_free_buffers may cause
memory to be accessed that was previously freed in some situations

Impact summary: A use after free can have a range of potential consequences such
as the corruption of valid data, crashes or execution of arbitrary code.
However, only applications that directly call the SSL_free_buffers function are
affected by this issue. Applications that do not call this function are not
vulnerable. Our investigations indicate that this function is rarely used by
applications.

The SSL_free_buffers function is used to free the internal OpenSSL buffer used
when processing an incoming record from the network. The call is only expected
to succeed if the buffer is not currently in use. However, two scenarios have
been identified where the buffer is freed even when still in use.

The first scenario occurs where a record header has been received from the
network and processed by OpenSSL, but the full record body has not yet arrived.
In this case calling SSL_free_buffers will succeed even though a record has only
been partially processed and the buffer is still in use.

The second scenario occurs where a full record containing application data has
been received and processed by OpenSSL but the application has only read part of
this data. Again a call to SSL_free_buffers will succeed even though the buffer
is still in use.

While these scenarios could occur accidentally during normal operation a
malicious attacker could attempt to engineer a stituation where this occurs.
We are not aware of this issue being actively exploited.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-10-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4741/">CVE-2024-4741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4741">CVE-2024-4741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225551">SUSE bug 1225551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1225552">SUSE bug 1225552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953743" comment="openssl-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953744" comment="openssl-devel-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953745" comment="openssl-fips-provider-3.0.7-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953746" comment="openssl-fips-provider-so-3.0.7-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953747" comment="openssl-libs-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953748" comment="openssl-perl-3.2.2-6.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47537" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47537" ref_url="https://www.suse.com/security/cve/CVE-2024-47537" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000669.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11299" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. The program attempts to reallocate the memory pointed to by stream-&gt;samples to accommodate stream-&gt;n_samples + samples_count elements of type QtDemuxSample. The problem is that samples_count is read from the input file. And if this value is big enough, this can lead to an integer overflow during the addition. As a consequence, g_try_renew might allocate memory for a significantly smaller number of elements than intended. Following this, the program iterates through samples_count elements and attempts to write samples_count number of elements, potentially exceeding the actual allocated memory size and causing an OOB-write. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2025-06-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47537/">CVE-2024-47537 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47537">CVE-2024-47537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234414">SUSE bug 1234414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958275" comment="gstreamer1-plugins-good-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958276" comment="gstreamer1-plugins-good-gtk-1.22.1-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47538</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47538" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47538" ref_url="https://www.suse.com/security/cve/CVE-2024-47538" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000671.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64SNUMTNONUECANIAVBUNBV6RTL5TDY/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. A stack-buffer overflow has been detected in the `vorbis_handle_identification_packet` function within `gstvorbisdec.c`. The position array is a stack-allocated buffer of size 64. If vd-&gt;vi.channels exceeds 64, the for loop will write beyond the boundaries of the position array. The value written will always be `GST_AUDIO_CHANNEL_POSITION_NONE`. This vulnerability allows someone to overwrite the EIP address allocated in the stack. Additionally, this bug can overwrite the `GstAudioInfo` info structure. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2025-06-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47538/">CVE-2024-47538 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47538">CVE-2024-47538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234415">SUSE bug 1234415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958277" comment="gstreamer1-plugins-base-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958278" comment="gstreamer1-plugins-base-devel-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958279" comment="gstreamer1-plugins-base-tools-1.22.1-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47539</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47539" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47539" ref_url="https://www.suse.com/security/cve/CVE-2024-47539" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000669.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11299" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VA7KHMN2HFQR3FAIRY63QCQKG6UT7ERD/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An out-of-bounds write vulnerability was identified in the convert_to_s334_1a function in isomp4/qtdemux.c. The vulnerability arises due to a discrepancy between the size of memory allocated to the storage array and the loop condition i * 2 &lt; ccpair_size. Specifically, when ccpair_size is even, the allocated size in storage does not match the loop's expected bounds, resulting in an out-of-bounds write. This bug allows for the overwriting of up to 3 bytes beyond the allocated bounds of the storage array. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2025-06-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47539/">CVE-2024-47539 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47539">CVE-2024-47539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234417">SUSE bug 1234417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958275" comment="gstreamer1-plugins-good-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958276" comment="gstreamer1-plugins-good-gtk-1.22.1-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47540" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47540" ref_url="https://www.suse.com/security/cve/CVE-2024-47540" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000669.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11299" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02347-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040747.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An uninitialized stack variable vulnerability has been identified in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. When size &lt; 4, the program calls gst_buffer_unmap with an uninitialized map variable. Then, in the gst_memory_unmap function, the program will attempt to unmap the buffer using the uninitialized map variable, causing a function pointer hijack, as it will jump to mem-&gt;allocator-&gt;mem_unmap_full or mem-&gt;allocator-&gt;mem_unmap. This vulnerability could allow an attacker to hijack the execution flow, potentially leading to code execution. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2025-07-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47540/">CVE-2024-47540 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47540">CVE-2024-47540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234421">SUSE bug 1234421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958275" comment="gstreamer1-plugins-good-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958276" comment="gstreamer1-plugins-good-gtk-1.22.1-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47541" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47541" ref_url="https://www.suse.com/security/cve/CVE-2024-47541" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7243" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021081.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-write vulnerability has been identified in the gst_ssa_parse_remove_override_codes function of the gstssaparse.c file. This function is responsible for parsing and removing SSA (SubStation Alpha) style override codes, which are enclosed in curly brackets ({}). The issue arises when a closing curly bracket "}" appears before an opening curly bracket "{" in the input string. In this case, memmove() incorrectly duplicates a substring. With each successive loop iteration, the size passed to memmove() becomes progressively larger (strlen(end+1)), leading to a write beyond the allocated memory bounds. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2024-47541/">CVE-2024-47541 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47541">CVE-2024-47541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234459">SUSE bug 1234459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983912" comment="gstreamer1-plugins-base-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983913" comment="gstreamer1-plugins-base-devel-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983914" comment="gstreamer1-plugins-base-tools-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47542</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47542" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47542" ref_url="https://www.suse.com/security/cve/CVE-2024-47542" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7243" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64SNUMTNONUECANIAVBUNBV6RTL5TDY/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference has been discovered in the id3v2_read_synch_uint function, located in id3v2.c. If id3v2_read_synch_uint is called with a null work-&gt;hdr.frame_data, the pointer guint8 *data is accessed without validation, resulting in a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47542/">CVE-2024-47542 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47542">CVE-2024-47542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234460">SUSE bug 1234460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983912" comment="gstreamer1-plugins-base-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983913" comment="gstreamer1-plugins-base-devel-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983914" comment="gstreamer1-plugins-base-tools-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47543" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47543" ref_url="https://www.suse.com/security/cve/CVE-2024-47543" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14586-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VA7KHMN2HFQR3FAIRY63QCQKG6UT7ERD/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in qtdemux_parse_container function within qtdemux.c. In the parent function qtdemux_parse_node, the value of length is not well checked. So, if length is big enough, it causes the pointer end to point beyond the boundaries of buffer. Subsequently, in the qtdemux_parse_container function, the while loop can trigger an OOB-read, accessing memory beyond the bounds of buf. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-47543/">CVE-2024-47543 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47543">CVE-2024-47543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234462">SUSE bug 1234462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47544" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47544" ref_url="https://www.suse.com/security/cve/CVE-2024-47544" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. The function qtdemux_parse_sbgp in qtdemux.c is affected by a null dereference vulnerability. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47544/">CVE-2024-47544 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47544">CVE-2024-47544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234473">SUSE bug 1234473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47545</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47545" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47545" ref_url="https://www.suse.com/security/cve/CVE-2024-47545" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in qtdemux_parse_trak function within qtdemux.c. During the strf parsing case, the subtraction size -= 40 can lead to a negative integer overflow if it is less than 40. If this happens, the subsequent call to gst_buffer_fill will invoke memcpy with a large tocopy size, resulting in an OOB-read. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47545/">CVE-2024-47545 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47545">CVE-2024-47545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234476">SUSE bug 1234476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47546" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47546" ref_url="https://www.suse.com/security/cve/CVE-2024-47546" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in extract_cc_from_data function within qtdemux.c. In the FOURCC_c708 case, the subtraction atom_length - 8 may result in an underflow if atom_length is less than 8. When that subtraction underflows, *cclen ends up being a large number, and then cclen is passed to g_memdup2 leading to an out-of-bounds (OOB) read. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47546/">CVE-2024-47546 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47546">CVE-2024-47546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234477">SUSE bug 1234477</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47596" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47596" ref_url="https://www.suse.com/security/cve/CVE-2024-47596" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in the qtdemux_parse_svq3_stsd_data function within qtdemux.c. In the FOURCC_SMI_ case, seqh_size is read from the input file without proper validation. If seqh_size is greater than the remaining size of the data buffer, it can lead to an OOB-read in the following call to gst_buffer_fill, which internally uses memcpy. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47596/">CVE-2024-47596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47596">CVE-2024-47596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234424">SUSE bug 1234424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47597" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47597" ref_url="https://www.suse.com/security/cve/CVE-2024-47597" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been detected in the function qtdemux_parse_samples within qtdemux.c. This issue arises when the function qtdemux_parse_samples reads data beyond the boundaries of the stream-&gt;stco buffer. The following code snippet shows the call to qt_atom_parser_get_offset_unchecked, which leads to the OOB-read when parsing the provided GHSL-2024-245_crash1.mp4 file. This issue may lead to read up to 8 bytes out-of-bounds. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47597/">CVE-2024-47597 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47597">CVE-2024-47597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234425">SUSE bug 1234425</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47598" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47598" ref_url="https://www.suse.com/security/cve/CVE-2024-47598" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in the qtdemux_merge_sample_table function within qtdemux.c. The problem is that the size of the stts buffer isn't properly checked before reading stts_duration, allowing the program to read 4 bytes beyond the boundaries of stts-&gt;data. This vulnerability reads up to 4 bytes past the allocated bounds of the stts array. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47598/">CVE-2024-47598 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47598">CVE-2024-47598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234426">SUSE bug 1234426</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47599" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47599" ref_url="https://www.suse.com/security/cve/CVE-2024-47599" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_jpeg_dec_negotiate function in gstjpegdec.c. This function does not check for a NULL return value from gst_video_decoder_set_output_state. When this happens, dereferences of the outstate pointer will lead to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47599/">CVE-2024-47599 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47599">CVE-2024-47599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234427">SUSE bug 1234427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47600" ref_url="https://www.suse.com/security/cve/CVE-2024-47600" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7243" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64SNUMTNONUECANIAVBUNBV6RTL5TDY/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been detected in the format_channel_mask function in gst-discoverer.c. The vulnerability affects the local array position, which is defined with a fixed size of 64 elements. However, the function gst_discoverer_audio_info_get_channels may return a guint channels value greater than 64. This causes the for loop to attempt access beyond the bounds of the position array, resulting in an OOB-read when an index greater than 63 is used. This vulnerability can result in reading unintended bytes from the stack. Additionally, the dereference of value-&gt;value_nick after the OOB-read can lead to further memory corruption or undefined behavior. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-47600/">CVE-2024-47600 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47600">CVE-2024-47600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234453">SUSE bug 1234453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983912" comment="gstreamer1-plugins-base-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983913" comment="gstreamer1-plugins-base-devel-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983914" comment="gstreamer1-plugins-base-tools-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47601" ref_url="https://www.suse.com/security/cve/CVE-2024-47601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_parse_blockgroup_or_simpleblock function within matroska-demux.c. This function does not properly check the validity of the GstBuffer *sub pointer before performing dereferences. As a result, null pointer dereferences may occur. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47601/">CVE-2024-47601 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47601">CVE-2024-47601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234428">SUSE bug 1234428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47602" ref_url="https://www.suse.com/security/cve/CVE-2024-47602" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_add_wvpk_header function within matroska-demux.c. This function does not properly check the validity of the stream-&gt;codec_priv pointer in the following code. If stream-&gt;codec_priv is NULL, the call to GST_READ_UINT16_LE will attempt to dereference a null pointer, leading to a crash of the application. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47602/">CVE-2024-47602 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47602">CVE-2024-47602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234432">SUSE bug 1234432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47603" ref_url="https://www.suse.com/security/cve/CVE-2024-47603" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been discovered in the gst_matroska_demux_update_tracks function within matroska-demux.c. The vulnerability occurs when the gst_caps_is_equal function is called with invalid caps values. If this happen, then in the function gst_buffer_get_size the call to GST_BUFFER_MEM_PTR can return a null pointer. Attempting to dereference the size field of this null pointer results in a null pointer dereference. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47603/">CVE-2024-47603 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47603">CVE-2024-47603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234433">SUSE bug 1234433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47606</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47606" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47606" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47606" ref_url="https://www.suse.com/security/cve/CVE-2024-47606" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000669.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11299" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02034-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041761.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14576-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WXI5GJB5BPV65JTOGBHL6STLB5HKYOIT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An integer underflow has been detected in the function qtdemux_parse_theora_extension within qtdemux.c. The vulnerability occurs due to an underflow of the gint size variable, which causes size to hold a large unintended value when cast to an unsigned integer. This 32-bit negative value is then cast to a 64-bit unsigned integer (0xfffffffffffffffa) in a subsequent call to gst_buffer_new_and_alloc. The function gst_buffer_new_allocate then attempts to allocate memory, eventually calling _sysmem_new_block. The function _sysmem_new_block adds alignment and header size to the (unsigned) size, causing the overflow of the 'slice_size' variable. As a result, only 0x89 bytes are allocated, despite the large input size. When the following memcpy call occurs in gst_buffer_fill, the data from the input file will overwrite the content of the GstMapInfo info structure. Finally, during the call to gst_memory_unmap, the overwritten memory may cause a function pointer hijack, as the mem-&gt;allocator-&gt;mem_unmap_full function is called with a corrupted pointer. This function pointer overwrite could allow an attacker to alter the execution flow of the program, leading to arbitrary code execution. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2025-09-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47606/">CVE-2024-47606 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47606">CVE-2024-47606 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234449">SUSE bug 1234449</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958275" comment="gstreamer1-plugins-good-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958276" comment="gstreamer1-plugins-good-gtk-1.22.1-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47607</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47607" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47607" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47607" ref_url="https://www.suse.com/security/cve/CVE-2024-47607" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000671.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021081.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components.  stack-buffer overflow has been detected in the gst_opus_dec_parse_header function within `gstopusdec.c'. The pos array is a stack-allocated buffer of size 64. If n_channels exceeds 64, the for loop will write beyond the boundaries of the pos array. The value written will always be GST_AUDIO_CHANNEL_POSITION_NONE. This bug allows to overwrite the EIP address allocated in the stack. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2025-06-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47607/">CVE-2024-47607 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47607">CVE-2024-47607 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234455">SUSE bug 1234455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958277" comment="gstreamer1-plugins-base-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958278" comment="gstreamer1-plugins-base-devel-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958279" comment="gstreamer1-plugins-base-tools-1.22.1-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47613</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47613" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47613" ref_url="https://www.suse.com/security/cve/CVE-2024-47613" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11122" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000669.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11299" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been identified in `gst_gdk_pixbuf_dec_flush` within `gstgdkpixbufdec.c`. This function invokes `memcpy`, using `out_pix` as the destination address. `out_pix` is expected to point to the frame 0 from the frame structure, which is read from the input file. However, in certain situations, it can points to a NULL frame, causing the subsequent call to `memcpy` to attempt writing to the null address (0x00), leading to a null pointer dereference. This vulnerability can result in a Denial of Service (DoS) by triggering a segmentation fault (SEGV). This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47613/">CVE-2024-47613 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47613">CVE-2024-47613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234447">SUSE bug 1234447</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958275" comment="gstreamer1-plugins-good-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958276" comment="gstreamer1-plugins-good-gtk-1.22.1-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47615" ref_url="https://www.suse.com/security/cve/CVE-2024-47615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000671.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64SNUMTNONUECANIAVBUNBV6RTL5TDY/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-Write has been detected in the function gst_parse_vorbis_setup_packet within vorbis_parse.c. The integer size is read from the input file without proper validation. As a result, size can exceed the fixed size of the pad-&gt;vorbis_mode_sizes array (which size is 256). When this happens, the for loop overwrites the entire pad structure with 0s and 1s, affecting adjacent memory as well. This OOB-write can overwrite up to 380 bytes of memory beyond the boundaries of the pad-&gt;vorbis_mode_sizes array. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-18"/>
	<updated date="2025-06-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-47615/">CVE-2024-47615 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47615">CVE-2024-47615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234456">SUSE bug 1234456</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009958277" comment="gstreamer1-plugins-base-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958278" comment="gstreamer1-plugins-base-devel-1.22.1-3.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958279" comment="gstreamer1-plugins-base-tools-1.22.1-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47660</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47660" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47660" ref_url="https://www.suse.com/security/cve/CVE-2024-47660" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsnotify: clear PARENT_WATCHED flags lazily

In some setups directories can have many (usually negative) dentries.
Hence __fsnotify_update_child_dentry_flags() function can take a
significant amount of time. Since the bulk of this function happens
under inode-&gt;i_lock this causes a significant contention on the lock
when we remove the watch from the directory as the
__fsnotify_update_child_dentry_flags() call from fsnotify_recalc_mask()
races with __fsnotify_update_child_dentry_flags() calls from
__fsnotify_parent() happening on children. This can lead upto softlockup
reports reported by users.

Fix the problem by calling fsnotify_update_children_dentry_flags() to
set PARENT_WATCHED flags only when parent starts watching children.

When parent stops watching children, clear false positive PARENT_WATCHED
flags lazily in __fsnotify_parent() for each accessed child.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47660/">CVE-2024-47660 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47660">CVE-2024-47660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231439">SUSE bug 1231439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47668" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47668" ref_url="https://www.suse.com/security/cve/CVE-2024-47668" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/generic-radix-tree.c: Fix rare race in __genradix_ptr_alloc()

If we need to increase the tree depth, allocate a new node, and then
race with another thread that increased the tree depth before us, we'll
still have a preallocated node that might be used later.

If we then use that node for a new non-root node, it'll still have a
pointer to the old root instead of being zeroed - fix this by zeroing it
in the cmpxchg failure path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47668/">CVE-2024-47668 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47668">CVE-2024-47668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231502">SUSE bug 1231502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4767" ref_url="https://www.suse.com/security/cve/CVE-2024-4767" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If the `browser.privatebrowsing.autostart` preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4767/">CVE-2024-4767 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4767">CVE-2024-4767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875027" comment="firefox-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875028" comment="firefox-x11-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875029" comment="thunderbird-115.11.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47678</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47678" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47678" ref_url="https://www.suse.com/security/cve/CVE-2024-47678" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

icmp: change the order of rate limits

ICMP messages are ratelimited :

After the blamed commits, the two rate limiters are applied in this order:

1) host wide ratelimit (icmp_global_allow())

2) Per destination ratelimit (inetpeer based)

In order to avoid side-channels attacks, we need to apply
the per destination check first.

This patch makes the following change :

1) icmp_global_allow() checks if the host wide limit is reached.
   But credits are not yet consumed. This is deferred to 3)

2) The per destination limit is checked/updated.
   This might add a new node in inetpeer tree.

3) icmp_global_consume() consumes tokens if prior operations succeeded.

This means that host wide ratelimit is still effective
in keeping inetpeer tree small even under DDOS.

As a bonus, I removed icmp_global.lock as the fast path
can use a lock-free operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47678/">CVE-2024-47678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47678">CVE-2024-47678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231854">SUSE bug 1231854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47679" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47679" ref_url="https://www.suse.com/security/cve/CVE-2024-47679" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfs: fix race between evice_inodes() and find_inode()&amp;iput()

Hi, all

Recently I noticed a bug[1] in btrfs, after digged it into
and I believe it'a race in vfs.

Let's assume there's a inode (ie ino 261) with i_count 1 is
called by iput(), and there's a concurrent thread calling
generic_shutdown_super().

cpu0:                              cpu1:
iput() // i_count is 1
  -&gt;spin_lock(inode)
  -&gt;dec i_count to 0
  -&gt;iput_final()                    generic_shutdown_super()
    -&gt;__inode_add_lru()               -&gt;evict_inodes()
      // cause some reason[2]           -&gt;if (atomic_read(inode-&gt;i_count)) continue;
      // return before                  // inode 261 passed the above check
      // list_lru_add_obj()             // and then schedule out
   -&gt;spin_unlock()
// note here: the inode 261
// was still at sb list and hash list,
// and I_FREEING|I_WILL_FREE was not been set

btrfs_iget()
  // after some function calls
  -&gt;find_inode()
    // found the above inode 261
    -&gt;spin_lock(inode)
   // check I_FREEING|I_WILL_FREE
   // and passed
      -&gt;__iget()
    -&gt;spin_unlock(inode)                // schedule back
                                        -&gt;spin_lock(inode)
                                        // check (I_NEW|I_FREEING|I_WILL_FREE) flags,
                                        // passed and set I_FREEING
iput()                                  -&gt;spin_unlock(inode)
  -&gt;spin_lock(inode)			  -&gt;evict()
  // dec i_count to 0
  -&gt;iput_final()
    -&gt;spin_unlock()
    -&gt;evict()

Now, we have two threads simultaneously evicting
the same inode, which may trigger the BUG(inode-&gt;i_state &amp; I_CLEAR)
statement both within clear_inode() and iput().

To fix the bug, recheck the inode-&gt;i_count after holding i_lock.
Because in the most scenarios, the first check is valid, and
the overhead of spin_lock() can be reduced.

If there is any misunderstanding, please let me know, thanks.

[1]: https://lore.kernel.org/linux-btrfs/000000000000eabe1d0619c48986@google.com/
[2]: The reason might be 1. SB_ACTIVE was removed or 2. mapping_shrinkable()
return false when I reproduced the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47679/">CVE-2024-47679 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47679">CVE-2024-47679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231930">SUSE bug 1231930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4768" ref_url="https://www.suse.com/security/cve/CVE-2024-4768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4768/">CVE-2024-4768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4768">CVE-2024-4768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875027" comment="firefox-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875028" comment="firefox-x11-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875029" comment="thunderbird-115.11.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47685</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47685" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47685" ref_url="https://www.suse.com/security/cve/CVE-2024-47685" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()

syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending
garbage on the four reserved tcp bits (th-&gt;res1)

Use skb_put_zero() to clear the whole TCP header,
as done in nf_reject_ip_tcphdr_put()

BUG: KMSAN: uninit-value in nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255
  nf_reject_ip6_tcphdr_put+0x688/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:255
  nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344
  nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core net/core/dev.c:5661 [inline]
  __netif_receive_skb+0x1da/0xa00 net/core/dev.c:5775
  process_backlog+0x4ad/0xa50 net/core/dev.c:6108
  __napi_poll+0xe7/0x980 net/core/dev.c:6772
  napi_poll net/core/dev.c:6841 [inline]
  net_rx_action+0xa5a/0x19b0 net/core/dev.c:6963
  handle_softirqs+0x1ce/0x800 kernel/softirq.c:554
  __do_softirq+0x14/0x1a kernel/softirq.c:588
  do_softirq+0x9a/0x100 kernel/softirq.c:455
  __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:382
  local_bh_enable include/linux/bottom_half.h:33 [inline]
  rcu_read_unlock_bh include/linux/rcupdate.h:908 [inline]
  __dev_queue_xmit+0x2692/0x5610 net/core/dev.c:4450
  dev_queue_xmit include/linux/netdevice.h:3105 [inline]
  neigh_resolve_output+0x9ca/0xae0 net/core/neighbour.c:1565
  neigh_output include/net/neighbour.h:542 [inline]
  ip6_finish_output2+0x2347/0x2ba0 net/ipv6/ip6_output.c:141
  __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]
  ip6_finish_output+0xbb8/0x14b0 net/ipv6/ip6_output.c:226
  NF_HOOK_COND include/linux/netfilter.h:303 [inline]
  ip6_output+0x356/0x620 net/ipv6/ip6_output.c:247
  dst_output include/net/dst.h:450 [inline]
  NF_HOOK include/linux/netfilter.h:314 [inline]
  ip6_xmit+0x1ba6/0x25d0 net/ipv6/ip6_output.c:366
  inet6_csk_xmit+0x442/0x530 net/ipv6/inet6_connection_sock.c:135
  __tcp_transmit_skb+0x3b07/0x4880 net/ipv4/tcp_output.c:1466
  tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline]
  tcp_connect+0x35b6/0x7130 net/ipv4/tcp_output.c:4143
  tcp_v6_connect+0x1bcc/0x1e40 net/ipv6/tcp_ipv6.c:333
  __inet_stream_connect+0x2ef/0x1730 net/ipv4/af_inet.c:679
  inet_stream_connect+0x6a/0xd0 net/ipv4/af_inet.c:750
  __sys_connect_file net/socket.c:2061 [inline]
  __sys_connect+0x606/0x690 net/socket.c:2078
  __do_sys_connect net/socket.c:2088 [inline]
  __se_sys_connect net/socket.c:2085 [inline]
  __x64_sys_connect+0x91/0xe0 net/socket.c:2085
  x64_sys_call+0x27a5/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:43
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was stored to memory at:
  nf_reject_ip6_tcphdr_put+0x60c/0x6c0 net/ipv6/netfilter/nf_reject_ipv6.c:249
  nf_send_reset6+0xd84/0x15b0 net/ipv6/netfilter/nf_reject_ipv6.c:344
  nft_reject_inet_eval+0x3c1/0x880 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x438/0x22a0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x41a/0x4f0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  ipv6_rcv+0x29b/0x390 net/ipv6/ip6_input.c:310
  __netif_receive_skb_one_core
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47685/">CVE-2024-47685 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47685">CVE-2024-47685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231998">SUSE bug 1231998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47687</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47687" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47687" ref_url="https://www.suse.com/security/cve/CVE-2024-47687" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa/mlx5: Fix invalid mr resource destroy

Certain error paths from mlx5_vdpa_dev_add() can end up releasing mr
resources which never got initialized in the first place.

This patch adds the missing check in mlx5_vdpa_destroy_mr_resources()
to block releasing non-initialized mr resources.

Reference trace:

  mlx5_core 0000:08:00.2: mlx5_vdpa_dev_add:3274:(pid 2700) warning: No mac address provisioned?
  BUG: kernel NULL pointer dereference, address: 0000000000000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 140216067 P4D 0
  Oops: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 8 PID: 2700 Comm: vdpa Kdump: loaded Not tainted 5.14.0-496.el9.x86_64 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
  RIP: 0010:vhost_iotlb_del_range+0xf/0xe0 [vhost_iotlb]
  Code: [...]
  RSP: 0018:ff1c823ac23077f0 EFLAGS: 00010246
  RAX: ffffffffc1a21a60 RBX: ffffffff899567a0 RCX: 0000000000000000
  RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000000000000
  RBP: ff1bda1f7c21e800 R08: 0000000000000000 R09: ff1c823ac2307670
  R10: ff1c823ac2307668 R11: ffffffff8a9e7b68 R12: 0000000000000000
  R13: 0000000000000000 R14: ff1bda1f43e341a0 R15: 00000000ffffffea
  FS:  00007f56eba7c740(0000) GS:ff1bda269f800000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000000000000 CR3: 0000000104d90001 CR4: 0000000000771ef0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:

   ? show_trace_log_lvl+0x1c4/0x2df
   ? show_trace_log_lvl+0x1c4/0x2df
   ? mlx5_vdpa_free+0x3d/0x150 [mlx5_vdpa]
   ? __die_body.cold+0x8/0xd
   ? page_fault_oops+0x134/0x170
   ? __irq_work_queue_local+0x2b/0xc0
   ? irq_work_queue+0x2c/0x50
   ? exc_page_fault+0x62/0x150
   ? asm_exc_page_fault+0x22/0x30
   ? __pfx_mlx5_vdpa_free+0x10/0x10 [mlx5_vdpa]
   ? vhost_iotlb_del_range+0xf/0xe0 [vhost_iotlb]
   mlx5_vdpa_free+0x3d/0x150 [mlx5_vdpa]
   vdpa_release_dev+0x1e/0x50 [vdpa]
   device_release+0x31/0x90
   kobject_cleanup+0x37/0x130
   mlx5_vdpa_dev_add+0x2d2/0x7a0 [mlx5_vdpa]
   vdpa_nl_cmd_dev_add_set_doit+0x277/0x4c0 [vdpa]
   genl_family_rcv_msg_doit+0xd9/0x130
   genl_family_rcv_msg+0x14d/0x220
   ? __pfx_vdpa_nl_cmd_dev_add_set_doit+0x10/0x10 [vdpa]
   ? _copy_to_user+0x1a/0x30
   ? move_addr_to_user+0x4b/0xe0
   genl_rcv_msg+0x47/0xa0
   ? __import_iovec+0x46/0x150
   ? __pfx_genl_rcv_msg+0x10/0x10
   netlink_rcv_skb+0x54/0x100
   genl_rcv+0x24/0x40
   netlink_unicast+0x245/0x370
   netlink_sendmsg+0x206/0x440
   __sys_sendto+0x1dc/0x1f0
   ? do_read_fault+0x10c/0x1d0
   ? do_pte_missing+0x10d/0x190
   __x64_sys_sendto+0x20/0x30
   do_syscall_64+0x5c/0xf0
   ? __count_memcg_events+0x4f/0xb0
   ? mm_account_fault+0x6c/0x100
   ? handle_mm_fault+0x116/0x270
   ? do_user_addr_fault+0x1d6/0x6a0
   ? do_syscall_64+0x6b/0xf0
   ? clear_bhb_loop+0x25/0x80
   ? clear_bhb_loop+0x25/0x80
   ? clear_bhb_loop+0x25/0x80
   ? clear_bhb_loop+0x25/0x80
   ? clear_bhb_loop+0x25/0x80
   entry_SYSCALL_64_after_hwframe+0x78/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47687/">CVE-2024-47687 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47687">CVE-2024-47687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232003">SUSE bug 1232003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4769" ref_url="https://www.suse.com/security/cve/CVE-2024-4769" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When importing resources using Web Workers, error messages would distinguish the difference between `application/javascript` responses and non-script responses.  This could have been abused to learn information cross-origin. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4769/">CVE-2024-4769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4769">CVE-2024-4769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875027" comment="firefox-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875028" comment="firefox-x11-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875029" comment="thunderbird-115.11.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47692" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47692" ref_url="https://www.suse.com/security/cve/CVE-2024-47692" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: return -EINVAL when namelen is 0

When we have a corrupted main.sqlite in /var/lib/nfs/nfsdcld/, it may
result in namelen being 0, which will cause memdup_user() to return
ZERO_SIZE_PTR.
When we access the name.data that has been assigned the value of
ZERO_SIZE_PTR in nfs4_client_to_reclaim(), null pointer dereference is
triggered.

[ T1205] ==================================================================
[ T1205] BUG: KASAN: null-ptr-deref in nfs4_client_to_reclaim+0xe9/0x260
[ T1205] Read of size 1 at addr 0000000000000010 by task nfsdcld/1205
[ T1205]
[ T1205] CPU: 11 PID: 1205 Comm: nfsdcld Not tainted 5.10.0-00003-g2c1423731b8d #406
[ T1205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ?-20190727_073836-buildvm-ppc64le-16.ppc.fedoraproject.org-3.fc31 04/01/2014
[ T1205] Call Trace:
[ T1205]  dump_stack+0x9a/0xd0
[ T1205]  ? nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  __kasan_report.cold+0x34/0x84
[ T1205]  ? nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  kasan_report+0x3a/0x50
[ T1205]  nfs4_client_to_reclaim+0xe9/0x260
[ T1205]  ? nfsd4_release_lockowner+0x410/0x410
[ T1205]  cld_pipe_downcall+0x5ca/0x760
[ T1205]  ? nfsd4_cld_tracking_exit+0x1d0/0x1d0
[ T1205]  ? down_write_killable_nested+0x170/0x170
[ T1205]  ? avc_policy_seqno+0x28/0x40
[ T1205]  ? selinux_file_permission+0x1b4/0x1e0
[ T1205]  rpc_pipe_write+0x84/0xb0
[ T1205]  vfs_write+0x143/0x520
[ T1205]  ksys_write+0xc9/0x170
[ T1205]  ? __ia32_sys_read+0x50/0x50
[ T1205]  ? ktime_get_coarse_real_ts64+0xfe/0x110
[ T1205]  ? ktime_get_coarse_real_ts64+0xa2/0x110
[ T1205]  do_syscall_64+0x33/0x40
[ T1205]  entry_SYSCALL_64_after_hwframe+0x67/0xd1
[ T1205] RIP: 0033:0x7fdbdb761bc7
[ T1205] Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 514
[ T1205] RSP: 002b:00007fff8c4b7248 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ T1205] RAX: ffffffffffffffda RBX: 000000000000042b RCX: 00007fdbdb761bc7
[ T1205] RDX: 000000000000042b RSI: 00007fff8c4b75f0 RDI: 0000000000000008
[ T1205] RBP: 00007fdbdb761bb0 R08: 0000000000000000 R09: 0000000000000001
[ T1205] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000042b
[ T1205] R13: 0000000000000008 R14: 00007fff8c4b75f0 R15: 0000000000000000
[ T1205] ==================================================================

Fix it by checking namelen.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47692/">CVE-2024-47692 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47692">CVE-2024-47692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231857">SUSE bug 1231857</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4770</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4770" ref_url="https://www.suse.com/security/cve/CVE-2024-4770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    When saving a page to PDF, certain font styles could have led to a potential use-after-free crash. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-4770/">CVE-2024-4770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-4770">CVE-2024-4770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875027" comment="firefox-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875028" comment="firefox-x11-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875029" comment="thunderbird-115.11.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47700" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47700" ref_url="https://www.suse.com/security/cve/CVE-2024-47700" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: check stripe size compatibility on remount as well

We disable stripe size in __ext4_fill_super if it is not a multiple of
the cluster ratio however this check is missed when trying to remount.
This can leave us with cases where stripe &lt; cluster_ratio after
remount:set making EXT4_B2C(sbi-&gt;s_stripe) become 0 that can cause some
unforeseen bugs like divide by 0.

Fix that by adding the check in remount path as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47700/">CVE-2024-47700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47700">CVE-2024-47700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231919">SUSE bug 1231919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47703" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47703" ref_url="https://www.suse.com/security/cve/CVE-2024-47703" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, lsm: Add check for BPF LSM return value

A bpf prog returning a positive number attached to file_alloc_security
hook makes kernel panic.

This happens because file system can not filter out the positive number
returned by the LSM prog using IS_ERR, and misinterprets this positive
number as a file pointer.

Given that hook file_alloc_security never returned positive number
before the introduction of BPF LSM, and other BPF LSM hooks may
encounter similar issues, this patch adds LSM return value check
in verifier, to ensure no unexpected value is returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47703/">CVE-2024-47703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47703">CVE-2024-47703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231946">SUSE bug 1231946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47705" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47705" ref_url="https://www.suse.com/security/cve/CVE-2024-47705" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix potential invalid pointer dereference in blk_add_partition

The blk_add_partition() function initially used a single if-condition
(IS_ERR(part)) to check for errors when adding a partition. This was
modified to handle the specific case of -ENXIO separately, allowing the
function to proceed without logging the error in this case. However,
this change unintentionally left a path where md_autodetect_dev()
could be called without confirming that part is a valid pointer.

This commit separates the error handling logic by splitting the
initial if-condition, improving code readability and handling specific
error scenarios explicitly. The function now distinguishes the general
error case from -ENXIO without altering the existing behavior of
md_autodetect_dev() calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47705/">CVE-2024-47705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47705">CVE-2024-47705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231872">SUSE bug 1231872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47706</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47706" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47706" ref_url="https://www.suse.com/security/cve/CVE-2024-47706" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03186-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03191-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03223-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix possible UAF for bfqq-&gt;bic with merge chain

1) initial state, three tasks:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
		  |  ^            |  ^		  |  ^
		  |  |            |  |		  |  |
		  V  |            V  |		  V  |
		  bfqq1           bfqq2		  bfqq3
process ref:	   1		    1		    1

2) bfqq1 merged to bfqq2:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
		  |               |		  |  ^
		  \--------------\|		  |  |
		                  V		  V  |
		  bfqq1---------&gt;bfqq2		  bfqq3
process ref:	   0		    2		    1

3) bfqq2 merged to bfqq3:

		Process 1       Process 2	Process 3
		 (BIC1)          (BIC2)		 (BIC3)
	 here -&gt; ^                |		  |
		  \--------------\ \-------------\|
		                  V		  V
		  bfqq1---------&gt;bfqq2----------&gt;bfqq3
process ref:	   0		    1		    3

In this case, IO from Process 1 will get bfqq2 from BIC1 first, and then
get bfqq3 through merge chain, and finially handle IO by bfqq3.
Howerver, current code will think bfqq2 is owned by BIC1, like initial
state, and set bfqq2-&gt;bic to BIC1.

bfq_insert_request
-&gt; by Process 1
 bfqq = bfq_init_rq(rq)
  bfqq = bfq_get_bfqq_handle_split
   bfqq = bic_to_bfqq
   -&gt; get bfqq2 from BIC1
 bfqq-&gt;ref++
 rq-&gt;elv.priv[0] = bic
 rq-&gt;elv.priv[1] = bfqq
 if (bfqq_process_refs(bfqq) == 1)
  bfqq-&gt;bic = bic
  -&gt; record BIC1 to bfqq2

  __bfq_insert_request
   new_bfqq = bfq_setup_cooperator
   -&gt; get bfqq3 from bfqq2-&gt;new_bfqq
   bfqq_request_freed(bfqq)
   new_bfqq-&gt;ref++
   rq-&gt;elv.priv[1] = new_bfqq
   -&gt; handle IO by bfqq3

Fix the problem by checking bfqq is from merge chain fist. And this
might fix a following problem reported by our syzkaller(unreproducible):

==================================================================
BUG: KASAN: slab-use-after-free in bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]
BUG: KASAN: slab-use-after-free in bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]
BUG: KASAN: slab-use-after-free in bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889
Write of size 1 at addr ffff888123839eb8 by task kworker/0:1H/18595

CPU: 0 PID: 18595 Comm: kworker/0:1H Tainted: G             L     6.6.0-07439-gba2303cacfda #6
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014
Workqueue: kblockd blk_mq_requeue_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:364 [inline]
 print_report+0x10d/0x610 mm/kasan/report.c:475
 kasan_report+0x8e/0xc0 mm/kasan/report.c:588
 bfq_do_early_stable_merge block/bfq-iosched.c:5692 [inline]
 bfq_do_or_sched_stable_merge block/bfq-iosched.c:5805 [inline]
 bfq_get_queue+0x25b0/0x2610 block/bfq-iosched.c:5889
 bfq_get_bfqq_handle_split+0x169/0x5d0 block/bfq-iosched.c:6757
 bfq_init_rq block/bfq-iosched.c:6876 [inline]
 bfq_insert_request block/bfq-iosched.c:6254 [inline]
 bfq_insert_requests+0x1112/0x5cf0 block/bfq-iosched.c:6304
 blk_mq_insert_request+0x290/0x8d0 block/blk-mq.c:2593
 blk_mq_requeue_work+0x6bc/0xa70 block/blk-mq.c:1502
 process_one_work kernel/workqueue.c:2627 [inline]
 process_scheduled_works+0x432/0x13f0 kernel/workqueue.c:2700
 worker_thread+0x6f2/0x1160 kernel/workqueue.c:2781
 kthread+0x33c/0x440 kernel/kthread.c:388
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:305
 &lt;/TASK&gt;

Allocated by task 20776:
 kasan_save_stack+0x20/0x40 mm/kasan/common.c:45
 kasan_set_track+0x25/0x30 mm/kasan/common.c:52
 __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328
 kasan_slab_alloc include/linux/kasan.h:188 [inline]
 slab_post_alloc_hook mm/slab.h:763 [inline]
 slab_alloc_node mm/slub.c:3458 [inline]
 kmem_cache_alloc_node+0x1a4/0x6f0 mm/slub.c:3503
 ioc_create_icq block/blk-ioc.c:370 [inline]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47706/">CVE-2024-47706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47706">CVE-2024-47706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231942">SUSE bug 1231942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231943">SUSE bug 1231943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47710" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47710" ref_url="https://www.suse.com/security/cve/CVE-2024-47710" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sock_map: Add a cond_resched() in sock_hash_free()

Several syzbot soft lockup reports all have in common sock_hash_free()

If a map with a large number of buckets is destroyed, we need to yield
the cpu when needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47710/">CVE-2024-47710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47710">CVE-2024-47710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232049">SUSE bug 1232049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47713" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47713" ref_url="https://www.suse.com/security/cve/CVE-2024-47713" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()

Since '__dev_queue_xmit()' should be called with interrupts enabled,
the following backtrace:

ieee80211_do_stop()
 ...
 spin_lock_irqsave(&amp;local-&gt;queue_stop_reason_lock, flags)
 ...
 ieee80211_free_txskb()
  ieee80211_report_used_skb()
   ieee80211_report_ack_skb()
    cfg80211_mgmt_tx_status_ext()
     nl80211_frame_tx_status()
      genlmsg_multicast_netns()
       genlmsg_multicast_netns_filtered()
        nlmsg_multicast_filtered()
	 netlink_broadcast_filtered()
	  do_one_broadcast()
	   netlink_broadcast_deliver()
	    __netlink_sendskb()
	     netlink_deliver_tap()
	      __netlink_deliver_tap_skb()
	       dev_queue_xmit()
	        __dev_queue_xmit() ; with IRQS disabled
 ...
 spin_unlock_irqrestore(&amp;local-&gt;queue_stop_reason_lock, flags)

issues the warning (as reported by syzbot reproducer):

WARNING: CPU: 2 PID: 5128 at kernel/softirq.c:362 __local_bh_enable_ip+0xc3/0x120

Fix this by implementing a two-phase skb reclamation in
'ieee80211_do_stop()', where actual work is performed
outside of a section with interrupts disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47713/">CVE-2024-47713 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47713">CVE-2024-47713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232016">SUSE bug 1232016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47715" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47715" ref_url="https://www.suse.com/security/cve/CVE-2024-47715" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7915: fix oops on non-dbdc mt7986

mt7915_band_config() sets band_idx = 1 on the main phy for mt7986
with MT7975_ONE_ADIE or MT7976_ONE_ADIE.

Commit 0335c034e726 ("wifi: mt76: fix race condition related to
checking tx queue fill status") introduced a dereference of the
phys array indirectly indexed by band_idx via wcid-&gt;phy_idx in
mt76_wcid_cleanup(). This caused the following Oops on affected
mt7986 devices:

 Unable to handle kernel read from unreadable memory at virtual address 0000000000000024
 Mem abort info:
   ESR = 0x0000000096000005
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x05: level 1 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000005
   CM = 0, WnR = 0
 user pgtable: 4k pages, 39-bit VAs, pgdp=0000000042545000
 [0000000000000024] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
 Internal error: Oops: 0000000096000005 [#1] SMP
 Modules linked in: ... mt7915e mt76_connac_lib mt76 mac80211 cfg80211 ...
 CPU: 2 PID: 1631 Comm: hostapd Not tainted 5.15.150 #0
 Hardware name: ZyXEL EX5700 (Telenor) (DT)
 pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : mt76_wcid_cleanup+0x84/0x22c [mt76]
 lr : mt76_wcid_cleanup+0x64/0x22c [mt76]
 sp : ffffffc00a803700
 x29: ffffffc00a803700 x28: ffffff80008f7300 x27: ffffff80003f3c00
 x26: ffffff80000a7880 x25: ffffffc008c26e00 x24: 0000000000000001
 x23: ffffffc000a68114 x22: 0000000000000000 x21: ffffff8004172cc8
 x20: ffffffc00a803748 x19: ffffff8004152020 x18: 0000000000000000
 x17: 00000000000017c0 x16: ffffffc008ef5000 x15: 0000000000000be0
 x14: ffffff8004172e28 x13: ffffff8004172e28 x12: 0000000000000000
 x11: 0000000000000000 x10: ffffff8004172e30 x9 : ffffff8004172e28
 x8 : 0000000000000000 x7 : ffffff8004156020 x6 : 0000000000000000
 x5 : 0000000000000031 x4 : 0000000000000000 x3 : 0000000000000001
 x2 : 0000000000000000 x1 : ffffff80008f7300 x0 : 0000000000000024
 Call trace:
  mt76_wcid_cleanup+0x84/0x22c [mt76]
  __mt76_sta_remove+0x70/0xbc [mt76]
  mt76_sta_state+0x8c/0x1a4 [mt76]
  mt7915_eeprom_get_power_delta+0x11e4/0x23a0 [mt7915e]
  drv_sta_state+0x144/0x274 [mac80211]
  sta_info_move_state+0x1cc/0x2a4 [mac80211]
  sta_set_sinfo+0xaf8/0xc24 [mac80211]
  sta_info_destroy_addr_bss+0x4c/0x6c [mac80211]

  ieee80211_color_change_finish+0x1c08/0x1e70 [mac80211]
  cfg80211_check_station_change+0x1360/0x4710 [cfg80211]
  genl_family_rcv_msg_doit+0xb4/0x110
  genl_rcv_msg+0xd0/0x1bc
  netlink_rcv_skb+0x58/0x120
  genl_rcv+0x34/0x50
  netlink_unicast+0x1f0/0x2ec
  netlink_sendmsg+0x198/0x3d0
  ____sys_sendmsg+0x1b0/0x210
  ___sys_sendmsg+0x80/0xf0
  __sys_sendmsg+0x44/0xa0
  __arm64_sys_sendmsg+0x20/0x30
  invoke_syscall.constprop.0+0x4c/0xe0
  do_el0_svc+0x40/0xd0
  el0_svc+0x14/0x4c
  el0t_64_sync_handler+0x100/0x110
  el0t_64_sync+0x15c/0x160
 Code: d2800002 910092c0 52800023 f9800011 (885f7c01)
 ---[ end trace 7e42dd9a39ed2281 ]---

Fix by using mt76_dev_phy() which will map band_idx to the correct phy
for all hardware combinations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47715/">CVE-2024-47715 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47715">CVE-2024-47715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231860">SUSE bug 1231860</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47718" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47718" ref_url="https://www.suse.com/security/cve/CVE-2024-47718" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: always wait for both firmware loading attempts

In 'rtw_wait_firmware_completion()', always wait for both (regular and
wowlan) firmware loading attempts. Otherwise if 'rtw_usb_intf_init()'
has failed in 'rtw_usb_probe()', 'rtw_usb_disconnect()' may issue
'ieee80211_free_hw()' when one of 'rtw_load_firmware_cb()' (usually
the wowlan one) is still in progress, causing UAF detected by KASAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47718/">CVE-2024-47718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47718">CVE-2024-47718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232015">SUSE bug 1232015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47719</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47719" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47719" ref_url="https://www.suse.com/security/cve/CVE-2024-47719" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Protect against overflow of ALIGN() during iova allocation

Userspace can supply an iova and uptr such that the target iova alignment
becomes really big and ALIGN() overflows which corrupts the selected area
range during allocation. CONFIG_IOMMUFD_TEST can detect this:

   WARNING: CPU: 1 PID: 5092 at drivers/iommu/iommufd/io_pagetable.c:268 iopt_alloc_area_pages drivers/iommu/iommufd/io_pagetable.c:268 [inline]
   WARNING: CPU: 1 PID: 5092 at drivers/iommu/iommufd/io_pagetable.c:268 iopt_map_pages+0xf95/0x1050 drivers/iommu/iommufd/io_pagetable.c:352
   Modules linked in:
   CPU: 1 PID: 5092 Comm: syz-executor294 Not tainted 6.10.0-rc5-syzkaller-00294-g3ffea9a7a6f7 #0
   Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024
   RIP: 0010:iopt_alloc_area_pages drivers/iommu/iommufd/io_pagetable.c:268 [inline]
   RIP: 0010:iopt_map_pages+0xf95/0x1050 drivers/iommu/iommufd/io_pagetable.c:352
   Code: fc e9 a4 f3 ff ff e8 1a 8b 4c fc 41 be e4 ff ff ff e9 8a f3 ff ff e8 0a 8b 4c fc 90 0f 0b 90 e9 37 f5 ff ff e8 fc 8a 4c fc 90 &lt;0f&gt; 0b 90 e9 68 f3 ff ff 48 c7 c1 ec 82 ad 8f 80 e1 07 80 c1 03 38
   RSP: 0018:ffffc90003ebf9e0 EFLAGS: 00010293
   RAX: ffffffff85499fa4 RBX: 00000000ffffffef RCX: ffff888079b49e00
   RDX: 0000000000000000 RSI: 00000000ffffffef RDI: 0000000000000000
   RBP: ffffc90003ebfc50 R08: ffffffff85499b30 R09: ffffffff85499942
   R10: 0000000000000002 R11: ffff888079b49e00 R12: ffff8880228e0010
   R13: 0000000000000000 R14: 1ffff920007d7f68 R15: ffffc90003ebfd00
   FS:  000055557d760380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
   CR2: 00000000005fdeb8 CR3: 000000007404a000 CR4: 00000000003506f0
   DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
   DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
   Call Trace:
    &lt;TASK&gt;
    iommufd_ioas_copy+0x610/0x7b0 drivers/iommu/iommufd/ioas.c:274
    iommufd_fops_ioctl+0x4d9/0x5a0 drivers/iommu/iommufd/main.c:421
    vfs_ioctl fs/ioctl.c:51 [inline]
    __do_sys_ioctl fs/ioctl.c:907 [inline]
    __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
    do_syscall_x64 arch/x86/entry/common.c:52 [inline]
    do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

Cap the automatic alignment to the huge page size, which is probably a
better idea overall. Huge automatic alignments can fragment and chew up
the available IOVA space without any reason.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47719/">CVE-2024-47719 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47719">CVE-2024-47719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231865">SUSE bug 1231865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231866">SUSE bug 1231866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47727" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47727" ref_url="https://www.suse.com/security/cve/CVE-2024-47727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/tdx: Fix "in-kernel MMIO" check

TDX only supports kernel-initiated MMIO operations. The handle_mmio()
function checks if the #VE exception occurred in the kernel and rejects
the operation if it did not.

However, userspace can deceive the kernel into performing MMIO on its
behalf. For example, if userspace can point a syscall to an MMIO address,
syscall does get_user() or put_user() on it, triggering MMIO #VE. The
kernel will treat the #VE as in-kernel MMIO.

Ensure that the target MMIO address is within the kernel before decoding
instruction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47727/">CVE-2024-47727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47727">CVE-2024-47727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232116">SUSE bug 1232116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47737</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47737" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47737" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47737" ref_url="https://www.suse.com/security/cve/CVE-2024-47737" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: call cache_put if xdr_reserve_space returns NULL

If not enough buffer space available, but idmap_lookup has triggered
lookup_fn which calls cache_get and returns successfully. Then we
missed to call cache_put here which pairs with cache_get.

Reviwed-by: Jeff Layton &lt;jlayton@kernel.org&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47737/">CVE-2024-47737 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47737">CVE-2024-47737 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232056">SUSE bug 1232056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47738" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47738" ref_url="https://www.suse.com/security/cve/CVE-2024-47738" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't use rate mask for offchannel TX either

Like the commit ab9177d83c04 ("wifi: mac80211: don't use rate mask for
scanning"), ignore incorrect settings to avoid no supported rate warning
reported by syzbot.

The syzbot did bisect and found cause is commit 9df66d5b9f45 ("cfg80211:
fix default HE tx bitrate mask in 2G band"), which however corrects
bitmask of HE MCS and recognizes correctly settings of empty legacy rate
plus HE MCS rate instead of returning -EINVAL.

As suggestions [1], follow the change of SCAN TX to consider this case of
offchannel TX as well.

[1] https://lore.kernel.org/linux-wireless/6ab2dc9c3afe753ca6fdcdd1421e7a1f47e87b84.camel@sipsolutions.net/T/#m2ac2a6d2be06a37c9c47a3d8a44b4f647ed4f024
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47738/">CVE-2024-47738 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47738">CVE-2024-47738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232114">SUSE bug 1232114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47739" ref_url="https://www.suse.com/security/cve/CVE-2024-47739" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: use integer wrap around to prevent deadlock on seq_nr overflow

When submitting more than 2^32 padata objects to padata_do_serial, the
current sorting implementation incorrectly sorts padata objects with
overflowed seq_nr, causing them to be placed before existing objects in
the reorder list. This leads to a deadlock in the serialization process
as padata_find_next cannot match padata-&gt;seq_nr and pd-&gt;processed
because the padata instance with overflowed seq_nr will be selected
next.

To fix this, we use an unsigned integer wrap around to correctly sort
padata objects in scenarios with integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47739/">CVE-2024-47739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47739">CVE-2024-47739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232124">SUSE bug 1232124</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47745" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47745" ref_url="https://www.suse.com/security/cve/CVE-2024-47745" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: call the security_mmap_file() LSM hook in remap_file_pages()

The remap_file_pages syscall handler calls do_mmap() directly, which
doesn't contain the LSM security check. And if the process has called
personality(READ_IMPLIES_EXEC) before and remap_file_pages() is called for
RW pages, this will actually result in remapping the pages to RWX,
bypassing a W^X policy enforced by SELinux.

So we should check prot by security_mmap_file LSM hook in the
remap_file_pages syscall handler before do_mmap() is called. Otherwise, it
potentially permits an attacker to bypass a W^X policy enforced by
SELinux.

The bypass is similar to CVE-2016-10044, which bypass the same thing via
AIO and can be found in [1].

The PoC:

$ cat &gt; test.c

int main(void) {
	size_t pagesz = sysconf(_SC_PAGE_SIZE);
	int mfd = syscall(SYS_memfd_create, "test", 0);
	const char *buf = mmap(NULL, 4 * pagesz, PROT_READ | PROT_WRITE,
		MAP_SHARED, mfd, 0);
	unsigned int old = syscall(SYS_personality, 0xffffffff);
	syscall(SYS_personality, READ_IMPLIES_EXEC | old);
	syscall(SYS_remap_file_pages, buf, pagesz, 0, 2, 0);
	syscall(SYS_personality, old);
	// show the RWX page exists even if W^X policy is enforced
	int fd = open("/proc/self/maps", O_RDONLY);
	unsigned char buf2[1024];
	while (1) {
		int ret = read(fd, buf2, 1024);
		if (ret &lt;= 0) break;
		write(1, buf2, ret);
	}
	close(fd);
}

$ gcc test.c -o test
$ ./test | grep rwx
7f1836c34000-7f1836c35000 rwxs 00002000 00:01 2050 /memfd:test (deleted)

[PM: subject line tweaks]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47745/">CVE-2024-47745 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47745">CVE-2024-47745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232135">SUSE bug 1232135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47748</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47748" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47748" ref_url="https://www.suse.com/security/cve/CVE-2024-47748" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost_vdpa: assign irq bypass producer token correctly

We used to call irq_bypass_unregister_producer() in
vhost_vdpa_setup_vq_irq() which is problematic as we don't know if the
token pointer is still valid or not.

Actually, we use the eventfd_ctx as the token so the life cycle of the
token should be bound to the VHOST_SET_VRING_CALL instead of
vhost_vdpa_setup_vq_irq() which could be called by set_status().

Fixing this by setting up irq bypass producer's token when handling
VHOST_SET_VRING_CALL and un-registering the producer before calling
vhost_vring_ioctl() to prevent a possible use after free as eventfd
could have been released in vhost_vring_ioctl(). And such registering
and unregistering will only be done if DRIVER_OK is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47748/">CVE-2024-47748 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47748">CVE-2024-47748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232174">SUSE bug 1232174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232177">SUSE bug 1232177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20244777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-4777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-4777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-4777" ref_url="https://www.suse.com/security/cve/CVE-2024-4777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019264.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 126, Firefox ESR &lt; 115.11, and Thunderbird &lt; 115.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-23"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-4777/">CVE-2024-4777 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-4777">CVE-2024-4777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1224056">SUSE bug 1224056</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875027" comment="firefox-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875028" comment="firefox-x11-115.11.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875029" comment="thunderbird-115.11.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47774</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47774" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47774" ref_url="https://www.suse.com/security/cve/CVE-2024-47774" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47774/">CVE-2024-47774 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47774">CVE-2024-47774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234446">SUSE bug 1234446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47775" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47775" ref_url="https://www.suse.com/security/cve/CVE-2024-47775" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14578-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GZDF3P2GSSY47IWYHI5OBEEMZAKWSY3E/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been found in the parse_ds64 function within gstwavparse.c. The parse_ds64 function does not check that the buffer buf contains sufficient data before attempting to read from it, doing multiple GST_READ_UINT32_LE operations without performing boundary checks. This can lead to an OOB-read when buf is smaller than expected. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47775/">CVE-2024-47775 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47775">CVE-2024-47775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234434">SUSE bug 1234434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47776" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47776" ref_url="https://www.suse.com/security/cve/CVE-2024-47776" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read has been discovered in gst_wavparse_cue_chunk within gstwavparse.c. The vulnerability happens due to a discrepancy between the size of the data buffer and the size value provided to the function. This mismatch causes the comparison  if (size &lt; 4 + ncues * 24) to fail in some cases, allowing the subsequent loop to access beyond the bounds of the data buffer. The root cause of this discrepancy stems from a miscalculation when clipping the chunk size based on upstream data size. This vulnerability allows reading beyond the bounds of the data buffer, potentially leading to a crash (denial of service) or the leak of sensitive data. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47776/">CVE-2024-47776 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47776">CVE-2024-47776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234435">SUSE bug 1234435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47777" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47777" ref_url="https://www.suse.com/security/cve/CVE-2024-47777" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_wavparse_smpl_chunk function within gstwavparse.c. This function attempts to read 4 bytes from the data + 12 offset without checking if the size of the data buffer is sufficient. If the buffer is too small, the function reads beyond its bounds. This vulnerability may result in reading 4 bytes out of the boundaries of the data buffer. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47777/">CVE-2024-47777 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47777">CVE-2024-47777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234436">SUSE bug 1234436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47778" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47778" ref_url="https://www.suse.com/security/cve/CVE-2024-47778" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been discovered in gst_wavparse_adtl_chunk within gstwavparse.c. This vulnerability arises due to insufficient validation of the size parameter, which can exceed the bounds of the data buffer. As a result, an OOB read occurs in the following while loop. This vulnerability can result in reading up to 4GB of process memory or potentially causing a segmentation fault (SEGV) when accessing invalid memory. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47778/">CVE-2024-47778 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47778">CVE-2024-47778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234439">SUSE bug 1234439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47834</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47834" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47834" ref_url="https://www.suse.com/security/cve/CVE-2024-47834" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7242" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00063-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040414.html" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. An Use-After-Free read vulnerability has been discovered affecting the processing of CodecPrivate elements in Matroska streams. In the GST_MATROSKA_ID_CODECPRIVATE case within the gst_matroska_demux_parse_stream function, a data chunk is allocated using gst_ebml_read_binary. Later, the allocated memory is freed in the gst_matroska_track_free function, by the call to g_free (track-&gt;codec_priv). Finally, the freed memory is accessed in the caps_serialize function through gst_value_serialize_buffer. The freed memory will be accessed in the gst_value_serialize_buffer function. This results in a UAF read vulnerability, as the function tries to process memory that has already been freed. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-05"/>
	<updated date="2025-06-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47834/">CVE-2024-47834 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47834">CVE-2024-47834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234440">SUSE bug 1234440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985863" comment="gstreamer1-plugins-good-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985864" comment="gstreamer1-plugins-good-gtk-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47835" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47835" ref_url="https://www.suse.com/security/cve/CVE-2024-47835" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7243" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021081.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14577-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M64SNUMTNONUECANIAVBUNBV6RTL5TDY/" source="SUSE-SU"/>
    <description>
    GStreamer is a library for constructing graphs of media-handling components. A null pointer dereference vulnerability has been detected in the parse_lrc function within gstsubparse.c. The parse_lrc function calls strchr() to find the character ']' in the string line. The pointer returned by this call is then passed to g_strdup(). However, if the string line does not contain the character ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-47835/">CVE-2024-47835 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47835">CVE-2024-47835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234450">SUSE bug 1234450</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983912" comment="gstreamer1-plugins-base-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983913" comment="gstreamer1-plugins-base-devel-1.22.12-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983914" comment="gstreamer1-plugins-base-tools-1.22.12-4.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47850</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47850" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47850" ref_url="https://www.suse.com/security/cve/CVE-2024-47850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019765.html" source="SUSE-SU"/>
    <description>
    CUPS cups-browsed before 2.5b1 will send an HTTP POST request to an arbitrary destination and port in response to a single IPP UDP packet requesting a printer to be added, a different vulnerability than CVE-2024-47176. (The request is meant to probe the new printer but can be used to create DDoS amplification attacks.)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2024-47850/">CVE-2024-47850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-47850">CVE-2024-47850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231294">SUSE bug 1231294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945283" comment="cups-filters-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945284" comment="cups-filters-devel-1.28.7-17.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945285" comment="cups-filters-libs-1.28.7-17.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202447875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-47875</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-47875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-47875" ref_url="https://www.suse.com/security/cve/CVE-2024-47875" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8327" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000150.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8678" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000159.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000507.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    DOMPurify is a DOM-only, super-fast, uber-tolerant XSS sanitizer for HTML, MathML and SVG. DOMpurify was vulnerable to nesting-based mXSS. This vulnerability is fixed in 2.5.0 and 3.1.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-31"/>
	<updated date="2025-09-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-47875/">CVE-2024-47875 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-47875">CVE-2024-47875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231571">SUSE bug 1231571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953920" comment="grafana-10.2.6-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953921" comment="grafana-selinux-10.2.6-7.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202448873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-48873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-48873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48873" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-48873" ref_url="https://www.suse.com/security/cve/CVE-2024-48873" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: check return value of ieee80211_probereq_get() for RNR

The return value of ieee80211_probereq_get() might be NULL, so check it
before using to avoid NULL pointer access.

Addresses-Coverity-ID: 1529805 ("Dereference null return value")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-48873/">CVE-2024-48873 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-48873">CVE-2024-48873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235716">SUSE bug 1235716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49569</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49569" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49569" ref_url="https://www.suse.com/security/cve/CVE-2024-49569" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-rdma: unquiesce admin_q before destroy it

Kernel will hang on destroy admin_q while we create ctrl failed, such
as following calltrace:

PID: 23644    TASK: ff2d52b40f439fc0  CPU: 2    COMMAND: "nvme"
 #0 [ff61d23de260fb78] __schedule at ffffffff8323bc15
 #1 [ff61d23de260fc08] schedule at ffffffff8323c014
 #2 [ff61d23de260fc28] blk_mq_freeze_queue_wait at ffffffff82a3dba1
 #3 [ff61d23de260fc78] blk_freeze_queue at ffffffff82a4113a
 #4 [ff61d23de260fc90] blk_cleanup_queue at ffffffff82a33006
 #5 [ff61d23de260fcb0] nvme_rdma_destroy_admin_queue at ffffffffc12686ce
 #6 [ff61d23de260fcc8] nvme_rdma_setup_ctrl at ffffffffc1268ced
 #7 [ff61d23de260fd28] nvme_rdma_create_ctrl at ffffffffc126919b
 #8 [ff61d23de260fd68] nvmf_dev_write at ffffffffc024f362
 #9 [ff61d23de260fe38] vfs_write at ffffffff827d5f25
    RIP: 00007fda7891d574  RSP: 00007ffe2ef06958  RFLAGS: 00000202
    RAX: ffffffffffffffda  RBX: 000055e8122a4d90  RCX: 00007fda7891d574
    RDX: 000000000000012b  RSI: 000055e8122a4d90  RDI: 0000000000000004
    RBP: 00007ffe2ef079c0   R8: 000000000000012b   R9: 000055e8122a4d90
    R10: 0000000000000000  R11: 0000000000000202  R12: 0000000000000004
    R13: 000055e8122923c0  R14: 000000000000012b  R15: 00007fda78a54500
    ORIG_RAX: 0000000000000001  CS: 0033  SS: 002b

This due to we have quiesced admi_q before cancel requests, but forgot
to unquiesce before destroy it, as a result we fail to drain the
pending requests, and hang on blk_mq_freeze_queue_wait() forever. Here
try to reuse nvme_rdma_teardown_admin_queue() to fix this issue and
simplify the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49569/">CVE-2024-49569 at SUSE</cve>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49569">CVE-2024-49569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235730">SUSE bug 1235730</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49570" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49570" ref_url="https://www.suse.com/security/cve/CVE-2024-49570" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/tracing: Fix a potential TP_printk UAF

The commit
afd2627f727b ("tracing: Check "%s" dereference via the field and not the TP_printk format")
exposes potential UAFs in the xe_bo_move trace event.

Fix those by avoiding dereferencing the
xe_mem_type_to_name[] array at TP_printk time.

Since some code refactoring has taken place, explicit backporting may
be needed for kernels older than 6.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49570/">CVE-2024-49570 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-49570">CVE-2024-49570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238782">SUSE bug 1238782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49761" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49761" ref_url="https://www.suse.com/security/cve/CVE-2024-49761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10834" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000640.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10850" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000645.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10858" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000643.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10860" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000644.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11047" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024943.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0129-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DGKHOJBF7CZTZV4MBBSARWRERGVICQZ5/" source="SUSE-SU"/>
    <description>
    REXML is an XML toolkit for Ruby. The REXML gem before 3.3.9 has a ReDoS vulnerability when it parses an XML that has many digits between &amp;# and x...; in a hex numeric character reference (&amp;#x...;). This does not happen with Ruby 3.2 or later. Ruby 3.1 is the only affected maintained Ruby. The REXML gem 3.3.9 or later include the patch to fix the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-08"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49761/">CVE-2024-49761 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49761">CVE-2024-49761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232440">SUSE bug 1232440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957114" comment="ruby-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957115" comment="ruby-bundled-gems-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957116" comment="ruby-default-gems-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957117" comment="ruby-devel-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957118" comment="ruby-doc-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957119" comment="ruby-libs-3.1.5-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957120" comment="rubygem-bigdecimal-3.1.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957121" comment="rubygem-bundler-2.3.27-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957122" comment="rubygem-io-console-0.5.11-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957123" comment="rubygem-irb-1.4.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957124" comment="rubygem-json-2.6.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957125" comment="rubygem-minitest-5.15.0-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957126" comment="rubygem-power_assert-2.0.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957127" comment="rubygem-psych-4.0.4-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957128" comment="rubygem-rake-13.0.6-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957129" comment="rubygem-rbs-2.7.0-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957130" comment="rubygem-rdoc-6.4.1.1-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957108" comment="rubygem-rexml-3.2.5-163.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957109" comment="rubygem-rss-0.2.9-163.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957133" comment="rubygem-test-unit-3.5.3-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957134" comment="rubygem-typeprof-0.21.3-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957135" comment="rubygems-3.3.27-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957136" comment="rubygems-devel-3.3.27-145.module+el9.5.0+22579+d0aa0a16 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49851</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49851" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49851" ref_url="https://www.suse.com/security/cve/CVE-2024-49851" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Clean up TPM space after command failure

tpm_dev_transmit prepares the TPM space before attempting command
transmission. However if the command fails no rollback of this
preparation is done. This can result in transient handles being leaked
if the device is subsequently closed with no further commands performed.

Fix this by flushing the space in the event of command transmission
failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49851/">CVE-2024-49851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49851">CVE-2024-49851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232134">SUSE bug 1232134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49856" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49856" ref_url="https://www.suse.com/security/cve/CVE-2024-49856" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sgx: Fix deadlock in SGX NUMA node search

When the current node doesn't have an EPC section configured by firmware
and all other EPC sections are used up, CPU can get stuck inside the
while loop that looks for an available EPC page from remote nodes
indefinitely, leading to a soft lockup. Note how nid_of_current will
never be equal to nid in that while loop because nid_of_current is not
set in sgx_numa_mask.

Also worth mentioning is that it's perfectly fine for the firmware not
to setup an EPC section on a node. While setting up an EPC section on
each node can enhance performance, it is not a requirement for
functionality.

Rework the loop to start and end on *a* node that has SGX memory. This
avoids the deadlock looking for the current SGX-lacking node to show up
in the loop when it never will.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49856/">CVE-2024-49856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49856">CVE-2024-49856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232202">SUSE bug 1232202</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49860</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49860" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49860" ref_url="https://www.suse.com/security/cve/CVE-2024-49860" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: sysfs: validate return type of _STR method

Only buffer objects are valid return values of _STR.

If something else is returned description_show() will access invalid
memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49860/">CVE-2024-49860 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49860">CVE-2024-49860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231861">SUSE bug 1231861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231862">SUSE bug 1231862</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49861" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49861" ref_url="https://www.suse.com/security/cve/CVE-2024-49861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix helper writes to read-only maps

Lonial found an issue that despite user- and BPF-side frozen BPF map
(like in case of .rodata), it was still possible to write into it from
a BPF program side through specific helpers having ARG_PTR_TO_{LONG,INT}
as arguments.

In check_func_arg() when the argument is as mentioned, the meta-&gt;raw_mode
is never set. Later, check_helper_mem_access(), under the case of
PTR_TO_MAP_VALUE as register base type, it assumes BPF_READ for the
subsequent call to check_map_access_type() and given the BPF map is
read-only it succeeds.

The helpers really need to be annotated as ARG_PTR_TO_{LONG,INT} | MEM_UNINIT
when results are written into them as opposed to read out of them. The
latter indicates that it's okay to pass a pointer to uninitialized memory
as the memory is written to anyway.

However, ARG_PTR_TO_{LONG,INT} is a special case of ARG_PTR_TO_FIXED_SIZE_MEM
just with additional alignment requirement. So it is better to just get
rid of the ARG_PTR_TO_{LONG,INT} special cases altogether and reuse the
fixed size memory types. For this, add MEM_ALIGNED to additionally ensure
alignment given these helpers write directly into the args via *&lt;ptr&gt; = val.
The .arg*_size has been initialized reflecting the actual sizeof(*&lt;ptr&gt;).

MEM_ALIGNED can only be used in combination with MEM_FIXED_SIZE annotated
argument types, since in !MEM_FIXED_SIZE cases the verifier does not know
the buffer size a priori and therefore cannot blindly write *&lt;ptr&gt; = val.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49861/">CVE-2024-49861 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49861">CVE-2024-49861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232254">SUSE bug 1232254</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49862</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49862" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49862" ref_url="https://www.suse.com/security/cve/CVE-2024-49862" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powercap: intel_rapl: Fix off by one in get_rpi()

The rp-&gt;priv-&gt;rpi array is either rpi_msr or rpi_tpmi which have
NR_RAPL_PRIMITIVES number of elements.  Thus the &gt; needs to be &gt;=
to prevent an off by one access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49862/">CVE-2024-49862 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49862">CVE-2024-49862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231871">SUSE bug 1231871</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49864" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49864" ref_url="https://www.suse.com/security/cve/CVE-2024-49864" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix a race between socket set up and I/O thread creation

In rxrpc_open_socket(), it sets up the socket and then sets up the I/O
thread that will handle it.  This is a problem, however, as there's a gap
between the two phases in which a packet may come into rxrpc_encap_rcv()
from the UDP packet but we oops when trying to wake the not-yet created I/O
thread.

As a quick fix, just make rxrpc_encap_rcv() discard the packet if there's
no I/O thread yet.

A better, but more intrusive fix would perhaps be to rearrange things such
that the socket creation is done by the I/O thread.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49864/">CVE-2024-49864 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49864">CVE-2024-49864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232256">SUSE bug 1232256</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49870</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49870" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49870" ref_url="https://www.suse.com/security/cve/CVE-2024-49870" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachefiles: fix dentry leak in cachefiles_open_file()

A dentry leak may be caused when a lookup cookie and a cull are concurrent:

            P1             |             P2
-----------------------------------------------------------
cachefiles_lookup_cookie
  cachefiles_look_up_object
    lookup_one_positive_unlocked
     // get dentry
                            cachefiles_cull
                              inode-&gt;i_flags |= S_KERNEL_FILE;
    cachefiles_open_file
      cachefiles_mark_inode_in_use
        __cachefiles_mark_inode_in_use
          can_use = false
          if (!(inode-&gt;i_flags &amp; S_KERNEL_FILE))
            can_use = true
	  return false
        return false
        // Returns an error but doesn't put dentry

After that the following WARNING will be triggered when the backend folder
is umounted:

==================================================================
BUG: Dentry 000000008ad87947{i=7a,n=Dx_1_1.img}  still in use (1) [unmount of ext4 sda]
WARNING: CPU: 4 PID: 359261 at fs/dcache.c:1767 umount_check+0x5d/0x70
CPU: 4 PID: 359261 Comm: umount Not tainted 6.6.0-dirty #25
RIP: 0010:umount_check+0x5d/0x70
Call Trace:
 &lt;TASK&gt;
 d_walk+0xda/0x2b0
 do_one_tree+0x20/0x40
 shrink_dcache_for_umount+0x2c/0x90
 generic_shutdown_super+0x20/0x160
 kill_block_super+0x1a/0x40
 ext4_kill_sb+0x22/0x40
 deactivate_locked_super+0x35/0x80
 cleanup_mnt+0x104/0x160
==================================================================

Whether cachefiles_open_file() returns true or false, the reference count
obtained by lookup_positive_unlocked() in cachefiles_look_up_object()
should be released.

Therefore release that reference count in cachefiles_look_up_object() to
fix the above issue and simplify the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49870/">CVE-2024-49870 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49870">CVE-2024-49870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232279">SUSE bug 1232279</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49875</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49875" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49875" ref_url="https://www.suse.com/security/cve/CVE-2024-49875" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: map the EBADMSG to nfserr_io to avoid warning

Ext4 will throw -EBADMSG through ext4_readdir when a checksum error
occurs, resulting in the following WARNING.

Fix it by mapping EBADMSG to nfserr_io.

nfsd_buffered_readdir
 iterate_dir // -EBADMSG -74
  ext4_readdir // .iterate_shared
   ext4_dx_readdir
    ext4_htree_fill_tree
     htree_dirblock_to_tree
      ext4_read_dirblock
       __ext4_read_dirblock
        ext4_dirblock_csum_verify
         warn_no_space_for_csum
          __warn_no_space_for_csum
        return ERR_PTR(-EFSBADCRC) // -EBADMSG -74
 nfserrno // WARNING

[  161.115610] ------------[ cut here ]------------
[  161.116465] nfsd: non-standard errno: -74
[  161.117315] WARNING: CPU: 1 PID: 780 at fs/nfsd/nfsproc.c:878 nfserrno+0x9d/0xd0
[  161.118596] Modules linked in:
[  161.119243] CPU: 1 PID: 780 Comm: nfsd Not tainted 5.10.0-00014-g79679361fd5d #138
[  161.120684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qe
mu.org 04/01/2014
[  161.123601] RIP: 0010:nfserrno+0x9d/0xd0
[  161.124676] Code: 0f 87 da 30 dd 00 83 e3 01 b8 00 00 00 05 75 d7 44 89 ee 48 c7 c7 c0 57 24 98 89 44 24 04 c6
 05 ce 2b 61 03 01 e8 99 20 d8 00 &lt;0f&gt; 0b 8b 44 24 04 eb b5 4c 89 e6 48 c7 c7 a0 6d a4 99 e8 cc 15 33
[  161.127797] RSP: 0018:ffffc90000e2f9c0 EFLAGS: 00010286
[  161.128794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
[  161.130089] RDX: 1ffff1103ee16f6d RSI: 0000000000000008 RDI: fffff520001c5f2a
[  161.131379] RBP: 0000000000000022 R08: 0000000000000001 R09: ffff8881f70c1827
[  161.132664] R10: ffffed103ee18304 R11: 0000000000000001 R12: 0000000000000021
[  161.133949] R13: 00000000ffffffb6 R14: ffff8881317c0000 R15: ffffc90000e2fbd8
[  161.135244] FS:  0000000000000000(0000) GS:ffff8881f7080000(0000) knlGS:0000000000000000
[  161.136695] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  161.137761] CR2: 00007fcaad70b348 CR3: 0000000144256006 CR4: 0000000000770ee0
[  161.139041] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  161.140291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  161.141519] PKRU: 55555554
[  161.142076] Call Trace:
[  161.142575]  ? __warn+0x9b/0x140
[  161.143229]  ? nfserrno+0x9d/0xd0
[  161.143872]  ? report_bug+0x125/0x150
[  161.144595]  ? handle_bug+0x41/0x90
[  161.145284]  ? exc_invalid_op+0x14/0x70
[  161.146009]  ? asm_exc_invalid_op+0x12/0x20
[  161.146816]  ? nfserrno+0x9d/0xd0
[  161.147487]  nfsd_buffered_readdir+0x28b/0x2b0
[  161.148333]  ? nfsd4_encode_dirent_fattr+0x380/0x380
[  161.149258]  ? nfsd_buffered_filldir+0xf0/0xf0
[  161.150093]  ? wait_for_concurrent_writes+0x170/0x170
[  161.151004]  ? generic_file_llseek_size+0x48/0x160
[  161.151895]  nfsd_readdir+0x132/0x190
[  161.152606]  ? nfsd4_encode_dirent_fattr+0x380/0x380
[  161.153516]  ? nfsd_unlink+0x380/0x380
[  161.154256]  ? override_creds+0x45/0x60
[  161.155006]  nfsd4_encode_readdir+0x21a/0x3d0
[  161.155850]  ? nfsd4_encode_readlink+0x210/0x210
[  161.156731]  ? write_bytes_to_xdr_buf+0x97/0xe0
[  161.157598]  ? __write_bytes_to_xdr_buf+0xd0/0xd0
[  161.158494]  ? lock_downgrade+0x90/0x90
[  161.159232]  ? nfs4svc_decode_voidarg+0x10/0x10
[  161.160092]  nfsd4_encode_operation+0x15a/0x440
[  161.160959]  nfsd4_proc_compound+0x718/0xe90
[  161.161818]  nfsd_dispatch+0x18e/0x2c0
[  161.162586]  svc_process_common+0x786/0xc50
[  161.163403]  ? nfsd_svc+0x380/0x380
[  161.164137]  ? svc_printk+0x160/0x160
[  161.164846]  ? svc_xprt_do_enqueue.part.0+0x365/0x380
[  161.165808]  ? nfsd_svc+0x380/0x380
[  161.166523]  ? rcu_is_watching+0x23/0x40
[  161.167309]  svc_process+0x1a5/0x200
[  161.168019]  nfsd+0x1f5/0x380
[  161.168663]  ? nfsd_shutdown_threads+0x260/0x260
[  161.169554]  kthread+0x1c4/0x210
[  161.170224]  ? kthread_insert_work_sanity_check+0x80/0x80
[  161.171246]  ret_from_fork+0x1f/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49875/">CVE-2024-49875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49875">CVE-2024-49875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232333">SUSE bug 1232333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49878" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49878" ref_url="https://www.suse.com/security/cve/CVE-2024-49878" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

resource: fix region_intersects() vs add_memory_driver_managed()

On a system with CXL memory, the resource tree (/proc/iomem) related to
CXL memory may look like something as follows.

490000000-50fffffff : CXL Window 0
  490000000-50fffffff : region0
    490000000-50fffffff : dax0.0
      490000000-50fffffff : System RAM (kmem)

Because drivers/dax/kmem.c calls add_memory_driver_managed() during
onlining CXL memory, which makes "System RAM (kmem)" a descendant of "CXL
Window X".  This confuses region_intersects(), which expects all "System
RAM" resources to be at the top level of iomem_resource.  This can lead to
bugs.

For example, when the following command line is executed to write some
memory in CXL memory range via /dev/mem,

 $ dd if=data of=/dev/mem bs=$((1 &lt;&lt; 10)) seek=$((0x490000000 &gt;&gt; 10)) count=1
 dd: error writing '/dev/mem': Bad address
 1+0 records in
 0+0 records out
 0 bytes copied, 0.0283507 s, 0.0 kB/s

the command fails as expected.  However, the error code is wrong.  It
should be "Operation not permitted" instead of "Bad address".  More
seriously, the /dev/mem permission checking in devmem_is_allowed() passes
incorrectly.  Although the accessing is prevented later because ioremap()
isn't allowed to map system RAM, it is a potential security issue.  During
command executing, the following warning is reported in the kernel log for
calling ioremap() on system RAM.

 ioremap on RAM at 0x0000000490000000 - 0x0000000490000fff
 WARNING: CPU: 2 PID: 416 at arch/x86/mm/ioremap.c:216 __ioremap_caller.constprop.0+0x131/0x35d
 Call Trace:
  memremap+0xcb/0x184
  xlate_dev_mem_ptr+0x25/0x2f
  write_mem+0x94/0xfb
  vfs_write+0x128/0x26d
  ksys_write+0xac/0xfe
  do_syscall_64+0x9a/0xfd
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

The details of command execution process are as follows.  In the above
resource tree, "System RAM" is a descendant of "CXL Window 0" instead of a
top level resource.  So, region_intersects() will report no System RAM
resources in the CXL memory region incorrectly, because it only checks the
top level resources.  Consequently, devmem_is_allowed() will return 1
(allow access via /dev/mem) for CXL memory region incorrectly. 
Fortunately, ioremap() doesn't allow to map System RAM and reject the
access.

So, region_intersects() needs to be fixed to work correctly with the
resource tree with "System RAM" not at top level as above.  To fix it, if
we found a unmatched resource in the top level, we will continue to search
matched resources in its descendant resources.  So, we will not miss any
matched resources in resource tree anymore.

In the new implementation, an example resource tree

|------------- "CXL Window 0" ------------|
|-- "System RAM" --|

will behave similar as the following fake resource tree for
region_intersects(, IORESOURCE_SYSTEM_RAM, ),

|-- "System RAM" --||-- "CXL Window 0a" --|

Where "CXL Window 0a" is part of the original "CXL Window 0" that
isn't covered by "System RAM".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49878/">CVE-2024-49878 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49878">CVE-2024-49878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232340">SUSE bug 1232340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49881" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49881" ref_url="https://www.suse.com/security/cve/CVE-2024-49881" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: update orig_path in ext4_find_extent()

In ext4_find_extent(), if the path is not big enough, we free it and set
*orig_path to NULL. But after reallocating and successfully initializing
the path, we don't update *orig_path, in which case the caller gets a
valid path but a NULL ppath, and this may cause a NULL pointer dereference
or a path memory leak. For example:

ext4_split_extent
  path = *ppath = 2000
  ext4_find_extent
    if (depth &gt; path[0].p_maxdepth)
      kfree(path = 2000);
      *orig_path = path = NULL;
      path = kcalloc() = 3000
  ext4_split_extent_at(*ppath = NULL)
    path = *ppath;
    ex = path[depth].p_ext;
    // NULL pointer dereference!

==================================================================
BUG: kernel NULL pointer dereference, address: 0000000000000010
CPU: 6 UID: 0 PID: 576 Comm: fsstress Not tainted 6.11.0-rc2-dirty #847
RIP: 0010:ext4_split_extent_at+0x6d/0x560
Call Trace:
 &lt;TASK&gt;
 ext4_split_extent.isra.0+0xcb/0x1b0
 ext4_ext_convert_to_initialized+0x168/0x6c0
 ext4_ext_handle_unwritten_extents+0x325/0x4d0
 ext4_ext_map_blocks+0x520/0xdb0
 ext4_map_blocks+0x2b0/0x690
 ext4_iomap_begin+0x20e/0x2c0
[...]
==================================================================

Therefore, *orig_path is updated when the extent lookup succeeds, so that
the caller can safely use path or *ppath.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49881/">CVE-2024-49881 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49881">CVE-2024-49881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232201">SUSE bug 1232201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49882" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49882" ref_url="https://www.suse.com/security/cve/CVE-2024-49882" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double brelse() the buffer of the extents path

In ext4_ext_try_to_merge_up(), set path[1].p_bh to NULL after it has been
released, otherwise it may be released twice. An example of what triggers
this is as follows:

  split2    map    split1
|--------|-------|--------|

ext4_ext_map_blocks
 ext4_ext_handle_unwritten_extents
  ext4_split_convert_extents
   // path-&gt;p_depth == 0
   ext4_split_extent
     // 1. do split1
     ext4_split_extent_at
       |ext4_ext_insert_extent
       |  ext4_ext_create_new_leaf
       |    ext4_ext_grow_indepth
       |      le16_add_cpu(&amp;neh-&gt;eh_depth, 1)
       |    ext4_find_extent
       |      // return -ENOMEM
       |// get error and try zeroout
       |path = ext4_find_extent
       |  path-&gt;p_depth = 1
       |ext4_ext_try_to_merge
       |  ext4_ext_try_to_merge_up
       |    path-&gt;p_depth = 0
       |    brelse(path[1].p_bh)  ---&gt; not set to NULL here
       |// zeroout success
     // 2. update path
     ext4_find_extent
     // 3. do split2
     ext4_split_extent_at
       ext4_ext_insert_extent
         ext4_ext_create_new_leaf
           ext4_ext_grow_indepth
             le16_add_cpu(&amp;neh-&gt;eh_depth, 1)
           ext4_find_extent
             path[0].p_bh = NULL;
             path-&gt;p_depth = 1
             read_extent_tree_block  ---&gt; return err
             // path[1].p_bh is still the old value
             ext4_free_ext_path
               ext4_ext_drop_refs
                 // path-&gt;p_depth == 1
                 brelse(path[1].p_bh)  ---&gt; brelse a buffer twice

Finally got the following WARRNING when removing the buffer from lru:

============================================
VFS: brelse: Trying to free free buffer
WARNING: CPU: 2 PID: 72 at fs/buffer.c:1241 __brelse+0x58/0x90
CPU: 2 PID: 72 Comm: kworker/u19:1 Not tainted 6.9.0-dirty #716
RIP: 0010:__brelse+0x58/0x90
Call Trace:
 &lt;TASK&gt;
 __find_get_block+0x6e7/0x810
 bdev_getblk+0x2b/0x480
 __ext4_get_inode_loc+0x48a/0x1240
 ext4_get_inode_loc+0xb2/0x150
 ext4_reserve_inode_write+0xb7/0x230
 __ext4_mark_inode_dirty+0x144/0x6a0
 ext4_ext_insert_extent+0x9c8/0x3230
 ext4_ext_map_blocks+0xf45/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]
============================================
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49882/">CVE-2024-49882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49882">CVE-2024-49882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232200">SUSE bug 1232200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49883" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49883" ref_url="https://www.suse.com/security/cve/CVE-2024-49883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: aovid use-after-free in ext4_ext_insert_extent()

As Ojaswin mentioned in Link, in ext4_ext_insert_extent(), if the path is
reallocated in ext4_ext_create_new_leaf(), we'll use the stale path and
cause UAF. Below is a sample trace with dummy values:

ext4_ext_insert_extent
  path = *ppath = 2000
  ext4_ext_create_new_leaf(ppath)
    ext4_find_extent(ppath)
      path = *ppath = 2000
      if (depth &gt; path[0].p_maxdepth)
            kfree(path = 2000);
            *ppath = path = NULL;
      path = kcalloc() = 3000
      *ppath = 3000;
      return path;
  /* here path is still 2000, UAF! */
  eh = path[depth].p_hdr

==================================================================
BUG: KASAN: slab-use-after-free in ext4_ext_insert_extent+0x26d4/0x3330
Read of size 8 at addr ffff8881027bf7d0 by task kworker/u36:1/179
CPU: 3 UID: 0 PID: 179 Comm: kworker/u6:1 Not tainted 6.11.0-rc2-dirty #866
Call Trace:
 &lt;TASK&gt;
 ext4_ext_insert_extent+0x26d4/0x3330
 ext4_ext_map_blocks+0xe22/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
[...]

Allocated by task 179:
 ext4_find_extent+0x81c/0x1f70
 ext4_ext_map_blocks+0x146/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
 ext4_writepages+0x26d/0x4e0
 do_writepages+0x175/0x700
[...]

Freed by task 179:
 kfree+0xcb/0x240
 ext4_find_extent+0x7c0/0x1f70
 ext4_ext_insert_extent+0xa26/0x3330
 ext4_ext_map_blocks+0xe22/0x2d40
 ext4_map_blocks+0x71e/0x1700
 ext4_do_writepages+0x1290/0x2800
 ext4_writepages+0x26d/0x4e0
 do_writepages+0x175/0x700
[...]
==================================================================

So use *ppath to update the path to avoid the above problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49883/">CVE-2024-49883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49883">CVE-2024-49883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232199">SUSE bug 1232199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49884" ref_url="https://www.suse.com/security/cve/CVE-2024-49884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-use-after-free in ext4_split_extent_at()

We hit the following use-after-free:

==================================================================
BUG: KASAN: slab-use-after-free in ext4_split_extent_at+0xba8/0xcc0
Read of size 2 at addr ffff88810548ed08 by task kworker/u20:0/40
CPU: 0 PID: 40 Comm: kworker/u20:0 Not tainted 6.9.0-dirty #724
Call Trace:
 &lt;TASK&gt;
 kasan_report+0x93/0xc0
 ext4_split_extent_at+0xba8/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Allocated by task 40:
 __kmalloc_noprof+0x1ac/0x480
 ext4_find_extent+0xf3b/0x1e70
 ext4_ext_map_blocks+0x188/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]

Freed by task 40:
 kfree+0xf1/0x2b0
 ext4_find_extent+0xa71/0x1e70
 ext4_ext_insert_extent+0xa22/0x3260
 ext4_split_extent_at+0x3ef/0xcc0
 ext4_split_extent.isra.0+0x18f/0x500
 ext4_split_convert_extents+0x275/0x750
 ext4_ext_handle_unwritten_extents+0x73e/0x1580
 ext4_ext_map_blocks+0xe20/0x2dc0
 ext4_map_blocks+0x724/0x1700
 ext4_do_writepages+0x12d6/0x2a70
[...]
==================================================================

The flow of issue triggering is as follows:

ext4_split_extent_at
  path = *ppath
  ext4_ext_insert_extent(ppath)
    ext4_ext_create_new_leaf(ppath)
      ext4_find_extent(orig_path)
        path = *orig_path
        read_extent_tree_block
          // return -ENOMEM or -EIO
        ext4_free_ext_path(path)
          kfree(path)
        *orig_path = NULL
  a. If err is -ENOMEM:
  ext4_ext_dirty(path + path-&gt;p_depth)
  // path use-after-free !!!
  b. If err is -EIO and we have EXT_DEBUG defined:
  ext4_ext_show_leaf(path)
    eh = path[depth].p_hdr
    // path also use-after-free !!!

So when trying to zeroout or fix the extent length, call ext4_find_extent()
to update the path.

In addition we use *ppath directly as an ext4_ext_show_leaf() input to
avoid possible use-after-free when EXT_DEBUG is defined, and to avoid
unnecessary path updates.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49884/">CVE-2024-49884 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49884">CVE-2024-49884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232198">SUSE bug 1232198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49885" ref_url="https://www.suse.com/security/cve/CVE-2024-49885" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, slub: avoid zeroing kmalloc redzone

Since commit 946fa0dbf2d8 ("mm/slub: extend redzone check to extra
allocated kmalloc space than requested"), setting orig_size treats
the wasted space (object_size - orig_size) as a redzone. However with
init_on_free=1 we clear the full object-&gt;size, including the redzone.

Additionally we clear the object metadata, including the stored orig_size,
making it zero, which makes check_object() treat the whole object as a
redzone.

These issues lead to the following BUG report with "slub_debug=FUZ
init_on_free=1":

[    0.000000] =============================================================================
[    0.000000] BUG kmalloc-8 (Not tainted): kmalloc Redzone overwritten
[    0.000000] -----------------------------------------------------------------------------
[    0.000000]
[    0.000000] 0xffff000010032858-0xffff00001003285f @offset=2136. First byte 0x0 instead of 0xcc
[    0.000000] FIX kmalloc-8: Restoring kmalloc Redzone 0xffff000010032858-0xffff00001003285f=0xcc
[    0.000000] Slab 0xfffffdffc0400c80 objects=36 used=23 fp=0xffff000010032a18 flags=0x3fffe0000000200(workingset|node=0|zone=0|lastcpupid=0x1ffff)
[    0.000000] Object 0xffff000010032858 @offset=2136 fp=0xffff0000100328c8
[    0.000000]
[    0.000000] Redzone  ffff000010032850: cc cc cc cc cc cc cc cc                          ........
[    0.000000] Object   ffff000010032858: cc cc cc cc cc cc cc cc                          ........
[    0.000000] Redzone  ffff000010032860: cc cc cc cc cc cc cc cc                          ........
[    0.000000] Padding  ffff0000100328b4: 00 00 00 00 00 00 00 00 00 00 00 00              ............
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.11.0-rc3-next-20240814-00004-g61844c55c3f4 #144
[    0.000000] Hardware name: NXP i.MX95 19X19 board (DT)
[    0.000000] Call trace:
[    0.000000]  dump_backtrace+0x90/0xe8
[    0.000000]  show_stack+0x18/0x24
[    0.000000]  dump_stack_lvl+0x74/0x8c
[    0.000000]  dump_stack+0x18/0x24
[    0.000000]  print_trailer+0x150/0x218
[    0.000000]  check_object+0xe4/0x454
[    0.000000]  free_to_partial_list+0x2f8/0x5ec

To address the issue, use orig_size to clear the used area. And restore
the value of orig_size after clear the remaining area.

When CONFIG_SLUB_DEBUG not defined, (get_orig_size()' directly returns
s-&gt;object_size. So when using memset to init the area, the size can simply
be orig_size, as orig_size returns object_size when CONFIG_SLUB_DEBUG not
enabled. And orig_size can never be bigger than object_size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49885/">CVE-2024-49885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49885">CVE-2024-49885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232197">SUSE bug 1232197</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49886</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49886" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49886" ref_url="https://www.suse.com/security/cve/CVE-2024-49886" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug

Attaching SST PCI device to VM causes "BUG: KASAN: slab-out-of-bounds".
kasan report:
[   19.411889] ==================================================================
[   19.413702] BUG: KASAN: slab-out-of-bounds in _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.415634] Read of size 8 at addr ffff888829e65200 by task cpuhp/16/113
[   19.417368]
[   19.418627] CPU: 16 PID: 113 Comm: cpuhp/16 Tainted: G            E      6.9.0 #10
[   19.420435] Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.20192059.B64.2207280713 07/28/2022
[   19.422687] Call Trace:
[   19.424091]  &lt;TASK&gt;
[   19.425448]  dump_stack_lvl+0x5d/0x80
[   19.426963]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.428694]  print_report+0x19d/0x52e
[   19.430206]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[   19.431837]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.433539]  kasan_report+0xf0/0x170
[   19.435019]  ? _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.436709]  _isst_if_get_pci_dev+0x3d5/0x400 [isst_if_common]
[   19.438379]  ? __pfx_sched_clock_cpu+0x10/0x10
[   19.439910]  isst_if_cpu_online+0x406/0x58f [isst_if_common]
[   19.441573]  ? __pfx_isst_if_cpu_online+0x10/0x10 [isst_if_common]
[   19.443263]  ? ttwu_queue_wakelist+0x2c1/0x360
[   19.444797]  cpuhp_invoke_callback+0x221/0xec0
[   19.446337]  cpuhp_thread_fun+0x21b/0x610
[   19.447814]  ? __pfx_cpuhp_thread_fun+0x10/0x10
[   19.449354]  smpboot_thread_fn+0x2e7/0x6e0
[   19.450859]  ? __pfx_smpboot_thread_fn+0x10/0x10
[   19.452405]  kthread+0x29c/0x350
[   19.453817]  ? __pfx_kthread+0x10/0x10
[   19.455253]  ret_from_fork+0x31/0x70
[   19.456685]  ? __pfx_kthread+0x10/0x10
[   19.458114]  ret_from_fork_asm+0x1a/0x30
[   19.459573]  &lt;/TASK&gt;
[   19.460853]
[   19.462055] Allocated by task 1198:
[   19.463410]  kasan_save_stack+0x30/0x50
[   19.464788]  kasan_save_track+0x14/0x30
[   19.466139]  __kasan_kmalloc+0xaa/0xb0
[   19.467465]  __kmalloc+0x1cd/0x470
[   19.468748]  isst_if_cdev_register+0x1da/0x350 [isst_if_common]
[   19.470233]  isst_if_mbox_init+0x108/0xff0 [isst_if_mbox_msr]
[   19.471670]  do_one_initcall+0xa4/0x380
[   19.472903]  do_init_module+0x238/0x760
[   19.474105]  load_module+0x5239/0x6f00
[   19.475285]  init_module_from_file+0xd1/0x130
[   19.476506]  idempotent_init_module+0x23b/0x650
[   19.477725]  __x64_sys_finit_module+0xbe/0x130
[   19.476506]  idempotent_init_module+0x23b/0x650
[   19.477725]  __x64_sys_finit_module+0xbe/0x130
[   19.478920]  do_syscall_64+0x82/0x160
[   19.480036]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   19.481292]
[   19.482205] The buggy address belongs to the object at ffff888829e65000
 which belongs to the cache kmalloc-512 of size 512
[   19.484818] The buggy address is located 0 bytes to the right of
 allocated 512-byte region [ffff888829e65000, ffff888829e65200)
[   19.487447]
[   19.488328] The buggy address belongs to the physical page:
[   19.489569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888829e60c00 pfn:0x829e60
[   19.491140] head: order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[   19.492466] anon flags: 0x57ffffc0000840(slab|head|node=1|zone=2|lastcpupid=0x1fffff)
[   19.493914] page_type: 0xffffffff()
[   19.494988] raw: 0057ffffc0000840 ffff88810004cc80 0000000000000000 0000000000000001
[   19.496451] raw: ffff888829e60c00 0000000080200018 00000001ffffffff 0000000000000000
[   19.497906] head: 0057ffffc0000840 ffff88810004cc80 0000000000000000 0000000000000001
[   19.499379] head: ffff888829e60c00 0000000080200018 00000001ffffffff 0000000000000000
[   19.500844] head: 0057ffffc0000003 ffffea0020a79801 ffffea0020a79848 00000000ffffffff
[   19.502316] head: 0000000800000000 0000000000000000 00000000ffffffff 0000000000000000
[   19.503784] page dumped because: k
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49886/">CVE-2024-49886 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49886">CVE-2024-49886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232196">SUSE bug 1232196</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49889</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49889" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49889" ref_url="https://www.suse.com/security/cve/CVE-2024-49889" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid use-after-free in ext4_ext_show_leaf()

In ext4_find_extent(), path may be freed by error or be reallocated, so
using a previously saved *ppath may have been freed and thus may trigger
use-after-free, as follows:

ext4_split_extent
  path = *ppath;
  ext4_split_extent_at(ppath)
  path = ext4_find_extent(ppath)
  ext4_split_extent_at(ppath)
    // ext4_find_extent fails to free path
    // but zeroout succeeds
  ext4_ext_show_leaf(inode, path)
    eh = path[depth].p_hdr
    // path use-after-free !!!

Similar to ext4_split_extent_at(), we use *ppath directly as an input to
ext4_ext_show_leaf(). Fix a spelling error by the way.

Same problem in ext4_ext_handle_unwritten_extents(). Since 'path' is only
used in ext4_ext_show_leaf(), remove 'path' and use *ppath directly.

This issue is triggered only when EXT_DEBUG is defined and therefore does
not affect functionality.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49889/">CVE-2024-49889 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49889">CVE-2024-49889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232215">SUSE bug 1232215</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49904</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49904" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49904" ref_url="https://www.suse.com/security/cve/CVE-2024-49904" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add list empty check to avoid null pointer issue

Add list empty check to avoid null pointer issues in some corner cases.
- list_for_each_entry_safe()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49904/">CVE-2024-49904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49904">CVE-2024-49904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232356">SUSE bug 1232356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49927" ref_url="https://www.suse.com/security/cve/CVE-2024-49927" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/ioapic: Handle allocation failures gracefully

Breno observed panics when using failslab under certain conditions during
runtime:

   can not alloc irq_pin_list (-1,0,20)
   Kernel panic - not syncing: IO-APIC: failed to add irq-pin. Can not proceed

   panic+0x4e9/0x590
   mp_irqdomain_alloc+0x9ab/0xa80
   irq_domain_alloc_irqs_locked+0x25d/0x8d0
   __irq_domain_alloc_irqs+0x80/0x110
   mp_map_pin_to_irq+0x645/0x890
   acpi_register_gsi_ioapic+0xe6/0x150
   hpet_open+0x313/0x480

That's a pointless panic which is a leftover of the historic IO/APIC code
which panic'ed during early boot when the interrupt allocation failed.

The only place which might justify panic is the PIT/HPET timer_check() code
which tries to figure out whether the timer interrupt is delivered through
the IO/APIC. But that code does not require to handle interrupt allocation
failures. If the interrupt cannot be allocated then timer delivery fails
and it either panics due to that or falls back to legacy mode.

Cure this by removing the panic wrapper around __add_pin_to_irq_node() and
making mp_irqdomain_alloc() aware of the failure condition and handle it as
any other failure in this function gracefully.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49927/">CVE-2024-49927 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49927">CVE-2024-49927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232249">SUSE bug 1232249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49928" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49928" ref_url="https://www.suse.com/security/cve/CVE-2024-49928" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: avoid reading out of bounds when loading TX power FW elements

Because the loop-expression will do one more time before getting false from
cond-expression, the original code copied one more entry size beyond valid
region.

Fix it by moving the entry copy to loop-body.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49928/">CVE-2024-49928 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49928">CVE-2024-49928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232250">SUSE bug 1232250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49929" ref_url="https://www.suse.com/security/cve/CVE-2024-49929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: avoid NULL pointer dereference

iwl_mvm_tx_skb_sta() and iwl_mvm_tx_mpdu() verify that the mvmvsta
pointer is not NULL.
It retrieves this pointer using iwl_mvm_sta_from_mac80211, which is
dereferencing the ieee80211_sta pointer.
If sta is NULL, iwl_mvm_sta_from_mac80211 will dereference a NULL
pointer.
Fix this by checking the sta pointer before retrieving the mvmsta
from it. If sta is not NULL, then mvmsta isn't either.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49929/">CVE-2024-49929 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49929">CVE-2024-49929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232253">SUSE bug 1232253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49930</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49930" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49930" ref_url="https://www.suse.com/security/cve/CVE-2024-49930" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix array out-of-bound access in SoC stats

Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a
maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx()
function access ath11k_soc_dp_stats::hal_reo_error using the REO
destination SRNG ring ID, which is incorrect. SRNG ring ID differ from
normal ring ID, and this usage leads to out-of-bounds array access. To fix
this issue, modify ath11k_dp_process_rx() to use the normal ring ID
directly instead of the SRNG ring ID to avoid out-of-bounds array access.

Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49930/">CVE-2024-49930 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49930">CVE-2024-49930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232260">SUSE bug 1232260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232261">SUSE bug 1232261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49933" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49933" ref_url="https://www.suse.com/security/cve/CVE-2024-49933" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk_iocost: fix more out of bound shifts

Recently running UBSAN caught few out of bound shifts in the
ioc_forgive_debts() function:

UBSAN: shift-out-of-bounds in block/blk-iocost.c:2142:38
shift exponent 80 is too large for 64-bit type 'u64' (aka 'unsigned long
long')
...
UBSAN: shift-out-of-bounds in block/blk-iocost.c:2144:30
shift exponent 80 is too large for 64-bit type 'u64' (aka 'unsigned long
long')
...
Call Trace:
&lt;IRQ&gt;
dump_stack_lvl+0xca/0x130
__ubsan_handle_shift_out_of_bounds+0x22c/0x280
? __lock_acquire+0x6441/0x7c10
ioc_timer_fn+0x6cec/0x7750
? blk_iocost_init+0x720/0x720
? call_timer_fn+0x5d/0x470
call_timer_fn+0xfa/0x470
? blk_iocost_init+0x720/0x720
__run_timer_base+0x519/0x700
...

Actual impact of this issue was not identified but I propose to fix the
undefined behaviour.
The proposed fix to prevent those out of bound shifts consist of
precalculating exponent before using it the shift operations by taking
min value from the actual exponent and maximum possible number of bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49933/">CVE-2024-49933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49933">CVE-2024-49933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232368">SUSE bug 1232368</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49934" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49934" ref_url="https://www.suse.com/security/cve/CVE-2024-49934" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name

It's observed that a crash occurs during hot-remove a memory device,
in which user is accessing the hugetlb. See calltrace as following:

------------[ cut here ]------------
WARNING: CPU: 1 PID: 14045 at arch/x86/mm/fault.c:1278 do_user_addr_fault+0x2a0/0x790
Modules linked in: kmem device_dax cxl_mem cxl_pmem cxl_port cxl_pci dax_hmem dax_pmem nd_pmem cxl_acpi nd_btt cxl_core crc32c_intel nvme virtiofs fuse nvme_core nfit libnvdimm dm_multipath scsi_dh_rdac scsi_dh_emc s
mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 14045 Comm: daxctl Not tainted 6.10.0-rc2-lizhijian+ #492
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:do_user_addr_fault+0x2a0/0x790
Code: 48 8b 00 a8 04 0f 84 b5 fe ff ff e9 1c ff ff ff 4c 89 e9 4c 89 e2 be 01 00 00 00 bf 02 00 00 00 e8 b5 ef 24 00 e9 42 fe ff ff &lt;0f&gt; 0b 48 83 c4 08 4c 89 ea 48 89 ee 4c 89 e7 5b 5d 41 5c 41 5d 41
RSP: 0000:ffffc90000a575f0 EFLAGS: 00010046
RAX: ffff88800c303600 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000001000 RSI: ffffffff82504162 RDI: ffffffff824b2c36
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffc90000a57658
R13: 0000000000001000 R14: ffff88800bc2e040 R15: 0000000000000000
FS:  00007f51cb57d880(0000) GS:ffff88807fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000001000 CR3: 00000000072e2004 CR4: 00000000001706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x8d/0x190
 ? do_user_addr_fault+0x2a0/0x790
 ? report_bug+0x1c3/0x1d0
 ? handle_bug+0x3c/0x70
 ? exc_invalid_op+0x14/0x70
 ? asm_exc_invalid_op+0x16/0x20
 ? do_user_addr_fault+0x2a0/0x790
 ? exc_page_fault+0x31/0x200
 exc_page_fault+0x68/0x200
&lt;...snip...&gt;
BUG: unable to handle page fault for address: 0000000000001000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0
 Oops: Oops: 0000 [#1] PREEMPT SMP PTI
 ---[ end trace 0000000000000000 ]---
 BUG: unable to handle page fault for address: 0000000000001000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0
 Oops: Oops: 0000 [#1] PREEMPT SMP PTI
 CPU: 1 PID: 14045 Comm: daxctl Kdump: loaded Tainted: G        W          6.10.0-rc2-lizhijian+ #492
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
 RIP: 0010:dentry_name+0x1f4/0x440
&lt;...snip...&gt;
? dentry_name+0x2fa/0x440
vsnprintf+0x1f3/0x4f0
vprintk_store+0x23a/0x540
vprintk_emit+0x6d/0x330
_printk+0x58/0x80
dump_mapping+0x10b/0x1a0
? __pfx_free_object_rcu+0x10/0x10
__dump_page+0x26b/0x3e0
? vprintk_emit+0xe0/0x330
? _printk+0x58/0x80
? dump_page+0x17/0x50
dump_page+0x17/0x50
do_migrate_range+0x2f7/0x7f0
? do_migrate_range+0x42/0x7f0
? offline_pages+0x2f4/0x8c0
offline_pages+0x60a/0x8c0
memory_subsys_offline+0x9f/0x1c0
? lockdep_hardirqs_on+0x77/0x100
? _raw_spin_unlock_irqrestore+0x38/0x60
device_offline+0xe3/0x110
state_store+0x6e/0xc0
kernfs_fop_write_iter+0x143/0x200
vfs_write+0x39f/0x560
ksys_write+0x65/0xf0
do_syscall_64+0x62/0x130

Previously, some sanity check have been done in dump_mapping() before
the print facility parsing '%pd' though, it's still possible to run into
an invalid dentry.d_name.name.

Since dump_mapping() only needs to dump the filename only, retrieve it
by itself in a safer way to prevent an unnecessary crash.

Note that either retrieving the filename with '%pd' or
strncpy_from_kernel_nofault(), the filename could be unreliable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49934/">CVE-2024-49934 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49934">CVE-2024-49934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232387">SUSE bug 1232387</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49935" ref_url="https://www.suse.com/security/cve/CVE-2024-49935" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: PAD: fix crash in exit_round_robin()

The kernel occasionally crashes in cpumask_clear_cpu(), which is called
within exit_round_robin(), because when executing clear_bit(nr, addr) with
nr set to 0xffffffff, the address calculation may cause misalignment within
the memory, leading to access to an invalid memory address.

----------
BUG: unable to handle kernel paging request at ffffffffe0740618
        ...
CPU: 3 PID: 2919323 Comm: acpi_pad/14 Kdump: loaded Tainted: G           OE  X --------- -  - 4.18.0-425.19.2.el8_7.x86_64 #1
        ...
RIP: 0010:power_saving_thread+0x313/0x411 [acpi_pad]
Code: 89 cd 48 89 d3 eb d1 48 c7 c7 55 70 72 c0 e8 64 86 b0 e4 c6 05 0d a1 02 00 01 e9 bc fd ff ff 45 89 e4 42 8b 04 a5 20 82 72 c0 &lt;f0&gt; 48 0f b3 05 f4 9c 01 00 42 c7 04 a5 20 82 72 c0 ff ff ff ff 31
RSP: 0018:ff72a5d51fa77ec8 EFLAGS: 00010202
RAX: 00000000ffffffff RBX: ff462981e5d8cb80 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246
RBP: ff46297556959d80 R08: 0000000000000382 R09: ff46297c8d0f38d8
R10: 0000000000000000 R11: 0000000000000001 R12: 000000000000000e
R13: 0000000000000000 R14: ffffffffffffffff R15: 000000000000000e
FS:  0000000000000000(0000) GS:ff46297a800c0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffe0740618 CR3: 0000007e20410004 CR4: 0000000000771ee0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 ? acpi_pad_add+0x120/0x120 [acpi_pad]
 kthread+0x10b/0x130
 ? set_kthread_struct+0x50/0x50
 ret_from_fork+0x1f/0x40
        ...
CR2: ffffffffe0740618

crash&gt; dis -lr ffffffffc0726923
        ...
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./include/linux/cpumask.h: 114
0xffffffffc0726918 &lt;power_saving_thread+776&gt;:	mov    %r12d,%r12d
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./include/linux/cpumask.h: 325
0xffffffffc072691b &lt;power_saving_thread+779&gt;:	mov    -0x3f8d7de0(,%r12,4),%eax
/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./arch/x86/include/asm/bitops.h: 80
0xffffffffc0726923 &lt;power_saving_thread+787&gt;:	lock btr %rax,0x19cf4(%rip)        # 0xffffffffc0740620 &lt;pad_busy_cpus_bits&gt;

crash&gt; px tsk_in_cpu[14]
$66 = 0xffffffff

crash&gt; px 0xffffffffc072692c+0x19cf4
$99 = 0xffffffffc0740620

crash&gt; sym 0xffffffffc0740620
ffffffffc0740620 (b) pad_busy_cpus_bits [acpi_pad]

crash&gt; px pad_busy_cpus_bits[0]
$42 = 0xfffc0
----------

To fix this, ensure that tsk_in_cpu[tsk_index] != -1 before calling
cpumask_clear_cpu() in exit_round_robin(), just as it is done in
round_robin_cpu().

[ rjw: Subject edit, avoid updates to the same value ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49935/">CVE-2024-49935 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49935">CVE-2024-49935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232370">SUSE bug 1232370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49937" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49937" ref_url="https://www.suse.com/security/cve/CVE-2024-49937" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Set correct chandef when starting CAC

When starting CAC in a mode other than AP mode, it return a
"WARNING: CPU: 0 PID: 63 at cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]"
caused by the chandef.chan being null at the end of CAC.

Solution: Ensure the channel definition is set for the different modes
when starting CAC to avoid getting a NULL 'chan' at the end of CAC.

 Call Trace:
  ? show_regs.part.0+0x14/0x16
  ? __warn+0x67/0xc0
  ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]
  ? report_bug+0xa7/0x130
  ? exc_overflow+0x30/0x30
  ? handle_bug+0x27/0x50
  ? exc_invalid_op+0x18/0x60
  ? handle_exception+0xf6/0xf6
  ? exc_overflow+0x30/0x30
  ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]
  ? exc_overflow+0x30/0x30
  ? cfg80211_chandef_dfs_usable+0x20/0xaf [cfg80211]
  ? regulatory_propagate_dfs_state.cold+0x1b/0x4c [cfg80211]
  ? cfg80211_propagate_cac_done_wk+0x1a/0x30 [cfg80211]
  ? process_one_work+0x165/0x280
  ? worker_thread+0x120/0x3f0
  ? kthread+0xc2/0xf0
  ? process_one_work+0x280/0x280
  ? kthread_complete_and_exit+0x20/0x20
  ? ret_from_fork+0x19/0x24

[shorten subject, remove OCB, reorder cases to match previous list]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49937/">CVE-2024-49937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49937">CVE-2024-49937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232427">SUSE bug 1232427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49938" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49938" ref_url="https://www.suse.com/security/cve/CVE-2024-49938" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit

Syzbot points out that skb_trim() has a sanity check on the existing length of
the skb, which can be uninitialised in some error paths. The intent here is
clearly just to reset the length to zero before resubmitting, so switch to
calling __skb_set_length(skb, 0) directly. In addition, __skb_set_length()
already contains a call to skb_reset_tail_pointer(), so remove the redundant
call.

The syzbot report came from ath9k_hif_usb_reg_in_cb(), but there's a similar
usage of skb_trim() in ath9k_hif_usb_rx_cb(), change both while we're at it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49938/">CVE-2024-49938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49938">CVE-2024-49938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232552">SUSE bug 1232552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49939</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49939" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49939" ref_url="https://www.suse.com/security/cve/CVE-2024-49939" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: avoid to add interface to list twice when SER

If SER L2 occurs during the WoWLAN resume flow, the add interface flow
is triggered by ieee80211_reconfig(). However, due to
rtw89_wow_resume() return failure, it will cause the add interface flow
to be executed again, resulting in a double add list and causing a kernel
panic. Therefore, we have added a check to prevent double adding of the
list.

list_add double add: new=ffff99d6992e2010, prev=ffff99d6992e2010, next=ffff99d695302628.
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:37!
invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 0 PID: 9 Comm: kworker/0:1 Tainted: G        W  O       6.6.30-02659-gc18865c4dfbd #1 770df2933251a0e3c888ba69d1053a817a6376a7
Hardware name: HP Grunt/Grunt, BIOS Google_Grunt.11031.169.0 06/24/2021
Workqueue: events_freezable ieee80211_restart_work [mac80211]
RIP: 0010:__list_add_valid_or_report+0x5e/0xb0
Code: c7 74 18 48 39 ce 74 13 b0 01 59 5a 5e 5f 41 58 41 59 41 5a 5d e9 e2 d6 03 00 cc 48 c7 c7 8d 4f 17 83 48 89 c2 e8 02 c0 00 00 &lt;0f&gt; 0b 48 c7 c7 aa 8c 1c 83 e8 f4 bf 00 00 0f 0b 48 c7 c7 c8 bc 12
RSP: 0018:ffffa91b8007bc50 EFLAGS: 00010246
RAX: 0000000000000058 RBX: ffff99d6992e0900 RCX: a014d76c70ef3900
RDX: ffffa91b8007bae8 RSI: 00000000ffffdfff RDI: 0000000000000001
RBP: ffffa91b8007bc88 R08: 0000000000000000 R09: ffffa91b8007bae0
R10: 00000000ffffdfff R11: ffffffff83a79800 R12: ffff99d695302060
R13: ffff99d695300900 R14: ffff99d6992e1be0 R15: ffff99d6992e2010
FS:  0000000000000000(0000) GS:ffff99d6aac00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000078fbdba43480 CR3: 000000010e464000 CR4: 00000000001506f0
Call Trace:
 &lt;TASK&gt;
 ? __die_body+0x1f/0x70
 ? die+0x3d/0x60
 ? do_trap+0xa4/0x110
 ? __list_add_valid_or_report+0x5e/0xb0
 ? do_error_trap+0x6d/0x90
 ? __list_add_valid_or_report+0x5e/0xb0
 ? handle_invalid_op+0x30/0x40
 ? __list_add_valid_or_report+0x5e/0xb0
 ? exc_invalid_op+0x3c/0x50
 ? asm_exc_invalid_op+0x16/0x20
 ? __list_add_valid_or_report+0x5e/0xb0
 rtw89_ops_add_interface+0x309/0x310 [rtw89_core 7c32b1ee6854761c0321027c8a58c5160e41f48f]
 drv_add_interface+0x5c/0x130 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 ieee80211_reconfig+0x241/0x13d0 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 ? finish_wait+0x3e/0x90
 ? synchronize_rcu_expedited+0x174/0x260
 ? sync_rcu_exp_done_unlocked+0x50/0x50
 ? wake_bit_function+0x40/0x40
 ieee80211_restart_work+0xf0/0x140 [mac80211 83e989e6e616bd5b4b8a2b0a9f9352a2c385a3bc]
 process_scheduled_works+0x1e5/0x480
 worker_thread+0xea/0x1e0
 kthread+0xdb/0x110
 ? move_linked_works+0x90/0x90
 ? kthread_associate_blkcg+0xa0/0xa0
 ret_from_fork+0x3b/0x50
 ? kthread_associate_blkcg+0xa0/0xa0
 ret_from_fork_asm+0x11/0x20
 &lt;/TASK&gt;
Modules linked in: dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc rfcomm cmac uinput algif_hash algif_skcipher af_alg btusb btrtl iio_trig_hrtimer industrialio_sw_trigger btmtk industrialio_configfs btbcm btintel uvcvideo videobuf2_vmalloc iio_trig_sysfs videobuf2_memops videobuf2_v4l2 videobuf2_common uvc snd_hda_codec_hdmi veth snd_hda_intel snd_intel_dspcfg acpi_als snd_hda_codec industrialio_triggered_buffer kfifo_buf snd_hwdep industrialio i2c_piix4 snd_hda_core designware_i2s ip6table_nat snd_soc_max98357a xt_MASQUERADE xt_cgroup snd_soc_acp_rt5682_mach fuse rtw89_8922ae(O) rtw89_8922a(O) rtw89_pci(O) rtw89_core(O) 8021q mac80211(O) bluetooth ecdh_generic ecc cfg80211 r8152 mii joydev
gsmi: Log Shutdown Reason 0x03
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49939/">CVE-2024-49939 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49939">CVE-2024-49939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232381">SUSE bug 1232381</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49946</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49946" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49946" ref_url="https://www.suse.com/security/cve/CVE-2024-49946" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: do not assume bh is held in ppp_channel_bridge_input()

Networking receive path is usually handled from BH handler.
However, some protocols need to acquire the socket lock, and
packets might be stored in the socket backlog is the socket was
owned by a user process.

In this case, release_sock(), __release_sock(), and sk_backlog_rcv()
might call the sk-&gt;sk_backlog_rcv() handler in process context.

sybot caught ppp was not considering this case in
ppp_channel_bridge_input() :

WARNING: inconsistent lock state
6.11.0-rc7-syzkaller-g5f5673607153 #0 Not tainted
--------------------------------
inconsistent {SOFTIRQ-ON-W} -&gt; {IN-SOFTIRQ-W} usage.
ksoftirqd/1/24 [HC0[0]:SC1[1]:HE1:SE0] takes:
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
 ffff0000db7f11e0 (&amp;pch-&gt;downl){+.?.}-{2:2}, at: ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304
{SOFTIRQ-ON-W} state was registered at:
   lock_acquire+0x240/0x728 kernel/locking/lockdep.c:5759
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x48/0x60 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2272 [inline]
   ppp_input+0x16c/0x854 drivers/net/ppp/ppp_generic.c:2304
   pppoe_rcv_core+0xfc/0x314 drivers/net/ppp/pppoe.c:379
   sk_backlog_rcv include/net/sock.h:1111 [inline]
   __release_sock+0x1a8/0x3d8 net/core/sock.c:3004
   release_sock+0x68/0x1b8 net/core/sock.c:3558
   pppoe_sendmsg+0xc8/0x5d8 drivers/net/ppp/pppoe.c:903
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg net/socket.c:745 [inline]
   __sys_sendto+0x374/0x4f4 net/socket.c:2204
   __do_sys_sendto net/socket.c:2216 [inline]
   __se_sys_sendto net/socket.c:2212 [inline]
   __arm64_sys_sendto+0xd8/0xf8 net/socket.c:2212
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
   el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
   el0_svc+0x54/0x168 arch/arm64/kernel/entry-common.c:712
   el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:730
   el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:598
irq event stamp: 282914
 hardirqs last  enabled at (282914): [&lt;ffff80008b42e30c&gt;] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
 hardirqs last  enabled at (282914): [&lt;ffff80008b42e30c&gt;] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194
 hardirqs last disabled at (282913): [&lt;ffff80008b42e13c&gt;] __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:108 [inline]
 hardirqs last disabled at (282913): [&lt;ffff80008b42e13c&gt;] _raw_spin_lock_irqsave+0x2c/0x7c kernel/locking/spinlock.c:162
 softirqs last  enabled at (282904): [&lt;ffff8000801f8e88&gt;] softirq_handle_end kernel/softirq.c:400 [inline]
 softirqs last  enabled at (282904): [&lt;ffff8000801f8e88&gt;] handle_softirqs+0xa3c/0xbfc kernel/softirq.c:582
 softirqs last disabled at (282909): [&lt;ffff8000801fbdf8&gt;] run_ksoftirqd+0x70/0x158 kernel/softirq.c:928

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&amp;pch-&gt;downl);
  &lt;Interrupt&gt;
    lock(&amp;pch-&gt;downl);

 *** DEADLOCK ***

1 lock held by ksoftirqd/1/24:
  #0: ffff80008f74dfa0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x10/0x4c include/linux/rcupdate.h:325

stack backtrace:
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.11.0-rc7-syzkaller-g5f5673607153 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call trace:
  dump_backtrace+0x1b8/0x1e4 arch/arm64/kernel/stacktrace.c:319
  show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:326
  __dump_sta
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49946/">CVE-2024-49946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49946">CVE-2024-49946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232164">SUSE bug 1232164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49948" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49948" ref_url="https://www.suse.com/security/cve/CVE-2024-49948" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: add more sanity checks to qdisc_pkt_len_init()

One path takes care of SKB_GSO_DODGY, assuming
skb-&gt;len is bigger than hdr_len.

virtio_net_hdr_to_skb() does not fully dissect TCP headers,
it only make sure it is at least 20 bytes.

It is possible for an user to provide a malicious 'GSO' packet,
total length of 80 bytes.

- 20 bytes of IPv4 header
- 60 bytes TCP header
- a small gso_size like 8

virtio_net_hdr_to_skb() would declare this packet as a normal
GSO packet, because it would see 40 bytes of payload,
bigger than gso_size.

We need to make detect this case to not underflow
qdisc_skb_cb(skb)-&gt;pkt_len.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49948/">CVE-2024-49948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49948">CVE-2024-49948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232161">SUSE bug 1232161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49949</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49949" ref_url="https://www.suse.com/security/cve/CVE-2024-49949" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: avoid potential underflow in qdisc_pkt_len_init() with UFO

After commit 7c6d2ecbda83 ("net: be more gentle about silly gso
requests coming from user") virtio_net_hdr_to_skb() had sanity check
to detect malicious attempts from user space to cook a bad GSO packet.

Then commit cf9acc90c80ec ("net: virtio_net_hdr_to_skb: count
transport header in UFO") while fixing one issue, allowed user space
to cook a GSO packet with the following characteristic :

IPv4 SKB_GSO_UDP, gso_size=3, skb-&gt;len = 28.

When this packet arrives in qdisc_pkt_len_init(), we end up
with hdr_len = 28 (IPv4 header + UDP header), matching skb-&gt;len

Then the following sets gso_segs to 0 :

gso_segs = DIV_ROUND_UP(skb-&gt;len - hdr_len,
                        shinfo-&gt;gso_size);

Then later we set qdisc_skb_cb(skb)-&gt;pkt_len to back to zero :/

qdisc_skb_cb(skb)-&gt;pkt_len += (gso_segs - 1) * hdr_len;

This leads to the following crash in fq_codel [1]

qdisc_pkt_len_init() is best effort, we only want an estimation
of the bytes sent on the wire, not crashing the kernel.

This patch is fixing this particular issue, a following one
adds more sanity checks for another potential bug.

[1]
[   70.724101] BUG: kernel NULL pointer dereference, address: 0000000000000000
[   70.724561] #PF: supervisor read access in kernel mode
[   70.724561] #PF: error_code(0x0000) - not-present page
[   70.724561] PGD 10ac61067 P4D 10ac61067 PUD 107ee2067 PMD 0
[   70.724561] Oops: Oops: 0000 [#1] SMP NOPTI
[   70.724561] CPU: 11 UID: 0 PID: 2163 Comm: b358537762 Not tainted 6.11.0-virtme #991
[   70.724561] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   70.724561] RIP: 0010:fq_codel_enqueue (net/sched/sch_fq_codel.c:120 net/sched/sch_fq_codel.c:168 net/sched/sch_fq_codel.c:230) sch_fq_codel
[ 70.724561] Code: 24 08 49 c1 e1 06 44 89 7c 24 18 45 31 ed 45 31 c0 31 ff 89 44 24 14 4c 03 8b 90 01 00 00 eb 04 39 ca 73 37 4d 8b 39 83 c7 01 &lt;49&gt; 8b 17 49 89 11 41 8b 57 28 45 8b 5f 34 49 c7 07 00 00 00 00 49
All code
========
   0:	24 08                	and    $0x8,%al
   2:	49 c1 e1 06          	shl    $0x6,%r9
   6:	44 89 7c 24 18       	mov    %r15d,0x18(%rsp)
   b:	45 31 ed             	xor    %r13d,%r13d
   e:	45 31 c0             	xor    %r8d,%r8d
  11:	31 ff                	xor    %edi,%edi
  13:	89 44 24 14          	mov    %eax,0x14(%rsp)
  17:	4c 03 8b 90 01 00 00 	add    0x190(%rbx),%r9
  1e:	eb 04                	jmp    0x24
  20:	39 ca                	cmp    %ecx,%edx
  22:	73 37                	jae    0x5b
  24:	4d 8b 39             	mov    (%r9),%r15
  27:	83 c7 01             	add    $0x1,%edi
  2a:*	49 8b 17             	mov    (%r15),%rdx		&lt;-- trapping instruction
  2d:	49 89 11             	mov    %rdx,(%r9)
  30:	41 8b 57 28          	mov    0x28(%r15),%edx
  34:	45 8b 5f 34          	mov    0x34(%r15),%r11d
  38:	49 c7 07 00 00 00 00 	movq   $0x0,(%r15)
  3f:	49                   	rex.WB

Code starting with the faulting instruction
===========================================
   0:	49 8b 17             	mov    (%r15),%rdx
   3:	49 89 11             	mov    %rdx,(%r9)
   6:	41 8b 57 28          	mov    0x28(%r15),%edx
   a:	45 8b 5f 34          	mov    0x34(%r15),%r11d
   e:	49 c7 07 00 00 00 00 	movq   $0x0,(%r15)
  15:	49                   	rex.WB
[   70.724561] RSP: 0018:ffff95ae85e6fb90 EFLAGS: 00000202
[   70.724561] RAX: 0000000002000000 RBX: ffff95ae841de000 RCX: 0000000000000000
[   70.724561] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001
[   70.724561] RBP: ffff95ae85e6fbf8 R08: 0000000000000000 R09: ffff95b710a30000
[   70.724561] R10: 0000000000000000 R11: bdf289445ce31881 R12: ffff95ae85e6fc58
[   70.724561] R13: 0000000000000000 R14: 0000000000000040 R15: 0000000000000000
[   70.724561] FS:  000000002c5c1380(0000) GS:ffff95bd7fcc0000(0000) knlGS:0000000000000000
[   70.724561] CS:  0010 DS: 0000 ES: 0000 C
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49949/">CVE-2024-49949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49949">CVE-2024-49949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232160">SUSE bug 1232160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957437" comment="bpftool-7.4.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957438" comment="kernel-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957439" comment="kernel-abi-stablelists-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957440" comment="kernel-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957441" comment="kernel-cross-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957442" comment="kernel-debug-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957443" comment="kernel-debug-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957446" comment="kernel-debug-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957447" comment="kernel-debug-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957448" comment="kernel-debug-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957449" comment="kernel-debug-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957452" comment="kernel-doc-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957453" comment="kernel-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957454" comment="kernel-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957455" comment="kernel-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957456" comment="kernel-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957457" comment="kernel-tools-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957458" comment="kernel-tools-libs-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957460" comment="kernel-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957461" comment="kernel-uki-virt-addons-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957462" comment="libperf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957463" comment="perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957464" comment="python3-perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957465" comment="rtla-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957466" comment="rv-5.14.0-503.16.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49950</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49950" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49950" ref_url="https://www.suse.com/security/cve/CVE-2024-49950" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix uaf in l2cap_connect

[Syzbot reported]
BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949
Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54

CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: hci2 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0xc3/0x620 mm/kasan/report.c:488
 kasan_report+0xd9/0x110 mm/kasan/report.c:601
 l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949
 l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline]
 l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline]
 l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline]
 l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825
 l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514
 hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline]
 hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
...

Freed by task 5245:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579
 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240
 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2256 [inline]
 slab_free mm/slub.c:4477 [inline]
 kfree+0x12a/0x3b0 mm/slub.c:4598
 l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline]
 kref_put include/linux/kref.h:65 [inline]
 l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline]
 l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802
 l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241
 hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline]
 hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265
 hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583
 abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917
 hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328
 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231
 process_scheduled_works kernel/workqueue.c:3312 [inline]
 worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389
 kthread+0x2c1/0x3a0 kernel/kthread.c:389
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49950/">CVE-2024-49950 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49950">CVE-2024-49950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232159">SUSE bug 1232159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49951</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49951" ref_url="https://www.suse.com/security/cve/CVE-2024-49951" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix possible crash on mgmt_index_removed

If mgmt_index_removed is called while there are commands queued on
cmd_sync it could lead to crashes like the bellow trace:

0x0000053D: __list_del_entry_valid_or_report+0x98/0xdc
0x0000053D: mgmt_pending_remove+0x18/0x58 [bluetooth]
0x0000053E: mgmt_remove_adv_monitor_complete+0x80/0x108 [bluetooth]
0x0000053E: hci_cmd_sync_work+0xbc/0x164 [bluetooth]

So while handling mgmt_index_removed this attempts to dequeue
commands passed as user_data to cmd_sync.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49951/">CVE-2024-49951 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49951">CVE-2024-49951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232158">SUSE bug 1232158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49954</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49954" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49954" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49954" ref_url="https://www.suse.com/security/cve/CVE-2024-49954" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

static_call: Replace pointless WARN_ON() in static_call_module_notify()

static_call_module_notify() triggers a WARN_ON(), when memory allocation
fails in __static_call_add_module().

That's not really justified, because the failure case must be correctly
handled by the well known call chain and the error code is passed
through to the initiating userspace application.

A memory allocation fail is not a fatal problem, but the WARN_ON() takes
the machine out when panic_on_warn is set.

Replace it with a pr_warn().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49954/">CVE-2024-49954 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49954">CVE-2024-49954 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232155">SUSE bug 1232155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49959</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49959" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49959" ref_url="https://www.suse.com/security/cve/CVE-2024-49959" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error

In __jbd2_log_wait_for_space(), we might call jbd2_cleanup_journal_tail()
to recover some journal space. But if an error occurs while executing
jbd2_cleanup_journal_tail() (e.g., an EIO), we don't stop waiting for free
space right away, we try other branches, and if j_committing_transaction
is NULL (i.e., the tid is 0), we will get the following complain:

============================================
JBD2: I/O error when updating journal superblock for sdd-8.
__jbd2_log_wait_for_space: needed 256 blocks and only had 217 space available
__jbd2_log_wait_for_space: no way to get more journal space in sdd-8
------------[ cut here ]------------
WARNING: CPU: 2 PID: 139804 at fs/jbd2/checkpoint.c:109 __jbd2_log_wait_for_space+0x251/0x2e0
Modules linked in:
CPU: 2 PID: 139804 Comm: kworker/u8:3 Not tainted 6.6.0+ #1
RIP: 0010:__jbd2_log_wait_for_space+0x251/0x2e0
Call Trace:
 &lt;TASK&gt;
 add_transaction_credits+0x5d1/0x5e0
 start_this_handle+0x1ef/0x6a0
 jbd2__journal_start+0x18b/0x340
 ext4_dirty_inode+0x5d/0xb0
 __mark_inode_dirty+0xe4/0x5d0
 generic_update_time+0x60/0x70
[...]
============================================

So only if jbd2_cleanup_journal_tail() returns 1, i.e., there is nothing to
clean up at the moment, continue to try to reclaim free space in other ways.

Note that this fix relies on commit 6f6a6fda2945 ("jbd2: fix ocfs2 corrupt
when updating journal superblock fails") to make jbd2_cleanup_journal_tail
return the correct error code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49959/">CVE-2024-49959 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49959">CVE-2024-49959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232149">SUSE bug 1232149</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49960</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49960" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49960" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49960" ref_url="https://www.suse.com/security/cve/CVE-2024-49960" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix timer use-after-free on failed mount

Syzbot has found an ODEBUG bug in ext4_fill_super

The del_timer_sync function cancels the s_err_report timer,
which reminds about filesystem errors daily. We should
guarantee the timer is no longer active before kfree(sbi).

When filesystem mounting fails, the flow goes to failed_mount3,
where an error occurs when ext4_stop_mmpd is called, causing
a read I/O failure. This triggers the ext4_handle_error function
that ultimately re-arms the timer,
leaving the s_err_report timer active before kfree(sbi) is called.

Fix the issue by canceling the s_err_report timer after calling ext4_stop_mmpd.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49960/">CVE-2024-49960 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49960">CVE-2024-49960 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232395">SUSE bug 1232395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232803">SUSE bug 1232803</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49962" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49962" ref_url="https://www.suse.com/security/cve/CVE-2024-49962" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()

ACPICA commit 4d4547cf13cca820ff7e0f859ba83e1a610b9fd0

ACPI_ALLOCATE_ZEROED() may fail, elements might be NULL and will cause
NULL pointer dereference later.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49962/">CVE-2024-49962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49962">CVE-2024-49962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232314">SUSE bug 1232314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49967</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49967" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49967" ref_url="https://www.suse.com/security/cve/CVE-2024-49967" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49967/">CVE-2024-49967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49967">CVE-2024-49967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232140">SUSE bug 1232140</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49968" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49968" ref_url="https://www.suse.com/security/cve/CVE-2024-49968" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: filesystems without casefold feature cannot be mounted with siphash

When mounting the ext4 filesystem, if the default hash version is set to
DX_HASH_SIPHASH but the casefold feature is not set, exit the mounting.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49968/">CVE-2024-49968 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49968">CVE-2024-49968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232264">SUSE bug 1232264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49971" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49971" ref_url="https://www.suse.com/security/cve/CVE-2024-49971" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Increase array size of dummy_boolean

[WHY]
dml2_core_shared_mode_support and dml_core_mode_support access the third
element of dummy_boolean, i.e. hw_debug5 = &amp;s-&gt;dummy_boolean[2], when
dummy_boolean has size of 2. Any assignment to hw_debug5 causes an
OVERRUN.

[HOW]
Increase dummy_boolean's array size to 3.

This fixes 2 OVERRUN issues reported by Coverity.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49971/">CVE-2024-49971 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49971">CVE-2024-49971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232473">SUSE bug 1232473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49973" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49973" ref_url="https://www.suse.com/security/cve/CVE-2024-49973" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

r8169: add tally counter fields added with RTL8125

RTL8125 added fields to the tally counter, what may result in the chip
dma'ing these new fields to unallocated memory. Therefore make sure
that the allocated memory area is big enough to hold all of the
tally counter values, even if we use only parts of it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49973/">CVE-2024-49973 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49973">CVE-2024-49973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232105">SUSE bug 1232105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49974</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49974" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49974" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49974" ref_url="https://www.suse.com/security/cve/CVE-2024-49974" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Limit the number of concurrent async COPY operations

Nothing appears to limit the number of concurrent async COPY
operations that clients can start. In addition, AFAICT each async
COPY can copy an unlimited number of 4MB chunks, so can run for a
long time. Thus IMO async COPY can become a DoS vector.

Add a restriction mechanism that bounds the number of concurrent
background COPY operations. Start simple and try to be fair -- this
patch implements a per-namespace limit.

An async COPY request that occurs while this limit is exceeded gets
NFS4ERR_DELAY. The requesting client can choose to send the request
again after a delay or fall back to a traditional read/write style
copy.

If there is need to make the mechanism more sophisticated, we can
visit that in future patches.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49974/">CVE-2024-49974 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49974">CVE-2024-49974 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232383">SUSE bug 1232383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232384">SUSE bug 1232384</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49975</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49975" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49975" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49975" ref_url="https://www.suse.com/security/cve/CVE-2024-49975" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uprobes: fix kernel info leak via "[uprobes]" vma

xol_add_vma() maps the uninitialized page allocated by __create_xol_area()
into userspace. On some architectures (x86) this memory is readable even
without VM_READ, VM_EXEC results in the same pgprot_t as VM_EXEC|VM_READ,
although this doesn't really matter, debugger can read this memory anyway.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49975/">CVE-2024-49975 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49975">CVE-2024-49975 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232104">SUSE bug 1232104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49977</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49977" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49977" ref_url="https://www.suse.com/security/cve/CVE-2024-49977" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: Fix zero-division error when disabling tc cbs

The commit b8c43360f6e4 ("net: stmmac: No need to calculate speed divider
when offload is disabled") allows the "port_transmit_rate_kbps" to be
set to a value of 0, which is then passed to the "div_s64" function when
tc-cbs is disabled. This leads to a zero-division error.

When tc-cbs is disabled, the idleslope, sendslope, and credit values the
credit values are not required to be configured. Therefore, adding a return
statement after setting the txQ mode to DCB when tc-cbs is disabled would
prevent a zero-division error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49977/">CVE-2024-49977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49977">CVE-2024-49977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232102">SUSE bug 1232102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49983" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49983" ref_url="https://www.suse.com/security/cve/CVE-2024-49983" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free

When calling ext4_force_split_extent_at() in ext4_ext_replay_update_ex(),
the 'ppath' is updated but it is the 'path' that is freed, thus potentially
triggering a double-free in the following process:

ext4_ext_replay_update_ex
  ppath = path
  ext4_force_split_extent_at(&amp;ppath)
    ext4_split_extent_at
      ext4_ext_insert_extent
        ext4_ext_create_new_leaf
          ext4_ext_grow_indepth
            ext4_find_extent
              if (depth &gt; path[0].p_maxdepth)
                kfree(path)                 ---&gt; path First freed
                *orig_path = path = NULL    ---&gt; null ppath
  kfree(path)                               ---&gt; path double-free !!!

So drop the unnecessary ppath and use path directly to avoid this problem.
And use ext4_find_extent() directly to update path, avoiding unnecessary
memory allocation and freeing. Also, propagate the error returned by
ext4_find_extent() instead of using strange error codes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49983/">CVE-2024-49983 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49983">CVE-2024-49983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232096">SUSE bug 1232096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49991</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49991" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49991" ref_url="https://www.suse.com/security/cve/CVE-2024-49991" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer

Pass pointer reference to amdgpu_bo_unref to clear the correct pointer,
otherwise amdgpu_bo_unref clear the local variable, the original pointer
not set to NULL, this could cause use-after-free bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49991/">CVE-2024-49991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49991">CVE-2024-49991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232282">SUSE bug 1232282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232284">SUSE bug 1232284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49993" ref_url="https://www.suse.com/security/cve/CVE-2024-49993" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49993/">CVE-2024-49993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49993">CVE-2024-49993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232316">SUSE bug 1232316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49994" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49994" ref_url="https://www.suse.com/security/cve/CVE-2024-49994" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix integer overflow in BLKSECDISCARD

I independently rediscovered

	commit 22d24a544b0d49bbcbd61c8c0eaf77d3c9297155
	block: fix overflow in blk_ioctl_discard()

but for secure erase.

Same problem:

	uint64_t r[2] = {512, 18446744073709551104ULL};
	ioctl(fd, BLKSECDISCARD, r);

will enter near infinite loop inside blkdev_issue_secure_erase():

	a.out: attempt to access beyond end of device
	loop0: rw=5, sector=3399043073, nr_sectors = 1024 limit=2048
	bio_check_eod: 3286214 callbacks suppressed
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49994/">CVE-2024-49994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49994">CVE-2024-49994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237757">SUSE bug 1237757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49995</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49995" ref_url="https://www.suse.com/security/cve/CVE-2024-49995" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-49995/">CVE-2024-49995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49995">CVE-2024-49995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232432">SUSE bug 1232432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232433">SUSE bug 1232433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202449999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-49999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-49999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49999" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-49999" ref_url="https://www.suse.com/security/cve/CVE-2024-49999" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix the setting of the server responding flag

In afs_wait_for_operation(), we set transcribe the call responded flag to
the server record that we used after doing the fileserver iteration loop -
but it's possible to exit the loop having had a response from the server
that we've discarded (e.g. it returned an abort or we started receiving
data, but the call didn't complete).

This means that op-&gt;server might be NULL, but we don't check that before
attempting to set the server flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-49999/">CVE-2024-49999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-49999">CVE-2024-49999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232086">SUSE bug 1232086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50002" ref_url="https://www.suse.com/security/cve/CVE-2024-50002" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

static_call: Handle module init failure correctly in static_call_del_module()

Module insertion invokes static_call_add_module() to initialize the static
calls in a module. static_call_add_module() invokes __static_call_init(),
which allocates a struct static_call_mod to either encapsulate the built-in
static call sites of the associated key into it so further modules can be
added or to append the module to the module chain.

If that allocation fails the function returns with an error code and the
module core invokes static_call_del_module() to clean up eventually added
static_call_mod entries.

This works correctly, when all keys used by the module were converted over
to a module chain before the failure. If not then static_call_del_module()
causes a #GP as it blindly assumes that key::mods points to a valid struct
static_call_mod.

The problem is that key::mods is not a individual struct member of struct
static_call_key, it's part of a union to save space:

        union {
                /* bit 0: 0 = mods, 1 = sites */
                unsigned long type;
                struct static_call_mod *mods;
                struct static_call_site *sites;
	};

key::sites is a pointer to the list of built-in usage sites of the static
call. The type of the pointer is differentiated by bit 0. A mods pointer
has the bit clear, the sites pointer has the bit set.

As static_call_del_module() blidly assumes that the pointer is a valid
static_call_mod type, it fails to check for this failure case and
dereferences the pointer to the list of built-in call sites, which is
obviously bogus.

Cure it by checking whether the key has a sites or a mods pointer.

If it's a sites pointer then the key is not to be touched. As the sites are
walked in the same order as in __static_call_init() the site walk can be
terminated because all subsequent sites have not been touched by the init
code due to the error exit.

If it was converted before the allocation fail, then the inner loop which
searches for a module match will find nothing.

A fail in the second allocation in __static_call_init() is harmless and
does not require special treatment. The first allocation succeeded and
converted the key to a module chain. That first entry has mod::mod == NULL
and mod::next == NULL, so the inner loop of static_call_del_module() will
neither find a module match nor a module chain. The next site in the walk
was either already converted, but can't match the module, or it will exit
the outer loop because it has a static_call_site pointer and not a
static_call_mod pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50002/">CVE-2024-50002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50002">CVE-2024-50002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232083">SUSE bug 1232083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50006" ref_url="https://www.suse.com/security/cve/CVE-2024-50006" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix i_data_sem unlock order in ext4_ind_migrate()

Fuzzing reports a possible deadlock in jbd2_log_wait_commit.

This issue is triggered when an EXT4_IOC_MIGRATE ioctl is set to require
synchronous updates because the file descriptor is opened with O_SYNC.
This can lead to the jbd2_journal_stop() function calling
jbd2_might_wait_for_commit(), potentially causing a deadlock if the
EXT4_IOC_MIGRATE call races with a write(2) system call.

This problem only arises when CONFIG_PROVE_LOCKING is enabled. In this
case, the jbd2_might_wait_for_commit macro locks jbd2_handle in the
jbd2_journal_stop function while i_data_sem is locked. This triggers
lockdep because the jbd2_journal_start function might also lock the same
jbd2_handle simultaneously.

Found by Linux Verification Center (linuxtesting.org) with syzkaller.

Rule: add
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50006/">CVE-2024-50006 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50006">CVE-2024-50006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232442">SUSE bug 1232442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50008</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50008" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50008" ref_url="https://www.suse.com/security/cve/CVE-2024-50008" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()

Replace one-element array with a flexible-array member in
`struct host_cmd_ds_802_11_scan_ext`.

With this, fix the following warning:

elo 16 17:51:58 surfacebook kernel: ------------[ cut here ]------------
elo 16 17:51:58 surfacebook kernel: memcpy: detected field-spanning write (size 243) of single field "ext_scan-&gt;tlv_buffer" at drivers/net/wireless/marvell/mwifiex/scan.c:2239 (size 1)
elo 16 17:51:58 surfacebook kernel: WARNING: CPU: 0 PID: 498 at drivers/net/wireless/marvell/mwifiex/scan.c:2239 mwifiex_cmd_802_11_scan_ext+0x83/0x90 [mwifiex]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50008/">CVE-2024-50008 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50008">CVE-2024-50008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232317">SUSE bug 1232317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50009" ref_url="https://www.suse.com/security/cve/CVE-2024-50009" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value

cpufreq_cpu_get may return NULL. To avoid NULL-dereference check it
and return in case of error.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50009/">CVE-2024-50009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50009">CVE-2024-50009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232318">SUSE bug 1232318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50013" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50013" ref_url="https://www.suse.com/security/cve/CVE-2024-50013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix memory leak in exfat_load_bitmap()

If the first directory entry in the root directory is not a bitmap
directory entry, 'bh' will not be released and reassigned, which
will cause a memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50013/">CVE-2024-50013 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50013">CVE-2024-50013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232080">SUSE bug 1232080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50014" ref_url="https://www.suse.com/security/cve/CVE-2024-50014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix access to uninitialised lock in fc replay path

The following kernel trace can be triggered with fstest generic/629 when
executed against a filesystem with fast-commit feature enabled:

INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 0 PID: 866 Comm: mount Not tainted 6.10.0+ #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x66/0x90
 register_lock_class+0x759/0x7d0
 __lock_acquire+0x85/0x2630
 ? __find_get_block+0xb4/0x380
 lock_acquire+0xd1/0x2d0
 ? __ext4_journal_get_write_access+0xd5/0x160
 _raw_spin_lock+0x33/0x40
 ? __ext4_journal_get_write_access+0xd5/0x160
 __ext4_journal_get_write_access+0xd5/0x160
 ext4_reserve_inode_write+0x61/0xb0
 __ext4_mark_inode_dirty+0x79/0x270
 ? ext4_ext_replay_set_iblocks+0x2f8/0x450
 ext4_ext_replay_set_iblocks+0x330/0x450
 ext4_fc_replay+0x14c8/0x1540
 ? jread+0x88/0x2e0
 ? rcu_is_watching+0x11/0x40
 do_one_pass+0x447/0xd00
 jbd2_journal_recover+0x139/0x1b0
 jbd2_journal_load+0x96/0x390
 ext4_load_and_init_journal+0x253/0xd40
 ext4_fill_super+0x2cc6/0x3180
...

In the replay path there's an attempt to lock sbi-&gt;s_bdev_wb_lock in
function ext4_check_bdev_write_error().  Unfortunately, at this point this
spinlock has not been initialized yet.  Moving it's initialization to an
earlier point in __ext4_fill_super() fixes this splat.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50014/">CVE-2024-50014 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50014">CVE-2024-50014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232446">SUSE bug 1232446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50015" ref_url="https://www.suse.com/security/cve/CVE-2024-50015" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: dax: fix overflowing extents beyond inode size when partially writing

The dax_iomap_rw() does two things in each iteration: map written blocks
and copy user data to blocks. If the process is killed by user(See signal
handling in dax_iomap_iter()), the copied data will be returned and added
on inode size, which means that the length of written extents may exceed
the inode size, then fsck will fail. An example is given as:

dd if=/dev/urandom of=file bs=4M count=1
 dax_iomap_rw
  iomap_iter // round 1
   ext4_iomap_begin
    ext4_iomap_alloc // allocate 0~2M extents(written flag)
  dax_iomap_iter // copy 2M data
  iomap_iter // round 2
   iomap_iter_advance
    iter-&gt;pos += iter-&gt;processed // iter-&gt;pos = 2M
   ext4_iomap_begin
    ext4_iomap_alloc // allocate 2~4M extents(written flag)
  dax_iomap_iter
   fatal_signal_pending
  done = iter-&gt;pos - iocb-&gt;ki_pos // done = 2M
 ext4_handle_inode_extension
  ext4_update_inode_size // inode size = 2M

fsck reports: Inode 13, i_size is 2097152, should be 4194304.  Fix?

Fix the problem by truncating extents if the written length is smaller
than expected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50015/">CVE-2024-50015 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50015">CVE-2024-50015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232079">SUSE bug 1232079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50018" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50018" ref_url="https://www.suse.com/security/cve/CVE-2024-50018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50018/">CVE-2024-50018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50018">CVE-2024-50018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232419">SUSE bug 1232419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50019" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50019" ref_url="https://www.suse.com/security/cve/CVE-2024-50019" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kthread: unpark only parked kthread

Calling into kthread unparking unconditionally is mostly harmless when
the kthread is already unparked. The wake up is then simply ignored
because the target is not in TASK_PARKED state.

However if the kthread is per CPU, the wake up is preceded by a call
to kthread_bind() which expects the task to be inactive and in
TASK_PARKED state, which obviously isn't the case if it is unparked.

As a result, calling kthread_stop() on an unparked per-cpu kthread
triggers such a warning:

	WARNING: CPU: 0 PID: 11 at kernel/kthread.c:525 __kthread_bind_mask kernel/kthread.c:525
	 &lt;TASK&gt;
	 kthread_stop+0x17a/0x630 kernel/kthread.c:707
	 destroy_workqueue+0x136/0xc40 kernel/workqueue.c:5810
	 wg_destruct+0x1e2/0x2e0 drivers/net/wireguard/device.c:257
	 netdev_run_todo+0xe1a/0x1000 net/core/dev.c:10693
	 default_device_exit_batch+0xa14/0xa90 net/core/dev.c:11769
	 ops_exit_list net/core/net_namespace.c:178 [inline]
	 cleanup_net+0x89d/0xcc0 net/core/net_namespace.c:640
	 process_one_work kernel/workqueue.c:3231 [inline]
	 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
	 worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
	 kthread+0x2f0/0x390 kernel/kthread.c:389
	 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
	 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
	 &lt;/TASK&gt;

Fix this with skipping unecessary unparking while stopping a kthread.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50019/">CVE-2024-50019 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50019">CVE-2024-50019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231990">SUSE bug 1231990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50022" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50022" ref_url="https://www.suse.com/security/cve/CVE-2024-50022" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

device-dax: correct pgoff align in dax_set_mapping()

pgoff should be aligned using ALIGN_DOWN() instead of ALIGN().  Otherwise,
vmf-&gt;address not aligned to fault_size will be aligned to the next
alignment, that can result in memory failure getting the wrong address.

It's a subtle situation that only can be observed in
page_mapped_in_vma() after the page is page fault handled by
dev_dax_huge_fault.  Generally, there is little chance to perform
page_mapped_in_vma in dev-dax's page unless in specific error injection
to the dax device to trigger an MCE - memory-failure.  In that case,
page_mapped_in_vma() will be triggered to determine which task is
accessing the failure address and kill that task in the end.


We used self-developed dax device (which is 2M aligned mapping) , to
perform error injection to random address.  It turned out that error
injected to non-2M-aligned address was causing endless MCE until panic.
Because page_mapped_in_vma() kept resulting wrong address and the task
accessing the failure address was never killed properly:


[ 3783.719419] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3784.049006] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3784.049190] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3784.448042] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3784.448186] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3784.792026] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3784.792179] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3785.162502] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3785.162633] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3785.461116] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3785.461247] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3785.764730] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3785.764859] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3786.042128] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3786.042259] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3786.464293] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3786.464423] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3786.818090] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3786.818217] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered
[ 3787.085297] mce: Uncorrected hardware memory error in user-access at 
200c9742380
[ 3787.085424] Memory failure: 0x200c9742: recovery action for dax page: 
Recovered

It took us several weeks to pinpoint this problem,   but we eventually
used bpftrace to trace the page fault and mce address and successfully
identified the issue.


Joao added:

; Likely we never reproduce in production because we always pin
: device-dax regions in the region align they provide (Qemu does
: similarly with prealloc in hugetlb/file backed memory).  I think this
: bug requires that we touch *unpinned* device-dax regions unaligned to
: the device-dax selected alignment (page size i.e.  4K/2M/1G)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50022/">CVE-2024-50022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50022">CVE-2024-50022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231956">SUSE bug 1231956</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50023" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50023" ref_url="https://www.suse.com/security/cve/CVE-2024-50023" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: Remove LED entry from LEDs list on unregister

Commit c938ab4da0eb ("net: phy: Manual remove LEDs to ensure correct
ordering") correctly fixed a problem with using devm_ but missed
removing the LED entry from the LEDs list.

This cause kernel panic on specific scenario where the port for the PHY
is torn down and up and the kmod for the PHY is removed.

On setting the port down the first time, the assosiacted LEDs are
correctly unregistered. The associated kmod for the PHY is now removed.
The kmod is now added again and the port is now put up, the associated LED
are registered again.
On putting the port down again for the second time after these step, the
LED list now have 4 elements. With the first 2 already unregistered
previously and the 2 new one registered again.

This cause a kernel panic as the first 2 element should have been
removed.

Fix this by correctly removing the element when LED is unregistered.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50023/">CVE-2024-50023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50023">CVE-2024-50023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231955">SUSE bug 1231955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50024" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50024" ref_url="https://www.suse.com/security/cve/CVE-2024-50024" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Fix an unsafe loop on the list

The kernel may crash when deleting a genetlink family if there are still
listeners for that family:

Oops: Kernel access of bad area, sig: 11 [#1]
  ...
  NIP [c000000000c080bc] netlink_update_socket_mc+0x3c/0xc0
  LR [c000000000c0f764] __netlink_clear_multicast_users+0x74/0xc0
  Call Trace:
__netlink_clear_multicast_users+0x74/0xc0
genl_unregister_family+0xd4/0x2d0

Change the unsafe loop on the list to a safe one, because inside the
loop there is an element removal from this list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50024/">CVE-2024-50024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50024">CVE-2024-50024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231954">SUSE bug 1231954</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50027</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50027" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50027" ref_url="https://www.suse.com/security/cve/CVE-2024-50027" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Free tzp copy along with the thermal zone

The object pointed to by tz-&gt;tzp may still be accessed after being
freed in thermal_zone_device_unregister(), so move the freeing of it
to the point after the removal completion has been completed at which
it cannot be accessed any more.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50027/">CVE-2024-50027 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50027">CVE-2024-50027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231951">SUSE bug 1231951</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50028" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50028" ref_url="https://www.suse.com/security/cve/CVE-2024-50028" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: core: Reference count the zone in thermal_zone_get_by_id()

There are places in the thermal netlink code where nothing prevents
the thermal zone object from going away while being accessed after it
has been returned by thermal_zone_get_by_id().

To address this, make thermal_zone_get_by_id() get a reference on the
thermal zone device object to be returned with the help of get_device(),
under thermal_list_lock, and adjust all of its callers to this change
with the help of the cleanup.h infrastructure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50028/">CVE-2024-50028 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50028">CVE-2024-50028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231950">SUSE bug 1231950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50029" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50029" ref_url="https://www.suse.com/security/cve/CVE-2024-50029" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync

This checks if the ACL connection remains valid as it could be destroyed
while hci_enhanced_setup_sync is pending on cmd_sync leading to the
following trace:

BUG: KASAN: slab-use-after-free in hci_enhanced_setup_sync+0x91b/0xa60
Read of size 1 at addr ffff888002328ffd by task kworker/u5:2/37

CPU: 0 UID: 0 PID: 37 Comm: kworker/u5:2 Not tainted 6.11.0-rc6-01300-g810be445d8d6 #7099
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x5d/0x80
 ? hci_enhanced_setup_sync+0x91b/0xa60
 print_report+0x152/0x4c0
 ? hci_enhanced_setup_sync+0x91b/0xa60
 ? __virt_addr_valid+0x1fa/0x420
 ? hci_enhanced_setup_sync+0x91b/0xa60
 kasan_report+0xda/0x1b0
 ? hci_enhanced_setup_sync+0x91b/0xa60
 hci_enhanced_setup_sync+0x91b/0xa60
 ? __pfx_hci_enhanced_setup_sync+0x10/0x10
 ? __pfx___mutex_lock+0x10/0x10
 hci_cmd_sync_work+0x1c2/0x330
 process_one_work+0x7d9/0x1360
 ? __pfx_lock_acquire+0x10/0x10
 ? __pfx_process_one_work+0x10/0x10
 ? assign_work+0x167/0x240
 worker_thread+0x5b7/0xf60
 ? __kthread_parkme+0xac/0x1c0
 ? __pfx_worker_thread+0x10/0x10
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x293/0x360
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2f/0x70
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 34:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 __hci_conn_add+0x187/0x17d0
 hci_connect_sco+0x2e1/0xb90
 sco_sock_connect+0x2a2/0xb80
 __sys_connect+0x227/0x2a0
 __x64_sys_connect+0x6d/0xb0
 do_syscall_64+0x71/0x140
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 37:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x101/0x160
 kfree+0xd0/0x250
 device_release+0x9a/0x210
 kobject_put+0x151/0x280
 hci_conn_del+0x448/0xbf0
 hci_abort_conn_sync+0x46f/0x980
 hci_cmd_sync_work+0x1c2/0x330
 process_one_work+0x7d9/0x1360
 worker_thread+0x5b7/0xf60
 kthread+0x293/0x360
 ret_from_fork+0x2f/0x70
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50029/">CVE-2024-50029 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50029">CVE-2024-50029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231949">SUSE bug 1231949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50033" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50033" ref_url="https://www.suse.com/security/cve/CVE-2024-50033" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

slip: make slhc_remember() more robust against malicious packets

syzbot found that slhc_remember() was missing checks against
malicious packets [1].

slhc_remember() only checked the size of the packet was at least 20,
which is not good enough.

We need to make sure the packet includes the IPv4 and TCP header
that are supposed to be carried.

Add iph and th pointers to make the code more readable.

[1]

BUG: KMSAN: uninit-value in slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666
  slhc_remember+0x2e8/0x7b0 drivers/net/slip/slhc.c:666
  ppp_receive_nonmp_frame+0xe45/0x35e0 drivers/net/ppp/ppp_generic.c:2455
  ppp_receive_frame drivers/net/ppp/ppp_generic.c:2372 [inline]
  ppp_do_recv+0x65f/0x40d0 drivers/net/ppp/ppp_generic.c:2212
  ppp_input+0x7dc/0xe60 drivers/net/ppp/ppp_generic.c:2327
  pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113
  __release_sock+0x1da/0x330 net/core/sock.c:3072
  release_sock+0x6b/0x250 net/core/sock.c:3626
  pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4091 [inline]
  slab_alloc_node mm/slub.c:4134 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4186
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678
  alloc_skb include/linux/skbuff.h:1322 [inline]
  sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732
  pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 0 UID: 0 PID: 5460 Comm: syz.2.33 Not tainted 6.12.0-rc2-syzkaller-00006-g87d6aab2389e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50033/">CVE-2024-50033 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50033">CVE-2024-50033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231914">SUSE bug 1231914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50035</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50035" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50035" ref_url="https://www.suse.com/security/cve/CVE-2024-50035" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: fix ppp_async_encode() illegal access

syzbot reported an issue in ppp_async_encode() [1]

In this case, pppoe_sendmsg() is called with a zero size.
Then ppp_async_encode() is called with an empty skb.

BUG: KMSAN: uninit-value in ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]
 BUG: KMSAN: uninit-value in ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675
  ppp_async_encode drivers/net/ppp/ppp_async.c:545 [inline]
  ppp_async_push+0xb4f/0x2660 drivers/net/ppp/ppp_async.c:675
  ppp_async_send+0x130/0x1b0 drivers/net/ppp/ppp_async.c:634
  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2280 [inline]
  ppp_input+0x1f1/0xe60 drivers/net/ppp/ppp_generic.c:2304
  pppoe_rcv_core+0x1d3/0x720 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1113
  __release_sock+0x1da/0x330 net/core/sock.c:3072
  release_sock+0x6b/0x250 net/core/sock.c:3626
  pppoe_sendmsg+0x2b8/0xb90 drivers/net/ppp/pppoe.c:903
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4092 [inline]
  slab_alloc_node mm/slub.c:4135 [inline]
  kmem_cache_alloc_node_noprof+0x6bf/0xb80 mm/slub.c:4187
  kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:587
  __alloc_skb+0x363/0x7b0 net/core/skbuff.c:678
  alloc_skb include/linux/skbuff.h:1322 [inline]
  sock_wmalloc+0xfe/0x1a0 net/core/sock.c:2732
  pppoe_sendmsg+0x3a7/0xb90 drivers/net/ppp/pppoe.c:867
  sock_sendmsg_nosec net/socket.c:729 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:744
  ____sys_sendmsg+0x903/0xb60 net/socket.c:2602
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2656
  __sys_sendmmsg+0x3c1/0x960 net/socket.c:2742
  __do_sys_sendmmsg net/socket.c:2771 [inline]
  __se_sys_sendmmsg net/socket.c:2768 [inline]
  __x64_sys_sendmmsg+0xbc/0x120 net/socket.c:2768
  x64_sys_call+0xb6e/0x3ba0 arch/x86/include/generated/asm/syscalls_64.h:308
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 5411 Comm: syz.1.14 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50035/">CVE-2024-50035 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50035">CVE-2024-50035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232392">SUSE bug 1232392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50038</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50038" ref_url="https://www.suse.com/security/cve/CVE-2024-50038" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: xtables: avoid NFPROTO_UNSPEC where needed

syzbot managed to call xt_cluster match via ebtables:

 WARNING: CPU: 0 PID: 11 at net/netfilter/xt_cluster.c:72 xt_cluster_mt+0x196/0x780
 [..]
 ebt_do_table+0x174b/0x2a40

Module registers to NFPROTO_UNSPEC, but it assumes ipv4/ipv6 packet
processing.  As this is only useful to restrict locally terminating
TCP/UDP traffic, register this for ipv4 and ipv6 family only.

Pablo points out that this is a general issue, direct users of the
set/getsockopt interface can call into targets/matches that were only
intended for use with ip(6)tables.

Check all UNSPEC matches and targets for similar issues:

- matches and targets are fine except if they assume skb_network_header()
  is valid -- this is only true when called from inet layer: ip(6) stack
  pulls the ip/ipv6 header into linear data area.
- targets that return XT_CONTINUE or other xtables verdicts must be
  restricted too, they are incompatbile with the ebtables traverser, e.g.
  EBT_CONTINUE is a completely different value than XT_CONTINUE.

Most matches/targets are changed to register for NFPROTO_IPV4/IPV6, as
they are provided for use by ip(6)tables.

The MARK target is also used by arptables, so register for NFPROTO_ARP too.

While at it, bail out if connbytes fails to enable the corresponding
conntrack family.

This change passes the selftests in iptables.git.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50038/">CVE-2024-50038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50038">CVE-2024-50038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231910">SUSE bug 1231910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50039</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50039" ref_url="https://www.suse.com/security/cve/CVE-2024-50039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: accept TCA_STAB only for root qdisc

Most qdiscs maintain their backlog using qdisc_pkt_len(skb)
on the assumption it is invariant between the enqueue()
and dequeue() handlers.

Unfortunately syzbot can crash a host rather easily using
a TBF + SFQ combination, with an STAB on SFQ [1]

We can't support TCA_STAB on arbitrary level, this would
require to maintain per-qdisc storage.

[1]
[   88.796496] BUG: kernel NULL pointer dereference, address: 0000000000000000
[   88.798611] #PF: supervisor read access in kernel mode
[   88.799014] #PF: error_code(0x0000) - not-present page
[   88.799506] PGD 0 P4D 0
[   88.799829] Oops: Oops: 0000 [#1] SMP NOPTI
[   88.800569] CPU: 14 UID: 0 PID: 2053 Comm: b371744477 Not tainted 6.12.0-rc1-virtme #1117
[   88.801107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   88.801779] RIP: 0010:sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq
[ 88.802544] Code: 0f b7 50 12 48 8d 04 d5 00 00 00 00 48 89 d6 48 29 d0 48 8b 91 c0 01 00 00 48 c1 e0 03 48 01 c2 66 83 7a 1a 00 7e c0 48 8b 3a &lt;4c&gt; 8b 07 4c 89 02 49 89 50 08 48 c7 47 08 00 00 00 00 48 c7 07 00
All code
========
   0:	0f b7 50 12          	movzwl 0x12(%rax),%edx
   4:	48 8d 04 d5 00 00 00 	lea    0x0(,%rdx,8),%rax
   b:	00
   c:	48 89 d6             	mov    %rdx,%rsi
   f:	48 29 d0             	sub    %rdx,%rax
  12:	48 8b 91 c0 01 00 00 	mov    0x1c0(%rcx),%rdx
  19:	48 c1 e0 03          	shl    $0x3,%rax
  1d:	48 01 c2             	add    %rax,%rdx
  20:	66 83 7a 1a 00       	cmpw   $0x0,0x1a(%rdx)
  25:	7e c0                	jle    0xffffffffffffffe7
  27:	48 8b 3a             	mov    (%rdx),%rdi
  2a:*	4c 8b 07             	mov    (%rdi),%r8		&lt;-- trapping instruction
  2d:	4c 89 02             	mov    %r8,(%rdx)
  30:	49 89 50 08          	mov    %rdx,0x8(%r8)
  34:	48 c7 47 08 00 00 00 	movq   $0x0,0x8(%rdi)
  3b:	00
  3c:	48                   	rex.W
  3d:	c7                   	.byte 0xc7
  3e:	07                   	(bad)
	...

Code starting with the faulting instruction
===========================================
   0:	4c 8b 07             	mov    (%rdi),%r8
   3:	4c 89 02             	mov    %r8,(%rdx)
   6:	49 89 50 08          	mov    %rdx,0x8(%r8)
   a:	48 c7 47 08 00 00 00 	movq   $0x0,0x8(%rdi)
  11:	00
  12:	48                   	rex.W
  13:	c7                   	.byte 0xc7
  14:	07                   	(bad)
	...
[   88.803721] RSP: 0018:ffff9a1f892b7d58 EFLAGS: 00000206
[   88.804032] RAX: 0000000000000000 RBX: ffff9a1f8420c800 RCX: ffff9a1f8420c800
[   88.804560] RDX: ffff9a1f81bc1440 RSI: 0000000000000000 RDI: 0000000000000000
[   88.805056] RBP: ffffffffc04bb0e0 R08: 0000000000000001 R09: 00000000ff7f9a1f
[   88.805473] R10: 000000000001001b R11: 0000000000009a1f R12: 0000000000000140
[   88.806194] R13: 0000000000000001 R14: ffff9a1f886df400 R15: ffff9a1f886df4ac
[   88.806734] FS:  00007f445601a740(0000) GS:ffff9a2e7fd80000(0000) knlGS:0000000000000000
[   88.807225] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   88.807672] CR2: 0000000000000000 CR3: 000000050cc46000 CR4: 00000000000006f0
[   88.808165] Call Trace:
[   88.808459]  &lt;TASK&gt;
[   88.808710] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)
[   88.809261] ? page_fault_oops (arch/x86/mm/fault.c:715)
[   88.809561] ? exc_page_fault (./arch/x86/include/asm/irqflags.h:26 ./arch/x86/include/asm/irqflags.h:87 ./arch/x86/include/asm/irqflags.h:147 arch/x86/mm/fault.c:1489 arch/x86/mm/fault.c:1539)
[   88.809806] ? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)
[   88.810074] ? sfq_dequeue (net/sched/sch_sfq.c:272 net/sched/sch_sfq.c:499) sch_sfq
[   88.810411] sfq_reset (net/sched/sch_sfq.c:525) sch_sfq
[   88.810671] qdisc_reset (./include/linux/skbuff.h:2135 ./include/linux/skbuff.h:2441 ./include/linux/skbuff.h:3304 ./include/linux/skbuff.h:3310 net/sched/sch_g
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50039/">CVE-2024-50039 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50039">CVE-2024-50039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231909">SUSE bug 1231909</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50044" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50044" ref_url="https://www.suse.com/security/cve/CVE-2024-50044" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change

rfcomm_sk_state_change attempts to use sock_lock so it must never be
called with it locked but rfcomm_sock_ioctl always attempt to lock it
causing the following trace:

======================================================
WARNING: possible circular locking dependency detected
6.8.0-syzkaller-08951-gfe46a7dd189e #0 Not tainted
------------------------------------------------------
syz-executor386/5093 is trying to acquire lock:
ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1671 [inline]
ffff88807c396258 (sk_lock-AF_BLUETOOTH-BTPROTO_RFCOMM){+.+.}-{0:0}, at: rfcomm_sk_state_change+0x5b/0x310 net/bluetooth/rfcomm/sock.c:73

but task is already holding lock:
ffff88807badfd28 (&amp;d-&gt;lock){+.+.}-{3:3}, at: __rfcomm_dlc_close+0x226/0x6a0 net/bluetooth/rfcomm/core.c:491
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50044/">CVE-2024-50044 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50044">CVE-2024-50044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231904">SUSE bug 1231904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50046</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50046" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50046" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50046" ref_url="https://www.suse.com/security/cve/CVE-2024-50046" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()

On the node of an NFS client, some files saved in the mountpoint of the
NFS server were copied to another location of the same NFS server.
Accidentally, the nfs42_complete_copies() got a NULL-pointer dereference
crash with the following syslog:

[232064.838881] NFSv4: state recovery failed for open file nfs/pvc-12b5200d-cd0f-46a3-b9f0-af8f4fe0ef64.qcow2, error = -116
[232064.839360] NFSv4: state recovery failed for open file nfs/pvc-12b5200d-cd0f-46a3-b9f0-af8f4fe0ef64.qcow2, error = -116
[232066.588183] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000058
[232066.588586] Mem abort info:
[232066.588701]   ESR = 0x0000000096000007
[232066.588862]   EC = 0x25: DABT (current EL), IL = 32 bits
[232066.589084]   SET = 0, FnV = 0
[232066.589216]   EA = 0, S1PTW = 0
[232066.589340]   FSC = 0x07: level 3 translation fault
[232066.589559] Data abort info:
[232066.589683]   ISV = 0, ISS = 0x00000007
[232066.589842]   CM = 0, WnR = 0
[232066.589967] user pgtable: 64k pages, 48-bit VAs, pgdp=00002000956ff400
[232066.590231] [0000000000000058] pgd=08001100ae100003, p4d=08001100ae100003, pud=08001100ae100003, pmd=08001100b3c00003, pte=0000000000000000
[232066.590757] Internal error: Oops: 96000007 [#1] SMP
[232066.590958] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs ocfs2_dlmfs ocfs2_stack_o2cb ocfs2_dlm vhost_net vhost vhost_iotlb tap tun ipt_rpfilter xt_multiport ip_set_hash_ip ip_set_hash_net xfrm_interface xfrm6_tunnel tunnel4 tunnel6 esp4 ah4 wireguard libcurve25519_generic veth xt_addrtype xt_set nf_conntrack_netlink ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_bitmap_port ip_set_hash_ipport dummy ip_set ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs iptable_filter sch_ingress nfnetlink_cttimeout vport_gre ip_gre ip_tunnel gre vport_geneve geneve vport_vxlan vxlan ip6_udp_tunnel udp_tunnel openvswitch nf_conncount dm_round_robin dm_service_time dm_multipath xt_nat xt_MASQUERADE nft_chain_nat nf_nat xt_mark xt_conntrack xt_comment nft_compat nft_counter nf_tables nfnetlink ocfs2 ocfs2_nodemanager ocfs2_stackglue iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ipmi_ssif nbd overlay 8021q garp mrp bonding tls rfkill sunrpc ext4 mbcache jbd2
[232066.591052]  vfat fat cas_cache cas_disk ses enclosure scsi_transport_sas sg acpi_ipmi ipmi_si ipmi_devintf ipmi_msghandler ip_tables vfio_pci vfio_pci_core vfio_virqfd vfio_iommu_type1 vfio dm_mirror dm_region_hash dm_log dm_mod nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 br_netfilter bridge stp llc fuse xfs libcrc32c ast drm_vram_helper qla2xxx drm_kms_helper syscopyarea crct10dif_ce sysfillrect ghash_ce sysimgblt sha2_ce fb_sys_fops cec sha256_arm64 sha1_ce drm_ttm_helper ttm nvme_fc igb sbsa_gwdt nvme_fabrics drm nvme_core i2c_algo_bit i40e scsi_transport_fc megaraid_sas aes_neon_bs
[232066.596953] CPU: 6 PID: 4124696 Comm: 10.253.166.125- Kdump: loaded Not tainted 5.15.131-9.cl9_ocfs2.aarch64 #1
[232066.597356] Hardware name: Great Wall .\x93\x8e...RF6260 V5/GWMSSE2GL1T, BIOS T656FBE_V3.0.18 2024-01-06
[232066.597721] pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[232066.598034] pc : nfs4_reclaim_open_state+0x220/0x800 [nfsv4]
[232066.598327] lr : nfs4_reclaim_open_state+0x12c/0x800 [nfsv4]
[232066.598595] sp : ffff8000f568fc70
[232066.598731] x29: ffff8000f568fc70 x28: 0000000000001000 x27: ffff21003db33000
[232066.599030] x26: ffff800005521ae0 x25: ffff0100f98fa3f0 x24: 0000000000000001
[232066.599319] x23: ffff800009920008 x22: ffff21003db33040 x21: ffff21003db33050
[232066.599628] x20: ffff410172fe9e40 x19: ffff410172fe9e00 x18: 0000000000000000
[232066.599914] x17: 0000000000000000 x16: 0000000000000004 x15: 0000000000000000
[232066.600195] x14: 0000000000000000 x13: ffff800008e685a8 x12: 00000000eac0c6e6
[232066.600498] x11: 00000000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50046/">CVE-2024-50046 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50046">CVE-2024-50046 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231902">SUSE bug 1231902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50047" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50047" ref_url="https://www.suse.com/security/cve/CVE-2024-50047" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in async decryption

Doing an async decryption (large read) crashes with a
slab-use-after-free way down in the crypto API.

Reproducer:
    # mount.cifs -o ...,seal,esize=1 //srv/share /mnt
    # dd if=/mnt/largefile of=/dev/null
    ...
    [  194.196391] ==================================================================
    [  194.196844] BUG: KASAN: slab-use-after-free in gf128mul_4k_lle+0xc1/0x110
    [  194.197269] Read of size 8 at addr ffff888112bd0448 by task kworker/u77:2/899
    [  194.197707]
    [  194.197818] CPU: 12 UID: 0 PID: 899 Comm: kworker/u77:2 Not tainted 6.11.0-lku-00028-gfca3ca14a17a-dirty #43
    [  194.198400] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.2-3-gd478f380-prebuilt.qemu.org 04/01/2014
    [  194.199046] Workqueue: smb3decryptd smb2_decrypt_offload [cifs]
    [  194.200032] Call Trace:
    [  194.200191]  &lt;TASK&gt;
    [  194.200327]  dump_stack_lvl+0x4e/0x70
    [  194.200558]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.200809]  print_report+0x174/0x505
    [  194.201040]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
    [  194.201352]  ? srso_return_thunk+0x5/0x5f
    [  194.201604]  ? __virt_addr_valid+0xdf/0x1c0
    [  194.201868]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.202128]  kasan_report+0xc8/0x150
    [  194.202361]  ? gf128mul_4k_lle+0xc1/0x110
    [  194.202616]  gf128mul_4k_lle+0xc1/0x110
    [  194.202863]  ghash_update+0x184/0x210
    [  194.203103]  shash_ahash_update+0x184/0x2a0
    [  194.203377]  ? __pfx_shash_ahash_update+0x10/0x10
    [  194.203651]  ? srso_return_thunk+0x5/0x5f
    [  194.203877]  ? crypto_gcm_init_common+0x1ba/0x340
    [  194.204142]  gcm_hash_assoc_remain_continue+0x10a/0x140
    [  194.204434]  crypt_message+0xec1/0x10a0 [cifs]
    [  194.206489]  ? __pfx_crypt_message+0x10/0x10 [cifs]
    [  194.208507]  ? srso_return_thunk+0x5/0x5f
    [  194.209205]  ? srso_return_thunk+0x5/0x5f
    [  194.209925]  ? srso_return_thunk+0x5/0x5f
    [  194.210443]  ? srso_return_thunk+0x5/0x5f
    [  194.211037]  decrypt_raw_data+0x15f/0x250 [cifs]
    [  194.212906]  ? __pfx_decrypt_raw_data+0x10/0x10 [cifs]
    [  194.214670]  ? srso_return_thunk+0x5/0x5f
    [  194.215193]  smb2_decrypt_offload+0x12a/0x6c0 [cifs]

This is because TFM is being used in parallel.

Fix this by allocating a new AEAD TFM for async decryption, but keep
the existing one for synchronous READ cases (similar to what is done
in smb3_calc_signature()).

Also remove the calls to aead_request_set_callback() and
crypto_wait_req() since it's always going to be a synchronous operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50047/">CVE-2024-50047 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50047">CVE-2024-50047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232418">SUSE bug 1232418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232576">SUSE bug 1232576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232638">SUSE bug 1232638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50055" ref_url="https://www.suse.com/security/cve/CVE-2024-50055" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

driver core: bus: Fix double free in driver API bus_register()

For bus_register(), any error which happens after kset_register() will
cause that @priv are freed twice, fixed by setting @priv with NULL after
the first free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50055/">CVE-2024-50055 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50055">CVE-2024-50055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232329">SUSE bug 1232329</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50057" ref_url="https://www.suse.com/security/cve/CVE-2024-50057" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tipd: Free IRQ only if it was requested before

In polling mode, if no IRQ was requested there is no need to free it.
Call devm_free_irq() only if client-&gt;irq is set. This fixes the warning
caused by the tps6598x module removal:

WARNING: CPU: 2 PID: 333 at kernel/irq/devres.c:144 devm_free_irq+0x80/0x8c
...
...
Call trace:
  devm_free_irq+0x80/0x8c
  tps6598x_remove+0x28/0x88 [tps6598x]
  i2c_device_remove+0x2c/0x9c
  device_remove+0x4c/0x80
  device_release_driver_internal+0x1cc/0x228
  driver_detach+0x50/0x98
  bus_remove_driver+0x6c/0xbc
  driver_unregister+0x30/0x60
  i2c_del_driver+0x54/0x64
  tps6598x_i2c_driver_exit+0x18/0xc3c [tps6598x]
  __arm64_sys_delete_module+0x184/0x264
  invoke_syscall+0x48/0x110
  el0_svc_common.constprop.0+0xc8/0xe8
  do_el0_svc+0x20/0x2c
  el0_svc+0x28/0x98
  el0t_64_sync_handler+0x13c/0x158
  el0t_64_sync+0x190/0x194
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50057/">CVE-2024-50057 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50057">CVE-2024-50057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232393">SUSE bug 1232393</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50058" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50058" ref_url="https://www.suse.com/security/cve/CVE-2024-50058" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: protect uart_port_dtr_rts() in uart_shutdown() too

Commit af224ca2df29 (serial: core: Prevent unsafe uart port access, part
3) added few uport == NULL checks. It added one to uart_shutdown(), so
the commit assumes, uport can be NULL in there. But right after that
protection, there is an unprotected "uart_port_dtr_rts(uport, false);"
call. That is invoked only if HUPCL is set, so I assume that is the
reason why we do not see lots of these reports.

Or it cannot be NULL at this point at all for some reason :P.

Until the above is investigated, stay on the safe side and move this
dereference to the if too.

I got this inconsistency from Coverity under CID 1585130. Thanks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50058/">CVE-2024-50058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50058">CVE-2024-50058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232285">SUSE bug 1232285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50060" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50060" ref_url="https://www.suse.com/security/cve/CVE-2024-50060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: check if we need to reschedule during overflow flush

In terms of normal application usage, this list will always be empty.
And if an application does overflow a bit, it'll have a few entries.
However, nothing obviously prevents syzbot from running a test case
that generates a ton of overflow entries, and then flushing them can
take quite a while.

Check for needing to reschedule while flushing, and drop our locks and
do so if necessary. There's no state to maintain here as overflows
always prune from head-of-list, hence it's fine to drop and reacquire
the locks at the end of the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50060/">CVE-2024-50060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50060">CVE-2024-50060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232417">SUSE bug 1232417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50064" ref_url="https://www.suse.com/security/cve/CVE-2024-50064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

zram: free secondary algorithms names

We need to kfree() secondary algorithms names when reset zram device that
had multi-streams, otherwise we leak memory.

[senozhatsky@chromium.org: kfree(NULL) is legal]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-50064/">CVE-2024-50064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50064">CVE-2024-50064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231901">SUSE bug 1231901</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50067</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50067" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50067" ref_url="https://www.suse.com/security/cve/CVE-2024-50067" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uprobe: avoid out-of-bounds memory access of fetching args

Uprobe needs to fetch args into a percpu buffer, and then copy to ring
buffer to avoid non-atomic context problem.

Sometimes user-space strings, arrays can be very large, but the size of
percpu buffer is only page size. And store_trace_args() won't check
whether these data exceeds a single page or not, caused out-of-bounds
memory access.

It could be reproduced by following steps:
1. build kernel with CONFIG_KASAN enabled
2. save follow program as test.c

```
\#include &lt;stdio.h&gt;
\#include &lt;stdlib.h&gt;
\#include &lt;string.h&gt;

// If string length large than MAX_STRING_SIZE, the fetch_store_strlen()
// will return 0, cause __get_data_size() return shorter size, and
// store_trace_args() will not trigger out-of-bounds access.
// So make string length less than 4096.
\#define STRLEN 4093

void generate_string(char *str, int n)
{
    int i;
    for (i = 0; i &lt; n; ++i)
    {
        char c = i % 26 + 'a';
        str[i] = c;
    }
    str[n-1] = '\0';
}

void print_string(char *str)
{
    printf("%s\n", str);
}

int main()
{
    char tmp[STRLEN];

    generate_string(tmp, STRLEN);
    print_string(tmp);

    return 0;
}
```
3. compile program
`gcc -o test test.c`

4. get the offset of `print_string()`
```
objdump -t test | grep -w print_string
0000000000401199 g     F .text  000000000000001b              print_string
```

5. configure uprobe with offset 0x1199
```
off=0x1199

cd /sys/kernel/debug/tracing/
echo "p /root/test:${off} arg1=+0(%di):ustring arg2=\$comm arg3=+0(%di):ustring"
 &gt; uprobe_events
echo 1 &gt; events/uprobes/enable
echo 1 &gt; tracing_on
```

6. run `test`, and kasan will report error.
==================================================================
BUG: KASAN: use-after-free in strncpy_from_user+0x1d6/0x1f0
Write of size 8 at addr ffff88812311c004 by task test/499CPU: 0 UID: 0 PID: 499 Comm: test Not tainted 6.12.0-rc3+ #18
Hardware name: Red Hat KVM, BIOS 1.16.0-4.al8 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x55/0x70
 print_address_description.constprop.0+0x27/0x310
 kasan_report+0x10f/0x120
 ? strncpy_from_user+0x1d6/0x1f0
 strncpy_from_user+0x1d6/0x1f0
 ? rmqueue.constprop.0+0x70d/0x2ad0
 process_fetch_insn+0xb26/0x1470
 ? __pfx_process_fetch_insn+0x10/0x10
 ? _raw_spin_lock+0x85/0xe0
 ? __pfx__raw_spin_lock+0x10/0x10
 ? __pte_offset_map+0x1f/0x2d0
 ? unwind_next_frame+0xc5f/0x1f80
 ? arch_stack_walk+0x68/0xf0
 ? is_bpf_text_address+0x23/0x30
 ? kernel_text_address.part.0+0xbb/0xd0
 ? __kernel_text_address+0x66/0xb0
 ? unwind_get_return_address+0x5e/0xa0
 ? __pfx_stack_trace_consume_entry+0x10/0x10
 ? arch_stack_walk+0xa2/0xf0
 ? _raw_spin_lock_irqsave+0x8b/0xf0
 ? __pfx__raw_spin_lock_irqsave+0x10/0x10
 ? depot_alloc_stack+0x4c/0x1f0
 ? _raw_spin_unlock_irqrestore+0xe/0x30
 ? stack_depot_save_flags+0x35d/0x4f0
 ? kasan_save_stack+0x34/0x50
 ? kasan_save_stack+0x24/0x50
 ? mutex_lock+0x91/0xe0
 ? __pfx_mutex_lock+0x10/0x10
 prepare_uprobe_buffer.part.0+0x2cd/0x500
 uprobe_dispatcher+0x2c3/0x6a0
 ? __pfx_uprobe_dispatcher+0x10/0x10
 ? __kasan_slab_alloc+0x4d/0x90
 handler_chain+0xdd/0x3e0
 handle_swbp+0x26e/0x3d0
 ? __pfx_handle_swbp+0x10/0x10
 ? uprobe_pre_sstep_notifier+0x151/0x1b0
 irqentry_exit_to_user_mode+0xe2/0x1b0
 asm_exc_int3+0x39/0x40
RIP: 0033:0x401199
Code: 01 c2 0f b6 45 fb 88 02 83 45 fc 01 8b 45 fc 3b 45 e4 7c b7 8b 45 e4 48 98 48 8d 50 ff 48 8b 45 e8 48 01 d0 ce
RSP: 002b:00007ffdf00576a8 EFLAGS: 00000206
RAX: 00007ffdf00576b0 RBX: 0000000000000000 RCX: 0000000000000ff2
RDX: 0000000000000ffc RSI: 0000000000000ffd RDI: 00007ffdf00576b0
RBP: 00007ffdf00586b0 R08: 00007feb2f9c0d20 R09: 00007feb2f9c0d20
R10: 0000000000000001 R11: 0000000000000202 R12: 0000000000401040
R13: 00007ffdf0058780 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

This commit enforces the buffer's maxlen less than a page-size to avoid
store_trace_args() out-of-memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50067/">CVE-2024-50067 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50067">CVE-2024-50067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232416">SUSE bug 1232416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50073</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50073" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50073" ref_url="https://www.suse.com/security/cve/CVE-2024-50073" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: Fix use-after-free in gsm_cleanup_mux

BUG: KASAN: slab-use-after-free in gsm_cleanup_mux+0x77b/0x7b0
drivers/tty/n_gsm.c:3160 [n_gsm]
Read of size 8 at addr ffff88815fe99c00 by task poc/3379
CPU: 0 UID: 0 PID: 3379 Comm: poc Not tainted 6.11.0+ #56
Hardware name: VMware, Inc. VMware Virtual Platform/440BX
Desktop Reference Platform, BIOS 6.00 11/12/2020
Call Trace:
 &lt;TASK&gt;
 gsm_cleanup_mux+0x77b/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]
 __pfx_gsm_cleanup_mux+0x10/0x10 drivers/tty/n_gsm.c:3124 [n_gsm]
 __pfx_sched_clock_cpu+0x10/0x10 kernel/sched/clock.c:389
 update_load_avg+0x1c1/0x27b0 kernel/sched/fair.c:4500
 __pfx_min_vruntime_cb_rotate+0x10/0x10 kernel/sched/fair.c:846
 __rb_insert_augmented+0x492/0xbf0 lib/rbtree.c:161
 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]
 _raw_spin_lock_irqsave+0x92/0xf0 arch/x86/include/asm/atomic.h:107
 __pfx_gsmld_ioctl+0x10/0x10 drivers/tty/n_gsm.c:3822 [n_gsm]
 ktime_get+0x5e/0x140 kernel/time/timekeeping.c:195
 ldsem_down_read+0x94/0x4e0 arch/x86/include/asm/atomic64_64.h:79
 __pfx_ldsem_down_read+0x10/0x10 drivers/tty/tty_ldsem.c:338
 __pfx_do_vfs_ioctl+0x10/0x10 fs/ioctl.c:805
 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818

Allocated by task 65:
 gsm_data_alloc.constprop.0+0x27/0x190 drivers/tty/n_gsm.c:926 [n_gsm]
 gsm_send+0x2c/0x580 drivers/tty/n_gsm.c:819 [n_gsm]
 gsm1_receive+0x547/0xad0 drivers/tty/n_gsm.c:3038 [n_gsm]
 gsmld_receive_buf+0x176/0x280 drivers/tty/n_gsm.c:3609 [n_gsm]
 tty_ldisc_receive_buf+0x101/0x1e0 drivers/tty/tty_buffer.c:391
 tty_port_default_receive_buf+0x61/0xa0 drivers/tty/tty_port.c:39
 flush_to_ldisc+0x1b0/0x750 drivers/tty/tty_buffer.c:445
 process_scheduled_works+0x2b0/0x10d0 kernel/workqueue.c:3229
 worker_thread+0x3dc/0x950 kernel/workqueue.c:3391
 kthread+0x2a3/0x370 kernel/kthread.c:389
 ret_from_fork+0x2d/0x70 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:257

Freed by task 3367:
 kfree+0x126/0x420 mm/slub.c:4580
 gsm_cleanup_mux+0x36c/0x7b0 drivers/tty/n_gsm.c:3160 [n_gsm]
 gsmld_ioctl+0x395/0x1450 drivers/tty/n_gsm.c:3408 [n_gsm]
 tty_ioctl+0x643/0x1100 drivers/tty/tty_io.c:2818

[Analysis]
gsm_msg on the tx_ctrl_list or tx_data_list of gsm_mux
can be freed by multi threads through ioctl,which leads
to the occurrence of uaf. Protect it by gsm tx lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50073/">CVE-2024-50073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50073">CVE-2024-50073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225742">SUSE bug 1225742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232520">SUSE bug 1232520</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50074" ref_url="https://www.suse.com/security/cve/CVE-2024-50074" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

parport: Proper fix for array out-of-bounds access

The recent fix for array out-of-bounds accesses replaced sprintf()
calls blindly with snprintf().  However, since snprintf() returns the
would-be-printed size, not the actually output size, the length
calculation can still go over the given limit.

Use scnprintf() instead of snprintf(), which returns the actually
output letters, for addressing the potential out-of-bounds access
properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50074/">CVE-2024-50074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50074">CVE-2024-50074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232507">SUSE bug 1232507</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50075" ref_url="https://www.suse.com/security/cve/CVE-2024-50075" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xhci: tegra: fix checked USB2 port number

If USB virtualizatoin is enabled, USB2 ports are shared between all
Virtual Functions. The USB2 port number owned by an USB2 root hub in
a Virtual Function may be less than total USB2 phy number supported
by the Tegra XUSB controller.

Using total USB2 phy number as port number to check all PORTSC values
would cause invalid memory access.

[  116.923438] Unable to handle kernel paging request at virtual address 006c622f7665642f
...
[  117.213640] Call trace:
[  117.216783]  tegra_xusb_enter_elpg+0x23c/0x658
[  117.222021]  tegra_xusb_runtime_suspend+0x40/0x68
[  117.227260]  pm_generic_runtime_suspend+0x30/0x50
[  117.232847]  __rpm_callback+0x84/0x3c0
[  117.237038]  rpm_suspend+0x2dc/0x740
[  117.241229] pm_runtime_work+0xa0/0xb8
[  117.245769]  process_scheduled_works+0x24c/0x478
[  117.251007]  worker_thread+0x23c/0x328
[  117.255547]  kthread+0x104/0x1b0
[  117.259389]  ret_from_fork+0x10/0x20
[  117.263582] Code: 54000222 f9461ae8 f8747908 b4ffff48 (f9400100)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50075/">CVE-2024-50075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50075">CVE-2024-50075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232506">SUSE bug 1232506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50077" ref_url="https://www.suse.com/security/cve/CVE-2024-50077" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix multiple init when debugfs is disabled

If bt_debugfs is not created successfully, which happens if either
CONFIG_DEBUG_FS or CONFIG_DEBUG_FS_ALLOW_ALL is unset, then iso_init()
returns early and does not set iso_inited to true. This means that a
subsequent call to iso_init() will result in duplicate calls to
proto_register(), bt_sock_register(), etc.

With CONFIG_LIST_HARDENED and CONFIG_BUG_ON_DATA_CORRUPTION enabled, the
duplicate call to proto_register() triggers this BUG():

  list_add double add: new=ffffffffc0b280d0, prev=ffffffffbab56250,
    next=ffffffffc0b280d0.
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:35!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 2 PID: 887 Comm: bluetoothd Not tainted 6.10.11-1-ao-desktop #1
  RIP: 0010:__list_add_valid_or_report+0x9a/0xa0
  ...
    __list_add_valid_or_report+0x9a/0xa0
    proto_register+0x2b5/0x340
    iso_init+0x23/0x150 [bluetooth]
    set_iso_socket_func+0x68/0x1b0 [bluetooth]
    kmem_cache_free+0x308/0x330
    hci_sock_sendmsg+0x990/0x9e0 [bluetooth]
    __sock_sendmsg+0x7b/0x80
    sock_write_iter+0x9a/0x110
    do_iter_readv_writev+0x11d/0x220
    vfs_writev+0x180/0x3e0
    do_writev+0xca/0x100
  ...

This change removes the early return. The check for iso_debugfs being
NULL was unnecessary, it is always NULL when iso_inited is false.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50077/">CVE-2024-50077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50077">CVE-2024-50077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232504">SUSE bug 1232504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50078" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50078" ref_url="https://www.suse.com/security/cve/CVE-2024-50078" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Call iso_exit() on module unload

If iso_init() has been called, iso_exit() must be called on module
unload. Without that, the struct proto that iso_init() registered with
proto_register() becomes invalid, which could cause unpredictable
problems later. In my case, with CONFIG_LIST_HARDENED and
CONFIG_BUG_ON_DATA_CORRUPTION enabled, loading the module again usually
triggers this BUG():

  list_add corruption. next-&gt;prev should be prev (ffffffffb5355fd0),
    but was 0000000000000068. (next=ffffffffc0a010d0).
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:29!
  Oops: invalid opcode: 0000 [#1] PREEMPT SMP PTI
  CPU: 1 PID: 4159 Comm: modprobe Not tainted 6.10.11-4+bt2-ao-desktop #1
  RIP: 0010:__list_add_valid_or_report+0x61/0xa0
  ...
    __list_add_valid_or_report+0x61/0xa0
    proto_register+0x299/0x320
    hci_sock_init+0x16/0xc0 [bluetooth]
    bt_init+0x68/0xd0 [bluetooth]
    __pfx_bt_init+0x10/0x10 [bluetooth]
    do_one_initcall+0x80/0x2f0
    do_init_module+0x8b/0x230
    __do_sys_init_module+0x15f/0x190
    do_syscall_64+0x68/0x110
  ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50078/">CVE-2024-50078 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50078">CVE-2024-50078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232503">SUSE bug 1232503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50081" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50081" ref_url="https://www.suse.com/security/cve/CVE-2024-50081" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-mq: setup queue -&gt;tag_set before initializing hctx

Commit 7b815817aa58 ("blk-mq: add helper for checking if one CPU is mapped to specified hctx")
needs to check queue mapping via tag set in hctx's cpuhp handler.

However, q-&gt;tag_set may not be setup yet when the cpuhp handler is
enabled, then kernel oops is triggered.

Fix the issue by setup queue tag_set before initializing hctx.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50081/">CVE-2024-50081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50081">CVE-2024-50081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232501">SUSE bug 1232501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50082" ref_url="https://www.suse.com/security/cve/CVE-2024-50082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-rq-qos: fix crash on rq_qos_wait vs. rq_qos_wake_function race

We're seeing crashes from rq_qos_wake_function that look like this:

  BUG: unable to handle page fault for address: ffffafe180a40084
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 100000067 P4D 100000067 PUD 10027c067 PMD 10115d067 PTE 0
  Oops: Oops: 0002 [#1] PREEMPT SMP PTI
  CPU: 17 UID: 0 PID: 0 Comm: swapper/17 Not tainted 6.12.0-rc3-00013-geca631b8fe80 #11
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
  RIP: 0010:_raw_spin_lock_irqsave+0x1d/0x40
  Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 9c 41 5c fa 65 ff 05 62 97 30 4c 31 c0 ba 01 00 00 00 &lt;f0&gt; 0f b1 17 75 0a 4c 89 e0 41 5c c3 cc cc cc cc 89 c6 e8 2c 0b 00
  RSP: 0018:ffffafe180580ca0 EFLAGS: 00010046
  RAX: 0000000000000000 RBX: ffffafe180a3f7a8 RCX: 0000000000000011
  RDX: 0000000000000001 RSI: 0000000000000003 RDI: ffffafe180a40084
  RBP: 0000000000000000 R08: 00000000001e7240 R09: 0000000000000011
  R10: 0000000000000028 R11: 0000000000000888 R12: 0000000000000002
  R13: ffffafe180a40084 R14: 0000000000000000 R15: 0000000000000003
  FS:  0000000000000000(0000) GS:ffff9aaf1f280000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffafe180a40084 CR3: 000000010e428002 CR4: 0000000000770ef0
  DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
  PKRU: 55555554
  Call Trace:
   &lt;IRQ&gt;
   try_to_wake_up+0x5a/0x6a0
   rq_qos_wake_function+0x71/0x80
   __wake_up_common+0x75/0xa0
   __wake_up+0x36/0x60
   scale_up.part.0+0x50/0x110
   wb_timer_fn+0x227/0x450
   ...

So rq_qos_wake_function() calls wake_up_process(data-&gt;task), which calls
try_to_wake_up(), which faults in raw_spin_lock_irqsave(&amp;p-&gt;pi_lock).

p comes from data-&gt;task, and data comes from the waitqueue entry, which
is stored on the waiter's stack in rq_qos_wait(). Analyzing the core
dump with drgn, I found that the waiter had already woken up and moved
on to a completely unrelated code path, clobbering what was previously
data-&gt;task. Meanwhile, the waker was passing the clobbered garbage in
data-&gt;task to wake_up_process(), leading to the crash.

What's happening is that in between rq_qos_wake_function() deleting the
waitqueue entry and calling wake_up_process(), rq_qos_wait() is finding
that it already got a token and returning. The race looks like this:

rq_qos_wait()                           rq_qos_wake_function()
==============================================================
prepare_to_wait_exclusive()
                                        data-&gt;got_token = true;
                                        list_del_init(&amp;curr-&gt;entry);
if (data.got_token)
        break;
finish_wait(&amp;rqw-&gt;wait, &amp;data.wq);
  ^- returns immediately because
     list_empty_careful(&amp;wq_entry-&gt;entry)
     is true
... return, go do something else ...
                                        wake_up_process(data-&gt;task)
                                          (NO LONGER VALID!)-^

Normally, finish_wait() is supposed to synchronize against the waker.
But, as noted above, it is returning immediately because the waitqueue
entry has already been removed from the waitqueue.

The bug is that rq_qos_wake_function() is accessing the waitqueue entry
AFTER deleting it. Note that autoremove_wake_function() wakes the waiter
and THEN deletes the waitqueue entry, which is the proper order.

Fix it by swapping the order. We also need to use
list_del_init_careful() to match the list_empty_careful() in
finish_wait().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50082/">CVE-2024-50082 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50082">CVE-2024-50082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232500">SUSE bug 1232500</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50093" ref_url="https://www.suse.com/security/cve/CVE-2024-50093" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thermal: intel: int340x: processor: Fix warning during module unload

The processor_thermal driver uses pcim_device_enable() to enable a PCI
device, which means the device will be automatically disabled on driver
detach.  Thus there is no need to call pci_disable_device() again on it.

With recent PCI device resource management improvements, e.g. commit
f748a07a0b64 ("PCI: Remove legacy pcim_release()"), this problem is
exposed and triggers the warining below.

 [  224.010735] proc_thermal_pci 0000:00:04.0: disabling already-disabled device
 [  224.010747] WARNING: CPU: 8 PID: 4442 at drivers/pci/pci.c:2250 pci_disable_device+0xe5/0x100
 ...
 [  224.010844] Call Trace:
 [  224.010845]  &lt;TASK&gt;
 [  224.010847]  ? show_regs+0x6d/0x80
 [  224.010851]  ? __warn+0x8c/0x140
 [  224.010854]  ? pci_disable_device+0xe5/0x100
 [  224.010856]  ? report_bug+0x1c9/0x1e0
 [  224.010859]  ? handle_bug+0x46/0x80
 [  224.010862]  ? exc_invalid_op+0x1d/0x80
 [  224.010863]  ? asm_exc_invalid_op+0x1f/0x30
 [  224.010867]  ? pci_disable_device+0xe5/0x100
 [  224.010869]  ? pci_disable_device+0xe5/0x100
 [  224.010871]  ? kfree+0x21a/0x2b0
 [  224.010873]  pcim_disable_device+0x20/0x30
 [  224.010875]  devm_action_release+0x16/0x20
 [  224.010878]  release_nodes+0x47/0xc0
 [  224.010880]  devres_release_all+0x9f/0xe0
 [  224.010883]  device_unbind_cleanup+0x12/0x80
 [  224.010885]  device_release_driver_internal+0x1ca/0x210
 [  224.010887]  driver_detach+0x4e/0xa0
 [  224.010889]  bus_remove_driver+0x6f/0xf0
 [  224.010890]  driver_unregister+0x35/0x60
 [  224.010892]  pci_unregister_driver+0x44/0x90
 [  224.010894]  proc_thermal_pci_driver_exit+0x14/0x5f0 [processor_thermal_device_pci]
 ...
 [  224.010921] ---[ end trace 0000000000000000 ]---

Remove the excess pci_disable_device() calls.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50093/">CVE-2024-50093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50093">CVE-2024-50093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232877">SUSE bug 1232877</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50101</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50101" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50101" ref_url="https://www.suse.com/security/cve/CVE-2024-50101" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix incorrect pci_for_each_dma_alias() for non-PCI devices

Previously, the domain_context_clear() function incorrectly called
pci_for_each_dma_alias() to set up context entries for non-PCI devices.
This could lead to kernel hangs or other unexpected behavior.

Add a check to only call pci_for_each_dma_alias() for PCI devices. For
non-PCI devices, domain_context_clear_one() is called directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50101/">CVE-2024-50101 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50101">CVE-2024-50101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232869">SUSE bug 1232869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50102" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50102" ref_url="https://www.suse.com/security/cve/CVE-2024-50102" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86: fix user address masking non-canonical speculation issue

It turns out that AMD has a "Meltdown Lite(tm)" issue with non-canonical
accesses in kernel space.  And so using just the high bit to decide
whether an access is in user space or kernel space ends up with the good
old "leak speculative data" if you have the right gadget using the
result:

  CVE-2020-12965 “Transient Execution of Non-Canonical Accesses“

Now, the kernel surrounds the access with a STAC/CLAC pair, and those
instructions end up serializing execution on older Zen architectures,
which closes the speculation window.

But that was true only up until Zen 5, which renames the AC bit [1].
That improves performance of STAC/CLAC a lot, but also means that the
speculation window is now open.

Note that this affects not just the new address masking, but also the
regular valid_user_address() check used by access_ok(), and the asm
version of the sign bit check in the get_user() helpers.

It does not affect put_user() or clear_user() variants, since there's no
speculative result to be used in a gadget for those operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50102/">CVE-2024-50102 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50102">CVE-2024-50102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232880">SUSE bug 1232880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50106" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50106" ref_url="https://www.suse.com/security/cve/CVE-2024-50106" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix race between laundromat and free_stateid

There is a race between laundromat handling of revoked delegations
and a client sending free_stateid operation. Laundromat thread
finds that delegation has expired and needs to be revoked so it
marks the delegation stid revoked and it puts it on a reaper list
but then it unlock the state lock and the actual delegation revocation
happens without the lock. Once the stid is marked revoked a racing
free_stateid processing thread does the following (1) it calls
list_del_init() which removes it from the reaper list and (2) frees
the delegation stid structure. The laundromat thread ends up not
calling the revoke_delegation() function for this particular delegation
but that means it will no release the lock lease that exists on
the file.

Now, a new open for this file comes in and ends up finding that
lease list isn't empty and calls nfsd_breaker_owns_lease() which ends
up trying to derefence a freed delegation stateid. Leading to the
followint use-after-free KASAN warning:

kernel: ==================================================================
kernel: BUG: KASAN: slab-use-after-free in nfsd_breaker_owns_lease+0x140/0x160 [nfsd]
kernel: Read of size 8 at addr ffff0000e73cd0c8 by task nfsd/6205
kernel:
kernel: CPU: 2 UID: 0 PID: 6205 Comm: nfsd Kdump: loaded Not tainted 6.11.0-rc7+ #9
kernel: Hardware name: Apple Inc. Apple Virtualization Generic Platform, BIOS 2069.0.0.0.0 08/03/2024
kernel: Call trace:
kernel: dump_backtrace+0x98/0x120
kernel: show_stack+0x1c/0x30
kernel: dump_stack_lvl+0x80/0xe8
kernel: print_address_description.constprop.0+0x84/0x390
kernel: print_report+0xa4/0x268
kernel: kasan_report+0xb4/0xf8
kernel: __asan_report_load8_noabort+0x1c/0x28
kernel: nfsd_breaker_owns_lease+0x140/0x160 [nfsd]
kernel: nfsd_file_do_acquire+0xb3c/0x11d0 [nfsd]
kernel: nfsd_file_acquire_opened+0x84/0x110 [nfsd]
kernel: nfs4_get_vfs_file+0x634/0x958 [nfsd]
kernel: nfsd4_process_open2+0xa40/0x1a40 [nfsd]
kernel: nfsd4_open+0xa08/0xe80 [nfsd]
kernel: nfsd4_proc_compound+0xb8c/0x2130 [nfsd]
kernel: nfsd_dispatch+0x22c/0x718 [nfsd]
kernel: svc_process_common+0x8e8/0x1960 [sunrpc]
kernel: svc_process+0x3d4/0x7e0 [sunrpc]
kernel: svc_handle_xprt+0x828/0xe10 [sunrpc]
kernel: svc_recv+0x2cc/0x6a8 [sunrpc]
kernel: nfsd+0x270/0x400 [nfsd]
kernel: kthread+0x288/0x310
kernel: ret_from_fork+0x10/0x20

This patch proposes a fixed that's based on adding 2 new additional
stid's sc_status values that help coordinate between the laundromat
and other operations (nfsd4_free_stateid() and nfsd4_delegreturn()).

First to make sure, that once the stid is marked revoked, it is not
removed by the nfsd4_free_stateid(), the laundromat take a reference
on the stateid. Then, coordinating whether the stid has been put
on the cl_revoked list or we are processing FREE_STATEID and need to
make sure to remove it from the list, each check that state and act
accordingly. If laundromat has added to the cl_revoke list before
the arrival of FREE_STATEID, then nfsd4_free_stateid() knows to remove
it from the list. If nfsd4_free_stateid() finds that operations arrived
before laundromat has placed it on cl_revoke list, it marks the state
freed and then laundromat will no longer add it to the list.

Also, for nfsd4_delegreturn() when looking for the specified stid,
we need to access stid that are marked removed or freeable, it means
the laundromat has started processing it but hasn't finished and this
delegreturn needs to return nfserr_deleg_revoked and not
nfserr_bad_stateid. The latter will not trigger a FREE_STATEID and the
lack of it will leave this stid on the cl_revoked list indefinitely.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50106/">CVE-2024-50106 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50106">CVE-2024-50106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232882">SUSE bug 1232882</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50107</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50107" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50107" ref_url="https://www.suse.com/security/cve/CVE-2024-50107" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/intel/pmc: Fix pmc_core_iounmap to call iounmap for valid addresses

Commit 50c6dbdfd16e ("x86/ioremap: Improve iounmap() address range checks")
introduces a WARN when adrress ranges of iounmap are invalid. On Thinkpad
P1 Gen 7 (Meteor Lake-P) this caused the following warning to appear:

WARNING: CPU: 7 PID: 713 at arch/x86/mm/ioremap.c:461 iounmap+0x58/0x1f0
Modules linked in: rfkill(+) snd_timer(+) fjes(+) snd soundcore intel_pmc_core(+)
int3403_thermal(+) int340x_thermal_zone intel_vsec pmt_telemetry acpi_pad pmt_class
acpi_tad int3400_thermal acpi_thermal_rel joydev loop nfnetlink zram xe drm_suballoc_helper
nouveau i915 mxm_wmi drm_ttm_helper gpu_sched drm_gpuvm drm_exec drm_buddy i2c_algo_bit
crct10dif_pclmul crc32_pclmul ttm crc32c_intel polyval_clmulni rtsx_pci_sdmmc ucsi_acpi
polyval_generic mmc_core hid_multitouch drm_display_helper ghash_clmulni_intel typec_ucsi
nvme sha512_ssse3 video sha256_ssse3 nvme_core intel_vpu sha1_ssse3 rtsx_pci cec typec
nvme_auth i2c_hid_acpi i2c_hid wmi pinctrl_meteorlake serio_raw ip6_tables ip_tables fuse
CPU: 7 UID: 0 PID: 713 Comm: (udev-worker) Not tainted 6.12.0-rc2iounmap+ #42
Hardware name: LENOVO 21KWCTO1WW/21KWCTO1WW, BIOS N48ET19W (1.06 ) 07/18/2024
RIP: 0010:iounmap+0x58/0x1f0
Code: 85 6a 01 00 00 48 8b 05 e6 e2 28 04 48 39 c5 72 19 eb 26 cc cc cc 48 ba 00 00 00 00 00 00 32 00 48 8d 44 02 ff 48 39 c5 72 23 &lt;0f&gt; 0b 48 83 c4 08 5b 5d 41 5c c3 cc cc cc cc 48 ba 00 00 00 00 00
RSP: 0018:ffff888131eff038 EFLAGS: 00010207
RAX: ffffc90000000000 RBX: 0000000000000000 RCX: ffff888e33b80000
RDX: dffffc0000000000 RSI: ffff888e33bc29c0 RDI: 0000000000000000
RBP: 0000000000000000 R08: ffff8881598a8000 R09: ffff888e2ccedc10
R10: 0000000000000003 R11: ffffffffb3367634 R12: 00000000fe000000
R13: ffff888101d0da28 R14: ffffffffc2e437e0 R15: ffff888110b03b28
FS:  00007f3c1d4b3980(0000) GS:ffff888e33b80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005651cfc93578 CR3: 0000000124e4c002 CR4: 0000000000f70ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff07f0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
&lt;TASK&gt;
? __warn.cold+0xb6/0x176
? iounmap+0x58/0x1f0
? report_bug+0x1f4/0x2b0
? handle_bug+0x58/0x90
? exc_invalid_op+0x17/0x40
? asm_exc_invalid_op+0x1a/0x20
? iounmap+0x58/0x1f0
pmc_core_ssram_get_pmc+0x477/0x6c0 [intel_pmc_core]
? __pfx_pmc_core_ssram_get_pmc+0x10/0x10 [intel_pmc_core]
? __pfx_do_pci_enable_device+0x10/0x10
? pci_wait_for_pending+0x60/0x110
? pci_enable_device_flags+0x1e3/0x2e0
? __pfx_mtl_core_init+0x10/0x10 [intel_pmc_core]
pmc_core_ssram_init+0x7f/0x110 [intel_pmc_core]
mtl_core_init+0xda/0x130 [intel_pmc_core]
? __mutex_init+0xb9/0x130
pmc_core_probe+0x27e/0x10b0 [intel_pmc_core]
? _raw_spin_lock_irqsave+0x96/0xf0
? __pfx_pmc_core_probe+0x10/0x10 [intel_pmc_core]
? __pfx_mutex_unlock+0x10/0x10
? __pfx_mutex_lock+0x10/0x10
? device_pm_check_callbacks+0x82/0x370
? acpi_dev_pm_attach+0x234/0x2b0
platform_probe+0x9f/0x150
really_probe+0x1e0/0x8a0
__driver_probe_device+0x18c/0x370
? __pfx___driver_attach+0x10/0x10
driver_probe_device+0x4a/0x120
__driver_attach+0x190/0x4a0
? __pfx___driver_attach+0x10/0x10
bus_for_each_dev+0x103/0x180
? __pfx_bus_for_each_dev+0x10/0x10
? klist_add_tail+0x136/0x270
bus_add_driver+0x2fc/0x540
driver_register+0x1a5/0x360
? __pfx_pmc_core_driver_init+0x10/0x10 [intel_pmc_core]
do_one_initcall+0xa4/0x380
? __pfx_do_one_initcall+0x10/0x10
? kasan_unpoison+0x44/0x70
do_init_module+0x296/0x800
load_module+0x5090/0x6ce0
? __pfx_load_module+0x10/0x10
? ima_post_read_file+0x193/0x200
? __pfx_ima_post_read_file+0x10/0x10
? rw_verify_area+0x152/0x4c0
? kernel_read_file+0x257/0x750
? __pfx_kernel_read_file+0x10/0x10
? __pfx_filemap_get_read_batch+0x10/0x10
? init_module_from_file+0xd1/0x130
init_module_from_file+0xd1/0x130
? __pfx_init_module_from_file+0x10/0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50107/">CVE-2024-50107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50107">CVE-2024-50107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232883">SUSE bug 1232883</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50109</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50109" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50109" ref_url="https://www.suse.com/security/cve/CVE-2024-50109" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix null ptr dereference in raid10_size()

In raid10_run() if raid10_set_queue_limits() succeed, the return value
is set to zero, and if following procedures failed raid10_run() will
return zero while mddev-&gt;private is still NULL, causing null ptr
dereference in raid10_size().

Fix the problem by only overwrite the return value if
raid10_set_queue_limits() failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50109/">CVE-2024-50109 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50109">CVE-2024-50109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232886">SUSE bug 1232886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50117" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50117" ref_url="https://www.suse.com/security/cve/CVE-2024-50117" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd: Guard against bad data for ATIF ACPI method

If a BIOS provides bad data in response to an ATIF method call
this causes a NULL pointer dereference in the caller.

```
? show_regs (arch/x86/kernel/dumpstack.c:478 (discriminator 1))
? __die (arch/x86/kernel/dumpstack.c:423 arch/x86/kernel/dumpstack.c:434)
? page_fault_oops (arch/x86/mm/fault.c:544 (discriminator 2) arch/x86/mm/fault.c:705 (discriminator 2))
? do_user_addr_fault (arch/x86/mm/fault.c:440 (discriminator 1) arch/x86/mm/fault.c:1232 (discriminator 1))
? acpi_ut_update_object_reference (drivers/acpi/acpica/utdelete.c:642)
? exc_page_fault (arch/x86/mm/fault.c:1542)
? asm_exc_page_fault (./arch/x86/include/asm/idtentry.h:623)
? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:387 (discriminator 2)) amdgpu
? amdgpu_atif_query_backlight_caps.constprop.0 (drivers/gpu/drm/amd/amdgpu/amdgpu_acpi.c:386 (discriminator 1)) amdgpu
```

It has been encountered on at least one system, so guard for it.

(cherry picked from commit c9b7c809b89f24e9372a4e7f02d64c950b07fdee)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50117/">CVE-2024-50117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50117">CVE-2024-50117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232897">SUSE bug 1232897</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50120" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50120" ref_url="https://www.suse.com/security/cve/CVE-2024-50120" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: Handle kstrdup failures for passwords

In smb3_reconfigure(), after duplicating ctx-&gt;password and
ctx-&gt;password2 with kstrdup(), we need to check for allocation
failures.

If ses-&gt;password allocation fails, return -ENOMEM.
If ses-&gt;password2 allocation fails, free ses-&gt;password, set it
to NULL, and return -ENOMEM.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50120/">CVE-2024-50120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50120">CVE-2024-50120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232924">SUSE bug 1232924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50121" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50121" ref_url="https://www.suse.com/security/cve/CVE-2024-50121" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: cancel nfsd_shrinker_work using sync mode in nfs4_state_shutdown_net

In the normal case, when we excute `echo 0 &gt; /proc/fs/nfsd/threads`, the
function `nfs4_state_destroy_net` in `nfs4_state_shutdown_net` will
release all resources related to the hashed `nfs4_client`. If the
`nfsd_client_shrinker` is running concurrently, the `expire_client`
function will first unhash this client and then destroy it. This can
lead to the following warning. Additionally, numerous use-after-free
errors may occur as well.

nfsd_client_shrinker         echo 0 &gt; /proc/fs/nfsd/threads

expire_client                nfsd_shutdown_net
  unhash_client                ...
                               nfs4_state_shutdown_net
                                 /* won't wait shrinker exit */
  /*                             cancel_work(&amp;nn-&gt;nfsd_shrinker_work)
   * nfsd_file for this          /* won't destroy unhashed client1 */
   * client1 still alive         nfs4_state_destroy_net
   */

                               nfsd_file_cache_shutdown
                                 /* trigger warning */
                                 kmem_cache_destroy(nfsd_file_slab)
                                 kmem_cache_destroy(nfsd_file_mark_slab)
  /* release nfsd_file and mark */
  __destroy_client

====================================================================
BUG nfsd_file (Not tainted): Objects remaining in nfsd_file on
__kmem_cache_shutdown()
--------------------------------------------------------------------
CPU: 4 UID: 0 PID: 764 Comm: sh Not tainted 6.12.0-rc3+ #1

 dump_stack_lvl+0x53/0x70
 slab_err+0xb0/0xf0
 __kmem_cache_shutdown+0x15c/0x310
 kmem_cache_destroy+0x66/0x160
 nfsd_file_cache_shutdown+0xac/0x210 [nfsd]
 nfsd_destroy_serv+0x251/0x2a0 [nfsd]
 nfsd_svc+0x125/0x1e0 [nfsd]
 write_threads+0x16a/0x2a0 [nfsd]
 nfsctl_transaction_write+0x74/0xa0 [nfsd]
 vfs_write+0x1a5/0x6d0
 ksys_write+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

====================================================================
BUG nfsd_file_mark (Tainted: G    B   W         ): Objects remaining
nfsd_file_mark on __kmem_cache_shutdown()
--------------------------------------------------------------------

 dump_stack_lvl+0x53/0x70
 slab_err+0xb0/0xf0
 __kmem_cache_shutdown+0x15c/0x310
 kmem_cache_destroy+0x66/0x160
 nfsd_file_cache_shutdown+0xc8/0x210 [nfsd]
 nfsd_destroy_serv+0x251/0x2a0 [nfsd]
 nfsd_svc+0x125/0x1e0 [nfsd]
 write_threads+0x16a/0x2a0 [nfsd]
 nfsctl_transaction_write+0x74/0xa0 [nfsd]
 vfs_write+0x1a5/0x6d0
 ksys_write+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

To resolve this issue, cancel `nfsd_shrinker_work` using synchronous
mode in nfs4_state_shutdown_net.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50121/">CVE-2024-50121 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50121">CVE-2024-50121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232925">SUSE bug 1232925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50126" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50126" ref_url="https://www.suse.com/security/cve/CVE-2024-50126" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: use RCU read-side critical section in taprio_dump()

Fix possible use-after-free in 'taprio_dump()' by adding RCU
read-side critical section there. Never seen on x86 but
found on a KASAN-enabled arm64 system when investigating
https://syzkaller.appspot.com/bug?extid=b65e0af58423fc8a73aa:

[T15862] BUG: KASAN: slab-use-after-free in taprio_dump+0xa0c/0xbb0
[T15862] Read of size 4 at addr ffff0000d4bb88f8 by task repro/15862
[T15862]
[T15862] CPU: 0 UID: 0 PID: 15862 Comm: repro Not tainted 6.11.0-rc1-00293-gdefaf1a2113a-dirty #2
[T15862] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-20240524-5.fc40 05/24/2024
[T15862] Call trace:
[T15862]  dump_backtrace+0x20c/0x220
[T15862]  show_stack+0x2c/0x40
[T15862]  dump_stack_lvl+0xf8/0x174
[T15862]  print_report+0x170/0x4d8
[T15862]  kasan_report+0xb8/0x1d4
[T15862]  __asan_report_load4_noabort+0x20/0x2c
[T15862]  taprio_dump+0xa0c/0xbb0
[T15862]  tc_fill_qdisc+0x540/0x1020
[T15862]  qdisc_notify.isra.0+0x330/0x3a0
[T15862]  tc_modify_qdisc+0x7b8/0x1838
[T15862]  rtnetlink_rcv_msg+0x3c8/0xc20
[T15862]  netlink_rcv_skb+0x1f8/0x3d4
[T15862]  rtnetlink_rcv+0x28/0x40
[T15862]  netlink_unicast+0x51c/0x790
[T15862]  netlink_sendmsg+0x79c/0xc20
[T15862]  __sock_sendmsg+0xe0/0x1a0
[T15862]  ____sys_sendmsg+0x6c0/0x840
[T15862]  ___sys_sendmsg+0x1ac/0x1f0
[T15862]  __sys_sendmsg+0x110/0x1d0
[T15862]  __arm64_sys_sendmsg+0x74/0xb0
[T15862]  invoke_syscall+0x88/0x2e0
[T15862]  el0_svc_common.constprop.0+0xe4/0x2a0
[T15862]  do_el0_svc+0x44/0x60
[T15862]  el0_svc+0x50/0x184
[T15862]  el0t_64_sync_handler+0x120/0x12c
[T15862]  el0t_64_sync+0x190/0x194
[T15862]
[T15862] Allocated by task 15857:
[T15862]  kasan_save_stack+0x3c/0x70
[T15862]  kasan_save_track+0x20/0x3c
[T15862]  kasan_save_alloc_info+0x40/0x60
[T15862]  __kasan_kmalloc+0xd4/0xe0
[T15862]  __kmalloc_cache_noprof+0x194/0x334
[T15862]  taprio_change+0x45c/0x2fe0
[T15862]  tc_modify_qdisc+0x6a8/0x1838
[T15862]  rtnetlink_rcv_msg+0x3c8/0xc20
[T15862]  netlink_rcv_skb+0x1f8/0x3d4
[T15862]  rtnetlink_rcv+0x28/0x40
[T15862]  netlink_unicast+0x51c/0x790
[T15862]  netlink_sendmsg+0x79c/0xc20
[T15862]  __sock_sendmsg+0xe0/0x1a0
[T15862]  ____sys_sendmsg+0x6c0/0x840
[T15862]  ___sys_sendmsg+0x1ac/0x1f0
[T15862]  __sys_sendmsg+0x110/0x1d0
[T15862]  __arm64_sys_sendmsg+0x74/0xb0
[T15862]  invoke_syscall+0x88/0x2e0
[T15862]  el0_svc_common.constprop.0+0xe4/0x2a0
[T15862]  do_el0_svc+0x44/0x60
[T15862]  el0_svc+0x50/0x184
[T15862]  el0t_64_sync_handler+0x120/0x12c
[T15862]  el0t_64_sync+0x190/0x194
[T15862]
[T15862] Freed by task 6192:
[T15862]  kasan_save_stack+0x3c/0x70
[T15862]  kasan_save_track+0x20/0x3c
[T15862]  kasan_save_free_info+0x4c/0x80
[T15862]  poison_slab_object+0x110/0x160
[T15862]  __kasan_slab_free+0x3c/0x74
[T15862]  kfree+0x134/0x3c0
[T15862]  taprio_free_sched_cb+0x18c/0x220
[T15862]  rcu_core+0x920/0x1b7c
[T15862]  rcu_core_si+0x10/0x1c
[T15862]  handle_softirqs+0x2e8/0xd64
[T15862]  __do_softirq+0x14/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50126/">CVE-2024-50126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50126">CVE-2024-50126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232895">SUSE bug 1232895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50127" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50127" ref_url="https://www.suse.com/security/cve/CVE-2024-50127" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02069-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02110-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02134-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix use-after-free in taprio_change()

In 'taprio_change()', 'admin' pointer may become dangling due to sched
switch / removal caused by 'advance_sched()', and critical section
protected by 'q-&gt;current_entry_lock' is too small to prevent from such
a scenario (which causes use-after-free detected by KASAN). Fix this
by prefer 'rcu_replace_pointer()' over 'rcu_assign_pointer()' to update
'admin' immediately before an attempt to schedule freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50127/">CVE-2024-50127 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50127">CVE-2024-50127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232907">SUSE bug 1232907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232908">SUSE bug 1232908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50128</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50128" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50128" ref_url="https://www.suse.com/security/cve/CVE-2024-50128" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: fix global oob in wwan_rtnl_policy

The variable wwan_rtnl_link_ops assign a *bigger* maxtype which leads to
a global out-of-bounds read when parsing the netlink attributes. Exactly
same bug cause as the oob fixed in commit b33fb5b801c6 ("net: qualcomm:
rmnet: fix global oob in rmnet_policy").

==================================================================
BUG: KASAN: global-out-of-bounds in validate_nla lib/nlattr.c:388 [inline]
BUG: KASAN: global-out-of-bounds in __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603
Read of size 1 at addr ffffffff8b09cb60 by task syz.1.66276/323862

CPU: 0 PID: 323862 Comm: syz.1.66276 Not tainted 6.1.70 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:284 [inline]
 print_report+0x14f/0x750 mm/kasan/report.c:395
 kasan_report+0x139/0x170 mm/kasan/report.c:495
 validate_nla lib/nlattr.c:388 [inline]
 __nla_validate_parse+0x19d7/0x29a0 lib/nlattr.c:603
 __nla_parse+0x3c/0x50 lib/nlattr.c:700
 nla_parse_nested_deprecated include/net/netlink.h:1269 [inline]
 __rtnl_newlink net/core/rtnetlink.c:3514 [inline]
 rtnl_newlink+0x7bc/0x1fd0 net/core/rtnetlink.c:3623
 rtnetlink_rcv_msg+0x794/0xef0 net/core/rtnetlink.c:6122
 netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508
 netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]
 netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352
 netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874
 sock_sendmsg_nosec net/socket.c:716 [inline]
 __sock_sendmsg net/socket.c:728 [inline]
 ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499
 ___sys_sendmsg+0x21c/0x290 net/socket.c:2553
 __sys_sendmsg net/socket.c:2582 [inline]
 __do_sys_sendmsg net/socket.c:2591 [inline]
 __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f67b19a24ad
RSP: 002b:00007f67b17febb8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f67b1b45f80 RCX: 00007f67b19a24ad
RDX: 0000000000000000 RSI: 0000000020005e40 RDI: 0000000000000004
RBP: 00007f67b1a1e01d R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffd2513764f R14: 00007ffd251376e0 R15: 00007f67b17fed40
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 wwan_rtnl_policy+0x20/0x40

The buggy address belongs to the physical page:
page:ffffea00002c2700 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xb09c
flags: 0xfff00000001000(reserved|node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000001000 ffffea00002c2708 ffffea00002c2708 0000000000000000
raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner info is not present (never set?)

Memory state around the buggy address:
 ffffffff8b09ca00: 05 f9 f9 f9 05 f9 f9 f9 00 01 f9 f9 00 01 f9 f9
 ffffffff8b09ca80: 00 00 00 05 f9 f9 f9 f9 00 00 03 f9 f9 f9 f9 f9
&gt;ffffffff8b09cb00: 00 00 00 00 05 f9 f9 f9 00 00 00 00 f9 f9 f9 f9
                                                       ^
 ffffffff8b09cb80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
==================================================================

According to the comment of `nla_parse_nested_deprecated`, use correct size
`IFLA_WWAN_MAX` here to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50128/">CVE-2024-50128 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50128">CVE-2024-50128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232905">SUSE bug 1232905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50130" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50130" ref_url="https://www.suse.com/security/cve/CVE-2024-50130" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: bpf: must hold reference on net namespace

BUG: KASAN: slab-use-after-free in __nf_unregister_net_hook+0x640/0x6b0
Read of size 8 at addr ffff8880106fe400 by task repro/72=
bpf_nf_link_release+0xda/0x1e0
bpf_link_free+0x139/0x2d0
bpf_link_release+0x68/0x80
__fput+0x414/0xb60

Eric says:
 It seems that bpf was able to defer the __nf_unregister_net_hook()
 after exit()/close() time.
 Perhaps a netns reference is missing, because the netns has been
 dismantled/freed already.
 bpf_nf_link_attach() does :
 link-&gt;net = net;
 But I do not see a reference being taken on net.

Add such a reference and release it after hook unreg.
Note that I was unable to get syzbot reproducer to work, so I
do not know if this resolves this splat.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50130/">CVE-2024-50130 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50130">CVE-2024-50130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232894">SUSE bug 1232894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50141" ref_url="https://www.suse.com/security/cve/CVE-2024-50141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: PRM: Find EFI_MEMORY_RUNTIME block for PRM handler and context

PRMT needs to find the correct type of block to translate the PA-VA
mapping for EFI runtime services.

The issue arises because the PRMT is finding a block of type
EFI_CONVENTIONAL_MEMORY, which is not appropriate for runtime services
as described in Section 2.2.2 (Runtime Services) of the UEFI
Specification [1]. Since the PRM handler is a type of runtime service,
this causes an exception when the PRM handler is called.

    [Firmware Bug]: Unable to handle paging request in EFI runtime service
    WARNING: CPU: 22 PID: 4330 at drivers/firmware/efi/runtime-wrappers.c:341
        __efi_queue_work+0x11c/0x170
    Call trace:

Let PRMT find a block with EFI_MEMORY_RUNTIME for PRM handler and PRM
context.

If no suitable block is found, a warning message will be printed, but
the procedure continues to manage the next PRM handler.

However, if the PRM handler is actually called without proper allocation,
it would result in a failure during error handling.

By using the correct memory types for runtime services, ensure that the
PRM handler and the context are properly mapped in the virtual address
space during runtime, preventing the paging request error.

The issue is really that only memory that has been remapped for runtime
by the firmware can be used by the PRM handler, and so the region needs
to have the EFI_MEMORY_RUNTIME attribute.

[ rjw: Subject and changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50141/">CVE-2024-50141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50141">CVE-2024-50141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233065">SUSE bug 1233065</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50143</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50143" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50143" ref_url="https://www.suse.com/security/cve/CVE-2024-50143" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udf: fix uninit-value use in udf_get_fileshortad

Check for overflow when computing alen in udf_current_aext to mitigate
later uninit-value use in udf_get_fileshortad KMSAN bug[1].
After applying the patch reproducer did not trigger any issue[2].

[1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df
[2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50143/">CVE-2024-50143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50143">CVE-2024-50143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233038">SUSE bug 1233038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50150" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50150" ref_url="https://www.suse.com/security/cve/CVE-2024-50150" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmode should keep reference to parent

The altmode device release refers to its parent device, but without keeping
a reference to it.

When registering the altmode, get a reference to the parent and put it in
the release function.

Before this fix, when using CONFIG_DEBUG_KOBJECT_RELEASE, we see issues
like this:

[   43.572860] kobject: 'port0.0' (ffff8880057ba008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.573532] kobject: 'port0.1' (ffff8880057bd008): kobject_release, parent 0000000000000000 (delayed 1000)
[   43.574407] kobject: 'port0' (ffff8880057b9008): kobject_release, parent 0000000000000000 (delayed 3000)
[   43.575059] kobject: 'port1.0' (ffff8880057ca008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.575908] kobject: 'port1.1' (ffff8880057c9008): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.576908] kobject: 'typec' (ffff8880062dbc00): kobject_release, parent 0000000000000000 (delayed 4000)
[   43.577769] kobject: 'port1' (ffff8880057bf008): kobject_release, parent 0000000000000000 (delayed 3000)
[   46.612867] ==================================================================
[   46.613402] BUG: KASAN: slab-use-after-free in typec_altmode_release+0x38/0x129
[   46.614003] Read of size 8 at addr ffff8880057b9118 by task kworker/2:1/48
[   46.614538]
[   46.614668] CPU: 2 UID: 0 PID: 48 Comm: kworker/2:1 Not tainted 6.12.0-rc1-00138-gedbae730ad31 #535
[   46.615391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[   46.616042] Workqueue: events kobject_delayed_cleanup
[   46.616446] Call Trace:
[   46.616648]  &lt;TASK&gt;
[   46.616820]  dump_stack_lvl+0x5b/0x7c
[   46.617112]  ? typec_altmode_release+0x38/0x129
[   46.617470]  print_report+0x14c/0x49e
[   46.617769]  ? rcu_read_unlock_sched+0x56/0x69
[   46.618117]  ? __virt_addr_valid+0x19a/0x1ab
[   46.618456]  ? kmem_cache_debug_flags+0xc/0x1d
[   46.618807]  ? typec_altmode_release+0x38/0x129
[   46.619161]  kasan_report+0x8d/0xb4
[   46.619447]  ? typec_altmode_release+0x38/0x129
[   46.619809]  ? process_scheduled_works+0x3cb/0x85f
[   46.620185]  typec_altmode_release+0x38/0x129
[   46.620537]  ? process_scheduled_works+0x3cb/0x85f
[   46.620907]  device_release+0xaf/0xf2
[   46.621206]  kobject_delayed_cleanup+0x13b/0x17a
[   46.621584]  process_scheduled_works+0x4f6/0x85f
[   46.621955]  ? __pfx_process_scheduled_works+0x10/0x10
[   46.622353]  ? hlock_class+0x31/0x9a
[   46.622647]  ? lock_acquired+0x361/0x3c3
[   46.622956]  ? move_linked_works+0x46/0x7d
[   46.623277]  worker_thread+0x1ce/0x291
[   46.623582]  ? __kthread_parkme+0xc8/0xdf
[   46.623900]  ? __pfx_worker_thread+0x10/0x10
[   46.624236]  kthread+0x17e/0x190
[   46.624501]  ? kthread+0xfb/0x190
[   46.624756]  ? __pfx_kthread+0x10/0x10
[   46.625015]  ret_from_fork+0x20/0x40
[   46.625268]  ? __pfx_kthread+0x10/0x10
[   46.625532]  ret_from_fork_asm+0x1a/0x30
[   46.625805]  &lt;/TASK&gt;
[   46.625953]
[   46.626056] Allocated by task 678:
[   46.626287]  kasan_save_stack+0x24/0x44
[   46.626555]  kasan_save_track+0x14/0x2d
[   46.626811]  __kasan_kmalloc+0x3f/0x4d
[   46.627049]  __kmalloc_noprof+0x1bf/0x1f0
[   46.627362]  typec_register_port+0x23/0x491
[   46.627698]  cros_typec_probe+0x634/0xbb6
[   46.628026]  platform_probe+0x47/0x8c
[   46.628311]  really_probe+0x20a/0x47d
[   46.628605]  device_driver_attach+0x39/0x72
[   46.628940]  bind_store+0x87/0xd7
[   46.629213]  kernfs_fop_write_iter+0x1aa/0x218
[   46.629574]  vfs_write+0x1d6/0x29b
[   46.629856]  ksys_write+0xcd/0x13b
[   46.630128]  do_syscall_64+0xd4/0x139
[   46.630420]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   46.630820]
[   46.630946] Freed by task 48:
[   46.631182]  kasan_save_stack+0x24/0x44
[   46.631493]  kasan_save_track+0x14/0x2d
[   46.631799]  kasan_save_free_info+0x3f/0x4d
[   46.632144]  __kasan_slab_free+0x37/0x45
[   46.632474]
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50150/">CVE-2024-50150 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50150">CVE-2024-50150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233051">SUSE bug 1233051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50151" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50151" ref_url="https://www.suse.com/security/cve/CVE-2024-50151" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix OOBs when building SMB2_IOCTL request

When using encryption, either enforced by the server or when using
'seal' mount option, the client will squash all compound request buffers
down for encryption into a single iov in smb2_set_next_command().

SMB2_ioctl_init() allocates a small buffer (448 bytes) to hold the
SMB2_IOCTL request in the first iov, and if the user passes an input
buffer that is greater than 328 bytes, smb2_set_next_command() will
end up writing off the end of @rqst-&gt;iov[0].iov_base as shown below:

  mount.cifs //srv/share /mnt -o ...,seal
  ln -s $(perl -e "print('a')for 1..1024") /mnt/link

  BUG: KASAN: slab-out-of-bounds in
  smb2_set_next_command.cold+0x1d6/0x24c [cifs]
  Write of size 4116 at addr ffff8881148fcab8 by task ln/859

  CPU: 1 UID: 0 PID: 859 Comm: ln Not tainted 6.12.0-rc3 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  1.16.3-2.fc40 04/01/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x5d/0x80
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   print_report+0x156/0x4d9
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   ? __virt_addr_valid+0x145/0x310
   ? __phys_addr+0x46/0x90
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   kasan_report+0xda/0x110
   ? smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   kasan_check_range+0x10f/0x1f0
   __asan_memcpy+0x3c/0x60
   smb2_set_next_command.cold+0x1d6/0x24c [cifs]
   smb2_compound_op+0x238c/0x3840 [cifs]
   ? kasan_save_track+0x14/0x30
   ? kasan_save_free_info+0x3b/0x70
   ? vfs_symlink+0x1a1/0x2c0
   ? do_symlinkat+0x108/0x1c0
   ? __pfx_smb2_compound_op+0x10/0x10 [cifs]
   ? kmem_cache_free+0x118/0x3e0
   ? cifs_get_writable_path+0xeb/0x1a0 [cifs]
   smb2_get_reparse_inode+0x423/0x540 [cifs]
   ? __pfx_smb2_get_reparse_inode+0x10/0x10 [cifs]
   ? rcu_is_watching+0x20/0x50
   ? __kmalloc_noprof+0x37c/0x480
   ? smb2_create_reparse_symlink+0x257/0x490 [cifs]
   ? smb2_create_reparse_symlink+0x38f/0x490 [cifs]
   smb2_create_reparse_symlink+0x38f/0x490 [cifs]
   ? __pfx_smb2_create_reparse_symlink+0x10/0x10 [cifs]
   ? find_held_lock+0x8a/0xa0
   ? hlock_class+0x32/0xb0
   ? __build_path_from_dentry_optional_prefix+0x19d/0x2e0 [cifs]
   cifs_symlink+0x24f/0x960 [cifs]
   ? __pfx_make_vfsuid+0x10/0x10
   ? __pfx_cifs_symlink+0x10/0x10 [cifs]
   ? make_vfsgid+0x6b/0xc0
   ? generic_permission+0x96/0x2d0
   vfs_symlink+0x1a1/0x2c0
   do_symlinkat+0x108/0x1c0
   ? __pfx_do_symlinkat+0x10/0x10
   ? strncpy_from_user+0xaa/0x160
   __x64_sys_symlinkat+0xb9/0xf0
   do_syscall_64+0xbb/0x1d0
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7f08d75c13bb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50151/">CVE-2024-50151 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50151">CVE-2024-50151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233055">SUSE bug 1233055</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50152</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50152" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50152" ref_url="https://www.suse.com/security/cve/CVE-2024-50152" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix possible double free in smb2_set_ea()

Clang static checker(scan-build) warning:
fs/smb/client/smb2ops.c:1304:2: Attempt to free released memory.
 1304 |         kfree(ea);
      |         ^~~~~~~~~

There is a double free in such case:
'ea is initialized to NULL' -&gt; 'first successful memory allocation for
ea' -&gt; 'something failed, goto sea_exit' -&gt; 'first memory release for ea'
-&gt; 'goto replay_again' -&gt; 'second goto sea_exit before allocate memory
for ea' -&gt; 'second memory release for ea resulted in double free'.

Re-initialie 'ea' to NULL near to the replay_again label, it can fix this
double free problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50152/">CVE-2024-50152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50152">CVE-2024-50152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233033">SUSE bug 1233033</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50153</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50153" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50153" ref_url="https://www.suse.com/security/cve/CVE-2024-50153" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: core: Fix null-ptr-deref in target_alloc_device()

There is a null-ptr-deref issue reported by KASAN:

BUG: KASAN: null-ptr-deref in target_alloc_device+0xbc4/0xbe0 [target_core_mod]
...
 kasan_report+0xb9/0xf0
 target_alloc_device+0xbc4/0xbe0 [target_core_mod]
 core_dev_setup_virtual_lun0+0xef/0x1f0 [target_core_mod]
 target_core_init_configfs+0x205/0x420 [target_core_mod]
 do_one_initcall+0xdd/0x4e0
...
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

In target_alloc_device(), if allocing memory for dev queues fails, then
dev will be freed by dev-&gt;transport-&gt;free_device(), but dev-&gt;transport
is not initialized at that time, which will lead to a null pointer
reference problem.

Fixing this bug by freeing dev with hba-&gt;backend-&gt;ops-&gt;free_device().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50153/">CVE-2024-50153 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50153">CVE-2024-50153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233061">SUSE bug 1233061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50154" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50154" ref_url="https://www.suse.com/security/cve/CVE-2024-50154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000779.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11455" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03514-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03557-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20819-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink().

Martin KaFai Lau reported use-after-free [0] in reqsk_timer_handler().

  """
  We are seeing a use-after-free from a bpf prog attached to
  trace_tcp_retransmit_synack. The program passes the req-&gt;sk to the
  bpf_sk_storage_get_tracing kernel helper which does check for null
  before using it.
  """

The commit 83fccfc3940c ("inet: fix potential deadlock in
reqsk_queue_unlink()") added timer_pending() in reqsk_queue_unlink() not
to call del_timer_sync() from reqsk_timer_handler(), but it introduced a
small race window.

Before the timer is called, expire_timers() calls detach_timer(timer, true)
to clear timer-&gt;entry.pprev and marks it as not pending.

If reqsk_queue_unlink() checks timer_pending() just after expire_timers()
calls detach_timer(), TCP will miss del_timer_sync(); the reqsk timer will
continue running and send multiple SYN+ACKs until it expires.

The reported UAF could happen if req-&gt;sk is close()d earlier than the timer
expiration, which is 63s by default.

The scenario would be

  1. inet_csk_complete_hashdance() calls inet_csk_reqsk_queue_drop(),
     but del_timer_sync() is missed

  2. reqsk timer is executed and scheduled again

  3. req-&gt;sk is accept()ed and reqsk_put() decrements rsk_refcnt, but
     reqsk timer still has another one, and inet_csk_accept() does not
     clear req-&gt;sk for non-TFO sockets

  4. sk is close()d

  5. reqsk timer is executed again, and BPF touches req-&gt;sk

Let's not use timer_pending() by passing the caller context to
__inet_csk_reqsk_queue_drop().

Note that reqsk timer is pinned, so the issue does not happen in most
use cases. [1]

[0]
BUG: KFENCE: use-after-free read in bpf_sk_storage_get_tracing+0x2e/0x1b0

Use-after-free read at 0x00000000a891fb3a (in kfence-#1):
bpf_sk_storage_get_tracing+0x2e/0x1b0
bpf_prog_5ea3e95db6da0438_tcp_retransmit_synack+0x1d20/0x1dda
bpf_trace_run2+0x4c/0xc0
tcp_rtx_synack+0xf9/0x100
reqsk_timer_handler+0xda/0x3d0
run_timer_softirq+0x292/0x8a0
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
intel_idle_irq+0x5a/0xa0
cpuidle_enter_state+0x94/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

kfence-#1: 0x00000000a72cc7b6-0x00000000d97616d9, size=2376, cache=TCPv6

allocated by task 0 on cpu 9 at 260507.901592s:
sk_prot_alloc+0x35/0x140
sk_clone_lock+0x1f/0x3f0
inet_csk_clone_lock+0x15/0x160
tcp_create_openreq_child+0x1f/0x410
tcp_v6_syn_recv_sock+0x1da/0x700
tcp_check_req+0x1fb/0x510
tcp_v6_rcv+0x98b/0x1420
ipv6_list_rcv+0x2258/0x26e0
napi_complete_done+0x5b1/0x2990
mlx5e_napi_poll+0x2ae/0x8d0
net_rx_action+0x13e/0x590
irq_exit_rcu+0xf5/0x320
common_interrupt+0x80/0x90
asm_common_interrupt+0x22/0x40
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb

freed by task 0 on cpu 9 at 260507.927527s:
rcu_core_si+0x4ff/0xf10
irq_exit_rcu+0xf5/0x320
sysvec_apic_timer_interrupt+0x6d/0x80
asm_sysvec_apic_timer_interrupt+0x16/0x20
cpuidle_enter_state+0xfb/0x273
cpu_startup_entry+0x15e/0x260
start_secondary+0x8a/0x90
secondary_startup_64_no_verify+0xfa/0xfb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50154/">CVE-2024-50154 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50154">CVE-2024-50154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233070">SUSE bug 1233070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233072">SUSE bug 1233072</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961451" comment="bpftool-7.4.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961452" comment="kernel-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961453" comment="kernel-abi-stablelists-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961454" comment="kernel-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961455" comment="kernel-cross-headers-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961456" comment="kernel-debug-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961457" comment="kernel-debug-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961460" comment="kernel-debug-modules-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961461" comment="kernel-debug-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961462" comment="kernel-debug-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961463" comment="kernel-debug-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961466" comment="kernel-doc-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961467" comment="kernel-headers-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961468" comment="kernel-modules-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961469" comment="kernel-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961470" comment="kernel-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961471" comment="kernel-tools-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961472" comment="kernel-tools-libs-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961474" comment="kernel-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961475" comment="kernel-uki-virt-addons-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961476" comment="libperf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961477" comment="perf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961478" comment="python3-perf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961479" comment="rtla-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961480" comment="rv-5.14.0-503.22.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50162</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50162" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50162" ref_url="https://www.suse.com/security/cve/CVE-2024-50162" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: devmap: provide rxq after redirect

rxq contains a pointer to the device from where
the redirect happened. Currently, the BPF program
that was executed after a redirect via BPF_MAP_TYPE_DEVMAP*
does not have it set.

This is particularly bad since accessing ingress_ifindex, e.g.

SEC("xdp")
int prog(struct xdp_md *pkt)
{
        return bpf_redirect_map(&amp;dev_redirect_map, 0, 0);
}

SEC("xdp/devmap")
int prog_after_redirect(struct xdp_md *pkt)
{
        bpf_printk("ifindex %i", pkt-&gt;ingress_ifindex);
        return XDP_PASS;
}

depends on access to rxq, so a NULL pointer gets dereferenced:

&lt;1&gt;[  574.475170] BUG: kernel NULL pointer dereference, address: 0000000000000000
&lt;1&gt;[  574.475188] #PF: supervisor read access in kernel mode
&lt;1&gt;[  574.475194] #PF: error_code(0x0000) - not-present page
&lt;6&gt;[  574.475199] PGD 0 P4D 0
&lt;4&gt;[  574.475207] Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
&lt;4&gt;[  574.475217] CPU: 4 UID: 0 PID: 217 Comm: kworker/4:1 Not tainted 6.11.0-rc5-reduced-00859-g780801200300 #23
&lt;4&gt;[  574.475226] Hardware name: Intel(R) Client Systems NUC13ANHi7/NUC13ANBi7, BIOS ANRPL357.0026.2023.0314.1458 03/14/2023
&lt;4&gt;[  574.475231] Workqueue: mld mld_ifc_work
&lt;4&gt;[  574.475247] RIP: 0010:bpf_prog_5e13354d9cf5018a_prog_after_redirect+0x17/0x3c
&lt;4&gt;[  574.475257] Code: cc cc cc cc cc cc cc 80 00 00 00 cc cc cc cc cc cc cc cc f3 0f 1e fa 0f 1f 44 00 00 66 90 55 48 89 e5 f3 0f 1e fa 48 8b 57 20 &lt;48&gt; 8b 52 00 8b 92 e0 00 00 00 48 bf f8 a6 d5 c4 5d a0 ff ff be 0b
&lt;4&gt;[  574.475263] RSP: 0018:ffffa62440280c98 EFLAGS: 00010206
&lt;4&gt;[  574.475269] RAX: ffffa62440280cd8 RBX: 0000000000000001 RCX: 0000000000000000
&lt;4&gt;[  574.475274] RDX: 0000000000000000 RSI: ffffa62440549048 RDI: ffffa62440280ce0
&lt;4&gt;[  574.475278] RBP: ffffa62440280c98 R08: 0000000000000002 R09: 0000000000000001
&lt;4&gt;[  574.475281] R10: ffffa05dc8b98000 R11: ffffa05f577fca40 R12: ffffa05dcab24000
&lt;4&gt;[  574.475285] R13: ffffa62440280ce0 R14: ffffa62440549048 R15: ffffa62440549000
&lt;4&gt;[  574.475289] FS:  0000000000000000(0000) GS:ffffa05f4f700000(0000) knlGS:0000000000000000
&lt;4&gt;[  574.475294] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&lt;4&gt;[  574.475298] CR2: 0000000000000000 CR3: 000000025522e000 CR4: 0000000000f50ef0
&lt;4&gt;[  574.475303] PKRU: 55555554
&lt;4&gt;[  574.475306] Call Trace:
&lt;4&gt;[  574.475313]  &lt;IRQ&gt;
&lt;4&gt;[  574.475318]  ? __die+0x23/0x70
&lt;4&gt;[  574.475329]  ? page_fault_oops+0x180/0x4c0
&lt;4&gt;[  574.475339]  ? skb_pp_cow_data+0x34c/0x490
&lt;4&gt;[  574.475346]  ? kmem_cache_free+0x257/0x280
&lt;4&gt;[  574.475357]  ? exc_page_fault+0x67/0x150
&lt;4&gt;[  574.475368]  ? asm_exc_page_fault+0x26/0x30
&lt;4&gt;[  574.475381]  ? bpf_prog_5e13354d9cf5018a_prog_after_redirect+0x17/0x3c
&lt;4&gt;[  574.475386]  bq_xmit_all+0x158/0x420
&lt;4&gt;[  574.475397]  __dev_flush+0x30/0x90
&lt;4&gt;[  574.475407]  veth_poll+0x216/0x250 [veth]
&lt;4&gt;[  574.475421]  __napi_poll+0x28/0x1c0
&lt;4&gt;[  574.475430]  net_rx_action+0x32d/0x3a0
&lt;4&gt;[  574.475441]  handle_softirqs+0xcb/0x2c0
&lt;4&gt;[  574.475451]  do_softirq+0x40/0x60
&lt;4&gt;[  574.475458]  &lt;/IRQ&gt;
&lt;4&gt;[  574.475461]  &lt;TASK&gt;
&lt;4&gt;[  574.475464]  __local_bh_enable_ip+0x66/0x70
&lt;4&gt;[  574.475471]  __dev_queue_xmit+0x268/0xe40
&lt;4&gt;[  574.475480]  ? selinux_ip_postroute+0x213/0x420
&lt;4&gt;[  574.475491]  ? alloc_skb_with_frags+0x4a/0x1d0
&lt;4&gt;[  574.475502]  ip6_finish_output2+0x2be/0x640
&lt;4&gt;[  574.475512]  ? nf_hook_slow+0x42/0xf0
&lt;4&gt;[  574.475521]  ip6_finish_output+0x194/0x300
&lt;4&gt;[  574.475529]  ? __pfx_ip6_finish_output+0x10/0x10
&lt;4&gt;[  574.475538]  mld_sendpack+0x17c/0x240
&lt;4&gt;[  574.475548]  mld_ifc_work+0x192/0x410
&lt;4&gt;[  574.475557]  process_one_work+0x15d/0x380
&lt;4&gt;[  574.475566]  worker_thread+0x29d/0x3a0
&lt;4&gt;[  574.475573]  ? __pfx_worker_thread+0x10/0x10
&lt;4&gt;[  574.475580]  ? __pfx_worker_thread+0x10/0x10
&lt;4&gt;[  574.475587]  kthread+0xcd/0x100
&lt;4&gt;[  574.475597]  ? __pfx_kthread+0x10/0x10
&lt;4&gt;[  574.475606]  ret_from_fork+0x31/0x50
&lt;4&gt;[  574.475615]  ? __pfx_kthread+0x10/0x10
&lt;4&gt;[  574.475623]  ret_from_fork_asm+0x1a/0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50162/">CVE-2024-50162 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50162">CVE-2024-50162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233075">SUSE bug 1233075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50163</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50163" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50163" ref_url="https://www.suse.com/security/cve/CVE-2024-50163" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Make sure internal and UAPI bpf_redirect flags don't overlap

The bpf_redirect_info is shared between the SKB and XDP redirect paths,
and the two paths use the same numeric flag values in the ri-&gt;flags
field (specifically, BPF_F_BROADCAST == BPF_F_NEXTHOP). This means that
if skb bpf_redirect_neigh() is used with a non-NULL params argument and,
subsequently, an XDP redirect is performed using the same
bpf_redirect_info struct, the XDP path will get confused and end up
crashing, which syzbot managed to trigger.

With the stack-allocated bpf_redirect_info, the structure is no longer
shared between the SKB and XDP paths, so the crash doesn't happen
anymore. However, different code paths using identically-numbered flag
values in the same struct field still seems like a bit of a mess, so
this patch cleans that up by moving the flag definitions together and
redefining the three flags in BPF_F_REDIRECT_INTERNAL to not overlap
with the flags used for XDP. It also adds a BUILD_BUG_ON() check to make
sure the overlap is not re-introduced by mistake.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50163/">CVE-2024-50163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50163">CVE-2024-50163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233098">SUSE bug 1233098</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50169</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50169" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50169" ref_url="https://www.suse.com/security/cve/CVE-2024-50169" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Update rx_bytes on read_skb()

Make sure virtio_transport_inc_rx_pkt() and virtio_transport_dec_rx_pkt()
calls are balanced (i.e. virtio_vsock_sock::rx_bytes doesn't lie) after
vsock_transport::read_skb().

While here, also inform the peer that we've freed up space and it has more
credit.

Failing to update rx_bytes after packet is dequeued leads to a warning on
SOCK_STREAM recv():

[  233.396654] rx_queue is empty, but rx_bytes is non-zero
[  233.396702] WARNING: CPU: 11 PID: 40601 at net/vmw_vsock/virtio_transport_common.c:589
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50169/">CVE-2024-50169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50169">CVE-2024-50169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233320">SUSE bug 1233320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50182" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50182" ref_url="https://www.suse.com/security/cve/CVE-2024-50182" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

secretmem: disable memfd_secret() if arch cannot set direct map

Return -ENOSYS from memfd_secret() syscall if !can_set_direct_map().  This
is the case for example on some arm64 configurations, where marking 4k
PTEs in the direct map not present can only be done if the direct map is
set up at 4k granularity in the first place (as ARM's break-before-make
semantics do not easily allow breaking apart large/gigantic pages).

More precisely, on arm64 systems with !can_set_direct_map(),
set_direct_map_invalid_noflush() is a no-op, however it returns success
(0) instead of an error.  This means that memfd_secret will seemingly
"work" (e.g.  syscall succeeds, you can mmap the fd and fault in pages),
but it does not actually achieve its goal of removing its memory from the
direct map.

Note that with this patch, memfd_secret() will start erroring on systems
where can_set_direct_map() returns false (arm64 with
CONFIG_RODATA_FULL_DEFAULT_ENABLED=n, CONFIG_DEBUG_PAGEALLOC=n and
CONFIG_KFENCE=n), but that still seems better than the current silent
failure.  Since CONFIG_RODATA_FULL_DEFAULT_ENABLED defaults to 'y', most
arm64 systems actually have a working memfd_secret() and aren't be
affected.

From going through the iterations of the original memfd_secret patch
series, it seems that disabling the syscall in these scenarios was the
intended behavior [1] (preferred over having
set_direct_map_invalid_noflush return an error as that would result in
SIGBUSes at page-fault time), however the check for it got dropped between
v16 [2] and v17 [3], when secretmem moved away from CMA allocations.

[1]: https://lore.kernel.org/lkml/20201124164930.GK8537@kernel.org/
[2]: https://lore.kernel.org/lkml/20210121122723.3446-11-rppt@kernel.org/#t
[3]: https://lore.kernel.org/lkml/20201125092208.12544-10-rppt@kernel.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50182/">CVE-2024-50182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50182">CVE-2024-50182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233129">SUSE bug 1233129</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50186</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50186" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50186" ref_url="https://www.suse.com/security/cve/CVE-2024-50186" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: explicitly clear the sk pointer, when pf-&gt;create fails

We have recently noticed the exact same KASAN splat as in commit
6cd4a78d962b ("net: do not leave a dangling sk pointer, when socket
creation fails"). The problem is that commit did not fully address the
problem, as some pf-&gt;create implementations do not use sk_common_release
in their error paths.

For example, we can use the same reproducer as in the above commit, but
changing ping to arping. arping uses AF_PACKET socket and if packet_create
fails, it will just sk_free the allocated sk object.

While we could chase all the pf-&gt;create implementations and make sure they
NULL the freed sk object on error from the socket, we can't guarantee
future protocols will not make the same mistake.

So it is easier to just explicitly NULL the sk pointer upon return from
pf-&gt;create in __sock_create. We do know that pf-&gt;create always releases the
allocated sk object on error, so if the pointer is not NULL, it is
definitely dangling.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50186/">CVE-2024-50186 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50186">CVE-2024-50186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233110">SUSE bug 1233110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50189" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50189" ref_url="https://www.suse.com/security/cve/CVE-2024-50189" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: amd_sfh: Switch to device-managed dmam_alloc_coherent()

Using the device-managed version allows to simplify clean-up in probe()
error path.

Additionally, this device-managed ensures proper cleanup, which helps to
resolve memory errors, page faults, btrfs going read-only, and btrfs
disk corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50189/">CVE-2024-50189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50189">CVE-2024-50189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233105">SUSE bug 1233105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50191" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50191" ref_url="https://www.suse.com/security/cve/CVE-2024-50191" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: don't set SB_RDONLY after filesystem errors

When the filesystem is mounted with errors=remount-ro, we were setting
SB_RDONLY flag to stop all filesystem modifications. We knew this misses
proper locking (sb-&gt;s_umount) and does not go through proper filesystem
remount procedure but it has been the way this worked since early ext2
days and it was good enough for catastrophic situation damage
mitigation. Recently, syzbot has found a way (see link) to trigger
warnings in filesystem freezing because the code got confused by
SB_RDONLY changing under its hands. Since these days we set
EXT4_FLAGS_SHUTDOWN on the superblock which is enough to stop all
filesystem modifications, modifying SB_RDONLY shouldn't be needed. So
stop doing that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50191/">CVE-2024-50191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50191">CVE-2024-50191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233101">SUSE bug 1233101</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50195</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50195" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50195" ref_url="https://www.suse.com/security/cve/CVE-2024-50195" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-clock: Fix missing timespec64 check in pc_clock_settime()

As Andrew pointed out, it will make sense that the PTP core
checked timespec64 struct's tv_sec and tv_nsec range before calling
ptp-&gt;info-&gt;settime64().

As the man manual of clock_settime() said, if tp.tv_sec is negative or
tp.tv_nsec is outside the range [0..999,999,999], it should return EINVAL,
which include dynamic clocks which handles PTP clock, and the condition is
consistent with timespec64_valid(). As Thomas suggested, timespec64_valid()
only check the timespec is valid, but not ensure that the time is
in a valid range, so check it ahead using timespec64_valid_strict()
in pc_clock_settime() and return -EINVAL if not valid.

There are some drivers that use tp-&gt;tv_sec and tp-&gt;tv_nsec directly to
write registers without validity checks and assume that the higher layer
has checked it, which is dangerous and will benefit from this, such as
hclge_ptp_settime(), igb_ptp_settime_i210(), _rcar_gen4_ptp_settime(),
and some drivers can remove the checks of itself.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50195/">CVE-2024-50195 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50195">CVE-2024-50195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233103">SUSE bug 1233103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50197" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50197" ref_url="https://www.suse.com/security/cve/CVE-2024-50197" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: intel: platform: fix error path in device_for_each_child_node()

The device_for_each_child_node() loop requires calls to
fwnode_handle_put() upon early returns to decrement the refcount of
the child node and avoid leaking memory if that error path is triggered.

There is one early returns within that loop in
intel_platform_pinctrl_prepare_community(), but fwnode_handle_put() is
missing.

Instead of adding the missing call, the scoped version of the loop can
be used to simplify the code and avoid mistakes in the future if new
early returns are added, as the child node is only used for parsing, and
it is never assigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50197/">CVE-2024-50197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50197">CVE-2024-50197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233089">SUSE bug 1233089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50199" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50199" ref_url="https://www.suse.com/security/cve/CVE-2024-50199" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/swapfile: skip HugeTLB pages for unuse_vma

I got a bad pud error and lost a 1GB HugeTLB when calling swapoff.  The
problem can be reproduced by the following steps:

 1. Allocate an anonymous 1GB HugeTLB and some other anonymous memory.
 2. Swapout the above anonymous memory.
 3. run swapoff and we will get a bad pud error in kernel message:

  mm/pgtable-generic.c:42: bad pud 00000000743d215d(84000001400000e7)

We can tell that pud_clear_bad is called by pud_none_or_clear_bad in
unuse_pud_range() by ftrace.  And therefore the HugeTLB pages will never
be freed because we lost it from page table.  We can skip HugeTLB pages
for unuse_vma to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50199/">CVE-2024-50199 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50199">CVE-2024-50199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233112">SUSE bug 1233112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50200" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50200" ref_url="https://www.suse.com/security/cve/CVE-2024-50200" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

maple_tree: correct tree corruption on spanning store

Patch series "maple_tree: correct tree corruption on spanning store", v3.

There has been a nasty yet subtle maple tree corruption bug that appears
to have been in existence since the inception of the algorithm.

This bug seems far more likely to happen since commit f8d112a4e657
("mm/mmap: avoid zeroing vma tree in mmap_region()"), which is the point
at which reports started to be submitted concerning this bug.

We were made definitely aware of the bug thanks to the kind efforts of
Bert Karwatzki who helped enormously in my being able to track this down
and identify the cause of it.

The bug arises when an attempt is made to perform a spanning store across
two leaf nodes, where the right leaf node is the rightmost child of the
shared parent, AND the store completely consumes the right-mode node.

This results in mas_wr_spanning_store() mitakenly duplicating the new and
existing entries at the maximum pivot within the range, and thus maple
tree corruption.

The fix patch corrects this by detecting this scenario and disallowing the
mistaken duplicate copy.

The fix patch commit message goes into great detail as to how this occurs.

This series also includes a test which reliably reproduces the issue, and
asserts that the fix works correctly.

Bert has kindly tested the fix and confirmed it resolved his issues.  Also
Mikhail Gavrilov kindly reported what appears to be precisely the same
bug, which this fix should also resolve.


This patch (of 2):

There has been a subtle bug present in the maple tree implementation from
its inception.

This arises from how stores are performed - when a store occurs, it will
overwrite overlapping ranges and adjust the tree as necessary to
accommodate this.

A range may always ultimately span two leaf nodes.  In this instance we
walk the two leaf nodes, determine which elements are not overwritten to
the left and to the right of the start and end of the ranges respectively
and then rebalance the tree to contain these entries and the newly
inserted one.

This kind of store is dubbed a 'spanning store' and is implemented by
mas_wr_spanning_store().

In order to reach this stage, mas_store_gfp() invokes
mas_wr_preallocate(), mas_wr_store_type() and mas_wr_walk() in turn to
walk the tree and update the object (mas) to traverse to the location
where the write should be performed, determining its store type.

When a spanning store is required, this function returns false stopping at
the parent node which contains the target range, and mas_wr_store_type()
marks the mas-&gt;store_type as wr_spanning_store to denote this fact.

When we go to perform the store in mas_wr_spanning_store(), we first
determine the elements AFTER the END of the range we wish to store (that
is, to the right of the entry to be inserted) - we do this by walking to
the NEXT pivot in the tree (i.e.  r_mas.last + 1), starting at the node we
have just determined contains the range over which we intend to write.

We then turn our attention to the entries to the left of the entry we are
inserting, whose state is represented by l_mas, and copy these into a 'big
node', which is a special node which contains enough slots to contain two
leaf node's worth of data.

We then copy the entry we wish to store immediately after this - the copy
and the insertion of the new entry is performed by mas_store_b_node().

After this we copy the elements to the right of the end of the range which
we are inserting, if we have not exceeded the length of the node (i.e. 
r_mas.offset &lt;= r_mas.end).

Herein lies the bug - under very specific circumstances, this logic can
break and corrupt the maple tree.

Consider the following tree:

Height
  0                             Root Node
                                 /      \
                 pivot = 0xffff /        \ pivot = ULONG_MAX
                               /          
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50200/">CVE-2024-50200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50200">CVE-2024-50200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233088">SUSE bug 1233088</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50201" ref_url="https://www.suse.com/security/cve/CVE-2024-50201" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Fix encoder-&gt;possible_clones

Include the encoder itself in its possible_clones bitmask.
In the past nothing validated that drivers were populating
possible_clones correctly, but that changed in commit
74d2aacbe840 ("drm: Validate encoder-&gt;possible_clones").
Looks like radeon never got the memo and is still not
following the rules 100% correctly.

This results in some warnings during driver initialization:
Bogus possible_clones: [ENCODER:46:TV-46] possible_clones=0x4 (full encoder mask=0x7)
WARNING: CPU: 0 PID: 170 at drivers/gpu/drm/drm_mode_config.c:615 drm_mode_config_validate+0x113/0x39c
...

(cherry picked from commit 3b6e7d40649c0d75572039aff9d0911864c689db)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50201/">CVE-2024-50201 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50201">CVE-2024-50201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233104">SUSE bug 1233104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50208" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50208" ref_url="https://www.suse.com/security/cve/CVE-2024-50208" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4131-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02398-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02449-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20526-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages

Avoid memory corruption while setting up Level-2 PBL pages for the non MR
resources when num_pages &gt; 256K.

There will be a single PDE page address (contiguous pages in the case of &gt;
PAGE_SIZE), but, current logic assumes multiple pages, leading to invalid
memory access after 256K PBL entries in the PDE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50208/">CVE-2024-50208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50208">CVE-2024-50208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233117">SUSE bug 1233117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233118">SUSE bug 1233118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959322" comment="bpftool-7.4.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959323" comment="kernel-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959324" comment="kernel-abi-stablelists-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959325" comment="kernel-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959326" comment="kernel-cross-headers-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959327" comment="kernel-debug-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959328" comment="kernel-debug-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959331" comment="kernel-debug-modules-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959332" comment="kernel-debug-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959333" comment="kernel-debug-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959334" comment="kernel-debug-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959337" comment="kernel-doc-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959338" comment="kernel-headers-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959339" comment="kernel-modules-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959340" comment="kernel-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959341" comment="kernel-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959342" comment="kernel-tools-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959343" comment="kernel-tools-libs-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959345" comment="kernel-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959346" comment="kernel-uki-virt-addons-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959347" comment="libperf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959348" comment="perf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959349" comment="python3-perf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959350" comment="rtla-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959351" comment="rv-5.14.0-503.21.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50215" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50215" ref_url="https://www.suse.com/security/cve/CVE-2024-50215" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-auth: assign dh_key to NULL after kfree_sensitive

ctrl-&gt;dh_key might be used across multiple calls to nvmet_setup_dhgroup()
for the same controller. So it's better to nullify it after release on
error path in order to avoid double free later in nvmet_destroy_auth().

Found by Linux Verification Center (linuxtesting.org) with Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50215/">CVE-2024-50215 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50215">CVE-2024-50215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233189">SUSE bug 1233189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50216" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50216" ref_url="https://www.suse.com/security/cve/CVE-2024-50216" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix finding a last resort AG in xfs_filestream_pick_ag

When the main loop in xfs_filestream_pick_ag fails to find a suitable
AG it tries to just pick the online AG.  But the loop for that uses
args-&gt;pag as loop iterator while the later code expects pag to be
set.  Fix this by reusing the max_pag case for this last resort, and
also add a check for impossible case of no AG just to make sure that
the uninitialized pag doesn't even escape in theory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50216/">CVE-2024-50216 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50216">CVE-2024-50216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233179">SUSE bug 1233179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50219</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50219" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50219" ref_url="https://www.suse.com/security/cve/CVE-2024-50219" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Not set</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50219/">CVE-2024-50219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50219">CVE-2024-50219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233190">SUSE bug 1233190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50226</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50226" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50226" ref_url="https://www.suse.com/security/cve/CVE-2024-50226" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10274" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000615.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cxl/port: Fix use-after-free, permit out-of-order decoder shutdown

In support of investigating an initialization failure report [1],
cxl_test was updated to register mock memory-devices after the mock
root-port/bus device had been registered. That led to cxl_test crashing
with a use-after-free bug with the following signature:

    cxl_port_attach_region: cxl region3: cxl_host_bridge.0:port3 decoder3.0 add: mem0:decoder7.0 @ 0 next: cxl_switch_uport.0 nr_eps: 1 nr_targets: 1
    cxl_port_attach_region: cxl region3: cxl_host_bridge.0:port3 decoder3.0 add: mem4:decoder14.0 @ 1 next: cxl_switch_uport.0 nr_eps: 2 nr_targets: 1
    cxl_port_setup_targets: cxl region3: cxl_switch_uport.0:port6 target[0] = cxl_switch_dport.0 for mem0:decoder7.0 @ 0
1)  cxl_port_setup_targets: cxl region3: cxl_switch_uport.0:port6 target[1] = cxl_switch_dport.4 for mem4:decoder14.0 @ 1
    [..]
    cxld_unregister: cxl decoder14.0:
    cxl_region_decode_reset: cxl_region region3:
    mock_decoder_reset: cxl_port port3: decoder3.0 reset
2)  mock_decoder_reset: cxl_port port3: decoder3.0: out of order reset, expected decoder3.1
    cxl_endpoint_decoder_release: cxl decoder14.0:
    [..]
    cxld_unregister: cxl decoder7.0:
3)  cxl_region_decode_reset: cxl_region region3:
    Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6bc3: 0000 [#1] PREEMPT SMP PTI
    [..]
    RIP: 0010:to_cxl_port+0x8/0x60 [cxl_core]
    [..]
    Call Trace:
     &lt;TASK&gt;
     cxl_region_decode_reset+0x69/0x190 [cxl_core]
     cxl_region_detach+0xe8/0x210 [cxl_core]
     cxl_decoder_kill_region+0x27/0x40 [cxl_core]
     cxld_unregister+0x5d/0x60 [cxl_core]

At 1) a region has been established with 2 endpoint decoders (7.0 and
14.0). Those endpoints share a common switch-decoder in the topology
(3.0). At teardown, 2), decoder14.0 is the first to be removed and hits
the "out of order reset case" in the switch decoder. The effect though
is that region3 cleanup is aborted leaving it in-tact and
referencing decoder14.0. At 3) the second attempt to teardown region3
trips over the stale decoder14.0 object which has long since been
deleted.

The fix here is to recognize that the CXL specification places no
mandate on in-order shutdown of switch-decoders, the driver enforces
in-order allocation, and hardware enforces in-order commit. So, rather
than fail and leave objects dangling, always remove them.

In support of making cxl_region_decode_reset() always succeed,
cxl_region_invalidate_memregion() failures are turned into warnings.
Crashing the kernel is ok there since system integrity is at risk if
caches cannot be managed around physical address mutation events like
CXL region destruction.

A new device_for_each_child_reverse_from() is added to cleanup
port-&gt;commit_end after all dependent decoders have been disabled. In
other words if decoders are allocated 0-&gt;1-&gt;2 and disabled 1-&gt;2-&gt;0 then
port-&gt;commit_end only decrements from 2 after 2 has been disabled, and
it decrements all the way to zero since 1 was disabled previously.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-28"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50226/">CVE-2024-50226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50226">CVE-2024-50226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233195">SUSE bug 1233195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955019" comment="bpftool-7.4.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955020" comment="kernel-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955021" comment="kernel-abi-stablelists-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955022" comment="kernel-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955023" comment="kernel-cross-headers-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955024" comment="kernel-debug-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955025" comment="kernel-debug-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955028" comment="kernel-debug-modules-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955029" comment="kernel-debug-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955030" comment="kernel-debug-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955031" comment="kernel-debug-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955034" comment="kernel-doc-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955035" comment="kernel-headers-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955036" comment="kernel-modules-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955037" comment="kernel-modules-core-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955038" comment="kernel-modules-extra-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955039" comment="kernel-tools-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955040" comment="kernel-tools-libs-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955042" comment="kernel-uki-virt-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955043" comment="kernel-uki-virt-addons-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955044" comment="libperf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955045" comment="perf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955046" comment="python3-perf-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955047" comment="rtla-5.14.0-503.15.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955048" comment="rv-5.14.0-503.15.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50228</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50228" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50228" ref_url="https://www.suse.com/security/cve/CVE-2024-50228" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50228/">CVE-2024-50228 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50228">CVE-2024-50228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233204">SUSE bug 1233204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50235" ref_url="https://www.suse.com/security/cve/CVE-2024-50235" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: clear wdev-&gt;cqm_config pointer on free

When we free wdev-&gt;cqm_config when unregistering, we also
need to clear out the pointer since the same wdev/netdev
may get re-registered in another network namespace, then
destroyed later, running this code again, which results in
a double-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50235/">CVE-2024-50235 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50235">CVE-2024-50235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233176">SUSE bug 1233176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50236</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50236" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50236" ref_url="https://www.suse.com/security/cve/CVE-2024-50236" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: Fix memory leak in management tx

In the current logic, memory is allocated for storing the MSDU context
during management packet TX but this memory is not being freed during
management TX completion. Similar leaks are seen in the management TX
cleanup logic.

Kmemleak reports this problem as below,

unreferenced object 0xffffff80b64ed250 (size 16):
  comm "kworker/u16:7", pid 148, jiffies 4294687130 (age 714.199s)
  hex dump (first 16 bytes):
    00 2b d8 d8 80 ff ff ff c4 74 e9 fd 07 00 00 00  .+.......t......
  backtrace:
    [&lt;ffffffe6e7b245dc&gt;] __kmem_cache_alloc_node+0x1e4/0x2d8
    [&lt;ffffffe6e7adde88&gt;] kmalloc_trace+0x48/0x110
    [&lt;ffffffe6bbd765fc&gt;] ath10k_wmi_tlv_op_gen_mgmt_tx_send+0xd4/0x1d8 [ath10k_core]
    [&lt;ffffffe6bbd3eed4&gt;] ath10k_mgmt_over_wmi_tx_work+0x134/0x298 [ath10k_core]
    [&lt;ffffffe6e78d5974&gt;] process_scheduled_works+0x1ac/0x400
    [&lt;ffffffe6e78d60b8&gt;] worker_thread+0x208/0x328
    [&lt;ffffffe6e78dc890&gt;] kthread+0x100/0x1c0
    [&lt;ffffffe6e78166c0&gt;] ret_from_fork+0x10/0x20

Free the memory during completion and cleanup to fix the leak.

Protect the mgmt_pending_tx idr_remove() operation in
ath10k_wmi_tlv_op_cleanup_mgmt_tx_send() using ar-&gt;data_lock similar to
other instances.

Tested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50236/">CVE-2024-50236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50236">CVE-2024-50236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233212">SUSE bug 1233212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50237" ref_url="https://www.suse.com/security/cve/CVE-2024-50237" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: do not pass a stopped vif to the driver in .get_txpower

Avoid potentially crashing in the driver because of uninitialized private data
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50237/">CVE-2024-50237 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50237">CVE-2024-50237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233216">SUSE bug 1233216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50251" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50251" ref_url="https://www.suse.com/security/cve/CVE-2024-50251" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_payload: sanitize offset and length before calling skb_checksum()

If access to offset + length is larger than the skbuff length, then
skb_checksum() triggers BUG_ON().

skb_checksum() internally subtracts the length parameter while iterating
over skbuff, BUG_ON(len) at the end of it checks that the expected
length to be included in the checksum calculation is fully consumed.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50251/">CVE-2024-50251 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50251">CVE-2024-50251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233248">SUSE bug 1233248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957437" comment="bpftool-7.4.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957438" comment="kernel-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957439" comment="kernel-abi-stablelists-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957440" comment="kernel-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957441" comment="kernel-cross-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957442" comment="kernel-debug-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957443" comment="kernel-debug-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957446" comment="kernel-debug-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957447" comment="kernel-debug-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957448" comment="kernel-debug-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957449" comment="kernel-debug-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957452" comment="kernel-doc-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957453" comment="kernel-headers-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957454" comment="kernel-modules-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957455" comment="kernel-modules-core-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957456" comment="kernel-modules-extra-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957457" comment="kernel-tools-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957458" comment="kernel-tools-libs-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957460" comment="kernel-uki-virt-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957461" comment="kernel-uki-virt-addons-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957462" comment="libperf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957463" comment="perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957464" comment="python3-perf-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957465" comment="rtla-5.14.0-503.16.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957466" comment="rv-5.14.0-503.16.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50252</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50252" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50252" ref_url="https://www.suse.com/security/cve/CVE-2024-50252" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_ipip: Fix memory leak when changing remote IPv6 address

The device stores IPv6 addresses that are used for encapsulation in
linear memory that is managed by the driver.

Changing the remote address of an ip6gre net device never worked
properly, but since cited commit the following reproducer [1] would
result in a warning [2] and a memory leak [3]. The problem is that the
new remote address is never added by the driver to its hash table (and
therefore the device) and the old address is never removed from it.

Fix by programming the new address when the configuration of the ip6gre
net device changes and removing the old one. If the address did not
change, then the above would result in increasing the reference count of
the address and then decreasing it.

[1]
 # ip link add name bla up type ip6gre local 2001:db8:1::1 remote 2001:db8:2::1 tos inherit ttl inherit
 # ip link set dev bla type ip6gre remote 2001:db8:3::1
 # ip link del dev bla
 # devlink dev reload pci/0000:01:00.0

[2]
WARNING: CPU: 0 PID: 1682 at drivers/net/ethernet/mellanox/mlxsw/spectrum.c:3002 mlxsw_sp_ipv6_addr_put+0x140/0x1d0
Modules linked in:
CPU: 0 UID: 0 PID: 1682 Comm: ip Not tainted 6.12.0-rc3-custom-g86b5b55bc835 #151
Hardware name: Nvidia SN5600/VMOD0013, BIOS 5.13 05/31/2023
RIP: 0010:mlxsw_sp_ipv6_addr_put+0x140/0x1d0
[...]
Call Trace:
 &lt;TASK&gt;
 mlxsw_sp_router_netdevice_event+0x55f/0x1240
 notifier_call_chain+0x5a/0xd0
 call_netdevice_notifiers_info+0x39/0x90
 unregister_netdevice_many_notify+0x63e/0x9d0
 rtnl_dellink+0x16b/0x3a0
 rtnetlink_rcv_msg+0x142/0x3f0
 netlink_rcv_skb+0x50/0x100
 netlink_unicast+0x242/0x390
 netlink_sendmsg+0x1de/0x420
 ____sys_sendmsg+0x2bd/0x320
 ___sys_sendmsg+0x9a/0xe0
 __sys_sendmsg+0x7a/0xd0
 do_syscall_64+0x9e/0x1a0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

[3]
unreferenced object 0xffff898081f597a0 (size 32):
  comm "ip", pid 1626, jiffies 4294719324
  hex dump (first 32 bytes):
    20 01 0d b8 00 02 00 00 00 00 00 00 00 00 00 01   ...............
    21 49 61 83 80 89 ff ff 00 00 00 00 01 00 00 00  !Ia.............
  backtrace (crc fd9be911):
    [&lt;00000000df89c55d&gt;] __kmalloc_cache_noprof+0x1da/0x260
    [&lt;00000000ff2a1ddb&gt;] mlxsw_sp_ipv6_addr_kvdl_index_get+0x281/0x340
    [&lt;000000009ddd445d&gt;] mlxsw_sp_router_netdevice_event+0x47b/0x1240
    [&lt;00000000743e7757&gt;] notifier_call_chain+0x5a/0xd0
    [&lt;000000007c7b9e13&gt;] call_netdevice_notifiers_info+0x39/0x90
    [&lt;000000002509645d&gt;] register_netdevice+0x5f7/0x7a0
    [&lt;00000000c2e7d2a9&gt;] ip6gre_newlink_common.isra.0+0x65/0x130
    [&lt;0000000087cd6d8d&gt;] ip6gre_newlink+0x72/0x120
    [&lt;000000004df7c7cc&gt;] rtnl_newlink+0x471/0xa20
    [&lt;0000000057ed632a&gt;] rtnetlink_rcv_msg+0x142/0x3f0
    [&lt;0000000032e0d5b5&gt;] netlink_rcv_skb+0x50/0x100
    [&lt;00000000908bca63&gt;] netlink_unicast+0x242/0x390
    [&lt;00000000cdbe1c87&gt;] netlink_sendmsg+0x1de/0x420
    [&lt;0000000011db153e&gt;] ____sys_sendmsg+0x2bd/0x320
    [&lt;000000003b6d53eb&gt;] ___sys_sendmsg+0x9a/0xe0
    [&lt;00000000cae27c62&gt;] __sys_sendmsg+0x7a/0xd0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50252/">CVE-2024-50252 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50252">CVE-2024-50252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233201">SUSE bug 1233201</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959322" comment="bpftool-7.4.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959323" comment="kernel-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959324" comment="kernel-abi-stablelists-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959325" comment="kernel-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959326" comment="kernel-cross-headers-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959327" comment="kernel-debug-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959328" comment="kernel-debug-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959331" comment="kernel-debug-modules-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959332" comment="kernel-debug-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959333" comment="kernel-debug-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959334" comment="kernel-debug-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959337" comment="kernel-doc-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959338" comment="kernel-headers-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959339" comment="kernel-modules-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959340" comment="kernel-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959341" comment="kernel-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959342" comment="kernel-tools-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959343" comment="kernel-tools-libs-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959345" comment="kernel-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959346" comment="kernel-uki-virt-addons-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959347" comment="libperf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959348" comment="perf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959349" comment="python3-perf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959350" comment="rtla-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959351" comment="rv-5.14.0-503.21.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50256</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50256" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50256" ref_url="https://www.suse.com/security/cve/CVE-2024-50256" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject_ipv6: fix potential crash in nf_send_reset6()

I got a syzbot report without a repro [1] crashing in nf_send_reset6()

I think the issue is that dev-&gt;hard_header_len is zero, and we attempt
later to push an Ethernet header.

Use LL_MAX_HEADER, as other functions in net/ipv6/netfilter/nf_reject_ipv6.c.

[1]

skbuff: skb_under_panic: text:ffffffff89b1d008 len:74 put:14 head:ffff88803123aa00 data:ffff88803123a9f2 tail:0x3c end:0x140 dev:syz_tun
 kernel BUG at net/core/skbuff.c:206 !
Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 0 UID: 0 PID: 7373 Comm: syz.1.568 Not tainted 6.12.0-rc2-syzkaller-00631-g6d858708d465 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
 RIP: 0010:skb_panic net/core/skbuff.c:206 [inline]
 RIP: 0010:skb_under_panic+0x14b/0x150 net/core/skbuff.c:216
Code: 0d 8d 48 c7 c6 60 a6 29 8e 48 8b 54 24 08 8b 0c 24 44 8b 44 24 04 4d 89 e9 50 41 54 41 57 41 56 e8 ba 30 38 02 48 83 c4 20 90 &lt;0f&gt; 0b 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3
RSP: 0018:ffffc900045269b0 EFLAGS: 00010282
RAX: 0000000000000088 RBX: dffffc0000000000 RCX: cd66dacdc5d8e800
RDX: 0000000000000000 RSI: 0000000000000200 RDI: 0000000000000000
RBP: ffff88802d39a3d0 R08: ffffffff8174afec R09: 1ffff920008a4ccc
R10: dffffc0000000000 R11: fffff520008a4ccd R12: 0000000000000140
R13: ffff88803123aa00 R14: ffff88803123a9f2 R15: 000000000000003c
FS:  00007fdbee5ff6c0(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000005d322000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  skb_push+0xe5/0x100 net/core/skbuff.c:2636
  eth_header+0x38/0x1f0 net/ethernet/eth.c:83
  dev_hard_header include/linux/netdevice.h:3208 [inline]
  nf_send_reset6+0xce6/0x1270 net/ipv6/netfilter/nf_reject_ipv6.c:358
  nft_reject_inet_eval+0x3b9/0x690 net/netfilter/nft_reject_inet.c:48
  expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
  nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
  nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
  nf_hook include/linux/netfilter.h:269 [inline]
  NF_HOOK include/linux/netfilter.h:312 [inline]
  br_nf_pre_routing_ipv6+0x63e/0x770 net/bridge/br_netfilter_ipv6.c:184
  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
  nf_hook_bridge_pre net/bridge/br_input.c:277 [inline]
  br_handle_frame+0x9fd/0x1530 net/bridge/br_input.c:424
  __netif_receive_skb_core+0x13e8/0x4570 net/core/dev.c:5562
  __netif_receive_skb_one_core net/core/dev.c:5666 [inline]
  __netif_receive_skb+0x12f/0x650 net/core/dev.c:5781
  netif_receive_skb_internal net/core/dev.c:5867 [inline]
  netif_receive_skb+0x1e8/0x890 net/core/dev.c:5926
  tun_rx_batched+0x1b7/0x8f0 drivers/net/tun.c:1550
  tun_get_user+0x3056/0x47e0 drivers/net/tun.c:2007
  tun_chr_write_iter+0x10d/0x1f0 drivers/net/tun.c:2053
  new_sync_write fs/read_write.c:590 [inline]
  vfs_write+0xa6d/0xc90 fs/read_write.c:683
  ksys_write+0x183/0x2b0 fs/read_write.c:736
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fdbeeb7d1ff
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 1c 8e 02 00 48
RSP: 002b:00007fdbee5ff000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fdbeed36058 RCX: 00007fdbeeb7d1ff
RDX: 000000000000008e RSI: 0000000020000040 RDI: 00000000000000c8
RBP: 00007fdbeebf12be R08: 0000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50256/">CVE-2024-50256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50256">CVE-2024-50256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233200">SUSE bug 1233200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50261</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50261" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50261" ref_url="https://www.suse.com/security/cve/CVE-2024-50261" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14500-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2NO44GTYBSPPWKFDREFWHITK4XKTNVLP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14705-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7LN2FDZYBYZRLX5LOA3REDAXV7VKGW4/" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macsec: Fix use-after-free while sending the offloading packet

KASAN reports the following UAF. The metadata_dst, which is used to
store the SCI value for macsec offload, is already freed by
metadata_dst_free() in macsec_free_netdev(), while driver still use it
for sending the packet.

To fix this issue, dst_release() is used instead to release
metadata_dst. So it is not freed instantly in macsec_free_netdev() if
still referenced by skb.

 BUG: KASAN: slab-use-after-free in mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]
 Read of size 2 at addr ffff88813e42e038 by task kworker/7:2/714
 [...]
 Workqueue: mld mld_ifc_work
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x51/0x60
  print_report+0xc1/0x600
  kasan_report+0xab/0xe0
  mlx5e_xmit+0x1e8f/0x4190 [mlx5_core]
  dev_hard_start_xmit+0x120/0x530
  sch_direct_xmit+0x149/0x11e0
  __qdisc_run+0x3ad/0x1730
  __dev_queue_xmit+0x1196/0x2ed0
  vlan_dev_hard_start_xmit+0x32e/0x510 [8021q]
  dev_hard_start_xmit+0x120/0x530
  __dev_queue_xmit+0x14a7/0x2ed0
  macsec_start_xmit+0x13e9/0x2340
  dev_hard_start_xmit+0x120/0x530
  __dev_queue_xmit+0x14a7/0x2ed0
  ip6_finish_output2+0x923/0x1a70
  ip6_finish_output+0x2d7/0x970
  ip6_output+0x1ce/0x3a0
  NF_HOOK.constprop.0+0x15f/0x190
  mld_sendpack+0x59a/0xbd0
  mld_ifc_work+0x48a/0xa80
  process_one_work+0x5aa/0xe50
  worker_thread+0x79c/0x1290
  kthread+0x28f/0x350
  ret_from_fork+0x2d/0x70
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;

 Allocated by task 3922:
  kasan_save_stack+0x20/0x40
  kasan_save_track+0x10/0x30
  __kasan_kmalloc+0x77/0x90
  __kmalloc_noprof+0x188/0x400
  metadata_dst_alloc+0x1f/0x4e0
  macsec_newlink+0x914/0x1410
  __rtnl_newlink+0xe08/0x15b0
  rtnl_newlink+0x5f/0x90
  rtnetlink_rcv_msg+0x667/0xa80
  netlink_rcv_skb+0x12c/0x360
  netlink_unicast+0x551/0x770
  netlink_sendmsg+0x72d/0xbd0
  __sock_sendmsg+0xc5/0x190
  ____sys_sendmsg+0x52e/0x6a0
  ___sys_sendmsg+0xeb/0x170
  __sys_sendmsg+0xb5/0x140
  do_syscall_64+0x4c/0x100
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

 Freed by task 4011:
  kasan_save_stack+0x20/0x40
  kasan_save_track+0x10/0x30
  kasan_save_free_info+0x37/0x50
  poison_slab_object+0x10c/0x190
  __kasan_slab_free+0x11/0x30
  kfree+0xe0/0x290
  macsec_free_netdev+0x3f/0x140
  netdev_run_todo+0x450/0xc70
  rtnetlink_rcv_msg+0x66f/0xa80
  netlink_rcv_skb+0x12c/0x360
  netlink_unicast+0x551/0x770
  netlink_sendmsg+0x72d/0xbd0
  __sock_sendmsg+0xc5/0x190
  ____sys_sendmsg+0x52e/0x6a0
  ___sys_sendmsg+0xeb/0x170
  __sys_sendmsg+0xb5/0x140
  do_syscall_64+0x4c/0x100
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50261/">CVE-2024-50261 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50261">CVE-2024-50261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233253">SUSE bug 1233253</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50264</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50264" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50264" ref_url="https://www.suse.com/security/cve/CVE-2024-50264" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000661.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0138-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0254-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXXGNAJF6LIQZ33Z2TGQJBQXVAR577Z4/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Initialization of the dangling pointer occurring in vsk-&gt;trans

During loopback communication, a dangling pointer can be created in
vsk-&gt;trans, potentially leading to a Use-After-Free condition.  This
issue is resolved by initializing vsk-&gt;trans to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50264/">CVE-2024-50264 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50264">CVE-2024-50264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233453">SUSE bug 1233453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233712">SUSE bug 1233712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968351" comment="bpftool-7.4.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968352" comment="kernel-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968353" comment="kernel-abi-stablelists-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968354" comment="kernel-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968355" comment="kernel-cross-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968356" comment="kernel-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968357" comment="kernel-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968360" comment="kernel-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968361" comment="kernel-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968362" comment="kernel-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968363" comment="kernel-debug-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968366" comment="kernel-doc-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968367" comment="kernel-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968368" comment="kernel-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968369" comment="kernel-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968370" comment="kernel-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968371" comment="kernel-rt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968372" comment="kernel-rt-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968373" comment="kernel-rt-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968374" comment="kernel-rt-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968376" comment="kernel-rt-debug-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968377" comment="kernel-rt-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968378" comment="kernel-rt-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968379" comment="kernel-rt-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968381" comment="kernel-rt-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968382" comment="kernel-rt-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968383" comment="kernel-rt-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968384" comment="kernel-rt-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968385" comment="kernel-tools-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968386" comment="kernel-tools-libs-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968388" comment="kernel-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968389" comment="kernel-uki-virt-addons-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968390" comment="libperf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968391" comment="perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968392" comment="python3-perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968393" comment="rtla-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968394" comment="rv-5.14.0-503.31.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50271" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50271" ref_url="https://www.suse.com/security/cve/CVE-2024-50271" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

signal: restore the override_rlimit logic

Prior to commit d64696905554 ("Reimplement RLIMIT_SIGPENDING on top of
ucounts") UCOUNT_RLIMIT_SIGPENDING rlimit was not enforced for a class of
signals.  However now it's enforced unconditionally, even if
override_rlimit is set.  This behavior change caused production issues.  

For example, if the limit is reached and a process receives a SIGSEGV
signal, sigqueue_alloc fails to allocate the necessary resources for the
signal delivery, preventing the signal from being delivered with siginfo. 
This prevents the process from correctly identifying the fault address and
handling the error.  From the user-space perspective, applications are
unaware that the limit has been reached and that the siginfo is
effectively 'corrupted'.  This can lead to unpredictable behavior and
crashes, as we observed with java applications.

Fix this by passing override_rlimit into inc_rlimit_get_ucounts() and skip
the comparison to max there if override_rlimit is set.  This effectively
restores the old behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50271/">CVE-2024-50271 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50271">CVE-2024-50271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233460">SUSE bug 1233460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50272" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50272" ref_url="https://www.suse.com/security/cve/CVE-2024-50272" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

filemap: Fix bounds checking in filemap_read()

If the caller supplies an iocb-&gt;ki_pos value that is close to the
filesystem upper limit, and an iterator with a count that causes us to
overflow that limit, then filemap_read() enters an infinite loop.

This behaviour was discovered when testing xfstests generic/525 with the
"localio" optimisation for loopback NFS mounts.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50272/">CVE-2024-50272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50272">CVE-2024-50272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233461">SUSE bug 1233461</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50275" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50275" ref_url="https://www.suse.com/security/cve/CVE-2024-50275" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000779.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1068" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/sve: Discard stale CPU state when handling SVE traps

The logic for handling SVE traps manipulates saved FPSIMD/SVE state
incorrectly, and a race with preemption can result in a task having
TIF_SVE set and TIF_FOREIGN_FPSTATE clear even though the live CPU state
is stale (e.g. with SVE traps enabled). This has been observed to result
in warnings from do_sve_acc() where SVE traps are not expected while
TIF_SVE is set:

|         if (test_and_set_thread_flag(TIF_SVE))
|                 WARN_ON(1); /* SVE access shouldn't have trapped */

Warnings of this form have been reported intermittently, e.g.

  https://lore.kernel.org/linux-arm-kernel/CA+G9fYtEGe_DhY2Ms7+L7NKsLYUomGsgqpdBj+QwDLeSg=JhGg@mail.gmail.com/
  https://lore.kernel.org/linux-arm-kernel/000000000000511e9a060ce5a45c@google.com/

The race can occur when the SVE trap handler is preempted before and
after manipulating the saved FPSIMD/SVE state, starting and ending on
the same CPU, e.g.

| void do_sve_acc(unsigned long esr, struct pt_regs *regs)
| {
|         // Trap on CPU 0 with TIF_SVE clear, SVE traps enabled
|         // task-&gt;fpsimd_cpu is 0.
|         // per_cpu_ptr(&amp;fpsimd_last_state, 0) is task.
|
|         ...
|
|         // Preempted; migrated from CPU 0 to CPU 1.
|         // TIF_FOREIGN_FPSTATE is set.
|
|         get_cpu_fpsimd_context();
|
|         if (test_and_set_thread_flag(TIF_SVE))
|                 WARN_ON(1); /* SVE access shouldn't have trapped */
|
|         sve_init_regs() {
|                 if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {
|                         ...
|                 } else {
|                         fpsimd_to_sve(current);
|                         current-&gt;thread.fp_type = FP_STATE_SVE;
|                 }
|         }
|
|         put_cpu_fpsimd_context();
|
|         // Preempted; migrated from CPU 1 to CPU 0.
|         // task-&gt;fpsimd_cpu is still 0
|         // If per_cpu_ptr(&amp;fpsimd_last_state, 0) is still task then:
|         // - Stale HW state is reused (with SVE traps enabled)
|         // - TIF_FOREIGN_FPSTATE is cleared
|         // - A return to userspace skips HW state restore
| }

Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set
by calling fpsimd_flush_task_state() to detach from the saved CPU
state. This ensures that a subsequent context switch will not reuse the
stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the
new state to be reloaded from memory prior to a return to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50275/">CVE-2024-50275 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50275">CVE-2024-50275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233464">SUSE bug 1233464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961451" comment="bpftool-7.4.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961452" comment="kernel-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961453" comment="kernel-abi-stablelists-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961454" comment="kernel-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961455" comment="kernel-cross-headers-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961456" comment="kernel-debug-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961457" comment="kernel-debug-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961460" comment="kernel-debug-modules-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961461" comment="kernel-debug-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961462" comment="kernel-debug-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961463" comment="kernel-debug-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961466" comment="kernel-doc-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961467" comment="kernel-headers-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961468" comment="kernel-modules-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961469" comment="kernel-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961470" comment="kernel-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961471" comment="kernel-tools-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961472" comment="kernel-tools-libs-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961474" comment="kernel-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961475" comment="kernel-uki-virt-addons-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961476" comment="libperf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961477" comment="perf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961478" comment="python3-perf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961479" comment="rtla-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961480" comment="rv-5.14.0-503.22.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50278</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50278" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50278" ref_url="https://www.suse.com/security/cve/CVE-2024-50278" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm cache: fix potential out-of-bounds access on the first resume

Out-of-bounds access occurs if the fast device is expanded unexpectedly
before the first-time resume of the cache table. This happens because
expanding the fast device requires reloading the cache table for
cache_create to allocate new in-core data structures that fit the new
size, and the check in cache_preresume is not performed during the
first resume, leading to the issue.

Reproduce steps:

1. prepare component devices:

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc 262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1 oflag=direct

2. load a cache table of 512 cache blocks, and deliberately expand the
   fast device before resuming the cache, making the in-core data
   structures inadequate.

dmsetup create cache --notable
dmsetup reload cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"
dmsetup reload cdata --table "0 131072 linear /dev/sdc 8192"
dmsetup resume cdata
dmsetup resume cache

3. suspend the cache to write out the in-core dirty bitset and hint
   array, leading to out-of-bounds access to the dirty bitset at offset
   0x40:

dmsetup suspend cache

KASAN reports:

  BUG: KASAN: vmalloc-out-of-bounds in is_dirty_callback+0x2b/0x80
  Read of size 8 at addr ffffc90000085040 by task dmsetup/90

  (...snip...)
  The buggy address belongs to the virtual mapping at
   [ffffc90000085000, ffffc90000087000) created by:
   cache_ctr+0x176a/0x35f0

  (...snip...)
  Memory state around the buggy address:
   ffffc90000084f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000084f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
  &gt;ffffc90000085000: 00 00 00 00 00 00 00 00 f8 f8 f8 f8 f8 f8 f8 f8
                                             ^
   ffffc90000085080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
   ffffc90000085100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8

Fix by checking the size change on the first resume.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50278/">CVE-2024-50278 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50278">CVE-2024-50278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233467">SUSE bug 1233467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233709">SUSE bug 1233709</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50282</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50282" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50282" ref_url="https://www.suse.com/security/cve/CVE-2024-50282" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: add missing size check in amdgpu_debugfs_gprwave_read()

Avoid a possible buffer overflow if size is larger than 4K.

(cherry picked from commit f5d873f5825b40d886d03bd2aede91d4cf002434)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-50282/">CVE-2024-50282 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50282">CVE-2024-50282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233471">SUSE bug 1233471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233707">SUSE bug 1233707</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50294" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50294" ref_url="https://www.suse.com/security/cve/CVE-2024-50294" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix missing locking causing hanging calls

If a call gets aborted (e.g. because kafs saw a signal) between it being
queued for connection and the I/O thread picking up the call, the abort
will be prioritised over the connection and it will be removed from
local-&gt;new_client_calls by rxrpc_disconnect_client_call() without a lock
being held.  This may cause other calls on the list to disappear if a race
occurs.

Fix this by taking the client_call_lock when removing a call from whatever
list its -&gt;wait_link happens to be on.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50294/">CVE-2024-50294 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50294">CVE-2024-50294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233483">SUSE bug 1233483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50299</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50299" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50299" ref_url="https://www.suse.com/security/cve/CVE-2024-50299" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: properly validate chunk size in sctp_sf_ootb()

A size validation fix similar to that in Commit 50619dbf8db7 ("sctp: add
size validation when walking chunks") is also required in sctp_sf_ootb()
to address a crash reported by syzbot:

  BUG: KMSAN: uninit-value in sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712
  sctp_sf_ootb+0x7f5/0xce0 net/sctp/sm_statefuns.c:3712
  sctp_do_sm+0x181/0x93d0 net/sctp/sm_sideeffect.c:1166
  sctp_endpoint_bh_rcv+0xc38/0xf90 net/sctp/endpointola.c:407
  sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88
  sctp_rcv+0x3831/0x3b20 net/sctp/input.c:243
  sctp4_rcv+0x42/0x50 net/sctp/protocol.c:1159
  ip_protocol_deliver_rcu+0xb51/0x13d0 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50299/">CVE-2024-50299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50299">CVE-2024-50299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233488">SUSE bug 1233488</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50301</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50301" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50301" ref_url="https://www.suse.com/security/cve/CVE-2024-50301" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002061.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9580" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02069-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02110-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02134-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

security/keys: fix slab-out-of-bounds in key_task_permission

KASAN reports an out of bounds read:
BUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36
BUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]
BUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410
security/keys/permission.c:54
Read of size 4 at addr ffff88813c3ab618 by task stress-ng/4362

CPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15
Call Trace:
 __dump_stack lib/dump_stack.c:82 [inline]
 dump_stack+0x107/0x167 lib/dump_stack.c:123
 print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400
 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560
 kasan_report+0x3a/0x50 mm/kasan/report.c:585
 __kuid_val include/linux/uidgid.h:36 [inline]
 uid_eq include/linux/uidgid.h:63 [inline]
 key_task_permission+0x394/0x410 security/keys/permission.c:54
 search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793

This issue was also reported by syzbot.

It can be reproduced by following these steps(more details [1]):
1. Obtain more than 32 inputs that have similar hashes, which ends with the
   pattern '0xxxxxxxe6'.
2. Reboot and add the keys obtained in step 1.

The reproducer demonstrates how this issue happened:
1. In the search_nested_keyrings function, when it iterates through the
   slots in a node(below tag ascend_to_node), if the slot pointer is meta
   and node-&gt;back_pointer != NULL(it means a root), it will proceed to
   descend_to_node. However, there is an exception. If node is the root,
   and one of the slots points to a shortcut, it will be treated as a
   keyring.
2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.
   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as
   ASSOC_ARRAY_PTR_SUBTYPE_MASK.
3. When 32 keys with the similar hashes are added to the tree, the ROOT
   has keys with hashes that are not similar (e.g. slot 0) and it splits
   NODE A without using a shortcut. When NODE A is filled with keys that
   all hashes are xxe6, the keys are similar, NODE A will split with a
   shortcut. Finally, it forms the tree as shown below, where slot 6 points
   to a shortcut.

                      NODE A
              +------&gt;+---+
      ROOT    |       | 0 | xxe6
      +---+   |       +---+
 xxxx | 0 | shortcut  :   : xxe6
      +---+   |       +---+
 xxe6 :   :   |       |   | xxe6
      +---+   |       +---+
      | 6 |---+       :   : xxe6
      +---+           +---+
 xxe6 :   :           | f | xxe6
      +---+           +---+
 xxe6 | f |
      +---+

4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,
   it may be mistakenly transferred to a key*, leading to a read
   out-of-bounds read.

To fix this issue, one should jump to descend_to_node if the ptr is a
shortcut, regardless of whether the node is root or not.

[1] https://lore.kernel.org/linux-kernel/1cfa878e-8c7b-4570-8606-21daf5e13ce7@huaweicloud.com/

[jarkko: tweaked the commit message a bit to have an appropriate closes
 tag.]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-10"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50301/">CVE-2024-50301 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50301">CVE-2024-50301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233490">SUSE bug 1233490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233680">SUSE bug 1233680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010020388" comment="kernel-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020389" comment="kernel-abi-stablelists-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020390" comment="kernel-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020391" comment="kernel-cross-headers-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020392" comment="kernel-debug-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020393" comment="kernel-debug-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020396" comment="kernel-debug-modules-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020397" comment="kernel-debug-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020398" comment="kernel-debug-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020399" comment="kernel-debug-uki-virt-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020402" comment="kernel-doc-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020403" comment="kernel-headers-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020404" comment="kernel-modules-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020405" comment="kernel-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020406" comment="kernel-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020407" comment="kernel-rt-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020408" comment="kernel-rt-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020409" comment="kernel-rt-debug-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020410" comment="kernel-rt-debug-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020412" comment="kernel-rt-debug-kvm-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020413" comment="kernel-rt-debug-modules-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020414" comment="kernel-rt-debug-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020415" comment="kernel-rt-debug-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020417" comment="kernel-rt-kvm-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020418" comment="kernel-rt-modules-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020419" comment="kernel-rt-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020420" comment="kernel-rt-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020421" comment="kernel-tools-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020422" comment="kernel-tools-libs-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020424" comment="kernel-uki-virt-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020425" comment="kernel-uki-virt-addons-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020426" comment="libperf-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020427" comment="perf-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020428" comment="python3-perf-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020429" comment="rtla-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020430" comment="rv-5.14.0-570.51.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50302</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50302" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50302" ref_url="https://www.suse.com/security/cve/CVE-2024-50302" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000922.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000989.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020552.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6AJSXTJOJBIIV5HSF53W7LDQI5JZTS3M/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: zero-initialize the report buffer

Since the report buffer is used by all kinds of drivers in various ways, let's
zero-initialize it during allocation to make sure that it can't be ever used
to leak kernel memory via specially-crafted report.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50302/">CVE-2024-50302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50302">CVE-2024-50302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233491">SUSE bug 1233491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233679">SUSE bug 1233679</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968351" comment="bpftool-7.4.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968352" comment="kernel-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968353" comment="kernel-abi-stablelists-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968354" comment="kernel-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968355" comment="kernel-cross-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968356" comment="kernel-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968357" comment="kernel-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968360" comment="kernel-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968361" comment="kernel-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968362" comment="kernel-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968363" comment="kernel-debug-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968366" comment="kernel-doc-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968367" comment="kernel-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968368" comment="kernel-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968369" comment="kernel-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968370" comment="kernel-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968371" comment="kernel-rt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968372" comment="kernel-rt-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968373" comment="kernel-rt-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968374" comment="kernel-rt-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968376" comment="kernel-rt-debug-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968377" comment="kernel-rt-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968378" comment="kernel-rt-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968379" comment="kernel-rt-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968381" comment="kernel-rt-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968382" comment="kernel-rt-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968383" comment="kernel-rt-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968384" comment="kernel-rt-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968385" comment="kernel-tools-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968386" comment="kernel-tools-libs-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968388" comment="kernel-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968389" comment="kernel-uki-virt-addons-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968390" comment="libperf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968391" comment="perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968392" comment="python3-perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968393" comment="rtla-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968394" comment="rv-5.14.0-503.31.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50304" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50304" ref_url="https://www.suse.com/security/cve/CVE-2024-50304" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_find()

The per-netns IP tunnel hash table is protected by the RTNL mutex and
ip_tunnel_find() is only called from the control path where the mutex is
taken.

Add a lockdep expression to hlist_for_each_entry_rcu() in
ip_tunnel_find() in order to validate that the mutex is held and to
silence the suspicious RCU usage warning [1].

[1]
WARNING: suspicious RCU usage
6.12.0-rc3-custom-gd95d9a31aceb #139 Not tainted
-----------------------------
net/ipv4/ip_tunnel.c:221 RCU-list traversed in non-reader section!!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
1 lock held by ip/362:
 #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60

stack backtrace:
CPU: 12 UID: 0 PID: 362 Comm: ip Not tainted 6.12.0-rc3-custom-gd95d9a31aceb #139
Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xba/0x110
 lockdep_rcu_suspicious.cold+0x4f/0xd6
 ip_tunnel_find+0x435/0x4d0
 ip_tunnel_newlink+0x517/0x7a0
 ipgre_newlink+0x14c/0x170
 __rtnl_newlink+0x1173/0x19c0
 rtnl_newlink+0x6c/0xa0
 rtnetlink_rcv_msg+0x3cc/0xf60
 netlink_rcv_skb+0x171/0x450
 netlink_unicast+0x539/0x7f0
 netlink_sendmsg+0x8c1/0xd80
 ____sys_sendmsg+0x8f9/0xc20
 ___sys_sendmsg+0x197/0x1e0
 __sys_sendmsg+0x122/0x1f0
 do_syscall_64+0xbb/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-50304/">CVE-2024-50304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50304">CVE-2024-50304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233522">SUSE bug 1233522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50349" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50349" ref_url="https://www.suse.com/security/cve/CVE-2024-50349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001821.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11534" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:20362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041929.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14652-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3U7ZJVFYNJHRXNCR7ICBM6U5UARDPCAF/" source="SUSE-SU"/>
    <description>
    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a password. At this stage, any URL-encoded parts have been decoded already, and are printed verbatim. This allows attackers to craft URLs that contain ANSI escape sequences that the terminal interpret to confuse users e.g. into providing passwords for trusted Git hosting sites when in fact they are then sent to untrusted sites that are under the attacker's control. This issue has been patch via commits `7725b81` and `c903985` which are included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-50349/">CVE-2024-50349 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50349">CVE-2024-50349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235600">SUSE bug 1235600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009051" comment="git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009052" comment="git-all-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009053" comment="git-core-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009054" comment="git-core-doc-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009055" comment="git-credential-libsecret-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009056" comment="git-daemon-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009057" comment="git-email-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009058" comment="git-gui-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009059" comment="git-instaweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009060" comment="git-subtree-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009061" comment="git-svn-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009062" comment="gitk-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009063" comment="gitweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009064" comment="perl-Git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009065" comment="perl-Git-SVN-2.47.3-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50379</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50379" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50379" ref_url="https://www.suse.com/security/cve/CVE-2024-50379" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3645" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001025.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="TID000021699" ref_url="https://www.suse.com/support/kb/doc/?id=000021699" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14623-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BW77WQOC353TC34OPBAFJ7NIG6GAGCA5/" source="SUSE-SU"/>
    <description>
    Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.

The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.

Users are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-09"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50379/">CVE-2024-50379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50379">CVE-2024-50379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234663">SUSE bug 1234663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974613" comment="tomcat-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974614" comment="tomcat-admin-webapps-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974615" comment="tomcat-docs-webapp-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974616" comment="tomcat-el-3.0-api-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974617" comment="tomcat-jsp-2.3-api-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974618" comment="tomcat-lib-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974619" comment="tomcat-servlet-4.0-api-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974620" comment="tomcat-webapps-9.0.87-2.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50602" ref_url="https://www.suse.com/security/cve/CVE-2024-50602" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000220.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9541" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023693.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14443-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TAVLUAO5K6MJFTEJB4GJPOEFBO7TERI6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14444-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MSPMMPTPAUGVEMQV4WR37XQICDFXWTS7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14457-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SP6G2HGBBIFIEGEE6GB4U2UPVC5XL57H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14587-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5Q6VPY7UYNTWIQZCAPDUIAN2AZRTCYK5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14588-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BKOTUGA2O5N3MZDEKZ6VRDG7KV5LDOGO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14589-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X3V7QAWJ6AWA3YEKX4DEGJFLTQ6ASRC3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14609-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AH5Z5BJKL2IEXW4VDPEM33Y47PIJHEHX/" source="SUSE-SU"/>
    <description>
    An issue was discovered in libexpat before 2.6.4. There is a crash within the XML_ResumeParser function because XML_StopParser can stop/suspend an unstarted parser.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2026-01-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50602/">CVE-2024-50602 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-50602">CVE-2024-50602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232579">SUSE bug 1232579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953929" comment="expat-2.5.0-3.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953930" comment="expat-devel-2.5.0-3.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202450612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-50612</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-50612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50612" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-50612" ref_url="https://www.suse.com/security/cve/CVE-2024-50612" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11192" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000701.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000719.html" source="SUSE-SU"/>
    <description>
    libsndfile through 1.2.2 has an ogg_vorbis.c vorbis_analysis_wrote out-of-bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2026-02-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-50612/">CVE-2024-50612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-50612">CVE-2024-50612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232438">SUSE bug 1232438</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959007" comment="libsndfile-1.0.31-8.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959008" comment="libsndfile-devel-1.0.31-8.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959009" comment="libsndfile-utils-1.0.31-8.el9_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202451741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-51741</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-51741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51741" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-51741" ref_url="https://www.suse.com/security/cve/CVE-2024-51741" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0692" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020155.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14638-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TGZSR4XROA2QNSJN3D6QEMR3R6FSTFZQ/" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51741/">CVE-2024-51741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51741">CVE-2024-51741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235386">SUSE bug 1235386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961483" comment="redis-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961484" comment="redis-devel-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961485" comment="redis-doc-7.2.7-1.module+el9.5.0+22705+3d861c1c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5197" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5197" ref_url="https://www.suse.com/security/cve/CVE-2024-5197" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9827" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2409-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035913.html" source="SUSE-SU"/>
    <description>
    There exists interger overflows in libvpx in versions prior to 1.14.1.  Calling vpx_img_alloc()  with a large value of the d_w, d_h, or align  parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t  struct may be invalid.  Calling vpx_img_wrap()  with a large value of the d_w, d_h, or stride_align  parameter may result in integer overflows in the calculations of buffer sizes and offsets and some fields of the returned vpx_image_t  struct may be invalid. We recommend upgrading to version 1.14.1 or beyond
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5197/">CVE-2024-5197 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5197">CVE-2024-5197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225879">SUSE bug 1225879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953976" comment="libvpx-1.9.0-8.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953977" comment="libvpx-devel-1.9.0-8.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52005" ref_url="https://www.suse.com/security/cve/CVE-2024-52005" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001298.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8414" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001582.html" source="SUSE-SU"/>
    <description>
    Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-52005/">CVE-2024-52005 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52005">CVE-2024-52005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235975">SUSE bug 1235975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983944" comment="git-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983945" comment="git-all-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983946" comment="git-core-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983947" comment="git-core-doc-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983948" comment="git-credential-libsecret-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983949" comment="git-daemon-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983950" comment="git-email-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983951" comment="git-gui-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983952" comment="git-instaweb-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983953" comment="git-subtree-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983954" comment="git-svn-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983955" comment="gitk-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983956" comment="gitweb-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983957" comment="perl-Git-2.47.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983958" comment="perl-Git-SVN-2.47.1-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52006" ref_url="https://www.suse.com/security/cve/CVE-2024-52006" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001821.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11534" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:20362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041929.html" source="SUSE-SU"/>
    <description>
    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.2, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-52006/">CVE-2024-52006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52006">CVE-2024-52006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235601">SUSE bug 1235601</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009051" comment="git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009052" comment="git-all-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009053" comment="git-core-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009054" comment="git-core-doc-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009055" comment="git-credential-libsecret-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009056" comment="git-daemon-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009057" comment="git-email-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009058" comment="git-gui-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009059" comment="git-instaweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009060" comment="git-subtree-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009061" comment="git-svn-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009062" comment="gitk-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009063" comment="gitweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009064" comment="perl-Git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009065" comment="perl-Git-SVN-2.47.3-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52332</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52332" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52332" ref_url="https://www.suse.com/security/cve/CVE-2024-52332" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Fix potential invalid memory access in igb_init_module()

The pci_register_driver() can fail and when this happened, the dca_notifier
needs to be unregistered, otherwise the dca_notifier can be called when
igb fails to install, resulting to invalid memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52332/">CVE-2024-52332 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-52332">CVE-2024-52332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235700">SUSE bug 1235700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52336</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52336" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52336" ref_url="https://www.suse.com/security/cve/CVE-2024-52336" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10384" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000626.html" source="SUSE-SU"/>
    <description>
    A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52336/">CVE-2024-52336 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52336">CVE-2024-52336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233806">SUSE bug 1233806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955680" comment="tuned-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955681" comment="tuned-gtk-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955682" comment="tuned-ppd-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955683" comment="tuned-profiles-atomic-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955684" comment="tuned-profiles-cpu-partitioning-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955685" comment="tuned-profiles-mssql-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955686" comment="tuned-profiles-oracle-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955687" comment="tuned-profiles-postgresql-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955688" comment="tuned-profiles-spectrumscale-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955689" comment="tuned-utils-2.24.0-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52337" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52337" ref_url="https://www.suse.com/security/cve/CVE-2024-52337" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10381" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10384" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000676.html" source="SUSE-SU"/>
    <description>
    A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52337/">CVE-2024-52337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52337">CVE-2024-52337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233807">SUSE bug 1233807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009955680" comment="tuned-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955681" comment="tuned-gtk-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955682" comment="tuned-ppd-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955683" comment="tuned-profiles-atomic-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955684" comment="tuned-profiles-cpu-partitioning-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955685" comment="tuned-profiles-mssql-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955686" comment="tuned-profiles-oracle-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955687" comment="tuned-profiles-postgresql-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955688" comment="tuned-profiles-spectrumscale-2.24.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955689" comment="tuned-utils-2.24.0-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52530" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52530" ref_url="https://www.suse.com/security/cve/CVE-2024-52530" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9559" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000500.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9573" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000597.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9654" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPGNGXYLDM752SEEDHAXAPSLNGZIY5CP/" source="SUSE-SU"/>
    <description>
    GNOME libsoup before 3.6.0 allows HTTP request smuggling in some configurations because '\0' characters at the end of header names are ignored, i.e., a "Transfer-Encoding\0: chunked" header is treated the same as a "Transfer-Encoding: chunked" header.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52530/">CVE-2024-52530 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52530">CVE-2024-52530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953943" comment="libsoup-2.72.0-8.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953944" comment="libsoup-devel-2.72.0-8.el9_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52531" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52531" ref_url="https://www.suse.com/security/cve/CVE-2024-52531" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0791" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000802.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0838" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR6TVFEO2A7NR2MI6QLABP2BHZUQEULO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPGNGXYLDM752SEEDHAXAPSLNGZIY5CP/" source="SUSE-SU"/>
    <description>
    GNOME libsoup before 3.6.1 allows a buffer overflow in applications that perform conversion to UTF-8 in soup_header_parse_param_list_strict. There is a plausible way to reach this remotely via soup_message_headers_get_content_type (e.g., an application may want to retrieve the content type of a request or response).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-01"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52531/">CVE-2024-52531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52531">CVE-2024-52531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233292">SUSE bug 1233292</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009962061" comment="libsoup-2.72.0-8.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962062" comment="libsoup-devel-2.72.0-8.el9_5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52532</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52532" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52532" ref_url="https://www.suse.com/security/cve/CVE-2024-52532" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9559" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000500.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9573" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021064.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14488-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PR6TVFEO2A7NR2MI6QLABP2BHZUQEULO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14489-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XPGNGXYLDM752SEEDHAXAPSLNGZIY5CP/" source="SUSE-SU"/>
    <description>
    GNOME libsoup before 3.6.1 has an infinite loop, and memory consumption. during the reading of certain patterns of WebSocket data from clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52532/">CVE-2024-52532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52532">CVE-2024-52532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233285">SUSE bug 1233285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233287">SUSE bug 1233287</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953943" comment="libsoup-2.72.0-8.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953944" comment="libsoup-devel-2.72.0-8.el9_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52533" ref_url="https://www.suse.com/security/cve/CVE-2024-52533" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0936" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11140" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001798.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11327" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4051-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019966.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021089.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14487-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LDZ2T3NMB6ITHZZK4Z34LZGL42OJMYWP/" source="SUSE-SU"/>
    <description>
    gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-05"/>
	<updated date="2025-07-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52533/">CVE-2024-52533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52533">CVE-2024-52533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233282">SUSE bug 1233282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010007811" comment="glib2-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007812" comment="glib2-devel-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007813" comment="glib2-doc-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007814" comment="glib2-static-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007815" comment="glib2-tests-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962432" comment="mingw32-glib2-2.78.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962433" comment="mingw32-glib2-static-2.78.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962434" comment="mingw64-glib2-2.78.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009962435" comment="mingw64-glib2-static-2.78.6-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52615" ref_url="https://www.suse.com/security/cve/CVE-2024-52615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11402" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2026-03-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52615/">CVE-2024-52615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52615">CVE-2024-52615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233421">SUSE bug 1233421</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010008992" comment="avahi-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008993" comment="avahi-autoipd-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008994" comment="avahi-compat-howl-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008995" comment="avahi-compat-howl-devel-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008996" comment="avahi-compat-libdns_sd-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008997" comment="avahi-compat-libdns_sd-devel-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008998" comment="avahi-devel-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008999" comment="avahi-glib-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009000" comment="avahi-glib-devel-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009001" comment="avahi-gobject-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009002" comment="avahi-gobject-devel-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009003" comment="avahi-libs-0.8-22.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009004" comment="avahi-tools-0.8-22.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52616" ref_url="https://www.suse.com/security/cve/CVE-2024-52616" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7437" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021029.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14538-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G3ABDXZMFN73MQ62ZJOBQIVUE3HAEKVL/" source="SUSE-SU"/>
    <description>
    A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52616/">CVE-2024-52616 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52616">CVE-2024-52616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233420">SUSE bug 1233420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984020" comment="avahi-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984021" comment="avahi-autoipd-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984022" comment="avahi-compat-howl-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984023" comment="avahi-compat-howl-devel-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984024" comment="avahi-compat-libdns_sd-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984025" comment="avahi-compat-libdns_sd-devel-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984026" comment="avahi-devel-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984027" comment="avahi-glib-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984028" comment="avahi-glib-devel-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984029" comment="avahi-gobject-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984030" comment="avahi-gobject-devel-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984031" comment="avahi-libs-0.8-22.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984032" comment="avahi-tools-0.8-22.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52804</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52804" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52804" ref_url="https://www.suse.com/security/cve/CVE-2024-52804" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10590" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000629.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2471" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040560.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14528-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KECEA6QVDQMKX34TWO73YYIDDQZZ476N/" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. The algorithm used for parsing HTTP cookies in Tornado versions prior to 6.4.2 sometimes has quadratic complexity, leading to excessive CPU consumption when parsing maliciously-crafted cookie headers. This parsing occurs in the event loop thread and may block the processing of other requests. Version 6.4.2 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-03"/>
	<updated date="2025-07-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52804/">CVE-2024-52804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52804">CVE-2024-52804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233668">SUSE bug 1233668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968349" comment="pcs-0.11.8-1.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968350" comment="pcs-snmp-0.11.8-1.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009955690" comment="python3-tornado-6.4.2-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52949</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52949" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52949" ref_url="https://www.suse.com/security/cve/CVE-2024-52949" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7064" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001338.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14516-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6UQOVVH4Y5FENNI3EJA5R7V3JBWCKEK/" source="SUSE-SU"/>
    <description>
    iptraf-ng 1.2.1 has a stack-based buffer overflow. In src/ifaces.c, the strcpy function consistently fails to control the size, and it is consequently possible to overflow memory on the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-52949/">CVE-2024-52949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52949">CVE-2024-52949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233683">SUSE bug 1233683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984838" comment="iptraf-ng-1.2.2-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53042" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53042" ref_url="https://www.suse.com/security/cve/CVE-2024-53042" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20340-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20367-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: ip_tunnel: Fix suspicious RCU usage warning in ip_tunnel_init_flow()

There are code paths from which the function is called without holding
the RCU read lock, resulting in a suspicious RCU usage warning [1].

Fix by using l3mdev_master_upper_ifindex_by_index() which will acquire
the RCU read lock before calling
l3mdev_master_upper_ifindex_by_index_rcu().

[1]
WARNING: suspicious RCU usage
6.12.0-rc3-custom-gac8f72681cf2 #141 Not tainted
-----------------------------
net/core/dev.c:876 RCU-list traversed in non-reader section!!

other info that might help us debug this:

rcu_scheduler_active = 2, debug_locks = 1
1 lock held by ip/361:
 #0: ffffffff86fc7cb0 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x377/0xf60

stack backtrace:
CPU: 3 UID: 0 PID: 361 Comm: ip Not tainted 6.12.0-rc3-custom-gac8f72681cf2 #141
Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xba/0x110
 lockdep_rcu_suspicious.cold+0x4f/0xd6
 dev_get_by_index_rcu+0x1d3/0x210
 l3mdev_master_upper_ifindex_by_index_rcu+0x2b/0xf0
 ip_tunnel_bind_dev+0x72f/0xa00
 ip_tunnel_newlink+0x368/0x7a0
 ipgre_newlink+0x14c/0x170
 __rtnl_newlink+0x1173/0x19c0
 rtnl_newlink+0x6c/0xa0
 rtnetlink_rcv_msg+0x3cc/0xf60
 netlink_rcv_skb+0x171/0x450
 netlink_unicast+0x539/0x7f0
 netlink_sendmsg+0x8c1/0xd80
 ____sys_sendmsg+0x8f9/0xc20
 ___sys_sendmsg+0x197/0x1e0
 __sys_sendmsg+0x122/0x1f0
 do_syscall_64+0xbb/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53042/">CVE-2024-53042 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53042">CVE-2024-53042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233540">SUSE bug 1233540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233678">SUSE bug 1233678</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53044" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53044" ref_url="https://www.suse.com/security/cve/CVE-2024-53044" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_api: fix xa_insert() error path in tcf_block_get_ext()

This command:

$ tc qdisc replace dev eth0 ingress_block 1 egress_block 1 clsact
Error: block dev insert failed: -EBUSY.

fails because user space requests the same block index to be set for
both ingress and egress.

[ side note, I don't think it even failed prior to commit 913b47d3424e
  ("net/sched: Introduce tc block netdev tracking infra"), because this
  is a command from an old set of notes of mine which used to work, but
  alas, I did not scientifically bisect this ]

The problem is not that it fails, but rather, that the second time
around, it fails differently (and irrecoverably):

$ tc qdisc replace dev eth0 ingress_block 1 egress_block 1 clsact
Error: dsa_core: Flow block cb is busy.

[ another note: the extack is added by me for illustration purposes.
  the context of the problem is that clsact_init() obtains the same
  &amp;q-&gt;ingress_block pointer as &amp;q-&gt;egress_block, and since we call
  tcf_block_get_ext() on both of them, "dev" will be added to the
  block-&gt;ports xarray twice, thus failing the operation: once through
  the ingress block pointer, and once again through the egress block
  pointer. the problem itself is that when xa_insert() fails, we have
  emitted a FLOW_BLOCK_BIND command through ndo_setup_tc(), but the
  offload never sees a corresponding FLOW_BLOCK_UNBIND. ]

Even correcting the bad user input, we still cannot recover:

$ tc qdisc replace dev swp3 ingress_block 1 egress_block 2 clsact
Error: dsa_core: Flow block cb is busy.

Basically the only way to recover is to reboot the system, or unbind and
rebind the net device driver.

To fix the bug, we need to fill the correct error teardown path which
was missed during code movement, and call tcf_block_offload_unbind()
when xa_insert() fails.

[ last note, fundamentally I blame the label naming convention in
  tcf_block_get_ext() for the bug. The labels should be named after what
  they do, not after the error path that jumps to them. This way, it is
  obviously wrong that two labels pointing to the same code mean
  something is wrong, and checking the code correctness at the goto site
  is also easier ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53044/">CVE-2024-53044 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53044">CVE-2024-53044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233722">SUSE bug 1233722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53047" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53047" ref_url="https://www.suse.com/security/cve/CVE-2024-53047" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: init: protect sched with rcu_read_lock

Enabling CONFIG_PROVE_RCU_LIST with its dependence CONFIG_RCU_EXPERT
creates this splat when an MPTCP socket is created:

  =============================
  WARNING: suspicious RCU usage
  6.12.0-rc2+ #11 Not tainted
  -----------------------------
  net/mptcp/sched.c:44 RCU-list traversed in non-reader section!!

  other info that might help us debug this:

  rcu_scheduler_active = 2, debug_locks = 1
  no locks held by mptcp_connect/176.

  stack backtrace:
  CPU: 0 UID: 0 PID: 176 Comm: mptcp_connect Not tainted 6.12.0-rc2+ #11
  Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl (lib/dump_stack.c:123)
   lockdep_rcu_suspicious (kernel/locking/lockdep.c:6822)
   mptcp_sched_find (net/mptcp/sched.c:44 (discriminator 7))
   mptcp_init_sock (net/mptcp/protocol.c:2867 (discriminator 1))
   ? sock_init_data_uid (arch/x86/include/asm/atomic.h:28)
   inet_create.part.0.constprop.0 (net/ipv4/af_inet.c:386)
   ? __sock_create (include/linux/rcupdate.h:347 (discriminator 1))
   __sock_create (net/socket.c:1576)
   __sys_socket (net/socket.c:1671)
   ? __pfx___sys_socket (net/socket.c:1712)
   ? do_user_addr_fault (arch/x86/mm/fault.c:1419 (discriminator 1))
   __x64_sys_socket (net/socket.c:1728)
   do_syscall_64 (arch/x86/entry/common.c:52 (discriminator 1))
   entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)

That's because when the socket is initialised, rcu_read_lock() is not
used despite the explicit comment written above the declaration of
mptcp_sched_find() in sched.c. Adding the missing lock/unlock avoids the
warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53047/">CVE-2024-53047 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53047">CVE-2024-53047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233545">SUSE bug 1233545</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53050" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53050" ref_url="https://www.suse.com/security/cve/CVE-2024-53050" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/hdcp: Add encoder check in hdcp2_get_capability

Add encoder check in intel_hdcp2_get_capability to avoid
null pointer error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53050/">CVE-2024-53050 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53050">CVE-2024-53050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233546">SUSE bug 1233546</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53051</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53051" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53051" ref_url="https://www.suse.com/security/cve/CVE-2024-53051" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability

Sometimes during hotplug scenario or suspend/resume scenario encoder is
not always initialized when intel_hdcp_get_capability add
a check to avoid kernel null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53051/">CVE-2024-53051 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53051">CVE-2024-53051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233547">SUSE bug 1233547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53052" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53052" ref_url="https://www.suse.com/security/cve/CVE-2024-53052" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/rw: fix missing NOWAIT check for O_DIRECT start write

When io_uring starts a write, it'll call kiocb_start_write() to bump the
super block rwsem, preventing any freezes from happening while that
write is in-flight. The freeze side will grab that rwsem for writing,
excluding any new writers from happening and waiting for existing writes
to finish. But io_uring unconditionally uses kiocb_start_write(), which
will block if someone is currently attempting to freeze the mount point.
This causes a deadlock where freeze is waiting for previous writes to
complete, but the previous writes cannot complete, as the task that is
supposed to complete them is blocked waiting on starting a new write.
This results in the following stuck trace showing that dependency with
the write blocked starting a new write:

task:fio             state:D stack:0     pid:886   tgid:886   ppid:876
Call trace:
 __switch_to+0x1d8/0x348
 __schedule+0x8e8/0x2248
 schedule+0x110/0x3f0
 percpu_rwsem_wait+0x1e8/0x3f8
 __percpu_down_read+0xe8/0x500
 io_write+0xbb8/0xff8
 io_issue_sqe+0x10c/0x1020
 io_submit_sqes+0x614/0x2110
 __arm64_sys_io_uring_enter+0x524/0x1038
 invoke_syscall+0x74/0x268
 el0_svc_common.constprop.0+0x160/0x238
 do_el0_svc+0x44/0x60
 el0_svc+0x44/0xb0
 el0t_64_sync_handler+0x118/0x128
 el0t_64_sync+0x168/0x170
INFO: task fsfreeze:7364 blocked for more than 15 seconds.
      Not tainted 6.12.0-rc5-00063-g76aaf945701c #7963

with the attempting freezer stuck trying to grab the rwsem:

task:fsfreeze        state:D stack:0     pid:7364  tgid:7364  ppid:995
Call trace:
 __switch_to+0x1d8/0x348
 __schedule+0x8e8/0x2248
 schedule+0x110/0x3f0
 percpu_down_write+0x2b0/0x680
 freeze_super+0x248/0x8a8
 do_vfs_ioctl+0x149c/0x1b18
 __arm64_sys_ioctl+0xd0/0x1a0
 invoke_syscall+0x74/0x268
 el0_svc_common.constprop.0+0x160/0x238
 do_el0_svc+0x44/0x60
 el0_svc+0x44/0xb0
 el0t_64_sync_handler+0x118/0x128
 el0t_64_sync+0x168/0x170

Fix this by having the io_uring side honor IOCB_NOWAIT, and only attempt a
blocking grab of the super block rwsem if it isn't set. For normal issue
where IOCB_NOWAIT would always be set, this returns -EAGAIN which will
have io_uring core issue a blocking attempt of the write. That will in
turn also get completions run, ensuring forward progress.

Since freezing requires CAP_SYS_ADMIN in the first place, this isn't
something that can be triggered by a regular user.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-53052/">CVE-2024-53052 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53052">CVE-2024-53052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233548">SUSE bug 1233548</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53055" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53055" ref_url="https://www.suse.com/security/cve/CVE-2024-53055" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: fix 6 GHz scan construction

If more than 255 colocated APs exist for the set of all
APs found during 2.4/5 GHz scanning, then the 6 GHz scan
construction will loop forever since the loop variable
has type u8, which can never reach the number found when
that's bigger than 255, and is stored in a u32 variable.
Also move it into the loops to have a smaller scope.

Using a u32 there is fine, we limit the number of APs in
the scan list and each has a limit on the number of RNR
entries due to the frame size. With a limit of 1000 scan
results, a frame size upper bound of 4096 (really it's
more like ~2300) and a TBTT entry size of at least 11,
we get an upper bound for the number of ~372k, well in
the bounds of a u32.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53055/">CVE-2024-53055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53055">CVE-2024-53055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233550">SUSE bug 1233550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53057" ref_url="https://www.suse.com/security/cve/CVE-2024-53057" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT

In qdisc_tree_reduce_backlog, Qdiscs with major handle ffff: are assumed
to be either root or ingress. This assumption is bogus since it's valid
to create egress qdiscs with major handle ffff:
Budimir Markovic found that for qdiscs like DRR that maintain an active
class list, it will cause a UAF with a dangling class pointer.

In 066a3b5b2346, the concern was to avoid iterating over the ingress
qdisc since its parent is itself. The proper fix is to stop when parent
TC_H_ROOT is reached because the only way to retrieve ingress is when a
hierarchy which does not contain a ffff: major handle call into
qdisc_lookup with TC_H_MAJ(TC_H_ROOT).

In the scenario where major ffff: is an egress qdisc in any of the tree
levels, the updates will also propagate to TC_H_ROOT, which then the
iteration must stop.


 net/sched/sch_api.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53057/">CVE-2024-53057 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53057">CVE-2024-53057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233551">SUSE bug 1233551</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245816">SUSE bug 1245816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53059" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53059" ref_url="https://www.suse.com/security/cve/CVE-2024-53059" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()

1. The size of the response packet is not validated.
2. The response buffer is not freed.

Resolve these issues by switching to iwl_mvm_send_cmd_status(),
which handles both size validation and frees the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53059/">CVE-2024-53059 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53059">CVE-2024-53059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233553">SUSE bug 1233553</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53060" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53060" ref_url="https://www.suse.com/security/cve/CVE-2024-53060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: prevent NULL pointer dereference if ATIF is not supported

acpi_evaluate_object() may return AE_NOT_FOUND (failure), which
would result in dereferencing buffer.pointer (obj) while being NULL.

Although this case may be unrealistic for the current code, it is
still better to protect against possible bugs.

Bail out also when status is AE_NOT_FOUND.

This fixes 1 FORWARD_NULL issue reported by Coverity
Report: CID 1600951:  Null pointer dereferences  (FORWARD_NULL)

(cherry picked from commit 91c9e221fe2553edf2db71627d8453f083de87a1)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53060/">CVE-2024-53060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53060">CVE-2024-53060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233554">SUSE bug 1233554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53070" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53070" ref_url="https://www.suse.com/security/cve/CVE-2024-53070" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: fix fault at system suspend if device was already runtime suspended

If the device was already runtime suspended then during system suspend
we cannot access the device registers else it will crash.

Also we cannot access any registers after dwc3_core_exit() on some
platforms so move the dwc3_enable_susphy() call to the top.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53070/">CVE-2024-53070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53070">CVE-2024-53070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233563">SUSE bug 1233563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53072</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53072" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53072" ref_url="https://www.suse.com/security/cve/CVE-2024-53072" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd/pmc: Detect when STB is not available

Loading the amd_pmc module as:

    amd_pmc enable_stb=1

...can result in the following messages in the kernel ring buffer:

    amd_pmc AMDI0009:00: SMU cmd failed. err: 0xff
    ioremap on RAM at 0x0000000000000000 - 0x0000000000ffffff
    WARNING: CPU: 10 PID: 2151 at arch/x86/mm/ioremap.c:217 __ioremap_caller+0x2cd/0x340

Further debugging reveals that this occurs when the requests for
S2D_PHYS_ADDR_LOW and S2D_PHYS_ADDR_HIGH return a value of 0,
indicating that the STB is inaccessible. To prevent the ioremap
warning and provide clarity to the user, handle the invalid address
and display an error message.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53072/">CVE-2024-53072 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53072">CVE-2024-53072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233564">SUSE bug 1233564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53074</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53074" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53074" ref_url="https://www.suse.com/security/cve/CVE-2024-53074" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: don't leak a link on AP removal

Release the link mapping resource in AP removal. This impacted devices
that do not support the MLD API (9260 and down).
On those devices, we couldn't start the AP again after the AP has been
already started and stopped.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53074/">CVE-2024-53074 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53074">CVE-2024-53074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233566">SUSE bug 1233566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235086">SUSE bug 1235086</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53082" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53082" ref_url="https://www.suse.com/security/cve/CVE-2024-53082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio_net: Add hash_key_length check

Add hash_key_length check in virtnet_probe() to avoid possible out of
bound errors when setting/reading the hash key.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53082/">CVE-2024-53082 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53082">CVE-2024-53082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233573">SUSE bug 1233573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1233677">SUSE bug 1233677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53085" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53085" ref_url="https://www.suse.com/security/cve/CVE-2024-53085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Lock TPM chip in tpm_pm_suspend() first

Setting TPM_CHIP_FLAG_SUSPENDED in the end of tpm_pm_suspend() can be racy
according, as this leaves window for tpm_hwrng_read() to be called while
the operation is in progress. The recent bug report gives also evidence of
this behaviour.

Aadress this by locking the TPM chip before checking any chip-&gt;flags both
in tpm_pm_suspend() and tpm_hwrng_read(). Move TPM_CHIP_FLAG_SUSPENDED
check inside tpm_get_random() so that it will be always checked only when
the lock is reserved.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53085/">CVE-2024-53085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53085">CVE-2024-53085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233577">SUSE bug 1233577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53088" ref_url="https://www.suse.com/security/cve/CVE-2024-53088" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0065" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000741.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix race condition by adding filter's intermediate sync state

Fix a race condition in the i40e driver that leads to MAC/VLAN filters
becoming corrupted and leaking. Address the issue that occurs under
heavy load when multiple threads are concurrently modifying MAC/VLAN
filters by setting mac and port VLAN.

1. Thread T0 allocates a filter in i40e_add_filter() within
        i40e_ndo_set_vf_port_vlan().
2. Thread T1 concurrently frees the filter in __i40e_del_filter() within
        i40e_ndo_set_vf_mac().
3. Subsequently, i40e_service_task() calls i40e_sync_vsi_filters(), which
        refers to the already freed filter memory, causing corruption.

Reproduction steps:
1. Spawn multiple VFs.
2. Apply a concurrent heavy load by running parallel operations to change
        MAC addresses on the VFs and change port VLANs on the host.
3. Observe errors in dmesg:
"Error I40E_AQ_RC_ENOSPC adding RX filters on VF XX,
	please set promiscuous on manually for VF XX".

Exact code for stable reproduction Intel can't open-source now.

The fix involves implementing a new intermediate filter state,
I40E_FILTER_NEW_SYNC, for the time when a filter is on a tmp_add_list.
These filters cannot be deleted from the hash list directly but
must be removed using the full process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53088/">CVE-2024-53088 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53088">CVE-2024-53088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233580">SUSE bug 1233580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961451" comment="bpftool-7.4.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961452" comment="kernel-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961453" comment="kernel-abi-stablelists-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961454" comment="kernel-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961455" comment="kernel-cross-headers-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961456" comment="kernel-debug-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961457" comment="kernel-debug-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961460" comment="kernel-debug-modules-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961461" comment="kernel-debug-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961462" comment="kernel-debug-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961463" comment="kernel-debug-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961466" comment="kernel-doc-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961467" comment="kernel-headers-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961468" comment="kernel-modules-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961469" comment="kernel-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961470" comment="kernel-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961471" comment="kernel-tools-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961472" comment="kernel-tools-libs-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961474" comment="kernel-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961475" comment="kernel-uki-virt-addons-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961476" comment="libperf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961477" comment="perf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961478" comment="python3-perf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961479" comment="rtla-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961480" comment="rv-5.14.0-503.22.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53090</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53090" ref_url="https://www.suse.com/security/cve/CVE-2024-53090" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix lock recursion

afs_wake_up_async_call() can incur lock recursion.  The problem is that it
is called from AF_RXRPC whilst holding the -&gt;notify_lock, but it tries to
take a ref on the afs_call struct in order to pass it to a work queue - but
if the afs_call is already queued, we then have an extraneous ref that must
be put... calling afs_put_call() may call back down into AF_RXRPC through
rxrpc_kernel_shutdown_call(), however, which might try taking the
-&gt;notify_lock again.

This case isn't very common, however, so defer it to a workqueue.  The oops
looks something like:

  BUG: spinlock recursion on CPU#0, krxrpcio/7001/1646
   lock: 0xffff888141399b30, .magic: dead4ead, .owner: krxrpcio/7001/1646, .owner_cpu: 0
  CPU: 0 UID: 0 PID: 1646 Comm: krxrpcio/7001 Not tainted 6.12.0-rc2-build3+ #4351
  Hardware name: ASUS All Series/H97-PLUS, BIOS 2306 10/09/2014
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x47/0x70
   do_raw_spin_lock+0x3c/0x90
   rxrpc_kernel_shutdown_call+0x83/0xb0
   afs_put_call+0xd7/0x180
   rxrpc_notify_socket+0xa0/0x190
   rxrpc_input_split_jumbo+0x198/0x1d0
   rxrpc_input_data+0x14b/0x1e0
   ? rxrpc_input_call_packet+0xc2/0x1f0
   rxrpc_input_call_event+0xad/0x6b0
   rxrpc_input_packet_on_conn+0x1e1/0x210
   rxrpc_input_packet+0x3f2/0x4d0
   rxrpc_io_thread+0x243/0x410
   ? __pfx_rxrpc_io_thread+0x10/0x10
   kthread+0xcf/0xe0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x24/0x40
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53090/">CVE-2024-53090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53090">CVE-2024-53090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233637">SUSE bug 1233637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53091" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53091" ref_url="https://www.suse.com/security/cve/CVE-2024-53091" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add sk_is_inet and IS_ICSK check in tls_sw_has_ctx_tx/rx

As the introduction of the support for vsock and unix sockets in sockmap,
tls_sw_has_ctx_tx/rx cannot presume the socket passed in must be IS_ICSK.
vsock and af_unix sockets have vsock_sock and unix_sock instead of
inet_connection_sock. For these sockets, tls_get_ctx may return an invalid
pointer and cause page fault in function tls_sw_ctx_rx.

BUG: unable to handle page fault for address: 0000000000040030
Workqueue: vsock-loopback vsock_loopback_work
RIP: 0010:sk_psock_strp_data_ready+0x23/0x60
Call Trace:
 ? __die+0x81/0xc3
 ? no_context+0x194/0x350
 ? do_page_fault+0x30/0x110
 ? async_page_fault+0x3e/0x50
 ? sk_psock_strp_data_ready+0x23/0x60
 virtio_transport_recv_pkt+0x750/0x800
 ? update_load_avg+0x7e/0x620
 vsock_loopback_work+0xd0/0x100
 process_one_work+0x1a7/0x360
 worker_thread+0x30/0x390
 ? create_worker+0x1a0/0x1a0
 kthread+0x112/0x130
 ? __kthread_cancel_work+0x40/0x40
 ret_from_fork+0x1f/0x40

v2:
  - Add IS_ICSK check
v3:
  - Update the commits in Fixes
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53091/">CVE-2024-53091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53091">CVE-2024-53091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233638">SUSE bug 1233638</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53093" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53093" ref_url="https://www.suse.com/security/cve/CVE-2024-53093" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-multipath: defer partition scanning

We need to suppress the partition scan from occuring within the
controller's scan_work context. If a path error occurs here, the IO will
wait until a path becomes available or all paths are torn down, but that
action also occurs within scan_work, so it would deadlock. Defer the
partion scan to a different context that does not block scan_work.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53093/">CVE-2024-53093 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53093">CVE-2024-53093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233640">SUSE bug 1233640</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53095</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53095" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53095" ref_url="https://www.suse.com/security/cve/CVE-2024-53095" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: Fix use-after-free of network namespace.

Recently, we got a customer report that CIFS triggers oops while
reconnecting to a server.  [0]

The workload runs on Kubernetes, and some pods mount CIFS servers
in non-root network namespaces.  The problem rarely happened, but
it was always while the pod was dying.

The root cause is wrong reference counting for network namespace.

CIFS uses kernel sockets, which do not hold refcnt of the netns that
the socket belongs to.  That means CIFS must ensure the socket is
always freed before its netns; otherwise, use-after-free happens.

The repro steps are roughly:

  1. mount CIFS in a non-root netns
  2. drop packets from the netns
  3. destroy the netns
  4. unmount CIFS

We can reproduce the issue quickly with the script [1] below and see
the splat [2] if CONFIG_NET_NS_REFCNT_TRACKER is enabled.

When the socket is TCP, it is hard to guarantee the netns lifetime
without holding refcnt due to async timers.

Let's hold netns refcnt for each socket as done for SMC in commit
9744d2bf1976 ("smc: Fix use-after-free in tcp_write_timer_handler().").

Note that we need to move put_net() from cifs_put_tcp_session() to
clean_demultiplex_info(); otherwise, __sock_create() still could touch a
freed netns while cifsd tries to reconnect from cifs_demultiplex_thread().

Also, maybe_get_net() cannot be put just before __sock_create() because
the code is not under RCU and there is a small chance that the same
address happened to be reallocated to another netns.

[0]:
CIFS: VFS: \\XXXXXXXXXXX has not responded in 15 seconds. Reconnecting...
CIFS: Serverclose failed 4 times, giving up
Unable to handle kernel paging request at virtual address 14de99e461f84a07
Mem abort info:
  ESR = 0x0000000096000004
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x04: level 0 translation fault
Data abort info:
  ISV = 0, ISS = 0x00000004
  CM = 0, WnR = 0
[14de99e461f84a07] address between user and kernel address ranges
Internal error: Oops: 0000000096000004 [#1] SMP
Modules linked in: cls_bpf sch_ingress nls_utf8 cifs cifs_arc4 cifs_md4 dns_resolver tcp_diag inet_diag veth xt_state xt_connmark nf_conntrack_netlink xt_nat xt_statistic xt_MASQUERADE xt_mark xt_addrtype ipt_REJECT nf_reject_ipv4 nft_chain_nat nf_nat xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_comment nft_compat nf_tables nfnetlink overlay nls_ascii nls_cp437 sunrpc vfat fat aes_ce_blk aes_ce_cipher ghash_ce sm4_ce_cipher sm4 sm3_ce sm3 sha3_ce sha512_ce sha512_arm64 sha1_ce ena button sch_fq_codel loop fuse configfs dmi_sysfs sha2_ce sha256_arm64 dm_mirror dm_region_hash dm_log dm_mod dax efivarfs
CPU: 5 PID: 2690970 Comm: cifsd Not tainted 6.1.103-109.184.amzn2023.aarch64 #1
Hardware name: Amazon EC2 r7g.4xlarge/, BIOS 1.0 11/1/2018
pstate: 00400005 (nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : fib_rules_lookup+0x44/0x238
lr : __fib_lookup+0x64/0xbc
sp : ffff8000265db790
x29: ffff8000265db790 x28: 0000000000000000 x27: 000000000000bd01
x26: 0000000000000000 x25: ffff000b4baf8000 x24: ffff00047b5e4580
x23: ffff8000265db7e0 x22: 0000000000000000 x21: ffff00047b5e4500
x20: ffff0010e3f694f8 x19: 14de99e461f849f7 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000000 x12: 3f92800abd010002
x11: 0000000000000001 x10: ffff0010e3f69420 x9 : ffff800008a6f294
x8 : 0000000000000000 x7 : 0000000000000006 x6 : 0000000000000000
x5 : 0000000000000001 x4 : ffff001924354280 x3 : ffff8000265db7e0
x2 : 0000000000000000 x1 : ffff0010e3f694f8 x0 : ffff00047b5e4500
Call trace:
 fib_rules_lookup+0x44/0x238
 __fib_lookup+0x64/0xbc
 ip_route_output_key_hash_rcu+0x2c4/0x398
 ip_route_output_key_hash+0x60/0x8c
 tcp_v4_connect+0x290/0x488
 __inet_stream_connect+0x108/0x3d0
 inet_stream_connect+0x50/0x78
 kernel_connect+0x6c/0xac
 generic_ip_conne
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53095/">CVE-2024-53095 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53095">CVE-2024-53095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233642">SUSE bug 1233642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53096" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53096" ref_url="https://www.suse.com/security/cve/CVE-2024-53096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: resolve faulty mmap_region() error path behaviour

The mmap_region() function is somewhat terrifying, with spaghetti-like
control flow and numerous means by which issues can arise and incomplete
state, memory leaks and other unpleasantness can occur.

A large amount of the complexity arises from trying to handle errors late
in the process of mapping a VMA, which forms the basis of recently
observed issues with resource leaks and observable inconsistent state.

Taking advantage of previous patches in this series we move a number of
checks earlier in the code, simplifying things by moving the core of the
logic into a static internal function __mmap_region().

Doing this allows us to perform a number of checks up front before we do
any real work, and allows us to unwind the writable unmap check
unconditionally as required and to perform a CONFIG_DEBUG_VM_MAPLE_TREE
validation unconditionally also.

We move a number of things here:

1. We preallocate memory for the iterator before we call the file-backed
   memory hook, allowing us to exit early and avoid having to perform
   complicated and error-prone close/free logic. We carefully free
   iterator state on both success and error paths.

2. The enclosing mmap_region() function handles the mapping_map_writable()
   logic early. Previously the logic had the mapping_map_writable() at the
   point of mapping a newly allocated file-backed VMA, and a matching
   mapping_unmap_writable() on success and error paths.

   We now do this unconditionally if this is a file-backed, shared writable
   mapping. If a driver changes the flags to eliminate VM_MAYWRITE, however
   doing so does not invalidate the seal check we just performed, and we in
   any case always decrement the counter in the wrapper.

   We perform a debug assert to ensure a driver does not attempt to do the
   opposite.

3. We also move arch_validate_flags() up into the mmap_region()
   function. This is only relevant on arm64 and sparc64, and the check is
   only meaningful for SPARC with ADI enabled. We explicitly add a warning
   for this arch if a driver invalidates this check, though the code ought
   eventually to be fixed to eliminate the need for this.

With all of these measures in place, we no longer need to explicitly close
the VMA on error paths, as we place all checks which might fail prior to a
call to any driver mmap hook.

This eliminates an entire class of errors, makes the code easier to reason
about and more robust.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53096/">CVE-2024-53096 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53096">CVE-2024-53096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233756">SUSE bug 1233756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53097" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53097" ref_url="https://www.suse.com/security/cve/CVE-2024-53097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: krealloc: Fix MTE false alarm in __do_krealloc

This patch addresses an issue introduced by commit 1a83a716ec233 ("mm:
krealloc: consider spare memory for __GFP_ZERO") which causes MTE
(Memory Tagging Extension) to falsely report a slab-out-of-bounds error.

The problem occurs when zeroing out spare memory in __do_krealloc. The
original code only considered software-based KASAN and did not account
for MTE. It does not reset the KASAN tag before calling memset, leading
to a mismatch between the pointer tag and the memory tag, resulting
in a false positive.

Example of the error:
==================================================================
swapper/0: BUG: KASAN: slab-out-of-bounds in __memset+0x84/0x188
swapper/0: Write at addr f4ffff8005f0fdf0 by task swapper/0/1
swapper/0: Pointer tag: [f4], memory tag: [fe]
swapper/0:
swapper/0: CPU: 4 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.
swapper/0: Hardware name: MT6991(ENG) (DT)
swapper/0: Call trace:
swapper/0:  dump_backtrace+0xfc/0x17c
swapper/0:  show_stack+0x18/0x28
swapper/0:  dump_stack_lvl+0x40/0xa0
swapper/0:  print_report+0x1b8/0x71c
swapper/0:  kasan_report+0xec/0x14c
swapper/0:  __do_kernel_fault+0x60/0x29c
swapper/0:  do_bad_area+0x30/0xdc
swapper/0:  do_tag_check_fault+0x20/0x34
swapper/0:  do_mem_abort+0x58/0x104
swapper/0:  el1_abort+0x3c/0x5c
swapper/0:  el1h_64_sync_handler+0x80/0xcc
swapper/0:  el1h_64_sync+0x68/0x6c
swapper/0:  __memset+0x84/0x188
swapper/0:  btf_populate_kfunc_set+0x280/0x3d8
swapper/0:  __register_btf_kfunc_id_set+0x43c/0x468
swapper/0:  register_btf_kfunc_id_set+0x48/0x60
swapper/0:  register_nf_nat_bpf+0x1c/0x40
swapper/0:  nf_nat_init+0xc0/0x128
swapper/0:  do_one_initcall+0x184/0x464
swapper/0:  do_initcall_level+0xdc/0x1b0
swapper/0:  do_initcalls+0x70/0xc0
swapper/0:  do_basic_setup+0x1c/0x28
swapper/0:  kernel_init_freeable+0x144/0x1b8
swapper/0:  kernel_init+0x20/0x1a8
swapper/0:  ret_from_fork+0x10/0x20
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53097/">CVE-2024-53097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53097">CVE-2024-53097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233757">SUSE bug 1233757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53103</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53103" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53103" ref_url="https://www.suse.com/security/cve/CVE-2024-53103" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_sock: Initializing vsk-&gt;trans to NULL to prevent a dangling pointer

When hvs is released, there is a possibility that vsk-&gt;trans may not
be initialized to NULL, which could lead to a dangling pointer.
This issue is resolved by initializing vsk-&gt;trans to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53103/">CVE-2024-53103 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53103">CVE-2024-53103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234024">SUSE bug 1234024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53104" ref_url="https://www.suse.com/security/cve/CVE-2024-53104" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1262" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000853.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1266" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000860.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0709-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format

This can lead to out of bounds writes since frames of this type were not
taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-12"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-53104/">CVE-2024-53104 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53104">CVE-2024-53104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234025">SUSE bug 1234025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236783">SUSE bug 1236783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963302" comment="bpftool-7.4.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963303" comment="kernel-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963304" comment="kernel-abi-stablelists-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963305" comment="kernel-core-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963306" comment="kernel-cross-headers-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963307" comment="kernel-debug-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963308" comment="kernel-debug-core-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963311" comment="kernel-debug-modules-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963312" comment="kernel-debug-modules-core-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963313" comment="kernel-debug-modules-extra-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963314" comment="kernel-debug-uki-virt-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963317" comment="kernel-doc-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963318" comment="kernel-headers-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963319" comment="kernel-modules-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963320" comment="kernel-modules-core-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963321" comment="kernel-modules-extra-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963322" comment="kernel-tools-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963323" comment="kernel-tools-libs-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963325" comment="kernel-uki-virt-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963326" comment="kernel-uki-virt-addons-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963327" comment="libperf-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963328" comment="perf-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963329" comment="python3-perf-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963330" comment="rtla-5.14.0-503.23.2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963331" comment="rv-5.14.0-503.23.2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53105</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53105" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53105" ref_url="https://www.suse.com/security/cve/CVE-2024-53105" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: page_alloc: move mlocked flag clearance into free_pages_prepare()

Syzbot reported a bad page state problem caused by a page being freed
using free_page() still having a mlocked flag at free_pages_prepare()
stage:

  BUG: Bad page state in process syz.5.504  pfn:61f45
  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x61f45
  flags: 0xfff00000080204(referenced|workingset|mlocked|node=0|zone=1|lastcpupid=0x7ff)
  raw: 00fff00000080204 0000000000000000 dead000000000122 0000000000000000
  raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
  page dumped because: PAGE_FLAGS_CHECK_AT_FREE flag(s) set
  page_owner tracks the page as allocated
  page last allocated via order 0, migratetype Unmovable, gfp_mask 0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), pid 8443, tgid 8442 (syz.5.504), ts 201884660643, free_ts 201499827394
   set_page_owner include/linux/page_owner.h:32 [inline]
   post_alloc_hook+0x1f3/0x230 mm/page_alloc.c:1537
   prep_new_page mm/page_alloc.c:1545 [inline]
   get_page_from_freelist+0x303f/0x3190 mm/page_alloc.c:3457
   __alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4733
   alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265
   kvm_coalesced_mmio_init+0x1f/0xf0 virt/kvm/coalesced_mmio.c:99
   kvm_create_vm virt/kvm/kvm_main.c:1235 [inline]
   kvm_dev_ioctl_create_vm virt/kvm/kvm_main.c:5488 [inline]
   kvm_dev_ioctl+0x12dc/0x2240 virt/kvm/kvm_main.c:5530
   __do_compat_sys_ioctl fs/ioctl.c:1007 [inline]
   __se_compat_sys_ioctl+0x510/0xc90 fs/ioctl.c:950
   do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]
   __do_fast_syscall_32+0xb4/0x110 arch/x86/entry/common.c:386
   do_fast_syscall_32+0x34/0x80 arch/x86/entry/common.c:411
   entry_SYSENTER_compat_after_hwframe+0x84/0x8e
  page last free pid 8399 tgid 8399 stack trace:
   reset_page_owner include/linux/page_owner.h:25 [inline]
   free_pages_prepare mm/page_alloc.c:1108 [inline]
   free_unref_folios+0xf12/0x18d0 mm/page_alloc.c:2686
   folios_put_refs+0x76c/0x860 mm/swap.c:1007
   free_pages_and_swap_cache+0x5c8/0x690 mm/swap_state.c:335
   __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline]
   tlb_batch_pages_flush mm/mmu_gather.c:149 [inline]
   tlb_flush_mmu_free mm/mmu_gather.c:366 [inline]
   tlb_flush_mmu+0x3a3/0x680 mm/mmu_gather.c:373
   tlb_finish_mmu+0xd4/0x200 mm/mmu_gather.c:465
   exit_mmap+0x496/0xc40 mm/mmap.c:1926
   __mmput+0x115/0x390 kernel/fork.c:1348
   exit_mm+0x220/0x310 kernel/exit.c:571
   do_exit+0x9b2/0x28e0 kernel/exit.c:926
   do_group_exit+0x207/0x2c0 kernel/exit.c:1088
   __do_sys_exit_group kernel/exit.c:1099 [inline]
   __se_sys_exit_group kernel/exit.c:1097 [inline]
   __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097
   x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  Modules linked in:
  CPU: 0 UID: 0 PID: 8442 Comm: syz.5.504 Not tainted 6.12.0-rc6-syzkaller #0
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
  Call Trace:
   &lt;TASK&gt;
   __dump_stack lib/dump_stack.c:94 [inline]
   dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
   bad_page+0x176/0x1d0 mm/page_alloc.c:501
   free_page_is_bad mm/page_alloc.c:918 [inline]
   free_pages_prepare mm/page_alloc.c:1100 [inline]
   free_unref_page+0xed0/0xf20 mm/page_alloc.c:2638
   kvm_destroy_vm virt/kvm/kvm_main.c:1327 [inline]
   kvm_put_kvm+0xc75/0x1350 virt/kvm/kvm_main.c:1386
   kvm_vcpu_release+0x54/0x60 virt/kvm/kvm_main.c:4143
   __fput+0x23f/0x880 fs/file_table.c:431
   task_work_run+0x24f/0x310 kernel/task_work.c:239
   exit_task_work include/linux/task_work.h:43 [inline]
   do_exit+0xa2f/0x28e0 kernel/exit.c:939
   do_group_exit+0x207/0x2c0 kernel/exit.c:1088
   __do_sys_exit_group kernel/exit.c:1099 [in
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53105/">CVE-2024-53105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53105">CVE-2024-53105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234069">SUSE bug 1234069</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53110" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53110" ref_url="https://www.suse.com/security/cve/CVE-2024-53110" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vp_vdpa: fix id_table array not null terminated error

Allocate one extra virtio_device_id as null terminator, otherwise
vdpa_mgmtdev_get_classes() may iterate multiple times and visit
undefined memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53110/">CVE-2024-53110 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53110">CVE-2024-53110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234085">SUSE bug 1234085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53113" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53113" ref_url="https://www.suse.com/security/cve/CVE-2024-53113" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: fix NULL pointer dereference in alloc_pages_bulk_noprof

We triggered a NULL pointer dereference for ac.preferred_zoneref-&gt;zone in
alloc_pages_bulk_noprof() when the task is migrated between cpusets.

When cpuset is enabled, in prepare_alloc_pages(), ac-&gt;nodemask may be
&amp;current-&gt;mems_allowed.  when first_zones_zonelist() is called to find
preferred_zoneref, the ac-&gt;nodemask may be modified concurrently if the
task is migrated between different cpusets.  Assuming we have 2 NUMA Node,
when traversing Node1 in ac-&gt;zonelist, the nodemask is 2, and when
traversing Node2 in ac-&gt;zonelist, the nodemask is 1.  As a result, the
ac-&gt;preferred_zoneref points to NULL zone.

In alloc_pages_bulk_noprof(), for_each_zone_zonelist_nodemask() finds a
allowable zone and calls zonelist_node_idx(ac.preferred_zoneref), leading
to NULL pointer dereference.

__alloc_pages_noprof() fixes this issue by checking NULL pointer in commit
ea57485af8f4 ("mm, page_alloc: fix check for NULL preferred_zone") and
commit df76cee6bbeb ("mm, page_alloc: remove redundant checks from alloc
fastpath").

To fix it, check NULL pointer for preferred_zoneref-&gt;zone.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53113/">CVE-2024-53113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53113">CVE-2024-53113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234077">SUSE bug 1234077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968351" comment="bpftool-7.4.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968352" comment="kernel-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968353" comment="kernel-abi-stablelists-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968354" comment="kernel-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968355" comment="kernel-cross-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968356" comment="kernel-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968357" comment="kernel-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968360" comment="kernel-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968361" comment="kernel-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968362" comment="kernel-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968363" comment="kernel-debug-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968366" comment="kernel-doc-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968367" comment="kernel-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968368" comment="kernel-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968369" comment="kernel-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968370" comment="kernel-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968371" comment="kernel-rt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968372" comment="kernel-rt-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968373" comment="kernel-rt-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968374" comment="kernel-rt-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968376" comment="kernel-rt-debug-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968377" comment="kernel-rt-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968378" comment="kernel-rt-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968379" comment="kernel-rt-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968381" comment="kernel-rt-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968382" comment="kernel-rt-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968383" comment="kernel-rt-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968384" comment="kernel-rt-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968385" comment="kernel-tools-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968386" comment="kernel-tools-libs-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968388" comment="kernel-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968389" comment="kernel-uki-virt-addons-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968390" comment="libperf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968391" comment="perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968392" comment="python3-perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968393" comment="rtla-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968394" comment="rv-5.14.0-503.31.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53117</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53117" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53117" ref_url="https://www.suse.com/security/cve/CVE-2024-53117" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio/vsock: Improve MSG_ZEROCOPY error handling

Add a missing kfree_skb() to prevent memory leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53117/">CVE-2024-53117 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53117">CVE-2024-53117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234079">SUSE bug 1234079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53118</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53118" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53118" ref_url="https://www.suse.com/security/cve/CVE-2024-53118" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix sk_error_queue memory leak

Kernel queues MSG_ZEROCOPY completion notifications on the error queue.
Where they remain, until explicitly recv()ed. To prevent memory leaks,
clean up the queue when the socket is destroyed.

unreferenced object 0xffff8881028beb00 (size 224):
  comm "vsock_test", pid 1218, jiffies 4294694897
  hex dump (first 32 bytes):
    90 b0 21 17 81 88 ff ff 90 b0 21 17 81 88 ff ff  ..!.......!.....
    00 00 00 00 00 00 00 00 00 b0 21 17 81 88 ff ff  ..........!.....
  backtrace (crc 6c7031ca):
    [&lt;ffffffff81418ef7&gt;] kmem_cache_alloc_node_noprof+0x2f7/0x370
    [&lt;ffffffff81d35882&gt;] __alloc_skb+0x132/0x180
    [&lt;ffffffff81d2d32b&gt;] sock_omalloc+0x4b/0x80
    [&lt;ffffffff81d3a8ae&gt;] msg_zerocopy_realloc+0x9e/0x240
    [&lt;ffffffff81fe5cb2&gt;] virtio_transport_send_pkt_info+0x412/0x4c0
    [&lt;ffffffff81fe6183&gt;] virtio_transport_stream_enqueue+0x43/0x50
    [&lt;ffffffff81fe0813&gt;] vsock_connectible_sendmsg+0x373/0x450
    [&lt;ffffffff81d233d5&gt;] ____sys_sendmsg+0x365/0x3a0
    [&lt;ffffffff81d246f4&gt;] ___sys_sendmsg+0x84/0xd0
    [&lt;ffffffff81d26f47&gt;] __sys_sendmsg+0x47/0x80
    [&lt;ffffffff820d3df3&gt;] do_syscall_64+0x93/0x180
    [&lt;ffffffff8220012b&gt;] entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53118/">CVE-2024-53118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53118">CVE-2024-53118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234071">SUSE bug 1234071</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53119" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53119" ref_url="https://www.suse.com/security/cve/CVE-2024-53119" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio/vsock: Fix accept_queue memory leak

As the final stages of socket destruction may be delayed, it is possible
that virtio_transport_recv_listen() will be called after the accept_queue
has been flushed, but before the SOCK_DONE flag has been set. As a result,
sockets enqueued after the flush would remain unremoved, leading to a
memory leak.

vsock_release
  __vsock_release
    lock
    virtio_transport_release
      virtio_transport_close
        schedule_delayed_work(close_work)
    sk_shutdown = SHUTDOWN_MASK
(!) flush accept_queue
    release
                                        virtio_transport_recv_pkt
                                          vsock_find_bound_socket
                                          lock
                                          if flag(SOCK_DONE) return
                                          virtio_transport_recv_listen
                                            child = vsock_create_connected
                                      (!)   vsock_enqueue_accept(child)
                                          release
close_work
  lock
  virtio_transport_do_close
    set_flag(SOCK_DONE)
    virtio_transport_remove_sock
      vsock_remove_sock
        vsock_remove_bound
  release

Introduce a sk_shutdown check to disallow vsock_enqueue_accept() during
socket destruction.

unreferenced object 0xffff888109e3f800 (size 2040):
  comm "kworker/5:2", pid 371, jiffies 4294940105
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    28 00 0b 40 00 00 00 00 00 00 00 00 00 00 00 00  (..@............
  backtrace (crc 9e5f4e84):
    [&lt;ffffffff81418ff1&gt;] kmem_cache_alloc_noprof+0x2c1/0x360
    [&lt;ffffffff81d27aa0&gt;] sk_prot_alloc+0x30/0x120
    [&lt;ffffffff81d2b54c&gt;] sk_alloc+0x2c/0x4b0
    [&lt;ffffffff81fe049a&gt;] __vsock_create.constprop.0+0x2a/0x310
    [&lt;ffffffff81fe6d6c&gt;] virtio_transport_recv_pkt+0x4dc/0x9a0
    [&lt;ffffffff81fe745d&gt;] vsock_loopback_work+0xfd/0x140
    [&lt;ffffffff810fc6ac&gt;] process_one_work+0x20c/0x570
    [&lt;ffffffff810fce3f&gt;] worker_thread+0x1bf/0x3a0
    [&lt;ffffffff811070dd&gt;] kthread+0xdd/0x110
    [&lt;ffffffff81044fdd&gt;] ret_from_fork+0x2d/0x50
    [&lt;ffffffff8100785a&gt;] ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53119/">CVE-2024-53119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53119">CVE-2024-53119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234073">SUSE bug 1234073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53120</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53120" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53120" ref_url="https://www.suse.com/security/cve/CVE-2024-53120" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: CT: Fix null-ptr-deref in add rule err flow

In error flow of mlx5_tc_ct_entry_add_rule(), in case ct_rule_add()
callback returns error, zone_rule-&gt;attr is used uninitiated. Fix it to
use attr which has the needed pointer value.

Kernel log:
 BUG: kernel NULL pointer dereference, address: 0000000000000110
 RIP: 0010:mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core]
...
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x20/0x70
  ? page_fault_oops+0x150/0x3e0
  ? exc_page_fault+0x74/0x140
  ? asm_exc_page_fault+0x22/0x30
  ? mlx5_tc_ct_entry_add_rule+0x2b1/0x2f0 [mlx5_core]
  ? mlx5_tc_ct_entry_add_rule+0x1d5/0x2f0 [mlx5_core]
  mlx5_tc_ct_block_flow_offload+0xc6a/0xf90 [mlx5_core]
  ? nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table]
  nf_flow_offload_tuple+0xd8/0x190 [nf_flow_table]
  flow_offload_work_handler+0x142/0x320 [nf_flow_table]
  ? finish_task_switch.isra.0+0x15b/0x2b0
  process_one_work+0x16c/0x320
  worker_thread+0x28c/0x3a0
  ? __pfx_worker_thread+0x10/0x10
  kthread+0xb8/0xf0
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x2d/0x50
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53120/">CVE-2024-53120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53120">CVE-2024-53120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234075">SUSE bug 1234075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53121" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53121" ref_url="https://www.suse.com/security/cve/CVE-2024-53121" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fs, lock FTE when checking if active

The referenced commits introduced a two-step process for deleting FTEs:

- Lock the FTE, delete it from hardware, set the hardware deletion function
  to NULL and unlock the FTE.
- Lock the parent flow group, delete the software copy of the FTE, and
  remove it from the xarray.

However, this approach encounters a race condition if a rule with the same
match value is added simultaneously. In this scenario, fs_core may set the
hardware deletion function to NULL prematurely, causing a panic during
subsequent rule deletions.

To prevent this, ensure the active flag of the FTE is checked under a lock,
which will prevent the fs_core layer from attaching a new steering rule to
an FTE that is in the process of deletion.

[  438.967589] MOSHE: 2496 mlx5_del_flow_rules del_hw_func
[  438.968205] ------------[ cut here ]------------
[  438.968654] refcount_t: decrement hit 0; leaking memory.
[  438.969249] WARNING: CPU: 0 PID: 8957 at lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110
[  438.970054] Modules linked in: act_mirred cls_flower act_gact sch_ingress openvswitch nsh mlx5_vdpa vringh vhost_iotlb vdpa mlx5_ib mlx5_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core zram zsmalloc fuse [last unloaded: cls_flower]
[  438.973288] CPU: 0 UID: 0 PID: 8957 Comm: tc Not tainted 6.12.0-rc1+ #8
[  438.973888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[  438.974874] RIP: 0010:refcount_warn_saturate+0xfb/0x110
[  438.975363] Code: 40 66 3b 82 c6 05 16 e9 4d 01 01 e8 1f 7c a0 ff 0f 0b c3 cc cc cc cc 48 c7 c7 10 66 3b 82 c6 05 fd e8 4d 01 01 e8 05 7c a0 ff &lt;0f&gt; 0b c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 90
[  438.976947] RSP: 0018:ffff888124a53610 EFLAGS: 00010286
[  438.977446] RAX: 0000000000000000 RBX: ffff888119d56de0 RCX: 0000000000000000
[  438.978090] RDX: ffff88852c828700 RSI: ffff88852c81b3c0 RDI: ffff88852c81b3c0
[  438.978721] RBP: ffff888120fa0e88 R08: 0000000000000000 R09: ffff888124a534b0
[  438.979353] R10: 0000000000000001 R11: 0000000000000001 R12: ffff888119d56de0
[  438.979979] R13: ffff888120fa0ec0 R14: ffff888120fa0ee8 R15: ffff888119d56de0
[  438.980607] FS:  00007fe6dcc0f800(0000) GS:ffff88852c800000(0000) knlGS:0000000000000000
[  438.983984] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  438.984544] CR2: 00000000004275e0 CR3: 0000000186982001 CR4: 0000000000372eb0
[  438.985205] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  438.985842] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  438.986507] Call Trace:
[  438.986799]  &lt;TASK&gt;
[  438.987070]  ? __warn+0x7d/0x110
[  438.987426]  ? refcount_warn_saturate+0xfb/0x110
[  438.987877]  ? report_bug+0x17d/0x190
[  438.988261]  ? prb_read_valid+0x17/0x20
[  438.988659]  ? handle_bug+0x53/0x90
[  438.989054]  ? exc_invalid_op+0x14/0x70
[  438.989458]  ? asm_exc_invalid_op+0x16/0x20
[  438.989883]  ? refcount_warn_saturate+0xfb/0x110
[  438.990348]  mlx5_del_flow_rules+0x2f7/0x340 [mlx5_core]
[  438.990932]  __mlx5_eswitch_del_rule+0x49/0x170 [mlx5_core]
[  438.991519]  ? mlx5_lag_is_sriov+0x3c/0x50 [mlx5_core]
[  438.992054]  ? xas_load+0x9/0xb0
[  438.992407]  mlx5e_tc_rule_unoffload+0x45/0xe0 [mlx5_core]
[  438.993037]  mlx5e_tc_del_fdb_flow+0x2a6/0x2e0 [mlx5_core]
[  438.993623]  mlx5e_flow_put+0x29/0x60 [mlx5_core]
[  438.994161]  mlx5e_delete_flower+0x261/0x390 [mlx5_core]
[  438.994728]  tc_setup_cb_destroy+0xb9/0x190
[  438.995150]  fl_hw_destroy_filter+0x94/0xc0 [cls_flower]
[  438.995650]  fl_change+0x11a4/0x13c0 [cls_flower]
[  438.996105]  tc_new_tfilter+0x347/0xbc0
[  438.996503]  ? __
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53121/">CVE-2024-53121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53121">CVE-2024-53121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234078">SUSE bug 1234078</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53122" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53122" ref_url="https://www.suse.com/security/cve/CVE-2024-53122" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000740.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0065" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: cope racing subflow creation in mptcp_rcv_space_adjust

Additional active subflows - i.e. created by the in kernel path
manager - are included into the subflow list before starting the
3whs.

A racing recvmsg() spooling data received on an already established
subflow would unconditionally call tcp_cleanup_rbuf() on all the
current subflows, potentially hitting a divide by zero error on
the newly created ones.

Explicitly check that the subflow is in a suitable state before
invoking tcp_cleanup_rbuf().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-10"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53122/">CVE-2024-53122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53122">CVE-2024-53122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234076">SUSE bug 1234076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959322" comment="bpftool-7.4.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959323" comment="kernel-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959324" comment="kernel-abi-stablelists-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959325" comment="kernel-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959326" comment="kernel-cross-headers-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959327" comment="kernel-debug-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959328" comment="kernel-debug-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959331" comment="kernel-debug-modules-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959332" comment="kernel-debug-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959333" comment="kernel-debug-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959334" comment="kernel-debug-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959337" comment="kernel-doc-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959338" comment="kernel-headers-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959339" comment="kernel-modules-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959340" comment="kernel-modules-core-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959341" comment="kernel-modules-extra-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959342" comment="kernel-tools-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959343" comment="kernel-tools-libs-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959345" comment="kernel-uki-virt-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959346" comment="kernel-uki-virt-addons-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959347" comment="libperf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959348" comment="perf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959349" comment="python3-perf-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959350" comment="rtla-5.14.0-503.21.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959351" comment="rv-5.14.0-503.21.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53123" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53123" ref_url="https://www.suse.com/security/cve/CVE-2024-53123" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: error out earlier on disconnect

Eric reported a division by zero splat in the MPTCP protocol:

Oops: divide error: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 1 UID: 0 PID: 6094 Comm: syz-executor317 Not tainted
6.12.0-rc5-syzkaller-00291-g05b92660cdfe #0
Hardware name: Google Google Compute Engine/Google Compute Engine,
BIOS Google 09/13/2024
RIP: 0010:__tcp_select_window+0x5b4/0x1310 net/ipv4/tcp_output.c:3163
Code: f6 44 01 e3 89 df e8 9b 75 09 f8 44 39 f3 0f 8d 11 ff ff ff e8
0d 74 09 f8 45 89 f4 e9 04 ff ff ff e8 00 74 09 f8 44 89 f0 99 &lt;f7&gt; 7c
24 14 41 29 d6 45 89 f4 e9 ec fe ff ff e8 e8 73 09 f8 48 89
RSP: 0018:ffffc900041f7930 EFLAGS: 00010293
RAX: 0000000000017e67 RBX: 0000000000017e67 RCX: ffffffff8983314b
RDX: 0000000000000000 RSI: ffffffff898331b0 RDI: 0000000000000004
RBP: 00000000005d6000 R08: 0000000000000004 R09: 0000000000017e67
R10: 0000000000003e80 R11: 0000000000000000 R12: 0000000000003e80
R13: ffff888031d9b440 R14: 0000000000017e67 R15: 00000000002eb000
FS: 00007feb5d7f16c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007feb5d8adbb8 CR3: 0000000074e4c000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
__tcp_cleanup_rbuf+0x3e7/0x4b0 net/ipv4/tcp.c:1493
mptcp_rcv_space_adjust net/mptcp/protocol.c:2085 [inline]
mptcp_recvmsg+0x2156/0x2600 net/mptcp/protocol.c:2289
inet_recvmsg+0x469/0x6a0 net/ipv4/af_inet.c:885
sock_recvmsg_nosec net/socket.c:1051 [inline]
sock_recvmsg+0x1b2/0x250 net/socket.c:1073
__sys_recvfrom+0x1a5/0x2e0 net/socket.c:2265
__do_sys_recvfrom net/socket.c:2283 [inline]
__se_sys_recvfrom net/socket.c:2279 [inline]
__x64_sys_recvfrom+0xe0/0x1c0 net/socket.c:2279
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7feb5d857559
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48
89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d
01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007feb5d7f1208 EFLAGS: 00000246 ORIG_RAX: 000000000000002d
RAX: ffffffffffffffda RBX: 00007feb5d8e1318 RCX: 00007feb5d857559
RDX: 000000800000000e RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007feb5d8e1310 R08: 0000000000000000 R09: ffffffff81000000
R10: 0000000000000100 R11: 0000000000000246 R12: 00007feb5d8e131c
R13: 00007feb5d8ae074 R14: 000000800000000e R15: 00000000fffffdef

and provided a nice reproducer.

The root cause is the current bad handling of racing disconnect.
After the blamed commit below, sk_wait_data() can return (with
error) with the underlying socket disconnected and a zero rcv_mss.

Catch the error and return without performing any additional
operations on the current socket.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53123/">CVE-2024-53123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53123">CVE-2024-53123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234070">SUSE bug 1234070</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53124" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53124" ref_url="https://www.suse.com/security/cve/CVE-2024-53124" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix data-races around sk-&gt;sk_forward_alloc

Syzkaller reported this warning:
 ------------[ cut here ]------------
 WARNING: CPU: 0 PID: 16 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x1c5/0x1e0
 Modules linked in:
 CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-rc5 #26
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
 RIP: 0010:inet_sock_destruct+0x1c5/0x1e0
 Code: 24 12 4c 89 e2 5b 48 c7 c7 98 ec bb 82 41 5c e9 d1 18 17 ff 4c 89 e6 5b 48 c7 c7 d0 ec bb 82 41 5c e9 bf 18 17 ff 0f 0b eb 83 &lt;0f&gt; 0b eb 97 0f 0b eb 87 0f 0b e9 68 ff ff ff 66 66 2e 0f 1f 84 00
 RSP: 0018:ffffc9000008bd90 EFLAGS: 00010206
 RAX: 0000000000000300 RBX: ffff88810b172a90 RCX: 0000000000000007
 RDX: 0000000000000002 RSI: 0000000000000300 RDI: ffff88810b172a00
 RBP: ffff88810b172a00 R08: ffff888104273c00 R09: 0000000000100007
 R10: 0000000000020000 R11: 0000000000000006 R12: ffff88810b172a00
 R13: 0000000000000004 R14: 0000000000000000 R15: ffff888237c31f78
 FS:  0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007ffc63fecac8 CR3: 000000000342e000 CR4: 00000000000006f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;TASK&gt;
  ? __warn+0x88/0x130
  ? inet_sock_destruct+0x1c5/0x1e0
  ? report_bug+0x18e/0x1a0
  ? handle_bug+0x53/0x90
  ? exc_invalid_op+0x18/0x70
  ? asm_exc_invalid_op+0x1a/0x20
  ? inet_sock_destruct+0x1c5/0x1e0
  __sk_destruct+0x2a/0x200
  rcu_do_batch+0x1aa/0x530
  ? rcu_do_batch+0x13b/0x530
  rcu_core+0x159/0x2f0
  handle_softirqs+0xd3/0x2b0
  ? __pfx_smpboot_thread_fn+0x10/0x10
  run_ksoftirqd+0x25/0x30
  smpboot_thread_fn+0xdd/0x1d0
  kthread+0xd3/0x100
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x34/0x50
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;
 ---[ end trace 0000000000000000 ]---

Its possible that two threads call tcp_v6_do_rcv()/sk_forward_alloc_add()
concurrently when sk-&gt;sk_state == TCP_LISTEN with sk-&gt;sk_lock unlocked,
which triggers a data-race around sk-&gt;sk_forward_alloc:
tcp_v6_rcv
    tcp_v6_do_rcv
        skb_clone_and_charge_r
            sk_rmem_schedule
                __sk_mem_schedule
                    sk_forward_alloc_add()
            skb_set_owner_r
                sk_mem_charge
                    sk_forward_alloc_add()
        __kfree_skb
            skb_release_all
                skb_release_head_state
                    sock_rfree
                        sk_mem_uncharge
                            sk_forward_alloc_add()
                            sk_mem_reclaim
                                // set local var reclaimable
                                __sk_mem_reclaim
                                    sk_forward_alloc_add()

In this syzkaller testcase, two threads call
tcp_v6_do_rcv() with skb-&gt;truesize=768, the sk_forward_alloc changes like
this:
 (cpu 1)             | (cpu 2)             | sk_forward_alloc
 ...                 | ...                 | 0
 __sk_mem_schedule() |                     | +4096 = 4096
                     | __sk_mem_schedule() | +4096 = 8192
 sk_mem_charge()     |                     | -768  = 7424
                     | sk_mem_charge()     | -768  = 6656
 ...                 |    ...              |
 sk_mem_uncharge()   |                     | +768  = 7424
 reclaimable=7424    |                     |
                     | sk_mem_uncharge()   | +768  = 8192
                     | reclaimable=8192    |
 __sk_mem_reclaim()  |                     | -4096 = 4096
                     | __sk_mem_reclaim()  | -8192 = -4096 != 0

The skb_clone_and_charge_r() should not be called in tcp_v6_do_rcv() when
sk-&gt;sk_state is TCP_LISTEN, it happens later in tcp_v6_syn_recv_sock().
Fix the same issue in dccp_v6_do_rcv().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53124/">CVE-2024-53124 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53124">CVE-2024-53124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234074">SUSE bug 1234074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53134</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53134" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53134" ref_url="https://www.suse.com/security/cve/CVE-2024-53134" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx93-blk-ctrl: correct remove path

The check condition should be 'i &lt; bc-&gt;onecell_data.num_domains', not
'bc-&gt;onecell_data.num_domains' which will make the look never finish
and cause kernel panic.

Also disable runtime to address
"imx93-blk-ctrl 4ac10000.system-controller: Unbalanced pm_runtime_enable!"
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53134/">CVE-2024-53134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53134">CVE-2024-53134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234159">SUSE bug 1234159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53135" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53135" ref_url="https://www.suse.com/security/cve/CVE-2024-53135" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN

Hide KVM's pt_mode module param behind CONFIG_BROKEN, i.e. disable support
for virtualizing Intel PT via guest/host mode unless BROKEN=y.  There are
myriad bugs in the implementation, some of which are fatal to the guest,
and others which put the stability and health of the host at risk.

For guest fatalities, the most glaring issue is that KVM fails to ensure
tracing is disabled, and *stays* disabled prior to VM-Enter, which is
necessary as hardware disallows loading (the guest's) RTIT_CTL if tracing
is enabled (enforced via a VMX consistency check).  Per the SDM:

  If the logical processor is operating with Intel PT enabled (if
  IA32_RTIT_CTL.TraceEn = 1) at the time of VM entry, the "load
  IA32_RTIT_CTL" VM-entry control must be 0.

On the host side, KVM doesn't validate the guest CPUID configuration
provided by userspace, and even worse, uses the guest configuration to
decide what MSRs to save/load at VM-Enter and VM-Exit.  E.g. configuring
guest CPUID to enumerate more address ranges than are supported in hardware
will result in KVM trying to passthrough, save, and load non-existent MSRs,
which generates a variety of WARNs, ToPA ERRORs in the host, a potential
deadlock, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53135/">CVE-2024-53135 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53135">CVE-2024-53135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234154">SUSE bug 1234154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53136</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53136" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53136" ref_url="https://www.suse.com/security/cve/CVE-2024-53136" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: revert "mm: shmem: fix data-race in shmem_getattr()"

Revert d949d1d14fa2 ("mm: shmem: fix data-race in shmem_getattr()") as
suggested by Chuck [1].  It is causing deadlocks when accessing tmpfs over
NFS.

As Hugh commented, "added just to silence a syzbot sanitizer splat: added
where there has never been any practical problem".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-53136/">CVE-2024-53136 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53136">CVE-2024-53136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234161">SUSE bug 1234161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53141" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53141" ref_url="https://www.suse.com/security/cve/CVE-2024-53141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7531" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7898" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: add missing range check in bitmap_ip_uadt

When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists,
the values of ip and ip_to are slightly swapped. Therefore, the range check
for ip should be done later, but this part is missing and it seems that the
vulnerability occurs.

So we should add missing range checks and remove unnecessary range checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53141/">CVE-2024-53141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53141">CVE-2024-53141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234381">SUSE bug 1234381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245778">SUSE bug 1245778</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53142</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53142" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53142" ref_url="https://www.suse.com/security/cve/CVE-2024-53142" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

initramfs: avoid filename buffer overrun

The initramfs filename field is defined in
Documentation/driver-api/early-userspace/buffer-format.rst as:

 37 cpio_file := ALGN(4) + cpio_header + filename + "\0" + ALGN(4) + data
...
 55 ============= ================== =========================
 56 Field name    Field size         Meaning
 57 ============= ================== =========================
...
 70 c_namesize    8 bytes            Length of filename, including final \0

When extracting an initramfs cpio archive, the kernel's do_name() path
handler assumes a zero-terminated path at @collected, passing it
directly to filp_open() / init_mkdir() / init_mknod().

If a specially crafted cpio entry carries a non-zero-terminated filename
and is followed by uninitialized memory, then a file may be created with
trailing characters that represent the uninitialized memory. The ability
to create an initramfs entry would imply already having full control of
the system, so the buffer overrun shouldn't be considered a security
vulnerability.

Append the output of the following bash script to an existing initramfs
and observe any created /initramfs_test_fname_overrunAA* path. E.g.
  ./reproducer.sh | gzip &gt;&gt; /myinitramfs

It's easiest to observe non-zero uninitialized memory when the output is
gzipped, as it'll overflow the heap allocated @out_buf in __gunzip(),
rather than the initrd_start+initrd_size block.

---- reproducer.sh ----
nilchar="A"	# change to "\0" to properly zero terminate / pad
magic="070701"
ino=1
mode=$(( 0100777 ))
uid=0
gid=0
nlink=1
mtime=1
filesize=0
devmajor=0
devminor=1
rdevmajor=0
rdevminor=0
csum=0
fname="initramfs_test_fname_overrun"
namelen=$(( ${#fname} + 1 ))	# plus one to account for terminator

printf "%s%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%08x%s" \
	$magic $ino $mode $uid $gid $nlink $mtime $filesize \
	$devmajor $devminor $rdevmajor $rdevminor $namelen $csum $fname

termpadlen=$(( 1 + ((4 - ((110 + $namelen) &amp; 3)) % 4) ))
printf "%.s${nilchar}" $(seq 1 $termpadlen)
---- reproducer.sh ----

Symlink filename fields handled in do_symlink() won't overrun past the
data segment, due to the explicit zero-termination of the symlink
target.

Fix filename buffer overrun by aborting the initramfs FSM if any cpio
entry doesn't carry a zero-terminator at the expected (name_len - 1)
offset.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-53142/">CVE-2024-53142 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53142">CVE-2024-53142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232436">SUSE bug 1232436</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53146</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53146" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53146" ref_url="https://www.suse.com/security/cve/CVE-2024-53146" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02396-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02398-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02415-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02422-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02433-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02449-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20526-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20527-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Prevent a potential integer overflow

If the tag length is &gt;= U32_MAX - 3 then the "length + 4" addition
can result in an integer overflow. Address this by splitting the
decoding into several steps so that decode_cb_compound4res() does
not have to perform arithmetic on the unsafe length value.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53146/">CVE-2024-53146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53146">CVE-2024-53146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234854">SUSE bug 1234854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53150" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53150" ref_url="https://www.suse.com/security/cve/CVE-2024-53150" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001080.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3893" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001038.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3937" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix out of bounds reads when finding clock sources

The current USB-audio driver code doesn't check bLength of each
descriptor at traversing for clock descriptors.  That is, when a
device provides a bogus descriptor with a shorter bLength, the driver
might hit out-of-bounds reads.

For addressing it, this patch adds sanity checks to the validator
functions for the clock descriptor traversal.  When the descriptor
length is shorter than expected, it's skipped in the loop.

For the clock source and clock multiplier descriptors, we can just
check bLength against the sizeof() of each descriptor type.
OTOH, the clock selector descriptor of UAC2 and UAC3 has an array
of bNrInPins elements and two more fields at its tail, hence those
have to be checked in addition to the sizeof() check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-18"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53150/">CVE-2024-53150 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53150">CVE-2024-53150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234834">SUSE bug 1234834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009975729" comment="bpftool-7.4.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975730" comment="kernel-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975731" comment="kernel-abi-stablelists-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975732" comment="kernel-core-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975733" comment="kernel-cross-headers-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975734" comment="kernel-debug-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975735" comment="kernel-debug-core-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975738" comment="kernel-debug-modules-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975739" comment="kernel-debug-modules-core-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975740" comment="kernel-debug-modules-extra-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975741" comment="kernel-debug-uki-virt-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975744" comment="kernel-doc-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975745" comment="kernel-headers-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975746" comment="kernel-modules-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975747" comment="kernel-modules-core-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975748" comment="kernel-modules-extra-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975749" comment="kernel-rt-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975750" comment="kernel-rt-core-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975751" comment="kernel-rt-debug-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975752" comment="kernel-rt-debug-core-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975754" comment="kernel-rt-debug-kvm-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975755" comment="kernel-rt-debug-modules-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975756" comment="kernel-rt-debug-modules-core-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975757" comment="kernel-rt-debug-modules-extra-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975759" comment="kernel-rt-kvm-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975760" comment="kernel-rt-modules-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975761" comment="kernel-rt-modules-core-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975762" comment="kernel-rt-modules-extra-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975763" comment="kernel-tools-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975764" comment="kernel-tools-libs-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975766" comment="kernel-uki-virt-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975767" comment="kernel-uki-virt-addons-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975768" comment="libperf-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975769" comment="perf-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975770" comment="python3-perf-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975771" comment="rtla-5.14.0-503.38.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009975772" comment="rv-5.14.0-503.38.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53152</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53152" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53152" ref_url="https://www.suse.com/security/cve/CVE-2024-53152" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: tegra194: Move controller cleanups to pex_ep_event_pex_rst_deassert()

Currently, the endpoint cleanup function dw_pcie_ep_cleanup() and EPF
deinit notify function pci_epc_deinit_notify() are called during the
execution of pex_ep_event_pex_rst_assert() i.e., when the host has asserted
PERST#. But quickly after this step, refclk will also be disabled by the
host.

All of the tegra194 endpoint SoCs supported as of now depend on the refclk
from the host for keeping the controller operational. Due to this
limitation, any access to the hardware registers in the absence of refclk
will result in a whole endpoint crash. Unfortunately, most of the
controller cleanups require accessing the hardware registers (like eDMA
cleanup performed in dw_pcie_ep_cleanup(), etc...). So these cleanup
functions can cause the crash in the endpoint SoC once host asserts PERST#.

One way to address this issue is by generating the refclk in the endpoint
itself and not depending on the host. But that is not always possible as
some of the endpoint designs do require the endpoint to consume refclk from
the host.

Thus, fix this crash by moving the controller cleanups to the start of
the pex_ep_event_pex_rst_deassert() function. This function is called
whenever the host has deasserted PERST# and it is guaranteed that the
refclk would be active at this point. So at the start of this function
(after enabling resources) the controller cleanup can be performed. Once
finished, rest of the code execution for PERST# deassert can continue as
usual.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53152/">CVE-2024-53152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53152">CVE-2024-53152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234841">SUSE bug 1234841</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53156</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53156" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53156" ref_url="https://www.suse.com/security/cve/CVE-2024-53156" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01598-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01668-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01669-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01692-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20340-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20349-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20367-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k: add range check for conn_rsp_epid in htc_connect_service()

I found the following bug in my fuzzer:

  UBSAN: array-index-out-of-bounds in drivers/net/wireless/ath/ath9k/htc_hst.c:26:51
  index 255 is out of range for type 'htc_endpoint [22]'
  CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-rc6-dirty #14
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  Workqueue: events request_firmware_work_func
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x180/0x1b0
   __ubsan_handle_out_of_bounds+0xd4/0x130
   htc_issue_send.constprop.0+0x20c/0x230
   ? _raw_spin_unlock_irqrestore+0x3c/0x70
   ath9k_wmi_cmd+0x41d/0x610
   ? mark_held_locks+0x9f/0xe0
   ...

Since this bug has been confirmed to be caused by insufficient verification
of conn_rsp_epid, I think it would be appropriate to add a range check for
conn_rsp_epid to htc_connect_service() to prevent the bug from occurring.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53156/">CVE-2024-53156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53156">CVE-2024-53156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234846">SUSE bug 1234846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234847">SUSE bug 1234847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53160" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53160" ref_url="https://www.suse.com/security/cve/CVE-2024-53160" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu/kvfree: Fix data-race in __mod_timer / kvfree_call_rcu

KCSAN reports a data race when access the krcp-&gt;monitor_work.timer.expires
variable in the schedule_delayed_monitor_work() function:

&lt;snip&gt;
BUG: KCSAN: data-race in __mod_timer / kvfree_call_rcu

read to 0xffff888237d1cce8 of 8 bytes by task 10149 on cpu 1:
 schedule_delayed_monitor_work kernel/rcu/tree.c:3520 [inline]
 kvfree_call_rcu+0x3b8/0x510 kernel/rcu/tree.c:3839
 trie_update_elem+0x47c/0x620 kernel/bpf/lpm_trie.c:441
 bpf_map_update_value+0x324/0x350 kernel/bpf/syscall.c:203
 generic_map_update_batch+0x401/0x520 kernel/bpf/syscall.c:1849
 bpf_map_do_batch+0x28c/0x3f0 kernel/bpf/syscall.c:5143
 __sys_bpf+0x2e5/0x7a0
 __do_sys_bpf kernel/bpf/syscall.c:5741 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5739 [inline]
 __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5739
 x64_sys_call+0x2625/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

write to 0xffff888237d1cce8 of 8 bytes by task 56 on cpu 0:
 __mod_timer+0x578/0x7f0 kernel/time/timer.c:1173
 add_timer_global+0x51/0x70 kernel/time/timer.c:1330
 __queue_delayed_work+0x127/0x1a0 kernel/workqueue.c:2523
 queue_delayed_work_on+0xdf/0x190 kernel/workqueue.c:2552
 queue_delayed_work include/linux/workqueue.h:677 [inline]
 schedule_delayed_monitor_work kernel/rcu/tree.c:3525 [inline]
 kfree_rcu_monitor+0x5e8/0x660 kernel/rcu/tree.c:3643
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 56 Comm: kworker/u8:4 Not tainted 6.12.0-rc2-syzkaller-00050-g5b7c893ed5ed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events_unbound kfree_rcu_monitor
&lt;snip&gt;

kfree_rcu_monitor() rearms the work if a "krcp" has to be still
offloaded and this is done without holding krcp-&gt;lock, whereas
the kvfree_call_rcu() holds it.

Fix it by acquiring the "krcp-&gt;lock" for kfree_rcu_monitor() so
both functions do not race anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53160/">CVE-2024-53160 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53160">CVE-2024-53160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234810">SUSE bug 1234810</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53161</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53161" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53161" ref_url="https://www.suse.com/security/cve/CVE-2024-53161" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/bluefield: Fix potential integer overflow

The 64-bit argument for the "get DIMM info" SMC call consists of mem_ctrl_idx
left-shifted 16 bits and OR-ed with DIMM index.  With mem_ctrl_idx defined as
32-bits wide the left-shift operation truncates the upper 16 bits of
information during the calculation of the SMC argument.

The mem_ctrl_idx stack variable must be defined as 64-bits wide to prevent any
potential integer overflow, i.e. loss of data from upper 16 bits.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53161/">CVE-2024-53161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53161">CVE-2024-53161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234856">SUSE bug 1234856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53164</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53164" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix ordering of qlen adjustment

Changes to sch-&gt;q.qlen around qdisc_tree_reduce_backlog() need to happen
_before_ a call to said function because otherwise it may fail to notify
parent qdiscs when the child is about to become empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246019">SUSE bug 1246019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53166" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53166" ref_url="https://www.suse.com/security/cve/CVE-2024-53166" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02433-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02449-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20526-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20527-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix bfqq uaf in bfq_limit_depth()

Set new allocated bfqq to bic or remove freed bfqq from bic are both
protected by bfqd-&gt;lock, however bfq_limit_depth() is deferencing bfqq
from bic without the lock, this can lead to UAF if the io_context is
shared by multiple tasks.

For example, test bfq with io_uring can trigger following UAF in v6.6:

==================================================================
BUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50

Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x47/0x80
 print_address_description.constprop.0+0x66/0x300
 print_report+0x3e/0x70
 kasan_report+0xb4/0xf0
 bfqq_group+0x15/0x50
 bfqq_request_over_limit+0x130/0x9a0
 bfq_limit_depth+0x1b5/0x480
 __blk_mq_alloc_requests+0x2b5/0xa00
 blk_mq_get_new_requests+0x11d/0x1d0
 blk_mq_submit_bio+0x286/0xb00
 submit_bio_noacct_nocheck+0x331/0x400
 __block_write_full_folio+0x3d0/0x640
 writepage_cb+0x3b/0xc0
 write_cache_pages+0x254/0x6c0
 write_cache_pages+0x254/0x6c0
 do_writepages+0x192/0x310
 filemap_fdatawrite_wbc+0x95/0xc0
 __filemap_fdatawrite_range+0x99/0xd0
 filemap_write_and_wait_range.part.0+0x4d/0xa0
 blkdev_read_iter+0xef/0x1e0
 io_read+0x1b6/0x8a0
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Allocated by task 808602:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 __kasan_slab_alloc+0x83/0x90
 kmem_cache_alloc_node+0x1b1/0x6d0
 bfq_get_queue+0x138/0xfa0
 bfq_get_bfqq_handle_split+0xe3/0x2c0
 bfq_init_rq+0x196/0xbb0
 bfq_insert_request.isra.0+0xb5/0x480
 bfq_insert_requests+0x156/0x180
 blk_mq_insert_request+0x15d/0x440
 blk_mq_submit_bio+0x8a4/0xb00
 submit_bio_noacct_nocheck+0x331/0x400
 __blkdev_direct_IO_async+0x2dd/0x330
 blkdev_write_iter+0x39a/0x450
 io_write+0x22a/0x840
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork+0x2d/0x50
 ret_from_fork_asm+0x1b/0x30

Freed by task 808589:
 kasan_save_stack+0x1e/0x40
 kasan_set_track+0x21/0x30
 kasan_save_free_info+0x27/0x40
 __kasan_slab_free+0x126/0x1b0
 kmem_cache_free+0x10c/0x750
 bfq_put_queue+0x2dd/0x770
 __bfq_insert_request.isra.0+0x155/0x7a0
 bfq_insert_request.isra.0+0x122/0x480
 bfq_insert_requests+0x156/0x180
 blk_mq_dispatch_plug_list+0x528/0x7e0
 blk_mq_flush_plug_list.part.0+0xe5/0x590
 __blk_flush_plug+0x3b/0x90
 blk_finish_plug+0x40/0x60
 do_writepages+0x19d/0x310
 filemap_fdatawrite_wbc+0x95/0xc0
 __filemap_fdatawrite_range+0x99/0xd0
 filemap_write_and_wait_range.part.0+0x4d/0xa0
 blkdev_read_iter+0xef/0x1e0
 io_read+0x1b6/0x8a0
 io_issue_sqe+0x87/0x300
 io_wq_submit_work+0xeb/0x390
 io_worker_handle_work+0x24d/0x550
 io_wq_worker+0x27f/0x6c0
 ret_from_fork+0x2d/0x50
 ret_from_fork_asm+0x1b/0x30

Fix the problem by protecting bic_to_bfqq() with bfqd-&gt;lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53166/">CVE-2024-53166 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53166">CVE-2024-53166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234884">SUSE bug 1234884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234885">SUSE bug 1234885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53170</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53170" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53170" ref_url="https://www.suse.com/security/cve/CVE-2024-53170" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix uaf for flush rq while iterating tags

blk_mq_clear_flush_rq_mapping() is not called during scsi probe, by
checking blk_queue_init_done(). However, QUEUE_FLAG_INIT_DONE is cleared
in del_gendisk by commit aec89dc5d421 ("block: keep q_usage_counter in
atomic mode after del_gendisk"), hence for disk like scsi, following
blk_mq_destroy_queue() will not clear flush rq from tags-&gt;rqs[] as well,
cause following uaf that is found by our syzkaller for v6.6:

==================================================================
BUG: KASAN: slab-use-after-free in blk_mq_find_and_get_req+0x16e/0x1a0 block/blk-mq-tag.c:261
Read of size 4 at addr ffff88811c969c20 by task kworker/1:2H/224909

CPU: 1 PID: 224909 Comm: kworker/1:2H Not tainted 6.6.0-ga836a5060850 #32
Workqueue: kblockd blk_mq_timeout_work
Call Trace:

__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106
print_address_description.constprop.0+0x66/0x300 mm/kasan/report.c:364
print_report+0x3e/0x70 mm/kasan/report.c:475
kasan_report+0xb8/0xf0 mm/kasan/report.c:588
blk_mq_find_and_get_req+0x16e/0x1a0 block/blk-mq-tag.c:261
bt_iter block/blk-mq-tag.c:288 [inline]
__sbitmap_for_each_set include/linux/sbitmap.h:295 [inline]
sbitmap_for_each_set include/linux/sbitmap.h:316 [inline]
bt_for_each+0x455/0x790 block/blk-mq-tag.c:325
blk_mq_queue_tag_busy_iter+0x320/0x740 block/blk-mq-tag.c:534
blk_mq_timeout_work+0x1a3/0x7b0 block/blk-mq.c:1673
process_one_work+0x7c4/0x1450 kernel/workqueue.c:2631
process_scheduled_works kernel/workqueue.c:2704 [inline]
worker_thread+0x804/0xe40 kernel/workqueue.c:2785
kthread+0x346/0x450 kernel/kthread.c:388
ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:293

Allocated by task 942:
kasan_save_stack+0x22/0x50 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
____kasan_kmalloc mm/kasan/common.c:374 [inline]
__kasan_kmalloc mm/kasan/common.c:383 [inline]
__kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:380
kasan_kmalloc include/linux/kasan.h:198 [inline]
__do_kmalloc_node mm/slab_common.c:1007 [inline]
__kmalloc_node+0x69/0x170 mm/slab_common.c:1014
kmalloc_node include/linux/slab.h:620 [inline]
kzalloc_node include/linux/slab.h:732 [inline]
blk_alloc_flush_queue+0x144/0x2f0 block/blk-flush.c:499
blk_mq_alloc_hctx+0x601/0x940 block/blk-mq.c:3788
blk_mq_alloc_and_init_hctx+0x27f/0x330 block/blk-mq.c:4261
blk_mq_realloc_hw_ctxs+0x488/0x5e0 block/blk-mq.c:4294
blk_mq_init_allocated_queue+0x188/0x860 block/blk-mq.c:4350
blk_mq_init_queue_data block/blk-mq.c:4166 [inline]
blk_mq_init_queue+0x8d/0x100 block/blk-mq.c:4176
scsi_alloc_sdev+0x843/0xd50 drivers/scsi/scsi_scan.c:335
scsi_probe_and_add_lun+0x77c/0xde0 drivers/scsi/scsi_scan.c:1189
__scsi_scan_target+0x1fc/0x5a0 drivers/scsi/scsi_scan.c:1727
scsi_scan_channel drivers/scsi/scsi_scan.c:1815 [inline]
scsi_scan_channel+0x14b/0x1e0 drivers/scsi/scsi_scan.c:1791
scsi_scan_host_selected+0x2fe/0x400 drivers/scsi/scsi_scan.c:1844
scsi_scan+0x3a0/0x3f0 drivers/scsi/scsi_sysfs.c:151
store_scan+0x2a/0x60 drivers/scsi/scsi_sysfs.c:191
dev_attr_store+0x5c/0x90 drivers/base/core.c:2388
sysfs_kf_write+0x11c/0x170 fs/sysfs/file.c:136
kernfs_fop_write_iter+0x3fc/0x610 fs/kernfs/file.c:338
call_write_iter include/linux/fs.h:2083 [inline]
new_sync_write+0x1b4/0x2d0 fs/read_write.c:493
vfs_write+0x76c/0xb00 fs/read_write.c:586
ksys_write+0x127/0x250 fs/read_write.c:639
do_syscall_x64 arch/x86/entry/common.c:51 [inline]
do_syscall_64+0x70/0x120 arch/x86/entry/common.c:81
entry_SYSCALL_64_after_hwframe+0x78/0xe2

Freed by task 244687:
kasan_save_stack+0x22/0x50 mm/kasan/common.c:45
kasan_set_track+0x25/0x30 mm/kasan/common.c:52
kasan_save_free_info+0x2b/0x50 mm/kasan/generic.c:522
____kasan_slab_free mm/kasan/common.c:236 [inline]
__kasan_slab_free+0x12a/0x1b0 mm/kasan/common.c:244
kasan_slab_free include/linux/kasan.h:164 [in
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53170/">CVE-2024-53170 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53170">CVE-2024-53170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234888">SUSE bug 1234888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53173</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53173" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53173" ref_url="https://www.suse.com/security/cve/CVE-2024-53173" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02396-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02398-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02415-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02422-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02433-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02449-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20526-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20527-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4.0: Fix a use-after-free problem in the asynchronous open()

Yang Erkun reports that when two threads are opening files at the same
time, and are forced to abort before a reply is seen, then the call to
nfs_release_seqid() in nfs4_opendata_free() can result in a
use-after-free of the pointer to the defunct rpc task of the other
thread.
The fix is to ensure that if the RPC call is aborted before the call to
nfs_wait_on_sequence() is complete, then we must call nfs_release_seqid()
in nfs4_open_release() before the rpc_task is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53173/">CVE-2024-53173 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53173">CVE-2024-53173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234891">SUSE bug 1234891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1234892">SUSE bug 1234892</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53174</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53174" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53174" ref_url="https://www.suse.com/security/cve/CVE-2024-53174" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: make sure cache entry active before cache_show

The function `c_show` was called with protection from RCU. This only
ensures that `cp` will not be freed. Therefore, the reference count for
`cp` can drop to zero, which will trigger a refcount use-after-free
warning when `cache_get` is called. To resolve this issue, use
`cache_get_rcu` to ensure that `cp` remains active.

------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 7 PID: 822 at lib/refcount.c:25
refcount_warn_saturate+0xb1/0x120
CPU: 7 UID: 0 PID: 822 Comm: cat Not tainted 6.12.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:refcount_warn_saturate+0xb1/0x120

Call Trace:
 &lt;TASK&gt;
 c_show+0x2fc/0x380 [sunrpc]
 seq_read_iter+0x589/0x770
 seq_read+0x1e5/0x270
 proc_reg_read+0xe1/0x140
 vfs_read+0x125/0x530
 ksys_read+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53174/">CVE-2024-53174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53174">CVE-2024-53174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234899">SUSE bug 1234899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53176" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53176" ref_url="https://www.suse.com/security/cve/CVE-2024-53176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: During unmount, ensure all cached dir instances drop their dentry

The unmount process (cifs_kill_sb() calling close_all_cached_dirs()) can
race with various cached directory operations, which ultimately results
in dentries not being dropped and these kernel BUGs:

BUG: Dentry ffff88814f37e358{i=1000000000080,n=/}  still in use (2) [unmount of cifs cifs]
VFS: Busy inodes after unmount of cifs (cifs)
------------[ cut here ]------------
kernel BUG at fs/super.c:661!

This happens when a cfid is in the process of being cleaned up when, and
has been removed from the cfids-&gt;entries list, including:

- Receiving a lease break from the server
- Server reconnection triggers invalidate_all_cached_dirs(), which
  removes all the cfids from the list
- The laundromat thread decides to expire an old cfid.

To solve these problems, dropping the dentry is done in queued work done
in a newly-added cfid_put_wq workqueue, and close_all_cached_dirs()
flushes that workqueue after it drops all the dentries of which it's
aware. This is a global workqueue (rather than scoped to a mount), but
the queued work is minimal.

The final cleanup work for cleaning up a cfid is performed via work
queued in the serverclose_wq workqueue; this is done separate from
dropping the dentries so that close_all_cached_dirs() doesn't block on
any server operations.

Both of these queued works expect to invoked with a cfid reference and
a tcon reference to avoid those objects from being freed while the work
is ongoing.

While we're here, add proper locking to close_all_cached_dirs(), and
locking around the freeing of cfid-&gt;dentry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53176/">CVE-2024-53176 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53176">CVE-2024-53176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234894">SUSE bug 1234894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53190</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53190" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53190" ref_url="https://www.suse.com/security/cve/CVE-2024-53190" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtlwifi: Drastically reduce the attempts to read efuse in case of failures

Syzkaller reported a hung task with uevent_show() on stack trace. That
specific issue was addressed by another commit [0], but even with that
fix applied (for example, running v6.12-rc5) we face another type of hung
task that comes from the same reproducer [1]. By investigating that, we
could narrow it to the following path:

(a) Syzkaller emulates a Realtek USB WiFi adapter using raw-gadget and
dummy_hcd infrastructure.

(b) During the probe of rtl8192cu, the driver ends-up performing an efuse
read procedure (which is related to EEPROM load IIUC), and here lies the
issue: the function read_efuse() calls read_efuse_byte() many times, as
loop iterations depending on the efuse size (in our example, 512 in total).

This procedure for reading efuse bytes relies in a loop that performs an
I/O read up to *10k* times in case of failures. We measured the time of
the loop inside read_efuse_byte() alone, and in this reproducer (which
involves the dummy_hcd emulation layer), it takes 15 seconds each. As a
consequence, we have the driver stuck in its probe routine for big time,
exposing a stack trace like below if we attempt to reboot the system, for
example:

task:kworker/0:3 state:D stack:0 pid:662 tgid:662 ppid:2 flags:0x00004000
Workqueue: usb_hub_wq hub_event
Call Trace:
 __schedule+0xe22/0xeb6
 schedule_timeout+0xe7/0x132
 __wait_for_common+0xb5/0x12e
 usb_start_wait_urb+0xc5/0x1ef
 ? usb_alloc_urb+0x95/0xa4
 usb_control_msg+0xff/0x184
 _usbctrl_vendorreq_sync+0xa0/0x161
 _usb_read_sync+0xb3/0xc5
 read_efuse_byte+0x13c/0x146
 read_efuse+0x351/0x5f0
 efuse_read_all_map+0x42/0x52
 rtl_efuse_shadow_map_update+0x60/0xef
 rtl_get_hwinfo+0x5d/0x1c2
 rtl92cu_read_eeprom_info+0x10a/0x8d5
 ? rtl92c_read_chip_version+0x14f/0x17e
 rtl_usb_probe+0x323/0x851
 usb_probe_interface+0x278/0x34b
 really_probe+0x202/0x4a4
 __driver_probe_device+0x166/0x1b2
 driver_probe_device+0x2f/0xd8
 [...]

We propose hereby to drastically reduce the attempts of doing the I/O
reads in case of failures, restricted to USB devices (given that
they're inherently slower than PCIe ones). By retrying up to 10 times
(instead of 10000), we got reponsiveness in the reproducer, while seems
reasonable to believe that there's no sane USB device implementation in
the field requiring this amount of retries at every I/O read in order
to properly work. Based on that assumption, it'd be good to have it
backported to stable but maybe not since driver implementation (the 10k
number comes from day 0), perhaps up to 6.x series makes sense.

[0] Commit 15fffc6a5624 ("driver core: Fix uevent_show() vs driver detach race")

[1] A note about that: this syzkaller report presents multiple reproducers
that differs by the type of emulated USB device. For this specific case,
check the entry from 2024/08/08 06:23 in the list of crashes; the C repro
is available at https://syzkaller.appspot.com/text?tag=ReproC&amp;x=1521fc83980000.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53190/">CVE-2024-53190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53190">CVE-2024-53190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234950">SUSE bug 1234950</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53194" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53194" ref_url="https://www.suse.com/security/cve/CVE-2024-53194" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix use-after-free of slot-&gt;bus on hot remove

Dennis reports a boot crash on recent Lenovo laptops with a USB4 dock.

Since commit 0fc70886569c ("thunderbolt: Reset USB4 v2 host router") and
commit 59a54c5f3dbd ("thunderbolt: Reset topology created by the boot
firmware"), USB4 v2 and v1 Host Routers are reset on probe of the
thunderbolt driver.

The reset clears the Presence Detect State and Data Link Layer Link Active
bits at the USB4 Host Router's Root Port and thus causes hot removal of the
dock.

The crash occurs when pciehp is unbound from one of the dock's Downstream
Ports:  pciehp creates a pci_slot on bind and destroys it on unbind.  The
pci_slot contains a pointer to the pci_bus below the Downstream Port, but
a reference on that pci_bus is never acquired.  The pci_bus is destroyed
before the pci_slot, so a use-after-free ensues when pci_slot_release()
accesses slot-&gt;bus.

In principle this should not happen because pci_stop_bus_device() unbinds
pciehp (and therefore destroys the pci_slot) before the pci_bus is
destroyed by pci_remove_bus_device().

However the stacktrace provided by Dennis shows that pciehp is unbound from
pci_remove_bus_device() instead of pci_stop_bus_device().  To understand
the significance of this, one needs to know that the PCI core uses a two
step process to remove a portion of the hierarchy:  It first unbinds all
drivers in the sub-hierarchy in pci_stop_bus_device() and then actually
removes the devices in pci_remove_bus_device().  There is no precaution to
prevent driver binding in-between pci_stop_bus_device() and
pci_remove_bus_device().

In Dennis' case, it seems removal of the hierarchy by pciehp races with
driver binding by pci_bus_add_devices().  pciehp is bound to the
Downstream Port after pci_stop_bus_device() has run, so it is unbound by
pci_remove_bus_device() instead of pci_stop_bus_device().  Because the
pci_bus has already been destroyed at that point, accesses to it result in
a use-after-free.

One might conclude that driver binding needs to be prevented after
pci_stop_bus_device() has run.  However it seems risky that pci_slot points
to pci_bus without holding a reference.  Solely relying on correct ordering
of driver unbind versus pci_bus destruction is certainly not defensive
programming.

If pci_slot has a need to access data in pci_bus, it ought to acquire a
reference.  Amend pci_create_slot() accordingly.  Dennis reports that the
crash is not reproducible with this change.

Abridged stacktrace:

  pcieport 0000:00:07.0: PME: Signaling with IRQ 156
  pcieport 0000:00:07.0: pciehp: Slot #12 AttnBtn- PwrCtrl- MRL- AttnInd- PwrInd- HotPlug+ Surprise+ Interlock- NoCompl+ IbPresDis- LLActRep+
  pci_bus 0000:20: dev 00, created physical slot 12
  pcieport 0000:00:07.0: pciehp: Slot(12): Card not present
  ...
  pcieport 0000:21:02.0: pciehp: pcie_disable_notification: SLOTCTRL d8 write cmd 0
  Oops: general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI
  CPU: 13 UID: 0 PID: 134 Comm: irq/156-pciehp Not tainted 6.11.0-devel+ #1
  RIP: 0010:dev_driver_string+0x12/0x40
  pci_destroy_slot
  pciehp_remove
  pcie_port_remove_service
  device_release_driver_internal
  bus_remove_device
  device_del
  device_unregister
  remove_iter
  device_for_each_child
  pcie_portdrv_remove
  pci_device_remove
  device_release_driver_internal
  bus_remove_device
  device_del
  pci_remove_bus_device (recursive invocation)
  pci_remove_bus_device
  pciehp_unconfigure_device
  pciehp_disable_slot
  pciehp_handle_presence_or_link_change
  pciehp_ist
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53194/">CVE-2024-53194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53194">CVE-2024-53194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235459">SUSE bug 1235459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53197</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53197" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53197" ref_url="https://www.suse.com/security/cve/CVE-2024-53197" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000922.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000989.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices

A bogus device can provide a bNumConfigurations value that exceeds the
initial value used in usb_get_configuration for allocating dev-&gt;config.

This can lead to out-of-bounds accesses later, e.g. in
usb_destroy_configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53197/">CVE-2024-53197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53197">CVE-2024-53197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235464">SUSE bug 1235464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968351" comment="bpftool-7.4.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968352" comment="kernel-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968353" comment="kernel-abi-stablelists-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968354" comment="kernel-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968355" comment="kernel-cross-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968356" comment="kernel-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968357" comment="kernel-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968360" comment="kernel-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968361" comment="kernel-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968362" comment="kernel-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968363" comment="kernel-debug-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968366" comment="kernel-doc-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968367" comment="kernel-headers-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968368" comment="kernel-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968369" comment="kernel-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968370" comment="kernel-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968371" comment="kernel-rt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968372" comment="kernel-rt-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968373" comment="kernel-rt-debug-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968374" comment="kernel-rt-debug-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968376" comment="kernel-rt-debug-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968377" comment="kernel-rt-debug-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968378" comment="kernel-rt-debug-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968379" comment="kernel-rt-debug-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968381" comment="kernel-rt-kvm-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968382" comment="kernel-rt-modules-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968383" comment="kernel-rt-modules-core-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968384" comment="kernel-rt-modules-extra-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968385" comment="kernel-tools-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968386" comment="kernel-tools-libs-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968388" comment="kernel-uki-virt-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968389" comment="kernel-uki-virt-addons-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968390" comment="libperf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968391" comment="perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968392" comment="python3-perf-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968393" comment="rtla-5.14.0-503.31.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968394" comment="rv-5.14.0-503.31.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53203</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53203" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53203" ref_url="https://www.suse.com/security/cve/CVE-2024-53203" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: fix potential array underflow in ucsi_ccg_sync_control()

The "command" variable can be controlled by the user via debugfs.  The
worry is that if con_index is zero then "&amp;uc-&gt;ucsi-&gt;connector[con_index
- 1]" would be an array underflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53203/">CVE-2024-53203 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53203">CVE-2024-53203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235001">SUSE bug 1235001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53208" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53208" ref_url="https://www.suse.com/security/cve/CVE-2024-53208" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02069-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync

This fixes the following crash:

==================================================================
BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353
Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54

CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:93 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
q kasan_report+0x143/0x180 mm/kasan/report.c:601
 set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353
 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328
 process_one_work kernel/workqueue.c:3231 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
 worker_thread+0x86d/0xd10 kernel/workqueue.c:3389
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;

Allocated by task 5247:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
 __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
 kasan_kmalloc include/linux/kasan.h:211 [inline]
 __kmalloc_cache_noprof+0x19c/0x2c0 mm/slub.c:4193
 kmalloc_noprof include/linux/slab.h:681 [inline]
 kzalloc_noprof include/linux/slab.h:807 [inline]
 mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269
 mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296
 set_powered+0x3cd/0x5e0 net/bluetooth/mgmt.c:1394
 hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712
 hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x221/0x270 net/socket.c:745
 sock_write_iter+0x2dd/0x400 net/socket.c:1160
 new_sync_write fs/read_write.c:497 [inline]
 vfs_write+0xa72/0xc90 fs/read_write.c:590
 ksys_write+0x1a0/0x2c0 fs/read_write.c:643
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 5246:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579
 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240
 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256
 kasan_slab_free include/linux/kasan.h:184 [inline]
 slab_free_hook mm/slub.c:2256 [inline]
 slab_free mm/slub.c:4477 [inline]
 kfree+0x149/0x360 mm/slub.c:4598
 settings_rsp+0x2bc/0x390 net/bluetooth/mgmt.c:1443
 mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259
 __mgmt_power_off+0x112/0x420 net/bluetooth/mgmt.c:9455
 hci_dev_close_sync+0x665/0x11a0 net/bluetooth/hci_sync.c:5191
 hci_dev_do_close net/bluetooth/hci_core.c:483 [inline]
 hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508
 sock_do_ioctl+0x158/0x460 net/socket.c:1222
 sock_ioctl+0x629/0x8e0 net/socket.c:1341
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83gv
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53208/">CVE-2024-53208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53208">CVE-2024-53208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234909">SUSE bug 1234909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236244">SUSE bug 1236244</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53213</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53213" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53213" ref_url="https://www.suse.com/security/cve/CVE-2024-53213" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: lan78xx: Fix double free issue with interrupt buffer allocation

In lan78xx_probe(), the buffer `buf` was being freed twice: once
implicitly through `usb_free_urb(dev-&gt;urb_intr)` with the
`URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused
a double free issue.

To resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to
simplify the initialization sequence and removed the redundant
`kfree(buf)`.  Now, `buf` is allocated after `usb_alloc_urb()`, ensuring
it is correctly managed by  `usb_fill_int_urb()` and freed by
`usb_free_urb()` as intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53213/">CVE-2024-53213 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53213">CVE-2024-53213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234973">SUSE bug 1234973</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53216" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53216" ref_url="https://www.suse.com/security/cve/CVE-2024-53216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: release svc_expkey/svc_export with rcu_work

The last reference for `cache_head` can be reduced to zero in `c_show`
and `e_show`(using `rcu_read_lock` and `rcu_read_unlock`). Consequently,
`svc_export_put` and `expkey_put` will be invoked, leading to two
issues:

1. The `svc_export_put` will directly free ex_uuid. However,
   `e_show`/`c_show` will access `ex_uuid` after `cache_put`, which can
   trigger a use-after-free issue, shown below.

   ==================================================================
   BUG: KASAN: slab-use-after-free in svc_export_show+0x362/0x430 [nfsd]
   Read of size 1 at addr ff11000010fdc120 by task cat/870

   CPU: 1 UID: 0 PID: 870 Comm: cat Not tainted 6.12.0-rc3+ #1
   Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
   1.16.1-2.fc37 04/01/2014
   Call Trace:
    &lt;TASK&gt;
    dump_stack_lvl+0x53/0x70
    print_address_description.constprop.0+0x2c/0x3a0
    print_report+0xb9/0x280
    kasan_report+0xae/0xe0
    svc_export_show+0x362/0x430 [nfsd]
    c_show+0x161/0x390 [sunrpc]
    seq_read_iter+0x589/0x770
    seq_read+0x1e5/0x270
    proc_reg_read+0xe1/0x140
    vfs_read+0x125/0x530
    ksys_read+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

   Allocated by task 830:
    kasan_save_stack+0x20/0x40
    kasan_save_track+0x14/0x30
    __kasan_kmalloc+0x8f/0xa0
    __kmalloc_node_track_caller_noprof+0x1bc/0x400
    kmemdup_noprof+0x22/0x50
    svc_export_parse+0x8a9/0xb80 [nfsd]
    cache_do_downcall+0x71/0xa0 [sunrpc]
    cache_write_procfs+0x8e/0xd0 [sunrpc]
    proc_reg_write+0xe1/0x140
    vfs_write+0x1a5/0x6d0
    ksys_write+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

   Freed by task 868:
    kasan_save_stack+0x20/0x40
    kasan_save_track+0x14/0x30
    kasan_save_free_info+0x3b/0x60
    __kasan_slab_free+0x37/0x50
    kfree+0xf3/0x3e0
    svc_export_put+0x87/0xb0 [nfsd]
    cache_purge+0x17f/0x1f0 [sunrpc]
    nfsd_destroy_serv+0x226/0x2d0 [nfsd]
    nfsd_svc+0x125/0x1e0 [nfsd]
    write_threads+0x16a/0x2a0 [nfsd]
    nfsctl_transaction_write+0x74/0xa0 [nfsd]
    vfs_write+0x1a5/0x6d0
    ksys_write+0xc1/0x160
    do_syscall_64+0x5f/0x170
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

2. We cannot sleep while using `rcu_read_lock`/`rcu_read_unlock`.
   However, `svc_export_put`/`expkey_put` will call path_put, which
   subsequently triggers a sleeping operation due to the following
   `dput`.

   =============================
   WARNING: suspicious RCU usage
   5.10.0-dirty #141 Not tainted
   -----------------------------
   ...
   Call Trace:
   dump_stack+0x9a/0xd0
   ___might_sleep+0x231/0x240
   dput+0x39/0x600
   path_put+0x1b/0x30
   svc_export_put+0x17/0x80
   e_show+0x1c9/0x200
   seq_read_iter+0x63f/0x7c0
   seq_read+0x226/0x2d0
   vfs_read+0x113/0x2c0
   ksys_read+0xc9/0x170
   do_syscall_64+0x33/0x40
   entry_SYSCALL_64_after_hwframe+0x67/0xd1

Fix these issues by using `rcu_work` to help release
`svc_expkey`/`svc_export`. This approach allows for an asynchronous
context to invoke `path_put` and also facilitates the freeing of
`uuid/exp/key` after an RCU grace period.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53216/">CVE-2024-53216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53216">CVE-2024-53216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235003">SUSE bug 1235003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53222</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53222" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53222" ref_url="https://www.suse.com/security/cve/CVE-2024-53222" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

zram: fix NULL pointer in comp_algorithm_show()

LTP reported a NULL pointer dereference as followed:

 CPU: 7 UID: 0 PID: 5995 Comm: cat Kdump: loaded Not tainted 6.12.0-rc6+ #3
 Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __pi_strcmp+0x24/0x140
 lr : zcomp_available_show+0x60/0x100 [zram]
 sp : ffff800088b93b90
 x29: ffff800088b93b90 x28: 0000000000000001 x27: 0000000000400cc0
 x26: 0000000000000ffe x25: ffff80007b3e2388 x24: 0000000000000000
 x23: ffff80007b3e2390 x22: ffff0004041a9000 x21: ffff80007b3e2900
 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000000
 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
 x11: 0000000000000000 x10: ffff80007b3e2900 x9 : ffff80007b3cb280
 x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000
 x5 : 0000000000000040 x4 : 0000000000000000 x3 : 00656c722d6f7a6c
 x2 : 0000000000000000 x1 : ffff80007b3e2900 x0 : 0000000000000000
 Call trace:
  __pi_strcmp+0x24/0x140
  comp_algorithm_show+0x40/0x70 [zram]
  dev_attr_show+0x28/0x80
  sysfs_kf_seq_show+0x90/0x140
  kernfs_seq_show+0x34/0x48
  seq_read_iter+0x1d4/0x4e8
  kernfs_fop_read_iter+0x40/0x58
  new_sync_read+0x9c/0x168
  vfs_read+0x1a8/0x1f8
  ksys_read+0x74/0x108
  __arm64_sys_read+0x24/0x38
  invoke_syscall+0x50/0x120
  el0_svc_common.constprop.0+0xc8/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x38/0x138
  el0t_64_sync_handler+0xc0/0xc8
  el0t_64_sync+0x188/0x190

The zram-&gt;comp_algs[ZRAM_PRIMARY_COMP] can be NULL in zram_add() if
comp_algorithm_set() has not been called.  User can access the zram device
by sysfs after device_add_disk(), so there is a time window to trigger the
NULL pointer dereference.  Move it ahead device_add_disk() to make sure
when user can access the zram device, it is ready.  comp_algorithm_set()
is protected by zram-&gt;init_lock in other places and no such problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53222/">CVE-2024-53222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53222">CVE-2024-53222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234974">SUSE bug 1234974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53224</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53224" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53224" ref_url="https://www.suse.com/security/cve/CVE-2024-53224" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Move events notifier registration to be after device registration

Move pkey change work initialization and cleanup from device resources
stage to notifier stage, since this is the stage which handles this work
events.

Fix a race between the device deregistration and pkey change work by moving
MLX5_IB_STAGE_DEVICE_NOTIFIER to be after MLX5_IB_STAGE_IB_REG in order to
ensure that the notifier is deregistered before the device during cleanup.
Which ensures there are no works that are being executed after the
device has already unregistered which can cause the panic below.

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 630071 Comm: kworker/1:2 Kdump: loaded Tainted: G W OE --------- --- 5.14.0-162.6.1.el9_1.x86_64 #1
Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090008 02/27/2023
Workqueue: events pkey_change_handler [mlx5_ib]
RIP: 0010:setup_qp+0x38/0x1f0 [mlx5_ib]
Code: ee 41 54 45 31 e4 55 89 f5 53 48 89 fb 48 83 ec 20 8b 77 08 65 48 8b 04 25 28 00 00 00 48 89 44 24 18 48 8b 07 48 8d 4c 24 16 &lt;4c&gt; 8b 38 49 8b 87 80 0b 00 00 4c 89 ff 48 8b 80 08 05 00 00 8b 40
RSP: 0018:ffffbcc54068be20 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff954054494128 RCX: ffffbcc54068be36
RDX: ffff954004934000 RSI: 0000000000000001 RDI: ffff954054494128
RBP: 0000000000000023 R08: ffff954001be2c20 R09: 0000000000000001
R10: ffff954001be2c20 R11: ffff9540260133c0 R12: 0000000000000000
R13: 0000000000000023 R14: 0000000000000000 R15: ffff9540ffcb0905
FS: 0000000000000000(0000) GS:ffff9540ffc80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000010625c001 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
mlx5_ib_gsi_pkey_change+0x20/0x40 [mlx5_ib]
process_one_work+0x1e8/0x3c0
worker_thread+0x50/0x3b0
? rescuer_thread+0x380/0x380
kthread+0x149/0x170
? set_kthread_struct+0x50/0x50
ret_from_fork+0x22/0x30
Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) mlx5_fwctl(OE) fwctl(OE) ib_uverbs(OE) mlx5_core(OE) mlxdevm(OE) ib_core(OE) mlx_compat(OE) psample mlxfw(OE) tls knem(OE) netconsole nfsv3 nfs_acl nfs lockd grace fscache netfs qrtr rfkill sunrpc intel_rapl_msr intel_rapl_common rapl hv_balloon hv_utils i2c_piix4 pcspkr joydev fuse ext4 mbcache jbd2 sr_mod sd_mod cdrom t10_pi sg ata_generic pci_hyperv pci_hyperv_intf hyperv_drm drm_shmem_helper drm_kms_helper hv_storvsc syscopyarea hv_netvsc sysfillrect sysimgblt hid_hyperv fb_sys_fops scsi_transport_fc hyperv_keyboard drm ata_piix crct10dif_pclmul crc32_pclmul crc32c_intel libata ghash_clmulni_intel hv_vmbus serio_raw [last unloaded: ib_core]
CR2: 0000000000000000
---[ end trace f6f8be4eae12f7bc ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53224/">CVE-2024-53224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53224">CVE-2024-53224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235009">SUSE bug 1235009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53229" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53229" ref_url="https://www.suse.com/security/cve/CVE-2024-53229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the qp flush warnings in req

When the qp is in error state, the status of WQEs in the queue should be
set to error. Or else the following will appear.

[  920.617269] WARNING: CPU: 1 PID: 21 at drivers/infiniband/sw/rxe/rxe_comp.c:756 rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.617744] Modules linked in: rnbd_client(O) rtrs_client(O) rtrs_core(O) rdma_ucm rdma_cm iw_cm ib_cm crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel ib_uverbs ib_core loop brd null_blk ipv6
[  920.618516] CPU: 1 PID: 21 Comm: ksoftirqd/1 Tainted: G           O       6.1.113-storage+ #65
[  920.618986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
[  920.619396] RIP: 0010:rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.619658] Code: 0f b6 84 24 3a 02 00 00 41 89 84 24 44 04 00 00 e9 2a f7 ff ff 39 ca bb 03 00 00 00 b8 0e 00 00 00 48 0f 45 d8 e9 15 f7 ff ff &lt;0f&gt; 0b e9 cb f8 ff ff 41 bf f5 ff ff ff e9 08 f8 ff ff 49 8d bc 24
[  920.620482] RSP: 0018:ffff97b7c00bbc38 EFLAGS: 00010246
[  920.620817] RAX: 0000000000000000 RBX: 000000000000000c RCX: 0000000000000008
[  920.621183] RDX: ffff960dc396ebc0 RSI: 0000000000005400 RDI: ffff960dc4e2fbac
[  920.621548] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffffffac406450
[  920.621884] R10: ffffffffac4060c0 R11: 0000000000000001 R12: ffff960dc4e2f800
[  920.622254] R13: ffff960dc4e2f928 R14: ffff97b7c029c580 R15: 0000000000000000
[  920.622609] FS:  0000000000000000(0000) GS:ffff960ef7d00000(0000) knlGS:0000000000000000
[  920.622979] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  920.623245] CR2: 00007fa056965e90 CR3: 00000001107f1000 CR4: 00000000000006e0
[  920.623680] Call Trace:
[  920.623815]  &lt;TASK&gt;
[  920.623933]  ? __warn+0x79/0xc0
[  920.624116]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.624356]  ? report_bug+0xfb/0x150
[  920.624594]  ? handle_bug+0x3c/0x60
[  920.624796]  ? exc_invalid_op+0x14/0x70
[  920.624976]  ? asm_exc_invalid_op+0x16/0x20
[  920.625203]  ? rxe_completer+0x989/0xcc0 [rdma_rxe]
[  920.625474]  ? rxe_completer+0x329/0xcc0 [rdma_rxe]
[  920.625749]  rxe_do_task+0x80/0x110 [rdma_rxe]
[  920.626037]  rxe_requester+0x625/0xde0 [rdma_rxe]
[  920.626310]  ? rxe_cq_post+0xe2/0x180 [rdma_rxe]
[  920.626583]  ? do_complete+0x18d/0x220 [rdma_rxe]
[  920.626812]  ? rxe_completer+0x1a3/0xcc0 [rdma_rxe]
[  920.627050]  rxe_do_task+0x80/0x110 [rdma_rxe]
[  920.627285]  tasklet_action_common.constprop.0+0xa4/0x120
[  920.627522]  handle_softirqs+0xc2/0x250
[  920.627728]  ? sort_range+0x20/0x20
[  920.627942]  run_ksoftirqd+0x1f/0x30
[  920.628158]  smpboot_thread_fn+0xc7/0x1b0
[  920.628334]  kthread+0xd6/0x100
[  920.628504]  ? kthread_complete_and_exit+0x20/0x20
[  920.628709]  ret_from_fork+0x1f/0x30
[  920.628892]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53229/">CVE-2024-53229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53229">CVE-2024-53229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234905">SUSE bug 1234905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53232</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53232" ref_url="https://www.suse.com/security/cve/CVE-2024-53232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/s390: Implement blocking domain

This fixes a crash when surprise hot-unplugging a PCI device. This crash
happens because during hot-unplug __iommu_group_set_domain_nofail()
attaching the default domain fails when the platform no longer
recognizes the device as it has already been removed and we end up with
a NULL domain pointer and UAF. This is exactly the case referred to in
the second comment in __iommu_device_set_domain() and just as stated
there if we can instead attach the blocking domain the UAF is prevented
as this can handle the already removed device. Implement the blocking
domain to use this handling.  With this change, the crash is fixed but
we still hit a warning attempting to change DMA ownership on a blocked
device.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53232/">CVE-2024-53232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53232">CVE-2024-53232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235050">SUSE bug 1235050</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53237" ref_url="https://www.suse.com/security/cve/CVE-2024-53237" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1385-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: fix use-after-free in device_for_each_child()

Syzbot has reported the following KASAN splat:

BUG: KASAN: slab-use-after-free in device_for_each_child+0x18f/0x1a0
Read of size 8 at addr ffff88801f605308 by task kbnepd bnep0/4980

CPU: 0 UID: 0 PID: 4980 Comm: kbnepd bnep0 Not tainted 6.12.0-rc4-00161-gae90f6a6170d #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x100/0x190
 ? device_for_each_child+0x18f/0x1a0
 print_report+0x13a/0x4cb
 ? __virt_addr_valid+0x5e/0x590
 ? __phys_addr+0xc6/0x150
 ? device_for_each_child+0x18f/0x1a0
 kasan_report+0xda/0x110
 ? device_for_each_child+0x18f/0x1a0
 ? __pfx_dev_memalloc_noio+0x10/0x10
 device_for_each_child+0x18f/0x1a0
 ? __pfx_device_for_each_child+0x10/0x10
 pm_runtime_set_memalloc_noio+0xf2/0x180
 netdev_unregister_kobject+0x1ed/0x270
 unregister_netdevice_many_notify+0x123c/0x1d80
 ? __mutex_trylock_common+0xde/0x250
 ? __pfx_unregister_netdevice_many_notify+0x10/0x10
 ? trace_contention_end+0xe6/0x140
 ? __mutex_lock+0x4e7/0x8f0
 ? __pfx_lock_acquire.part.0+0x10/0x10
 ? rcu_is_watching+0x12/0xc0
 ? unregister_netdev+0x12/0x30
 unregister_netdevice_queue+0x30d/0x3f0
 ? __pfx_unregister_netdevice_queue+0x10/0x10
 ? __pfx_down_write+0x10/0x10
 unregister_netdev+0x1c/0x30
 bnep_session+0x1fb3/0x2ab0
 ? __pfx_bnep_session+0x10/0x10
 ? __pfx_lock_release+0x10/0x10
 ? __pfx_woken_wake_function+0x10/0x10
 ? __kthread_parkme+0x132/0x200
 ? __pfx_bnep_session+0x10/0x10
 ? kthread+0x13a/0x370
 ? __pfx_bnep_session+0x10/0x10
 kthread+0x2b7/0x370
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x48/0x80
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 4974:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0xaa/0xb0
 __kmalloc_noprof+0x1d1/0x440
 hci_alloc_dev_priv+0x1d/0x2820
 __vhci_create_device+0xef/0x7d0
 vhci_write+0x2c7/0x480
 vfs_write+0x6a0/0xfc0
 ksys_write+0x12f/0x260
 do_syscall_64+0xc7/0x250
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 4979:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x4f/0x70
 kfree+0x141/0x490
 hci_release_dev+0x4d9/0x600
 bt_host_release+0x6a/0xb0
 device_release+0xa4/0x240
 kobject_put+0x1ec/0x5a0
 put_device+0x1f/0x30
 vhci_release+0x81/0xf0
 __fput+0x3f6/0xb30
 task_work_run+0x151/0x250
 do_exit+0xa79/0x2c30
 do_group_exit+0xd5/0x2a0
 get_signal+0x1fcd/0x2210
 arch_do_signal_or_restart+0x93/0x780
 syscall_exit_to_user_mode+0x140/0x290
 do_syscall_64+0xd4/0x250
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

In 'hci_conn_del_sysfs()', 'device_unregister()' may be called when
an underlying (kobject) reference counter is greater than 1. This
means that reparenting (happened when the device is actually freed)
is delayed and, during that delay, parent controller device (hciX)
may be deleted. Since the latter may create a dangling pointer to
freed parent, avoid that scenario by reparenting to NULL explicitly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53237/">CVE-2024-53237 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53237">CVE-2024-53237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235007">SUSE bug 1235007</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235008">SUSE bug 1235008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53241" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53241" ref_url="https://www.suse.com/security/cve/CVE-2024-53241" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3893" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02326-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/xen: don't do PV iret hypercall through hypercall page

Instead of jumping to the Xen hypercall page for doing the iret
hypercall, directly code the required sequence in xen-asm.S.

This is done in preparation of no longer using hypercall page at all,
as it has shown to cause problems with speculation mitigations.

This is part of XSA-466 / CVE-2024-53241.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53241/">CVE-2024-53241 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53241">CVE-2024-53241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234282">SUSE bug 1234282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53263" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53263" ref_url="https://www.suse.com/security/cve/CVE-2024-53263" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000780.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0845" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020248.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUJEMV422T3LAPI4DRX6RNNLCCUYCIHN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14649-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U4RACGLXZEZGUX7BZLFN4GQOHFBHL6FO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14653-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ISCFQBRATG2LAA3K5XNETXSCP77AAKA/" source="SUSE-SU"/>
    <description>
    Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-53263/">CVE-2024-53263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53263">CVE-2024-53263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235876">SUSE bug 1235876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961482" comment="git-lfs-3.4.1-4.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53580" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53580" ref_url="https://www.suse.com/security/cve/CVE-2024-53580" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000744.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000746.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0402" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000790.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024291.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14700-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AUDDPLGQCTFI55SRG3SYJVCTOHHNA37T/" source="SUSE-SU"/>
    <description>
    iperf v3.17.1 was discovered to contain a segmentation violation via the iperf_exchange_parameters() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-11"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53580/">CVE-2024-53580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53580">CVE-2024-53580 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234705">SUSE bug 1234705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959724" comment="iperf3-3.9-13.el9_5.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53680</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53680" ref_url="https://www.suse.com/security/cve/CVE-2024-53680" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()

Under certain kernel configurations when building with Clang/LLVM, the
compiler does not generate a return or jump as the terminator
instruction for ip_vs_protocol_init(), triggering the following objtool
warning during build time:

  vmlinux.o: warning: objtool: ip_vs_protocol_init() falls through to next function __initstub__kmod_ip_vs_rr__935_123_ip_vs_rr_init6()

At runtime, this either causes an oops when trying to load the ipvs
module or a boot-time panic if ipvs is built-in. This same issue has
been reported by the Intel kernel test robot previously.

Digging deeper into both LLVM and the kernel code reveals this to be a
undefined behavior problem. ip_vs_protocol_init() uses a on-stack buffer
of 64 chars to store the registered protocol names and leaves it
uninitialized after definition. The function calls strnlen() when
concatenating protocol names into the buffer. With CONFIG_FORTIFY_SOURCE
strnlen() performs an extra step to check whether the last byte of the
input char buffer is a null character (commit 3009f891bb9f ("fortify:
Allow strlen() and strnlen() to pass compile-time known lengths")).
This, together with possibly other configurations, cause the following
IR to be generated:

  define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #5 section ".init.text" align 16 !kcfi_type !29 {
    %1 = alloca [64 x i8], align 16
    ...

  14:                                               ; preds = %11
    %15 = getelementptr inbounds i8, ptr %1, i64 63
    %16 = load i8, ptr %15, align 1
    %17 = tail call i1 @llvm.is.constant.i8(i8 %16)
    %18 = icmp eq i8 %16, 0
    %19 = select i1 %17, i1 %18, i1 false
    br i1 %19, label %20, label %23

  20:                                               ; preds = %14
    %21 = call i64 @strlen(ptr noundef nonnull dereferenceable(1) %1) #23
    ...

  23:                                               ; preds = %14, %11, %20
    %24 = call i64 @strnlen(ptr noundef nonnull dereferenceable(1) %1, i64 noundef 64) #24
    ...
  }

The above code calculates the address of the last char in the buffer
(value %15) and then loads from it (value %16). Because the buffer is
never initialized, the LLVM GVN pass marks value %16 as undefined:

  %13 = getelementptr inbounds i8, ptr %1, i64 63
  br i1 undef, label %14, label %17

This gives later passes (SCCP, in particular) more DCE opportunities by
propagating the undef value further, and eventually removes everything
after the load on the uninitialized stack location:

  define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #0 section ".init.text" align 16 !kcfi_type !11 {
    %1 = alloca [64 x i8], align 16
    ...

  12:                                               ; preds = %11
    %13 = getelementptr inbounds i8, ptr %1, i64 63
    unreachable
  }

In this way, the generated native code will just fall through to the
next function, as LLVM does not generate any code for the unreachable IR
instruction and leaves the function without a terminator.

Zero the on-stack buffer to avoid this possible UB.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53680/">CVE-2024-53680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53680">CVE-2024-53680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235715">SUSE bug 1235715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53681</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53681" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53681" ref_url="https://www.suse.com/security/cve/CVE-2024-53681" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: Don't overflow subsysnqn

nvmet_root_discovery_nqn_store treats the subsysnqn string like a fixed
size buffer, even though it is dynamically allocated to the size of the
string.

Create a new string with kstrndup instead of using the old buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53681/">CVE-2024-53681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53681">CVE-2024-53681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235904">SUSE bug 1235904</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53920" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53920" ref_url="https://www.suse.com/security/cve/CVE-2024-53920" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11030" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001792.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4787" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9448" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020488.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14591-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P4KYDPPUCZHJVNAEXLQAF43YKVZPVWFH/" source="SUSE-SU"/>
    <description>
    In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-15"/>
	<updated date="2025-07-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53920/">CVE-2024-53920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-53920">CVE-2024-53920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233894">SUSE bug 1233894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996937" comment="emacs-27.2-14.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996938" comment="emacs-common-27.2-14.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996939" comment="emacs-filesystem-27.2-14.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996940" comment="emacs-lucid-27.2-14.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996941" comment="emacs-nox-27.2-14.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54456</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54456" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54456" ref_url="https://www.suse.com/security/cve/CVE-2024-54456" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()

name is char[64] where the size of clnt-&gt;cl_program-&gt;name remains
unknown. Invoking strcat() directly will also lead to potential buffer
overflow. Change them to strscpy() and strncat() to fix potential
issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54456/">CVE-2024-54456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54456">CVE-2024-54456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239113">SUSE bug 1239113</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54460</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54460" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54460" ref_url="https://www.suse.com/security/cve/CVE-2024-54460" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: iso: Fix circular lock in iso_listen_bis

This fixes the circular locking dependency warning below, by
releasing the socket lock before enterning iso_listen_bis, to
avoid any potential deadlock with hdev lock.

[   75.307983] ======================================================
[   75.307984] WARNING: possible circular locking dependency detected
[   75.307985] 6.12.0-rc6+ #22 Not tainted
[   75.307987] ------------------------------------------------------
[   75.307987] kworker/u81:2/2623 is trying to acquire lock:
[   75.307988] ffff8fde1769da58 (sk_lock-AF_BLUETOOTH-BTPROTO_ISO)
               at: iso_connect_cfm+0x253/0x840 [bluetooth]
[   75.308021]
               but task is already holding lock:
[   75.308022] ffff8fdd61a10078 (&amp;hdev-&gt;lock)
               at: hci_le_per_adv_report_evt+0x47/0x2f0 [bluetooth]
[   75.308053]
               which lock already depends on the new lock.

[   75.308054]
               the existing dependency chain (in reverse order) is:
[   75.308055]
               -&gt; #1 (&amp;hdev-&gt;lock){+.+.}-{3:3}:
[   75.308057]        __mutex_lock+0xad/0xc50
[   75.308061]        mutex_lock_nested+0x1b/0x30
[   75.308063]        iso_sock_listen+0x143/0x5c0 [bluetooth]
[   75.308085]        __sys_listen_socket+0x49/0x60
[   75.308088]        __x64_sys_listen+0x4c/0x90
[   75.308090]        x64_sys_call+0x2517/0x25f0
[   75.308092]        do_syscall_64+0x87/0x150
[   75.308095]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   75.308098]
               -&gt; #0 (sk_lock-AF_BLUETOOTH-BTPROTO_ISO){+.+.}-{0:0}:
[   75.308100]        __lock_acquire+0x155e/0x25f0
[   75.308103]        lock_acquire+0xc9/0x300
[   75.308105]        lock_sock_nested+0x32/0x90
[   75.308107]        iso_connect_cfm+0x253/0x840 [bluetooth]
[   75.308128]        hci_connect_cfm+0x6c/0x190 [bluetooth]
[   75.308155]        hci_le_per_adv_report_evt+0x27b/0x2f0 [bluetooth]
[   75.308180]        hci_le_meta_evt+0xe7/0x200 [bluetooth]
[   75.308206]        hci_event_packet+0x21f/0x5c0 [bluetooth]
[   75.308230]        hci_rx_work+0x3ae/0xb10 [bluetooth]
[   75.308254]        process_one_work+0x212/0x740
[   75.308256]        worker_thread+0x1bd/0x3a0
[   75.308258]        kthread+0xe4/0x120
[   75.308259]        ret_from_fork+0x44/0x70
[   75.308261]        ret_from_fork_asm+0x1a/0x30
[   75.308263]
               other info that might help us debug this:

[   75.308264]  Possible unsafe locking scenario:

[   75.308264]        CPU0                CPU1
[   75.308265]        ----                ----
[   75.308265]   lock(&amp;hdev-&gt;lock);
[   75.308267]                            lock(sk_lock-
                                                AF_BLUETOOTH-BTPROTO_ISO);
[   75.308268]                            lock(&amp;hdev-&gt;lock);
[   75.308269]   lock(sk_lock-AF_BLUETOOTH-BTPROTO_ISO);
[   75.308270]
                *** DEADLOCK ***

[   75.308271] 4 locks held by kworker/u81:2/2623:
[   75.308272]  #0: ffff8fdd66e52148 ((wq_completion)hci0#2){+.+.}-{0:0},
                at: process_one_work+0x443/0x740
[   75.308276]  #1: ffffafb488b7fe48 ((work_completion)(&amp;hdev-&gt;rx_work)),
                at: process_one_work+0x1ce/0x740
[   75.308280]  #2: ffff8fdd61a10078 (&amp;hdev-&gt;lock){+.+.}-{3:3}
                at: hci_le_per_adv_report_evt+0x47/0x2f0 [bluetooth]
[   75.308304]  #3: ffffffffb6ba4900 (rcu_read_lock){....}-{1:2},
                at: hci_connect_cfm+0x29/0x190 [bluetooth]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54460/">CVE-2024-54460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54460">CVE-2024-54460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235722">SUSE bug 1235722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54467" ref_url="https://www.suse.com/security/cve/CVE-2024-54467" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7387" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1033-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJC3GUPN6T3FGCOPMOLUI52AMJZNNKNX/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1149-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039031.html" source="SUSE-SU"/>
    <description>
    A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18, iOS 18 and iPadOS 18, macOS Sequoia 15, tvOS 18, visionOS 2, watchOS 11. A malicious website may exfiltrate data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54467/">CVE-2024-54467 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54467">CVE-2024-54467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239864">SUSE bug 1239864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983920" comment="webkit2gtk3-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983921" comment="webkit2gtk3-devel-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983922" comment="webkit2gtk3-jsc-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983923" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54479</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54479" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54479" ref_url="https://www.suse.com/security/cve/CVE-2024-54479" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0145" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000749.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0146" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-11"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54479/">CVE-2024-54479 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54479">CVE-2024-54479 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234851">SUSE bug 1234851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959720" comment="webkit2gtk3-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959721" comment="webkit2gtk3-devel-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959722" comment="webkit2gtk3-jsc-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959723" comment="webkit2gtk3-jsc-devel-2.46.5-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54502" ref_url="https://www.suse.com/security/cve/CVE-2024-54502" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0145" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000749.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0146" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.6, macOS Sequoia 15.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-11"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54502/">CVE-2024-54502 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54502">CVE-2024-54502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234851">SUSE bug 1234851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959720" comment="webkit2gtk3-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959721" comment="webkit2gtk3-devel-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959722" comment="webkit2gtk3-jsc-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959723" comment="webkit2gtk3-jsc-devel-2.46.5-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54505" ref_url="https://www.suse.com/security/cve/CVE-2024-54505" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0145" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000749.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0146" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.3, macOS Sequoia 15.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-11"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54505/">CVE-2024-54505 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54505">CVE-2024-54505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234851">SUSE bug 1234851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959720" comment="webkit2gtk3-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959721" comment="webkit2gtk3-devel-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959722" comment="webkit2gtk3-jsc-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959723" comment="webkit2gtk3-jsc-devel-2.46.5-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54508</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54508" ref_url="https://www.suse.com/security/cve/CVE-2024-54508" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0145" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000749.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0146" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.6, macOS Sequoia 15.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-11"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54508/">CVE-2024-54508 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54508">CVE-2024-54508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234851">SUSE bug 1234851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009959720" comment="webkit2gtk3-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959721" comment="webkit2gtk3-devel-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959722" comment="webkit2gtk3-jsc-2.46.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009959723" comment="webkit2gtk3-jsc-devel-2.46.5-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54534" ref_url="https://www.suse.com/security/cve/CVE-2024-54534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.6, macOS Sequoia 15.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54534/">CVE-2024-54534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54534">CVE-2024-54534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234851">SUSE bug 1234851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953935" comment="webkit2gtk3-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953936" comment="webkit2gtk3-devel-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953937" comment="webkit2gtk3-jsc-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953938" comment="webkit2gtk3-jsc-devel-2.46.3-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54543" ref_url="https://www.suse.com/security/cve/CVE-2024-54543" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000917.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2035" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.2, iOS 18.2 and iPadOS 18.2, iPadOS 17.7.6, macOS Sequoia 15.2, tvOS 18.2, visionOS 2.2, watchOS 11.2. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54543/">CVE-2024-54543 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54543">CVE-2024-54543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236946">SUSE bug 1236946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967159" comment="webkit2gtk3-2.46.6-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967160" comment="webkit2gtk3-devel-2.46.6-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967161" comment="webkit2gtk3-jsc-2.46.6-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967162" comment="webkit2gtk3-jsc-devel-2.46.6-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54551" ref_url="https://www.suse.com/security/cve/CVE-2024-54551" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7387" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039058.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 17.6, iOS 17.6 and iPadOS 17.6, macOS Sonoma 14.6, tvOS 17.6, visionOS 1.3, watchOS 10.6. Processing web content may lead to a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54551/">CVE-2024-54551 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54551">CVE-2024-54551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240962">SUSE bug 1240962</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983920" comment="webkit2gtk3-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983921" comment="webkit2gtk3-devel-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983922" comment="webkit2gtk3-jsc-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983923" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5458" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5458" ref_url="https://www.suse.com/security/cve/CVE-2024-5458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000656.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2027-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2038-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035600.html" source="SUSE-SU"/>
    <description>
    In PHP versions  8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs  (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-5458/">CVE-2024-5458 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5458">CVE-2024-5458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226072">SUSE bug 1226072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226073">SUSE bug 1226073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226074">SUSE bug 1226074</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957468" comment="php-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957469" comment="php-bcmath-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957470" comment="php-cli-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957471" comment="php-common-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957472" comment="php-dba-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957473" comment="php-dbg-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957474" comment="php-devel-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957475" comment="php-embedded-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957476" comment="php-enchant-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957477" comment="php-ffi-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957478" comment="php-fpm-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957479" comment="php-gd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957480" comment="php-gmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957481" comment="php-intl-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957482" comment="php-ldap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957483" comment="php-mbstring-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957484" comment="php-mysqlnd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957485" comment="php-odbc-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957486" comment="php-opcache-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957487" comment="php-pdo-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957493" comment="php-pgsql-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957494" comment="php-process-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957495" comment="php-snmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957496" comment="php-soap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957497" comment="php-xml-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54658</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54658" ref_url="https://www.suse.com/security/cve/CVE-2024-54658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 17.4, iOS 17.4 and iPadOS 17.4, macOS Sonoma 14.4, tvOS 17.4, visionOS 1.1, watchOS 10.4. Processing web content may lead to a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54658/">CVE-2024-54658 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54658">CVE-2024-54658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236946">SUSE bug 1236946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54661</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54661" ref_url="https://www.suse.com/security/cve/CVE-2024-54661" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10353" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001763.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11042" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/020015.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14582-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XWXJAVQD3HTBZI5EGK6RRHQ3EC55XXFL/" source="SUSE-SU"/>
    <description>
    readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-07-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-54661/">CVE-2024-54661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-54661">CVE-2024-54661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225462">SUSE bug 1225462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999182" comment="socat-1.7.4.1-6.el9_6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54680</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54680" ref_url="https://www.suse.com/security/cve/CVE-2024-54680" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54680/">CVE-2024-54680 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54680">CVE-2024-54680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235723">SUSE bug 1235723</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5535" ref_url="https://www.suse.com/security/cve/CVE-2024-5535" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000610.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3119-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an
empty supported client protocols buffer may cause a crash or memory contents to
be sent to the peer.

Impact summary: A buffer overread can have a range of potential consequences
such as unexpected application beahviour or a crash. In particular this issue
could result in up to 255 bytes of arbitrary private data from memory being sent
to the peer leading to a loss of confidentiality. However, only applications
that directly call the SSL_select_next_proto function with a 0 length list of
supported client protocols are affected by this issue. This would normally never
be a valid scenario and is typically not under attacker control but may occur by
accident in the case of a configuration or programming error in the calling
application.

The OpenSSL API function SSL_select_next_proto is typically used by TLS
applications that support ALPN (Application Layer Protocol Negotiation) or NPN
(Next Protocol Negotiation). NPN is older, was never standardised and
is deprecated in favour of ALPN. We believe that ALPN is significantly more
widely deployed than NPN. The SSL_select_next_proto function accepts a list of
protocols from the server and a list of protocols from the client and returns
the first protocol that appears in the server list that also appears in the
client list. In the case of no overlap between the two lists it returns the
first item in the client list. In either case it will signal whether an overlap
between the two lists was found. In the case where SSL_select_next_proto is
called with a zero length client list it fails to notice this condition and
returns the memory immediately following the client list pointer (and reports
that there was no overlap in the lists).

This function is typically called from a server side application callback for
ALPN or a client side application callback for NPN. In the case of ALPN the list
of protocols supplied by the client is guaranteed by libssl to never be zero in
length. The list of server protocols comes from the application and should never
normally be expected to be of zero length. In this case if the
SSL_select_next_proto function has been called as expected (with the list
supplied by the client passed in the client/client_len parameters), then the
application will not be vulnerable to this issue. If the application has
accidentally been configured with a zero length server list, and has
accidentally passed that zero length server list in the client/client_len
parameters, and has additionally failed to correctly handle a "no overlap"
response (which would normally result in a handshake failure in ALPN) then it
will be vulnerable to this problem.

In the case of NPN, the protocol permits the client to opportunistically select
a protocol when there is no overlap. OpenSSL returns the first client protocol
in the no overlap case in support of this. The list of client protocols comes
from the application and should never normally be expected to be of zero length.
However if the SSL_select_next_proto function is accidentally called with a
client_len of 0 then an invalid memory pointer will be returned instead. If the
application uses this output as the opportunistic protocol then the loss of
confidentiality will occur.

This issue has been assessed as Low severity because applications are most
likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not
widely used. It also requires an application configuration or programming error.
Finally, this issue would not typically be under attacker control making active
exploitation unlikely.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.

Due to the low severity of this issue we are not issuing new releases of
OpenSSL at this time. The fix will be included in the next releases when they
become available.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5535/">CVE-2024-5535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5535">CVE-2024-5535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227138">SUSE bug 1227138</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227147">SUSE bug 1227147</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1227233">SUSE bug 1227233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953743" comment="openssl-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953744" comment="openssl-devel-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953745" comment="openssl-fips-provider-3.0.7-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953746" comment="openssl-fips-provider-so-3.0.7-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953747" comment="openssl-libs-3.2.2-6.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953748" comment="openssl-perl-3.2.2-6.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202455549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-55549</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-55549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55549" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-55549" ref_url="https://www.suse.com/security/cve/CVE-2024-55549" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3612" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3615" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001021.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4025" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001046.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKCQGOW24ZBKSYCIKDUG4KKITEGCJKY2/" source="SUSE-SU"/>
    <description>
    xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-22"/>
	<updated date="2025-10-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-55549/">CVE-2024-55549 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-55549">CVE-2024-55549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239637">SUSE bug 1239637</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983959" comment="libxslt-1.1.34-13.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983960" comment="libxslt-devel-1.1.34-13.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5564</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5564" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5564" ref_url="https://www.suse.com/security/cve/CVE-2024-5564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021228.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libndp. This flaw allows a local malicious user to cause a buffer overflow in NetworkManager, triggered by sending a malformed IPv6 router advertisement packet. This issue occurred as libndp was not correctly validating the route length information.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-22"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5564/">CVE-2024-5564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5564">CVE-2024-5564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1225771">SUSE bug 1225771</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874750" comment="libndp-1.8-6.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56171" ref_url="https://www.suse.com/security/cve/CVE-2024-56171" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000996.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2679" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000965.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2686" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021047.html" source="SUSE-SU"/>
    <description>
    libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-10-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56171/">CVE-2024-56171 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56171">CVE-2024-56171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237363">SUSE bug 1237363</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968422" comment="libxml2-2.9.13-6.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968423" comment="libxml2-devel-2.9.13-6.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968424" comment="python3-libxml2-2.9.13-6.el9_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56201" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56201" ref_url="https://www.suse.com/security/cve/CVE-2024-56201" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0006-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPNJF5YIZCFWIYFLQBGRUQ2IHXCRQPMO/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJHTSZ2BBTEOR5VWX6IPMTWJ5V4265YW/" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. In versions on the 3.x branch prior to 3.1.5, a bug in the Jinja compiler allows an attacker that controls both the content and filename of a template to execute arbitrary Python code, regardless of if Jinja's sandbox is used. To exploit the vulnerability, an attacker needs to control both the filename and the contents of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates where the template author can also choose the template filename. This vulnerability is fixed in 3.1.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-09-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56201/">CVE-2024-56201 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56201">CVE-2024-56201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234808">SUSE bug 1234808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960124" comment="fence-agents-aliyun-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960125" comment="fence-agents-all-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960126" comment="fence-agents-amt-ws-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960127" comment="fence-agents-apc-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960128" comment="fence-agents-apc-snmp-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960129" comment="fence-agents-aws-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960130" comment="fence-agents-azure-arm-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960131" comment="fence-agents-bladecenter-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960132" comment="fence-agents-brocade-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960133" comment="fence-agents-cisco-mds-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960134" comment="fence-agents-cisco-ucs-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960135" comment="fence-agents-common-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960136" comment="fence-agents-compute-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960137" comment="fence-agents-drac5-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960138" comment="fence-agents-eaton-snmp-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960139" comment="fence-agents-emerson-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960140" comment="fence-agents-eps-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960141" comment="fence-agents-gce-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960142" comment="fence-agents-heuristics-ping-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960143" comment="fence-agents-hpblade-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960144" comment="fence-agents-ibm-powervs-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960145" comment="fence-agents-ibm-vpc-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960146" comment="fence-agents-ibmblade-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960147" comment="fence-agents-ifmib-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960148" comment="fence-agents-ilo-moonshot-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960149" comment="fence-agents-ilo-mp-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960150" comment="fence-agents-ilo-ssh-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960151" comment="fence-agents-ilo2-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960152" comment="fence-agents-intelmodular-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960153" comment="fence-agents-ipdu-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960154" comment="fence-agents-ipmilan-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960155" comment="fence-agents-kdump-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960156" comment="fence-agents-kubevirt-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960157" comment="fence-agents-mpath-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960158" comment="fence-agents-openstack-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960159" comment="fence-agents-redfish-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960160" comment="fence-agents-rhevm-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960161" comment="fence-agents-rsa-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960162" comment="fence-agents-rsb-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960163" comment="fence-agents-sbd-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960164" comment="fence-agents-scsi-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960165" comment="fence-agents-virsh-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960166" comment="fence-agents-vmware-rest-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960167" comment="fence-agents-vmware-soap-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960168" comment="fence-agents-wti-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960169" comment="fence-virt-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960170" comment="fence-virtd-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960171" comment="fence-virtd-cpg-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960172" comment="fence-virtd-libvirt-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960173" comment="fence-virtd-multicast-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960174" comment="fence-virtd-serial-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960175" comment="fence-virtd-tcp-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960176" comment="ha-cloud-support-4.10.0-76.el9_5.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56326</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56326" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56326" ref_url="https://www.suse.com/security/cve/CVE-2024-56326" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000759.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000774.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0711" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000805.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1250" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0006-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HPNJF5YIZCFWIYFLQBGRUQ2IHXCRQPMO/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021063.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14997-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RJHTSZ2BBTEOR5VWX6IPMTWJ5V4265YW/" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. Prior to 3.1.5, An oversight in how the Jinja sandboxed environment detects calls to str.format allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to store a reference to a malicious string's format method, then pass that to a filter that calls it. No such filters are built-in to Jinja, but could be present through custom filters in an application. After the fix, such indirect calls are also handled by the sandbox. This vulnerability is fixed in 3.1.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-15"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56326/">CVE-2024-56326 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56326">CVE-2024-56326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234809">SUSE bug 1234809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960124" comment="fence-agents-aliyun-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960125" comment="fence-agents-all-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960126" comment="fence-agents-amt-ws-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960127" comment="fence-agents-apc-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960128" comment="fence-agents-apc-snmp-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960129" comment="fence-agents-aws-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960130" comment="fence-agents-azure-arm-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960131" comment="fence-agents-bladecenter-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960132" comment="fence-agents-brocade-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960133" comment="fence-agents-cisco-mds-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960134" comment="fence-agents-cisco-ucs-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960135" comment="fence-agents-common-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960136" comment="fence-agents-compute-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960137" comment="fence-agents-drac5-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960138" comment="fence-agents-eaton-snmp-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960139" comment="fence-agents-emerson-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960140" comment="fence-agents-eps-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960141" comment="fence-agents-gce-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960142" comment="fence-agents-heuristics-ping-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960143" comment="fence-agents-hpblade-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960144" comment="fence-agents-ibm-powervs-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960145" comment="fence-agents-ibm-vpc-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960146" comment="fence-agents-ibmblade-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960147" comment="fence-agents-ifmib-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960148" comment="fence-agents-ilo-moonshot-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960149" comment="fence-agents-ilo-mp-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960150" comment="fence-agents-ilo-ssh-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960151" comment="fence-agents-ilo2-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960152" comment="fence-agents-intelmodular-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960153" comment="fence-agents-ipdu-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960154" comment="fence-agents-ipmilan-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960155" comment="fence-agents-kdump-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960156" comment="fence-agents-kubevirt-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960157" comment="fence-agents-mpath-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960158" comment="fence-agents-openstack-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960159" comment="fence-agents-redfish-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960160" comment="fence-agents-rhevm-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960161" comment="fence-agents-rsa-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960162" comment="fence-agents-rsb-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960163" comment="fence-agents-sbd-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960164" comment="fence-agents-scsi-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960165" comment="fence-agents-virsh-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960166" comment="fence-agents-vmware-rest-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960167" comment="fence-agents-vmware-soap-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960168" comment="fence-agents-wti-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960169" comment="fence-virt-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960170" comment="fence-virtd-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960171" comment="fence-virtd-cpg-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960172" comment="fence-virtd-libvirt-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960173" comment="fence-virtd-multicast-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960174" comment="fence-virtd-serial-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960175" comment="fence-virtd-tcp-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960176" comment="ha-cloud-support-4.10.0-76.el9_5.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961481" comment="python3-jinja2-2.11.3-7.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56337</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56337" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56337" ref_url="https://www.suse.com/security/cve/CVE-2024-56337" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001810.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11335" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038899.html" source="SUSE-SU"/>
		<reference ref_id="TID000021699" ref_url="https://www.suse.com/support/kb/doc/?id=000021699" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14897-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/" source="SUSE-SU"/>
    <description>
    Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions 
may also be affected.


The mitigation for CVE-2024-50379 was incomplete.

Users running Tomcat on a case insensitive file system with the default servlet write enabled (readonly initialisation 
parameter set to the non-default value of false) may need additional configuration to fully mitigate CVE-2024-50379 depending on which version of Java they are using with Tomcat:
- running on Java 8 or Java 11: the system property  sun.io.useCanonCaches must be explicitly set to false (it defaults to true)
- running on Java 17: the  system property sun.io.useCanonCaches, if set, must be set to false  (it defaults to false)
- running on Java 21 onwards: no further configuration is required  (the system property and the problematic cache have been removed)

Tomcat 11.0.3, 10.1.35 and 9.0.99 onwards will include checks that  sun.io.useCanonCaches is set appropriately before allowing the default servlet to be write enabled on a case insensitive file system. Tomcat will also set  sun.io.useCanonCaches to false by default where it can.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-56337/">CVE-2024-56337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56337">CVE-2024-56337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234663">SUSE bug 1234663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236809">SUSE bug 1236809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010008048" comment="tomcat-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008049" comment="tomcat-admin-webapps-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008050" comment="tomcat-docs-webapp-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008051" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008052" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008053" comment="tomcat-lib-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008054" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008055" comment="tomcat-webapps-9.0.87-3.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5642" ref_url="https://www.suse.com/security/cve/CVE-2024-5642" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
    <description>
    CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-5642/">CVE-2024-5642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5642">CVE-2024-5642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227233">SUSE bug 1227233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054505" comment="python-unversioned-command-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054506" comment="python3-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054507" comment="python3-debug-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054508" comment="python3-devel-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054509" comment="python3-idle-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054510" comment="python3-libs-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054511" comment="python3-test-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054512" comment="python3-tkinter-3.9.25-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56433" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56433" ref_url="https://www.suse.com/security/cve/CVE-2024-56433" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20559" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003080.html" source="SUSE-SU"/>
    <description>
    shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-56433/">CVE-2024-56433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56433">CVE-2024-56433 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054048" comment="shadow-utils-4.9-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054049" comment="shadow-utils-subid-4.9-15.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054050" comment="shadow-utils-subid-devel-4.9-15.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56535" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56535" ref_url="https://www.suse.com/security/cve/CVE-2024-56535" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: coex: check NULL return of kmalloc in btc_fw_set_monreg()

kmalloc may fail, return value might be NULL and will cause
NULL pointer dereference. Add check NULL return of kmalloc in
btc_fw_set_monreg().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56535/">CVE-2024-56535 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56535">CVE-2024-56535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235044">SUSE bug 1235044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56544</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56544" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56544" ref_url="https://www.suse.com/security/cve/CVE-2024-56544" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udmabuf: change folios array from kmalloc to kvmalloc

When PAGE_SIZE 4096, MAX_PAGE_ORDER 10, 64bit machine,
page_alloc only support 4MB.
If above this, trigger this warn and return NULL.

udmabuf can change size limit, if change it to 3072(3GB), and then alloc
3GB udmabuf, will fail create.

[ 4080.876581] ------------[ cut here ]------------
[ 4080.876843] WARNING: CPU: 3 PID: 2015 at mm/page_alloc.c:4556 __alloc_pages+0x2c8/0x350
[ 4080.878839] RIP: 0010:__alloc_pages+0x2c8/0x350
[ 4080.879470] Call Trace:
[ 4080.879473]  &lt;TASK&gt;
[ 4080.879473]  ? __alloc_pages+0x2c8/0x350
[ 4080.879475]  ? __warn.cold+0x8e/0xe8
[ 4080.880647]  ? __alloc_pages+0x2c8/0x350
[ 4080.880909]  ? report_bug+0xff/0x140
[ 4080.881175]  ? handle_bug+0x3c/0x80
[ 4080.881556]  ? exc_invalid_op+0x17/0x70
[ 4080.881559]  ? asm_exc_invalid_op+0x1a/0x20
[ 4080.882077]  ? udmabuf_create+0x131/0x400

Because MAX_PAGE_ORDER, kmalloc can max alloc 4096 * (1 &lt;&lt; 10), 4MB
memory, each array entry is pointer(8byte), so can save 524288 pages(2GB).

Further more, costly order(order 3) may not be guaranteed that it can be
applied for, due to fragmentation.

This patch change udmabuf array use kvmalloc_array, this can fallback
alloc into vmalloc, which can guarantee allocation for any size and does
not affect the performance of kmalloc allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56544/">CVE-2024-56544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56544">CVE-2024-56544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235067">SUSE bug 1235067</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56551</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56551" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56551" ref_url="https://www.suse.com/security/cve/CVE-2024-56551" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix usage slab after free

[  +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147

[  +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1
[  +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[  +0.000016] Call Trace:
[  +0.000008]  &lt;TASK&gt;
[  +0.000009]  dump_stack_lvl+0x76/0xa0
[  +0.000017]  print_report+0xce/0x5f0
[  +0.000017]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000019]  ? srso_return_thunk+0x5/0x5f
[  +0.000015]  ? kasan_complete_mode_report_info+0x72/0x200
[  +0.000016]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000019]  kasan_report+0xbe/0x110
[  +0.000015]  ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000023]  __asan_report_load8_noabort+0x14/0x30
[  +0.000014]  drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_write+0x14/0x30
[  +0.000016]  ? __pfx_drm_sched_entity_flush+0x10/0x10 [gpu_sched]
[  +0.000020]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? __kasan_check_write+0x14/0x30
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? enable_work+0x124/0x220
[  +0.000015]  ? __pfx_enable_work+0x10/0x10
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? free_large_kmalloc+0x85/0xf0
[  +0.000016]  drm_sched_entity_destroy+0x18/0x30 [gpu_sched]
[  +0.000020]  amdgpu_vce_sw_fini+0x55/0x170 [amdgpu]
[  +0.000735]  ? __kasan_check_read+0x11/0x20
[  +0.000016]  vce_v4_0_sw_fini+0x80/0x110 [amdgpu]
[  +0.000726]  amdgpu_device_fini_sw+0x331/0xfc0 [amdgpu]
[  +0.000679]  ? mutex_unlock+0x80/0xe0
[  +0.000017]  ? __pfx_amdgpu_device_fini_sw+0x10/0x10 [amdgpu]
[  +0.000662]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? __kasan_check_write+0x14/0x30
[  +0.000013]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? mutex_unlock+0x80/0xe0
[  +0.000016]  amdgpu_driver_release_kms+0x16/0x80 [amdgpu]
[  +0.000663]  drm_minor_release+0xc9/0x140 [drm]
[  +0.000081]  drm_release+0x1fd/0x390 [drm]
[  +0.000082]  __fput+0x36c/0xad0
[  +0.000018]  __fput_sync+0x3c/0x50
[  +0.000014]  __x64_sys_close+0x7d/0xe0
[  +0.000014]  x64_sys_call+0x1bc6/0x2680
[  +0.000014]  do_syscall_64+0x70/0x130
[  +0.000014]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? irqentry_exit_to_user_mode+0x60/0x190
[  +0.000015]  ? srso_return_thunk+0x5/0x5f
[  +0.000014]  ? irqentry_exit+0x43/0x50
[  +0.000012]  ? srso_return_thunk+0x5/0x5f
[  +0.000013]  ? exc_page_fault+0x7c/0x110
[  +0.000015]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  +0.000014] RIP: 0033:0x7ffff7b14f67
[  +0.000013] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff
[  +0.000026] RSP: 002b:00007fffffffe378 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  +0.000019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffff7b14f67
[  +0.000014] RDX: 0000000000000000 RSI: 00007ffff7f6f47a RDI: 0000000000000003
[  +0.000014] RBP: 00007fffffffe3a0 R08: 0000555555569890 R09: 0000000000000000
[  +0.000014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffffffe5c8
[  +0.000013] R13: 00005555555552a9 R14: 0000555555557d48 R15: 00007ffff7ffd040
[  +0.000020]  &lt;/TASK&gt;

[  +0.000016] Allocated by task 383 on cpu 7 at 26.880319s:
[  +0.000014]  kasan_save_stack+0x28/0x60
[  +0.000008]  kasan_save_track+0x18/0x70
[  +0.000007]  kasan_save_alloc_info+0x38/0x60
[  +0.000007]  __kasan_kmalloc+0xc1/0xd0
[  +0.000007]  kmalloc_trace_noprof+0x180/0x380
[  +0.000007]  drm_sched_init+0x411/0xec0 [gpu_sched]
[  +0.000012]  amdgpu_device_init+0x695f/0xa610 [amdgpu]
[  +0.000658]  amdgpu_driver_load_kms+0x1a/0x120 [amdgpu]
[  +0.000662]  amdgpu_pci_p
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56551/">CVE-2024-56551 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56551">CVE-2024-56551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235075">SUSE bug 1235075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235102">SUSE bug 1235102</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56558" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56558" ref_url="https://www.suse.com/security/cve/CVE-2024-56558" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02388-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02390-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02398-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02401-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02428-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02433-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02449-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20517-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20526-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20527-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20544-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: make sure exp active before svc_export_show

The function `e_show` was called with protection from RCU. This only
ensures that `exp` will not be freed. Therefore, the reference count for
`exp` can drop to zero, which will trigger a refcount use-after-free
warning when `exp_get` is called. To resolve this issue, use
`cache_get_rcu` to ensure that `exp` remains active.

------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 3 PID: 819 at lib/refcount.c:25
refcount_warn_saturate+0xb1/0x120
CPU: 3 UID: 0 PID: 819 Comm: cat Not tainted 6.12.0-rc3+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:refcount_warn_saturate+0xb1/0x120
...
Call Trace:
 &lt;TASK&gt;
 e_show+0x20b/0x230 [nfsd]
 seq_read_iter+0x589/0x770
 seq_read+0x1e5/0x270
 vfs_read+0x125/0x530
 ksys_read+0xc1/0x160
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56558/">CVE-2024-56558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56558">CVE-2024-56558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235100">SUSE bug 1235100</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243648">SUSE bug 1243648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56562</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56562" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56562" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56562" ref_url="https://www.suse.com/security/cve/CVE-2024-56562" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs()

if (dev-&gt;boardinfo &amp;&amp; dev-&gt;boardinfo-&gt;init_dyn_addr)
                                      ^^^ here check "init_dyn_addr"
	i3c_bus_set_addr_slot_status(&amp;master-&gt;bus, dev-&gt;info.dyn_addr, ...)
						             ^^^^
							free "dyn_addr"
Fix copy/paste error "dyn_addr" by replacing it with "init_dyn_addr".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56562/">CVE-2024-56562 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56562">CVE-2024-56562 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234930">SUSE bug 1234930</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56566" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56566" ref_url="https://www.suse.com/security/cve/CVE-2024-56566" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: Avoid list corruption when removing a slab from the full list

Boot with slub_debug=UFPZ.

If allocated object failed in alloc_consistency_checks, all objects of
the slab will be marked as used, and then the slab will be removed from
the partial list.

When an object belonging to the slab got freed later, the remove_full()
function is called. Because the slab is neither on the partial list nor
on the full list, it eventually lead to a list corruption (actually a
list poison being detected).

So we need to mark and isolate the slab page with metadata corruption,
do not put it back in circulation.

Because the debug caches avoid all the fastpaths, reusing the frozen bit
to mark slab page with metadata corruption seems to be fine.

[ 4277.385669] list_del corruption, ffffea00044b3e50-&gt;next is LIST_POISON1 (dead000000000100)
[ 4277.387023] ------------[ cut here ]------------
[ 4277.387880] kernel BUG at lib/list_debug.c:56!
[ 4277.388680] invalid opcode: 0000 [#1] PREEMPT SMP PTI
[ 4277.389562] CPU: 5 PID: 90 Comm: kworker/5:1 Kdump: loaded Tainted: G           OE      6.6.1-1 #1
[ 4277.392113] Workqueue: xfs-inodegc/vda1 xfs_inodegc_worker [xfs]
[ 4277.393551] RIP: 0010:__list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.394518] Code: 48 91 82 e8 37 f9 9a ff 0f 0b 48 89 fe 48 c7 c7 28 49 91 82 e8 26 f9 9a ff 0f 0b 48 89 fe 48 c7 c7 58 49 91
[ 4277.397292] RSP: 0018:ffffc90000333b38 EFLAGS: 00010082
[ 4277.398202] RAX: 000000000000004e RBX: ffffea00044b3e50 RCX: 0000000000000000
[ 4277.399340] RDX: 0000000000000002 RSI: ffffffff828f8715 RDI: 00000000ffffffff
[ 4277.400545] RBP: ffffea00044b3e40 R08: 0000000000000000 R09: ffffc900003339f0
[ 4277.401710] R10: 0000000000000003 R11: ffffffff82d44088 R12: ffff888112cf9910
[ 4277.402887] R13: 0000000000000001 R14: 0000000000000001 R15: ffff8881000424c0
[ 4277.404049] FS:  0000000000000000(0000) GS:ffff88842fd40000(0000) knlGS:0000000000000000
[ 4277.405357] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 4277.406389] CR2: 00007f2ad0b24000 CR3: 0000000102a3a006 CR4: 00000000007706e0
[ 4277.407589] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 4277.408780] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 4277.410000] PKRU: 55555554
[ 4277.410645] Call Trace:
[ 4277.411234]  &lt;TASK&gt;
[ 4277.411777]  ? die+0x32/0x80
[ 4277.412439]  ? do_trap+0xd6/0x100
[ 4277.413150]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.414158]  ? do_error_trap+0x6a/0x90
[ 4277.414948]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.415915]  ? exc_invalid_op+0x4c/0x60
[ 4277.416710]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.417675]  ? asm_exc_invalid_op+0x16/0x20
[ 4277.418482]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.419466]  ? __list_del_entry_valid_or_report+0x7b/0xc0
[ 4277.420410]  free_to_partial_list+0x515/0x5e0
[ 4277.421242]  ? xfs_iext_remove+0x41a/0xa10 [xfs]
[ 4277.422298]  xfs_iext_remove+0x41a/0xa10 [xfs]
[ 4277.423316]  ? xfs_inodegc_worker+0xb4/0x1a0 [xfs]
[ 4277.424383]  xfs_bmap_del_extent_delay+0x4fe/0x7d0 [xfs]
[ 4277.425490]  __xfs_bunmapi+0x50d/0x840 [xfs]
[ 4277.426445]  xfs_itruncate_extents_flags+0x13a/0x490 [xfs]
[ 4277.427553]  xfs_inactive_truncate+0xa3/0x120 [xfs]
[ 4277.428567]  xfs_inactive+0x22d/0x290 [xfs]
[ 4277.429500]  xfs_inodegc_worker+0xb4/0x1a0 [xfs]
[ 4277.430479]  process_one_work+0x171/0x340
[ 4277.431227]  worker_thread+0x277/0x390
[ 4277.431962]  ? __pfx_worker_thread+0x10/0x10
[ 4277.432752]  kthread+0xf0/0x120
[ 4277.433382]  ? __pfx_kthread+0x10/0x10
[ 4277.434134]  ret_from_fork+0x2d/0x50
[ 4277.434837]  ? __pfx_kthread+0x10/0x10
[ 4277.435566]  ret_from_fork_asm+0x1b/0x30
[ 4277.436280]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56566/">CVE-2024-56566 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56566">CVE-2024-56566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235033">SUSE bug 1235033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235034">SUSE bug 1235034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56570</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56570" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56570" ref_url="https://www.suse.com/security/cve/CVE-2024-56570" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: Filter invalid inodes with missing lookup function

Add a check to the ovl_dentry_weird() function to prevent the
processing of directory inodes that lack the lookup function.
This is important because such inodes can cause errors in overlayfs
when passed to the lowerstack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56570/">CVE-2024-56570 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56570">CVE-2024-56570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235035">SUSE bug 1235035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56590</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56590" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56590" ref_url="https://www.suse.com/security/cve/CVE-2024-56590" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet

This fixes not checking if skb really contains an ACL header otherwise
the code may attempt to access some uninitilized/invalid memory past the
valid skb-&gt;data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56590/">CVE-2024-56590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56590">CVE-2024-56590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235038">SUSE bug 1235038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56591</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56591" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56591" ref_url="https://www.suse.com/security/cve/CVE-2024-56591" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_conn: Use disable_delayed_work_sync

This makes use of disable_delayed_work_sync instead
cancel_delayed_work_sync as it not only cancel the ongoing work but also
disables new submit which is disarable since the object holding the work
is about to be freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56591/">CVE-2024-56591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56591">CVE-2024-56591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235052">SUSE bug 1235052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56600" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56600" ref_url="https://www.suse.com/security/cve/CVE-2024-56600" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1214-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1238-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: inet6: do not leave a dangling sk pointer in inet6_create()

sock_init_data() attaches the allocated sk pointer to the provided sock
object. If inet6_create() fails later, the sk object is released, but the
sock object retains the dangling sk pointer, which may cause use-after-free
later.

Clear the sock sk pointer on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56600/">CVE-2024-56600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56600">CVE-2024-56600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235217">SUSE bug 1235217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235218">SUSE bug 1235218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56601" ref_url="https://www.suse.com/security/cve/CVE-2024-56601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02069-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02110-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02134-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02138-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02155-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20449-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: inet: do not leave a dangling sk pointer in inet_create()

sock_init_data() attaches the allocated sk object to the provided sock
object. If inet_create() fails later, the sk object is freed, but the
sock object retains the dangling pointer, which may create use-after-free
later.

Clear the sk pointer in the sock object on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56601/">CVE-2024-56601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56601">CVE-2024-56601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235230">SUSE bug 1235230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235231">SUSE bug 1235231</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56602</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56602" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56602" ref_url="https://www.suse.com/security/cve/CVE-2024-56602" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()

sock_init_data() attaches the allocated sk object to the provided sock
object. If ieee802154_create() fails later, the allocated sk object is
freed, but the dangling pointer remains in the provided sock object, which
may allow use-after-free.

Clear the sk pointer in the sock object on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56602/">CVE-2024-56602 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56602">CVE-2024-56602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235521">SUSE bug 1235521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235522">SUSE bug 1235522</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56603" ref_url="https://www.suse.com/security/cve/CVE-2024-56603" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: af_can: do not leave a dangling sk pointer in can_create()

On error can_create() frees the allocated sk object, but sock_init_data()
has already attached it to the provided sock object. This will leave a
dangling sk pointer in the sock object and may cause use-after-free later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56603/">CVE-2024-56603 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56603">CVE-2024-56603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235415">SUSE bug 1235415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56604" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56604" ref_url="https://www.suse.com/security/cve/CVE-2024-56604" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: RFCOMM: avoid leaving dangling sk pointer in rfcomm_sock_alloc()

bt_sock_alloc() attaches allocated sk object to the provided sock object.
If rfcomm_dlc_alloc() fails, we release the sk object, but leave the
dangling pointer in the sock object, which may cause use-after-free.

Fix this by swapping calls to bt_sock_alloc() and rfcomm_dlc_alloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56604/">CVE-2024-56604 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56604">CVE-2024-56604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235056">SUSE bug 1235056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235058">SUSE bug 1235058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56605" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56605" ref_url="https://www.suse.com/security/cve/CVE-2024-56605" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0201-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02069-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02096-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02101-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02110-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02116-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02134-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02140-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02144-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02145-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20449-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20450-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20451-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create()

bt_sock_alloc() allocates the sk object and attaches it to the provided
sock object. On error l2cap_sock_alloc() frees the sk object, but the
dangling pointer is still attached to the sock object, which may create
use-after-free in other code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56605/">CVE-2024-56605 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56605">CVE-2024-56605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234853">SUSE bug 1234853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235061">SUSE bug 1235061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235062">SUSE bug 1235062</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56611</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56611" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56611" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56611" ref_url="https://www.suse.com/security/cve/CVE-2024-56611" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mempolicy: fix migrate_to_node() assuming there is at least one VMA in a MM

We currently assume that there is at least one VMA in a MM, which isn't
true.

So we might end up having find_vma() return NULL, to then de-reference
NULL.  So properly handle find_vma() returning NULL.

This fixes the report:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
CPU: 1 UID: 0 PID: 6021 Comm: syz-executor284 Not tainted 6.12.0-rc7-syzkaller-00187-gf868cd251776 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024
RIP: 0010:migrate_to_node mm/mempolicy.c:1090 [inline]
RIP: 0010:do_migrate_pages+0x403/0x6f0 mm/mempolicy.c:1194
Code: ...
RSP: 0018:ffffc9000375fd08 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffffc9000375fd78 RCX: 0000000000000000
RDX: ffff88807e171300 RSI: dffffc0000000000 RDI: ffff88803390c044
RBP: ffff88807e171428 R08: 0000000000000014 R09: fffffbfff2039ef1
R10: ffffffff901cf78f R11: 0000000000000000 R12: 0000000000000003
R13: ffffc9000375fe90 R14: ffffc9000375fe98 R15: ffffc9000375fdf8
FS:  00005555919e1380(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555919e1ca8 CR3: 000000007f12a000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 kernel_migrate_pages+0x5b2/0x750 mm/mempolicy.c:1709
 __do_sys_migrate_pages mm/mempolicy.c:1727 [inline]
 __se_sys_migrate_pages mm/mempolicy.c:1723 [inline]
 __x64_sys_migrate_pages+0x96/0x100 mm/mempolicy.c:1723
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

[akpm@linux-foundation.org: add unlikely()]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56611/">CVE-2024-56611 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56611">CVE-2024-56611 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235391">SUSE bug 1235391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56614" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56614" ref_url="https://www.suse.com/security/cve/CVE-2024-56614" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: fix OOB map writes when deleting elements

Jordy says:

"
In the xsk_map_delete_elem function an unsigned integer
(map-&gt;max_entries) is compared with a user-controlled signed integer
(k). Due to implicit type conversion, a large unsigned value for
map-&gt;max_entries can bypass the intended bounds check:

	if (k &gt;= map-&gt;max_entries)
		return -EINVAL;

This allows k to hold a negative value (between -2147483648 and -2),
which is then used as an array index in m-&gt;xsk_map[k], which results
in an out-of-bounds access.

	spin_lock_bh(&amp;m-&gt;lock);
	map_entry = &amp;m-&gt;xsk_map[k]; // Out-of-bounds map_entry
	old_xs = unrcu_pointer(xchg(map_entry, NULL));  // Oob write
	if (old_xs)
		xsk_map_sock_delete(old_xs, map_entry);
	spin_unlock_bh(&amp;m-&gt;lock);

The xchg operation can then be used to cause an out-of-bounds write.
Moreover, the invalid map_entry passed to xsk_map_sock_delete can lead
to further memory corruption.
"

It indeed results in following splat:

[76612.897343] BUG: unable to handle page fault for address: ffffc8fc2e461108
[76612.904330] #PF: supervisor write access in kernel mode
[76612.909639] #PF: error_code(0x0002) - not-present page
[76612.914855] PGD 0 P4D 0
[76612.917431] Oops: Oops: 0002 [#1] PREEMPT SMP
[76612.921859] CPU: 11 UID: 0 PID: 10318 Comm: a.out Not tainted 6.12.0-rc1+ #470
[76612.929189] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019
[76612.939781] RIP: 0010:xsk_map_delete_elem+0x2d/0x60
[76612.944738] Code: 00 00 41 54 55 53 48 63 2e 3b 6f 24 73 38 4c 8d a7 f8 00 00 00 48 89 fb 4c 89 e7 e8 2d bf 05 00 48 8d b4 eb 00 01 00 00 31 ff &lt;48&gt; 87 3e 48 85 ff 74 05 e8 16 ff ff ff 4c 89 e7 e8 3e bc 05 00 31
[76612.963774] RSP: 0018:ffffc9002e407df8 EFLAGS: 00010246
[76612.969079] RAX: 0000000000000000 RBX: ffffc9002e461000 RCX: 0000000000000000
[76612.976323] RDX: 0000000000000001 RSI: ffffc8fc2e461108 RDI: 0000000000000000
[76612.983569] RBP: ffffffff80000001 R08: 0000000000000000 R09: 0000000000000007
[76612.990812] R10: ffffc9002e407e18 R11: ffff888108a38858 R12: ffffc9002e4610f8
[76612.998060] R13: ffff888108a38858 R14: 00007ffd1ae0ac78 R15: ffffc9002e4610c0
[76613.005303] FS:  00007f80b6f59740(0000) GS:ffff8897e0ec0000(0000) knlGS:0000000000000000
[76613.013517] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[76613.019349] CR2: ffffc8fc2e461108 CR3: 000000011e3ef001 CR4: 00000000007726f0
[76613.026595] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[76613.033841] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[76613.041086] PKRU: 55555554
[76613.043842] Call Trace:
[76613.046331]  &lt;TASK&gt;
[76613.048468]  ? __die+0x20/0x60
[76613.051581]  ? page_fault_oops+0x15a/0x450
[76613.055747]  ? search_extable+0x22/0x30
[76613.059649]  ? search_bpf_extables+0x5f/0x80
[76613.063988]  ? exc_page_fault+0xa9/0x140
[76613.067975]  ? asm_exc_page_fault+0x22/0x30
[76613.072229]  ? xsk_map_delete_elem+0x2d/0x60
[76613.076573]  ? xsk_map_delete_elem+0x23/0x60
[76613.080914]  __sys_bpf+0x19b7/0x23c0
[76613.084555]  __x64_sys_bpf+0x1a/0x20
[76613.088194]  do_syscall_64+0x37/0xb0
[76613.091832]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
[76613.096962] RIP: 0033:0x7f80b6d1e88d
[76613.100592] Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 b5 0f 00 f7 d8 64 89 01 48
[76613.119631] RSP: 002b:00007ffd1ae0ac68 EFLAGS: 00000206 ORIG_RAX: 0000000000000141
[76613.131330] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f80b6d1e88d
[76613.142632] RDX: 0000000000000098 RSI: 00007ffd1ae0ad20 RDI: 0000000000000003
[76613.153967] RBP: 00007ffd1ae0adc0 R08: 0000000000000000 R09: 0000000000000000
[76613.166030] R10: 00007f80b6f77040 R11: 0000000000000206 R12: 00007ffd1ae0aed8
[76613.177130] R13: 000055ddf42ce1e9 R14: 000055ddf42d0d98 R15: 00
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56614/">CVE-2024-56614 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56614">CVE-2024-56614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235424">SUSE bug 1235424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56616</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56616" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56616" ref_url="https://www.suse.com/security/cve/CVE-2024-56616" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/dp_mst: Fix MST sideband message body length check

Fix the MST sideband message body length check, which must be at least 1
byte accounting for the message body CRC (aka message data CRC) at the
end of the message.

This fixes a case where an MST branch device returns a header with a
correct header CRC (indicating a correctly received body length), with
the body length being incorrectly set to 0. This will later lead to a
memory corruption in drm_dp_sideband_append_payload() and the following
errors in dmesg:

   UBSAN: array-index-out-of-bounds in drivers/gpu/drm/display/drm_dp_mst_topology.c:786:25
   index -1 is out of range for type 'u8 [48]'
   Call Trace:
    drm_dp_sideband_append_payload+0x33d/0x350 [drm_display_helper]
    drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]
    drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]

   memcpy: detected field-spanning write (size 18446744073709551615) of single field "&amp;msg-&gt;msg[msg-&gt;curlen]" at drivers/gpu/drm/display/drm_dp_mst_topology.c:791 (size 256)
   Call Trace:
    drm_dp_sideband_append_payload+0x324/0x350 [drm_display_helper]
    drm_dp_get_one_sb_msg+0x3ce/0x5f0 [drm_display_helper]
    drm_dp_mst_hpd_irq_handle_event+0xc8/0x1580 [drm_display_helper]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56616/">CVE-2024-56616 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56616">CVE-2024-56616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235427">SUSE bug 1235427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56623" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56623" ref_url="https://www.suse.com/security/cve/CVE-2024-56623" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix use after free on unload

System crash is observed with stack trace warning of use after
free. There are 2 signals to tell dpc_thread to terminate (UNLOADING
flag and kthread_stop).

On setting the UNLOADING flag when dpc_thread happens to run at the time
and sees the flag, this causes dpc_thread to exit and clean up
itself. When kthread_stop is called for final cleanup, this causes use
after free.

Remove UNLOADING signal to terminate dpc_thread.  Use the kthread_stop
as the main signal to exit dpc_thread.

[596663.812935] kernel BUG at mm/slub.c:294!
[596663.812950] invalid opcode: 0000 [#1] SMP PTI
[596663.812957] CPU: 13 PID: 1475935 Comm: rmmod Kdump: loaded Tainted: G          IOE    --------- -  - 4.18.0-240.el8.x86_64 #1
[596663.812960] Hardware name: HP ProLiant DL380p Gen8, BIOS P70 08/20/2012
[596663.812974] RIP: 0010:__slab_free+0x17d/0x360

...
[596663.813008] Call Trace:
[596663.813022]  ? __dentry_kill+0x121/0x170
[596663.813030]  ? _cond_resched+0x15/0x30
[596663.813034]  ? _cond_resched+0x15/0x30
[596663.813039]  ? wait_for_completion+0x35/0x190
[596663.813048]  ? try_to_wake_up+0x63/0x540
[596663.813055]  free_task+0x5a/0x60
[596663.813061]  kthread_stop+0xf3/0x100
[596663.813103]  qla2x00_remove_one+0x284/0x440 [qla2xxx]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56623/">CVE-2024-56623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56623">CVE-2024-56623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235466">SUSE bug 1235466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235468">SUSE bug 1235468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56631" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56631" ref_url="https://www.suse.com/security/cve/CVE-2024-56631" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Fix slab-use-after-free read in sg_release()

Fix a use-after-free bug in sg_release(), detected by syzbot with KASAN:

BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30
kernel/locking/lockdep.c:5838
__mutex_unlock_slowpath+0xe2/0x750 kernel/locking/mutex.c:912
sg_release+0x1f4/0x2e0 drivers/scsi/sg.c:407

In sg_release(), the function kref_put(&amp;sfp-&gt;f_ref, sg_remove_sfp) is
called before releasing the open_rel_lock mutex. The kref_put() call may
decrement the reference count of sfp to zero, triggering its cleanup
through sg_remove_sfp(). This cleanup includes scheduling deferred work
via sg_remove_sfp_usercontext(), which ultimately frees sfp.

After kref_put(), sg_release() continues to unlock open_rel_lock and may
reference sfp or sdp. If sfp has already been freed, this results in a
slab-use-after-free error.

Move the kref_put(&amp;sfp-&gt;f_ref, sg_remove_sfp) call after unlocking the
open_rel_lock mutex. This ensures:

 - No references to sfp or sdp occur after the reference count is
   decremented.

 - Cleanup functions such as sg_remove_sfp() and
   sg_remove_sfp_usercontext() can safely execute without impacting the
   mutex handling in sg_release().

The fix has been tested and validated by syzbot. This patch closes the
bug reported at the following syzkaller link and ensures proper
sequencing of resource cleanup and mutex operations, eliminating the
risk of use-after-free errors in sg_release().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56631/">CVE-2024-56631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56631">CVE-2024-56631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235480">SUSE bug 1235480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235482">SUSE bug 1235482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56642" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56642" ref_url="https://www.suse.com/security/cve/CVE-2024-56642" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free of kernel socket in cleanup_bearer().

syzkaller reported a use-after-free of UDP kernel socket
in cleanup_bearer() without repro. [0][1]

When bearer_disable() calls tipc_udp_disable(), cleanup
of the UDP kernel socket is deferred by work calling
cleanup_bearer().

tipc_exit_net() waits for such works to finish by checking
tipc_net(net)-&gt;wq_count.  However, the work decrements the
count too early before releasing the kernel socket,
unblocking cleanup_net() and resulting in use-after-free.

Let's move the decrement after releasing the socket in
cleanup_bearer().

[0]:
ref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at
     sk_alloc+0x438/0x608
     inet_create+0x4c8/0xcb0
     __sock_create+0x350/0x6b8
     sock_create_kern+0x58/0x78
     udp_sock_create4+0x68/0x398
     udp_sock_create+0x88/0xc8
     tipc_udp_enable+0x5e8/0x848
     __tipc_nl_bearer_enable+0x84c/0xed8
     tipc_nl_bearer_enable+0x38/0x60
     genl_family_rcv_msg_doit+0x170/0x248
     genl_rcv_msg+0x400/0x5b0
     netlink_rcv_skb+0x1dc/0x398
     genl_rcv+0x44/0x68
     netlink_unicast+0x678/0x8b0
     netlink_sendmsg+0x5e4/0x898
     ____sys_sendmsg+0x500/0x830

[1]:
BUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]
BUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979
 udp_hashslot include/net/udp.h:85 [inline]
 udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979
 sk_common_release+0xaf/0x3f0 net/core/sock.c:3820
 inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437
 inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489
 __sock_release net/socket.c:658 [inline]
 sock_release+0xa0/0x210 net/socket.c:686
 cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310
 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391
 kthread+0x531/0x6b0 kernel/kthread.c:389
 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244

Uninit was created at:
 slab_free_hook mm/slub.c:2269 [inline]
 slab_free mm/slub.c:4580 [inline]
 kmem_cache_free+0x207/0xc40 mm/slub.c:4682
 net_free net/core/net_namespace.c:454 [inline]
 cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310
 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391
 kthread+0x531/0x6b0 kernel/kthread.c:389
 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244

CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
Workqueue: events cleanup_bearer
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56642/">CVE-2024-56642 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56642">CVE-2024-56642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235433">SUSE bug 1235433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235434">SUSE bug 1235434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56644</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56644" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56644" ref_url="https://www.suse.com/security/cve/CVE-2024-56644" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: release expired exception dst cached in socket

Dst objects get leaked in ip6_negative_advice() when this function is
executed for an expired IPv6 route located in the exception table. There
are several conditions that must be fulfilled for the leak to occur:
* an ICMPv6 packet indicating a change of the MTU for the path is received,
  resulting in an exception dst being created
* a TCP connection that uses the exception dst for routing packets must
  start timing out so that TCP begins retransmissions
* after the exception dst expires, the FIB6 garbage collector must not run
  before TCP executes ip6_negative_advice() for the expired exception dst

When TCP executes ip6_negative_advice() for an exception dst that has
expired and if no other socket holds a reference to the exception dst, the
refcount of the exception dst is 2, which corresponds to the increment
made by dst_init() and the increment made by the TCP socket for which the
connection is timing out. The refcount made by the socket is never
released. The refcount of the dst is decremented in sk_dst_reset() but
that decrement is counteracted by a dst_hold() intentionally placed just
before the sk_dst_reset() in ip6_negative_advice(). After
ip6_negative_advice() has finished, there is no other object tied to the
dst. The socket lost its reference stored in sk_dst_cache and the dst is
no longer in the exception table. The exception dst becomes a leaked
object.

As a result of this dst leak, an unbalanced refcount is reported for the
loopback device of a net namespace being destroyed under kernels that do
not contain e5f80fcf869a ("ipv6: give an IPv6 dev to blackhole_netdev"):
unregister_netdevice: waiting for lo to become free. Usage count = 2

Fix the dst leak by removing the dst_hold() in ip6_negative_advice(). The
patch that introduced the dst_hold() in ip6_negative_advice() was
92f1655aa2b22 ("net: fix __dst_negative_advice() race"). But 92f1655aa2b22
merely refactored the code with regards to the dst refcount so the issue
was present even before 92f1655aa2b22. The bug was introduced in
54c1a859efd9f ("ipv6: Don't drop cache route entry unless timer actually
expired.") where the expired cached route is deleted and the sk_dst_cache
member of the socket is set to NULL by calling dst_negative_advice() but
the refcount belonging to the socket is left unbalanced.

The IPv4 version - ipv4_negative_advice() - is not affected by this bug.
When the TCP connection times out ipv4_negative_advice() merely resets the
sk_dst_cache of the socket while decrementing the refcount of the
exception dst.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56644/">CVE-2024-56644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56644">CVE-2024-56644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235133">SUSE bug 1235133</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56645</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56645" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56645" ref_url="https://www.suse.com/security/cve/CVE-2024-56645" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_session_new(): fix skb reference counting

Since j1939_session_skb_queue() does an extra skb_get() for each new
skb, do the same for the initial one in j1939_session_new() to avoid
refcount underflow.

[mkl: clean up commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56645/">CVE-2024-56645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56645">CVE-2024-56645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235134">SUSE bug 1235134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235135">SUSE bug 1235135</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56647" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56647" ref_url="https://www.suse.com/security/cve/CVE-2024-56647" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Fix icmp host relookup triggering ip_rt_bug

arp link failure may trigger ip_rt_bug while xfrm enabled, call trace is:

WARNING: CPU: 0 PID: 0 at net/ipv4/route.c:1241 ip_rt_bug+0x14/0x20
Modules linked in:
CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.0-rc6-00077-g2e1b3cc9d7f7
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:ip_rt_bug+0x14/0x20
Call Trace:
 &lt;IRQ&gt;
 ip_send_skb+0x14/0x40
 __icmp_send+0x42d/0x6a0
 ipv4_link_failure+0xe2/0x1d0
 arp_error_report+0x3c/0x50
 neigh_invalidate+0x8d/0x100
 neigh_timer_handler+0x2e1/0x330
 call_timer_fn+0x21/0x120
 __run_timer_base.part.0+0x1c9/0x270
 run_timer_softirq+0x4c/0x80
 handle_softirqs+0xac/0x280
 irq_exit_rcu+0x62/0x80
 sysvec_apic_timer_interrupt+0x77/0x90

The script below reproduces this scenario:
ip xfrm policy add src 0.0.0.0/0 dst 0.0.0.0/0 \
	dir out priority 0 ptype main flag localok icmp
ip l a veth1 type veth
ip a a 192.168.141.111/24 dev veth0
ip l s veth0 up
ping 192.168.141.155 -c 1

icmp_route_lookup() create input routes for locally generated packets
while xfrm relookup ICMP traffic.Then it will set input route
(dst-&gt;out = ip_rt_bug) to skb for DESTUNREACH.

For ICMP err triggered by locally generated packets, dst-&gt;dev of output
route is loopback. Generally, xfrm relookup verification is not required
on loopback interfaces (net.ipv4.conf.lo.disable_xfrm = 1).

Skip icmp relookup for locally generated packets to fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56647/">CVE-2024-56647 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56647">CVE-2024-56647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235435">SUSE bug 1235435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56653</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56653" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56653" ref_url="https://www.suse.com/security/cve/CVE-2024-56653" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btmtk: avoid UAF in btmtk_process_coredump

hci_devcd_append may lead to the release of the skb, so it cannot be
accessed once it is called.

==================================================================
BUG: KASAN: slab-use-after-free in btmtk_process_coredump+0x2a7/0x2d0 [btmtk]
Read of size 4 at addr ffff888033cfabb0 by task kworker/0:3/82

CPU: 0 PID: 82 Comm: kworker/0:3 Tainted: G     U             6.6.40-lockdep-03464-g1d8b4eb3060e #1 b0b3c1cc0c842735643fb411799d97921d1f688c
Hardware name: Google Yaviks_Ufs/Yaviks_Ufs, BIOS Google_Yaviks_Ufs.15217.552.0 05/07/2024
Workqueue: events btusb_rx_work [btusb]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xfd/0x150
 print_report+0x131/0x780
 kasan_report+0x177/0x1c0
 btmtk_process_coredump+0x2a7/0x2d0 [btmtk 03edd567dd71a65958807c95a65db31d433e1d01]
 btusb_recv_acl_mtk+0x11c/0x1a0 [btusb 675430d1e87c4f24d0c1f80efe600757a0f32bec]
 btusb_rx_work+0x9e/0xe0 [btusb 675430d1e87c4f24d0c1f80efe600757a0f32bec]
 worker_thread+0xe44/0x2cc0
 kthread+0x2ff/0x3a0
 ret_from_fork+0x51/0x80
 ret_from_fork_asm+0x1b/0x30
 &lt;/TASK&gt;

Allocated by task 82:
 stack_trace_save+0xdc/0x190
 kasan_set_track+0x4e/0x80
 __kasan_slab_alloc+0x4e/0x60
 kmem_cache_alloc+0x19f/0x360
 skb_clone+0x132/0xf70
 btusb_recv_acl_mtk+0x104/0x1a0 [btusb]
 btusb_rx_work+0x9e/0xe0 [btusb]
 worker_thread+0xe44/0x2cc0
 kthread+0x2ff/0x3a0
 ret_from_fork+0x51/0x80
 ret_from_fork_asm+0x1b/0x30

Freed by task 1733:
 stack_trace_save+0xdc/0x190
 kasan_set_track+0x4e/0x80
 kasan_save_free_info+0x28/0xb0
 ____kasan_slab_free+0xfd/0x170
 kmem_cache_free+0x183/0x3f0
 hci_devcd_rx+0x91a/0x2060 [bluetooth]
 worker_thread+0xe44/0x2cc0
 kthread+0x2ff/0x3a0
 ret_from_fork+0x51/0x80
 ret_from_fork_asm+0x1b/0x30

The buggy address belongs to the object at ffff888033cfab40
 which belongs to the cache skbuff_head_cache of size 232
The buggy address is located 112 bytes inside of
 freed 232-byte region [ffff888033cfab40, ffff888033cfac28)

The buggy address belongs to the physical page:
page:00000000a174ba93 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x33cfa
head:00000000a174ba93 order:1 entire_mapcount:0 nr_pages_mapped:0 pincount:0
anon flags: 0x4000000000000840(slab|head|zone=1)
page_type: 0xffffffff()
raw: 4000000000000840 ffff888100848a00 0000000000000000 0000000000000001
raw: 0000000000000000 0000000080190019 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888033cfaa80: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc
 ffff888033cfab00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb
&gt;ffff888033cfab80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                     ^
 ffff888033cfac00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc
 ffff888033cfac80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================

Check if we need to call hci_devcd_complete before calling
hci_devcd_append. That requires that we check data-&gt;cd_info.cnt &gt;=
MTK_COREDUMP_NUM instead of data-&gt;cd_info.cnt &gt; MTK_COREDUMP_NUM, as we
increment data-&gt;cd_info.cnt only once the call to hci_devcd_append
succeeds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56653/">CVE-2024-56653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56653">CVE-2024-56653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235531">SUSE bug 1235531</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56654" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56654" ref_url="https://www.suse.com/security/cve/CVE-2024-56654" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Fix using rcu_read_(un)lock while iterating

The usage of rcu_read_(un)lock while inside list_for_each_entry_rcu is
not safe since for the most part entries fetched this way shall be
treated as rcu_dereference:

	Note that the value returned by rcu_dereference() is valid
	only within the enclosing RCU read-side critical section [1]_.
	For example, the following is **not** legal::

		rcu_read_lock();
		p = rcu_dereference(head.next);
		rcu_read_unlock();
		x = p-&gt;address;	/* BUG!!! */
		rcu_read_lock();
		y = p-&gt;data;	/* BUG!!! */
		rcu_read_unlock();
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56654/">CVE-2024-56654 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56654">CVE-2024-56654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235532">SUSE bug 1235532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56662" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56662" ref_url="https://www.suse.com/security/cve/CVE-2024-56662" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl

Fix an issue detected by syzbot with KASAN:

BUG: KASAN: vmalloc-out-of-bounds in cmd_to_func drivers/acpi/nfit/
core.c:416 [inline]
BUG: KASAN: vmalloc-out-of-bounds in acpi_nfit_ctl+0x20e8/0x24a0
drivers/acpi/nfit/core.c:459

The issue occurs in cmd_to_func when the call_pkg-&gt;nd_reserved2
array is accessed without verifying that call_pkg points to a buffer
that is appropriately sized as a struct nd_cmd_pkg. This can lead
to out-of-bounds access and undefined behavior if the buffer does not
have sufficient space.

To address this, a check was added in acpi_nfit_ctl() to ensure that
buf is not NULL and that buf_len is less than sizeof(*call_pkg)
before accessing it. This ensures safe access to the members of
call_pkg, including the nd_reserved2 array.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56662/">CVE-2024-56662 at SUSE</cve>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56662">CVE-2024-56662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235533">SUSE bug 1235533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56663" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56663" ref_url="https://www.suse.com/security/cve/CVE-2024-56663" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: nl80211: fix NL80211_ATTR_MLO_LINK_ID off-by-one

Since the netlink attribute range validation provides inclusive
checking, the *max* of attribute NL80211_ATTR_MLO_LINK_ID should be
IEEE80211_MLD_MAX_NUM_LINKS - 1 otherwise causing an off-by-one.

One crash stack for demonstration:
==================================================================
BUG: KASAN: wild-memory-access in ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939
Read of size 6 at addr 001102080000000c by task fuzzer.386/9508

CPU: 1 PID: 9508 Comm: syz.1.386 Not tainted 6.1.70 #2
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x177/0x231 lib/dump_stack.c:106
 print_report+0xe0/0x750 mm/kasan/report.c:398
 kasan_report+0x139/0x170 mm/kasan/report.c:495
 kasan_check_range+0x287/0x290 mm/kasan/generic.c:189
 memcpy+0x25/0x60 mm/kasan/shadow.c:65
 ieee80211_tx_control_port+0x3b6/0xca0 net/mac80211/tx.c:5939
 rdev_tx_control_port net/wireless/rdev-ops.h:761 [inline]
 nl80211_tx_control_port+0x7b3/0xc40 net/wireless/nl80211.c:15453
 genl_family_rcv_msg_doit+0x22e/0x320 net/netlink/genetlink.c:756
 genl_family_rcv_msg net/netlink/genetlink.c:833 [inline]
 genl_rcv_msg+0x539/0x740 net/netlink/genetlink.c:850
 netlink_rcv_skb+0x1de/0x420 net/netlink/af_netlink.c:2508
 genl_rcv+0x24/0x40 net/netlink/genetlink.c:861
 netlink_unicast_kernel net/netlink/af_netlink.c:1326 [inline]
 netlink_unicast+0x74b/0x8c0 net/netlink/af_netlink.c:1352
 netlink_sendmsg+0x882/0xb90 net/netlink/af_netlink.c:1874
 sock_sendmsg_nosec net/socket.c:716 [inline]
 __sock_sendmsg net/socket.c:728 [inline]
 ____sys_sendmsg+0x5cc/0x8f0 net/socket.c:2499
 ___sys_sendmsg+0x21c/0x290 net/socket.c:2553
 __sys_sendmsg net/socket.c:2582 [inline]
 __do_sys_sendmsg net/socket.c:2591 [inline]
 __se_sys_sendmsg+0x19e/0x270 net/socket.c:2589
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x45/0x90 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x63/0xcd

Update the policy to ensure correct validation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56663/">CVE-2024-56663 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56663">CVE-2024-56663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235454">SUSE bug 1235454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56664</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56664" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56664" ref_url="https://www.suse.com/security/cve/CVE-2024-56664" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02673-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02691-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix race between element replace and close()

Element replace (with a socket different from the one stored) may race
with socket's close() link popping &amp; unlinking. __sock_map_delete()
unconditionally unrefs the (wrong) element:

// set map[0] = s0
map_update_elem(map, 0, s0)

// drop fd of s0
close(s0)
  sock_map_close()
    lock_sock(sk)               (s0!)
    sock_map_remove_links(sk)
      link = sk_psock_link_pop()
      sock_map_unlink(sk, link)
        sock_map_delete_from_link
                                        // replace map[0] with s1
                                        map_update_elem(map, 0, s1)
                                          sock_map_update_elem
                                (s1!)       lock_sock(sk)
                                            sock_map_update_common
                                              psock = sk_psock(sk)
                                              spin_lock(&amp;stab-&gt;lock)
                                              osk = stab-&gt;sks[idx]
                                              sock_map_add_link(..., &amp;stab-&gt;sks[idx])
                                              sock_map_unref(osk, &amp;stab-&gt;sks[idx])
                                                psock = sk_psock(osk)
                                                sk_psock_put(sk, psock)
                                                  if (refcount_dec_and_test(&amp;psock))
                                                    sk_psock_drop(sk, psock)
                                              spin_unlock(&amp;stab-&gt;lock)
                                            unlock_sock(sk)
          __sock_map_delete
            spin_lock(&amp;stab-&gt;lock)
            sk = *psk                        // s1 replaced s0; sk == s1
            if (!sk_test || sk_test == sk)   // sk_test (s0) != sk (s1); no branch
              sk = xchg(psk, NULL)
            if (sk)
              sock_map_unref(sk, psk)        // unref s1; sks[idx] will dangle
                psock = sk_psock(sk)
                sk_psock_put(sk, psock)
                  if (refcount_dec_and_test())
                    sk_psock_drop(sk, psock)
            spin_unlock(&amp;stab-&gt;lock)
    release_sock(sk)

Then close(map) enqueues bpf_map_free_deferred, which finally calls
sock_map_free(). This results in some refcount_t warnings along with
a KASAN splat [1].

Fix __sock_map_delete(), do not allow sock_map_unref() on elements that
may have been replaced.

[1]:
BUG: KASAN: slab-use-after-free in sock_map_free+0x10e/0x330
Write of size 4 at addr ffff88811f5b9100 by task kworker/u64:12/1063

CPU: 14 UID: 0 PID: 1063 Comm: kworker/u64:12 Not tainted 6.12.0+ #125
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014
Workqueue: events_unbound bpf_map_free_deferred
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x68/0x90
 print_report+0x174/0x4f6
 kasan_report+0xb9/0x190
 kasan_check_range+0x10f/0x1e0
 sock_map_free+0x10e/0x330
 bpf_map_free_deferred+0x173/0x320
 process_one_work+0x846/0x1420
 worker_thread+0x5b3/0xf80
 kthread+0x29e/0x360
 ret_from_fork+0x2d/0x70
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 1202:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 __kasan_slab_alloc+0x85/0x90
 kmem_cache_alloc_noprof+0x131/0x450
 sk_prot_alloc+0x5b/0x220
 sk_alloc+0x2c/0x870
 unix_create1+0x88/0x8a0
 unix_create+0xc5/0x180
 __sock_create+0x241/0x650
 __sys_socketpair+0x1ce/0x420
 __x64_sys_socketpair+0x92/0x100
 do_syscall_64+0x93/0x180
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 46:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 kasan_save_free_info+0x37/0x60
 __kasan_slab_free+0x4b/0x70
 kmem_cache_free+0x1a1/0x590
 __sk_destruct+0x388/0x5a0
 sk_psock_destroy+0x73e/0xa50
 process_one_work+0x846/0x1420
 worker_thread+0x5b3/0xf80
 kthread+0x29e/0x360
 ret_from_fork+0x2d/0x70
 ret_from_fork_asm+0x1a/0x30

The bu
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56664/">CVE-2024-56664 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56664">CVE-2024-56664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235249">SUSE bug 1235249</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235250">SUSE bug 1235250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56667</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56667" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56667" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56667" ref_url="https://www.suse.com/security/cve/CVE-2024-56667" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix NULL pointer dereference in capture_engine

When the intel_context structure contains NULL,
it raises a NULL pointer dereference error in drm_info().

(cherry picked from commit 754302a5bc1bd8fd3b7d85c168b0a1af6d4bba4d)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56667/">CVE-2024-56667 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56667">CVE-2024-56667 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235016">SUSE bug 1235016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56672" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56672" ref_url="https://www.suse.com/security/cve/CVE-2024-56672" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Fix UAF in blkcg_unpin_online()

blkcg_unpin_online() walks up the blkcg hierarchy putting the online pin. To
walk up, it uses blkcg_parent(blkcg) but it was calling that after
blkcg_destroy_blkgs(blkcg) which could free the blkcg, leading to the
following UAF:

  ==================================================================
  BUG: KASAN: slab-use-after-free in blkcg_unpin_online+0x15a/0x270
  Read of size 8 at addr ffff8881057678c0 by task kworker/9:1/117

  CPU: 9 UID: 0 PID: 117 Comm: kworker/9:1 Not tainted 6.13.0-rc1-work-00182-gb8f52214c61a-dirty #48
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS unknown 02/02/2022
  Workqueue: cgwb_release cgwb_release_workfn
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x27/0x80
   print_report+0x151/0x710
   kasan_report+0xc0/0x100
   blkcg_unpin_online+0x15a/0x270
   cgwb_release_workfn+0x194/0x480
   process_scheduled_works+0x71b/0xe20
   worker_thread+0x82a/0xbd0
   kthread+0x242/0x2c0
   ret_from_fork+0x33/0x70
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;
  ...
  Freed by task 1944:
   kasan_save_track+0x2b/0x70
   kasan_save_free_info+0x3c/0x50
   __kasan_slab_free+0x33/0x50
   kfree+0x10c/0x330
   css_free_rwork_fn+0xe6/0xb30
   process_scheduled_works+0x71b/0xe20
   worker_thread+0x82a/0xbd0
   kthread+0x242/0x2c0
   ret_from_fork+0x33/0x70
   ret_from_fork_asm+0x1a/0x30

Note that the UAF is not easy to trigger as the free path is indirected
behind a couple RCU grace periods and a work item execution. I could only
trigger it with artifical msleep() injected in blkcg_unpin_online().

Fix it by reading the parent pointer before destroying the blkcg's blkg's.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56672/">CVE-2024-56672 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56672">CVE-2024-56672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235534">SUSE bug 1235534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56675" ref_url="https://www.suse.com/security/cve/CVE-2024-56675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors

Uprobes always use bpf_prog_run_array_uprobe() under tasks-trace-RCU
protection. But it is possible to attach a non-sleepable BPF program to a
uprobe, and non-sleepable BPF programs are freed via normal RCU (see
__bpf_prog_put_noref()). This leads to UAF of the bpf_prog because a normal
RCU grace period does not imply a tasks-trace-RCU grace period.

Fix it by explicitly waiting for a tasks-trace-RCU grace period after
removing the attachment of a bpf_prog to a perf_event.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56675/">CVE-2024-56675 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56675">CVE-2024-56675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235555">SUSE bug 1235555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56688" ref_url="https://www.suse.com/security/cve/CVE-2024-56688" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport

Since transport-&gt;sock has been set to NULL during reset transport,
XPRT_SOCK_UPD_TIMEOUT also needs to be cleared. Otherwise, the
xs_tcp_set_socket_timeouts() may be triggered in xs_tcp_send_request()
to dereference the transport-&gt;sock that has been set to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56688/">CVE-2024-56688 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56688">CVE-2024-56688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235538">SUSE bug 1235538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56690" ref_url="https://www.suse.com/security/cve/CVE-2024-56690" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21563" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY

Since commit 8f4f68e788c3 ("crypto: pcrypt - Fix hungtask for
PADATA_RESET"), the pcrypt encryption and decryption operations return
-EAGAIN when the CPU goes online or offline. In alg_test(), a WARN is
generated when pcrypt_aead_decrypt() or pcrypt_aead_encrypt() returns
-EAGAIN, the unnecessary panic will occur when panic_on_warn set 1.
Fix this issue by calling crypto layer directly without parallelization
in that case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56690/">CVE-2024-56690 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56690">CVE-2024-56690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235428">SUSE bug 1235428</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56693" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56693" ref_url="https://www.suse.com/security/cve/CVE-2024-56693" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

brd: defer automatic disk creation until module initialization succeeds

My colleague Wupeng found the following problems during fault injection:

BUG: unable to handle page fault for address: fffffbfff809d073
PGD 6e648067 P4D 123ec8067 PUD 123ec4067 PMD 100e38067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
CPU: 5 UID: 0 PID: 755 Comm: modprobe Not tainted 6.12.0-rc3+ #17
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:__asan_load8+0x4c/0xa0
...
Call Trace:
 &lt;TASK&gt;
 blkdev_put_whole+0x41/0x70
 bdev_release+0x1a3/0x250
 blkdev_release+0x11/0x20
 __fput+0x1d7/0x4a0
 task_work_run+0xfc/0x180
 syscall_exit_to_user_mode+0x1de/0x1f0
 do_syscall_64+0x6b/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

loop_init() is calling loop_add() after __register_blkdev() succeeds and
is ignoring disk_add() failure from loop_add(), for loop_add() failure
is not fatal and successfully created disks are already visible to
bdev_open().

brd_init() is currently calling brd_alloc() before __register_blkdev()
succeeds and is releasing successfully created disks when brd_init()
returns an error. This can cause UAF for the latter two case:

case 1:
    T1:
modprobe brd
  brd_init
    brd_alloc(0) // success
      add_disk
        disk_scan_partitions
          bdev_file_open_by_dev // alloc file
          fput // won't free until back to userspace
    brd_alloc(1) // failed since mem alloc error inject
  // error path for modprobe will release code segment
  // back to userspace
  __fput
    blkdev_release
      bdev_release
        blkdev_put_whole
          bdev-&gt;bd_disk-&gt;fops-&gt;release // fops is freed now, UAF!

case 2:
    T1:                            T2:
modprobe brd
  brd_init
    brd_alloc(0) // success
                                   open(/dev/ram0)
    brd_alloc(1) // fail
  // error path for modprobe

                                   close(/dev/ram0)
                                   ...
                                   /* UAF! */
                                   bdev-&gt;bd_disk-&gt;fops-&gt;release

Fix this problem by following what loop_init() does. Besides,
reintroduce brd_devices_mutex to help serialize modifications to
brd_list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56693/">CVE-2024-56693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56693">CVE-2024-56693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235418">SUSE bug 1235418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235419">SUSE bug 1235419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56709" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56709" ref_url="https://www.suse.com/security/cve/CVE-2024-56709" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: check if iowq is killed before queuing

task work can be executed after the task has gone through io_uring
termination, whether it's the final task_work run or the fallback path.
In this case, task work will find -&gt;io_wq being already killed and
null'ed, which is a problem if it then tries to forward the request to
io_queue_iowq(). Make io_queue_iowq() fail requests in this case.

Note that it also checks PF_KTHREAD, because the user can first close
a DEFER_TASKRUN ring and shortly after kill the task, in which case
-&gt;iowq check would race.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56709/">CVE-2024-56709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56709">CVE-2024-56709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235552">SUSE bug 1235552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56729" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56729" ref_url="https://www.suse.com/security/cve/CVE-2024-56729" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: Initialize cfid-&gt;tcon before performing network ops

Avoid leaking a tcon ref when a lease break races with opening the
cached directory. Processing the leak break might take a reference to
the tcon in cached_dir_lease_break() and then fail to release the ref in
cached_dir_offload_close, since cfid-&gt;tcon is still NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56729/">CVE-2024-56729 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56729">CVE-2024-56729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235503">SUSE bug 1235503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56739" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56739" ref_url="https://www.suse.com/security/cve/CVE-2024-56739" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtc: check if __rtc_read_time was successful in rtc_timer_do_work()

If the __rtc_read_time call fails,, the struct rtc_time tm; may contain
uninitialized data, or an illegal date/time read from the RTC hardware.

When calling rtc_tm_to_ktime later, the result may be a very large value
(possibly KTIME_MAX). If there are periodic timers in rtc-&gt;timerqueue,
they will continually expire, may causing kernel softlockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56739/">CVE-2024-56739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56739">CVE-2024-56739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235611">SUSE bug 1235611</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56757" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56757" ref_url="https://www.suse.com/security/cve/CVE-2024-56757" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: mediatek: add intf release flow when usb disconnect

MediaTek claim an special usb intr interface for ISO data transmission.
The interface need to be released before unregistering hci device when
usb disconnect. Removing BT usb dongle without properly releasing the
interface may cause Kernel panic while unregister hci device.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56757/">CVE-2024-56757 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56757">CVE-2024-56757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235619">SUSE bug 1235619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56760" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56760" ref_url="https://www.suse.com/security/cve/CVE-2024-56760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/MSI: Handle lack of irqdomain gracefully

Alexandre observed a warning emitted from pci_msi_setup_msi_irqs() on a
RISCV platform which does not provide PCI/MSI support:

 WARNING: CPU: 1 PID: 1 at drivers/pci/msi/msi.h:121 pci_msi_setup_msi_irqs+0x2c/0x32
 __pci_enable_msix_range+0x30c/0x596
 pci_msi_setup_msi_irqs+0x2c/0x32
 pci_alloc_irq_vectors_affinity+0xb8/0xe2

RISCV uses hierarchical interrupt domains and correctly does not implement
the legacy fallback. The warning triggers from the legacy fallback stub.

That warning is bogus as the PCI/MSI layer knows whether a PCI/MSI parent
domain is associated with the device or not. There is a check for MSI-X,
which has a legacy assumption. But that legacy fallback assumption is only
valid when legacy support is enabled, but otherwise the check should simply
return -ENOTSUPP.

Loongarch tripped over the same problem and blindly enabled legacy support
without implementing the legacy fallbacks. There are weak implementations
which return an error, so the problem was papered over.

Correct pci_msi_domain_supports() to evaluate the legacy mode and add
the missing supported check into the MSI enable path to complete it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56760/">CVE-2024-56760 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56760">CVE-2024-56760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235616">SUSE bug 1235616</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56779" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56779" ref_url="https://www.suse.com/security/cve/CVE-2024-56779" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur

The action force umount(umount -f) will attempt to kill all rpc_task even
umount operation may ultimately fail if some files remain open.
Consequently, if an action attempts to open a file, it can potentially
send two rpc_task to nfs server.

                   NFS CLIENT
thread1                             thread2
open("file")
...
nfs4_do_open
 _nfs4_do_open
  _nfs4_open_and_get_state
   _nfs4_proc_open
    nfs4_run_open_task
     /* rpc_task1 */
     rpc_run_task
     rpc_wait_for_completion_task

                                    umount -f
                                    nfs_umount_begin
                                     rpc_killall_tasks
                                      rpc_signal_task
     rpc_task1 been wakeup
     and return -512
 _nfs4_do_open // while loop
    ...
    nfs4_run_open_task
     /* rpc_task2 */
     rpc_run_task
     rpc_wait_for_completion_task

While processing an open request, nfsd will first attempt to find or
allocate an nfs4_openowner. If it finds an nfs4_openowner that is not
marked as NFS4_OO_CONFIRMED, this nfs4_openowner will released. Since
two rpc_task can attempt to open the same file simultaneously from the
client to server, and because two instances of nfsd can run
concurrently, this situation can lead to lots of memory leak.
Additionally, when we echo 0 to /proc/fs/nfsd/threads, warning will be
triggered.

                    NFS SERVER
nfsd1                  nfsd2       echo 0 &gt; /proc/fs/nfsd/threads

nfsd4_open
 nfsd4_process_open1
  find_or_alloc_open_stateowner
   // alloc oo1, stateid1
                       nfsd4_open
                        nfsd4_process_open1
                        find_or_alloc_open_stateowner
                        // find oo1, without NFS4_OO_CONFIRMED
                         release_openowner
                          unhash_openowner_locked
                          list_del_init(&amp;oo-&gt;oo_perclient)
                          // cannot find this oo
                          // from client, LEAK!!!
                         alloc_stateowner // alloc oo2

 nfsd4_process_open2
  init_open_stateid
  // associate oo1
  // with stateid1, stateid1 LEAK!!!
  nfs4_get_vfs_file
  // alloc nfsd_file1 and nfsd_file_mark1
  // all LEAK!!!

                         nfsd4_process_open2
                         ...

                                    write_threads
                                     ...
                                     nfsd_destroy_serv
                                      nfsd_shutdown_net
                                       nfs4_state_shutdown_net
                                        nfs4_state_destroy_net
                                         destroy_client
                                          __destroy_client
                                          // won't find oo1!!!
                                     nfsd_shutdown_generic
                                      nfsd_file_cache_shutdown
                                       kmem_cache_destroy
                                       for nfsd_file_slab
                                       and nfsd_file_mark_slab
                                       // bark since nfsd_file1
                                       // and nfsd_file_mark1
                                       // still alive

=======================================================================
BUG nfsd_file (Not tainted): Objects remaining in nfsd_file on
__kmem_cache_shutdown()
-----------------------------------------------------------------------

Slab 0xffd4000004438a80 objects=34 used=1 fp=0xff11000110e2ad28
flags=0x17ffffc0000240(workingset|head|node=0|zone=2|lastcpupid=0x1fffff)
CPU: 4 UID: 0 PID: 757 Comm: sh Not tainted 6.12.0-rc6+ #19
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dum
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56779/">CVE-2024-56779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56779">CVE-2024-56779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235632">SUSE bug 1235632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56783" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56783" ref_url="https://www.suse.com/security/cve/CVE-2024-56783" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level

cgroup maximum depth is INT_MAX by default, there is a cgroup toggle to
restrict this maximum depth to a more reasonable value not to harm
performance. Remove unnecessary WARN_ON_ONCE which is reachable from
userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56783/">CVE-2024-56783 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56783">CVE-2024-56783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235625">SUSE bug 1235625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56786" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56786" ref_url="https://www.suse.com/security/cve/CVE-2024-56786" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56786/">CVE-2024-56786 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-56786">CVE-2024-56786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235644">SUSE bug 1235644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240422">SUSE bug 1240422</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56826" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56826" ref_url="https://www.suse.com/security/cve/CVE-2024-56826" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020076.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14620-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKBM37J7PMJ763EKO4IP3FLOLF4U26HW/" source="SUSE-SU"/>
    <description>
    A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility.  This can lead to an application crash or other undefined behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56826/">CVE-2024-56826 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56826">CVE-2024-56826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235029">SUSE bug 1235029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983916" comment="openjpeg2-2.4.0-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983917" comment="openjpeg2-devel-2.4.0-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983918" comment="openjpeg2-tools-2.4.0-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56827</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56827" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56827" ref_url="https://www.suse.com/security/cve/CVE-2024-56827" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001335.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the OpenJPEG project. A heap buffer overflow condition may be triggered when certain options are specified while using the opj_decompress utility.  This can lead to an application crash or other undefined behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56827/">CVE-2024-56827 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56827">CVE-2024-56827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235213">SUSE bug 1235213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983916" comment="openjpeg2-2.4.0-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983917" comment="openjpeg2-devel-2.4.0-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983918" comment="openjpeg2-tools-2.4.0-8.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5688" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5688" ref_url="https://www.suse.com/security/cve/CVE-2024-5688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a garbage collection was triggered at the right time, a use-after-free could have occurred during object transplant. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5688/">CVE-2024-5688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5688">CVE-2024-5688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869922" comment="firefox-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869923" comment="firefox-x11-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869937" comment="thunderbird-115.12.1-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5690" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5690" ref_url="https://www.suse.com/security/cve/CVE-2024-5690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By monitoring the time certain operations take, an attacker could have guessed which external protocol handlers were functional on a user's system. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5690/">CVE-2024-5690 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5690">CVE-2024-5690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869922" comment="firefox-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869923" comment="firefox-x11-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869937" comment="thunderbird-115.12.1-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5691" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5691" ref_url="https://www.suse.com/security/cve/CVE-2024-5691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5691/">CVE-2024-5691 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5691">CVE-2024-5691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869922" comment="firefox-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869923" comment="firefox-x11-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869937" comment="thunderbird-115.12.1-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5693" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5693" ref_url="https://www.suse.com/security/cve/CVE-2024-5693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Offscreen Canvas did not properly track cross-origin tainting, which could be used to access image data from another site in violation of same-origin policy. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5693/">CVE-2024-5693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5693">CVE-2024-5693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869922" comment="firefox-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869923" comment="firefox-x11-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869937" comment="thunderbird-115.12.1-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5696" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5696" ref_url="https://www.suse.com/security/cve/CVE-2024-5696" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By manipulating the text in an `&amp;lt;input&amp;gt;` tag, an attacker could have caused corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5696/">CVE-2024-5696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5696">CVE-2024-5696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869922" comment="firefox-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869923" comment="firefox-x11-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869937" comment="thunderbird-115.12.1-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5700" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5700" ref_url="https://www.suse.com/security/cve/CVE-2024-5700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 127, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5700/">CVE-2024-5700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5700">CVE-2024-5700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869922" comment="firefox-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869923" comment="firefox-x11-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869937" comment="thunderbird-115.12.1-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5702" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5702" ref_url="https://www.suse.com/security/cve/CVE-2024-5702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
    <description>
    Memory corruption in the networking stack could have led to a potentially exploitable crash. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.12, and Thunderbird &lt; 115.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-06-29"/>
	<updated date="2025-02-16"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-5702/">CVE-2024-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5702">CVE-2024-5702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226027">SUSE bug 1226027</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009869922" comment="firefox-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869923" comment="firefox-x11-115.12.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009869937" comment="thunderbird-115.12.1-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5742</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5742" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5742" ref_url="https://www.suse.com/security/cve/CVE-2024-5742" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6986" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000076.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9430" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000587.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0157-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCJGQ6SCOSZGXAPYA7GYUT3M6ZPBLO5V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0157-2" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GBANP4TJZOYQBX7QCCMXMTPLJ7XCVTTU/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-5742/">CVE-2024-5742 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-5742">CVE-2024-5742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226099">SUSE bug 1226099</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953763" comment="nano-5.6.1-6.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57798" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57798" ref_url="https://www.suse.com/security/cve/CVE-2024-57798" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0517-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req()

While receiving an MST up request message from one thread in
drm_dp_mst_handle_up_req(), the MST topology could be removed from
another thread via drm_dp_mst_topology_mgr_set_mst(false), freeing
mst_primary and setting drm_dp_mst_topology_mgr::mst_primary to NULL.
This could lead to a NULL deref/use-after-free of mst_primary in
drm_dp_mst_handle_up_req().

Avoid the above by holding a reference for mst_primary in
drm_dp_mst_handle_up_req() while it's used.

v2: Fix kfreeing the request if getting an mst_primary reference fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57798/">CVE-2024-57798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57798">CVE-2024-57798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235818">SUSE bug 1235818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235819">SUSE bug 1235819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57809</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57809" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57809" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57809" ref_url="https://www.suse.com/security/cve/CVE-2024-57809" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: imx6: Fix suspend/resume support on i.MX6QDL

The suspend/resume functionality is currently broken on the i.MX6QDL
platform, as documented in the NXP errata (ERR005723):

  https://www.nxp.com/docs/en/errata/IMX6DQCE.pdf

This patch addresses the issue by sharing most of the suspend/resume
sequences used by other i.MX devices, while avoiding modifications to
critical registers that disrupt the PCIe functionality. It targets the
same problem as the following downstream commit:

  https://github.com/nxp-imx/linux-imx/commit/4e92355e1f79d225ea842511fcfd42b343b32995

Unlike the downstream commit, this patch also resets the connected PCIe
device if possible. Without this reset, certain drivers, such as ath10k
or iwlwifi, will crash on resume. The device reset is also done by the
driver on other i.MX platforms, making this patch consistent with
existing practices.

Upon resuming, the kernel will hang and display an error. Here's an
example of the error encountered with the ath10k driver:

  ath10k_pci 0000:01:00.0: Unable to change power state from D3hot to D0, device inaccessible
  Unhandled fault: imprecise external abort (0x1406) at 0x0106f944

Without this patch, suspend/resume will fail on i.MX6QDL devices if a
PCIe device is connected.

[kwilczynski: commit log, added tag for stable releases]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57809/">CVE-2024-57809 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57809">CVE-2024-57809 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235793">SUSE bug 1235793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57823" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57823" ref_url="https://www.suse.com/security/cve/CVE-2024-57823" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0312" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000760.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0314" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000757.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0319" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03257-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041737.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14646-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7S7ZVXAGSBLZGFFVSEHSDXQND2DNAKY2/" source="SUSE-SU"/>
    <description>
    In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-16"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57823/">CVE-2024-57823 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57823">CVE-2024-57823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235673">SUSE bug 1235673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960344" comment="raptor2-2.0.15-32.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960345" comment="raptor2-devel-2.0.15-32.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57843" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57843" ref_url="https://www.suse.com/security/cve/CVE-2024-57843" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix overflow inside virtnet_rq_alloc

When the frag just got a page, then may lead to regression on VM.
Specially if the sysctl net.core.high_order_alloc_disable value is 1,
then the frag always get a page when do refill.

Which could see reliable crashes or scp failure (scp a file 100M in size
to VM).

The issue is that the virtnet_rq_dma takes up 16 bytes at the beginning
of a new frag. When the frag size is larger than PAGE_SIZE,
everything is fine. However, if the frag is only one page and the
total size of the buffer and virtnet_rq_dma is larger than one page, an
overflow may occur.

The commit f9dac92ba908 ("virtio_ring: enable premapped mode whatever
use_dma_api") introduced this problem. And we reverted some commits to
fix this in last linux version. Now we try to enable it and fix this
bug directly.

Here, when the frag size is not enough, we reduce the buffer len to fix
this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-57843/">CVE-2024-57843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57843">CVE-2024-57843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235816">SUSE bug 1235816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57852" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57852" ref_url="https://www.suse.com/security/cve/CVE-2024-57852" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: qcom: scm: smc: Handle missing SCM device

Commit ca61d6836e6f ("firmware: qcom: scm: fix a NULL-pointer
dereference") makes it explicit that qcom_scm_get_tzmem_pool() can
return NULL, therefore its users should handle this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57852/">CVE-2024-57852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57852">CVE-2024-57852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239006">SUSE bug 1239006</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57876</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57876" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57876" ref_url="https://www.suse.com/security/cve/CVE-2024-57876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0577-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/dp_mst: Fix resetting msg rx state after topology removal

If the MST topology is removed during the reception of an MST down reply
or MST up request sideband message, the
drm_dp_mst_topology_mgr::up_req_recv/down_rep_recv states could be reset
from one thread via drm_dp_mst_topology_mgr_set_mst(false), racing with
the reading/parsing of the message from another thread via
drm_dp_mst_handle_down_rep() or drm_dp_mst_handle_up_req(). The race is
possible since the reader/parser doesn't hold any lock while accessing
the reception state. This in turn can lead to a memory corruption in the
reader/parser as described by commit bd2fccac61b4 ("drm/dp_mst: Fix MST
sideband message body length check").

Fix the above by resetting the message reception state if needed before
reading/parsing a message. Another solution would be to hold the
drm_dp_mst_topology_mgr::lock for the whole duration of the message
reception/parsing in drm_dp_mst_handle_down_rep() and
drm_dp_mst_handle_up_req(), however this would require a bigger change.
Since the fix is also needed for stable, opting for the simpler solution
in this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57876/">CVE-2024-57876 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57876">CVE-2024-57876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235806">SUSE bug 1235806</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1235807">SUSE bug 1235807</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009813705" comment="bpftool-7.2.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813706" comment="kernel-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813707" comment="kernel-abi-stablelists-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813708" comment="kernel-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813709" comment="kernel-cross-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813710" comment="kernel-debug-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813711" comment="kernel-debug-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813714" comment="kernel-debug-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813715" comment="kernel-debug-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813716" comment="kernel-debug-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813717" comment="kernel-debug-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813720" comment="kernel-doc-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813721" comment="kernel-headers-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813722" comment="kernel-modules-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813723" comment="kernel-modules-core-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813724" comment="kernel-modules-extra-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813725" comment="kernel-tools-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813726" comment="kernel-tools-libs-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813728" comment="kernel-uki-virt-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813729" comment="libperf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813730" comment="perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813731" comment="python3-perf-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813732" comment="rtla-5.14.0-362.8.1.el9_3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813733" comment="rv-5.14.0-362.8.1.el9_3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57879" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57879" ref_url="https://www.suse.com/security/cve/CVE-2024-57879" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: iso: Always release hdev at the end of iso_listen_bis

Since hci_get_route holds the device before returning, the hdev
should be released with hci_dev_put at the end of iso_listen_bis
even if the function returns with an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57879/">CVE-2024-57879 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57879">CVE-2024-57879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235802">SUSE bug 1235802</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57884" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57884" ref_url="https://www.suse.com/security/cve/CVE-2024-57884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: vmscan: account for free pages to prevent infinite Loop in throttle_direct_reclaim()

The task sometimes continues looping in throttle_direct_reclaim() because
allow_direct_reclaim(pgdat) keeps returning false.  

 #0 [ffff80002cb6f8d0] __switch_to at ffff8000080095ac
 #1 [ffff80002cb6f900] __schedule at ffff800008abbd1c
 #2 [ffff80002cb6f990] schedule at ffff800008abc50c
 #3 [ffff80002cb6f9b0] throttle_direct_reclaim at ffff800008273550
 #4 [ffff80002cb6fa20] try_to_free_pages at ffff800008277b68
 #5 [ffff80002cb6fae0] __alloc_pages_nodemask at ffff8000082c4660
 #6 [ffff80002cb6fc50] alloc_pages_vma at ffff8000082e4a98
 #7 [ffff80002cb6fca0] do_anonymous_page at ffff80000829f5a8
 #8 [ffff80002cb6fce0] __handle_mm_fault at ffff8000082a5974
 #9 [ffff80002cb6fd90] handle_mm_fault at ffff8000082a5bd4

At this point, the pgdat contains the following two zones:

        NODE: 4  ZONE: 0  ADDR: ffff00817fffe540  NAME: "DMA32"
          SIZE: 20480  MIN/LOW/HIGH: 11/28/45
          VM_STAT:
                NR_FREE_PAGES: 359
        NR_ZONE_INACTIVE_ANON: 18813
          NR_ZONE_ACTIVE_ANON: 0
        NR_ZONE_INACTIVE_FILE: 50
          NR_ZONE_ACTIVE_FILE: 0
          NR_ZONE_UNEVICTABLE: 0
        NR_ZONE_WRITE_PENDING: 0
                     NR_MLOCK: 0
                    NR_BOUNCE: 0
                   NR_ZSPAGES: 0
            NR_FREE_CMA_PAGES: 0

        NODE: 4  ZONE: 1  ADDR: ffff00817fffec00  NAME: "Normal"
          SIZE: 8454144  PRESENT: 98304  MIN/LOW/HIGH: 68/166/264
          VM_STAT:
                NR_FREE_PAGES: 146
        NR_ZONE_INACTIVE_ANON: 94668
          NR_ZONE_ACTIVE_ANON: 3
        NR_ZONE_INACTIVE_FILE: 735
          NR_ZONE_ACTIVE_FILE: 78
          NR_ZONE_UNEVICTABLE: 0
        NR_ZONE_WRITE_PENDING: 0
                     NR_MLOCK: 0
                    NR_BOUNCE: 0
                   NR_ZSPAGES: 0
            NR_FREE_CMA_PAGES: 0

In allow_direct_reclaim(), while processing ZONE_DMA32, the sum of
inactive/active file-backed pages calculated in zone_reclaimable_pages()
based on the result of zone_page_state_snapshot() is zero.  

Additionally, since this system lacks swap, the calculation of inactive/
active anonymous pages is skipped.

        crash&gt; p nr_swap_pages
        nr_swap_pages = $1937 = {
          counter = 0
        }

As a result, ZONE_DMA32 is deemed unreclaimable and skipped, moving on to
the processing of the next zone, ZONE_NORMAL, despite ZONE_DMA32 having
free pages significantly exceeding the high watermark.

The problem is that the pgdat-&gt;kswapd_failures hasn't been incremented.

        crash&gt; px ((struct pglist_data *) 0xffff00817fffe540)-&gt;kswapd_failures
        $1935 = 0x0

This is because the node deemed balanced.  The node balancing logic in
balance_pgdat() evaluates all zones collectively.  If one or more zones
(e.g., ZONE_DMA32) have enough free pages to meet their watermarks, the
entire node is deemed balanced.  This causes balance_pgdat() to exit early
before incrementing the kswapd_failures, as it considers the overall
memory state acceptable, even though some zones (like ZONE_NORMAL) remain
under significant pressure.


The patch ensures that zone_reclaimable_pages() includes free pages
(NR_FREE_PAGES) in its calculation when no other reclaimable pages are
available (e.g., file-backed or anonymous pages).  This change prevents
zones like ZONE_DMA32, which have sufficient free pages, from being
mistakenly deemed unreclaimable.  By doing so, the patch ensures proper
node balancing, avoids masking pressure on other zones like ZONE_NORMAL,
and prevents infinite loops in throttle_direct_reclaim() caused by
allow_direct_reclaim(pgdat) repeatedly returning false.


The kernel hangs due to a task stuck in throttle_direct_reclaim(), caused
by a node being incorrectly deemed balanced despite pressure in certain
zones, such as ZONE_NORMAL.  This issue arises from
zone_reclaimable_pages
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57884/">CVE-2024-57884 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57884">CVE-2024-57884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235948">SUSE bug 1235948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57885" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57885" ref_url="https://www.suse.com/security/cve/CVE-2024-57885" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: fix sleeping function called from invalid context at print message

Address a bug in the kernel that triggers a "sleeping function called from
invalid context" warning when /sys/kernel/debug/kmemleak is printed under
specific conditions:
- CONFIG_PREEMPT_RT=y
- Set SELinux as the LSM for the system
- Set kptr_restrict to 1
- kmemleak buffer contains at least one item

BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 136, name: cat
preempt_count: 1, expected: 0
RCU nest depth: 2, expected: 2
6 locks held by cat/136:
 #0: ffff32e64bcbf950 (&amp;p-&gt;lock){+.+.}-{3:3}, at: seq_read_iter+0xb8/0xe30
 #1: ffffafe6aaa9dea0 (scan_mutex){+.+.}-{3:3}, at: kmemleak_seq_start+0x34/0x128
 #3: ffff32e6546b1cd0 (&amp;object-&gt;lock){....}-{2:2}, at: kmemleak_seq_show+0x3c/0x1e0
 #4: ffffafe6aa8d8560 (rcu_read_lock){....}-{1:2}, at: has_ns_capability_noaudit+0x8/0x1b0
 #5: ffffafe6aabbc0f8 (notif_lock){+.+.}-{2:2}, at: avc_compute_av+0xc4/0x3d0
irq event stamp: 136660
hardirqs last  enabled at (136659): [&lt;ffffafe6a80fd7a0&gt;] _raw_spin_unlock_irqrestore+0xa8/0xd8
hardirqs last disabled at (136660): [&lt;ffffafe6a80fd85c&gt;] _raw_spin_lock_irqsave+0x8c/0xb0
softirqs last  enabled at (0): [&lt;ffffafe6a5d50b28&gt;] copy_process+0x11d8/0x3df8
softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0
Preemption disabled at:
[&lt;ffffafe6a6598a4c&gt;] kmemleak_seq_show+0x3c/0x1e0
CPU: 1 UID: 0 PID: 136 Comm: cat Tainted: G            E      6.11.0-rt7+ #34
Tainted: [E]=UNSIGNED_MODULE
Hardware name: linux,dummy-virt (DT)
Call trace:
 dump_backtrace+0xa0/0x128
 show_stack+0x1c/0x30
 dump_stack_lvl+0xe8/0x198
 dump_stack+0x18/0x20
 rt_spin_lock+0x8c/0x1a8
 avc_perm_nonode+0xa0/0x150
 cred_has_capability.isra.0+0x118/0x218
 selinux_capable+0x50/0x80
 security_capable+0x7c/0xd0
 has_ns_capability_noaudit+0x94/0x1b0
 has_capability_noaudit+0x20/0x30
 restricted_pointer+0x21c/0x4b0
 pointer+0x298/0x760
 vsnprintf+0x330/0xf70
 seq_printf+0x178/0x218
 print_unreferenced+0x1a4/0x2d0
 kmemleak_seq_show+0xd0/0x1e0
 seq_read_iter+0x354/0xe30
 seq_read+0x250/0x378
 full_proxy_read+0xd8/0x148
 vfs_read+0x190/0x918
 ksys_read+0xf0/0x1e0
 __arm64_sys_read+0x70/0xa8
 invoke_syscall.constprop.0+0xd4/0x1d8
 el0_svc+0x50/0x158
 el0t_64_sync+0x17c/0x180

%pS and %pK, in the same back trace line, are redundant, and %pS can void
%pK service in certain contexts.

%pS alone already provides the necessary information, and if it cannot
resolve the symbol, it falls back to printing the raw address voiding
the original intent behind the %pK.

Additionally, %pK requires a privilege check CAP_SYSLOG enforced through
the LSM, which can trigger a "sleeping function called from invalid
context" warning under RT_PREEMPT kernels when the check occurs in an
atomic context. This issue may also affect other LSMs.

This change avoids the unnecessary privilege check and resolves the
sleeping function warning without any loss of information.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57885/">CVE-2024-57885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57885">CVE-2024-57885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235925">SUSE bug 1235925</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57888</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57888" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57888" ref_url="https://www.suse.com/security/cve/CVE-2024-57888" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work from !WQ_MEM_RECLAIM worker

After commit
746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")
amdgpu started seeing the following warning:

 [ ] workqueue: WQ_MEM_RECLAIM sdma0:drm_sched_run_job_work [gpu_sched] is flushing !WQ_MEM_RECLAIM events:amdgpu_device_delay_enable_gfx_off [amdgpu]
...
 [ ] Workqueue: sdma0 drm_sched_run_job_work [gpu_sched]
...
 [ ] Call Trace:
 [ ]  &lt;TASK&gt;
...
 [ ]  ? check_flush_dependency+0xf5/0x110
...
 [ ]  cancel_delayed_work_sync+0x6e/0x80
 [ ]  amdgpu_gfx_off_ctrl+0xab/0x140 [amdgpu]
 [ ]  amdgpu_ring_alloc+0x40/0x50 [amdgpu]
 [ ]  amdgpu_ib_schedule+0xf4/0x810 [amdgpu]
 [ ]  ? drm_sched_run_job_work+0x22c/0x430 [gpu_sched]
 [ ]  amdgpu_job_run+0xaa/0x1f0 [amdgpu]
 [ ]  drm_sched_run_job_work+0x257/0x430 [gpu_sched]
 [ ]  process_one_work+0x217/0x720
...
 [ ]  &lt;/TASK&gt;

The intent of the verifcation done in check_flush_depedency is to ensure
forward progress during memory reclaim, by flagging cases when either a
memory reclaim process, or a memory reclaim work item is flushed from a
context not marked as memory reclaim safe.

This is correct when flushing, but when called from the
cancel(_delayed)_work_sync() paths it is a false positive because work is
either already running, or will not be running at all. Therefore
cancelling it is safe and we can relax the warning criteria by letting the
helper know of the calling context.

References: 746ae46c1113 ("drm/sched: Mark scheduler work queues with WQ_MEM_RECLAIM")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57888/">CVE-2024-57888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57888">CVE-2024-57888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235918">SUSE bug 1235918</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57890" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57890" ref_url="https://www.suse.com/security/cve/CVE-2024-57890" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/uverbs: Prevent integer overflow issue

In the expression "cmd.wqe_size * cmd.wr_count", both variables are u32
values that come from the user so the multiplication can lead to integer
wrapping.  Then we pass the result to uverbs_request_next_ptr() which also
could potentially wrap.  The "cmd.sge_count * sizeof(struct ib_uverbs_sge)"
multiplication can also overflow on 32bit systems although it's fine on
64bit systems.

This patch does two things.  First, I've re-arranged the condition in
uverbs_request_next_ptr() so that the use controlled variable "len" is on
one side of the comparison by itself without any math.  Then I've modified
all the callers to use size_mul() for the multiplications.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57890/">CVE-2024-57890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57890">CVE-2024-57890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235919">SUSE bug 1235919</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57894</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57894" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57894" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57894" ref_url="https://www.suse.com/security/cve/CVE-2024-57894" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57894/">CVE-2024-57894 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-57894">CVE-2024-57894 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235922">SUSE bug 1235922</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57898" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57898" ref_url="https://www.suse.com/security/cve/CVE-2024-57898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: clear link ID from bitmap during link delete after clean up

Currently, during link deletion, the link ID is first removed from the
valid_links bitmap before performing any clean-up operations. However, some
functions require the link ID to remain in the valid_links bitmap. One
such example is cfg80211_cac_event(). The flow is -

nl80211_remove_link()
    cfg80211_remove_link()
        ieee80211_del_intf_link()
            ieee80211_vif_set_links()
                ieee80211_vif_update_links()
                    ieee80211_link_stop()
                        cfg80211_cac_event()

cfg80211_cac_event() requires link ID to be present but it is cleared
already in cfg80211_remove_link(). Ultimately, WARN_ON() is hit.

Therefore, clear the link ID from the bitmap only after completing the link
clean-up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57898/">CVE-2024-57898 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57898">CVE-2024-57898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235966">SUSE bug 1235966</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57903</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57903" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57903" ref_url="https://www.suse.com/security/cve/CVE-2024-57903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: restrict SO_REUSEPORT to inet sockets

After blamed commit, crypto sockets could accidentally be destroyed
from RCU call back, as spotted by zyzbot [1].

Trying to acquire a mutex in RCU callback is not allowed.

Restrict SO_REUSEPORT socket option to inet sockets.

v1 of this patch supported TCP, UDP and SCTP sockets,
but fcnal-test.sh test needed RAW and ICMP support.

[1]
BUG: sleeping function called from invalid context at kernel/locking/mutex.c:562
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 24, name: ksoftirqd/1
preempt_count: 100, expected: 0
RCU nest depth: 0, expected: 0
1 lock held by ksoftirqd/1/24:
  #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
  #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_do_batch kernel/rcu/tree.c:2561 [inline]
  #0: ffffffff8e937ba0 (rcu_callback){....}-{0:0}, at: rcu_core+0xa37/0x17a0 kernel/rcu/tree.c:2823
Preemption disabled at:
 [&lt;ffffffff8161c8c8&gt;] softirq_handle_begin kernel/softirq.c:402 [inline]
 [&lt;ffffffff8161c8c8&gt;] handle_softirqs+0x128/0x9b0 kernel/softirq.c:537
CPU: 1 UID: 0 PID: 24 Comm: ksoftirqd/1 Not tainted 6.13.0-rc3-syzkaller-00174-ga024e377efed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:94 [inline]
  dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
  __might_resched+0x5d4/0x780 kernel/sched/core.c:8758
  __mutex_lock_common kernel/locking/mutex.c:562 [inline]
  __mutex_lock+0x131/0xee0 kernel/locking/mutex.c:735
  crypto_put_default_null_skcipher+0x18/0x70 crypto/crypto_null.c:179
  aead_release+0x3d/0x50 crypto/algif_aead.c:489
  alg_do_release crypto/af_alg.c:118 [inline]
  alg_sock_destruct+0x86/0xc0 crypto/af_alg.c:502
  __sk_destruct+0x58/0x5f0 net/core/sock.c:2260
  rcu_do_batch kernel/rcu/tree.c:2567 [inline]
  rcu_core+0xaaa/0x17a0 kernel/rcu/tree.c:2823
  handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561
  run_ksoftirqd+0xca/0x130 kernel/softirq.c:950
  smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
  kthread+0x2f0/0x390 kernel/kthread.c:389
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57903/">CVE-2024-57903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57903">CVE-2024-57903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235967">SUSE bug 1235967</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57929" ref_url="https://www.suse.com/security/cve/CVE-2024-57929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm array: fix releasing a faulty array block twice in dm_array_cursor_end

When dm_bm_read_lock() fails due to locking or checksum errors, it
releases the faulty block implicitly while leaving an invalid output
pointer behind. The caller of dm_bm_read_lock() should not operate on
this invalid dm_block pointer, or it will lead to undefined result.
For example, the dm_array_cursor incorrectly caches the invalid pointer
on reading a faulty array block, causing a double release in
dm_array_cursor_end(), then hitting the BUG_ON in dm-bufio cache_put().

Reproduce steps:

1. initialize a cache device

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc $262144"
dd if=/dev/zero of=/dev/mapper/cmeta bs=4k count=1
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

2. wipe the second array block offline

dmsteup remove cache cmeta cdata corig
mapping_root=$(dd if=/dev/sdc bs=1c count=8 skip=192 \
2&gt;/dev/null | hexdump -e '1/8 "%u\n"')
ablock=$(dd if=/dev/sdc bs=1c count=8 skip=$((4096*mapping_root+2056)) \
2&gt;/dev/null | hexdump -e '1/8 "%u\n"')
dd if=/dev/zero of=/dev/sdc bs=4k count=1 seek=$ablock

3. try reopen the cache device

dmsetup create cmeta --table "0 8192 linear /dev/sdc 0"
dmsetup create cdata --table "0 65536 linear /dev/sdc 8192"
dmsetup create corig --table "0 524288 linear /dev/sdc $262144"
dmsetup create cache --table "0 524288 cache /dev/mapper/cmeta \
/dev/mapper/cdata /dev/mapper/corig 128 2 metadata2 writethrough smq 0"

Kernel logs:

(snip)
device-mapper: array: array_block_check failed: blocknr 0 != wanted 10
device-mapper: block manager: array validator check failed for block 10
device-mapper: array: get_ablock failed
device-mapper: cache metadata: dm_array_cursor_next for mapping failed
------------[ cut here ]------------
kernel BUG at drivers/md/dm-bufio.c:638!

Fix by setting the cached block pointer to NULL on errors.

In addition to the reproducer described above, this fix can be
verified using the "array_cursor/damaged" test in dm-unit:
  dm-unit run /pdata/array_cursor/damaged --kernel-dir &lt;KERNEL_DIR&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57929/">CVE-2024-57929 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57929">CVE-2024-57929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236096">SUSE bug 1236096</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57931" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57931" ref_url="https://www.suse.com/security/cve/CVE-2024-57931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

selinux: ignore unknown extended permissions

When evaluating extended permissions, ignore unknown permissions instead
of calling BUG(). This commit ensures that future permissions can be
added without interfering with older kernels.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57931/">CVE-2024-57931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57931">CVE-2024-57931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236192">SUSE bug 1236192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57940</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57940" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57940" ref_url="https://www.suse.com/security/cve/CVE-2024-57940" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix the infinite loop in exfat_readdir()

If the file system is corrupted so that a cluster is linked to
itself in the cluster chain, and there is an unused directory
entry in the cluster, 'dentry' will not be incremented, causing
condition 'dentry &lt; max_dentries' unable to prevent an infinite
loop.

This infinite loop causes s_lock not to be released, and other
tasks will hang, such as exfat_sync_fs().

This commit stops traversing the cluster chain when there is unused
directory entry in the cluster to avoid this infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57940/">CVE-2024-57940 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57940">CVE-2024-57940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236227">SUSE bug 1236227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57947</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57947" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57947" ref_url="https://www.suse.com/security/cve/CVE-2024-57947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_set_pipapo: fix initial map fill

The initial buffer has to be inited to all-ones, but it must restrict
it to the size of the first field, not the total field size.

After each round in the map search step, the result and the fill map
are swapped, so if we have a set where f-&gt;bsize of the first element
is smaller than m-&gt;bsize_max, those one-bits are leaked into future
rounds result map.

This makes pipapo find an incorrect matching results for sets where
first field size is not the largest.

Followup patch adds a test case to nft_concat_range.sh selftest script.

Thanks to Stefano Brivio for pointing out that we need to zero out
the remainder explicitly, only correcting memset() argument isn't enough.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57947/">CVE-2024-57947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57947">CVE-2024-57947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236333">SUSE bug 1236333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245799">SUSE bug 1245799</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961451" comment="bpftool-7.4.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961452" comment="kernel-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961453" comment="kernel-abi-stablelists-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961454" comment="kernel-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961455" comment="kernel-cross-headers-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961456" comment="kernel-debug-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961457" comment="kernel-debug-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961460" comment="kernel-debug-modules-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961461" comment="kernel-debug-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961462" comment="kernel-debug-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961463" comment="kernel-debug-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961466" comment="kernel-doc-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961467" comment="kernel-headers-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961468" comment="kernel-modules-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961469" comment="kernel-modules-core-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961470" comment="kernel-modules-extra-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961471" comment="kernel-tools-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961472" comment="kernel-tools-libs-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961474" comment="kernel-uki-virt-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961475" comment="kernel-uki-virt-addons-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961476" comment="libperf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961477" comment="perf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961478" comment="python3-perf-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961479" comment="rtla-5.14.0-503.22.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961480" comment="rv-5.14.0-503.22.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57980</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57980" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57980" ref_url="https://www.suse.com/security/cve/CVE-2024-57980" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix double free in error path

If the uvc_status_init() function fails to allocate the int_urb, it will
free the dev-&gt;status pointer but doesn't reset the pointer to NULL. This
results in the kfree() call in uvc_status_cleanup() trying to
double-free the memory. Fix it by resetting the dev-&gt;status pointer to
NULL after freeing it.

Reviewed by: Ricardo Ribalda &lt;ribalda@chromium.org&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57980/">CVE-2024-57980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57980">CVE-2024-57980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237911">SUSE bug 1237911</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57981" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57981" ref_url="https://www.suse.com/security/cve/CVE-2024-57981" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Fix NULL pointer dereference on certain command aborts

If a command is queued to the final usable TRB of a ring segment, the
enqueue pointer is advanced to the subsequent link TRB and no further.
If the command is later aborted, when the abort completion is handled
the dequeue pointer is advanced to the first TRB of the next segment.

If no further commands are queued, xhci_handle_stopped_cmd_ring() sees
the ring pointers unequal and assumes that there is a pending command,
so it calls xhci_mod_cmd_timer() which crashes if cur_cmd was NULL.

Don't attempt timer setup if cur_cmd is NULL. The subsequent doorbell
ring likely is unnecessary too, but it's harmless. Leave it alone.

This is probably Bug 219532, but no confirmation has been received.

The issue has been independently reproduced and confirmed fixed using
a USB MCU programmed to NAK the Status stage of SET_ADDRESS forever.
Everything continued working normally after several prevented crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57981/">CVE-2024-57981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57981">CVE-2024-57981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237912">SUSE bug 1237912</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57986</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57986" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57986" ref_url="https://www.suse.com/security/cve/CVE-2024-57986" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections

A report in 2019 by the syzbot fuzzer was found to be connected to two
errors in the HID core associated with Resolution Multipliers.  One of
the errors was fixed by commit ea427a222d8b ("HID: core: Fix deadloop
in hid_apply_multiplier."), but the other has not been fixed.

This error arises because hid_apply_multipler() assumes that every
Resolution Multiplier control is contained in a Logical Collection,
i.e., there's no way the routine can ever set multiplier_collection to
NULL.  This is in spite of the fact that the function starts with a
big comment saying:

	 * "The Resolution Multiplier control must be contained in the same
	 * Logical Collection as the control(s) to which it is to be applied.
	   ...
	 *  If no Logical Collection is
	 * defined, the Resolution Multiplier is associated with all
	 * controls in the report."
	 * HID Usage Table, v1.12, Section 4.3.1, p30
	 *
	 * Thus, search from the current collection upwards until we find a
	 * logical collection...

The comment and the code overlook the possibility that none of the
collections found may be a Logical Collection.

The fix is to set the multiplier_collection pointer to NULL if the
collection found isn't a Logical Collection.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57986/">CVE-2024-57986 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57986">CVE-2024-57986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237907">SUSE bug 1237907</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57987</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57987" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57987" ref_url="https://www.suse.com/security/cve/CVE-2024-57987" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()

If insert an USB dongle which chip is not maintained in ic_id_table, it
will hit the NULL point accessed. Add a null point check to avoid the
Kernel Oops.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57987/">CVE-2024-57987 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57987">CVE-2024-57987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237905">SUSE bug 1237905</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57988</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57988" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57988" ref_url="https://www.suse.com/security/cve/CVE-2024-57988" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name()

devm_kstrdup() can return a NULL pointer on failure,but this
returned value in btbcm_get_board_name() is not checked.
Add NULL check in btbcm_get_board_name(), to handle kernel NULL
pointer dereference error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57988/">CVE-2024-57988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57988">CVE-2024-57988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237910">SUSE bug 1237910</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57989" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57989" ref_url="https://www.suse.com/security/cve/CVE-2024-57989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links

In mt7925_change_vif_links() devm_kzalloc() may return NULL but this
returned value is not checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57989/">CVE-2024-57989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57989">CVE-2024-57989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237899">SUSE bug 1237899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57990</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57990" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57990" ref_url="https://www.suse.com/security/cve/CVE-2024-57990" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: fix off by one in mt7925_load_clc()

This comparison should be &gt;= instead of &gt; to prevent an out of bounds
read and write.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57990/">CVE-2024-57990 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57990">CVE-2024-57990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237900">SUSE bug 1237900</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57993" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57993" ref_url="https://www.suse.com/security/cve/CVE-2024-57993" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check

syzbot has found a type mismatch between a USB pipe and the transfer
endpoint, which is triggered by the hid-thrustmaster driver[1].
There is a number of similar, already fixed issues [2].
In this case as in others, implementing check for endpoint type fixes the issue.

[1] https://syzkaller.appspot.com/bug?extid=040e8b3db6a96908d470
[2] https://syzkaller.appspot.com/bug?extid=348331f63b034f89b622
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57993/">CVE-2024-57993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57993">CVE-2024-57993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237894">SUSE bug 1237894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57995</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57995" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57995" ref_url="https://www.suse.com/security/cve/CVE-2024-57995" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev()

In ath12k_mac_assign_vif_to_vdev(), if arvif is created on a different
radio, it gets deleted from that radio through a call to
ath12k_mac_unassign_link_vif(). This action frees the arvif pointer.
Subsequently, there is a check involving arvif, which will result in a
read-after-free scenario.

Fix this by moving this check after arvif is again assigned via call to
ath12k_mac_assign_link_vif().

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57995/">CVE-2024-57995 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57995">CVE-2024-57995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237895">SUSE bug 1237895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57998" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57998" ref_url="https://www.suse.com/security/cve/CVE-2024-57998" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

OPP: add index check to assert to avoid buffer overflow in _read_freq()

Pass the freq index to the assert function to make sure
we do not read a freq out of the opp-&gt;rates[] table when called
from the indexed variants:
dev_pm_opp_find_freq_exact_indexed() or
dev_pm_opp_find_freq_ceil/floor_indexed().

Add a secondary parameter to the assert function, unused
for assert_single_clk() then add assert_clk_index() which
will check for the clock index when called from the _indexed()
find functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57998/">CVE-2024-57998 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57998">CVE-2024-57998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238527">SUSE bug 1238527</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58002</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58002" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58002" ref_url="https://www.suse.com/security/cve/CVE-2024-58002" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11411" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Remove dangling pointers

When an async control is written, we copy a pointer to the file handle
that started the operation. That pointer will be used when the device is
done. Which could be anytime in the future.

If the user closes that file descriptor, its structure will be freed,
and there will be one dangling pointer per pending async control, that
the driver will try to use.

Clean all the dangling pointers during release().

To avoid adding a performance penalty in the most common case (no async
operation), a counter has been introduced with some logic to make sure
that it is properly handled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58002/">CVE-2024-58002 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58002">CVE-2024-58002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238503">SUSE bug 1238503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009005" comment="kernel-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009006" comment="kernel-abi-stablelists-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009007" comment="kernel-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009008" comment="kernel-cross-headers-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009009" comment="kernel-debug-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009010" comment="kernel-debug-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009013" comment="kernel-debug-modules-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009014" comment="kernel-debug-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009015" comment="kernel-debug-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009016" comment="kernel-debug-uki-virt-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009019" comment="kernel-doc-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009020" comment="kernel-headers-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009021" comment="kernel-modules-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009022" comment="kernel-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009023" comment="kernel-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009024" comment="kernel-rt-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009025" comment="kernel-rt-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009026" comment="kernel-rt-debug-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009027" comment="kernel-rt-debug-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009029" comment="kernel-rt-debug-kvm-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009030" comment="kernel-rt-debug-modules-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009031" comment="kernel-rt-debug-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009032" comment="kernel-rt-debug-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009034" comment="kernel-rt-kvm-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009035" comment="kernel-rt-modules-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009036" comment="kernel-rt-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009037" comment="kernel-rt-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009038" comment="kernel-tools-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009039" comment="kernel-tools-libs-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009041" comment="kernel-uki-virt-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009042" comment="kernel-uki-virt-addons-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009043" comment="libperf-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009044" comment="perf-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009045" comment="python3-perf-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009046" comment="rtla-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009047" comment="rv-5.14.0-570.28.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58005" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58005" ref_url="https://www.suse.com/security/cve/CVE-2024-58005" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7423" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Change to kvalloc() in eventlog/acpi.c

The following failure was reported on HPE ProLiant D320:

[   10.693310][    T1] tpm_tis STM0925:00: 2.0 TPM (device-id 0x3, rev-id 0)
[   10.848132][    T1] ------------[ cut here ]------------
[   10.853559][    T1] WARNING: CPU: 59 PID: 1 at mm/page_alloc.c:4727 __alloc_pages_noprof+0x2ca/0x330
[   10.862827][    T1] Modules linked in:
[   10.866671][    T1] CPU: 59 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-lp155.2.g52785e2-default #1 openSUSE Tumbleweed (unreleased) 588cd98293a7c9eba9013378d807364c088c9375
[   10.882741][    T1] Hardware name: HPE ProLiant DL320 Gen12/ProLiant DL320 Gen12, BIOS 1.20 10/28/2024
[   10.892170][    T1] RIP: 0010:__alloc_pages_noprof+0x2ca/0x330
[   10.898103][    T1] Code: 24 08 e9 4a fe ff ff e8 34 36 fa ff e9 88 fe ff ff 83 fe 0a 0f 86 b3 fd ff ff 80 3d 01 e7 ce 01 00 75 09 c6 05 f8 e6 ce 01 01 &lt;0f&gt; 0b 45 31 ff e9 e5 fe ff ff f7 c2 00 00 08 00 75 42 89 d9 80 e1
[   10.917750][    T1] RSP: 0000:ffffb7cf40077980 EFLAGS: 00010246
[   10.923777][    T1] RAX: 0000000000000000 RBX: 0000000000040cc0 RCX: 0000000000000000
[   10.931727][    T1] RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000040cc0

The above transcript shows that ACPI pointed a 16 MiB buffer for the log
events because RSI maps to the 'order' parameter of __alloc_pages_noprof().
Address the bug by moving from devm_kmalloc() to devm_add_action() and
kvmalloc() and devm_add_action().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58005/">CVE-2024-58005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58005">CVE-2024-58005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237873">SUSE bug 1237873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985567" comment="kernel-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985568" comment="kernel-abi-stablelists-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985569" comment="kernel-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985570" comment="kernel-cross-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985571" comment="kernel-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985572" comment="kernel-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985575" comment="kernel-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985576" comment="kernel-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985577" comment="kernel-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985578" comment="kernel-debug-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985581" comment="kernel-doc-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985582" comment="kernel-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985583" comment="kernel-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985584" comment="kernel-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985585" comment="kernel-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985586" comment="kernel-rt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985587" comment="kernel-rt-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985588" comment="kernel-rt-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985589" comment="kernel-rt-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985591" comment="kernel-rt-debug-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985592" comment="kernel-rt-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985593" comment="kernel-rt-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985594" comment="kernel-rt-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985596" comment="kernel-rt-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985597" comment="kernel-rt-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985598" comment="kernel-rt-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985599" comment="kernel-rt-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985600" comment="kernel-tools-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985601" comment="kernel-tools-libs-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985603" comment="kernel-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985604" comment="kernel-uki-virt-addons-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985605" comment="libperf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985606" comment="perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985607" comment="python3-perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985608" comment="rtla-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985609" comment="rv-5.14.0-570.16.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58007</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58007" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58007" ref_url="https://www.suse.com/security/cve/CVE-2024-58007" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7423" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: socinfo: Avoid out of bounds read of serial number

On MSM8916 devices, the serial number exposed in sysfs is constant and does
not change across individual devices. It's always:

  db410c:/sys/devices/soc0$ cat serial_number
  2644893864

The firmware used on MSM8916 exposes SOCINFO_VERSION(0, 8), which does not
have support for the serial_num field in the socinfo struct. There is an
existing check to avoid exposing the serial number in that case, but it's
not correct: When checking the item_size returned by SMEM, we need to make
sure the *end* of the serial_num is within bounds, instead of comparing
with the *start* offset. The serial_number currently exposed on MSM8916
devices is just an out of bounds read of whatever comes after the socinfo
struct in SMEM.

Fix this by changing offsetof() to offsetofend(), so that the size of the
field is also taken into account.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58007/">CVE-2024-58007 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58007">CVE-2024-58007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238511">SUSE bug 1238511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985567" comment="kernel-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985568" comment="kernel-abi-stablelists-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985569" comment="kernel-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985570" comment="kernel-cross-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985571" comment="kernel-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985572" comment="kernel-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985575" comment="kernel-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985576" comment="kernel-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985577" comment="kernel-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985578" comment="kernel-debug-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985581" comment="kernel-doc-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985582" comment="kernel-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985583" comment="kernel-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985584" comment="kernel-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985585" comment="kernel-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985586" comment="kernel-rt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985587" comment="kernel-rt-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985588" comment="kernel-rt-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985589" comment="kernel-rt-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985591" comment="kernel-rt-debug-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985592" comment="kernel-rt-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985593" comment="kernel-rt-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985594" comment="kernel-rt-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985596" comment="kernel-rt-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985597" comment="kernel-rt-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985598" comment="kernel-rt-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985599" comment="kernel-rt-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985600" comment="kernel-tools-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985601" comment="kernel-tools-libs-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985603" comment="kernel-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985604" comment="kernel-uki-virt-addons-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985605" comment="libperf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985606" comment="perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985607" comment="python3-perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985608" comment="rtla-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985609" comment="rv-5.14.0-570.16.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58009" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58009" ref_url="https://www.suse.com/security/cve/CVE-2024-58009" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc

A NULL sock pointer is passed into l2cap_sock_alloc() when it is called
from l2cap_sock_new_connection_cb() and the error handling paths should
also be aware of it.

Seemingly a more elegant solution would be to swap bt_sock_alloc() and
l2cap_chan_create() calls since they are not interdependent to that moment
but then l2cap_chan_create() adds the soon to be deallocated and still
dummy-initialized channel to the global list accessible by many L2CAP
paths. The channel would be removed from the list in short period of time
but be a bit more straight-forward here and just check for NULL instead of
changing the order of function calls.

Found by Linux Verification Center (linuxtesting.org) with SVACE static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58009/">CVE-2024-58009 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58009">CVE-2024-58009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238760">SUSE bug 1238760</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58012" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58012" ref_url="https://www.suse.com/security/cve/CVE-2024-58012" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params

Each cpu DAI should associate with a widget. However, the topology might
not create the right number of DAI widgets for aggregated amps. And it
will cause NULL pointer deference.
Check that the DAI widget associated with the CPU DAI is valid to prevent
NULL pointer deference due to missing DAI widgets in topologies with
aggregated amps.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58012/">CVE-2024-58012 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58012">CVE-2024-58012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239104">SUSE bug 1239104</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58014" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58014" ref_url="https://www.suse.com/security/cve/CVE-2024-58014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()

In 'wlc_phy_iqcal_gainparams_nphy()', add gain range check to WARN()
instead of possible out-of-bounds 'tbl_iqcal_gainparams_nphy' access.
Compile tested only.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58014/">CVE-2024-58014 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58014">CVE-2024-58014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239109">SUSE bug 1239109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239110">SUSE bug 1239110</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58015" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58015" ref_url="https://www.suse.com/security/cve/CVE-2024-58015" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix for out-of bound access error

Selfgen stats are placed in a buffer using print_array_to_buf_index() function.
Array length parameter passed to the function is too big, resulting in possible
out-of bound memory error.
Decreasing buffer size by one fixes faulty upper bound of passed array.

Discovered in coverity scan, CID 1600742 and CID 1600758
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58015/">CVE-2024-58015 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58015">CVE-2024-58015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238995">SUSE bug 1238995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58057" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58057" ref_url="https://www.suse.com/security/cve/CVE-2024-58057" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: convert workqueues to unbound

When a workqueue is created with `WQ_UNBOUND`, its work items are
served by special worker-pools, whose host workers are not bound to
any specific CPU. In the default configuration (i.e. when
`queue_delayed_work` and friends do not specify which CPU to run the
work item on), `WQ_UNBOUND` allows the work item to be executed on any
CPU in the same node of the CPU it was enqueued on. While this
solution potentially sacrifices locality, it avoids contention with
other processes that might dominate the CPU time of the processor the
work item was scheduled on.

This is not just a theoretical problem: in a particular scenario
misconfigured process was hogging most of the time from CPU0, leaving
less than 0.5% of its CPU time to the kworker. The IDPF workqueues
that were using the kworker on CPU0 suffered large completion delays
as a result, causing performance degradation, timeouts and eventual
system crash.


* I have also run a manual test to gauge the performance
  improvement. The test consists of an antagonist process
  (`./stress --cpu 2`) consuming as much of CPU 0 as possible. This
  process is run under `taskset 01` to bind it to CPU0, and its
  priority is changed with `chrt -pQ 9900 10000 ${pid}` and
  `renice -n -20 ${pid}` after start.

  Then, the IDPF driver is forced to prefer CPU0 by editing all calls
  to `queue_delayed_work`, `mod_delayed_work`, etc... to use CPU 0.

  Finally, `ktraces` for the workqueue events are collected.

  Without the current patch, the antagonist process can force
  arbitrary delays between `workqueue_queue_work` and
  `workqueue_execute_start`, that in my tests were as high as
  `30ms`. With the current patch applied, the workqueue can be
  migrated to another unloaded CPU in the same node, and, keeping
  everything else equal, the maximum delay I could see was `6us`.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58057/">CVE-2024-58057 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58057">CVE-2024-58057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238969">SUSE bug 1238969</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58062</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58062" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58062" ref_url="https://www.suse.com/security/cve/CVE-2024-58062" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: mvm: avoid NULL pointer dereference

When iterating over the links of a vif, we need to make sure that the
pointer is valid (in other words - that the link exists) before
dereferncing it.
Use for_each_vif_active_link that also does the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58062/">CVE-2024-58062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58062">CVE-2024-58062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238965">SUSE bug 1238965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58064" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58064" ref_url="https://www.suse.com/security/cve/CVE-2024-58064" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: tests: Fix potential NULL dereference in test_cfg80211_parse_colocated_ap()

kunit_kzalloc() may return NULL, dereferencing it without NULL check may
lead to NULL dereference.
Add a NULL check for ies.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58064/">CVE-2024-58064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58064">CVE-2024-58064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238977">SUSE bug 1238977</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58068</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58068" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58068" ref_url="https://www.suse.com/security/cve/CVE-2024-58068" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized

If a driver calls dev_pm_opp_find_bw_ceil/floor() the retrieve bandwidth
from the OPP table but the bandwidth table was not created because the
interconnect properties were missing in the OPP consumer node, the
kernel will crash with:

Unable to handle kernel NULL pointer dereference at virtual address 0000000000000004
...
pc : _read_bw+0x8/0x10
lr : _opp_table_find_key+0x9c/0x174
...
Call trace:
  _read_bw+0x8/0x10 (P)
  _opp_table_find_key+0x9c/0x174 (L)
  _find_key+0x98/0x168
  dev_pm_opp_find_bw_ceil+0x50/0x88
...

In order to fix the crash, create an assert function to check
if the bandwidth table was created before trying to get a
bandwidth with _read_bw().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58068/">CVE-2024-58068 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58068">CVE-2024-58068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238961">SUSE bug 1238961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58069</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58069" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58069" ref_url="https://www.suse.com/security/cve/CVE-2024-58069" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7423" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read

The nvmem interface supports variable buffer sizes, while the regmap
interface operates with fixed-size storage. If an nvmem client uses a
buffer size less than 4 bytes, regmap_read will write out of bounds
as it expects the buffer to point at an unsigned int.

Fix this by using an intermediary unsigned int to hold the value.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58069/">CVE-2024-58069 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58069">CVE-2024-58069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238978">SUSE bug 1238978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985567" comment="kernel-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985568" comment="kernel-abi-stablelists-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985569" comment="kernel-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985570" comment="kernel-cross-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985571" comment="kernel-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985572" comment="kernel-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985575" comment="kernel-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985576" comment="kernel-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985577" comment="kernel-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985578" comment="kernel-debug-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985581" comment="kernel-doc-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985582" comment="kernel-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985583" comment="kernel-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985584" comment="kernel-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985585" comment="kernel-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985586" comment="kernel-rt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985587" comment="kernel-rt-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985588" comment="kernel-rt-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985589" comment="kernel-rt-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985591" comment="kernel-rt-debug-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985592" comment="kernel-rt-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985593" comment="kernel-rt-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985594" comment="kernel-rt-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985596" comment="kernel-rt-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985597" comment="kernel-rt-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985598" comment="kernel-rt-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985599" comment="kernel-rt-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985600" comment="kernel-tools-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985601" comment="kernel-tools-libs-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985603" comment="kernel-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985604" comment="kernel-uki-virt-addons-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985605" comment="libperf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985606" comment="perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985607" comment="python3-perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985608" comment="rtla-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985609" comment="rv-5.14.0-570.16.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58072</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58072" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58072" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58072" ref_url="https://www.suse.com/security/cve/CVE-2024-58072" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtlwifi: remove unused check_buddy_priv

Commit 2461c7d60f9f ("rtlwifi: Update header file") introduced a global
list of private data structures.

Later on, commit 26634c4b1868 ("rtlwifi Modify existing bits to match
vendor version 2013.02.07") started adding the private data to that list at
probe time and added a hook, check_buddy_priv to find the private data from
a similar device.

However, that function was never used.

Besides, though there is a lock for that list, it is never used. And when
the probe fails, the private data is never removed from the list. This
would cause a second probe to access freed memory.

Remove the unused hook, structures and members, which will prevent the
potential race condition on the list and its corruption during a second
probe when probe fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58072/">CVE-2024-58072 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58072">CVE-2024-58072 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238964">SUSE bug 1238964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58075" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58075" ref_url="https://www.suse.com/security/cve/CVE-2024-58075" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: tegra - do not transfer req when tegra init fails

The tegra_cmac_init or tegra_sha_init function may return an error when
memory is exhausted. It should not transfer the request when they return
an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58075/">CVE-2024-58075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58075">CVE-2024-58075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238976">SUSE bug 1238976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58077" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58077" ref_url="https://www.suse.com/security/cve/CVE-2024-58077" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback

commit 1f5664351410 ("ASoC: lower "no backend DAIs enabled for ... Port"
log severity") ignores -EINVAL error message on common soc_pcm_ret().
It is used from many functions, ignoring -EINVAL is over-kill.

The reason why -EINVAL was ignored was it really should only be used
upon invalid parameters coming from userspace and in that case we don't
want to log an error since we do not want to give userspace a way to do
a denial-of-service attack on the syslog / diskspace.

So don't use soc_pcm_ret() on .prepare callback is better idea.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58077/">CVE-2024-58077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58077">CVE-2024-58077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239090">SUSE bug 1239090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58083" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58083" ref_url="https://www.suse.com/security/cve/CVE-2024-58083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Explicitly verify target vCPU is online in kvm_get_vcpu()

Explicitly verify the target vCPU is fully online _prior_ to clamping the
index in kvm_get_vcpu().  If the index is "bad", the nospec clamping will
generate '0', i.e. KVM will return vCPU0 instead of NULL.

In practice, the bug is unlikely to cause problems, as it will only come
into play if userspace or the guest is buggy or misbehaving, e.g. KVM may
send interrupts to vCPU0 instead of dropping them on the floor.

However, returning vCPU0 when it shouldn't exist per online_vcpus is
problematic now that KVM uses an xarray for the vCPUs array, as KVM needs
to insert into the xarray before publishing the vCPU to userspace (see
commit c5b077549136 ("KVM: Convert the kvm-&gt;vcpus array to a xarray")),
i.e. before vCPU creation is guaranteed to succeed.

As a result, incorrectly providing access to vCPU0 will trigger a
use-after-free if vCPU0 is dereferenced and kvm_vm_ioctl_create_vcpu()
bails out of vCPU creation due to an error and frees vCPU0.  Commit
afb2acb2e3a3 ("KVM: Fix vcpu_array[0] races") papered over that issue, but
in doing so introduced an unsolvable teardown conundrum.  Preventing
accesses to vCPU0 before it's fully online will allow reverting commit
afb2acb2e3a3, without re-introducing the vcpu_array[0] UAF race.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-58083/">CVE-2024-58083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-58083">CVE-2024-58083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239036">SUSE bug 1239036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58088" ref_url="https://www.suse.com/security/cve/CVE-2024-58088" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix deadlock when freeing cgroup storage

The following commit
bc235cdb423a ("bpf: Prevent deadlock from recursive bpf_task_storage_[get|delete]")
first introduced deadlock prevention for fentry/fexit programs attaching
on bpf_task_storage helpers. That commit also employed the logic in map
free path in its v6 version.

Later bpf_cgrp_storage was first introduced in
c4bcfb38a95e ("bpf: Implement cgroup storage available to non-cgroup-attached bpf progs")
which faces the same issue as bpf_task_storage, instead of its busy
counter, NULL was passed to bpf_local_storage_map_free() which opened
a window to cause deadlock:

	&lt;TASK&gt;
		(acquiring local_storage-&gt;lock)
	_raw_spin_lock_irqsave+0x3d/0x50
	bpf_local_storage_update+0xd1/0x460
	bpf_cgrp_storage_get+0x109/0x130
	bpf_prog_a4d4a370ba857314_cgrp_ptr+0x139/0x170
	? __bpf_prog_enter_recur+0x16/0x80
	bpf_trampoline_6442485186+0x43/0xa4
	cgroup_storage_ptr+0x9/0x20
		(holding local_storage-&gt;lock)
	bpf_selem_unlink_storage_nolock.constprop.0+0x135/0x160
	bpf_selem_unlink_storage+0x6f/0x110
	bpf_local_storage_map_free+0xa2/0x110
	bpf_map_free_deferred+0x5b/0x90
	process_one_work+0x17c/0x390
	worker_thread+0x251/0x360
	kthread+0xd2/0x100
	ret_from_fork+0x34/0x50
	ret_from_fork_asm+0x1a/0x30
	&lt;/TASK&gt;

Progs:
 - A: SEC("fentry/cgroup_storage_ptr")
   - cgid (BPF_MAP_TYPE_HASH)
	Record the id of the cgroup the current task belonging
	to in this hash map, using the address of the cgroup
	as the map key.
   - cgrpa (BPF_MAP_TYPE_CGRP_STORAGE)
	If current task is a kworker, lookup the above hash
	map using function parameter @owner as the key to get
	its corresponding cgroup id which is then used to get
	a trusted pointer to the cgroup through
	bpf_cgroup_from_id(). This trusted pointer can then
	be passed to bpf_cgrp_storage_get() to finally trigger
	the deadlock issue.
 - B: SEC("tp_btf/sys_enter")
   - cgrpb (BPF_MAP_TYPE_CGRP_STORAGE)
	The only purpose of this prog is to fill Prog A's
	hash map by calling bpf_cgrp_storage_get() for as
	many userspace tasks as possible.

Steps to reproduce:
 - Run A;
 - while (true) { Run B; Destroy B; }

Fix this issue by passing its busy counter to the free procedure so
it can be properly incremented before storage/smap locking.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58088/">CVE-2024-58088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58088">CVE-2024-58088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239510">SUSE bug 1239510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58099" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58099" ref_url="https://www.suse.com/security/cve/CVE-2024-58099" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vmxnet3: Fix packet corruption in vmxnet3_xdp_xmit_frame

Andrew and Nikolay reported connectivity issues with Cilium's service
load-balancing in case of vmxnet3.

If a BPF program for native XDP adds an encapsulation header such as
IPIP and transmits the packet out the same interface, then in case
of vmxnet3 a corrupted packet is being sent and subsequently dropped
on the path.

vmxnet3_xdp_xmit_frame() which is called e.g. via vmxnet3_run_xdp()
through vmxnet3_xdp_xmit_back() calculates an incorrect DMA address:

  page = virt_to_page(xdpf-&gt;data);
  tbi-&gt;dma_addr = page_pool_get_dma_addr(page) +
                  VMXNET3_XDP_HEADROOM;
  dma_sync_single_for_device(&amp;adapter-&gt;pdev-&gt;dev,
                             tbi-&gt;dma_addr, buf_size,
                             DMA_TO_DEVICE);

The above assumes a fixed offset (VMXNET3_XDP_HEADROOM), but the XDP
BPF program could have moved xdp-&gt;data. While the passed buf_size is
correct (xdpf-&gt;len), the dma_addr needs to have a dynamic offset which
can be calculated as xdpf-&gt;data - (void *)xdpf, that is, xdp-&gt;data -
xdp-&gt;data_hard_start.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58099/">CVE-2024-58099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58099">CVE-2024-58099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242035">SUSE bug 1242035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20245953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-5953</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-5953" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5953" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-5953" ref_url="https://www.suse.com/security/cve/CVE-2024-5953" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6569" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019745.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-5953/">CVE-2024-5953 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-5953">CVE-2024-5953 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226277">SUSE bug 1226277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879623" comment="389-ds-base-2.4.5-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879624" comment="389-ds-base-devel-2.4.5-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879625" comment="389-ds-base-libs-2.4.5-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879626" comment="python3-lib389-2.4.5-9.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6104" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6104" ref_url="https://www.suse.com/security/cve/CVE-2024-6104" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6194" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9098" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000553.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9115" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2273-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-February/038343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0226-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZM3Q2GOCY2XWQUP7VK2V2KZENX5UIAN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0227-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/G2COZIDAEHXSE2NGBIJOMDBA64FCPZOP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PKSIUOW7HIED3L6UVUD2KMZSPDHNUTO/" source="SUSE-SU"/>
    <description>
    go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-11"/>
	<updated date="2025-10-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-6104/">CVE-2024-6104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6104">CVE-2024-6104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227024">SUSE bug 1227024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953574" comment="grafana-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953575" comment="grafana-selinux-10.2.6-4.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941970" comment="podman-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941971" comment="podman-docker-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941972" comment="podman-plugins-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941973" comment="podman-remote-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941974" comment="podman-tests-4.9.4-10.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953542" comment="skopeo-1.16.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953543" comment="skopeo-tests-1.16.1-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6119" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6119" ref_url="https://www.suse.com/security/cve/CVE-2024-6119" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000046.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8935" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3105-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3107-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021360.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14317-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72HQXYTYRYSUESQTFLZVCSPGKFEDEBGR/" source="SUSE-SU"/>
    <description>
    Issue summary: Applications performing certificate name checks (e.g., TLS
clients checking server certificates) may attempt to read an invalid memory
address resulting in abnormal termination of the application process.

Impact summary: Abnormal termination of an application can a cause a denial of
service.

Applications performing certificate name checks (e.g., TLS clients checking
server certificates) may attempt to read an invalid memory address when
comparing the expected name with an `otherName` subject alternative name of an
X.509 certificate. This may result in an exception that terminates the
application program.

Note that basic certificate chain validation (signatures, dates, ...) is not
affected, the denial of service can occur only when the application also
specifies an expected DNS name, Email address or IP address.

TLS servers rarely solicit client certificates, and even when they do, they
generally don't perform a name check against a reference identifier (expected
identity), but rather extract the presented identity after checking the
certificate chain.  So TLS servers are generally not affected and the severity
of the issue is Moderate.

The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6119/">CVE-2024-6119 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6119">CVE-2024-6119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229465">SUSE bug 1229465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009951344" comment="edk2-ovmf-20231122-6.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951345" comment="edk2-tools-20231122-6.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951346" comment="edk2-tools-doc-20231122-6.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943439" comment="openssl-3.0.7-28.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943440" comment="openssl-devel-3.0.7-28.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943441" comment="openssl-libs-3.0.7-28.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943442" comment="openssl-perl-3.0.7-28.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6126" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6126" ref_url="https://www.suse.com/security/cve/CVE-2024-6126" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9325" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2478-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018983.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0206-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNZTH7PKY4BMSDPSUA32JS3BZQRTKTGF/" source="SUSE-SU"/>
    <description>
    A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-6126/">CVE-2024-6126 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6126">CVE-2024-6126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226040">SUSE bug 1226040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953728" comment="cockpit-323.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953729" comment="cockpit-bridge-323.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953730" comment="cockpit-doc-323.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953731" comment="cockpit-packagekit-323.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953732" comment="cockpit-pcp-323.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953733" comment="cockpit-storaged-323.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953734" comment="cockpit-system-323.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953735" comment="cockpit-ws-323.1-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6174</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6174" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6174" ref_url="https://www.suse.com/security/cve/CVE-2024-6174" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001788.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11324" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041923.html" source="SUSE-SU"/>
    <description>
    When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this,  cloud-init default configurations disable platform enumeration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-15"/>
	<updated date="2026-02-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6174/">CVE-2024-6174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6174">CVE-2024-6174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245401">SUSE bug 1245401</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006152" comment="cloud-init-24.4-4.el9_6.3 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6232</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6232" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6232" ref_url="https://www.suse.com/security/cve/CVE-2024-6232" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000079.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8446" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000152.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8836" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8838" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9450" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000549.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9451" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9468" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14340-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EB3HULWLZQ24PRVM3P2LCSJ3IJUISSTW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XGNLIXONZEJPUCB2A4GVFSDMNJ37VXYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBWVORMJLTP5YM7GG2KA4LSPGF6N5YVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKDHGTJKHTETAZ6BAHXXRCINJKQVWXGN/" source="SUSE-SU"/>
    <description>
    There is a MEDIUM severity vulnerability affecting CPython.





Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-26"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6232/">CVE-2024-6232 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6232">CVE-2024-6232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230227">SUSE bug 1230227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953903" comment="python-unversioned-command-3.9.19-8.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953904" comment="python3-3.9.19-8.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953905" comment="python3-debug-3.9.19-8.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953906" comment="python3-devel-3.9.19-8.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953907" comment="python3-idle-3.9.19-8.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953908" comment="python3-libs-3.9.19-8.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953909" comment="python3-test-3.9.19-8.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953910" comment="python3-tkinter-3.9.19-8.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953775" comment="python3.11-3.11.9-7.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953776" comment="python3.11-debug-3.11.9-7.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953777" comment="python3.11-devel-3.11.9-7.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953778" comment="python3.11-idle-3.11.9-7.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953779" comment="python3.11-libs-3.11.9-7.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953780" comment="python3.11-test-3.11.9-7.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953781" comment="python3.11-tkinter-3.11.9-7.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953782" comment="python3.12-3.12.5-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953783" comment="python3.12-debug-3.12.5-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953784" comment="python3.12-devel-3.12.5-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953785" comment="python3.12-idle-3.12.5-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953786" comment="python3.12-libs-3.12.5-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953787" comment="python3.12-test-3.12.5-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953788" comment="python3.12-tkinter-3.12.5-2.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6237" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6237" ref_url="https://www.suse.com/security/cve/CVE-2024-6237" source="SUSE CVE"/>
    <description>
    A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6237/">CVE-2024-6237 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6237">CVE-2024-6237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227610">SUSE bug 1227610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009879623" comment="389-ds-base-2.4.5-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879624" comment="389-ds-base-devel-2.4.5-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879625" comment="389-ds-base-libs-2.4.5-9.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879626" comment="python3-lib389-2.4.5-9.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6239" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6239" ref_url="https://www.suse.com/security/cve/CVE-2024-6239" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9167" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035845.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Poppler's Pdfinfo utility. This issue occurs when using -dests parameter with pdfinfo utility. By using certain malformed input files, an attacker could cause the utility to crash, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6239/">CVE-2024-6239 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6239">CVE-2024-6239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226916">SUSE bug 1226916</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953642" comment="poppler-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953643" comment="poppler-cpp-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953644" comment="poppler-cpp-devel-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953645" comment="poppler-devel-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953646" comment="poppler-glib-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953647" comment="poppler-glib-devel-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953648" comment="poppler-glib-doc-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953649" comment="poppler-qt5-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953650" comment="poppler-qt5-devel-21.01.0-21.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953651" comment="poppler-utils-21.01.0-21.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6345" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6345" ref_url="https://www.suse.com/security/cve/CVE-2024-6345" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000021.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6311" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6726" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-16"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6345/">CVE-2024-6345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6345">CVE-2024-6345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228105">SUSE bug 1228105</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943028" comment="fence-agents-aliyun-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943029" comment="fence-agents-all-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943030" comment="fence-agents-amt-ws-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943031" comment="fence-agents-apc-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943032" comment="fence-agents-apc-snmp-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943033" comment="fence-agents-aws-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943034" comment="fence-agents-azure-arm-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943035" comment="fence-agents-bladecenter-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943036" comment="fence-agents-brocade-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943037" comment="fence-agents-cisco-mds-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943038" comment="fence-agents-cisco-ucs-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943039" comment="fence-agents-common-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943040" comment="fence-agents-compute-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943041" comment="fence-agents-drac5-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943042" comment="fence-agents-eaton-snmp-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943043" comment="fence-agents-emerson-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943044" comment="fence-agents-eps-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943045" comment="fence-agents-gce-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943046" comment="fence-agents-heuristics-ping-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943047" comment="fence-agents-hpblade-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943048" comment="fence-agents-ibm-powervs-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943049" comment="fence-agents-ibm-vpc-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943050" comment="fence-agents-ibmblade-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943051" comment="fence-agents-ifmib-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943052" comment="fence-agents-ilo-moonshot-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943053" comment="fence-agents-ilo-mp-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943054" comment="fence-agents-ilo-ssh-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943055" comment="fence-agents-ilo2-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943056" comment="fence-agents-intelmodular-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943057" comment="fence-agents-ipdu-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943058" comment="fence-agents-ipmilan-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943059" comment="fence-agents-kdump-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943060" comment="fence-agents-kubevirt-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943061" comment="fence-agents-mpath-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943062" comment="fence-agents-openstack-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943063" comment="fence-agents-redfish-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943064" comment="fence-agents-rhevm-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943065" comment="fence-agents-rsa-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943066" comment="fence-agents-rsb-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943067" comment="fence-agents-sbd-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943068" comment="fence-agents-scsi-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943069" comment="fence-agents-virsh-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943070" comment="fence-agents-vmware-rest-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943071" comment="fence-agents-vmware-soap-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943072" comment="fence-agents-wti-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943073" comment="fence-virt-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943074" comment="fence-virtd-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943075" comment="fence-virtd-cpg-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943076" comment="fence-virtd-libvirt-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943077" comment="fence-virtd-multicast-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943078" comment="fence-virtd-serial-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943079" comment="fence-virtd-tcp-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943080" comment="ha-cloud-support-4.10.0-62.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880241" comment="python3-setuptools-53.0.0-12.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880242" comment="python3-setuptools-wheel-53.0.0-12.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879627" comment="python3.11-setuptools-65.5.1-2.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009879628" comment="python3.11-setuptools-wheel-65.5.1-2.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880239" comment="python3.12-setuptools-68.2.2-3.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009880240" comment="python3.12-setuptools-wheel-68.2.2-3.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6387" ref_url="https://www.suse.com/security/cve/CVE-2024-6387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/018851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2275-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021369.html" source="SUSE-SU"/>
		<reference ref_id="TID000021482" ref_url="https://www.suse.com/support/kb/doc/?id=000021482" source="SUSE-SU"/>
    <description>
    A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-10"/>
	<updated date="2025-06-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6387/">CVE-2024-6387 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387">CVE-2024-6387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226641">SUSE bug 1226641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1226642">SUSE bug 1226642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009871872" comment="openssh-8.7p1-38.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871873" comment="openssh-askpass-8.7p1-38.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871874" comment="openssh-clients-8.7p1-38.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871875" comment="openssh-keycat-8.7p1-38.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871876" comment="openssh-server-8.7p1-38.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009871877" comment="pam_ssh_agent_auth-0.10.4-5.38.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6409" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6409" ref_url="https://www.suse.com/security/cve/CVE-2024-6409" source="SUSE CVE"/>
    <description>
    A race condition vulnerability was discovered in how signals are handled by OpenSSH's server (sshd). If a remote attacker does not authenticate within a set time period, then sshd's SIGALRM handler is called asynchronously. However, this signal handler calls various functions that are not async-signal-safe, for example, syslog(). As a consequence of a successful attack, in the worst case scenario, an attacker may be able to perform a remote code execution (RCE) as an unprivileged user running the sshd server.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-13"/>
	<updated date="2025-07-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-6409/">CVE-2024-6409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6409">CVE-2024-6409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227217">SUSE bug 1227217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009872987" comment="openssh-8.7p1-38.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872988" comment="openssh-askpass-8.7p1-38.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872989" comment="openssh-clients-8.7p1-38.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872990" comment="openssh-keycat-8.7p1-38.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872991" comment="openssh-server-8.7p1-38.el9_4.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872992" comment="pam_ssh_agent_auth-0.10.4-5.38.el9_4.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6501" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6501" ref_url="https://www.suse.com/security/cve/CVE-2024-6501" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9317" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000582.html" source="SUSE-SU"/>
    <description>
    A flaw was found in NetworkManager. When a system running NetworkManager with DEBUG logs enabled and an interface eth1 configured with LLDP enabled, a malicious user could inject a malformed LLDP packet. NetworkManager would crash, leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-6501/">CVE-2024-6501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6501">CVE-2024-6501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227566">SUSE bug 1227566</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953712" comment="NetworkManager-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953713" comment="NetworkManager-adsl-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953714" comment="NetworkManager-bluetooth-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953715" comment="NetworkManager-cloud-setup-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953716" comment="NetworkManager-config-connectivity-suse-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953717" comment="NetworkManager-config-server-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953718" comment="NetworkManager-dispatcher-routing-rules-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953719" comment="NetworkManager-initscripts-updown-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953720" comment="NetworkManager-libnm-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953721" comment="NetworkManager-libnm-devel-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953722" comment="NetworkManager-ovs-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953723" comment="NetworkManager-ppp-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953724" comment="NetworkManager-team-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953725" comment="NetworkManager-tui-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953726" comment="NetworkManager-wifi-1.48.10-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953727" comment="NetworkManager-wwan-1.48.10-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6601" ref_url="https://www.suse.com/security/cve/CVE-2024-6601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A race condition could lead to a cross-origin container obtaining permissions of the top-level origin. This vulnerability affects Firefox &lt; 128, Firefox ESR &lt; 115.13, Thunderbird &lt; 115.13, and Thunderbird &lt; 128.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-6601/">CVE-2024-6601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6601">CVE-2024-6601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226316">SUSE bug 1226316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875460" comment="firefox-115.13.0-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875461" comment="firefox-x11-115.13.0-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877069" comment="thunderbird-115.13.0-3.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6603</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6603" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6603" ref_url="https://www.suse.com/security/cve/CVE-2024-6603" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    In an out-of-memory scenario an allocation could fail but free would have been called on the pointer afterwards leading to memory corruption. This vulnerability affects Firefox &lt; 128, Firefox ESR &lt; 115.13, Thunderbird &lt; 115.13, and Thunderbird &lt; 128.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-6603/">CVE-2024-6603 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6603">CVE-2024-6603 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226316">SUSE bug 1226316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875460" comment="firefox-115.13.0-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875461" comment="firefox-x11-115.13.0-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877069" comment="thunderbird-115.13.0-3.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6604</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6604" ref_url="https://www.suse.com/security/cve/CVE-2024-6604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2371-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 128, Firefox ESR &lt; 115.13, Thunderbird &lt; 115.13, and Thunderbird &lt; 128.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-07-25"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6604/">CVE-2024-6604 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6604">CVE-2024-6604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226316">SUSE bug 1226316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009875460" comment="firefox-115.13.0-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009875461" comment="firefox-x11-115.13.0-3.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009877069" comment="thunderbird-115.13.0-3.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6655</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6655" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6655" ref_url="https://www.suse.com/security/cve/CVE-2024-6655" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000074.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2661-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/036187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021279.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-6655/">CVE-2024-6655 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6655">CVE-2024-6655 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228120">SUSE bug 1228120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953656" comment="gtk-update-icon-cache-3.24.31-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953657" comment="gtk3-3.24.31-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953658" comment="gtk3-devel-3.24.31-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953659" comment="gtk3-devel-docs-3.24.31-5.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953660" comment="gtk3-immodule-xim-3.24.31-5.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6923</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6923" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6923" ref_url="https://www.suse.com/security/cve/CVE-2024-6923" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000009.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000013.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000077.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024203.html" source="SUSE-SU"/>
    <description>
    There is a MEDIUM severity vulnerability affecting CPython.

The 
email module didn't properly quote newlines for email headers when 
serializing an email message allowing for header injection when an email
 is serialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-04"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-6923/">CVE-2024-6923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6923">CVE-2024-6923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228780">SUSE bug 1228780</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009942219" comment="python-unversioned-command-3.9.18-3.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942220" comment="python3-3.9.18-3.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942221" comment="python3-debug-3.9.18-3.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942222" comment="python3-devel-3.9.18-3.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942223" comment="python3-idle-3.9.18-3.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942224" comment="python3-libs-3.9.18-3.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942225" comment="python3-test-3.9.18-3.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942226" comment="python3-tkinter-3.9.18-3.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942227" comment="python3.11-3.11.7-1.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942228" comment="python3.11-debug-3.11.7-1.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942229" comment="python3.11-devel-3.11.7-1.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942230" comment="python3.11-idle-3.11.7-1.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942231" comment="python3.11-libs-3.11.7-1.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942232" comment="python3.11-test-3.11.7-1.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009942233" comment="python3.11-tkinter-3.11.7-1.el9_4.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940510" comment="python3.12-3.12.1-4.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940511" comment="python3.12-debug-3.12.1-4.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940512" comment="python3.12-devel-3.12.1-4.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940513" comment="python3.12-idle-3.12.1-4.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940514" comment="python3.12-libs-3.12.1-4.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940515" comment="python3.12-test-3.12.1-4.el9_4.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009940516" comment="python3.12-tkinter-3.12.1-4.el9_4.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7006" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7006" ref_url="https://www.suse.com/security/cve/CVE-2024-7006" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3117-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A null pointer dereference flaw was found in Libtiff via `tif_dirinfo.c`. This issue may allow an attacker to trigger memory allocation failures through certain means, such as restricting the heap space size or injecting faults, causing a segmentation fault. This can cause an application crash, eventually leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-08"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7006/">CVE-2024-7006 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7006">CVE-2024-7006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228924">SUSE bug 1228924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009951341" comment="libtiff-4.4.0-12.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951342" comment="libtiff-devel-4.4.0-12.el9_4.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951343" comment="libtiff-tools-4.4.0-12.el9_4.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7264</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7264" ref_url="https://www.suse.com/security/cve/CVE-2024-7264" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3080-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021336.html" source="SUSE-SU"/>
    <description>
    libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an
ASN.1 Generalized Time field. If given an syntactically incorrect field, the
parser might end up using -1 for the length of the *time fraction*, leading to
a `strlen()` getting performed on a pointer to a heap buffer area that is not
(purposely) null terminated.

This flaw most likely leads to a crash, but can also lead to heap contents
getting returned to the application when
[CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7264/">CVE-2024-7264 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7264">CVE-2024-7264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228535">SUSE bug 1228535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7347</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7347" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7347" ref_url="https://www.suse.com/security/cve/CVE-2024-7347" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3261" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/001002.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3262" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001006.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7402" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020236.html" source="SUSE-SU"/>
    <description>
    NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7347/">CVE-2024-7347 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7347">CVE-2024-7347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229155">SUSE bug 1229155</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974172" comment="nginx-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974173" comment="nginx-all-modules-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974174" comment="nginx-core-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974175" comment="nginx-filesystem-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974176" comment="nginx-mod-devel-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974177" comment="nginx-mod-http-image-filter-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974178" comment="nginx-mod-http-perl-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974179" comment="nginx-mod-http-xslt-filter-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974180" comment="nginx-mod-mail-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974181" comment="nginx-mod-stream-1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7348</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7348" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7348" ref_url="https://www.suse.com/security/cve/CVE-2024-7348" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8495" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3158-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3158-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3159-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3168-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3170-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3191-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036877.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14348-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OXG6KBR4NGDILNDJZP2FM4AIADAY3DBM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JFBV5HQIUL2TYPYWU3EU4MRYMYE6ONRA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F6L7CYTL2P6XU6L63WN47NCR4GIQGAQH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14351-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/233KJGMB42XZRNBMLOMSWHBSDKMS7R47/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14360-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RSHH7GG3JERRES4WX7FTBWO2TZCAMJMP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14361-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HD5J3C4URB7D6PHUVYZRISSS5HBJ3ITI/" source="SUSE-SU"/>
    <description>
    Time-of-check Time-of-use (TOCTOU) race condition in pg_dump in PostgreSQL allows an object creator to execute arbitrary SQL functions as the user running pg_dump, which is often a superuser. The attack involves replacing another relation type with a view or foreign table. The attack requires waiting for pg_dump to start, but winning the race condition is trivial if the attacker retains an open transaction. Versions before PostgreSQL 16.4, 15.8, 14.13, 13.16, and 12.20 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-31"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7348/">CVE-2024-7348 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7348">CVE-2024-7348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229013">SUSE bug 1229013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009881472" comment="pg_repack-1.4.8-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881475" comment="postgresql-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881476" comment="postgresql-contrib-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881477" comment="postgresql-docs-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881478" comment="postgresql-plperl-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881479" comment="postgresql-plpython3-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881480" comment="postgresql-pltcl-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881481" comment="postgresql-private-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881482" comment="postgresql-private-libs-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881483" comment="postgresql-server-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881484" comment="postgresql-server-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881485" comment="postgresql-static-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881486" comment="postgresql-test-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881487" comment="postgresql-test-rpm-macros-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881488" comment="postgresql-upgrade-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881489" comment="postgresql-upgrade-devel-16.4-1.module+el9.4.0+22207+8466e31f is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7383" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7383" ref_url="https://www.suse.com/security/cve/CVE-2024-7383" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6757" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019138.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libnbd. The client did not always correctly verify the NBD server's certificate when using TLS to connect to an NBD server. This issue allows a man-in-the-middle attack on NBD traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-20"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7383/">CVE-2024-7383 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7383">CVE-2024-7383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228872">SUSE bug 1228872</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009943432" comment="libnbd-1.18.1-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943433" comment="libnbd-bash-completion-1.18.1-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943434" comment="libnbd-devel-1.18.1-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943435" comment="nbdfuse-1.18.1-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943436" comment="ocaml-libnbd-1.18.1-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943437" comment="ocaml-libnbd-devel-1.18.1-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009943438" comment="python3-libnbd-1.18.1-4.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7409</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7409" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7409" ref_url="https://www.suse.com/security/cve/CVE-2024-7409" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02530-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021271.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPDARJICNXP6BQXL6RDWC63AJMWSDEU5/" source="SUSE-SU"/>
    <description>
    A flaw was found in the QEMU NBD Server. This vulnerability allows a denial of service (DoS) attack via improper synchronization during socket closure when a client keeps a socket open as the server is taken offline.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-07-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-7409/">CVE-2024-7409 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7409">CVE-2024-7409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229007">SUSE bug 1229007</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953616" comment="qemu-guest-agent-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953617" comment="qemu-img-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953618" comment="qemu-kvm-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953619" comment="qemu-kvm-audio-pa-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953620" comment="qemu-kvm-block-blkio-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953621" comment="qemu-kvm-block-curl-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953622" comment="qemu-kvm-block-rbd-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953623" comment="qemu-kvm-common-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953624" comment="qemu-kvm-core-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953625" comment="qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953626" comment="qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953627" comment="qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953628" comment="qemu-kvm-device-usb-host-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953629" comment="qemu-kvm-device-usb-redirect-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953630" comment="qemu-kvm-docs-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953631" comment="qemu-kvm-tools-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953632" comment="qemu-kvm-ui-egl-headless-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953633" comment="qemu-kvm-ui-opengl-9.0.0-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953634" comment="qemu-pr-helper-9.0.0-10.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7518</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7518" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7518" ref_url="https://www.suse.com/security/cve/CVE-2024-7518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Select options could obscure the fullscreen notification dialog. This could be used by a malicious site to perform a spoofing attack. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 128.1, and Thunderbird &lt; 128.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-7518/">CVE-2024-7518 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7518">CVE-2024-7518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7519" ref_url="https://www.suse.com/security/cve/CVE-2024-7519" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Insufficient checks when processing graphics shared memory could have led to memory corruption. This could be leveraged by an attacker to perform a sandbox escape. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 115.14, Firefox ESR &lt; 128.1, Thunderbird &lt; 128.1, and Thunderbird &lt; 115.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7519/">CVE-2024-7519 at SUSE</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7519">CVE-2024-7519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7520" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7520" ref_url="https://www.suse.com/security/cve/CVE-2024-7520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A type confusion bug in WebAssembly could be leveraged by an attacker to potentially achieve code execution. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 128.1, and Thunderbird &lt; 128.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7520/">CVE-2024-7520 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7520">CVE-2024-7520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7521" ref_url="https://www.suse.com/security/cve/CVE-2024-7521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incomplete WebAssembly exception handing could have led to a use-after-free. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 115.14, Firefox ESR &lt; 128.1, Thunderbird &lt; 128.1, and Thunderbird &lt; 115.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7521/">CVE-2024-7521 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7521">CVE-2024-7521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7522" ref_url="https://www.suse.com/security/cve/CVE-2024-7522" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Editor code failed to check an attribute value. This could have led to an out-of-bounds read. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 115.14, Firefox ESR &lt; 128.1, Thunderbird &lt; 128.1, and Thunderbird &lt; 115.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7522/">CVE-2024-7522 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7522">CVE-2024-7522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7524</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7524" ref_url="https://www.suse.com/security/cve/CVE-2024-7524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox adds web-compatibility shims in place of some tracking scripts blocked by Enhanced Tracking Protection.  On a site protected by Content Security Policy in "strict-dynamic" mode, an attacker able to inject an HTML element could have used a DOM Clobbering attack on some of the shims and achieved XSS, bypassing the CSP strict-dynamic protection. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 115.14, and Firefox ESR &lt; 128.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-07"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7524/">CVE-2024-7524 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7524">CVE-2024-7524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7525</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7525" ref_url="https://www.suse.com/security/cve/CVE-2024-7525" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It was possible for a web extension with minimal permissions to create a `StreamFilter` which could be used to read and modify the response body of requests on any site. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 115.14, Firefox ESR &lt; 128.1, Thunderbird &lt; 128.1, and Thunderbird &lt; 115.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7525/">CVE-2024-7525 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7525">CVE-2024-7525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7526" ref_url="https://www.suse.com/security/cve/CVE-2024-7526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    ANGLE failed to initialize parameters which lead to reading from uninitialized memory. This could be leveraged to leak sensitive data from memory. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 115.14, Firefox ESR &lt; 128.1, Thunderbird &lt; 128.1, and Thunderbird &lt; 115.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7526/">CVE-2024-7526 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7526">CVE-2024-7526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7527" ref_url="https://www.suse.com/security/cve/CVE-2024-7527" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Unexpected marking work at the start of sweeping could have led to a use-after-free. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 115.14, Firefox ESR &lt; 128.1, Thunderbird &lt; 128.1, and Thunderbird &lt; 115.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7527/">CVE-2024-7527 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7527">CVE-2024-7527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7528" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7528" ref_url="https://www.suse.com/security/cve/CVE-2024-7528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Incorrect garbage collection interaction in IndexedDB could have led to a use-after-free. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 128.1, and Thunderbird &lt; 128.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-7528/">CVE-2024-7528 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7528">CVE-2024-7528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7529" ref_url="https://www.suse.com/security/cve/CVE-2024-7529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3112-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The date picker could partially obscure security prompts. This could be used by a malicious site to trick a user into granting permissions. This vulnerability affects Firefox &lt; 129, Firefox ESR &lt; 115.14, Firefox ESR &lt; 128.1, Thunderbird &lt; 128.1, and Thunderbird &lt; 115.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-08-29"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2024-7529/">CVE-2024-7529 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7529">CVE-2024-7529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1228648">SUSE bug 1228648</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009941420" comment="firefox-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009941421" comment="firefox-x11-115.14.0-2.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881384" comment="thunderbird-115.14.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7592</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7592" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7592" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7592" ref_url="https://www.suse.com/security/cve/CVE-2024-7592" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3631" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001022.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3634" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3302-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/037102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024569.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14345-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XGNLIXONZEJPUCB2A4GVFSDMNJ37VXYU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14346-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UBWVORMJLTP5YM7GG2KA4LSPGF6N5YVF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14352-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSUCGYAR5V6CBTVYCRCUUUTW72KK3V55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14370-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OKDHGTJKHTETAZ6BAHXXRCINJKQVWXGN/" source="SUSE-SU"/>
    <description>
    There is a LOW severity vulnerability affecting CPython, specifically the
'http.cookies' standard library module.


When parsing cookies that contained backslashes for quoted characters in
the cookie value, the parser would use an algorithm with quadratic
complexity, resulting in excess CPU resources being used while parsing the
value.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-7592/">CVE-2024-7592 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-7592">CVE-2024-7592 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229596">SUSE bug 1229596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957530" comment="python-unversioned-command-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957531" comment="python3-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957532" comment="python3-debug-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957533" comment="python3-devel-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957534" comment="python3-idle-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957535" comment="python3-libs-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957536" comment="python3-test-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957537" comment="python3-tkinter-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974606" comment="python3.11-3.11.9-7.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974607" comment="python3.11-debug-3.11.9-7.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974608" comment="python3.11-devel-3.11.9-7.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974609" comment="python3.11-idle-3.11.9-7.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974610" comment="python3.11-libs-3.11.9-7.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974611" comment="python3.11-test-3.11.9-7.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974612" comment="python3.11-tkinter-3.11.9-7.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974499" comment="python3.12-3.12.5-2.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974500" comment="python3.12-debug-3.12.5-2.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974501" comment="python3.12-devel-3.12.5-2.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974502" comment="python3.12-idle-3.12.5-2.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974503" comment="python3.12-libs-3.12.5-2.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974504" comment="python3.12-test-3.12.5-2.el9_5.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974505" comment="python3.12-tkinter-3.12.5-2.el9_5.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20247652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-7652</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-7652" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-7652" ref_url="https://www.suse.com/security/cve/CVE-2024-7652" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000093.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000090.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6684" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000092.html" source="SUSE-SU"/>
    <description>
    An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash. This vulnerability affects Firefox &lt; 128, Firefox ESR &lt; 115.13, Thunderbird &lt; 115.13, and Thunderbird &lt; 128.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2024-7652/">CVE-2024-7652 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-7652">CVE-2024-7652 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230356">SUSE bug 1230356</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8088" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8088" ref_url="https://www.suse.com/security/cve/CVE-2024-8088" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000077.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000514.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9192" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000223.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9371" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202410:15283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
    <description>
    There is a HIGH severity vulnerability affecting the CPython "zipfile"
module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected.





When iterating over names of entries in a zip archive (for example, methods
of "zipfile.Path" like "namelist()", "iterdir()", etc)
the process can be put into an infinite loop with a maliciously crafted
zip archive. This defect applies when reading only metadata or extracting
the contents of the zip archive. Programs that are not handling
user-controlled zip archives are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-13"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8088/">CVE-2024-8088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8088">CVE-2024-8088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229704">SUSE bug 1229704</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009951968" comment="python-unversioned-command-3.9.19-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951969" comment="python3-3.9.19-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951970" comment="python3-debug-3.9.19-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951971" comment="python3-devel-3.9.19-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951972" comment="python3-idle-3.9.19-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951973" comment="python3-libs-3.9.19-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951974" comment="python3-test-3.9.19-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951975" comment="python3-tkinter-3.9.19-8.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951961" comment="python3.11-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951962" comment="python3.11-debug-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951963" comment="python3.11-devel-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951964" comment="python3.11-idle-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951965" comment="python3.11-libs-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951966" comment="python3.11-test-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009951967" comment="python3.11-tkinter-3.11.9-7.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953669" comment="python3.12-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953670" comment="python3.12-debug-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953671" comment="python3.12-devel-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953672" comment="python3.12-idle-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953673" comment="python3.12-libs-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953674" comment="python3.12-test-3.12.5-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953675" comment="python3.12-tkinter-3.12.5-2.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8176" ref_url="https://www.suse.com/security/cve/CVE-2024-8176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3531" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001013.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3913" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001041.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001059.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7444" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1186-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021027.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14952-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLES3CLDZ6NUIXG3MGWX56BEZ55QFHG7/" source="SUSE-SU"/>
    <description>
    A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2025-09-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8176/">CVE-2024-8176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8176">CVE-2024-8176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239618">SUSE bug 1239618</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984041" comment="expat-2.5.0-5.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984042" comment="expat-devel-2.5.0-5.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8235</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8235" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8235" ref_url="https://www.suse.com/security/cve/CVE-2024-8235" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000511.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libvirt. A refactor of the code fetching the list of interfaces for multiple APIs introduced a corner case on platforms where allocating 0 bytes of memory results in a NULL pointer. This corner case would lead to a NULL-pointer dereference and subsequent crash of virtinterfaced. This issue could allow clients connecting to the read-only socket to crash the virtinterfaced daemon.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8235/">CVE-2024-8235 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8235">CVE-2024-8235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230024">SUSE bug 1230024</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953584" comment="libvirt-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953585" comment="libvirt-client-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953586" comment="libvirt-client-qemu-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953587" comment="libvirt-daemon-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953588" comment="libvirt-daemon-common-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953589" comment="libvirt-daemon-config-network-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953590" comment="libvirt-daemon-config-nwfilter-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953591" comment="libvirt-daemon-driver-interface-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953592" comment="libvirt-daemon-driver-network-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953593" comment="libvirt-daemon-driver-nodedev-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953594" comment="libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953595" comment="libvirt-daemon-driver-qemu-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953596" comment="libvirt-daemon-driver-secret-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953597" comment="libvirt-daemon-driver-storage-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953598" comment="libvirt-daemon-driver-storage-core-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953599" comment="libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953600" comment="libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953601" comment="libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953602" comment="libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953603" comment="libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953604" comment="libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953605" comment="libvirt-daemon-kvm-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953606" comment="libvirt-daemon-lock-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953607" comment="libvirt-daemon-log-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953608" comment="libvirt-daemon-plugin-lockd-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953609" comment="libvirt-daemon-plugin-sanlock-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953610" comment="libvirt-daemon-proxy-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953611" comment="libvirt-devel-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953612" comment="libvirt-docs-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953613" comment="libvirt-libs-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953614" comment="libvirt-nss-10.5.0-7.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953615" comment="libvirt-ssh-proxy-10.5.0-7.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8381</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8381" ref_url="https://www.suse.com/security/cve/CVE-2024-8381" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000093.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000090.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6684" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5S76WFG23P4ITMRS7RGPVTUJR3KZSV24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJV2343USGKZZGZDZGLQNTRCJZRRSSKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A potentially exploitable type confusion could be triggered when looking up a property name on an object being used as the `with` environment. This vulnerability affects Firefox &lt; 130, Firefox ESR &lt; 128.2, Firefox ESR &lt; 115.15, Thunderbird &lt; 128.2, and Thunderbird &lt; 115.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-8381/">CVE-2024-8381 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8381">CVE-2024-8381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8382</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8382" ref_url="https://www.suse.com/security/cve/CVE-2024-8382" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000093.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000090.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6684" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5S76WFG23P4ITMRS7RGPVTUJR3KZSV24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJV2343USGKZZGZDZGLQNTRCJZRRSSKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Internal browser event interfaces were exposed to web content when privileged EventHandler listener callbacks ran for those events. Web content that tried to use those interfaces would not be able to use them with elevated privileges, but their presence would indicate certain browser features had been used, such as when a user opened the Dev Tools console. This vulnerability affects Firefox &lt; 130, Firefox ESR &lt; 128.2, Firefox ESR &lt; 115.15, Thunderbird &lt; 128.2, and Thunderbird &lt; 115.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8382/">CVE-2024-8382 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8382">CVE-2024-8382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8383</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8383" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8383" ref_url="https://www.suse.com/security/cve/CVE-2024-8383" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000093.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036806.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5S76WFG23P4ITMRS7RGPVTUJR3KZSV24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJV2343USGKZZGZDZGLQNTRCJZRRSSKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will. This vulnerability affects Firefox &lt; 130, Firefox ESR &lt; 128.2, and Firefox ESR &lt; 115.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8383/">CVE-2024-8383 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8383">CVE-2024-8383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8384" ref_url="https://www.suse.com/security/cve/CVE-2024-8384" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000093.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000090.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6684" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5S76WFG23P4ITMRS7RGPVTUJR3KZSV24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJV2343USGKZZGZDZGLQNTRCJZRRSSKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    The JavaScript garbage collector could mis-color cross-compartment objects if OOM conditions were detected at the right point between two passes. This could have led to memory corruption. This vulnerability affects Firefox &lt; 130, Firefox ESR &lt; 128.2, Firefox ESR &lt; 115.15, Thunderbird &lt; 128.2, and Thunderbird &lt; 115.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-8384/">CVE-2024-8384 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8384">CVE-2024-8384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8385" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8385" ref_url="https://www.suse.com/security/cve/CVE-2024-8385" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000093.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000090.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6684" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5S76WFG23P4ITMRS7RGPVTUJR3KZSV24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJV2343USGKZZGZDZGLQNTRCJZRRSSKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A difference in the handling of StructFields and ArrayTypes in WASM could be used to trigger an exploitable type confusion vulnerability. This vulnerability affects Firefox &lt; 130, Firefox ESR &lt; 128.2, and Thunderbird &lt; 128.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8385/">CVE-2024-8385 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8385">CVE-2024-8385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8386</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8386" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8386" ref_url="https://www.suse.com/security/cve/CVE-2024-8386" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000093.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000090.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6684" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5S76WFG23P4ITMRS7RGPVTUJR3KZSV24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJV2343USGKZZGZDZGLQNTRCJZRRSSKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    If a site had been granted the permission to open popup windows, it could cause Select elements to appear on top of another site to perform a spoofing attack. This vulnerability affects Firefox &lt; 130, Firefox ESR &lt; 128.2, and Thunderbird &lt; 128.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-8386/">CVE-2024-8386 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8386">CVE-2024-8386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8387</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8387" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8387" ref_url="https://www.suse.com/security/cve/CVE-2024-8387" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000093.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000090.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6684" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14358-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5S76WFG23P4ITMRS7RGPVTUJR3KZSV24/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14369-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJV2343USGKZZGZDZGLQNTRCJZRRSSKT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 129, Firefox ESR 128.1, and Thunderbird 128.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 130, Firefox ESR &lt; 128.2, and Thunderbird &lt; 128.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-8387/">CVE-2024-8387 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8387">CVE-2024-8387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945000" comment="firefox-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945001" comment="firefox-x11-128.2.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8394" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8394" ref_url="https://www.suse.com/security/cve/CVE-2024-8394" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:6683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:6684" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-September/000092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019538.html" source="SUSE-SU"/>
    <description>
    When aborting the verification of an OTR chat session, an attacker could have caused a use-after-free bug leading to a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 128.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-09-28"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-8394/">CVE-2024-8394 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8394">CVE-2024-8394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229821">SUSE bug 1229821</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945002" comment="thunderbird-128.2.0-1.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8418" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8418" ref_url="https://www.suse.com/security/cve/CVE-2024-8418" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7094" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001291.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Aardvark-dns, which is vulnerable to a Denial of Service attack due to the serial processing of TCP DNS queries. An attacker can exploit this flaw by keeping a TCP connection open indefinitely, causing the server to become unresponsive and resulting in other DNS queries timing out. This issue prevents legitimate users from accessing DNS services, thereby disrupting normal operations and causing service downtime.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8418/">CVE-2024-8418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8418">CVE-2024-8418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230153">SUSE bug 1230153</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983883" comment="aardvark-dns-1.14.0-1.el9 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8508</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8508" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8508" ref_url="https://www.suse.com/security/cve/CVE-2024-8508" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:11232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000724.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0837" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000806.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8197" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14391-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/F4IYYAPWSSJTTLRJA632C5ITH6QLLWE2/" source="SUSE-SU"/>
    <description>
    NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete. Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long. This change should not affect normal DNS traffic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-02"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L" href="https://www.suse.com/security/cve/CVE-2024-8508/">CVE-2024-8508 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8508">CVE-2024-8508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231284">SUSE bug 1231284</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985480" comment="python3-unbound-1.16.2-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985481" comment="unbound-1.16.2-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985482" comment="unbound-devel-1.16.2-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985483" comment="unbound-dracut-1.16.2-18.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985484" comment="unbound-libs-1.16.2-18.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8925" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8925" ref_url="https://www.suse.com/security/cve/CVE-2024-8925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000656.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RM3WP4ENMVRYGM7IU7L7DTX3KTTN5UHE/" source="SUSE-SU"/>
    <description>
    In PHP versions  8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8925/">CVE-2024-8925 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8925">CVE-2024-8925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231360">SUSE bug 1231360</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957468" comment="php-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957469" comment="php-bcmath-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957470" comment="php-cli-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957471" comment="php-common-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957472" comment="php-dba-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957473" comment="php-dbg-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957474" comment="php-devel-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957475" comment="php-embedded-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957476" comment="php-enchant-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957477" comment="php-ffi-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957478" comment="php-fpm-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957479" comment="php-gd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957480" comment="php-gmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957481" comment="php-intl-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957482" comment="php-ldap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957483" comment="php-mbstring-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957484" comment="php-mysqlnd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957485" comment="php-odbc-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957486" comment="php-opcache-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957487" comment="php-pdo-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957493" comment="php-pgsql-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957494" comment="php-process-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957495" comment="php-snmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957496" comment="php-soap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957497" comment="php-xml-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8927" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8927" ref_url="https://www.suse.com/security/cve/CVE-2024-8927" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000656.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RM3WP4ENMVRYGM7IU7L7DTX3KTTN5UHE/" source="SUSE-SU"/>
    <description>
    In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12,  HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to  cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-8927/">CVE-2024-8927 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-8927">CVE-2024-8927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231358">SUSE bug 1231358</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957468" comment="php-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957469" comment="php-bcmath-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957470" comment="php-cli-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957471" comment="php-common-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957472" comment="php-dba-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957473" comment="php-dbg-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957474" comment="php-devel-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957475" comment="php-embedded-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957476" comment="php-enchant-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957477" comment="php-ffi-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957478" comment="php-fpm-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957479" comment="php-gd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957480" comment="php-gmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957481" comment="php-intl-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957482" comment="php-ldap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957483" comment="php-mbstring-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957484" comment="php-mysqlnd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957485" comment="php-odbc-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957486" comment="php-opcache-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957487" comment="php-pdo-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957493" comment="php-pgsql-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957494" comment="php-process-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957495" comment="php-snmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957496" comment="php-soap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957497" comment="php-xml-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20248929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-8929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-8929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8929" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-8929" ref_url="https://www.suse.com/security/cve/CVE-2024-8929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15687" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001091.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019936.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14521-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROEYTIBLUXYCMCC2T25PTAXMN2GIRPJV/" source="SUSE-SU"/>
    <description>
    In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, a hostile MySQL server can cause the client to disclose the content of its heap containing data from other SQL requests and possible other data belonging to different users of the same server.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-8929/">CVE-2024-8929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-8929">CVE-2024-8929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233651">SUSE bug 1233651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985419" comment="php-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985420" comment="php-bcmath-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985421" comment="php-cli-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985422" comment="php-common-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985423" comment="php-dba-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985424" comment="php-dbg-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985425" comment="php-devel-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985426" comment="php-embedded-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985427" comment="php-enchant-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985428" comment="php-ffi-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985429" comment="php-fpm-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985430" comment="php-gd-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985431" comment="php-gmp-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985432" comment="php-intl-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985433" comment="php-ldap-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985434" comment="php-mbstring-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985435" comment="php-mysqlnd-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985436" comment="php-odbc-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985437" comment="php-opcache-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985438" comment="php-pdo-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985439" comment="php-pgsql-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985440" comment="php-process-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985441" comment="php-snmp-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985442" comment="php-soap-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985443" comment="php-xml-8.2.28-1.module+el9.6.0+23063+43495379 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9026" ref_url="https://www.suse.com/security/cve/CVE-2024-9026" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000656.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000662.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10952" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000659.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019658.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14376-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RM3WP4ENMVRYGM7IU7L7DTX3KTTN5UHE/" source="SUSE-SU"/>
    <description>
    In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is  configured to catch workers output through catch_workers_output = yes,  it may be possible to pollute the final log or  remove up to 4 characters from the log messages by manipulating log message content. Additionally, if  PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9026/">CVE-2024-9026 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9026">CVE-2024-9026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231382">SUSE bug 1231382</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957467" comment="apcu-panel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957468" comment="php-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957469" comment="php-bcmath-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957470" comment="php-cli-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957471" comment="php-common-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957472" comment="php-dba-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957473" comment="php-dbg-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957474" comment="php-devel-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957475" comment="php-embedded-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957476" comment="php-enchant-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957477" comment="php-ffi-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957478" comment="php-fpm-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957479" comment="php-gd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957480" comment="php-gmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957481" comment="php-intl-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957482" comment="php-ldap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957483" comment="php-mbstring-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957484" comment="php-mysqlnd-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957485" comment="php-odbc-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957486" comment="php-opcache-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957487" comment="php-pdo-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957488" comment="php-pecl-apcu-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957489" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957490" comment="php-pecl-rrd-2.0.3-4.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957491" comment="php-pecl-xdebug3-3.2.2-2.module+el9.4.0+20796+bd4564df is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957492" comment="php-pecl-zip-1.22.3-1.module+el9.4.0+20748+b46899d2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957493" comment="php-pgsql-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957494" comment="php-process-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957495" comment="php-snmp-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957496" comment="php-soap-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957497" comment="php-xml-8.2.25-1.module+el9.5.0+22477+5fdac06d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9050" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9050" ref_url="https://www.suse.com/security/cve/CVE-2024-9050" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8353" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000156.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8357" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000234.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9555" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000561.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14422-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CEIZP2JFDFLF4SCP5AM7FOG6C2LBQOEA/" source="SUSE-SU"/>
    <description>
    A flaw was found in the libreswan client plugin for NetworkManager (NetkworkManager-libreswan), where it fails to properly sanitize the VPN configuration from the local unprivileged user. In this configuration, composed by a key-value format, the plugin fails to escape special characters, leading the application to interpret values as keys. One of the most critical parameters that could be abused by a malicious user is the `leftupdown`key. This key takes an executable command as a value and is used to specify what executes as a callback in NetworkManager-libreswan to retrieve configuration settings back to NetworkManager. As NetworkManager uses Polkit to allow an unprivileged user to control the system's network configuration, a malicious actor could achieve local privilege escalation and potential code execution as root in the targeted machine by creating a malicious configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9050/">CVE-2024-9050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9050">CVE-2024-9050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231331">SUSE bug 1231331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1232040">SUSE bug 1232040</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953941" comment="NetworkManager-libreswan-1.2.22-4.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953942" comment="NetworkManager-libreswan-gnome-1.2.22-4.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9287" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9287" ref_url="https://www.suse.com/security/cve/CVE-2024-9287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10779" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000637.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10978" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000663.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10979" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000660.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10980" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:10983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000664.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:11111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000668.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3924-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3929-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14427-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJFBQRJPO2RKRNCFXRZ7LBNZOD2J2TFB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14428-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZYTLEATTD6AS6C3WNEDFOJPHEPEHGVZC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14430-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYTPGEX77JK2ZE34EQ72QVIKUVEAF7IU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14455-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOVJMCY4KA267OTEHQVHGXZYG3ZDFHLF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14456-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WTLWSKEJY5ZQSVBIFJAPHI42KG6XZRAO/" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-12-13"/>
	<updated date="2025-12-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Green" href="https://www.suse.com/security/cve/CVE-2024-9287/">CVE-2024-9287 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9287">CVE-2024-9287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232241">SUSE bug 1232241</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009957530" comment="python-unversioned-command-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957531" comment="python3-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957532" comment="python3-debug-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957533" comment="python3-devel-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957534" comment="python3-idle-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957535" comment="python3-libs-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957536" comment="python3-test-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957537" comment="python3-tkinter-3.9.21-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958268" comment="python3.11-3.11.9-7.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958269" comment="python3.11-debug-3.11.9-7.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958270" comment="python3.11-devel-3.11.9-7.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958271" comment="python3.11-idle-3.11.9-7.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958272" comment="python3.11-libs-3.11.9-7.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958273" comment="python3.11-test-3.11.9-7.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009958274" comment="python3.11-tkinter-3.11.9-7.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957523" comment="python3.12-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957524" comment="python3.12-debug-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957525" comment="python3.12-devel-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957526" comment="python3.12-idle-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957527" comment="python3.12-libs-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957528" comment="python3.12-test-3.12.5-2.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009957529" comment="python3.12-tkinter-3.12.5-2.el9_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9341</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9341" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9341" ref_url="https://www.suse.com/security/cve/CVE-2024-9341" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8112" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8846" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SH4NME65WLYSIYI2S73LD7TJVOL5XNUR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4W2RFBCCEXD7IMZ5BZTZHSWFFZ7ALKG6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/" source="SUSE-SU"/>
    <description>
    A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-15"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N" cvss4="5.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9341/">CVE-2024-9341 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9341">CVE-2024-9341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231230">SUSE bug 1231230</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953901" comment="buildah-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953902" comment="buildah-tests-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953894" comment="podman-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953895" comment="podman-docker-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953896" comment="podman-plugins-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953897" comment="podman-remote-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953898" comment="podman-tests-5.2.2-9.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9355</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9355" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9355" ref_url="https://www.suse.com/security/cve/CVE-2024-9355" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7550" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000108.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8327" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000150.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8678" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000159.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000193.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7256" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Golang FIPS OpenSSL. This flaw allows a malicious user to randomly cause an uninitialized buffer length variable with a zeroed buffer to be returned in FIPS mode. It may also be possible to force a false positive match between non-equal hashes when comparing a trusted computed hmac sum to an untrusted input sum if an attacker can send a zeroed buffer in place of a pre-computed sum.   It is also possible to force a derived key to be all zeros instead of an unpredictable value.   This may have follow-on implications for the Go TLS stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-04"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-9355/">CVE-2024-9355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9355">CVE-2024-9355 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983915" comment="git-lfs-3.6.1-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945478" comment="go-toolset-1.21.13-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945479" comment="golang-1.21.13-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945480" comment="golang-bin-1.21.13-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945481" comment="golang-docs-1.21.13-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945482" comment="golang-misc-1.21.13-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945483" comment="golang-src-1.21.13-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945484" comment="golang-tests-1.21.13-4.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950363" comment="grafana-9.2.10-19.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009950364" comment="grafana-selinux-9.2.10-19.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9392" ref_url="https://www.suse.com/security/cve/CVE-2024-9392" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A compromised content process could have allowed for the arbitrary loading of cross-origin pages. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Firefox ESR &lt; 115.16, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9392/">CVE-2024-9392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9392">CVE-2024-9392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945529" comment="firefox-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945530" comment="firefox-x11-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9393" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9393" ref_url="https://www.suse.com/security/cve/CVE-2024-9393" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://pdf.js` origin.  This could allow them to access cross-origin PDF content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Firefox ESR &lt; 115.16, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9393/">CVE-2024-9393 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9393">CVE-2024-9393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945529" comment="firefox-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945530" comment="firefox-x11-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9394</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9394" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9394" ref_url="https://www.suse.com/security/cve/CVE-2024-9394" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://devtools` origin.  This could allow them to access cross-origin JSON content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Firefox ESR &lt; 115.16, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9394/">CVE-2024-9394 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9394">CVE-2024-9394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945529" comment="firefox-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945530" comment="firefox-x11-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9396" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9396" ref_url="https://www.suse.com/security/cve/CVE-2024-9396" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    It is currently unknown if this issue is exploitable but a condition may arise where the structured clone of certain objects could lead to memory corruption. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9396/">CVE-2024-9396 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9396">CVE-2024-9396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9397" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9397" ref_url="https://www.suse.com/security/cve/CVE-2024-9397" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A missing delay in directory upload UI could have made it possible for an attacker to trick a user into granting permission via clickjacking. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9397/">CVE-2024-9397 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9397">CVE-2024-9397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9398</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9398" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9398" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9398" ref_url="https://www.suse.com/security/cve/CVE-2024-9398" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9398/">CVE-2024-9398 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9398">CVE-2024-9398 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9399</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9399" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9399" ref_url="https://www.suse.com/security/cve/CVE-2024-9399" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A website configured to initiate a specially crafted WebTransport session could crash the Firefox process leading to a denial of service condition. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9399/">CVE-2024-9399 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9399">CVE-2024-9399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9400</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9400" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9400" ref_url="https://www.suse.com/security/cve/CVE-2024-9400" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    A potential memory corruption vulnerability could be triggered if an attacker had the ability to trigger an OOM at a specific moment during JIT compilation. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9400/">CVE-2024-9400 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9400">CVE-2024-9400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9401</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9401" ref_url="https://www.suse.com/security/cve/CVE-2024-9401" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 130, Firefox ESR 115.15, Firefox ESR 128.2, and Thunderbird 128.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Firefox ESR &lt; 115.16, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9401/">CVE-2024-9401 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9401">CVE-2024-9401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945529" comment="firefox-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945530" comment="firefox-x11-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9402</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9402" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9402" ref_url="https://www.suse.com/security/cve/CVE-2024-9402" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7505" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 130, Firefox ESR 128.2, and Thunderbird 128.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 131, Firefox ESR &lt; 128.3, Thunderbird &lt; 128.3, and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9402/">CVE-2024-9402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9402">CVE-2024-9402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009945529" comment="firefox-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945530" comment="firefox-x11-128.3.0-1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9403" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9403" ref_url="https://www.suse.com/security/cve/CVE-2024-9403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000118.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14385-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4JP3GXA5W44ZPKFH3YRRO2ZB77WGE4V/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 130. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 131 and Thunderbird &lt; 131.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-05"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9403/">CVE-2024-9403 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9403">CVE-2024-9403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230979">SUSE bug 1230979</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009945531" comment="thunderbird-128.3.0-1.el9_4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9407</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9407" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9407" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9407" ref_url="https://www.suse.com/security/cve/CVE-2024-9407" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8846" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9051" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14388-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SH4NME65WLYSIYI2S73LD7TJVOL5XNUR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14390-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4W2RFBCCEXD7IMZ5BZTZHSWFFZ7ALKG6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/" source="SUSE-SU"/>
    <description>
    A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9407/">CVE-2024-9407 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9407">CVE-2024-9407 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231208">SUSE bug 1231208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953901" comment="buildah-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953902" comment="buildah-tests-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953894" comment="podman-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953895" comment="podman-docker-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953896" comment="podman-plugins-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953897" comment="podman-remote-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953898" comment="podman-tests-5.2.2-9.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9632</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9632" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9632" ref_url="https://www.suse.com/security/cve/CVE-2024-9632" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10090" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000572.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8798" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000182.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9540" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000226.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9901" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-December/000731.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019762.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14466-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TM2IXKHQAG2LGZAB7MW6VRZJ235MJKFH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14467-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B5QVOIWQHHCYNLWGG5A6LO6BYXLGP7FG/" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-22"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9632/">CVE-2024-9632 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-9632">CVE-2024-9632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231565">SUSE bug 1231565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953522" comment="tigervnc-1.14.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953523" comment="tigervnc-icons-1.14.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953524" comment="tigervnc-license-1.14.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953525" comment="tigervnc-selinux-1.14.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953526" comment="tigervnc-server-1.14.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953527" comment="tigervnc-server-minimal-1.14.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953528" comment="tigervnc-server-module-1.14.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9675" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9675" ref_url="https://www.suse.com/security/cve/CVE-2024-9675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:8563" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8846" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9051" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3728-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0350-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3GBL6IN35EDC2YQIKBPTX7XQQ67KRPAM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14405-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WAOHB23MPYVTOWAWBVXUG2DJFLZAIBD7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14409-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3BPZKWEB45TSWJ6NPKC7CTIJ2DSDXEQT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14447-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XTEQAM75LF5DZCFX3MOH4IT3DWP5ZTL6/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9675/">CVE-2024-9675 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9675">CVE-2024-9675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231499">SUSE bug 1231499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953901" comment="buildah-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953902" comment="buildah-tests-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953894" comment="podman-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953895" comment="podman-docker-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953896" comment="podman-plugins-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953897" comment="podman-remote-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953898" comment="podman-tests-5.2.2-9.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9676</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9676" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9676" ref_url="https://www.suse.com/security/cve/CVE-2024-9676" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:10289" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000617.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9051" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3988-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:4303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021231.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14420-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZNUMAPSPUJ4JOCPEUY4VGKUCILGH4O7H/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14562-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KRGDO26PMNXRU3LV645D4AE5XHP53LSM/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-11-12"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9676/">CVE-2024-9676 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9676">CVE-2024-9676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231698">SUSE bug 1231698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1231785">SUSE bug 1231785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953901" comment="buildah-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953902" comment="buildah-tests-1.37.5-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953894" comment="podman-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953895" comment="podman-docker-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953896" comment="podman-plugins-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953897" comment="podman-remote-5.2.2-9.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953898" comment="podman-tests-5.2.2-9.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20249680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-9680</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-9680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-9680" ref_url="https://www.suse.com/security/cve/CVE-2024-9680" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:7958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000128.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:7977" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000127.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:8025" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-October/000130.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9552" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000503.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2024:9554" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-October/019660.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14393-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T5UD5DAIFOWXHQHPLPDOEEDOCIYMRZW4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14394-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WA4S63AHEQ76BYNIIRG5P4KRDT5XUJR4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14397-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5WJZTJUW6SGUZACDHTJJMLUGZL7BRNQV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14572-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3HI2RC7AJAHY74Q6MK7GNGWU6TITB22V/" source="SUSE-SU"/>
    <description>
    An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox &lt; 131.0.2, Firefox ESR &lt; 128.3.1, Firefox ESR &lt; 115.16.1, Thunderbird &lt; 131.0.1, Thunderbird &lt; 128.3.1, and Thunderbird &lt; 115.16.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2024-10-13"/>
	<updated date="2025-02-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-9680/">CVE-2024-9680 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-9680">CVE-2024-9680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1231413">SUSE bug 1231413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953939" comment="firefox-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953940" comment="firefox-x11-128.4.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953934" comment="thunderbird-128.4.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0237</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0237" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0237" ref_url="https://www.suse.com/security/cve/CVE-2025-0237" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKLU2J7H4YLXHVAZAROZZL5CYOTGOZOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GF5AMCD43NSPZ373YVOYZALNIIIRXFV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2BXA7IOGMK76W2OZSY2IVZEHTAOGRVP/" source="SUSE-SU"/>
    <description>
    The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0237/">CVE-2025-0237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0237">CVE-2025-0237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234991">SUSE bug 1234991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960005" comment="firefox-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960006" comment="firefox-x11-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960007" comment="thunderbird-128.6.0-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0238</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0238" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0238" ref_url="https://www.suse.com/security/cve/CVE-2025-0238" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKLU2J7H4YLXHVAZAROZZL5CYOTGOZOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GF5AMCD43NSPZ373YVOYZALNIIIRXFV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2BXA7IOGMK76W2OZSY2IVZEHTAOGRVP/" source="SUSE-SU"/>
    <description>
    Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Firefox ESR 115.19, Thunderbird 134, and Thunderbird 128.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-0238/">CVE-2025-0238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0238">CVE-2025-0238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234991">SUSE bug 1234991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960005" comment="firefox-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960006" comment="firefox-x11-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960007" comment="thunderbird-128.6.0-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0239</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0239" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0239" ref_url="https://www.suse.com/security/cve/CVE-2025-0239" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKLU2J7H4YLXHVAZAROZZL5CYOTGOZOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GF5AMCD43NSPZ373YVOYZALNIIIRXFV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2BXA7IOGMK76W2OZSY2IVZEHTAOGRVP/" source="SUSE-SU"/>
    <description>
    When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0239/">CVE-2025-0239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0239">CVE-2025-0239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234991">SUSE bug 1234991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960005" comment="firefox-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960006" comment="firefox-x11-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960007" comment="thunderbird-128.6.0-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0240" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0240" ref_url="https://www.suse.com/security/cve/CVE-2025-0240" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKLU2J7H4YLXHVAZAROZZL5CYOTGOZOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GF5AMCD43NSPZ373YVOYZALNIIIRXFV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2BXA7IOGMK76W2OZSY2IVZEHTAOGRVP/" source="SUSE-SU"/>
    <description>
    Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0240/">CVE-2025-0240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0240">CVE-2025-0240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234991">SUSE bug 1234991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960005" comment="firefox-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960006" comment="firefox-x11-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960007" comment="thunderbird-128.6.0-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0241</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0241" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0241" ref_url="https://www.suse.com/security/cve/CVE-2025-0241" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKLU2J7H4YLXHVAZAROZZL5CYOTGOZOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GF5AMCD43NSPZ373YVOYZALNIIIRXFV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2BXA7IOGMK76W2OZSY2IVZEHTAOGRVP/" source="SUSE-SU"/>
    <description>
    When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0241/">CVE-2025-0241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0241">CVE-2025-0241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234991">SUSE bug 1234991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960005" comment="firefox-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960006" comment="firefox-x11-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960007" comment="thunderbird-128.6.0-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0242</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0242" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0242" ref_url="https://www.suse.com/security/cve/CVE-2025-0242" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000751.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0147" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000753.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKLU2J7H4YLXHVAZAROZZL5CYOTGOZOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GF5AMCD43NSPZ373YVOYZALNIIIRXFV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2BXA7IOGMK76W2OZSY2IVZEHTAOGRVP/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Firefox ESR 115.19, Thunderbird 134, and Thunderbird 128.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0242/">CVE-2025-0242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0242">CVE-2025-0242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234991">SUSE bug 1234991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960005" comment="firefox-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960006" comment="firefox-x11-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960007" comment="thunderbird-128.6.0-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0243</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0243" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0243" ref_url="https://www.suse.com/security/cve/CVE-2025-0243" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000752.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000751.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0147" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000753.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020098.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14619-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKLU2J7H4YLXHVAZAROZZL5CYOTGOZOX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14630-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GF5AMCD43NSPZ373YVOYZALNIIIRXFV4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14648-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Q2BXA7IOGMK76W2OZSY2IVZEHTAOGRVP/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-0243/">CVE-2025-0243 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0243">CVE-2025-0243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234991">SUSE bug 1234991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009960005" comment="firefox-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960006" comment="firefox-x11-128.6.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009960007" comment="thunderbird-128.6.0-3.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0395</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0395" ref_url="https://www.suse.com/security/cve/CVE-2025-0395" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4244" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0395/">CVE-2025-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236282">SUSE bug 1236282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976563" comment="glibc-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976564" comment="glibc-all-langpacks-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976565" comment="glibc-benchtests-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976566" comment="glibc-common-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976567" comment="glibc-devel-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976568" comment="glibc-doc-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976569" comment="glibc-gconv-extra-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976570" comment="glibc-headers-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976571" comment="glibc-langpack-aa-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976572" comment="glibc-langpack-af-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976573" comment="glibc-langpack-agr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976574" comment="glibc-langpack-ak-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976575" comment="glibc-langpack-am-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976576" comment="glibc-langpack-an-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976577" comment="glibc-langpack-anp-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976578" comment="glibc-langpack-ar-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976579" comment="glibc-langpack-as-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976580" comment="glibc-langpack-ast-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976581" comment="glibc-langpack-ayc-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976582" comment="glibc-langpack-az-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976583" comment="glibc-langpack-be-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976584" comment="glibc-langpack-bem-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976585" comment="glibc-langpack-ber-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976586" comment="glibc-langpack-bg-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976587" comment="glibc-langpack-bhb-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976588" comment="glibc-langpack-bho-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976589" comment="glibc-langpack-bi-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976590" comment="glibc-langpack-bn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976591" comment="glibc-langpack-bo-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976592" comment="glibc-langpack-br-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976593" comment="glibc-langpack-brx-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976594" comment="glibc-langpack-bs-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976595" comment="glibc-langpack-byn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976596" comment="glibc-langpack-ca-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976597" comment="glibc-langpack-ce-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976598" comment="glibc-langpack-chr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976599" comment="glibc-langpack-ckb-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976600" comment="glibc-langpack-cmn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976601" comment="glibc-langpack-crh-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976602" comment="glibc-langpack-cs-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976603" comment="glibc-langpack-csb-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976604" comment="glibc-langpack-cv-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976605" comment="glibc-langpack-cy-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976606" comment="glibc-langpack-da-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976607" comment="glibc-langpack-de-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976608" comment="glibc-langpack-doi-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976609" comment="glibc-langpack-dsb-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976610" comment="glibc-langpack-dv-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976611" comment="glibc-langpack-dz-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976612" comment="glibc-langpack-el-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976613" comment="glibc-langpack-en-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976614" comment="glibc-langpack-eo-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976615" comment="glibc-langpack-es-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976616" comment="glibc-langpack-et-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976617" comment="glibc-langpack-eu-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976618" comment="glibc-langpack-fa-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976619" comment="glibc-langpack-ff-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976620" comment="glibc-langpack-fi-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976621" comment="glibc-langpack-fil-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976622" comment="glibc-langpack-fo-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976623" comment="glibc-langpack-fr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976624" comment="glibc-langpack-fur-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976625" comment="glibc-langpack-fy-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976626" comment="glibc-langpack-ga-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976627" comment="glibc-langpack-gd-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976628" comment="glibc-langpack-gez-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976629" comment="glibc-langpack-gl-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976630" comment="glibc-langpack-gu-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976631" comment="glibc-langpack-gv-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976632" comment="glibc-langpack-ha-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976633" comment="glibc-langpack-hak-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976634" comment="glibc-langpack-he-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976635" comment="glibc-langpack-hi-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976636" comment="glibc-langpack-hif-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976637" comment="glibc-langpack-hne-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976638" comment="glibc-langpack-hr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976639" comment="glibc-langpack-hsb-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976640" comment="glibc-langpack-ht-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976641" comment="glibc-langpack-hu-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976642" comment="glibc-langpack-hy-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976643" comment="glibc-langpack-ia-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976644" comment="glibc-langpack-id-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976645" comment="glibc-langpack-ig-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976646" comment="glibc-langpack-ik-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976647" comment="glibc-langpack-is-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976648" comment="glibc-langpack-it-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976649" comment="glibc-langpack-iu-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976650" comment="glibc-langpack-ja-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976651" comment="glibc-langpack-ka-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976652" comment="glibc-langpack-kab-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976653" comment="glibc-langpack-kk-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976654" comment="glibc-langpack-kl-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976655" comment="glibc-langpack-km-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976656" comment="glibc-langpack-kn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976657" comment="glibc-langpack-ko-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976658" comment="glibc-langpack-kok-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976659" comment="glibc-langpack-ks-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976660" comment="glibc-langpack-ku-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976661" comment="glibc-langpack-kw-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976662" comment="glibc-langpack-ky-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976663" comment="glibc-langpack-lb-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976664" comment="glibc-langpack-lg-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976665" comment="glibc-langpack-li-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976666" comment="glibc-langpack-lij-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976667" comment="glibc-langpack-ln-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976668" comment="glibc-langpack-lo-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976669" comment="glibc-langpack-lt-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976670" comment="glibc-langpack-lv-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976671" comment="glibc-langpack-lzh-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976672" comment="glibc-langpack-mag-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976673" comment="glibc-langpack-mai-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976674" comment="glibc-langpack-mfe-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976675" comment="glibc-langpack-mg-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976676" comment="glibc-langpack-mhr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976677" comment="glibc-langpack-mi-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976678" comment="glibc-langpack-miq-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976679" comment="glibc-langpack-mjw-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976680" comment="glibc-langpack-mk-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976681" comment="glibc-langpack-ml-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976682" comment="glibc-langpack-mn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976683" comment="glibc-langpack-mni-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976684" comment="glibc-langpack-mnw-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976685" comment="glibc-langpack-mr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976686" comment="glibc-langpack-ms-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976687" comment="glibc-langpack-mt-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976688" comment="glibc-langpack-my-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976689" comment="glibc-langpack-nan-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976690" comment="glibc-langpack-nb-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976691" comment="glibc-langpack-nds-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976692" comment="glibc-langpack-ne-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976693" comment="glibc-langpack-nhn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976694" comment="glibc-langpack-niu-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976695" comment="glibc-langpack-nl-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976696" comment="glibc-langpack-nn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976697" comment="glibc-langpack-nr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976698" comment="glibc-langpack-nso-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976699" comment="glibc-langpack-oc-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976700" comment="glibc-langpack-om-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976701" comment="glibc-langpack-or-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976702" comment="glibc-langpack-os-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976703" comment="glibc-langpack-pa-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976704" comment="glibc-langpack-pap-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976705" comment="glibc-langpack-pl-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976706" comment="glibc-langpack-ps-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976707" comment="glibc-langpack-pt-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976708" comment="glibc-langpack-quz-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976709" comment="glibc-langpack-raj-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976710" comment="glibc-langpack-ro-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976711" comment="glibc-langpack-ru-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976712" comment="glibc-langpack-rw-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976713" comment="glibc-langpack-sa-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976714" comment="glibc-langpack-sah-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976715" comment="glibc-langpack-sat-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976716" comment="glibc-langpack-sc-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976717" comment="glibc-langpack-sd-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976718" comment="glibc-langpack-se-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976719" comment="glibc-langpack-sgs-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976720" comment="glibc-langpack-shn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976721" comment="glibc-langpack-shs-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976722" comment="glibc-langpack-si-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976723" comment="glibc-langpack-sid-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976724" comment="glibc-langpack-sk-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976725" comment="glibc-langpack-sl-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976726" comment="glibc-langpack-sm-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976727" comment="glibc-langpack-so-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976728" comment="glibc-langpack-sq-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976729" comment="glibc-langpack-sr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976730" comment="glibc-langpack-ss-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976731" comment="glibc-langpack-st-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976732" comment="glibc-langpack-sv-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976733" comment="glibc-langpack-sw-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976734" comment="glibc-langpack-szl-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976735" comment="glibc-langpack-ta-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976736" comment="glibc-langpack-tcy-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976737" comment="glibc-langpack-te-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976738" comment="glibc-langpack-tg-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976739" comment="glibc-langpack-th-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976740" comment="glibc-langpack-the-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976741" comment="glibc-langpack-ti-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976742" comment="glibc-langpack-tig-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976743" comment="glibc-langpack-tk-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976744" comment="glibc-langpack-tl-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976745" comment="glibc-langpack-tn-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976746" comment="glibc-langpack-to-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976747" comment="glibc-langpack-tpi-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976748" comment="glibc-langpack-tr-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976749" comment="glibc-langpack-ts-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976750" comment="glibc-langpack-tt-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976751" comment="glibc-langpack-ug-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976752" comment="glibc-langpack-uk-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976753" comment="glibc-langpack-unm-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976754" comment="glibc-langpack-ur-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976755" comment="glibc-langpack-uz-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976756" comment="glibc-langpack-ve-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976757" comment="glibc-langpack-vi-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976758" comment="glibc-langpack-wa-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976759" comment="glibc-langpack-wae-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976760" comment="glibc-langpack-wal-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976761" comment="glibc-langpack-wo-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976762" comment="glibc-langpack-xh-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976763" comment="glibc-langpack-yi-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976764" comment="glibc-langpack-yo-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976765" comment="glibc-langpack-yue-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976766" comment="glibc-langpack-yuw-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976767" comment="glibc-langpack-zh-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976768" comment="glibc-langpack-zu-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976769" comment="glibc-locale-source-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976770" comment="glibc-minimal-langpack-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976771" comment="glibc-nss-devel-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976772" comment="glibc-static-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976773" comment="glibc-utils-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976774" comment="libnsl-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976775" comment="nscd-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976776" comment="nss_db-2.34-125.el9_5.8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976777" comment="nss_hesiod-2.34-125.el9_5.8 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0510</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0510" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0510" ref_url="https://www.suse.com/security/cve/CVE-2025-0510" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    Thunderbird displayed an incorrect sender address if the From field of an email used the invalid group name syntax that is described in CVE-2024-49040. This vulnerability was fixed in Thunderbird 128.7 and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-0510/">CVE-2025-0510 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0510">CVE-2025-0510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0622</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0622" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0622" ref_url="https://www.suse.com/security/cve/CVE-2025-0622" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0622/">CVE-2025-0622 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0622">CVE-2025-0622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236317">SUSE bug 1236317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0624</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0624" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0624" ref_url="https://www.suse.com/security/cve/CVE-2025-0624" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001028.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000970.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3367" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/001004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-10-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-0624/">CVE-2025-0624 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0624">CVE-2025-0624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236316">SUSE bug 1236316</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968429" comment="grub2-common-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968430" comment="grub2-efi-x64-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968431" comment="grub2-efi-x64-cdboot-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968432" comment="grub2-efi-x64-modules-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968433" comment="grub2-pc-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968434" comment="grub2-pc-modules-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968435" comment="grub2-tools-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968436" comment="grub2-tools-efi-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968437" comment="grub2-tools-extra-2.06-94.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968438" comment="grub2-tools-minimal-2.06-94.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0677</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0677" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0677" ref_url="https://www.suse.com/security/cve/CVE-2025-0677" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0677/">CVE-2025-0677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0677">CVE-2025-0677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237002">SUSE bug 1237002</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0690" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0690" ref_url="https://www.suse.com/security/cve/CVE-2025-0690" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6990" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20511-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14822-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ASOEHBP5LS2I6OPV4KMUZIY2AF7IGH4E/" source="SUSE-SU"/>
    <description>
    The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-31"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-0690/">CVE-2025-0690 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0690">CVE-2025-0690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237012">SUSE bug 1237012</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984827" comment="grub2-common-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984828" comment="grub2-efi-x64-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984829" comment="grub2-efi-x64-cdboot-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984830" comment="grub2-efi-x64-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984831" comment="grub2-pc-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984832" comment="grub2-pc-modules-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984833" comment="grub2-tools-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984834" comment="grub2-tools-efi-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984835" comment="grub2-tools-extra-2.06-104.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984836" comment="grub2-tools-minimal-2.06-104.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0938" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0938" ref_url="https://www.suse.com/security/cve/CVE-2025-0938" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6977" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001281.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7107" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001293.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001294.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5588" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0406-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQJAIMSQWTMDLGVA5OBWBXBGN3VUZIWZ/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-February/038350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0553-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040141.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14751-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U2KVRPUQU3BIECMQXUM7JPONC6ARC23S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/U6UNOYCMZ7MBRSJ77HSUWMVEL347MVK2/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14759-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6C2LBMYMTGGG6MLAULA4VOLNBBVRPWRY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14760-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7NX5AR5RGDPJDJFRYBUSRNLERPCINRWF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14761-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/APT6NEQOKF6AA6ZKZAMWYFX5FHCH6Y2T/" source="SUSE-SU"/>
    <description>
    The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0938/">CVE-2025-0938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0938">CVE-2025-0938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236705">SUSE bug 1236705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983856" comment="python-unversioned-command-3.9.21-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983857" comment="python3-3.9.21-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983858" comment="python3-debug-3.9.21-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983859" comment="python3-devel-3.9.21-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983860" comment="python3-idle-3.9.21-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983861" comment="python3-libs-3.9.21-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983862" comment="python3-test-3.9.21-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983863" comment="python3-tkinter-3.9.21-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983891" comment="python3.11-3.11.11-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983892" comment="python3.11-debug-3.11.11-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983893" comment="python3.11-devel-3.11.11-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983894" comment="python3.11-idle-3.11.11-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983895" comment="python3.11-libs-3.11.11-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983896" comment="python3.11-test-3.11.11-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983897" comment="python3.11-tkinter-3.11.11-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983884" comment="python3.12-3.12.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983885" comment="python3.12-debug-3.12.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983886" comment="python3.12-devel-3.12.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983887" comment="python3.12-idle-3.12.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983888" comment="python3.12-libs-3.12.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983889" comment="python3.12-test-3.12.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983890" comment="python3.12-tkinter-3.12.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1009</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1009" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1009" ref_url="https://www.suse.com/security/cve/CVE-2025-1009" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000862.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKL4Q4JIJAFIP47G3Y7MQZ2RNDDMCC33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1009/">CVE-2025-1009 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1009">CVE-2025-1009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1010</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1010" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1010" ref_url="https://www.suse.com/security/cve/CVE-2025-1010" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000862.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKL4Q4JIJAFIP47G3Y7MQZ2RNDDMCC33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-1010/">CVE-2025-1010 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1010">CVE-2025-1010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1011</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1011" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1011" ref_url="https://www.suse.com/security/cve/CVE-2025-1011" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000862.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKL4Q4JIJAFIP47G3Y7MQZ2RNDDMCC33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution. This vulnerability was fixed in Firefox 135, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1011/">CVE-2025-1011 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1011">CVE-2025-1011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1012" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1012" ref_url="https://www.suse.com/security/cve/CVE-2025-1012" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000862.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKL4Q4JIJAFIP47G3Y7MQZ2RNDDMCC33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    A race during concurrent delazification could have led to a use-after-free. This vulnerability was fixed in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1012/">CVE-2025-1012 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1012">CVE-2025-1012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1013" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1013" ref_url="https://www.suse.com/security/cve/CVE-2025-1013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000862.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKL4Q4JIJAFIP47G3Y7MQZ2RNDDMCC33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    A race condition could have led to private browsing tabs being opened in normal browsing windows. This could have resulted in a potential privacy leak. This vulnerability was fixed in Firefox 135, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-1013/">CVE-2025-1013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1013">CVE-2025-1013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1014" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1014" ref_url="https://www.suse.com/security/cve/CVE-2025-1014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000862.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKL4Q4JIJAFIP47G3Y7MQZ2RNDDMCC33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    Certificate length was not properly checked when added to a certificate store. In practice only trusted data was processed. This vulnerability was fixed in Firefox 135, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1014/">CVE-2025-1014 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1014">CVE-2025-1014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1015" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1015" ref_url="https://www.suse.com/security/cve/CVE-2025-1015" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability was fixed in Thunderbird 128.7 and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1015/">CVE-2025-1015 at SUSE</cve>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1015">CVE-2025-1015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10158" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10158" ref_url="https://www.suse.com/security/cve/CVE-2025-10158" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6390" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003261.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0069-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023752.html" source="SUSE-SU"/>
    <description>
    A malicious client acting as the receiver of an rsync file transfer can trigger an out of bounds read of a heap based buffer, via a negative array index. The 

malicious 

rsync client requires at least read access to the remote rsync module in order to trigger the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-10158/">CVE-2025-10158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10158">CVE-2025-10158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254441">SUSE bug 1254441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055908" comment="rsync-3.2.5-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055909" comment="rsync-daemon-3.2.5-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055910" comment="rsync-rrsync-3.2.5-3.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1016" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1016" ref_url="https://www.suse.com/security/cve/CVE-2025-1016" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000862.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKL4Q4JIJAFIP47G3Y7MQZ2RNDDMCC33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1016/">CVE-2025-1016 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1016">CVE-2025-1016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1017</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1017" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1017" ref_url="https://www.suse.com/security/cve/CVE-2025-1017" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000862.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1292" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0405-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020302.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14730-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKL4Q4JIJAFIP47G3Y7MQZ2RNDDMCC33/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14731-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MP4SZWYCKRN2DG7QYUK64Y4TXD7ABUH5/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 135, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-1017/">CVE-2025-1017 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1017">CVE-2025-1017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236539">SUSE bug 1236539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009963164" comment="firefox-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963165" comment="firefox-x11-128.7.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963166" comment="thunderbird-128.7.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10527" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-21"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018753" comment="firefox-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018754" comment="firefox-x11-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018755" comment="thunderbird-140.3.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10528" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-21"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018753" comment="firefox-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018754" comment="firefox-x11-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018755" comment="thunderbird-140.3.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10529" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the Layout component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-21"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018753" comment="firefox-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018754" comment="firefox-x11-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018755" comment="thunderbird-140.3.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10532</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10532" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the JavaScript: GC component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-21"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018753" comment="firefox-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018754" comment="firefox-x11-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018755" comment="thunderbird-140.3.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10533" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the SVG component. This vulnerability was fixed in Firefox 143, Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-21"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018753" comment="firefox-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018754" comment="firefox-x11-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018755" comment="thunderbird-140.3.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10536" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Information disclosure in the Networking: Cache component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-21"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018753" comment="firefox-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018754" comment="firefox-x11-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018755" comment="thunderbird-140.3.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10537</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10537" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-21"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018753" comment="firefox-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018754" comment="firefox-x11-140.3.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018755" comment="thunderbird-140.3.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10920" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10920" ref_url="https://www.suse.com/security/cve/CVE-2025-10920" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
    <description>
    GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ICNS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27684.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10920/">CVE-2025-10920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10920">CVE-2025-10920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250495">SUSE bug 1250495</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054268" comment="gimp-3.0.4-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054269" comment="gimp-libs-3.0.4-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10921" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10921" ref_url="https://www.suse.com/security/cve/CVE-2025-10921" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023536.html" source="SUSE-SU"/>
    <description>
    GIMP HDR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of HDR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27803.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10921/">CVE-2025-10921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10921">CVE-2025-10921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250496">SUSE bug 1250496</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054268" comment="gimp-3.0.4-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054269" comment="gimp-libs-3.0.4-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10922" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10922" ref_url="https://www.suse.com/security/cve/CVE-2025-10922" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023447.html" source="SUSE-SU"/>
    <description>
    GIMP DCM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27863.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10922/">CVE-2025-10922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10922">CVE-2025-10922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250497">SUSE bug 1250497</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054268" comment="gimp-3.0.4-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054269" comment="gimp-libs-3.0.4-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10923</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10923" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10923" ref_url="https://www.suse.com/security/cve/CVE-2025-10923" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
    <description>
    GIMP WBMP File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of WBMP files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27878.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10923/">CVE-2025-10923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10923">CVE-2025-10923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250498">SUSE bug 1250498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054268" comment="gimp-3.0.4-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054269" comment="gimp-libs-3.0.4-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10924</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10924" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10924" ref_url="https://www.suse.com/security/cve/CVE-2025-10924" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
    <description>
    GIMP FF File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of FF files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27836.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10924/">CVE-2025-10924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10924">CVE-2025-10924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250499">SUSE bug 1250499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054268" comment="gimp-3.0.4-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054269" comment="gimp-libs-3.0.4-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10925" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10925" ref_url="https://www.suse.com/security/cve/CVE-2025-10925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
    <description>
    GIMP ILBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ILBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27793.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10925/">CVE-2025-10925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10925">CVE-2025-10925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250501">SUSE bug 1250501</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054268" comment="gimp-3.0.4-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054269" comment="gimp-libs-3.0.4-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10934" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10934" ref_url="https://www.suse.com/security/cve/CVE-2025-10934" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024492.html" source="SUSE-SU"/>
    <description>
    GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27823.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10934/">CVE-2025-10934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10934">CVE-2025-10934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252886">SUSE bug 1252886</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054268" comment="gimp-3.0.4-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054269" comment="gimp-libs-3.0.4-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1094" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1094" ref_url="https://www.suse.com/security/cve/CVE-2025-1094" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1737" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000890.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1738" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000886.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1740" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000911.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1742" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000891.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3978" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:00614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020456.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14807-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YK3EE7JIJVKOQGX76FWFAHQKDECBSJRT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14810-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DEQYP7JKCLUF4DB3FNI43RIPXVXQGCT7/" source="SUSE-SU"/>
    <description>
    Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-22"/>
	<updated date="2025-09-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1094/">CVE-2025-1094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1094">CVE-2025-1094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237093">SUSE bug 1237093</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965294" comment="libpq-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965295" comment="libpq-devel-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965296" comment="postgresql-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965297" comment="postgresql-contrib-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965298" comment="postgresql-docs-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965299" comment="postgresql-plperl-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965300" comment="postgresql-plpython3-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965301" comment="postgresql-pltcl-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965302" comment="postgresql-private-devel-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965303" comment="postgresql-private-libs-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965304" comment="postgresql-server-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965305" comment="postgresql-server-devel-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965306" comment="postgresql-static-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965307" comment="postgresql-test-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965308" comment="postgresql-test-rpm-macros-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965309" comment="postgresql-upgrade-13.20-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965310" comment="postgresql-upgrade-devel-13.20-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11021</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11021" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11021" ref_url="https://www.suse.com/security/cve/CVE-2025-11021" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19714" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20959" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw could result in unintended disclosure of memory contents, potentially exposing sensitive information from the process using libsoup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11021/">CVE-2025-11021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11021">CVE-2025-11021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054138" comment="libsoup-2.72.0-12.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054139" comment="libsoup-devel-2.72.0-12.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23336" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003145.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23343" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003144.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002321.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23400" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002336.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0052" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003180.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002412.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002417.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250632">SUSE bug 1250632</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054513" comment="binutils-2.35.2-67.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054514" comment="binutils-devel-2.35.2-67.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054515" comment="binutils-gold-2.35.2-67.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054502" comment="gcc-toolset-13-binutils-2.40-21.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054503" comment="gcc-toolset-13-binutils-devel-2.40-21.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054504" comment="gcc-toolset-13-binutils-gold-2.40-21.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054543" comment="gcc-toolset-14-binutils-2.41-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054544" comment="gcc-toolset-14-binutils-devel-2.41-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054545" comment="gcc-toolset-14-binutils-gold-2.41-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054546" comment="gcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054880" comment="gcc-toolset-15-binutils-2.44-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054881" comment="gcc-toolset-15-binutils-devel-2.44-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054882" comment="gcc-toolset-15-binutils-gold-2.44-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054883" comment="gcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11187</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11187" ref_url="https://www.suse.com/security/cve/CVE-2025-11187" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation
which can trigger a stack-based buffer overflow, invalid pointer or NULL
pointer dereference during MAC verification.

Impact summary: The stack buffer overflow or NULL pointer dereference may
cause a crash leading to Denial of Service for an application that parses
untrusted PKCS#12 files. The buffer overflow may also potentially enable
code execution depending on platform mitigations.

When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2
salt and keylength parameters from the file are used without validation.
If the value of keylength exceeds the size of the fixed stack buffer used
for the derived key (64 bytes), the key derivation will overflow the buffer.
The overflow length is attacker-controlled. Also, if the salt parameter is
not an OCTET STRING type this can lead to invalid or NULL pointer
dereference.

Exploiting this issue requires a user or application to process
a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted
PKCS#12 files in applications as they are usually used to store private
keys which are trusted by definition. For this reason the issue was assessed
as Moderate severity.

The FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as
PKCS#12 processing is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.

OpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do
not support PBMAC1 in PKCS#12.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11187/">CVE-2025-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11187">CVE-2025-11187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256829">SUSE bug 1256829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256878">SUSE bug 1256878</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11230" ref_url="https://www.suse.com/security/cve/CVE-2025-11230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03587-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023879.html" source="SUSE-SU"/>
    <description>
    Inefficient algorithm complexity in mjson in HAProxy allows remote attackers to cause a denial of service via specially crafted JSON requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11230/">CVE-2025-11230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11230">CVE-2025-11230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250983">SUSE bug 1250983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054216" comment="haproxy-2.8.14-1.el9_7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11277" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11277" ref_url="https://www.suse.com/security/cve/CVE-2025-11277" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19911" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003116.html" source="SUSE-SU"/>
    <description>
    A weakness has been identified in Open Asset Import Library Assimp 6.0.2. This affects the function Q3DImporter::InternReadFile of the file assimp/code/AssetLib/Q3D/Q3DLoader.cpp. Executing a manipulation can lead to heap-based buffer overflow. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11277/">CVE-2025-11277 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11277">CVE-2025-11277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251019">SUSE bug 1251019</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054152" comment="qt5-qt3d-5.15.9-2.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054153" comment="qt5-qt3d-devel-5.15.9-2.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054154" comment="qt5-qt3d-examples-5.15.9-2.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11561</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11561" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19610" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002175.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002540.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20954" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003082.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023724.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251827">SUSE bug 1251827</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054093" comment="libipa_hbac-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054094" comment="libsss_autofs-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054095" comment="libsss_certmap-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054096" comment="libsss_idmap-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054097" comment="libsss_nss_idmap-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054098" comment="libsss_nss_idmap-devel-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054099" comment="libsss_simpleifp-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054100" comment="libsss_sudo-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054101" comment="python3-libipa_hbac-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054102" comment="python3-libsss_nss_idmap-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054103" comment="python3-sss-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054104" comment="python3-sss-murmur-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054105" comment="python3-sssdconfig-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054106" comment="sssd-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054107" comment="sssd-ad-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054108" comment="sssd-client-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054109" comment="sssd-common-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054110" comment="sssd-common-pac-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054111" comment="sssd-dbus-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054112" comment="sssd-idp-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054113" comment="sssd-ipa-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054114" comment="sssd-kcm-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054115" comment="sssd-krb5-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054116" comment="sssd-krb5-common-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054117" comment="sssd-ldap-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054118" comment="sssd-nfs-idmap-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054119" comment="sssd-passkey-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054120" comment="sssd-polkit-rules-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054121" comment="sssd-proxy-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054122" comment="sssd-tools-2.9.7-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054123" comment="sssd-winbind-idmap-2.9.7-4.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11708</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11708" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    Use-after-free in MediaTrackGraphImpl::GetInstance(). This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021830" comment="firefox-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021831" comment="firefox-x11-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022848" comment="thunderbird-140.4.0-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11709" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021830" comment="firefox-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021831" comment="firefox-x11-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022848" comment="thunderbird-140.4.0-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11710" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021830" comment="firefox-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021831" comment="firefox-x11-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022848" comment="thunderbird-140.4.0-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11711" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021830" comment="firefox-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021831" comment="firefox-x11-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022848" comment="thunderbird-140.4.0-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11712" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021830" comment="firefox-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021831" comment="firefox-x11-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022848" comment="thunderbird-140.4.0-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021830" comment="firefox-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021831" comment="firefox-x11-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022848" comment="thunderbird-140.4.0-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11715" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021830" comment="firefox-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021831" comment="firefox-x11-140.4.0-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022848" comment="thunderbird-140.4.0-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0022" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002438.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002346.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002442.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1408" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1478" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003215.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1583" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002451.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1631" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002456.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2275" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002482.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-31"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254997">SUSE bug 1254997</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054952" comment="python-unversioned-command-3.9.25-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054953" comment="python3-3.9.25-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054954" comment="python3-debug-3.9.25-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054955" comment="python3-devel-3.9.25-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054956" comment="python3-idle-3.9.25-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054957" comment="python3-libs-3.9.25-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054958" comment="python3-test-3.9.25-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054959" comment="python3-tkinter-3.9.25-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054916" comment="python3.11-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054917" comment="python3.11-debug-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054918" comment="python3.11-devel-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054919" comment="python3.11-idle-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054920" comment="python3.11-libs-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054921" comment="python3.11-test-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054922" comment="python3.11-tkinter-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054884" comment="python3.12-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054885" comment="python3.12-debug-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054886" comment="python3.12-devel-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054887" comment="python3.12-idle-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054888" comment="python3.12-libs-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054889" comment="python3.12-test-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054890" comment="python3.12-tkinter-3.12.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1217</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1217" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1217" ref_url="https://www.suse.com/security/cve/CVE-2025-1217" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15687" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001091.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7418" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001543.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7431" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001305.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14895-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7LU4U7HP6TCMKUSW3XOAH6TARUKTOSU/" source="SUSE-SU"/>
    <description>
    In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-02-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1217/">CVE-2025-1217 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1217">CVE-2025-1217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239664">SUSE bug 1239664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985383" comment="php-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985384" comment="php-bcmath-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985385" comment="php-cli-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985386" comment="php-common-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985387" comment="php-dba-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985388" comment="php-dbg-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985389" comment="php-devel-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985390" comment="php-embedded-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985391" comment="php-enchant-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985392" comment="php-ffi-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985393" comment="php-fpm-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985394" comment="php-gd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985395" comment="php-gmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985396" comment="php-intl-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985397" comment="php-ldap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985398" comment="php-mbstring-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985399" comment="php-mysqlnd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985400" comment="php-odbc-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985401" comment="php-opcache-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985402" comment="php-pdo-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985409" comment="php-pgsql-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985410" comment="php-process-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985411" comment="php-snmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985412" comment="php-soap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985413" comment="php-xml-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1219</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1219" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1219" ref_url="https://www.suse.com/security/cve/CVE-2025-1219" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15687" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001091.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7418" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001543.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7431" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001305.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14895-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7LU4U7HP6TCMKUSW3XOAH6TARUKTOSU/" source="SUSE-SU"/>
    <description>
    In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type  header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1219/">CVE-2025-1219 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1219">CVE-2025-1219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239667">SUSE bug 1239667</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985383" comment="php-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985384" comment="php-bcmath-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985385" comment="php-cli-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985386" comment="php-common-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985387" comment="php-dba-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985388" comment="php-dbg-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985389" comment="php-devel-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985390" comment="php-embedded-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985391" comment="php-enchant-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985392" comment="php-ffi-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985393" comment="php-fpm-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985394" comment="php-gd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985395" comment="php-gmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985396" comment="php-intl-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985397" comment="php-ldap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985398" comment="php-mbstring-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985399" comment="php-mysqlnd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985400" comment="php-odbc-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985401" comment="php-opcache-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985402" comment="php-pdo-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985409" comment="php-pgsql-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985410" comment="php-process-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985411" comment="php-snmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985412" comment="php-soap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985413" comment="php-xml-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1220</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1220" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1220" ref_url="https://www.suse.com/security/cve/CVE-2025-1220" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003150.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02474-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040895.html" source="SUSE-SU"/>
    <description>
    In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1220/">CVE-2025-1220 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1220">CVE-2025-1220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246167">SUSE bug 1246167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054463" comment="php-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054464" comment="php-bcmath-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054465" comment="php-cli-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054466" comment="php-common-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054467" comment="php-dba-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054468" comment="php-dbg-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054469" comment="php-devel-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054470" comment="php-embedded-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054471" comment="php-enchant-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054472" comment="php-ffi-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054473" comment="php-fpm-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054474" comment="php-gd-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054475" comment="php-gmp-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054476" comment="php-intl-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054477" comment="php-ldap-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054478" comment="php-mbstring-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054479" comment="php-mysqlnd-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054480" comment="php-odbc-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054481" comment="php-opcache-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054482" comment="php-pdo-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054483" comment="php-pgsql-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054484" comment="php-process-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054485" comment="php-snmp-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054486" comment="php-soap-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054487" comment="php-xml-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1244" ref_url="https://www.suse.com/security/cve/CVE-2025-1244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1915" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000915.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2130" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0589-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020386.html" source="SUSE-SU"/>
    <description>
    A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2025-03-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1244/">CVE-2025-1244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1244">CVE-2025-1244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237091">SUSE bug 1237091</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967154" comment="emacs-27.2-11.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967155" comment="emacs-common-27.2-11.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967156" comment="emacs-filesystem-27.2-11.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967157" comment="emacs-lucid-27.2-11.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967158" comment="emacs-nox-27.2-11.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1272" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1272" ref_url="https://www.suse.com/security/cve/CVE-2025-1272" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1272/">CVE-2025-1272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1272">CVE-2025-1272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259766">SUSE bug 1259766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12801" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12801" ref_url="https://www.suse.com/security/cve/CVE-2025-12801" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3938" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002551.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3940" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003212.html" source="SUSE-SU"/>
    <description>
    A vulnerability was recently discovered in the rpc.mountd daemon in the nfs-utils package for Linux, that allows a NFSv3 client to escalate the
privileges assigned to it in the /etc/exports file at mount time. In particular, it allows the client to access any subdirectory or subtree of an exported directory, regardless of the set file permissions, and regardless of any 'root_squash' or 'all_squash' attributes that would normally be expected to apply to that client.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12801/">CVE-2025-12801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12801">CVE-2025-12801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259204">SUSE bug 1259204</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055595" comment="libnfsidmap-2.5.4-38.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055596" comment="libnfsidmap-devel-2.5.4-38.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055597" comment="nfs-utils-2.5.4-38.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055598" comment="nfs-utils-coreos-2.5.4-38.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055599" comment="nfsv4-client-utils-2.5.4-38.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002334.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0268" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002425.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0269" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002375.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0491" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003183.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0492" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0493" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003169.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0519" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002376.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0523" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002379.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0524" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045345.html" source="SUSE-SU"/>
    <description>
    Missing authorization in PostgreSQL CREATE STATISTICS command allows a table owner to achieve denial of service against other CREATE STATISTICS users by creating in any schema.  A later CREATE STATISTICS for the same name, from a user having the CREATE privilege, would then fail.  Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253332">SUSE bug 1253332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054671" comment="postgis-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054672" comment="postgis-client-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054673" comment="postgis-docs-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054674" comment="postgis-upgrade-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054675" comment="postgis-utils-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054676" comment="postgresql-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054677" comment="postgresql-contrib-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054678" comment="postgresql-docs-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054679" comment="postgresql-plperl-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054680" comment="postgresql-plpython3-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054681" comment="postgresql-pltcl-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054682" comment="postgresql-private-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054683" comment="postgresql-private-libs-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054684" comment="postgresql-server-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054685" comment="postgresql-server-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054686" comment="postgresql-static-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054687" comment="postgresql-test-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054688" comment="postgresql-test-rpm-macros-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054689" comment="postgresql-upgrade-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054690" comment="postgresql-upgrade-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12818</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002334.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0268" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002425.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0269" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002375.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003173.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0491" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003183.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0492" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0493" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003169.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0519" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002376.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0523" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002379.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0524" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002382.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0695" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002381.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0745" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045345.html" source="SUSE-SU"/>
    <description>
    Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes.  This results in a segmentation fault for the application using libpq.  Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253333">SUSE bug 1253333</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054634" comment="libpq-13.23-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054635" comment="libpq-devel-13.23-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054671" comment="postgis-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054672" comment="postgis-client-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054673" comment="postgis-docs-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054674" comment="postgis-upgrade-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054675" comment="postgis-utils-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054676" comment="postgresql-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054677" comment="postgresql-contrib-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054678" comment="postgresql-docs-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054679" comment="postgresql-plperl-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054680" comment="postgresql-plpython3-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054681" comment="postgresql-pltcl-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054682" comment="postgresql-private-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054683" comment="postgresql-private-libs-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054684" comment="postgresql-server-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054685" comment="postgresql-server-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054686" comment="postgresql-static-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054687" comment="postgresql-test-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054688" comment="postgresql-test-rpm-macros-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054689" comment="postgresql-upgrade-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054690" comment="postgresql-upgrade-devel-16.11-1.module+el9.7.0+23784+0c5a3b34 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13012" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Race condition in the Graphics component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Firefox ESR 115.30, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13013" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: Core &amp; HTML component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Firefox ESR 115.30, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13014</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13014" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Audio/Video component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Firefox ESR 115.30, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13015</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13015" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Spoofing issue in Firefox. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, and Firefox ESR 115.30.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13016</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13016" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13017</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13017" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the DOM: Notifications component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13018" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13019" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the DOM: Workers component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13020" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the WebRTC: Audio/Video component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054177" comment="firefox-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054178" comment="firefox-x11-140.5.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054231" comment="thunderbird-140.5.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13465" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024728.html" source="SUSE-SU"/>
    <description>
    Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset  and _.omit  functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.

The issue permits deletion of properties but does not allow overwriting their original behavior.

This issue is patched on 4.17.23
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257321">SUSE bug 1257321</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055120" comment="pcs-0.11.10-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055121" comment="pcs-snmp-0.11.10-1.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13499" ref_url="https://www.suse.com/security/cve/CVE-2025-13499" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003129.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    Kafka dissector crash in Wireshark 4.6.0 and 4.4.0 to 4.4.10 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13499/">CVE-2025-13499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13499">CVE-2025-13499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254108">SUSE bug 1254108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054419" comment="wireshark-3.4.10-8.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054420" comment="wireshark-cli-3.4.10-8.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054421" comment="wireshark-devel-3.4.10-8.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13502" ref_url="https://www.suse.com/security/cve/CVE-2025-13502" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13502/">CVE-2025-13502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13502">CVE-2025-13502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254208">SUSE bug 1254208</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13601" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0936" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003174.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0991" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002426.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1465" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002447.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1608" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254297">SUSE bug 1254297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054778" comment="glib2-2.68.4-18.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054779" comment="glib2-devel-2.68.4-18.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054780" comment="glib2-doc-2.68.4-18.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054781" comment="glib2-static-2.68.4-18.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054782" comment="glib2-tests-2.68.4-18.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13609</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13609" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13609" ref_url="https://www.suse.com/security/cve/CVE-2025-13609" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023868.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID). This action overwrites the legitimate agent's identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-13609/">CVE-2025-13609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13609">CVE-2025-13609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254199">SUSE bug 1254199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054422" comment="keylime-7.12.1-11.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054423" comment="keylime-base-7.12.1-11.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054424" comment="keylime-registrar-7.12.1-11.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054425" comment="keylime-selinux-7.12.1-11.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054426" comment="keylime-tenant-7.12.1-11.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054427" comment="keylime-verifier-7.12.1-11.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054428" comment="python3-keylime-7.12.1-11.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13699" ref_url="https://www.suse.com/security/cve/CVE-2025-13699" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002351.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003182.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0225" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002358.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002360.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0233" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002357.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023725.html" source="SUSE-SU"/>
    <description>
    MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13699/">CVE-2025-13699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13699">CVE-2025-13699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254313">SUSE bug 1254313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009962391" comment="galera-26.4.20-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13836</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002442.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1408" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2419" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002500.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254400">SUSE bug 1254400</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054916" comment="python3.11-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054917" comment="python3.11-debug-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054918" comment="python3.11-devel-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054919" comment="python3.11-idle-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054920" comment="python3.11-libs-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054921" comment="python3.11-test-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054922" comment="python3.11-tkinter-3.11.13-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054884" comment="python3.12-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054885" comment="python3.12-debug-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054886" comment="python3.12-devel-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054887" comment="python3.12-idle-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054888" comment="python3.12-libs-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054889" comment="python3.12-test-3.12.12-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054890" comment="python3.12-tkinter-3.12.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13947</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13947" ref_url="https://www.suse.com/security/cve/CVE-2025-13947" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13947/">CVE-2025-13947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13947">CVE-2025-13947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254473">SUSE bug 1254473</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14104" ref_url="https://www.suse.com/security/cve/CVE-2025-14104" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1852" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002473.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1913" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21016-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045390.html" source="SUSE-SU"/>
    <description>
    A flaw was found in util-linux. This vulnerability allows a heap buffer overread when processing 256-byte usernames, specifically within the `setpwnam()` function, affecting SUID (Set User ID) login-utils utilities writing to the password database.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14104/">CVE-2025-14104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14104">CVE-2025-14104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254666">SUSE bug 1254666</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055050" comment="libblkid-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055051" comment="libblkid-devel-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055052" comment="libfdisk-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055053" comment="libfdisk-devel-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055054" comment="libmount-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055055" comment="libmount-devel-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055056" comment="libsmartcols-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055057" comment="libsmartcols-devel-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055058" comment="libuuid-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055059" comment="libuuid-devel-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055060" comment="python3-libmount-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055061" comment="util-linux-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055062" comment="util-linux-core-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055063" comment="util-linux-user-2.37.4-21.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055064" comment="uuidd-2.37.4-21.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14174</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14174" ref_url="https://www.suse.com/security/cve/CVE-2025-14174" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14174/">CVE-2025-14174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14174">CVE-2025-14174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254776">SUSE bug 1254776</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054525" comment="webkit2gtk3-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054526" comment="webkit2gtk3-devel-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054527" comment="webkit2gtk3-jsc-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054528" comment="webkit2gtk3-jsc-devel-2.50.4-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003203.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2799" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023952.html" source="SUSE-SU"/>
    <description>
    In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255710">SUSE bug 1255710</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054923" comment="php-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054924" comment="php-bcmath-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054925" comment="php-cli-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054926" comment="php-common-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054927" comment="php-dba-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054928" comment="php-dbg-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054929" comment="php-devel-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054930" comment="php-embedded-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054931" comment="php-enchant-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054932" comment="php-ffi-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054933" comment="php-fpm-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054934" comment="php-gd-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054935" comment="php-gmp-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054936" comment="php-intl-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054937" comment="php-ldap-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054938" comment="php-mbstring-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054939" comment="php-mysqlnd-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054940" comment="php-odbc-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054941" comment="php-opcache-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054942" comment="php-pdo-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054943" comment="php-pgsql-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054944" comment="php-process-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054945" comment="php-snmp-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054946" comment="php-soap-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054947" comment="php-xml-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002450.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002453.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003203.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2799" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003214.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023952.html" source="SUSE-SU"/>
    <description>
    In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255711">SUSE bug 1255711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054923" comment="php-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054924" comment="php-bcmath-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054925" comment="php-cli-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054926" comment="php-common-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054927" comment="php-dba-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054928" comment="php-dbg-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054929" comment="php-devel-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054930" comment="php-embedded-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054931" comment="php-enchant-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054932" comment="php-ffi-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054933" comment="php-fpm-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054934" comment="php-gd-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054935" comment="php-gmp-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054936" comment="php-intl-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054937" comment="php-ldap-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054938" comment="php-mbstring-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054939" comment="php-mysqlnd-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054940" comment="php-odbc-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054941" comment="php-opcache-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054942" comment="php-pdo-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054943" comment="php-pgsql-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054944" comment="php-process-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054945" comment="php-snmp-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054946" comment="php-soap-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054947" comment="php-xml-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14180" ref_url="https://www.suse.com/security/cve/CVE-2025-14180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002450.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002453.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023952.html" source="SUSE-SU"/>
    <description>
    In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14180/">CVE-2025-14180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14180">CVE-2025-14180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255712">SUSE bug 1255712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054923" comment="php-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054924" comment="php-bcmath-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054925" comment="php-cli-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054926" comment="php-common-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054927" comment="php-dba-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054928" comment="php-dbg-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054929" comment="php-devel-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054930" comment="php-embedded-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054931" comment="php-enchant-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054932" comment="php-ffi-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054933" comment="php-fpm-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054934" comment="php-gd-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054935" comment="php-gmp-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054936" comment="php-intl-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054937" comment="php-ldap-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054938" comment="php-mbstring-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054939" comment="php-mysqlnd-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054940" comment="php-odbc-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054941" comment="php-opcache-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054942" comment="php-pdo-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054943" comment="php-pgsql-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054944" comment="php-process-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054945" comment="php-snmp-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054946" comment="php-soap-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054947" comment="php-xml-8.3.29-1.module+el9.7.0+23852+76de6b03 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14242</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14242" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14242" ref_url="https://www.suse.com/security/cve/CVE-2025-14242" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0605" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003163.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0608" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002385.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4513" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002579.html" source="SUSE-SU"/>
    <description>
    A flaw was found in vsftpd. This vulnerability allows a denial of service (DoS) via an integer overflow in the ls command parameter parsing, triggered by a remote, authenticated attacker sending a crafted STAT command with a specific byte sequence.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14242/">CVE-2025-14242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14242">CVE-2025-14242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256700">SUSE bug 1256700</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054691" comment="vsftpd-3.0.5-6.el9_7.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14321</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14321" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14322" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability was fixed in Firefox 146, Firefox ESR 115.31, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14323</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14323" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the DOM: Notifications component. This vulnerability was fixed in Firefox 146, Firefox ESR 115.31, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14324</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14324" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 146, Firefox ESR 115.31, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14325</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14325" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14327</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Spoofing issue in the Downloads Panel component. This vulnerability was fixed in Firefox 146, Thunderbird 146, Firefox ESR 140.7, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14328</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14328" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14329</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14329" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14330</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14330" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14331</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14331" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the Request Handling component. This vulnerability was fixed in Firefox 146, Firefox ESR 115.31, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14333</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14333" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.5, Thunderbird ESR 140.5, Firefox 145 and Thunderbird 145. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-07"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054366" comment="firefox-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054367" comment="firefox-x11-140.6.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054531" comment="thunderbird-140.6.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14422</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14422" ref_url="https://www.suse.com/security/cve/CVE-2025-14422" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003159.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1511" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002466.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1574" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023932.html" source="SUSE-SU"/>
    <description>
    GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14422/">CVE-2025-14422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14422">CVE-2025-14422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255293">SUSE bug 1255293</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054741" comment="gimp-3.0.4-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054742" comment="gimp-libs-3.0.4-1.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14423</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14423" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14423" ref_url="https://www.suse.com/security/cve/CVE-2025-14423" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003159.html" source="SUSE-SU"/>
    <description>
    GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14423/">CVE-2025-14423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14423">CVE-2025-14423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255294">SUSE bug 1255294</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054741" comment="gimp-3.0.4-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054742" comment="gimp-libs-3.0.4-1.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14424</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14424" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14424" ref_url="https://www.suse.com/security/cve/CVE-2025-14424" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003159.html" source="SUSE-SU"/>
    <description>
    GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14424/">CVE-2025-14424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14424">CVE-2025-14424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255295">SUSE bug 1255295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054741" comment="gimp-3.0.4-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054742" comment="gimp-libs-3.0.4-1.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14425" ref_url="https://www.suse.com/security/cve/CVE-2025-14425" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003159.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1511" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023932.html" source="SUSE-SU"/>
    <description>
    GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14425/">CVE-2025-14425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14425">CVE-2025-14425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255296">SUSE bug 1255296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054741" comment="gimp-3.0.4-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054742" comment="gimp-libs-3.0.4-1.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14523</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003170.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0907" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002419.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1509" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw in libsoup's HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254876">SUSE bug 1254876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054596" comment="libsoup-2.72.0-12.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054597" comment="libsoup-devel-2.72.0-12.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14831</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14831" ref_url="https://www.suse.com/security/cve/CVE-2025-14831" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003274.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5585" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002624.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6630" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045347.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14831/">CVE-2025-14831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14831">CVE-2025-14831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257960">SUSE bug 1257960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055666" comment="gnutls-3.8.3-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055667" comment="gnutls-c++-3.8.3-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055668" comment="gnutls-dane-3.8.3-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055669" comment="gnutls-devel-3.8.3-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055670" comment="gnutls-utils-3.8.3-10.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14905" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14905" ref_url="https://www.suse.com/security/cve/CVE-2025-14905" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003220.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4207" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002593.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5513" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20927-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045225.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14905/">CVE-2025-14905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14905">CVE-2025-14905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258727">SUSE bug 1258727</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055489" comment="389-ds-base-2.7.0-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055490" comment="389-ds-base-devel-2.7.0-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055491" comment="389-ds-base-libs-2.7.0-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055492" comment="389-ds-base-snmp-2.7.0-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055493" comment="python3-lib389-2.7.0-10.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15059" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15059" ref_url="https://www.suse.com/security/cve/CVE-2025-15059" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2707" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023718.html" source="SUSE-SU"/>
    <description>
    GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28232.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15059/">CVE-2025-15059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15059">CVE-2025-15059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255766">SUSE bug 1255766</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055122" comment="gimp-3.0.4-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055123" comment="gimp-libs-3.0.4-1.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15269" ref_url="https://www.suse.com/security/cve/CVE-2025-15269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2213" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024340.html" source="SUSE-SU"/>
    <description>
    FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15269/">CVE-2025-15269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15269">CVE-2025-15269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256032">SUSE bug 1256032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055067" comment="fontforge-20201107-7.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15270</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15270" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15270" ref_url="https://www.suse.com/security/cve/CVE-2025-15270" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6628" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003269.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6635" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002647.html" source="SUSE-SU"/>
    <description>
    FontForge SFD File Parsing Improper Validation of Array Index Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28563.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15270/">CVE-2025-15270 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15270">CVE-2025-15270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256031">SUSE bug 1256031</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055952" comment="fontforge-20201107-8.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15275</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15275" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15275" ref_url="https://www.suse.com/security/cve/CVE-2025-15275" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2213" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024340.html" source="SUSE-SU"/>
    <description>
    FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28543.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15275/">CVE-2025-15275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15275">CVE-2025-15275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256025">SUSE bug 1256025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055067" comment="fontforge-20201107-7.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15279</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15279" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15279" ref_url="https://www.suse.com/security/cve/CVE-2025-15279" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2213" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024340.html" source="SUSE-SU"/>
    <description>
    FontForge GUtils BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of pixels within BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27517.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15279/">CVE-2025-15279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15279">CVE-2025-15279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256013">SUSE bug 1256013</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055067" comment="fontforge-20201107-7.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15281</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15281" ref_url="https://www.suse.com/security/cve/CVE-2025-15281" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4772" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15281/">CVE-2025-15281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15281">CVE-2025-15281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257005">SUSE bug 1257005</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055197" comment="glibc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055198" comment="glibc-all-langpacks-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055199" comment="glibc-benchtests-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055200" comment="glibc-common-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055201" comment="glibc-devel-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055202" comment="glibc-doc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055203" comment="glibc-gconv-extra-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055204" comment="glibc-headers-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055205" comment="glibc-langpack-aa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055206" comment="glibc-langpack-af-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055207" comment="glibc-langpack-agr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055208" comment="glibc-langpack-ak-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055209" comment="glibc-langpack-am-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055210" comment="glibc-langpack-an-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055211" comment="glibc-langpack-anp-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055212" comment="glibc-langpack-ar-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055213" comment="glibc-langpack-as-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055214" comment="glibc-langpack-ast-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055215" comment="glibc-langpack-ayc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055216" comment="glibc-langpack-az-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055217" comment="glibc-langpack-be-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055218" comment="glibc-langpack-bem-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055219" comment="glibc-langpack-ber-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055220" comment="glibc-langpack-bg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055221" comment="glibc-langpack-bhb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055222" comment="glibc-langpack-bho-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055223" comment="glibc-langpack-bi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055224" comment="glibc-langpack-bn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055225" comment="glibc-langpack-bo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055226" comment="glibc-langpack-br-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055227" comment="glibc-langpack-brx-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055228" comment="glibc-langpack-bs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055229" comment="glibc-langpack-byn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055230" comment="glibc-langpack-ca-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055231" comment="glibc-langpack-ce-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055232" comment="glibc-langpack-chr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055233" comment="glibc-langpack-ckb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055234" comment="glibc-langpack-cmn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055235" comment="glibc-langpack-crh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055236" comment="glibc-langpack-cs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055237" comment="glibc-langpack-csb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055238" comment="glibc-langpack-cv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055239" comment="glibc-langpack-cy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055240" comment="glibc-langpack-da-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055241" comment="glibc-langpack-de-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055242" comment="glibc-langpack-doi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055243" comment="glibc-langpack-dsb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055244" comment="glibc-langpack-dv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055245" comment="glibc-langpack-dz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055246" comment="glibc-langpack-el-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055247" comment="glibc-langpack-en-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055248" comment="glibc-langpack-eo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055249" comment="glibc-langpack-es-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055250" comment="glibc-langpack-et-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055251" comment="glibc-langpack-eu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055252" comment="glibc-langpack-fa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055253" comment="glibc-langpack-ff-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055254" comment="glibc-langpack-fi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055255" comment="glibc-langpack-fil-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055256" comment="glibc-langpack-fo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055257" comment="glibc-langpack-fr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055258" comment="glibc-langpack-fur-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055259" comment="glibc-langpack-fy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055260" comment="glibc-langpack-ga-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055261" comment="glibc-langpack-gd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055262" comment="glibc-langpack-gez-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055263" comment="glibc-langpack-gl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055264" comment="glibc-langpack-gu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055265" comment="glibc-langpack-gv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055266" comment="glibc-langpack-ha-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055267" comment="glibc-langpack-hak-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055268" comment="glibc-langpack-he-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055269" comment="glibc-langpack-hi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055270" comment="glibc-langpack-hif-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055271" comment="glibc-langpack-hne-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055272" comment="glibc-langpack-hr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055273" comment="glibc-langpack-hsb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055274" comment="glibc-langpack-ht-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055275" comment="glibc-langpack-hu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055276" comment="glibc-langpack-hy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055277" comment="glibc-langpack-ia-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055278" comment="glibc-langpack-id-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055279" comment="glibc-langpack-ig-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055280" comment="glibc-langpack-ik-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055281" comment="glibc-langpack-is-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055282" comment="glibc-langpack-it-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055283" comment="glibc-langpack-iu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055284" comment="glibc-langpack-ja-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055285" comment="glibc-langpack-ka-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055286" comment="glibc-langpack-kab-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055287" comment="glibc-langpack-kk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055288" comment="glibc-langpack-kl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055289" comment="glibc-langpack-km-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055290" comment="glibc-langpack-kn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055291" comment="glibc-langpack-ko-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055292" comment="glibc-langpack-kok-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055293" comment="glibc-langpack-ks-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055294" comment="glibc-langpack-ku-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055295" comment="glibc-langpack-kw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055296" comment="glibc-langpack-ky-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055297" comment="glibc-langpack-lb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055298" comment="glibc-langpack-lg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055299" comment="glibc-langpack-li-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055300" comment="glibc-langpack-lij-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055301" comment="glibc-langpack-ln-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055302" comment="glibc-langpack-lo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055303" comment="glibc-langpack-lt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055304" comment="glibc-langpack-lv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055305" comment="glibc-langpack-lzh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055306" comment="glibc-langpack-mag-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055307" comment="glibc-langpack-mai-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055308" comment="glibc-langpack-mfe-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055309" comment="glibc-langpack-mg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055310" comment="glibc-langpack-mhr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055311" comment="glibc-langpack-mi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055312" comment="glibc-langpack-miq-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055313" comment="glibc-langpack-mjw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055314" comment="glibc-langpack-mk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055315" comment="glibc-langpack-ml-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055316" comment="glibc-langpack-mn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055317" comment="glibc-langpack-mni-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055318" comment="glibc-langpack-mnw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055319" comment="glibc-langpack-mr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055320" comment="glibc-langpack-ms-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055321" comment="glibc-langpack-mt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055322" comment="glibc-langpack-my-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055323" comment="glibc-langpack-nan-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055324" comment="glibc-langpack-nb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055325" comment="glibc-langpack-nds-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055326" comment="glibc-langpack-ne-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055327" comment="glibc-langpack-nhn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055328" comment="glibc-langpack-niu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055329" comment="glibc-langpack-nl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055330" comment="glibc-langpack-nn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055331" comment="glibc-langpack-nr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055332" comment="glibc-langpack-nso-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055333" comment="glibc-langpack-oc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055334" comment="glibc-langpack-om-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055335" comment="glibc-langpack-or-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055336" comment="glibc-langpack-os-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055337" comment="glibc-langpack-pa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055338" comment="glibc-langpack-pap-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055339" comment="glibc-langpack-pl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055340" comment="glibc-langpack-ps-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055341" comment="glibc-langpack-pt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055342" comment="glibc-langpack-quz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055343" comment="glibc-langpack-raj-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055344" comment="glibc-langpack-ro-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055345" comment="glibc-langpack-ru-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055346" comment="glibc-langpack-rw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055347" comment="glibc-langpack-sa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055348" comment="glibc-langpack-sah-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055349" comment="glibc-langpack-sat-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055350" comment="glibc-langpack-sc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055351" comment="glibc-langpack-sd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055352" comment="glibc-langpack-se-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055353" comment="glibc-langpack-sgs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055354" comment="glibc-langpack-shn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055355" comment="glibc-langpack-shs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055356" comment="glibc-langpack-si-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055357" comment="glibc-langpack-sid-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055358" comment="glibc-langpack-sk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055359" comment="glibc-langpack-sl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055360" comment="glibc-langpack-sm-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055361" comment="glibc-langpack-so-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055362" comment="glibc-langpack-sq-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055363" comment="glibc-langpack-sr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055364" comment="glibc-langpack-ss-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055365" comment="glibc-langpack-st-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055366" comment="glibc-langpack-sv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055367" comment="glibc-langpack-sw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055368" comment="glibc-langpack-szl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055369" comment="glibc-langpack-ta-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055370" comment="glibc-langpack-tcy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055371" comment="glibc-langpack-te-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055372" comment="glibc-langpack-tg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055373" comment="glibc-langpack-th-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055374" comment="glibc-langpack-the-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055375" comment="glibc-langpack-ti-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055376" comment="glibc-langpack-tig-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055377" comment="glibc-langpack-tk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055378" comment="glibc-langpack-tl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055379" comment="glibc-langpack-tn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055380" comment="glibc-langpack-to-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055381" comment="glibc-langpack-tpi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055382" comment="glibc-langpack-tr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055383" comment="glibc-langpack-ts-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055384" comment="glibc-langpack-tt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055385" comment="glibc-langpack-ug-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055386" comment="glibc-langpack-uk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055387" comment="glibc-langpack-unm-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055388" comment="glibc-langpack-ur-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055389" comment="glibc-langpack-uz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055390" comment="glibc-langpack-ve-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055391" comment="glibc-langpack-vi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055392" comment="glibc-langpack-wa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055393" comment="glibc-langpack-wae-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055394" comment="glibc-langpack-wal-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055395" comment="glibc-langpack-wo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055396" comment="glibc-langpack-xh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055397" comment="glibc-langpack-yi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055398" comment="glibc-langpack-yo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055399" comment="glibc-langpack-yue-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055400" comment="glibc-langpack-yuw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055401" comment="glibc-langpack-zh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055402" comment="glibc-langpack-zu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055403" comment="glibc-locale-source-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055404" comment="glibc-minimal-langpack-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055405" comment="glibc-nss-devel-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055406" comment="glibc-static-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055407" comment="glibc-utils-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055408" comment="libnsl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055409" comment="nscd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055410" comment="nss_db-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055411" comment="nss_hesiod-2.34-231.el9_7.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15366</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15366" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15366" ref_url="https://www.suse.com/security/cve/CVE-2025-15366" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0053" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002627.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003253.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003265.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002594.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
    <description>
    The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15366/">CVE-2025-15366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15366">CVE-2025-15366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257044">SUSE bug 1257044</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055656" comment="python-unversioned-command-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055657" comment="python3-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055658" comment="python3-debug-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055659" comment="python3-devel-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055660" comment="python3-idle-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055661" comment="python3-libs-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055662" comment="python3-test-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055663" comment="python3-tkinter-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055671" comment="python3.11-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055672" comment="python3.11-debug-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055673" comment="python3.11-devel-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055674" comment="python3.11-idle-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055675" comment="python3.11-libs-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055676" comment="python3.11-test-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055677" comment="python3.11-tkinter-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055649" comment="python3.12-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055650" comment="python3.12-debug-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055651" comment="python3.12-devel-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055652" comment="python3.12-idle-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055653" comment="python3.12-libs-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055654" comment="python3.12-test-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055655" comment="python3.12-tkinter-3.12.12-4.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15367" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15367" ref_url="https://www.suse.com/security/cve/CVE-2025-15367" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0053" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002627.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003253.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003265.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002594.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
    <description>
    The poplib module, when passed a user-controlled command, can have
additional commands injected using newlines. Mitigation rejects commands
containing control characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15367/">CVE-2025-15367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15367">CVE-2025-15367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257041">SUSE bug 1257041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055656" comment="python-unversioned-command-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055657" comment="python3-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055658" comment="python3-debug-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055659" comment="python3-devel-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055660" comment="python3-idle-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055661" comment="python3-libs-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055662" comment="python3-test-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055663" comment="python3-tkinter-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055671" comment="python3.11-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055672" comment="python3.11-debug-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055673" comment="python3.11-devel-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055674" comment="python3.11-idle-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055675" comment="python3.11-libs-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055676" comment="python3.11-test-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055677" comment="python3.11-tkinter-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055649" comment="python3.12-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055650" comment="python3.12-debug-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055651" comment="python3.12-devel-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055652" comment="python3.12-idle-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055653" comment="python3.12-libs-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055654" comment="python3.12-test-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055655" comment="python3.12-tkinter-3.12.12-4.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15467</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15467" ref_url="https://www.suse.com/security/cve/CVE-2025-15467" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1503" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with
maliciously crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code execution.

When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as
AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is
copied into a fixed-size stack buffer without verifying that its length fits
the destination. An attacker can supply a crafted CMS message with an
oversized IV, causing a stack-based out-of-bounds write before any
authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using
AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.
Because the overflow occurs prior to authentication, no valid key material
is required to trigger it. While exploitability to remote code execution
depends on platform and toolchain mitigations, the stack-based write
primitive represents a severe risk.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.

OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15467/">CVE-2025-15467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256830">SUSE bug 1256830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256876">SUSE bug 1256876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15468</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15468" ref_url="https://www.suse.com/security/cve/CVE-2025-15468" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: If an application using the SSL_CIPHER_find() function in
a QUIC protocol client or server receives an unknown cipher suite from
the peer, a NULL dereference occurs.

Impact summary: A NULL pointer dereference leads to abnormal termination of
the running process causing Denial of Service.

Some applications call SSL_CIPHER_find() from the client_hello_cb callback
on the cipher ID received from the peer. If this is done with an SSL object
implementing the QUIC protocol, NULL pointer dereference will happen if
the examined cipher ID is unknown or unsupported.

As it is not very common to call this function in applications using the QUIC 
protocol and the worst outcome is Denial of Service, the issue was assessed
as Low severity.

The vulnerable code was introduced in the 3.2 version with the addition
of the QUIC protocol support.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,
as the QUIC implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15468/">CVE-2025-15468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15468">CVE-2025-15468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256831">SUSE bug 1256831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256880">SUSE bug 1256880</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15469</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15469" ref_url="https://www.suse.com/security/cve/CVE-2025-15469" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: The 'openssl dgst' command-line tool silently truncates input
data to 16MB when using one-shot signing algorithms and reports success instead
of an error.

Impact summary: A user signing or verifying files larger than 16MB with
one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire
file is authenticated while trailing data beyond 16MB remains unauthenticated.

When the 'openssl dgst' command is used with algorithms that only support
one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input
is buffered with a 16MB limit. If the input exceeds this limit, the tool
silently truncates to the first 16MB and continues without signaling an error,
contrary to what the documentation states. This creates an integrity gap where
trailing bytes can be modified without detection if both signing and
verification are performed using the same affected codepath.

The issue affects only the command-line tool behavior. Verifiers that process
the full message using library APIs will reject the signature, so the risk
primarily affects workflows that both sign and verify with the affected
'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and
library users are unaffected.

The FIPS modules in 3.5 and 3.6 are not affected by this issue, as the
command-line tools are outside the OpenSSL FIPS module boundary.

OpenSSL 3.5 and 3.6 are vulnerable to this issue.

OpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15469/">CVE-2025-15469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15469">CVE-2025-15469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256832">SUSE bug 1256832</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1734" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1734" ref_url="https://www.suse.com/security/cve/CVE-2025-1734" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15687" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001091.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7418" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001543.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7431" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001305.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14895-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7LU4U7HP6TCMKUSW3XOAH6TARUKTOSU/" source="SUSE-SU"/>
    <description>
    In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-1734/">CVE-2025-1734 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1734">CVE-2025-1734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239668">SUSE bug 1239668</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985383" comment="php-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985384" comment="php-bcmath-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985385" comment="php-cli-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985386" comment="php-common-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985387" comment="php-dba-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985388" comment="php-dbg-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985389" comment="php-devel-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985390" comment="php-embedded-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985391" comment="php-enchant-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985392" comment="php-ffi-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985393" comment="php-fpm-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985394" comment="php-gd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985395" comment="php-gmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985396" comment="php-intl-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985397" comment="php-ldap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985398" comment="php-mbstring-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985399" comment="php-mysqlnd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985400" comment="php-odbc-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985401" comment="php-opcache-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985402" comment="php-pdo-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985409" comment="php-pgsql-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985410" comment="php-process-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985411" comment="php-snmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985412" comment="php-soap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985413" comment="php-xml-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1735</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1735" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1735" ref_url="https://www.suse.com/security/cve/CVE-2025-1735" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003150.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02474-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040895.html" source="SUSE-SU"/>
    <description>
    In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This  could cause crashes if Postgres server rejects the string as invalid.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1735/">CVE-2025-1735 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1735">CVE-2025-1735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246146">SUSE bug 1246146</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054463" comment="php-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054464" comment="php-bcmath-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054465" comment="php-cli-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054466" comment="php-common-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054467" comment="php-dba-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054468" comment="php-dbg-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054469" comment="php-devel-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054470" comment="php-embedded-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054471" comment="php-enchant-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054472" comment="php-ffi-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054473" comment="php-fpm-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054474" comment="php-gd-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054475" comment="php-gmp-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054476" comment="php-intl-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054477" comment="php-ldap-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054478" comment="php-mbstring-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054479" comment="php-mysqlnd-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054480" comment="php-odbc-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054481" comment="php-opcache-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054482" comment="php-pdo-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054483" comment="php-pgsql-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054484" comment="php-process-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054485" comment="php-snmp-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054486" comment="php-soap-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054487" comment="php-xml-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1736</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1736" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1736" ref_url="https://www.suse.com/security/cve/CVE-2025-1736" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15687" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001091.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7418" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001543.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7431" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001305.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14895-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7LU4U7HP6TCMKUSW3XOAH6TARUKTOSU/" source="SUSE-SU"/>
    <description>
    In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-02-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1736/">CVE-2025-1736 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1736">CVE-2025-1736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239670">SUSE bug 1239670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985383" comment="php-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985384" comment="php-bcmath-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985385" comment="php-cli-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985386" comment="php-common-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985387" comment="php-dba-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985388" comment="php-dbg-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985389" comment="php-devel-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985390" comment="php-embedded-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985391" comment="php-enchant-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985392" comment="php-ffi-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985393" comment="php-fpm-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985394" comment="php-gd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985395" comment="php-gmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985396" comment="php-intl-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985397" comment="php-ldap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985398" comment="php-mbstring-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985399" comment="php-mysqlnd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985400" comment="php-odbc-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985401" comment="php-opcache-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985402" comment="php-pdo-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985409" comment="php-pgsql-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985410" comment="php-process-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985411" comment="php-snmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985412" comment="php-soap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985413" comment="php-xml-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1861" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1861" ref_url="https://www.suse.com/security/cve/CVE-2025-1861" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15687" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4263" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001091.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7418" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001543.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7431" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001305.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020600.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14895-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7LU4U7HP6TCMKUSW3XOAH6TARUKTOSU/" source="SUSE-SU"/>
    <description>
    In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-02-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-1861/">CVE-2025-1861 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1861">CVE-2025-1861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239669">SUSE bug 1239669</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985383" comment="php-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985384" comment="php-bcmath-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985385" comment="php-cli-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985386" comment="php-common-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985387" comment="php-dba-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985388" comment="php-dbg-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985389" comment="php-devel-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985390" comment="php-embedded-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985391" comment="php-enchant-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985392" comment="php-ffi-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985393" comment="php-fpm-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985394" comment="php-gd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985395" comment="php-gmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985396" comment="php-intl-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985397" comment="php-ldap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985398" comment="php-mbstring-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985399" comment="php-mysqlnd-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985400" comment="php-odbc-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985401" comment="php-opcache-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985402" comment="php-pdo-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985409" comment="php-pgsql-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985410" comment="php-process-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985411" comment="php-snmp-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985412" comment="php-soap-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985413" comment="php-xml-8.3.19-1.module+el9.6.0+23015+da8065b7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1930</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1930" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1930" ref_url="https://www.suse.com/security/cve/CVE-2025-1930" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
    <description>
    On Windows, a compromised content process could use bad StreamData sent over AudioIPC to trigger a use-after-free in the Browser process. This could have led to a sandbox escape. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1930/">CVE-2025-1930 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1930">CVE-2025-1930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1931</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1931" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1931" ref_url="https://www.suse.com/security/cve/CVE-2025-1931" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZKGV75ZSDUQ4HV5GEU5SXQRWEVYV5SQ/" source="SUSE-SU"/>
    <description>
    It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1931/">CVE-2025-1931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1931">CVE-2025-1931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1932" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1932" ref_url="https://www.suse.com/security/cve/CVE-2025-1932" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
    <description>
    An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1932/">CVE-2025-1932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1932">CVE-2025-1932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1933" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1933" ref_url="https://www.suse.com/security/cve/CVE-2025-1933" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
    <description>
    On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1933/">CVE-2025-1933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1933">CVE-2025-1933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1934</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1934" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1934" ref_url="https://www.suse.com/security/cve/CVE-2025-1934" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
    <description>
    It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1934/">CVE-2025-1934 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1934">CVE-2025-1934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1935</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1935" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1935" ref_url="https://www.suse.com/security/cve/CVE-2025-1935" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14958-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZKGV75ZSDUQ4HV5GEU5SXQRWEVYV5SQ/" source="SUSE-SU"/>
    <description>
    A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1935/">CVE-2025-1935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1935">CVE-2025-1935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1936" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1936" ref_url="https://www.suse.com/security/cve/CVE-2025-1936" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
    <description>
    jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1936/">CVE-2025-1936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1936">CVE-2025-1936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1937" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1937" ref_url="https://www.suse.com/security/cve/CVE-2025-1937" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2899" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000971.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1937/">CVE-2025-1937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1937">CVE-2025-1937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968439" comment="thunderbird-128.8.0-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1938</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1938" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1938" ref_url="https://www.suse.com/security/cve/CVE-2025-1938" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000935.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000918.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2899" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000971.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020504.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14852-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/75LUXAZIP2FPG7P4MLEHROFH5V3BDMRU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14853-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3F56FYNOMPTY7UTRNBWD5KRKK7TLZFPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14861-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ELFCIRFYZHSULQ4OOF6EEX5F4HJ65XAG/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1938/">CVE-2025-1938 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1938">CVE-2025-1938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237683">SUSE bug 1237683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967866" comment="firefox-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967867" comment="firefox-x11-128.8.0-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968439" comment="thunderbird-128.8.0-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202520012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-20012</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-20012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20012" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-20012" ref_url="https://www.suse.com/security/cve/CVE-2025-20012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Incorrect behavior order for some Intel(R) Core(tm) Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="4.1/CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-20012/">CVE-2025-20012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20012">CVE-2025-20012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243123">SUSE bug 1243123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053953" comment="microcode_ctl-20250211-1.20250512.1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202520623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-20623</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-20623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-20623" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-20623" ref_url="https://www.suse.com/security/cve/CVE-2025-20623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Core(tm) processors (10th Generation) may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-20623/">CVE-2025-20623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-20623">CVE-2025-20623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243454">SUSE bug 1243454</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053953" comment="microcode_ctl-20250211-1.20250512.1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21171" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21171" ref_url="https://www.suse.com/security/cve/CVE-2025-21171" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000768.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21171/">CVE-2025-21171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21171">CVE-2025-21171 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053897" comment="aspnetcore-runtime-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053898" comment="aspnetcore-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053899" comment="aspnetcore-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053900" comment="dotnet-apphost-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053901" comment="dotnet-host-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053902" comment="dotnet-hostfxr-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053903" comment="dotnet-runtime-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053904" comment="dotnet-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053905" comment="dotnet-sdk-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053906" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053907" comment="dotnet-sdk-aot-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053908" comment="dotnet-sdk-dbg-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053909" comment="dotnet-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053910" comment="dotnet-templates-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053911" comment="netstandard-targeting-pack-2.1-9.0.102-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21172</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21172" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21172" ref_url="https://www.suse.com/security/cve/CVE-2025-21172" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0381" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000767.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000768.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21172/">CVE-2025-21172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21172">CVE-2025-21172 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053885" comment="aspnetcore-runtime-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053897" comment="aspnetcore-runtime-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053886" comment="aspnetcore-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053898" comment="aspnetcore-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053887" comment="aspnetcore-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053899" comment="aspnetcore-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053888" comment="dotnet-apphost-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053900" comment="dotnet-apphost-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053901" comment="dotnet-host-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053889" comment="dotnet-hostfxr-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053902" comment="dotnet-hostfxr-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053890" comment="dotnet-runtime-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053903" comment="dotnet-runtime-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053891" comment="dotnet-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053904" comment="dotnet-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053892" comment="dotnet-sdk-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053893" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053905" comment="dotnet-sdk-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053906" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053907" comment="dotnet-sdk-aot-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053894" comment="dotnet-sdk-dbg-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053908" comment="dotnet-sdk-dbg-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053895" comment="dotnet-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053909" comment="dotnet-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053896" comment="dotnet-templates-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053910" comment="dotnet-templates-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053911" comment="netstandard-targeting-pack-2.1-9.0.102-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21173</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21173" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21173" ref_url="https://www.suse.com/security/cve/CVE-2025-21173" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0381" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000767.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000768.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21173/">CVE-2025-21173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21173">CVE-2025-21173 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053885" comment="aspnetcore-runtime-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053897" comment="aspnetcore-runtime-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053886" comment="aspnetcore-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053898" comment="aspnetcore-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053887" comment="aspnetcore-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053899" comment="aspnetcore-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053888" comment="dotnet-apphost-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053900" comment="dotnet-apphost-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053901" comment="dotnet-host-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053889" comment="dotnet-hostfxr-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053902" comment="dotnet-hostfxr-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053890" comment="dotnet-runtime-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053903" comment="dotnet-runtime-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053891" comment="dotnet-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053904" comment="dotnet-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053892" comment="dotnet-sdk-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053893" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053905" comment="dotnet-sdk-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053906" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053907" comment="dotnet-sdk-aot-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053894" comment="dotnet-sdk-dbg-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053908" comment="dotnet-sdk-dbg-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053895" comment="dotnet-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053909" comment="dotnet-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053896" comment="dotnet-templates-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053910" comment="dotnet-templates-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053911" comment="netstandard-targeting-pack-2.1-9.0.102-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21176" ref_url="https://www.suse.com/security/cve/CVE-2025-21176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0381" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000767.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000768.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21176/">CVE-2025-21176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21176">CVE-2025-21176 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053885" comment="aspnetcore-runtime-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053897" comment="aspnetcore-runtime-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053886" comment="aspnetcore-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053898" comment="aspnetcore-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053887" comment="aspnetcore-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053899" comment="aspnetcore-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053888" comment="dotnet-apphost-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053900" comment="dotnet-apphost-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053901" comment="dotnet-host-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053889" comment="dotnet-hostfxr-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053902" comment="dotnet-hostfxr-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053890" comment="dotnet-runtime-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053903" comment="dotnet-runtime-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053891" comment="dotnet-runtime-dbg-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053904" comment="dotnet-runtime-dbg-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053892" comment="dotnet-sdk-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053893" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053905" comment="dotnet-sdk-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053906" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053907" comment="dotnet-sdk-aot-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053894" comment="dotnet-sdk-dbg-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053908" comment="dotnet-sdk-dbg-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053895" comment="dotnet-targeting-pack-8.0-8.0.12-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053909" comment="dotnet-targeting-pack-9.0-9.0.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053896" comment="dotnet-templates-8.0-8.0.112-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053910" comment="dotnet-templates-9.0-9.0.102-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053911" comment="netstandard-targeting-pack-2.1-9.0.102-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21490" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21490" ref_url="https://www.suse.com/security/cve/CVE-2025-21490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19572" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002214.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19584" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01716-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023630.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21490/">CVE-2025-21490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21490">CVE-2025-21490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243355">SUSE bug 1243355</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024824" comment="galera-26.4.22-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21491" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21491" ref_url="https://www.suse.com/security/cve/CVE-2025-21491" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21491/">CVE-2025-21491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21491">CVE-2025-21491 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21494</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21494" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21494" ref_url="https://www.suse.com/security/cve/CVE-2025-21494" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21494/">CVE-2025-21494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21494">CVE-2025-21494 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21497</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21497" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21497" ref_url="https://www.suse.com/security/cve/CVE-2025-21497" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21497/">CVE-2025-21497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21497">CVE-2025-21497 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21500" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21500" ref_url="https://www.suse.com/security/cve/CVE-2025-21500" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21500/">CVE-2025-21500 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21500">CVE-2025-21500 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21501" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21501" ref_url="https://www.suse.com/security/cve/CVE-2025-21501" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21501/">CVE-2025-21501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21501">CVE-2025-21501 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21502</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21502" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21502" ref_url="https://www.suse.com/security/cve/CVE-2025-21502" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000770.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:0426" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020420.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0066-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GS63GCBRVH7N4JEIZNQAPVFNNVB2OGSU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XA5CCGSPUXUTQHDG25O5DM4G37BLRUMN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14755-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T7KZSNPFAS32QHPRWSJGI2D4QTO3KWTH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14824-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SEZ7TDWKNAHFBSUJ6EKTGNZH73T5RDFR/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-01-28"/>
	<updated date="2025-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21502/">CVE-2025-21502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21502">CVE-2025-21502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236278">SUSE bug 1236278</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009961355" comment="java-17-openjdk-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961356" comment="java-17-openjdk-demo-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961406" comment="java-17-openjdk-demo-fastdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961407" comment="java-17-openjdk-demo-slowdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961359" comment="java-17-openjdk-devel-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961409" comment="java-17-openjdk-devel-fastdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961410" comment="java-17-openjdk-devel-slowdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961411" comment="java-17-openjdk-fastdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961363" comment="java-17-openjdk-headless-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961413" comment="java-17-openjdk-headless-fastdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961414" comment="java-17-openjdk-headless-slowdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961366" comment="java-17-openjdk-javadoc-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961367" comment="java-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961368" comment="java-17-openjdk-jmods-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961418" comment="java-17-openjdk-jmods-fastdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961419" comment="java-17-openjdk-jmods-slowdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961420" comment="java-17-openjdk-slowdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961372" comment="java-17-openjdk-src-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961422" comment="java-17-openjdk-src-fastdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961423" comment="java-17-openjdk-src-slowdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961375" comment="java-17-openjdk-static-libs-17.0.14.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961425" comment="java-17-openjdk-static-libs-fastdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961426" comment="java-17-openjdk-static-libs-slowdebug-17.0.14.0.7-3.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961378" comment="java-21-openjdk-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961379" comment="java-21-openjdk-demo-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961380" comment="java-21-openjdk-demo-fastdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961381" comment="java-21-openjdk-demo-slowdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961382" comment="java-21-openjdk-devel-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961383" comment="java-21-openjdk-devel-fastdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961384" comment="java-21-openjdk-devel-slowdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961385" comment="java-21-openjdk-fastdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961386" comment="java-21-openjdk-headless-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961387" comment="java-21-openjdk-headless-fastdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961388" comment="java-21-openjdk-headless-slowdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961389" comment="java-21-openjdk-javadoc-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961390" comment="java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961391" comment="java-21-openjdk-jmods-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961392" comment="java-21-openjdk-jmods-fastdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961393" comment="java-21-openjdk-jmods-slowdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961394" comment="java-21-openjdk-slowdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961395" comment="java-21-openjdk-src-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961396" comment="java-21-openjdk-src-fastdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961397" comment="java-21-openjdk-src-slowdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961398" comment="java-21-openjdk-static-libs-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961399" comment="java-21-openjdk-static-libs-fastdebug-21.0.6.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009961400" comment="java-21-openjdk-static-libs-slowdebug-21.0.6.0.7-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21503</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21503" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21503" ref_url="https://www.suse.com/security/cve/CVE-2025-21503" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21503/">CVE-2025-21503 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21503">CVE-2025-21503 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21504</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21504" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21504" ref_url="https://www.suse.com/security/cve/CVE-2025-21504" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21504/">CVE-2025-21504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21504">CVE-2025-21504 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21505</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21505" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21505" ref_url="https://www.suse.com/security/cve/CVE-2025-21505" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21505/">CVE-2025-21505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21505">CVE-2025-21505 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21518</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21518" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21518" ref_url="https://www.suse.com/security/cve/CVE-2025-21518" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21518/">CVE-2025-21518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21518">CVE-2025-21518 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21519" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21519" ref_url="https://www.suse.com/security/cve/CVE-2025-21519" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21519/">CVE-2025-21519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21519">CVE-2025-21519 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21520" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21520" ref_url="https://www.suse.com/security/cve/CVE-2025-21520" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21520/">CVE-2025-21520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21520">CVE-2025-21520 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21521</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21521" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21521" ref_url="https://www.suse.com/security/cve/CVE-2025-21521" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21521/">CVE-2025-21521 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21521">CVE-2025-21521 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21522" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21522" ref_url="https://www.suse.com/security/cve/CVE-2025-21522" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21522/">CVE-2025-21522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21522">CVE-2025-21522 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21523</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21523" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21523" ref_url="https://www.suse.com/security/cve/CVE-2025-21523" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21523/">CVE-2025-21523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21523">CVE-2025-21523 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21525</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21525" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21525" ref_url="https://www.suse.com/security/cve/CVE-2025-21525" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21525/">CVE-2025-21525 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21525">CVE-2025-21525 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21529" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21529" ref_url="https://www.suse.com/security/cve/CVE-2025-21529" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21529/">CVE-2025-21529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21529">CVE-2025-21529 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21531" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21531" ref_url="https://www.suse.com/security/cve/CVE-2025-21531" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21531/">CVE-2025-21531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21531">CVE-2025-21531 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21534" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21534" ref_url="https://www.suse.com/security/cve/CVE-2025-21534" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21534/">CVE-2025-21534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21534">CVE-2025-21534 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21536" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21536" ref_url="https://www.suse.com/security/cve/CVE-2025-21536" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21536/">CVE-2025-21536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21536">CVE-2025-21536 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21540</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21540" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21540" ref_url="https://www.suse.com/security/cve/CVE-2025-21540" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21540/">CVE-2025-21540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21540">CVE-2025-21540 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21543</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21543" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21543" ref_url="https://www.suse.com/security/cve/CVE-2025-21543" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21543/">CVE-2025-21543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21543">CVE-2025-21543 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21546</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21546" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21546" ref_url="https://www.suse.com/security/cve/CVE-2025-21546" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21546/">CVE-2025-21546 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21546">CVE-2025-21546 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21555</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21555" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21555" ref_url="https://www.suse.com/security/cve/CVE-2025-21555" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21555/">CVE-2025-21555 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21555">CVE-2025-21555 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21559</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21559" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21559" ref_url="https://www.suse.com/security/cve/CVE-2025-21559" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1671" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000898.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000910.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-21"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21559/">CVE-2025-21559 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21559">CVE-2025-21559 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009965094" comment="mysql-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965095" comment="mysql-common-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965096" comment="mysql-devel-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965097" comment="mysql-errmsg-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965098" comment="mysql-libs-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965099" comment="mysql-server-8.0.41-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009965100" comment="mysql-test-8.0.41-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21574" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21574" ref_url="https://www.suse.com/security/cve/CVE-2025-21574" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21574/">CVE-2025-21574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21574">CVE-2025-21574 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21575</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21575" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21575" ref_url="https://www.suse.com/security/cve/CVE-2025-21575" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21575/">CVE-2025-21575 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21575">CVE-2025-21575 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21577</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21577" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21577" ref_url="https://www.suse.com/security/cve/CVE-2025-21577" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21577/">CVE-2025-21577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21577">CVE-2025-21577 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21579</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21579" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21579" ref_url="https://www.suse.com/security/cve/CVE-2025-21579" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21579/">CVE-2025-21579 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21579">CVE-2025-21579 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21580</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21580" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21580" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21580" ref_url="https://www.suse.com/security/cve/CVE-2025-21580" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21580/">CVE-2025-21580 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21580">CVE-2025-21580 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21581" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21581" ref_url="https://www.suse.com/security/cve/CVE-2025-21581" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21581/">CVE-2025-21581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21581">CVE-2025-21581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21584</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21584" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21584" ref_url="https://www.suse.com/security/cve/CVE-2025-21584" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21584/">CVE-2025-21584 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21584">CVE-2025-21584 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21585</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21585" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21585" ref_url="https://www.suse.com/security/cve/CVE-2025-21585" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21585/">CVE-2025-21585 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21585">CVE-2025-21585 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21587</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21587" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21587" ref_url="https://www.suse.com/security/cve/CVE-2025-21587" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3844" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3845" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001044.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001784.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3852" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3855" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1524-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BRJ4ISGUWDRCC6WFUQ7DJTTNQVMYNV5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6XNBWNLTVY24PY5AGA3UCES65X3SMQN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTNITOYWDOKJOEHSH2CU5O6OKDMZOEYZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQYOZOCMS25XBQWUFJFFM6CS5L66IC5C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15080-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI5CZCHTIKADEFJKS6K6CGUTIV4PERYD/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-20"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21587/">CVE-2025-21587 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21587">CVE-2025-21587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241274">SUSE bug 1241274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976014" comment="java-1.8.0-openjdk-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976015" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976016" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976017" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976018" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976019" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976020" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976021" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976022" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976023" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976024" comment="java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976025" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976026" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976027" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976028" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976029" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976030" comment="java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976031" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976032" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976033" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999610" comment="java-11-openjdk-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999611" comment="java-11-openjdk-demo-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999552" comment="java-11-openjdk-demo-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999553" comment="java-11-openjdk-demo-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999612" comment="java-11-openjdk-devel-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999556" comment="java-11-openjdk-devel-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999557" comment="java-11-openjdk-devel-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999558" comment="java-11-openjdk-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999613" comment="java-11-openjdk-headless-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999561" comment="java-11-openjdk-headless-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999562" comment="java-11-openjdk-headless-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999614" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999615" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999616" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999569" comment="java-11-openjdk-jmods-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999570" comment="java-11-openjdk-jmods-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999571" comment="java-11-openjdk-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999617" comment="java-11-openjdk-src-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999574" comment="java-11-openjdk-src-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999575" comment="java-11-openjdk-src-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999618" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999578" comment="java-11-openjdk-static-libs-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999579" comment="java-11-openjdk-static-libs-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976149" comment="java-17-openjdk-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976150" comment="java-17-openjdk-demo-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976151" comment="java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976152" comment="java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976153" comment="java-17-openjdk-devel-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976154" comment="java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976155" comment="java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976156" comment="java-17-openjdk-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976157" comment="java-17-openjdk-headless-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976158" comment="java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976159" comment="java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976160" comment="java-17-openjdk-javadoc-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976161" comment="java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976162" comment="java-17-openjdk-jmods-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976163" comment="java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976164" comment="java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976165" comment="java-17-openjdk-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976166" comment="java-17-openjdk-src-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976167" comment="java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976168" comment="java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976169" comment="java-17-openjdk-static-libs-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976170" comment="java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976171" comment="java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976253" comment="java-21-openjdk-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976254" comment="java-21-openjdk-demo-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976255" comment="java-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976256" comment="java-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976257" comment="java-21-openjdk-devel-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976258" comment="java-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976259" comment="java-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976260" comment="java-21-openjdk-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976261" comment="java-21-openjdk-headless-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976262" comment="java-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976263" comment="java-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976264" comment="java-21-openjdk-javadoc-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976265" comment="java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976266" comment="java-21-openjdk-jmods-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976267" comment="java-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976268" comment="java-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976269" comment="java-21-openjdk-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976270" comment="java-21-openjdk-src-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976271" comment="java-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976272" comment="java-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976273" comment="java-21-openjdk-static-libs-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976274" comment="java-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976275" comment="java-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21588</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21588" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21588" ref_url="https://www.suse.com/security/cve/CVE-2025-21588" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-21"/>
	<updated date="2025-09-21"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21588/">CVE-2025-21588 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21588">CVE-2025-21588 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21605</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21605" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21605" ref_url="https://www.suse.com/security/cve/CVE-2025-21605" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001290.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7438" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001312.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7686" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1420-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1432-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1433-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020843.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15035-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSPBVBDGOIAOC7YYCCDLC4XBLWKHYLWL/" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like firewalls, iptables, security groups, etc, or enabling TLS and requiring users to authenticate using client side certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21605/">CVE-2025-21605 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21605">CVE-2025-21605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241708">SUSE bug 1241708</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983976" comment="redis-7.2.8-1.module+el9.6.0+23049+8374f320 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983977" comment="redis-devel-7.2.8-1.module+el9.6.0+23049+8374f320 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983978" comment="redis-doc-7.2.8-1.module+el9.6.0+23049+8374f320 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21631" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21631" ref_url="https://www.suse.com/security/cve/CVE-2025-21631" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()

Our syzkaller report a following UAF for v6.6:

BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958
Read of size 8 at addr ffff8881b57147d8 by task fsstress/232726

CPU: 2 PID: 232726 Comm: fsstress Not tainted 6.6.0-g3629d1885222 #39
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x91/0xf0 lib/dump_stack.c:106
 print_address_description.constprop.0+0x66/0x300 mm/kasan/report.c:364
 print_report+0x3e/0x70 mm/kasan/report.c:475
 kasan_report+0xb8/0xf0 mm/kasan/report.c:588
 hlist_add_head include/linux/list.h:1023 [inline]
 bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958
 bfq_insert_request.isra.0+0xe8/0xa20 block/bfq-iosched.c:6271
 bfq_insert_requests+0x27f/0x390 block/bfq-iosched.c:6323
 blk_mq_insert_request+0x290/0x8f0 block/blk-mq.c:2660
 blk_mq_submit_bio+0x1021/0x15e0 block/blk-mq.c:3143
 __submit_bio+0xa0/0x6b0 block/blk-core.c:639
 __submit_bio_noacct_mq block/blk-core.c:718 [inline]
 submit_bio_noacct_nocheck+0x5b7/0x810 block/blk-core.c:747
 submit_bio_noacct+0xca0/0x1990 block/blk-core.c:847
 __ext4_read_bh fs/ext4/super.c:205 [inline]
 ext4_read_bh+0x15e/0x2e0 fs/ext4/super.c:230
 __read_extent_tree_block+0x304/0x6f0 fs/ext4/extents.c:567
 ext4_find_extent+0x479/0xd20 fs/ext4/extents.c:947
 ext4_ext_map_blocks+0x1a3/0x2680 fs/ext4/extents.c:4182
 ext4_map_blocks+0x929/0x15a0 fs/ext4/inode.c:660
 ext4_iomap_begin_report+0x298/0x480 fs/ext4/inode.c:3569
 iomap_iter+0x3dd/0x1010 fs/iomap/iter.c:91
 iomap_fiemap+0x1f4/0x360 fs/iomap/fiemap.c:80
 ext4_fiemap+0x181/0x210 fs/ext4/extents.c:5051
 ioctl_fiemap.isra.0+0x1b4/0x290 fs/ioctl.c:220
 do_vfs_ioctl+0x31c/0x11a0 fs/ioctl.c:811
 __do_sys_ioctl fs/ioctl.c:869 [inline]
 __se_sys_ioctl+0xae/0x190 fs/ioctl.c:857
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x70/0x120 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x78/0xe2

Allocated by task 232719:
 kasan_save_stack+0x22/0x50 mm/kasan/common.c:45
 kasan_set_track+0x25/0x30 mm/kasan/common.c:52
 __kasan_slab_alloc+0x87/0x90 mm/kasan/common.c:328
 kasan_slab_alloc include/linux/kasan.h:188 [inline]
 slab_post_alloc_hook mm/slab.h:768 [inline]
 slab_alloc_node mm/slub.c:3492 [inline]
 kmem_cache_alloc_node+0x1b8/0x6f0 mm/slub.c:3537
 bfq_get_queue+0x215/0x1f00 block/bfq-iosched.c:5869
 bfq_get_bfqq_handle_split+0x167/0x5f0 block/bfq-iosched.c:6776
 bfq_init_rq+0x13a4/0x17a0 block/bfq-iosched.c:6938
 bfq_insert_request.isra.0+0xe8/0xa20 block/bfq-iosched.c:6271
 bfq_insert_requests+0x27f/0x390 block/bfq-iosched.c:6323
 blk_mq_insert_request+0x290/0x8f0 block/blk-mq.c:2660
 blk_mq_submit_bio+0x1021/0x15e0 block/blk-mq.c:3143
 __submit_bio+0xa0/0x6b0 block/blk-core.c:639
 __submit_bio_noacct_mq block/blk-core.c:718 [inline]
 submit_bio_noacct_nocheck+0x5b7/0x810 block/blk-core.c:747
 submit_bio_noacct+0xca0/0x1990 block/blk-core.c:847
 __ext4_read_bh fs/ext4/super.c:205 [inline]
 ext4_read_bh_nowait+0x15a/0x240 fs/ext4/super.c:217
 ext4_read_bh_lock+0xac/0xd0 fs/ext4/super.c:242
 ext4_bread_batch+0x268/0x500 fs/ext4/inode.c:958
 __ext4_find_entry+0x448/0x10f0 fs/ext4/namei.c:1671
 ext4_lookup_entry fs/ext4/namei.c:1774 [inline]
 ext4_lookup.part.0+0x359/0x6f0 fs/ext4/namei.c:1842
 ext4_lookup+0x72/0x90 fs/ext4/namei.c:1839
 __lookup_slow+0x257/0x480 fs/namei.c:1696
 lookup_slow fs/namei.c:1713 [inline]
 walk_component+0x454/0x5c0 fs/namei.c:2004
 link_path_walk.part.0+0x773/0xda0 fs/namei.c:2331
 link_path_walk fs/namei.c:3826 [inline]
 path_openat+0x1b9/0x520 fs/namei.c:3826
 do_filp_open+0x1b7/0x400 fs/namei.c:3857
 do_sys_openat2+0x5dc/0x6e0 fs/open.c:1428
 do_sys_open fs/open.c:1443 [inline]
 __do_sys_openat fs/open.c:1459 [inline]
 __se_sys_openat fs/open.c:1454 [inline]
 __x64_sys_openat+0x148/0x200 fs/open.c:1454
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_6
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21631/">CVE-2025-21631 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21631">CVE-2025-21631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236099">SUSE bug 1236099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236100">SUSE bug 1236100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21633</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21633" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21633" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21633" ref_url="https://www.suse.com/security/cve/CVE-2025-21633" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7423" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001566.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21633/">CVE-2025-21633 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21633">CVE-2025-21633 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236108">SUSE bug 1236108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985567" comment="kernel-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985568" comment="kernel-abi-stablelists-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985569" comment="kernel-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985570" comment="kernel-cross-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985571" comment="kernel-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985572" comment="kernel-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985575" comment="kernel-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985576" comment="kernel-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985577" comment="kernel-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985578" comment="kernel-debug-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985581" comment="kernel-doc-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985582" comment="kernel-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985583" comment="kernel-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985584" comment="kernel-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985585" comment="kernel-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985586" comment="kernel-rt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985587" comment="kernel-rt-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985588" comment="kernel-rt-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985589" comment="kernel-rt-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985591" comment="kernel-rt-debug-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985592" comment="kernel-rt-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985593" comment="kernel-rt-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985594" comment="kernel-rt-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985596" comment="kernel-rt-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985597" comment="kernel-rt-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985598" comment="kernel-rt-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985599" comment="kernel-rt-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985600" comment="kernel-tools-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985601" comment="kernel-tools-libs-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985603" comment="kernel-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985604" comment="kernel-uki-virt-addons-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985605" comment="libperf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985606" comment="perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985607" comment="python3-perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985608" comment="rtla-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985609" comment="rv-5.14.0-570.16.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21646" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21646" ref_url="https://www.suse.com/security/cve/CVE-2025-21646" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix the maximum cell name length

The kafs filesystem limits the maximum length of a cell to 256 bytes, but a
problem occurs if someone actually does that: kafs tries to create a
directory under /proc/net/afs/ with the name of the cell, but that fails
with a warning:

        WARNING: CPU: 0 PID: 9 at fs/proc/generic.c:405

because procfs limits the maximum filename length to 255.

However, the DNS limits the maximum lookup length and, by extension, the
maximum cell name, to 255 less two (length count and trailing NUL).

Fix this by limiting the maximum acceptable cellname length to 253.  This
also allows us to be sure we can create the "/afs/.&lt;cell&gt;/" mountpoint too.

Further, split the YFS VL record cell name maximum to be the 256 allowed by
the protocol and ignore the record retrieved by YFSVL.GetCellName if it
exceeds 253.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21646/">CVE-2025-21646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21646">CVE-2025-21646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236168">SUSE bug 1236168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21647" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21647" ref_url="https://www.suse.com/security/cve/CVE-2025-21647" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0833-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: add bounds checks to host bulk flow fairness counts

Even though we fixed a logic error in the commit cited below, syzbot
still managed to trigger an underflow of the per-host bulk flow
counters, leading to an out of bounds memory access.

To avoid any such logic errors causing out of bounds memory accesses,
this commit factors out all accesses to the per-host bulk flow counters
to a series of helpers that perform bounds-checking before any
increments and decrements. This also has the benefit of improving
readability by moving the conditional checks for the flow mode into
these helpers, instead of having them spread out throughout the
code (which was the cause of the original logic error).

As part of this change, the flow quantum calculation is consolidated
into a helper function, which means that the dithering applied to the
ost load scaling is now applied both in the DRR rotation and when a
sparse flow's quantum is first initiated. The only user-visible effect
of this is that the maximum packet size that can be sent while a flow
stays sparse will now vary with +/- one byte in some cases. This should
not make a noticeable difference in practice, and thus it's not worth
complicating the code to preserve the old behaviour.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21647/">CVE-2025-21647 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21647">CVE-2025-21647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236133">SUSE bug 1236133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1236134">SUSE bug 1236134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21648</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21648" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21648" ref_url="https://www.suse.com/security/cve/CVE-2025-21648" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: clamp maximum hashtable size to INT_MAX

Use INT_MAX as maximum size for the conntrack hashtable. Otherwise, it
is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof() when
resizing hashtable because __GFP_NOWARN is unset. See:

  0708a0afe291 ("mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls")

Note: hashtable resize is only possible from init_netns.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21648/">CVE-2025-21648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21648">CVE-2025-21648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236142">SUSE bug 1236142</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21663</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21663" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21663" ref_url="https://www.suse.com/security/cve/CVE-2025-21663" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: dwmac-tegra: Read iommu stream id from device tree

Nvidia's Tegra MGBE controllers require the IOMMU "Stream ID" (SID) to be
written to the MGBE_WRAP_AXI_ASID0_CTRL register.

The current driver is hard coded to use MGBE0's SID for all controllers.
This causes softirq time outs and kernel panics when using controllers
other than MGBE0.

Example dmesg errors when an ethernet cable is connected to MGBE1:

[  116.133290] tegra-mgbe 6910000.ethernet eth1: Link is Up - 1Gbps/Full - flow control rx/tx
[  121.851283] tegra-mgbe 6910000.ethernet eth1: NETDEV WATCHDOG: CPU: 5: transmit queue 0 timed out 5690 ms
[  121.851782] tegra-mgbe 6910000.ethernet eth1: Reset adapter.
[  121.892464] tegra-mgbe 6910000.ethernet eth1: Register MEM_TYPE_PAGE_POOL RxQ-0
[  121.905920] tegra-mgbe 6910000.ethernet eth1: PHY [stmmac-1:00] driver [Aquantia AQR113] (irq=171)
[  121.907356] tegra-mgbe 6910000.ethernet eth1: Enabling Safety Features
[  121.907578] tegra-mgbe 6910000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
[  121.908399] tegra-mgbe 6910000.ethernet eth1: registered PTP clock
[  121.908582] tegra-mgbe 6910000.ethernet eth1: configuring for phy/10gbase-r link mode
[  125.961292] tegra-mgbe 6910000.ethernet eth1: Link is Up - 1Gbps/Full - flow control rx/tx
[  181.921198] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[  181.921404] rcu: 	7-....: (1 GPs behind) idle=540c/1/0x4000000000000002 softirq=1748/1749 fqs=2337
[  181.921684] rcu: 	(detected by 4, t=6002 jiffies, g=1357, q=1254 ncpus=8)
[  181.921878] Sending NMI from CPU 4 to CPUs 7:
[  181.921886] NMI backtrace for cpu 7
[  181.922131] CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Kdump: loaded Not tainted 6.13.0-rc3+ #6
[  181.922390] Hardware name: NVIDIA CTI Forge + Orin AGX/Jetson, BIOS 202402.1-Unknown 10/28/2024
[  181.922658] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  181.922847] pc : handle_softirqs+0x98/0x368
[  181.922978] lr : __do_softirq+0x18/0x20
[  181.923095] sp : ffff80008003bf50
[  181.923189] x29: ffff80008003bf50 x28: 0000000000000008 x27: 0000000000000000
[  181.923379] x26: ffffce78ea277000 x25: 0000000000000000 x24: 0000001c61befda0
[  181.924486] x23: 0000000060400009 x22: ffffce78e99918bc x21: ffff80008018bd70
[  181.925568] x20: ffffce78e8bb00d8 x19: ffff80008018bc20 x18: 0000000000000000
[  181.926655] x17: ffff318ebe7d3000 x16: ffff800080038000 x15: 0000000000000000
[  181.931455] x14: ffff000080816680 x13: ffff318ebe7d3000 x12: 000000003464d91d
[  181.938628] x11: 0000000000000040 x10: ffff000080165a70 x9 : ffffce78e8bb0160
[  181.945804] x8 : ffff8000827b3160 x7 : f9157b241586f343 x6 : eeb6502a01c81c74
[  181.953068] x5 : a4acfcdd2e8096bb x4 : ffffce78ea277340 x3 : 00000000ffffd1e1
[  181.960329] x2 : 0000000000000101 x1 : ffffce78ea277340 x0 : ffff318ebe7d3000
[  181.967591] Call trace:
[  181.970043]  handle_softirqs+0x98/0x368 (P)
[  181.974240]  __do_softirq+0x18/0x20
[  181.977743]  ____do_softirq+0x14/0x28
[  181.981415]  call_on_irq_stack+0x24/0x30
[  181.985180]  do_softirq_own_stack+0x20/0x30
[  181.989379]  __irq_exit_rcu+0x114/0x140
[  181.993142]  irq_exit_rcu+0x14/0x28
[  181.996816]  el1_interrupt+0x44/0xb8
[  182.000316]  el1h_64_irq_handler+0x14/0x20
[  182.004343]  el1h_64_irq+0x80/0x88
[  182.007755]  cpuidle_enter_state+0xc4/0x4a8 (P)
[  182.012305]  cpuidle_enter+0x3c/0x58
[  182.015980]  cpuidle_idle_call+0x128/0x1c0
[  182.020005]  do_idle+0xe0/0xf0
[  182.023155]  cpu_startup_entry+0x3c/0x48
[  182.026917]  secondary_start_kernel+0xdc/0x120
[  182.031379]  __secondary_switched+0x74/0x78
[  212.971162] rcu: INFO: rcu_preempt detected expedited stalls on CPUs/tasks: { 7-.... } 6103 jiffies s: 417 root: 0x80/.
[  212.985935] rcu: blocking rcu_node structures (internal RCU debug):
[  212.992758] Sending NMI from CPU 0 to CPUs 7:
[  212.998539] NMI backtrace for cpu 7
[  213.004304] CPU: 7 UID: 0 PI
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21663/">CVE-2025-21663 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21663">CVE-2025-21663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236260">SUSE bug 1236260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21666</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21666" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21666" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21666" ref_url="https://www.suse.com/security/cve/CVE-2025-21666" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]

Recent reports have shown how we sometimes call vsock_*_has_data()
when a vsock socket has been de-assigned from a transport (see attached
links), but we shouldn't.

Previous commits should have solved the real problems, but we may have
more in the future, so to avoid null-ptr-deref, we can return 0
(no space, no data available) but with a warning.

This way the code should continue to run in a nearly consistent state
and have a warning that allows us to debug future problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21666/">CVE-2025-21666 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21666">CVE-2025-21666 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236680">SUSE bug 1236680</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21668</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21668" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21668" ref_url="https://www.suse.com/security/cve/CVE-2025-21668" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx8mp-blk-ctrl: add missing loop break condition

Currently imx8mp_blk_ctrl_remove() will continue the for loop
until an out-of-bounds exception occurs.

pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : dev_pm_domain_detach+0x8/0x48
lr : imx8mp_blk_ctrl_shutdown+0x58/0x90
sp : ffffffc084f8bbf0
x29: ffffffc084f8bbf0 x28: ffffff80daf32ac0 x27: 0000000000000000
x26: ffffffc081658d78 x25: 0000000000000001 x24: ffffffc08201b028
x23: ffffff80d0db9490 x22: ffffffc082340a78 x21: 00000000000005b0
x20: ffffff80d19bc180 x19: 000000000000000a x18: ffffffffffffffff
x17: ffffffc080a39e08 x16: ffffffc080a39c98 x15: 4f435f464f006c72
x14: 0000000000000004 x13: ffffff80d0172110 x12: 0000000000000000
x11: ffffff80d0537740 x10: ffffff80d05376c0 x9 : ffffffc0808ed2d8
x8 : ffffffc084f8bab0 x7 : 0000000000000000 x6 : 0000000000000000
x5 : ffffff80d19b9420 x4 : fffffffe03466e60 x3 : 0000000080800077
x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000000
Call trace:
 dev_pm_domain_detach+0x8/0x48
 platform_shutdown+0x2c/0x48
 device_shutdown+0x158/0x268
 kernel_restart_prepare+0x40/0x58
 kernel_kexec+0x58/0xe8
 __do_sys_reboot+0x198/0x258
 __arm64_sys_reboot+0x2c/0x40
 invoke_syscall+0x5c/0x138
 el0_svc_common.constprop.0+0x48/0xf0
 do_el0_svc+0x24/0x38
 el0_svc+0x38/0xc8
 el0t_64_sync_handler+0x120/0x130
 el0t_64_sync+0x190/0x198
Code: 8128c2d0 ffffffc0 aa1e03e9 d503201f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21668/">CVE-2025-21668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21668">CVE-2025-21668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236682">SUSE bug 1236682</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21669</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21669" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21669" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21669" ref_url="https://www.suse.com/security/cve/CVE-2025-21669" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: discard packets if the transport changes

If the socket has been de-assigned or assigned to another transport,
we must discard any packets received because they are not expected
and would cause issues when we access vsk-&gt;transport.

A possible scenario is described by Hyunwoo Kim in the attached link,
where after a first connect() interrupted by a signal, and a second
connect() failed, we can find `vsk-&gt;transport` at NULL, leading to a
NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21669/">CVE-2025-21669 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21669">CVE-2025-21669 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236683">SUSE bug 1236683</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21671</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21671" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21671" ref_url="https://www.suse.com/security/cve/CVE-2025-21671" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

zram: fix potential UAF of zram table

If zram_meta_alloc failed early, it frees allocated zram-&gt;table without
setting it NULL.  Which will potentially cause zram_meta_free to access
the table if user reset an failed and uninitialized device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21671/">CVE-2025-21671 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21671">CVE-2025-21671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236692">SUSE bug 1236692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21672</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21672" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21672" ref_url="https://www.suse.com/security/cve/CVE-2025-21672" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

afs: Fix merge preference rule failure condition

syzbot reported a lock held when returning to userspace[1].  This is
because if argc is less than 0 and the function returns directly, the held
inode lock is not released.

Fix this by store the error in ret and jump to done to clean up instead of
returning directly.

[dh: Modified Lizhi Xu's original patch to make it honour the error code
from afs_split_string()]

[1]
WARNING: lock held when returning to user space!
6.13.0-rc3-syzkaller-00209-g499551201b5f #0 Not tainted
------------------------------------------------
syz-executor133/5823 is leaving the kernel with locks still held!
1 lock held by syz-executor133/5823:
 #0: ffff888071cffc00 (&amp;sb-&gt;s_type-&gt;i_mutex_key#9){++++}-{4:4}, at: inode_lock include/linux/fs.h:818 [inline]
 #0: ffff888071cffc00 (&amp;sb-&gt;s_type-&gt;i_mutex_key#9){++++}-{4:4}, at: afs_proc_addr_prefs_write+0x2bb/0x14e0 fs/afs/addr_prefs.c:388
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21672/">CVE-2025-21672 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21672">CVE-2025-21672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236691">SUSE bug 1236691</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21689</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21689" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21689" ref_url="https://www.suse.com/security/cve/CVE-2025-21689" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

USB: serial: quatech2: fix null-ptr-deref in qt2_process_read_urb()

This patch addresses a null-ptr-deref in qt2_process_read_urb() due to
an incorrect bounds check in the following:

       if (newport &gt; serial-&gt;num_ports) {
               dev_err(&amp;port-&gt;dev,
                       "%s - port change to invalid port: %i\n",
                       __func__, newport);
               break;
       }

The condition doesn't account for the valid range of the serial-&gt;port
buffer, which is from 0 to serial-&gt;num_ports - 1. When newport is equal
to serial-&gt;num_ports, the assignment of "port" in the
following code is out-of-bounds and NULL:

       serial_priv-&gt;current_port = newport;
       port = serial-&gt;port[serial_priv-&gt;current_port];

The fix checks if newport is greater than or equal to serial-&gt;num_ports
indicating it is out-of-bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21689/">CVE-2025-21689 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21689">CVE-2025-21689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237017">SUSE bug 1237017</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21691" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21691" ref_url="https://www.suse.com/security/cve/CVE-2025-21691" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cachestat: fix page cache statistics permission checking

When the 'cachestat()' system call was added in commit cf264e1329fb
("cachestat: implement cachestat syscall"), it was meant to be a much
more convenient (and performant) version of mincore() that didn't need
mapping things into the user virtual address space in order to work.

But it ended up missing the "check for writability or ownership" fix for
mincore(), done in commit 134fca9063ad ("mm/mincore.c: make mincore()
more conservative").

This just adds equivalent logic to 'cachestat()', modified for the file
context (rather than vma).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21691/">CVE-2025-21691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21691">CVE-2025-21691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237026">SUSE bug 1237026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21693" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21693" ref_url="https://www.suse.com/security/cve/CVE-2025-21693" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: zswap: properly synchronize freeing resources during CPU hotunplug

In zswap_compress() and zswap_decompress(), the per-CPU acomp_ctx of the
current CPU at the beginning of the operation is retrieved and used
throughout.  However, since neither preemption nor migration are disabled,
it is possible that the operation continues on a different CPU.

If the original CPU is hotunplugged while the acomp_ctx is still in use,
we run into a UAF bug as some of the resources attached to the acomp_ctx
are freed during hotunplug in zswap_cpu_comp_dead() (i.e. 
acomp_ctx.buffer, acomp_ctx.req, or acomp_ctx.acomp).

The problem was introduced in commit 1ec3b5fe6eec ("mm/zswap: move to use
crypto_acomp API for hardware acceleration") when the switch to the
crypto_acomp API was made.  Prior to that, the per-CPU crypto_comp was
retrieved using get_cpu_ptr() which disables preemption and makes sure the
CPU cannot go away from under us.  Preemption cannot be disabled with the
crypto_acomp API as a sleepable context is needed.

Use the acomp_ctx.mutex to synchronize CPU hotplug callbacks allocating
and freeing resources with compression/decompression paths.  Make sure
that acomp_ctx.req is NULL when the resources are freed.  In the
compression/decompression paths, check if acomp_ctx.req is NULL after
acquiring the mutex (meaning the CPU was offlined) and retry on the new
CPU.

The initialization of acomp_ctx.mutex is moved from the CPU hotplug
callback to the pool initialization where it belongs (where the mutex is
allocated).  In addition to adding clarity, this makes sure that CPU
hotplug cannot reinitialize a mutex that is already locked by
compression/decompression.

Previously a fix was attempted by holding cpus_read_lock() [1].  This
would have caused a potential deadlock as it is possible for code already
holding the lock to fall into reclaim and enter zswap (causing a
deadlock).  A fix was also attempted using SRCU for synchronization, but
Johannes pointed out that synchronize_srcu() cannot be used in CPU hotplug
notifiers [2].

Alternative fixes that were considered/attempted and could have worked:
- Refcounting the per-CPU acomp_ctx. This involves complexity in
  handling the race between the refcount dropping to zero in
  zswap_[de]compress() and the refcount being re-initialized when the
  CPU is onlined.
- Disabling migration before getting the per-CPU acomp_ctx [3], but
  that's discouraged and is a much bigger hammer than needed, and could
  result in subtle performance issues.

[1]https://lkml.kernel.org/20241219212437.2714151-1-yosryahmed@google.com/
[2]https://lkml.kernel.org/20250107074724.1756696-2-yosryahmed@google.com/
[3]https://lkml.kernel.org/20250107222236.2715883-2-yosryahmed@google.com/

[yosryahmed@google.com: remove comment]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21693/">CVE-2025-21693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21693">CVE-2025-21693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237029">SUSE bug 1237029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237047">SUSE bug 1237047</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21694</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21694" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21694" ref_url="https://www.suse.com/security/cve/CVE-2025-21694" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc: fix softlockup in __read_vmcore (part 2)

Since commit 5cbcb62dddf5 ("fs/proc: fix softlockup in __read_vmcore") the
number of softlockups in __read_vmcore at kdump time have gone down, but
they still happen sometimes.

In a memory constrained environment like the kdump image, a softlockup is
not just a harmless message, but it can interfere with things like RCU
freeing memory, causing the crashdump to get stuck.

The second loop in __read_vmcore has a lot more opportunities for natural
sleep points, like scheduling out while waiting for a data write to
happen, but apparently that is not always enough.

Add a cond_resched() to the second loop in __read_vmcore to (hopefully)
get rid of the softlockups.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21694/">CVE-2025-21694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21694">CVE-2025-21694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237109">SUSE bug 1237109</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21696" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21696" ref_url="https://www.suse.com/security/cve/CVE-2025-21696" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: clear uffd-wp PTE/PMD state on mremap()

When mremap()ing a memory region previously registered with userfaultfd as
write-protected but without UFFD_FEATURE_EVENT_REMAP, an inconsistency in
flag clearing leads to a mismatch between the vma flags (which have
uffd-wp cleared) and the pte/pmd flags (which do not have uffd-wp
cleared).  This mismatch causes a subsequent mprotect(PROT_WRITE) to
trigger a warning in page_table_check_pte_flags() due to setting the pte
to writable while uffd-wp is still set.

Fix this by always explicitly clearing the uffd-wp pte/pmd flags on any
such mremap() so that the values are consistent with the existing clearing
of VM_UFFD_WP.  Be careful to clear the logical flag regardless of its
physical form; a PTE bit, a swap PTE bit, or a PTE marker.  Cover PTE,
huge PMD and hugetlb paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21696/">CVE-2025-21696 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21696">CVE-2025-21696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237111">SUSE bug 1237111</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21702" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21702" ref_url="https://www.suse.com/security/cve/CVE-2025-21702" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02606-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02608-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02637-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02673-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02691-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20612-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20613-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20615-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20621-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20622-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20623-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pfifo_tail_enqueue: Drop new packet when sch-&gt;limit == 0

Expected behaviour:
In case we reach scheduler's limit, pfifo_tail_enqueue() will drop a
packet in scheduler's queue and decrease scheduler's qlen by one.
Then, pfifo_tail_enqueue() enqueue new packet and increase
scheduler's qlen by one. Finally, pfifo_tail_enqueue() return
`NET_XMIT_CN` status code.

Weird behaviour:
In case we set `sch-&gt;limit == 0` and trigger pfifo_tail_enqueue() on a
scheduler that has no packet, the 'drop a packet' step will do nothing.
This means the scheduler's qlen still has value equal 0.
Then, we continue to enqueue new packet and increase scheduler's qlen by
one. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by
one and return `NET_XMIT_CN` status code.

The problem is:
Let's say we have two qdiscs: Qdisc_A and Qdisc_B.
 - Qdisc_A's type must have '-&gt;graft()' function to create parent/child relationship.
   Let's say Qdisc_A's type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.
 - Qdisc_B's type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.
 - Qdisc_B is configured to have `sch-&gt;limit == 0`.
 - Qdisc_A is configured to route the enqueued's packet to Qdisc_B.

Enqueue packet through Qdisc_A will lead to:
 - hfsc_enqueue(Qdisc_A) -&gt; pfifo_tail_enqueue(Qdisc_B)
 - Qdisc_B-&gt;q.qlen += 1
 - pfifo_tail_enqueue() return `NET_XMIT_CN`
 - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` =&gt; hfsc_enqueue() don't increase qlen of Qdisc_A.

The whole process lead to a situation where Qdisc_A-&gt;q.qlen == 0 and Qdisc_B-&gt;q.qlen == 1.
Replace 'hfsc' with other type (for example: 'drr') still lead to the same problem.
This violate the design where parent's qlen should equal to the sum of its childrens'qlen.

Bug impact: This issue can be used for user-&gt;kernel privilege escalation when it is reachable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21702/">CVE-2025-21702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21702">CVE-2025-21702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237312">SUSE bug 1237312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245797">SUSE bug 1245797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21714" ref_url="https://www.suse.com/security/cve/CVE-2025-21714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix implicit ODP use after free

Prevent double queueing of implicit ODP mr destroy work by using
__xa_cmpxchg() to make sure this is the only time we are destroying this
specific mr.

Without this change, we could try to invalidate this mr twice, which in
turn could result in queuing a MR work destroy twice, and eventually the
second work could execute after the MR was freed due to the first work,
causing a user after free and trace below.

   refcount_t: underflow; use-after-free.
   WARNING: CPU: 2 PID: 12178 at lib/refcount.c:28 refcount_warn_saturate+0x12b/0x130
   Modules linked in: bonding ib_ipoib vfio_pci ip_gre geneve nf_tables ip6_gre gre ip6_tunnel tunnel6 ipip tunnel4 ib_umad rdma_ucm mlx5_vfio_pci vfio_pci_core vfio_iommu_type1 mlx5_ib vfio ib_uverbs mlx5_core iptable_raw openvswitch nsh rpcrdma ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm ib_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay zram zsmalloc fuse [last unloaded: ib_uverbs]
   CPU: 2 PID: 12178 Comm: kworker/u20:5 Not tainted 6.5.0-rc1_net_next_mlx5_58c644e #1
   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
   Workqueue: events_unbound free_implicit_child_mr_work [mlx5_ib]
   RIP: 0010:refcount_warn_saturate+0x12b/0x130
   Code: 48 c7 c7 38 95 2a 82 c6 05 bc c6 fe 00 01 e8 0c 66 aa ff 0f 0b 5b c3 48 c7 c7 e0 94 2a 82 c6 05 a7 c6 fe 00 01 e8 f5 65 aa ff &lt;0f&gt; 0b 5b c3 90 8b 07 3d 00 00 00 c0 74 12 83 f8 01 74 13 8d 50 ff
   RSP: 0018:ffff8881008e3e40 EFLAGS: 00010286
   RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000027
   RDX: ffff88852c91b5c8 RSI: 0000000000000001 RDI: ffff88852c91b5c0
   RBP: ffff8881dacd4e00 R08: 00000000ffffffff R09: 0000000000000019
   R10: 000000000000072e R11: 0000000063666572 R12: ffff88812bfd9e00
   R13: ffff8881c792d200 R14: ffff88810011c005 R15: ffff8881002099c0
   FS:  0000000000000000(0000) GS:ffff88852c900000(0000) knlGS:0000000000000000
   CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
   CR2: 00007f5694b5e000 CR3: 00000001153f6003 CR4: 0000000000370ea0
   DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
   DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
   Call Trace:
    &lt;TASK&gt;
    ? refcount_warn_saturate+0x12b/0x130
    free_implicit_child_mr_work+0x180/0x1b0 [mlx5_ib]
    process_one_work+0x1cc/0x3c0
    worker_thread+0x218/0x3c0
    kthread+0xc6/0xf0
    ret_from_fork+0x1f/0x30
    &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21714/">CVE-2025-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21714">CVE-2025-21714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237890">SUSE bug 1237890</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21726</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21726" ref_url="https://www.suse.com/security/cve/CVE-2025-21726" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: avoid UAF for reorder_work

Although the previous patch can avoid ps and ps UAF for _do_serial, it
can not avoid potential UAF issue for reorder_work. This issue can
happen just as below:

crypto_request			crypto_request		crypto_del_alg
padata_do_serial
  ...
  padata_reorder
    // processes all remaining
    // requests then breaks
    while (1) {
      if (!padata)
        break;
      ...
    }

				padata_do_serial
				  // new request added
				  list_add
    // sees the new request
    queue_work(reorder_work)
				  padata_reorder
				    queue_work_on(squeue-&gt;work)
...

				&lt;kworker context&gt;
				padata_serial_worker
				// completes new request,
				// no more outstanding
				// requests

							crypto_del_alg
							  // free pd

&lt;kworker context&gt;
invoke_padata_reorder
  // UAF of pd

To avoid UAF for 'reorder_work', get 'pd' ref before put 'reorder_work'
into the 'serial_wq' and put 'pd' ref until the 'serial_wq' finish.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21726/">CVE-2025-21726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21726">CVE-2025-21726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238865">SUSE bug 1238865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240837">SUSE bug 1240837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21727" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21727" ref_url="https://www.suse.com/security/cve/CVE-2025-21727" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: fix UAF in padata_reorder

A bug was found when run ltp test:

BUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0
Read of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206

CPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+
Workqueue: pdecrypt_parallel padata_parallel_worker
Call Trace:
&lt;TASK&gt;
dump_stack_lvl+0x32/0x50
print_address_description.constprop.0+0x6b/0x3d0
print_report+0xdd/0x2c0
kasan_report+0xa5/0xd0
padata_find_next+0x29/0x1a0
padata_reorder+0x131/0x220
padata_parallel_worker+0x3d/0xc0
process_one_work+0x2ec/0x5a0

If 'mdelay(10)' is added before calling 'padata_find_next' in the
'padata_reorder' function, this issue could be reproduced easily with
ltp test (pcrypt_aead01).

This can be explained as bellow:

pcrypt_aead_encrypt
...
padata_do_parallel
refcount_inc(&amp;pd-&gt;refcnt); // add refcnt
...
padata_do_serial
padata_reorder // pd
while (1) {
padata_find_next(pd, true); // using pd
queue_work_on
...
padata_serial_worker				crypto_del_alg
padata_put_pd_cnt // sub refcnt
						padata_free_shell
						padata_put_pd(ps-&gt;pd);
						// pd is freed
// loop again, but pd is freed
// call padata_find_next, UAF
}

In the padata_reorder function, when it loops in 'while', if the alg is
deleted, the refcnt may be decreased to 0 before entering
'padata_find_next', which leads to UAF.

As mentioned in [1], do_serial is supposed to be called with BHs disabled
and always happen under RCU protection, to address this issue, add
synchronize_rcu() in 'padata_free_shell' wait for all _do_serial calls
to finish.

[1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/
[2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21727/">CVE-2025-21727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21727">CVE-2025-21727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237876">SUSE bug 1237876</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21728" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21728" ref_url="https://www.suse.com/security/cve/CVE-2025-21728" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Send signals asynchronously if !preemptible

BPF programs can execute in all kinds of contexts and when a program
running in a non-preemptible context uses the bpf_send_signal() kfunc,
it will cause issues because this kfunc can sleep.
Change `irqs_disabled()` to `!preemptible()`.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21728/">CVE-2025-21728 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21728">CVE-2025-21728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237879">SUSE bug 1237879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21729" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21729" ref_url="https://www.suse.com/security/cve/CVE-2025-21729" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion

The rtwdev-&gt;scanning flag isn't protected by mutex originally, so
cancel_hw_scan can pass the condition, but suddenly hw_scan completion
unset the flag and calls ieee80211_scan_completed() that will free
local-&gt;hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and
use-after-free. Fix it by moving the check condition to where
protected by mutex.

 KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]
 CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G           OE
 Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019
 Workqueue: events cfg80211_conn_work [cfg80211]
 RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]
 Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d
 RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206
 RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001
 RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089
 RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960
 R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000
 FS:  0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0
 Call Trace:
  &lt;TASK&gt;
  ? show_regs+0x61/0x73
  ? __die_body+0x20/0x73
  ? die_addr+0x4f/0x7b
  ? exc_general_protection+0x191/0x1db
  ? asm_exc_general_protection+0x27/0x30
  ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]
  ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]
  ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]
  ? do_raw_spin_lock+0x75/0xdb
  ? __pfx_do_raw_spin_lock+0x10/0x10
  rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]
  ? _raw_spin_unlock+0xe/0x24
  ? __mutex_lock.constprop.0+0x40c/0x471
  ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]
  ? __mutex_lock_slowpath+0x13/0x1f
  ? mutex_lock+0xa2/0xdc
  ? __pfx_mutex_lock+0x10/0x10
  rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]
  rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]
  ieee80211_scan_cancel+0x468/0x4d0 [mac80211]
  ieee80211_prep_connection+0x858/0x899 [mac80211]
  ieee80211_mgd_auth+0xbea/0xdde [mac80211]
  ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]
  ? cfg80211_find_elem+0x15/0x29 [cfg80211]
  ? is_bss+0x1b7/0x1d7 [cfg80211]
  ieee80211_auth+0x18/0x27 [mac80211]
  cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]
  cfg80211_conn_do_work+0x410/0xb81 [cfg80211]
  ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]
  ? __kasan_check_read+0x11/0x1f
  ? psi_group_change+0x8bc/0x944
  ? __kasan_check_write+0x14/0x22
  ? mutex_lock+0x8e/0xdc
  ? __pfx_mutex_lock+0x10/0x10
  ? __pfx___radix_tree_lookup+0x10/0x10
  cfg80211_conn_work+0x245/0x34d [cfg80211]
  ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]
  ? update_cfs_rq_load_avg+0x3bc/0x3d7
  ? sched_clock_noinstr+0x9/0x1a
  ? sched_clock+0x10/0x24
  ? sched_clock_cpu+0x7e/0x42e
  ? newidle_balance+0x796/0x937
  ? __pfx_sched_clock_cpu+0x10/0x10
  ? __pfx_newidle_balance+0x10/0x10
  ? __kasan_check_read+0x11/0x1f
  ? psi_group_change+0x8bc/0x944
  ? _raw_spin_unlock+0xe/0x24
  ? raw_spin_rq_unlock+0x47/0x54
  ? raw_spin_rq_unlock_irq+0x9/0x1f
  ? finish_task_switch.isra.0+0x347/0x586
  ? __schedule+0x27bf/0x2892
  ? mutex_unlock+0x80/0xd0
  ? do_raw_spin_lock+0x75/0xdb
  ? __pfx___schedule+0x10/0x10
  process_scheduled_works+0x58c/0x821
  worker_thread+0x4c7/0x586
  ? __kasan_check_read+0x11/0x1f
  kthread+0x285/0x294
  ? __pfx_worker_thread+0x10/0x10
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x29/0x6f
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1b/0x30
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21729/">CVE-2025-21729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21729">CVE-2025-21729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237874">SUSE bug 1237874</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21738" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21738" ref_url="https://www.suse.com/security/cve/CVE-2025-21738" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: libata-sff: Ensure that we cannot write outside the allocated buffer

reveliofuzzing reported that a SCSI_IOCTL_SEND_COMMAND ioctl with out_len
set to 0xd42, SCSI command set to ATA_16 PASS-THROUGH, ATA command set to
ATA_NOP, and protocol set to ATA_PROT_PIO, can cause ata_pio_sector() to
write outside the allocated buffer, overwriting random memory.

While a ATA device is supposed to abort a ATA_NOP command, there does seem
to be a bug either in libata-sff or QEMU, where either this status is not
set, or the status is cleared before read by ata_sff_hsm_move().
Anyway, that is most likely a separate bug.

Looking at __atapi_pio_bytes(), it already has a safety check to ensure
that __atapi_pio_bytes() cannot write outside the allocated buffer.

Add a similar check to ata_pio_sector(), such that also ata_pio_sector()
cannot write outside the allocated buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21738/">CVE-2025-21738 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21738">CVE-2025-21738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238917">SUSE bug 1238917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257118">SUSE bug 1257118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21739</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21739" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21739" ref_url="https://www.suse.com/security/cve/CVE-2025-21739" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix use-after free in init error and remove paths

devm_blk_crypto_profile_init() registers a cleanup handler to run when
the associated (platform-) device is being released. For UFS, the
crypto private data and pointers are stored as part of the ufs_hba's
data structure 'struct ufs_hba::crypto_profile'. This structure is
allocated as part of the underlying ufshcd and therefore Scsi_host
allocation.

During driver release or during error handling in ufshcd_pltfrm_init(),
this structure is released as part of ufshcd_dealloc_host() before the
(platform-) device associated with the crypto call above is released.
Once this device is released, the crypto cleanup code will run, using
the just-released 'struct ufs_hba::crypto_profile'. This causes a
use-after-free situation:

  Call trace:
   kfree+0x60/0x2d8 (P)
   kvfree+0x44/0x60
   blk_crypto_profile_destroy_callback+0x28/0x70
   devm_action_release+0x1c/0x30
   release_nodes+0x6c/0x108
   devres_release_all+0x98/0x100
   device_unbind_cleanup+0x20/0x70
   really_probe+0x218/0x2d0

In other words, the initialisation code flow is:

  platform-device probe
    ufshcd_pltfrm_init()
      ufshcd_alloc_host()
        scsi_host_alloc()
          allocation of struct ufs_hba
          creation of scsi-host devices
    devm_blk_crypto_profile_init()
      devm registration of cleanup handler using platform-device

and during error handling of ufshcd_pltfrm_init() or during driver
removal:

  ufshcd_dealloc_host()
    scsi_host_put()
      put_device(scsi-host)
        release of struct ufs_hba
  put_device(platform-device)
    crypto cleanup handler

To fix this use-after free, change ufshcd_alloc_host() to register a
devres action to automatically cleanup the underlying SCSI device on
ufshcd destruction, without requiring explicit calls to
ufshcd_dealloc_host(). This way:

    * the crypto profile and all other ufs_hba-owned resources are
      destroyed before SCSI (as they've been registered after)
    * a memleak is plugged in tc-dwc-g210-pci.c remove() as a
      side-effect
    * EXPORT_SYMBOL_GPL(ufshcd_dealloc_host) can be removed fully as
      it's not needed anymore
    * no future drivers using ufshcd_alloc_host() could ever forget
      adding the cleanup
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21739/">CVE-2025-21739 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21739">CVE-2025-21739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238506">SUSE bug 1238506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21745</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21745" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21745" ref_url="https://www.suse.com/security/cve/CVE-2025-21745" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: Fix class @block_class's subsystem refcount leakage

blkcg_fill_root_iostats() iterates over @block_class's devices by
class_dev_iter_(init|next)(), but does not end iterating with
class_dev_iter_exit(), so causes the class's subsystem refcount leakage.

Fix by ending the iterating with class_dev_iter_exit().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21745/">CVE-2025-21745 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21745">CVE-2025-21745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238785">SUSE bug 1238785</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21746</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21746" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21746" ref_url="https://www.suse.com/security/cve/CVE-2025-21746" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: synaptics - fix crash when enabling pass-through port

When enabling a pass-through port an interrupt might come before psmouse
driver binds to the pass-through port. However synaptics sub-driver
tries to access psmouse instance presumably associated with the
pass-through port to figure out if only 1 byte of response or entire
protocol packet needs to be forwarded to the pass-through port and may
crash if psmouse instance has not been attached to the port yet.

Fix the crash by introducing open() and close() methods for the port and
check if the port is open before trying to access psmouse instance.
Because psmouse calls serio_open() only after attaching psmouse instance
to serio port instance this prevents the potential crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21746/">CVE-2025-21746 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21746">CVE-2025-21746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238498">SUSE bug 1238498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21756</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21756" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21756" ref_url="https://www.suse.com/security/cve/CVE-2025-21756" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7903" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001567.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8056" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Keep the binding until socket destruction

Preserve sockets bindings; this includes both resulting from an explicit
bind() and those implicitly bound through autobind during connect().

Prevents socket unbinding during a transport reassignment, which fixes a
use-after-free:

    1. vsock_create() (refcnt=1) calls vsock_insert_unbound() (refcnt=2)
    2. transport-&gt;release() calls vsock_remove_bound() without checking if
       sk was bound and moved to bound list (refcnt=1)
    3. vsock_bind() assumes sk is in unbound list and before
       __vsock_insert_bound(vsock_bound_sockets()) calls
       __vsock_remove_bound() which does:
           list_del_init(&amp;vsk-&gt;bound_table); // nop
           sock_put(&amp;vsk-&gt;sk);               // refcnt=0

BUG: KASAN: slab-use-after-free in __vsock_bind+0x62e/0x730
Read of size 4 at addr ffff88816b46a74c by task a.out/2057
 dump_stack_lvl+0x68/0x90
 print_report+0x174/0x4f6
 kasan_report+0xb9/0x190
 __vsock_bind+0x62e/0x730
 vsock_bind+0x97/0xe0
 __sys_bind+0x154/0x1f0
 __x64_sys_bind+0x6e/0xb0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Allocated by task 2057:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 __kasan_slab_alloc+0x85/0x90
 kmem_cache_alloc_noprof+0x131/0x450
 sk_prot_alloc+0x5b/0x220
 sk_alloc+0x2c/0x870
 __vsock_create.constprop.0+0x2e/0xb60
 vsock_create+0xe4/0x420
 __sock_create+0x241/0x650
 __sys_socket+0xf2/0x1a0
 __x64_sys_socket+0x6e/0xb0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 2057:
 kasan_save_stack+0x1e/0x40
 kasan_save_track+0x10/0x30
 kasan_save_free_info+0x37/0x60
 __kasan_slab_free+0x4b/0x70
 kmem_cache_free+0x1a1/0x590
 __sk_destruct+0x388/0x5a0
 __vsock_bind+0x5e1/0x730
 vsock_bind+0x97/0xe0
 __sys_bind+0x154/0x1f0
 __x64_sys_bind+0x6e/0xb0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

refcount_t: addition on 0; use-after-free.
WARNING: CPU: 7 PID: 2057 at lib/refcount.c:25 refcount_warn_saturate+0xce/0x150
RIP: 0010:refcount_warn_saturate+0xce/0x150
 __vsock_bind+0x66d/0x730
 vsock_bind+0x97/0xe0
 __sys_bind+0x154/0x1f0
 __x64_sys_bind+0x6e/0xb0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

refcount_t: underflow; use-after-free.
WARNING: CPU: 7 PID: 2057 at lib/refcount.c:28 refcount_warn_saturate+0xee/0x150
RIP: 0010:refcount_warn_saturate+0xee/0x150
 vsock_remove_bound+0x187/0x1e0
 __vsock_release+0x383/0x4a0
 vsock_release+0x90/0x120
 __sock_release+0xa3/0x250
 sock_close+0x14/0x20
 __fput+0x359/0xa80
 task_work_run+0x107/0x1d0
 do_exit+0x847/0x2560
 do_group_exit+0xb8/0x250
 __x64_sys_exit_group+0x3a/0x50
 x64_sys_call+0xfec/0x14f0
 do_syscall_64+0x93/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21756/">CVE-2025-21756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21756">CVE-2025-21756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238876">SUSE bug 1238876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245795">SUSE bug 1245795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985610" comment="kernel-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985611" comment="kernel-abi-stablelists-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985612" comment="kernel-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985613" comment="kernel-cross-headers-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985614" comment="kernel-debug-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985615" comment="kernel-debug-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985618" comment="kernel-debug-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985619" comment="kernel-debug-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985620" comment="kernel-debug-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985621" comment="kernel-debug-uki-virt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985624" comment="kernel-doc-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985625" comment="kernel-headers-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985626" comment="kernel-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985627" comment="kernel-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985628" comment="kernel-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985629" comment="kernel-rt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985630" comment="kernel-rt-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985631" comment="kernel-rt-debug-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985632" comment="kernel-rt-debug-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985634" comment="kernel-rt-debug-kvm-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985635" comment="kernel-rt-debug-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985636" comment="kernel-rt-debug-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985637" comment="kernel-rt-debug-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985639" comment="kernel-rt-kvm-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985640" comment="kernel-rt-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985641" comment="kernel-rt-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985642" comment="kernel-rt-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985643" comment="kernel-tools-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985644" comment="kernel-tools-libs-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985646" comment="kernel-uki-virt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985647" comment="kernel-uki-virt-addons-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985648" comment="libperf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985649" comment="perf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985650" comment="python3-perf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985651" comment="rtla-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985652" comment="rv-5.14.0-570.17.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21759</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21759" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21759" ref_url="https://www.suse.com/security/cve/CVE-2025-21759" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10379" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001765.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: extend RCU protection in igmp6_send()

igmp6_send() can be called without RTNL or RCU being held.

Extend RCU protection so that we can safely fetch the net pointer
and avoid a potential UAF.

Note that we no longer can use sock_alloc_send_skb() because
ipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.

Instead use alloc_skb() and charge the net-&gt;ipv6.igmp_sk
socket under RCU protection.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21759/">CVE-2025-21759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21759">CVE-2025-21759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238738">SUSE bug 1238738</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999183" comment="kernel-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999184" comment="kernel-abi-stablelists-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999185" comment="kernel-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999186" comment="kernel-cross-headers-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999187" comment="kernel-debug-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999188" comment="kernel-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999191" comment="kernel-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999192" comment="kernel-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999193" comment="kernel-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999194" comment="kernel-debug-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999197" comment="kernel-doc-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999198" comment="kernel-headers-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999199" comment="kernel-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999200" comment="kernel-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999201" comment="kernel-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999202" comment="kernel-rt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999203" comment="kernel-rt-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999204" comment="kernel-rt-debug-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999205" comment="kernel-rt-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999207" comment="kernel-rt-debug-kvm-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999208" comment="kernel-rt-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999209" comment="kernel-rt-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999210" comment="kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999212" comment="kernel-rt-kvm-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999213" comment="kernel-rt-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999214" comment="kernel-rt-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999215" comment="kernel-rt-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999216" comment="kernel-tools-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999217" comment="kernel-tools-libs-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999219" comment="kernel-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999220" comment="kernel-uki-virt-addons-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999221" comment="libperf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999222" comment="perf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999223" comment="python3-perf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999224" comment="rtla-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999225" comment="rv-5.14.0-570.25.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21764" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21764" ref_url="https://www.suse.com/security/cve/CVE-2025-21764" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001620.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9580" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ndisc: use RCU protection in ndisc_alloc_skb()

ndisc_alloc_skb() can be called without RTNL or RCU being held.

Add RCU protection to avoid possible UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-06"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21764/">CVE-2025-21764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21764">CVE-2025-21764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237885">SUSE bug 1237885</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985978" comment="kernel-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985979" comment="kernel-abi-stablelists-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985980" comment="kernel-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985981" comment="kernel-cross-headers-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985982" comment="kernel-debug-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985983" comment="kernel-debug-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985986" comment="kernel-debug-modules-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985987" comment="kernel-debug-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985988" comment="kernel-debug-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985989" comment="kernel-debug-uki-virt-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985992" comment="kernel-doc-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985993" comment="kernel-headers-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985994" comment="kernel-modules-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985995" comment="kernel-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985996" comment="kernel-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985997" comment="kernel-rt-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985998" comment="kernel-rt-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985999" comment="kernel-rt-debug-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986000" comment="kernel-rt-debug-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986002" comment="kernel-rt-debug-kvm-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986003" comment="kernel-rt-debug-modules-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986004" comment="kernel-rt-debug-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986005" comment="kernel-rt-debug-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986007" comment="kernel-rt-kvm-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986008" comment="kernel-rt-modules-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986009" comment="kernel-rt-modules-core-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986010" comment="kernel-rt-modules-extra-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986011" comment="kernel-tools-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986012" comment="kernel-tools-libs-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986014" comment="kernel-uki-virt-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986015" comment="kernel-uki-virt-addons-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986016" comment="libperf-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986017" comment="perf-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986018" comment="python3-perf-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986019" comment="rtla-5.14.0-570.19.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986020" comment="rv-5.14.0-570.19.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21765</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21765" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21765" ref_url="https://www.suse.com/security/cve/CVE-2025-21765" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU protection in ip6_default_advmss()

ip6_default_advmss() needs rcu protection to make
sure the net structure it reads does not disappear.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21765/">CVE-2025-21765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21765">CVE-2025-21765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237906">SUSE bug 1237906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21785</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21785" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21785" ref_url="https://www.suse.com/security/cve/CVE-2025-21785" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3208" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/001000.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array

The loop that detects/populates cache information already has a bounds
check on the array size but does not account for cache levels with
separate data/instructions cache. Fix this by incrementing the index
for any populated leaf (instead of any populated level).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-29"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21785/">CVE-2025-21785 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21785">CVE-2025-21785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238747">SUSE bug 1238747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239076">SUSE bug 1239076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240745">SUSE bug 1240745</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009970459" comment="bpftool-7.4.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970460" comment="kernel-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970461" comment="kernel-abi-stablelists-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970462" comment="kernel-core-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970463" comment="kernel-cross-headers-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970464" comment="kernel-debug-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970465" comment="kernel-debug-core-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970468" comment="kernel-debug-modules-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970469" comment="kernel-debug-modules-core-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970470" comment="kernel-debug-modules-extra-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970471" comment="kernel-debug-uki-virt-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970474" comment="kernel-doc-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970475" comment="kernel-headers-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970476" comment="kernel-modules-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970477" comment="kernel-modules-core-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970478" comment="kernel-modules-extra-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970479" comment="kernel-rt-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970480" comment="kernel-rt-core-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970481" comment="kernel-rt-debug-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970482" comment="kernel-rt-debug-core-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970484" comment="kernel-rt-debug-kvm-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970485" comment="kernel-rt-debug-modules-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970486" comment="kernel-rt-debug-modules-core-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970487" comment="kernel-rt-debug-modules-extra-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970489" comment="kernel-rt-kvm-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970490" comment="kernel-rt-modules-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970491" comment="kernel-rt-modules-core-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970492" comment="kernel-rt-modules-extra-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970493" comment="kernel-tools-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970494" comment="kernel-tools-libs-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970496" comment="kernel-uki-virt-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970497" comment="kernel-uki-virt-addons-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970498" comment="libperf-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970499" comment="perf-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970500" comment="python3-perf-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970501" comment="rtla-5.14.0-503.34.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970502" comment="rv-5.14.0-503.34.1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21786" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21786" ref_url="https://www.suse.com/security/cve/CVE-2025-21786" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

workqueue: Put the pwq after detaching the rescuer from the pool

The commit 68f83057b913("workqueue: Reap workers via kthread_stop() and
remove detach_completion") adds code to reap the normal workers but
mistakenly does not handle the rescuer and also removes the code waiting
for the rescuer in put_unbound_pool(), which caused a use-after-free bug
reported by Cheung Wall.

To avoid the use-after-free bug, the pool's reference must be held until
the detachment is complete. Therefore, move the code that puts the pwq
after detaching the rescuer from the pool.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21786/">CVE-2025-21786 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21786">CVE-2025-21786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238505">SUSE bug 1238505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21787" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21787" ref_url="https://www.suse.com/security/cve/CVE-2025-21787" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: better TEAM_OPTION_TYPE_STRING validation

syzbot reported following splat [1]

Make sure user-provided data contains one nul byte.

[1]
 BUG: KMSAN: uninit-value in string_nocheck lib/vsprintf.c:633 [inline]
 BUG: KMSAN: uninit-value in string+0x3ec/0x5f0 lib/vsprintf.c:714
  string_nocheck lib/vsprintf.c:633 [inline]
  string+0x3ec/0x5f0 lib/vsprintf.c:714
  vsnprintf+0xa5d/0x1960 lib/vsprintf.c:2843
  __request_module+0x252/0x9f0 kernel/module/kmod.c:149
  team_mode_get drivers/net/team/team_core.c:480 [inline]
  team_change_mode drivers/net/team/team_core.c:607 [inline]
  team_mode_option_set+0x437/0x970 drivers/net/team/team_core.c:1401
  team_option_set drivers/net/team/team_core.c:375 [inline]
  team_nl_options_set_doit+0x1339/0x1f90 drivers/net/team/team_core.c:2662
  genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]
  genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]
  genl_rcv_msg+0x1214/0x12c0 net/netlink/genetlink.c:1210
  netlink_rcv_skb+0x375/0x650 net/netlink/af_netlink.c:2543
  genl_rcv+0x40/0x60 net/netlink/genetlink.c:1219
  netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]
  netlink_unicast+0xf52/0x1260 net/netlink/af_netlink.c:1348
  netlink_sendmsg+0x10da/0x11e0 net/netlink/af_netlink.c:1892
  sock_sendmsg_nosec net/socket.c:718 [inline]
  __sock_sendmsg+0x30f/0x380 net/socket.c:733
  ____sys_sendmsg+0x877/0xb60 net/socket.c:2573
  ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2627
  __sys_sendmsg net/socket.c:2659 [inline]
  __do_sys_sendmsg net/socket.c:2664 [inline]
  __se_sys_sendmsg net/socket.c:2662 [inline]
  __x64_sys_sendmsg+0x212/0x3c0 net/socket.c:2662
  x64_sys_call+0x2ed6/0x3c30 arch/x86/include/generated/asm/syscalls_64.h:47
  do_syscall_x64 arch/x86/entry/common.c:52 [inline]
  do_syscall_64+0xcd/0x1e0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21787/">CVE-2025-21787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21787">CVE-2025-21787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238774">SUSE bug 1238774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21790" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21790" ref_url="https://www.suse.com/security/cve/CVE-2025-21790" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vxlan: check vxlan_vnigroup_init() return value

vxlan_init() must check vxlan_vnigroup_init() success
otherwise a crash happens later, spotted by syzbot.

Oops: general protection fault, probably for non-canonical address 0xdffffc000000002c: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000160-0x0000000000000167]
CPU: 0 UID: 0 PID: 7313 Comm: syz-executor147 Not tainted 6.14.0-rc1-syzkaller-00276-g69b54314c975 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
 RIP: 0010:vxlan_vnigroup_uninit+0x89/0x500 drivers/net/vxlan/vxlan_vnifilter.c:912
Code: 00 48 8b 44 24 08 4c 8b b0 98 41 00 00 49 8d 86 60 01 00 00 48 89 c2 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 4d 04 00 00 49 8b 86 60 01 00 00 48 ba 00 00 00
RSP: 0018:ffffc9000cc1eea8 EFLAGS: 00010202
RAX: dffffc0000000000 RBX: 0000000000000001 RCX: ffffffff8672effb
RDX: 000000000000002c RSI: ffffffff8672ecb9 RDI: ffff8880461b4f18
RBP: ffff8880461b4ef4 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000020000
R13: ffff8880461b0d80 R14: 0000000000000000 R15: dffffc0000000000
FS:  00007fecfa95d6c0(0000) GS:ffff88806a600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fecfa95cfb8 CR3: 000000004472c000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  vxlan_uninit+0x1ab/0x200 drivers/net/vxlan/vxlan_core.c:2942
  unregister_netdevice_many_notify+0x12d6/0x1f30 net/core/dev.c:11824
  unregister_netdevice_many net/core/dev.c:11866 [inline]
  unregister_netdevice_queue+0x307/0x3f0 net/core/dev.c:11736
  register_netdevice+0x1829/0x1eb0 net/core/dev.c:10901
  __vxlan_dev_create+0x7c6/0xa30 drivers/net/vxlan/vxlan_core.c:3981
  vxlan_newlink+0xd1/0x130 drivers/net/vxlan/vxlan_core.c:4407
  rtnl_newlink_create net/core/rtnetlink.c:3795 [inline]
  __rtnl_newlink net/core/rtnetlink.c:3906 [inline]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21790/">CVE-2025-21790 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21790">CVE-2025-21790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238753">SUSE bug 1238753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21791" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21791" ref_url="https://www.suse.com/security/cve/CVE-2025-21791" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03514-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03528-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03543-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03554-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03557-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03577-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20819-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vrf: use RCU protection in l3mdev_l3_out()

l3mdev_l3_out() can be called without RCU being held:

raw_sendmsg()
 ip_push_pending_frames()
  ip_send_skb()
   ip_local_out()
    __ip_local_out()
     l3mdev_ip_out()

Add rcu_read_lock() / rcu_read_unlock() pair to avoid
a potential UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21791/">CVE-2025-21791 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21791">CVE-2025-21791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238512">SUSE bug 1238512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240744">SUSE bug 1240744</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21795" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21795" ref_url="https://www.suse.com/security/cve/CVE-2025-21795" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix hang in nfsd4_shutdown_callback

If nfs4_client is in courtesy state then there is no point to send
the callback. This causes nfsd4_shutdown_callback to hang since
cl_cb_inflight is not 0. This hang lasts about 15 minutes until TCP
notifies NFSD that the connection was dropped.

This patch modifies nfsd4_run_cb_work to skip the RPC call if
nfs4_client is in courtesy state.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21795/">CVE-2025-21795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21795">CVE-2025-21795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238759">SUSE bug 1238759</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21796" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21796" ref_url="https://www.suse.com/security/cve/CVE-2025-21796" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: clear acl_access/acl_default after releasing them

If getting acl_default fails, acl_access and acl_default will be released
simultaneously. However, acl_access will still retain a pointer pointing
to the released posix_acl, which will trigger a WARNING in
nfs3svc_release_getacl like this:

------------[ cut here ]------------
refcount_t: underflow; use-after-free.
WARNING: CPU: 26 PID: 3199 at lib/refcount.c:28
refcount_warn_saturate+0xb5/0x170
Modules linked in:
CPU: 26 UID: 0 PID: 3199 Comm: nfsd Not tainted
6.12.0-rc6-00079-g04ae226af01f-dirty #8
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
RIP: 0010:refcount_warn_saturate+0xb5/0x170
Code: cc cc 0f b6 1d b3 20 a5 03 80 fb 01 0f 87 65 48 d8 00 83 e3 01 75
e4 48 c7 c7 c0 3b 9b 85 c6 05 97 20 a5 03 01 e8 fb 3e 30 ff &lt;0f&gt; 0b eb
cd 0f b6 1d 8a3
RSP: 0018:ffffc90008637cd8 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff83904fde
RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88871ed36380
RBP: ffff888158beeb40 R08: 0000000000000001 R09: fffff520010c6f56
R10: ffffc90008637ab7 R11: 0000000000000001 R12: 0000000000000001
R13: ffff888140e77400 R14: ffff888140e77408 R15: ffffffff858b42c0
FS:  0000000000000000(0000) GS:ffff88871ed00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000562384d32158 CR3: 000000055cc6a000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? refcount_warn_saturate+0xb5/0x170
 ? __warn+0xa5/0x140
 ? refcount_warn_saturate+0xb5/0x170
 ? report_bug+0x1b1/0x1e0
 ? handle_bug+0x53/0xa0
 ? exc_invalid_op+0x17/0x40
 ? asm_exc_invalid_op+0x1a/0x20
 ? tick_nohz_tick_stopped+0x1e/0x40
 ? refcount_warn_saturate+0xb5/0x170
 ? refcount_warn_saturate+0xb5/0x170
 nfs3svc_release_getacl+0xc9/0xe0
 svc_process_common+0x5db/0xb60
 ? __pfx_svc_process_common+0x10/0x10
 ? __rcu_read_unlock+0x69/0xa0
 ? __pfx_nfsd_dispatch+0x10/0x10
 ? svc_xprt_received+0xa1/0x120
 ? xdr_init_decode+0x11d/0x190
 svc_process+0x2a7/0x330
 svc_handle_xprt+0x69d/0x940
 svc_recv+0x180/0x2d0
 nfsd+0x168/0x200
 ? __pfx_nfsd+0x10/0x10
 kthread+0x1a2/0x1e0
 ? kthread+0xf4/0x1e0
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x34/0x60
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
Kernel panic - not syncing: kernel: panic_on_warn set ...

Clear acl_access/acl_default after posix_acl_release is called to prevent
UAF from being triggered.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21796/">CVE-2025-21796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21796">CVE-2025-21796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238716">SUSE bug 1238716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21806" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21806" ref_url="https://www.suse.com/security/cve/CVE-2025-21806" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: let net.core.dev_weight always be non-zero

The following problem was encountered during stability test:

(NULL net_device): NAPI poll function process_backlog+0x0/0x530 \
	returned 1, exceeding its budget of 0.
------------[ cut here ]------------
list_add double add: new=ffff88905f746f48, prev=ffff88905f746f48, \
	next=ffff88905f746e40.
WARNING: CPU: 18 PID: 5462 at lib/list_debug.c:35 \
	__list_add_valid_or_report+0xf3/0x130
CPU: 18 UID: 0 PID: 5462 Comm: ping Kdump: loaded Not tainted 6.13.0-rc7+
RIP: 0010:__list_add_valid_or_report+0xf3/0x130
Call Trace:
? __warn+0xcd/0x250
? __list_add_valid_or_report+0xf3/0x130
enqueue_to_backlog+0x923/0x1070
netif_rx_internal+0x92/0x2b0
__netif_rx+0x15/0x170
loopback_xmit+0x2ef/0x450
dev_hard_start_xmit+0x103/0x490
__dev_queue_xmit+0xeac/0x1950
ip_finish_output2+0x6cc/0x1620
ip_output+0x161/0x270
ip_push_pending_frames+0x155/0x1a0
raw_sendmsg+0xe13/0x1550
__sys_sendto+0x3bf/0x4e0
__x64_sys_sendto+0xdc/0x1b0
do_syscall_64+0x5b/0x170
entry_SYSCALL_64_after_hwframe+0x76/0x7e

The reproduction command is as follows:
  sysctl -w net.core.dev_weight=0
  ping 127.0.0.1

This is because when the napi's weight is set to 0, process_backlog() may
return 0 and clear the NAPI_STATE_SCHED bit of napi-&gt;state, causing this
napi to be re-polled in net_rx_action() until __do_softirq() times out.
Since the NAPI_STATE_SCHED bit has been cleared, napi_schedule_rps() can
be retriggered in enqueue_to_backlog(), causing this issue.

Making the napi's weight always non-zero solves this problem.

Triggering this issue requires system-wide admin (setting is
not namespaced).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21806/">CVE-2025-21806 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21806">CVE-2025-21806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238746">SUSE bug 1238746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21826</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21826" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21826" ref_url="https://www.suse.com/security/cve/CVE-2025-21826" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject mismatching sum of field_len with set key length

The field length description provides the length of each separated key
field in the concatenation, each field gets rounded up to 32-bits to
calculate the pipapo rule width from pipapo_init(). The set key length
provides the total size of the key aligned to 32-bits.

Register-based arithmetics still allows for combining mismatching set
key length and field length description, eg. set key length 10 and field
description [ 5, 4 ] leading to pipapo width of 12.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21826/">CVE-2025-21826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21826">CVE-2025-21826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238968">SUSE bug 1238968</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21828</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21828" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21828" ref_url="https://www.suse.com/security/cve/CVE-2025-21828" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: don't flush non-uploaded STAs

If STA state is pre-moved to AUTHORIZED (such as in IBSS
scenarios) and insertion fails, the station is freed.
In this case, the driver never knew about the station,
so trying to flush it is unexpected and may crash.

Check if the sta was uploaded to the driver before and
fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21828/">CVE-2025-21828 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21828">CVE-2025-21828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238958">SUSE bug 1238958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21829</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21829" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21829" ref_url="https://www.suse.com/security/cve/CVE-2025-21829" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]"

The Call Trace is as below:
"
  &lt;TASK&gt;
  ? show_regs.cold+0x1a/0x1f
  ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]
  ? __warn+0x84/0xd0
  ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]
  ? report_bug+0x105/0x180
  ? handle_bug+0x46/0x80
  ? exc_invalid_op+0x19/0x70
  ? asm_exc_invalid_op+0x1b/0x20
  ? __rxe_cleanup+0x12c/0x170 [rdma_rxe]
  ? __rxe_cleanup+0x124/0x170 [rdma_rxe]
  rxe_destroy_qp.cold+0x24/0x29 [rdma_rxe]
  ib_destroy_qp_user+0x118/0x190 [ib_core]
  rdma_destroy_qp.cold+0x43/0x5e [rdma_cm]
  rtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core]
  rtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server]
  process_one_work+0x21d/0x3f0
  worker_thread+0x4a/0x3c0
  ? process_one_work+0x3f0/0x3f0
  kthread+0xf0/0x120
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x22/0x30
  &lt;/TASK&gt;
"
When too many rdma resources are allocated, rxe needs more time to
handle these rdma resources. Sometimes with the current timeout, rxe
can not release the rdma resources correctly.

Compared with other rdma drivers, a bigger timeout is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21829/">CVE-2025-21829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21829">CVE-2025-21829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239030">SUSE bug 1239030</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21837</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21837" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21837" ref_url="https://www.suse.com/security/cve/CVE-2025-21837" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21837/">CVE-2025-21837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21837">CVE-2025-21837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239064">SUSE bug 1239064</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21839</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21839" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21839" ref_url="https://www.suse.com/security/cve/CVE-2025-21839" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop

Move the conditional loading of hardware DR6 with the guest's DR6 value
out of the core .vcpu_run() loop to fix a bug where KVM can load hardware
with a stale vcpu-&gt;arch.dr6.

When the guest accesses a DR and host userspace isn't debugging the guest,
KVM disables DR interception and loads the guest's values into hardware on
VM-Enter and saves them on VM-Exit.  This allows the guest to access DRs
at will, e.g. so that a sequence of DR accesses to configure a breakpoint
only generates one VM-Exit.

For DR0-DR3, the logic/behavior is identical between VMX and SVM, and also
identical between KVM_DEBUGREG_BP_ENABLED (userspace debugging the guest)
and KVM_DEBUGREG_WONT_EXIT (guest using DRs), and so KVM handles loading
DR0-DR3 in common code, _outside_ of the core kvm_x86_ops.vcpu_run() loop.

But for DR6, the guest's value doesn't need to be loaded into hardware for
KVM_DEBUGREG_BP_ENABLED, and SVM provides a dedicated VMCB field whereas
VMX requires software to manually load the guest value, and so loading the
guest's value into DR6 is handled by {svm,vmx}_vcpu_run(), i.e. is done
_inside_ the core run loop.

Unfortunately, saving the guest values on VM-Exit is initiated by common
x86, again outside of the core run loop.  If the guest modifies DR6 (in
hardware, when DR interception is disabled), and then the next VM-Exit is
a fastpath VM-Exit, KVM will reload hardware DR6 with vcpu-&gt;arch.dr6 and
clobber the guest's actual value.

The bug shows up primarily with nested VMX because KVM handles the VMX
preemption timer in the fastpath, and the window between hardware DR6
being modified (in guest context) and DR6 being read by guest software is
orders of magnitude larger in a nested setup.  E.g. in non-nested, the
VMX preemption timer would need to fire precisely between #DB injection
and the #DB handler's read of DR6, whereas with a KVM-on-KVM setup, the
window where hardware DR6 is "dirty" extends all the way from L1 writing
DR6 to VMRESUME (in L1).

    L1's view:
    ==========
    &lt;L1 disables DR interception&gt;
           CPU 0/KVM-7289    [023] d....  2925.640961: kvm_entry: vcpu 0
 A:  L1 Writes DR6
           CPU 0/KVM-7289    [023] d....  2925.640963: &lt;hack&gt;: Set DRs, DR6 = 0xffff0ff1

 B:        CPU 0/KVM-7289    [023] d....  2925.640967: kvm_exit: vcpu 0 reason EXTERNAL_INTERRUPT intr_info 0x800000ec

 D: L1 reads DR6, arch.dr6 = 0
           CPU 0/KVM-7289    [023] d....  2925.640969: &lt;hack&gt;: Sync DRs, DR6 = 0xffff0ff0

           CPU 0/KVM-7289    [023] d....  2925.640976: kvm_entry: vcpu 0
    L2 reads DR6, L1 disables DR interception
           CPU 0/KVM-7289    [023] d....  2925.640980: kvm_exit: vcpu 0 reason DR_ACCESS info1 0x0000000000000216
           CPU 0/KVM-7289    [023] d....  2925.640983: kvm_entry: vcpu 0

           CPU 0/KVM-7289    [023] d....  2925.640983: &lt;hack&gt;: Set DRs, DR6 = 0xffff0ff0

    L2 detects failure
           CPU 0/KVM-7289    [023] d....  2925.640987: kvm_exit: vcpu 0 reason HLT
    L1 reads DR6 (confirms failure)
           CPU 0/KVM-7289    [023] d....  2925.640990: &lt;hack&gt;: Sync DRs, DR6 = 0xffff0ff0

    L0's view:
    ==========
    L2 reads DR6, arch.dr6 = 0
          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_exit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216
          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit: vcpu 23 reason DR_ACCESS info1 0x0000000000000216

    L2 =&gt; L1 nested VM-Exit
          CPU 23/KVM-5046    [001] .....  3410.005610: kvm_nested_vmexit_inject: reason: DR_ACCESS ext_inf1: 0x0000000000000216

          CPU 23/KVM-5046    [001] d....  3410.005610: kvm_entry: vcpu 23
          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_exit: vcpu 23 reason VMREAD
          CPU 23/KVM-5046    [001] d....  3410.005611: kvm_entry: vcpu 23
          CPU 23/KVM-5046    [001] d....  3410.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21839/">CVE-2025-21839 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21839">CVE-2025-21839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239061">SUSE bug 1239061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21844" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21844" ref_url="https://www.suse.com/security/cve/CVE-2025-21844" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: Add check for next_buffer in receive_encrypted_standard()

Add check for the return value of cifs_buf_get() and cifs_small_buf_get()
in receive_encrypted_standard() to prevent null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21844/">CVE-2025-21844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21844">CVE-2025-21844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239512">SUSE bug 1239512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21846</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21846" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21846" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21846" ref_url="https://www.suse.com/security/cve/CVE-2025-21846" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

acct: perform last write from workqueue

In [1] it was reported that the acct(2) system call can be used to
trigger NULL deref in cases where it is set to write to a file that
triggers an internal lookup. This can e.g., happen when pointing acc(2)
to /sys/power/resume. At the point the where the write to this file
happens the calling task has already exited and called exit_fs(). A
lookup will thus trigger a NULL-deref when accessing current-&gt;fs.

Reorganize the code so that the the final write happens from the
workqueue but with the caller's credentials. This preserves the
(strange) permission model and has almost no regression risk.

This api should stop to exist though.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21846/">CVE-2025-21846 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21846">CVE-2025-21846 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239508">SUSE bug 1239508</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21847</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21847" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21847" ref_url="https://www.suse.com/security/cve/CVE-2025-21847" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data()

The nullity of sps-&gt;cstream should be checked similarly as it is done in
sof_set_stream_data_offset() function.
Assuming that it is not NULL if sps-&gt;stream is NULL is incorrect and can
lead to NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21847/">CVE-2025-21847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21847">CVE-2025-21847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239471">SUSE bug 1239471</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21848</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21848" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21848" ref_url="https://www.suse.com/security/cve/CVE-2025-21848" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()

Add check for the return value of nfp_app_ctrl_msg_alloc() in
nfp_bpf_cmsg_alloc() to prevent null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21848/">CVE-2025-21848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21848">CVE-2025-21848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239479">SUSE bug 1239479</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21851</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21851" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21851" ref_url="https://www.suse.com/security/cve/CVE-2025-21851" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix softlockup in arena_map_free on 64k page kernel

On an aarch64 kernel with CONFIG_PAGE_SIZE_64KB=y,
arena_htab tests cause a segmentation fault and soft lockup.
The same failure is not observed with 4k pages on aarch64.

It turns out arena_map_free() is calling
apply_to_existing_page_range() with the address returned by
bpf_arena_get_kern_vm_start().  If this address is not page-aligned
the code ends up calling apply_to_pte_range() with that unaligned
address causing soft lockup.

Fix it by round up GUARD_SZ to PAGE_SIZE &lt;&lt; 1 so that the
division by 2 in bpf_arena_get_kern_vm_start() returns
a page-aligned value.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21851/">CVE-2025-21851 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21851">CVE-2025-21851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239480">SUSE bug 1239480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21853</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21853" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21853" ref_url="https://www.suse.com/security/cve/CVE-2025-21853" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: avoid holding freeze_mutex during mmap operation

We use map-&gt;freeze_mutex to prevent races between map_freeze() and
memory mapping BPF map contents with writable permissions. The way we
naively do this means we'll hold freeze_mutex for entire duration of all
the mm and VMA manipulations, which is completely unnecessary. This can
potentially also lead to deadlocks, as reported by syzbot in [0].

So, instead, hold freeze_mutex only during writeability checks, bump
(proactively) "write active" count for the map, unlock the mutex and
proceed with mmap logic. And only if something went wrong during mmap
logic, then undo that "write active" counter increment.

  [0] https://lore.kernel.org/bpf/678dcbc9.050a0220.303755.0066.GAE@google.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21853/">CVE-2025-21853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21853">CVE-2025-21853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239476">SUSE bug 1239476</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21855" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21855" ref_url="https://www.suse.com/security/cve/CVE-2025-21855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: Don't reference skb after sending to VIOS

Previously, after successfully flushing the xmit buffer to VIOS,
the tx_bytes stat was incremented by the length of the skb.

It is invalid to access the skb memory after sending the buffer to
the VIOS because, at any point after sending, the VIOS can trigger
an interrupt to free this memory. A race between reading skb-&gt;len
and freeing the skb is possible (especially during LPM) and will
result in use-after-free:
 ==================================================================
 BUG: KASAN: slab-use-after-free in ibmvnic_xmit+0x75c/0x1808 [ibmvnic]
 Read of size 4 at addr c00000024eb48a70 by task hxecom/14495
 &lt;...&gt;
 Call Trace:
 [c000000118f66cf0] [c0000000018cba6c] dump_stack_lvl+0x84/0xe8 (unreliable)
 [c000000118f66d20] [c0000000006f0080] print_report+0x1a8/0x7f0
 [c000000118f66df0] [c0000000006f08f0] kasan_report+0x128/0x1f8
 [c000000118f66f00] [c0000000006f2868] __asan_load4+0xac/0xe0
 [c000000118f66f20] [c0080000046eac84] ibmvnic_xmit+0x75c/0x1808 [ibmvnic]
 [c000000118f67340] [c0000000014be168] dev_hard_start_xmit+0x150/0x358
 &lt;...&gt;
 Freed by task 0:
 kasan_save_stack+0x34/0x68
 kasan_save_track+0x2c/0x50
 kasan_save_free_info+0x64/0x108
 __kasan_mempool_poison_object+0x148/0x2d4
 napi_skb_cache_put+0x5c/0x194
 net_tx_action+0x154/0x5b8
 handle_softirqs+0x20c/0x60c
 do_softirq_own_stack+0x6c/0x88
 &lt;...&gt;
 The buggy address belongs to the object at c00000024eb48a00 which
  belongs to the cache skbuff_head_cache of size 224
==================================================================
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21855/">CVE-2025-21855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21855">CVE-2025-21855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239484">SUSE bug 1239484</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21861" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21861" ref_url="https://www.suse.com/security/cve/CVE-2025-21861" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()

If migration succeeded, we called
folio_migrate_flags()-&gt;mem_cgroup_migrate() to migrate the memcg from the
old to the new folio.  This will set memcg_data of the old folio to 0.

Similarly, if migration failed, memcg_data of the dst folio is left unset.

If we call folio_putback_lru() on such folios (memcg_data == 0), we will
add the folio to be freed to the LRU, making memcg code unhappy.  Running
the hmm selftests:

  # ./hmm-tests
  ...
  #  RUN           hmm.hmm_device_private.migrate ...
  [  102.078007][T14893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x7ff27d200 pfn:0x13cc00
  [  102.079974][T14893] anon flags: 0x17ff00000020018(uptodate|dirty|swapbacked|node=0|zone=2|lastcpupid=0x7ff)
  [  102.082037][T14893] raw: 017ff00000020018 dead000000000100 dead000000000122 ffff8881353896c9
  [  102.083687][T14893] raw: 00000007ff27d200 0000000000000000 00000001ffffffff 0000000000000000
  [  102.085331][T14893] page dumped because: VM_WARN_ON_ONCE_FOLIO(!memcg &amp;&amp; !mem_cgroup_disabled())
  [  102.087230][T14893] ------------[ cut here ]------------
  [  102.088279][T14893] WARNING: CPU: 0 PID: 14893 at ./include/linux/memcontrol.h:726 folio_lruvec_lock_irqsave+0x10e/0x170
  [  102.090478][T14893] Modules linked in:
  [  102.091244][T14893] CPU: 0 UID: 0 PID: 14893 Comm: hmm-tests Not tainted 6.13.0-09623-g6c216bc522fd #151
  [  102.093089][T14893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
  [  102.094848][T14893] RIP: 0010:folio_lruvec_lock_irqsave+0x10e/0x170
  [  102.096104][T14893] Code: ...
  [  102.099908][T14893] RSP: 0018:ffffc900236c37b0 EFLAGS: 00010293
  [  102.101152][T14893] RAX: 0000000000000000 RBX: ffffea0004f30000 RCX: ffffffff8183f426
  [  102.102684][T14893] RDX: ffff8881063cb880 RSI: ffffffff81b8117f RDI: ffff8881063cb880
  [  102.104227][T14893] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000
  [  102.105757][T14893] R10: 0000000000000001 R11: 0000000000000002 R12: ffffc900236c37d8
  [  102.107296][T14893] R13: ffff888277a2bcb0 R14: 000000000000001f R15: 0000000000000000
  [  102.108830][T14893] FS:  00007ff27dbdd740(0000) GS:ffff888277a00000(0000) knlGS:0000000000000000
  [  102.110643][T14893] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [  102.111924][T14893] CR2: 00007ff27d400000 CR3: 000000010866e000 CR4: 0000000000750ef0
  [  102.113478][T14893] PKRU: 55555554
  [  102.114172][T14893] Call Trace:
  [  102.114805][T14893]  &lt;TASK&gt;
  [  102.115397][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170
  [  102.116547][T14893]  ? __warn.cold+0x110/0x210
  [  102.117461][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170
  [  102.118667][T14893]  ? report_bug+0x1b9/0x320
  [  102.119571][T14893]  ? handle_bug+0x54/0x90
  [  102.120494][T14893]  ? exc_invalid_op+0x17/0x50
  [  102.121433][T14893]  ? asm_exc_invalid_op+0x1a/0x20
  [  102.122435][T14893]  ? __wake_up_klogd.part.0+0x76/0xd0
  [  102.123506][T14893]  ? dump_page+0x4f/0x60
  [  102.124352][T14893]  ? folio_lruvec_lock_irqsave+0x10e/0x170
  [  102.125500][T14893]  folio_batch_move_lru+0xd4/0x200
  [  102.126577][T14893]  ? __pfx_lru_add+0x10/0x10
  [  102.127505][T14893]  __folio_batch_add_and_move+0x391/0x720
  [  102.128633][T14893]  ? __pfx_lru_add+0x10/0x10
  [  102.129550][T14893]  folio_putback_lru+0x16/0x80
  [  102.130564][T14893]  migrate_device_finalize+0x9b/0x530
  [  102.131640][T14893]  dmirror_migrate_to_device.constprop.0+0x7c5/0xad0
  [  102.133047][T14893]  dmirror_fops_unlocked_ioctl+0x89b/0xc80

Likely, nothing else goes wrong: putting the last folio reference will
remove the folio from the LRU again.  So besides memcg complaining, adding
the folio to be freed to the LRU is just an unnecessary step.

The new flow resembles what we have in migrate_folio_move(): add the dst
to the lru, rem
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21861/">CVE-2025-21861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21861">CVE-2025-21861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239483">SUSE bug 1239483</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21863" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21863" ref_url="https://www.suse.com/security/cve/CVE-2025-21863" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1703" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: prevent opcode speculation

sqe-&gt;opcode is used for different tables, make sure we santitise it
against speculations.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21863/">CVE-2025-21863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21863">CVE-2025-21863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239475">SUSE bug 1239475</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21864" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21864" ref_url="https://www.suse.com/security/cve/CVE-2025-21864" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: drop secpath at the same time as we currently drop dst

Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit while
running tests that boil down to:
 - create a pair of netns
 - run a basic TCP test over ipcomp6
 - delete the pair of netns

The xfrm_state found on spi_byaddr was not deleted at the time we
delete the netns, because we still have a reference on it. This
lingering reference comes from a secpath (which holds a ref on the
xfrm_state), which is still attached to an skb. This skb is not
leaked, it ends up on sk_receive_queue and then gets defer-free'd by
skb_attempt_defer_free.

The problem happens when we defer freeing an skb (push it on one CPU's
defer_list), and don't flush that list before the netns is deleted. In
that case, we still have a reference on the xfrm_state that we don't
expect at this point.

We already drop the skb's dst in the TCP receive path when it's no
longer needed, so let's also drop the secpath. At this point,
tcp_filter has already called into the LSM hooks that may require the
secpath, so it should not be needed anymore. However, in some of those
places, the MPTCP extension has just been attached to the skb, so we
cannot simply drop all extensions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21864/">CVE-2025-21864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21864">CVE-2025-21864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239482">SUSE bug 1239482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21867</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21867" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21867" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21867" ref_url="https://www.suse.com/security/cve/CVE-2025-21867" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, test_run: Fix use-after-free issue in eth_skb_pkt_type()

KMSAN reported a use-after-free issue in eth_skb_pkt_type()[1]. The
cause of the issue was that eth_skb_pkt_type() accessed skb's data
that didn't contain an Ethernet header. This occurs when
bpf_prog_test_run_xdp() passes an invalid value as the user_data
argument to bpf_test_init().

Fix this by returning an error when user_data is less than ETH_HLEN in
bpf_test_init(). Additionally, remove the check for "if (user_size &gt;
size)" as it is unnecessary.

[1]
BUG: KMSAN: use-after-free in eth_skb_pkt_type include/linux/etherdevice.h:627 [inline]
BUG: KMSAN: use-after-free in eth_type_trans+0x4ee/0x980 net/ethernet/eth.c:165
 eth_skb_pkt_type include/linux/etherdevice.h:627 [inline]
 eth_type_trans+0x4ee/0x980 net/ethernet/eth.c:165
 __xdp_build_skb_from_frame+0x5a8/0xa50 net/core/xdp.c:635
 xdp_recv_frames net/bpf/test_run.c:272 [inline]
 xdp_test_run_batch net/bpf/test_run.c:361 [inline]
 bpf_test_run_xdp_live+0x2954/0x3330 net/bpf/test_run.c:390
 bpf_prog_test_run_xdp+0x148e/0x1b10 net/bpf/test_run.c:1318
 bpf_prog_test_run+0x5b7/0xa30 kernel/bpf/syscall.c:4371
 __sys_bpf+0x6a6/0xe20 kernel/bpf/syscall.c:5777
 __do_sys_bpf kernel/bpf/syscall.c:5866 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5864 [inline]
 __x64_sys_bpf+0xa4/0xf0 kernel/bpf/syscall.c:5864
 x64_sys_call+0x2ea0/0x3d90 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd9/0x1d0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 free_pages_prepare mm/page_alloc.c:1056 [inline]
 free_unref_page+0x156/0x1320 mm/page_alloc.c:2657
 __free_pages+0xa3/0x1b0 mm/page_alloc.c:4838
 bpf_ringbuf_free kernel/bpf/ringbuf.c:226 [inline]
 ringbuf_map_free+0xff/0x1e0 kernel/bpf/ringbuf.c:235
 bpf_map_free kernel/bpf/syscall.c:838 [inline]
 bpf_map_free_deferred+0x17c/0x310 kernel/bpf/syscall.c:862
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa2b/0x1b60 kernel/workqueue.c:3310
 worker_thread+0xedf/0x1550 kernel/workqueue.c:3391
 kthread+0x535/0x6b0 kernel/kthread.c:389
 ret_from_fork+0x6e/0x90 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

CPU: 1 UID: 0 PID: 17276 Comm: syz.1.16450 Not tainted 6.12.0-05490-g9bb88c659673 #8
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21867/">CVE-2025-21867 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21867">CVE-2025-21867 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240181">SUSE bug 1240181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21883" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21883" ref_url="https://www.suse.com/security/cve/CVE-2025-21883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix deinitializing VF in error path

If ice_ena_vfs() fails after calling ice_create_vf_entries(), it frees
all VFs without removing them from snapshot PF-VF mailbox list, leading
to list corruption.

Reproducer:
  devlink dev eswitch set $PF1_PCI mode switchdev
  ip l s $PF1 up
  ip l s $PF1 promisc on
  sleep 1
  echo 1 &gt; /sys/class/net/$PF1/device/sriov_numvfs
  sleep 1
  echo 1 &gt; /sys/class/net/$PF1/device/sriov_numvfs

Trace (minimized):
  list_add corruption. next-&gt;prev should be prev (ffff8882e241c6f0), but was 0000000000000000. (next=ffff888455da1330).
  kernel BUG at lib/list_debug.c:29!
  RIP: 0010:__list_add_valid_or_report+0xa6/0x100
   ice_mbx_init_vf_info+0xa7/0x180 [ice]
   ice_initialize_vf_entry+0x1fa/0x250 [ice]
   ice_sriov_configure+0x8d7/0x1520 [ice]
   ? __percpu_ref_switch_mode+0x1b1/0x5d0
   ? __pfx_ice_sriov_configure+0x10/0x10 [ice]

Sometimes a KASAN report can be seen instead with a similar stack trace:
  BUG: KASAN: use-after-free in __list_add_valid_or_report+0xf1/0x100

VFs are added to this list in ice_mbx_init_vf_info(), but only removed
in ice_free_vfs(). Move the removing to ice_free_vf_entries(), which is
also being called in other places where VFs are being removed (including
ice_free_vfs() itself).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21883/">CVE-2025-21883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21883">CVE-2025-21883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240189">SUSE bug 1240189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996844" comment="kernel-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996845" comment="kernel-abi-stablelists-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996846" comment="kernel-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996847" comment="kernel-cross-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996848" comment="kernel-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996849" comment="kernel-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996852" comment="kernel-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996853" comment="kernel-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996854" comment="kernel-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996855" comment="kernel-debug-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996858" comment="kernel-doc-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996859" comment="kernel-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996860" comment="kernel-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996861" comment="kernel-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996862" comment="kernel-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996863" comment="kernel-rt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996864" comment="kernel-rt-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996865" comment="kernel-rt-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996866" comment="kernel-rt-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996868" comment="kernel-rt-debug-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996869" comment="kernel-rt-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996870" comment="kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996871" comment="kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996873" comment="kernel-rt-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996874" comment="kernel-rt-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996875" comment="kernel-rt-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996876" comment="kernel-rt-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996877" comment="kernel-tools-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996878" comment="kernel-tools-libs-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996880" comment="kernel-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996881" comment="kernel-uki-virt-addons-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996882" comment="libperf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996883" comment="perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996884" comment="python3-perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996885" comment="rtla-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996886" comment="rv-5.14.0-570.23.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21887</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21887" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21887" ref_url="https://www.suse.com/security/cve/CVE-2025-21887" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10379" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up

The issue was caused by dput(upper) being called before
ovl_dentry_update_reval(), while upper-&gt;d_flags was still
accessed in ovl_dentry_remote().

Move dput(upper) after its last use to prevent use-after-free.

BUG: KASAN: slab-use-after-free in ovl_dentry_remote fs/overlayfs/util.c:162 [inline]
BUG: KASAN: slab-use-after-free in ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167

Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0xc3/0x620 mm/kasan/report.c:488
 kasan_report+0xd9/0x110 mm/kasan/report.c:601
 ovl_dentry_remote fs/overlayfs/util.c:162 [inline]
 ovl_dentry_update_reval+0xd2/0xf0 fs/overlayfs/util.c:167
 ovl_link_up fs/overlayfs/copy_up.c:610 [inline]
 ovl_copy_up_one+0x2105/0x3490 fs/overlayfs/copy_up.c:1170
 ovl_copy_up_flags+0x18d/0x200 fs/overlayfs/copy_up.c:1223
 ovl_rename+0x39e/0x18c0 fs/overlayfs/dir.c:1136
 vfs_rename+0xf84/0x20a0 fs/namei.c:4893
...
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21887/">CVE-2025-21887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21887">CVE-2025-21887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240176">SUSE bug 1240176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999183" comment="kernel-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999184" comment="kernel-abi-stablelists-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999185" comment="kernel-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999186" comment="kernel-cross-headers-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999187" comment="kernel-debug-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999188" comment="kernel-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999191" comment="kernel-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999192" comment="kernel-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999193" comment="kernel-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999194" comment="kernel-debug-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999197" comment="kernel-doc-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999198" comment="kernel-headers-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999199" comment="kernel-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999200" comment="kernel-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999201" comment="kernel-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999202" comment="kernel-rt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999203" comment="kernel-rt-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999204" comment="kernel-rt-debug-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999205" comment="kernel-rt-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999207" comment="kernel-rt-debug-kvm-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999208" comment="kernel-rt-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999209" comment="kernel-rt-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999210" comment="kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999212" comment="kernel-rt-kvm-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999213" comment="kernel-rt-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999214" comment="kernel-rt-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999215" comment="kernel-rt-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999216" comment="kernel-tools-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999217" comment="kernel-tools-libs-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999219" comment="kernel-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999220" comment="kernel-uki-virt-addons-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999221" comment="libperf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999222" comment="perf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999223" comment="python3-perf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999224" comment="rtla-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999225" comment="rv-5.14.0-570.25.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21888</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21888" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21888" ref_url="https://www.suse.com/security/cve/CVE-2025-21888" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix a WARN during dereg_mr for DM type

Memory regions (MR) of type DM (device memory) do not have an associated
umem.

In the __mlx5_ib_dereg_mr() -&gt; mlx5_free_priv_descs() flow, the code
incorrectly takes the wrong branch, attempting to call
dma_unmap_single() on a DMA address that is not mapped.

This results in a WARN [1], as shown below.

The issue is resolved by properly accounting for the DM type and
ensuring the correct branch is selected in mlx5_free_priv_descs().

[1]
WARNING: CPU: 12 PID: 1346 at drivers/iommu/dma-iommu.c:1230 iommu_dma_unmap_page+0x79/0x90
Modules linked in: ip6table_mangle ip6table_nat ip6table_filter ip6_tables iptable_mangle xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry ovelay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core fuse mlx5_core
CPU: 12 UID: 0 PID: 1346 Comm: ibv_rc_pingpong Not tainted 6.12.0-rc7+ #1631
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:iommu_dma_unmap_page+0x79/0x90
Code: 2b 49 3b 29 72 26 49 3b 69 08 73 20 4d 89 f0 44 89 e9 4c 89 e2 48 89 ee 48 89 df 5b 5d 41 5c 41 5d 41 5e 41 5f e9 07 b8 88 ff &lt;0f&gt; 0b 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 66 0f 1f 44 00
RSP: 0018:ffffc90001913a10 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88810194b0a8 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001
RBP: ffff88810194b0a8 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f537abdd740(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f537aeb8000 CR3: 000000010c248001 CR4: 0000000000372eb0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
? __warn+0x84/0x190
? iommu_dma_unmap_page+0x79/0x90
? report_bug+0xf8/0x1c0
? handle_bug+0x55/0x90
? exc_invalid_op+0x13/0x60
? asm_exc_invalid_op+0x16/0x20
? iommu_dma_unmap_page+0x79/0x90
dma_unmap_page_attrs+0xe6/0x290
mlx5_free_priv_descs+0xb0/0xe0 [mlx5_ib]
__mlx5_ib_dereg_mr+0x37e/0x520 [mlx5_ib]
? _raw_spin_unlock_irq+0x24/0x40
? wait_for_completion+0xfe/0x130
? rdma_restrack_put+0x63/0xe0 [ib_core]
ib_dereg_mr_user+0x5f/0x120 [ib_core]
? lock_release+0xc6/0x280
destroy_hw_idr_uobject+0x1d/0x60 [ib_uverbs]
uverbs_destroy_uobject+0x58/0x1d0 [ib_uverbs]
uobj_destroy+0x3f/0x70 [ib_uverbs]
ib_uverbs_cmd_verbs+0x3e4/0xbb0 [ib_uverbs]
? __pfx_uverbs_destroy_def_handler+0x10/0x10 [ib_uverbs]
? lock_acquire+0xc1/0x2f0
? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs]
? ib_uverbs_ioctl+0x116/0x170 [ib_uverbs]
? lock_release+0xc6/0x280
ib_uverbs_ioctl+0xe7/0x170 [ib_uverbs]
? ib_uverbs_ioctl+0xcb/0x170 [ib_uverbs]
__x64_sys_ioctl+0x1b0/0xa70
do_syscall_64+0x6b/0x140
entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f537adaf17b
Code: 0f 1e fa 48 8b 05 1d ad 0c 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 0f 1f 44 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d ed ac 0c 00 f7 d8 64 89 01 48
RSP: 002b:00007ffff218f0b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007ffff218f1d8 RCX: 00007f537adaf17b
RDX: 00007ffff218f1c0 RSI: 00000000c0181b01 RDI: 0000000000000003
RBP: 00007ffff218f1a0 R08: 00007f537aa8d010 R09: 0000561ee2e4f270
R10: 00007f537aace3a8 R11: 0000000000000246 R12: 00007ffff218f190
R13: 000000000000001c R14: 0000561ee2e4d7c0 R15: 00007ffff218f450
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21888/">CVE-2025-21888 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21888">CVE-2025-21888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240177">SUSE bug 1240177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21902</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21902" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21902" ref_url="https://www.suse.com/security/cve/CVE-2025-21902" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

acpi: typec: ucsi: Introduce a -&gt;poll_cci method

For the ACPI backend of UCSI the UCSI "registers" are just a memory copy
of the register values in an opregion. The ACPI implementation in the
BIOS ensures that the opregion contents are synced to the embedded
controller and it ensures that the registers (in particular CCI) are
synced back to the opregion on notifications. While there is an ACPI call
that syncs the actual registers to the opregion there is rarely a need to
do this and on some ACPI implementations it actually breaks in various
interesting ways.

The only reason to force a sync from the embedded controller is to poll
CCI while notifications are disabled. Only the ucsi core knows if this
is the case and guessing based on the current command is suboptimal, i.e.
leading to the following spurious assertion splat:

WARNING: CPU: 3 PID: 76 at drivers/usb/typec/ucsi/ucsi.c:1388 ucsi_reset_ppm+0x1b4/0x1c0 [typec_ucsi]
CPU: 3 UID: 0 PID: 76 Comm: kworker/3:0 Not tainted 6.12.11-200.fc41.x86_64 #1
Hardware name: LENOVO 21D0/LNVNB161216, BIOS J6CN45WW 03/17/2023
Workqueue: events_long ucsi_init_work [typec_ucsi]
RIP: 0010:ucsi_reset_ppm+0x1b4/0x1c0 [typec_ucsi]
Call Trace:
 &lt;TASK&gt;
 ucsi_init_work+0x3c/0xac0 [typec_ucsi]
 process_one_work+0x179/0x330
 worker_thread+0x252/0x390
 kthread+0xd2/0x100
 ret_from_fork+0x34/0x50
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Thus introduce a -&gt;poll_cci() method that works like -&gt;read_cci() with an
additional forced sync and document that this should be used when polling
with notifications disabled. For all other backends that presumably don't
have this issue use the same implementation for both methods.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21902/">CVE-2025-21902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21902">CVE-2025-21902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240599">SUSE bug 1240599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21905" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21905" ref_url="https://www.suse.com/security/cve/CVE-2025-21905" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11850" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001855.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: limit printed string from FW file

There's no guarantee here that the file is always with a
NUL-termination, so reading the string may read beyond the
end of the TLV. If that's the last TLV in the file, it can
perhaps even read beyond the end of the file buffer.

Fix that by limiting the print format to the size of the
buffer we have.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21905/">CVE-2025-21905 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21905">CVE-2025-21905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240575">SUSE bug 1240575</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21919" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21919" ref_url="https://www.suse.com/security/cve/CVE-2025-21919" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11850" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001855.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/fair: Fix potential memory corruption in child_cfs_rq_on_list

child_cfs_rq_on_list attempts to convert a 'prev' pointer to a cfs_rq.
This 'prev' pointer can originate from struct rq's leaf_cfs_rq_list,
making the conversion invalid and potentially leading to memory
corruption. Depending on the relative positions of leaf_cfs_rq_list and
the task group (tg) pointer within the struct, this can cause a memory
fault or access garbage data.

The issue arises in list_add_leaf_cfs_rq, where both
cfs_rq-&gt;leaf_cfs_rq_list and rq-&gt;leaf_cfs_rq_list are added to the same
leaf list. Also, rq-&gt;tmp_alone_branch can be set to rq-&gt;leaf_cfs_rq_list.

This adds a check `if (prev == &amp;rq-&gt;leaf_cfs_rq_list)` after the main
conditional in child_cfs_rq_on_list. This ensures that the container_of
operation will convert a correct cfs_rq struct.

This check is sufficient because only cfs_rqs on the same CPU are added
to the list, so verifying the 'prev' pointer against the current rq's list
head is enough.

Fixes a potential memory corruption issue that due to current struct
layout might not be manifesting as a crash but could lead to unpredictable
behavior when the layout changes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21919/">CVE-2025-21919 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21919">CVE-2025-21919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240593">SUSE bug 1240593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996844" comment="kernel-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996845" comment="kernel-abi-stablelists-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996846" comment="kernel-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996847" comment="kernel-cross-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996848" comment="kernel-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996849" comment="kernel-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996852" comment="kernel-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996853" comment="kernel-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996854" comment="kernel-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996855" comment="kernel-debug-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996858" comment="kernel-doc-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996859" comment="kernel-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996860" comment="kernel-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996861" comment="kernel-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996862" comment="kernel-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996863" comment="kernel-rt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996864" comment="kernel-rt-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996865" comment="kernel-rt-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996866" comment="kernel-rt-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996868" comment="kernel-rt-debug-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996869" comment="kernel-rt-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996870" comment="kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996871" comment="kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996873" comment="kernel-rt-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996874" comment="kernel-rt-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996875" comment="kernel-rt-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996876" comment="kernel-rt-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996877" comment="kernel-tools-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996878" comment="kernel-tools-libs-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996880" comment="kernel-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996881" comment="kernel-uki-virt-addons-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996882" comment="libperf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996883" comment="perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996884" comment="python3-perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996885" comment="rtla-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996886" comment="rv-5.14.0-570.23.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21920" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21920" ref_url="https://www.suse.com/security/cve/CVE-2025-21920" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8643" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vlan: enforce underlying device type

Currently, VLAN devices can be created on top of non-ethernet devices.

Besides the fact that it doesn't make much sense, this also causes a
bug which leaks the address of a kernel function to usermode.

When creating a VLAN device, we initialize GARP (garp_init_applicant)
and MRP (mrp_init_applicant) for the underlying device.

As part of the initialization process, we add the multicast address of
each applicant to the underlying device, by calling dev_mc_add.

__dev_mc_add uses dev-&gt;addr_len to determine the length of the new
multicast address.

This causes an out-of-bounds read if dev-&gt;addr_len is greater than 6,
since the multicast addresses provided by GARP and MRP are only 6
bytes long.

This behaviour can be reproduced using the following commands:

ip tunnel add gretest mode ip6gre local ::1 remote ::2 dev lo
ip l set up dev gretest
ip link add link gretest name vlantest type vlan id 100

Then, the following command will display the address of garp_pdu_rcv:

ip maddr show | grep 01:80:c2:00:00:21

Fix the bug by enforcing the type of the underlying device during VLAN
device initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-11"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21920/">CVE-2025-21920 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21920">CVE-2025-21920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240686">SUSE bug 1240686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986194" comment="kernel-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986195" comment="kernel-abi-stablelists-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986196" comment="kernel-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986197" comment="kernel-cross-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986198" comment="kernel-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986199" comment="kernel-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986202" comment="kernel-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986203" comment="kernel-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986204" comment="kernel-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986205" comment="kernel-debug-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986208" comment="kernel-doc-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986209" comment="kernel-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986210" comment="kernel-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986211" comment="kernel-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986212" comment="kernel-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986213" comment="kernel-rt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986214" comment="kernel-rt-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986215" comment="kernel-rt-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986216" comment="kernel-rt-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986218" comment="kernel-rt-debug-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986219" comment="kernel-rt-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986220" comment="kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986221" comment="kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986223" comment="kernel-rt-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986224" comment="kernel-rt-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986225" comment="kernel-rt-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986226" comment="kernel-rt-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986227" comment="kernel-tools-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986228" comment="kernel-tools-libs-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986230" comment="kernel-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986231" comment="kernel-uki-virt-addons-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986232" comment="libperf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986233" comment="perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986234" comment="python3-perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986235" comment="rtla-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986236" comment="rv-5.14.0-570.21.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21926</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21926" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21926" ref_url="https://www.suse.com/security/cve/CVE-2025-21926" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8643" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: gso: fix ownership in __udp_gso_segment

In __udp_gso_segment the skb destructor is removed before segmenting the
skb but the socket reference is kept as-is. This is an issue if the
original skb is later orphaned as we can hit the following bug:

  kernel BUG at ./include/linux/skbuff.h:3312!  (skb_orphan)
  RIP: 0010:ip_rcv_core+0x8b2/0xca0
  Call Trace:
   ip_rcv+0xab/0x6e0
   __netif_receive_skb_one_core+0x168/0x1b0
   process_backlog+0x384/0x1100
   __napi_poll.constprop.0+0xa1/0x370
   net_rx_action+0x925/0xe50

The above can happen following a sequence of events when using
OpenVSwitch, when an OVS_ACTION_ATTR_USERSPACE action precedes an
OVS_ACTION_ATTR_OUTPUT action:

1. OVS_ACTION_ATTR_USERSPACE is handled (in do_execute_actions): the skb
   goes through queue_gso_packets and then __udp_gso_segment, where its
   destructor is removed.
2. The segments' data are copied and sent to userspace.
3. OVS_ACTION_ATTR_OUTPUT is handled (in do_execute_actions) and the
   same original skb is sent to its path.
4. If it later hits skb_orphan, we hit the bug.

Fix this by also removing the reference to the socket in
__udp_gso_segment.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-11"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21926/">CVE-2025-21926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21926">CVE-2025-21926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240712">SUSE bug 1240712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986194" comment="kernel-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986195" comment="kernel-abi-stablelists-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986196" comment="kernel-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986197" comment="kernel-cross-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986198" comment="kernel-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986199" comment="kernel-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986202" comment="kernel-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986203" comment="kernel-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986204" comment="kernel-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986205" comment="kernel-debug-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986208" comment="kernel-doc-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986209" comment="kernel-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986210" comment="kernel-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986211" comment="kernel-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986212" comment="kernel-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986213" comment="kernel-rt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986214" comment="kernel-rt-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986215" comment="kernel-rt-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986216" comment="kernel-rt-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986218" comment="kernel-rt-debug-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986219" comment="kernel-rt-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986220" comment="kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986221" comment="kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986223" comment="kernel-rt-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986224" comment="kernel-rt-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986225" comment="kernel-rt-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986226" comment="kernel-rt-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986227" comment="kernel-tools-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986228" comment="kernel-tools-libs-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986230" comment="kernel-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986231" comment="kernel-uki-virt-addons-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986232" comment="libperf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986233" comment="perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986234" comment="python3-perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986235" comment="rtla-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986236" comment="rv-5.14.0-570.21.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21927</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21927" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21927" ref_url="https://www.suse.com/security/cve/CVE-2025-21927" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7423" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()

nvme_tcp_recv_pdu() doesn't check the validity of the header length.
When header digests are enabled, a target might send a packet with an
invalid header length (e.g. 255), causing nvme_tcp_verify_hdgst()
to access memory outside the allocated area and cause memory corruptions
by overwriting it with the calculated digest.

Fix this by rejecting packets with an unexpected header length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-07"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21927/">CVE-2025-21927 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21927">CVE-2025-21927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240714">SUSE bug 1240714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977299" comment="bpftool-7.4.0-503.40.1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985567" comment="kernel-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985568" comment="kernel-abi-stablelists-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985569" comment="kernel-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985570" comment="kernel-cross-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985571" comment="kernel-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985572" comment="kernel-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985575" comment="kernel-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985576" comment="kernel-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985577" comment="kernel-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985578" comment="kernel-debug-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985581" comment="kernel-doc-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985582" comment="kernel-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985583" comment="kernel-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985584" comment="kernel-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985585" comment="kernel-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985586" comment="kernel-rt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985587" comment="kernel-rt-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985588" comment="kernel-rt-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985589" comment="kernel-rt-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985591" comment="kernel-rt-debug-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985592" comment="kernel-rt-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985593" comment="kernel-rt-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985594" comment="kernel-rt-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985596" comment="kernel-rt-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985597" comment="kernel-rt-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985598" comment="kernel-rt-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985599" comment="kernel-rt-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985600" comment="kernel-tools-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985601" comment="kernel-tools-libs-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985603" comment="kernel-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985604" comment="kernel-uki-virt-addons-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985605" comment="libperf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985606" comment="perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985607" comment="python3-perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985608" comment="rtla-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985609" comment="rv-5.14.0-570.16.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21928" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21928" ref_url="https://www.suse.com/security/cve/CVE-2025-21928" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()

The system can experience a random crash a few minutes after the driver is
removed. This issue occurs due to improper handling of memory freeing in
the ishtp_hid_remove() function.

The function currently frees the `driver_data` directly within the loop
that destroys the HID devices, which can lead to accessing freed memory.
Specifically, `hid_destroy_device()` uses `driver_data` when it calls
`hid_ishtp_set_feature()` to power off the sensor, so freeing
`driver_data` beforehand can result in accessing invalid memory.

This patch resolves the issue by storing the `driver_data` in a temporary
variable before calling `hid_destroy_device()`, and then freeing the
`driver_data` after the device is destroyed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21928/">CVE-2025-21928 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21928">CVE-2025-21928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240722">SUSE bug 1240722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21929</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21929" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21929" ref_url="https://www.suse.com/security/cve/CVE-2025-21929" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()

During the `rmmod` operation for the `intel_ishtp_hid` driver, a
use-after-free issue can occur in the hid_ishtp_cl_remove() function.
The function hid_ishtp_cl_deinit() is called before ishtp_hid_remove(),
which can lead to accessing freed memory or resources during the
removal process.

Call Trace:
 ? ishtp_cl_send+0x168/0x220 [intel_ishtp]
 ? hid_output_report+0xe3/0x150 [hid]
 hid_ishtp_set_feature+0xb5/0x120 [intel_ishtp_hid]
 ishtp_hid_request+0x7b/0xb0 [intel_ishtp_hid]
 hid_hw_request+0x1f/0x40 [hid]
 sensor_hub_set_feature+0x11f/0x190 [hid_sensor_hub]
 _hid_sensor_power_state+0x147/0x1e0 [hid_sensor_trigger]
 hid_sensor_runtime_resume+0x22/0x30 [hid_sensor_trigger]
 sensor_hub_remove+0xa8/0xe0 [hid_sensor_hub]
 hid_device_remove+0x49/0xb0 [hid]
 hid_destroy_device+0x6f/0x90 [hid]
 ishtp_hid_remove+0x42/0x70 [intel_ishtp_hid]
 hid_ishtp_cl_remove+0x6b/0xb0 [intel_ishtp_hid]
 ishtp_cl_device_remove+0x4a/0x60 [intel_ishtp]
 ...

Additionally, ishtp_hid_remove() is a HID level power off, which should
occur before the ISHTP level disconnect.

This patch resolves the issue by reordering the calls in
hid_ishtp_cl_remove(). The function ishtp_hid_remove() is now
called before hid_ishtp_cl_deinit().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21929/">CVE-2025-21929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21929">CVE-2025-21929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240711">SUSE bug 1240711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21961</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21961" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21961" ref_url="https://www.suse.com/security/cve/CVE-2025-21961" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eth: bnxt: fix truesize for mb-xdp-pass case

When mb-xdp is set and return is XDP_PASS, packet is converted from
xdp_buff to sk_buff with xdp_update_skb_shared_info() in
bnxt_xdp_build_skb().
bnxt_xdp_build_skb() passes incorrect truesize argument to
xdp_update_skb_shared_info().
The truesize is calculated as BNXT_RX_PAGE_SIZE * sinfo-&gt;nr_frags but
the skb_shared_info was wiped by napi_build_skb() before.
So it stores sinfo-&gt;nr_frags before bnxt_xdp_build_skb() and use it
instead of getting skb_shared_info from xdp_get_shared_info_from_buff().

Splat looks like:
 ------------[ cut here ]------------
 WARNING: CPU: 2 PID: 0 at net/core/skbuff.c:6072 skb_try_coalesce+0x504/0x590
 Modules linked in: xt_nat xt_tcpudp veth af_packet xt_conntrack nft_chain_nat xt_MASQUERADE nf_conntrack_netlink xfrm_user xt_addrtype nft_coms
 CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.14.0-rc2+ #3
 RIP: 0010:skb_try_coalesce+0x504/0x590
 Code: 4b fd ff ff 49 8b 34 24 40 80 e6 40 0f 84 3d fd ff ff 49 8b 74 24 48 40 f6 c6 01 0f 84 2e fd ff ff 48 8d 4e ff e9 25 fd ff ff &lt;0f&gt; 0b e99
 RSP: 0018:ffffb62c4120caa8 EFLAGS: 00010287
 RAX: 0000000000000003 RBX: ffffb62c4120cb14 RCX: 0000000000000ec0
 RDX: 0000000000001000 RSI: ffffa06e5d7dc000 RDI: 0000000000000003
 RBP: ffffa06e5d7ddec0 R08: ffffa06e6120a800 R09: ffffa06e7a119900
 R10: 0000000000002310 R11: ffffa06e5d7dcec0 R12: ffffe4360575f740
 R13: ffffe43600000000 R14: 0000000000000002 R15: 0000000000000002
 FS:  0000000000000000(0000) GS:ffffa0755f700000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f147b76b0f8 CR3: 00000001615d4000 CR4: 00000000007506f0
 PKRU: 55555554
 Call Trace:
  &lt;IRQ&gt;
  ? __warn+0x84/0x130
  ? skb_try_coalesce+0x504/0x590
  ? report_bug+0x18a/0x1a0
  ? handle_bug+0x53/0x90
  ? exc_invalid_op+0x14/0x70
  ? asm_exc_invalid_op+0x16/0x20
  ? skb_try_coalesce+0x504/0x590
  inet_frag_reasm_finish+0x11f/0x2e0
  ip_defrag+0x37a/0x900
  ip_local_deliver+0x51/0x120
  ip_sublist_rcv_finish+0x64/0x70
  ip_sublist_rcv+0x179/0x210
  ip_list_rcv+0xf9/0x130

How to reproduce:
&lt;Node A&gt;
ip link set $interface1 xdp obj xdp_pass.o
ip link set $interface1 mtu 9000 up
ip a a 10.0.0.1/24 dev $interface1
&lt;Node B&gt;
ip link set $interfac2 mtu 9000 up
ip a a 10.0.0.2/24 dev $interface2
ping 10.0.0.1 -s 65000

Following ping.py patch adds xdp-mb-pass case. so ping.py is going to be
able to reproduce this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21961/">CVE-2025-21961 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21961">CVE-2025-21961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240816">SUSE bug 1240816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986972" comment="kernel-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986973" comment="kernel-abi-stablelists-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986974" comment="kernel-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986975" comment="kernel-cross-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986976" comment="kernel-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986977" comment="kernel-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986980" comment="kernel-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986981" comment="kernel-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986982" comment="kernel-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986983" comment="kernel-debug-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986986" comment="kernel-doc-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986987" comment="kernel-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986988" comment="kernel-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986989" comment="kernel-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986990" comment="kernel-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986991" comment="kernel-rt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986992" comment="kernel-rt-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986993" comment="kernel-rt-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986994" comment="kernel-rt-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986996" comment="kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986997" comment="kernel-rt-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986998" comment="kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986999" comment="kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987001" comment="kernel-rt-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987002" comment="kernel-rt-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987003" comment="kernel-rt-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987004" comment="kernel-rt-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987005" comment="kernel-tools-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987006" comment="kernel-tools-libs-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987008" comment="kernel-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987009" comment="kernel-uki-virt-addons-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987010" comment="libperf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987011" comment="perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987012" comment="python3-perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987013" comment="rtla-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987014" comment="rv-5.14.0-570.22.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21962</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21962" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21962" ref_url="https://www.suse.com/security/cve/CVE-2025-21962" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix integer overflow while processing closetimeo mount option

User-provided mount parameter closetimeo of type u32 is intended to have
an upper limit, but before it is validated, the value is converted from
seconds to jiffies which can lead to an integer overflow.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21962/">CVE-2025-21962 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21962">CVE-2025-21962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240655">SUSE bug 1240655</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21963</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21963" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21963" ref_url="https://www.suse.com/security/cve/CVE-2025-21963" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix integer overflow while processing acdirmax mount option

User-provided mount parameter acdirmax of type u32 is intended to have
an upper limit, but before it is validated, the value is converted from
seconds to jiffies which can lead to an integer overflow.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21963/">CVE-2025-21963 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21963">CVE-2025-21963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240717">SUSE bug 1240717</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986972" comment="kernel-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986973" comment="kernel-abi-stablelists-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986974" comment="kernel-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986975" comment="kernel-cross-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986976" comment="kernel-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986977" comment="kernel-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986980" comment="kernel-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986981" comment="kernel-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986982" comment="kernel-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986983" comment="kernel-debug-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986986" comment="kernel-doc-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986987" comment="kernel-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986988" comment="kernel-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986989" comment="kernel-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986990" comment="kernel-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986991" comment="kernel-rt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986992" comment="kernel-rt-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986993" comment="kernel-rt-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986994" comment="kernel-rt-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986996" comment="kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986997" comment="kernel-rt-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986998" comment="kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986999" comment="kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987001" comment="kernel-rt-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987002" comment="kernel-rt-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987003" comment="kernel-rt-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987004" comment="kernel-rt-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987005" comment="kernel-tools-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987006" comment="kernel-tools-libs-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987008" comment="kernel-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987009" comment="kernel-uki-virt-addons-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987010" comment="libperf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987011" comment="perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987012" comment="python3-perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987013" comment="rtla-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987014" comment="rv-5.14.0-570.22.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21964" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21964" ref_url="https://www.suse.com/security/cve/CVE-2025-21964" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix integer overflow while processing acregmax mount option

User-provided mount parameter acregmax of type u32 is intended to have
an upper limit, but before it is validated, the value is converted from
seconds to jiffies which can lead to an integer overflow.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21964/">CVE-2025-21964 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21964">CVE-2025-21964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240740">SUSE bug 1240740</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985653" comment="kernel-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985654" comment="kernel-abi-stablelists-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985655" comment="kernel-core-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985656" comment="kernel-cross-headers-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985657" comment="kernel-debug-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985658" comment="kernel-debug-core-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985661" comment="kernel-debug-modules-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985662" comment="kernel-debug-modules-core-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985663" comment="kernel-debug-modules-extra-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985664" comment="kernel-debug-uki-virt-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985667" comment="kernel-doc-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985668" comment="kernel-headers-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985669" comment="kernel-modules-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985670" comment="kernel-modules-core-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985671" comment="kernel-modules-extra-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985672" comment="kernel-rt-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985673" comment="kernel-rt-core-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985674" comment="kernel-rt-debug-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985675" comment="kernel-rt-debug-core-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985677" comment="kernel-rt-debug-kvm-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985678" comment="kernel-rt-debug-modules-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985679" comment="kernel-rt-debug-modules-core-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985680" comment="kernel-rt-debug-modules-extra-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985682" comment="kernel-rt-kvm-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985683" comment="kernel-rt-modules-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985684" comment="kernel-rt-modules-core-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985685" comment="kernel-rt-modules-extra-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985686" comment="kernel-tools-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985687" comment="kernel-tools-libs-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985689" comment="kernel-uki-virt-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985690" comment="kernel-uki-virt-addons-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985691" comment="libperf-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985692" comment="perf-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985693" comment="python3-perf-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985694" comment="rtla-5.14.0-570.18.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985695" comment="rv-5.14.0-570.18.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21966" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21966" ref_url="https://www.suse.com/security/cve/CVE-2025-21966" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7903" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature

Fix memory corruption due to incorrect parameter being passed to bio_init
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21966/">CVE-2025-21966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21966">CVE-2025-21966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240779">SUSE bug 1240779</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985610" comment="kernel-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985611" comment="kernel-abi-stablelists-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985612" comment="kernel-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985613" comment="kernel-cross-headers-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985614" comment="kernel-debug-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985615" comment="kernel-debug-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985618" comment="kernel-debug-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985619" comment="kernel-debug-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985620" comment="kernel-debug-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985621" comment="kernel-debug-uki-virt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985624" comment="kernel-doc-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985625" comment="kernel-headers-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985626" comment="kernel-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985627" comment="kernel-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985628" comment="kernel-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985629" comment="kernel-rt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985630" comment="kernel-rt-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985631" comment="kernel-rt-debug-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985632" comment="kernel-rt-debug-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985634" comment="kernel-rt-debug-kvm-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985635" comment="kernel-rt-debug-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985636" comment="kernel-rt-debug-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985637" comment="kernel-rt-debug-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985639" comment="kernel-rt-kvm-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985640" comment="kernel-rt-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985641" comment="kernel-rt-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985642" comment="kernel-rt-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985643" comment="kernel-tools-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985644" comment="kernel-tools-libs-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985646" comment="kernel-uki-virt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985647" comment="kernel-uki-virt-addons-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985648" comment="libperf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985649" comment="perf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985650" comment="python3-perf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985651" comment="rtla-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985652" comment="rv-5.14.0-570.17.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21969</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21969" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21969" ref_url="https://www.suse.com/security/cve/CVE-2025-21969" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd

After the hci sync command releases l2cap_conn, the hci receive data work
queue references the released l2cap_conn when sending to the upper layer.
Add hci dev lock to the hci receive data work queue to synchronize the two.

[1]
BUG: KASAN: slab-use-after-free in l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954
Read of size 8 at addr ffff8880271a4000 by task kworker/u9:2/5837

CPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: hci1 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:489
 kasan_report+0x143/0x180 mm/kasan/report.c:602
 l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline]
 l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954
 l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline]
 l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline]
 l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817
 hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline]
 hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;

Allocated by task 5837:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329
 kmalloc_noprof include/linux/slab.h:901 [inline]
 kzalloc_noprof include/linux/slab.h:1037 [inline]
 l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860
 l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239
 hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]
 hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726
 hci_event_func net/bluetooth/hci_event.c:7473 [inline]
 hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525
 hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

Freed by task 54:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2353 [inline]
 slab_free mm/slub.c:4613 [inline]
 kfree+0x196/0x430 mm/slub.c:4761
 l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235
 hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]
 hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266
 hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603
 hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21969/">CVE-2025-21969 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21969">CVE-2025-21969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240784">SUSE bug 1240784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986972" comment="kernel-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986973" comment="kernel-abi-stablelists-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986974" comment="kernel-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986975" comment="kernel-cross-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986976" comment="kernel-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986977" comment="kernel-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986980" comment="kernel-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986981" comment="kernel-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986982" comment="kernel-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986983" comment="kernel-debug-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986986" comment="kernel-doc-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986987" comment="kernel-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986988" comment="kernel-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986989" comment="kernel-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986990" comment="kernel-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986991" comment="kernel-rt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986992" comment="kernel-rt-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986993" comment="kernel-rt-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986994" comment="kernel-rt-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986996" comment="kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986997" comment="kernel-rt-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986998" comment="kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986999" comment="kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987001" comment="kernel-rt-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987002" comment="kernel-rt-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987003" comment="kernel-rt-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987004" comment="kernel-rt-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987005" comment="kernel-tools-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987006" comment="kernel-tools-libs-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987008" comment="kernel-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987009" comment="kernel-uki-virt-addons-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987010" comment="libperf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987011" comment="perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987012" comment="python3-perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987013" comment="rtla-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987014" comment="rv-5.14.0-570.22.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21979" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21979" ref_url="https://www.suse.com/security/cve/CVE-2025-21979" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: cancel wiphy_work before freeing wiphy

A wiphy_work can be queued from the moment the wiphy is allocated and
initialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the
rdev::wiphy_work is getting queued.

If wiphy_free is called before the rdev::wiphy_work had a chance to run,
the wiphy memory will be freed, and then when it eventally gets to run
it'll use invalid memory.

Fix this by canceling the work before freeing the wiphy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21979/">CVE-2025-21979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21979">CVE-2025-21979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240808">SUSE bug 1240808</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986972" comment="kernel-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986973" comment="kernel-abi-stablelists-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986974" comment="kernel-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986975" comment="kernel-cross-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986976" comment="kernel-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986977" comment="kernel-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986980" comment="kernel-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986981" comment="kernel-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986982" comment="kernel-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986983" comment="kernel-debug-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986986" comment="kernel-doc-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986987" comment="kernel-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986988" comment="kernel-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986989" comment="kernel-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986990" comment="kernel-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986991" comment="kernel-rt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986992" comment="kernel-rt-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986993" comment="kernel-rt-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986994" comment="kernel-rt-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986996" comment="kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986997" comment="kernel-rt-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986998" comment="kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986999" comment="kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987001" comment="kernel-rt-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987002" comment="kernel-rt-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987003" comment="kernel-rt-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987004" comment="kernel-rt-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987005" comment="kernel-tools-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987006" comment="kernel-tools-libs-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987008" comment="kernel-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987009" comment="kernel-uki-virt-addons-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987010" comment="libperf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987011" comment="perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987012" comment="python3-perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987013" comment="rtla-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987014" comment="rv-5.14.0-570.22.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21991</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21991" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21991" ref_url="https://www.suse.com/security/cve/CVE-2025-21991" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10837" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001797.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes

Currently, load_microcode_amd() iterates over all NUMA nodes, retrieves their
CPU masks and unconditionally accesses per-CPU data for the first CPU of each
mask.

According to Documentation/admin-guide/mm/numaperf.rst:

  "Some memory may share the same node as a CPU, and others are provided as
  memory only nodes."

Therefore, some node CPU masks may be empty and wouldn't have a "first CPU".

On a machine with far memory (and therefore CPU-less NUMA nodes):
- cpumask_of_node(nid) is 0
- cpumask_first(0) is CONFIG_NR_CPUS
- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an
  index that is 1 out of bounds

This does not have any security implications since flashing microcode is
a privileged operation but I believe this has reliability implications by
potentially corrupting memory while flashing a microcode update.

When booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes
a microcode update. I get the following splat:

  UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y
  index 512 is out of range for type 'unsigned long[512]'
  [...]
  Call Trace:
   dump_stack
   __ubsan_handle_out_of_bounds
   load_microcode_amd
   request_microcode_amd
   reload_store
   kernfs_fop_write_iter
   vfs_write
   ksys_write
   do_syscall_64
   entry_SYSCALL_64_after_hwframe

Change the loop to go over only NUMA nodes which have CPUs before determining
whether the first CPU on the respective node needs microcode update.

  [ bp: Massage commit message, fix typo. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21991/">CVE-2025-21991 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21991">CVE-2025-21991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240795">SUSE bug 1240795</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010006289" comment="kernel-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006290" comment="kernel-abi-stablelists-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006291" comment="kernel-core-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006292" comment="kernel-cross-headers-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006293" comment="kernel-debug-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006294" comment="kernel-debug-core-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006297" comment="kernel-debug-modules-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006298" comment="kernel-debug-modules-core-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006299" comment="kernel-debug-modules-extra-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006300" comment="kernel-debug-uki-virt-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006303" comment="kernel-doc-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006304" comment="kernel-headers-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006305" comment="kernel-modules-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006306" comment="kernel-modules-core-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006307" comment="kernel-modules-extra-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006308" comment="kernel-rt-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006309" comment="kernel-rt-core-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006310" comment="kernel-rt-debug-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006311" comment="kernel-rt-debug-core-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006313" comment="kernel-rt-debug-kvm-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006314" comment="kernel-rt-debug-modules-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006315" comment="kernel-rt-debug-modules-core-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006316" comment="kernel-rt-debug-modules-extra-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006318" comment="kernel-rt-kvm-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006319" comment="kernel-rt-modules-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006320" comment="kernel-rt-modules-core-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006321" comment="kernel-rt-modules-extra-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006322" comment="kernel-tools-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006323" comment="kernel-tools-libs-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006325" comment="kernel-uki-virt-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006326" comment="kernel-uki-virt-addons-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006327" comment="libperf-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006328" comment="perf-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006329" comment="python3-perf-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006330" comment="rtla-5.14.0-570.26.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010006331" comment="rv-5.14.0-570.26.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21993</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21993" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21993" ref_url="https://www.suse.com/security/cve/CVE-2025-21993" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7423" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1293-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024169.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()

When performing an iSCSI boot using IPv6, iscsistart still reads the
/sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix
length is 64, this causes the shift exponent to become negative,
triggering a UBSAN warning. As the concept of a subnet mask does not
apply to IPv6, the value is set to ~0 to suppress the warning message.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21993/">CVE-2025-21993 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21993">CVE-2025-21993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240797">SUSE bug 1240797</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985567" comment="kernel-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985568" comment="kernel-abi-stablelists-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985569" comment="kernel-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985570" comment="kernel-cross-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985571" comment="kernel-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985572" comment="kernel-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985575" comment="kernel-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985576" comment="kernel-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985577" comment="kernel-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985578" comment="kernel-debug-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985581" comment="kernel-doc-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985582" comment="kernel-headers-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985583" comment="kernel-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985584" comment="kernel-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985585" comment="kernel-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985586" comment="kernel-rt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985587" comment="kernel-rt-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985588" comment="kernel-rt-debug-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985589" comment="kernel-rt-debug-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985591" comment="kernel-rt-debug-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985592" comment="kernel-rt-debug-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985593" comment="kernel-rt-debug-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985594" comment="kernel-rt-debug-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985596" comment="kernel-rt-kvm-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985597" comment="kernel-rt-modules-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985598" comment="kernel-rt-modules-core-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985599" comment="kernel-rt-modules-extra-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985600" comment="kernel-tools-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985601" comment="kernel-tools-libs-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985603" comment="kernel-uki-virt-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985604" comment="kernel-uki-virt-addons-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985605" comment="libperf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985606" comment="perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985607" comment="python3-perf-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985608" comment="rtla-5.14.0-570.16.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985609" comment="rv-5.14.0-570.16.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21997</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21997" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21997" ref_url="https://www.suse.com/security/cve/CVE-2025-21997" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8643" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: fix an integer overflow in xp_create_and_assign_umem()

Since the i and pool-&gt;chunk_size variables are of type 'u32',
their product can wrap around and then be cast to 'u64'.
This can lead to two different XDP buffers pointing to the same
memory area.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-11"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21997/">CVE-2025-21997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21997">CVE-2025-21997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240823">SUSE bug 1240823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986194" comment="kernel-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986195" comment="kernel-abi-stablelists-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986196" comment="kernel-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986197" comment="kernel-cross-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986198" comment="kernel-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986199" comment="kernel-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986202" comment="kernel-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986203" comment="kernel-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986204" comment="kernel-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986205" comment="kernel-debug-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986208" comment="kernel-doc-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986209" comment="kernel-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986210" comment="kernel-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986211" comment="kernel-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986212" comment="kernel-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986213" comment="kernel-rt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986214" comment="kernel-rt-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986215" comment="kernel-rt-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986216" comment="kernel-rt-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986218" comment="kernel-rt-debug-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986219" comment="kernel-rt-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986220" comment="kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986221" comment="kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986223" comment="kernel-rt-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986224" comment="kernel-rt-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986225" comment="kernel-rt-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986226" comment="kernel-rt-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986227" comment="kernel-tools-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986228" comment="kernel-tools-libs-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986230" comment="kernel-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986231" comment="kernel-uki-virt-addons-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986232" comment="libperf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986233" comment="perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986234" comment="python3-perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986235" comment="rtla-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986236" comment="rv-5.14.0-570.21.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21999" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21999" ref_url="https://www.suse.com/security/cve/CVE-2025-21999" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03129-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03186-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03191-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03223-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03235-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20763-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20776-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

proc: fix UAF in proc_get_inode()

Fix race between rmmod and /proc/XXX's inode instantiation.

The bug is that pde-&gt;proc_ops don't belong to /proc, it belongs to a
module, therefore dereferencing it after /proc entry has been registered
is a bug unless use_pde/unuse_pde() pair has been used.

use_pde/unuse_pde can be avoided (2 atomic ops!) because pde-&gt;proc_ops
never changes so information necessary for inode instantiation can be
saved _before_ proc_register() in PDE itself and used later, avoiding
pde-&gt;proc_ops-&gt;...  dereference.

      rmmod                         lookup
sys_delete_module
                         proc_lookup_de
			   pde_get(de);
			   proc_get_inode(dir-&gt;i_sb, de);
  mod-&gt;exit()
    proc_remove
      remove_proc_subtree
       proc_entry_rundown(de);
  free_module(mod);

                               if (S_ISREG(inode-&gt;i_mode))
	                         if (de-&gt;proc_ops-&gt;proc_read_iter)
                           --&gt; As module is already freed, will trigger UAF

BUG: unable to handle page fault for address: fffffbfff80a702b
PGD 817fc4067 P4D 817fc4067 PUD 817fc0067 PMD 102ef4067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN PTI
CPU: 26 UID: 0 PID: 2667 Comm: ls Tainted: G
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
RIP: 0010:proc_get_inode+0x302/0x6e0
RSP: 0018:ffff88811c837998 EFLAGS: 00010a06
RAX: dffffc0000000000 RBX: ffffffffc0538140 RCX: 0000000000000007
RDX: 1ffffffff80a702b RSI: 0000000000000001 RDI: ffffffffc0538158
RBP: ffff8881299a6000 R08: 0000000067bbe1e5 R09: 1ffff11023906f20
R10: ffffffffb560ca07 R11: ffffffffb2b43a58 R12: ffff888105bb78f0
R13: ffff888100518048 R14: ffff8881299a6004 R15: 0000000000000001
FS:  00007f95b9686840(0000) GS:ffff8883af100000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: fffffbfff80a702b CR3: 0000000117dd2000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 proc_lookup_de+0x11f/0x2e0
 __lookup_slow+0x188/0x350
 walk_component+0x2ab/0x4f0
 path_lookupat+0x120/0x660
 filename_lookup+0x1ce/0x560
 vfs_statx+0xac/0x150
 __do_sys_newstat+0x96/0x110
 do_syscall_64+0x5f/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

[adobriyan@gmail.com: don't do 2 atomic ops on the common path]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-21999/">CVE-2025-21999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21999">CVE-2025-21999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240802">SUSE bug 1240802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242579">SUSE bug 1242579</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986972" comment="kernel-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986973" comment="kernel-abi-stablelists-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986974" comment="kernel-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986975" comment="kernel-cross-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986976" comment="kernel-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986977" comment="kernel-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986980" comment="kernel-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986981" comment="kernel-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986982" comment="kernel-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986983" comment="kernel-debug-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986986" comment="kernel-doc-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986987" comment="kernel-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986988" comment="kernel-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986989" comment="kernel-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986990" comment="kernel-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986991" comment="kernel-rt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986992" comment="kernel-rt-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986993" comment="kernel-rt-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986994" comment="kernel-rt-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986996" comment="kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986997" comment="kernel-rt-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986998" comment="kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986999" comment="kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987001" comment="kernel-rt-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987002" comment="kernel-rt-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987003" comment="kernel-rt-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987004" comment="kernel-rt-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987005" comment="kernel-tools-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987006" comment="kernel-tools-libs-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987008" comment="kernel-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987009" comment="kernel-uki-virt-addons-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987010" comment="libperf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987011" comment="perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987012" comment="python3-perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987013" comment="rtla-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987014" comment="rv-5.14.0-570.22.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22004" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22004" ref_url="https://www.suse.com/security/cve/CVE-2025-22004" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10379" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001765.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11358" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02099-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atm: fix use after free in lec_send()

The -&gt;send() operation frees skb so save the length before calling
-&gt;send() to avoid a use after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22004/">CVE-2025-22004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22004">CVE-2025-22004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240835">SUSE bug 1240835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241090">SUSE bug 1241090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999193" comment="kernel-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999201" comment="kernel-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999210" comment="kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999215" comment="kernel-rt-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22020" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22020" ref_url="https://www.suse.com/security/cve/CVE-2025-22020" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove

This fixes the following crash:

==================================================================
BUG: KASAN: slab-use-after-free in rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]
Read of size 8 at addr ffff888136335380 by task kworker/6:0/140241

CPU: 6 UID: 0 PID: 140241 Comm: kworker/6:0 Kdump: loaded Tainted: G            E      6.14.0-rc6+ #1
Tainted: [E]=UNSIGNED_MODULE
Hardware name: LENOVO 30FNA1V7CW/1057, BIOS S0EKT54A 07/01/2024
Workqueue: events rtsx_usb_ms_poll_card [rtsx_usb_ms]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x51/0x70
 print_address_description.constprop.0+0x27/0x320
 ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]
 print_report+0x3e/0x70
 kasan_report+0xab/0xe0
 ? rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]
 rtsx_usb_ms_poll_card+0x159/0x200 [rtsx_usb_ms]
 ? __pfx_rtsx_usb_ms_poll_card+0x10/0x10 [rtsx_usb_ms]
 ? __pfx___schedule+0x10/0x10
 ? kick_pool+0x3b/0x270
 process_one_work+0x357/0x660
 worker_thread+0x390/0x4c0
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x190/0x1d0
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x2d/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 161446:
 kasan_save_stack+0x20/0x40
 kasan_save_track+0x10/0x30
 __kasan_kmalloc+0x7b/0x90
 __kmalloc_noprof+0x1a7/0x470
 memstick_alloc_host+0x1f/0xe0 [memstick]
 rtsx_usb_ms_drv_probe+0x47/0x320 [rtsx_usb_ms]
 platform_probe+0x60/0xe0
 call_driver_probe+0x35/0x120
 really_probe+0x123/0x410
 __driver_probe_device+0xc7/0x1e0
 driver_probe_device+0x49/0xf0
 __device_attach_driver+0xc6/0x160
 bus_for_each_drv+0xe4/0x160
 __device_attach+0x13a/0x2b0
 bus_probe_device+0xbd/0xd0
 device_add+0x4a5/0x760
 platform_device_add+0x189/0x370
 mfd_add_device+0x587/0x5e0
 mfd_add_devices+0xb1/0x130
 rtsx_usb_probe+0x28e/0x2e0 [rtsx_usb]
 usb_probe_interface+0x15c/0x460
 call_driver_probe+0x35/0x120
 really_probe+0x123/0x410
 __driver_probe_device+0xc7/0x1e0
 driver_probe_device+0x49/0xf0
 __device_attach_driver+0xc6/0x160
 bus_for_each_drv+0xe4/0x160
 __device_attach+0x13a/0x2b0
 rebind_marked_interfaces.isra.0+0xcc/0x110
 usb_reset_device+0x352/0x410
 usbdev_do_ioctl+0xe5c/0x1860
 usbdev_ioctl+0xa/0x20
 __x64_sys_ioctl+0xc5/0xf0
 do_syscall_64+0x59/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Freed by task 161506:
 kasan_save_stack+0x20/0x40
 kasan_save_track+0x10/0x30
 kasan_save_free_info+0x36/0x60
 __kasan_slab_free+0x34/0x50
 kfree+0x1fd/0x3b0
 device_release+0x56/0xf0
 kobject_cleanup+0x73/0x1c0
 rtsx_usb_ms_drv_remove+0x13d/0x220 [rtsx_usb_ms]
 platform_remove+0x2f/0x50
 device_release_driver_internal+0x24b/0x2e0
 bus_remove_device+0x124/0x1d0
 device_del+0x239/0x530
 platform_device_del.part.0+0x19/0xe0
 platform_device_unregister+0x1c/0x40
 mfd_remove_devices_fn+0x167/0x170
 device_for_each_child_reverse+0xc9/0x130
 mfd_remove_devices+0x6e/0xa0
 rtsx_usb_disconnect+0x2e/0xd0 [rtsx_usb]
 usb_unbind_interface+0xf3/0x3f0
 device_release_driver_internal+0x24b/0x2e0
 proc_disconnect_claim+0x13d/0x220
 usbdev_do_ioctl+0xb5e/0x1860
 usbdev_ioctl+0xa/0x20
 __x64_sys_ioctl+0xc5/0xf0
 do_syscall_64+0x59/0x170
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Last potentially related work creation:
 kasan_save_stack+0x20/0x40
 kasan_record_aux_stack+0x85/0x90
 insert_work+0x29/0x100
 __queue_work+0x34a/0x540
 call_timer_fn+0x2a/0x160
 expire_timers+0x5f/0x1f0
 __run_timer_base.part.0+0x1b6/0x1e0
 run_timer_softirq+0x8b/0xe0
 handle_softirqs+0xf9/0x360
 __irq_exit_rcu+0x114/0x130
 sysvec_apic_timer_interrupt+0x72/0x90
 asm_sysvec_apic_timer_interrupt+0x16/0x20

Second to last potentially related work creation:
 kasan_save_stack+0x20/0x40
 kasan_record_aux_stack+0x85/0x90
 insert_work+0x29/0x100
 __queue_work+0x34a/0x540
 call_timer_fn+0x2a/0x160
 expire_timers+0x5f/0x1f0
 __run_timer_base.part.0+0x1b6/0x1e0
 run_timer_softirq+0x8b/0xe0
 handle_softirqs+0xf9/0x
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22020/">CVE-2025-22020 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22020">CVE-2025-22020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241280">SUSE bug 1241280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241281">SUSE bug 1241281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22026</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22026" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22026" ref_url="https://www.suse.com/security/cve/CVE-2025-22026" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: don't ignore the return code of svc_proc_register()

Currently, nfsd_proc_stat_init() ignores the return value of
svc_proc_register(). If the procfile creation fails, then the kernel
will WARN when it tries to remove the entry later.

Fix nfsd_proc_stat_init() to return the same type of pointer as
svc_proc_register(), and fix up nfsd_net_init() to check that and fail
the nfsd_net construction if it occurs.

svc_proc_register() can fail if the dentry can't be allocated, or if an
identical dentry already exists. The second case is pretty unlikely in
the nfsd_net construction codepath, so if this happens, return -ENOMEM.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22026/">CVE-2025-22026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22026">CVE-2025-22026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241349">SUSE bug 1241349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023062" comment="kernel-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023063" comment="kernel-abi-stablelists-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023064" comment="kernel-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023065" comment="kernel-cross-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023066" comment="kernel-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023067" comment="kernel-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023070" comment="kernel-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023071" comment="kernel-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023072" comment="kernel-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023073" comment="kernel-debug-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023076" comment="kernel-doc-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023077" comment="kernel-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023078" comment="kernel-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023079" comment="kernel-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023080" comment="kernel-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023081" comment="kernel-rt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023082" comment="kernel-rt-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023083" comment="kernel-rt-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023084" comment="kernel-rt-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023086" comment="kernel-rt-debug-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023087" comment="kernel-rt-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023088" comment="kernel-rt-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023089" comment="kernel-rt-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023091" comment="kernel-rt-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023092" comment="kernel-rt-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023093" comment="kernel-rt-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023094" comment="kernel-rt-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023095" comment="kernel-tools-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023096" comment="kernel-tools-libs-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023098" comment="kernel-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023099" comment="kernel-uki-virt-addons-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023100" comment="libperf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023101" comment="perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023102" comment="python3-perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023103" comment="rtla-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023104" comment="rv-5.14.0-570.55.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22055</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22055" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22055" ref_url="https://www.suse.com/security/cve/CVE-2025-22055" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8643" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01633-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix geneve_opt length integer overflow

struct geneve_opt uses 5 bit length for each single option, which
means every vary size option should be smaller than 128 bytes.

However, all current related Netlink policies cannot promise this
length condition and the attacker can exploit a exact 128-byte size
option to *fake* a zero length option and confuse the parsing logic,
further achieve heap out-of-bounds read.

One example crash log is like below:

[    3.905425] ==================================================================
[    3.905925] BUG: KASAN: slab-out-of-bounds in nla_put+0xa9/0xe0
[    3.906255] Read of size 124 at addr ffff888005f291cc by task poc/177
[    3.906646]
[    3.906775] CPU: 0 PID: 177 Comm: poc-oob-read Not tainted 6.1.132 #1
[    3.907131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
[    3.907784] Call Trace:
[    3.907925]  &lt;TASK&gt;
[    3.908048]  dump_stack_lvl+0x44/0x5c
[    3.908258]  print_report+0x184/0x4be
[    3.909151]  kasan_report+0xc5/0x100
[    3.909539]  kasan_check_range+0xf3/0x1a0
[    3.909794]  memcpy+0x1f/0x60
[    3.909968]  nla_put+0xa9/0xe0
[    3.910147]  tunnel_key_dump+0x945/0xba0
[    3.911536]  tcf_action_dump_1+0x1c1/0x340
[    3.912436]  tcf_action_dump+0x101/0x180
[    3.912689]  tcf_exts_dump+0x164/0x1e0
[    3.912905]  fw_dump+0x18b/0x2d0
[    3.913483]  tcf_fill_node+0x2ee/0x460
[    3.914778]  tfilter_notify+0xf4/0x180
[    3.915208]  tc_new_tfilter+0xd51/0x10d0
[    3.918615]  rtnetlink_rcv_msg+0x4a2/0x560
[    3.919118]  netlink_rcv_skb+0xcd/0x200
[    3.919787]  netlink_unicast+0x395/0x530
[    3.921032]  netlink_sendmsg+0x3d0/0x6d0
[    3.921987]  __sock_sendmsg+0x99/0xa0
[    3.922220]  __sys_sendto+0x1b7/0x240
[    3.922682]  __x64_sys_sendto+0x72/0x90
[    3.922906]  do_syscall_64+0x5e/0x90
[    3.923814]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[    3.924122] RIP: 0033:0x7e83eab84407
[    3.924331] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00 83 e2 39 83 faf
[    3.925330] RSP: 002b:00007ffff505e370 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
[    3.925752] RAX: ffffffffffffffda RBX: 00007e83eaafa740 RCX: 00007e83eab84407
[    3.926173] RDX: 00000000000001a8 RSI: 00007ffff505e3c0 RDI: 0000000000000003
[    3.926587] RBP: 00007ffff505f460 R08: 00007e83eace1000 R09: 000000000000000c
[    3.926977] R10: 0000000000000000 R11: 0000000000000202 R12: 00007ffff505f3c0
[    3.927367] R13: 00007ffff505f5c8 R14: 00007e83ead1b000 R15: 00005d4fbbe6dcb8

Fix these issues by enforing correct length condition in related
policies.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-11"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22055/">CVE-2025-22055 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22055">CVE-2025-22055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241371">SUSE bug 1241371</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241372">SUSE bug 1241372</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986194" comment="kernel-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986195" comment="kernel-abi-stablelists-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986196" comment="kernel-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986197" comment="kernel-cross-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986198" comment="kernel-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986199" comment="kernel-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986202" comment="kernel-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986203" comment="kernel-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986204" comment="kernel-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986205" comment="kernel-debug-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986208" comment="kernel-doc-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986209" comment="kernel-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986210" comment="kernel-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986211" comment="kernel-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986212" comment="kernel-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986213" comment="kernel-rt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986214" comment="kernel-rt-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986215" comment="kernel-rt-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986216" comment="kernel-rt-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986218" comment="kernel-rt-debug-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986219" comment="kernel-rt-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986220" comment="kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986221" comment="kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986223" comment="kernel-rt-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986224" comment="kernel-rt-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986225" comment="kernel-rt-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986226" comment="kernel-rt-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986227" comment="kernel-tools-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986228" comment="kernel-tools-libs-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986230" comment="kernel-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986231" comment="kernel-uki-virt-addons-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986232" comment="libperf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986233" comment="perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986234" comment="python3-perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986235" comment="rtla-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986236" comment="rv-5.14.0-570.21.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22056</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22056" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22056" ref_url="https://www.suse.com/security/cve/CVE-2025-22056" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_tunnel: fix geneve_opt type confusion addition

When handling multiple NFTA_TUNNEL_KEY_OPTS_GENEVE attributes, the
parsing logic should place every geneve_opt structure one by one
compactly. Hence, when deciding the next geneve_opt position, the
pointer addition should be in units of char *.

However, the current implementation erroneously does type conversion
before the addition, which will lead to heap out-of-bounds write.

[    6.989857] ==================================================================
[    6.990293] BUG: KASAN: slab-out-of-bounds in nft_tunnel_obj_init+0x977/0xa70
[    6.990725] Write of size 124 at addr ffff888005f18974 by task poc/178
[    6.991162]
[    6.991259] CPU: 0 PID: 178 Comm: poc-oob-write Not tainted 6.1.132 #1
[    6.991655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
[    6.992281] Call Trace:
[    6.992423]  &lt;TASK&gt;
[    6.992586]  dump_stack_lvl+0x44/0x5c
[    6.992801]  print_report+0x184/0x4be
[    6.993790]  kasan_report+0xc5/0x100
[    6.994252]  kasan_check_range+0xf3/0x1a0
[    6.994486]  memcpy+0x38/0x60
[    6.994692]  nft_tunnel_obj_init+0x977/0xa70
[    6.995677]  nft_obj_init+0x10c/0x1b0
[    6.995891]  nf_tables_newobj+0x585/0x950
[    6.996922]  nfnetlink_rcv_batch+0xdf9/0x1020
[    6.998997]  nfnetlink_rcv+0x1df/0x220
[    6.999537]  netlink_unicast+0x395/0x530
[    7.000771]  netlink_sendmsg+0x3d0/0x6d0
[    7.001462]  __sock_sendmsg+0x99/0xa0
[    7.001707]  ____sys_sendmsg+0x409/0x450
[    7.002391]  ___sys_sendmsg+0xfd/0x170
[    7.003145]  __sys_sendmsg+0xea/0x170
[    7.004359]  do_syscall_64+0x5e/0x90
[    7.005817]  entry_SYSCALL_64_after_hwframe+0x6e/0xd8
[    7.006127] RIP: 0033:0x7ec756d4e407
[    7.006339] Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00 83 e2 39 83 faf
[    7.007364] RSP: 002b:00007ffed5d46760 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
[    7.007827] RAX: ffffffffffffffda RBX: 00007ec756cc4740 RCX: 00007ec756d4e407
[    7.008223] RDX: 0000000000000000 RSI: 00007ffed5d467f0 RDI: 0000000000000003
[    7.008620] RBP: 00007ffed5d468a0 R08: 0000000000000000 R09: 0000000000000000
[    7.009039] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000
[    7.009429] R13: 00007ffed5d478b0 R14: 00007ec756ee5000 R15: 00005cbd4e655cb8

Fix this bug with correct pointer addition and conversion in parse
and dump code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22056/">CVE-2025-22056 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22056">CVE-2025-22056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241525">SUSE bug 1241525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22058" ref_url="https://www.suse.com/security/cve/CVE-2025-22058" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001940.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14438" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udp: Fix memory accounting leak.

Matt Dowling reported a weird UDP memory usage issue.

Under normal operation, the UDP memory usage reported in /proc/net/sockstat
remains close to zero.  However, it occasionally spiked to 524,288 pages
and never dropped.  Moreover, the value doubled when the application was
terminated.  Finally, it caused intermittent packet drops.

We can reproduce the issue with the script below [0]:

  1. /proc/net/sockstat reports 0 pages

    # cat /proc/net/sockstat | grep UDP:
    UDP: inuse 1 mem 0

  2. Run the script till the report reaches 524,288

    # python3 test.py &amp; sleep 5
    # cat /proc/net/sockstat | grep UDP:
    UDP: inuse 3 mem 524288  &lt;-- (INT_MAX + 1) &gt;&gt; PAGE_SHIFT

  3. Kill the socket and confirm the number never drops

    # pkill python3 &amp;&amp; sleep 5
    # cat /proc/net/sockstat | grep UDP:
    UDP: inuse 1 mem 524288

  4. (necessary since v6.0) Trigger proto_memory_pcpu_drain()

    # python3 test.py &amp; sleep 1 &amp;&amp; pkill python3

  5. The number doubles

    # cat /proc/net/sockstat | grep UDP:
    UDP: inuse 1 mem 1048577

The application set INT_MAX to SO_RCVBUF, which triggered an integer
overflow in udp_rmem_release().

When a socket is close()d, udp_destruct_common() purges its receive
queue and sums up skb-&gt;truesize in the queue.  This total is calculated
and stored in a local unsigned integer variable.

The total size is then passed to udp_rmem_release() to adjust memory
accounting.  However, because the function takes a signed integer
argument, the total size can wrap around, causing an overflow.

Then, the released amount is calculated as follows:

  1) Add size to sk-&gt;sk_forward_alloc.
  2) Round down sk-&gt;sk_forward_alloc to the nearest lower multiple of
      PAGE_SIZE and assign it to amount.
  3) Subtract amount from sk-&gt;sk_forward_alloc.
  4) Pass amount &gt;&gt; PAGE_SHIFT to __sk_mem_reduce_allocated().

When the issue occurred, the total in udp_destruct_common() was 2147484480
(INT_MAX + 833), which was cast to -2147482816 in udp_rmem_release().

At 1) sk-&gt;sk_forward_alloc is changed from 3264 to -2147479552, and
2) sets -2147479552 to amount.  3) reverts the wraparound, so we don't
see a warning in inet_sock_destruct().  However, udp_memory_allocated
ends up doubling at 4).

Since commit 3cd3399dd7a8 ("net: implement per-cpu reserves for
memory_allocated"), memory usage no longer doubles immediately after
a socket is close()d because __sk_mem_reduce_allocated() caches the
amount in udp_memory_per_cpu_fw_alloc.  However, the next time a UDP
socket receives a packet, the subtraction takes effect, causing UDP
memory usage to double.

This issue makes further memory allocation fail once the socket's
sk-&gt;sk_rmem_alloc exceeds net.ipv4.udp_rmem_min, resulting in packet
drops.

To prevent this issue, let's use unsigned int for the calculation and
call sk_forward_alloc_add() only once for the small delta.

Note that first_packet_length() also potentially has the same problem.

[0]:
from socket import *

SO_RCVBUFFORCE = 33
INT_MAX = (2 ** 31) - 1

s = socket(AF_INET, SOCK_DGRAM)
s.bind(('', 0))
s.setsockopt(SOL_SOCKET, SO_RCVBUFFORCE, INT_MAX)

c = socket(AF_INET, SOCK_DGRAM)
c.connect(s.getsockname())

data = b'a' * 100

while True:
    c.send(data)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-28"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22058/">CVE-2025-22058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22058">CVE-2025-22058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241332">SUSE bug 1241332</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015654" comment="kernel-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015655" comment="kernel-abi-stablelists-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015656" comment="kernel-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015657" comment="kernel-cross-headers-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015658" comment="kernel-debug-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015659" comment="kernel-debug-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015662" comment="kernel-debug-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015663" comment="kernel-debug-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015664" comment="kernel-debug-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015665" comment="kernel-debug-uki-virt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015668" comment="kernel-doc-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015669" comment="kernel-headers-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015670" comment="kernel-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015671" comment="kernel-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015672" comment="kernel-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015673" comment="kernel-rt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015674" comment="kernel-rt-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015675" comment="kernel-rt-debug-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015676" comment="kernel-rt-debug-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015678" comment="kernel-rt-debug-kvm-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015679" comment="kernel-rt-debug-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015680" comment="kernel-rt-debug-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015681" comment="kernel-rt-debug-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015683" comment="kernel-rt-kvm-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015684" comment="kernel-rt-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015685" comment="kernel-rt-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015686" comment="kernel-rt-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015687" comment="kernel-tools-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015688" comment="kernel-tools-libs-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015690" comment="kernel-uki-virt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015691" comment="kernel-uki-virt-addons-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015692" comment="libperf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015693" comment="perf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015694" comment="python3-perf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015695" comment="rtla-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015696" comment="rv-5.14.0-570.37.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22085" ref_url="https://www.suse.com/security/cve/CVE-2025-22085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Fix use-after-free when rename device name

Syzbot reported a slab-use-after-free with the following call trace:

==================================================================
BUG: KASAN: slab-use-after-free in nla_put+0xd3/0x150 lib/nlattr.c:1099
Read of size 5 at addr ffff888140ea1c60 by task syz.0.988/10025

CPU: 0 UID: 0 PID: 10025 Comm: syz.0.988
Not tainted 6.14.0-rc4-syzkaller-00859-gf77f12010f67 #0
Hardware name: Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0x16e/0x5b0 mm/kasan/report.c:521
 kasan_report+0x143/0x180 mm/kasan/report.c:634
 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
 __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105
 nla_put+0xd3/0x150 lib/nlattr.c:1099
 nla_put_string include/net/netlink.h:1621 [inline]
 fill_nldev_handle+0x16e/0x200 drivers/infiniband/core/nldev.c:265
 rdma_nl_notify_event+0x561/0xef0 drivers/infiniband/core/nldev.c:2857
 ib_device_notify_register+0x22/0x230 drivers/infiniband/core/device.c:1344
 ib_register_device+0x1292/0x1460 drivers/infiniband/core/device.c:1460
 rxe_register_device+0x233/0x350 drivers/infiniband/sw/rxe/rxe_verbs.c:1540
 rxe_net_add+0x74/0xf0 drivers/infiniband/sw/rxe/rxe_net.c:550
 rxe_newlink+0xde/0x1a0 drivers/infiniband/sw/rxe/rxe.c:212
 nldev_newlink+0x5ea/0x680 drivers/infiniband/core/nldev.c:1795
 rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]
 rdma_nl_rcv+0x6dd/0x9e0 drivers/infiniband/core/netlink.c:259
 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
 netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1339
 netlink_sendmsg+0x8de/0xcb0 net/netlink/af_netlink.c:1883
 sock_sendmsg_nosec net/socket.c:709 [inline]
 __sock_sendmsg+0x221/0x270 net/socket.c:724
 ____sys_sendmsg+0x53a/0x860 net/socket.c:2564
 ___sys_sendmsg net/socket.c:2618 [inline]
 __sys_sendmsg+0x269/0x350 net/socket.c:2650
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f42d1b8d169
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 ...
RSP: 002b:00007f42d2960038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f42d1da6320 RCX: 00007f42d1b8d169
RDX: 0000000000000000 RSI: 00004000000002c0 RDI: 000000000000000c
RBP: 00007f42d1c0e2a0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f42d1da6320 R15: 00007ffe399344a8
 &lt;/TASK&gt;

Allocated by task 10025:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4294 [inline]
 __kmalloc_node_track_caller_noprof+0x28b/0x4c0 mm/slub.c:4313
 __kmemdup_nul mm/util.c:61 [inline]
 kstrdup+0x42/0x100 mm/util.c:81
 kobject_set_name_vargs+0x61/0x120 lib/kobject.c:274
 dev_set_name+0xd5/0x120 drivers/base/core.c:3468
 assign_name drivers/infiniband/core/device.c:1202 [inline]
 ib_register_device+0x178/0x1460 drivers/infiniband/core/device.c:1384
 rxe_register_device+0x233/0x350 drivers/infiniband/sw/rxe/rxe_verbs.c:1540
 rxe_net_add+0x74/0xf0 drivers/infiniband/sw/rxe/rxe_net.c:550
 rxe_newlink+0xde/0x1a0 drivers/infiniband/sw/rxe/rxe.c:212
 nldev_newlink+0x5ea/0x680 drivers/infiniband/core/nldev.c:1795
 rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]
 rdma_nl_rcv+0x6dd/0x9e0 drivers/infiniband/core/netlink.c:259
 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
 netlink_unicast+0x7f6/0x990 net/netlink/af_netlink.c:1339
 netlink_sendmsg+0x8de/0xcb0 net
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22085/">CVE-2025-22085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22085">CVE-2025-22085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241419">SUSE bug 1241419</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22086" ref_url="https://www.suse.com/security/cve/CVE-2025-22086" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow

When cur_qp isn't NULL, in order to avoid fetching the QP from
the radix tree again we check if the next cqe QP is identical to
the one we already have.

The bug however is that we are checking if the QP is identical by
checking the QP number inside the CQE against the QP number inside the
mlx5_ib_qp, but that's wrong since the QP number from the CQE is from
FW so it should be matched against mlx5_core_qp which is our FW QP
number.

Otherwise we could use the wrong QP when handling a CQE which could
cause the kernel trace below.

This issue is mainly noticeable over QPs 0 &amp; 1, since for now they are
the only QPs in our driver whereas the QP number inside mlx5_ib_qp
doesn't match the QP number inside mlx5_core_qp.

BUG: kernel NULL pointer dereference, address: 0000000000000012
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP
 CPU: 0 UID: 0 PID: 7927 Comm: kworker/u62:1 Not tainted 6.14.0-rc3+ #189
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
 Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core]
 RIP: 0010:mlx5_ib_poll_cq+0x4c7/0xd90 [mlx5_ib]
 Code: 03 00 00 8d 58 ff 21 cb 66 39 d3 74 39 48 c7 c7 3c 89 6e a0 0f b7 db e8 b7 d2 b3 e0 49 8b 86 60 03 00 00 48 c7 c7 4a 89 6e a0 &lt;0f&gt; b7 5c 98 02 e8 9f d2 b3 e0 41 0f b7 86 78 03 00 00 83 e8 01 21
 RSP: 0018:ffff88810511bd60 EFLAGS: 00010046
 RAX: 0000000000000010 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000000 RSI: ffff88885fa1b3c0 RDI: ffffffffa06e894a
 RBP: 00000000000000b0 R08: 0000000000000000 R09: ffff88810511bc10
 R10: 0000000000000001 R11: 0000000000000001 R12: ffff88810d593000
 R13: ffff88810e579108 R14: ffff888105146000 R15: 00000000000000b0
 FS:  0000000000000000(0000) GS:ffff88885fa00000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000012 CR3: 00000001077e6001 CR4: 0000000000370eb0
 Call Trace:
  &lt;TASK&gt;
  ? __die+0x20/0x60
  ? page_fault_oops+0x150/0x3e0
  ? exc_page_fault+0x74/0x130
  ? asm_exc_page_fault+0x22/0x30
  ? mlx5_ib_poll_cq+0x4c7/0xd90 [mlx5_ib]
  __ib_process_cq+0x5a/0x150 [ib_core]
  ib_cq_poll_work+0x31/0x90 [ib_core]
  process_one_work+0x169/0x320
  worker_thread+0x288/0x3a0
  ? work_busy+0xb0/0xb0
  kthread+0xd7/0x1f0
  ? kthreads_online_cpu+0x130/0x130
  ? kthreads_online_cpu+0x130/0x130
  ret_from_fork+0x2d/0x50
  ? kthreads_online_cpu+0x130/0x130
  ret_from_fork_asm+0x11/0x20
  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22086/">CVE-2025-22086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22086">CVE-2025-22086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241458">SUSE bug 1241458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22087" ref_url="https://www.suse.com/security/cve/CVE-2025-22087" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix array bounds error with may_goto

may_goto uses an additional 8 bytes on the stack, which causes the
interpreters[] array to go out of bounds when calculating index by
stack_size.

1. If a BPF program is rewritten, re-evaluate the stack size. For non-JIT
cases, reject loading directly.

2. For non-JIT cases, calculating interpreters[idx] may still cause
out-of-bounds array access, and just warn about it.

3. For jit_requested cases, the execution of bpf_func also needs to be
warned. So move the definition of function __bpf_prog_ret0_warn out of
the macro definition CONFIG_BPF_JIT_ALWAYS_ON.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22087/">CVE-2025-22087 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22087">CVE-2025-22087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241460">SUSE bug 1241460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985525" comment="kernel-cross-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985560" comment="libperf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22089" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22089" ref_url="https://www.suse.com/security/cve/CVE-2025-22089" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Don't expose hw_counters outside of init net namespace

Commit 467f432a521a ("RDMA/core: Split port and device counter sysfs
attributes") accidentally almost exposed hw counters to non-init net
namespaces. It didn't expose them fully, as an attempt to read any of
those counters leads to a crash like this one:

[42021.807566] BUG: kernel NULL pointer dereference, address: 0000000000000028
[42021.814463] #PF: supervisor read access in kernel mode
[42021.819549] #PF: error_code(0x0000) - not-present page
[42021.824636] PGD 0 P4D 0
[42021.827145] Oops: 0000 [#1] SMP PTI
[42021.830598] CPU: 82 PID: 2843922 Comm: switchto-defaul Kdump: loaded Tainted: G S      W I        XXX
[42021.841697] Hardware name: XXX
[42021.849619] RIP: 0010:hw_stat_device_show+0x1e/0x40 [ib_core]
[42021.855362] Code: 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 49 89 d0 4c 8b 5e 20 48 8b 8f b8 04 00 00 48 81 c7 f0 fa ff ff &lt;48&gt; 8b 41 28 48 29 ce 48 83 c6 d0 48 c1 ee 04 69 d6 ab aa aa aa 48
[42021.873931] RSP: 0018:ffff97fe90f03da0 EFLAGS: 00010287
[42021.879108] RAX: ffff9406988a8c60 RBX: ffff940e1072d438 RCX: 0000000000000000
[42021.886169] RDX: ffff94085f1aa000 RSI: ffff93c6cbbdbcb0 RDI: ffff940c7517aef0
[42021.893230] RBP: ffff97fe90f03e70 R08: ffff94085f1aa000 R09: 0000000000000000
[42021.900294] R10: ffff94085f1aa000 R11: ffffffffc0775680 R12: ffffffff87ca2530
[42021.907355] R13: ffff940651602840 R14: ffff93c6cbbdbcb0 R15: ffff94085f1aa000
[42021.914418] FS:  00007fda1a3b9700(0000) GS:ffff94453fb80000(0000) knlGS:0000000000000000
[42021.922423] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[42021.928130] CR2: 0000000000000028 CR3: 00000042dcfb8003 CR4: 00000000003726f0
[42021.935194] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[42021.942257] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[42021.949324] Call Trace:
[42021.951756]  &lt;TASK&gt;
[42021.953842]  [&lt;ffffffff86c58674&gt;] ? show_regs+0x64/0x70
[42021.959030]  [&lt;ffffffff86c58468&gt;] ? __die+0x78/0xc0
[42021.963874]  [&lt;ffffffff86c9ef75&gt;] ? page_fault_oops+0x2b5/0x3b0
[42021.969749]  [&lt;ffffffff87674b92&gt;] ? exc_page_fault+0x1a2/0x3c0
[42021.975549]  [&lt;ffffffff87801326&gt;] ? asm_exc_page_fault+0x26/0x30
[42021.981517]  [&lt;ffffffffc0775680&gt;] ? __pfx_show_hw_stats+0x10/0x10 [ib_core]
[42021.988482]  [&lt;ffffffffc077564e&gt;] ? hw_stat_device_show+0x1e/0x40 [ib_core]
[42021.995438]  [&lt;ffffffff86ac7f8e&gt;] dev_attr_show+0x1e/0x50
[42022.000803]  [&lt;ffffffff86a3eeb1&gt;] sysfs_kf_seq_show+0x81/0xe0
[42022.006508]  [&lt;ffffffff86a11134&gt;] seq_read_iter+0xf4/0x410
[42022.011954]  [&lt;ffffffff869f4b2e&gt;] vfs_read+0x16e/0x2f0
[42022.017058]  [&lt;ffffffff869f50ee&gt;] ksys_read+0x6e/0xe0
[42022.022073]  [&lt;ffffffff8766f1ca&gt;] do_syscall_64+0x6a/0xa0
[42022.027441]  [&lt;ffffffff8780013b&gt;] entry_SYSCALL_64_after_hwframe+0x78/0xe2

The problem can be reproduced using the following steps:
  ip netns add foo
  ip netns exec foo bash
  cat /sys/class/infiniband/mlx4_0/hw_counters/*

The panic occurs because of casting the device pointer into an
ib_device pointer using container_of() in hw_stat_device_show() is
wrong and leads to a memory corruption.

However the real problem is that hw counters should never been exposed
outside of the non-init net namespace.

Fix this by saving the index of the corresponding attribute group
(it might be 1 or 2 depending on the presence of driver-specific
attributes) and zeroing the pointer to hw_counters group for compat
devices during the initialization.

With this fix applied hw_counters are not available in a non-init
net namespace:
  find /sys/class/infiniband/mlx4_0/ -name hw_counters
    /sys/class/infiniband/mlx4_0/ports/1/hw_counters
    /sys/class/infiniband/mlx4_0/ports/2/hw_counters
    /sys/class/infiniband/mlx4_0/hw_counters

  ip netns add foo
  ip netns exec foo bash
  find /sys/class/infiniband/mlx4_0/ -name hw_counters
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22089/">CVE-2025-22089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22089">CVE-2025-22089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241538">SUSE bug 1241538</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22091" ref_url="https://www.suse.com/security/cve/CVE-2025-22091" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix page_size variable overflow

Change all variables storing mlx5_umem_mkc_find_best_pgsz() result to
unsigned long to support values larger than 31 and avoid overflow.

For example: If we try to register 4GB of memory that is contiguous in
physical memory, the driver will optimize the page_size and try to use
an mkey with 4GB entity size. The 'unsigned int' page_size variable will
overflow to '0' and we'll hit the WARN_ON() in alloc_cacheable_mr().

WARNING: CPU: 2 PID: 1203 at drivers/infiniband/hw/mlx5/mr.c:1124 alloc_cacheable_mr+0x22/0x580 [mlx5_ib]
Modules linked in: mlx5_ib mlx5_core bonding ip6_gre ip6_tunnel tunnel6 ip_gre gre rdma_rxe rdma_ucm ib_uverbs ib_ipoib ib_umad rpcrdma ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_cm fuse ib_core [last unloaded: mlx5_core]
CPU: 2 UID: 70878 PID: 1203 Comm: rdma_resource_l Tainted: G        W          6.14.0-rc4-dirty #43
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:alloc_cacheable_mr+0x22/0x580 [mlx5_ib]
Code: 90 90 90 90 90 90 90 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 41 52 53 48 83 ec 30 f6 46 28 04 4c 8b 77 08 75 21 &lt;0f&gt; 0b 49 c7 c2 ea ff ff ff 48 8d 65 d0 4c 89 d0 5b 41 5a 41 5c 41
RSP: 0018:ffffc900006ffac8 EFLAGS: 00010246
RAX: 0000000004c0d0d0 RBX: ffff888217a22000 RCX: 0000000000100001
RDX: 00007fb7ac480000 RSI: ffff8882037b1240 RDI: ffff8882046f0600
RBP: ffffc900006ffb28 R08: 0000000000000001 R09: 0000000000000000
R10: 00000000000007e0 R11: ffffea0008011d40 R12: ffff8882037b1240
R13: ffff8882046f0600 R14: ffff888217a22000 R15: ffffc900006ffe00
FS:  00007fb7ed013340(0000) GS:ffff88885fd00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fb7ed1d8000 CR3: 00000001fd8f6006 CR4: 0000000000772eb0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 ? __warn+0x81/0x130
 ? alloc_cacheable_mr+0x22/0x580 [mlx5_ib]
 ? report_bug+0xfc/0x1e0
 ? handle_bug+0x55/0x90
 ? exc_invalid_op+0x17/0x70
 ? asm_exc_invalid_op+0x1a/0x20
 ? alloc_cacheable_mr+0x22/0x580 [mlx5_ib]
 create_real_mr+0x54/0x150 [mlx5_ib]
 ib_uverbs_reg_mr+0x17f/0x2a0 [ib_uverbs]
 ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xca/0x140 [ib_uverbs]
 ib_uverbs_run_method+0x6d0/0x780 [ib_uverbs]
 ? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]
 ib_uverbs_cmd_verbs+0x19b/0x360 [ib_uverbs]
 ? walk_system_ram_range+0x79/0xd0
 ? ___pte_offset_map+0x1b/0x110
 ? __pte_offset_map_lock+0x80/0x100
 ib_uverbs_ioctl+0xac/0x110 [ib_uverbs]
 __x64_sys_ioctl+0x94/0xb0
 do_syscall_64+0x50/0x110
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fb7ecf0737b
Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 7d 2a 0f 00 f7 d8 64 89 01 48
RSP: 002b:00007ffdbe03ecc8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007ffdbe03edb8 RCX: 00007fb7ecf0737b
RDX: 00007ffdbe03eda0 RSI: 00000000c0181b01 RDI: 0000000000000003
RBP: 00007ffdbe03ed80 R08: 00007fb7ecc84010 R09: 00007ffdbe03eed4
R10: 0000000000000009 R11: 0000000000000246 R12: 00007ffdbe03eed4
R13: 000000000000000c R14: 000000000000000c R15: 00007fb7ecc84150
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22091/">CVE-2025-22091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22091">CVE-2025-22091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241535">SUSE bug 1241535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22092" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22092" ref_url="https://www.suse.com/security/cve/CVE-2025-22092" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix NULL dereference in SR-IOV VF creation error path

Clean up when virtfn setup fails to prevent NULL pointer dereference
during device removal. The kernel oops below occurred due to incorrect
error handling flow when pci_setup_device() fails.

Add pci_iov_scan_device(), which handles virtfn allocation and setup and
cleans up if pci_setup_device() fails, so pci_iov_add_virtfn() doesn't need
to call pci_stop_and_remove_bus_device().  This prevents accessing
partially initialized virtfn devices during removal.

  BUG: kernel NULL pointer dereference, address: 00000000000000d0
  RIP: 0010:device_del+0x3d/0x3d0
  Call Trace:
   pci_remove_bus_device+0x7c/0x100
   pci_iov_add_virtfn+0xfa/0x200
   sriov_enable+0x208/0x420
   mlx5_core_sriov_configure+0x6a/0x160 [mlx5_core]
   sriov_numvfs_store+0xae/0x1a0

[bhelgaas: commit log, return ERR_PTR(-ENOMEM) directly]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22092/">CVE-2025-22092 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22092">CVE-2025-22092 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241446">SUSE bug 1241446</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22097" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22097" ref_url="https://www.suse.com/security/cve/CVE-2025-22097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001923.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01640-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vkms: Fix use after free and double free on init error

If the driver initialization fails, the vkms_exit() function might
access an uninitialized or freed default_config pointer and it might
double free it.

Fix both possible errors by initializing default_config only when the
driver initialization succeeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22097/">CVE-2025-22097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22097">CVE-2025-22097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241541">SUSE bug 1241541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241542">SUSE bug 1241542</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
</definition>
<definition id="oval:org.opensuse.security:def:202522104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22104" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22104" ref_url="https://www.suse.com/security/cve/CVE-2025-22104" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ibmvnic: Use kernel helpers for hex dumps

Previously, when the driver was printing hex dumps, the buffer was cast
to an 8 byte long and printed using string formatters. If the buffer
size was not a multiple of 8 then a read buffer overflow was possible.

Therefore, create a new ibmvnic function that loops over a buffer and
calls hex_dump_to_buffer instead.

This patch address KASAN reports like the one below:
  ibmvnic 30000003 env3: Login Buffer:
  ibmvnic 30000003 env3: 01000000af000000
  &lt;...&gt;
  ibmvnic 30000003 env3: 2e6d62692e736261
  ibmvnic 30000003 env3: 65050003006d6f63
  ==================================================================
  BUG: KASAN: slab-out-of-bounds in ibmvnic_login+0xacc/0xffc [ibmvnic]
  Read of size 8 at addr c0000001331a9aa8 by task ip/17681
  &lt;...&gt;
  Allocated by task 17681:
  &lt;...&gt;
  ibmvnic_login+0x2f0/0xffc [ibmvnic]
  ibmvnic_open+0x148/0x308 [ibmvnic]
  __dev_open+0x1ac/0x304
  &lt;...&gt;
  The buggy address is located 168 bytes inside of
                allocated 175-byte region [c0000001331a9a00, c0000001331a9aaf)
  &lt;...&gt;
  =================================================================
  ibmvnic 30000003 env3: 000000000033766e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22104/">CVE-2025-22104 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22104">CVE-2025-22104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241550">SUSE bug 1241550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996844" comment="kernel-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996845" comment="kernel-abi-stablelists-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996846" comment="kernel-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996847" comment="kernel-cross-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996848" comment="kernel-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996849" comment="kernel-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996852" comment="kernel-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996853" comment="kernel-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996854" comment="kernel-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996855" comment="kernel-debug-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996858" comment="kernel-doc-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996859" comment="kernel-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996860" comment="kernel-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996861" comment="kernel-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996862" comment="kernel-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996863" comment="kernel-rt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996864" comment="kernel-rt-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996865" comment="kernel-rt-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996866" comment="kernel-rt-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996868" comment="kernel-rt-debug-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996869" comment="kernel-rt-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996870" comment="kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996871" comment="kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996873" comment="kernel-rt-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996874" comment="kernel-rt-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996875" comment="kernel-rt-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996876" comment="kernel-rt-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996877" comment="kernel-tools-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996878" comment="kernel-tools-libs-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996880" comment="kernel-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996881" comment="kernel-uki-virt-addons-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996882" comment="libperf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996883" comment="perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996884" comment="python3-perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996885" comment="rtla-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996886" comment="rv-5.14.0-570.23.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22111" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22111" ref_url="https://www.suse.com/security/cve/CVE-2025-22111" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF.

SIOCBRDELIF is passed to dev_ioctl() first and later forwarded to
br_ioctl_call(), which causes unnecessary RTNL dance and the splat
below [0] under RTNL pressure.

Let's say Thread A is trying to detach a device from a bridge and
Thread B is trying to remove the bridge.

In dev_ioctl(), Thread A bumps the bridge device's refcnt by
netdev_hold() and releases RTNL because the following br_ioctl_call()
also re-acquires RTNL.

In the race window, Thread B could acquire RTNL and try to remove
the bridge device.  Then, rtnl_unlock() by Thread B will release RTNL
and wait for netdev_put() by Thread A.

Thread A, however, must hold RTNL after the unlock in dev_ifsioc(),
which may take long under RTNL pressure, resulting in the splat by
Thread B.

  Thread A (SIOCBRDELIF)           Thread B (SIOCBRDELBR)
  ----------------------           ----------------------
  sock_ioctl                       sock_ioctl
  `- sock_do_ioctl                 `- br_ioctl_call
     `- dev_ioctl                     `- br_ioctl_stub
        |- rtnl_lock                     |
        |- dev_ifsioc                    '
        '  |- dev = __dev_get_by_name(...)
           |- netdev_hold(dev, ...)      .
       /   |- rtnl_unlock  ------.       |
       |   |- br_ioctl_call       `---&gt;  |- rtnl_lock
  Race |   |  `- br_ioctl_stub           |- br_del_bridge
  Window   |     |                       |  |- dev = __dev_get_by_name(...)
       |   |     |  May take long        |  `- br_dev_delete(dev, ...)
       |   |     |  under RTNL pressure  |     `- unregister_netdevice_queue(dev, ...)
       |   |     |               |       `- rtnl_unlock
       \   |     |- rtnl_lock  &lt;-'          `- netdev_run_todo
           |     |- ...                        `- netdev_run_todo
           |     `- rtnl_unlock                   |- __rtnl_unlock
           |                                      |- netdev_wait_allrefs_any
           |- netdev_put(dev, ...)  &lt;----------------'
                                                Wait refcnt decrement
                                                and log splat below

To avoid blocking SIOCBRDELBR unnecessarily, let's not call
dev_ioctl() for SIOCBRADDIF and SIOCBRDELIF.

In the dev_ioctl() path, we do the following:

  1. Copy struct ifreq by get_user_ifreq in sock_do_ioctl()
  2. Check CAP_NET_ADMIN in dev_ioctl()
  3. Call dev_load() in dev_ioctl()
  4. Fetch the master dev from ifr.ifr_name in dev_ifsioc()

3. can be done by request_module() in br_ioctl_call(), so we move
1., 2., and 4. to br_ioctl_stub().

Note that 2. is also checked later in add_del_if(), but it's better
performed before RTNL.

SIOCBRADDIF and SIOCBRDELIF have been processed in dev_ioctl() since
the pre-git era, and there seems to be no specific reason to process
them there.

[0]:
unregister_netdevice: waiting for wpan3 to become free. Usage count = 2
ref_tracker: wpan3@ffff8880662d8608 has 1/1 users at
     __netdev_tracker_alloc include/linux/netdevice.h:4282 [inline]
     netdev_hold include/linux/netdevice.h:4311 [inline]
     dev_ifsioc+0xc6a/0x1160 net/core/dev_ioctl.c:624
     dev_ioctl+0x255/0x10c0 net/core/dev_ioctl.c:826
     sock_do_ioctl+0x1ca/0x260 net/socket.c:1213
     sock_ioctl+0x23a/0x6c0 net/socket.c:1318
     vfs_ioctl fs/ioctl.c:51 [inline]
     __do_sys_ioctl fs/ioctl.c:906 [inline]
     __se_sys_ioctl fs/ioctl.c:892 [inline]
     __x64_sys_ioctl+0x1a4/0x210 fs/ioctl.c:892
     do_syscall_x64 arch/x86/entry/common.c:52 [inline]
     do_syscall_64+0xcb/0x250 arch/x86/entry/common.c:83
     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22111/">CVE-2025-22111 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22111">CVE-2025-22111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241572">SUSE bug 1241572</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22113</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22113" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22113" ref_url="https://www.suse.com/security/cve/CVE-2025-22113" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid journaling sb update on error if journal is destroying

Presently we always BUG_ON if trying to start a transaction on a journal marked
with JBD2_UNMOUNT, since this should never happen. However, while ltp running
stress tests, it was observed that in case of some error handling paths, it is
possible for update_super_work to start a transaction after the journal is
destroyed eg:

(umount)
ext4_kill_sb
  kill_block_super
    generic_shutdown_super
      sync_filesystem /* commits all txns */
      evict_inodes
        /* might start a new txn */
      ext4_put_super
	flush_work(&amp;sbi-&gt;s_sb_upd_work) /* flush the workqueue */
        jbd2_journal_destroy
          journal_kill_thread
            journal-&gt;j_flags |= JBD2_UNMOUNT;
          jbd2_journal_commit_transaction
            jbd2_journal_get_descriptor_buffer
              jbd2_journal_bmap
                ext4_journal_bmap
                  ext4_map_blocks
                    ...
                    ext4_inode_error
                      ext4_handle_error
                        schedule_work(&amp;sbi-&gt;s_sb_upd_work)

                                               /* work queue kicks in */
                                               update_super_work
                                                 jbd2_journal_start
                                                   start_this_handle
                                                     BUG_ON(journal-&gt;j_flags &amp;
                                                            JBD2_UNMOUNT)

Hence, introduce a new mount flag to indicate journal is destroying and only do
a journaled (and deferred) update of sb if this flag is not set. Otherwise, just
fallback to an un-journaled commit.

Further, in the journal destroy path, we have the following sequence:

  1. Set mount flag indicating journal is destroying
  2. force a commit and wait for it
  3. flush pending sb updates

This sequence is important as it ensures that, after this point, there is no sb
update that might be journaled so it is safe to update the sb outside the
journal. (To avoid race discussed in 2d01ddc86606)

Also, we don't need a similar check in ext4_grp_locked_error since it is only
called from mballoc and AFAICT it would be always valid to schedule work here.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22113/">CVE-2025-22113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22113">CVE-2025-22113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241617">SUSE bug 1241617</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22116" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22116" ref_url="https://www.suse.com/security/cve/CVE-2025-22116" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: check error for register_netdev() on init

Current init logic ignores the error code from register_netdev(),
which will cause WARN_ON() on attempt to unregister it, if there was one,
and there is no info for the user that the creation of the netdev failed.

WARNING: CPU: 89 PID: 6902 at net/core/dev.c:11512 unregister_netdevice_many_notify+0x211/0x1a10
...
[ 3707.563641]  unregister_netdev+0x1c/0x30
[ 3707.563656]  idpf_vport_dealloc+0x5cf/0xce0 [idpf]
[ 3707.563684]  idpf_deinit_task+0xef/0x160 [idpf]
[ 3707.563712]  idpf_vc_core_deinit+0x84/0x320 [idpf]
[ 3707.563739]  idpf_remove+0xbf/0x780 [idpf]
[ 3707.563769]  pci_device_remove+0xab/0x1e0
[ 3707.563786]  device_release_driver_internal+0x371/0x530
[ 3707.563803]  driver_detach+0xbf/0x180
[ 3707.563816]  bus_remove_driver+0x11b/0x2a0
[ 3707.563829]  pci_unregister_driver+0x2a/0x250

Introduce an error check and log the vport number and error code.
On removal make sure to check VPORT_REG_NETDEV flag prior to calling
unregister and free on the netdev.

Add local variables for idx, vport_config and netdev for readability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22116/">CVE-2025-22116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22116">CVE-2025-22116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241459">SUSE bug 1241459</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22119</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22119" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22119" ref_url="https://www.suse.com/security/cve/CVE-2025-22119" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: init wiphy_work before allocating rfkill fails

syzbort reported a uninitialize wiphy_work_lock in cfg80211_dev_free. [1]

After rfkill allocation fails, the wiphy release process will be performed,
which will cause cfg80211_dev_free to access the uninitialized wiphy_work
related data.

Move the initialization of wiphy_work to before rfkill initialization to
avoid this issue.

[1]
INFO: trying to register non-static key.
The code is fine but needs lockdep annotation, or maybe
you didn't initialize this object before use?
turning off the locking correctness validator.
CPU: 0 UID: 0 PID: 5935 Comm: syz-executor550 Not tainted 6.14.0-rc6-syzkaller-00103-g4003c9e78778 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 assign_lock_key kernel/locking/lockdep.c:983 [inline]
 register_lock_class+0xc39/0x1240 kernel/locking/lockdep.c:1297
 __lock_acquire+0x135/0x3c40 kernel/locking/lockdep.c:5103
 lock_acquire.part.0+0x11b/0x380 kernel/locking/lockdep.c:5851
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162
 cfg80211_dev_free+0x30/0x3d0 net/wireless/core.c:1196
 device_release+0xa1/0x240 drivers/base/core.c:2568
 kobject_cleanup lib/kobject.c:689 [inline]
 kobject_release lib/kobject.c:720 [inline]
 kref_put include/linux/kref.h:65 [inline]
 kobject_put+0x1e4/0x5a0 lib/kobject.c:737
 put_device+0x1f/0x30 drivers/base/core.c:3774
 wiphy_free net/wireless/core.c:1224 [inline]
 wiphy_new_nm+0x1c1f/0x2160 net/wireless/core.c:562
 ieee80211_alloc_hw_nm+0x1b7a/0x2260 net/mac80211/main.c:835
 mac80211_hwsim_new_radio+0x1d6/0x54e0 drivers/net/wireless/virtual/mac80211_hwsim.c:5185
 hwsim_new_radio_nl+0xb42/0x12b0 drivers/net/wireless/virtual/mac80211_hwsim.c:6242
 genl_family_rcv_msg_doit+0x202/0x2f0 net/netlink/genetlink.c:1115
 genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]
 genl_rcv_msg+0x565/0x800 net/netlink/genetlink.c:1210
 netlink_rcv_skb+0x16b/0x440 net/netlink/af_netlink.c:2533
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219
 netlink_unicast_kernel net/netlink/af_netlink.c:1312 [inline]
 netlink_unicast+0x53c/0x7f0 net/netlink/af_netlink.c:1338
 netlink_sendmsg+0x8b8/0xd70 net/netlink/af_netlink.c:1882
 sock_sendmsg_nosec net/socket.c:718 [inline]
 __sock_sendmsg net/socket.c:733 [inline]
 ____sys_sendmsg+0xaaf/0xc90 net/socket.c:2573
 ___sys_sendmsg+0x135/0x1e0 net/socket.c:2627
 __sys_sendmsg+0x16e/0x220 net/socket.c:2659
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83

Close: https://syzkaller.appspot.com/bug?extid=aaf0488c83d1d5f4f029
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22119/">CVE-2025-22119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22119">CVE-2025-22119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241576">SUSE bug 1241576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241577">SUSE bug 1241577</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22121" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22121" ref_url="https://www.suse.com/security/cve/CVE-2025-22121" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix out-of-bound read in ext4_xattr_inode_dec_ref_all()

There's issue as follows:
BUG: KASAN: use-after-free in ext4_xattr_inode_dec_ref_all+0x6ff/0x790
Read of size 4 at addr ffff88807b003000 by task syz-executor.0/15172

CPU: 3 PID: 15172 Comm: syz-executor.0
Call Trace:
 __dump_stack lib/dump_stack.c:82 [inline]
 dump_stack+0xbe/0xfd lib/dump_stack.c:123
 print_address_description.constprop.0+0x1e/0x280 mm/kasan/report.c:400
 __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560
 kasan_report+0x3a/0x50 mm/kasan/report.c:585
 ext4_xattr_inode_dec_ref_all+0x6ff/0x790 fs/ext4/xattr.c:1137
 ext4_xattr_delete_inode+0x4c7/0xda0 fs/ext4/xattr.c:2896
 ext4_evict_inode+0xb3b/0x1670 fs/ext4/inode.c:323
 evict+0x39f/0x880 fs/inode.c:622
 iput_final fs/inode.c:1746 [inline]
 iput fs/inode.c:1772 [inline]
 iput+0x525/0x6c0 fs/inode.c:1758
 ext4_orphan_cleanup fs/ext4/super.c:3298 [inline]
 ext4_fill_super+0x8c57/0xba40 fs/ext4/super.c:5300
 mount_bdev+0x355/0x410 fs/super.c:1446
 legacy_get_tree+0xfe/0x220 fs/fs_context.c:611
 vfs_get_tree+0x8d/0x2f0 fs/super.c:1576
 do_new_mount fs/namespace.c:2983 [inline]
 path_mount+0x119a/0x1ad0 fs/namespace.c:3316
 do_mount+0xfc/0x110 fs/namespace.c:3329
 __do_sys_mount fs/namespace.c:3540 [inline]
 __se_sys_mount+0x219/0x2e0 fs/namespace.c:3514
 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x67/0xd1

Memory state around the buggy address:
 ffff88807b002f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff88807b002f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
&gt;ffff88807b003000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                   ^
 ffff88807b003080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
 ffff88807b003100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff

Above issue happens as ext4_xattr_delete_inode() isn't check xattr
is valid if xattr is in inode.
To solve above issue call xattr_check_inode() check if xattr if valid
in inode. In fact, we can directly verify in ext4_iget_extra_inode(),
so that there is no divergent verification.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22121/">CVE-2025-22121 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22121">CVE-2025-22121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241593">SUSE bug 1241593</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22122</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22122" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22122" ref_url="https://www.suse.com/security/cve/CVE-2025-22122" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix adding folio to bio

&gt;4GB folio is possible on some ARCHs, such as aarch64, 16GB hugepage
is supported, then 'offset' of folio can't be held in 'unsigned int',
cause warning in bio_add_folio_nofail() and IO failure.

Fix it by adjusting 'page' &amp; trimming 'offset' so that `-&gt;bi_offset` won't
be overflow, and folio can be added to bio successfully.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22122/">CVE-2025-22122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22122">CVE-2025-22122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241594">SUSE bug 1241594</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024258" comment="kernel-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024259" comment="kernel-abi-stablelists-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024260" comment="kernel-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024261" comment="kernel-cross-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024262" comment="kernel-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024263" comment="kernel-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024266" comment="kernel-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024267" comment="kernel-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024268" comment="kernel-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024269" comment="kernel-debug-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024272" comment="kernel-doc-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024273" comment="kernel-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024274" comment="kernel-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024275" comment="kernel-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024276" comment="kernel-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024277" comment="kernel-rt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024278" comment="kernel-rt-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024279" comment="kernel-rt-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024280" comment="kernel-rt-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024282" comment="kernel-rt-debug-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024283" comment="kernel-rt-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024284" comment="kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024285" comment="kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024287" comment="kernel-rt-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024288" comment="kernel-rt-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024289" comment="kernel-rt-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024290" comment="kernel-rt-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024291" comment="kernel-tools-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024292" comment="kernel-tools-libs-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024294" comment="kernel-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024295" comment="kernel-uki-virt-addons-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024296" comment="libperf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024297" comment="perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024298" comment="python3-perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024299" comment="rtla-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024300" comment="rv-5.14.0-570.58.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22126</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22126" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22126" ref_url="https://www.suse.com/security/cve/CVE-2025-22126" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix mddev uaf while iterating all_mddevs list

While iterating all_mddevs list from md_notify_reboot() and md_exit(),
list_for_each_entry_safe is used, and this can race with deletint the
next mddev, causing UAF:

t1:
spin_lock
//list_for_each_entry_safe(mddev, n, ...)
 mddev_get(mddev1)
 // assume mddev2 is the next entry
 spin_unlock
            t2:
            //remove mddev2
            ...
            mddev_free
            spin_lock
            list_del
            spin_unlock
            kfree(mddev2)
 mddev_put(mddev1)
 spin_lock
 //continue dereference mddev2-&gt;all_mddevs

The old helper for_each_mddev() actually grab the reference of mddev2
while holding the lock, to prevent from being freed. This problem can be
fixed the same way, however, the code will be complex.

Hence switch to use list_for_each_entry, in this case mddev_put() can free
the mddev1 and it's not safe as well. Refer to md_seq_show(), also factor
out a helper mddev_put_locked() to fix this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22126/">CVE-2025-22126 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22126">CVE-2025-22126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241597">SUSE bug 1241597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986972" comment="kernel-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986973" comment="kernel-abi-stablelists-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986974" comment="kernel-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986975" comment="kernel-cross-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986976" comment="kernel-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986977" comment="kernel-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986980" comment="kernel-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986981" comment="kernel-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986982" comment="kernel-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986983" comment="kernel-debug-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986986" comment="kernel-doc-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986987" comment="kernel-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986988" comment="kernel-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986989" comment="kernel-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986990" comment="kernel-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986991" comment="kernel-rt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986992" comment="kernel-rt-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986993" comment="kernel-rt-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986994" comment="kernel-rt-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986996" comment="kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986997" comment="kernel-rt-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986998" comment="kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986999" comment="kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987001" comment="kernel-rt-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987002" comment="kernel-rt-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987003" comment="kernel-rt-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987004" comment="kernel-rt-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987005" comment="kernel-tools-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987006" comment="kernel-tools-libs-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987008" comment="kernel-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987009" comment="kernel-uki-virt-addons-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987010" comment="libperf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987011" comment="perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987012" comment="python3-perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987013" comment="rtla-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987014" comment="rv-5.14.0-570.22.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22150" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22150" ref_url="https://www.suse.com/security/cve/CVE-2025-22150" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1351" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000900.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000872.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1446" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000870.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1582" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000903.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1611" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000902.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1613" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLMBUS6KTOM5ZRBZUFNAWPANSHPLYG3W/" source="SUSE-SU"/>
    <description>
    Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-15"/>
	<updated date="2025-02-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7.4/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22150/">CVE-2025-22150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22150">CVE-2025-22150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236257">SUSE bug 1236257</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009964799" comment="nodejs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964800" comment="nodejs-devel-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964801" comment="nodejs-docs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964802" comment="nodejs-full-i18n-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964803" comment="nodejs-libs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963855" comment="nodejs-nodemon-3.0.1-1.module+el9.5.0+22773+9a359385 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963856" comment="nodejs-packaging-2021.06-4.module+el9.5.0+22773+9a359385 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963857" comment="nodejs-packaging-bundler-2021.06-4.module+el9.5.0+22773+9a359385 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964807" comment="npm-10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964808" comment="v8-12.4-devel-12.4.254.21-1.22.13.1.1.module+el9.5.0+22763+17233acb is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22247</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22247" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22247" ref_url="https://www.suse.com/security/cve/CVE-2025-22247" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01565-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01658-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20379-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20452-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040553.html" source="SUSE-SU"/>
    <description>
    VMware Tools contains an insecure file handling vulnerability.  A malicious actor with non-administrative privileges on a guest VM may tamper the local files to trigger insecure file operations within that VM.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22247/">CVE-2025-22247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22247">CVE-2025-22247 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243106">SUSE bug 1243106</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010053946" comment="open-vm-tools-13.0.0-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053947" comment="open-vm-tools-desktop-13.0.0-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053948" comment="open-vm-tools-salt-minion-13.0.0-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053949" comment="open-vm-tools-sdmp-13.0.0-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053950" comment="open-vm-tools-test-13.0.0-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22866" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22866" ref_url="https://www.suse.com/security/cve/CVE-2025-22866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039220.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14735-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQJSYILFTX3S2O5RES7ORQ4XSV6GWDLY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14746-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L7UGHSZ63TOLAKUNNNI4C3UFVJH4QNCX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15030-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLAZMF6OXHA44LELUVOL3F5GAUV5PW3Y/" source="SUSE-SU"/>
    <description>
    Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22866/">CVE-2025-22866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22866">CVE-2025-22866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236801">SUSE bug 1236801</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974982" comment="delve-1.24.1-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974983" comment="go-toolset-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974984" comment="golang-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974985" comment="golang-bin-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974986" comment="golang-docs-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974987" comment="golang-misc-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974988" comment="golang-race-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974989" comment="golang-src-1.23.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974990" comment="golang-tests-1.23.6-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22869</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22869" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000997.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3336" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001010.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001061.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKOLRH73CIQLMQ327IYGUHNSFKCU5MPI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CKYE7I5OJNC37LL7255HIGX5ALO2LO5S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLILESXTUSI5RA744QQ3PZ6BOEUIKZJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14887-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKHXEY6EIRYIRT5OFXFAGRE6PTYMVUZF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2WDHFL2CJ54WXZCWMM62SG3EEXCUE7B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLMCPFY73CP4P47VPVL2WKQEHQZDTY6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKWQ6ES2RHURE5QOZDDNTWPTMPKEXYXM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
    <description>
    SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239322">SUSE bug 1239322</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985380" comment="gvisor-tap-vsock-0.8.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985381" comment="gvisor-tap-vsock-gvforwarder-0.8.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983924" comment="podman-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983925" comment="podman-docker-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983926" comment="podman-plugins-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983927" comment="podman-remote-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983928" comment="podman-tests-5.4.0-9.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22871</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22871" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22871" ref_url="https://www.suse.com/security/cve/CVE-2025-22871" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8476" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001618.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8478" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001621.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001631.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8682" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001643.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001672.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001667.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9060" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001670.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9106" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001675.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001666.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001661.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9144" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001662.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9145" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9147" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001664.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9150" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001663.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9635" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001699.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9845" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1141-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038925.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14962-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AA2KWPVTT6A22ZWL7S3ZP4ZGWZTBM36I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14963-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2724FJ42C3M7EKSK55CSRHCPSWBIW5PZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14978-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIF3HNGPDAC6VLCTBDIHNCVVDXMRKGZB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15029-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/THQQDNUA6DIHLT5MRF3QSKVBTESL2VHF/" source="SUSE-SU"/>
    <description>
    The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-06"/>
	<updated date="2025-09-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22871/">CVE-2025-22871 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22871">CVE-2025-22871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240550">SUSE bug 1240550</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986876" comment="buildah-1.39.4-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986877" comment="buildah-tests-1.39.4-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986868" comment="containernetworking-plugins-1.6.2-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987015" comment="git-lfs-3.6.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986021" comment="go-toolset-1.23.9-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986022" comment="golang-1.23.9-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986023" comment="golang-bin-1.23.9-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986024" comment="golang-docs-1.23.9-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986025" comment="golang-misc-1.23.9-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986026" comment="golang-race-1.23.9-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986027" comment="golang-src-1.23.9-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986028" comment="golang-tests-1.23.9-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986652" comment="grafana-10.2.6-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986971" comment="grafana-pcp-5.1.1-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986653" comment="grafana-selinux-10.2.6-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986878" comment="gvisor-tap-vsock-0.8.5-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986879" comment="gvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986869" comment="podman-5.4.0-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986870" comment="podman-docker-5.4.0-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986871" comment="podman-plugins-5.4.0-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986872" comment="podman-remote-5.4.0-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986873" comment="podman-tests-5.4.0-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986874" comment="skopeo-1.18.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986875" comment="skopeo-tests-1.18.1-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997709" comment="weldr-client-35.12-4.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22874</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22874" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22874" ref_url="https://www.suse.com/security/cve/CVE-2025-22874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041648.html" source="SUSE-SU"/>
    <description>
    Calling Verify with a VerifyOptions.KeyUsages that contains ExtKeyUsageAny unintentionally disabledpolicy validation. This only affected certificate chains which contain policy graphs, which are rather uncommon.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22874/">CVE-2025-22874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22874">CVE-2025-22874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244158">SUSE bug 1244158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999424" comment="go-toolset-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999425" comment="golang-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999426" comment="golang-bin-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999427" comment="golang-docs-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999428" comment="golang-misc-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999429" comment="golang-race-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999430" comment="golang-src-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999431" comment="golang-tests-1.24.4-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23048" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23048" ref_url="https://www.suse.com/security/cve/CVE-2025-23048" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001973.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02565-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041070.html" source="SUSE-SU"/>
    <description>
    In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-09-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23048/">CVE-2025-23048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23048">CVE-2025-23048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246302">SUSE bug 1246302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017031" comment="httpd-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017032" comment="httpd-core-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017033" comment="httpd-devel-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017034" comment="httpd-filesystem-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017035" comment="httpd-manual-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017036" comment="httpd-tools-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017037" comment="mod_ldap-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017038" comment="mod_lua-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017039" comment="mod_proxy_html-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017040" comment="mod_session-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017041" comment="mod_ssl-2.4.62-4.el9_6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23083" ref_url="https://www.suse.com/security/cve/CVE-2025-23083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1351" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000900.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000872.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1611" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000902.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1613" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLMBUS6KTOM5ZRBZUFNAWPANSHPLYG3W/" source="SUSE-SU"/>
    <description>
    With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. 

This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-15"/>
	<updated date="2025-02-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23083/">CVE-2025-23083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23083">CVE-2025-23083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236251">SUSE bug 1236251</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009964799" comment="nodejs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964800" comment="nodejs-devel-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964801" comment="nodejs-docs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964802" comment="nodejs-full-i18n-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964803" comment="nodejs-libs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964804" comment="nodejs-nodemon-3.0.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964805" comment="nodejs-packaging-2021.06-4.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964806" comment="nodejs-packaging-bundler-2021.06-4.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964807" comment="npm-10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964808" comment="v8-12.4-devel-12.4.254.21-1.22.13.1.1.module+el9.5.0+22763+17233acb is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23085" ref_url="https://www.suse.com/security/cve/CVE-2025-23085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1351" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000900.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000872.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1446" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000870.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1582" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000903.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1611" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000902.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:1613" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020197.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020235.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14706-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLMBUS6KTOM5ZRBZUFNAWPANSHPLYG3W/" source="SUSE-SU"/>
    <description>
    A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions.

This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-02-15"/>
	<updated date="2025-02-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23085/">CVE-2025-23085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23085">CVE-2025-23085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236250">SUSE bug 1236250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009964799" comment="nodejs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964800" comment="nodejs-devel-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964801" comment="nodejs-docs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964802" comment="nodejs-full-i18n-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964803" comment="nodejs-libs-22.13.1-1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963855" comment="nodejs-nodemon-3.0.1-1.module+el9.5.0+22773+9a359385 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963856" comment="nodejs-packaging-2021.06-4.module+el9.5.0+22773+9a359385 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009963857" comment="nodejs-packaging-bundler-2021.06-4.module+el9.5.0+22773+9a359385 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964807" comment="npm-10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009964808" comment="v8-12.4-devel-12.4.254.21-1.22.13.1.1.module+el9.5.0+22763+17233acb is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23129" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23129" ref_url="https://www.suse.com/security/cve/CVE-2025-23129" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path

If a shared IRQ is used by the driver due to platform limitation, then the
IRQ affinity hint is set right after the allocation of IRQ vectors in
ath11k_pci_alloc_msi(). This does no harm unless one of the functions
requesting the IRQ fails and attempt to free the IRQ. This results in the
below warning:

WARNING: CPU: 7 PID: 349 at kernel/irq/manage.c:1929 free_irq+0x278/0x29c
Call trace:
 free_irq+0x278/0x29c
 ath11k_pcic_free_irq+0x70/0x10c [ath11k]
 ath11k_pci_probe+0x800/0x820 [ath11k_pci]
 local_pci_probe+0x40/0xbc

The warning is due to not clearing the affinity hint before freeing the
IRQs.

So to fix this issue, clear the IRQ affinity hint before calling
ath11k_pcic_free_irq() in the error path. The affinity will be cleared once
again further down the error path due to code organization, but that does
no harm.

Tested-on: QCA6390 hw2.0 PCI WLAN.HST.1.0.1-05266-QCAHSTSWPLZ_V2_TO_X86-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23129/">CVE-2025-23129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23129">CVE-2025-23129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241599">SUSE bug 1241599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23150</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23150" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23150" ref_url="https://www.suse.com/security/cve/CVE-2025-23150" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix off-by-one error in do_split

Syzkaller detected a use-after-free issue in ext4_insert_dentry that was
caused by out-of-bounds access due to incorrect splitting in do_split.

BUG: KASAN: use-after-free in ext4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109
Write of size 251 at addr ffff888074572f14 by task syz-executor335/5847

CPU: 0 UID: 0 PID: 5847 Comm: syz-executor335 Not tainted 6.12.0-rc6-syzkaller-00318-ga9cda7c0ffed #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106
 ext4_insert_dentry+0x36a/0x6d0 fs/ext4/namei.c:2109
 add_dirent_to_buf+0x3d9/0x750 fs/ext4/namei.c:2154
 make_indexed_dir+0xf98/0x1600 fs/ext4/namei.c:2351
 ext4_add_entry+0x222a/0x25d0 fs/ext4/namei.c:2455
 ext4_add_nondir+0x8d/0x290 fs/ext4/namei.c:2796
 ext4_symlink+0x920/0xb50 fs/ext4/namei.c:3431
 vfs_symlink+0x137/0x2e0 fs/namei.c:4615
 do_symlinkat+0x222/0x3a0 fs/namei.c:4641
 __do_sys_symlink fs/namei.c:4662 [inline]
 __se_sys_symlink fs/namei.c:4660 [inline]
 __x64_sys_symlink+0x7a/0x90 fs/namei.c:4660
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 &lt;/TASK&gt;

The following loop is located right above 'if' statement.

for (i = count-1; i &gt;= 0; i--) {
	/* is more than half of this entry in 2nd half of the block? */
	if (size + map[i].size/2 &gt; blocksize/2)
		break;
	size += map[i].size;
	move++;
}

'i' in this case could go down to -1, in which case sum of active entries
wouldn't exceed half the block size, but previous behaviour would also do
split in half if sum would exceed at the very last block, which in case of
having too many long name files in a single block could lead to
out-of-bounds access and following use-after-free.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-23150/">CVE-2025-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23150">CVE-2025-23150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242513">SUSE bug 1242513</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996844" comment="kernel-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996845" comment="kernel-abi-stablelists-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996846" comment="kernel-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996847" comment="kernel-cross-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996848" comment="kernel-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996849" comment="kernel-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996852" comment="kernel-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996853" comment="kernel-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996854" comment="kernel-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996855" comment="kernel-debug-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996858" comment="kernel-doc-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996859" comment="kernel-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996860" comment="kernel-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996861" comment="kernel-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996862" comment="kernel-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996863" comment="kernel-rt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996864" comment="kernel-rt-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996865" comment="kernel-rt-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996866" comment="kernel-rt-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996868" comment="kernel-rt-debug-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996869" comment="kernel-rt-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996870" comment="kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996871" comment="kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996873" comment="kernel-rt-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996874" comment="kernel-rt-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996875" comment="kernel-rt-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996876" comment="kernel-rt-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996877" comment="kernel-tools-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996878" comment="kernel-tools-libs-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996880" comment="kernel-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996881" comment="kernel-uki-virt-addons-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996882" comment="libperf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996883" comment="perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996884" comment="python3-perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996885" comment="rtla-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996886" comment="rv-5.14.0-570.23.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23165</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23165" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23165" ref_url="https://www.suse.com/security/cve/CVE-2025-23165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01878-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01879-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02045-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040401.html" source="SUSE-SU"/>
    <description>
    In Node.js, the `ReadFileUtf8` internal binding leaks memory due to a corrupted pointer in `uv_fs_s.file`: a UTF-16 path buffer is allocated but subsequently overwritten when the file descriptor is set. This results in an unrecoverable memory leak on every call. Repeated use can cause unbounded memory growth, leading to a denial of service.

Impact:
* This vulnerability affects APIs relying on `ReadFileUtf8` on Node.js release lines: v20 and v22.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23165/">CVE-2025-23165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23165">CVE-2025-23165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243217">SUSE bug 1243217</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986177" comment="nodejs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986178" comment="nodejs-devel-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986179" comment="nodejs-docs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986180" comment="nodejs-full-i18n-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986181" comment="nodejs-libs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986188" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986189" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986190" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986182" comment="npm-10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986183" comment="v8-12.4-devel-12.4.254.21-1.22.16.0.1.module+el9.6.0+23151+b1496e9d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23166</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23166" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23166" ref_url="https://www.suse.com/security/cve/CVE-2025-23166" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8467" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001634.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8468" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001633.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8506" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001630.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8514" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01878-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01879-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02045-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040401.html" source="SUSE-SU"/>
    <description>
    The C++ method SignTraits::DeriveBits() may incorrectly call ThrowException() based on user-supplied inputs when executing in a background thread, crashing the Node.js process. Such cryptographic operations are commonly applied to untrusted inputs. Thus, this mechanism potentially allows an adversary to remotely crash a Node.js runtime.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-11"/>
	<updated date="2025-06-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23166/">CVE-2025-23166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166">CVE-2025-23166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243218">SUSE bug 1243218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986177" comment="nodejs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986178" comment="nodejs-devel-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986179" comment="nodejs-docs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986180" comment="nodejs-full-i18n-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986181" comment="nodejs-libs-22.16.0-1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986188" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986189" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986190" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986182" comment="npm-10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986183" comment="v8-12.4-devel-12.4.254.21-1.22.16.0.1.module+el9.6.0+23151+b1496e9d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23167</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23167" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23167" ref_url="https://www.suse.com/security/cve/CVE-2025-23167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02039-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02045-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040401.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js 20's HTTP parser allows improper termination of HTTP/1 headers using `\r\n\rX` instead of the required `\r\n\r\n`.
This inconsistency enables request smuggling, allowing attackers to bypass proxy-based access controls and submit unauthorized requests.

The issue was resolved by upgrading `llhttp` to version 9, which enforces correct header termination.

Impact:
* This vulnerability affects only Node.js 20.x users prior to the `llhttp` v9 upgrade.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23167/">CVE-2025-23167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23167">CVE-2025-23167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243220">SUSE bug 1243220</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986184" comment="nodejs-20.19.2-1.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986185" comment="nodejs-devel-20.19.2-1.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986186" comment="nodejs-docs-20.19.2-1.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986187" comment="nodejs-full-i18n-20.19.2-1.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986188" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986189" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986190" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23146+be9976bd is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986191" comment="npm-10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23419</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23419" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23419" ref_url="https://www.suse.com/security/cve/CVE-2025-23419" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03243-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03444-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/041989.html" source="SUSE-SU"/>
    <description>
    When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers. This vulnerability arises when  TLS Session Tickets https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key  are used and/or the  SSL session cache https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_cache  are used in the default server and the default server is performing client certificate authentication.    

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-23419/">CVE-2025-23419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23419">CVE-2025-23419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236851">SUSE bug 1236851</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985368" comment="nginx-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985369" comment="nginx-all-modules-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985370" comment="nginx-core-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985371" comment="nginx-filesystem-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985372" comment="nginx-mod-devel-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985373" comment="nginx-mod-http-image-filter-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985374" comment="nginx-mod-http-perl-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985375" comment="nginx-mod-http-xslt-filter-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985376" comment="nginx-mod-mail-1.20.1-22.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985377" comment="nginx-mod-stream-1.20.1-22.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24070</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24070" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24070" ref_url="https://www.suse.com/security/cve/CVE-2025-24070" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000954.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2668" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000963.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2669" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000968.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2670" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000955.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-07-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24070/">CVE-2025-24070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24070">CVE-2025-24070 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968410" comment="aspnetcore-runtime-8.0-8.0.14-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968395" comment="aspnetcore-runtime-9.0-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968411" comment="aspnetcore-runtime-dbg-8.0-8.0.14-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968396" comment="aspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968412" comment="aspnetcore-targeting-pack-8.0-8.0.14-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968397" comment="aspnetcore-targeting-pack-9.0-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968413" comment="dotnet-apphost-pack-8.0-8.0.14-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968398" comment="dotnet-apphost-pack-9.0-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968399" comment="dotnet-host-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968414" comment="dotnet-hostfxr-8.0-8.0.14-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968400" comment="dotnet-hostfxr-9.0-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968415" comment="dotnet-runtime-8.0-8.0.14-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968401" comment="dotnet-runtime-9.0-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968416" comment="dotnet-runtime-dbg-8.0-8.0.14-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968402" comment="dotnet-runtime-dbg-9.0-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968417" comment="dotnet-sdk-8.0-8.0.114-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968418" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.114-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968403" comment="dotnet-sdk-9.0-9.0.104-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968404" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.104-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968405" comment="dotnet-sdk-aot-9.0-9.0.104-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968419" comment="dotnet-sdk-dbg-8.0-8.0.114-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968406" comment="dotnet-sdk-dbg-9.0-9.0.104-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968420" comment="dotnet-targeting-pack-8.0-8.0.14-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968407" comment="dotnet-targeting-pack-9.0-9.0.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968421" comment="dotnet-templates-8.0-8.0.114-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968408" comment="dotnet-templates-9.0-9.0.104-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968409" comment="netstandard-targeting-pack-2.1-9.0.104-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24158" ref_url="https://www.suse.com/security/cve/CVE-2025-24158" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000917.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2035" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, visionOS 2.3, watchOS 11.3. Processing web content may lead to a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24158/">CVE-2025-24158 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24158">CVE-2025-24158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236946">SUSE bug 1236946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24162</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24162" ref_url="https://www.suse.com/security/cve/CVE-2025-24162" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000917.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2035" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" source="SUSE-SU"/>
    <description>
    This issue was addressed through improved state management. This issue is fixed in Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, visionOS 2.3, watchOS 11.3. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-06"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24162/">CVE-2025-24162 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24162">CVE-2025-24162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236946">SUSE bug 1236946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967159" comment="webkit2gtk3-2.46.6-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967160" comment="webkit2gtk3-devel-2.46.6-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967161" comment="webkit2gtk3-jsc-2.46.6-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967162" comment="webkit2gtk3-jsc-devel-2.46.6-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24189</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24189" ref_url="https://www.suse.com/security/cve/CVE-2025-24189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, tvOS 18.3, visionOS 2.3, watchOS 11.3. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24189/">CVE-2025-24189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24189">CVE-2025-24189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247565">SUSE bug 1247565</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974759" comment="webkit2gtk3-2.48.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974760" comment="webkit2gtk3-devel-2.48.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974761" comment="webkit2gtk3-jsc-2.48.1-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974762" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24201</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24201" ref_url="https://www.suse.com/security/cve/CVE-2025-24201" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2863" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000962.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2864" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1033-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJC3GUPN6T3FGCOPMOLUI52AMJZNNKNX/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1149-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038918.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in Safari 18.3.1, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iOS 18.3.2 and iPadOS 18.3.2, iPadOS 17.7.6, macOS Sequoia 15.3.2, visionOS 2.3.2, watchOS 11.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24201/">CVE-2025-24201 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24201">CVE-2025-24201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239547">SUSE bug 1239547</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968425" comment="webkit2gtk3-2.46.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968426" comment="webkit2gtk3-devel-2.46.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968427" comment="webkit2gtk3-jsc-2.46.6-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968428" comment="webkit2gtk3-jsc-devel-2.46.6-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24208</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24208" ref_url="https://www.suse.com/security/cve/CVE-2025-24208" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7387" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039058.html" source="SUSE-SU"/>
    <description>
    A permissions issue was addressed with additional restrictions. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4. Loading a malicious iframe may lead to a cross-site scripting attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24208/">CVE-2025-24208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24208">CVE-2025-24208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240961">SUSE bug 1240961</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983920" comment="webkit2gtk3-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983921" comment="webkit2gtk3-devel-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983922" comment="webkit2gtk3-jsc-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983923" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24209</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24209" ref_url="https://www.suse.com/security/cve/CVE-2025-24209" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7387" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039058.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, watchOS 11.4. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24209/">CVE-2025-24209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24209">CVE-2025-24209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240964">SUSE bug 1240964</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983920" comment="webkit2gtk3-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983921" comment="webkit2gtk3-devel-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983922" comment="webkit2gtk3-jsc-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983923" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24216" ref_url="https://www.suse.com/security/cve/CVE-2025-24216" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7387" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039058.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, visionOS 2.4, watchOS 11.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24216/">CVE-2025-24216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24216">CVE-2025-24216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240986">SUSE bug 1240986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983920" comment="webkit2gtk3-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983921" comment="webkit2gtk3-devel-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983922" comment="webkit2gtk3-jsc-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983923" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24223</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24223" ref_url="https://www.suse.com/security/cve/CVE-2025-24223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040413.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24223/">CVE-2025-24223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24223">CVE-2025-24223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243424">SUSE bug 1243424</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24264</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24264" ref_url="https://www.suse.com/security/cve/CVE-2025-24264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039058.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, visionOS 2.4, watchOS 11.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24264/">CVE-2025-24264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24264">CVE-2025-24264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240987">SUSE bug 1240987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24294" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24294" ref_url="https://www.suse.com/security/cve/CVE-2025-24294" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3776-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023374.html" source="SUSE-SU"/>
    <description>
    The attack vector is a potential Denial of Service (DoS). The vulnerability is caused by an insufficient check on the length of a decompressed domain name within a DNS packet.

An attacker can craft a malicious DNS packet containing a highly compressed domain name. When the resolv library parses such a packet, the name decompression process consumes a large amount of CPU resources, as the library does not limit the resulting length of the name.

This resource consumption can cause the application thread to become unresponsive, resulting in a Denial of Service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24294/">CVE-2025-24294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24294">CVE-2025-24294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246430">SUSE bug 1246430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054376" comment="ruby-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054377" comment="ruby-bundled-gems-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054378" comment="ruby-default-gems-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054379" comment="ruby-devel-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054380" comment="ruby-doc-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054381" comment="ruby-libs-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054382" comment="rubygem-bigdecimal-3.1.5-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054383" comment="rubygem-bundler-2.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054384" comment="rubygem-io-console-0.7.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054385" comment="rubygem-irb-1.13.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054386" comment="rubygem-json-2.7.2-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054387" comment="rubygem-minitest-5.20.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054388" comment="rubygem-mysql2-0.5.5-3.module+el9.7.0+23362+7018fe7e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054389" comment="rubygem-mysql2-doc-0.5.5-3.module+el9.7.0+23362+7018fe7e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054390" comment="rubygem-power_assert-2.0.3-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054391" comment="rubygem-psych-5.1.2-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054392" comment="rubygem-racc-1.7.3-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054393" comment="rubygem-rake-13.1.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054394" comment="rubygem-rbs-3.4.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054395" comment="rubygem-rdoc-6.6.3.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054396" comment="rubygem-rexml-3.4.4-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054397" comment="rubygem-rss-0.3.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054398" comment="rubygem-test-unit-3.6.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054399" comment="rubygem-typeprof-0.21.9-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054400" comment="rubygems-3.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054401" comment="rubygems-devel-3.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24495</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24495" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24495" ref_url="https://www.suse.com/security/cve/CVE-2025-24495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01651-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1567-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040391.html" source="SUSE-SU"/>
		<reference ref_id="TID000021845" ref_url="https://www.suse.com/support/kb/doc/?id=000021845" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15093-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IDMNMRHOEJBKOC4ZPMYVNMKT2SGRVB7Q/" source="SUSE-SU"/>
    <description>
    Incorrect initialization of resource in the branch prediction unit for some Intel(R) Core(tm) Ultra Processors may allow an authenticated user to potentially enable information disclosure via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24495/">CVE-2025-24495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24495">CVE-2025-24495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242006">SUSE bug 1242006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243123">SUSE bug 1243123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053953" comment="microcode_ctl-20250211-1.20250512.1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24528" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24528" ref_url="https://www.suse.com/security/cve/CVE-2025-24528" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:1352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-February/000875.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000960.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2FTHPKX7AIUOFNDU7J36C27TP7QFP2LP/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0401-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024196.html" source="SUSE-SU"/>
    <description>
    In MIT Kerberos 5 (aka krb5) before 1.22 (with incremental propagation), there is an integer overflow for a large update size to resize() in kdb_log.c. An authenticated attacker can cause an out-of-bounds write and kadmind daemon crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24528/">CVE-2025-24528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24528">CVE-2025-24528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236619">SUSE bug 1236619</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983876" comment="krb5-devel-1.21.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983877" comment="krb5-libs-1.21.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983878" comment="krb5-pkinit-1.21.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983879" comment="krb5-server-1.21.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983880" comment="krb5-server-ldap-1.21.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983881" comment="krb5-workstation-1.21.1-6.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983882" comment="libkadm5-1.21.1-6.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24813</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24813" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24813" ref_url="https://www.suse.com/security/cve/CVE-2025-24813" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3645" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001025.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3683" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14896-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WQRQ6JSFISH4LSDOH7IDJHNYPKMGUF5X/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14897-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7OKLY4MUG7KKGPWMJ2OO7BLP5MD4C3UC/" source="SUSE-SU"/>
    <description>
    Path Equivalence: 'file.Name' (Internal Dot) leading to  Remote Code Execution and/or Information disclosure  and/or malicious content added to uploaded files via write enabled  Default Servlet  in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions 
may also be affected.


If all of the following were true, a malicious user was able to view       security sensitive files and/or inject content into those files:
-  writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of  a target URL for public uploads
-  attacker knowledge of the names of security sensitive files being  uploaded
-  the security sensitive files also being uploaded via partial PUT

If all of the following were true, a malicious user was able to       perform remote code execution:
- writes enabled for the default servlet (disabled by default)
-  support for partial PUT (enabled by default)
-  application was using Tomcat's file based session persistence with the  default storage location
-  application included a library that may be leveraged in a  deserialization attack

Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-09"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24813/">CVE-2025-24813 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24813">CVE-2025-24813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239302">SUSE bug 1239302</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974613" comment="tomcat-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974614" comment="tomcat-admin-webapps-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974615" comment="tomcat-docs-webapp-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974616" comment="tomcat-el-3.0-api-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974617" comment="tomcat-jsp-2.3-api-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974618" comment="tomcat-lib-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974619" comment="tomcat-servlet-4.0-api-9.0.87-2.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974620" comment="tomcat-webapps-9.0.87-2.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24855" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24855" ref_url="https://www.suse.com/security/cve/CVE-2025-24855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3107" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000995.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3612" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3615" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021045.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14894-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZKCQGOW24ZBKSYCIKDUG4KKITEGCJKY2/" source="SUSE-SU"/>
    <description>
    numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-26"/>
	<updated date="2025-10-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-24855/">CVE-2025-24855 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24855">CVE-2025-24855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239625">SUSE bug 1239625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009969562" comment="libxslt-1.1.34-9.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009969563" comment="libxslt-devel-1.1.34-9.el9_5.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2487</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2487" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2487" ref_url="https://www.suse.com/security/cve/CVE-2025-2487" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4491" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001107.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7395" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001297.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14934-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IOFOA4ZKJPKCPTBVPQNJTATQO7NXBNQW/" source="SUSE-SU"/>
    <description>
    A flaw was found in the 389-ds-base LDAP Server. This issue occurs when issuing a Modify DN LDAP operation through the ldap protocol, when the function return value is not tested and a NULL pointer is dereferenced. If a privileged user performs a ldap MODDN operation after a failed operation, it could lead to a Denial of Service (DoS) or system crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2487/">CVE-2025-2487 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2487">CVE-2025-2487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239722">SUSE bug 1239722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983929" comment="389-ds-base-2.6.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983930" comment="389-ds-base-devel-2.6.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983931" comment="389-ds-base-libs-2.6.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983932" comment="389-ds-base-snmp-2.6.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983933" comment="python3-lib389-2.6.1-8.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24898" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24898" ref_url="https://www.suse.com/security/cve/CVE-2025-24898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7147" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001310.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7160" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001517.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7313" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001296.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7317" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001540.html" source="SUSE-SU"/>
    <description>
    rust-openssl is a set of OpenSSL bindings for the Rust programming language. In affected versions `ssl::select_next_proto` can return a slice pointing into the `server` argument's buffer but with a lifetime bound to the `client` argument. In situations where the `sever` buffer's lifetime is shorter than the `client` buffer's, this can cause a use after free. This could cause the server to crash or to return arbitrary memory contents to the client. The crate`openssl` version 0.10.70 fixes the signature of `ssl::select_next_proto` to properly constrain the output buffer's lifetime to that of both input buffers. Users are advised to upgrade. In standard usage of `ssl::select_next_proto` in the callback passed to `SslContextBuilder::set_alpn_select_callback`, code is only affected if the `server` buffer is constructed *within* the callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-24898/">CVE-2025-24898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-24898">CVE-2025-24898 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983900" comment="bootc-1.1.6-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985341" comment="bootupd-0.2.27-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983919" comment="keylime-agent-rust-0.2.2-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985367" comment="python3.12-cryptography-41.0.7-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983898" comment="rpm-ostree-2025.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983899" comment="rpm-ostree-libs-2025.5-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983901" comment="system-reinstall-bootc-1.1.6-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202524928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-24928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-24928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24928" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-24928" ref_url="https://www.suse.com/security/cve/CVE-2025-24928" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2673" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000996.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2679" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000965.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2686" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0747-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021047.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14999-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOJ5M2XMJXGWQUYHA5ROFPVMA2BJ6SLD/" source="SUSE-SU"/>
    <description>
    libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-20"/>
	<updated date="2025-10-17"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-24928/">CVE-2025-24928 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-24928">CVE-2025-24928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237370">SUSE bug 1237370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009968422" comment="libxml2-2.9.13-6.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968423" comment="libxml2-devel-2.9.13-6.el9_5.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009968424" comment="python3-libxml2-2.9.13-6.el9_5.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202525186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-25186</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-25186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-25186" ref_url="https://www.suse.com/security/cve/CVE-2025-25186" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10217" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001751.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4493" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001619.html" source="SUSE-SU"/>
    <description>
    Net::IMAP implements Internet Message Access Protocol (IMAP) client functionality in Ruby. Starting in version 0.3.2 and prior to versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial of service by memory exhaustion in `net-imap`'s response parser.  At any time while the client is connected, a malicious server can send  can send highly compressed `uid-set` data which is automatically read by the client's receiver thread. The response parser uses `Range#to_a` to convert the `uid-set` data into arrays of integers, with no limitation on the expanded size of the ranges. Versions 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details for proper configuration of fixed versions and backward compatibility are available in the GitHub Security Advisory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-06"/>
	<updated date="2025-08-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25186/">CVE-2025-25186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-25186">CVE-2025-25186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237051">SUSE bug 1237051</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985952" comment="ruby-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985953" comment="ruby-bundled-gems-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985954" comment="ruby-default-gems-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985955" comment="ruby-devel-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985956" comment="ruby-doc-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985957" comment="ruby-libs-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985958" comment="rubygem-bigdecimal-3.1.5-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985959" comment="rubygem-bundler-2.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985960" comment="rubygem-io-console-0.7.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985961" comment="rubygem-irb-1.13.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985962" comment="rubygem-json-2.7.2-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985963" comment="rubygem-minitest-5.20.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985964" comment="rubygem-power_assert-2.0.3-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985965" comment="rubygem-psych-5.1.2-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985966" comment="rubygem-racc-1.7.3-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985967" comment="rubygem-rake-13.1.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985968" comment="rubygem-rbs-3.4.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985969" comment="rubygem-rdoc-6.6.3.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985970" comment="rubygem-rexml-3.3.9-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985971" comment="rubygem-rss-0.3.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985972" comment="rubygem-test-unit-3.6.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985973" comment="rubygem-typeprof-0.21.9-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985974" comment="rubygems-3.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985975" comment="rubygems-devel-3.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202525724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-25724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-25724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-25724" ref_url="https://www.suse.com/security/cve/CVE-2025-25724" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9431" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0986-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021061.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14882-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2VPBSF65DTMKEEGFEJY6QEGJSZY7TSKV/" source="SUSE-SU"/>
    <description>
    list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspecified other impact via a crafted TAR archive that is read with a verbose value of 2. For example, the 100-byte buffer may not be sufficient for a custom locale.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-25724/">CVE-2025-25724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-25724">CVE-2025-25724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238610">SUSE bug 1238610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996931" comment="bsdtar-3.5.3-5.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996932" comment="libarchive-3.5.3-5.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996933" comment="libarchive-devel-3.5.3-5.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26465" ref_url="https://www.suse.com/security/cve/CVE-2025-26465" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16823" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002050.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:6993" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021099.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14820-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N26B32FQ4LFRH3U2SONNEYKLATWGNDP4/" source="SUSE-SU"/>
    <description>
    A vulnerability was found in OpenSSH when the VerifyHostKeyDNS option is enabled. A machine-in-the-middle attack can be performed by a malicious machine impersonating a legit server. This issue occurs due to how OpenSSH mishandles error codes in specific conditions when verifying the host key. For an attack to be considered successful, the attacker needs to manage to exhaust the client's memory resource first, turning the attack complexity high.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-26465/">CVE-2025-26465 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26465">CVE-2025-26465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237040">SUSE bug 1237040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237041">SUSE bug 1237041</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983864" comment="openssh-8.7p1-45.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983865" comment="openssh-askpass-8.7p1-45.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983866" comment="openssh-clients-8.7p1-45.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983867" comment="openssh-keycat-8.7p1-45.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983868" comment="openssh-server-8.7p1-45.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983869" comment="pam_ssh_agent_auth-0.10.4-5.45.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26594" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26594" ref_url="https://www.suse.com/security/cve/CVE-2025-26594" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in X.Org and Xwayland. The root cursor is referenced in the X server as a global variable. If a client frees the root cursor, the internal reference points to freed memory and causes a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-14"/>
	<updated date="2025-05-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-26594/">CVE-2025-26594 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26594">CVE-2025-26594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237427">SUSE bug 1237427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26595</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26595" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26595" ref_url="https://www.suse.com/security/cve/CVE-2025-26595" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0758-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/27GANBYQW25DQC6LDPTKCLJHEVLSI5SU/" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020494.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in X.Org and Xwayland. The code in XkbVModMaskText() allocates a fixed-sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code fails to check the bounds of the buffer and would copy the data regardless of the size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-14"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26595/">CVE-2025-26595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26595">CVE-2025-26595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237429">SUSE bug 1237429</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26596</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26596" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26596" ref_url="https://www.suse.com/security/cve/CVE-2025-26596" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A heap overflow flaw was found in X.Org and Xwayland. The computation of the length in XkbSizeKeySyms() differs from what is written in XkbWriteKeySyms(), which may lead to a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-14"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26596/">CVE-2025-26596 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26596">CVE-2025-26596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237430">SUSE bug 1237430</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26597</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26597" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26597" ref_url="https://www.suse.com/security/cve/CVE-2025-26597" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0739-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021033.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A buffer overflow flaw was found in X.Org and Xwayland. If XkbChangeTypesOfKey() is called with a 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If the same function is later called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-14"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26597/">CVE-2025-26597 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26597">CVE-2025-26597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237431">SUSE bug 1237431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26598" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26598" ref_url="https://www.suse.com/security/cve/CVE-2025-26598" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write flaw was found in X.Org and Xwayland. The function GetBarrierDevice() searches for the pointer device based on its device ID and returns the matching value, or supposedly NULL, if no match was found. However, the code will return the last element of the list if no matching device ID is found, which can lead to out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-14"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26598/">CVE-2025-26598 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26598">CVE-2025-26598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237432">SUSE bug 1237432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26599</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26599" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26599" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26599" ref_url="https://www.suse.com/security/cve/CVE-2025-26599" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    An access to an uninitialized pointer flaw was found in X.Org and Xwayland. The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without validating the window tree marked just before, which leaves the validated data partly initialized and the use of an uninitialized pointer later.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-14"/>
	<updated date="2025-05-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26599/">CVE-2025-26599 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26599">CVE-2025-26599 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237433">SUSE bug 1237433</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26600</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26600" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26600" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26600" ref_url="https://www.suse.com/security/cve/CVE-2025-26600" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in X.Org and Xwayland. When a device is removed while still frozen, the events queued for that device remain while the device is freed. Replaying the events will cause a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-14"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26600/">CVE-2025-26600 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26600">CVE-2025-26600 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237434">SUSE bug 1237434</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26601</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26601" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26601" ref_url="https://www.suse.com/security/cve/CVE-2025-26601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:2500" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000948.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2502" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000937.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:2879" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000951.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001306.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020437.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14841-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFXFWTIBYVEZW7776X7CR2CMJGQXCGXT/" source="SUSE-SU"/>
    <description>
    A use-after-free flaw was found in X.Org and Xwayland. When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested, and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object, possibly causing a use-after-free when the alarm eventually triggers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-14"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26601/">CVE-2025-26601 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-26601">CVE-2025-26601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237435">SUSE bug 1237435</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009967979" comment="tigervnc-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967980" comment="tigervnc-icons-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967981" comment="tigervnc-license-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967982" comment="tigervnc-selinux-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967983" comment="tigervnc-server-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967984" comment="tigervnc-server-minimal-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009967985" comment="tigervnc-server-module-1.14.1-1.el9_5.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983902" comment="xorg-x11-server-Xdmx-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983903" comment="xorg-x11-server-Xephyr-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983904" comment="xorg-x11-server-Xnest-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983905" comment="xorg-x11-server-Xorg-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983906" comment="xorg-x11-server-Xvfb-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983910" comment="xorg-x11-server-Xwayland-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983911" comment="xorg-x11-server-Xwayland-devel-23.2.7-3.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983907" comment="xorg-x11-server-common-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983908" comment="xorg-x11-server-devel-1.20.11-28.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983909" comment="xorg-x11-server-source-1.20.11-28.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26625</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26625" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26625" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26625" ref_url="https://www.suse.com/security/cve/CVE-2025-26625" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002338.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23744" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003155.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23745" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002328.html" source="SUSE-SU"/>
    <description>
    Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository's working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26625/">CVE-2025-26625 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26625">CVE-2025-26625 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252259">SUSE bug 1252259</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054530" comment="git-lfs-3.6.1-4.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26646" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26646" ref_url="https://www.suse.com/security/cve/CVE-2025-26646" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7571" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7598" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001315.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7600" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001545.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-26646/">CVE-2025-26646 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26646">CVE-2025-26646 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984043" comment="aspnetcore-runtime-8.0-8.0.16-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985452" comment="aspnetcore-runtime-9.0-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984044" comment="aspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985453" comment="aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984045" comment="aspnetcore-targeting-pack-8.0-8.0.16-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985454" comment="aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984046" comment="dotnet-apphost-pack-8.0-8.0.16-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985455" comment="dotnet-apphost-pack-9.0-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985456" comment="dotnet-host-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984047" comment="dotnet-hostfxr-8.0-8.0.16-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985457" comment="dotnet-hostfxr-9.0-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984048" comment="dotnet-runtime-8.0-8.0.16-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985458" comment="dotnet-runtime-9.0-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984049" comment="dotnet-runtime-dbg-8.0-8.0.16-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985459" comment="dotnet-runtime-dbg-9.0-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984050" comment="dotnet-sdk-8.0-8.0.116-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984051" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.116-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985460" comment="dotnet-sdk-9.0-9.0.106-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985461" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.106-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985462" comment="dotnet-sdk-aot-9.0-9.0.106-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984052" comment="dotnet-sdk-dbg-8.0-8.0.116-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985463" comment="dotnet-sdk-dbg-9.0-9.0.106-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984053" comment="dotnet-targeting-pack-8.0-8.0.16-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985464" comment="dotnet-targeting-pack-9.0-9.0.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984054" comment="dotnet-templates-8.0-8.0.116-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985465" comment="dotnet-templates-9.0-9.0.106-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985466" comment="netstandard-targeting-pack-2.1-9.0.106-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27144" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7389" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001565.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7397" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0080-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N7HT377S427BEOJBVSVDIDXHCBYPR7BR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6CKDKOLFT3FBRNIKECBJKGOC3PU3UIC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14871-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSWXCPWQTROX3SPB557CKOCT4MAX7ILY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
    <description>
    Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters.  An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2026-02-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237608">SUSE bug 1237608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237609">SUSE bug 1237609</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985565" comment="buildah-1.39.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985566" comment="buildah-tests-1.39.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983924" comment="podman-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983925" comment="podman-docker-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983926" comment="podman-plugins-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983927" comment="podman-remote-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983928" comment="podman-tests-5.4.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985976" comment="skopeo-1.18.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985977" comment="skopeo-tests-1.18.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27151" ref_url="https://www.suse.com/security/cve/CVE-2025-27151" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041074.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-27151/">CVE-2025-27151 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27151">CVE-2025-27151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243804">SUSE bug 1243804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011411" comment="redis-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011412" comment="redis-devel-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011413" comment="redis-doc-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27219</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27219" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27219" ref_url="https://www.suse.com/security/cve/CVE-2025-27219" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10217" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001751.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4487" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4493" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023374.html" source="SUSE-SU"/>
    <description>
    In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27219/">CVE-2025-27219 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27219">CVE-2025-27219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237804">SUSE bug 1237804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985952" comment="ruby-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985953" comment="ruby-bundled-gems-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985954" comment="ruby-default-gems-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985955" comment="ruby-devel-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985956" comment="ruby-doc-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985957" comment="ruby-libs-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985958" comment="rubygem-bigdecimal-3.1.5-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985959" comment="rubygem-bundler-2.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985960" comment="rubygem-io-console-0.7.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985961" comment="rubygem-irb-1.13.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985962" comment="rubygem-json-2.7.2-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985963" comment="rubygem-minitest-5.20.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985964" comment="rubygem-power_assert-2.0.3-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985965" comment="rubygem-psych-5.1.2-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985966" comment="rubygem-racc-1.7.3-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985967" comment="rubygem-rake-13.1.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985968" comment="rubygem-rbs-3.4.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985969" comment="rubygem-rdoc-6.6.3.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977574" comment="rubygem-rexml-3.3.9-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977575" comment="rubygem-rss-0.3.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985972" comment="rubygem-test-unit-3.6.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985973" comment="rubygem-typeprof-0.21.9-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985974" comment="rubygems-3.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985975" comment="rubygems-devel-3.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27220</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27220" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27220" ref_url="https://www.suse.com/security/cve/CVE-2025-27220" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4487" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1369-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023374.html" source="SUSE-SU"/>
    <description>
    In the CGI gem before 0.4.2 for Ruby, a Regular Expression Denial of Service (ReDoS) vulnerability exists in the Util#escapeElement method.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27220/">CVE-2025-27220 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27220">CVE-2025-27220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237806">SUSE bug 1237806</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009977557" comment="ruby-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977558" comment="ruby-bundled-gems-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977559" comment="ruby-default-gems-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977560" comment="ruby-devel-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977561" comment="ruby-doc-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977562" comment="ruby-libs-3.1.7-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977563" comment="rubygem-bigdecimal-3.1.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977564" comment="rubygem-bundler-2.3.27-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977565" comment="rubygem-io-console-0.5.11-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977566" comment="rubygem-irb-1.4.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977567" comment="rubygem-json-2.6.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977568" comment="rubygem-minitest-5.15.0-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872260" comment="rubygem-mysql2-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872261" comment="rubygem-mysql2-doc-0.5.4-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872262" comment="rubygem-pg-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009872263" comment="rubygem-pg-doc-1.3.5-1.module+el9.1.0+15737+76195479 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977569" comment="rubygem-power_assert-2.0.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977570" comment="rubygem-psych-4.0.4-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977571" comment="rubygem-rake-13.0.6-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977572" comment="rubygem-rbs-2.7.0-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977573" comment="rubygem-rdoc-6.4.1.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977574" comment="rubygem-rexml-3.3.9-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977575" comment="rubygem-rss-0.3.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977576" comment="rubygem-test-unit-3.5.3-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977577" comment="rubygem-typeprof-0.21.3-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977578" comment="rubygems-3.3.27-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977579" comment="rubygems-devel-3.3.27-146.module+el9.5.0+23003+a4c328ce is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27221</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27221" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27221" ref_url="https://www.suse.com/security/cve/CVE-2025-27221" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10217" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001751.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4493" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02739-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023374.html" source="SUSE-SU"/>
    <description>
    In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.join, URI#merge, URI#+) have an inadvertent leakage of authentication credentials because userinfo is retained even after changing the host.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27221/">CVE-2025-27221 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27221">CVE-2025-27221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237805">SUSE bug 1237805</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985952" comment="ruby-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985953" comment="ruby-bundled-gems-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985954" comment="ruby-default-gems-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985955" comment="ruby-devel-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985956" comment="ruby-doc-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985957" comment="ruby-libs-3.3.8-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985958" comment="rubygem-bigdecimal-3.1.5-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985959" comment="rubygem-bundler-2.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985960" comment="rubygem-io-console-0.7.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985961" comment="rubygem-irb-1.13.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985962" comment="rubygem-json-2.7.2-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985963" comment="rubygem-minitest-5.20.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874724" comment="rubygem-mysql2-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874725" comment="rubygem-mysql2-doc-0.5.5-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985964" comment="rubygem-power_assert-2.0.3-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985965" comment="rubygem-psych-5.1.2-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985966" comment="rubygem-racc-1.7.3-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985967" comment="rubygem-rake-13.1.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985968" comment="rubygem-rbs-3.4.0-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985969" comment="rubygem-rdoc-6.6.3.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977574" comment="rubygem-rexml-3.3.9-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977575" comment="rubygem-rss-0.3.1-146.module+el9.5.0+23003+a4c328ce is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985972" comment="rubygem-test-unit-3.6.1-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985973" comment="rubygem-typeprof-0.21.9-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985974" comment="rubygems-3.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985975" comment="rubygems-devel-3.5.22-4.module+el9.5.0+23030+26c9b8e1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27363</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27363" ref_url="https://www.suse.com/security/cve/CVE-2025-27363" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:2834" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001037.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3407" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001011.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020586.html" source="SUSE-SU"/>
    <description>
    An out of bounds write exists in FreeType versions 2.13.0 and below (newer versions of FreeType are not vulnerable) when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2025-05-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27363/">CVE-2025-27363 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27363">CVE-2025-27363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239465">SUSE bug 1239465</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974188" comment="freetype-2.10.4-10.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974189" comment="freetype-devel-2.10.4-10.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27516</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27516" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27516" ref_url="https://www.suse.com/security/cve/CVE-2025-27516" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000999.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001014.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3406" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1004-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024922.html" source="SUSE-SU"/>
    <description>
    Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-29"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-27516/">CVE-2025-27516 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-27516">CVE-2025-27516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238879">SUSE bug 1238879</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009970406" comment="fence-agents-aliyun-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970407" comment="fence-agents-all-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970408" comment="fence-agents-amt-ws-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970409" comment="fence-agents-apc-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970410" comment="fence-agents-apc-snmp-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970411" comment="fence-agents-aws-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970412" comment="fence-agents-azure-arm-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970413" comment="fence-agents-bladecenter-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970414" comment="fence-agents-brocade-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970415" comment="fence-agents-cisco-mds-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970416" comment="fence-agents-cisco-ucs-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970417" comment="fence-agents-common-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970418" comment="fence-agents-compute-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970419" comment="fence-agents-drac5-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970420" comment="fence-agents-eaton-snmp-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970421" comment="fence-agents-emerson-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970422" comment="fence-agents-eps-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970423" comment="fence-agents-gce-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970424" comment="fence-agents-heuristics-ping-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970425" comment="fence-agents-hpblade-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970426" comment="fence-agents-ibm-powervs-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970427" comment="fence-agents-ibm-vpc-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970428" comment="fence-agents-ibmblade-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970429" comment="fence-agents-ifmib-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970430" comment="fence-agents-ilo-moonshot-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970431" comment="fence-agents-ilo-mp-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970432" comment="fence-agents-ilo-ssh-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970433" comment="fence-agents-ilo2-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970434" comment="fence-agents-intelmodular-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970435" comment="fence-agents-ipdu-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970436" comment="fence-agents-ipmilan-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970437" comment="fence-agents-kdump-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970438" comment="fence-agents-kubevirt-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970439" comment="fence-agents-mpath-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970440" comment="fence-agents-openstack-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970441" comment="fence-agents-redfish-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970442" comment="fence-agents-rhevm-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970443" comment="fence-agents-rsa-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970444" comment="fence-agents-rsb-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970445" comment="fence-agents-sbd-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970446" comment="fence-agents-scsi-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970447" comment="fence-agents-virsh-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970448" comment="fence-agents-vmware-rest-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970449" comment="fence-agents-vmware-soap-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970450" comment="fence-agents-wti-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970451" comment="fence-virt-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970452" comment="fence-virtd-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970453" comment="fence-virtd-cpg-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970454" comment="fence-virtd-libvirt-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970455" comment="fence-virtd-multicast-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970456" comment="fence-virtd-serial-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970457" comment="fence-virtd-tcp-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009970458" comment="ha-cloud-support-4.10.0-76.el9_5.6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974187" comment="python3-jinja2-2.11.3-8.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27613</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27613" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27613" ref_url="https://www.suse.com/security/cve/CVE-2025-27613" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001821.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11534" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042323.html" source="SUSE-SU"/>
    <description>
    Gitk is a Tcl/Tk based Git history browser. Starting with 1.7.0, when a user clones an untrusted repository and runs gitk without additional command arguments, files for which the user has write permission can be created and truncated. The option Support per-file encoding must have been enabled before in Gitk's Preferences. This option is disabled by default. The same happens when Show origin of this line is used in the main window (regardless of whether Support per-file encoding is enabled or not). This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27613/">CVE-2025-27613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27613">CVE-2025-27613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245938">SUSE bug 1245938</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009051" comment="git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009052" comment="git-all-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009053" comment="git-core-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009054" comment="git-core-doc-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009055" comment="git-credential-libsecret-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009056" comment="git-daemon-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009057" comment="git-email-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009058" comment="git-gui-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009059" comment="git-instaweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009060" comment="git-subtree-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009061" comment="git-svn-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009062" comment="gitk-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009063" comment="gitweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009064" comment="perl-Git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009065" comment="perl-Git-SVN-2.47.3-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27614" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27614" ref_url="https://www.suse.com/security/cve/CVE-2025-27614" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001821.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11534" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042323.html" source="SUSE-SU"/>
    <description>
    Gitk is a Tcl/Tk based Git history browser. Starting with 2.41.0, a Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking gitk filename, where filename has a particular structure. The script is run with the privileges of the user. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-10-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27614/">CVE-2025-27614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27614">CVE-2025-27614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245939">SUSE bug 1245939</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009051" comment="git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009052" comment="git-all-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009053" comment="git-core-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009054" comment="git-core-doc-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009055" comment="git-credential-libsecret-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009056" comment="git-daemon-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009057" comment="git-email-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009058" comment="git-gui-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009059" comment="git-instaweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009060" comment="git-subtree-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009061" comment="git-svn-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009062" comment="gitk-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009063" comment="gitweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009064" comment="perl-Git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009065" comment="perl-Git-SVN-2.47.3-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27832</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27832" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27832" ref_url="https://www.suse.com/security/cve/CVE-2025-27832" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7586" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001436.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1118-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038898.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14953-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GBB65P3KU5MBN7SLCFPCDEZ3Y2ACRGXP/" source="SUSE-SU"/>
    <description>
    An issue was discovered in Artifex Ghostscript before 10.05.0. The NPDL device has a Compression buffer overflow for contrib/japanese/gdevnpdl.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-06-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-27832/">CVE-2025-27832 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27832">CVE-2025-27832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240077">SUSE bug 1240077</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985444" comment="ghostscript-9.54.0-19.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985445" comment="ghostscript-doc-9.54.0-19.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985446" comment="ghostscript-tools-dvipdf-9.54.0-19.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985447" comment="ghostscript-tools-fonts-9.54.0-19.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985448" comment="ghostscript-tools-printing-9.54.0-19.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985449" comment="ghostscript-x11-9.54.0-19.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985450" comment="libgs-9.54.0-19.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985451" comment="libgs-devel-9.54.0-19.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2784" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2784" ref_url="https://www.suse.com/security/cve/CVE-2025-2784" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATPKW6OXT3PUHQHSXCXQTRUSRDDEGELB/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. The package is vulnerable to a heap buffer over-read when sniffing content via the skip_insight_whitespace() function. Libsoup clients may read one byte out-of-bounds in response to a crafted HTTP response by an HTTP server.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2784/">CVE-2025-2784 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2784">CVE-2025-2784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240750">SUSE bug 1240750</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984056" comment="libsoup-2.72.0-10.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984057" comment="libsoup-devel-2.72.0-10.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2817" ref_url="https://www.suse.com/security/cve/CVE-2025-2817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001109.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001112.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4460" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039147.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15040-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XHOGC66EWXDTKRZBGGUUDBINOQVJYIKY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6ZBNI7X4V2LGK72WNKGQDBMYZSO5HW3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXN7YKFNUPOTT4RDBIYSLHYZG3DKIOBT/" source="SUSE-SU"/>
    <description>
    Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2817/">CVE-2025-2817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2817">CVE-2025-2817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241621">SUSE bug 1241621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983974" comment="firefox-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983975" comment="firefox-x11-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977556" comment="thunderbird-128.10.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2830" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2830" ref_url="https://www.suse.com/security/cve/CVE-2025-2830" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4229" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001087.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4649" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001119.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKWS5YHK7AB6D4UFHQPWTWDC2B75TA6/" source="SUSE-SU"/>
    <description>
    By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability was fixed in Thunderbird 137.0.2 and Thunderbird 128.9.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="4.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-2830/">CVE-2025-2830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-2830">CVE-2025-2830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241277">SUSE bug 1241277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984017" comment="thunderbird-128.10.0-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3344" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/001003.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7404" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVFAGUWHTVZSJTUAIU6C4S26DP2KIGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDRQUFBQNFRUIM2F2EPVEBMFI6LKYQ4J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14956-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGGR7W7ANU3YEPLMZP3LOTAKB42X53A7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EULP2ZKPR2GRWBMBH66KSSP6XBVLEOIS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4WVLSK4BXQRTF3JIGHVYEEVTW7AMWO4M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SOIW5K4UTSFQ2FUGGOHNDTI4Y4PCBWTB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PKSIUOW7HIED3L6UVUD2KMZSPDHNUTO/" source="SUSE-SU"/>
    <description>
    golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer  followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-03-30"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240441">SUSE bug 1240441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240442">SUSE bug 1240442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985378" comment="grafana-10.2.6-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985379" comment="grafana-selinux-10.2.6-11.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3028" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3028" ref_url="https://www.suse.com/security/cve/CVE-2025-3028" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3556" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001015.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3582" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4169" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4170" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1138-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038923.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WBRCQJYFKUAGSQ5SHW67JST3P5FSU4D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLEINOYG527XRVX4H6KEXEEA4YBKPHTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETNHULRLMLJHZBIZIPSURXJNK2JZWDQP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14975-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DFCJUQ2K4CXOQIEYDJ6TH5U5DJENK6I6/" source="SUSE-SU"/>
    <description>
    JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability was fixed in Firefox 137, Firefox ESR 115.22, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3028/">CVE-2025-3028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3028">CVE-2025-3028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240083">SUSE bug 1240083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974192" comment="firefox-128.9.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974193" comment="firefox-x11-128.9.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976400" comment="thunderbird-128.9.0-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3029" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3029" ref_url="https://www.suse.com/security/cve/CVE-2025-3029" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3556" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001015.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3582" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4169" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4170" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1138-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038923.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WBRCQJYFKUAGSQ5SHW67JST3P5FSU4D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLEINOYG527XRVX4H6KEXEEA4YBKPHTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETNHULRLMLJHZBIZIPSURXJNK2JZWDQP/" source="SUSE-SU"/>
    <description>
    A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability was fixed in Firefox 137, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-3029/">CVE-2025-3029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3029">CVE-2025-3029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240083">SUSE bug 1240083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974192" comment="firefox-128.9.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974193" comment="firefox-x11-128.9.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976400" comment="thunderbird-128.9.0-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3030</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3030" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3030" ref_url="https://www.suse.com/security/cve/CVE-2025-3030" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3556" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001015.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3582" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4169" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4170" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1103-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1138-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1157-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038923.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14961-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WBRCQJYFKUAGSQ5SHW67JST3P5FSU4D/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14966-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLEINOYG527XRVX4H6KEXEEA4YBKPHTQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14971-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ETNHULRLMLJHZBIZIPSURXJNK2JZWDQP/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 137, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-04"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-3030/">CVE-2025-3030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3030">CVE-2025-3030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240083">SUSE bug 1240083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009974192" comment="firefox-128.9.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009974193" comment="firefox-x11-128.9.0-2.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976400" comment="thunderbird-128.9.0-2.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30399</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30399" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30399" ref_url="https://www.suse.com/security/cve/CVE-2025-30399" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8812" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8813" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001644.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001659.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8817" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001642.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-13"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30399/">CVE-2025-30399 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30399">CVE-2025-30399 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986654" comment="aspnetcore-runtime-8.0-8.0.17-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986666" comment="aspnetcore-runtime-9.0-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986655" comment="aspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986667" comment="aspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986656" comment="aspnetcore-targeting-pack-8.0-8.0.17-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986668" comment="aspnetcore-targeting-pack-9.0-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986657" comment="dotnet-apphost-pack-8.0-8.0.17-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986669" comment="dotnet-apphost-pack-9.0-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986670" comment="dotnet-host-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986658" comment="dotnet-hostfxr-8.0-8.0.17-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986671" comment="dotnet-hostfxr-9.0-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986659" comment="dotnet-runtime-8.0-8.0.17-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986672" comment="dotnet-runtime-9.0-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986660" comment="dotnet-runtime-dbg-8.0-8.0.17-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986673" comment="dotnet-runtime-dbg-9.0-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986661" comment="dotnet-sdk-8.0-8.0.117-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986662" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.117-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986674" comment="dotnet-sdk-9.0-9.0.107-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986675" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.107-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986676" comment="dotnet-sdk-aot-9.0-9.0.107-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986663" comment="dotnet-sdk-dbg-8.0-8.0.117-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986677" comment="dotnet-sdk-dbg-9.0-9.0.107-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986664" comment="dotnet-targeting-pack-8.0-8.0.17-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986678" comment="dotnet-targeting-pack-9.0-9.0.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986665" comment="dotnet-templates-8.0-8.0.117-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986679" comment="dotnet-templates-9.0-9.0.107-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986680" comment="netstandard-targeting-pack-2.1-9.0.107-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30427" ref_url="https://www.suse.com/security/cve/CVE-2025-30427" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001026.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7387" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1325-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039058.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, visionOS 2.4, watchOS 11.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-10"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30427/">CVE-2025-30427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30427">CVE-2025-30427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240958">SUSE bug 1240958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983920" comment="webkit2gtk3-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983921" comment="webkit2gtk3-devel-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983922" comment="webkit2gtk3-jsc-2.48.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983923" comment="webkit2gtk3-jsc-devel-2.48.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30472" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30472" ref_url="https://www.suse.com/security/cve/CVE-2025-30472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7201" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038870.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14933-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L63W4FOTC7DCCZ5Z6IDGHNMPP3LXH2YY/" source="SUSE-SU"/>
    <description>
    Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-08-05"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-30472/">CVE-2025-30472 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30472">CVE-2025-30472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239987">SUSE bug 1239987</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985337" comment="corosync-3.1.9-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985338" comment="corosync-vqsim-3.1.9-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985339" comment="corosynclib-3.1.9-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985340" comment="corosynclib-devel-3.1.9-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30681</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30681" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30681" ref_url="https://www.suse.com/security/cve/CVE-2025-30681" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30681/">CVE-2025-30681 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30681">CVE-2025-30681 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30682</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30682" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30682" ref_url="https://www.suse.com/security/cve/CVE-2025-30682" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30682/">CVE-2025-30682 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30682">CVE-2025-30682 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30683</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30683" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30683" ref_url="https://www.suse.com/security/cve/CVE-2025-30683" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30683/">CVE-2025-30683 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30683">CVE-2025-30683 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30684</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30684" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30684" ref_url="https://www.suse.com/security/cve/CVE-2025-30684" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30684/">CVE-2025-30684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30684">CVE-2025-30684 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30685</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30685" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30685" ref_url="https://www.suse.com/security/cve/CVE-2025-30685" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30685/">CVE-2025-30685 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30685">CVE-2025-30685 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30687</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30687" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30687" ref_url="https://www.suse.com/security/cve/CVE-2025-30687" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30687/">CVE-2025-30687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30687">CVE-2025-30687 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30688" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30688" ref_url="https://www.suse.com/security/cve/CVE-2025-30688" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30688/">CVE-2025-30688 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30688">CVE-2025-30688 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30689</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30689" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30689" ref_url="https://www.suse.com/security/cve/CVE-2025-30689" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30689/">CVE-2025-30689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30689">CVE-2025-30689 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30691" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30691" ref_url="https://www.suse.com/security/cve/CVE-2025-30691" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3844" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3845" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001044.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001784.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3852" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3855" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1524-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BRJ4ISGUWDRCC6WFUQ7DJTTNQVMYNV5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6XNBWNLTVY24PY5AGA3UCES65X3SMQN/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-20"/>
	<updated date="2025-11-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30691/">CVE-2025-30691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30691">CVE-2025-30691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241275">SUSE bug 1241275</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976014" comment="java-1.8.0-openjdk-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976015" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976016" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976017" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976018" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976019" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976020" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976021" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976022" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976023" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976024" comment="java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976025" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976026" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976027" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976028" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976029" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976030" comment="java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976031" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976032" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976033" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999610" comment="java-11-openjdk-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999611" comment="java-11-openjdk-demo-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999552" comment="java-11-openjdk-demo-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999553" comment="java-11-openjdk-demo-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999612" comment="java-11-openjdk-devel-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999556" comment="java-11-openjdk-devel-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999557" comment="java-11-openjdk-devel-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999558" comment="java-11-openjdk-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999613" comment="java-11-openjdk-headless-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999561" comment="java-11-openjdk-headless-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999562" comment="java-11-openjdk-headless-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999614" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999615" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999616" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999569" comment="java-11-openjdk-jmods-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999570" comment="java-11-openjdk-jmods-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999571" comment="java-11-openjdk-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999617" comment="java-11-openjdk-src-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999574" comment="java-11-openjdk-src-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999575" comment="java-11-openjdk-src-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999618" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999578" comment="java-11-openjdk-static-libs-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999579" comment="java-11-openjdk-static-libs-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976149" comment="java-17-openjdk-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976150" comment="java-17-openjdk-demo-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976151" comment="java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976152" comment="java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976153" comment="java-17-openjdk-devel-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976154" comment="java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976155" comment="java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976156" comment="java-17-openjdk-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976157" comment="java-17-openjdk-headless-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976158" comment="java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976159" comment="java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976160" comment="java-17-openjdk-javadoc-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976161" comment="java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976162" comment="java-17-openjdk-jmods-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976163" comment="java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976164" comment="java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976165" comment="java-17-openjdk-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976166" comment="java-17-openjdk-src-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976167" comment="java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976168" comment="java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976169" comment="java-17-openjdk-static-libs-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976170" comment="java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976171" comment="java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976253" comment="java-21-openjdk-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976254" comment="java-21-openjdk-demo-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976255" comment="java-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976256" comment="java-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976257" comment="java-21-openjdk-devel-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976258" comment="java-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976259" comment="java-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976260" comment="java-21-openjdk-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976261" comment="java-21-openjdk-headless-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976262" comment="java-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976263" comment="java-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976264" comment="java-21-openjdk-javadoc-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976265" comment="java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976266" comment="java-21-openjdk-jmods-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976267" comment="java-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976268" comment="java-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976269" comment="java-21-openjdk-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976270" comment="java-21-openjdk-src-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976271" comment="java-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976272" comment="java-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976273" comment="java-21-openjdk-static-libs-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976274" comment="java-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976275" comment="java-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30693" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30693" ref_url="https://www.suse.com/security/cve/CVE-2025-30693" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19572" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002214.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19584" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023630.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-30693/">CVE-2025-30693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30693">CVE-2025-30693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249213">SUSE bug 1249213</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024824" comment="galera-26.4.22-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30695" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30695" ref_url="https://www.suse.com/security/cve/CVE-2025-30695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30695/">CVE-2025-30695 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30695">CVE-2025-30695 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30696" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30696" ref_url="https://www.suse.com/security/cve/CVE-2025-30696" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30696/">CVE-2025-30696 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30696">CVE-2025-30696 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30698" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30698" ref_url="https://www.suse.com/security/cve/CVE-2025-30698" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3844" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001096.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3845" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001044.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001784.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3852" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3855" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01487-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01490-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1399-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1524-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020817.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15022-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BRJ4ISGUWDRCC6WFUQ7DJTTNQVMYNV5Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15024-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6XNBWNLTVY24PY5AGA3UCES65X3SMQN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15077-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PTNITOYWDOKJOEHSH2CU5O6OKDMZOEYZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15078-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PQYOZOCMS25XBQWUFJFFM6CS5L66IC5C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15080-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YI5CZCHTIKADEFJKS6K6CGUTIV4PERYD/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-20"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30698/">CVE-2025-30698 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30698">CVE-2025-30698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241274">SUSE bug 1241274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241276">SUSE bug 1241276</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009976014" comment="java-1.8.0-openjdk-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976015" comment="java-1.8.0-openjdk-accessibility-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976016" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976017" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.452.b09-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976018" comment="java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976019" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976020" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976021" comment="java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976022" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976023" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976024" comment="java-1.8.0-openjdk-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976025" comment="java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976026" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976027" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976028" comment="java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976029" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976030" comment="java-1.8.0-openjdk-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976031" comment="java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976032" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976033" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.452.b09-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999610" comment="java-11-openjdk-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999549" comment="java-11-openjdk-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999611" comment="java-11-openjdk-demo-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999551" comment="java-11-openjdk-demo-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999552" comment="java-11-openjdk-demo-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999553" comment="java-11-openjdk-demo-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999612" comment="java-11-openjdk-devel-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999555" comment="java-11-openjdk-devel-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999556" comment="java-11-openjdk-devel-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999557" comment="java-11-openjdk-devel-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999558" comment="java-11-openjdk-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999613" comment="java-11-openjdk-headless-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999560" comment="java-11-openjdk-headless-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999561" comment="java-11-openjdk-headless-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999562" comment="java-11-openjdk-headless-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999614" comment="java-11-openjdk-javadoc-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999564" comment="java-11-openjdk-javadoc-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999615" comment="java-11-openjdk-javadoc-zip-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999566" comment="java-11-openjdk-javadoc-zip-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999616" comment="java-11-openjdk-jmods-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999568" comment="java-11-openjdk-jmods-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999569" comment="java-11-openjdk-jmods-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999570" comment="java-11-openjdk-jmods-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999571" comment="java-11-openjdk-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999617" comment="java-11-openjdk-src-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999573" comment="java-11-openjdk-src-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999574" comment="java-11-openjdk-src-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999575" comment="java-11-openjdk-src-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999618" comment="java-11-openjdk-static-libs-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999577" comment="java-11-openjdk-static-libs-debug-11.0.27.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999578" comment="java-11-openjdk-static-libs-fastdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999579" comment="java-11-openjdk-static-libs-slowdebug-11.0.27.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976149" comment="java-17-openjdk-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976150" comment="java-17-openjdk-demo-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976151" comment="java-17-openjdk-demo-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976152" comment="java-17-openjdk-demo-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976153" comment="java-17-openjdk-devel-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976154" comment="java-17-openjdk-devel-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976155" comment="java-17-openjdk-devel-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976156" comment="java-17-openjdk-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976157" comment="java-17-openjdk-headless-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976158" comment="java-17-openjdk-headless-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976159" comment="java-17-openjdk-headless-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976160" comment="java-17-openjdk-javadoc-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976161" comment="java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976162" comment="java-17-openjdk-jmods-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976163" comment="java-17-openjdk-jmods-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976164" comment="java-17-openjdk-jmods-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976165" comment="java-17-openjdk-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976166" comment="java-17-openjdk-src-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976167" comment="java-17-openjdk-src-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976168" comment="java-17-openjdk-src-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976169" comment="java-17-openjdk-static-libs-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976170" comment="java-17-openjdk-static-libs-fastdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976171" comment="java-17-openjdk-static-libs-slowdebug-17.0.15.0.6-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976253" comment="java-21-openjdk-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976254" comment="java-21-openjdk-demo-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976255" comment="java-21-openjdk-demo-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976256" comment="java-21-openjdk-demo-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976257" comment="java-21-openjdk-devel-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976258" comment="java-21-openjdk-devel-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976259" comment="java-21-openjdk-devel-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976260" comment="java-21-openjdk-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976261" comment="java-21-openjdk-headless-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976262" comment="java-21-openjdk-headless-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976263" comment="java-21-openjdk-headless-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976264" comment="java-21-openjdk-javadoc-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976265" comment="java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976266" comment="java-21-openjdk-jmods-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976267" comment="java-21-openjdk-jmods-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976268" comment="java-21-openjdk-jmods-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976269" comment="java-21-openjdk-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976270" comment="java-21-openjdk-src-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976271" comment="java-21-openjdk-src-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976272" comment="java-21-openjdk-src-slowdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976273" comment="java-21-openjdk-static-libs-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976274" comment="java-21-openjdk-static-libs-fastdebug-21.0.7.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009976275" comment="java-21-openjdk-static-libs-slowdebug-21.0.7.0.6-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30699" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30699" ref_url="https://www.suse.com/security/cve/CVE-2025-30699" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30699/">CVE-2025-30699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30699">CVE-2025-30699 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30703" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30703" ref_url="https://www.suse.com/security/cve/CVE-2025-30703" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30703/">CVE-2025-30703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30703">CVE-2025-30703 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30704" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30704" ref_url="https://www.suse.com/security/cve/CVE-2025-30704" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30704/">CVE-2025-30704 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30704">CVE-2025-30704 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30705" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30705" ref_url="https://www.suse.com/security/cve/CVE-2025-30705" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30705/">CVE-2025-30705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30705">CVE-2025-30705 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30715" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30715" ref_url="https://www.suse.com/security/cve/CVE-2025-30715" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30715/">CVE-2025-30715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30715">CVE-2025-30715 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30721" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30721" ref_url="https://www.suse.com/security/cve/CVE-2025-30721" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-30721/">CVE-2025-30721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30721">CVE-2025-30721 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30722</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30722" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30722" ref_url="https://www.suse.com/security/cve/CVE-2025-30722" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19572" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002214.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19584" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023630.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30722/">CVE-2025-30722 at SUSE</cve>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-30722">CVE-2025-30722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249212">SUSE bug 1249212</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024824" comment="galera-26.4.22-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30749" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30749" ref_url="https://www.suse.com/security/cve/CVE-2025-30749" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001811.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001814.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10873" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02667-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30749/">CVE-2025-30749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30749">CVE-2025-30749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010008294" comment="java-1.8.0-openjdk-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008295" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008296" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008297" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008298" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008299" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008300" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008301" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008302" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008303" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008304" comment="java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008305" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008306" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008307" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008308" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008309" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008310" comment="java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008311" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008312" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008313" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011414" comment="java-11-openjdk-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011415" comment="java-11-openjdk-demo-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011169" comment="java-11-openjdk-demo-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011170" comment="java-11-openjdk-demo-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011416" comment="java-11-openjdk-devel-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011173" comment="java-11-openjdk-devel-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011174" comment="java-11-openjdk-devel-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011175" comment="java-11-openjdk-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011417" comment="java-11-openjdk-headless-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011178" comment="java-11-openjdk-headless-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011179" comment="java-11-openjdk-headless-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011418" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011419" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011420" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011186" comment="java-11-openjdk-jmods-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011187" comment="java-11-openjdk-jmods-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011188" comment="java-11-openjdk-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011421" comment="java-11-openjdk-src-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011191" comment="java-11-openjdk-src-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011192" comment="java-11-openjdk-src-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011422" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011195" comment="java-11-openjdk-static-libs-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011196" comment="java-11-openjdk-static-libs-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007998" comment="java-17-openjdk-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007999" comment="java-17-openjdk-demo-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008000" comment="java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008001" comment="java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008002" comment="java-17-openjdk-devel-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008003" comment="java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008004" comment="java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008005" comment="java-17-openjdk-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008006" comment="java-17-openjdk-headless-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008007" comment="java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008008" comment="java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008009" comment="java-17-openjdk-javadoc-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008010" comment="java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008011" comment="java-17-openjdk-jmods-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008012" comment="java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008013" comment="java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008014" comment="java-17-openjdk-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008015" comment="java-17-openjdk-src-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008016" comment="java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008017" comment="java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008018" comment="java-17-openjdk-static-libs-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008019" comment="java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008020" comment="java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022816" comment="java-21-openjdk-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022817" comment="java-21-openjdk-demo-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022818" comment="java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022819" comment="java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022820" comment="java-21-openjdk-devel-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022821" comment="java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022822" comment="java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022823" comment="java-21-openjdk-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022824" comment="java-21-openjdk-headless-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022825" comment="java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022826" comment="java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022827" comment="java-21-openjdk-javadoc-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022828" comment="java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022829" comment="java-21-openjdk-jmods-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022830" comment="java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022831" comment="java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022832" comment="java-21-openjdk-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022833" comment="java-21-openjdk-src-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022834" comment="java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022835" comment="java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022836" comment="java-21-openjdk-static-libs-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022837" comment="java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022838" comment="java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30754</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30754" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30754" ref_url="https://www.suse.com/security/cve/CVE-2025-30754" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001811.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001814.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10873" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02667-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30754/">CVE-2025-30754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30754">CVE-2025-30754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246598">SUSE bug 1246598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010008294" comment="java-1.8.0-openjdk-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008295" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008296" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008297" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008298" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008299" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008300" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008301" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008302" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008303" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008304" comment="java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008305" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008306" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008307" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008308" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008309" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008310" comment="java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008311" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008312" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008313" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011414" comment="java-11-openjdk-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011415" comment="java-11-openjdk-demo-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011169" comment="java-11-openjdk-demo-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011170" comment="java-11-openjdk-demo-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011416" comment="java-11-openjdk-devel-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011173" comment="java-11-openjdk-devel-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011174" comment="java-11-openjdk-devel-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011175" comment="java-11-openjdk-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011417" comment="java-11-openjdk-headless-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011178" comment="java-11-openjdk-headless-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011179" comment="java-11-openjdk-headless-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011418" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011419" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011420" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011186" comment="java-11-openjdk-jmods-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011187" comment="java-11-openjdk-jmods-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011188" comment="java-11-openjdk-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011421" comment="java-11-openjdk-src-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011191" comment="java-11-openjdk-src-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011192" comment="java-11-openjdk-src-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011422" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011195" comment="java-11-openjdk-static-libs-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011196" comment="java-11-openjdk-static-libs-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007998" comment="java-17-openjdk-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007999" comment="java-17-openjdk-demo-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008000" comment="java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008001" comment="java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008002" comment="java-17-openjdk-devel-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008003" comment="java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008004" comment="java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008005" comment="java-17-openjdk-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008006" comment="java-17-openjdk-headless-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008007" comment="java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008008" comment="java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008009" comment="java-17-openjdk-javadoc-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008010" comment="java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008011" comment="java-17-openjdk-jmods-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008012" comment="java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008013" comment="java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008014" comment="java-17-openjdk-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008015" comment="java-17-openjdk-src-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008016" comment="java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008017" comment="java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008018" comment="java-17-openjdk-static-libs-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008019" comment="java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008020" comment="java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022816" comment="java-21-openjdk-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022817" comment="java-21-openjdk-demo-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022818" comment="java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022819" comment="java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022820" comment="java-21-openjdk-devel-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022821" comment="java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022822" comment="java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022823" comment="java-21-openjdk-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022824" comment="java-21-openjdk-headless-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022825" comment="java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022826" comment="java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022827" comment="java-21-openjdk-javadoc-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022828" comment="java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022829" comment="java-21-openjdk-jmods-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022830" comment="java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022831" comment="java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022832" comment="java-21-openjdk-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022833" comment="java-21-openjdk-src-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022834" comment="java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022835" comment="java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022836" comment="java-21-openjdk-static-libs-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022837" comment="java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022838" comment="java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30761" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30761" ref_url="https://www.suse.com/security/cve/CVE-2025-30761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001811.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-19"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-30761/">CVE-2025-30761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30761">CVE-2025-30761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246580">SUSE bug 1246580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010008294" comment="java-1.8.0-openjdk-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008295" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008296" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008297" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008298" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008299" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008300" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008301" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008302" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008303" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008304" comment="java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008305" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008306" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008307" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008308" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008309" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008310" comment="java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008311" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008312" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008313" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011414" comment="java-11-openjdk-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011415" comment="java-11-openjdk-demo-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011169" comment="java-11-openjdk-demo-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011170" comment="java-11-openjdk-demo-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011416" comment="java-11-openjdk-devel-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011173" comment="java-11-openjdk-devel-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011174" comment="java-11-openjdk-devel-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011175" comment="java-11-openjdk-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011417" comment="java-11-openjdk-headless-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011178" comment="java-11-openjdk-headless-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011179" comment="java-11-openjdk-headless-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011418" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011419" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011420" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011186" comment="java-11-openjdk-jmods-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011187" comment="java-11-openjdk-jmods-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011188" comment="java-11-openjdk-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011421" comment="java-11-openjdk-src-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011191" comment="java-11-openjdk-src-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011192" comment="java-11-openjdk-src-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011422" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011195" comment="java-11-openjdk-static-libs-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011196" comment="java-11-openjdk-static-libs-slowdebug-11.0.28.0.6-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack:  an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054130" comment="runc-1.3.0-4.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31204" ref_url="https://www.suse.com/security/cve/CVE-2025-31204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040413.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-31204/">CVE-2025-31204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31204">CVE-2025-31204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243286">SUSE bug 1243286</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31205</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31205" ref_url="https://www.suse.com/security/cve/CVE-2025-31205" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7995" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001525.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040413.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. A malicious website may exfiltrate data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-31205/">CVE-2025-31205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31205">CVE-2025-31205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243282">SUSE bug 1243282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985470" comment="webkit2gtk3-2.48.2-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985471" comment="webkit2gtk3-devel-2.48.2-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985472" comment="webkit2gtk3-jsc-2.48.2-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985473" comment="webkit2gtk3-jsc-devel-2.48.2-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31206" ref_url="https://www.suse.com/security/cve/CVE-2025-31206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040413.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, iPadOS 17.7.7, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31206/">CVE-2025-31206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31206">CVE-2025-31206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243288">SUSE bug 1243288</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31215</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31215" ref_url="https://www.suse.com/security/cve/CVE-2025-31215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040413.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, iPadOS 17.7.7, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-31215/">CVE-2025-31215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31215">CVE-2025-31215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243289">SUSE bug 1243289</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009806650" comment="webkit2gtk3-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806651" comment="webkit2gtk3-devel-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806652" comment="webkit2gtk3-jsc-2.38.5-1.el9_2.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009806653" comment="webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31223</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31223" ref_url="https://www.suse.com/security/cve/CVE-2025-31223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31223/">CVE-2025-31223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31223">CVE-2025-31223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259949">SUSE bug 1259949</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022618" comment="webkit2gtk3-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022619" comment="webkit2gtk3-devel-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022620" comment="webkit2gtk3-jsc-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022621" comment="webkit2gtk3-jsc-devel-2.50.1-0.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31257</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31257" ref_url="https://www.suse.com/security/cve/CVE-2025-31257" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7995" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001525.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01746-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02033-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040413.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved memory handling. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31257/">CVE-2025-31257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31257">CVE-2025-31257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243596">SUSE bug 1243596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985470" comment="webkit2gtk3-2.48.2-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985471" comment="webkit2gtk3-devel-2.48.2-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985472" comment="webkit2gtk3-jsc-2.48.2-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985473" comment="webkit2gtk3-jsc-devel-2.48.2-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31273" ref_url="https://www.suse.com/security/cve/CVE-2025-31273" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31273/">CVE-2025-31273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31273">CVE-2025-31273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247564">SUSE bug 1247564</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31277" ref_url="https://www.suse.com/security/cve/CVE-2025-31277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31277/">CVE-2025-31277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31277">CVE-2025-31277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259948">SUSE bug 1259948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022618" comment="webkit2gtk3-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022619" comment="webkit2gtk3-devel-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022620" comment="webkit2gtk3-jsc-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022621" comment="webkit2gtk3-jsc-devel-2.50.1-0.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31278</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31278" ref_url="https://www.suse.com/security/cve/CVE-2025-31278" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31278/">CVE-2025-31278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31278">CVE-2025-31278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247563">SUSE bug 1247563</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31492</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31492" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31492" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31492" ref_url="https://www.suse.com/security/cve/CVE-2025-31492" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001043.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7419" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1286-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1465-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14972-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UVSFHJSVTYXCGOB23YKUXLYGYQ2KA5HL/" source="SUSE-SU"/>
    <description>
    mod_auth_openidc is an OpenID Certified authentication and authorization module for the Apache 2.x HTTP server that implements the OpenID Connect Relying Party functionality. Prior to 2.4.16.11, a bug in a mod_auth_openidc results in disclosure of protected content to unauthenticated users. The conditions for disclosure are an OIDCProviderAuthRequestMethod POST, a valid account, and there mustn't be any application-level gateway (or load balancer etc) protecting the server. When you request a protected resource, the response includes the HTTP status, the HTTP headers, the intended response (the self-submitting form), and the protected resource (with no headers). This is an example of a request for a protected resource, including all the data returned. In the case where mod_auth_openidc returns a form, it has to return OK from check_userid so as not to go down the error path in httpd. This means httpd will try to issue the protected resource. oidc_content_handler is called early, which has the opportunity to prevent the normal output being issued by httpd. oidc_content_handler has a number of checks for when it intervenes, but it doesn't check for this case, so the handler returns DECLINED. Consequently, httpd appends the protected content to the response. The issue has been patched in mod_auth_openidc versions &gt;= 2.4.16.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-12-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31492/">CVE-2025-31492 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31492">CVE-2025-31492 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240893">SUSE bug 1240893</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983963" comment="mod_auth_openidc-2.4.10-1.el9_6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31498" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31498" ref_url="https://www.suse.com/security/cve/CVE-2025-31498" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4461" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7426" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001524.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001308.html" source="SUSE-SU"/>
    <description>
    c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-06-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31498/">CVE-2025-31498 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31498">CVE-2025-31498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240955">SUSE bug 1240955</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984007" comment="nodejs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984008" comment="nodejs-devel-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984009" comment="nodejs-docs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984010" comment="nodejs-full-i18n-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984011" comment="nodejs-libs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984012" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984013" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984014" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984015" comment="npm-10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984016" comment="v8-12.4-devel-12.4.254.21-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3155</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3155" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3155" ref_url="https://www.suse.com/security/cve/CVE-2025-3155" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7430" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001304.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7569" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01904-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02168-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02170-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023375.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15167-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/T4HL3S3XNP5C4Q7YW3W22GDBDEEXQDW2/" source="SUSE-SU"/>
    <description>
    A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-11-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3155/">CVE-2025-3155 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3155">CVE-2025-3155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240688">SUSE bug 1240688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983979" comment="yelp-40.3-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983980" comment="yelp-devel-40.3-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983981" comment="yelp-libs-40.3-2.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3158" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3158" ref_url="https://www.suse.com/security/cve/CVE-2025-3158" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001904.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. Affected by this issue is the function Assimp::LWO::AnimResolver::UpdateAnimRangeSetup of the file code/AssetLib/LWO/LWOAnimation.cpp of the component LWO File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-12"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-3158/">CVE-2025-3158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3158">CVE-2025-3158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240773">SUSE bug 1240773</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013277" comment="qt5-qt3d-5.15.9-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013278" comment="qt5-qt3d-devel-5.15.9-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013279" comment="qt5-qt3d-examples-5.15.9-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3159" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3159" ref_url="https://www.suse.com/security/cve/CVE-2025-3159" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001904.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASE::Parser::ParseLV4MeshBonesVertices of the file code/AssetLib/ASE/ASEParser.cpp of the component ASE File Handler. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is e8a6286542924e628e02749c4f5ac4f91fdae71b. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-12"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-3159/">CVE-2025-3159 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3159">CVE-2025-3159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240774">SUSE bug 1240774</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013277" comment="qt5-qt3d-5.15.9-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013278" comment="qt5-qt3d-devel-5.15.9-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013279" comment="qt5-qt3d-examples-5.15.9-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31650</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31650" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31650" ref_url="https://www.suse.com/security/cve/CVE-2025-31650" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11333" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001810.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11335" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039204.html" source="SUSE-SU"/>
    <description>
    Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.

This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.90 though 8.5.100.


Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-08-09"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31650/">CVE-2025-31650 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31650">CVE-2025-31650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242008">SUSE bug 1242008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010008048" comment="tomcat-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008049" comment="tomcat-admin-webapps-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008050" comment="tomcat-docs-webapp-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008051" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008052" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008053" comment="tomcat-lib-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008054" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008055" comment="tomcat-webapps-9.0.87-3.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31651</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31651" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31651" ref_url="https://www.suse.com/security/cve/CVE-2025-31651" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23044" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002390.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002284.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01882-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.  For a subset of unlikely rewrite rule configurations, it was possible 
for a specially crafted request to bypass some rewrite rules. If those 
rewrite rules effectively enforced security constraints, those 
constraints could be bypassed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions 
may also be affected.


Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-31651/">CVE-2025-31651 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31651">CVE-2025-31651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242009">SUSE bug 1242009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054368" comment="tomcat-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054369" comment="tomcat-admin-webapps-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054370" comment="tomcat-docs-webapp-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054371" comment="tomcat-el-3.0-api-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054372" comment="tomcat-jsp-2.3-api-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054373" comment="tomcat-lib-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054374" comment="tomcat-servlet-4.0-api-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054375" comment="tomcat-webapps-9.0.87-6.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32023" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32023" ref_url="https://www.suse.com/security/cve/CVE-2025-32023" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001823.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12006" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02593-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02594-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041520.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-09-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32023/">CVE-2025-32023 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32023">CVE-2025-32023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246059">SUSE bug 1246059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011411" comment="redis-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011412" comment="redis-devel-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011413" comment="redis-doc-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240751">SUSE bug 1240751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984056" comment="libsoup-2.72.0-10.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984057" comment="libsoup-devel-2.72.0-10.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32050</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32050" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32050" ref_url="https://www.suse.com/security/cve/CVE-2025-32050" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATPKW6OXT3PUHQHSXCXQTRUSRDDEGELB/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. The libsoup append_param_quoted() function may contain an overflow bug resulting in a buffer under-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32050/">CVE-2025-32050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32050">CVE-2025-32050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240752">SUSE bug 1240752</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32052" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32052" ref_url="https://www.suse.com/security/cve/CVE-2025-32052" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATPKW6OXT3PUHQHSXCXQTRUSRDDEGELB/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. A vulnerability in the sniff_unknown() function may lead to heap buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32052/">CVE-2025-32052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32052">CVE-2025-32052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240756">SUSE bug 1240756</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32053" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32053" ref_url="https://www.suse.com/security/cve/CVE-2025-32053" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15018-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ATPKW6OXT3PUHQHSXCXQTRUSRDDEGELB/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. A vulnerability in sniff_feed_or_html() and skip_insignificant_space() functions may lead to a heap buffer over-read.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32053/">CVE-2025-32053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32053">CVE-2025-32053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240757">SUSE bug 1240757</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32365</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32365" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32365" ref_url="https://www.suse.com/security/cve/CVE-2025-32365" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003164.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0130" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002349.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039062.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14976-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ULCQ4B6UIFAO47KDNU5W3OK2BBKAPINE/" source="SUSE-SU"/>
    <description>
    Poppler before 25.04.0 allows crafted input files to trigger out-of-bounds reads in the JBIG2Bitmap::combine function in JBIG2Stream.cc because of a misplaced isOk check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32365/">CVE-2025-32365 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32365">CVE-2025-32365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240881">SUSE bug 1240881</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054548" comment="poppler-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054549" comment="poppler-cpp-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054550" comment="poppler-cpp-devel-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054551" comment="poppler-devel-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054552" comment="poppler-glib-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054553" comment="poppler-glib-devel-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054554" comment="poppler-glib-doc-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054555" comment="poppler-qt5-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054556" comment="poppler-qt5-devel-21.01.0-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054557" comment="poppler-utils-21.01.0-23.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32414</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32414" ref_url="https://www.suse.com/security/cve/CVE-2025-32414" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001885.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20364-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HN7F2PARWMCPSROOCFF3CWKQYVSIH4RA/" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-09"/>
	<updated date="2025-08-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-32414/">CVE-2025-32414 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32414">CVE-2025-32414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241551">SUSE bug 1241551</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013159" comment="libxml2-2.9.13-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013160" comment="libxml2-devel-2.9.13-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013161" comment="python3-libxml2-2.9.13-12.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32415" ref_url="https://www.suse.com/security/cve/CVE-2025-32415" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13203" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001881.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001885.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20364-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039495.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15019-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HN7F2PARWMCPSROOCFF3CWKQYVSIH4RA/" source="SUSE-SU"/>
    <description>
    In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-09"/>
	<updated date="2025-09-18"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-32415/">CVE-2025-32415 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32415">CVE-2025-32415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241453">SUSE bug 1241453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013159" comment="libxml2-2.9.13-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013160" comment="libxml2-devel-2.9.13-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013161" comment="python3-libxml2-2.9.13-12.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32462</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32462" ref_url="https://www.suse.com/security/cve/CVE-2025-32462" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001749.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10871" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001790.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9978" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02177-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20478-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20489-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040932.html" source="SUSE-SU"/>
    <description>
    Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-02"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32462/">CVE-2025-32462 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32462">CVE-2025-32462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245274">SUSE bug 1245274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009997968" comment="sudo-1.9.5p2-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997969" comment="sudo-python-plugin-1.9.5p2-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3277" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3277" ref_url="https://www.suse.com/security/cve/CVE-2025-3277" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4459" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01456-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040536.html" source="SUSE-SU"/>
    <description>
    An integer overflow can be triggered in SQLite's `concat_ws()` function. The resulting, truncated integer is then used to allocate a buffer. When SQLite then writes the resulting string to the buffer, it uses the original, untruncated size and thus a wild Heap Buffer overflow of size ~4GB can be triggered. This can result in arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3277/">CVE-2025-3277 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3277">CVE-2025-3277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241189">SUSE bug 1241189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984007" comment="nodejs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984008" comment="nodejs-devel-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984009" comment="nodejs-docs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984010" comment="nodejs-full-i18n-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984011" comment="nodejs-libs-22.15.0-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984012" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984013" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984014" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984015" comment="npm-10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984016" comment="v8-12.4-devel-12.4.254.21-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32906</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32906" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32906" ref_url="https://www.suse.com/security/cve/CVE-2025-32906" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup, where the soup_headers_parse_request() function may be vulnerable to an out-of-bound read. This flaw allows a malicious user to use a specially crafted HTTP request to crash the HTTP server.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32906/">CVE-2025-32906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32906">CVE-2025-32906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241263">SUSE bug 1241263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32907</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32907" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32907" ref_url="https://www.suse.com/security/cve/CVE-2025-32907" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15043-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JS6PNVCOLUDSMBH7ZH22MAN2ZTSKVB7Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53THXHSDPP4TLMFRSP5DPLY4DK72M7XY/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. The implementation of HTTP range requests is vulnerable to a resource consumption attack. This flaw allows a malicious client to request the same range many times in a single HTTP request, causing the server to use large amounts of memory. This does not allow for a full denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32907/">CVE-2025-32907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32907">CVE-2025-32907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241222">SUSE bug 1241222</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32911</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32911" ref_url="https://www.suse.com/security/cve/CVE-2025-32911" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023643.html" source="SUSE-SU"/>
    <description>
    A use-after-free type vulnerability was found in libsoup, in the soup_message_headers_get_content_disposition() function. This flaw allows a malicious HTTP client to cause memory corruption in the libsoup server.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-32911/">CVE-2025-32911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32911">CVE-2025-32911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241238">SUSE bug 1241238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32913" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32913" ref_url="https://www.suse.com/security/cve/CVE-2025-32913" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup, where the soup_message_headers_get_content_disposition() function is vulnerable to a NULL pointer dereference. This flaw allows a malicious HTTP peer to crash a libsoup client or server that uses this function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-32913/">CVE-2025-32913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32913">CVE-2025-32913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241162">SUSE bug 1241162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32914" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32914" ref_url="https://www.suse.com/security/cve/CVE-2025-32914" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15015-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S22JSK2XZAOA2FDRSMJRCA7U6HIFDWLZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53THXHSDPP4TLMFRSP5DPLY4DK72M7XY/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup, where the soup_multipart_new_from_message() function is vulnerable to an out-of-bounds read. This flaw allows a malicious HTTP client to induce the libsoup server to read out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-32914/">CVE-2025-32914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32914">CVE-2025-32914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241164">SUSE bug 1241164</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984056" comment="libsoup-2.72.0-10.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984057" comment="libsoup-devel-2.72.0-10.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32988</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32988" ref_url="https://www.suse.com/security/cve/CVE-2025-32988" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16116" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002031.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17415" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02340-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022483.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GnuTLS. A double-free vulnerability exists in GnuTLS due to incorrect ownership handling in the export logic of Subject Alternative Name (SAN) entries containing an otherName. If the type-id OID is invalid or malformed, GnuTLS will call asn1_delete_structure() on an ASN.1 node it does not own, leading to a double-free condition when the parent function or caller later attempts to free the same structure.

This vulnerability can be triggered using only public GnuTLS APIs and may result in denial of service or memory corruption, depending on allocator behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32988/">CVE-2025-32988 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32988">CVE-2025-32988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246232">SUSE bug 1246232</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018662" comment="gnutls-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018663" comment="gnutls-c++-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018664" comment="gnutls-dane-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018665" comment="gnutls-devel-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018666" comment="gnutls-utils-3.8.3-6.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32989" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32989" ref_url="https://www.suse.com/security/cve/CVE-2025-32989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16116" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002031.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02340-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022483.html" source="SUSE-SU"/>
    <description>
    A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-09-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32989/">CVE-2025-32989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32989">CVE-2025-32989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246233">SUSE bug 1246233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018662" comment="gnutls-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018663" comment="gnutls-c++-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018664" comment="gnutls-dane-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018665" comment="gnutls-devel-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018666" comment="gnutls-utils-3.8.3-6.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32990</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32990" ref_url="https://www.suse.com/security/cve/CVE-2025-32990" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16116" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002031.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17415" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02340-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02520-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022483.html" source="SUSE-SU"/>
    <description>
    A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32990/">CVE-2025-32990 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-32990">CVE-2025-32990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246267">SUSE bug 1246267</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018662" comment="gnutls-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018663" comment="gnutls-c++-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018664" comment="gnutls-dane-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018665" comment="gnutls-devel-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018666" comment="gnutls-utils-3.8.3-6.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3522</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3522" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3522" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3522" ref_url="https://www.suse.com/security/cve/CVE-2025-3522" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4229" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001087.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4649" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001119.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKWS5YHK7AB6D4UFHQPWTWDC2B75TA6/" source="SUSE-SU"/>
    <description>
    Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to  determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability was fixed in Thunderbird 137.0.2 and Thunderbird 128.9.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3522/">CVE-2025-3522 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3522">CVE-2025-3522 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241277">SUSE bug 1241277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984017" comment="thunderbird-128.10.0-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3523</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3523" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3523" ref_url="https://www.suse.com/security/cve/CVE-2025-3523" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4229" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001087.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4649" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001119.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-April/020740.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15000-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKWS5YHK7AB6D4UFHQPWTWDC2B75TA6/" source="SUSE-SU"/>
    <description>
    When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability was fixed in Thunderbird 137.0.2 and Thunderbird 128.9.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-04-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3523/">CVE-2025-3523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3523">CVE-2025-3523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241277">SUSE bug 1241277</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984017" comment="thunderbird-128.10.0-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3576</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3576" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3576" ref_url="https://www.suse.com/security/cve/CVE-2025-3576" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8411" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001579.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9430" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03227-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20719-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024180.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the MIT Kerberos implementation allows GSSAPI-protected messages using RC4-HMAC-MD5 to be spoofed due to weaknesses in the MD5 checksum design. If RC4 is preferred over stronger encryption types, an attacker could exploit MD5 collisions to forge message integrity codes. This may lead to unauthorized message tampering.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3576/">CVE-2025-3576 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3576">CVE-2025-3576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241218">SUSE bug 1241218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996924" comment="krb5-devel-1.21.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996925" comment="krb5-libs-1.21.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996926" comment="krb5-pkinit-1.21.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996927" comment="krb5-server-1.21.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996928" comment="krb5-server-ldap-1.21.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996929" comment="krb5-workstation-1.21.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996930" comment="libkadm5-1.21.1-8.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37738</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37738" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37738" ref_url="https://www.suse.com/security/cve/CVE-2025-37738" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001807.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: ignore xattrs past end

Once inside 'ext4_xattr_inode_dec_ref_all' we should
ignore xattrs entries past the 'end' entry.

This fixes the following KASAN reported issue:

==================================================================
BUG: KASAN: slab-use-after-free in ext4_xattr_inode_dec_ref_all+0xb8c/0xe90
Read of size 4 at addr ffff888012c120c4 by task repro/2065

CPU: 1 UID: 0 PID: 2065 Comm: repro Not tainted 6.13.0-rc2+ #11
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x1fd/0x300
 ? tcp_gro_dev_warn+0x260/0x260
 ? _printk+0xc0/0x100
 ? read_lock_is_recursive+0x10/0x10
 ? irq_work_queue+0x72/0xf0
 ? __virt_addr_valid+0x17b/0x4b0
 print_address_description+0x78/0x390
 print_report+0x107/0x1f0
 ? __virt_addr_valid+0x17b/0x4b0
 ? __virt_addr_valid+0x3ff/0x4b0
 ? __phys_addr+0xb5/0x160
 ? ext4_xattr_inode_dec_ref_all+0xb8c/0xe90
 kasan_report+0xcc/0x100
 ? ext4_xattr_inode_dec_ref_all+0xb8c/0xe90
 ext4_xattr_inode_dec_ref_all+0xb8c/0xe90
 ? ext4_xattr_delete_inode+0xd30/0xd30
 ? __ext4_journal_ensure_credits+0x5f0/0x5f0
 ? __ext4_journal_ensure_credits+0x2b/0x5f0
 ? inode_update_timestamps+0x410/0x410
 ext4_xattr_delete_inode+0xb64/0xd30
 ? ext4_truncate+0xb70/0xdc0
 ? ext4_expand_extra_isize_ea+0x1d20/0x1d20
 ? __ext4_mark_inode_dirty+0x670/0x670
 ? ext4_journal_check_start+0x16f/0x240
 ? ext4_inode_is_fast_symlink+0x2f2/0x3a0
 ext4_evict_inode+0xc8c/0xff0
 ? ext4_inode_is_fast_symlink+0x3a0/0x3a0
 ? do_raw_spin_unlock+0x53/0x8a0
 ? ext4_inode_is_fast_symlink+0x3a0/0x3a0
 evict+0x4ac/0x950
 ? proc_nr_inodes+0x310/0x310
 ? trace_ext4_drop_inode+0xa2/0x220
 ? _raw_spin_unlock+0x1a/0x30
 ? iput+0x4cb/0x7e0
 do_unlinkat+0x495/0x7c0
 ? try_break_deleg+0x120/0x120
 ? 0xffffffff81000000
 ? __check_object_size+0x15a/0x210
 ? strncpy_from_user+0x13e/0x250
 ? getname_flags+0x1dc/0x530
 __x64_sys_unlinkat+0xc8/0xf0
 do_syscall_64+0x65/0x110
 entry_SYSCALL_64_after_hwframe+0x67/0x6f
RIP: 0033:0x434ffd
Code: 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 8
RSP: 002b:00007ffc50fa7b28 EFLAGS: 00000246 ORIG_RAX: 0000000000000107
RAX: ffffffffffffffda RBX: 00007ffc50fa7e18 RCX: 0000000000434ffd
RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000005
RBP: 00007ffc50fa7be0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
R13: 00007ffc50fa7e08 R14: 00000000004bbf30 R15: 0000000000000001
 &lt;/TASK&gt;

The buggy address belongs to the object at ffff888012c12000
 which belongs to the cache filp of size 360
The buggy address is located 196 bytes inside of
 freed 360-byte region [ffff888012c12000, ffff888012c12168)

The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12c12
head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
flags: 0x40(head|node=0|zone=0)
page_type: f5(slab)
raw: 0000000000000040 ffff888000ad7640 ffffea0000497a00 dead000000000004
raw: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
head: 0000000000000040 ffff888000ad7640 ffffea0000497a00 dead000000000004
head: 0000000000000000 0000000000100010 00000001f5000000 0000000000000000
head: 0000000000000001 ffffea00004b0481 ffffffffffffffff 0000000000000000
head: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888012c11f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 ffff888012c12000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
&gt; ffff888012c12080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                           ^
 ffff888012c12100: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc
 ffff888012c12180: fc fc fc fc fc fc fc fc fc
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37738/">CVE-2025-37738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37738">CVE-2025-37738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242846">SUSE bug 1242846</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996844" comment="kernel-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996845" comment="kernel-abi-stablelists-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996846" comment="kernel-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996847" comment="kernel-cross-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996848" comment="kernel-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996849" comment="kernel-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996852" comment="kernel-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996853" comment="kernel-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996854" comment="kernel-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996855" comment="kernel-debug-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996858" comment="kernel-doc-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996859" comment="kernel-headers-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996860" comment="kernel-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996861" comment="kernel-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996862" comment="kernel-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996863" comment="kernel-rt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996864" comment="kernel-rt-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996865" comment="kernel-rt-debug-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996866" comment="kernel-rt-debug-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996868" comment="kernel-rt-debug-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996869" comment="kernel-rt-debug-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996870" comment="kernel-rt-debug-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996871" comment="kernel-rt-debug-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996873" comment="kernel-rt-kvm-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996874" comment="kernel-rt-modules-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996875" comment="kernel-rt-modules-core-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996876" comment="kernel-rt-modules-extra-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996877" comment="kernel-tools-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996878" comment="kernel-tools-libs-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996880" comment="kernel-uki-virt-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996881" comment="kernel-uki-virt-addons-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996882" comment="libperf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996883" comment="perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996884" comment="python3-perf-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996885" comment="rtla-5.14.0-570.23.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996886" comment="rv-5.14.0-570.23.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37749" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37749" ref_url="https://www.suse.com/security/cve/CVE-2025-37749" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7903" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ppp: Add bound checking for skb data on ppp_sync_txmung

Ensure we have enough data in linear buffer from skb before accessing
initial bytes. This prevents potential out-of-bounds accesses
when processing short packets.

When ppp_sync_txmung receives an incoming package with an empty
payload:
(remote) gef&gt;&gt;  p *(struct pppoe_hdr *) (skb-&gt;head + skb-&gt;network_header)
$18 = {
	type = 0x1,
	ver = 0x1,
	code = 0x0,
	sid = 0x2,
        length = 0x0,
	tag = 0xffff8880371cdb96
}

from the skb struct (trimmed)
      tail = 0x16,
      end = 0x140,
      head = 0xffff88803346f400 "4",
      data = 0xffff88803346f416 ":\377",
      truesize = 0x380,
      len = 0x0,
      data_len = 0x0,
      mac_len = 0xe,
      hdr_len = 0x0,

it is not safe to access data[2].

[pabeni@redhat.com: fixed subj typo]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-03"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37749/">CVE-2025-37749 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37749">CVE-2025-37749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242859">SUSE bug 1242859</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985610" comment="kernel-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985611" comment="kernel-abi-stablelists-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985612" comment="kernel-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985613" comment="kernel-cross-headers-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985614" comment="kernel-debug-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985615" comment="kernel-debug-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985618" comment="kernel-debug-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985619" comment="kernel-debug-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985620" comment="kernel-debug-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985621" comment="kernel-debug-uki-virt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985624" comment="kernel-doc-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985625" comment="kernel-headers-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985626" comment="kernel-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985627" comment="kernel-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985628" comment="kernel-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985629" comment="kernel-rt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985630" comment="kernel-rt-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985631" comment="kernel-rt-debug-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985632" comment="kernel-rt-debug-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985634" comment="kernel-rt-debug-kvm-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985635" comment="kernel-rt-debug-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985636" comment="kernel-rt-debug-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985637" comment="kernel-rt-debug-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985639" comment="kernel-rt-kvm-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985640" comment="kernel-rt-modules-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985641" comment="kernel-rt-modules-core-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985642" comment="kernel-rt-modules-extra-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985643" comment="kernel-tools-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985644" comment="kernel-tools-libs-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985646" comment="kernel-uki-virt-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985647" comment="kernel-uki-virt-addons-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985648" comment="libperf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985649" comment="perf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985650" comment="python3-perf-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985651" comment="rtla-5.14.0-570.17.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985652" comment="rv-5.14.0-570.17.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37750</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37750" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37750" ref_url="https://www.suse.com/security/cve/CVE-2025-37750" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix UAF in decryption with multichannel

After commit f7025d861694 ("smb: client: allocate crypto only for
primary server") and commit b0abcd65ec54 ("smb: client: fix UAF in
async decryption"), the channels started reusing AEAD TFM from primary
channel to perform synchronous decryption, but that can't done as
there could be multiple cifsd threads (one per channel) simultaneously
accessing it to perform decryption.

This fixes the following KASAN splat when running fstest generic/249
with 'vers=3.1.1,multichannel,max_channels=4,seal' against Windows
Server 2022:

BUG: KASAN: slab-use-after-free in gf128mul_4k_lle+0xba/0x110
Read of size 8 at addr ffff8881046c18a0 by task cifsd/986
CPU: 3 UID: 0 PID: 986 Comm: cifsd Not tainted 6.15.0-rc1 #1
PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-3.fc41
04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x5d/0x80
 print_report+0x156/0x528
 ? gf128mul_4k_lle+0xba/0x110
 ? __virt_addr_valid+0x145/0x300
 ? __phys_addr+0x46/0x90
 ? gf128mul_4k_lle+0xba/0x110
 kasan_report+0xdf/0x1a0
 ? gf128mul_4k_lle+0xba/0x110
 gf128mul_4k_lle+0xba/0x110
 ghash_update+0x189/0x210
 shash_ahash_update+0x295/0x370
 ? __pfx_shash_ahash_update+0x10/0x10
 ? __pfx_shash_ahash_update+0x10/0x10
 ? __pfx_extract_iter_to_sg+0x10/0x10
 ? ___kmalloc_large_node+0x10e/0x180
 ? __asan_memset+0x23/0x50
 crypto_ahash_update+0x3c/0xc0
 gcm_hash_assoc_remain_continue+0x93/0xc0
 crypt_message+0xe09/0xec0 [cifs]
 ? __pfx_crypt_message+0x10/0x10 [cifs]
 ? _raw_spin_unlock+0x23/0x40
 ? __pfx_cifs_readv_from_socket+0x10/0x10 [cifs]
 decrypt_raw_data+0x229/0x380 [cifs]
 ? __pfx_decrypt_raw_data+0x10/0x10 [cifs]
 ? __pfx_cifs_read_iter_from_socket+0x10/0x10 [cifs]
 smb3_receive_transform+0x837/0xc80 [cifs]
 ? __pfx_smb3_receive_transform+0x10/0x10 [cifs]
 ? __pfx___might_resched+0x10/0x10
 ? __pfx_smb3_is_transform_hdr+0x10/0x10 [cifs]
 cifs_demultiplex_thread+0x692/0x1570 [cifs]
 ? __pfx_cifs_demultiplex_thread+0x10/0x10 [cifs]
 ? rcu_is_watching+0x20/0x50
 ? rcu_lockdep_current_cpu_online+0x62/0xb0
 ? find_held_lock+0x32/0x90
 ? kvm_sched_clock_read+0x11/0x20
 ? local_clock_noinstr+0xd/0xd0
 ? trace_irq_enable.constprop.0+0xa8/0xe0
 ? __pfx_cifs_demultiplex_thread+0x10/0x10 [cifs]
 kthread+0x1fe/0x380
 ? kthread+0x10f/0x380
 ? __pfx_kthread+0x10/0x10
 ? local_clock_noinstr+0xd/0xd0
 ? ret_from_fork+0x1b/0x60
 ? local_clock+0x15/0x30
 ? lock_release+0x29b/0x390
 ? rcu_is_watching+0x20/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x31/0x60
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37750/">CVE-2025-37750 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37750">CVE-2025-37750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242510">SUSE bug 1242510</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986972" comment="kernel-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986973" comment="kernel-abi-stablelists-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986974" comment="kernel-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986975" comment="kernel-cross-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986976" comment="kernel-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986977" comment="kernel-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986980" comment="kernel-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986981" comment="kernel-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986982" comment="kernel-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986983" comment="kernel-debug-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986986" comment="kernel-doc-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986987" comment="kernel-headers-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986988" comment="kernel-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986989" comment="kernel-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986990" comment="kernel-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986991" comment="kernel-rt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986992" comment="kernel-rt-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986993" comment="kernel-rt-debug-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986994" comment="kernel-rt-debug-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986996" comment="kernel-rt-debug-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986997" comment="kernel-rt-debug-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986998" comment="kernel-rt-debug-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986999" comment="kernel-rt-debug-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987001" comment="kernel-rt-kvm-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987002" comment="kernel-rt-modules-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987003" comment="kernel-rt-modules-core-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987004" comment="kernel-rt-modules-extra-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987005" comment="kernel-tools-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987006" comment="kernel-tools-libs-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987008" comment="kernel-uki-virt-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987009" comment="kernel-uki-virt-addons-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987010" comment="libperf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987011" comment="perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987012" comment="python3-perf-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987013" comment="rtla-5.14.0-570.22.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987014" comment="rv-5.14.0-570.22.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37785</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37785" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37785" ref_url="https://www.suse.com/security/cve/CVE-2025-37785" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8643" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01600-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix OOB read when checking dotdot dir

Mounting a corrupted filesystem with directory which contains '.' dir
entry with rec_len == block size results in out-of-bounds read (later
on, when the corrupted directory is removed).

ext4_empty_dir() assumes every ext4 directory contains at least '.'
and '..' as directory entries in the first data block. It first loads
the '.' dir entry, performs sanity checks by calling ext4_check_dir_entry()
and then uses its rec_len member to compute the location of '..' dir
entry (in ext4_next_entry). It assumes the '..' dir entry fits into the
same data block.

If the rec_len of '.' is precisely one block (4KB), it slips through the
sanity checks (it is considered the last directory entry in the data
block) and leaves "struct ext4_dir_entry_2 *de" point exactly past the
memory slot allocated to the data block. The following call to
ext4_check_dir_entry() on new value of de then dereferences this pointer
which results in out-of-bounds mem access.

Fix this by extending __ext4_check_dir_entry() to check for '.' dir
entries that reach the end of data block. Make sure to ignore the phony
dir entries for checksum (by checking name_len for non-zero).

Note: This is reported by KASAN as use-after-free in case another
structure was recently freed from the slot past the bound, but it is
really an OOB read.

This issue was found by syzkaller tool.

Call Trace:
[   38.594108] BUG: KASAN: slab-use-after-free in __ext4_check_dir_entry+0x67e/0x710
[   38.594649] Read of size 2 at addr ffff88802b41a004 by task syz-executor/5375
[   38.595158]
[   38.595288] CPU: 0 UID: 0 PID: 5375 Comm: syz-executor Not tainted 6.14.0-rc7 #1
[   38.595298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[   38.595304] Call Trace:
[   38.595308]  &lt;TASK&gt;
[   38.595311]  dump_stack_lvl+0xa7/0xd0
[   38.595325]  print_address_description.constprop.0+0x2c/0x3f0
[   38.595339]  ? __ext4_check_dir_entry+0x67e/0x710
[   38.595349]  print_report+0xaa/0x250
[   38.595359]  ? __ext4_check_dir_entry+0x67e/0x710
[   38.595368]  ? kasan_addr_to_slab+0x9/0x90
[   38.595378]  kasan_report+0xab/0xe0
[   38.595389]  ? __ext4_check_dir_entry+0x67e/0x710
[   38.595400]  __ext4_check_dir_entry+0x67e/0x710
[   38.595410]  ext4_empty_dir+0x465/0x990
[   38.595421]  ? __pfx_ext4_empty_dir+0x10/0x10
[   38.595432]  ext4_rmdir.part.0+0x29a/0xd10
[   38.595441]  ? __dquot_initialize+0x2a7/0xbf0
[   38.595455]  ? __pfx_ext4_rmdir.part.0+0x10/0x10
[   38.595464]  ? __pfx___dquot_initialize+0x10/0x10
[   38.595478]  ? down_write+0xdb/0x140
[   38.595487]  ? __pfx_down_write+0x10/0x10
[   38.595497]  ext4_rmdir+0xee/0x140
[   38.595506]  vfs_rmdir+0x209/0x670
[   38.595517]  ? lookup_one_qstr_excl+0x3b/0x190
[   38.595529]  do_rmdir+0x363/0x3c0
[   38.595537]  ? __pfx_do_rmdir+0x10/0x10
[   38.595544]  ? strncpy_from_user+0x1ff/0x2e0
[   38.595561]  __x64_sys_unlinkat+0xf0/0x130
[   38.595570]  do_syscall_64+0x5b/0x180
[   38.595583]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-11"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37785/">CVE-2025-37785 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37785">CVE-2025-37785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241640">SUSE bug 1241640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1241698">SUSE bug 1241698</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986194" comment="kernel-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986195" comment="kernel-abi-stablelists-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986196" comment="kernel-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986197" comment="kernel-cross-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986198" comment="kernel-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986199" comment="kernel-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986202" comment="kernel-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986203" comment="kernel-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986204" comment="kernel-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986205" comment="kernel-debug-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986208" comment="kernel-doc-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986209" comment="kernel-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986210" comment="kernel-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986211" comment="kernel-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986212" comment="kernel-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986213" comment="kernel-rt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986214" comment="kernel-rt-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986215" comment="kernel-rt-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986216" comment="kernel-rt-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986218" comment="kernel-rt-debug-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986219" comment="kernel-rt-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986220" comment="kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986221" comment="kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986223" comment="kernel-rt-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986224" comment="kernel-rt-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986225" comment="kernel-rt-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986226" comment="kernel-rt-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986227" comment="kernel-tools-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986228" comment="kernel-tools-libs-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986230" comment="kernel-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986231" comment="kernel-uki-virt-addons-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986232" comment="libperf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986233" comment="perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986234" comment="python3-perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986235" comment="rtla-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986236" comment="rv-5.14.0-570.21.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37789" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37789" ref_url="https://www.suse.com/security/cve/CVE-2025-37789" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix nested key length validation in the set() action

It's not safe to access nla_len(ovs_key) if the data is smaller than
the netlink header.  Check that the attribute is OK first.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37789/">CVE-2025-37789 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37789">CVE-2025-37789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242762">SUSE bug 1242762</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37797" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37797" ref_url="https://www.suse.com/security/cve/CVE-2025-37797" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02606-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02608-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02619-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02636-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02637-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02638-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02673-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02691-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02697-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02708-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20572-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20573-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20582-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20611-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20612-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20613-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20615-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20621-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20622-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20623-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20625-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a UAF vulnerability in class handling

This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class
handling. The issue occurs due to a time-of-check/time-of-use condition
in hfsc_change_class() when working with certain child qdiscs like netem
or codel.

The vulnerability works as follows:
1. hfsc_change_class() checks if a class has packets (q.qlen != 0)
2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g.,
   codel, netem) might drop packets and empty the queue
3. The code continues assuming the queue is still non-empty, adding
   the class to vttree
4. This breaks HFSC scheduler assumptions that only non-empty classes
   are in vttree
5. Later, when the class is destroyed, this can lead to a Use-After-Free

The fix adds a second queue length check after qdisc_peek_len() to verify
the queue wasn't emptied.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37797/">CVE-2025-37797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37797">CVE-2025-37797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242417">SUSE bug 1242417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245793">SUSE bug 1245793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37799</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37799" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37799" ref_url="https://www.suse.com/security/cve/CVE-2025-37799" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10379" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp

vmxnet3 driver's XDP handling is buggy for packet sizes using ring0 (that
is, packet sizes between 128 - 3k bytes).

We noticed MTU-related connectivity issues with Cilium's service load-
balancing in case of vmxnet3 as NIC underneath. A simple curl to a HTTP
backend service where the XDP LB was doing IPIP encap led to overly large
packet sizes but only for *some* of the packets (e.g. HTTP GET request)
while others (e.g. the prior TCP 3WHS) looked completely fine on the wire.

In fact, the pcap recording on the backend node actually revealed that the
node with the XDP LB was leaking uninitialized kernel data onto the wire
for the affected packets, for example, while the packets should have been
152 bytes their actual size was 1482 bytes, so the remainder after 152 bytes
was padded with whatever other data was in that page at the time (e.g. we
saw user/payload data from prior processed packets).

We only noticed this through an MTU issue, e.g. when the XDP LB node and
the backend node both had the same MTU (e.g. 1500) then the curl request
got dropped on the backend node's NIC given the packet was too large even
though the IPIP-encapped packet normally would never even come close to
the MTU limit. Lowering the MTU on the XDP LB (e.g. 1480) allowed to let
the curl request succeed (which also indicates that the kernel ignored the
padding, and thus the issue wasn't very user-visible).

Commit e127ce7699c1 ("vmxnet3: Fix missing reserved tailroom") was too eager
to also switch xdp_prepare_buff() from rcd-&gt;len to rbi-&gt;len. It really needs
to stick to rcd-&gt;len which is the actual packet length from the descriptor.
The latter we also feed into vmxnet3_process_xdp_small(), by the way, and
it indicates the correct length needed to initialize the xdp-&gt;{data,data_end}
parts. For e127ce7699c1 ("vmxnet3: Fix missing reserved tailroom") the
relevant part was adapting xdp_init_buff() to address the warning given the
xdp_data_hard_end() depends on xdp-&gt;frame_sz. With that fixed, traffic on
the wire looks good again.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37799/">CVE-2025-37799 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37799">CVE-2025-37799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242283">SUSE bug 1242283</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999183" comment="kernel-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999184" comment="kernel-abi-stablelists-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999185" comment="kernel-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999186" comment="kernel-cross-headers-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999187" comment="kernel-debug-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999188" comment="kernel-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999191" comment="kernel-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999192" comment="kernel-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999193" comment="kernel-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999194" comment="kernel-debug-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999197" comment="kernel-doc-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999198" comment="kernel-headers-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999199" comment="kernel-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999200" comment="kernel-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999201" comment="kernel-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999202" comment="kernel-rt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999203" comment="kernel-rt-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999204" comment="kernel-rt-debug-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999205" comment="kernel-rt-debug-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999207" comment="kernel-rt-debug-kvm-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999208" comment="kernel-rt-debug-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999209" comment="kernel-rt-debug-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999210" comment="kernel-rt-debug-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999212" comment="kernel-rt-kvm-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999213" comment="kernel-rt-modules-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999214" comment="kernel-rt-modules-core-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999215" comment="kernel-rt-modules-extra-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999216" comment="kernel-tools-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999217" comment="kernel-tools-libs-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999219" comment="kernel-uki-virt-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999220" comment="kernel-uki-virt-addons-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999221" comment="libperf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999222" comment="perf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999223" comment="python3-perf-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999224" comment="rtla-5.14.0-570.25.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999225" comment="rv-5.14.0-570.25.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37803</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37803" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37803" ref_url="https://www.suse.com/security/cve/CVE-2025-37803" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

udmabuf: fix a buf size overflow issue during udmabuf creation

by casting size_limit_mb to u64  when calculate pglimit.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-11"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37803/">CVE-2025-37803 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37803">CVE-2025-37803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242852">SUSE bug 1242852</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017422" comment="kernel-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017423" comment="kernel-abi-stablelists-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017424" comment="kernel-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017425" comment="kernel-cross-headers-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017426" comment="kernel-debug-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017427" comment="kernel-debug-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017430" comment="kernel-debug-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017431" comment="kernel-debug-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017432" comment="kernel-debug-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017433" comment="kernel-debug-uki-virt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017436" comment="kernel-doc-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017437" comment="kernel-headers-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017438" comment="kernel-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017439" comment="kernel-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017440" comment="kernel-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017441" comment="kernel-rt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017442" comment="kernel-rt-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017443" comment="kernel-rt-debug-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017444" comment="kernel-rt-debug-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017446" comment="kernel-rt-debug-kvm-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017447" comment="kernel-rt-debug-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017448" comment="kernel-rt-debug-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017449" comment="kernel-rt-debug-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017451" comment="kernel-rt-kvm-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017452" comment="kernel-rt-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017453" comment="kernel-rt-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017454" comment="kernel-rt-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017455" comment="kernel-tools-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017456" comment="kernel-tools-libs-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017458" comment="kernel-uki-virt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017459" comment="kernel-uki-virt-addons-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017460" comment="libperf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017461" comment="perf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017462" comment="python3-perf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017463" comment="rtla-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017464" comment="rv-5.14.0-570.41.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37810</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37810" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37810" ref_url="https://www.suse.com/security/cve/CVE-2025-37810" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: gadget: check that event count does not exceed event buffer length

The event count is read from register DWC3_GEVNTCOUNT.
There is a check for the count being zero, but not for exceeding the
event buffer length.
Check that event count does not exceed event buffer length,
avoiding an out-of-bounds access when memcpy'ing the event.
Crash log:
Unable to handle kernel paging request at virtual address ffffffc0129be000
pc : __memcpy+0x114/0x180
lr : dwc3_check_event_buf+0xec/0x348
x3 : 0000000000000030 x2 : 000000000000dfc4
x1 : ffffffc0129be000 x0 : ffffff87aad60080
Call trace:
__memcpy+0x114/0x180
dwc3_interrupt+0x24/0x34
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37810/">CVE-2025-37810 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37810">CVE-2025-37810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242906">SUSE bug 1242906</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010019488" comment="kernel-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019489" comment="kernel-abi-stablelists-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019490" comment="kernel-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019491" comment="kernel-cross-headers-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019492" comment="kernel-debug-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019493" comment="kernel-debug-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019496" comment="kernel-debug-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019497" comment="kernel-debug-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019498" comment="kernel-debug-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019499" comment="kernel-debug-uki-virt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019502" comment="kernel-doc-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019503" comment="kernel-headers-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019504" comment="kernel-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019505" comment="kernel-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019506" comment="kernel-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019507" comment="kernel-rt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019508" comment="kernel-rt-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019509" comment="kernel-rt-debug-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019510" comment="kernel-rt-debug-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019512" comment="kernel-rt-debug-kvm-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019513" comment="kernel-rt-debug-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019514" comment="kernel-rt-debug-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019515" comment="kernel-rt-debug-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019517" comment="kernel-rt-kvm-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019518" comment="kernel-rt-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019519" comment="kernel-rt-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019520" comment="kernel-rt-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019521" comment="kernel-tools-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019522" comment="kernel-tools-libs-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019524" comment="kernel-uki-virt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019525" comment="kernel-uki-virt-addons-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019526" comment="libperf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019527" comment="perf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019528" comment="python3-perf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019529" comment="rtla-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019530" comment="rv-5.14.0-570.46.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37819" ref_url="https://www.suse.com/security/cve/CVE-2025-37819" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()

With ACPI in place, gicv2m_get_fwnode() is registered with the pci
subsystem as pci_msi_get_fwnode_cb(), which may get invoked at runtime
during a PCI host bridge probe. But, the call back is wrongly marked as
__init, causing it to be freed, while being registered with the PCI
subsystem and could trigger:

 Unable to handle kernel paging request at virtual address ffff8000816c0400
  gicv2m_get_fwnode+0x0/0x58 (P)
  pci_set_bus_msi_domain+0x74/0x88
  pci_register_host_bridge+0x194/0x548

This is easily reproducible on a Juno board with ACPI boot.

Retain the function for later use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37819/">CVE-2025-37819 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37819">CVE-2025-37819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242873">SUSE bug 1242873</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37823</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37823" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37823" ref_url="https://www.suse.com/security/cve/CVE-2025-37823" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too

Similarly to the previous patch, we need to safe guard hfsc_dequeue()
too. But for this one, we don't have a reliable reproducer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37823/">CVE-2025-37823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37823">CVE-2025-37823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242924">SUSE bug 1242924</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37890" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37890" ref_url="https://www.suse.com/security/cve/CVE-2025-37890" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03124-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03129-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03148-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03154-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03156-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03175-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03181-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03182-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03186-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03191-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03194-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03195-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03223-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03235-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20763-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20776-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc

As described in Gerrard's report [1], we have a UAF case when an hfsc class
has a netem child qdisc. The crux of the issue is that hfsc is assuming
that checking for cl-&gt;qdisc-&gt;q.qlen == 0 guarantees that it hasn't inserted
the class in the vttree or eltree (which is not true for the netem
duplicate case).

This patch checks the n_active class variable to make sure that the code
won't insert the class in the vttree or eltree twice, catering for the
reentrant case.

[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37890/">CVE-2025-37890 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37890">CVE-2025-37890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243330">SUSE bug 1243330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245791">SUSE bug 1245791</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37914" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37914" ref_url="https://www.suse.com/security/cve/CVE-2025-37914" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001923.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: ets: Fix double list add in class with netem as child qdisc

As described in Gerrard's report [1], there are use cases where a netem
child qdisc will make the parent qdisc's enqueue callback reentrant.
In the case of ets, there won't be a UAF, but the code will add the same
classifier to the list twice, which will cause memory corruption.

In addition to checking for qlen being zero, this patch checks whether
the class was already added to the active_list (cl_is_active) before
doing the addition to cater for the reentrant case.

[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-28"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37914/">CVE-2025-37914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37914">CVE-2025-37914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243472">SUSE bug 1243472</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015654" comment="kernel-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015655" comment="kernel-abi-stablelists-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015656" comment="kernel-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015657" comment="kernel-cross-headers-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015658" comment="kernel-debug-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015659" comment="kernel-debug-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015662" comment="kernel-debug-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015663" comment="kernel-debug-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015664" comment="kernel-debug-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015665" comment="kernel-debug-uki-virt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015668" comment="kernel-doc-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015669" comment="kernel-headers-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015670" comment="kernel-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015671" comment="kernel-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015672" comment="kernel-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015673" comment="kernel-rt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015674" comment="kernel-rt-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015675" comment="kernel-rt-debug-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015676" comment="kernel-rt-debug-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015678" comment="kernel-rt-debug-kvm-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015679" comment="kernel-rt-debug-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015680" comment="kernel-rt-debug-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015681" comment="kernel-rt-debug-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015683" comment="kernel-rt-kvm-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015684" comment="kernel-rt-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015685" comment="kernel-rt-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015686" comment="kernel-rt-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015687" comment="kernel-tools-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015688" comment="kernel-tools-libs-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015690" comment="kernel-uki-virt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015691" comment="kernel-uki-virt-addons-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015692" comment="libperf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015693" comment="perf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015694" comment="python3-perf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015695" comment="rtla-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015696" comment="rv-5.14.0-570.37.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37943</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37943" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37943" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37943" ref_url="https://www.suse.com/security/cve/CVE-2025-37943" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8643" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi

In certain cases, hardware might provide packets with a
length greater than the maximum native Wi-Fi header length.
This can lead to accessing and modifying fields in the header
within the ath12k_dp_rx_h_undecap_nwifi function for
DP_RX_DECAP_TYPE_NATIVE_WIFI decap type and
potentially resulting in invalid data access and memory corruption.

Add a sanity check before processing the SKB to prevent invalid
data access in the undecap native Wi-Fi function for the
DP_RX_DECAP_TYPE_NATIVE_WIFI decap type.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-11"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37943/">CVE-2025-37943 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37943">CVE-2025-37943 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243509">SUSE bug 1243509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986194" comment="kernel-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986195" comment="kernel-abi-stablelists-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986196" comment="kernel-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986197" comment="kernel-cross-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986198" comment="kernel-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986199" comment="kernel-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986202" comment="kernel-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986203" comment="kernel-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986204" comment="kernel-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986205" comment="kernel-debug-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986208" comment="kernel-doc-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986209" comment="kernel-headers-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986210" comment="kernel-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986211" comment="kernel-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986212" comment="kernel-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986213" comment="kernel-rt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986214" comment="kernel-rt-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986215" comment="kernel-rt-debug-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986216" comment="kernel-rt-debug-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986218" comment="kernel-rt-debug-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986219" comment="kernel-rt-debug-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986220" comment="kernel-rt-debug-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986221" comment="kernel-rt-debug-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986223" comment="kernel-rt-kvm-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986224" comment="kernel-rt-modules-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986225" comment="kernel-rt-modules-core-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986226" comment="kernel-rt-modules-extra-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986227" comment="kernel-tools-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986228" comment="kernel-tools-libs-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986230" comment="kernel-uki-virt-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986231" comment="kernel-uki-virt-addons-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986232" comment="libperf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986233" comment="perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986234" comment="python3-perf-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986235" comment="rtla-5.14.0-570.21.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986236" comment="rv-5.14.0-570.21.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37958</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37958" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37958" ref_url="https://www.suse.com/security/cve/CVE-2025-37958" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: fix dereferencing invalid pmd migration entry

When migrating a THP, concurrent access to the PMD migration entry during
a deferred split scan can lead to an invalid address access, as
illustrated below.  To prevent this invalid access, it is necessary to
check the PMD migration entry and return early.  In this context, there is
no need to use pmd_to_swp_entry and pfn_swap_entry_to_page to verify the
equality of the target folio.  Since the PMD migration entry is locked, it
cannot be served as the target.

Mailing list discussion and explanation from Hugh Dickins: "An anon_vma
lookup points to a location which may contain the folio of interest, but
might instead contain another folio: and weeding out those other folios is
precisely what the "folio != pmd_folio((*pmd)" check (and the "risk of
replacing the wrong folio" comment a few lines above it) is for."

BUG: unable to handle page fault for address: ffffea60001db008
CPU: 0 UID: 0 PID: 2199114 Comm: tee Not tainted 6.14.0+ #4 NONE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:split_huge_pmd_locked+0x3b5/0x2b60
Call Trace:
&lt;TASK&gt;
try_to_migrate_one+0x28c/0x3730
rmap_walk_anon+0x4f6/0x770
unmap_folio+0x196/0x1f0
split_huge_page_to_list_to_order+0x9f6/0x1560
deferred_split_scan+0xac5/0x12a0
shrinker_debugfs_scan_write+0x376/0x470
full_proxy_write+0x15c/0x220
vfs_write+0x2fc/0xcb0
ksys_write+0x146/0x250
do_syscall_64+0x6a/0x120
entry_SYSCALL_64_after_hwframe+0x76/0x7e

The bug is found by syzkaller on an internal kernel, then confirmed on
upstream.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37958/">CVE-2025-37958 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37958">CVE-2025-37958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243539">SUSE bug 1243539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37994" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37994" ref_url="https://www.suse.com/security/cve/CVE-2025-37994" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: displayport: Fix NULL pointer access

This patch ensures that the UCSI driver waits for all pending tasks in the
ucsi_displayport_work workqueue to finish executing before proceeding with
the partner removal.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37994/">CVE-2025-37994 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37994">CVE-2025-37994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243823">SUSE bug 1243823</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38013</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38013" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38013" ref_url="https://www.suse.com/security/cve/CVE-2025-38013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: Set n_channels after allocating struct cfg80211_scan_request

Make sure that n_channels is set after allocating the
struct cfg80211_registered_device::int_scan_req member. Seen with
syzkaller:

UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:1208:5
index 0 is out of range for type 'struct ieee80211_channel *[] __counted_by(n_channels)' (aka 'struct ieee80211_channel *[]')

This was missed in the initial conversions because I failed to locate
the allocation likely due to the "sizeof(void *)" not matching the
"channels" array type.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38013/">CVE-2025-38013 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38013">CVE-2025-38013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244731">SUSE bug 1244731</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38022</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38022" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38022" ref_url="https://www.suse.com/security/cve/CVE-2025-38022" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Fix "KASAN: slab-use-after-free Read in ib_register_device" problem

Call Trace:

 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xc3/0x670 mm/kasan/report.c:521
 kasan_report+0xe0/0x110 mm/kasan/report.c:634
 strlen+0x93/0xa0 lib/string.c:420
 __fortify_strlen include/linux/fortify-string.h:268 [inline]
 get_kobj_path_length lib/kobject.c:118 [inline]
 kobject_get_path+0x3f/0x2a0 lib/kobject.c:158
 kobject_uevent_env+0x289/0x1870 lib/kobject_uevent.c:545
 ib_register_device drivers/infiniband/core/device.c:1472 [inline]
 ib_register_device+0x8cf/0xe00 drivers/infiniband/core/device.c:1393
 rxe_register_device+0x275/0x320 drivers/infiniband/sw/rxe/rxe_verbs.c:1552
 rxe_net_add+0x8e/0xe0 drivers/infiniband/sw/rxe/rxe_net.c:550
 rxe_newlink+0x70/0x190 drivers/infiniband/sw/rxe/rxe.c:225
 nldev_newlink+0x3a3/0x680 drivers/infiniband/core/nldev.c:1796
 rdma_nl_rcv_msg+0x387/0x6e0 drivers/infiniband/core/netlink.c:195
 rdma_nl_rcv_skb.constprop.0.isra.0+0x2e5/0x450
 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
 netlink_unicast+0x53a/0x7f0 net/netlink/af_netlink.c:1339
 netlink_sendmsg+0x8d1/0xdd0 net/netlink/af_netlink.c:1883
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg net/socket.c:727 [inline]
 ____sys_sendmsg+0xa95/0xc70 net/socket.c:2566
 ___sys_sendmsg+0x134/0x1d0 net/socket.c:2620
 __sys_sendmsg+0x16d/0x220 net/socket.c:2652
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

This problem is similar to the problem that the
commit 1d6a9e7449e2 ("RDMA/core: Fix use-after-free when rename device name")
fixes.

The root cause is: the function ib_device_rename() renames the name with
lock. But in the function kobject_uevent(), this name is accessed without
lock protection at the same time.

The solution is to add the lock protection when this name is accessed in
the function kobject_uevent().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38022/">CVE-2025-38022 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38022">CVE-2025-38022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245003">SUSE bug 1245003</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38024" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38024" ref_url="https://www.suse.com/security/cve/CVE-2025-38024" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02334-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix slab-use-after-free Read in rxe_queue_cleanup bug

Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x7d/0xa0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xcf/0x610 mm/kasan/report.c:489
 kasan_report+0xb5/0xe0 mm/kasan/report.c:602
 rxe_queue_cleanup+0xd0/0xe0 drivers/infiniband/sw/rxe/rxe_queue.c:195
 rxe_cq_cleanup+0x3f/0x50 drivers/infiniband/sw/rxe/rxe_cq.c:132
 __rxe_cleanup+0x168/0x300 drivers/infiniband/sw/rxe/rxe_pool.c:232
 rxe_create_cq+0x22e/0x3a0 drivers/infiniband/sw/rxe/rxe_verbs.c:1109
 create_cq+0x658/0xb90 drivers/infiniband/core/uverbs_cmd.c:1052
 ib_uverbs_create_cq+0xc7/0x120 drivers/infiniband/core/uverbs_cmd.c:1095
 ib_uverbs_write+0x969/0xc90 drivers/infiniband/core/uverbs_main.c:679
 vfs_write fs/read_write.c:677 [inline]
 vfs_write+0x26a/0xcc0 fs/read_write.c:659
 ksys_write+0x1b8/0x200 fs/read_write.c:731
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xaa/0x1b0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

In the function rxe_create_cq, when rxe_cq_from_init fails, the function
rxe_cleanup will be called to handle the allocated resources. In fact,
some memory resources have already been freed in the function
rxe_cq_from_init. Thus, this problem will occur.

The solution is to let rxe_cleanup do all the work.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38024/">CVE-2025-38024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38024">CVE-2025-38024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245025">SUSE bug 1245025</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38052</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38052" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done

Syzbot reported a slab-use-after-free with the following call trace:

  ==================================================================
  BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840
  Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25

  Call Trace:
   kasan_report+0xd9/0x110 mm/kasan/report.c:601
   tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840
   crypto_request_complete include/crypto/algapi.h:266
   aead_request_complete include/crypto/internal/aead.h:85
   cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772
   crypto_request_complete include/crypto/algapi.h:266
   cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181
   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231

  Allocated by task 8355:
   kzalloc_noprof include/linux/slab.h:778
   tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466
   tipc_init_net+0x2dd/0x430 net/tipc/core.c:72
   ops_init+0xb9/0x650 net/core/net_namespace.c:139
   setup_net+0x435/0xb40 net/core/net_namespace.c:343
   copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508
   create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110
   unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228
   ksys_unshare+0x419/0x970 kernel/fork.c:3323
   __do_sys_unshare kernel/fork.c:3394

  Freed by task 63:
   kfree+0x12a/0x3b0 mm/slub.c:4557
   tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539
   tipc_exit_net+0x8c/0x110 net/tipc/core.c:119
   ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173
   cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640
   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231

After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done
may still visit it in cryptd_queue_worker workqueue.

I reproduce this issue by:
  ip netns add ns1
  ip link add veth1 type veth peer name veth2
  ip link set veth1 netns ns1
  ip netns exec ns1 tipc bearer enable media eth dev veth1
  ip netns exec ns1 tipc node set key this_is_a_master_key master
  ip netns exec ns1 tipc bearer disable media eth dev veth1
  ip netns del ns1

The key of reproduction is that, simd_aead_encrypt is interrupted, leading
to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is
triggered, and the tipc_crypto tx will be visited.

  tipc_disc_timeout
    tipc_bearer_xmit_skb
      tipc_crypto_xmit
        tipc_aead_encrypt
          crypto_aead_encrypt
            // encrypt()
            simd_aead_encrypt
              // crypto_simd_usable() is false
              child = &amp;ctx-&gt;cryptd_tfm-&gt;base;

  simd_aead_encrypt
    crypto_aead_encrypt
      // encrypt()
      cryptd_aead_encrypt_enqueue
        cryptd_aead_enqueue
          cryptd_enqueue_request
            // trigger cryptd_queue_worker
            queue_work_on(smp_processor_id(), cryptd_wq, &amp;cpu_queue-&gt;work)

Fix this by holding net reference count before encrypt.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244749">SUSE bug 1244749</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38053" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38053" ref_url="https://www.suse.com/security/cve/CVE-2025-38053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix null-ptr-deref in idpf_features_check

idpf_features_check is used to validate the TX packet. skb header
length is compared with the hardware supported value received from
the device control plane. The value is stored in the adapter structure
and to access it, vport pointer is used. During reset all the vports
are released and the vport pointer that the netdev private structure
points to is NULL.

To avoid null-ptr-deref, store the max header length value in netdev
private structure. This also helps to cache the value and avoid
accessing adapter pointer in hot path.

BUG: kernel NULL pointer dereference, address: 0000000000000068
...
RIP: 0010:idpf_features_check+0x6d/0xe0 [idpf]
Call Trace:
 &lt;TASK&gt;
 ? __die+0x23/0x70
 ? page_fault_oops+0x154/0x520
 ? exc_page_fault+0x76/0x190
 ? asm_exc_page_fault+0x26/0x30
 ? idpf_features_check+0x6d/0xe0 [idpf]
 netif_skb_features+0x88/0x310
 validate_xmit_skb+0x2a/0x2b0
 validate_xmit_skb_list+0x4c/0x70
 sch_direct_xmit+0x19d/0x3a0
 __dev_queue_xmit+0xb74/0xe70
 ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38053/">CVE-2025-38053 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38053">CVE-2025-38053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244746">SUSE bug 1244746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009870054" comment="bpftool-7.3.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870055" comment="kernel-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870056" comment="kernel-abi-stablelists-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870057" comment="kernel-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870058" comment="kernel-cross-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870059" comment="kernel-debug-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870060" comment="kernel-debug-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870063" comment="kernel-debug-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870064" comment="kernel-debug-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870065" comment="kernel-debug-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870066" comment="kernel-debug-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870069" comment="kernel-doc-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870070" comment="kernel-headers-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870071" comment="kernel-modules-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870072" comment="kernel-modules-core-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870073" comment="kernel-modules-extra-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870074" comment="kernel-tools-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870075" comment="kernel-tools-libs-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870077" comment="kernel-uki-virt-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870078" comment="libperf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870079" comment="perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870080" comment="python3-perf-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870081" comment="rtla-5.14.0-427.13.1.el9_4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009870082" comment="rv-5.14.0-427.13.1.el9_4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38075" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38075" ref_url="https://www.suse.com/security/cve/CVE-2025-38075" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix timeout on deleted connection

NOPIN response timer may expire on a deleted connection and crash with
such logs:

Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d

BUG: Kernel NULL pointer dereference on read at 0x00000000
NIP  strlcpy+0x8/0xb0
LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod]
Call Trace:
 iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]
 call_timer_fn+0x58/0x1f0
 run_timer_softirq+0x740/0x860
 __do_softirq+0x16c/0x420
 irq_exit+0x188/0x1c0
 timer_interrupt+0x184/0x410

That is because nopin response timer may be re-started on nopin timer
expiration.

Stop nopin timer before stopping the nopin response timer to be sure
that no one of them will be re-started.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38075/">CVE-2025-38075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244734">SUSE bug 1244734</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38079" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38079" ref_url="https://www.suse.com/security/cve/CVE-2025-38079" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13602" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001911.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14987" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02854-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02878-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02883-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02908-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02909-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02911-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02918-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02937-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20329-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024166.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: algif_hash - fix double free in hash_accept

If accept(2) is called on socket type algif_hash with
MSG_MORE flag set and crypto_ahash_import fails,
sk2 is freed. However, it is also freed in af_alg_release,
leading to slab-use-after-free error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-13"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38079/">CVE-2025-38079 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38079">CVE-2025-38079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245217">SUSE bug 1245217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245218">SUSE bug 1245218</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013382" comment="kernel-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013383" comment="kernel-abi-stablelists-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013384" comment="kernel-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013385" comment="kernel-cross-headers-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013386" comment="kernel-debug-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013387" comment="kernel-debug-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013390" comment="kernel-debug-modules-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013391" comment="kernel-debug-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013392" comment="kernel-debug-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013393" comment="kernel-debug-uki-virt-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013396" comment="kernel-doc-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013397" comment="kernel-headers-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013398" comment="kernel-modules-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013399" comment="kernel-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013400" comment="kernel-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013401" comment="kernel-rt-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013402" comment="kernel-rt-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013403" comment="kernel-rt-debug-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013404" comment="kernel-rt-debug-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013406" comment="kernel-rt-debug-kvm-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013407" comment="kernel-rt-debug-modules-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013408" comment="kernel-rt-debug-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013409" comment="kernel-rt-debug-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013411" comment="kernel-rt-kvm-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013412" comment="kernel-rt-modules-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013413" comment="kernel-rt-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013414" comment="kernel-rt-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013415" comment="kernel-tools-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013416" comment="kernel-tools-libs-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013418" comment="kernel-uki-virt-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013419" comment="kernel-uki-virt-addons-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013420" comment="libperf-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013421" comment="perf-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013422" comment="python3-perf-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013423" comment="rtla-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013424" comment="rv-5.14.0-570.33.2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38084" ref_url="https://www.suse.com/security/cve/CVE-2025-38084" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: unshare page tables during VMA split, not before

Currently, __split_vma() triggers hugetlb page table unsharing through
vm_ops-&gt;may_split().  This happens before the VMA lock and rmap locks are
taken - which is too early, it allows racing VMA-locked page faults in our
process and racing rmap walks from other processes to cause page tables to
be shared again before we actually perform the split.

Fix it by explicitly calling into the hugetlb unshare logic from
__split_vma() in the same place where THP splitting also happens.  At that
point, both the VMA and the rmap(s) are write-locked.

An annoying detail is that we can now call into the helper
hugetlb_unshare_pmds() from two different locking contexts:

1. from hugetlb_split(), holding:
    - mmap lock (exclusively)
    - VMA lock
    - file rmap lock (exclusively)
2. hugetlb_unshare_all_pmds(), which I think is designed to be able to
   call us with only the mmap lock held (in shared mode), but currently
   only runs while holding mmap lock (exclusively) and VMA lock

Backporting note:
This commit fixes a racy protection that was introduced in commit
b30c14cd6102 ("hugetlb: unshare some PMDs when splitting VMAs"); that
commit claimed to fix an issue introduced in 5.13, but it should actually
also go all the way back.

[jannh@google.com: v2]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38084/">CVE-2025-38084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245498">SUSE bug 1245498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001909.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race

huge_pmd_unshare() drops a reference on a page table that may have
previously been shared across processes, potentially turning it into a
normal page table used in another process in which unrelated VMAs can
afterwards be installed.

If this happens in the middle of a concurrent gup_fast(), gup_fast() could
end up walking the page tables of another process.  While I don't see any
way in which that immediately leads to kernel memory corruption, it is
really weird and unexpected.

Fix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),
just like we do in khugepaged when removing page tables for a THP
collapse.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245499">SUSE bug 1245499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38086" ref_url="https://www.suse.com/security/cve/CVE-2025-38086" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11455" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001825.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ch9200: fix uninitialised access during mii_nway_restart

In mii_nway_restart() the code attempts to call
mii-&gt;mdio_read which is ch9200_mdio_read(). ch9200_mdio_read()
utilises a local buffer called "buff", which is initialised
with control_read(). However "buff" is conditionally
initialised inside control_read():

        if (err == size) {
                memcpy(data, buf, size);
        }

If the condition of "err == size" is not met, then
"buff" remains uninitialised. Once this happens the
uninitialised "buff" is accessed and returned during
ch9200_mdio_read():

        return (buff[0] | buff[1] &lt;&lt; 8);

The problem stems from the fact that ch9200_mdio_read()
ignores the return value of control_read(), leading to
uinit-access of "buff".

To fix this we should check the return value of
control_read() and return early on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38086/">CVE-2025-38086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38086">CVE-2025-38086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245503">SUSE bug 1245503</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38087" ref_url="https://www.suse.com/security/cve/CVE-2025-38087" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03104-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03223-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03235-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20763-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20776-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: fix use-after-free in taprio_dev_notifier

Since taprio's taprio_dev_notifier() isn't protected by an
RCU read-side critical section, a race with advance_sched()
can lead to a use-after-free.

Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38087/">CVE-2025-38087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245504">SUSE bug 1245504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245505">SUSE bug 1245505</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012426" comment="kernel-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012427" comment="kernel-abi-stablelists-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012428" comment="kernel-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012429" comment="kernel-cross-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012430" comment="kernel-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012431" comment="kernel-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012434" comment="kernel-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012435" comment="kernel-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012436" comment="kernel-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012437" comment="kernel-debug-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012440" comment="kernel-doc-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012441" comment="kernel-headers-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012442" comment="kernel-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012443" comment="kernel-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012444" comment="kernel-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012445" comment="kernel-rt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012446" comment="kernel-rt-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012447" comment="kernel-rt-debug-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012448" comment="kernel-rt-debug-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012450" comment="kernel-rt-debug-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012451" comment="kernel-rt-debug-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012452" comment="kernel-rt-debug-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012453" comment="kernel-rt-debug-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012455" comment="kernel-rt-kvm-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012456" comment="kernel-rt-modules-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012457" comment="kernel-rt-modules-core-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012458" comment="kernel-rt-modules-extra-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012459" comment="kernel-tools-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012460" comment="kernel-tools-libs-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012462" comment="kernel-uki-virt-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012463" comment="kernel-uki-virt-addons-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012464" comment="libperf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012465" comment="perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012466" comment="python3-perf-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012467" comment="rtla-5.14.0-570.32.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012468" comment="rv-5.14.0-570.32.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38089" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38089" ref_url="https://www.suse.com/security/cve/CVE-2025-38089" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11411" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03495-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03567-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20819-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: handle SVC_GARBAGE during svc auth processing as auth error

tianshuo han reported a remotely-triggerable crash if the client sends a
kernel RPC server a specially crafted packet. If decoding the RPC reply
fails in such a way that SVC_GARBAGE is returned without setting the
rq_accept_statp pointer, then that pointer can be dereferenced and a
value stored there.

If it's the first time the thread has processed an RPC, then that
pointer will be set to NULL and the kernel will crash. In other cases,
it could create a memory scribble.

The server sunrpc code treats a SVC_GARBAGE return from svc_authenticate
or pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531
says that if authentication fails that the RPC should be rejected
instead with a status of AUTH_ERR.

Handle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of
AUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This
sidesteps the whole problem of touching the rpc_accept_statp pointer in
this situation and avoids the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38089/">CVE-2025-38089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245508">SUSE bug 1245508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245509">SUSE bug 1245509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009005" comment="kernel-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009006" comment="kernel-abi-stablelists-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009007" comment="kernel-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009008" comment="kernel-cross-headers-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009009" comment="kernel-debug-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009010" comment="kernel-debug-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009013" comment="kernel-debug-modules-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009014" comment="kernel-debug-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009015" comment="kernel-debug-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009016" comment="kernel-debug-uki-virt-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009019" comment="kernel-doc-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009020" comment="kernel-headers-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009021" comment="kernel-modules-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009022" comment="kernel-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009023" comment="kernel-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009024" comment="kernel-rt-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009025" comment="kernel-rt-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009026" comment="kernel-rt-debug-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009027" comment="kernel-rt-debug-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009029" comment="kernel-rt-debug-kvm-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009030" comment="kernel-rt-debug-modules-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009031" comment="kernel-rt-debug-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009032" comment="kernel-rt-debug-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009034" comment="kernel-rt-kvm-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009035" comment="kernel-rt-modules-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009036" comment="kernel-rt-modules-core-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009037" comment="kernel-rt-modules-extra-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009038" comment="kernel-tools-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009039" comment="kernel-tools-libs-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009041" comment="kernel-uki-virt-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009042" comment="kernel-uki-virt-addons-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009043" comment="libperf-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009044" comment="perf-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009045" comment="python3-perf-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009046" comment="rtla-5.14.0-570.28.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009047" comment="rv-5.14.0-570.28.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38106" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38106" ref_url="https://www.suse.com/security/cve/CVE-2025-38106" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix use-after-free of sq-&gt;thread in __io_uring_show_fdinfo()

syzbot reports:

BUG: KASAN: slab-use-after-free in getrusage+0x1109/0x1a60
Read of size 8 at addr ffff88810de2d2c8 by task a.out/304

CPU: 0 UID: 0 PID: 304 Comm: a.out Not tainted 6.16.0-rc1 #1 PREEMPT(voluntary)
Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x53/0x70
 print_report+0xd0/0x670
 ? __pfx__raw_spin_lock_irqsave+0x10/0x10
 ? getrusage+0x1109/0x1a60
 kasan_report+0xce/0x100
 ? getrusage+0x1109/0x1a60
 getrusage+0x1109/0x1a60
 ? __pfx_getrusage+0x10/0x10
 __io_uring_show_fdinfo+0x9fe/0x1790
 ? ksys_read+0xf7/0x1c0
 ? do_syscall_64+0xa4/0x260
 ? vsnprintf+0x591/0x1100
 ? __pfx___io_uring_show_fdinfo+0x10/0x10
 ? __pfx_vsnprintf+0x10/0x10
 ? mutex_trylock+0xcf/0x130
 ? __pfx_mutex_trylock+0x10/0x10
 ? __pfx_show_fd_locks+0x10/0x10
 ? io_uring_show_fdinfo+0x57/0x80
 io_uring_show_fdinfo+0x57/0x80
 seq_show+0x38c/0x690
 seq_read_iter+0x3f7/0x1180
 ? inode_set_ctime_current+0x160/0x4b0
 seq_read+0x271/0x3e0
 ? __pfx_seq_read+0x10/0x10
 ? __pfx__raw_spin_lock+0x10/0x10
 ? __mark_inode_dirty+0x402/0x810
 ? selinux_file_permission+0x368/0x500
 ? file_update_time+0x10f/0x160
 vfs_read+0x177/0xa40
 ? __pfx___handle_mm_fault+0x10/0x10
 ? __pfx_vfs_read+0x10/0x10
 ? mutex_lock+0x81/0xe0
 ? __pfx_mutex_lock+0x10/0x10
 ? fdget_pos+0x24d/0x4b0
 ksys_read+0xf7/0x1c0
 ? __pfx_ksys_read+0x10/0x10
 ? do_user_addr_fault+0x43b/0x9c0
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f0f74170fc9
Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 8
RSP: 002b:00007fffece049e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0f74170fc9
RDX: 0000000000001000 RSI: 00007fffece049f0 RDI: 0000000000000004
RBP: 00007fffece05ad0 R08: 0000000000000000 R09: 00007fffece04d90
R10: 0000000000000000 R11: 0000000000000206 R12: 00005651720a1100
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Allocated by task 298:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_slab_alloc+0x6e/0x70
 kmem_cache_alloc_node_noprof+0xe8/0x330
 copy_process+0x376/0x5e00
 create_io_thread+0xab/0xf0
 io_sq_offload_create+0x9ed/0xf20
 io_uring_setup+0x12b0/0x1cc0
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 22:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x37/0x50
 kmem_cache_free+0xc4/0x360
 rcu_core+0x5ff/0x19f0
 handle_softirqs+0x18c/0x530
 run_ksoftirqd+0x20/0x30
 smpboot_thread_fn+0x287/0x6c0
 kthread+0x30d/0x630
 ret_from_fork+0xef/0x1a0
 ret_from_fork_asm+0x1a/0x30

Last potentially related work creation:
 kasan_save_stack+0x33/0x60
 kasan_record_aux_stack+0x8c/0xa0
 __call_rcu_common.constprop.0+0x68/0x940
 __schedule+0xff2/0x2930
 __cond_resched+0x4c/0x80
 mutex_lock+0x5c/0xe0
 io_uring_del_tctx_node+0xe1/0x2b0
 io_uring_clean_tctx+0xb7/0x160
 io_uring_cancel_generic+0x34e/0x760
 do_exit+0x240/0x2350
 do_group_exit+0xab/0x220
 __x64_sys_exit_group+0x39/0x40
 x64_sys_call+0x1243/0x1840
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The buggy address belongs to the object at ffff88810de2cb00
 which belongs to the cache task_struct of size 3712
The buggy address is located 1992 bytes inside of
 freed 3712-byte region [ffff88810de2cb00, ffff88810de2d980)

which is caused by the task_struct pointed to by sq-&gt;thread being
released while it is being used in the function
__io_uring_show_fdinfo(). Holding ctx-&gt;uring_lock does not prevent ehre
relase or exit of sq-&gt;thread.

Fix this by assigning and looking up -&gt;thread under RCU, and grabbing a
reference to the task_struct. This e
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38106/">CVE-2025-38106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38106">CVE-2025-38106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245664">SUSE bug 1245664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055600" comment="kernel-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055601" comment="kernel-abi-stablelists-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055602" comment="kernel-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055603" comment="kernel-cross-headers-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055604" comment="kernel-debug-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055605" comment="kernel-debug-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055606" comment="kernel-debug-modules-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055607" comment="kernel-debug-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055608" comment="kernel-debug-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055609" comment="kernel-debug-uki-virt-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055610" comment="kernel-doc-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055611" comment="kernel-headers-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055612" comment="kernel-modules-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055613" comment="kernel-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055614" comment="kernel-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055615" comment="kernel-rt-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055616" comment="kernel-rt-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055617" comment="kernel-rt-debug-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055618" comment="kernel-rt-debug-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055619" comment="kernel-rt-debug-modules-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055620" comment="kernel-rt-debug-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055621" comment="kernel-rt-debug-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055622" comment="kernel-rt-modules-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055623" comment="kernel-rt-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055624" comment="kernel-rt-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055625" comment="kernel-tools-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055626" comment="kernel-tools-libs-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055627" comment="kernel-uki-virt-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055628" comment="kernel-uki-virt-addons-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055629" comment="libperf-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055630" comment="perf-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055631" comment="python3-perf-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055632" comment="rtla-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055633" comment="rv-5.14.0-611.38.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38109</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38109" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38109" ref_url="https://www.suse.com/security/cve/CVE-2025-38109" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix ECVF vports unload on shutdown flow

Fix shutdown flow UAF when a virtual function is created on the embedded
chip (ECVF) of a BlueField device. In such case the vport acl ingress
table is not properly destroyed.

ECVF functionality is independent of ecpf_vport_exists capability and
thus functions mlx5_eswitch_(enable|disable)_pf_vf_vports() should not
test it when enabling/disabling ECVF vports.

kernel log:
[] refcount_t: underflow; use-after-free.
[] WARNING: CPU: 3 PID: 1 at lib/refcount.c:28
   refcount_warn_saturate+0x124/0x220
----------------
[] Call trace:
[] refcount_warn_saturate+0x124/0x220
[] tree_put_node+0x164/0x1e0 [mlx5_core]
[] mlx5_destroy_flow_table+0x98/0x2c0 [mlx5_core]
[] esw_acl_ingress_table_destroy+0x28/0x40 [mlx5_core]
[] esw_acl_ingress_lgcy_cleanup+0x80/0xf4 [mlx5_core]
[] esw_legacy_vport_acl_cleanup+0x44/0x60 [mlx5_core]
[] esw_vport_cleanup+0x64/0x90 [mlx5_core]
[] mlx5_esw_vport_disable+0xc0/0x1d0 [mlx5_core]
[] mlx5_eswitch_unload_ec_vf_vports+0xcc/0x150 [mlx5_core]
[] mlx5_eswitch_disable_sriov+0x198/0x2a0 [mlx5_core]
[] mlx5_device_disable_sriov+0xb8/0x1e0 [mlx5_core]
[] mlx5_sriov_detach+0x40/0x50 [mlx5_core]
[] mlx5_unload+0x40/0xc4 [mlx5_core]
[] mlx5_unload_one_devl_locked+0x6c/0xe4 [mlx5_core]
[] mlx5_unload_one+0x3c/0x60 [mlx5_core]
[] shutdown+0x7c/0xa4 [mlx5_core]
[] pci_device_shutdown+0x3c/0xa0
[] device_shutdown+0x170/0x340
[] __do_sys_reboot+0x1f4/0x2a0
[] __arm64_sys_reboot+0x2c/0x40
[] invoke_syscall+0x78/0x100
[] el0_svc_common.constprop.0+0x54/0x184
[] do_el0_svc+0x30/0xac
[] el0_svc+0x48/0x160
[] el0t_64_sync_handler+0xa4/0x12c
[] el0t_64_sync+0x1a4/0x1a8
[] --[ end trace 9c4601d68c70030e ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38109/">CVE-2025-38109 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38109">CVE-2025-38109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245684">SUSE bug 1245684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245685">SUSE bug 1245685</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055917" comment="kernel-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055918" comment="kernel-abi-stablelists-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055919" comment="kernel-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055920" comment="kernel-cross-headers-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055921" comment="kernel-debug-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055922" comment="kernel-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055923" comment="kernel-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055924" comment="kernel-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055925" comment="kernel-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055926" comment="kernel-debug-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055927" comment="kernel-doc-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055928" comment="kernel-headers-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055929" comment="kernel-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055930" comment="kernel-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055931" comment="kernel-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055932" comment="kernel-rt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055933" comment="kernel-rt-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055934" comment="kernel-rt-debug-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055935" comment="kernel-rt-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055936" comment="kernel-rt-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055937" comment="kernel-rt-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055938" comment="kernel-rt-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055939" comment="kernel-rt-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055940" comment="kernel-rt-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055941" comment="kernel-rt-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055942" comment="kernel-tools-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055943" comment="kernel-tools-libs-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055944" comment="kernel-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055945" comment="kernel-uki-virt-addons-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055946" comment="libperf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055947" comment="perf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055948" comment="python3-perf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055949" comment="rtla-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055950" comment="rv-5.14.0-611.47.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38110</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38110" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38110" ref_url="https://www.suse.com/security/cve/CVE-2025-38110" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mdiobus: Fix potential out-of-bounds clause 45 read/write access

When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via C45 (clause 45) mdiobus,
there is no verification of parameters passed to the ioctl and
it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.

Fix that by adding address verification before C45 read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38110/">CVE-2025-38110 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38110">CVE-2025-38110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245665">SUSE bug 1245665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249458">SUSE bug 1249458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011365" comment="kernel-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011366" comment="kernel-abi-stablelists-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011367" comment="kernel-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011368" comment="kernel-cross-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011369" comment="kernel-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011370" comment="kernel-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011373" comment="kernel-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011374" comment="kernel-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011375" comment="kernel-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011376" comment="kernel-debug-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011379" comment="kernel-doc-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011380" comment="kernel-headers-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011381" comment="kernel-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011382" comment="kernel-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011383" comment="kernel-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011384" comment="kernel-rt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011385" comment="kernel-rt-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011386" comment="kernel-rt-debug-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011387" comment="kernel-rt-debug-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011389" comment="kernel-rt-debug-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011390" comment="kernel-rt-debug-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011391" comment="kernel-rt-debug-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011392" comment="kernel-rt-debug-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011394" comment="kernel-rt-kvm-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011395" comment="kernel-rt-modules-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011396" comment="kernel-rt-modules-core-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011397" comment="kernel-rt-modules-extra-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011398" comment="kernel-tools-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011399" comment="kernel-tools-libs-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011401" comment="kernel-uki-virt-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011402" comment="kernel-uki-virt-addons-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011403" comment="libperf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011404" comment="perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011405" comment="python3-perf-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011406" comment="rtla-5.14.0-570.30.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011407" comment="rv-5.14.0-570.30.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38116</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38116" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38116" ref_url="https://www.suse.com/security/cve/CVE-2025-38116" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix uaf in ath12k_core_init()

When the execution of ath12k_core_hw_group_assign() or
ath12k_core_hw_group_create() fails, the registered notifier chain is not
unregistered properly. Its memory is freed after rmmod, which may trigger
to a use-after-free (UAF) issue if there is a subsequent access to this
notifier chain.

Fixes the issue by calling ath12k_core_panic_notifier_unregister() in
failure cases.

Call trace:
 notifier_chain_register+0x4c/0x1f0 (P)
 atomic_notifier_chain_register+0x38/0x68
 ath12k_core_init+0x50/0x4e8 [ath12k]
 ath12k_pci_probe+0x5f8/0xc28 [ath12k]
 pci_device_probe+0xbc/0x1a8
 really_probe+0xc8/0x3a0
 __driver_probe_device+0x84/0x1b0
 driver_probe_device+0x44/0x130
 __driver_attach+0xcc/0x208
 bus_for_each_dev+0x84/0x100
 driver_attach+0x2c/0x40
 bus_add_driver+0x130/0x260
 driver_register+0x70/0x138
 __pci_register_driver+0x68/0x80
 ath12k_pci_init+0x30/0x68 [ath12k]
 ath12k_init+0x28/0x78 [ath12k]

Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38116/">CVE-2025-38116 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38116">CVE-2025-38116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245692">SUSE bug 1245692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38124</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38124" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38124" ref_url="https://www.suse.com/security/cve/CVE-2025-38124" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix udp gso skb_segment after pull from frag_list

Commit a1e40ac5b5e9 ("net: gso: fix udp gso fraglist segmentation after
pull from frag_list") detected invalid geometry in frag_list skbs and
redirects them from skb_segment_list to more robust skb_segment. But some
packets with modified geometry can also hit bugs in that code. We don't
know how many such cases exist. Addressing each one by one also requires
touching the complex skb_segment code, which risks introducing bugs for
other types of skbs. Instead, linearize all these packets that fail the
basic invariants on gso fraglist skbs. That is more robust.

If only part of the fraglist payload is pulled into head_skb, it will
always cause exception when splitting skbs by skb_segment. For detailed
call stack information, see below.

Valid SKB_GSO_FRAGLIST skbs
- consist of two or more segments
- the head_skb holds the protocol headers plus first gso_size
- one or more frag_list skbs hold exactly one segment
- all but the last must be gso_size

Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can
modify fraglist skbs, breaking these invariants.

In extreme cases they pull one part of data into skb linear. For UDP,
this  causes three payloads with lengths of (11,11,10) bytes were
pulled tail to become (12,10,10) bytes.

The skbs no longer meets the above SKB_GSO_FRAGLIST conditions because
payload was pulled into head_skb, it needs to be linearized before pass
to regular skb_segment.

    skb_segment+0xcd0/0xd14
    __udp_gso_segment+0x334/0x5f4
    udp4_ufo_fragment+0x118/0x15c
    inet_gso_segment+0x164/0x338
    skb_mac_gso_segment+0xc4/0x13c
    __skb_gso_segment+0xc4/0x124
    validate_xmit_skb+0x9c/0x2c0
    validate_xmit_skb_list+0x4c/0x80
    sch_direct_xmit+0x70/0x404
    __dev_queue_xmit+0x64c/0xe5c
    neigh_resolve_output+0x178/0x1c4
    ip_finish_output2+0x37c/0x47c
    __ip_finish_output+0x194/0x240
    ip_finish_output+0x20/0xf4
    ip_output+0x100/0x1a0
    NF_HOOK+0xc4/0x16c
    ip_forward+0x314/0x32c
    ip_rcv+0x90/0x118
    __netif_receive_skb+0x74/0x124
    process_backlog+0xe8/0x1a4
    __napi_poll+0x5c/0x1f8
    net_rx_action+0x154/0x314
    handle_softirqs+0x154/0x4b8

    [118.376811] [C201134] rxq0_pus: [name:bug&amp;]kernel BUG at net/core/skbuff.c:4278!
    [118.376829] [C201134] rxq0_pus: [name:traps&amp;]Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
    [118.470774] [C201134] rxq0_pus: [name:mrdump&amp;]Kernel Offset: 0x178cc00000 from 0xffffffc008000000
    [118.470810] [C201134] rxq0_pus: [name:mrdump&amp;]PHYS_OFFSET: 0x40000000
    [118.470827] [C201134] rxq0_pus: [name:mrdump&amp;]pstate: 60400005 (nZCv daif +PAN -UAO)
    [118.470848] [C201134] rxq0_pus: [name:mrdump&amp;]pc : [0xffffffd79598aefc] skb_segment+0xcd0/0xd14
    [118.470900] [C201134] rxq0_pus: [name:mrdump&amp;]lr : [0xffffffd79598a5e8] skb_segment+0x3bc/0xd14
    [118.470928] [C201134] rxq0_pus: [name:mrdump&amp;]sp : ffffffc008013770
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38124/">CVE-2025-38124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38124">CVE-2025-38124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245690">SUSE bug 1245690</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38129</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38129" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003235.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024720.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

page_pool: Fix use-after-free in page_pool_recycle_in_ring

syzbot reported a uaf in page_pool_recycle_in_ring:

BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862
Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943

CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:489
 kasan_report+0x143/0x180 mm/kasan/report.c:602
 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline]
 _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 ptr_ring_produce_bh include/linux/ptr_ring.h:164 [inline]
 page_pool_recycle_in_ring net/core/page_pool.c:707 [inline]
 page_pool_put_unrefed_netmem+0x748/0xb00 net/core/page_pool.c:826
 page_pool_put_netmem include/net/page_pool/helpers.h:323 [inline]
 page_pool_put_full_netmem include/net/page_pool/helpers.h:353 [inline]
 napi_pp_put_page+0x149/0x2b0 net/core/skbuff.c:1036
 skb_pp_recycle net/core/skbuff.c:1047 [inline]
 skb_free_head net/core/skbuff.c:1094 [inline]
 skb_release_data+0x6c4/0x8a0 net/core/skbuff.c:1125
 skb_release_all net/core/skbuff.c:1190 [inline]
 __kfree_skb net/core/skbuff.c:1204 [inline]
 sk_skb_reason_drop+0x1c9/0x380 net/core/skbuff.c:1242
 kfree_skb_reason include/linux/skbuff.h:1263 [inline]
 __skb_queue_purge_reason include/linux/skbuff.h:3343 [inline]

root cause is:

page_pool_recycle_in_ring
  ptr_ring_produce
    spin_lock(&amp;r-&gt;producer_lock);
    WRITE_ONCE(r-&gt;queue[r-&gt;producer++], ptr)
      //recycle last page to pool
				page_pool_release
				  page_pool_scrub
				    page_pool_empty_ring
				      ptr_ring_consume
				      page_pool_return_page  //release all page
				  __page_pool_destroy
				     free_percpu(pool-&gt;recycle_stats);
				     free(pool) //free

     spin_unlock(&amp;r-&gt;producer_lock); //pool-&gt;ring uaf read
  recycle_stat_inc(pool, ring);

page_pool can be free while page pool recycle the last page in ring.
Add producer-lock barrier to page_pool_release to prevent the page
pool from being free before all pages have been recycled.

recycle_stat_inc() is empty when CONFIG_PAGE_POOL_STATS is not
enabled, which will trigger Wempty-body build warning. Add definition
for pool stat macro to fix warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245723">SUSE bug 1245723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258139">SUSE bug 1258139</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055444" comment="kernel-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055445" comment="kernel-abi-stablelists-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055446" comment="kernel-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055447" comment="kernel-cross-headers-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055448" comment="kernel-debug-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055449" comment="kernel-debug-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055450" comment="kernel-debug-modules-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055451" comment="kernel-debug-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055452" comment="kernel-debug-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055453" comment="kernel-debug-uki-virt-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055454" comment="kernel-doc-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055455" comment="kernel-headers-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055456" comment="kernel-modules-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055457" comment="kernel-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055458" comment="kernel-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055459" comment="kernel-rt-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055460" comment="kernel-rt-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055461" comment="kernel-rt-debug-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055462" comment="kernel-rt-debug-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055463" comment="kernel-rt-debug-modules-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055464" comment="kernel-rt-debug-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055465" comment="kernel-rt-debug-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055466" comment="kernel-rt-modules-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055467" comment="kernel-rt-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055468" comment="kernel-rt-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055469" comment="kernel-tools-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055470" comment="kernel-tools-libs-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055471" comment="kernel-uki-virt-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055472" comment="kernel-uki-virt-addons-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055473" comment="libperf-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055474" comment="perf-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055475" comment="python3-perf-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055476" comment="rtla-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055477" comment="rv-5.14.0-611.35.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38141" ref_url="https://www.suse.com/security/cve/CVE-2025-38141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix dm_blk_report_zones

If dm_get_live_table() returned NULL, dm_put_live_table() was never
called. Also, it is possible that md-&gt;zone_revalidate_map will change
while calling this function. Only read it once, so that we are always
using the same value. Otherwise we might miss a call to
dm_put_live_table().

Finally, while md-&gt;zone_revalidate_map is set and a process is calling
blk_revalidate_disk_zones() to set up the zone append emulation
resources, it is possible that another process, perhaps triggered by
blkdev_report_zones_ioctl(), will call dm_blk_report_zones(). If
blk_revalidate_disk_zones() fails, these resources can be freed while
the other process is still using them, causing a use-after-free error.

blk_revalidate_disk_zones() will only ever be called when initially
setting up the zone append emulation resources, such as when setting up
a zoned dm-crypt table for the first time. Further table swaps will not
set md-&gt;zone_revalidate_map or call blk_revalidate_disk_zones().
However it must be called using the new table (referenced by
md-&gt;zone_revalidate_map) and the new queue limits while the DM device is
suspended. dm_blk_report_zones() needs some way to distinguish between a
call from blk_revalidate_disk_zones(), which must be allowed to use
md-&gt;zone_revalidate_map to access this not yet activated table, and all
other calls to dm_blk_report_zones(), which should not be allowed while
the device is suspended and cannot use md-&gt;zone_revalidate_map, since
the zone resources might be freed by the process currently calling
blk_revalidate_disk_zones().

Solve this by tracking the process that sets md-&gt;zone_revalidate_map in
dm_revalidate_zones() and only allowing that process to make use of it
in dm_blk_report_zones().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38141/">CVE-2025-38141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38141">CVE-2025-38141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245715">SUSE bug 1245715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245716">SUSE bug 1245716</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38159</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38159" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001909.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds

Set the size to 6 instead of 2, since 'para' array is passed to
'rtw_fw_bt_wifi_control(rtwdev, para[0], &amp;para[1])', which reads
5 bytes:

void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data)
{
    ...
    SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data);
    SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1));
    ...
    SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4));

Detected using the static analysis tool - Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245751">SUSE bug 1245751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257629">SUSE bug 1257629</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002632.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atm: fix /proc/net/atm/lec handling

/proc/net/atm/lec must ensure safety against dev_lec[] changes.

It appears it had dev_put() calls without prior dev_hold(),
leading to imbalance and UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245970">SUSE bug 1245970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245971">SUSE bug 1245971</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38200" ref_url="https://www.suse.com/security/cve/CVE-2025-38200" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14438" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001933.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix MMIO write access to an invalid page in i40e_clear_hw

When the device sends a specific input, an integer underflow can occur, leading
to MMIO write access to an invalid page.

Prevent the integer underflow by changing the type of related variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38200/">CVE-2025-38200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38200">CVE-2025-38200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246045">SUSE bug 1246045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246046">SUSE bug 1246046</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38206</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38206" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38206" ref_url="https://www.suse.com/security/cve/CVE-2025-38206" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix double free in delayed_free

The double free could happen in the following path.

exfat_create_upcase_table()
        exfat_create_upcase_table() : return error
        exfat_free_upcase_table() : free -&gt;vol_utbl
        exfat_load_default_upcase_table : return error
     exfat_kill_sb()
           delayed_free()
                  exfat_free_upcase_table() &lt;--------- double free
This patch set -&gt;vol_util as NULL after freeing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38206/">CVE-2025-38206 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38206">CVE-2025-38206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246073">SUSE bug 1246073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246075">SUSE bug 1246075</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055444" comment="kernel-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055445" comment="kernel-abi-stablelists-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055446" comment="kernel-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055447" comment="kernel-cross-headers-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055448" comment="kernel-debug-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055449" comment="kernel-debug-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055450" comment="kernel-debug-modules-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055451" comment="kernel-debug-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055452" comment="kernel-debug-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055453" comment="kernel-debug-uki-virt-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055454" comment="kernel-doc-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055455" comment="kernel-headers-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055456" comment="kernel-modules-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055457" comment="kernel-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055458" comment="kernel-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055459" comment="kernel-rt-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055460" comment="kernel-rt-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055461" comment="kernel-rt-debug-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055462" comment="kernel-rt-debug-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055463" comment="kernel-rt-debug-modules-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055464" comment="kernel-rt-debug-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055465" comment="kernel-rt-debug-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055466" comment="kernel-rt-modules-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055467" comment="kernel-rt-modules-core-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055468" comment="kernel-rt-modules-extra-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055469" comment="kernel-tools-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055470" comment="kernel-tools-libs-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055471" comment="kernel-uki-virt-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055472" comment="kernel-uki-virt-addons-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055473" comment="libperf-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055474" comment="perf-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055475" comment="python3-perf-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055476" comment="rtla-5.14.0-611.35.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055477" comment="rv-5.14.0-611.35.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38211" ref_url="https://www.suse.com/security/cve/CVE-2025-38211" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction

The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last
deref") simplified cm_id resource management by freeing cm_id once all
references to the cm_id were removed. The references are removed either
upon completion of iw_cm event handlers or when the application destroys
the cm_id. This commit introduced the use-after-free condition where
cm_id_private object could still be in use by event handler works during
the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a
use-after-free related to destroying CM IDs") addressed this use-after-
free by flushing all pending works at the cm_id destruction.

However, still another use-after-free possibility remained. It happens
with the work objects allocated for each cm_id_priv within
alloc_work_entries() during cm_id creation, and subsequently freed in
dealloc_work_entries() once all references to the cm_id are removed.
If the cm_id's last reference is decremented in the event handler work,
the work object for the work itself gets removed, and causes the use-
after-free BUG below:

  BUG: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250
  Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091

  CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
  Workqueue:  0x0 (iw_cm_wq)
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6a/0x90
   print_report+0x174/0x554
   ? __virt_addr_valid+0x208/0x430
   ? __pwq_activate_work+0x1ff/0x250
   kasan_report+0xae/0x170
   ? __pwq_activate_work+0x1ff/0x250
   __pwq_activate_work+0x1ff/0x250
   pwq_dec_nr_in_flight+0x8c5/0xfb0
   process_one_work+0xc11/0x1460
   ? __pfx_process_one_work+0x10/0x10
   ? assign_work+0x16c/0x240
   worker_thread+0x5ef/0xfd0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x3b0/0x770
   ? __pfx_kthread+0x10/0x10
   ? rcu_is_watching+0x11/0xb0
   ? _raw_spin_unlock_irq+0x24/0x50
   ? rcu_is_watching+0x11/0xb0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x30/0x70
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

  Allocated by task 147416:
   kasan_save_stack+0x2c/0x50
   kasan_save_track+0x10/0x30
   __kasan_kmalloc+0xa6/0xb0
   alloc_work_entries+0xa9/0x260 [iw_cm]
   iw_cm_connect+0x23/0x4a0 [iw_cm]
   rdma_connect_locked+0xbfd/0x1920 [rdma_cm]
   nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma]
   cma_cm_event_handler+0xae/0x320 [rdma_cm]
   cma_work_handler+0x106/0x1b0 [rdma_cm]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

  Freed by task 147091:
   kasan_save_stack+0x2c/0x50
   kasan_save_track+0x10/0x30
   kasan_save_free_info+0x37/0x60
   __kasan_slab_free+0x4b/0x70
   kfree+0x13a/0x4b0
   dealloc_work_entries+0x125/0x1f0 [iw_cm]
   iwcm_deref_id+0x6f/0xa0 [iw_cm]
   cm_work_handler+0x136/0x1ba0 [iw_cm]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

  Last potentially related work creation:
   kasan_save_stack+0x2c/0x50
   kasan_record_aux_stack+0xa3/0xb0
   __queue_work+0x2ff/0x1390
   queue_work_on+0x67/0xc0
   cm_event_handler+0x46a/0x820 [iw_cm]
   siw_cm_upcall+0x330/0x650 [siw]
   siw_cm_work_handler+0x6b9/0x2b20 [siw]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

This BUG is reproducible by repeating the blktests test case nvme/061
for the rdma transport and the siw driver.

To avoid the use-after-free of cm_id_private work objects, ensure that
the last reference to the cm_id is decremented not in the event handler
works, but in the cm_id destruction context. For that purpose, mo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38211/">CVE-2025-38211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246008">SUSE bug 1246008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38250</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38250" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38250" ref_url="https://www.suse.com/security/cve/CVE-2025-38250" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001923.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_core: Fix use-after-free in vhci_flush()

syzbot reported use-after-free in vhci_flush() without repro. [0]

From the splat, a thread close()d a vhci file descriptor while
its device was being used by iotcl() on another thread.

Once the last fd refcnt is released, vhci_release() calls
hci_unregister_dev(), hci_free_dev(), and kfree() for struct
vhci_data, which is set to hci_dev-&gt;dev-&gt;driver_data.

The problem is that there is no synchronisation after unlinking
hdev from hci_dev_list in hci_unregister_dev().  There might be
another thread still accessing the hdev which was fetched before
the unlink operation.

We can use SRCU for such synchronisation.

Let's run hci_dev_reset() under SRCU and wait for its completion
in hci_unregister_dev().

Another option would be to restore hci_dev-&gt;destruct(), which was
removed in commit 587ae086f6e4 ("Bluetooth: Remove unused
hci-destruct cb").  However, this would not be a good solution, as
we should not run hci_unregister_dev() while there are in-flight
ioctl() requests, which could lead to another data-race KCSAN splat.

Note that other drivers seem to have the same problem, for exmaple,
virtbt_remove().

[0]:
BUG: KASAN: slab-use-after-free in skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]
BUG: KASAN: slab-use-after-free in skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937
Read of size 8 at addr ffff88807cb8d858 by task syz.1.219/6718

CPU: 1 UID: 0 PID: 6718 Comm: syz.1.219 Not tainted 6.16.0-rc1-syzkaller-00196-g08207f42d3ff #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xd2/0x2b0 mm/kasan/report.c:521
 kasan_report+0x118/0x150 mm/kasan/report.c:634
 skb_queue_empty_lockless include/linux/skbuff.h:1891 [inline]
 skb_queue_purge_reason+0x99/0x360 net/core/skbuff.c:3937
 skb_queue_purge include/linux/skbuff.h:3368 [inline]
 vhci_flush+0x44/0x50 drivers/bluetooth/hci_vhci.c:69
 hci_dev_do_reset net/bluetooth/hci_core.c:552 [inline]
 hci_dev_reset+0x420/0x5c0 net/bluetooth/hci_core.c:592
 sock_do_ioctl+0xd9/0x300 net/socket.c:1190
 sock_ioctl+0x576/0x790 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fcf5b98e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcf5c7b9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007fcf5bbb6160 RCX: 00007fcf5b98e929
RDX: 0000000000000000 RSI: 00000000400448cb RDI: 0000000000000009
RBP: 00007fcf5ba10b39 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007fcf5bbb6160 R15: 00007ffd6353d528
 &lt;/TASK&gt;

Allocated by task 6535:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 vhci_open+0x57/0x360 drivers/bluetooth/hci_vhci.c:635
 misc_open+0x2bc/0x330 drivers/char/misc.c:161
 chrdev_open+0x4c9/0x5e0 fs/char_dev.c:414
 do_dentry_open+0xdf0/0x1970 fs/open.c:964
 vfs_open+0x3b/0x340 fs/open.c:1094
 do_open fs/namei.c:3887 [inline]
 path_openat+0x2ee5/0x3830 fs/name
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38250/">CVE-2025-38250 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38250">CVE-2025-38250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246182">SUSE bug 1246182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38292</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38292" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38292" ref_url="https://www.suse.com/security/cve/CVE-2025-38292" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13602" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix invalid access to memory

In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean
is_continuation is part of rxcb.
Currently, after freeing the skb, the rxcb-&gt;is_continuation accessed
again which is wrong since the memory is already freed.
This might lead use-after-free error.

Hence, fix by locally defining bool is_continuation from rxcb,
so that after freeing skb, is_continuation can be used.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-13"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38292/">CVE-2025-38292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38292">CVE-2025-38292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246295">SUSE bug 1246295</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013382" comment="kernel-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013383" comment="kernel-abi-stablelists-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013384" comment="kernel-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013385" comment="kernel-cross-headers-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013386" comment="kernel-debug-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013387" comment="kernel-debug-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013390" comment="kernel-debug-modules-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013391" comment="kernel-debug-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013392" comment="kernel-debug-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013393" comment="kernel-debug-uki-virt-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013396" comment="kernel-doc-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013397" comment="kernel-headers-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013398" comment="kernel-modules-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013399" comment="kernel-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013400" comment="kernel-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013401" comment="kernel-rt-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013402" comment="kernel-rt-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013403" comment="kernel-rt-debug-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013404" comment="kernel-rt-debug-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013406" comment="kernel-rt-debug-kvm-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013407" comment="kernel-rt-debug-modules-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013408" comment="kernel-rt-debug-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013409" comment="kernel-rt-debug-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013411" comment="kernel-rt-kvm-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013412" comment="kernel-rt-modules-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013413" comment="kernel-rt-modules-core-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013414" comment="kernel-rt-modules-extra-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013415" comment="kernel-tools-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013416" comment="kernel-tools-libs-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013418" comment="kernel-uki-virt-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013419" comment="kernel-uki-virt-addons-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013420" comment="libperf-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013421" comment="perf-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013422" comment="python3-perf-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013423" comment="rtla-5.14.0-570.33.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013424" comment="rv-5.14.0-570.33.2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38332</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001998.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Use memcpy() for BIOS version

The strlcat() with FORTIFY support is triggering a panic because it
thinks the target buffer will overflow although the correct target
buffer size is passed in.

Anyway, instead of memset() with 0 followed by a strlcat(), just use
memcpy() and ensure that the resulting buffer is NULL terminated.

BIOSVersion is only used for the lpfc_printf_log() which expects a
properly terminated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-13"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246375">SUSE bug 1246375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017875" comment="kernel-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017876" comment="kernel-abi-stablelists-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017877" comment="kernel-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017878" comment="kernel-cross-headers-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017879" comment="kernel-debug-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017880" comment="kernel-debug-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017883" comment="kernel-debug-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017884" comment="kernel-debug-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017885" comment="kernel-debug-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017886" comment="kernel-debug-uki-virt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017889" comment="kernel-doc-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017890" comment="kernel-headers-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017891" comment="kernel-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017892" comment="kernel-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017893" comment="kernel-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017894" comment="kernel-rt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017895" comment="kernel-rt-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017896" comment="kernel-rt-debug-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017897" comment="kernel-rt-debug-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017899" comment="kernel-rt-debug-kvm-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017900" comment="kernel-rt-debug-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017901" comment="kernel-rt-debug-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017902" comment="kernel-rt-debug-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017904" comment="kernel-rt-kvm-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017905" comment="kernel-rt-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017906" comment="kernel-rt-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017907" comment="kernel-rt-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017908" comment="kernel-tools-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017909" comment="kernel-tools-libs-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017911" comment="kernel-uki-virt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017912" comment="kernel-uki-virt-addons-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017913" comment="libperf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017914" comment="perf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017915" comment="python3-perf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017916" comment="rtla-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017917" comment="rv-5.14.0-570.42.2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38349" ref_url="https://www.suse.com/security/cve/CVE-2025-38349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eventpoll: don't decrement ep refcount while still holding the ep mutex

Jann Horn points out that epoll is decrementing the ep refcount and then
doing a

    mutex_unlock(&amp;ep-&gt;mtx);

afterwards. That's very wrong, because it can lead to a use-after-free.

That pattern is actually fine for the very last reference, because the
code in question will delay the actual call to "ep_free(ep)" until after
it has unlocked the mutex.

But it's wrong for the much subtler "next to last" case when somebody
*else* may also be dropping their reference and free the ep while we're
still using the mutex.

Note that this is true even if that other user is also using the same ep
mutex: mutexes, unlike spinlocks, can not be used for object ownership,
even if they guarantee mutual exclusion.

A mutex "unlock" operation is not atomic, and as one user is still
accessing the mutex as part of unlocking it, another user can come in
and get the now released mutex and free the data structure while the
first user is still cleaning up.

See our mutex documentation in Documentation/locking/mutex-design.rst,
in particular the section [1] about semantics:

	"mutex_unlock() may access the mutex structure even after it has
	 internally released the lock already - so it's not safe for
	 another context to acquire the mutex and assume that the
	 mutex_unlock() context is not using the structure anymore"

So if we drop our ep ref before the mutex unlock, but we weren't the
last one, we may then unlock the mutex, another user comes in, drops
_their_ reference and releases the 'ep' as it now has no users - all
while the mutex_unlock() is still accessing it.

Fix this by simply moving the ep refcount dropping to outside the mutex:
the refcount itself is atomic, and doesn't need mutex protection (that's
the whole _point_ of refcounts: unlike mutexes, they are inherently
about object lifetimes).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38349/">CVE-2025-38349 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38349">CVE-2025-38349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246777">SUSE bug 1246777</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38350</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38350" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Always pass notifications when child class becomes empty

Certain classful qdiscs may invoke their classes' dequeue handler on an
enqueue operation. This may unexpectedly empty the child qdisc and thus
make an in-flight class passive via qlen_notify(). Most qdiscs do not
expect such behaviour at this point in time and may re-activate the
class eventually anyways which will lead to a use-after-free.

The referenced fix commit attempted to fix this behavior for the HFSC
case by moving the backlog accounting around, though this turned out to
be incomplete since the parent's parent may run into the issue too.
The following reproducer demonstrates this use-after-free:

    tc qdisc add dev lo root handle 1: drr
    tc filter add dev lo parent 1: basic classid 1:1
    tc class add dev lo parent 1: classid 1:1 drr
    tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1
    tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0
    tc qdisc add dev lo parent 2:1 handle 3: netem
    tc qdisc add dev lo parent 3:1 handle 4: blackhole

    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888
    tc class delete dev lo classid 1:1
    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888

Since backlog accounting issues leading to a use-after-frees on stale
class pointers is a recurring pattern at this point, this patch takes
a different approach. Instead of trying to fix the accounting, the patch
ensures that qdisc_tree_reduce_backlog always calls qlen_notify when
the child qdisc is empty. This solves the problem because deletion of
qdiscs always involves a call to qdisc_reset() and / or
qdisc_purge_queue() which ultimately resets its qlen to 0 thus causing
the following qdisc_tree_reduce_backlog() to report to the parent. Note
that this may call qlen_notify on passive classes multiple times. This
is not a problem after the recent patch series that made all the
classful qdiscs qlen_notify() handlers idempotent.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246781">SUSE bug 1246781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247043">SUSE bug 1247043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38351</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38351" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38351" ref_url="https://www.suse.com/security/cve/CVE-2025-38351" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002061.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush

In KVM guests with Hyper-V hypercalls enabled, the hypercalls
HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX
allow a guest to request invalidation of portions of a virtual TLB.
For this, the hypercall parameter includes a list of GVAs that are supposed
to be invalidated.

However, when non-canonical GVAs are passed, there is currently no
filtering in place and they are eventually passed to checked invocations of
INVVPID on Intel / INVLPGA on AMD.  While AMD's INVLPGA silently ignores
non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly
signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error():

  invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000
  WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482
  invvpid_error+0x91/0xa0 [kvm_intel]
  Modules linked in: kvm_intel kvm 9pnet_virtio irqbypass fuse
  CPU: 6 UID: 0 PID: 326 Comm: kvm-vm Not tainted 6.15.0 #14 PREEMPT(voluntary)
  RIP: 0010:invvpid_error+0x91/0xa0 [kvm_intel]
  Call Trace:
    vmx_flush_tlb_gva+0x320/0x490 [kvm_intel]
    kvm_hv_vcpu_flush_tlb+0x24f/0x4f0 [kvm]
    kvm_arch_vcpu_ioctl_run+0x3013/0x5810 [kvm]

Hyper-V documents that invalid GVAs (those that are beyond a partition's
GVA space) are to be ignored.  While not completely clear whether this
ruling also applies to non-canonical GVAs, it is likely fine to make that
assumption, and manual testing on Azure confirms "real" Hyper-V interprets
the specification in the same way.

Skip non-canonical GVAs when processing the list of address to avoid
tripping the INVVPID failure.  Alternatively, KVM could filter out "bad"
GVAs before inserting into the FIFO, but practically speaking the only
downside of pushing validation to the final processing is that doing so
is suboptimal for the guest, and no well-behaved guest will request TLB
flushes for non-canonical addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38351/">CVE-2025-38351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38351">CVE-2025-38351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246782">SUSE bug 1246782</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020412" comment="kernel-rt-debug-kvm-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020417" comment="kernel-rt-kvm-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38352</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38352" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15471" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001992.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001998.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

If an exiting non-autoreaping task has already passed exit_notify() and
calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent
or debugger right after unlock_task_sighand().

If a concurrent posix_cpu_timer_del() runs at that moment, it won't be
able to detect timer-&gt;it.cpu.firing != 0: cpu_timer_task_rcu() and/or
lock_task_sighand() will fail.

Add the tsk-&gt;exit_state check into run_posix_cpu_timers() to fix this.

This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because
exit_task_work() is called before exit_notify(). But the check still
makes sense, task_work_add(&amp;tsk-&gt;posix_cputimers_work.work) will fail
anyway in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-13"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249205">SUSE bug 1249205</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017875" comment="kernel-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017876" comment="kernel-abi-stablelists-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017877" comment="kernel-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017878" comment="kernel-cross-headers-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017879" comment="kernel-debug-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017880" comment="kernel-debug-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017883" comment="kernel-debug-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017884" comment="kernel-debug-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017885" comment="kernel-debug-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017886" comment="kernel-debug-uki-virt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017889" comment="kernel-doc-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017890" comment="kernel-headers-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017891" comment="kernel-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017892" comment="kernel-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017893" comment="kernel-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017894" comment="kernel-rt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017895" comment="kernel-rt-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017896" comment="kernel-rt-debug-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017897" comment="kernel-rt-debug-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017899" comment="kernel-rt-debug-kvm-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017900" comment="kernel-rt-debug-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017901" comment="kernel-rt-debug-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017902" comment="kernel-rt-debug-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017904" comment="kernel-rt-kvm-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017905" comment="kernel-rt-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017906" comment="kernel-rt-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017907" comment="kernel-rt-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017908" comment="kernel-tools-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017909" comment="kernel-tools-libs-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017911" comment="kernel-uki-virt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017912" comment="kernel-uki-virt-addons-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017913" comment="libperf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017914" comment="perf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017915" comment="python3-perf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017916" comment="rtla-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017917" comment="rv-5.14.0-570.42.2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38380</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38380" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001923.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247028">SUSE bug 1247028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247029">SUSE bug 1247029</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38392" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38392" ref_url="https://www.suse.com/security/cve/CVE-2025-38392" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001984.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: convert control queue mutex to a spinlock

With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated
on module load:

[  324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578
[  324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager
[  324.701689] preempt_count: 201, expected: 0
[  324.701693] RCU nest depth: 0, expected: 0
[  324.701697] 2 locks held by NetworkManager/1582:
[  324.701702]  #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0
[  324.701730]  #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870
[  324.701749] Preemption disabled at:
[  324.701752] [&lt;ffffffff9cd23b9d&gt;] __dev_open+0x3dd/0x870
[  324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary)
[  324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50FCP2SBSTD, BIOS SE5C741.86B.01.01.0001.2211140926 11/14/2022
[  324.701774] Call Trace:
[  324.701777]  &lt;TASK&gt;
[  324.701779]  dump_stack_lvl+0x5d/0x80
[  324.701788]  ? __dev_open+0x3dd/0x870
[  324.701793]  __might_resched.cold+0x1ef/0x23d
&lt;..&gt;
[  324.701818]  __mutex_lock+0x113/0x1b80
&lt;..&gt;
[  324.701917]  idpf_ctlq_clean_sq+0xad/0x4b0 [idpf]
[  324.701935]  ? kasan_save_track+0x14/0x30
[  324.701941]  idpf_mb_clean+0x143/0x380 [idpf]
&lt;..&gt;
[  324.701991]  idpf_send_mb_msg+0x111/0x720 [idpf]
[  324.702009]  idpf_vc_xn_exec+0x4cc/0x990 [idpf]
[  324.702021]  ? rcu_is_watching+0x12/0xc0
[  324.702035]  idpf_add_del_mac_filters+0x3ed/0xb50 [idpf]
&lt;..&gt;
[  324.702122]  __hw_addr_sync_dev+0x1cf/0x300
[  324.702126]  ? find_held_lock+0x32/0x90
[  324.702134]  idpf_set_rx_mode+0x317/0x390 [idpf]
[  324.702152]  __dev_open+0x3f8/0x870
[  324.702159]  ? __pfx___dev_open+0x10/0x10
[  324.702174]  __dev_change_flags+0x443/0x650
&lt;..&gt;
[  324.702208]  netif_change_flags+0x80/0x160
[  324.702218]  do_setlink.isra.0+0x16a0/0x3960
&lt;..&gt;
[  324.702349]  rtnl_newlink+0x12fd/0x21e0

The sequence is as follows:
	rtnl_newlink()-&gt;
	__dev_change_flags()-&gt;
	__dev_open()-&gt;
	dev_set_rx_mode() - &gt;  # disables BH and grabs "dev-&gt;addr_list_lock"
	idpf_set_rx_mode() -&gt;  # proceed only if VIRTCHNL2_CAP_MACFILTER is ON
	__dev_uc_sync() -&gt;
	idpf_add_mac_filter -&gt;
	idpf_add_del_mac_filters -&gt;
	idpf_send_mb_msg() -&gt;
	idpf_mb_clean() -&gt;
	idpf_ctlq_clean_sq()   # mutex_lock(cq_lock)

Fix by converting cq_lock to a spinlock. All operations under the new
lock are safe except freeing the DMA memory, which may use vunmap(). Fix
by requesting a contiguous physical memory for the DMA mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38392/">CVE-2025-38392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247169">SUSE bug 1247169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017422" comment="kernel-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017423" comment="kernel-abi-stablelists-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017424" comment="kernel-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017425" comment="kernel-cross-headers-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017426" comment="kernel-debug-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017427" comment="kernel-debug-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017430" comment="kernel-debug-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017431" comment="kernel-debug-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017432" comment="kernel-debug-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017433" comment="kernel-debug-uki-virt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017436" comment="kernel-doc-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017437" comment="kernel-headers-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017438" comment="kernel-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017439" comment="kernel-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017440" comment="kernel-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017441" comment="kernel-rt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017442" comment="kernel-rt-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017443" comment="kernel-rt-debug-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017444" comment="kernel-rt-debug-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017446" comment="kernel-rt-debug-kvm-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017447" comment="kernel-rt-debug-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017448" comment="kernel-rt-debug-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017449" comment="kernel-rt-debug-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017451" comment="kernel-rt-kvm-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017452" comment="kernel-rt-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017453" comment="kernel-rt-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017454" comment="kernel-rt-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017455" comment="kernel-tools-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017456" comment="kernel-tools-libs-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017458" comment="kernel-uki-virt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017459" comment="kernel-uki-virt-addons-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017460" comment="libperf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017461" comment="perf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017462" comment="python3-perf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017463" comment="rtla-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017464" comment="rv-5.14.0-570.41.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38393</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38393" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38393" ref_url="https://www.suse.com/security/cve/CVE-2025-38393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN

We found a few different systems hung up in writeback waiting on the same
page lock, and one task waiting on the NFS_LAYOUT_DRAIN bit in
pnfs_update_layout(), however the pnfs_layout_hdr's plh_outstanding count
was zero.

It seems most likely that this is another race between the waiter and waker
similar to commit ed0172af5d6f ("SUNRPC: Fix a race to wake a sync task").
Fix it up by applying the advised barrier.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38393/">CVE-2025-38393 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247170">SUSE bug 1247170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009805871" comment="bpftool-7.0.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805872" comment="kernel-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805873" comment="kernel-abi-stablelists-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805874" comment="kernel-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805875" comment="kernel-cross-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805876" comment="kernel-debug-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805877" comment="kernel-debug-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805880" comment="kernel-debug-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805881" comment="kernel-debug-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805882" comment="kernel-debug-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805883" comment="kernel-debug-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805886" comment="kernel-doc-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805887" comment="kernel-headers-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805888" comment="kernel-modules-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805889" comment="kernel-modules-core-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805890" comment="kernel-modules-extra-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805891" comment="kernel-tools-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805892" comment="kernel-tools-libs-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805894" comment="kernel-uki-virt-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805895" comment="perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805896" comment="python3-perf-5.14.0-284.11.1.el9_2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009805897" comment="rtla-5.14.0-284.11.1.el9_2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38396</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38396" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38396" ref_url="https://www.suse.com/security/cve/CVE-2025-38396" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass

Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create
anonymous inodes with proper security context. This replaces the current
pattern of calling alloc_anon_inode() followed by
inode_init_security_anon() for creating security context manually.

This change also fixes a security regression in secretmem where the
S_PRIVATE flag was not cleared after alloc_anon_inode(), causing
LSM/SELinux checks to be bypassed for secretmem file descriptors.

As guest_memfd currently resides in the KVM module, we need to export this
symbol for use outside the core kernel. In the future, guest_memfd might be
moved to core-mm, at which point the symbols no longer would have to be
exported. When/if that happens is still unclear.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38396/">CVE-2025-38396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247156">SUSE bug 1247156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247158">SUSE bug 1247158</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38403</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38403" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38403" ref_url="https://www.suse.com/security/cve/CVE-2025-38403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/vmci: Clear the vmci transport packet properly when initializing it

In vmci_transport_packet_init memset the vmci_transport_packet before
populating the fields to avoid any uninitialised data being left in the
structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38403/">CVE-2025-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247141">SUSE bug 1247141</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38415</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check return result of sb_min_blocksize

Syzkaller reports an "UBSAN: shift-out-of-bounds in squashfs_bio_read" bug.

Syzkaller forks multiple processes which after mounting the Squashfs
filesystem, issues an ioctl("/dev/loop0", LOOP_SET_BLOCK_SIZE, 0x8000). 
Now if this ioctl occurs at the same time another process is in the
process of mounting a Squashfs filesystem on /dev/loop0, the failure
occurs.  When this happens the following code in squashfs_fill_super()
fails.

----
msblk-&gt;devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);
msblk-&gt;devblksize_log2 = ffz(~msblk-&gt;devblksize);
----

sb_min_blocksize() returns 0, which means msblk-&gt;devblksize is set to 0.

As a result, ffz(~msblk-&gt;devblksize) returns 64, and msblk-&gt;devblksize_log2
is set to 64.

This subsequently causes the

UBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36
shift exponent 64 is too large for 64-bit type 'u64' (aka
'unsigned long long')

This commit adds a check for a 0 return by sb_min_blocksize().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247147">SUSE bug 1247147</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38417</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38417" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38417" ref_url="https://www.suse.com/security/cve/CVE-2025-38417" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix eswitch code memory leak in reset scenario

Add simple eswitch mode checker in attaching VF procedure and allocate
required port representor memory structures only in switchdev mode.
The reset flows triggers VF (if present) detach/attach procedure.
It might involve VF port representor(s) re-creation if the device is
configured is switchdev mode (not legacy one).
The memory was blindly allocated in current implementation,
regardless of the mode and not freed if in legacy mode.

Kmemeleak trace:
unreferenced object (percpu) 0x7e3bce5b888458 (size 40):
  comm "bash", pid 1784, jiffies 4295743894
  hex dump (first 32 bytes on cpu 45):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 0):
    pcpu_alloc_noprof+0x4c4/0x7c0
    ice_repr_create+0x66/0x130 [ice]
    ice_repr_create_vf+0x22/0x70 [ice]
    ice_eswitch_attach_vf+0x1b/0xa0 [ice]
    ice_reset_all_vfs+0x1dd/0x2f0 [ice]
    ice_pci_err_resume+0x3b/0xb0 [ice]
    pci_reset_function+0x8f/0x120
    reset_store+0x56/0xa0
    kernfs_fop_write_iter+0x120/0x1b0
    vfs_write+0x31c/0x430
    ksys_write+0x61/0xd0
    do_syscall_64+0x5b/0x180
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

Testing hints (ethX is PF netdev):
- create at least one VF
    echo 1 &gt; /sys/class/net/ethX/device/sriov_numvfs
- trigger the reset
    echo 1 &gt; /sys/class/net/ethX/device/reset
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-28"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38417/">CVE-2025-38417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38417">CVE-2025-38417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247282">SUSE bug 1247282</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015654" comment="kernel-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015655" comment="kernel-abi-stablelists-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015656" comment="kernel-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015657" comment="kernel-cross-headers-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015658" comment="kernel-debug-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015659" comment="kernel-debug-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015662" comment="kernel-debug-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015663" comment="kernel-debug-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015664" comment="kernel-debug-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015665" comment="kernel-debug-uki-virt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015668" comment="kernel-doc-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015669" comment="kernel-headers-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015670" comment="kernel-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015671" comment="kernel-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015672" comment="kernel-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015673" comment="kernel-rt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015674" comment="kernel-rt-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015675" comment="kernel-rt-debug-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015676" comment="kernel-rt-debug-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015678" comment="kernel-rt-debug-kvm-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015679" comment="kernel-rt-debug-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015680" comment="kernel-rt-debug-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015681" comment="kernel-rt-debug-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015683" comment="kernel-rt-kvm-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015684" comment="kernel-rt-modules-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015685" comment="kernel-rt-modules-core-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015686" comment="kernel-rt-modules-extra-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015687" comment="kernel-tools-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015688" comment="kernel-tools-libs-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015690" comment="kernel-uki-virt-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015691" comment="kernel-uki-virt-addons-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015692" comment="libperf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015693" comment="perf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015694" comment="python3-perf-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015695" comment="rtla-5.14.0-570.37.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015696" comment="rv-5.14.0-570.37.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38438</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38438" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38438" ref_url="https://www.suse.com/security/cve/CVE-2025-38438" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak.

sof_pdata-&gt;tplg_filename can have address allocated by kstrdup()
and can be overwritten. Memory leak was detected with kmemleak:

unreferenced object 0xffff88812391ff60 (size 16):
  comm "kworker/4:1", pid 161, jiffies 4294802931
  hex dump (first 16 bytes):
    73 6f 66 2d 68 64 61 2d 67 65 6e 65 72 69 63 00  sof-hda-generic.
  backtrace (crc 4bf1675c):
    __kmalloc_node_track_caller_noprof+0x49c/0x6b0
    kstrdup+0x46/0xc0
    hda_machine_select.cold+0x1de/0x12cf [snd_sof_intel_hda_generic]
    sof_init_environment+0x16f/0xb50 [snd_sof]
    sof_probe_continue+0x45/0x7c0 [snd_sof]
    sof_probe_work+0x1e/0x40 [snd_sof]
    process_one_work+0x894/0x14b0
    worker_thread+0x5e5/0xfb0
    kthread+0x39d/0x760
    ret_from_fork+0x31/0x70
    ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38438/">CVE-2025-38438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38438">CVE-2025-38438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247157">SUSE bug 1247157</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054004" comment="kernel-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054005" comment="kernel-abi-stablelists-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054006" comment="kernel-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054007" comment="kernel-cross-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054008" comment="kernel-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054009" comment="kernel-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054010" comment="kernel-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054011" comment="kernel-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054012" comment="kernel-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054013" comment="kernel-debug-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054014" comment="kernel-doc-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054015" comment="kernel-headers-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054016" comment="kernel-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054017" comment="kernel-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054018" comment="kernel-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054019" comment="kernel-rt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054020" comment="kernel-rt-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054021" comment="kernel-rt-debug-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054022" comment="kernel-rt-debug-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054023" comment="kernel-rt-debug-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054024" comment="kernel-rt-debug-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054025" comment="kernel-rt-debug-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054026" comment="kernel-rt-modules-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054027" comment="kernel-rt-modules-core-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054028" comment="kernel-rt-modules-extra-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054029" comment="kernel-tools-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054030" comment="kernel-tools-libs-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054031" comment="kernel-uki-virt-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054032" comment="kernel-uki-virt-addons-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054033" comment="libperf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054034" comment="perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054035" comment="python3-perf-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054036" comment="rtla-5.14.0-611.5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054037" comment="rv-5.14.0-611.5.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38449</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38449" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38449" ref_url="https://www.suse.com/security/cve/CVE-2025-38449" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gem: Acquire references on GEM handles for framebuffers

A GEM handle can be released while the GEM buffer object is attached
to a DRM framebuffer. This leads to the release of the dma-buf backing
the buffer object, if any. [1] Trying to use the framebuffer in further
mode-setting operations leads to a segmentation fault. Most easily
happens with driver that use shadow planes for vmap-ing the dma-buf
during a page flip. An example is shown below.

[  156.791968] ------------[ cut here ]------------
[  156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430
[...]
[  156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430
[  157.043420] Call Trace:
[  157.045898]  &lt;TASK&gt;
[  157.048030]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.052436]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.056836]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.061253]  ? drm_gem_shmem_vmap+0x74/0x710
[  157.065567]  ? dma_buf_vmap+0x224/0x430
[  157.069446]  ? __warn.cold+0x58/0xe4
[  157.073061]  ? dma_buf_vmap+0x224/0x430
[  157.077111]  ? report_bug+0x1dd/0x390
[  157.080842]  ? handle_bug+0x5e/0xa0
[  157.084389]  ? exc_invalid_op+0x14/0x50
[  157.088291]  ? asm_exc_invalid_op+0x16/0x20
[  157.092548]  ? dma_buf_vmap+0x224/0x430
[  157.096663]  ? dma_resv_get_singleton+0x6d/0x230
[  157.101341]  ? __pfx_dma_buf_vmap+0x10/0x10
[  157.105588]  ? __pfx_dma_resv_get_singleton+0x10/0x10
[  157.110697]  drm_gem_shmem_vmap+0x74/0x710
[  157.114866]  drm_gem_vmap+0xa9/0x1b0
[  157.118763]  drm_gem_vmap_unlocked+0x46/0xa0
[  157.123086]  drm_gem_fb_vmap+0xab/0x300
[  157.126979]  drm_atomic_helper_prepare_planes.part.0+0x487/0xb10
[  157.133032]  ? lockdep_init_map_type+0x19d/0x880
[  157.137701]  drm_atomic_helper_commit+0x13d/0x2e0
[  157.142671]  ? drm_atomic_nonblocking_commit+0xa0/0x180
[  157.147988]  drm_mode_atomic_ioctl+0x766/0xe40
[...]
[  157.346424] ---[ end trace 0000000000000000 ]---

Acquiring GEM handles for the framebuffer's GEM buffer objects prevents
this from happening. The framebuffer's cleanup later puts the handle
references.

Commit 1a148af06000 ("drm/gem-shmem: Use dma_buf from GEM object
instance") triggers the segmentation fault easily by using the dma-buf
field more widely. The underlying issue with reference counting has
been present before.

v2:
- acquire the handle instead of the BO (Christian)
- fix comment style (Christian)
- drop the Fixes tag (Christian)
- rename err_ gotos
- add missing Link tag
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-13"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38449/">CVE-2025-38449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247255">SUSE bug 1247255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247258">SUSE bug 1247258</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017875" comment="kernel-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017876" comment="kernel-abi-stablelists-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017877" comment="kernel-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017878" comment="kernel-cross-headers-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017879" comment="kernel-debug-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017880" comment="kernel-debug-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017883" comment="kernel-debug-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017884" comment="kernel-debug-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017885" comment="kernel-debug-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017886" comment="kernel-debug-uki-virt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017889" comment="kernel-doc-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017890" comment="kernel-headers-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017891" comment="kernel-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017892" comment="kernel-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017893" comment="kernel-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017894" comment="kernel-rt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017895" comment="kernel-rt-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017896" comment="kernel-rt-debug-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017897" comment="kernel-rt-debug-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017899" comment="kernel-rt-debug-kvm-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017900" comment="kernel-rt-debug-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017901" comment="kernel-rt-debug-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017902" comment="kernel-rt-debug-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017904" comment="kernel-rt-kvm-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017905" comment="kernel-rt-modules-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017906" comment="kernel-rt-modules-core-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017907" comment="kernel-rt-modules-extra-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017908" comment="kernel-tools-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017909" comment="kernel-tools-libs-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017911" comment="kernel-uki-virt-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017912" comment="kernel-uki-virt-addons-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017913" comment="libperf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017914" comment="perf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017915" comment="python3-perf-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017916" comment="rtla-5.14.0-570.42.2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017917" comment="rv-5.14.0-570.42.2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38459</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix infinite recursive call of clip_push().

syzbot reported the splat below. [0]

This happens if we call ioctl(ATMARP_MKIP) more than once.

During the first call, clip_mkip() sets clip_push() to vcc-&gt;push(),
and the second call copies it to clip_vcc-&gt;old_push().

Later, when the socket is close()d, vcc_destroy_socket() passes
NULL skb to clip_push(), which calls clip_vcc-&gt;old_push(),
triggering the infinite recursion.

Let's prevent the second ioctl(ATMARP_MKIP) by checking
vcc-&gt;user_back, which is allocated by the first call as clip_vcc.

Note also that we use lock_sock() to prevent racy calls.

[0]:
BUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)
Oops: stack guard page: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191
Code: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 &lt;41&gt; 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00
RSP: 0018:ffffc9000d670000 EFLAGS: 00010246
RAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000
RBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e
R10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300
R13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578
FS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
...
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 vcc_destroy_socket net/atm/common.c:183 [inline]
 vcc_release+0x157/0x460 net/atm/common.c:205
 __sock_release net/socket.c:647 [inline]
 sock_close+0xc0/0x240 net/socket.c:1391
 __fput+0x449/0xa70 fs/file_table.c:465
 task_work_run+0x1d1/0x260 kernel/task_work.c:227
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114
 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]
 syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]
 do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff31c98e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f
R10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c
R13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090
 &lt;/TASK&gt;
Modules linked in:
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247119">SUSE bug 1247119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38461</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38461" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38461" ref_url="https://www.suse.com/security/cve/CVE-2025-38461" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix transport_* TOCTOU

Transport assignment may race with module unload. Protect new_transport
from becoming a stale pointer.

This also takes care of an insecure call in vsock_use_local_transport();
add a lockdep assert.

BUG: unable to handle page fault for address: fffffbfff8056000
Oops: Oops: 0000 [#1] SMP KASAN
RIP: 0010:vsock_assign_transport+0x366/0x600
Call Trace:
 vsock_connect+0x59c/0xc40
 __sys_connect+0xe8/0x100
 __x64_sys_connect+0x6e/0xc0
 do_syscall_64+0x92/0x1c0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38461/">CVE-2025-38461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247103">SUSE bug 1247103</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38464</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38464" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38464" ref_url="https://www.suse.com/security/cve/CVE-2025-38464" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free in tipc_conn_close().

syzbot reported a null-ptr-deref in tipc_conn_close() during netns
dismantle. [0]

tipc_topsrv_stop() iterates tipc_net(net)-&gt;topsrv-&gt;conn_idr and calls
tipc_conn_close() for each tipc_conn.

The problem is that tipc_conn_close() is called after releasing the
IDR lock.

At the same time, there might be tipc_conn_recv_work() running and it
could call tipc_conn_close() for the same tipc_conn and release its
last -&gt;kref.

Once we release the IDR lock in tipc_topsrv_stop(), there is no
guarantee that the tipc_conn is alive.

Let's hold the ref before releasing the lock and put the ref after
tipc_conn_close() in tipc_topsrv_stop().

[0]:
BUG: KASAN: use-after-free in tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
Read of size 8 at addr ffff888099305a08 by task kworker/u4:3/435

CPU: 0 PID: 435 Comm: kworker/u4:3 Not tainted 4.19.204-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
 print_address_description.cold+0x54/0x219 mm/kasan/report.c:256
 kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354
 kasan_report mm/kasan/report.c:412 [inline]
 __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433
 tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
 tipc_topsrv_stop net/tipc/topsrv.c:701 [inline]
 tipc_topsrv_exit_net+0x27b/0x5c0 net/tipc/topsrv.c:722
 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153
 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Allocated by task 23:
 kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625
 kmalloc include/linux/slab.h:515 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 tipc_conn_alloc+0x43/0x4f0 net/tipc/topsrv.c:192
 tipc_topsrv_accept+0x1b5/0x280 net/tipc/topsrv.c:470
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Freed by task 23:
 __cache_free mm/slab.c:3503 [inline]
 kfree+0xcc/0x210 mm/slab.c:3822
 tipc_conn_kref_release net/tipc/topsrv.c:150 [inline]
 kref_put include/linux/kref.h:70 [inline]
 conn_put+0x2cd/0x3a0 net/tipc/topsrv.c:155
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

The buggy address belongs to the object at ffff888099305a00
 which belongs to the cache kmalloc-512 of size 512
The buggy address is located 8 bytes inside of
 512-byte region [ffff888099305a00, ffff888099305c00)
The buggy address belongs to the page:
page:ffffea000264c140 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffffea00028b6b88 ffffea0002cd2b08 ffff88813bff0940
raw: 0000000000000000 ffff888099305000 0000000100000006 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888099305900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff888099305a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                      ^
 ffff888099305a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38464/">CVE-2025-38464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247112">SUSE bug 1247112</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38471</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38471" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38471" ref_url="https://www.suse.com/security/cve/CVE-2025-38471" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: always refresh the queue when reading sock

After recent changes in net-next TCP compacts skbs much more
aggressively. This unearthed a bug in TLS where we may try
to operate on an old skb when checking if all skbs in the
queue have matching decrypt state and geometry.

    BUG: KASAN: slab-use-after-free in tls_strp_check_rcv+0x898/0x9a0 [tls]
    (net/tls/tls_strp.c:436 net/tls/tls_strp.c:530 net/tls/tls_strp.c:544)
    Read of size 4 at addr ffff888013085750 by task tls/13529

    CPU: 2 UID: 0 PID: 13529 Comm: tls Not tainted 6.16.0-rc5-virtme
    Call Trace:
     kasan_report+0xca/0x100
     tls_strp_check_rcv+0x898/0x9a0 [tls]
     tls_rx_rec_wait+0x2c9/0x8d0 [tls]
     tls_sw_recvmsg+0x40f/0x1aa0 [tls]
     inet_recvmsg+0x1c3/0x1f0

Always reload the queue, fast path is to have the record in the queue
when we wake, anyway (IOW the path going down "if !strp-&gt;stm.full_len").
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H" cvss4="8.4/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38471/">CVE-2025-38471 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38471">CVE-2025-38471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247450">SUSE bug 1247450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247452">SUSE bug 1247452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015542" comment="kernel-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015543" comment="kernel-abi-stablelists-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015544" comment="kernel-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015545" comment="kernel-cross-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015546" comment="kernel-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015547" comment="kernel-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015550" comment="kernel-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015551" comment="kernel-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015552" comment="kernel-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015553" comment="kernel-debug-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015556" comment="kernel-doc-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015557" comment="kernel-headers-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015558" comment="kernel-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015559" comment="kernel-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015560" comment="kernel-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015561" comment="kernel-rt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015562" comment="kernel-rt-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015563" comment="kernel-rt-debug-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015564" comment="kernel-rt-debug-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015566" comment="kernel-rt-debug-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015567" comment="kernel-rt-debug-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015568" comment="kernel-rt-debug-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015569" comment="kernel-rt-debug-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015571" comment="kernel-rt-kvm-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015572" comment="kernel-rt-modules-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015573" comment="kernel-rt-modules-core-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015574" comment="kernel-rt-modules-extra-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015575" comment="kernel-tools-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015576" comment="kernel-tools-libs-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015578" comment="kernel-uki-virt-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015579" comment="kernel-uki-virt-addons-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015580" comment="libperf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015581" comment="perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015582" comment="python3-perf-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015583" comment="rtla-5.14.0-570.35.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015584" comment="rv-5.14.0-570.35.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38472</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38472" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38472" ref_url="https://www.suse.com/security/cve/CVE-2025-38472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack: fix crash due to removal of uninitialised entry

A crash in conntrack was reported while trying to unlink the conntrack
entry from the hash bucket list:
    [exception RIP: __nf_ct_delete_from_lists+172]
    [..]
 #7 [ff539b5a2b043aa0] nf_ct_delete at ffffffffc124d421 [nf_conntrack]
 #8 [ff539b5a2b043ad0] nf_ct_gc_expired at ffffffffc124d999 [nf_conntrack]
 #9 [ff539b5a2b043ae0] __nf_conntrack_find_get at ffffffffc124efbc [nf_conntrack]
    [..]

The nf_conn struct is marked as allocated from slab but appears to be in
a partially initialised state:

 ct hlist pointer is garbage; looks like the ct hash value
 (hence crash).
 ct-&gt;status is equal to IPS_CONFIRMED|IPS_DYING, which is expected
 ct-&gt;timeout is 30000 (=30s), which is unexpected.

Everything else looks like normal udp conntrack entry.  If we ignore
ct-&gt;status and pretend its 0, the entry matches those that are newly
allocated but not yet inserted into the hash:
  - ct hlist pointers are overloaded and store/cache the raw tuple hash
  - ct-&gt;timeout matches the relative time expected for a new udp flow
    rather than the absolute 'jiffies' value.

If it were not for the presence of IPS_CONFIRMED,
__nf_conntrack_find_get() would have skipped the entry.

Theory is that we did hit following race:

cpu x 			cpu y			cpu z
 found entry E		found entry E
 E is expired		&lt;preemption&gt;
 nf_ct_delete()
 return E to rcu slab
					init_conntrack
					E is re-inited,
					ct-&gt;status set to 0
					reply tuplehash hnnode.pprev
					stores hash value.

cpu y found E right before it was deleted on cpu x.
E is now re-inited on cpu z.  cpu y was preempted before
checking for expiry and/or confirm bit.

					-&gt;refcnt set to 1
					E now owned by skb
					-&gt;timeout set to 30000

If cpu y were to resume now, it would observe E as
expired but would skip E due to missing CONFIRMED bit.

					nf_conntrack_confirm gets called
					sets: ct-&gt;status |= CONFIRMED
					This is wrong: E is not yet added
					to hashtable.

cpu y resumes, it observes E as expired but CONFIRMED:
			&lt;resumes&gt;
			nf_ct_expired()
			 -&gt; yes (ct-&gt;timeout is 30s)
			confirmed bit set.

cpu y will try to delete E from the hashtable:
			nf_ct_delete() -&gt; set DYING bit
			__nf_ct_delete_from_lists

Even this scenario doesn't guarantee a crash:
cpu z still holds the table bucket lock(s) so y blocks:

			wait for spinlock held by z

					CONFIRMED is set but there is no
					guarantee ct will be added to hash:
					"chaintoolong" or "clash resolution"
					logic both skip the insert step.
					reply hnnode.pprev still stores the
					hash value.

					unlocks spinlock
					return NF_DROP
			&lt;unblocks, then
			 crashes on hlist_nulls_del_rcu pprev&gt;

In case CPU z does insert the entry into the hashtable, cpu y will unlink
E again right away but no crash occurs.

Without 'cpu y' race, 'garbage' hlist is of no consequence:
ct refcnt remains at 1, eventually skb will be free'd and E gets
destroyed via: nf_conntrack_put -&gt; nf_conntrack_destroy -&gt; nf_ct_destroy.

To resolve this, move the IPS_CONFIRMED assignment after the table
insertion but before the unlock.

Pablo points out that the confirm-bit-store could be reordered to happen
before hlist add resp. the timeout fixup, so switch to set_bit and
before_atomic memory barrier to prevent this.

It doesn't matter if other CPUs can observe a newly inserted entry right
before the CONFIRMED bit was set:

Such event cannot be distinguished from above "E is the old incarnation"
case: the entry will be skipped.

Also change nf_ct_should_gc() to first check the confirmed bit.

The gc sequence is:
 1. Check if entry has expired, if not skip to next entry
 2. Obtain a reference to the expired entry.
 3. Call nf_ct_should_gc() to double-check step 1.

nf_ct_should_gc() is thus called only for entries that already failed an
expiry check. After this patch, once the confirmed bit check pas
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38472/">CVE-2025-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38472">CVE-2025-38472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247313">SUSE bug 1247313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010019798" comment="kernel-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019799" comment="kernel-abi-stablelists-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019800" comment="kernel-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019801" comment="kernel-cross-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019802" comment="kernel-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019803" comment="kernel-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019806" comment="kernel-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019807" comment="kernel-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019808" comment="kernel-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019809" comment="kernel-debug-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019812" comment="kernel-doc-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019813" comment="kernel-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019814" comment="kernel-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019815" comment="kernel-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019816" comment="kernel-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019817" comment="kernel-rt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019818" comment="kernel-rt-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019819" comment="kernel-rt-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019820" comment="kernel-rt-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019822" comment="kernel-rt-debug-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019823" comment="kernel-rt-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019824" comment="kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019825" comment="kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019827" comment="kernel-rt-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019828" comment="kernel-rt-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019829" comment="kernel-rt-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019830" comment="kernel-rt-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019831" comment="kernel-tools-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019832" comment="kernel-tools-libs-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019834" comment="kernel-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019835" comment="kernel-uki-virt-addons-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019836" comment="libperf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019837" comment="perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019838" comment="python3-perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019839" comment="rtla-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019840" comment="rv-5.14.0-570.49.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38498</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38498" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38498" ref_url="https://www.suse.com/security/cve/CVE-2025-38498" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002043.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002042.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03379-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03396-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20791-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

do_change_type(): refuse to operate on unmounted/not ours mounts

Ensure that propagation settings can only be changed for mounts located
in the caller's mount namespace. This change aligns permission checking
with the rest of mount(2).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-27"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38498/">CVE-2025-38498 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38498">CVE-2025-38498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247499">SUSE bug 1247499</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019512" comment="kernel-rt-debug-kvm-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019517" comment="kernel-rt-kvm-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38499</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38499" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38499" ref_url="https://www.suse.com/security/cve/CVE-2025-38499" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3740-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns

What we want is to verify there is that clone won't expose something
hidden by a mount we wouldn't be able to undo.  "Wouldn't be able to undo"
may be a result of MNT_LOCKED on a child, but it may also come from
lacking admin rights in the userns of the namespace mount belongs to.

clone_private_mnt() checks the former, but not the latter.

There's a number of rather confusing CAP_SYS_ADMIN checks in various
userns during the mount, especially with the new mount API; they serve
different purposes and in case of clone_private_mnt() they usually,
but not always end up covering the missing check mentioned above.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38499/">CVE-2025-38499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247976">SUSE bug 1247976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248673">SUSE bug 1248673</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054429" comment="kernel-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054430" comment="kernel-abi-stablelists-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054431" comment="kernel-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054432" comment="kernel-cross-headers-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054433" comment="kernel-debug-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054434" comment="kernel-debug-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054435" comment="kernel-debug-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054436" comment="kernel-debug-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054437" comment="kernel-debug-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054438" comment="kernel-debug-uki-virt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054439" comment="kernel-doc-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054440" comment="kernel-headers-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054441" comment="kernel-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054442" comment="kernel-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054443" comment="kernel-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054444" comment="kernel-rt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054445" comment="kernel-rt-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054446" comment="kernel-rt-debug-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054447" comment="kernel-rt-debug-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054448" comment="kernel-rt-debug-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054449" comment="kernel-rt-debug-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054450" comment="kernel-rt-debug-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054451" comment="kernel-rt-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054452" comment="kernel-rt-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054453" comment="kernel-rt-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054454" comment="kernel-tools-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054455" comment="kernel-tools-libs-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054456" comment="kernel-uki-virt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054457" comment="kernel-uki-virt-addons-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054458" comment="libperf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054459" comment="perf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054460" comment="python3-perf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054461" comment="rtla-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054462" comment="rv-5.14.0-611.16.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38500</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38500" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38500" ref_url="https://www.suse.com/security/cve/CVE-2025-38500" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: interface: fix use-after-free after changing collect_md xfrm interface

collect_md property on xfrm interfaces can only be set on device creation,
thus xfrmi_changelink() should fail when called on such interfaces.

The check to enforce this was done only in the case where the xi was
returned from xfrmi_locate() which doesn't look for the collect_md
interface, and thus the validation was never reached.

Calling changelink would thus errornously place the special interface xi
in the xfrmi_net-&gt;xfrmi hash, but since it also exists in the
xfrmi_net-&gt;collect_md_xfrmi pointer it would lead to a double free when
the net namespace was taken down [1].

Change the check to use the xi from netdev_priv which is available earlier
in the function to prevent changes in xfrm collect_md interfaces.

[1] resulting oops:
[    8.516540] kernel BUG at net/core/dev.c:12029!
[    8.516552] Oops: invalid opcode: 0000 [#1] SMP NOPTI
[    8.516559] CPU: 0 UID: 0 PID: 12 Comm: kworker/u80:0 Not tainted 6.15.0-virtme #5 PREEMPT(voluntary)
[    8.516565] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[    8.516569] Workqueue: netns cleanup_net
[    8.516579] RIP: 0010:unregister_netdevice_many_notify+0x101/0xab0
[    8.516590] Code: 90 0f 0b 90 48 8b b0 78 01 00 00 48 8b 90 80 01 00 00 48 89 56 08 48 89 32 4c 89 80 78 01 00 00 48 89 b8 80 01 00 00 eb ac 90 &lt;0f&gt; 0b 48 8b 45 00 4c 8d a0 88 fe ff ff 48 39 c5 74 5c 41 80 bc 24
[    8.516593] RSP: 0018:ffffa93b8006bd30 EFLAGS: 00010206
[    8.516598] RAX: ffff98fe4226e000 RBX: ffffa93b8006bd58 RCX: ffffa93b8006bc60
[    8.516601] RDX: 0000000000000004 RSI: 0000000000000000 RDI: dead000000000122
[    8.516603] RBP: ffffa93b8006bdd8 R08: dead000000000100 R09: ffff98fe4133c100
[    8.516605] R10: 0000000000000000 R11: 00000000000003d2 R12: ffffa93b8006be00
[    8.516608] R13: ffffffff96c1a510 R14: ffffffff96c1a510 R15: ffffa93b8006be00
[    8.516615] FS:  0000000000000000(0000) GS:ffff98fee73b7000(0000) knlGS:0000000000000000
[    8.516619] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    8.516622] CR2: 00007fcd2abd0700 CR3: 000000003aa40000 CR4: 0000000000752ef0
[    8.516625] PKRU: 55555554
[    8.516627] Call Trace:
[    8.516632]  &lt;TASK&gt;
[    8.516635]  ? rtnl_is_locked+0x15/0x20
[    8.516641]  ? unregister_netdevice_queue+0x29/0xf0
[    8.516650]  ops_undo_list+0x1f2/0x220
[    8.516659]  cleanup_net+0x1ad/0x2e0
[    8.516664]  process_one_work+0x160/0x380
[    8.516673]  worker_thread+0x2aa/0x3c0
[    8.516679]  ? __pfx_worker_thread+0x10/0x10
[    8.516686]  kthread+0xfb/0x200
[    8.516690]  ? __pfx_kthread+0x10/0x10
[    8.516693]  ? __pfx_kthread+0x10/0x10
[    8.516697]  ret_from_fork+0x82/0xf0
[    8.516705]  ? __pfx_kthread+0x10/0x10
[    8.516709]  ret_from_fork_asm+0x1a/0x30
[    8.516718]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38500/">CVE-2025-38500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248088">SUSE bug 1248088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248672">SUSE bug 1248672</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38527" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38527" ref_url="https://www.suse.com/security/cve/CVE-2025-38527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17397" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in cifs_oplock_break

A race condition can occur in cifs_oplock_break() leading to a
use-after-free of the cinode structure when unmounting:

  cifs_oplock_break()
    _cifsFileInfo_put(cfile)
      cifsFileInfo_put_final()
        cifs_sb_deactive()
          [last ref, start releasing sb]
            kill_sb()
              kill_anon_super()
                generic_shutdown_super()
                  evict_inodes()
                    dispose_list()
                      evict()
                        destroy_inode()
                          call_rcu(&amp;inode-&gt;i_rcu, i_callback)
    spin_lock(&amp;cinode-&gt;open_file_lock)  &lt;- OK
                            [later] i_callback()
                              cifs_free_inode()
                                kmem_cache_free(cinode)
    spin_unlock(&amp;cinode-&gt;open_file_lock)  &lt;- UAF
    cifs_done_oplock_break(cinode)       &lt;- UAF

The issue occurs when umount has already released its reference to the
superblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this
releases the last reference, triggering the immediate cleanup of all
inodes under RCU. However, cifs_oplock_break() continues to access the
cinode after this point, resulting in use-after-free.

Fix this by holding an extra reference to the superblock during the
entire oplock break operation. This ensures that the superblock and
its inodes remain valid until the oplock break completes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38527/">CVE-2025-38527 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248199">SUSE bug 1248199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010019798" comment="kernel-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019799" comment="kernel-abi-stablelists-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019800" comment="kernel-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019801" comment="kernel-cross-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019802" comment="kernel-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019803" comment="kernel-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019806" comment="kernel-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019807" comment="kernel-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019808" comment="kernel-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019809" comment="kernel-debug-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019812" comment="kernel-doc-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019813" comment="kernel-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019814" comment="kernel-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019815" comment="kernel-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019816" comment="kernel-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019817" comment="kernel-rt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019818" comment="kernel-rt-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019819" comment="kernel-rt-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019820" comment="kernel-rt-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019822" comment="kernel-rt-debug-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019823" comment="kernel-rt-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019824" comment="kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019825" comment="kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019827" comment="kernel-rt-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019828" comment="kernel-rt-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019829" comment="kernel-rt-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019830" comment="kernel-rt-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019831" comment="kernel-tools-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019832" comment="kernel-tools-libs-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019834" comment="kernel-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019835" comment="kernel-uki-virt-addons-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019836" comment="libperf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019837" comment="perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019838" comment="python3-perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019839" comment="rtla-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019840" comment="rv-5.14.0-570.49.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38550</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38550" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38550" ref_url="https://www.suse.com/security/cve/CVE-2025-38550" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15740" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: Delay put pmc-&gt;idev in mld_del_delrec()

pmc-&gt;idev is still used in ip6_mc_clear_src(), so as mld_clear_delrec()
does, the reference should be put after ip6_mc_clear_src() return.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-17"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38550/">CVE-2025-38550 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38550">CVE-2025-38550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248227">SUSE bug 1248227</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018240" comment="kernel-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018241" comment="kernel-abi-stablelists-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018242" comment="kernel-core-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018243" comment="kernel-cross-headers-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018244" comment="kernel-debug-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018245" comment="kernel-debug-core-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018248" comment="kernel-debug-modules-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018249" comment="kernel-debug-modules-core-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018250" comment="kernel-debug-modules-extra-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018251" comment="kernel-debug-uki-virt-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018254" comment="kernel-doc-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018255" comment="kernel-headers-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018256" comment="kernel-modules-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018257" comment="kernel-modules-core-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018258" comment="kernel-modules-extra-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018259" comment="kernel-rt-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018260" comment="kernel-rt-core-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018261" comment="kernel-rt-debug-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018262" comment="kernel-rt-debug-core-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018264" comment="kernel-rt-debug-kvm-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018265" comment="kernel-rt-debug-modules-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018266" comment="kernel-rt-debug-modules-core-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018267" comment="kernel-rt-debug-modules-extra-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018269" comment="kernel-rt-kvm-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018270" comment="kernel-rt-modules-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018271" comment="kernel-rt-modules-core-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018272" comment="kernel-rt-modules-extra-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018273" comment="kernel-tools-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018274" comment="kernel-tools-libs-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018276" comment="kernel-uki-virt-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018277" comment="kernel-uki-virt-addons-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018278" comment="libperf-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018279" comment="perf-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018280" comment="python3-perf-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018281" comment="rtla-5.14.0-570.44.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018282" comment="rv-5.14.0-570.44.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38556</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38556" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002043.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: Harden s32ton() against conversion to 0 bits

Testing by the syzbot fuzzer showed that the HID core gets a
shift-out-of-bounds exception when it tries to convert a 32-bit
quantity to a 0-bit quantity.  Ideally this should never occur, but
there are buggy devices and some might have a report field with size
set to zero; we shouldn't reject the report or the device just because
of that.

Instead, harden the s32ton() routine so that it returns a reasonable
result instead of crashing when it is called with the number of bits
set to 0 -- the same as what snto32() does.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-15"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248296">SUSE bug 1248296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021393" comment="kernel-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021394" comment="kernel-abi-stablelists-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021395" comment="kernel-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021396" comment="kernel-cross-headers-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021397" comment="kernel-debug-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021398" comment="kernel-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021401" comment="kernel-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021402" comment="kernel-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021403" comment="kernel-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021404" comment="kernel-debug-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021407" comment="kernel-doc-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021408" comment="kernel-headers-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021409" comment="kernel-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021410" comment="kernel-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021411" comment="kernel-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021412" comment="kernel-rt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021413" comment="kernel-rt-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021414" comment="kernel-rt-debug-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021415" comment="kernel-rt-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021417" comment="kernel-rt-debug-kvm-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021418" comment="kernel-rt-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021419" comment="kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021420" comment="kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021422" comment="kernel-rt-kvm-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021423" comment="kernel-rt-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021424" comment="kernel-rt-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021425" comment="kernel-rt-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021426" comment="kernel-tools-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021427" comment="kernel-tools-libs-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021429" comment="kernel-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021430" comment="kernel-uki-virt-addons-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021431" comment="libperf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021432" comment="perf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021433" comment="python3-perf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021434" comment="rtla-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021435" comment="rv-5.14.0-570.52.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38566" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38566" ref_url="https://www.suse.com/security/cve/CVE-2025-38566" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix handling of server side tls alerts

Scott Mayhew discovered a security exploit in NFS over TLS in
tls_alert_recv() due to its assumption it can read data from
the msg iterator's kvec..

kTLS implementation splits TLS non-data record payload between
the control message buffer (which includes the type such as TLS
aler or TLS cipher change) and the rest of the payload (say TLS
alert's level/description) which goes into the msg payload buffer.

This patch proposes to rework how control messages are setup and
used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a
kvec backed msg buffer and read in the control message such as a
TLS alert. Msg iterator can advance the kvec pointer as a part of
the copy process thus we need to revert the iterator before calling
into the tls_alert_recv.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38566/">CVE-2025-38566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248374">SUSE bug 1248374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248376">SUSE bug 1248376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023062" comment="kernel-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023063" comment="kernel-abi-stablelists-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023064" comment="kernel-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023065" comment="kernel-cross-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023066" comment="kernel-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023067" comment="kernel-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023070" comment="kernel-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023071" comment="kernel-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023072" comment="kernel-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023073" comment="kernel-debug-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023076" comment="kernel-doc-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023077" comment="kernel-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023078" comment="kernel-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023079" comment="kernel-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023080" comment="kernel-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023081" comment="kernel-rt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023082" comment="kernel-rt-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023083" comment="kernel-rt-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023084" comment="kernel-rt-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023086" comment="kernel-rt-debug-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023087" comment="kernel-rt-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023088" comment="kernel-rt-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023089" comment="kernel-rt-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023091" comment="kernel-rt-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023092" comment="kernel-rt-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023093" comment="kernel-rt-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023094" comment="kernel-rt-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023095" comment="kernel-tools-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023096" comment="kernel-tools-libs-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023098" comment="kernel-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023099" comment="kernel-uki-virt-addons-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023100" comment="libperf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023101" comment="perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023102" comment="python3-perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023103" comment="rtla-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023104" comment="rv-5.14.0-570.55.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38568</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38568" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38568" ref_url="https://www.suse.com/security/cve/CVE-2025-38568" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing

TCA_MQPRIO_TC_ENTRY_INDEX is validated using
NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value
TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack
write in the fp[] array, which only has room for 16 elements (0-15).

Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38568/">CVE-2025-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248386">SUSE bug 1248386</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054961" comment="kernel-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054962" comment="kernel-abi-stablelists-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054963" comment="kernel-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054964" comment="kernel-cross-headers-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054965" comment="kernel-debug-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054966" comment="kernel-debug-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054967" comment="kernel-debug-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054968" comment="kernel-debug-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054969" comment="kernel-debug-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054970" comment="kernel-debug-uki-virt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054971" comment="kernel-doc-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054972" comment="kernel-headers-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054973" comment="kernel-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054974" comment="kernel-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054975" comment="kernel-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054976" comment="kernel-rt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054977" comment="kernel-rt-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054978" comment="kernel-rt-debug-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054979" comment="kernel-rt-debug-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054980" comment="kernel-rt-debug-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054981" comment="kernel-rt-debug-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054982" comment="kernel-rt-debug-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054983" comment="kernel-rt-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054984" comment="kernel-rt-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054985" comment="kernel-rt-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054986" comment="kernel-tools-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054987" comment="kernel-tools-libs-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054988" comment="kernel-uki-virt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054989" comment="kernel-uki-virt-addons-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054990" comment="libperf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054991" comment="perf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054992" comment="python3-perf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054993" comment="rtla-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054994" comment="rv-5.14.0-611.27.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38571</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38571" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38571" ref_url="https://www.suse.com/security/cve/CVE-2025-38571" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix client side handling of tls alerts

A security exploit was discovered in NFS over TLS in tls_alert_recv
due to its assumption that there is valid data in the msghdr's
iterator's kvec.

Instead, this patch proposes the rework how control messages are
setup and used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a kvec
backed control buffer and read in the control message such as a TLS
alert. Scott found that a msg iterator can advance the kvec pointer
as a part of the copy process thus we need to revert the iterator
before calling into the tls_alert_recv.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38571/">CVE-2025-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248401">SUSE bug 1248401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248402">SUSE bug 1248402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023062" comment="kernel-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023063" comment="kernel-abi-stablelists-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023064" comment="kernel-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023065" comment="kernel-cross-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023066" comment="kernel-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023067" comment="kernel-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023070" comment="kernel-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023071" comment="kernel-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023072" comment="kernel-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023073" comment="kernel-debug-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023076" comment="kernel-doc-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023077" comment="kernel-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023078" comment="kernel-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023079" comment="kernel-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023080" comment="kernel-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023081" comment="kernel-rt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023082" comment="kernel-rt-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023083" comment="kernel-rt-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023084" comment="kernel-rt-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023086" comment="kernel-rt-debug-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023087" comment="kernel-rt-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023088" comment="kernel-rt-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023089" comment="kernel-rt-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023091" comment="kernel-rt-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023092" comment="kernel-rt-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023093" comment="kernel-rt-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023094" comment="kernel-rt-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023095" comment="kernel-tools-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023096" comment="kernel-tools-libs-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023098" comment="kernel-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023099" comment="kernel-uki-virt-addons-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023100" comment="libperf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023101" comment="perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023102" comment="python3-perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023103" comment="rtla-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023104" comment="rv-5.14.0-570.55.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38614</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38614" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38614" ref_url="https://www.suse.com/security/cve/CVE-2025-38614" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eventpoll: Fix semi-unbounded recursion

Ensure that epoll instances can never form a graph deeper than
EP_MAX_NESTS+1 links.

Currently, ep_loop_check_proc() ensures that the graph is loop-free and
does some recursion depth checks, but those recursion depth checks don't
limit the depth of the resulting tree for two reasons:

 - They don't look upwards in the tree.
 - If there are multiple downwards paths of different lengths, only one of
   the paths is actually considered for the depth check since commit
   28d82dc1c4ed ("epoll: limit paths").

Essentially, the current recursion depth check in ep_loop_check_proc() just
serves to prevent it from recursing too deeply while checking for loops.

A more thorough check is done in reverse_path_check() after the new graph
edge has already been created; this checks, among other things, that no
paths going upwards from any non-epoll file with a length of more than 5
edges exist. However, this check does not apply to non-epoll files.

As a result, it is possible to recurse to a depth of at least roughly 500,
tested on v6.15. (I am unsure if deeper recursion is possible; and this may
have changed with commit 8c44dac8add7 ("eventpoll: Fix priority inversion
problem").)

To fix it:

1. In ep_loop_check_proc(), note the subtree depth of each visited node,
and use subtree depths for the total depth calculation even when a subtree
has already been visited.
2. Add ep_get_upwards_depth_proc() for similarly determining the maximum
depth of an upwards walk.
3. In ep_loop_check(), use these values to limit the total path length
between epoll nodes to EP_MAX_NESTS edges.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-15"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38614/">CVE-2025-38614 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38614">CVE-2025-38614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248392">SUSE bug 1248392</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021393" comment="kernel-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021394" comment="kernel-abi-stablelists-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021395" comment="kernel-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021396" comment="kernel-cross-headers-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021397" comment="kernel-debug-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021398" comment="kernel-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021401" comment="kernel-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021402" comment="kernel-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021403" comment="kernel-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021404" comment="kernel-debug-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021407" comment="kernel-doc-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021408" comment="kernel-headers-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021409" comment="kernel-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021410" comment="kernel-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021411" comment="kernel-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021412" comment="kernel-rt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021413" comment="kernel-rt-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021414" comment="kernel-rt-debug-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021415" comment="kernel-rt-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021417" comment="kernel-rt-debug-kvm-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021418" comment="kernel-rt-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021419" comment="kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021420" comment="kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021422" comment="kernel-rt-kvm-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021423" comment="kernel-rt-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021424" comment="kernel-rt-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021425" comment="kernel-rt-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021426" comment="kernel-tools-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021427" comment="kernel-tools-libs-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021429" comment="kernel-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021430" comment="kernel-uki-virt-addons-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021431" comment="libperf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021432" comment="perf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021433" comment="python3-perf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021434" comment="rtla-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021435" comment="rv-5.14.0-570.52.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38684</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: use old 'nbands' while purging unused classes

Shuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify()
after recent changes from Lion [2]. The problem is: in ets_qdisc_change()
we purge unused DWRR queues; the value of 'q-&gt;nbands' is the new one, and
the cleanup should be done with the old one. The problem is here since my
first attempts to fix ets_qdisc_change(), but it surfaced again after the
recent qdisc len accounting fixes. Fix it purging idle DWRR queues before
assigning a new value of 'q-&gt;nbands', so that all purge operations find a
consistent configuration:

 - old 'q-&gt;nbands' because it's needed by ets_class_find()
 - old 'q-&gt;nstrict' because it's needed by ets_class_is_strict()

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 62 UID: 0 PID: 39457 Comm: tc Kdump: loaded Not tainted 6.12.0-116.el10.x86_64 #1 PREEMPT(voluntary)
 Hardware name: Dell Inc. PowerEdge R640/06DKY5, BIOS 2.12.2 07/09/2021
 RIP: 0010:__list_del_entry_valid_or_report+0x4/0x80
 Code: ff 4c 39 c7 0f 84 39 19 8e ff b8 01 00 00 00 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa &lt;48&gt; 8b 17 48 8b 4f 08 48 85 d2 0f 84 56 19 8e ff 48 85 c9 0f 84 ab
 RSP: 0018:ffffba186009f400 EFLAGS: 00010202
 RAX: 00000000000000d6 RBX: 0000000000000000 RCX: 0000000000000004
 RDX: ffff9f0fa29b69c0 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffffffffc12c2400 R08: 0000000000000008 R09: 0000000000000004
 R10: ffffffffffffffff R11: 0000000000000004 R12: 0000000000000000
 R13: ffff9f0f8cfe0000 R14: 0000000000100005 R15: 0000000000000000
 FS:  00007f2154f37480(0000) GS:ffff9f269c1c0000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000001530be001 CR4: 00000000007726f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ets_class_qlen_notify+0x65/0x90 [sch_ets]
  qdisc_tree_reduce_backlog+0x74/0x110
  ets_qdisc_change+0x630/0xa40 [sch_ets]
  __tc_modify_qdisc.constprop.0+0x216/0x7f0
  tc_modify_qdisc+0x7c/0x120
  rtnetlink_rcv_msg+0x145/0x3f0
  netlink_rcv_skb+0x53/0x100
  netlink_unicast+0x245/0x390
  netlink_sendmsg+0x21b/0x470
  ____sys_sendmsg+0x39d/0x3d0
  ___sys_sendmsg+0x9a/0xe0
  __sys_sendmsg+0x7a/0xd0
  do_syscall_64+0x7d/0x160
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 RIP: 0033:0x7f2155114084
 Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d 25 f0 0c 00 00 74 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
 RSP: 002b:00007fff1fd7a988 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000560ec063e5e0 RCX: 00007f2155114084
 RDX: 0000000000000000 RSI: 00007fff1fd7a9f0 RDI: 0000000000000003
 RBP: 00007fff1fd7aa60 R08: 0000000000000010 R09: 000000000000003f
 R10: 0000560ee9b3a010 R11: 0000000000000202 R12: 00007fff1fd7aae0
 R13: 000000006891ccde R14: 0000560ec063e5e0 R15: 00007fff1fd7aad0
  &lt;/TASK&gt;

 [1] https://lore.kernel.org/netdev/e08c7f4a6882f260011909a868311c6e9b54f3e4.1639153474.git.dcaratti@redhat.com/
 [2] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249156">SUSE bug 1249156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017120" comment="kernel-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017121" comment="kernel-abi-stablelists-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017122" comment="kernel-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017123" comment="kernel-cross-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017124" comment="kernel-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017125" comment="kernel-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017128" comment="kernel-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017129" comment="kernel-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017130" comment="kernel-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017131" comment="kernel-debug-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017134" comment="kernel-doc-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017135" comment="kernel-headers-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017136" comment="kernel-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017137" comment="kernel-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017138" comment="kernel-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017139" comment="kernel-rt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017140" comment="kernel-rt-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017141" comment="kernel-rt-debug-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017142" comment="kernel-rt-debug-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017144" comment="kernel-rt-debug-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017145" comment="kernel-rt-debug-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017146" comment="kernel-rt-debug-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017147" comment="kernel-rt-debug-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017149" comment="kernel-rt-kvm-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017150" comment="kernel-rt-modules-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017151" comment="kernel-rt-modules-core-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017152" comment="kernel-rt-modules-extra-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017153" comment="kernel-tools-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017154" comment="kernel-tools-libs-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017156" comment="kernel-uki-virt-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017157" comment="kernel-uki-virt-addons-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017158" comment="libperf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017159" comment="perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017160" comment="python3-perf-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017161" comment="rtla-5.14.0-570.39.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017162" comment="rv-5.14.0-570.39.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38703</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38703" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38703" ref_url="https://www.suse.com/security/cve/CVE-2025-38703" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Make dma-fences compliant with the safe access rules

Xe can free some of the data pointed to by the dma-fences it exports. Most
notably the timeline name can get freed if userspace closes the associated
submit queue. At the same time the fence could have been exported to a
third party (for example a sync_fence fd) which will then cause an use-
after-free on subsequent access.

To make this safe we need to make the driver compliant with the newly
documented dma-fence rules. Driver has to ensure a RCU grace period
between signalling a fence and freeing any data pointed to by said fence.

For the timeline name we simply make the queue be freed via kfree_rcu and
for the shared lock associated with multiple queues we add a RCU grace
period before freeing the per GT structure holding the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38703/">CVE-2025-38703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38703">CVE-2025-38703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249193">SUSE bug 1249193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249763">SUSE bug 1249763</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054707" comment="kernel-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054708" comment="kernel-abi-stablelists-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054709" comment="kernel-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054710" comment="kernel-cross-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054711" comment="kernel-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054712" comment="kernel-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054713" comment="kernel-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054714" comment="kernel-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054715" comment="kernel-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054716" comment="kernel-debug-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054717" comment="kernel-doc-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054718" comment="kernel-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054719" comment="kernel-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054720" comment="kernel-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054721" comment="kernel-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054722" comment="kernel-rt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054723" comment="kernel-rt-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054724" comment="kernel-rt-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054725" comment="kernel-rt-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054726" comment="kernel-rt-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054727" comment="kernel-rt-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054728" comment="kernel-rt-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054729" comment="kernel-rt-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054730" comment="kernel-rt-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054731" comment="kernel-rt-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054732" comment="kernel-tools-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054733" comment="kernel-tools-libs-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054734" comment="kernel-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054735" comment="kernel-uki-virt-addons-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054736" comment="libperf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054737" comment="perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054738" comment="python3-perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054739" comment="rtla-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054740" comment="rv-5.14.0-611.24.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: linearize cloned gso packets in sctp_rcv

A cloned head skb still shares these frag skbs in fraglist with the
original head skb. It's not safe to access these frag skbs.

syzbot reported two use-of-uninitialized-memory bugs caused by this:

  BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998
   sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331
   sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122
   __release_sock+0x1da/0x330 net/core/sock.c:3106
   release_sock+0x6b/0x250 net/core/sock.c:3660
   sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360
   sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885
   sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031
   inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:718 [inline]

and

  BUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331
   sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148
   __release_sock+0x1d3/0x330 net/core/sock.c:3213
   release_sock+0x6b/0x270 net/core/sock.c:3767
   sctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367
   sctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886
   sctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032
   inet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:712 [inline]

This patch fixes it by linearizing cloned gso packets in sctp_rcv().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249161">SUSE bug 1249161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010019798" comment="kernel-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019799" comment="kernel-abi-stablelists-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019800" comment="kernel-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019801" comment="kernel-cross-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019802" comment="kernel-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019803" comment="kernel-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019806" comment="kernel-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019807" comment="kernel-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019808" comment="kernel-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019809" comment="kernel-debug-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019812" comment="kernel-doc-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019813" comment="kernel-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019814" comment="kernel-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019815" comment="kernel-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019816" comment="kernel-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019817" comment="kernel-rt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019818" comment="kernel-rt-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019819" comment="kernel-rt-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019820" comment="kernel-rt-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019822" comment="kernel-rt-debug-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019823" comment="kernel-rt-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019824" comment="kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019825" comment="kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019827" comment="kernel-rt-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019828" comment="kernel-rt-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019829" comment="kernel-rt-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019830" comment="kernel-rt-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019831" comment="kernel-tools-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019832" comment="kernel-tools-libs-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019834" comment="kernel-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019835" comment="kernel-uki-virt-addons-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019836" comment="libperf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019837" comment="perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019838" comment="python3-perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019839" comment="rtla-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019840" comment="rv-5.14.0-570.49.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38724</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38724" ref_url="https://www.suse.com/security/cve/CVE-2025-38724" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()

Lei Lu recently reported that nfsd4_setclientid_confirm() did not check
the return value from get_client_locked(). a SETCLIENTID_CONFIRM could
race with a confirmed client expiring and fail to get a reference. That
could later lead to a UAF.

Fix this by getting a reference early in the case where there is an
extant confirmed client. If that fails then treat it as if there were no
confirmed client found at all.

In the case where the unconfirmed client is expiring, just fail and
return the result from get_client_locked().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38724/">CVE-2025-38724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249169">SUSE bug 1249169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38730" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38730" ref_url="https://www.suse.com/security/cve/CVE-2025-38730" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: commit partial buffers on retry

Ring provided buffers are potentially only valid within the single
execution context in which they were acquired. io_uring deals with this
and invalidates them on retry. But on the networking side, if
MSG_WAITALL is set, or if the socket is of the streaming type and too
little was processed, then it will hang on to the buffer rather than
recycle or commit it. This is problematic for two reasons:

1) If someone unregisters the provided buffer ring before a later retry,
   then the req-&gt;buf_list will no longer be valid.

2) If multiple sockers are using the same buffer group, then multiple
   receives can consume the same memory. This can cause data corruption
   in the application, as either receive could land in the same
   userspace buffer.

Fix this by disallowing partial retries from pinning a provided buffer
across multiple executions, if ring provided buffers are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38730/">CVE-2025-38730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249172">SUSE bug 1249172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38731" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38731" ref_url="https://www.suse.com/security/cve/CVE-2025-38731" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix vm_bind_ioctl double free bug

If the argument check during an array bind fails, the bind_ops are freed
twice as seen below. Fix this by setting bind_ops to NULL after freeing.

==================================================================
BUG: KASAN: double-free in xe_vm_bind_ioctl+0x1b2/0x21f0 [xe]
Free of addr ffff88813bb9b800 by task xe_vm/14198

CPU: 5 UID: 0 PID: 14198 Comm: xe_vm Not tainted 6.16.0-xe-eudebug-cmanszew+ #520 PREEMPT(full)
Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR5 RVP, BIOS ADLPFWI1.R00.2411.A02.2110081023 10/08/2021
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x82/0xd0
 print_report+0xcb/0x610
 ? __virt_addr_valid+0x19a/0x300
 ? xe_vm_bind_ioctl+0x1b2/0x21f0 [xe]
 kasan_report_invalid_free+0xc8/0xf0
 ? xe_vm_bind_ioctl+0x1b2/0x21f0 [xe]
 ? xe_vm_bind_ioctl+0x1b2/0x21f0 [xe]
 check_slab_allocation+0x102/0x130
 kfree+0x10d/0x440
 ? should_fail_ex+0x57/0x2f0
 ? xe_vm_bind_ioctl+0x1b2/0x21f0 [xe]
 xe_vm_bind_ioctl+0x1b2/0x21f0 [xe]
 ? __pfx_xe_vm_bind_ioctl+0x10/0x10 [xe]
 ? __lock_acquire+0xab9/0x27f0
 ? lock_acquire+0x165/0x300
 ? drm_dev_enter+0x53/0xe0 [drm]
 ? find_held_lock+0x2b/0x80
 ? drm_dev_exit+0x30/0x50 [drm]
 ? drm_ioctl_kernel+0x128/0x1c0 [drm]
 drm_ioctl_kernel+0x128/0x1c0 [drm]
 ? __pfx_xe_vm_bind_ioctl+0x10/0x10 [xe]
 ? find_held_lock+0x2b/0x80
 ? __pfx_drm_ioctl_kernel+0x10/0x10 [drm]
 ? should_fail_ex+0x57/0x2f0
 ? __pfx_xe_vm_bind_ioctl+0x10/0x10 [xe]
 drm_ioctl+0x352/0x620 [drm]
 ? __pfx_drm_ioctl+0x10/0x10 [drm]
 ? __pfx_rpm_resume+0x10/0x10
 ? do_raw_spin_lock+0x11a/0x1b0
 ? find_held_lock+0x2b/0x80
 ? __pm_runtime_resume+0x61/0xc0
 ? rcu_is_watching+0x20/0x50
 ? trace_irq_enable.constprop.0+0xac/0xe0
 xe_drm_ioctl+0x91/0xc0 [xe]
 __x64_sys_ioctl+0xb2/0x100
 ? rcu_is_watching+0x20/0x50
 do_syscall_64+0x68/0x2e0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fa9acb24ded

(cherry picked from commit a01b704527c28a2fd43a17a85f8996b75ec8492a)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38731/">CVE-2025-38731 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38731">CVE-2025-38731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249261">SUSE bug 1249261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3875</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3875" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3875" ref_url="https://www.suse.com/security/cve/CVE-2025-3875" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8203" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001550.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01660-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSFDWDAINA2OZWCXINCXQQLCGCNKIVEK/" source="SUSE-SU"/>
    <description>
    Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name  ", Thunderbird treats spoofed@example.com as the actual address. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3875/">CVE-2025-3875 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3875">CVE-2025-3875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243216">SUSE bug 1243216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985485" comment="thunderbird-128.10.1-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3877" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3877" ref_url="https://www.suse.com/security/cve/CVE-2025-3877" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8203" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001550.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01660-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSFDWDAINA2OZWCXINCXQQLCGCNKIVEK/" source="SUSE-SU"/>
    <description>
    This CVE was marked as fixed, but due to other code landing - was not actually fixed.  It was subsequently fixed in CVE-2025-5986.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-07-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3877/">CVE-2025-3877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3877">CVE-2025-3877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243216">SUSE bug 1243216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985485" comment="thunderbird-128.10.1-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3887</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3887" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3887" ref_url="https://www.suse.com/security/cve/CVE-2025-3887" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8183" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001548.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8201" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039394.html" source="SUSE-SU"/>
    <description>
    GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the parsing of H265 slice headers. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26596.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-06-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3887/">CVE-2025-3887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3887">CVE-2025-3887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242809">SUSE bug 1242809</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985477" comment="gstreamer1-plugins-bad-free-1.22.12-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985478" comment="gstreamer1-plugins-bad-free-devel-1.22.12-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985479" comment="gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3891</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3891" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3891" ref_url="https://www.suse.com/security/cve/CVE-2025-3891" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4597" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9396" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4532-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023659.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-12-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3891/">CVE-2025-3891 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3891">CVE-2025-3891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242015">SUSE bug 1242015</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996923" comment="mod_auth_openidc-2.4.10-1.el9_6.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3909</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3909" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3909" ref_url="https://www.suse.com/security/cve/CVE-2025-3909" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8203" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001550.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01660-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSFDWDAINA2OZWCXINCXQQLCGCNKIVEK/" source="SUSE-SU"/>
    <description>
    Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may incorrectly render it as HTML when opened, allowing the embedded JavaScript to run without requiring a file download. This behavior relies on Thunderbird auto-saving the attachment to /tmp and linking to it via the file:/// protocol, potentially enabling JavaScript execution as part of the HTML. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3909/">CVE-2025-3909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3909">CVE-2025-3909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243216">SUSE bug 1243216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985485" comment="thunderbird-128.10.1-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3932</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3932" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3932" ref_url="https://www.suse.com/security/cve/CVE-2025-3932" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8203" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001550.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01660-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01660-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039396.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DSFDWDAINA2OZWCXINCXQQLCGCNKIVEK/" source="SUSE-SU"/>
    <description>
    It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent that. Thunderbird has been fixed to no longer allow access to web pages listed in the X-Mozilla-External-Attachment-URL header of an email. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3932/">CVE-2025-3932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3932">CVE-2025-3932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243216">SUSE bug 1243216</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985485" comment="thunderbird-128.10.1-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39682</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39682" ref_url="https://www.suse.com/security/cve/CVE-2025-39682" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix handling of zero-length records on the rx_list

Each recvmsg() call must process either
 - only contiguous DATA records (any number of them)
 - one non-DATA record

If the next record has different type than what has already been
processed we break out of the main processing loop. If the record
has already been decrypted (which may be the case for TLS 1.3 where
we don't know type until decryption) we queue the pending record
to the rx_list. Next recvmsg() will pick it up from there.

Queuing the skb to rx_list after zero-copy decrypt is not possible,
since in that case we decrypted directly to the user space buffer,
and we don't have an skb to queue (darg.skb points to the ciphertext
skb for access to metadata like length).

Only data records are allowed zero-copy, and we break the processing
loop after each non-data record. So we should never zero-copy and
then find out that the record type has changed. The corner case
we missed is when the initial record comes from rx_list, and it's
zero length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-39682/">CVE-2025-39682 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249284">SUSE bug 1249284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250192">SUSE bug 1250192</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010019798" comment="kernel-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019799" comment="kernel-abi-stablelists-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019800" comment="kernel-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019801" comment="kernel-cross-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019802" comment="kernel-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019803" comment="kernel-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019806" comment="kernel-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019807" comment="kernel-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019808" comment="kernel-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019809" comment="kernel-debug-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019812" comment="kernel-doc-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019813" comment="kernel-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019814" comment="kernel-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019815" comment="kernel-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019816" comment="kernel-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019817" comment="kernel-rt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019818" comment="kernel-rt-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019819" comment="kernel-rt-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019820" comment="kernel-rt-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019822" comment="kernel-rt-debug-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019823" comment="kernel-rt-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019824" comment="kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019825" comment="kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019827" comment="kernel-rt-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019828" comment="kernel-rt-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019829" comment="kernel-rt-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019830" comment="kernel-rt-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019831" comment="kernel-tools-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019832" comment="kernel-tools-libs-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019834" comment="kernel-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019835" comment="kernel-uki-virt-addons-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019836" comment="libperf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019837" comment="perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019838" comment="python3-perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019839" comment="rtla-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019840" comment="rv-5.14.0-570.49.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39694</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39694" ref_url="https://www.suse.com/security/cve/CVE-2025-39694" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Fix SCCB present check

Tracing code called by the SCLP interrupt handler contains early exits
if the SCCB address associated with an interrupt is NULL. This check is
performed after physical to virtual address translation.

If the kernel identity mapping does not start at address zero, the
resulting virtual address is never zero, so that the NULL checks won't
work. Subsequently this may result in incorrect accesses to the first
page of the identity mapping.

Fix this by introducing a function that handles the NULL case before
address translation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-27"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39694/">CVE-2025-39694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249299">SUSE bug 1249299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010019488" comment="kernel-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019489" comment="kernel-abi-stablelists-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019490" comment="kernel-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019491" comment="kernel-cross-headers-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019492" comment="kernel-debug-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019493" comment="kernel-debug-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019496" comment="kernel-debug-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019497" comment="kernel-debug-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019498" comment="kernel-debug-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019499" comment="kernel-debug-uki-virt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019502" comment="kernel-doc-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019503" comment="kernel-headers-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019504" comment="kernel-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019505" comment="kernel-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019506" comment="kernel-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019507" comment="kernel-rt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019508" comment="kernel-rt-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019509" comment="kernel-rt-debug-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019510" comment="kernel-rt-debug-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019512" comment="kernel-rt-debug-kvm-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019513" comment="kernel-rt-debug-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019514" comment="kernel-rt-debug-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019515" comment="kernel-rt-debug-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019517" comment="kernel-rt-kvm-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019518" comment="kernel-rt-modules-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019519" comment="kernel-rt-modules-core-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019520" comment="kernel-rt-modules-extra-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019521" comment="kernel-tools-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019522" comment="kernel-tools-libs-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019524" comment="kernel-uki-virt-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019525" comment="kernel-uki-virt-addons-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019526" comment="libperf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019527" comment="perf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019528" comment="python3-perf-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019529" comment="rtla-5.14.0-570.46.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019530" comment="rv-5.14.0-570.46.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39697</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39697" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39697" ref_url="https://www.suse.com/security/cve/CVE-2025-39697" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a race when updating an existing write

After nfs_lock_and_join_requests() tests for whether the request is
still attached to the mapping, nothing prevents a call to
nfs_inode_remove_request() from succeeding until we actually lock the
page group.
The reason is that whoever called nfs_inode_remove_request() doesn't
necessarily have a lock on the page group head.

So in order to avoid races, let's take the page group lock earlier in
nfs_lock_and_join_requests(), and hold it across the removal of the
request in nfs_inode_remove_request().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39697/">CVE-2025-39697 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249319">SUSE bug 1249319</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39698" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39698" ref_url="https://www.suse.com/security/cve/CVE-2025-39698" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/futex: ensure io_futex_wait() cleans up properly on failure

The io_futex_data is allocated upfront and assigned to the io_kiocb
async_data field, but the request isn't marked with REQ_F_ASYNC_DATA
at that point. Those two should always go together, as the flag tells
io_uring whether the field is valid or not.

Additionally, on failure cleanup, the futex handler frees the data but
does not clear -&gt;async_data. Clear the data and the flag in the error
path as well.

Thanks to Trend Micro Zero Day Initiative and particularly ReDress for
reporting this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-30"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39698/">CVE-2025-39698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249322">SUSE bug 1249322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250190">SUSE bug 1250190</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010019798" comment="kernel-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019799" comment="kernel-abi-stablelists-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019800" comment="kernel-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019801" comment="kernel-cross-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019802" comment="kernel-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019803" comment="kernel-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019806" comment="kernel-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019807" comment="kernel-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019808" comment="kernel-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019809" comment="kernel-debug-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019812" comment="kernel-doc-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019813" comment="kernel-headers-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019814" comment="kernel-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019815" comment="kernel-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019816" comment="kernel-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019817" comment="kernel-rt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019818" comment="kernel-rt-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019819" comment="kernel-rt-debug-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019820" comment="kernel-rt-debug-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019822" comment="kernel-rt-debug-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019823" comment="kernel-rt-debug-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019824" comment="kernel-rt-debug-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019825" comment="kernel-rt-debug-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019827" comment="kernel-rt-kvm-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019828" comment="kernel-rt-modules-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019829" comment="kernel-rt-modules-core-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019830" comment="kernel-rt-modules-extra-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019831" comment="kernel-tools-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019832" comment="kernel-tools-libs-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019834" comment="kernel-uki-virt-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019835" comment="kernel-uki-virt-addons-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019836" comment="libperf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019837" comment="perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019838" comment="python3-perf-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019839" comment="rtla-5.14.0-570.49.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010019840" comment="rv-5.14.0-570.49.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39702" ref_url="https://www.suse.com/security/cve/CVE-2025-39702" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: Fix MAC comparison to be constant-time

To prevent timing attacks, MACs need to be compared in constant time.
Use the appropriate helper function for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39702/">CVE-2025-39702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249317">SUSE bug 1249317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024764" comment="kernel-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024765" comment="kernel-abi-stablelists-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024766" comment="kernel-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024767" comment="kernel-cross-headers-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024768" comment="kernel-debug-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024769" comment="kernel-debug-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024772" comment="kernel-debug-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024773" comment="kernel-debug-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024774" comment="kernel-debug-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024775" comment="kernel-debug-uki-virt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024778" comment="kernel-doc-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024779" comment="kernel-headers-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024780" comment="kernel-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024781" comment="kernel-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024782" comment="kernel-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024783" comment="kernel-rt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024784" comment="kernel-rt-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024785" comment="kernel-rt-debug-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024786" comment="kernel-rt-debug-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024788" comment="kernel-rt-debug-kvm-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024789" comment="kernel-rt-debug-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024790" comment="kernel-rt-debug-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024791" comment="kernel-rt-debug-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024793" comment="kernel-rt-kvm-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024794" comment="kernel-rt-modules-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024795" comment="kernel-rt-modules-core-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024796" comment="kernel-rt-modules-extra-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024797" comment="kernel-tools-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024798" comment="kernel-tools-libs-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024800" comment="kernel-uki-virt-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024801" comment="kernel-uki-virt-addons-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024802" comment="libperf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024803" comment="perf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024804" comment="python3-perf-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024805" comment="rtla-5.14.0-570.60.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024806" comment="rv-5.14.0-570.60.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39718" ref_url="https://www.suse.com/security/cve/CVE-2025-39718" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Validate length in packet header before skb_put()

When receiving a vsock packet in the guest, only the virtqueue buffer
size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,
virtio_vsock_skb_rx_put() uses the length from the packet header as the
length argument to skb_put(), potentially resulting in SKB overflow if
the host has gone wonky.

Validate the length as advertised by the packet header before calling
virtio_vsock_skb_rx_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39718/">CVE-2025-39718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249305">SUSE bug 1249305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024258" comment="kernel-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024259" comment="kernel-abi-stablelists-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024260" comment="kernel-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024261" comment="kernel-cross-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024262" comment="kernel-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024263" comment="kernel-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024266" comment="kernel-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024267" comment="kernel-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024268" comment="kernel-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024269" comment="kernel-debug-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024272" comment="kernel-doc-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024273" comment="kernel-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024274" comment="kernel-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024275" comment="kernel-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024276" comment="kernel-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024277" comment="kernel-rt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024278" comment="kernel-rt-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024279" comment="kernel-rt-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024280" comment="kernel-rt-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024282" comment="kernel-rt-debug-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024283" comment="kernel-rt-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024284" comment="kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024285" comment="kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024287" comment="kernel-rt-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024288" comment="kernel-rt-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024289" comment="kernel-rt-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024290" comment="kernel-rt-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024291" comment="kernel-tools-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024292" comment="kernel-tools-libs-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024294" comment="kernel-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024295" comment="kernel-uki-virt-addons-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024296" comment="libperf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024297" comment="perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024298" comment="python3-perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024299" comment="rtla-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024300" comment="rv-5.14.0-570.58.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39730</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39730" ref_url="https://www.suse.com/security/cve/CVE-2025-39730" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17397" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002074.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()

The function needs to check the minimal filehandle length before it can
access the embedded filehandle.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39730/">CVE-2025-39730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249296">SUSE bug 1249296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024258" comment="kernel-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024259" comment="kernel-abi-stablelists-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024260" comment="kernel-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024261" comment="kernel-cross-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024262" comment="kernel-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024263" comment="kernel-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024266" comment="kernel-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024267" comment="kernel-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024268" comment="kernel-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024269" comment="kernel-debug-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024272" comment="kernel-doc-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024273" comment="kernel-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024274" comment="kernel-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024275" comment="kernel-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024276" comment="kernel-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024277" comment="kernel-rt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024278" comment="kernel-rt-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024279" comment="kernel-rt-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024280" comment="kernel-rt-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024282" comment="kernel-rt-debug-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024283" comment="kernel-rt-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024284" comment="kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024285" comment="kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024287" comment="kernel-rt-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024288" comment="kernel-rt-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024289" comment="kernel-rt-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024290" comment="kernel-rt-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024291" comment="kernel-tools-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024292" comment="kernel-tools-libs-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024294" comment="kernel-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024295" comment="kernel-uki-virt-addons-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024296" comment="libperf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024297" comment="perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024298" comment="python3-perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024299" comment="rtla-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024300" comment="rv-5.14.0-570.58.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39751</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39751" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249538">SUSE bug 1249538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249539">SUSE bug 1249539</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024258" comment="kernel-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024259" comment="kernel-abi-stablelists-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024260" comment="kernel-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024261" comment="kernel-cross-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024262" comment="kernel-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024263" comment="kernel-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024266" comment="kernel-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024267" comment="kernel-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024268" comment="kernel-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024269" comment="kernel-debug-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024272" comment="kernel-doc-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024273" comment="kernel-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024274" comment="kernel-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024275" comment="kernel-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024276" comment="kernel-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024277" comment="kernel-rt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024278" comment="kernel-rt-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024279" comment="kernel-rt-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024280" comment="kernel-rt-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024282" comment="kernel-rt-debug-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024283" comment="kernel-rt-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024284" comment="kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024285" comment="kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024287" comment="kernel-rt-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024288" comment="kernel-rt-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024289" comment="kernel-rt-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024290" comment="kernel-rt-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024291" comment="kernel-tools-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024292" comment="kernel-tools-libs-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024294" comment="kernel-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024295" comment="kernel-uki-virt-addons-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024296" comment="libperf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024297" comment="perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024298" comment="python3-perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024299" comment="rtla-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024300" comment="rv-5.14.0-570.58.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39757" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Validate UAC3 cluster segment descriptors

UAC3 class segment descriptors need to be verified whether their sizes
match with the declared lengths and whether they fit with the
allocated buffer sizes, too.  Otherwise malicious firmware may lead to
the unexpected OOB accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-15"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249515">SUSE bug 1249515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021393" comment="kernel-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021394" comment="kernel-abi-stablelists-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021395" comment="kernel-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021396" comment="kernel-cross-headers-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021397" comment="kernel-debug-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021398" comment="kernel-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021401" comment="kernel-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021402" comment="kernel-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021403" comment="kernel-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021404" comment="kernel-debug-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021407" comment="kernel-doc-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021408" comment="kernel-headers-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021409" comment="kernel-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021410" comment="kernel-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021411" comment="kernel-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021412" comment="kernel-rt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021413" comment="kernel-rt-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021414" comment="kernel-rt-debug-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021415" comment="kernel-rt-debug-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021417" comment="kernel-rt-debug-kvm-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021418" comment="kernel-rt-debug-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021419" comment="kernel-rt-debug-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021420" comment="kernel-rt-debug-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021422" comment="kernel-rt-kvm-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021423" comment="kernel-rt-modules-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021424" comment="kernel-rt-modules-core-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021425" comment="kernel-rt-modules-extra-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021426" comment="kernel-tools-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021427" comment="kernel-tools-libs-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021429" comment="kernel-uki-virt-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021430" comment="kernel-uki-virt-addons-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021431" comment="libperf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021432" comment="perf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021433" comment="python3-perf-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021434" comment="rtla-5.14.0-570.52.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021435" comment="rv-5.14.0-570.52.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: core: config: Prevent OOB read in SS endpoint companion parsing

usb_parse_ss_endpoint_companion() checks descriptor type before length,
enabling a potentially odd read outside of the buffer size.

Fix this up by checking the size first before looking at any of the
fields in the descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249598">SUSE bug 1249598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39761" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39761" ref_url="https://www.suse.com/security/cve/CVE-2025-39761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Decrement TID on RX peer frag setup error handling

Currently, TID is not decremented before peer cleanup, during error
handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to
out-of-bounds access in peer-&gt;rx_tid[].

Hence, add a decrement operation for TID, before peer cleanup to
ensures proper cleanup and prevents out-of-bounds access issues when
the RX peer frag setup fails.

Found during code review. Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-10"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39761/">CVE-2025-39761 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249554">SUSE bug 1249554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249555">SUSE bug 1249555</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010020388" comment="kernel-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020389" comment="kernel-abi-stablelists-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020390" comment="kernel-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020391" comment="kernel-cross-headers-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020392" comment="kernel-debug-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020393" comment="kernel-debug-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020396" comment="kernel-debug-modules-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020397" comment="kernel-debug-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020398" comment="kernel-debug-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020399" comment="kernel-debug-uki-virt-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020402" comment="kernel-doc-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020403" comment="kernel-headers-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020404" comment="kernel-modules-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020405" comment="kernel-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020406" comment="kernel-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020407" comment="kernel-rt-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020408" comment="kernel-rt-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020409" comment="kernel-rt-debug-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020410" comment="kernel-rt-debug-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020412" comment="kernel-rt-debug-kvm-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020413" comment="kernel-rt-debug-modules-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020414" comment="kernel-rt-debug-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020415" comment="kernel-rt-debug-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020417" comment="kernel-rt-kvm-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020418" comment="kernel-rt-modules-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020419" comment="kernel-rt-modules-core-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020420" comment="kernel-rt-modules-extra-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020421" comment="kernel-tools-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020422" comment="kernel-tools-libs-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020424" comment="kernel-uki-virt-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020425" comment="kernel-uki-virt-addons-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020426" comment="libperf-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020427" comment="perf-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020428" comment="python3-perf-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020429" comment="rtla-5.14.0-570.51.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020430" comment="rv-5.14.0-570.51.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39806" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39806" ref_url="https://www.suse.com/security/cve/CVE-2025-39806" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: multitouch: fix slab out-of-bounds access in mt_report_fixup()

A malicious HID device can trigger a slab out-of-bounds during
mt_report_fixup() by passing in report descriptor smaller than
607 bytes. mt_report_fixup() attempts to patch byte offset 607
of the descriptor with 0x25 by first checking if byte offset
607 is 0x15 however it lacks bounds checks to verify if the
descriptor is big enough before conducting this check. Fix
this bug by ensuring the descriptor size is at least 608
bytes before accessing it.

Below is the KASAN splat after the out of bounds access happens:

[   13.671954] ==================================================================
[   13.672667] BUG: KASAN: slab-out-of-bounds in mt_report_fixup+0x103/0x110
[   13.673297] Read of size 1 at addr ffff888103df39df by task kworker/0:1/10
[   13.673297]
[   13.673297] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0-00005-gec5d573d83f4-dirty #3
[   13.673297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/04
[   13.673297] Call Trace:
[   13.673297]  &lt;TASK&gt;
[   13.673297]  dump_stack_lvl+0x5f/0x80
[   13.673297]  print_report+0xd1/0x660
[   13.673297]  kasan_report+0xe5/0x120
[   13.673297]  __asan_report_load1_noabort+0x18/0x20
[   13.673297]  mt_report_fixup+0x103/0x110
[   13.673297]  hid_open_report+0x1ef/0x810
[   13.673297]  mt_probe+0x422/0x960
[   13.673297]  hid_device_probe+0x2e2/0x6f0
[   13.673297]  really_probe+0x1c6/0x6b0
[   13.673297]  __driver_probe_device+0x24f/0x310
[   13.673297]  driver_probe_device+0x4e/0x220
[   13.673297]  __device_attach_driver+0x169/0x320
[   13.673297]  bus_for_each_drv+0x11d/0x1b0
[   13.673297]  __device_attach+0x1b8/0x3e0
[   13.673297]  device_initial_probe+0x12/0x20
[   13.673297]  bus_probe_device+0x13d/0x180
[   13.673297]  device_add+0xe3a/0x1670
[   13.673297]  hid_add_device+0x31d/0xa40
[...]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39806/">CVE-2025-39806 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39806">CVE-2025-39806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249888">SUSE bug 1249888</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054600" comment="kernel-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054601" comment="kernel-abi-stablelists-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054602" comment="kernel-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054603" comment="kernel-cross-headers-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054604" comment="kernel-debug-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054605" comment="kernel-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054606" comment="kernel-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054607" comment="kernel-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054608" comment="kernel-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054609" comment="kernel-debug-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054610" comment="kernel-doc-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054611" comment="kernel-headers-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054612" comment="kernel-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054613" comment="kernel-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054614" comment="kernel-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054615" comment="kernel-rt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054616" comment="kernel-rt-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054617" comment="kernel-rt-debug-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054618" comment="kernel-rt-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054619" comment="kernel-rt-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054620" comment="kernel-rt-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054621" comment="kernel-rt-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054622" comment="kernel-rt-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054623" comment="kernel-rt-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054624" comment="kernel-rt-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054625" comment="kernel-tools-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054626" comment="kernel-tools-libs-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054627" comment="kernel-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054628" comment="kernel-uki-virt-addons-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054629" comment="libperf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054630" comment="perf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054631" comment="python3-perf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054632" comment="rtla-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054633" comment="rv-5.14.0-611.20.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare

Observed on kernel 6.6 (present on master as well):

  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0
  Call trace:
   kasan_check_range+0xe8/0x190
   __asan_loadN+0x1c/0x28
   memcmp+0x98/0xd0
   efivarfs_d_compare+0x68/0xd8
   __d_lookup_rcu_op_compare+0x178/0x218
   __d_lookup_rcu+0x1f8/0x228
   d_alloc_parallel+0x150/0x648
   lookup_open.isra.0+0x5f0/0x8d0
   open_last_lookups+0x264/0x828
   path_openat+0x130/0x3f8
   do_filp_open+0x114/0x248
   do_sys_openat2+0x340/0x3c0
   __arm64_sys_openat+0x120/0x1a0

If dentry-&gt;d_name.len &lt; EFI_VARIABLE_GUID_LEN , 'guid' can become
negative, leadings to oob. The issue can be triggered by parallel
lookups using invalid filename:

  T1			T2
  lookup_open
   -&gt;lookup
    simple_lookup
     d_add
     // invalid dentry is added to hash list

			lookup_open
			 d_alloc_parallel
			  __d_lookup_rcu
			   __d_lookup_rcu_op_compare
			    hlist_bl_for_each_entry_rcu
			    // invalid dentry can be retrieved
			     -&gt;d_compare
			      efivarfs_d_compare
			      // oob

Fix it by checking 'guid' before cmp.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249998">SUSE bug 1249998</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023062" comment="kernel-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023063" comment="kernel-abi-stablelists-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023064" comment="kernel-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023065" comment="kernel-cross-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023066" comment="kernel-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023067" comment="kernel-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023070" comment="kernel-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023071" comment="kernel-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023072" comment="kernel-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023073" comment="kernel-debug-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023076" comment="kernel-doc-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023077" comment="kernel-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023078" comment="kernel-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023079" comment="kernel-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023080" comment="kernel-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023081" comment="kernel-rt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023082" comment="kernel-rt-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023083" comment="kernel-rt-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023084" comment="kernel-rt-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023086" comment="kernel-rt-debug-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023087" comment="kernel-rt-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023088" comment="kernel-rt-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023089" comment="kernel-rt-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023091" comment="kernel-rt-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023092" comment="kernel-rt-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023093" comment="kernel-rt-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023094" comment="kernel-rt-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023095" comment="kernel-tools-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023096" comment="kernel-tools-libs-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023098" comment="kernel-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023099" comment="kernel-uki-virt-addons-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023100" comment="libperf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023101" comment="perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023102" comment="python3-perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023103" comment="rtla-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023104" comment="rv-5.14.0-570.55.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39818</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39818" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39818" ref_url="https://www.suse.com/security/cve/CVE-2025-39818" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003256.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: intel-thc-hid: intel-thc: Fix incorrect pointer arithmetic in I2C regs save

Improper use of secondary pointer (&amp;dev-&gt;i2c_subip_regs) caused
kernel crash and out-of-bounds error:

 BUG: KASAN: slab-out-of-bounds in _regmap_bulk_read+0x449/0x510
 Write of size 4 at addr ffff888136005dc0 by task kworker/u33:5/5107

 CPU: 3 UID: 0 PID: 5107 Comm: kworker/u33:5 Not tainted 6.16.0+ #3 PREEMPT(voluntary)
 Workqueue: async async_run_entry_fn
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x76/0xa0
  print_report+0xd1/0x660
  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
  ? kasan_complete_mode_report_info+0x26/0x200
  kasan_report+0xe1/0x120
  ? _regmap_bulk_read+0x449/0x510
  ? _regmap_bulk_read+0x449/0x510
  __asan_report_store4_noabort+0x17/0x30
  _regmap_bulk_read+0x449/0x510
  ? __pfx__regmap_bulk_read+0x10/0x10
  regmap_bulk_read+0x270/0x3d0
  pio_complete+0x1ee/0x2c0 [intel_thc]
  ? __pfx_pio_complete+0x10/0x10 [intel_thc]
  ? __pfx_pio_wait+0x10/0x10 [intel_thc]
  ? regmap_update_bits_base+0x13b/0x1f0
  thc_i2c_subip_pio_read+0x117/0x270 [intel_thc]
  thc_i2c_subip_regs_save+0xc2/0x140 [intel_thc]
  ? __pfx_thc_i2c_subip_regs_save+0x10/0x10 [intel_thc]
[...]
 The buggy address belongs to the object at ffff888136005d00
  which belongs to the cache kmalloc-rnd-12-192 of size 192
 The buggy address is located 0 bytes to the right of
  allocated 192-byte region [ffff888136005d00, ffff888136005dc0)

Replaced with direct array indexing (&amp;dev-&gt;i2c_subip_regs[i]) to ensure
safe memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39818/">CVE-2025-39818 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39818">CVE-2025-39818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249903">SUSE bug 1249903</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055731" comment="kernel-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055732" comment="kernel-abi-stablelists-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055733" comment="kernel-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055734" comment="kernel-cross-headers-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055735" comment="kernel-debug-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055736" comment="kernel-debug-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055737" comment="kernel-debug-modules-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055738" comment="kernel-debug-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055739" comment="kernel-debug-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055740" comment="kernel-debug-uki-virt-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055741" comment="kernel-doc-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055742" comment="kernel-headers-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055743" comment="kernel-modules-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055744" comment="kernel-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055745" comment="kernel-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055746" comment="kernel-rt-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055747" comment="kernel-rt-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055748" comment="kernel-rt-debug-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055749" comment="kernel-rt-debug-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055750" comment="kernel-rt-debug-modules-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055751" comment="kernel-rt-debug-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055752" comment="kernel-rt-debug-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055753" comment="kernel-rt-modules-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055754" comment="kernel-rt-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055755" comment="kernel-rt-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055756" comment="kernel-tools-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055757" comment="kernel-tools-libs-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055758" comment="kernel-uki-virt-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055759" comment="kernel-uki-virt-addons-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055760" comment="libperf-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055761" comment="perf-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055762" comment="python3-perf-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055763" comment="rtla-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055764" comment="rv-5.14.0-611.41.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39819" ref_url="https://www.suse.com/security/cve/CVE-2025-39819" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/smb: Fix inconsistent refcnt update

A possible inconsistent update of refcount was identified in `smb2_compound_op`.
Such inconsistent update could lead to possible resource leaks.

Why it is a possible bug:
1. In the comment section of the function, it clearly states that the
reference to `cfile` should be dropped after calling this function.
2. Every control flow path would check and drop the reference to
`cfile`, except the patched one.
3. Existing callers would not handle refcount update of `cfile` if
-ENOMEM is returned.

To fix the bug, an extra goto label "out" is added, to make sure that the
cleanup logic would always be respected. As the problem is caused by the
allocation failure of `vars`, the cleanup logic between label "finished"
and "out" can be safely ignored. According to the definition of function
`is_replayable_error`, the error code of "-ENOMEM" is not recoverable.
Therefore, the replay logic also gets ignored.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39819/">CVE-2025-39819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39819">CVE-2025-39819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250176">SUSE bug 1250176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010024258" comment="kernel-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024259" comment="kernel-abi-stablelists-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024260" comment="kernel-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024261" comment="kernel-cross-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024262" comment="kernel-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024263" comment="kernel-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024266" comment="kernel-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024267" comment="kernel-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024268" comment="kernel-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024269" comment="kernel-debug-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024272" comment="kernel-doc-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024273" comment="kernel-headers-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024274" comment="kernel-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024275" comment="kernel-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024276" comment="kernel-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024277" comment="kernel-rt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024278" comment="kernel-rt-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024279" comment="kernel-rt-debug-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024280" comment="kernel-rt-debug-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024282" comment="kernel-rt-debug-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024283" comment="kernel-rt-debug-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024284" comment="kernel-rt-debug-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024285" comment="kernel-rt-debug-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024287" comment="kernel-rt-kvm-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024288" comment="kernel-rt-modules-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024289" comment="kernel-rt-modules-core-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024290" comment="kernel-rt-modules-extra-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024291" comment="kernel-tools-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024292" comment="kernel-tools-libs-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024294" comment="kernel-uki-virt-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024295" comment="kernel-uki-virt-addons-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024296" comment="libperf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024297" comment="perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024298" comment="python3-perf-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024299" comment="rtla-5.14.0-570.58.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010024300" comment="rv-5.14.0-570.58.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39825</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39825" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39825" ref_url="https://www.suse.com/security/cve/CVE-2025-39825" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix race with concurrent opens in rename(2)

Besides sending the rename request to the server, the rename process
also involves closing any deferred close, waiting for outstanding I/O
to complete as well as marking all existing open handles as deleted to
prevent them from deferring closes, which increases the race window
for potential concurrent opens on the target file.

Fix this by unhashing the dentry in advance to prevent any concurrent
opens on the target.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39825/">CVE-2025-39825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39825">CVE-2025-39825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250179">SUSE bug 1250179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017422" comment="kernel-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017423" comment="kernel-abi-stablelists-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017424" comment="kernel-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017425" comment="kernel-cross-headers-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017426" comment="kernel-debug-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017427" comment="kernel-debug-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017430" comment="kernel-debug-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017431" comment="kernel-debug-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017432" comment="kernel-debug-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017433" comment="kernel-debug-uki-virt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017436" comment="kernel-doc-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017437" comment="kernel-headers-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017438" comment="kernel-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017439" comment="kernel-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017440" comment="kernel-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017441" comment="kernel-rt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017442" comment="kernel-rt-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017443" comment="kernel-rt-debug-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017444" comment="kernel-rt-debug-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017446" comment="kernel-rt-debug-kvm-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017447" comment="kernel-rt-debug-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017448" comment="kernel-rt-debug-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017449" comment="kernel-rt-debug-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017451" comment="kernel-rt-kvm-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017452" comment="kernel-rt-modules-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017453" comment="kernel-rt-modules-core-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017454" comment="kernel-rt-modules-extra-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017455" comment="kernel-tools-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017456" comment="kernel-tools-libs-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017458" comment="kernel-uki-virt-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017459" comment="kernel-uki-virt-addons-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017460" comment="libperf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017461" comment="perf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017462" comment="python3-perf-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017463" comment="rtla-5.14.0-570.41.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017464" comment="rv-5.14.0-570.41.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39840</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39840" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39840" ref_url="https://www.suse.com/security/cve/CVE-2025-39840" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

audit: fix out-of-bounds read in audit_compare_dname_path()

When a watch on dir=/ is combined with an fsnotify event for a
single-character name directly under / (e.g., creating /a), an
out-of-bounds read can occur in audit_compare_dname_path().

The helper parent_len() returns 1 for "/". In audit_compare_dname_path(),
when parentlen equals the full path length (1), the code sets p = path + 1
and pathlen = 1 - 1 = 0. The subsequent loop then dereferences
p[pathlen - 1] (i.e., p[-1]), causing an out-of-bounds read.

Fix this by adding a pathlen &gt; 0 check to the while loop condition
to prevent the out-of-bounds access.

[PM: subject tweak, sign-off email fixes]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39840/">CVE-2025-39840 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39840">CVE-2025-39840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250273">SUSE bug 1250273</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054600" comment="kernel-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054601" comment="kernel-abi-stablelists-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054602" comment="kernel-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054603" comment="kernel-cross-headers-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054604" comment="kernel-debug-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054605" comment="kernel-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054606" comment="kernel-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054607" comment="kernel-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054608" comment="kernel-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054609" comment="kernel-debug-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054610" comment="kernel-doc-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054611" comment="kernel-headers-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054612" comment="kernel-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054613" comment="kernel-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054614" comment="kernel-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054615" comment="kernel-rt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054616" comment="kernel-rt-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054617" comment="kernel-rt-debug-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054618" comment="kernel-rt-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054619" comment="kernel-rt-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054620" comment="kernel-rt-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054621" comment="kernel-rt-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054622" comment="kernel-rt-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054623" comment="kernel-rt-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054624" comment="kernel-rt-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054625" comment="kernel-tools-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054626" comment="kernel-tools-libs-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054627" comment="kernel-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054628" comment="kernel-uki-virt-addons-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054629" comment="libperf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054630" comment="perf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054631" comment="python3-perf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054632" comment="rtla-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054633" comment="rv-5.14.0-611.20.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39841</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39841" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39841" ref_url="https://www.suse.com/security/cve/CVE-2025-39841" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix buffer free/clear order in deferred receive path

Fix a use-after-free window by correcting the buffer release sequence in
the deferred receive path. The code freed the RQ buffer first and only
then cleared the context pointer under the lock. Concurrent paths (e.g.,
ABTS and the repost path) also inspect and release the same pointer under
the lock, so the old order could lead to double-free/UAF.

Note that the repost path already uses the correct pattern: detach the
pointer under the lock, then free it after dropping the lock. The
deferred path should do the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39841/">CVE-2025-39841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39841">CVE-2025-39841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250274">SUSE bug 1250274</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023062" comment="kernel-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023063" comment="kernel-abi-stablelists-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023064" comment="kernel-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023065" comment="kernel-cross-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023066" comment="kernel-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023067" comment="kernel-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023070" comment="kernel-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023071" comment="kernel-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023072" comment="kernel-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023073" comment="kernel-debug-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023076" comment="kernel-doc-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023077" comment="kernel-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023078" comment="kernel-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023079" comment="kernel-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023080" comment="kernel-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023081" comment="kernel-rt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023082" comment="kernel-rt-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023083" comment="kernel-rt-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023084" comment="kernel-rt-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023086" comment="kernel-rt-debug-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023087" comment="kernel-rt-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023088" comment="kernel-rt-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023089" comment="kernel-rt-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023091" comment="kernel-rt-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023092" comment="kernel-rt-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023093" comment="kernel-rt-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023094" comment="kernel-rt-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023095" comment="kernel-tools-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023096" comment="kernel-tools-libs-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023098" comment="kernel-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023099" comment="kernel-uki-virt-addons-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023100" comment="libperf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023101" comment="perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023102" comment="python3-perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023103" comment="rtla-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023104" comment="rv-5.14.0-570.55.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39843</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39843" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39843" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39843" ref_url="https://www.suse.com/security/cve/CVE-2025-39843" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003109.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: slub: avoid wake up kswapd in set_track_prepare

set_track_prepare() can incur lock recursion.
The issue is that it is called from hrtimer_start_range_ns
holding the per_cpu(hrtimer_bases)[n].lock, but when enabled
CONFIG_DEBUG_OBJECTS_TIMERS, may wake up kswapd in set_track_prepare,
and try to hold the per_cpu(hrtimer_bases)[n].lock.

Avoid deadlock caused by implicitly waking up kswapd by passing in
allocation flags, which do not contain __GFP_KSWAPD_RECLAIM in the
debug_objects_fill_pool() case. Inside stack depot they are processed by
gfp_nested_mask().
Since ___slab_alloc() has preemption disabled, we mask out
__GFP_DIRECT_RECLAIM from the flags there.

The oops looks something like:

BUG: spinlock recursion on CPU#3, swapper/3/0
 lock: 0xffffff8a4bf29c80, .magic: dead4ead, .owner: swapper/3/0, .owner_cpu: 3
Hardware name: Qualcomm Technologies, Inc. Popsicle based on SM8850 (DT)
Call trace:
spin_bug+0x0
_raw_spin_lock_irqsave+0x80
hrtimer_try_to_cancel+0x94
task_contending+0x10c
enqueue_dl_entity+0x2a4
dl_server_start+0x74
enqueue_task_fair+0x568
enqueue_task+0xac
do_activate_task+0x14c
ttwu_do_activate+0xcc
try_to_wake_up+0x6c8
default_wake_function+0x20
autoremove_wake_function+0x1c
__wake_up+0xac
wakeup_kswapd+0x19c
wake_all_kswapds+0x78
__alloc_pages_slowpath+0x1ac
__alloc_pages_noprof+0x298
stack_depot_save_flags+0x6b0
stack_depot_save+0x14
set_track_prepare+0x5c
___slab_alloc+0xccc
__kmalloc_cache_noprof+0x470
__set_page_owner+0x2bc
post_alloc_hook[jt]+0x1b8
prep_new_page+0x28
get_page_from_freelist+0x1edc
__alloc_pages_noprof+0x13c
alloc_slab_page+0x244
allocate_slab+0x7c
___slab_alloc+0x8e8
kmem_cache_alloc_noprof+0x450
debug_objects_fill_pool+0x22c
debug_object_activate+0x40
enqueue_hrtimer[jt]+0xdc
hrtimer_start_range_ns+0x5f8
...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39843/">CVE-2025-39843 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39843">CVE-2025-39843 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250270">SUSE bug 1250270</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054234" comment="kernel-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054235" comment="kernel-abi-stablelists-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054236" comment="kernel-core-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054237" comment="kernel-cross-headers-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054238" comment="kernel-debug-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054239" comment="kernel-debug-core-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054240" comment="kernel-debug-modules-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054241" comment="kernel-debug-modules-core-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054242" comment="kernel-debug-modules-extra-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054243" comment="kernel-debug-uki-virt-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054244" comment="kernel-doc-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054245" comment="kernel-headers-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054246" comment="kernel-modules-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054247" comment="kernel-modules-core-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054248" comment="kernel-modules-extra-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054249" comment="kernel-rt-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054250" comment="kernel-rt-core-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054251" comment="kernel-rt-debug-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054252" comment="kernel-rt-debug-core-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054253" comment="kernel-rt-debug-modules-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054254" comment="kernel-rt-debug-modules-core-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054255" comment="kernel-rt-debug-modules-extra-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054256" comment="kernel-rt-modules-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054257" comment="kernel-rt-modules-core-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054258" comment="kernel-rt-modules-extra-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054259" comment="kernel-tools-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054260" comment="kernel-tools-libs-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054261" comment="kernel-uki-virt-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054262" comment="kernel-uki-virt-addons-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054263" comment="libperf-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054264" comment="perf-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054265" comment="python3-perf-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054266" comment="rtla-5.14.0-611.9.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054267" comment="rv-5.14.0-611.9.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39849</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39849" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39849" ref_url="https://www.suse.com/security/cve/CVE-2025-39849" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()

If the ssid-&gt;datalen is more than IEEE80211_MAX_SSID_LEN (32) it would
lead to memory corruption so add some bounds checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39849/">CVE-2025-39849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39849">CVE-2025-39849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250266">SUSE bug 1250266</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023062" comment="kernel-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023063" comment="kernel-abi-stablelists-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023064" comment="kernel-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023065" comment="kernel-cross-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023066" comment="kernel-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023067" comment="kernel-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023070" comment="kernel-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023071" comment="kernel-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023072" comment="kernel-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023073" comment="kernel-debug-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023076" comment="kernel-doc-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023077" comment="kernel-headers-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023078" comment="kernel-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023079" comment="kernel-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023080" comment="kernel-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023081" comment="kernel-rt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023082" comment="kernel-rt-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023083" comment="kernel-rt-debug-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023084" comment="kernel-rt-debug-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023086" comment="kernel-rt-debug-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023087" comment="kernel-rt-debug-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023088" comment="kernel-rt-debug-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023089" comment="kernel-rt-debug-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023091" comment="kernel-rt-kvm-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023092" comment="kernel-rt-modules-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023093" comment="kernel-rt-modules-core-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023094" comment="kernel-rt-modules-extra-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023095" comment="kernel-tools-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023096" comment="kernel-tools-libs-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023098" comment="kernel-uki-virt-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023099" comment="kernel-uki-virt-addons-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023100" comment="libperf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023101" comment="perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023102" comment="python3-perf-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023103" comment="rtla-5.14.0-570.55.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023104" comment="rv-5.14.0-570.55.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39864</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39864" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39864" ref_url="https://www.suse.com/security/cve/CVE-2025-39864" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002178.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: fix use-after-free in cmp_bss()

Following bss_free() quirk introduced in commit 776b3580178f
("cfg80211: track hidden SSID networks properly"), adjust
cfg80211_update_known_bss() to free the last beacon frame
elements only if they're not shared via the corresponding
'hidden_beacon_bss' pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39864/">CVE-2025-39864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39864">CVE-2025-39864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250242">SUSE bug 1250242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39881" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39881" ref_url="https://www.suse.com/security/cve/CVE-2025-39881" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kernfs: Fix UAF in polling when open file is released

A use-after-free (UAF) vulnerability was identified in the PSI (Pressure
Stall Information) monitoring mechanism:

BUG: KASAN: slab-use-after-free in psi_trigger_poll+0x3c/0x140
Read of size 8 at addr ffff3de3d50bd308 by task systemd/1

psi_trigger_poll+0x3c/0x140
cgroup_pressure_poll+0x70/0xa0
cgroup_file_poll+0x8c/0x100
kernfs_fop_poll+0x11c/0x1c0
ep_item_poll.isra.0+0x188/0x2c0

Allocated by task 1:
cgroup_file_open+0x88/0x388
kernfs_fop_open+0x73c/0xaf0
do_dentry_open+0x5fc/0x1200
vfs_open+0xa0/0x3f0
do_open+0x7e8/0xd08
path_openat+0x2fc/0x6b0
do_filp_open+0x174/0x368

Freed by task 8462:
cgroup_file_release+0x130/0x1f8
kernfs_drain_open_files+0x17c/0x440
kernfs_drain+0x2dc/0x360
kernfs_show+0x1b8/0x288
cgroup_file_show+0x150/0x268
cgroup_pressure_write+0x1dc/0x340
cgroup_file_write+0x274/0x548

Reproduction Steps:
1. Open test/cpu.pressure and establish epoll monitoring
2. Disable monitoring: echo 0 &gt; test/cgroup.pressure
3. Re-enable monitoring: echo 1 &gt; test/cgroup.pressure

The race condition occurs because:
1. When cgroup.pressure is disabled (echo 0 &gt; cgroup.pressure), it:
   - Releases PSI triggers via cgroup_file_release()
   - Frees of-&gt;priv through kernfs_drain_open_files()
2. While epoll still holds reference to the file and continues polling
3. Re-enabling (echo 1 &gt; cgroup.pressure) accesses freed of-&gt;priv

epolling			disable/enable cgroup.pressure
fd=open(cpu.pressure)
while(1)
...
epoll_wait
kernfs_fop_poll
kernfs_get_active = true	echo 0 &gt; cgroup.pressure
...				cgroup_file_show
				kernfs_show
				// inactive kn
				kernfs_drain_open_files
				cft-&gt;release(of);
				kfree(ctx);
				...
kernfs_get_active = false
				echo 1 &gt; cgroup.pressure
				kernfs_show
				kernfs_activate_one(kn);
kernfs_fop_poll
kernfs_get_active = true
cgroup_file_poll
psi_trigger_poll
// UAF
...
end: close(fd)

To address this issue, introduce kernfs_get_active_of() for kernfs open
files to obtain active references. This function will fail if the open file
has been released. Replace kernfs_get_active() with kernfs_get_active_of()
to prevent further operations on released file descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39881/">CVE-2025-39881 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250379">SUSE bug 1250379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39883" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39883" ref_url="https://www.suse.com/security/cve/CVE-2025-39883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003162.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory

When I did memory failure tests, below panic occurs:

page dumped because: VM_BUG_ON_PAGE(PagePoisoned(page))
kernel BUG at include/linux/page-flags.h:616!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
CPU: 3 PID: 720 Comm: bash Not tainted 6.10.0-rc1-00195-g148743902568 #40
RIP: 0010:unpoison_memory+0x2f3/0x590
RSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246
RAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8
RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0
RBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb
R10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000
R13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe
FS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK&gt;
 unpoison_memory+0x2f3/0x590
 simple_attr_write_xsigned.constprop.0.isra.0+0xb3/0x110
 debugfs_attr_write+0x42/0x60
 full_proxy_write+0x5b/0x80
 vfs_write+0xd5/0x540
 ksys_write+0x64/0xe0
 do_syscall_64+0xb9/0x1d0
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f08f0314887
RSP: 002b:00007ffece710078 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 00007f08f0314887
RDX: 0000000000000009 RSI: 0000564787a30410 RDI: 0000000000000001
RBP: 0000564787a30410 R08: 000000000000fefe R09: 000000007fffffff
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009
R13: 00007f08f041b780 R14: 00007f08f0417600 R15: 00007f08f0416a00
 &lt;/TASK&gt;
Modules linked in: hwpoison_inject
---[ end trace 0000000000000000 ]---
RIP: 0010:unpoison_memory+0x2f3/0x590
RSP: 0018:ffffa57fc8787d60 EFLAGS: 00000246
RAX: 0000000000000037 RBX: 0000000000000009 RCX: ffff9be25fcdc9c8
RDX: 0000000000000000 RSI: 0000000000000027 RDI: ffff9be25fcdc9c0
RBP: 0000000000300000 R08: ffffffffb4956f88 R09: 0000000000009ffb
R10: 0000000000000284 R11: ffffffffb4926fa0 R12: ffffe6b00c000000
R13: ffff9bdb453dfd00 R14: 0000000000000000 R15: fffffffffffffffe
FS:  00007f08f04e4740(0000) GS:ffff9be25fcc0000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000564787a30410 CR3: 000000010d4e2000 CR4: 00000000000006f0
Kernel panic - not syncing: Fatal exception
Kernel Offset: 0x31c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
---[ end Kernel panic - not syncing: Fatal exception ]---

The root cause is that unpoison_memory() tries to check the PG_HWPoison
flags of an uninitialized page.  So VM_BUG_ON_PAGE(PagePoisoned(page)) is
triggered.  This can be reproduced by below steps:

1.Offline memory block:

 echo offline &gt; /sys/devices/system/memory/memory12/state

2.Get offlined memory pfn:

 page-types -b n -rlN

3.Write pfn to unpoison-pfn

 echo &lt;pfn&gt; &gt; /sys/kernel/debug/hwpoison/unpoison-pfn

This scenario can be identified by pfn_to_online_page() returning NULL. 
And ZONE_DEVICE pages are never expected, so we can simply fail if
pfn_to_online_page() == NULL to fix the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39883/">CVE-2025-39883 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39883">CVE-2025-39883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250376">SUSE bug 1250376</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054600" comment="kernel-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054601" comment="kernel-abi-stablelists-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054602" comment="kernel-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054603" comment="kernel-cross-headers-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054604" comment="kernel-debug-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054605" comment="kernel-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054606" comment="kernel-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054607" comment="kernel-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054608" comment="kernel-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054609" comment="kernel-debug-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054610" comment="kernel-doc-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054611" comment="kernel-headers-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054612" comment="kernel-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054613" comment="kernel-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054614" comment="kernel-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054615" comment="kernel-rt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054616" comment="kernel-rt-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054617" comment="kernel-rt-debug-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054618" comment="kernel-rt-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054619" comment="kernel-rt-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054620" comment="kernel-rt-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054621" comment="kernel-rt-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054622" comment="kernel-rt-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054623" comment="kernel-rt-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054624" comment="kernel-rt-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054625" comment="kernel-tools-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054626" comment="kernel-tools-libs-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054627" comment="kernel-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054628" comment="kernel-uki-virt-addons-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054629" comment="libperf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054630" comment="perf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054631" comment="python3-perf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054632" comment="rtla-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054633" comment="rv-5.14.0-611.20.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39898</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39898" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250744">SUSE bug 1250744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39918" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39918" ref_url="https://www.suse.com/security/cve/CVE-2025-39918" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: fix linked list corruption

Never leave scheduled wcid entries on the temporary on-stack list
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39918/">CVE-2025-39918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39918">CVE-2025-39918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250729">SUSE bug 1250729</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39925" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39925" ref_url="https://www.suse.com/security/cve/CVE-2025-39925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: implement NETDEV_UNREGISTER notification handler

syzbot is reporting

  unregister_netdevice: waiting for vcan0 to become free. Usage count = 2

problem, for j1939 protocol did not have NETDEV_UNREGISTER notification
handler for undoing changes made by j1939_sk_bind().

Commit 25fe97cb7620 ("can: j1939: move j1939_priv_put() into sk_destruct
callback") expects that a call to j1939_priv_put() can be unconditionally
delayed until j1939_sk_sock_destruct() is called. But we need to call
j1939_priv_put() against an extra ref held by j1939_sk_bind() call
(as a part of undoing changes made by j1939_sk_bind()) as soon as
NETDEV_UNREGISTER notification fires (i.e. before j1939_sk_sock_destruct()
is called via j1939_sk_release()). Otherwise, the extra ref on "struct
j1939_priv" held by j1939_sk_bind() call prevents "struct net_device" from
dropping the usage count to 1; making it impossible for
unregister_netdevice() to continue.

[mkl: remove space in front of label]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39925/">CVE-2025-39925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39925">CVE-2025-39925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250736">SUSE bug 1250736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054332" comment="kernel-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054333" comment="kernel-abi-stablelists-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054334" comment="kernel-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054335" comment="kernel-cross-headers-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054336" comment="kernel-debug-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054337" comment="kernel-debug-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054338" comment="kernel-debug-modules-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054339" comment="kernel-debug-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054340" comment="kernel-debug-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054341" comment="kernel-debug-uki-virt-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054342" comment="kernel-doc-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054343" comment="kernel-headers-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054344" comment="kernel-modules-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054345" comment="kernel-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054346" comment="kernel-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054347" comment="kernel-rt-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054348" comment="kernel-rt-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054349" comment="kernel-rt-debug-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054350" comment="kernel-rt-debug-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054351" comment="kernel-rt-debug-modules-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054352" comment="kernel-rt-debug-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054353" comment="kernel-rt-debug-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054354" comment="kernel-rt-modules-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054355" comment="kernel-rt-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054356" comment="kernel-rt-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054357" comment="kernel-tools-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054358" comment="kernel-tools-libs-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054359" comment="kernel-uki-virt-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054360" comment="kernel-uki-virt-addons-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054361" comment="libperf-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054362" comment="perf-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054363" comment="python3-perf-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054364" comment="rtla-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054365" comment="rv-5.14.0-611.13.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39933" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39933" ref_url="https://www.suse.com/security/cve/CVE-2025-39933" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002404.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: let recv_done verify data_offset, data_length and remaining_data_length

This is inspired by the related server fixes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39933/">CVE-2025-39933 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39933">CVE-2025-39933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251172">SUSE bug 1251172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054707" comment="kernel-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054708" comment="kernel-abi-stablelists-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054709" comment="kernel-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054710" comment="kernel-cross-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054711" comment="kernel-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054712" comment="kernel-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054713" comment="kernel-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054714" comment="kernel-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054715" comment="kernel-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054716" comment="kernel-debug-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054717" comment="kernel-doc-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054718" comment="kernel-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054719" comment="kernel-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054720" comment="kernel-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054721" comment="kernel-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054722" comment="kernel-rt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054723" comment="kernel-rt-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054724" comment="kernel-rt-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054725" comment="kernel-rt-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054726" comment="kernel-rt-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054727" comment="kernel-rt-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054728" comment="kernel-rt-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054729" comment="kernel-rt-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054730" comment="kernel-rt-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054731" comment="kernel-rt-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054732" comment="kernel-tools-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054733" comment="kernel-tools-libs-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054734" comment="kernel-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054735" comment="kernel-uki-virt-addons-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054736" comment="libperf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054737" comment="perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054738" comment="python3-perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054739" comment="rtla-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054740" comment="rv-5.14.0-611.24.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39955</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect().

syzbot reported the splat below where a socket had tcp_sk(sk)-&gt;fastopen_rsk
in the TCP_ESTABLISHED state. [0]

syzbot reused the server-side TCP Fast Open socket as a new client before
the TFO socket completes 3WHS:

  1. accept()
  2. connect(AF_UNSPEC)
  3. connect() to another destination

As of accept(), sk-&gt;sk_state is TCP_SYN_RECV, and tcp_disconnect() changes
it to TCP_CLOSE and makes connect() possible, which restarts timers.

Since tcp_disconnect() forgot to clear tcp_sk(sk)-&gt;fastopen_rsk, the
retransmit timer triggered the warning and the intended packet was not
retransmitted.

Let's call reqsk_fastopen_remove() in tcp_disconnect().

[0]:
WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))
Modules linked in:
CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))
Code: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 &lt;0f&gt; 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e
RSP: 0018:ffffc900002f8d40 EFLAGS: 00010293
RAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017
RDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400
RBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8
R10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540
R13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0
FS:  0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0
Call Trace:
 &lt;IRQ&gt;
 tcp_write_timer (net/ipv4/tcp_timer.c:738)
 call_timer_fn (kernel/time/timer.c:1747)
 __run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372)
 timer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135)
 tmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035)
 __walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1))
 tmigr_handle_remote (kernel/time/timer_migration.c:1096)
 handle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580)
 irq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696)
 sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35))
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251804">SUSE bug 1251804</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39966</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39966" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39966" ref_url="https://www.suse.com/security/cve/CVE-2025-39966" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003139.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Fix race during abort for file descriptors

fput() doesn't actually call file_operations release() synchronously, it
puts the file on a work queue and it will be released eventually.

This is normally fine, except for iommufd the file and the iommufd_object
are tied to gether. The file has the object as it's private_data and holds
a users refcount, while the object is expected to remain alive as long as
the file is.

When the allocation of a new object aborts before installing the file it
will fput() the file and then go on to immediately kfree() the obj. This
causes a UAF once the workqueue completes the fput() and tries to
decrement the users refcount.

Fix this by putting the core code in charge of the file lifetime, and call
__fput_sync() during abort to ensure that release() is called before
kfree. __fput_sync() is a bit too tricky to open code in all the object
implementations. Instead the objects tell the core code where the file
pointer is and the core will take care of the life cycle.

If the object is successfully allocated then the file will hold a users
refcount and the iommufd_object cannot be destroyed.

It is worth noting that close(); ioctl(IOMMU_DESTROY); doesn't have an
issue because close() is already using a synchronous version of fput().

The UAF looks like this:

    BUG: KASAN: slab-use-after-free in iommufd_eventq_fops_release+0x45/0xc0 drivers/iommu/iommufd/eventq.c:376
    Write of size 4 at addr ffff888059c97804 by task syz.0.46/6164

    CPU: 0 UID: 0 PID: 6164 Comm: syz.0.46 Not tainted syzkaller #0 PREEMPT(full)
    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
    Call Trace:
     &lt;TASK&gt;
     __dump_stack lib/dump_stack.c:94 [inline]
     dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
     print_address_description mm/kasan/report.c:378 [inline]
     print_report+0xcd/0x630 mm/kasan/report.c:482
     kasan_report+0xe0/0x110 mm/kasan/report.c:595
     check_region_inline mm/kasan/generic.c:183 [inline]
     kasan_check_range+0x100/0x1b0 mm/kasan/generic.c:189
     instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
     atomic_fetch_sub_release include/linux/atomic/atomic-instrumented.h:400 [inline]
     __refcount_dec include/linux/refcount.h:455 [inline]
     refcount_dec include/linux/refcount.h:476 [inline]
     iommufd_eventq_fops_release+0x45/0xc0 drivers/iommu/iommufd/eventq.c:376
     __fput+0x402/0xb70 fs/file_table.c:468
     task_work_run+0x14d/0x240 kernel/task_work.c:227
     resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
     exit_to_user_mode_loop+0xeb/0x110 kernel/entry/common.c:43
     exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
     syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]
     syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]
     do_syscall_64+0x41c/0x4c0 arch/x86/entry/syscall_64.c:100
     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39966/">CVE-2025-39966 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39966">CVE-2025-39966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252043">SUSE bug 1252043</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054429" comment="kernel-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054430" comment="kernel-abi-stablelists-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054431" comment="kernel-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054432" comment="kernel-cross-headers-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054433" comment="kernel-debug-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054434" comment="kernel-debug-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054435" comment="kernel-debug-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054436" comment="kernel-debug-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054437" comment="kernel-debug-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054438" comment="kernel-debug-uki-virt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054439" comment="kernel-doc-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054440" comment="kernel-headers-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054441" comment="kernel-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054442" comment="kernel-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054443" comment="kernel-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054444" comment="kernel-rt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054445" comment="kernel-rt-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054446" comment="kernel-rt-debug-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054447" comment="kernel-rt-debug-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054448" comment="kernel-rt-debug-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054449" comment="kernel-rt-debug-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054450" comment="kernel-rt-debug-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054451" comment="kernel-rt-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054452" comment="kernel-rt-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054453" comment="kernel-rt-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054454" comment="kernel-tools-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054455" comment="kernel-tools-libs-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054456" comment="kernel-uki-virt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054457" comment="kernel-uki-virt-addons-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054458" comment="libperf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054459" comment="perf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054460" comment="python3-perf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054461" comment="rtla-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054462" comment="rv-5.14.0-611.16.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39971</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002256.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix idx validation in config queues msg

Ensure idx is within range of active/initialized TCs when iterating over
vf-&gt;ch[idx] in i40e_vc_config_queues_msg().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-17"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252052">SUSE bug 1252052</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39973" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: add validation for ring_len param

The `ring_len` parameter provided by the virtual function (VF)
is assigned directly to the hardware memory context (HMC) without
any validation.

To address this, introduce an upper boundary check for both Tx and Rx
queue lengths. The maximum number of descriptors supported by the
hardware is 8k-32.
Additionally, enforce alignment constraints: Tx rings must be a multiple
of 8, and Rx rings must be a multiple of 32.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252035">SUSE bug 1252035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252036">SUSE bug 1252036</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39979</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39979" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39979" ref_url="https://www.suse.com/security/cve/CVE-2025-39979" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fs, fix UAF in flow counter release

Fix a kernel trace [1] caused by releasing an HWS action of a local flow
counter in mlx5_cmd_hws_delete_fte(), where the HWS action refcount and
mutex were not initialized and the counter struct could already be freed
when deleting the rule.

Fix it by adding the missing initializations and adding refcount for the
local flow counter struct.

[1] Kernel log:
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x34/0x48
  mlx5_fs_put_hws_action.part.0.cold+0x21/0x94 [mlx5_core]
  mlx5_fc_put_hws_action+0x96/0xad [mlx5_core]
  mlx5_fs_destroy_fs_actions+0x8b/0x152 [mlx5_core]
  mlx5_cmd_hws_delete_fte+0x5a/0xa0 [mlx5_core]
  del_hw_fte+0x1ce/0x260 [mlx5_core]
  mlx5_del_flow_rules+0x12d/0x240 [mlx5_core]
  ? ttwu_queue_wakelist+0xf4/0x110
  mlx5_ib_destroy_flow+0x103/0x1b0 [mlx5_ib]
  uverbs_free_flow+0x20/0x50 [ib_uverbs]
  destroy_hw_idr_uobject+0x1b/0x50 [ib_uverbs]
  uverbs_destroy_uobject+0x34/0x1a0 [ib_uverbs]
  uobj_destroy+0x3c/0x80 [ib_uverbs]
  ib_uverbs_run_method+0x23e/0x360 [ib_uverbs]
  ? uverbs_finalize_object+0x60/0x60 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x14f/0x2c0 [ib_uverbs]
  ? do_tty_write+0x1a9/0x270
  ? file_tty_write.constprop.0+0x98/0xc0
  ? new_sync_write+0xfc/0x190
  ib_uverbs_ioctl+0xd7/0x160 [ib_uverbs]
  __x64_sys_ioctl+0x87/0xc0
  do_syscall_64+0x59/0x90
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39979/">CVE-2025-39979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39979">CVE-2025-39979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252067">SUSE bug 1252067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252068">SUSE bug 1252068</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054332" comment="kernel-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054333" comment="kernel-abi-stablelists-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054334" comment="kernel-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054335" comment="kernel-cross-headers-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054336" comment="kernel-debug-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054337" comment="kernel-debug-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054338" comment="kernel-debug-modules-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054339" comment="kernel-debug-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054340" comment="kernel-debug-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054341" comment="kernel-debug-uki-virt-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054342" comment="kernel-doc-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054343" comment="kernel-headers-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054344" comment="kernel-modules-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054345" comment="kernel-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054346" comment="kernel-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054347" comment="kernel-rt-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054348" comment="kernel-rt-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054349" comment="kernel-rt-debug-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054350" comment="kernel-rt-debug-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054351" comment="kernel-rt-debug-modules-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054352" comment="kernel-rt-debug-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054353" comment="kernel-rt-debug-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054354" comment="kernel-rt-modules-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054355" comment="kernel-rt-modules-core-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054356" comment="kernel-rt-modules-extra-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054357" comment="kernel-tools-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054358" comment="kernel-tools-libs-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054359" comment="kernel-uki-virt-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054360" comment="kernel-uki-virt-addons-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054361" comment="libperf-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054362" comment="perf-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054363" comment="python3-perf-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054364" comment="rtla-5.14.0-611.13.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054365" comment="rv-5.14.0-611.13.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39981</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39981" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39981" ref_url="https://www.suse.com/security/cve/CVE-2025-39981" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix possible UAFs

This attemps to fix possible UAFs caused by struct mgmt_pending being
freed while still being processed like in the following trace, in order
to fix mgmt_pending_valid is introduce and use to check if the
mgmt_pending hasn't been removed from the pending list, on the complete
callbacks it is used to check and in addtion remove the cmd from the list
while holding mgmt_pending_lock to avoid TOCTOU problems since if the cmd
is left on the list it can still be accessed and freed.

BUG: KASAN: slab-use-after-free in mgmt_add_adv_patterns_monitor_sync+0x35/0x50 net/bluetooth/mgmt.c:5223
Read of size 8 at addr ffff8880709d4dc0 by task kworker/u11:0/55

CPU: 0 UID: 0 PID: 55 Comm: kworker/u11:0 Not tainted 6.16.4 #2 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 mgmt_add_adv_patterns_monitor_sync+0x35/0x50 net/bluetooth/mgmt.c:5223
 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16.4/arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 12210:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4364
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 mgmt_pending_new+0x65/0x1e0 net/bluetooth/mgmt_util.c:269
 mgmt_pending_add+0x35/0x140 net/bluetooth/mgmt_util.c:296
 __add_adv_patterns_monitor+0x130/0x200 net/bluetooth/mgmt.c:5247
 add_adv_patterns_monitor+0x214/0x360 net/bluetooth/mgmt.c:5364
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:729
 sock_write_iter+0x258/0x330 net/socket.c:1133
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x5c9/0xb30 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 12221:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2381 [inline]
 slab_free mm/slub.c:4648 [inline]
 kfree+0x18e/0x440 mm/slub.c:4847
 mgmt_pending_free net/bluetooth/mgmt_util.c:311 [inline]
 mgmt_pending_foreach+0x30d/0x380 net/bluetooth/mgmt_util.c:257
 __mgmt_power_off+0x169/0x350 net/bluetooth/mgmt.c:9444
 hci_dev_close_sync+0x754/0x1330 net/bluetooth/hci_sync.c:5290
 hci_dev_do_close net/bluetooth/hci_core.c:501 [inline]
 hci_dev_close+0x108/0x200 net/bluetooth/hci_core.c:526
 sock_do_ioctl+0xd9/0x300 net/socket.c:1192
 sock_ioctl+0x576/0x790 net/socket.c:1313
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39981/">CVE-2025-39981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39981">CVE-2025-39981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252060">SUSE bug 1252060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252061">SUSE bug 1252061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39982</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39982" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39982" ref_url="https://www.suse.com/security/cve/CVE-2025-39982" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync

This fixes the following UFA in hci_acl_create_conn_sync where a
connection still pending is command submission (conn-&gt;state == BT_OPEN)
maybe freed, also since this also can happen with the likes of
hci_le_create_conn_sync fix it as well:

BUG: KASAN: slab-use-after-free in hci_acl_create_conn_sync+0x5ef/0x790 net/bluetooth/hci_sync.c:6861
Write of size 2 at addr ffff88805ffcc038 by task kworker/u11:2/9541

CPU: 1 UID: 0 PID: 9541 Comm: kworker/u11:2 Not tainted 6.16.0-rc7 #3 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Workqueue: hci3 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x230 mm/kasan/report.c:480
 kasan_report+0x118/0x150 mm/kasan/report.c:593
 hci_acl_create_conn_sync+0x5ef/0x790 net/bluetooth/hci_sync.c:6861
 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 123736:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 __hci_conn_add+0x233/0x1b30 net/bluetooth/hci_conn.c:939
 hci_conn_add_unset net/bluetooth/hci_conn.c:1051 [inline]
 hci_connect_acl+0x16c/0x4e0 net/bluetooth/hci_conn.c:1634
 pair_device+0x418/0xa70 net/bluetooth/mgmt.c:3556
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:727
 sock_write_iter+0x258/0x330 net/socket.c:1131
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x54b/0xa90 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 103680:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2381 [inline]
 slab_free mm/slub.c:4643 [inline]
 kfree+0x18e/0x440 mm/slub.c:4842
 device_release+0x9c/0x1c0
 kobject_cleanup lib/kobject.c:689 [inline]
 kobject_release lib/kobject.c:720 [inline]
 kref_put include/linux/kref.h:65 [inline]
 kobject_put+0x22b/0x480 lib/kobject.c:737
 hci_conn_cleanup net/bluetooth/hci_conn.c:175 [inline]
 hci_conn_del+0x8ff/0xcb0 net/bluetooth/hci_conn.c:1173
 hci_conn_complete_evt+0x3c7/0x1040 net/bluetooth/hci_event.c:3199
 hci_event_func net/bluetooth/hci_event.c:7477 [inline]
 hci_event_packet+0x7e0/0x1200 net/bluetooth/hci_event.c:7531
 hci_rx_work+0x46a/0xe80 net/bluetooth/hci_core.c:4070
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/sour
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39982/">CVE-2025-39982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39982">CVE-2025-39982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252083">SUSE bug 1252083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39983</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39983" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39983" ref_url="https://www.suse.com/security/cve/CVE-2025-39983" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Fix UAF in hci_conn_tx_dequeue

This fixes the following UAF caused by not properly locking hdev when
processing HCI_EV_NUM_COMP_PKTS:

BUG: KASAN: slab-use-after-free in hci_conn_tx_dequeue+0x1be/0x220 net/bluetooth/hci_conn.c:3036
Read of size 4 at addr ffff8880740f0940 by task kworker/u11:0/54

CPU: 1 UID: 0 PID: 54 Comm: kworker/u11:0 Not tainted 6.16.0-rc7 #3 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Workqueue: hci1 hci_rx_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x230 mm/kasan/report.c:480
 kasan_report+0x118/0x150 mm/kasan/report.c:593
 hci_conn_tx_dequeue+0x1be/0x220 net/bluetooth/hci_conn.c:3036
 hci_num_comp_pkts_evt+0x1c8/0xa50 net/bluetooth/hci_event.c:4404
 hci_event_func net/bluetooth/hci_event.c:7477 [inline]
 hci_event_packet+0x7e0/0x1200 net/bluetooth/hci_event.c:7531
 hci_rx_work+0x46a/0xe80 net/bluetooth/hci_core.c:4070
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 54:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 __hci_conn_add+0x233/0x1b30 net/bluetooth/hci_conn.c:939
 le_conn_complete_evt+0x3d6/0x1220 net/bluetooth/hci_event.c:5628
 hci_le_enh_conn_complete_evt+0x189/0x470 net/bluetooth/hci_event.c:5794
 hci_event_func net/bluetooth/hci_event.c:7474 [inline]
 hci_event_packet+0x78c/0x1200 net/bluetooth/hci_event.c:7531
 hci_rx_work+0x46a/0xe80 net/bluetooth/hci_core.c:4070
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245

Freed by task 9572:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2381 [inline]
 slab_free mm/slub.c:4643 [inline]
 kfree+0x18e/0x440 mm/slub.c:4842
 device_release+0x9c/0x1c0
 kobject_cleanup lib/kobject.c:689 [inline]
 kobject_release lib/kobject.c:720 [inline]
 kref_put include/linux/kref.h:65 [inline]
 kobject_put+0x22b/0x480 lib/kobject.c:737
 hci_conn_cleanup net/bluetooth/hci_conn.c:175 [inline]
 hci_conn_del+0x8ff/0xcb0 net/bluetooth/hci_conn.c:1173
 hci_abort_conn_sync+0x5d1/0xdf0 net/bluetooth/hci_sync.c:5689
 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39983/">CVE-2025-39983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39983">CVE-2025-39983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252080">SUSE bug 1252080</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40047" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40047" ref_url="https://www.suse.com/security/cve/CVE-2025-40047" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/waitid: always prune wait queue entry in io_waitid_wait()

For a successful return, always remove our entry from the wait queue
entry list. Previously this was skipped if a cancelation was in
progress, but this can race with another invocation of the wait queue
entry callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-17"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40047/">CVE-2025-40047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252790">SUSE bug 1252790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054182" comment="kernel-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054183" comment="kernel-abi-stablelists-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054184" comment="kernel-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054185" comment="kernel-cross-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054186" comment="kernel-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054187" comment="kernel-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054188" comment="kernel-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054189" comment="kernel-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054190" comment="kernel-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054191" comment="kernel-debug-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054192" comment="kernel-doc-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054193" comment="kernel-headers-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054194" comment="kernel-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054195" comment="kernel-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054196" comment="kernel-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054197" comment="kernel-rt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054198" comment="kernel-rt-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054199" comment="kernel-rt-debug-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054200" comment="kernel-rt-debug-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054201" comment="kernel-rt-debug-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054202" comment="kernel-rt-debug-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054203" comment="kernel-rt-debug-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054204" comment="kernel-rt-modules-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054205" comment="kernel-rt-modules-core-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054206" comment="kernel-rt-modules-extra-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054207" comment="kernel-tools-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054208" comment="kernel-tools-libs-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054209" comment="kernel-uki-virt-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054210" comment="kernel-uki-virt-addons-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054211" comment="libperf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054212" comment="perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054213" comment="python3-perf-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054214" comment="rtla-5.14.0-611.8.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054215" comment="rv-5.14.0-611.8.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40058" ref_url="https://www.suse.com/security/cve/CVE-2025-40058" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Disallow dirty tracking if incoherent page walk

Dirty page tracking relies on the IOMMU atomically updating the dirty bit
in the paging-structure entry. For this operation to succeed, the paging-
structure memory must be coherent between the IOMMU and the CPU. In
another word, if the iommu page walk is incoherent, dirty page tracking
doesn't work.

The Intel VT-d specification, Section 3.10 "Snoop Behavior" states:

"Remapping hardware encountering the need to atomically update A/EA/D bits
 in a paging-structure entry that is not snooped will result in a non-
 recoverable fault."

To prevent an IOMMU from being incorrectly configured for dirty page
tracking when it is operating in an incoherent mode, mark SSADS as
supported only when both ecap_slads and ecap_smpwc are supported.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40058/">CVE-2025-40058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252854">SUSE bug 1252854</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40064</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40064" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Fix use-after-free in __pnet_find_base_ndev().

syzbot reported use-after-free of net_device in __pnet_find_base_ndev(),
which was called during connect(). [0]

smc_pnet_find_ism_resource() fetches sk_dst_get(sk)-&gt;dev and passes
down to pnet_find_base_ndev(), where RTNL is held.  Then, UAF happened
at __pnet_find_base_ndev() when the dev is first used.

This means dev had already been freed before acquiring RTNL in
pnet_find_base_ndev().

While dev is going away, dst-&gt;dev could be swapped with blackhole_netdev,
and the dev's refcnt by dst will be released.

We must hold dev's refcnt before calling smc_pnet_find_ism_resource().

Also, smc_pnet_find_roce_resource() has the same problem.

Let's use __sk_dst_get() and dst_dev_rcu() in the two functions.

[0]:
BUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926
Read of size 1 at addr ffff888036bac33a by task syz.0.3632/18609

CPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926
 pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]
 smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]
 smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154
 smc_find_ism_device net/smc/af_smc.c:1030 [inline]
 smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]
 __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545
 smc_connect+0x877/0xd90 net/smc/af_smc.c:1715
 __sys_connect_file net/socket.c:2086 [inline]
 __sys_connect+0x313/0x440 net/socket.c:2105
 __do_sys_connect net/socket.c:2111 [inline]
 __se_sys_connect net/socket.c:2108 [inline]
 __x64_sys_connect+0x7a/0x90 net/socket.c:2108
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f47cbf8eba9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9
RDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b
RBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8
 &lt;/TASK&gt;

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000
raw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851
 prep_new_page mm/page_alloc.c:1859 [inline]
 get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858
 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148
 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416
 ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317
 __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348
 __do_kmalloc_node mm/slub.c:4364 [inline]
 __kvmalloc_node
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252845">SUSE bug 1252845</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055132" comment="kernel-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055133" comment="kernel-abi-stablelists-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055134" comment="kernel-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055135" comment="kernel-cross-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055136" comment="kernel-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055137" comment="kernel-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055138" comment="kernel-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055139" comment="kernel-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055140" comment="kernel-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055141" comment="kernel-debug-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055142" comment="kernel-doc-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055143" comment="kernel-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055144" comment="kernel-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055145" comment="kernel-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055146" comment="kernel-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055147" comment="kernel-rt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055148" comment="kernel-rt-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055149" comment="kernel-rt-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055150" comment="kernel-rt-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055151" comment="kernel-rt-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055152" comment="kernel-rt-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055153" comment="kernel-rt-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055154" comment="kernel-rt-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055155" comment="kernel-rt-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055156" comment="kernel-rt-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055157" comment="kernel-tools-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055158" comment="kernel-tools-libs-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055159" comment="kernel-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055160" comment="kernel-uki-virt-addons-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055161" comment="libperf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055162" comment="perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055163" comment="python3-perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055164" comment="rtla-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055165" comment="rv-5.14.0-611.34.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002404.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies

When adding dependencies with drm_sched_job_add_dependency(), that
function consumes the fence reference both on success and failure, so in
the latter case the dma_fence_put() on the error path (xarray failed to
expand) is a double free.

Interestingly this bug appears to have been present ever since
commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code
back then looked like this:

drm_sched_job_add_implicit_dependencies():
...
       for (i = 0; i &lt; fence_count; i++) {
               ret = drm_sched_job_add_dependency(job, fences[i]);
               if (ret)
                       break;
       }

       for (; i &lt; fence_count; i++)
               dma_fence_put(fences[i]);

Which means for the failing 'i' the dma_fence_put was already a double
free. Possibly there were no users at that time, or the test cases were
insufficient to hit it.

The bug was then only noticed and fixed after
commit 9c2ba265352a ("drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2")
landed, with its fixup of
commit 4eaf02d6076c ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies").

At that point it was a slightly different flavour of a double free, which
commit 963d0b356935 ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder")
noticed and attempted to fix.

But it only moved the double free from happening inside the
drm_sched_job_add_dependency(), when releasing the reference not yet
obtained, to the caller, when releasing the reference already released by
the former in the failure case.

As such it is not easy to identify the right target for the fixes tag so
lets keep it simple and just continue the chain.

While fixing we also improve the comment and explain the reason for taking
the reference and not dropping it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252902">SUSE bug 1252902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40135" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40135" ref_url="https://www.suse.com/security/cve/CVE-2025-40135" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU in ip6_xmit()

Use RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent
possible UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40135/">CVE-2025-40135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40135">CVE-2025-40135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253342">SUSE bug 1253342</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40141</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40141" ref_url="https://www.suse.com/security/cve/CVE-2025-40141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix possible UAF on iso_conn_free

This attempt to fix similar issue to sco_conn_free where if the
conn-&gt;sk is not set to NULL may lead to UAF on iso_conn_free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40141/">CVE-2025-40141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40141">CVE-2025-40141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253352">SUSE bug 1253352</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40154</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40154" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently
bytcr_rt5640 driver only shows an error message but leaves as is.
This may lead to unepxected results like OOB access.

This patch corrects the input mapping to the certain default value if
an invalid value is passed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253431">SUSE bug 1253431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253432">SUSE bug 1253432</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054961" comment="kernel-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054962" comment="kernel-abi-stablelists-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054963" comment="kernel-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054964" comment="kernel-cross-headers-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054965" comment="kernel-debug-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054966" comment="kernel-debug-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054967" comment="kernel-debug-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054968" comment="kernel-debug-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054969" comment="kernel-debug-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054970" comment="kernel-debug-uki-virt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054971" comment="kernel-doc-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054972" comment="kernel-headers-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054973" comment="kernel-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054974" comment="kernel-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054975" comment="kernel-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054976" comment="kernel-rt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054977" comment="kernel-rt-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054978" comment="kernel-rt-debug-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054979" comment="kernel-rt-debug-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054980" comment="kernel-rt-debug-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054981" comment="kernel-rt-debug-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054982" comment="kernel-rt-debug-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054983" comment="kernel-rt-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054984" comment="kernel-rt-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054985" comment="kernel-rt-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054986" comment="kernel-tools-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054987" comment="kernel-tools-libs-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054988" comment="kernel-uki-virt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054989" comment="kernel-uki-virt-addons-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054990" comment="libperf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054991" comment="perf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054992" comment="python3-perf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054993" comment="rtla-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054994" comment="rv-5.14.0-611.27.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40158</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40158" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40158" ref_url="https://www.suse.com/security/cve/CVE-2025-40158" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU in ip6_output()

Use RCU in ip6_output() in order to use dst_dev_rcu() to prevent
possible UAF.

We can remove rcu_read_lock()/rcu_read_unlock() pairs
from ip6_finish_output2().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40158/">CVE-2025-40158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40158">CVE-2025-40158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253402">SUSE bug 1253402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40168" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40168" ref_url="https://www.suse.com/security/cve/CVE-2025-40168" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002516.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().

smc_clc_prfx_match() is called from smc_listen_work() and
not under RCU nor RTNL.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dst_dev_rcu().

Note that the returned value of smc_clc_prfx_match() is not
used in the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40168/">CVE-2025-40168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40168">CVE-2025-40168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253427">SUSE bug 1253427</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055511" comment="kernel-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055512" comment="kernel-abi-stablelists-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055513" comment="kernel-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055514" comment="kernel-cross-headers-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055515" comment="kernel-debug-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055516" comment="kernel-debug-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055517" comment="kernel-debug-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055518" comment="kernel-debug-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055519" comment="kernel-debug-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055520" comment="kernel-debug-uki-virt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055521" comment="kernel-doc-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055522" comment="kernel-headers-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055523" comment="kernel-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055524" comment="kernel-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055525" comment="kernel-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055526" comment="kernel-rt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055527" comment="kernel-rt-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055528" comment="kernel-rt-debug-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055529" comment="kernel-rt-debug-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055530" comment="kernel-rt-debug-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055531" comment="kernel-rt-debug-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055532" comment="kernel-rt-debug-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055533" comment="kernel-rt-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055534" comment="kernel-rt-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055535" comment="kernel-rt-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055536" comment="kernel-tools-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055537" comment="kernel-tools-libs-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055538" comment="kernel-uki-virt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055539" comment="kernel-uki-virt-addons-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055540" comment="libperf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055541" comment="perf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055542" comment="python3-perf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055543" comment="rtla-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055544" comment="rv-5.14.0-611.36.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40170</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40170" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40170" ref_url="https://www.suse.com/security/cve/CVE-2025-40170" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: use dst_dev_rcu() in sk_setup_caps()

Use RCU to protect accesses to dst-&gt;dev from sk_setup_caps()
and sk_dst_gso_max_size().

Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(),
and ip_dst_mtu_maybe_forward().

ip4_dst_hoplimit() can use dst_dev_net_rcu().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40170/">CVE-2025-40170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40170">CVE-2025-40170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253413">SUSE bug 1253413</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40176" ref_url="https://www.suse.com/security/cve/CVE-2025-40176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: wait for pending async decryptions if tls_strp_msg_hold fails

Async decryption calls tls_strp_msg_hold to create a clone of the
input skb to hold references to the memory it uses. If we fail to
allocate that clone, proceeding with async decryption can lead to
various issues (UAF on the skb, writing into userspace memory after
the recv() call has returned).

In this case, wait for all pending decryption requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40176/">CVE-2025-40176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40176">CVE-2025-40176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253425">SUSE bug 1253425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254100">SUSE bug 1254100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054429" comment="kernel-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054430" comment="kernel-abi-stablelists-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054431" comment="kernel-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054432" comment="kernel-cross-headers-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054433" comment="kernel-debug-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054434" comment="kernel-debug-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054435" comment="kernel-debug-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054436" comment="kernel-debug-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054437" comment="kernel-debug-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054438" comment="kernel-debug-uki-virt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054439" comment="kernel-doc-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054440" comment="kernel-headers-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054441" comment="kernel-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054442" comment="kernel-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054443" comment="kernel-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054444" comment="kernel-rt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054445" comment="kernel-rt-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054446" comment="kernel-rt-debug-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054447" comment="kernel-rt-debug-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054448" comment="kernel-rt-debug-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054449" comment="kernel-rt-debug-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054450" comment="kernel-rt-debug-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054451" comment="kernel-rt-modules-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054452" comment="kernel-rt-modules-core-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054453" comment="kernel-rt-modules-extra-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054454" comment="kernel-tools-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054455" comment="kernel-tools-libs-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054456" comment="kernel-uki-virt-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054457" comment="kernel-uki-virt-addons-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054458" comment="libperf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054459" comment="perf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054460" comment="python3-perf-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054461" comment="rtla-5.14.0-611.16.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054462" comment="rv-5.14.0-611.16.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40185" ref_url="https://www.suse.com/security/cve/CVE-2025-40185" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: ice_adapter: release xa entry on adapter allocation failure

When ice_adapter_new() fails, the reserved XArray entry created by
xa_insert() is not released. This causes subsequent insertions at
the same index to return -EBUSY, potentially leading to
NULL pointer dereferences.

Reorder the operations as suggested by Przemek Kitszel:
1. Check if adapter already exists (xa_load)
2. Reserve the XArray slot (xa_reserve)
3. Allocate the adapter (ice_adapter_new)
4. Store the adapter (xa_store)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40185/">CVE-2025-40185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40185">CVE-2025-40185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253394">SUSE bug 1253394</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054281" comment="kernel-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054282" comment="kernel-abi-stablelists-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054283" comment="kernel-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054284" comment="kernel-cross-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054285" comment="kernel-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054286" comment="kernel-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054287" comment="kernel-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054288" comment="kernel-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054289" comment="kernel-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054290" comment="kernel-debug-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054291" comment="kernel-doc-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054292" comment="kernel-headers-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054293" comment="kernel-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054294" comment="kernel-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054295" comment="kernel-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054296" comment="kernel-rt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054297" comment="kernel-rt-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054298" comment="kernel-rt-debug-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054299" comment="kernel-rt-debug-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054300" comment="kernel-rt-debug-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054301" comment="kernel-rt-debug-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054302" comment="kernel-rt-debug-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054303" comment="kernel-rt-modules-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054304" comment="kernel-rt-modules-core-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054305" comment="kernel-rt-modules-extra-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054306" comment="kernel-tools-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054307" comment="kernel-tools-libs-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054308" comment="kernel-uki-virt-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054309" comment="kernel-uki-virt-addons-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054310" comment="libperf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054311" comment="perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054312" comment="python3-perf-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054313" comment="rtla-5.14.0-611.11.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054314" comment="rv-5.14.0-611.11.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40240" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40240" ref_url="https://www.suse.com/security/cve/CVE-2025-40240" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: avoid NULL dereference when chunk data buffer is missing

chunk-&gt;skb pointer is dereferenced in the if-block where it's supposed
to be NULL only.

chunk-&gt;skb can only be NULL if chunk-&gt;head_skb is not. Check for frag_list
instead and do it just before replacing chunk-&gt;skb. We're sure that
otherwise chunk-&gt;skb is non-NULL because of outer if() condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40240/">CVE-2025-40240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40240">CVE-2025-40240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254869">SUSE bug 1254869</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054600" comment="kernel-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054601" comment="kernel-abi-stablelists-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054602" comment="kernel-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054603" comment="kernel-cross-headers-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054604" comment="kernel-debug-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054605" comment="kernel-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054606" comment="kernel-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054607" comment="kernel-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054608" comment="kernel-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054609" comment="kernel-debug-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054610" comment="kernel-doc-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054611" comment="kernel-headers-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054612" comment="kernel-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054613" comment="kernel-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054614" comment="kernel-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054615" comment="kernel-rt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054616" comment="kernel-rt-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054617" comment="kernel-rt-debug-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054618" comment="kernel-rt-debug-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054619" comment="kernel-rt-debug-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054620" comment="kernel-rt-debug-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054621" comment="kernel-rt-debug-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054622" comment="kernel-rt-modules-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054623" comment="kernel-rt-modules-core-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054624" comment="kernel-rt-modules-extra-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054625" comment="kernel-tools-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054626" comment="kernel-tools-libs-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054627" comment="kernel-uki-virt-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054628" comment="kernel-uki-virt-addons-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054629" comment="libperf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054630" comment="perf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054631" comment="python3-perf-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054632" comment="rtla-5.14.0-611.20.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054633" comment="rv-5.14.0-611.20.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1703" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Ignore signal/timeout on connect() if already established

During connect(), acting on a signal/timeout by disconnecting an already
established socket leads to several issues:

1. connect() invoking vsock_transport_cancel_pkt() -&gt;
   virtio_transport_purge_skbs() may race with sendmsg() invoking
   virtio_transport_get_credit(). This results in a permanently elevated
   `vvs-&gt;bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.

2. connect() resetting a connected socket's state may race with socket
   being placed in a sockmap. A disconnected socket remaining in a sockmap
   breaks sockmap's assumptions. And gives rise to WARNs.

3. connect() transitioning SS_CONNECTED -&gt; SS_UNCONNECTED allows for a
   transport change/drop after TCP_ESTABLISHED. Which poses a problem for
   any simultaneous sendmsg() or connect() and may result in a
   use-after-free/null-ptr-deref.

Do not disconnect socket on signal/timeout. Keep the logic for unconnected
sockets: they don't linger, can't be placed in a sockmap, are rejected by
sendmsg().

[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/
[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/
[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254864">SUSE bug 1254864</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40251</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40251" ref_url="https://www.suse.com/security/cve/CVE-2025-40251" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: rate: Unset parent pointer in devl_rate_nodes_destroy

The function devl_rate_nodes_destroy is documented to "Unset parent for
all rate objects". However, it was only calling the driver-specific
`rate_leaf_parent_set` or `rate_node_parent_set` ops and decrementing
the parent's refcount, without actually setting the
`devlink_rate-&gt;parent` pointer to NULL.

This leaves a dangling pointer in the `devlink_rate` struct, which cause
refcount error in netdevsim[1] and mlx5[2]. In addition, this is
inconsistent with the behavior of `devlink_nl_rate_parent_node_set`,
where the parent pointer is correctly cleared.

This patch fixes the issue by explicitly setting `devlink_rate-&gt;parent`
to NULL after notifying the driver, thus fulfilling the function's
documented behavior for all rate objects.

[1]
repro steps:
echo 1 &gt; /sys/bus/netdevsim/new_device
devlink dev eswitch set netdevsim/netdevsim1 mode switchdev
echo 1 &gt; /sys/bus/netdevsim/devices/netdevsim1/sriov_numvfs
devlink port function rate add netdevsim/netdevsim1/test_node
devlink port function rate set netdevsim/netdevsim1/128 parent test_node
echo 1 &gt; /sys/bus/netdevsim/del_device

dmesg:
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 8 PID: 1530 at lib/refcount.c:31 refcount_warn_saturate+0x42/0xe0
CPU: 8 UID: 0 PID: 1530 Comm: bash Not tainted 6.18.0-rc4+ #1 NONE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:refcount_warn_saturate+0x42/0xe0
Call Trace:
 &lt;TASK&gt;
 devl_rate_leaf_destroy+0x8d/0x90
 __nsim_dev_port_del+0x6c/0x70 [netdevsim]
 nsim_dev_reload_destroy+0x11c/0x140 [netdevsim]
 nsim_drv_remove+0x2b/0xb0 [netdevsim]
 device_release_driver_internal+0x194/0x1f0
 bus_remove_device+0xc6/0x130
 device_del+0x159/0x3c0
 device_unregister+0x1a/0x60
 del_device_store+0x111/0x170 [netdevsim]
 kernfs_fop_write_iter+0x12e/0x1e0
 vfs_write+0x215/0x3d0
 ksys_write+0x5f/0xd0
 do_syscall_64+0x55/0x10f0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

[2]
devlink dev eswitch set pci/0000:08:00.0 mode switchdev
devlink port add pci/0000:08:00.0 flavour pcisf pfnum 0 sfnum 1000
devlink port function rate add pci/0000:08:00.0/group1
devlink port function rate set pci/0000:08:00.0/32768 parent group1
modprobe -r mlx5_ib mlx5_fwctl mlx5_core

dmesg:
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 7 PID: 16151 at lib/refcount.c:31 refcount_warn_saturate+0x42/0xe0
CPU: 7 UID: 0 PID: 16151 Comm: bash Not tainted 6.17.0-rc7_for_upstream_min_debug_2025_10_02_12_44 #1 NONE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:refcount_warn_saturate+0x42/0xe0
Call Trace:
 &lt;TASK&gt;
 devl_rate_leaf_destroy+0x8d/0x90
 mlx5_esw_offloads_devlink_port_unregister+0x33/0x60 [mlx5_core]
 mlx5_esw_offloads_unload_rep+0x3f/0x50 [mlx5_core]
 mlx5_eswitch_unload_sf_vport+0x40/0x90 [mlx5_core]
 mlx5_sf_esw_event+0xc4/0x120 [mlx5_core]
 notifier_call_chain+0x33/0xa0
 blocking_notifier_call_chain+0x3b/0x50
 mlx5_eswitch_disable_locked+0x50/0x110 [mlx5_core]
 mlx5_eswitch_disable+0x63/0x90 [mlx5_core]
 mlx5_unload+0x1d/0x170 [mlx5_core]
 mlx5_uninit_one+0xa2/0x130 [mlx5_core]
 remove_one+0x78/0xd0 [mlx5_core]
 pci_device_remove+0x39/0xa0
 device_release_driver_internal+0x194/0x1f0
 unbind_store+0x99/0xa0
 kernfs_fop_write_iter+0x12e/0x1e0
 vfs_write+0x215/0x3d0
 ksys_write+0x5f/0xd0
 do_syscall_64+0x53/0x1f0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40251/">CVE-2025-40251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254856">SUSE bug 1254856</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054961" comment="kernel-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054962" comment="kernel-abi-stablelists-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054963" comment="kernel-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054964" comment="kernel-cross-headers-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054965" comment="kernel-debug-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054966" comment="kernel-debug-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054967" comment="kernel-debug-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054968" comment="kernel-debug-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054969" comment="kernel-debug-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054970" comment="kernel-debug-uki-virt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054971" comment="kernel-doc-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054972" comment="kernel-headers-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054973" comment="kernel-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054974" comment="kernel-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054975" comment="kernel-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054976" comment="kernel-rt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054977" comment="kernel-rt-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054978" comment="kernel-rt-debug-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054979" comment="kernel-rt-debug-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054980" comment="kernel-rt-debug-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054981" comment="kernel-rt-debug-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054982" comment="kernel-rt-debug-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054983" comment="kernel-rt-modules-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054984" comment="kernel-rt-modules-core-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054985" comment="kernel-rt-modules-extra-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054986" comment="kernel-tools-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054987" comment="kernel-tools-libs-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054988" comment="kernel-uki-virt-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054989" comment="kernel-uki-virt-addons-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054990" comment="libperf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054991" comment="perf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054992" comment="python3-perf-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054993" comment="rtla-5.14.0-611.27.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054994" comment="rv-5.14.0-611.27.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40258</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40258" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix race condition in mptcp_schedule_work()

syzbot reported use-after-free in mptcp_schedule_work() [1]

Issue here is that mptcp_schedule_work() schedules a work,
then gets a refcount on sk-&gt;sk_refcnt if the work was scheduled.
This refcount will be released by mptcp_worker().

[A] if (schedule_work(...)) {
[B]     sock_hold(sk);
        return true;
    }

Problem is that mptcp_worker() can run immediately and complete before [B]

We need instead :

    sock_hold(sk);
    if (schedule_work(...))
        return true;
    sock_put(sk);

[1]
refcount_t: addition on 0; use-after-free.
 WARNING: CPU: 1 PID: 29 at lib/refcount.c:25 refcount_warn_saturate+0xfa/0x1d0 lib/refcount.c:25
Call Trace:
 &lt;TASK&gt;
 __refcount_add include/linux/refcount.h:-1 [inline]
  __refcount_inc include/linux/refcount.h:366 [inline]
  refcount_inc include/linux/refcount.h:383 [inline]
  sock_hold include/net/sock.h:816 [inline]
  mptcp_schedule_work+0x164/0x1a0 net/mptcp/protocol.c:943
  mptcp_tout_timer+0x21/0xa0 net/mptcp/protocol.c:2316
  call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747
  expire_timers kernel/time/timer.c:1798 [inline]
  __run_timers kernel/time/timer.c:2372 [inline]
  __run_timer_base+0x648/0x970 kernel/time/timer.c:2384
  run_timer_base kernel/time/timer.c:2393 [inline]
  run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403
  handle_softirqs+0x22f/0x710 kernel/softirq.c:622
  __do_softirq kernel/softirq.c:656 [inline]
  run_ktimerd+0xcf/0x190 kernel/softirq.c:1138
  smpboot_thread_fn+0x542/0xa60 kernel/smpboot.c:160
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254843">SUSE bug 1254843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255053">SUSE bug 1255053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40269" ref_url="https://www.suse.com/security/cve/CVE-2025-40269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential overflow of PCM transfer buffer

The PCM stream data in USB-audio driver is transferred over USB URB
packet buffers, and each packet size is determined dynamically.  The
packet sizes are limited by some factors such as wMaxPacketSize USB
descriptor.  OTOH, in the current code, the actually used packet sizes
are determined only by the rate and the PPS, which may be bigger than
the size limit above.  This results in a buffer overflow, as reported
by syzbot.

Basically when the limit is smaller than the calculated packet size,
it implies that something is wrong, most likely a weird USB
descriptor.  So the best option would be just to return an error at
the parameter setup time before doing any further operations.

This patch introduces such a sanity check, and returns -EINVAL when
the packet size is greater than maxpacksize.  The comparison with
ep-&gt;packsize[1] alone should suffice since it's always equal or
greater than ep-&gt;packsize[0].
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40269/">CVE-2025-40269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255035">SUSE bug 1255035</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40271</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc: fix uaf in proc_readdir_de()

Pde is erased from subdir rbtree through rb_erase(), but not set the node
to EMPTY, which may result in uaf access.  We should use RB_CLEAR_NODE()
set the erased node to EMPTY, then pde_subdir_next() will return NULL to
avoid uaf access.

We found an uaf issue while using stress-ng testing, need to run testcase
getdent and tun in the same time.  The steps of the issue is as follows:

1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current
   pde is tun3;

2) in the [time windows] unregister netdevice tun3 and tun2, and erase
   them from rbtree.  erase tun3 first, and then erase tun2.  the
   pde(tun2) will be released to slab;

3) continue to getdent process, then pde_subdir_next() will return
   pde(tun2) which is released, it will case uaf access.

CPU 0                                      |    CPU 1
-------------------------------------------------------------------------
traverse dir /proc/pid/net/dev_snmp6/      |   unregister_netdevice(tun-&gt;dev)   //tun3 tun2
sys_getdents64()                           |
  iterate_dir()                            |
    proc_readdir()                         |
      proc_readdir_de()                    |     snmp6_unregister_dev()
        pde_get(de);                       |       proc_remove()
        read_unlock(&amp;proc_subdir_lock);    |         remove_proc_subtree()
                                           |           write_lock(&amp;proc_subdir_lock);
        [time window]                      |           rb_erase(&amp;root-&gt;subdir_node, &amp;parent-&gt;subdir);
                                           |           write_unlock(&amp;proc_subdir_lock);
        read_lock(&amp;proc_subdir_lock);      |
        next = pde_subdir_next(de);        |
        pde_put(de);                       |
        de = next;    //UAF                |

rbtree of dev_snmp6
                        |
                    pde(tun3)
                     /    \
                  NULL  pde(tun2)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255297">SUSE bug 1255297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40277</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

This data originates from userspace and is used in buffer offset
calculations which could potentially overflow causing an out-of-bounds
access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254894">SUSE bug 1254894</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054707" comment="kernel-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054708" comment="kernel-abi-stablelists-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054709" comment="kernel-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054710" comment="kernel-cross-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054711" comment="kernel-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054712" comment="kernel-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054713" comment="kernel-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054714" comment="kernel-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054715" comment="kernel-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054716" comment="kernel-debug-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054717" comment="kernel-doc-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054718" comment="kernel-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054719" comment="kernel-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054720" comment="kernel-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054721" comment="kernel-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054722" comment="kernel-rt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054723" comment="kernel-rt-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054724" comment="kernel-rt-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054725" comment="kernel-rt-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054726" comment="kernel-rt-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054727" comment="kernel-rt-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054728" comment="kernel-rt-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054729" comment="kernel-rt-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054730" comment="kernel-rt-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054731" comment="kernel-rt-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054732" comment="kernel-tools-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054733" comment="kernel-tools-libs-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054734" comment="kernel-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054735" comment="kernel-uki-virt-addons-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054736" comment="libperf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054737" comment="perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054738" comment="python3-perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054739" comment="rtla-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054740" comment="rv-5.14.0-611.24.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40294</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40294" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40294" ref_url="https://www.suse.com/security/cve/CVE-2025-40294" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()

In the parse_adv_monitor_pattern() function, the value of
the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251).
The size of the 'value' array in the mgmt_adv_pattern structure is 31.
If the value of 'pattern[i].length' is set in the user space
and exceeds 31, the 'patterns[i].value' array can be accessed
out of bound when copied.

Increasing the size of the 'value' array in
the 'mgmt_adv_pattern' structure will break the userspace.
Considering this, and to avoid OOB access revert the limits for 'offset'
and 'length' back to the value of HCI_MAX_AD_LENGTH.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40294/">CVE-2025-40294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40294">CVE-2025-40294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255181">SUSE bug 1255181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40300</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/vmscape: Add conditional IBPB mitigation

VMSCAPE is a vulnerability that exploits insufficient branch predictor
isolation between a guest and a userspace hypervisor (like QEMU). Existing
mitigations already protect kernel/KVM from a malicious guest. Userspace
can additionally be protected by flushing the branch predictors after a
VMexit.

Since it is the userspace that consumes the poisoned branch predictors,
conditionally issue an IBPB after a VMexit and before returning to
userspace. Workloads that frequently switch between hypervisor and
userspace will incur the most overhead from the new IBPB.

This new IBPB is not integrated with the existing IBPB sites. For
instance, a task can use the existing speculation control prctl() to
get an IBPB at context switch time. With this implementation, the
IBPB is doubled up: one at context switch and another before running
userspace.

The intent is to integrate and optimize these cases post-embargo.

[ dhansen: elaborate on suboptimal IBPB solution ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249561">SUSE bug 1249561</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010025606" comment="kernel-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025607" comment="kernel-abi-stablelists-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025608" comment="kernel-core-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025609" comment="kernel-cross-headers-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025610" comment="kernel-debug-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025611" comment="kernel-debug-core-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025614" comment="kernel-debug-modules-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025615" comment="kernel-debug-modules-core-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025616" comment="kernel-debug-modules-extra-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025617" comment="kernel-debug-uki-virt-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025620" comment="kernel-doc-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025621" comment="kernel-headers-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025622" comment="kernel-modules-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025623" comment="kernel-modules-core-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025624" comment="kernel-modules-extra-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025625" comment="kernel-rt-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025626" comment="kernel-rt-core-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025627" comment="kernel-rt-debug-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025628" comment="kernel-rt-debug-core-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025630" comment="kernel-rt-debug-kvm-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025631" comment="kernel-rt-debug-modules-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025632" comment="kernel-rt-debug-modules-core-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025633" comment="kernel-rt-debug-modules-extra-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025635" comment="kernel-rt-kvm-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025636" comment="kernel-rt-modules-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025637" comment="kernel-rt-modules-core-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025638" comment="kernel-rt-modules-extra-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025639" comment="kernel-tools-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025640" comment="kernel-tools-libs-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025642" comment="kernel-uki-virt-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025643" comment="kernel-uki-virt-addons-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025644" comment="libperf-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025645" comment="perf-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025646" comment="python3-perf-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025647" comment="rtla-5.14.0-570.62.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025648" comment="rv-5.14.0-570.62.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40304</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40304" ref_url="https://www.suse.com/security/cve/CVE-2025-40304" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002516.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds

Add bounds checking to prevent writes past framebuffer boundaries when
rendering text near screen edges. Return early if the Y position is off-screen
and clip image height to screen boundary. Break from the rendering loop if the
X position is off-screen. When clipping image width to fit the screen, update
the character count to match the clipped width to prevent buffer size
mismatches.

Without the character count update, bit_putcs_aligned and bit_putcs_unaligned
receive mismatched parameters where the buffer is allocated for the clipped
width but cnt reflects the original larger count, causing out-of-bounds writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40304/">CVE-2025-40304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40304">CVE-2025-40304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255034">SUSE bug 1255034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055132" comment="kernel-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055133" comment="kernel-abi-stablelists-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055134" comment="kernel-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055135" comment="kernel-cross-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055136" comment="kernel-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055137" comment="kernel-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055138" comment="kernel-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055139" comment="kernel-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055140" comment="kernel-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055141" comment="kernel-debug-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055142" comment="kernel-doc-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055143" comment="kernel-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055144" comment="kernel-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055145" comment="kernel-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055146" comment="kernel-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055147" comment="kernel-rt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055148" comment="kernel-rt-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055149" comment="kernel-rt-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055150" comment="kernel-rt-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055151" comment="kernel-rt-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055152" comment="kernel-rt-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055153" comment="kernel-rt-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055154" comment="kernel-rt-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055155" comment="kernel-rt-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055156" comment="kernel-rt-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055157" comment="kernel-tools-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055158" comment="kernel-tools-libs-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055159" comment="kernel-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055160" comment="kernel-uki-virt-addons-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055161" comment="libperf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055162" comment="perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055163" comment="python3-perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055164" comment="rtla-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055165" comment="rv-5.14.0-611.34.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40318" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40318" ref_url="https://www.suse.com/security/cve/CVE-2025-40318" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once

hci_cmd_sync_dequeue_once() does lookup and then cancel
the entry under two separate lock sections. Meanwhile,
hci_cmd_sync_work() can also delete the same entry,
leading to double list_del() and "UAF".

Fix this by holding cmd_sync_work_lock across both
lookup and cancel, so that the entry cannot be removed
concurrently.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40318/">CVE-2025-40318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40318">CVE-2025-40318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254798">SUSE bug 1254798</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055077" comment="kernel-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055078" comment="kernel-abi-stablelists-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055079" comment="kernel-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055080" comment="kernel-cross-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055081" comment="kernel-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055082" comment="kernel-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055083" comment="kernel-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055084" comment="kernel-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055085" comment="kernel-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055086" comment="kernel-debug-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055087" comment="kernel-doc-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055088" comment="kernel-headers-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055089" comment="kernel-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055090" comment="kernel-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055091" comment="kernel-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055092" comment="kernel-rt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055093" comment="kernel-rt-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055094" comment="kernel-rt-debug-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055095" comment="kernel-rt-debug-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055096" comment="kernel-rt-debug-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055097" comment="kernel-rt-debug-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055098" comment="kernel-rt-debug-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055099" comment="kernel-rt-modules-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055100" comment="kernel-rt-modules-core-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055101" comment="kernel-rt-modules-extra-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055102" comment="kernel-tools-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055103" comment="kernel-tools-libs-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055104" comment="kernel-uki-virt-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055105" comment="kernel-uki-virt-addons-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055106" comment="libperf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055107" comment="perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055108" comment="python3-perf-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055109" comment="rtla-5.14.0-611.30.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055110" comment="rv-5.14.0-611.30.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40322</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40322" ref_url="https://www.suse.com/security/cve/CVE-2025-40322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: bitblit: bound-check glyph index in bit_putcs*

bit_putcs_aligned()/unaligned() derived the glyph pointer from the
character value masked by 0xff/0x1ff, which may exceed the actual font's
glyph count and read past the end of the built-in font array.
Clamp the index to the actual glyph count before computing the address.

This fixes a global out-of-bounds read reported by syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40322/">CVE-2025-40322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40322">CVE-2025-40322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255092">SUSE bug 1255092</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055132" comment="kernel-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055133" comment="kernel-abi-stablelists-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055134" comment="kernel-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055135" comment="kernel-cross-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055136" comment="kernel-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055137" comment="kernel-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055138" comment="kernel-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055139" comment="kernel-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055140" comment="kernel-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055141" comment="kernel-debug-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055142" comment="kernel-doc-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055143" comment="kernel-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055144" comment="kernel-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055145" comment="kernel-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055146" comment="kernel-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055147" comment="kernel-rt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055148" comment="kernel-rt-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055149" comment="kernel-rt-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055150" comment="kernel-rt-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055151" comment="kernel-rt-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055152" comment="kernel-rt-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055153" comment="kernel-rt-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055154" comment="kernel-rt-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055155" comment="kernel-rt-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055156" comment="kernel-rt-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055157" comment="kernel-tools-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055158" comment="kernel-tools-libs-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055159" comment="kernel-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055160" comment="kernel-uki-virt-addons-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055161" comment="libperf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055162" comment="perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055163" comment="python3-perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055164" comment="rtla-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055165" comment="rv-5.14.0-611.34.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002182.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002219.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003119.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003108.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22205" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache.
This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252379">SUSE bug 1252379</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054155" comment="bind-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054156" comment="bind-chroot-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054157" comment="bind-devel-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054158" comment="bind-dnssec-doc-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054159" comment="bind-dnssec-utils-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054160" comment="bind-doc-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054161" comment="bind-libs-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054162" comment="bind-license-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054163" comment="bind-utils-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054165" comment="bind9.18-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054166" comment="bind9.18-chroot-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054167" comment="bind9.18-devel-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054168" comment="bind9.18-dnssec-utils-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054169" comment="bind9.18-doc-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054170" comment="bind9.18-libs-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054171" comment="bind9.18-utils-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054164" comment="python3-bind-9.16.23-34.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40780</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002219.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003119.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html" source="SUSE-SU"/>
    <description>
    In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use.
This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252380">SUSE bug 1252380</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054155" comment="bind-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054156" comment="bind-chroot-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054157" comment="bind-devel-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054158" comment="bind-dnssec-doc-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054159" comment="bind-dnssec-utils-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054160" comment="bind-doc-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054161" comment="bind-libs-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054162" comment="bind-license-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054163" comment="bind-utils-9.16.23-34.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054165" comment="bind9.18-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054166" comment="bind9.18-chroot-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054167" comment="bind9.18-devel-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054168" comment="bind9.18-dnssec-utils-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054169" comment="bind9.18-doc-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054170" comment="bind9.18-libs-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054171" comment="bind9.18-utils-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054164" comment="python3-bind-9.16.23-34.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4083" ref_url="https://www.suse.com/security/cve/CVE-2025-4083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001109.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001112.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4460" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039147.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6ZBNI7X4V2LGK72WNKGQDBMYZSO5HW3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXN7YKFNUPOTT4RDBIYSLHYZG3DKIOBT/" source="SUSE-SU"/>
    <description>
    A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4083/">CVE-2025-4083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4083">CVE-2025-4083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241621">SUSE bug 1241621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983974" comment="firefox-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983975" comment="firefox-x11-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977556" comment="thunderbird-128.10.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4087" ref_url="https://www.suse.com/security/cve/CVE-2025-4087" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001109.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001112.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4460" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039147.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6ZBNI7X4V2LGK72WNKGQDBMYZSO5HW3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXN7YKFNUPOTT4RDBIYSLHYZG3DKIOBT/" source="SUSE-SU"/>
    <description>
    A vulnerability was identified in Thunderbird where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Thunderbird 138, and Thunderbird 128.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4087/">CVE-2025-4087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4087">CVE-2025-4087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241621">SUSE bug 1241621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983974" comment="firefox-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983975" comment="firefox-x11-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977556" comment="thunderbird-128.10.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40907</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40907" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40907" ref_url="https://www.suse.com/security/cve/CVE-2025-40907" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3015" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001640.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:3016" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001648.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:3017" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001646.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:3018" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001649.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8625" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001641.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8635" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001637.html" source="SUSE-SU"/>
    <description>
    FCGI versions 0.44 through 0.82, for Perl, include a vulnerable version of the FastCGI fcgi2 (aka fcgi) library.

The included FastCGI library is affected by  CVE-2025-23016, causing an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-11"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-40907/">CVE-2025-40907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40907">CVE-2025-40907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243326">SUSE bug 1243326</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986193" comment="perl-FCGI-0.79-8.1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40908</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40908" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40908" ref_url="https://www.suse.com/security/cve/CVE-2025-40908" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9329" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001696.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9330" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:03081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01885-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01885-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01886-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040223.html" source="SUSE-SU"/>
    <description>
    YAML-LibYAML prior to 0.903.0 for Perl uses 2-args open, allowing existing files to be modified
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-09-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40908/">CVE-2025-40908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40908">CVE-2025-40908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243902">SUSE bug 1243902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996922" comment="perl-YAML-LibYAML-0.82-6.1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40909</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40909" ref_url="https://www.suse.com/security/cve/CVE-2025-40909" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11804" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001840.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11805" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02027-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20532-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041122.html" source="SUSE-SU"/>
    <description>
    Perl threads have a working directory race condition where file operations may target unintended paths.

If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone  that handle for the new thread, which is visible from any third (or  more) thread already running. 

This may lead to unintended operations  such as loading code or accessing files from unexpected locations,  which a local attacker may be able to exploit.

The bug was introduced in commit  11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-40909/">CVE-2025-40909 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40909">CVE-2025-40909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244079">SUSE bug 1244079</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011265" comment="perl-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011266" comment="perl-Attribute-Handlers-1.01-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011267" comment="perl-AutoLoader-5.74-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011268" comment="perl-AutoSplit-5.74-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011269" comment="perl-B-1.80-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011270" comment="perl-Benchmark-1.23-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011271" comment="perl-Class-Struct-0.66-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011272" comment="perl-Config-Extensions-0.03-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011273" comment="perl-DBM_Filter-0.06-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011274" comment="perl-Devel-Peek-1.28-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011275" comment="perl-Devel-SelfStubber-1.06-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011276" comment="perl-DirHandle-1.05-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011277" comment="perl-Dumpvalue-2.27-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011278" comment="perl-DynaLoader-1.47-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011279" comment="perl-English-1.11-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011280" comment="perl-Errno-1.30-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011281" comment="perl-ExtUtils-Constant-0.25-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011282" comment="perl-ExtUtils-Embed-1.35-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011283" comment="perl-ExtUtils-Miniperl-1.09-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011284" comment="perl-Fcntl-1.13-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011285" comment="perl-File-Basename-2.85-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011286" comment="perl-File-Compare-1.100.600-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011287" comment="perl-File-Copy-2.34-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011288" comment="perl-File-DosGlob-1.12-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011289" comment="perl-File-Find-1.37-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011290" comment="perl-File-stat-1.09-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011291" comment="perl-FileCache-1.10-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011292" comment="perl-FileHandle-2.03-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011293" comment="perl-FindBin-1.51-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011294" comment="perl-GDBM_File-1.18-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011295" comment="perl-Getopt-Std-1.12-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011296" comment="perl-Hash-Util-0.23-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011297" comment="perl-Hash-Util-FieldHash-1.20-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011298" comment="perl-I18N-Collate-1.02-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011299" comment="perl-I18N-LangTags-0.44-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011300" comment="perl-I18N-Langinfo-0.19-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011301" comment="perl-IO-1.43-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011302" comment="perl-IPC-Open3-1.21-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011303" comment="perl-Locale-Maketext-Simple-0.21-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011304" comment="perl-Math-Complex-1.59-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011305" comment="perl-Memoize-1.03-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011306" comment="perl-Module-Loaded-0.08-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011307" comment="perl-NDBM_File-1.15-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011308" comment="perl-NEXT-0.67-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011309" comment="perl-Net-1.02-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011310" comment="perl-ODBM_File-1.16-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011311" comment="perl-Opcode-1.48-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011312" comment="perl-POSIX-1.94-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011313" comment="perl-Pod-Functions-1.13-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011314" comment="perl-Pod-Html-1.25-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011315" comment="perl-Safe-2.41-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011316" comment="perl-Search-Dict-1.07-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011317" comment="perl-SelectSaver-1.02-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011318" comment="perl-SelfLoader-1.26-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011319" comment="perl-Symbol-1.08-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011320" comment="perl-Sys-Hostname-1.23-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011321" comment="perl-Term-Complete-1.403-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011322" comment="perl-Term-ReadLine-1.17-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011323" comment="perl-Test-1.31-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011324" comment="perl-Text-Abbrev-1.02-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011325" comment="perl-Thread-3.05-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011326" comment="perl-Thread-Semaphore-2.13-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011327" comment="perl-Tie-4.6-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011328" comment="perl-Tie-File-1.06-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011329" comment="perl-Tie-Memoize-1.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011330" comment="perl-Time-1.03-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011331" comment="perl-Time-Piece-1.3401-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011332" comment="perl-Unicode-UCD-0.75-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011333" comment="perl-User-pwent-1.03-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011334" comment="perl-autouse-1.11-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011335" comment="perl-base-2.27-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011336" comment="perl-blib-1.07-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011337" comment="perl-debugger-1.56-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011338" comment="perl-deprecate-0.04-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011339" comment="perl-devel-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011340" comment="perl-diagnostics-1.37-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011341" comment="perl-doc-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011342" comment="perl-encoding-warnings-0.13-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011343" comment="perl-fields-2.27-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011344" comment="perl-filetest-1.03-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011345" comment="perl-if-0.60.800-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011346" comment="perl-interpreter-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011347" comment="perl-less-0.03-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011348" comment="perl-lib-0.65-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011349" comment="perl-libnetcfg-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011350" comment="perl-libs-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011351" comment="perl-locale-1.09-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011352" comment="perl-macros-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011353" comment="perl-meta-notation-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011354" comment="perl-mro-1.23-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011355" comment="perl-open-1.12-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011356" comment="perl-overload-1.31-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011357" comment="perl-overloading-0.02-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011358" comment="perl-ph-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011359" comment="perl-sigtrap-1.09-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011360" comment="perl-sort-2.04-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011361" comment="perl-subs-1.03-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011362" comment="perl-utils-5.32.1-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011363" comment="perl-vars-1.05-481.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011364" comment="perl-vmsish-1.04-481.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4091" ref_url="https://www.suse.com/security/cve/CVE-2025-4091" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001109.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001112.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4460" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039147.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6ZBNI7X4V2LGK72WNKGQDBMYZSO5HW3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15045-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IXN7YKFNUPOTT4RDBIYSLHYZG3DKIOBT/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Thunderbird 138, and Thunderbird 128.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4091/">CVE-2025-4091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4091">CVE-2025-4091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241621">SUSE bug 1241621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983974" comment="firefox-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983975" comment="firefox-x11-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977556" comment="thunderbird-128.10.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40928</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40928" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40928" ref_url="https://www.suse.com/security/cve/CVE-2025-40928" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002099.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17163" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002088.html" source="SUSE-SU"/>
    <description>
    JSON::XS before version 4.04 for Perl has an integer buffer overflow causing a segfault when parsing crafted JSON, enabling denial-of-service attacks or other unspecified impact
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-15"/>
	<updated date="2025-10-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40928/">CVE-2025-40928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40928">CVE-2025-40928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249330">SUSE bug 1249330</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021392" comment="perl-JSON-XS-4.04-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4093" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4093" ref_url="https://www.suse.com/security/cve/CVE-2025-4093" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001109.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001112.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4460" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4797" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039147.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15042-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H6ZBNI7X4V2LGK72WNKGQDBMYZSO5HW3/" source="SUSE-SU"/>
    <description>
    Memory safety bug present in Firefox ESR 128.9, and Thunderbird 128.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox ESR 128.10 and Thunderbird 128.10.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-09"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4093/">CVE-2025-4093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4093">CVE-2025-4093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241621">SUSE bug 1241621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009983974" comment="firefox-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009983975" comment="firefox-x11-128.10.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009977556" comment="thunderbird-128.10.0-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4123</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4123" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4123" ref_url="https://www.suse.com/security/cve/CVE-2025-4123" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7893" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001551.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7894" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15179-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NUT27N46T3RCYUKKZDD2PQ3C7X7OURLR/" source="SUSE-SU"/>
    <description>
    A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.

The default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-08-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-4123/">CVE-2025-4123 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4123">CVE-2025-4123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243714">SUSE bug 1243714</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985468" comment="grafana-10.2.6-13.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985469" comment="grafana-selinux-10.2.6-13.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202541244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-41244</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-41244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-41244" ref_url="https://www.suse.com/security/cve/CVE-2025-41244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17509" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03535-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20866-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023876.html" source="SUSE-SU"/>
    <description>
    VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability.  A malicious local actor with non-administrative privileges having access to a VM with VMware Tools  installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-11"/>
	<updated date="2026-03-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-41244/">CVE-2025-41244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41244">CVE-2025-41244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250373">SUSE bug 1250373</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010020560" comment="open-vm-tools-12.5.0-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020561" comment="open-vm-tools-desktop-12.5.0-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020562" comment="open-vm-tools-salt-minion-12.5.0-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020563" comment="open-vm-tools-sdmp-12.5.0-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020564" comment="open-vm-tools-test-12.5.0-1.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4138</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4138" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4138" ref_url="https://www.suse.com/security/cve/CVE-2025-4138" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001745.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10031" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001732.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001750.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001756.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001757.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001758.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02049-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023842.html" source="SUSE-SU"/>
    <description>
    Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.


You are affected by this vulnerability if using the tarfile  module to extract untrusted tar archives using TarFile.extractall()  or TarFile.extract()  using the filter=  parameter with a value of "data"  or "tar". See the tarfile  extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter   for more information.

Note that for Python 3.14 or later the default value of filter=  changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected.

Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-4138/">CVE-2025-4138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4138">CVE-2025-4138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244059">SUSE bug 1244059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998057" comment="python-unversioned-command-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998058" comment="python3-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998059" comment="python3-debug-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998060" comment="python3-devel-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998061" comment="python3-idle-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998062" comment="python3-libs-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998063" comment="python3-test-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998064" comment="python3-tkinter-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998168" comment="python3.11-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998169" comment="python3.11-debug-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998170" comment="python3.11-devel-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998171" comment="python3.11-idle-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998172" comment="python3.11-libs-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998173" comment="python3.11-test-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998174" comment="python3.11-tkinter-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998065" comment="python3.12-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998066" comment="python3.12-debug-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998067" comment="python3.12-devel-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998068" comment="python3.12-idle-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998069" comment="python3.12-libs-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998070" comment="python3.12-test-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998071" comment="python3.12-tkinter-3.12.9-1.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4207</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4207" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4207" ref_url="https://www.suse.com/security/cve/CVE-2025-4207" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003067.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15021" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002076.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15022" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01644-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01654-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01661-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01661-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01748-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01750-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01766-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01782-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01783-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01783-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01786-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041163.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15137-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X6Q4DROQ34RZGUHPAJEWNMRFWMBGGGOA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15138-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LACOZNYYUH6UJOCQHMPO6OQCWDECPBQL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15139-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7DQMSSFWSAMWV45L3LNTAM7KJEX55FUX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15140-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H4T7WEWKN27WKUDAHMZDKVIKPIOSL4TO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15151-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/B2LVMGMEIVHGEPLYZ4Q7HB6GKSATTHWV/" source="SUSE-SU"/>
    <description>
    Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination.  This affects the database server and also libpq.  Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-4207/">CVE-2025-4207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4207">CVE-2025-4207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242931">SUSE bug 1242931</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016337" comment="postgresql-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016338" comment="postgresql-contrib-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016339" comment="postgresql-docs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016340" comment="postgresql-plperl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016341" comment="postgresql-plpython3-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016342" comment="postgresql-pltcl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016343" comment="postgresql-private-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016344" comment="postgresql-private-libs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016345" comment="postgresql-server-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016346" comment="postgresql-server-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016347" comment="postgresql-static-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016348" comment="postgresql-test-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016349" comment="postgresql-test-rpm-macros-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016350" comment="postgresql-upgrade-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016351" comment="postgresql-upgrade-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43211</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43211" ref_url="https://www.suse.com/security/cve/CVE-2025-43211" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing web content may lead to a denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43211/">CVE-2025-43211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43211">CVE-2025-43211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247562">SUSE bug 1247562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43212</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43212" ref_url="https://www.suse.com/security/cve/CVE-2025-43212" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43212/">CVE-2025-43212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43212">CVE-2025-43212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247595">SUSE bug 1247595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43216</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43216" ref_url="https://www.suse.com/security/cve/CVE-2025-43216" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43216/">CVE-2025-43216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43216">CVE-2025-43216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247596">SUSE bug 1247596</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43227</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43227" ref_url="https://www.suse.com/security/cve/CVE-2025-43227" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    This issue was addressed through improved state management. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may disclose sensitive user information.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43227/">CVE-2025-43227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43227">CVE-2025-43227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247597">SUSE bug 1247597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43240</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43240" ref_url="https://www.suse.com/security/cve/CVE-2025-43240" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    A logic issue was addressed with improved checks. This issue is fixed in Safari 18.6, macOS Sequoia 15.6. A download's origin may be incorrectly associated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43240/">CVE-2025-43240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43240">CVE-2025-43240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247599">SUSE bug 1247599</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43265</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43265" ref_url="https://www.suse.com/security/cve/CVE-2025-43265" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    An out-of-bounds read was addressed with improved input validation. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may disclose internal states of the app.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43265/">CVE-2025-43265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43265">CVE-2025-43265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247600">SUSE bug 1247600</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43272</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43272" ref_url="https://www.suse.com/security/cve/CVE-2025-43272" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26, visionOS 26, watchOS 26. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43272/">CVE-2025-43272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43272">CVE-2025-43272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250439">SUSE bug 1250439</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054056" comment="webkit2gtk3-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054057" comment="webkit2gtk3-devel-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054058" comment="webkit2gtk3-jsc-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054059" comment="webkit2gtk3-jsc-devel-2.50.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4330</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4330" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4330" ref_url="https://www.suse.com/security/cve/CVE-2025-4330" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001745.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10031" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001732.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001750.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001756.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001757.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001758.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02049-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023842.html" source="SUSE-SU"/>
    <description>
    Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata.


You are affected by this vulnerability if using the tarfile  module to extract untrusted tar archives using TarFile.extractall()  or TarFile.extract()  using the filter=  parameter with a value of "data"  or "tar". See the tarfile  extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter   for more information.

Note that for Python 3.14 or later the default value of filter=  changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected.

Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4330/">CVE-2025-4330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4330">CVE-2025-4330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244060">SUSE bug 1244060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998057" comment="python-unversioned-command-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998058" comment="python3-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998059" comment="python3-debug-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998060" comment="python3-devel-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998061" comment="python3-idle-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998062" comment="python3-libs-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998063" comment="python3-test-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998064" comment="python3-tkinter-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998168" comment="python3.11-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998169" comment="python3.11-debug-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998170" comment="python3.11-devel-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998171" comment="python3.11-idle-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998172" comment="python3.11-libs-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998173" comment="python3.11-test-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998174" comment="python3.11-tkinter-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998065" comment="python3.12-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998066" comment="python3.12-debug-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998067" comment="python3.12-devel-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998068" comment="python3.12-idle-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998069" comment="python3.12-libs-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998070" comment="python3.12-test-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998071" comment="python3.12-tkinter-3.12.9-1.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43342</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43342" ref_url="https://www.suse.com/security/cve/CVE-2025-43342" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A correctness issue was addressed with improved checks. This issue is fixed in Safari 26, iOS 18.7 and iPadOS 18.7, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-43342/">CVE-2025-43342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43342">CVE-2025-43342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250440">SUSE bug 1250440</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054056" comment="webkit2gtk3-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054057" comment="webkit2gtk3-devel-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054058" comment="webkit2gtk3-jsc-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054059" comment="webkit2gtk3-jsc-devel-2.50.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43343</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43343" ref_url="https://www.suse.com/security/cve/CVE-2025-43343" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18070" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43343/">CVE-2025-43343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43343">CVE-2025-43343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251975">SUSE bug 1251975</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054056" comment="webkit2gtk3-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054057" comment="webkit2gtk3-devel-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054058" comment="webkit2gtk3-jsc-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054059" comment="webkit2gtk3-jsc-devel-2.50.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43356</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43356" ref_url="https://www.suse.com/security/cve/CVE-2025-43356" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved handling of caches. This issue is fixed in Safari 26, iOS 18.7 and iPadOS 18.7, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. A website may be able to access sensor information without user consent.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43356/">CVE-2025-43356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43356">CVE-2025-43356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250441">SUSE bug 1250441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054056" comment="webkit2gtk3-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054057" comment="webkit2gtk3-devel-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054058" comment="webkit2gtk3-jsc-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054059" comment="webkit2gtk3-jsc-devel-2.50.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43368</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43368" ref_url="https://www.suse.com/security/cve/CVE-2025-43368" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-43368/">CVE-2025-43368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43368">CVE-2025-43368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250442">SUSE bug 1250442</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054056" comment="webkit2gtk3-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054057" comment="webkit2gtk3-devel-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054058" comment="webkit2gtk3-jsc-2.50.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054059" comment="webkit2gtk3-jsc-devel-2.50.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43392</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43392" ref_url="https://www.suse.com/security/cve/CVE-2025-43392" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved handling of caches. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A website may exfiltrate image data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43392/">CVE-2025-43392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43392">CVE-2025-43392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254165">SUSE bug 1254165</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43419</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43419" ref_url="https://www.suse.com/security/cve/CVE-2025-43419" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43419/">CVE-2025-43419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43419">CVE-2025-43419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254166">SUSE bug 1254166</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010022618" comment="webkit2gtk3-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022619" comment="webkit2gtk3-devel-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022620" comment="webkit2gtk3-jsc-2.50.1-0.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022621" comment="webkit2gtk3-jsc-devel-2.50.1-0.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43421" ref_url="https://www.suse.com/security/cve/CVE-2025-43421" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    Multiple issues were addressed by disabling array allocation sinking. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43421/">CVE-2025-43421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43421">CVE-2025-43421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254167">SUSE bug 1254167</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43425" ref_url="https://www.suse.com/security/cve/CVE-2025-43425" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43425/">CVE-2025-43425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43425">CVE-2025-43425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254168">SUSE bug 1254168</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43427</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43427" ref_url="https://www.suse.com/security/cve/CVE-2025-43427" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed through improved state management. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43427/">CVE-2025-43427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43427">CVE-2025-43427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254169">SUSE bug 1254169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43429" ref_url="https://www.suse.com/security/cve/CVE-2025-43429" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was addressed with improved bounds checking. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43429/">CVE-2025-43429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43429">CVE-2025-43429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254174">SUSE bug 1254174</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43430</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43430" ref_url="https://www.suse.com/security/cve/CVE-2025-43430" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed through improved state management. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43430/">CVE-2025-43430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43430">CVE-2025-43430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254172">SUSE bug 1254172</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43431</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43431" ref_url="https://www.suse.com/security/cve/CVE-2025-43431" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-43431/">CVE-2025-43431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43431">CVE-2025-43431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254170">SUSE bug 1254170</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43432</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43432" ref_url="https://www.suse.com/security/cve/CVE-2025-43432" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43432/">CVE-2025-43432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43432">CVE-2025-43432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254171">SUSE bug 1254171</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43433</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43433" ref_url="https://www.suse.com/security/cve/CVE-2025-43433" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43433/">CVE-2025-43433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43433">CVE-2025-43433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259945">SUSE bug 1259945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43434" ref_url="https://www.suse.com/security/cve/CVE-2025-43434" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43434/">CVE-2025-43434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43434">CVE-2025-43434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254179">SUSE bug 1254179</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43438</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43438" ref_url="https://www.suse.com/security/cve/CVE-2025-43438" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43438/">CVE-2025-43438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43438">CVE-2025-43438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259944">SUSE bug 1259944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43440</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43440" ref_url="https://www.suse.com/security/cve/CVE-2025-43440" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved checks. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43440/">CVE-2025-43440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43440">CVE-2025-43440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254177">SUSE bug 1254177</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43441</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43441" ref_url="https://www.suse.com/security/cve/CVE-2025-43441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43441/">CVE-2025-43441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43441">CVE-2025-43441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259943">SUSE bug 1259943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43443</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43443" ref_url="https://www.suse.com/security/cve/CVE-2025-43443" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved checks. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43443/">CVE-2025-43443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43443">CVE-2025-43443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254176">SUSE bug 1254176</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43458</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43458" ref_url="https://www.suse.com/security/cve/CVE-2025-43458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed through improved state management. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43458/">CVE-2025-43458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43458">CVE-2025-43458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254498">SUSE bug 1254498</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43480</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43480" ref_url="https://www.suse.com/security/cve/CVE-2025-43480" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious website may exfiltrate data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43480/">CVE-2025-43480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43480">CVE-2025-43480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254175">SUSE bug 1254175</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009953935" comment="webkit2gtk3-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953936" comment="webkit2gtk3-devel-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953937" comment="webkit2gtk3-jsc-2.46.3-1.el9_5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009953938" comment="webkit2gtk3-jsc-devel-2.46.3-1.el9_5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43501</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43501" ref_url="https://www.suse.com/security/cve/CVE-2025-43501" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43501/">CVE-2025-43501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43501">CVE-2025-43501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255194">SUSE bug 1255194</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054525" comment="webkit2gtk3-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054526" comment="webkit2gtk3-devel-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054527" comment="webkit2gtk3-jsc-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054528" comment="webkit2gtk3-jsc-devel-2.50.4-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43529</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43529" ref_url="https://www.suse.com/security/cve/CVE-2025-43529" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43529/">CVE-2025-43529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529">CVE-2025-43529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255198">SUSE bug 1255198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054525" comment="webkit2gtk3-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054526" comment="webkit2gtk3-devel-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054527" comment="webkit2gtk3-jsc-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054528" comment="webkit2gtk3-jsc-devel-2.50.4-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43531" ref_url="https://www.suse.com/security/cve/CVE-2025-43531" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A race condition was addressed with improved state handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43531/">CVE-2025-43531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43531">CVE-2025-43531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255183">SUSE bug 1255183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054525" comment="webkit2gtk3-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054526" comment="webkit2gtk3-devel-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054527" comment="webkit2gtk3-jsc-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054528" comment="webkit2gtk3-jsc-devel-2.50.4-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43535</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43535" ref_url="https://www.suse.com/security/cve/CVE-2025-43535" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43535/">CVE-2025-43535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43535">CVE-2025-43535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255195">SUSE bug 1255195</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054525" comment="webkit2gtk3-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054526" comment="webkit2gtk3-devel-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054527" comment="webkit2gtk3-jsc-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054528" comment="webkit2gtk3-jsc-devel-2.50.4-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43536</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43536" ref_url="https://www.suse.com/security/cve/CVE-2025-43536" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43536/">CVE-2025-43536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43536">CVE-2025-43536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255200">SUSE bug 1255200</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054525" comment="webkit2gtk3-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054526" comment="webkit2gtk3-devel-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054527" comment="webkit2gtk3-jsc-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054528" comment="webkit2gtk3-jsc-devel-2.50.4-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43541</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43541" ref_url="https://www.suse.com/security/cve/CVE-2025-43541" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43541/">CVE-2025-43541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43541">CVE-2025-43541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255191">SUSE bug 1255191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054525" comment="webkit2gtk3-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054526" comment="webkit2gtk3-devel-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054527" comment="webkit2gtk3-jsc-2.50.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054528" comment="webkit2gtk3-jsc-devel-2.50.4-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4373</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4373" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4373" ref_url="https://www.suse.com/security/cve/CVE-2025-4373" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11140" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001798.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11327" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01880-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02167-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02233-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20508-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041043.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-17"/>
	<updated date="2025-08-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4373/">CVE-2025-4373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4373">CVE-2025-4373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242844">SUSE bug 1242844</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010007811" comment="glib2-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007812" comment="glib2-devel-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007813" comment="glib2-doc-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007814" comment="glib2-static-2.68.4-16.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007815" comment="glib2-tests-2.68.4-16.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4404</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4404" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4404" ref_url="https://www.suse.com/security/cve/CVE-2025-4404" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001677.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:3025" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001678.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9184" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001682.html" source="SUSE-SU"/>
    <description>
    A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-21"/>
	<updated date="2025-12-19"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-4404/">CVE-2025-4404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4404">CVE-2025-4404 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009987307" comment="ipa-client-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987308" comment="ipa-client-common-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987309" comment="ipa-client-encrypted-dns-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987310" comment="ipa-client-epn-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987311" comment="ipa-client-samba-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987312" comment="ipa-common-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987313" comment="ipa-selinux-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987314" comment="ipa-selinux-luna-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987315" comment="ipa-selinux-nfast-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987316" comment="ipa-server-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987317" comment="ipa-server-common-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987318" comment="ipa-server-dns-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987319" comment="ipa-server-encrypted-dns-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987320" comment="ipa-server-trust-ad-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987321" comment="python3-ipaclient-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987322" comment="python3-ipalib-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987323" comment="python3-ipaserver-4.12.2-14.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987324" comment="python3-ipatests-4.12.2-14.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4435</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4435" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4435" ref_url="https://www.suse.com/security/cve/CVE-2025-4435" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001745.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10031" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001732.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001750.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001756.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001757.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001758.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023842.html" source="SUSE-SU"/>
    <description>
    When using a TarFile.errorlevel = 0  and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0  in affected versions is that the member would still be extracted and not skipped.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-4435/">CVE-2025-4435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4435">CVE-2025-4435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244061">SUSE bug 1244061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998057" comment="python-unversioned-command-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998058" comment="python3-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998059" comment="python3-debug-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998060" comment="python3-devel-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998061" comment="python3-idle-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998062" comment="python3-libs-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998063" comment="python3-test-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998064" comment="python3-tkinter-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998168" comment="python3.11-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998169" comment="python3.11-debug-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998170" comment="python3.11-devel-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998171" comment="python3.11-idle-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998172" comment="python3.11-libs-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998173" comment="python3.11-test-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998174" comment="python3.11-tkinter-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998065" comment="python3.12-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998066" comment="python3.12-debug-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998067" comment="python3.12-devel-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998068" comment="python3.12-idle-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998069" comment="python3.12-libs-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998070" comment="python3.12-test-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998071" comment="python3.12-tkinter-3.12.9-1.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4517</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4517" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4517" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4517" ref_url="https://www.suse.com/security/cve/CVE-2025-4517" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001745.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10031" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001732.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001750.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001756.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001757.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001758.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02047-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02048-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02049-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023842.html" source="SUSE-SU"/>
    <description>
    Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data".


You are affected by this vulnerability if using the tarfile  module to extract untrusted tar archives using TarFile.extractall()  or TarFile.extract()  using the filter=  parameter with a value of "data"  or "tar". See the tarfile  extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter   for more information.

Note that for Python 3.14 or later the default value of filter=  changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected.

Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-01-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4517/">CVE-2025-4517 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4517">CVE-2025-4517 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244032">SUSE bug 1244032</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998057" comment="python-unversioned-command-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998058" comment="python3-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998059" comment="python3-debug-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998060" comment="python3-devel-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998061" comment="python3-idle-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998062" comment="python3-libs-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998063" comment="python3-test-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998064" comment="python3-tkinter-3.9.21-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998168" comment="python3.11-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998169" comment="python3.11-debug-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998170" comment="python3.11-devel-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998171" comment="python3.11-idle-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998172" comment="python3.11-libs-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998173" comment="python3.11-test-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998174" comment="python3.11-tkinter-3.11.11-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998065" comment="python3.12-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998066" comment="python3.12-debug-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998067" comment="python3.12-devel-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998068" comment="python3.12-idle-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998069" comment="python3.12-libs-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998070" comment="python3.12-test-3.12.9-1.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998071" comment="python3.12-tkinter-3.12.9-1.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202545582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-45582</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-45582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-45582" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-45582" ref_url="https://www.suse.com/security/cve/CVE-2025-45582" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1177-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20959-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21002-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045404.html" source="SUSE-SU"/>
    <description>
    GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -&gt; ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-45582/">CVE-2025-45582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-45582">CVE-2025-45582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246399">SUSE bug 1246399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054547" comment="tar-1.34-9.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4598</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4598" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4598" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4598" ref_url="https://www.suse.com/security/cve/CVE-2025-4598" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22660" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02243-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20405-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20416-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20554-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024288.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.

A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-4598/">CVE-2025-4598 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4598">CVE-2025-4598 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243935">SUSE bug 1243935</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054315" comment="rhel-net-naming-sysattrs-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054316" comment="systemd-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054317" comment="systemd-boot-unsigned-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054318" comment="systemd-container-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054319" comment="systemd-devel-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054320" comment="systemd-journal-remote-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054321" comment="systemd-libs-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054322" comment="systemd-oomd-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054323" comment="systemd-pam-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054324" comment="systemd-resolved-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054325" comment="systemd-rpm-macros-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054326" comment="systemd-udev-252-55.el9_7.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054327" comment="systemd-ukify-252-55.el9_7.7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46397</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46397" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46397" ref_url="https://www.suse.com/security/cve/CVE-2025-46397" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003167.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002424.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01835-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01890-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040219.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15155-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZDNSWLCQENGSN2O2GVDL64VL52AR7HAU/" source="SUSE-SU"/>
    <description>
    A flaw was found in xfig. This vulnerability allows possible code execution via local input manipulation via bezier_spline function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46397/">CVE-2025-46397 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46397">CVE-2025-46397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243260">SUSE bug 1243260</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054701" comment="transfig-3.2.7b-11.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46420" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46420" ref_url="https://www.suse.com/security/cve/CVE-2025-46420" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53THXHSDPP4TLMFRSP5DPLY4DK72M7XY/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. It is vulnerable to memory leaks in the soup_header_parse_quality_list() function when parsing a quality list that contains elements with all zeroes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46420/">CVE-2025-46420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46420">CVE-2025-46420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241686">SUSE bug 1241686</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46421" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46421" ref_url="https://www.suse.com/security/cve/CVE-2025-46421" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:4560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7436" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1518-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1519-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040559.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15044-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/53THXHSDPP4TLMFRSP5DPLY4DK72M7XY/" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. When libsoup clients encounter an HTTP redirect, they mistakenly send the HTTP Authorization header to the new host that the redirection points to. This allows the new host to impersonate the user to the original host that issued the redirect.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-07-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-46421/">CVE-2025-46421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46421">CVE-2025-46421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241688">SUSE bug 1241688</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984018" comment="libsoup-2.72.0-10.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984019" comment="libsoup-devel-2.72.0-10.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46727</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46727" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46727" ref_url="https://www.suse.com/security/cve/CVE-2025-46727" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3009" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01586-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02330-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02429-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02564-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040971.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15067-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6EIKHCUUAR4JGUYZYG5GEXXPCGJJ2MFD/" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. Prior to versions 2.2.14, 3.0.16, and 3.1.14, `Rack::QueryParser` parses query strings and `application/x-www-form-urlencoded` bodies into Ruby data structures without imposing any limit on the number of parameters, allowing attackers to send requests with extremely large numbers of parameters. The vulnerability arises because `Rack::QueryParser` iterates over each `&amp;`-separated key-value pair and adds it to a Hash without enforcing an upper bound on the total number of parameters. This allows an attacker to send a single request containing hundreds of thousands (or more) of parameters, which consumes excessive memory and CPU during parsing. An attacker can trigger denial of service by sending specifically crafted HTTP requests, which can cause memory exhaustion or pin CPU resources, stalling or crashing the Rack server. This results in full service disruption until the affected worker is restarted. Versions 2.2.14, 3.0.16, and 3.1.14 fix the issue. Some other mitigations are available. One may use middleware to enforce a maximum query string size or parameter count, or employ a reverse proxy (such as Nginx) to limit request sizes and reject oversized query strings or bodies. Limiting request body sizes and query string lengths at the web server or CDN level is an effective mitigation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-08-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46727/">CVE-2025-46727 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46727">CVE-2025-46727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242891">SUSE bug 1242891</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985809" comment="pcs-0.11.9-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985810" comment="pcs-snmp-0.11.9-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4673</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4673" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4673" ref_url="https://www.suse.com/security/cve/CVE-2025-4673" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10672" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001774.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
    <description>
    Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin redirects potentially leaking sensitive information.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-10"/>
	<updated date="2025-09-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4673/">CVE-2025-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4673">CVE-2025-4673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244156">SUSE bug 1244156</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999424" comment="go-toolset-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999425" comment="golang-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999426" comment="golang-bin-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999427" comment="golang-docs-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999428" comment="golang-misc-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999429" comment="golang-race-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999430" comment="golang-src-1.24.4-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999431" comment="golang-tests-1.24.4-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4674</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4674" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4674" ref_url="https://www.suse.com/security/cve/CVE-2025-4674" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13935" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001929.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13940" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02295-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02296-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02924-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
    <description>
    The go command may execute unexpected commands when operating in untrusted VCS repositories. This occurs when possibly dangerous VCS configuration is present in repositories. This can happen when a repository was fetched via one VCS (e.g. Git), but contains metadata for another VCS (e.g. Mercurial). Modules which are retrieved using the go command line, i.e. via "go get", are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-01-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4674/">CVE-2025-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4674">CVE-2025-4674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246118">SUSE bug 1246118</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015534" comment="go-toolset-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015535" comment="golang-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015536" comment="golang-bin-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015537" comment="golang-docs-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015538" comment="golang-misc-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015539" comment="golang-race-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015540" comment="golang-src-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015541" comment="golang-tests-1.24.6-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46817</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003068.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20955" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054124" comment="redis-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054125" comment="redis-devel-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054126" comment="redis-doc-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054232" comment="valkey-8.0.6-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054233" comment="valkey-devel-8.0.6-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46818</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46818" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003068.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20955" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054124" comment="redis-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054125" comment="redis-devel-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054126" comment="redis-doc-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054232" comment="valkey-8.0.6-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054233" comment="valkey-devel-8.0.6-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46819</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003068.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20955" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054124" comment="redis-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054125" comment="redis-devel-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054126" comment="redis-doc-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054232" comment="valkey-8.0.6-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054233" comment="valkey-devel-8.0.6-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46835</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46835" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46835" ref_url="https://www.suse.com/security/cve/CVE-2025-46835" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001821.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11534" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042323.html" source="SUSE-SU"/>
    <description>
    Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-10-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46835/">CVE-2025-46835 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46835">CVE-2025-46835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245942">SUSE bug 1245942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009051" comment="git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009052" comment="git-all-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009053" comment="git-core-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009054" comment="git-core-doc-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009055" comment="git-credential-libsecret-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009056" comment="git-daemon-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009057" comment="git-email-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009058" comment="git-gui-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009059" comment="git-instaweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009060" comment="git-subtree-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009061" comment="git-svn-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009062" comment="gitk-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009063" comment="gitweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009064" comment="perl-Git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009065" comment="perl-Git-SVN-2.47.3-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47151" ref_url="https://www.suse.com/security/cve/CVE-2025-47151" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002255.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003122.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21628" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023279.html" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability exists in the lasso_node_impl_init_from_xml functionality of Entr&amp;#39;ouvert Lasso 2.5.1 and 2.8.2. A specially crafted SAML response can lead to an arbitrary code execution. An attacker can send a malformed SAML response to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-25"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47151/">CVE-2025-47151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47151">CVE-2025-47151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253095">SUSE bug 1253095</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054179" comment="lasso-2.7.0-11.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054180" comment="lasso-devel-2.7.0-11.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054181" comment="python3-lasso-2.7.0-11.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47268</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47268" ref_url="https://www.suse.com/security/cve/CVE-2025-47268" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01776-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01776-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01779-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20380-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040563.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15089-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EPWP7MAB6QVGPERQWK64CQ7SW6A5J2TL/" source="SUSE-SU"/>
    <description>
    ping in iputils before 20250602 allows a denial of service (application error or incorrect data collection) via a crafted ICMP Echo Reply packet, because of a signed 64-bit integer overflow in timestamp multiplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-11-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47268/">CVE-2025-47268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47268">CVE-2025-47268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242300">SUSE bug 1242300</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996934" comment="iputils-20210202-11.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996935" comment="iputils-ninfod-20210202-11.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47273</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47273" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47273" ref_url="https://www.suse.com/security/cve/CVE-2025-47273" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10407" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001770.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11036" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001806.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001794.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11044" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001795.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001828.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001919.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11984" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001886.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12834" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001872.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13578" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001908.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01693-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01704-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01715-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040651.html" source="SUSE-SU"/>
    <description>
    setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-47273/">CVE-2025-47273 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47273">CVE-2025-47273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243313">SUSE bug 1243313</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009469" comment="fence-agents-aliyun-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009470" comment="fence-agents-all-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009471" comment="fence-agents-amt-ws-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009472" comment="fence-agents-apc-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009473" comment="fence-agents-apc-snmp-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009474" comment="fence-agents-aws-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009475" comment="fence-agents-azure-arm-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009476" comment="fence-agents-bladecenter-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009477" comment="fence-agents-brocade-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009478" comment="fence-agents-cisco-mds-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009479" comment="fence-agents-cisco-ucs-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009480" comment="fence-agents-common-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009481" comment="fence-agents-compute-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009482" comment="fence-agents-drac5-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009483" comment="fence-agents-eaton-snmp-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009484" comment="fence-agents-emerson-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009485" comment="fence-agents-eps-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009486" comment="fence-agents-gce-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009487" comment="fence-agents-heuristics-ping-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009488" comment="fence-agents-hpblade-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009489" comment="fence-agents-ibm-powervs-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009490" comment="fence-agents-ibm-vpc-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009491" comment="fence-agents-ibmblade-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009492" comment="fence-agents-ifmib-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009493" comment="fence-agents-ilo-moonshot-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009494" comment="fence-agents-ilo-mp-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009495" comment="fence-agents-ilo-ssh-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009496" comment="fence-agents-ilo2-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009497" comment="fence-agents-intelmodular-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009498" comment="fence-agents-ipdu-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009499" comment="fence-agents-ipmilan-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009500" comment="fence-agents-kdump-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009501" comment="fence-agents-kubevirt-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009502" comment="fence-agents-lpar-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009503" comment="fence-agents-mpath-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009504" comment="fence-agents-openstack-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009505" comment="fence-agents-redfish-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009506" comment="fence-agents-rhevm-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009507" comment="fence-agents-rsa-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009508" comment="fence-agents-rsb-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009509" comment="fence-agents-sbd-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009510" comment="fence-agents-scsi-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009511" comment="fence-agents-virsh-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009512" comment="fence-agents-vmware-rest-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009513" comment="fence-agents-vmware-soap-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009514" comment="fence-agents-wti-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009515" comment="fence-virt-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009516" comment="fence-virtd-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009517" comment="fence-virtd-cpg-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009518" comment="fence-virtd-libvirt-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009519" comment="fence-virtd-multicast-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009520" comment="fence-virtd-serial-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009521" comment="fence-virtd-tcp-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009522" comment="ha-cloud-support-4.10.0-86.el9_6.7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999226" comment="python3-setuptools-53.0.0-13.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999227" comment="python3-setuptools-wheel-53.0.0-13.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013286" comment="python3.11-setuptools-65.5.1-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013287" comment="python3.11-setuptools-wheel-65.5.1-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012684" comment="python3.12-setuptools-68.2.2-5.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012685" comment="python3.12-setuptools-wheel-68.2.2-5.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47287" ref_url="https://www.suse.com/security/cve/CVE-2025-47287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8136" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202507:15303-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202507:15308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202507:15309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202507:15310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01649-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01726-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02478-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02491-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02576-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02577-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20430-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20487-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040916.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15153-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UONXT4J4OCDF5HUKE3ESBSBHQZIGVTZ2/" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. When Tornado's ``multipart/form-data`` parser encounters certain errors, it logs a warning but continues trying to parse the remainder of the data. This allows remote attackers to generate an extremely high volume of logs, constituting a DoS attack. This DoS is compounded by the fact that the logging subsystem is synchronous. All versions of Tornado prior to 6.5.0 are affected. The vulnerable parser is enabled by default. Upgrade to Tornado version 6.50 to receive a patch. As a workaround, risk can be mitigated by blocking `Content-Type: multipart/form-data` in a proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2025-08-01"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47287/">CVE-2025-47287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47287">CVE-2025-47287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243268">SUSE bug 1243268</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985476" comment="python3-tornado-6.4.2-2.el9_6.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47905" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47905" ref_url="https://www.suse.com/security/cve/CVE-2025-47905" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8336" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001590.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001600.html" source="SUSE-SU"/>
    <description>
    Varnish Cache before 7.6.3 and 7.7 before 7.7.1, and Varnish Enterprise before 6.0.13r14, allow client-side desync via HTTP/1 requests, because the product incorrectly permits CRLF to be skipped to delimit chunk boundaries.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-04"/>
	<updated date="2025-06-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-47905/">CVE-2025-47905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47905">CVE-2025-47905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243247">SUSE bug 1243247</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985818" comment="varnish-6.6.2-6.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985819" comment="varnish-devel-6.6.2-6.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985820" comment="varnish-docs-6.6.2-6.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47906</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47906" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47906" ref_url="https://www.suse.com/security/cve/CVE-2025-47906" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22004" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002261.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22005" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003128.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22668" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02760-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02924-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
    <description>
    If the PATH environment variable contains paths which are executables (rather than just directories), passing certain strings to LookPath ("", ".", and ".."), can result in the binaries listed in the PATH being unexpectedly returned.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47906/">CVE-2025-47906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47906">CVE-2025-47906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247719">SUSE bug 1247719</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054270" comment="go-filesystem-3.6.0-12.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054271" comment="go-rpm-macros-3.6.0-12.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054272" comment="go-rpm-templates-3.6.0-12.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054273" comment="go-srpm-macros-3.6.0-12.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015534" comment="go-toolset-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015535" comment="golang-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015536" comment="golang-bin-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015537" comment="golang-docs-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015538" comment="golang-misc-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015539" comment="golang-race-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015540" comment="golang-src-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015541" comment="golang-tests-1.24.6-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47907</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47907" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47907" ref_url="https://www.suse.com/security/cve/CVE-2025-47907" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02759-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02760-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02912-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02924-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03115-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03161-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
    <description>
    Cancelling a query (e.g. by cancelling the context passed to one of the query methods) during a call to the Scan method of the returned Rows can result in unexpected results if other queries are being made in parallel. This can result in a race condition that may overwrite the expected results with those of another query, causing the call to Scan to return either unexpected results from the other query or an error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47907/">CVE-2025-47907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47907">CVE-2025-47907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247720">SUSE bug 1247720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015534" comment="go-toolset-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015535" comment="golang-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015536" comment="golang-bin-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015537" comment="golang-docs-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015538" comment="golang-misc-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015539" comment="golang-race-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015540" comment="golang-src-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015541" comment="golang-tests-1.24.6-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054051" comment="podman-5.6.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054052" comment="podman-docker-5.6.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054053" comment="podman-plugins-5.6.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054054" comment="podman-remote-5.6.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054055" comment="podman-tests-5.6.0-6.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47913</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47913" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0437" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003176.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0753" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002398.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1084" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045355.html" source="SUSE-SU"/>
    <description>
    SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253506">SUSE bug 1253506</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054598" comment="buildah-1.41.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054599" comment="buildah-tests-1.41.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054636" comment="podman-5.6.0-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054637" comment="podman-docker-5.6.0-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054638" comment="podman-plugins-5.6.0-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054639" comment="podman-remote-5.6.0-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054640" comment="podman-tests-5.6.0-11.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47947</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47947" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47947" ref_url="https://www.suse.com/security/cve/CVE-2025-47947" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8837" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001652.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8844" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02028-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02029-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040417.html" source="SUSE-SU"/>
    <description>
    ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions up to and including 2.9.8 are vulnerable to denial of service in one special case (in stable released versions): when the payload's content type is `application/json`, and there is at least one rule which does a `sanitiseMatchedBytes` action. A patch is available at pull request 3389 and expected to be part of version 2.9.9. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-13"/>
	<updated date="2025-08-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47947/">CVE-2025-47947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47947">CVE-2025-47947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243976">SUSE bug 1243976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243978">SUSE bug 1243978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986681" comment="mod_security-2.9.6-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986682" comment="mod_security-mlogc-2.9.6-2.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4802</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4802" ref_url="https://www.suse.com/security/cve/CVE-2025-4802" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10219" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001799.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8655" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001639.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8686" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01702-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20361-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039498.html" source="SUSE-SU"/>
    <description>
    Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-12"/>
	<updated date="2025-07-23"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-4802/">CVE-2025-4802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4802">CVE-2025-4802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243317">SUSE bug 1243317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243318">SUSE bug 1243318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009986311" comment="glibc-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986312" comment="glibc-all-langpacks-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986313" comment="glibc-benchtests-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986314" comment="glibc-common-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986315" comment="glibc-devel-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986316" comment="glibc-doc-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986317" comment="glibc-gconv-extra-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986318" comment="glibc-headers-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986319" comment="glibc-langpack-aa-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986320" comment="glibc-langpack-af-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986321" comment="glibc-langpack-agr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986322" comment="glibc-langpack-ak-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986323" comment="glibc-langpack-am-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986324" comment="glibc-langpack-an-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986325" comment="glibc-langpack-anp-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986326" comment="glibc-langpack-ar-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986327" comment="glibc-langpack-as-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986328" comment="glibc-langpack-ast-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986329" comment="glibc-langpack-ayc-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986330" comment="glibc-langpack-az-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986331" comment="glibc-langpack-be-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986332" comment="glibc-langpack-bem-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986333" comment="glibc-langpack-ber-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986334" comment="glibc-langpack-bg-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986335" comment="glibc-langpack-bhb-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986336" comment="glibc-langpack-bho-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986337" comment="glibc-langpack-bi-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986338" comment="glibc-langpack-bn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986339" comment="glibc-langpack-bo-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986340" comment="glibc-langpack-br-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986341" comment="glibc-langpack-brx-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986342" comment="glibc-langpack-bs-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986343" comment="glibc-langpack-byn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986344" comment="glibc-langpack-ca-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986345" comment="glibc-langpack-ce-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986346" comment="glibc-langpack-chr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986347" comment="glibc-langpack-ckb-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986348" comment="glibc-langpack-cmn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986349" comment="glibc-langpack-crh-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986350" comment="glibc-langpack-cs-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986351" comment="glibc-langpack-csb-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986352" comment="glibc-langpack-cv-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986353" comment="glibc-langpack-cy-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986354" comment="glibc-langpack-da-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986355" comment="glibc-langpack-de-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986356" comment="glibc-langpack-doi-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986357" comment="glibc-langpack-dsb-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986358" comment="glibc-langpack-dv-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986359" comment="glibc-langpack-dz-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986360" comment="glibc-langpack-el-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986361" comment="glibc-langpack-en-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986362" comment="glibc-langpack-eo-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986363" comment="glibc-langpack-es-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986364" comment="glibc-langpack-et-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986365" comment="glibc-langpack-eu-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986366" comment="glibc-langpack-fa-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986367" comment="glibc-langpack-ff-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986368" comment="glibc-langpack-fi-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986369" comment="glibc-langpack-fil-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986370" comment="glibc-langpack-fo-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986371" comment="glibc-langpack-fr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986372" comment="glibc-langpack-fur-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986373" comment="glibc-langpack-fy-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986374" comment="glibc-langpack-ga-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986375" comment="glibc-langpack-gd-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986376" comment="glibc-langpack-gez-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986377" comment="glibc-langpack-gl-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986378" comment="glibc-langpack-gu-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986379" comment="glibc-langpack-gv-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986380" comment="glibc-langpack-ha-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986381" comment="glibc-langpack-hak-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986382" comment="glibc-langpack-he-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986383" comment="glibc-langpack-hi-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986384" comment="glibc-langpack-hif-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986385" comment="glibc-langpack-hne-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986386" comment="glibc-langpack-hr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986387" comment="glibc-langpack-hsb-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986388" comment="glibc-langpack-ht-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986389" comment="glibc-langpack-hu-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986390" comment="glibc-langpack-hy-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986391" comment="glibc-langpack-ia-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986392" comment="glibc-langpack-id-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986393" comment="glibc-langpack-ig-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986394" comment="glibc-langpack-ik-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986395" comment="glibc-langpack-is-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986396" comment="glibc-langpack-it-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986397" comment="glibc-langpack-iu-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986398" comment="glibc-langpack-ja-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986399" comment="glibc-langpack-ka-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986400" comment="glibc-langpack-kab-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986401" comment="glibc-langpack-kk-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986402" comment="glibc-langpack-kl-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986403" comment="glibc-langpack-km-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986404" comment="glibc-langpack-kn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986405" comment="glibc-langpack-ko-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986406" comment="glibc-langpack-kok-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986407" comment="glibc-langpack-ks-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986408" comment="glibc-langpack-ku-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986409" comment="glibc-langpack-kw-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986410" comment="glibc-langpack-ky-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986411" comment="glibc-langpack-lb-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986412" comment="glibc-langpack-lg-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986413" comment="glibc-langpack-li-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986414" comment="glibc-langpack-lij-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986415" comment="glibc-langpack-ln-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986416" comment="glibc-langpack-lo-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986417" comment="glibc-langpack-lt-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986418" comment="glibc-langpack-lv-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986419" comment="glibc-langpack-lzh-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986420" comment="glibc-langpack-mag-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986421" comment="glibc-langpack-mai-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986422" comment="glibc-langpack-mfe-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986423" comment="glibc-langpack-mg-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986424" comment="glibc-langpack-mhr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986425" comment="glibc-langpack-mi-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986426" comment="glibc-langpack-miq-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986427" comment="glibc-langpack-mjw-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986428" comment="glibc-langpack-mk-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986429" comment="glibc-langpack-ml-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986430" comment="glibc-langpack-mn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986431" comment="glibc-langpack-mni-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986432" comment="glibc-langpack-mnw-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986433" comment="glibc-langpack-mr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986434" comment="glibc-langpack-ms-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986435" comment="glibc-langpack-mt-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986436" comment="glibc-langpack-my-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986437" comment="glibc-langpack-nan-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986438" comment="glibc-langpack-nb-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986439" comment="glibc-langpack-nds-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986440" comment="glibc-langpack-ne-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986441" comment="glibc-langpack-nhn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986442" comment="glibc-langpack-niu-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986443" comment="glibc-langpack-nl-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986444" comment="glibc-langpack-nn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986445" comment="glibc-langpack-nr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986446" comment="glibc-langpack-nso-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986447" comment="glibc-langpack-oc-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986448" comment="glibc-langpack-om-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986449" comment="glibc-langpack-or-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986450" comment="glibc-langpack-os-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986451" comment="glibc-langpack-pa-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986452" comment="glibc-langpack-pap-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986453" comment="glibc-langpack-pl-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986454" comment="glibc-langpack-ps-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986455" comment="glibc-langpack-pt-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986456" comment="glibc-langpack-quz-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986457" comment="glibc-langpack-raj-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986458" comment="glibc-langpack-ro-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986459" comment="glibc-langpack-ru-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986460" comment="glibc-langpack-rw-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986461" comment="glibc-langpack-sa-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986462" comment="glibc-langpack-sah-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986463" comment="glibc-langpack-sat-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986464" comment="glibc-langpack-sc-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986465" comment="glibc-langpack-sd-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986466" comment="glibc-langpack-se-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986467" comment="glibc-langpack-sgs-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986468" comment="glibc-langpack-shn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986469" comment="glibc-langpack-shs-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986470" comment="glibc-langpack-si-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986471" comment="glibc-langpack-sid-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986472" comment="glibc-langpack-sk-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986473" comment="glibc-langpack-sl-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986474" comment="glibc-langpack-sm-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986475" comment="glibc-langpack-so-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986476" comment="glibc-langpack-sq-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986477" comment="glibc-langpack-sr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986478" comment="glibc-langpack-ss-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986479" comment="glibc-langpack-st-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986480" comment="glibc-langpack-sv-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986481" comment="glibc-langpack-sw-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986482" comment="glibc-langpack-szl-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986483" comment="glibc-langpack-ta-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986484" comment="glibc-langpack-tcy-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986485" comment="glibc-langpack-te-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986486" comment="glibc-langpack-tg-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986487" comment="glibc-langpack-th-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986488" comment="glibc-langpack-the-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986489" comment="glibc-langpack-ti-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986490" comment="glibc-langpack-tig-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986491" comment="glibc-langpack-tk-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986492" comment="glibc-langpack-tl-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986493" comment="glibc-langpack-tn-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986494" comment="glibc-langpack-to-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986495" comment="glibc-langpack-tpi-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986496" comment="glibc-langpack-tr-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986497" comment="glibc-langpack-ts-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986498" comment="glibc-langpack-tt-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986499" comment="glibc-langpack-ug-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986500" comment="glibc-langpack-uk-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986501" comment="glibc-langpack-unm-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986502" comment="glibc-langpack-ur-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986503" comment="glibc-langpack-uz-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986504" comment="glibc-langpack-ve-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986505" comment="glibc-langpack-vi-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986506" comment="glibc-langpack-wa-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986507" comment="glibc-langpack-wae-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986508" comment="glibc-langpack-wal-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986509" comment="glibc-langpack-wo-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986510" comment="glibc-langpack-xh-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986511" comment="glibc-langpack-yi-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986512" comment="glibc-langpack-yo-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986513" comment="glibc-langpack-yue-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986514" comment="glibc-langpack-yuw-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986515" comment="glibc-langpack-zh-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986516" comment="glibc-langpack-zu-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986517" comment="glibc-locale-source-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986518" comment="glibc-minimal-langpack-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986519" comment="glibc-nss-devel-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986520" comment="glibc-static-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986521" comment="glibc-utils-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986522" comment="libnsl-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986523" comment="nscd-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986524" comment="nss_db-2.34-168.el9_6.19 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986525" comment="nss_hesiod-2.34-168.el9_6.19 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48060" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48060" ref_url="https://www.suse.com/security/cve/CVE-2025-48060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10585" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001772.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10618" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02915-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20655-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041570.html" source="SUSE-SU"/>
    <description>
    jq is a command-line JSON processor. In versions up to and including 1.7.1, a heap-buffer-overflow is present in function `jv_string_vfmt` in the jq_fuzz_execute harness from oss-fuzz. This crash happens on file jv.c, line 1456 `void* p = malloc(sz);`. As of time of publication, no patched versions are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-09"/>
	<updated date="2025-09-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48060/">CVE-2025-48060 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-48060">CVE-2025-48060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244116">SUSE bug 1244116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999228" comment="jq-1.6-17.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999229" comment="jq-devel-1.6-17.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48367</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48367" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48367" ref_url="https://www.suse.com/security/cve/CVE-2025-48367" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001823.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12006" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001846.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02579-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02593-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02594-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041520.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-09-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48367/">CVE-2025-48367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48367">CVE-2025-48367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246058">SUSE bug 1246058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011411" comment="redis-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011412" comment="redis-devel-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011413" comment="redis-doc-7.2.10-1.module+el9.6.0+23332+115a3b01 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48384</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48384" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48384" ref_url="https://www.suse.com/security/cve/CVE-2025-48384" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001821.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11534" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001832.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11688" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042323.html" source="SUSE-SU"/>
    <description>
    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When reading a config value, Git strips any trailing carriage return and line feed (CRLF). When writing a config entry, values with a trailing CR are not quoted, causing the CR to be lost when the config is later read. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read resulting in the submodule being checked out to an incorrect location. If a symlink exists that points the altered path to the submodule hooks directory, and the submodule contains an executable post-checkout hook, the script may be unintentionally executed after checkout. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-10-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48384/">CVE-2025-48384 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48384">CVE-2025-48384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245943">SUSE bug 1245943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009051" comment="git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009052" comment="git-all-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009053" comment="git-core-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009054" comment="git-core-doc-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009055" comment="git-credential-libsecret-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009056" comment="git-daemon-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009057" comment="git-email-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009058" comment="git-gui-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009059" comment="git-instaweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009060" comment="git-subtree-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009061" comment="git-svn-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009062" comment="gitk-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009063" comment="gitweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009064" comment="perl-Git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009065" comment="perl-Git-SVN-2.47.3-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48385</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48385" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48385" ref_url="https://www.suse.com/security/cve/CVE-2025-48385" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001821.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11534" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03037-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20855-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042323.html" source="SUSE-SU"/>
    <description>
    Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When cloning a repository Git knows to optionally fetch a bundle advertised by the remote server, which allows the server-side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection. This protocol injection can cause the client to write the fetched bundle to a location controlled by the adversary. The fetched content is fully controlled by the server, which can in the worst case lead to arbitrary code execution. The use of bundle URIs is not enabled by default and can be controlled by the bundle.heuristic config option. Some cases of the vulnerability require that the adversary is in control of where a repository will be cloned to. This either requires social engineering or a recursive clone with submodules. These cases can thus be avoided by disabling recursive clones. This vulnerability is fixed in v2.43.7, v2.44.4, v2.45.4, v2.46.4, v2.47.3, v2.48.2, v2.49.1, and v2.50.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-23"/>
	<updated date="2025-10-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48385/">CVE-2025-48385 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48385">CVE-2025-48385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245946">SUSE bug 1245946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010009051" comment="git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009052" comment="git-all-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009053" comment="git-core-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009054" comment="git-core-doc-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009055" comment="git-credential-libsecret-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009056" comment="git-daemon-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009057" comment="git-email-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009058" comment="git-gui-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009059" comment="git-instaweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009060" comment="git-subtree-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009061" comment="git-svn-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009062" comment="gitk-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009063" comment="gitweb-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009064" comment="perl-Git-2.47.3-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010009065" comment="perl-Git-SVN-2.47.3-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48734" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48734" ref_url="https://www.suse.com/security/cve/CVE-2025-48734" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9114" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001673.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9318" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040424.html" source="SUSE-SU"/>
    <description>
    Improper Access Control vulnerability in Apache Commons.



A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default.





Releases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum's class loader via the “declaredClass” property available on all Java “enum” objects. Accessing the enum's “declaredClass” allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty().
Starting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the “declaredClass” property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user's guide and the unit tests.

This issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils

 1.x are recommended to upgrade to version 1.11.0, which fixes the issue.


Users of the artifact org.apache.commons:commons-beanutils2

 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48734/">CVE-2025-48734 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243793">SUSE bug 1243793</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987016" comment="apache-commons-beanutils-1.9.4-10.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48797" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48797" ref_url="https://www.suse.com/security/cve/CVE-2025-48797" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001681.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001679.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040546.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GIMP when processing certain TGA image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing a heap buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-21"/>
	<updated date="2025-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48797/">CVE-2025-48797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48797">CVE-2025-48797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243711">SUSE bug 1243711</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009987305" comment="gimp-2.99.8-4.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987306" comment="gimp-libs-2.99.8-4.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48798</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48798" ref_url="https://www.suse.com/security/cve/CVE-2025-48798" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001681.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001679.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040546.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GIMP when processing XCF image files. If a user opens one of these image files that has been specially crafted by an attacker, GIMP can be tricked into making serious memory errors, potentially leading to crashes and causing use-after-free issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-21"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-48798/">CVE-2025-48798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48798">CVE-2025-48798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243712">SUSE bug 1243712</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009987305" comment="gimp-2.99.8-4.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987306" comment="gimp-libs-2.99.8-4.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48866</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48866" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48866" ref_url="https://www.suse.com/security/cve/CVE-2025-48866" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12838" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02028-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02029-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040417.html" source="SUSE-SU"/>
    <description>
    ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Versions prior to 2.9.10 contain a denial of service vulnerability similar to GHSA-859r-vvv8-rm8r/CVE-2025-47947. The `sanitiseArg` (and `sanitizeArg` - this is the same action but an alias) is vulnerable to adding an excessive number of arguments, thereby leading to denial of service. Version 2.9.10 fixes the issue. As a workaround, avoid using rules that contain the  `sanitiseArg` (or `sanitizeArg`) action.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-12"/>
	<updated date="2025-08-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48866/">CVE-2025-48866 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48866">CVE-2025-48866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243976">SUSE bug 1243976</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013272" comment="mod_security-2.9.6-2.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013273" comment="mod_security-mlogc-2.9.6-2.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48964" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48964" ref_url="https://www.suse.com/security/cve/CVE-2025-48964" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17558" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02430-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02431-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02432-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02797-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040919.html" source="SUSE-SU"/>
    <description>
    ping in iputils before 20250602 allows a denial of service (application error in adaptive ping mode or incorrect data collection) via a crafted ICMP Echo Reply packet, because a zero timestamp can lead to large intermediate values that have an integer overflow when squared during statistics calculations. NOTE: this issue exists because of an incomplete fix for CVE-2025-47268 (that fix was only about timestamp calculations, and it did not account for a specific scenario where the original timestamp in the ICMP payload is zero).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-10"/>
	<updated date="2025-10-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48964/">CVE-2025-48964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48964">CVE-2025-48964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243772">SUSE bug 1243772</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010020431" comment="iputils-20210202-11.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010020432" comment="iputils-ninfod-20210202-11.el9_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48976</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48976" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48976" ref_url="https://www.suse.com/security/cve/CVE-2025-48976" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14177" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001924.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02184-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040575.html" source="SUSE-SU"/>
    <description>
    Allocation of resources for multipart headers with insufficient limits enabled a DoS vulnerability in Apache Commons FileUpload.

This issue affects Apache Commons FileUpload: from 1.0 before 1.6; from 2.0.0-M1 before 2.0.0-M4.

Users are recommended to upgrade to versions 1.6 or 2.0.0-M4, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48976/">CVE-2025-48976 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48976">CVE-2025-48976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244657">SUSE bug 1244657</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016325" comment="tomcat-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016326" comment="tomcat-admin-webapps-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016327" comment="tomcat-docs-webapp-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016328" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016329" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016330" comment="tomcat-lib-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016331" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016332" comment="tomcat-webapps-9.0.87-3.el9_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48988</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48988" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48988" ref_url="https://www.suse.com/security/cve/CVE-2025-48988" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14177" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001924.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02214-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions 
may also be affected.


Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48988/">CVE-2025-48988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48988">CVE-2025-48988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244656">SUSE bug 1244656</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016325" comment="tomcat-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016326" comment="tomcat-admin-webapps-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016327" comment="tomcat-docs-webapp-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016328" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016329" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016330" comment="tomcat-lib-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016331" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016332" comment="tomcat-webapps-9.0.87-3.el9_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48989</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48989" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48989" ref_url="https://www.suse.com/security/cve/CVE-2025-48989" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14177" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001924.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="TID000021980" ref_url="https://www.suse.com/support/kb/doc/?id=000021980" source="SUSE-SU"/>
    <description>
    Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.

Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-48989/">CVE-2025-48989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989">CVE-2025-48989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243888">SUSE bug 1243888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243895">SUSE bug 1243895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016325" comment="tomcat-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016326" comment="tomcat-admin-webapps-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016327" comment="tomcat-docs-webapp-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016328" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016329" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016330" comment="tomcat-lib-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016331" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016332" comment="tomcat-webapps-9.0.87-3.el9_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49125</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49125" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49125" ref_url="https://www.suse.com/security/cve/CVE-2025-49125" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14177" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001924.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02214-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.   When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions 
may also be affected.


Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49125/">CVE-2025-49125 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49125">CVE-2025-49125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244649">SUSE bug 1244649</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016325" comment="tomcat-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016326" comment="tomcat-admin-webapps-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016327" comment="tomcat-docs-webapp-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016328" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016329" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016330" comment="tomcat-lib-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016331" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016332" comment="tomcat-webapps-9.0.87-3.el9_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49133</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49133" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49133" ref_url="https://www.suse.com/security/cve/CVE-2025-49133" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3052" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001876.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12100" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21064-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045460.html" source="SUSE-SU"/>
    <description>
    Libtpms is a library that targets the integration of TPM functionality into hypervisors, primarily into Qemu. Libtpms, which is derived from the TPM 2.0 reference implementation code published by the Trusted Computing Group, is prone to a potential out of bounds (OOB) read vulnerability. The vulnerability occurs in the 'CryptHmacSign' function with an inconsistent pairing of the signKey and signScheme parameters, where the signKey is ALG_KEYEDHASH key and inScheme is an ECC or RSA scheme. The reported vulnerability is in the 'CryptHmacSign' function, which is defined in the "Part 4: Supporting Routines - Code" document, section "7.151 - /tpm/src/crypt/CryptUtil.c ". This vulnerability can be triggered from user-mode applications by sending malicious commands to a TPM 2.0/vTPM (swtpm) whose firmware is based on an affected TCG reference implementation. The effect on libtpms is that it will cause an abort due to the detection of the out-of-bounds access, thus for example making a vTPM (swtpm) unavailable to a VM. This vulnerability is fixed in 0.7.12, 0.8.10, 0.9.7, and 0.10.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-31"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-49133/">CVE-2025-49133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49133">CVE-2025-49133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244528">SUSE bug 1244528</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011442" comment="libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49175</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49175" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49175" ref_url="https://www.suse.com/security/cve/CVE-2025-49175" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X Rendering extension's handling of animated cursors. If a client provides no cursors, the server assumes at least one is present, leading to an out-of-bounds read and potential crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49175/">CVE-2025-49175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49175">CVE-2025-49175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244082">SUSE bug 1244082</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996897" comment="tigervnc-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996898" comment="tigervnc-icons-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996899" comment="tigervnc-license-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996900" comment="tigervnc-selinux-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996901" comment="tigervnc-server-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996902" comment="tigervnc-server-minimal-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996903" comment="tigervnc-server-module-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996887" comment="xorg-x11-server-Xdmx-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996888" comment="xorg-x11-server-Xephyr-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996889" comment="xorg-x11-server-Xnest-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996890" comment="xorg-x11-server-Xorg-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996891" comment="xorg-x11-server-Xvfb-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996892" comment="xorg-x11-server-Xwayland-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996893" comment="xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996894" comment="xorg-x11-server-common-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996895" comment="xorg-x11-server-devel-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996896" comment="xorg-x11-server-source-1.20.11-31.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49176" ref_url="https://www.suse.com/security/cve/CVE-2025-49176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02191-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02206-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02207-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02208-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040615.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Big Requests extension. The request length is multiplied by 4 before checking against the maximum allowed size, potentially causing an integer overflow and bypassing the size check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49176/">CVE-2025-49176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49176">CVE-2025-49176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244084">SUSE bug 1244084</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996897" comment="tigervnc-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996898" comment="tigervnc-icons-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996899" comment="tigervnc-license-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996900" comment="tigervnc-selinux-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996901" comment="tigervnc-server-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996902" comment="tigervnc-server-minimal-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996903" comment="tigervnc-server-module-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996887" comment="xorg-x11-server-Xdmx-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996888" comment="xorg-x11-server-Xephyr-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996889" comment="xorg-x11-server-Xnest-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996890" comment="xorg-x11-server-Xorg-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996891" comment="xorg-x11-server-Xvfb-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996892" comment="xorg-x11-server-Xwayland-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996893" comment="xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996894" comment="xorg-x11-server-common-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996895" comment="xorg-x11-server-devel-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996896" comment="xorg-x11-server-source-1.20.11-31.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49177</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49177" ref_url="https://www.suse.com/security/cve/CVE-2025-49177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the XFIXES extension. The XFixesSetClientDisconnectMode handler does not validate the request length, allowing a client to read unintended memory from previous requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49177/">CVE-2025-49177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49177">CVE-2025-49177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244085">SUSE bug 1244085</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996887" comment="xorg-x11-server-Xdmx-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996888" comment="xorg-x11-server-Xephyr-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996889" comment="xorg-x11-server-Xnest-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996890" comment="xorg-x11-server-Xorg-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996891" comment="xorg-x11-server-Xvfb-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996892" comment="xorg-x11-server-Xwayland-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996893" comment="xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996894" comment="xorg-x11-server-common-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996895" comment="xorg-x11-server-devel-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996896" comment="xorg-x11-server-source-1.20.11-31.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49178</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49178" ref_url="https://www.suse.com/security/cve/CVE-2025-49178" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X server's request handling. Non-zero 'bytes to ignore' in a client's request can cause the server to skip processing another client's request, potentially leading to a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-07-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49178/">CVE-2025-49178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49178">CVE-2025-49178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244087">SUSE bug 1244087</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996897" comment="tigervnc-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996898" comment="tigervnc-icons-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996899" comment="tigervnc-license-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996900" comment="tigervnc-selinux-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996901" comment="tigervnc-server-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996902" comment="tigervnc-server-minimal-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996903" comment="tigervnc-server-module-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996887" comment="xorg-x11-server-Xdmx-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996888" comment="xorg-x11-server-Xephyr-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996889" comment="xorg-x11-server-Xnest-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996890" comment="xorg-x11-server-Xorg-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996891" comment="xorg-x11-server-Xvfb-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996892" comment="xorg-x11-server-Xwayland-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996893" comment="xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996894" comment="xorg-x11-server-common-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996895" comment="xorg-x11-server-devel-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996896" comment="xorg-x11-server-source-1.20.11-31.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49179" ref_url="https://www.suse.com/security/cve/CVE-2025-49179" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X Record extension. The RecordSanityCheckRegisterClients function does not check for an integer overflow when computing request length, which allows a client to bypass length checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49179/">CVE-2025-49179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49179">CVE-2025-49179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244089">SUSE bug 1244089</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996897" comment="tigervnc-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996898" comment="tigervnc-icons-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996899" comment="tigervnc-license-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996900" comment="tigervnc-selinux-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996901" comment="tigervnc-server-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996902" comment="tigervnc-server-minimal-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996903" comment="tigervnc-server-module-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996887" comment="xorg-x11-server-Xdmx-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996888" comment="xorg-x11-server-Xephyr-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996889" comment="xorg-x11-server-Xnest-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996890" comment="xorg-x11-server-Xorg-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996891" comment="xorg-x11-server-Xvfb-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996892" comment="xorg-x11-server-Xwayland-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996893" comment="xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996894" comment="xorg-x11-server-common-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996895" comment="xorg-x11-server-devel-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996896" comment="xorg-x11-server-source-1.20.11-31.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4918</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4918" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4918" ref_url="https://www.suse.com/security/cve/CVE-2025-4918" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001546.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8060" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001156.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040136.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVVXPS4TKJVPQ3RMI3UFUCU2YBSY4OUG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZQZBRXJFD4JQN3QEB5W47FK43HWBVBM/" source="SUSE-SU"/>
    <description>
    An attacker was able to perform an out-of-bounds read or write on a JavaScript `Promise` object. This vulnerability was fixed in Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, and Thunderbird 138.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4918/">CVE-2025-4918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4918">CVE-2025-4918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243303">SUSE bug 1243303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985474" comment="firefox-128.10.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985475" comment="firefox-x11-128.10.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49180" ref_url="https://www.suse.com/security/cve/CVE-2025-49180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10360" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001830.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10375" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001831.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9303" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001686.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9305" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001684.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001691.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9392" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01975-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02012-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the RandR extension, where the RRChangeProviderProperty function does not properly validate input. This issue leads to an integer overflow when computing the total size to allocate.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-07-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49180/">CVE-2025-49180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49180">CVE-2025-49180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244090">SUSE bug 1244090</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996897" comment="tigervnc-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996898" comment="tigervnc-icons-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996899" comment="tigervnc-license-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996900" comment="tigervnc-selinux-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996901" comment="tigervnc-server-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996902" comment="tigervnc-server-minimal-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996903" comment="tigervnc-server-module-1.14.1-8.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996887" comment="xorg-x11-server-Xdmx-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996888" comment="xorg-x11-server-Xephyr-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996889" comment="xorg-x11-server-Xnest-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996890" comment="xorg-x11-server-Xorg-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996891" comment="xorg-x11-server-Xvfb-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996892" comment="xorg-x11-server-Xwayland-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996893" comment="xorg-x11-server-Xwayland-devel-23.2.7-4.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996894" comment="xorg-x11-server-common-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996895" comment="xorg-x11-server-devel-1.20.11-31.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996896" comment="xorg-x11-server-source-1.20.11-31.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4919" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4919" ref_url="https://www.suse.com/security/cve/CVE-2025-4919" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001546.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8060" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001156.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040136.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15133-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XVVXPS4TKJVPQ3RMI3UFUCU2YBSY4OUG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15149-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3ZQZBRXJFD4JQN3QEB5W47FK43HWBVBM/" source="SUSE-SU"/>
    <description>
    An attacker was able to perform an out-of-bounds read or write on a JavaScript object by confusing array index sizes. This vulnerability was fixed in Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, and Thunderbird 138.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4919/">CVE-2025-4919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4919">CVE-2025-4919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243303">SUSE bug 1243303</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985474" comment="firefox-128.10.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985475" comment="firefox-x11-128.10.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4945" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4945" ref_url="https://www.suse.com/security/cve/CVE-2025-4945" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19714" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20959" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02276-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02277-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03026-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022365.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4945/">CVE-2025-4945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4945">CVE-2025-4945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243314">SUSE bug 1243314</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054138" comment="libsoup-2.72.0-12.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054139" comment="libsoup-devel-2.72.0-12.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4948" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4948" ref_url="https://www.suse.com/security/cve/CVE-2025-4948" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01794-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01864-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15189-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LI34B57WJ4B5UMQTOCNXAAI3NVKDGJWF/" source="SUSE-SU"/>
    <description>
    A flaw was found in the soup_multipart_new_from_message() function of the libsoup HTTP library, which is commonly used by GNOME and other applications to handle web communications. The issue occurs when the library processes specially crafted multipart messages. Due to improper validation, an internal calculation can go wrong, leading to an integer underflow. This can cause the program to access invalid memory and crash. As a result, any application or server using libsoup could be forced to exit unexpectedly, creating a denial-of-service (DoS) risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-05-30"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4948/">CVE-2025-4948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4948">CVE-2025-4948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243332">SUSE bug 1243332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009984056" comment="libsoup-2.72.0-10.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009984057" comment="libsoup-devel-2.72.0-10.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49630</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49630" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49630" ref_url="https://www.suse.com/security/cve/CVE-2025-49630" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001964.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02565-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041070.html" source="SUSE-SU"/>
    <description>
    In certain proxy configurations, a denial of service attack against  Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.

Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-03"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49630/">CVE-2025-49630 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49630">CVE-2025-49630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246307">SUSE bug 1246307</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016866" comment="mod_http2-2.0.26-4.el9_6.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49794</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49794" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49794" ref_url="https://www.suse.com/security/cve/CVE-2025-49794" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10698" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the &lt;sch:name path="..."/&gt; schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49794/">CVE-2025-49794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49794">CVE-2025-49794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244554">SUSE bug 1244554</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999607" comment="libxml2-2.9.13-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999608" comment="libxml2-devel-2.9.13-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999609" comment="python3-libxml2-2.9.13-10.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49796" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49796" ref_url="https://www.suse.com/security/cve/CVE-2025-49796" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10698" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-49796/">CVE-2025-49796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49796">CVE-2025-49796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244557">SUSE bug 1244557</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999607" comment="libxml2-2.9.13-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999608" comment="libxml2-devel-2.9.13-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999609" comment="python3-libxml2-2.9.13-10.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49812</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49812" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49812" ref_url="https://www.suse.com/security/cve/CVE-2025-49812" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14997" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001981.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001973.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02565-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041070.html" source="SUSE-SU"/>
    <description>
    In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.

Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-49812/">CVE-2025-49812 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-49812">CVE-2025-49812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246161">SUSE bug 1246161</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017031" comment="httpd-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017032" comment="httpd-core-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017033" comment="httpd-devel-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017034" comment="httpd-filesystem-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017035" comment="httpd-manual-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017036" comment="httpd-tools-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017037" comment="mod_ldap-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017038" comment="mod_lua-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017039" comment="mod_proxy_html-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017040" comment="mod_session-2.4.62-4.el9_6.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017041" comment="mod_ssl-2.4.62-4.el9_6.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49844</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003068.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20955" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-01"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054124" comment="redis-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054125" comment="redis-devel-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054126" comment="redis-doc-7.2.11-1.module+el9.7.0+23559+d075163a is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054232" comment="valkey-8.0.6-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054233" comment="valkey-devel-8.0.6-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50059</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50059" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50059" ref_url="https://www.suse.com/security/cve/CVE-2025-50059" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001814.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10873" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02545-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02667-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-50059/">CVE-2025-50059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50059">CVE-2025-50059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246575">SUSE bug 1246575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011414" comment="java-11-openjdk-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011415" comment="java-11-openjdk-demo-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011169" comment="java-11-openjdk-demo-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011170" comment="java-11-openjdk-demo-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011416" comment="java-11-openjdk-devel-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011173" comment="java-11-openjdk-devel-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011174" comment="java-11-openjdk-devel-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011175" comment="java-11-openjdk-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011417" comment="java-11-openjdk-headless-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011178" comment="java-11-openjdk-headless-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011179" comment="java-11-openjdk-headless-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011418" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011419" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011420" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011186" comment="java-11-openjdk-jmods-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011187" comment="java-11-openjdk-jmods-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011188" comment="java-11-openjdk-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011421" comment="java-11-openjdk-src-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011191" comment="java-11-openjdk-src-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011192" comment="java-11-openjdk-src-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011422" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011195" comment="java-11-openjdk-static-libs-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011196" comment="java-11-openjdk-static-libs-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007998" comment="java-17-openjdk-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007999" comment="java-17-openjdk-demo-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008000" comment="java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008001" comment="java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008002" comment="java-17-openjdk-devel-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008003" comment="java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008004" comment="java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008005" comment="java-17-openjdk-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008006" comment="java-17-openjdk-headless-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008007" comment="java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008008" comment="java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008009" comment="java-17-openjdk-javadoc-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008010" comment="java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008011" comment="java-17-openjdk-jmods-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008012" comment="java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008013" comment="java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008014" comment="java-17-openjdk-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008015" comment="java-17-openjdk-src-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008016" comment="java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008017" comment="java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008018" comment="java-17-openjdk-static-libs-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008019" comment="java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008020" comment="java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022816" comment="java-21-openjdk-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022817" comment="java-21-openjdk-demo-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022818" comment="java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022819" comment="java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022820" comment="java-21-openjdk-devel-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022821" comment="java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022822" comment="java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022823" comment="java-21-openjdk-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022824" comment="java-21-openjdk-headless-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022825" comment="java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022826" comment="java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022827" comment="java-21-openjdk-javadoc-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022828" comment="java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022829" comment="java-21-openjdk-jmods-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022830" comment="java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022831" comment="java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022832" comment="java-21-openjdk-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022833" comment="java-21-openjdk-src-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022834" comment="java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022835" comment="java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022836" comment="java-21-openjdk-static-libs-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022837" comment="java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022838" comment="java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50077</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50077" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50077" ref_url="https://www.suse.com/security/cve/CVE-2025-50077" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50077/">CVE-2025-50077 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50077">CVE-2025-50077 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50078</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50078" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50078" ref_url="https://www.suse.com/security/cve/CVE-2025-50078" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50078/">CVE-2025-50078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50078">CVE-2025-50078 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50079</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50079" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50079" ref_url="https://www.suse.com/security/cve/CVE-2025-50079" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50079/">CVE-2025-50079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50079">CVE-2025-50079 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50080</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50080" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50080" ref_url="https://www.suse.com/security/cve/CVE-2025-50080" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50080/">CVE-2025-50080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50080">CVE-2025-50080 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50081</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50081" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50081" ref_url="https://www.suse.com/security/cve/CVE-2025-50081" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50081/">CVE-2025-50081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50081">CVE-2025-50081 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50082" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50082" ref_url="https://www.suse.com/security/cve/CVE-2025-50082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50082/">CVE-2025-50082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50082">CVE-2025-50082 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50083" ref_url="https://www.suse.com/security/cve/CVE-2025-50083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50083/">CVE-2025-50083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50083">CVE-2025-50083 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50084</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50084" ref_url="https://www.suse.com/security/cve/CVE-2025-50084" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50084/">CVE-2025-50084 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50084">CVE-2025-50084 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50085" ref_url="https://www.suse.com/security/cve/CVE-2025-50085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50085/">CVE-2025-50085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50085">CVE-2025-50085 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50086" ref_url="https://www.suse.com/security/cve/CVE-2025-50086" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50086/">CVE-2025-50086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50086">CVE-2025-50086 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50087</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50087" ref_url="https://www.suse.com/security/cve/CVE-2025-50087" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50087/">CVE-2025-50087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50087">CVE-2025-50087 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50088" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50088" ref_url="https://www.suse.com/security/cve/CVE-2025-50088" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50088/">CVE-2025-50088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50088">CVE-2025-50088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50091</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50091" ref_url="https://www.suse.com/security/cve/CVE-2025-50091" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50091/">CVE-2025-50091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50091">CVE-2025-50091 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50092</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50092" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50092" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50092" ref_url="https://www.suse.com/security/cve/CVE-2025-50092" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50092/">CVE-2025-50092 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50092">CVE-2025-50092 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50093</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50093" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50093" ref_url="https://www.suse.com/security/cve/CVE-2025-50093" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50093/">CVE-2025-50093 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50093">CVE-2025-50093 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50094</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50094" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50094" ref_url="https://www.suse.com/security/cve/CVE-2025-50094" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50094/">CVE-2025-50094 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50094">CVE-2025-50094 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50096</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50096" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50096" ref_url="https://www.suse.com/security/cve/CVE-2025-50096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50096/">CVE-2025-50096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50096">CVE-2025-50096 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50097" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50097" ref_url="https://www.suse.com/security/cve/CVE-2025-50097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50097/">CVE-2025-50097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50097">CVE-2025-50097 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50098" ref_url="https://www.suse.com/security/cve/CVE-2025-50098" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50098/">CVE-2025-50098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50098">CVE-2025-50098 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50099</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50099" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50099" ref_url="https://www.suse.com/security/cve/CVE-2025-50099" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50099/">CVE-2025-50099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50099">CVE-2025-50099 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50100</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50100" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50100" ref_url="https://www.suse.com/security/cve/CVE-2025-50100" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50100/">CVE-2025-50100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50100">CVE-2025-50100 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50101</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50101" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50101" ref_url="https://www.suse.com/security/cve/CVE-2025-50101" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50101/">CVE-2025-50101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50101">CVE-2025-50101 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50102</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50102" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50102" ref_url="https://www.suse.com/security/cve/CVE-2025-50102" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50102/">CVE-2025-50102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50102">CVE-2025-50102 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50104</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50104" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50104" ref_url="https://www.suse.com/security/cve/CVE-2025-50104" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16046" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002029.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Low</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-50104/">CVE-2025-50104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50104">CVE-2025-50104 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018743" comment="mysql-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018744" comment="mysql-common-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018745" comment="mysql-devel-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018746" comment="mysql-errmsg-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018747" comment="mysql-libs-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018748" comment="mysql-server-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018749" comment="mysql-test-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018750" comment="mysql-test-data-8.4.6-1.module+el9.6.0+23497+d0c5dcca is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50106</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50106" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50106" ref_url="https://www.suse.com/security/cve/CVE-2025-50106" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001837.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001811.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001838.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10867" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001814.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10873" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02667-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03224-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041764.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-18"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-50106/">CVE-2025-50106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50106">CVE-2025-50106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246584">SUSE bug 1246584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246595">SUSE bug 1246595</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010008294" comment="java-1.8.0-openjdk-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008295" comment="java-1.8.0-openjdk-accessibility-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008296" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008297" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.462.b08-2.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008298" comment="java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008299" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008300" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008301" comment="java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008302" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008303" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008304" comment="java-1.8.0-openjdk-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008305" comment="java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008306" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008307" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008308" comment="java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008309" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008310" comment="java-1.8.0-openjdk-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008311" comment="java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008312" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008313" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.462.b08-3.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011414" comment="java-11-openjdk-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011166" comment="java-11-openjdk-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011415" comment="java-11-openjdk-demo-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011168" comment="java-11-openjdk-demo-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011169" comment="java-11-openjdk-demo-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011170" comment="java-11-openjdk-demo-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011416" comment="java-11-openjdk-devel-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011172" comment="java-11-openjdk-devel-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011173" comment="java-11-openjdk-devel-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011174" comment="java-11-openjdk-devel-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011175" comment="java-11-openjdk-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011417" comment="java-11-openjdk-headless-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011177" comment="java-11-openjdk-headless-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011178" comment="java-11-openjdk-headless-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011179" comment="java-11-openjdk-headless-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011418" comment="java-11-openjdk-javadoc-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011181" comment="java-11-openjdk-javadoc-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011419" comment="java-11-openjdk-javadoc-zip-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011183" comment="java-11-openjdk-javadoc-zip-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011420" comment="java-11-openjdk-jmods-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011185" comment="java-11-openjdk-jmods-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011186" comment="java-11-openjdk-jmods-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011187" comment="java-11-openjdk-jmods-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011188" comment="java-11-openjdk-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011421" comment="java-11-openjdk-src-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011190" comment="java-11-openjdk-src-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011191" comment="java-11-openjdk-src-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011192" comment="java-11-openjdk-src-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011422" comment="java-11-openjdk-static-libs-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011194" comment="java-11-openjdk-static-libs-debug-11.0.28.0.6-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011195" comment="java-11-openjdk-static-libs-fastdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011196" comment="java-11-openjdk-static-libs-slowdebug-11.0.28.0.6-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007998" comment="java-17-openjdk-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010007999" comment="java-17-openjdk-demo-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008000" comment="java-17-openjdk-demo-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008001" comment="java-17-openjdk-demo-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008002" comment="java-17-openjdk-devel-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008003" comment="java-17-openjdk-devel-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008004" comment="java-17-openjdk-devel-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008005" comment="java-17-openjdk-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008006" comment="java-17-openjdk-headless-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008007" comment="java-17-openjdk-headless-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008008" comment="java-17-openjdk-headless-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008009" comment="java-17-openjdk-javadoc-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008010" comment="java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008011" comment="java-17-openjdk-jmods-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008012" comment="java-17-openjdk-jmods-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008013" comment="java-17-openjdk-jmods-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008014" comment="java-17-openjdk-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008015" comment="java-17-openjdk-src-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008016" comment="java-17-openjdk-src-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008017" comment="java-17-openjdk-src-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008018" comment="java-17-openjdk-static-libs-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008019" comment="java-17-openjdk-static-libs-fastdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010008020" comment="java-17-openjdk-static-libs-slowdebug-17.0.16.0.8-2.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022816" comment="java-21-openjdk-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022817" comment="java-21-openjdk-demo-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022818" comment="java-21-openjdk-demo-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022819" comment="java-21-openjdk-demo-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022820" comment="java-21-openjdk-devel-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022821" comment="java-21-openjdk-devel-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022822" comment="java-21-openjdk-devel-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022823" comment="java-21-openjdk-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022824" comment="java-21-openjdk-headless-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022825" comment="java-21-openjdk-headless-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022826" comment="java-21-openjdk-headless-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022827" comment="java-21-openjdk-javadoc-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022828" comment="java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022829" comment="java-21-openjdk-jmods-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022830" comment="java-21-openjdk-jmods-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022831" comment="java-21-openjdk-jmods-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022832" comment="java-21-openjdk-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022833" comment="java-21-openjdk-src-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022834" comment="java-21-openjdk-src-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022835" comment="java-21-openjdk-src-slowdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022836" comment="java-21-openjdk-static-libs-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022837" comment="java-21-openjdk-static-libs-fastdebug-21.0.8.0.9-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010022838" comment="java-21-openjdk-static-libs-slowdebug-21.0.8.0.9-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5024</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5024" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5024" ref_url="https://www.suse.com/security/cve/CVE-2025-5024" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10631" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001768.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10742" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0766-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024551.html" source="SUSE-SU"/>
    <description>
    A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-10"/>
	<updated date="2026-03-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-5024/">CVE-2025-5024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5024">CVE-2025-5024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244053">SUSE bug 1244053</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999423" comment="gnome-remote-desktop-40.0-11.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5222</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5222" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5222" ref_url="https://www.suse.com/security/cve/CVE-2025-5222" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02216-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040602.html" source="SUSE-SU"/>
    <description>
    A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-31"/>
	<updated date="2025-08-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-5222/">CVE-2025-5222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5222">CVE-2025-5222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243721">SUSE bug 1243721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011439" comment="icu-67.1-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011440" comment="libicu-67.1-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011441" comment="libicu-devel-67.1-10.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52434</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52434" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52434" ref_url="https://www.suse.com/security/cve/CVE-2025-52434" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14177" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001924.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Tomcat when using the APR/Native connector. This was particularly noticeable with client initiated closes of HTTP/2 connections.

This issue affects Apache Tomcat: from 9.0.0.M1 through 9.0.106.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions 
may also be affected.


Users are recommended to upgrade to version 9.0.107, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52434/">CVE-2025-52434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52434">CVE-2025-52434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246389">SUSE bug 1246389</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016325" comment="tomcat-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016326" comment="tomcat-admin-webapps-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016327" comment="tomcat-docs-webapp-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016328" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016329" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016330" comment="tomcat-lib-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016331" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016332" comment="tomcat-webapps-9.0.87-3.el9_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52520</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52520" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52520" ref_url="https://www.suse.com/security/cve/CVE-2025-52520" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14177" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001924.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02745-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions 
may also be affected.


Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52520/">CVE-2025-52520 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520">CVE-2025-52520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246388">SUSE bug 1246388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016325" comment="tomcat-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016326" comment="tomcat-admin-webapps-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016327" comment="tomcat-docs-webapp-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016328" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016329" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016330" comment="tomcat-lib-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016331" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016332" comment="tomcat-webapps-9.0.87-3.el9_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52565</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054130" comment="runc-1.3.0-4.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5263</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5263" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985486" comment="firefox-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985487" comment="firefox-x11-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5264</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985486" comment="firefox-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985487" comment="firefox-x11-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5266</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5266" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985486" comment="firefox-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985487" comment="firefox-x11-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5267</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5267" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985486" comment="firefox-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985487" comment="firefox-x11-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5268</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985486" comment="firefox-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985487" comment="firefox-x11-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox ESR 128.11 and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-01"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985486" comment="firefox-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985487" comment="firefox-x11-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5283</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9118" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001676.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9119" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001669.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Use after free in libvpx in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-19"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243741">SUSE bug 1243741</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985486" comment="firefox-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985487" comment="firefox-x11-128.11.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987017" comment="libvpx-1.9.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987018" comment="libvpx-devel-1.9.0-9.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009986192" comment="thunderbird-128.11.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52881</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003127.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22030" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002275.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23543" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054274" comment="buildah-1.41.6-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054275" comment="buildah-tests-1.41.6-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054217" comment="podman-5.6.0-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054218" comment="podman-docker-5.6.0-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054219" comment="podman-plugins-5.6.0-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054220" comment="podman-remote-5.6.0-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054221" comment="podman-tests-5.6.0-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054130" comment="runc-1.3.0-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52999</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52999" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52999" ref_url="https://www.suse.com/security/cve/CVE-2025-52999" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001858.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002103.html" source="SUSE-SU"/>
    <description>
    jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-01"/>
	<updated date="2025-10-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52999/">CVE-2025-52999 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52999">CVE-2025-52999 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011535" comment="pki-jackson-annotations-2.19.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011536" comment="pki-jackson-core-2.19.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011537" comment="pki-jackson-databind-2.19.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011538" comment="pki-jackson-jaxrs-json-provider-2.19.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011539" comment="pki-jackson-jaxrs-providers-2.19.1-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011540" comment="pki-jackson-module-jaxb-annotations-2.19.1-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53023</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53023" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53023" ref_url="https://www.suse.com/security/cve/CVE-2025-53023" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002032.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002046.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-01"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53023/">CVE-2025-53023 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53023">CVE-2025-53023 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018655" comment="mysql-8.0.43-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018656" comment="mysql-common-8.0.43-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018657" comment="mysql-devel-8.0.43-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018658" comment="mysql-errmsg-8.0.43-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018659" comment="mysql-libs-8.0.43-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018660" comment="mysql-server-8.0.43-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018661" comment="mysql-test-8.0.43-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53040</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53040" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53040" ref_url="https://www.suse.com/security/cve/CVE-2025-53040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23134" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002388.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002288.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53040/">CVE-2025-53040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53040">CVE-2025-53040 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53042</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53042" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53042" ref_url="https://www.suse.com/security/cve/CVE-2025-53042" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23134" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002388.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002288.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53042/">CVE-2025-53042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53042">CVE-2025-53042 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53044" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53044" ref_url="https://www.suse.com/security/cve/CVE-2025-53044" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23134" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002388.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002288.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53044/">CVE-2025-53044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53044">CVE-2025-53044 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53045" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53045" ref_url="https://www.suse.com/security/cve/CVE-2025-53045" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23134" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002388.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002288.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53045/">CVE-2025-53045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53045">CVE-2025-53045 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53053</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53053" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53053" ref_url="https://www.suse.com/security/cve/CVE-2025-53053" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23134" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002388.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002288.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53053/">CVE-2025-53053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53053">CVE-2025-53053 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53054</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53054" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53054" ref_url="https://www.suse.com/security/cve/CVE-2025-53054" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23134" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002388.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002288.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53054/">CVE-2025-53054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53054">CVE-2025-53054 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53057</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18814" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002133.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18818" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002212.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18821" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-25"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252414">SUSE bug 1252414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023351" comment="java-1.8.0-openjdk-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023352" comment="java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023353" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.472.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023354" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.472.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023355" comment="java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023356" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023357" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023358" comment="java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023359" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023360" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023361" comment="java-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023362" comment="java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023363" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023364" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023365" comment="java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023366" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023367" comment="java-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023368" comment="java-1.8.0-openjdk-src-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023369" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023370" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025669" comment="java-11-openjdk-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025494" comment="java-11-openjdk-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025670" comment="java-11-openjdk-demo-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025496" comment="java-11-openjdk-demo-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025497" comment="java-11-openjdk-demo-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025498" comment="java-11-openjdk-demo-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025671" comment="java-11-openjdk-devel-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025500" comment="java-11-openjdk-devel-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025501" comment="java-11-openjdk-devel-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025502" comment="java-11-openjdk-devel-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025503" comment="java-11-openjdk-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025672" comment="java-11-openjdk-headless-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025505" comment="java-11-openjdk-headless-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025506" comment="java-11-openjdk-headless-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025507" comment="java-11-openjdk-headless-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025673" comment="java-11-openjdk-javadoc-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025509" comment="java-11-openjdk-javadoc-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025674" comment="java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025511" comment="java-11-openjdk-javadoc-zip-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025675" comment="java-11-openjdk-jmods-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025513" comment="java-11-openjdk-jmods-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025514" comment="java-11-openjdk-jmods-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025515" comment="java-11-openjdk-jmods-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025516" comment="java-11-openjdk-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025676" comment="java-11-openjdk-src-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025518" comment="java-11-openjdk-src-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025519" comment="java-11-openjdk-src-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025520" comment="java-11-openjdk-src-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025677" comment="java-11-openjdk-static-libs-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025522" comment="java-11-openjdk-static-libs-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025523" comment="java-11-openjdk-static-libs-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025524" comment="java-11-openjdk-static-libs-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023371" comment="java-17-openjdk-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023372" comment="java-17-openjdk-demo-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023373" comment="java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023374" comment="java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023375" comment="java-17-openjdk-devel-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023376" comment="java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023377" comment="java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023378" comment="java-17-openjdk-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023379" comment="java-17-openjdk-headless-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023380" comment="java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023381" comment="java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023382" comment="java-17-openjdk-javadoc-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023383" comment="java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023384" comment="java-17-openjdk-jmods-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023385" comment="java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023386" comment="java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023387" comment="java-17-openjdk-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023388" comment="java-17-openjdk-src-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023389" comment="java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023390" comment="java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023391" comment="java-17-openjdk-static-libs-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023392" comment="java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023393" comment="java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023394" comment="java-21-openjdk-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023395" comment="java-21-openjdk-demo-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023396" comment="java-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023397" comment="java-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023398" comment="java-21-openjdk-devel-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023399" comment="java-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023400" comment="java-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023401" comment="java-21-openjdk-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023402" comment="java-21-openjdk-headless-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023403" comment="java-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023404" comment="java-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023405" comment="java-21-openjdk-javadoc-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023406" comment="java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023407" comment="java-21-openjdk-jmods-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023408" comment="java-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023409" comment="java-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023410" comment="java-21-openjdk-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023411" comment="java-21-openjdk-src-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023412" comment="java-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023413" comment="java-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023414" comment="java-21-openjdk-static-libs-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023415" comment="java-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023416" comment="java-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53062</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53062" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53062" ref_url="https://www.suse.com/security/cve/CVE-2025-53062" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23134" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002388.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002288.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53062/">CVE-2025-53062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53062">CVE-2025-53062 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53066</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18814" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002133.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18818" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002212.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18821" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-25"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252417">SUSE bug 1252417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023351" comment="java-1.8.0-openjdk-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023352" comment="java-1.8.0-openjdk-accessibility-1.8.0.472.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023353" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.472.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023354" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.472.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023355" comment="java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023356" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023357" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023358" comment="java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023359" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023360" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023361" comment="java-1.8.0-openjdk-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023362" comment="java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023363" comment="java-1.8.0-openjdk-headless-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023364" comment="java-1.8.0-openjdk-headless-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023365" comment="java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023366" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023367" comment="java-1.8.0-openjdk-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023368" comment="java-1.8.0-openjdk-src-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023369" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023370" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.472.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025669" comment="java-11-openjdk-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025494" comment="java-11-openjdk-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025670" comment="java-11-openjdk-demo-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025496" comment="java-11-openjdk-demo-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025497" comment="java-11-openjdk-demo-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025498" comment="java-11-openjdk-demo-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025671" comment="java-11-openjdk-devel-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025500" comment="java-11-openjdk-devel-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025501" comment="java-11-openjdk-devel-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025502" comment="java-11-openjdk-devel-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025503" comment="java-11-openjdk-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025672" comment="java-11-openjdk-headless-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025505" comment="java-11-openjdk-headless-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025506" comment="java-11-openjdk-headless-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025507" comment="java-11-openjdk-headless-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025673" comment="java-11-openjdk-javadoc-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025509" comment="java-11-openjdk-javadoc-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025674" comment="java-11-openjdk-javadoc-zip-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025511" comment="java-11-openjdk-javadoc-zip-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025675" comment="java-11-openjdk-jmods-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025513" comment="java-11-openjdk-jmods-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025514" comment="java-11-openjdk-jmods-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025515" comment="java-11-openjdk-jmods-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025516" comment="java-11-openjdk-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025676" comment="java-11-openjdk-src-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025518" comment="java-11-openjdk-src-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025519" comment="java-11-openjdk-src-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025520" comment="java-11-openjdk-src-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025677" comment="java-11-openjdk-static-libs-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025522" comment="java-11-openjdk-static-libs-debug-11.0.29.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025523" comment="java-11-openjdk-static-libs-fastdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010025524" comment="java-11-openjdk-static-libs-slowdebug-11.0.29.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023371" comment="java-17-openjdk-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023372" comment="java-17-openjdk-demo-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023373" comment="java-17-openjdk-demo-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023374" comment="java-17-openjdk-demo-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023375" comment="java-17-openjdk-devel-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023376" comment="java-17-openjdk-devel-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023377" comment="java-17-openjdk-devel-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023378" comment="java-17-openjdk-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023379" comment="java-17-openjdk-headless-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023380" comment="java-17-openjdk-headless-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023381" comment="java-17-openjdk-headless-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023382" comment="java-17-openjdk-javadoc-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023383" comment="java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023384" comment="java-17-openjdk-jmods-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023385" comment="java-17-openjdk-jmods-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023386" comment="java-17-openjdk-jmods-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023387" comment="java-17-openjdk-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023388" comment="java-17-openjdk-src-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023389" comment="java-17-openjdk-src-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023390" comment="java-17-openjdk-src-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023391" comment="java-17-openjdk-static-libs-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023392" comment="java-17-openjdk-static-libs-fastdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023393" comment="java-17-openjdk-static-libs-slowdebug-17.0.17.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023394" comment="java-21-openjdk-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023395" comment="java-21-openjdk-demo-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023396" comment="java-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023397" comment="java-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023398" comment="java-21-openjdk-devel-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023399" comment="java-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023400" comment="java-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023401" comment="java-21-openjdk-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023402" comment="java-21-openjdk-headless-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023403" comment="java-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023404" comment="java-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023405" comment="java-21-openjdk-javadoc-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023406" comment="java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023407" comment="java-21-openjdk-jmods-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023408" comment="java-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023409" comment="java-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023410" comment="java-21-openjdk-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023411" comment="java-21-openjdk-src-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023412" comment="java-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023413" comment="java-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023414" comment="java-21-openjdk-static-libs-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023415" comment="java-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023416" comment="java-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53069</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53069" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53069" ref_url="https://www.suse.com/security/cve/CVE-2025-53069" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23109" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003153.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23134" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002388.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002288.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53069/">CVE-2025-53069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53069">CVE-2025-53069 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018739" comment="mecab-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018740" comment="mecab-devel-0.996-3.module+el9.6.0+22713+cbf15e23.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018741" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018742" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054411" comment="mysql-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054412" comment="mysql-common-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054413" comment="mysql-devel-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054414" comment="mysql-errmsg-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054415" comment="mysql-libs-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054416" comment="mysql-server-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054417" comment="mysql-test-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054418" comment="mysql-test-data-8.4.7-1.module+el9.7.0+23698+51fa9c99 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018751" comment="rapidjson-devel-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018752" comment="rapidjson-doc-1.1.0-19.module+el9.6.0+22713+cbf15e23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5318</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5318" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5318" ref_url="https://www.suse.com/security/cve/CVE-2025-5318" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18275" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002109.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18286" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20943" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02229-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20557-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022366.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libssh library in versions less than 0.11.2. An out-of-bounds read can be triggered in the sftp_handle function due to an incorrect comparison check that permits the function to access memory beyond the valid handle list and to return an invalid pointer, which is used in further processing. This vulnerability allows an authenticated remote attacker to potentially read unintended memory regions, exposing sensitive information or affect service behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5318/">CVE-2025-5318 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5318">CVE-2025-5318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245311">SUSE bug 1245311</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054085" comment="libssh-0.10.4-15.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054086" comment="libssh-config-0.10.4-15.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054087" comment="libssh-devel-0.10.4-15.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53506" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53506" ref_url="https://www.suse.com/security/cve/CVE-2025-53506" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14177" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001924.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14181" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02745-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
    <description>
    Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.
The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 through 8.5.100.  Other EOL versions may also be affected.


Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53506/">CVE-2025-53506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506">CVE-2025-53506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246318">SUSE bug 1246318</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016325" comment="tomcat-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016326" comment="tomcat-admin-webapps-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016327" comment="tomcat-docs-webapp-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016328" comment="tomcat-el-3.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016329" comment="tomcat-jsp-2.3-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016330" comment="tomcat-lib-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016331" comment="tomcat-servlet-4.0-api-9.0.87-3.el9_6.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016332" comment="tomcat-webapps-9.0.87-3.el9_6.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53905</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53905" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53905" ref_url="https://www.suse.com/security/cve/CVE-2025-53905" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17715" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002070.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17742" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20945" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03240-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024181.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim's tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53905/">CVE-2025-53905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53905">CVE-2025-53905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246604">SUSE bug 1246604</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054088" comment="vim-X11-8.2.2637-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054089" comment="vim-common-8.2.2637-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054090" comment="vim-enhanced-8.2.2637-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054091" comment="vim-filesystem-8.2.2637-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054092" comment="vim-minimal-8.2.2637-23.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53906</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53906" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17715" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002070.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17742" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20945" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03240-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025100.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim's zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-14"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246602">SUSE bug 1246602</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054088" comment="vim-X11-8.2.2637-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054089" comment="vim-common-8.2.2637-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054090" comment="vim-enhanced-8.2.2637-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054091" comment="vim-filesystem-8.2.2637-23.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054092" comment="vim-minimal-8.2.2637-23.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54349" ref_url="https://www.suse.com/security/cve/CVE-2025-54349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1592" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002446.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1595" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003179.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20658-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20795-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024287.html" source="SUSE-SU"/>
    <description>
    In iperf before 3.19.1, iperf_auth.c has an off-by-one error and resultant heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-54349/">CVE-2025-54349 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54349">CVE-2025-54349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247519">SUSE bug 1247519</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054960" comment="iperf3-3.9-14.el9_7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54389</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54389" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54389" ref_url="https://www.suse.com/security/cve/CVE-2025-54389" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14493" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001936.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14573" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20657-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041893.html" source="SUSE-SU"/>
    <description>
    AIDE is an advanced intrusion detection environment. Prior to version 0.19.2, there is an improper output neutralization vulnerability in AIDE.  An attacker can craft a malicious filename by including terminal escape sequences to hide the addition or removal of the file from the report and/or tamper with the log output. A local user might exploit this to bypass the AIDE detection of malicious files. Additionally the output of extended attribute key names and symbolic links targets are also not properly neutralized. This issue has been patched in version 0.19.2. A workaround involves configuring AIDE to write the report output to a regular file, redirecting stdout to a regular file, or redirecting the log output written to stderr to a regular file.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2025-09-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54389/">CVE-2025-54389 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54389">CVE-2025-54389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247884">SUSE bug 1247884</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015590" comment="aide-0.16-103.el9_6.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5455</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5455" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5455" ref_url="https://www.suse.com/security/cve/CVE-2025-5455" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022969.html" source="SUSE-SU"/>
    <description>
    An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code.

If the function was called with malformed data, for example, an URL that
contained a "charset" parameter that lacked a value (such as
"data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service
(abort).

This impacts Qt up to 5.15.18, 6.0.0-&gt;6.5.8, 6.6.0-&gt;6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2025-10-23"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-5455/">CVE-2025-5455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5455">CVE-2025-5455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243958">SUSE bug 1243958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245610">SUSE bug 1245610</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996942" comment="qt5-qtbase-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996943" comment="qt5-qtbase-common-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996944" comment="qt5-qtbase-devel-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996945" comment="qt5-qtbase-examples-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996946" comment="qt5-qtbase-gui-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996947" comment="qt5-qtbase-mysql-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996948" comment="qt5-qtbase-odbc-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996949" comment="qt5-qtbase-postgresql-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996950" comment="qt5-qtbase-private-devel-5.15.9-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996951" comment="qt5-qtbase-static-5.15.9-11.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54574</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54574" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54574" ref_url="https://www.suse.com/security/cve/CVE-2025-54574" source="SUSE CVE"/>
		<reference ref_id="GHSA-w4gv-vw3f-29g3" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-w4gv-vw3f-29g3" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management. This has been fixed in version 6.4. To work around this issue, disable URN access permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:H/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54574/">CVE-2025-54574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54574">CVE-2025-54574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247541">SUSE bug 1247541</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009813389" comment="squid-5.5-6.el9_3.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5473</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5473" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5473" ref_url="https://www.suse.com/security/cve/CVE-2025-5473" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9162" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001681.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001679.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9501" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040463.html" source="SUSE-SU"/>
    <description>
    GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ICO files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26752.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-21"/>
	<updated date="2025-08-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5473/">CVE-2025-5473 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5473">CVE-2025-5473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244058">SUSE bug 1244058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009987305" comment="gimp-2.99.8-4.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009987306" comment="gimp-libs-2.99.8-4.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2767" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2864" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js's Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.
This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256569">SUSE bug 1256569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055169" comment="nodejs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055170" comment="nodejs-devel-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055171" comment="nodejs-docs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055172" comment="nodejs-full-i18n-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055173" comment="nodejs-libs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055174" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055175" comment="nodejs-packaging-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055176" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055177" comment="npm-11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055188" comment="v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055178" comment="v8-13.6-devel-13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55131</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2767" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2864" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js's buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256570">SUSE bug 1256570</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055169" comment="nodejs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055170" comment="nodejs-devel-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055171" comment="nodejs-docs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055172" comment="nodejs-full-i18n-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055173" comment="nodejs-libs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055174" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055175" comment="nodejs-packaging-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055176" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055177" comment="npm-11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055188" comment="v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055178" comment="v8-13.6-devel-13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55132</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55132" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js's permission model allows a file's access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256571">SUSE bug 1256571</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055169" comment="nodejs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055170" comment="nodejs-devel-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055171" comment="nodejs-docs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055172" comment="nodejs-full-i18n-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055173" comment="nodejs-libs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055174" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055175" comment="nodejs-packaging-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055176" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055177" comment="npm-11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055188" comment="v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055178" comment="v8-13.6-devel-13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55247</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55247" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55247" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55247" ref_url="https://www.suse.com/security/cve/CVE-2025-55247" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18149" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002107.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18150" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002106.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18151" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002108.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2025-10-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55247/">CVE-2025-55247 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55247">CVE-2025-55247 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021803" comment="aspnetcore-runtime-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021815" comment="aspnetcore-runtime-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021804" comment="aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021816" comment="aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021805" comment="aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021817" comment="aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021806" comment="dotnet-apphost-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021818" comment="dotnet-apphost-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021819" comment="dotnet-host-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021807" comment="dotnet-hostfxr-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021820" comment="dotnet-hostfxr-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021808" comment="dotnet-runtime-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021821" comment="dotnet-runtime-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021809" comment="dotnet-runtime-dbg-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021822" comment="dotnet-runtime-dbg-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021810" comment="dotnet-sdk-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021811" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021823" comment="dotnet-sdk-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021824" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021825" comment="dotnet-sdk-aot-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021812" comment="dotnet-sdk-dbg-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021826" comment="dotnet-sdk-dbg-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021813" comment="dotnet-targeting-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021827" comment="dotnet-targeting-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021814" comment="dotnet-templates-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021828" comment="dotnet-templates-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021829" comment="netstandard-targeting-pack-2.1-9.0.111-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55248</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55248" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55248" ref_url="https://www.suse.com/security/cve/CVE-2025-55248" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18149" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002107.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18150" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002106.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18151" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002108.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2025-10-18"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55248/">CVE-2025-55248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55248">CVE-2025-55248 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021803" comment="aspnetcore-runtime-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021815" comment="aspnetcore-runtime-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021804" comment="aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021816" comment="aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021805" comment="aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021817" comment="aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021806" comment="dotnet-apphost-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021818" comment="dotnet-apphost-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021819" comment="dotnet-host-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021807" comment="dotnet-hostfxr-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021820" comment="dotnet-hostfxr-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021808" comment="dotnet-runtime-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021821" comment="dotnet-runtime-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021809" comment="dotnet-runtime-dbg-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021822" comment="dotnet-runtime-dbg-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021810" comment="dotnet-sdk-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021811" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021823" comment="dotnet-sdk-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021824" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021825" comment="dotnet-sdk-aot-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021812" comment="dotnet-sdk-dbg-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021826" comment="dotnet-sdk-dbg-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021813" comment="dotnet-targeting-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021827" comment="dotnet-targeting-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021814" comment="dotnet-templates-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021828" comment="dotnet-templates-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021829" comment="netstandard-targeting-pack-2.1-9.0.111-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55315</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55315" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55315" ref_url="https://www.suse.com/security/cve/CVE-2025-55315" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18149" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002107.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18150" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002106.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18151" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002108.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-17"/>
	<updated date="2025-10-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55315/">CVE-2025-55315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55315">CVE-2025-55315 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010021803" comment="aspnetcore-runtime-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021815" comment="aspnetcore-runtime-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021804" comment="aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021816" comment="aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021805" comment="aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021817" comment="aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021806" comment="dotnet-apphost-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021818" comment="dotnet-apphost-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021819" comment="dotnet-host-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021807" comment="dotnet-hostfxr-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021820" comment="dotnet-hostfxr-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021808" comment="dotnet-runtime-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021821" comment="dotnet-runtime-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021809" comment="dotnet-runtime-dbg-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021822" comment="dotnet-runtime-dbg-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021810" comment="dotnet-sdk-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021811" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021823" comment="dotnet-sdk-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021824" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021825" comment="dotnet-sdk-aot-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021812" comment="dotnet-sdk-dbg-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021826" comment="dotnet-sdk-dbg-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021813" comment="dotnet-targeting-pack-8.0-8.0.21-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021827" comment="dotnet-targeting-pack-9.0-9.0.10-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021814" comment="dotnet-templates-8.0-8.0.121-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021828" comment="dotnet-templates-9.0-9.0.111-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010021829" comment="netstandard-targeting-pack-2.1-9.0.111-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55752</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23044" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002390.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002284.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045349.html" source="SUSE-SU"/>
    <description>
    Relative Path Traversal vulnerability in Apache Tomcat.

The fix for bug 60013 introduced a regression where the       rewritten URL was normalized before it was decoded. This introduced the       possibility that, for rewrite rules that rewrite query parameters to the       URL, an attacker could manipulate the request URI to bypass security       constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.



This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.

The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252753">SUSE bug 1252753</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054368" comment="tomcat-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054369" comment="tomcat-admin-webapps-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054370" comment="tomcat-docs-webapp-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054371" comment="tomcat-el-3.0-api-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054372" comment="tomcat-jsp-2.3-api-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054373" comment="tomcat-lib-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054374" comment="tomcat-servlet-4.0-api-9.0.87-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054375" comment="tomcat-webapps-9.0.87-6.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55753</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55753" ref_url="https://www.suse.com/security/cve/CVE-2025-55753" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23739" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003175.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0094" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.

This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.


Users are recommended to upgrade to version 2.4.66, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55753/">CVE-2025-55753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55753">CVE-2025-55753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254511">SUSE bug 1254511</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054529" comment="mod_md-2.4.26-1.el9_7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5702" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5702" ref_url="https://www.suse.com/security/cve/CVE-2025-5702" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9877" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001703.html" source="SUSE-SU"/>
    <description>
    The strcmp implementation optimized for the Power10 processor in the GNU C Library version 2.39 and later writes to vector registers v20 to v31 without saving contents from the caller (those registers are defined as non-volatile registers by the powerpc64le ABI), resulting in overwriting of its contents and potentially altering control flow of the caller, or leaking the input strings to the function to other parts of the program.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-02"/>
	<updated date="2025-07-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5702/">CVE-2025-5702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5702">CVE-2025-5702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244182">SUSE bug 1244182</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009997710" comment="glibc-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997711" comment="glibc-all-langpacks-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997712" comment="glibc-benchtests-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997713" comment="glibc-common-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997714" comment="glibc-devel-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997715" comment="glibc-doc-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997716" comment="glibc-gconv-extra-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997717" comment="glibc-headers-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997718" comment="glibc-langpack-aa-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997719" comment="glibc-langpack-af-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997720" comment="glibc-langpack-agr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997721" comment="glibc-langpack-ak-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997722" comment="glibc-langpack-am-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997723" comment="glibc-langpack-an-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997724" comment="glibc-langpack-anp-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997725" comment="glibc-langpack-ar-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997726" comment="glibc-langpack-as-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997727" comment="glibc-langpack-ast-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997728" comment="glibc-langpack-ayc-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997729" comment="glibc-langpack-az-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997730" comment="glibc-langpack-be-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997731" comment="glibc-langpack-bem-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997732" comment="glibc-langpack-ber-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997733" comment="glibc-langpack-bg-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997734" comment="glibc-langpack-bhb-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997735" comment="glibc-langpack-bho-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997736" comment="glibc-langpack-bi-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997737" comment="glibc-langpack-bn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997738" comment="glibc-langpack-bo-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997739" comment="glibc-langpack-br-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997740" comment="glibc-langpack-brx-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997741" comment="glibc-langpack-bs-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997742" comment="glibc-langpack-byn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997743" comment="glibc-langpack-ca-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997744" comment="glibc-langpack-ce-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997745" comment="glibc-langpack-chr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997746" comment="glibc-langpack-ckb-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997747" comment="glibc-langpack-cmn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997748" comment="glibc-langpack-crh-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997749" comment="glibc-langpack-cs-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997750" comment="glibc-langpack-csb-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997751" comment="glibc-langpack-cv-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997752" comment="glibc-langpack-cy-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997753" comment="glibc-langpack-da-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997754" comment="glibc-langpack-de-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997755" comment="glibc-langpack-doi-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997756" comment="glibc-langpack-dsb-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997757" comment="glibc-langpack-dv-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997758" comment="glibc-langpack-dz-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997759" comment="glibc-langpack-el-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997760" comment="glibc-langpack-en-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997761" comment="glibc-langpack-eo-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997762" comment="glibc-langpack-es-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997763" comment="glibc-langpack-et-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997764" comment="glibc-langpack-eu-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997765" comment="glibc-langpack-fa-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997766" comment="glibc-langpack-ff-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997767" comment="glibc-langpack-fi-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997768" comment="glibc-langpack-fil-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997769" comment="glibc-langpack-fo-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997770" comment="glibc-langpack-fr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997771" comment="glibc-langpack-fur-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997772" comment="glibc-langpack-fy-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997773" comment="glibc-langpack-ga-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997774" comment="glibc-langpack-gd-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997775" comment="glibc-langpack-gez-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997776" comment="glibc-langpack-gl-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997777" comment="glibc-langpack-gu-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997778" comment="glibc-langpack-gv-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997779" comment="glibc-langpack-ha-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997780" comment="glibc-langpack-hak-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997781" comment="glibc-langpack-he-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997782" comment="glibc-langpack-hi-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997783" comment="glibc-langpack-hif-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997784" comment="glibc-langpack-hne-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997785" comment="glibc-langpack-hr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997786" comment="glibc-langpack-hsb-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997787" comment="glibc-langpack-ht-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997788" comment="glibc-langpack-hu-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997789" comment="glibc-langpack-hy-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997790" comment="glibc-langpack-ia-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997791" comment="glibc-langpack-id-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997792" comment="glibc-langpack-ig-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997793" comment="glibc-langpack-ik-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997794" comment="glibc-langpack-is-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997795" comment="glibc-langpack-it-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997796" comment="glibc-langpack-iu-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997797" comment="glibc-langpack-ja-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997798" comment="glibc-langpack-ka-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997799" comment="glibc-langpack-kab-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997800" comment="glibc-langpack-kk-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997801" comment="glibc-langpack-kl-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997802" comment="glibc-langpack-km-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997803" comment="glibc-langpack-kn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997804" comment="glibc-langpack-ko-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997805" comment="glibc-langpack-kok-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997806" comment="glibc-langpack-ks-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997807" comment="glibc-langpack-ku-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997808" comment="glibc-langpack-kw-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997809" comment="glibc-langpack-ky-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997810" comment="glibc-langpack-lb-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997811" comment="glibc-langpack-lg-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997812" comment="glibc-langpack-li-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997813" comment="glibc-langpack-lij-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997814" comment="glibc-langpack-ln-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997815" comment="glibc-langpack-lo-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997816" comment="glibc-langpack-lt-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997817" comment="glibc-langpack-lv-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997818" comment="glibc-langpack-lzh-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997819" comment="glibc-langpack-mag-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997820" comment="glibc-langpack-mai-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997821" comment="glibc-langpack-mfe-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997822" comment="glibc-langpack-mg-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997823" comment="glibc-langpack-mhr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997824" comment="glibc-langpack-mi-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997825" comment="glibc-langpack-miq-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997826" comment="glibc-langpack-mjw-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997827" comment="glibc-langpack-mk-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997828" comment="glibc-langpack-ml-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997829" comment="glibc-langpack-mn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997830" comment="glibc-langpack-mni-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997831" comment="glibc-langpack-mnw-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997832" comment="glibc-langpack-mr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997833" comment="glibc-langpack-ms-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997834" comment="glibc-langpack-mt-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997835" comment="glibc-langpack-my-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997836" comment="glibc-langpack-nan-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997837" comment="glibc-langpack-nb-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997838" comment="glibc-langpack-nds-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997839" comment="glibc-langpack-ne-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997840" comment="glibc-langpack-nhn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997841" comment="glibc-langpack-niu-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997842" comment="glibc-langpack-nl-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997843" comment="glibc-langpack-nn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997844" comment="glibc-langpack-nr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997845" comment="glibc-langpack-nso-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997846" comment="glibc-langpack-oc-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997847" comment="glibc-langpack-om-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997848" comment="glibc-langpack-or-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997849" comment="glibc-langpack-os-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997850" comment="glibc-langpack-pa-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997851" comment="glibc-langpack-pap-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997852" comment="glibc-langpack-pl-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997853" comment="glibc-langpack-ps-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997854" comment="glibc-langpack-pt-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997855" comment="glibc-langpack-quz-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997856" comment="glibc-langpack-raj-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997857" comment="glibc-langpack-ro-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997858" comment="glibc-langpack-ru-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997859" comment="glibc-langpack-rw-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997860" comment="glibc-langpack-sa-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997861" comment="glibc-langpack-sah-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997862" comment="glibc-langpack-sat-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997863" comment="glibc-langpack-sc-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997864" comment="glibc-langpack-sd-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997865" comment="glibc-langpack-se-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997866" comment="glibc-langpack-sgs-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997867" comment="glibc-langpack-shn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997868" comment="glibc-langpack-shs-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997869" comment="glibc-langpack-si-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997870" comment="glibc-langpack-sid-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997871" comment="glibc-langpack-sk-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997872" comment="glibc-langpack-sl-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997873" comment="glibc-langpack-sm-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997874" comment="glibc-langpack-so-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997875" comment="glibc-langpack-sq-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997876" comment="glibc-langpack-sr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997877" comment="glibc-langpack-ss-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997878" comment="glibc-langpack-st-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997879" comment="glibc-langpack-sv-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997880" comment="glibc-langpack-sw-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997881" comment="glibc-langpack-szl-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997882" comment="glibc-langpack-ta-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997883" comment="glibc-langpack-tcy-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997884" comment="glibc-langpack-te-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997885" comment="glibc-langpack-tg-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997886" comment="glibc-langpack-th-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997887" comment="glibc-langpack-the-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997888" comment="glibc-langpack-ti-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997889" comment="glibc-langpack-tig-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997890" comment="glibc-langpack-tk-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997891" comment="glibc-langpack-tl-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997892" comment="glibc-langpack-tn-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997893" comment="glibc-langpack-to-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997894" comment="glibc-langpack-tpi-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997895" comment="glibc-langpack-tr-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997896" comment="glibc-langpack-ts-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997897" comment="glibc-langpack-tt-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997898" comment="glibc-langpack-ug-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997899" comment="glibc-langpack-uk-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997900" comment="glibc-langpack-unm-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997901" comment="glibc-langpack-ur-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997902" comment="glibc-langpack-uz-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997903" comment="glibc-langpack-ve-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997904" comment="glibc-langpack-vi-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997905" comment="glibc-langpack-wa-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997906" comment="glibc-langpack-wae-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997907" comment="glibc-langpack-wal-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997908" comment="glibc-langpack-wo-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997909" comment="glibc-langpack-xh-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997910" comment="glibc-langpack-yi-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997911" comment="glibc-langpack-yo-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997912" comment="glibc-langpack-yue-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997913" comment="glibc-langpack-yuw-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997914" comment="glibc-langpack-zh-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997915" comment="glibc-langpack-zu-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997916" comment="glibc-locale-source-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997917" comment="glibc-minimal-langpack-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997918" comment="glibc-nss-devel-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997919" comment="glibc-static-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997920" comment="glibc-utils-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997921" comment="libnsl-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997922" comment="nscd-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997923" comment="nss_db-2.34-168.el9_6.20 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009997924" comment="nss_hesiod-2.34-168.el9_6.20 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58060</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002001.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001997.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17054" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-16"/>
	<updated date="2026-03-05"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249049">SUSE bug 1249049</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018057" comment="cups-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018058" comment="cups-client-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018059" comment="cups-devel-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018060" comment="cups-filesystem-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018061" comment="cups-ipptool-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018062" comment="cups-libs-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018063" comment="cups-lpd-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018064" comment="cups-printerapp-2.3.3op2-33.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58098</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58098" ref_url="https://www.suse.com/security/cve/CVE-2025-58098" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0017" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002434.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003135.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0090" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58098/">CVE-2025-58098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098">CVE-2025-58098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254512">SUSE bug 1254512</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054532" comment="httpd-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054533" comment="httpd-core-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054534" comment="httpd-devel-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054535" comment="httpd-filesystem-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054536" comment="httpd-manual-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054537" comment="httpd-tools-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054538" comment="mod_ldap-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054539" comment="mod_lua-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054540" comment="mod_proxy_html-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054541" comment="mod_session-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054542" comment="mod_ssl-2.4.62-7.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58183</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58183" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21778" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002262.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21964" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002266.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22030" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002275.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22668" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002272.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23002" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003156.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23325" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23326" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003130.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23394" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002335.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23948" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251261">SUSE bug 1251261</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054274" comment="buildah-1.41.6-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054275" comment="buildah-tests-1.41.6-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054222" comment="delve-1.25.2-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054223" comment="go-toolset-1.25.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054224" comment="golang-1.25.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054225" comment="golang-bin-1.25.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054226" comment="golang-docs-1.25.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054227" comment="golang-misc-1.25.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054228" comment="golang-race-1.25.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054229" comment="golang-src-1.25.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054230" comment="golang-tests-1.25.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054402" comment="grafana-10.2.6-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054403" comment="grafana-selinux-10.2.6-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054495" comment="podman-5.6.0-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054496" comment="podman-docker-5.6.0-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054497" comment="podman-plugins-5.6.0-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054498" comment="podman-remote-5.6.0-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054499" comment="podman-tests-5.6.0-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054500" comment="skopeo-1.20.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054501" comment="skopeo-tests-1.20.0-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58364</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58364" ref_url="https://www.suse.com/security/cve/CVE-2025-58364" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002001.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups &amp; cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-16"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58364/">CVE-2025-58364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58364">CVE-2025-58364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249128">SUSE bug 1249128</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018057" comment="cups-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018058" comment="cups-client-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018059" comment="cups-devel-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018060" comment="cups-filesystem-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018061" comment="cups-ipptool-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018062" comment="cups-libs-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018063" comment="cups-lpd-2.3.3op2-33.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018064" comment="cups-printerapp-2.3.3op2-33.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58436</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58436" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0312" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0596" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244057">SUSE bug 1244057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054588" comment="cups-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054589" comment="cups-client-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054590" comment="cups-devel-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054591" comment="cups-filesystem-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054592" comment="cups-ipptool-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054593" comment="cups-libs-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054594" comment="cups-lpd-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054595" comment="cups-printerapp-2.3.3op2-34.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58767" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58767" ref_url="https://www.suse.com/security/cve/CVE-2025-58767" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003131.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024943.html" source="SUSE-SU"/>
    <description>
    REXML is an XML toolkit for Ruby. The REXML gems from 3.3.3 to 3.4.1 has a DoS vulnerability when parsing XML containing multiple XML declarations. If you need to parse untrusted XMLs, you may be impacted to these vulnerabilities. The REXML gem 3.4.2 or later include the patches to fix these vulnerabilities.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58767/">CVE-2025-58767 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58767">CVE-2025-58767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250016">SUSE bug 1250016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054376" comment="ruby-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054377" comment="ruby-bundled-gems-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054378" comment="ruby-default-gems-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054379" comment="ruby-devel-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054380" comment="ruby-doc-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054381" comment="ruby-libs-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054382" comment="rubygem-bigdecimal-3.1.5-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054383" comment="rubygem-bundler-2.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054384" comment="rubygem-io-console-0.7.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054385" comment="rubygem-irb-1.13.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054386" comment="rubygem-json-2.7.2-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054387" comment="rubygem-minitest-5.20.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054388" comment="rubygem-mysql2-0.5.5-3.module+el9.7.0+23362+7018fe7e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054389" comment="rubygem-mysql2-doc-0.5.5-3.module+el9.7.0+23362+7018fe7e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054390" comment="rubygem-power_assert-2.0.3-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054391" comment="rubygem-psych-5.1.2-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054392" comment="rubygem-racc-1.7.3-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054393" comment="rubygem-rake-13.1.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054394" comment="rubygem-rbs-3.4.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054395" comment="rubygem-rdoc-6.6.3.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054396" comment="rubygem-rexml-3.4.4-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054397" comment="rubygem-rss-0.3.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054398" comment="rubygem-test-unit-3.6.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054399" comment="rubygem-typeprof-0.21.9-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054400" comment="rubygems-3.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054401" comment="rubygems-devel-3.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59088</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59088" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59088" ref_url="https://www.suse.com/security/cve/CVE-2025-59088" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21138" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002259.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21139" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003112.html" source="SUSE-SU"/>
    <description>
    If kdcproxy receives a request for a realm which does not have server addresses defined in its configuration, by default, it will query SRV records in the DNS zone matching the requested realm name. This creates a server-side request forgery vulnerability, since an attacker could send a request for a realm matching a DNS zone where they created SRV records pointing to arbitrary ports and hostnames (which may resolve to loopback or internal IP addresses). This vulnerability can be exploited to probe internal network topology and firewall rules, perform port scanning, and exfiltrate data. Deployments where
the "use_dns" setting is explicitly set to false are not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59088/">CVE-2025-59088 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59088">CVE-2025-59088 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054172" comment="python3-kdcproxy-1.0.0-9.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59089</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59089" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59089" ref_url="https://www.suse.com/security/cve/CVE-2025-59089" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21138" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002259.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21139" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003112.html" source="SUSE-SU"/>
    <description>
    If an attacker causes kdcproxy to connect to an attacker-controlled KDC server (e.g. through server-side request forgery), they can exploit the fact that kdcproxy does not enforce bounds on TCP response length to conduct a denial-of-service attack. While receiving the KDC's response, kdcproxy copies the entire buffered stream into a new
buffer on each recv() call, even when the transfer is incomplete, causing excessive memory allocation and CPU usage. Additionally, kdcproxy accepts incoming response chunks as long as the received data length is not exactly equal to the length indicated in the response
header, even when individual chunks or the total buffer exceed the maximum length of a Kerberos message. This allows an attacker to send unbounded data until the connection timeout is reached (approximately 12 seconds), exhausting server memory or CPU resources. Multiple concurrent requests can cause accept queue overflow, denying service to legitimate clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-59089/">CVE-2025-59089 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59089">CVE-2025-59089 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054172" comment="python3-kdcproxy-1.0.0-9.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5914</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5914" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5914" ref_url="https://www.suse.com/security/cve/CVE-2025-5914" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14130" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001932.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14135" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001931.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02522-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02718-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022368.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-27"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5914/">CVE-2025-5914 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5914">CVE-2025-5914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244272">SUSE bug 1244272</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010015587" comment="bsdtar-3.5.3-6.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015588" comment="libarchive-3.5.3-6.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010015589" comment="libarchive-devel-3.5.3-6.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59375</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21773" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21776" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002247.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002294.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22175" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3407" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03508-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249584">SUSE bug 1249584</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054276" comment="expat-2.5.0-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054277" comment="expat-devel-2.5.0-5.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59465</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2767" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2864" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:
```
server.on('secureConnection', socket =&gt; {
  socket.on('error', err =&gt; {
    console.log(err)
  })
})
```
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256573">SUSE bug 1256573</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055169" comment="nodejs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055170" comment="nodejs-devel-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055171" comment="nodejs-docs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055172" comment="nodejs-full-i18n-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055173" comment="nodejs-libs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055174" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055175" comment="nodejs-packaging-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055176" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055177" comment="npm-11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055188" comment="v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055178" comment="v8-13.6-devel-13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59466</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    We have identified a bug in Node.js error handling where "Maximum call stack size exceeded" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on('uncaughtException')`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256574">SUSE bug 1256574</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055169" comment="nodejs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055170" comment="nodejs-devel-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055171" comment="nodejs-docs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055172" comment="nodejs-full-i18n-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055173" comment="nodejs-libs-24.13.0-1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055174" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055175" comment="nodejs-packaging-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055176" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055177" comment="npm-11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055188" comment="v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055178" comment="v8-13.6-devel-13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59830</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59830" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59830" ref_url="https://www.suse.com/security/cve/CVE-2025-59830" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19512" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002167.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002181.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003125.html" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &amp;, while still splitting on both &amp; and ;. As a result, attackers could use ; separators to bypass the parameter count limit and submit more parameters than intended. Applications or middleware that directly invoke Rack::QueryParser with its default configuration (no explicit delimiter) could be exposed to increased CPU and memory consumption. This can be abused as a limited denial-of-service vector. This issue has been patched in version 2.2.18.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-59830/">CVE-2025-59830 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59830">CVE-2025-59830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250552">SUSE bug 1250552</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054150" comment="pcs-0.11.10-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054151" comment="pcs-snmp-0.11.10-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5986</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5986" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5986" ref_url="https://www.suse.com/security/cve/CVE-2025-5986" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10196" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001759.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040535.html" source="SUSE-SU"/>
    <description>
    A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability was fixed in Thunderbird 128.11.1 and Thunderbird 139.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-5986/">CVE-2025-5986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5986">CVE-2025-5986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244468">SUSE bug 1244468</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998072" comment="thunderbird-128.12.0-1.el9_6 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5987</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5987" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5987" ref_url="https://www.suse.com/security/cve/CVE-2025-5987" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23483" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003152.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20557-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022366.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libssh when using the ChaCha20 cipher with the OpenSSL library. If an attacker manages to exhaust the heap space, this error is not detected and may lead to libssh using a partially initialized cipher context. This occurs because the OpenSSL error code returned aliases with the SSH_OK code, resulting in libssh not properly detecting the error returned by the OpenSSL library. This issue can lead to undefined behavior, including compromised data confidentiality and integrity or crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5987/">CVE-2025-5987 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5987">CVE-2025-5987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245317">SUSE bug 1245317</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054522" comment="libssh-0.10.4-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054523" comment="libssh-config-0.10.4-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054524" comment="libssh-devel-0.10.4-17.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5994" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5994" ref_url="https://www.suse.com/security/cve/CVE-2025-5994" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11849" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001842.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11884" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001845.html" source="SUSE-SU"/>
    <description>
    A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-29"/>
	<updated date="2025-07-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-5994/">CVE-2025-5994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5994">CVE-2025-5994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246625">SUSE bug 1246625</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010539" comment="python3-unbound-1.16.2-19.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010540" comment="unbound-1.16.2-19.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010541" comment="unbound-devel-1.16.2-19.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010542" comment="unbound-dracut-1.16.2-19.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010543" comment="unbound-libs-1.16.2-19.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6019</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6019" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6019" ref_url="https://www.suse.com/security/cve/CVE-2025-6019" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10796" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002481.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9327" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001685.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9878" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02043-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02044-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20426-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040565.html" source="SUSE-SU"/>
    <description>
    A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the "allow_active" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an "allow_active" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation.  However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-06-27"/>
	<updated date="2026-02-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6019/">CVE-2025-6019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6019">CVE-2025-6019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243285">SUSE bug 1243285</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009996904" comment="libblockdev-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996905" comment="libblockdev-crypto-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996906" comment="libblockdev-dm-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996907" comment="libblockdev-fs-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996908" comment="libblockdev-kbd-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996909" comment="libblockdev-loop-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996910" comment="libblockdev-lvm-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996911" comment="libblockdev-lvm-dbus-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996912" comment="libblockdev-mdraid-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996913" comment="libblockdev-mpath-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996914" comment="libblockdev-nvdimm-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996915" comment="libblockdev-nvme-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996916" comment="libblockdev-part-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996917" comment="libblockdev-plugins-all-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996918" comment="libblockdev-swap-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996919" comment="libblockdev-tools-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996920" comment="libblockdev-utils-2.28-14.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009996921" comment="python3-blockdev-2.28-14.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6020</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6020" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6020" ref_url="https://www.suse.com/security/cve/CVE-2025-6020" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10027" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001746.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10357" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001824.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14557" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001988.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15099" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001966.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9526" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02013-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040564.html" source="SUSE-SU"/>
    <description>
    A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-02"/>
	<updated date="2025-09-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6020/">CVE-2025-6020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6020">CVE-2025-6020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244509">SUSE bug 1244509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016906" comment="pam-1.5.1-26.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016907" comment="pam-devel-1.5.1-26.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016908" comment="pam-docs-1.5.1-26.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6021</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6021" ref_url="https://www.suse.com/security/cve/CVE-2025-6021" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10698" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10699" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02275-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-11"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6021/">CVE-2025-6021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6021">CVE-2025-6021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244580">SUSE bug 1244580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999607" comment="libxml2-2.9.13-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999608" comment="libxml2-devel-2.9.13-10.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999609" comment="python3-libxml2-2.9.13-10.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6032" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10550" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001767.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10551" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20692-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20805-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-10"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245320">SUSE bug 1245320</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009999418" comment="podman-5.4.0-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999419" comment="podman-docker-5.4.0-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999420" comment="podman-plugins-5.4.0-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999421" comment="podman-remote-5.4.0-12.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009999422" comment="podman-tests-5.4.0-12.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6069</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6069" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02597-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244705">SUSE bug 1244705</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054505" comment="python-unversioned-command-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054506" comment="python3-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054507" comment="python3-debug-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054508" comment="python3-devel-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054509" comment="python3-idle-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054510" comment="python3-libs-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054511" comment="python3-test-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054512" comment="python3-tkinter-3.9.25-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6075</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6075" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    If the value passed to os.path.expandvars() is user-controlled a 
performance degradation is possible when expanding environment 
variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252974">SUSE bug 1252974</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054505" comment="python-unversioned-command-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054506" comment="python3-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054507" comment="python3-debug-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054508" comment="python3-devel-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054509" comment="python3-idle-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054510" comment="python3-libs-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054511" comment="python3-test-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054512" comment="python3-tkinter-3.9.25-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61594</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61594" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61594" ref_url="https://www.suse.com/security/cve/CVE-2025-61594" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003131.html" source="SUSE-SU"/>
    <description>
    URI is a module providing classes to handle Uniform Resource Identifiers. In versions prior to 0.12.5, 0.13.3, and 1.0.4, a bypass exists for the fix to CVE-2025-27221 that can expose user credentials. When using the `+` operator to combine URIs, sensitive information like passwords from the original URI can be leaked, violating RFC3986 and making applications vulnerable to credential exposure. Versions 0.12.5, 0.13.3, and 1.0.4 fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61594/">CVE-2025-61594 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61594">CVE-2025-61594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255833">SUSE bug 1255833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054376" comment="ruby-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054377" comment="ruby-bundled-gems-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054378" comment="ruby-default-gems-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054379" comment="ruby-devel-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054380" comment="ruby-doc-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054381" comment="ruby-libs-3.3.10-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054382" comment="rubygem-bigdecimal-3.1.5-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054383" comment="rubygem-bundler-2.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054384" comment="rubygem-io-console-0.7.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054385" comment="rubygem-irb-1.13.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054386" comment="rubygem-json-2.7.2-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054387" comment="rubygem-minitest-5.20.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054388" comment="rubygem-mysql2-0.5.5-3.module+el9.7.0+23362+7018fe7e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054389" comment="rubygem-mysql2-doc-0.5.5-3.module+el9.7.0+23362+7018fe7e is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874726" comment="rubygem-pg-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009874727" comment="rubygem-pg-doc-1.5.4-1.module+el9.4.0+21222+faeeed2f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054390" comment="rubygem-power_assert-2.0.3-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054391" comment="rubygem-psych-5.1.2-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054392" comment="rubygem-racc-1.7.3-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054393" comment="rubygem-rake-13.1.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054394" comment="rubygem-rbs-3.4.0-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054395" comment="rubygem-rdoc-6.6.3.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054396" comment="rubygem-rexml-3.4.4-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054397" comment="rubygem-rss-0.3.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054398" comment="rubygem-test-unit-3.6.1-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054399" comment="rubygem-typeprof-0.21.9-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054400" comment="rubygems-3.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054401" comment="rubygems-devel-3.5.22-5.module+el9.7.0+23651+15dc1615 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61662</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002611.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002610.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002582.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003262.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4823" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252933">SUSE bug 1252933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055765" comment="grub2-common-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055766" comment="grub2-efi-x64-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055767" comment="grub2-efi-x64-cdboot-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055768" comment="grub2-efi-x64-modules-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055769" comment="grub2-pc-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055770" comment="grub2-pc-modules-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055771" comment="grub2-tools-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055772" comment="grub2-tools-efi-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055773" comment="grub2-tools-extra-2.06-114.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055774" comment="grub2-tools-minimal-2.06-114.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61726</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2708" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2709" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003187.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3040" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003189.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002527.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002529.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3291" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003194.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003257.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003238.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003254.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003239.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3668" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003195.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3814" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002539.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3817" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002578.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3839" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003241.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003245.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3929" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002554.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3985" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002559.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4672" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256817">SUSE bug 1256817</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055495" comment="buildah-1.41.8-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055496" comment="buildah-tests-1.41.8-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055506" comment="containernetworking-plugins-1.7.1-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055594" comment="git-lfs-3.6.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055558" comment="go-filesystem-3.6.0-13.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055559" comment="go-rpm-macros-3.6.0-13.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055560" comment="go-rpm-templates-3.6.0-13.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055561" comment="go-srpm-macros-3.6.0-13.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055124" comment="go-toolset-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055125" comment="golang-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055126" comment="golang-bin-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055127" comment="golang-docs-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055128" comment="golang-misc-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055129" comment="golang-race-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055130" comment="golang-src-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055131" comment="golang-tests-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055437" comment="grafana-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055443" comment="grafana-pcp-5.1.1-12.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055438" comment="grafana-selinux-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055577" comment="image-builder-31-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055497" comment="podman-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055498" comment="podman-docker-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055499" comment="podman-plugins-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055500" comment="podman-remote-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055501" comment="podman-tests-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055494" comment="runc-1.4.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055504" comment="skopeo-1.20.0-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055505" comment="skopeo-tests-1.20.0-3.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61728</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61728" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2708" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2709" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003187.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002529.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003238.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4672" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256816">SUSE bug 1256816</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055124" comment="go-toolset-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055125" comment="golang-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055126" comment="golang-bin-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055127" comment="golang-docs-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055128" comment="golang-misc-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055129" comment="golang-race-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055130" comment="golang-src-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055131" comment="golang-tests-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055437" comment="grafana-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055438" comment="grafana-selinux-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055497" comment="podman-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055498" comment="podman-docker-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055499" comment="podman-plugins-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055500" comment="podman-remote-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055501" comment="podman-tests-5.6.0-14.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61729</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0921" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002407.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0923" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003172.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1344" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002440.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002439.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2323" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002488.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3040" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003189.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3291" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003194.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003257.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003238.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003254.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003239.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002535.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3817" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002578.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3839" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003241.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003245.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3929" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254431">SUSE bug 1254431</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055495" comment="buildah-1.41.8-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055496" comment="buildah-tests-1.41.8-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055506" comment="containernetworking-plugins-1.7.1-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055594" comment="git-lfs-3.6.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054743" comment="go-toolset-1.25.5-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054744" comment="golang-1.25.5-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054745" comment="golang-bin-1.25.5-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054746" comment="golang-docs-1.25.5-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054747" comment="golang-misc-1.25.5-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054748" comment="golang-race-1.25.5-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054749" comment="golang-src-1.25.5-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054750" comment="golang-tests-1.25.5-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055437" comment="grafana-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055443" comment="grafana-pcp-5.1.1-12.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055438" comment="grafana-selinux-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055577" comment="image-builder-31-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055497" comment="podman-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055498" comment="podman-docker-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055499" comment="podman-plugins-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055500" comment="podman-remote-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055501" comment="podman-tests-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055494" comment="runc-1.4.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055504" comment="skopeo-1.20.0-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055505" comment="skopeo-tests-1.20.0-3.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61731" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5942" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5944" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002629.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256819">SUSE bug 1256819</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055826" comment="go-toolset-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055827" comment="golang-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055828" comment="golang-bin-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055829" comment="golang-docs-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055830" comment="golang-misc-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055831" comment="golang-race-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055832" comment="golang-src-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055833" comment="golang-tests-1.25.8-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2708" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2709" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003187.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257692">SUSE bug 1257692</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055124" comment="go-toolset-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055125" comment="golang-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055126" comment="golang-bin-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055127" comment="golang-docs-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055128" comment="golang-misc-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055129" comment="golang-race-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055130" comment="golang-src-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055131" comment="golang-tests-1.25.7-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61748</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61748" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-25"/>
	<updated date="2025-12-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252418">SUSE bug 1252418</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010023394" comment="java-21-openjdk-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023395" comment="java-21-openjdk-demo-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023396" comment="java-21-openjdk-demo-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023397" comment="java-21-openjdk-demo-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023398" comment="java-21-openjdk-devel-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023399" comment="java-21-openjdk-devel-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023400" comment="java-21-openjdk-devel-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023401" comment="java-21-openjdk-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023402" comment="java-21-openjdk-headless-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023403" comment="java-21-openjdk-headless-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023404" comment="java-21-openjdk-headless-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023405" comment="java-21-openjdk-javadoc-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023406" comment="java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023407" comment="java-21-openjdk-jmods-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023408" comment="java-21-openjdk-jmods-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023409" comment="java-21-openjdk-jmods-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023410" comment="java-21-openjdk-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023411" comment="java-21-openjdk-src-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023412" comment="java-21-openjdk-src-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023413" comment="java-21-openjdk-src-slowdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023414" comment="java-21-openjdk-static-libs-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023415" comment="java-21-openjdk-static-libs-fastdebug-21.0.9.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010023416" comment="java-21-openjdk-static-libs-slowdebug-21.0.9.0.10-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6176" ref_url="https://www.suse.com/security/cve/CVE-2025-6176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2042" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003206.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2389" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002492.html" source="SUSE-SU"/>
    <description>
    Scrapy versions up to 2.13.2 are vulnerable to a denial of service (DoS) attack due to a flaw in its brotli decompression implementation. The protection mechanism against decompression bombs fails to mitigate the brotli variant, allowing remote servers to crash clients with less than 80GB of available memory. This occurs because brotli can achieve extremely high compression ratios for zero-filled data, leading to excessive memory consumption during decompression.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-6176/">CVE-2025-6176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6176">CVE-2025-6176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252945">SUSE bug 1252945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055068" comment="brotli-1.0.9-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055069" comment="brotli-devel-1.0.9-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055070" comment="libbrotli-1.0.9-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055071" comment="python3-brotli-1.0.9-9.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61770</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61770" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61770" ref_url="https://www.suse.com/security/cve/CVE-2025-61770" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19512" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002167.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002181.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003125.html" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart preamble (bytes before the first boundary) in memory without any size limit. A client can send a large preamble followed by a valid boundary, causing significant memory use and potential process termination due to out-of-memory (OOM) conditions. Remote attackers can trigger large transient memory spikes by including a long preamble in multipart/form-data requests. The impact scales with allowed request sizes and concurrency, potentially causing worker crashes or severe slowdown due to garbage collection. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a preamble size limit (e.g., 16 KiB) or discard preamble data entirely. Workarounds include limiting total request body size at the proxy or web server level and monitoring memory and set per-process limits to prevent OOM conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61770/">CVE-2025-61770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61770">CVE-2025-61770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251245">SUSE bug 1251245</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054150" comment="pcs-0.11.10-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054151" comment="pcs-snmp-0.11.10-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61771</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61771" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61771" ref_url="https://www.suse.com/security/cve/CVE-2025-61771" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19512" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002167.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002181.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003125.html" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, ``Rack::Multipart::Parser` stores non-file form fields (parts without a `filename`) entirely in memory as Ruby `String` objects. A single large text field in a multipart/form-data request (hundreds of megabytes or more) can consume equivalent process memory, potentially leading to out-of-memory (OOM) conditions and denial of service (DoS). Attackers can send large non-file fields to trigger excessive memory usage. Impact scales with request size and concurrency, potentially leading to worker crashes or severe garbage-collection overhead. All Rack applications processing multipart form submissions are affected. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a reasonable size cap for non-file fields (e.g., 2 MiB). Workarounds include restricting maximum request body size at the web-server or proxy layer (e.g., Nginx `client_max_body_size`) and validating and rejecting unusually large form fields at the application level.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61771/">CVE-2025-61771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61771">CVE-2025-61771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251243">SUSE bug 1251243</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054150" comment="pcs-0.11.10-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054151" comment="pcs-snmp-0.11.10-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61772</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61772" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61772" ref_url="https://www.suse.com/security/cve/CVE-2025-61772" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19512" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002167.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002181.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003125.html" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data when a multipart part's header block never terminates with the required blank line (`CRLFCRLF`). The parser keeps appending incoming bytes to memory without a size cap, allowing a remote attacker to exhaust memory and cause a denial of service (DoS). Attackers can send incomplete multipart headers to trigger high memory use, leading to process termination (OOM) or severe slowdown. The effect scales with request size limits and concurrency. All applications handling multipart uploads may be affected. Versions 2.2.19, 3.1.17, and 3.2.2 cap per-part header size (e.g., 64 KiB). As a workaround, restrict maximum request sizes at the proxy or web server layer (e.g., Nginx `client_max_body_size`).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61772/">CVE-2025-61772 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61772">CVE-2025-61772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251242">SUSE bug 1251242</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054150" comment="pcs-0.11.10-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054151" comment="pcs-snmp-0.11.10-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61915</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61915" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61915" ref_url="https://www.suse.com/security/cve/CVE-2025-61915" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0312" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0596" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61915/">CVE-2025-61915 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61915">CVE-2025-61915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253783">SUSE bug 1253783</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054588" comment="cups-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054589" comment="cups-client-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054590" comment="cups-devel-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054591" comment="cups-filesystem-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054592" comment="cups-ipptool-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054593" comment="cups-libs-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054594" comment="cups-lpd-2.3.3op2-34.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054595" comment="cups-printerapp-2.3.3op2-34.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61919</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61919" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19512" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002167.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002181.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023807.html" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, `Rack::Request#POST` reads the entire request body into memory for `Content-Type: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap. Large request bodies can therefore be buffered completely into process memory before parsing, leading to denial of service (DoS) through memory exhaustion. Users should upgrade to Rack version 2.2.20, 3.1.18, or 3.2.3, anu of which enforces form parameter limits using `query_parser.bytesize_limit`, preventing unbounded reads of `application/x-www-form-urlencoded` bodies. Additionally, enforce strict maximum body size at the proxy or web server layer (e.g., Nginx `client_max_body_size`, Apache `LimitRequestBody`).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251934">SUSE bug 1251934</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054150" comment="pcs-0.11.10-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054151" comment="pcs-snmp-0.11.10-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61984</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61984" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61984" ref_url="https://www.suse.com/security/cve/CVE-2025-61984" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23480" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002307.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024750.html" source="SUSE-SU"/>
    <description>
    ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61984/">CVE-2025-61984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984">CVE-2025-61984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251198">SUSE bug 1251198</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054516" comment="openssh-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054517" comment="openssh-askpass-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054518" comment="openssh-clients-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054519" comment="openssh-keycat-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054520" comment="openssh-server-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054521" comment="pam_ssh_agent_auth-0.10.4-5.47.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61985</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61985" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61985" ref_url="https://www.suse.com/security/cve/CVE-2025-61985" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23480" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002307.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024750.html" source="SUSE-SU"/>
    <description>
    ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61985/">CVE-2025-61985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985">CVE-2025-61985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251199">SUSE bug 1251199</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054516" comment="openssh-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054517" comment="openssh-askpass-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054518" comment="openssh-clients-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054519" comment="openssh-keycat-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054520" comment="openssh-server-8.7p1-47.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054521" comment="pam_ssh_agent_auth-0.10.4-5.47.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62168</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62168" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62168" ref_url="https://www.suse.com/security/cve/CVE-2025-62168" source="SUSE CVE"/>
		<reference ref_id="GHSA-c8cc-phh7-xmxr" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-c8cc-phh7-xmxr" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19107" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002130.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20935" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023819.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62168/">CVE-2025-62168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62168">CVE-2025-62168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252281">SUSE bug 1252281</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054081" comment="squid-5.5-22.el9_7.1 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251958">SUSE bug 1251958</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054131" comment="tigervnc-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054132" comment="tigervnc-icons-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054133" comment="tigervnc-license-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054134" comment="tigervnc-selinux-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054135" comment="tigervnc-server-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054136" comment="tigervnc-server-minimal-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054137" comment="tigervnc-server-module-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054142" comment="xorg-x11-server-Xdmx-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054143" comment="xorg-x11-server-Xephyr-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054144" comment="xorg-x11-server-Xnest-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054145" comment="xorg-x11-server-Xorg-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054146" comment="xorg-x11-server-Xvfb-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054140" comment="xorg-x11-server-Xwayland-23.2.7-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054141" comment="xorg-x11-server-Xwayland-devel-23.2.7-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054147" comment="xorg-x11-server-common-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054148" comment="xorg-x11-server-devel-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054149" comment="xorg-x11-server-source-1.20.11-32.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the X.Org X server's X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251959">SUSE bug 1251959</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054131" comment="tigervnc-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054132" comment="tigervnc-icons-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054133" comment="tigervnc-license-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054134" comment="tigervnc-selinux-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054135" comment="tigervnc-server-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054136" comment="tigervnc-server-minimal-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054137" comment="tigervnc-server-module-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054142" comment="xorg-x11-server-Xdmx-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054143" comment="xorg-x11-server-Xephyr-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054144" comment="xorg-x11-server-Xnest-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054145" comment="xorg-x11-server-Xorg-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054146" comment="xorg-x11-server-Xvfb-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054140" comment="xorg-x11-server-Xwayland-23.2.7-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054141" comment="xorg-x11-server-Xwayland-devel-23.2.7-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054147" comment="xorg-x11-server-common-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054148" comment="xorg-x11-server-devel-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054149" comment="xorg-x11-server-source-1.20.11-32.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the X.Org X server's X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-07"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251960">SUSE bug 1251960</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054131" comment="tigervnc-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054132" comment="tigervnc-icons-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054133" comment="tigervnc-license-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054134" comment="tigervnc-selinux-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054135" comment="tigervnc-server-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054136" comment="tigervnc-server-minimal-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054137" comment="tigervnc-server-module-1.15.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054142" comment="xorg-x11-server-Xdmx-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054143" comment="xorg-x11-server-Xephyr-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054144" comment="xorg-x11-server-Xnest-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054145" comment="xorg-x11-server-Xorg-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054146" comment="xorg-x11-server-Xvfb-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054140" comment="xorg-x11-server-Xwayland-23.2.7-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054141" comment="xorg-x11-server-Xwayland-devel-23.2.7-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054147" comment="xorg-x11-server-common-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054148" comment="xorg-x11-server-devel-1.20.11-32.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054149" comment="xorg-x11-server-source-1.20.11-32.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6395</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6395" ref_url="https://www.suse.com/security/cve/CVE-2025-6395" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16116" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002031.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17415" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02340-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022483.html" source="SUSE-SU"/>
    <description>
    A NULL pointer dereference flaw was found in the GnuTLS software in _gnutls_figure_common_ciphersuite().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-20"/>
	<updated date="2025-10-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6395/">CVE-2025-6395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6395">CVE-2025-6395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246299">SUSE bug 1246299</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010018662" comment="gnutls-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018663" comment="gnutls-c++-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018664" comment="gnutls-dane-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018665" comment="gnutls-devel-3.8.3-6.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010018666" comment="gnutls-utils-3.8.3-6.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6424</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6424" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10072" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001748.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10074" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001747.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability was fixed in Firefox 140, Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998055" comment="firefox-128.12.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998056" comment="firefox-x11-128.12.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998072" comment="thunderbird-128.12.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10072" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001748.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10074" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001747.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability was fixed in Firefox 140, Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998055" comment="firefox-128.12.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998056" comment="firefox-x11-128.12.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998072" comment="thunderbird-128.12.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6429</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6429" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10072" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001748.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10074" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001747.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Firefox could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an `embed` tag.  This could have bypassed website security checks that restricted which domains users were allowed to embed. This vulnerability was fixed in Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998055" comment="firefox-128.12.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998056" comment="firefox-x11-128.12.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998072" comment="thunderbird-128.12.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6430</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6430" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10072" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001748.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10074" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001747.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&amp;lt;embed&amp;gt;` or `&amp;lt;object&amp;gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability was fixed in Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009998055" comment="firefox-128.12.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998056" comment="firefox-x11-128.12.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009998072" comment="thunderbird-128.12.0-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64720</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254159">SUSE bug 1254159</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040212" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040213" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040214" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040215" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040216" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040217" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040218" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040219" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040220" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040221" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040222" comment="java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040223" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040224" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040225" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040226" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040227" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040228" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053475" comment="java-11-openjdk-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053476" comment="java-11-openjdk-demo-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053477" comment="java-11-openjdk-demo-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053478" comment="java-11-openjdk-demo-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053479" comment="java-11-openjdk-devel-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053480" comment="java-11-openjdk-devel-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053481" comment="java-11-openjdk-devel-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053482" comment="java-11-openjdk-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053483" comment="java-11-openjdk-headless-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053484" comment="java-11-openjdk-headless-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053485" comment="java-11-openjdk-headless-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053486" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053487" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053488" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053489" comment="java-11-openjdk-jmods-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053490" comment="java-11-openjdk-jmods-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053491" comment="java-11-openjdk-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053492" comment="java-11-openjdk-src-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053493" comment="java-11-openjdk-src-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053494" comment="java-11-openjdk-src-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053495" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053496" comment="java-11-openjdk-static-libs-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053497" comment="java-11-openjdk-static-libs-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039028" comment="java-17-openjdk-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039029" comment="java-17-openjdk-demo-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039030" comment="java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039031" comment="java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039032" comment="java-17-openjdk-devel-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039033" comment="java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039034" comment="java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039035" comment="java-17-openjdk-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039036" comment="java-17-openjdk-headless-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039037" comment="java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039038" comment="java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039039" comment="java-17-openjdk-javadoc-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039040" comment="java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039041" comment="java-17-openjdk-jmods-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039042" comment="java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039043" comment="java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039044" comment="java-17-openjdk-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039045" comment="java-17-openjdk-src-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039046" comment="java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039047" comment="java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039048" comment="java-17-openjdk-static-libs-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039049" comment="java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039050" comment="java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039592" comment="java-21-openjdk-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039593" comment="java-21-openjdk-demo-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039594" comment="java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039595" comment="java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039596" comment="java-21-openjdk-devel-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039597" comment="java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039598" comment="java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039599" comment="java-21-openjdk-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039600" comment="java-21-openjdk-headless-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039601" comment="java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039602" comment="java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039603" comment="java-21-openjdk-javadoc-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039604" comment="java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039605" comment="java-21-openjdk-jmods-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039606" comment="java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039607" comment="java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039608" comment="java-21-openjdk-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039609" comment="java-21-openjdk-src-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039610" comment="java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039611" comment="java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039612" comment="java-21-openjdk-static-libs-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039613" comment="java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039614" comment="java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054752" comment="java-25-openjdk-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054753" comment="java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054754" comment="java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054755" comment="java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054756" comment="java-25-openjdk-demo-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054757" comment="java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054758" comment="java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054759" comment="java-25-openjdk-devel-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054760" comment="java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054761" comment="java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054762" comment="java-25-openjdk-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054763" comment="java-25-openjdk-headless-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054764" comment="java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054765" comment="java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054766" comment="java-25-openjdk-javadoc-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054767" comment="java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054768" comment="java-25-openjdk-jmods-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054769" comment="java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054770" comment="java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054771" comment="java-25-openjdk-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054772" comment="java-25-openjdk-src-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054773" comment="java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054774" comment="java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054775" comment="java-25-openjdk-static-libs-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054776" comment="java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054777" comment="java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054572" comment="libpng-1.6.37-12.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054573" comment="libpng-devel-1.6.37-12.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6491" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6491" ref_url="https://www.suse.com/security/cve/CVE-2025-6491" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23309" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003150.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02474-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040895.html" source="SUSE-SU"/>
    <description>
    In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 when parsing XML data in SOAP extensions, overly large (&gt;2Gb) XML namespace prefix may lead to null pointer dereference. This may lead to crashes and affect the availability of the target server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6491/">CVE-2025-6491 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6491">CVE-2025-6491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246148">SUSE bug 1246148</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985382" comment="apcu-panel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054463" comment="php-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054464" comment="php-bcmath-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054465" comment="php-cli-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054466" comment="php-common-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054467" comment="php-dba-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054468" comment="php-dbg-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054469" comment="php-devel-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054470" comment="php-embedded-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054471" comment="php-enchant-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054472" comment="php-ffi-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054473" comment="php-fpm-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054474" comment="php-gd-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054475" comment="php-gmp-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054476" comment="php-intl-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054477" comment="php-ldap-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054478" comment="php-mbstring-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054479" comment="php-mysqlnd-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054480" comment="php-odbc-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054481" comment="php-opcache-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054482" comment="php-pdo-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985403" comment="php-pecl-apcu-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985404" comment="php-pecl-apcu-devel-5.1.23-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985405" comment="php-pecl-redis6-6.1.0-2.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985406" comment="php-pecl-rrd-2.0.3-4.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985407" comment="php-pecl-xdebug3-3.3.1-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985408" comment="php-pecl-zip-1.22.3-1.module+el9.6.0+22647+1741ae35 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054483" comment="php-pgsql-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054484" comment="php-process-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054485" comment="php-snmp-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054486" comment="php-soap-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054487" comment="php-xml-8.3.26-1.module+el9.7.0+23549+c13c2ce3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202565018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-65018</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-65018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254160">SUSE bug 1254160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040212" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040213" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040214" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040215" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040216" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040217" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040218" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040219" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040220" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040221" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040222" comment="java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040223" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040224" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040225" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040226" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040227" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040228" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053475" comment="java-11-openjdk-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053476" comment="java-11-openjdk-demo-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053477" comment="java-11-openjdk-demo-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053478" comment="java-11-openjdk-demo-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053479" comment="java-11-openjdk-devel-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053480" comment="java-11-openjdk-devel-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053481" comment="java-11-openjdk-devel-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053482" comment="java-11-openjdk-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053483" comment="java-11-openjdk-headless-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053484" comment="java-11-openjdk-headless-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053485" comment="java-11-openjdk-headless-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053486" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053487" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053488" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053489" comment="java-11-openjdk-jmods-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053490" comment="java-11-openjdk-jmods-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053491" comment="java-11-openjdk-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053492" comment="java-11-openjdk-src-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053493" comment="java-11-openjdk-src-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053494" comment="java-11-openjdk-src-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053495" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053496" comment="java-11-openjdk-static-libs-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053497" comment="java-11-openjdk-static-libs-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039028" comment="java-17-openjdk-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039029" comment="java-17-openjdk-demo-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039030" comment="java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039031" comment="java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039032" comment="java-17-openjdk-devel-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039033" comment="java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039034" comment="java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039035" comment="java-17-openjdk-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039036" comment="java-17-openjdk-headless-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039037" comment="java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039038" comment="java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039039" comment="java-17-openjdk-javadoc-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039040" comment="java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039041" comment="java-17-openjdk-jmods-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039042" comment="java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039043" comment="java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039044" comment="java-17-openjdk-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039045" comment="java-17-openjdk-src-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039046" comment="java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039047" comment="java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039048" comment="java-17-openjdk-static-libs-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039049" comment="java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039050" comment="java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039592" comment="java-21-openjdk-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039593" comment="java-21-openjdk-demo-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039594" comment="java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039595" comment="java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039596" comment="java-21-openjdk-devel-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039597" comment="java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039598" comment="java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039599" comment="java-21-openjdk-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039600" comment="java-21-openjdk-headless-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039601" comment="java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039602" comment="java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039603" comment="java-21-openjdk-javadoc-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039604" comment="java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039605" comment="java-21-openjdk-jmods-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039606" comment="java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039607" comment="java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039608" comment="java-21-openjdk-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039609" comment="java-21-openjdk-src-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039610" comment="java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039611" comment="java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039612" comment="java-21-openjdk-static-libs-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039613" comment="java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039614" comment="java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054752" comment="java-25-openjdk-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054753" comment="java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054754" comment="java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054755" comment="java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054756" comment="java-25-openjdk-demo-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054757" comment="java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054758" comment="java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054759" comment="java-25-openjdk-devel-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054760" comment="java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054761" comment="java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054762" comment="java-25-openjdk-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054763" comment="java-25-openjdk-headless-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054764" comment="java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054765" comment="java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054766" comment="java-25-openjdk-javadoc-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054767" comment="java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054768" comment="java-25-openjdk-jmods-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054769" comment="java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054770" comment="java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054771" comment="java-25-openjdk-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054772" comment="java-25-openjdk-src-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054773" comment="java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054774" comment="java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054775" comment="java-25-openjdk-static-libs-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054776" comment="java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054777" comment="java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054572" comment="libpng-1.6.37-12.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054573" comment="libpng-devel-1.6.37-12.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202565082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-65082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-65082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-65082" ref_url="https://www.suse.com/security/cve/CVE-2025-65082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65082/">CVE-2025-65082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65082">CVE-2025-65082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254514">SUSE bug 1254514</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054532" comment="httpd-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054533" comment="httpd-core-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054534" comment="httpd-devel-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054535" comment="httpd-filesystem-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054536" comment="httpd-manual-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054537" comment="httpd-tools-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054538" comment="mod_ldap-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054539" comment="mod_lua-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054540" comment="mod_proxy_html-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054541" comment="mod_session-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054542" comment="mod_ssl-2.4.62-7.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6558</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6558" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6558" ref_url="https://www.suse.com/security/cve/CVE-2025-6558" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13780" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001916.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041347.html" source="SUSE-SU"/>
    <description>
    Insufficient validation of untrusted input in ANGLE and GPU in Google Chrome prior to 138.0.7204.157 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-15"/>
	<updated date="2025-08-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-6558/">CVE-2025-6558 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6558">CVE-2025-6558 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246558">SUSE bug 1246558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247742">SUSE bug 1247742</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013938" comment="webkit2gtk3-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013939" comment="webkit2gtk3-devel-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013940" comment="webkit2gtk3-jsc-2.48.5-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013941" comment="webkit2gtk3-jsc-devel-2.48.5-1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66199</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66199" ref_url="https://www.suse.com/security/cve/CVE-2025-66199" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A TLS 1.3 connection using certificate compression can be
forced to allocate a large buffer before decompression without checking
against the configured certificate size limit.

Impact summary: An attacker can cause per-connection memory allocations of
up to approximately 22 MiB and extra CPU work, potentially leading to
service degradation or resource exhaustion (Denial of Service).

In affected configurations, the peer-supplied uncompressed certificate
length from a CompressedCertificate message is used to grow a heap buffer
prior to decompression. This length is not bounded by the max_cert_list
setting, which otherwise constrains certificate message sizes. An attacker
can exploit this to cause large per-connection allocations followed by
handshake failure. No memory corruption or information disclosure occurs.

This issue only affects builds where TLS 1.3 certificate compression is
compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression
algorithm (brotli, zlib, or zstd) is available, and where the compression
extension is negotiated. Both clients receiving a server CompressedCertificate
and servers in mutual TLS scenarios receiving a client CompressedCertificate
are affected. Servers that do not request client certificates are not
vulnerable to client-initiated attacks.

Users can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION
to disable receiving compressed certificates.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,
as the TLS implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66199/">CVE-2025-66199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66199">CVE-2025-66199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256833">SUSE bug 1256833</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66200</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66200" ref_url="https://www.suse.com/security/cve/CVE-2025-66200" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66200/">CVE-2025-66200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66200">CVE-2025-66200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254515">SUSE bug 1254515</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054532" comment="httpd-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054533" comment="httpd-core-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054534" comment="httpd-devel-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054535" comment="httpd-filesystem-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054536" comment="httpd-manual-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054537" comment="httpd-tools-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054538" comment="mod_ldap-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054539" comment="mod_lua-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054540" comment="mod_proxy_html-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054541" comment="mod_session-2.4.62-7.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054542" comment="mod_ssl-2.4.62-7.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66287" ref_url="https://www.suse.com/security/cve/CVE-2025-66287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66287/">CVE-2025-66287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66287">CVE-2025-66287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254509">SUSE bug 1254509</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054328" comment="webkit2gtk3-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054329" comment="webkit2gtk3-devel-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054330" comment="webkit2gtk3-jsc-2.50.3-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054331" comment="webkit2gtk3-jsc-devel-2.50.3-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66293</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254480">SUSE bug 1254480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054572" comment="libpng-1.6.37-12.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054573" comment="libpng-devel-1.6.37-12.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1332" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002445.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254866">SUSE bug 1254866</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054820" comment="fence-agents-aliyun-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054821" comment="fence-agents-all-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054822" comment="fence-agents-amt-ws-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054823" comment="fence-agents-apc-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054824" comment="fence-agents-apc-snmp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054825" comment="fence-agents-aws-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054826" comment="fence-agents-azure-arm-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054827" comment="fence-agents-bladecenter-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054828" comment="fence-agents-brocade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054829" comment="fence-agents-cisco-mds-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054830" comment="fence-agents-cisco-ucs-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054831" comment="fence-agents-common-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054832" comment="fence-agents-compute-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054833" comment="fence-agents-drac5-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054834" comment="fence-agents-eaton-snmp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054835" comment="fence-agents-emerson-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054836" comment="fence-agents-eps-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054837" comment="fence-agents-gce-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054838" comment="fence-agents-heuristics-ping-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054839" comment="fence-agents-hpblade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054840" comment="fence-agents-ibm-powervs-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054841" comment="fence-agents-ibm-vpc-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054842" comment="fence-agents-ibmblade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054843" comment="fence-agents-ifmib-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054844" comment="fence-agents-ilo-moonshot-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054845" comment="fence-agents-ilo-mp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054846" comment="fence-agents-ilo-ssh-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054847" comment="fence-agents-ilo2-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054848" comment="fence-agents-intelmodular-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054849" comment="fence-agents-ipdu-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054850" comment="fence-agents-ipmilan-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054851" comment="fence-agents-kdump-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054852" comment="fence-agents-kubevirt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054853" comment="fence-agents-lpar-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054854" comment="fence-agents-mpath-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054855" comment="fence-agents-nutanix-ahv-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054856" comment="fence-agents-openstack-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054857" comment="fence-agents-redfish-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054858" comment="fence-agents-rhevm-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054859" comment="fence-agents-rsa-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054860" comment="fence-agents-rsb-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054861" comment="fence-agents-sbd-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054862" comment="fence-agents-scsi-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054863" comment="fence-agents-virsh-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054864" comment="fence-agents-vmware-rest-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054865" comment="fence-agents-vmware-soap-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054866" comment="fence-agents-wti-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054867" comment="fence-virt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054868" comment="fence-virtd-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054869" comment="fence-virtd-cpg-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054870" comment="fence-virtd-libvirt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054871" comment="fence-virtd-multicast-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054872" comment="fence-virtd-serial-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054873" comment="fence-virtd-tcp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054874" comment="ha-cloud-support-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054783" comment="python3-urllib3-1.26.5-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054785" comment="python3.11-urllib3-1.26.12-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054784" comment="python3.12-urllib3-1.26.19-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66471</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66471" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1706" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002464.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254867">SUSE bug 1254867</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054820" comment="fence-agents-aliyun-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054821" comment="fence-agents-all-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054822" comment="fence-agents-amt-ws-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054823" comment="fence-agents-apc-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054824" comment="fence-agents-apc-snmp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054825" comment="fence-agents-aws-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054826" comment="fence-agents-azure-arm-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054827" comment="fence-agents-bladecenter-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054828" comment="fence-agents-brocade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054829" comment="fence-agents-cisco-mds-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054830" comment="fence-agents-cisco-ucs-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054831" comment="fence-agents-common-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054832" comment="fence-agents-compute-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054833" comment="fence-agents-drac5-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054834" comment="fence-agents-eaton-snmp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054835" comment="fence-agents-emerson-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054836" comment="fence-agents-eps-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054837" comment="fence-agents-gce-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054838" comment="fence-agents-heuristics-ping-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054839" comment="fence-agents-hpblade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054840" comment="fence-agents-ibm-powervs-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054841" comment="fence-agents-ibm-vpc-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054842" comment="fence-agents-ibmblade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054843" comment="fence-agents-ifmib-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054844" comment="fence-agents-ilo-moonshot-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054845" comment="fence-agents-ilo-mp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054846" comment="fence-agents-ilo-ssh-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054847" comment="fence-agents-ilo2-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054848" comment="fence-agents-intelmodular-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054849" comment="fence-agents-ipdu-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054850" comment="fence-agents-ipmilan-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054851" comment="fence-agents-kdump-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054852" comment="fence-agents-kubevirt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054853" comment="fence-agents-lpar-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054854" comment="fence-agents-mpath-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054855" comment="fence-agents-nutanix-ahv-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054856" comment="fence-agents-openstack-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054857" comment="fence-agents-redfish-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054858" comment="fence-agents-rhevm-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054859" comment="fence-agents-rsa-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054860" comment="fence-agents-rsb-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054861" comment="fence-agents-sbd-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054862" comment="fence-agents-scsi-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054863" comment="fence-agents-virsh-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054864" comment="fence-agents-vmware-rest-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054865" comment="fence-agents-vmware-soap-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054866" comment="fence-agents-wti-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054867" comment="fence-virt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054868" comment="fence-virtd-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054869" comment="fence-virtd-cpg-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054870" comment="fence-virtd-libvirt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054871" comment="fence-virtd-multicast-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054872" comment="fence-virtd-serial-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054873" comment="fence-virtd-tcp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054874" comment="ha-cloud-support-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054783" comment="python3-urllib3-1.26.5-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054785" comment="python3.11-urllib3-1.26.12-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054784" comment="python3.12-urllib3-1.26.19-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66566" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66566" ref_url="https://www.suse.com/security/cve/CVE-2025-66566" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0751" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002415.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003233.html" source="SUSE-SU"/>
    <description>
    yawkat LZ4 Java provides LZ4 compression for Java. Insufficient clearing of the output buffer in Java-based decompressor implementations in lz4-java 1.10.0 and earlier allows remote attackers to read previous buffer contents via crafted compressed input. In applications where the output buffer is reused without being cleared, this may lead to disclosure of sensitive data. JNI-based implementations are not affected. This vulnerability is fixed in 1.10.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66566/">CVE-2025-66566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66566">CVE-2025-66566 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054704" comment="jmc-8.2.0-18.el9_7.2 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67268</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67268" ref_url="https://www.suse.com/security/cve/CVE-2025-67268" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0771" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003211.html" source="SUSE-SU"/>
    <description>
    gpsd before commit dc966aa contains a heap-based out-of-bounds write vulnerability in the drivers/driver_nmea2000.c file. The hnd_129540 function, which handles NMEA2000 PGN 129540 (GNSS Satellites in View) packets, fails to validate the user-supplied satellite count against the size of the skyview array (184 elements). This allows an attacker to write beyond the bounds of the array by providing a satellite count up to 255, leading to memory corruption, Denial of Service (DoS), and potentially arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-67268/">CVE-2025-67268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67268">CVE-2025-67268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255913">SUSE bug 1255913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054705" comment="gpsd-minimal-3.26.1-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054706" comment="gpsd-minimal-clients-3.26.1-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67269</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67269" ref_url="https://www.suse.com/security/cve/CVE-2025-67269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0771" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003211.html" source="SUSE-SU"/>
    <description>
    An integer underflow vulnerability exists in the `nextstate()` function in `gpsd/packet.c` of gpsd versions prior to commit `ffa1d6f40bca0b035fc7f5e563160ebb67199da7`. When parsing a NAVCOM packet, the payload length is calculated using `lexer-&gt;length = (size_t)c - 4` without checking if the input byte `c` is less than 4. This results in an unsigned integer underflow, setting `lexer-&gt;length` to a very large value (near `SIZE_MAX`). The parser then enters a loop attempting to consume this massive number of bytes, causing 100% CPU utilization and a Denial of Service (DoS) condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-67269/">CVE-2025-67269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67269">CVE-2025-67269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255914">SUSE bug 1255914</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054705" comment="gpsd-minimal-3.26.1-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054706" comment="gpsd-minimal-clients-3.26.1-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67733</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67733" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67733" ref_url="https://www.suse.com/security/cve/CVE-2025-67733" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3507" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024650.html" source="SUSE-SU"/>
    <description>
    Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-67733/">CVE-2025-67733 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67733">CVE-2025-67733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258746">SUSE bug 1258746</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055545" comment="valkey-8.0.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055546" comment="valkey-devel-8.0.7-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67873</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67873" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67873" ref_url="https://www.suse.com/security/cve/CVE-2025-67873" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4898" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024973.html" source="SUSE-SU"/>
    <description>
    Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, Skipdata length is not bounds-checked, so a user-provided skipdata callback can make cs_disasm/cs_disasm_iter memcpy more than 24 bytes into cs_insn.bytes, causing a heap buffer overflow in the disassembly path. Commit cbef767ab33b82166d263895f24084b75b316df3 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67873/">CVE-2025-67873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67873">CVE-2025-67873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255309">SUSE bug 1255309</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055782" comment="capstone-4.0.2-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055783" comment="capstone-devel-4.0.2-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055784" comment="capstone-java-4.0.2-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055785" comment="python3-capstone-4.0.2-11.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68114</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68114" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68114" ref_url="https://www.suse.com/security/cve/CVE-2025-68114" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4898" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024973.html" source="SUSE-SU"/>
    <description>
    Capstone is a disassembly framework. In versions 6.0.0-Alpha5 and prior, an unchecked vsnprintf return in SStream_concat lets a malicious cs_opt_mem.vsnprintf drive SStream's index negative or past the end, leading to a stack buffer underflow/overflow when the next write occurs. Commit 2c7797182a1618be12017d7d41e0b6581d5d529e fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="2.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68114/">CVE-2025-68114 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68114">CVE-2025-68114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255310">SUSE bug 1255310</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055782" comment="capstone-4.0.2-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055783" comment="capstone-devel-4.0.2-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055784" comment="capstone-java-4.0.2-11.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055785" comment="python3-capstone-4.0.2-11.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68121</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68121" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2708" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2709" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003187.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3040" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003189.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002527.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002529.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3291" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003194.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003257.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003238.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003254.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003239.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3817" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002578.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3839" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003241.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003200.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003245.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3929" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002554.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3985" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002559.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4672" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256818">SUSE bug 1256818</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055495" comment="buildah-1.41.8-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055496" comment="buildah-tests-1.41.8-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055506" comment="containernetworking-plugins-1.7.1-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055578" comment="delve-1.25.2-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055594" comment="git-lfs-3.6.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055124" comment="go-toolset-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055125" comment="golang-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055126" comment="golang-bin-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055127" comment="golang-docs-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055128" comment="golang-misc-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055129" comment="golang-race-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055130" comment="golang-src-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055131" comment="golang-tests-1.25.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055437" comment="grafana-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055443" comment="grafana-pcp-5.1.1-12.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055438" comment="grafana-selinux-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055577" comment="image-builder-31-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055497" comment="podman-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055498" comment="podman-docker-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055499" comment="podman-plugins-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055500" comment="podman-remote-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055501" comment="podman-tests-5.6.0-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055494" comment="runc-1.4.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055504" comment="skopeo-1.20.0-3.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055505" comment="skopeo-tests-1.20.0-3.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68160</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Writing large, newline-free data into a BIO chain using the
line-buffering filter where the next BIO performs short writes can trigger
a heap-based out-of-bounds write.

Impact summary: This out-of-bounds write can cause memory corruption which
typically results in a crash, leading to Denial of Service for an application.

The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in
TLS/SSL data paths. In OpenSSL command-line applications, it is typically
only pushed onto stdout/stderr on VMS systems. Third-party applications that
explicitly use this filter with a BIO chain that can short-write and that
write large, newline-free data influenced by an attacker would be affected.
However, the circumstances where this could happen are unlikely to be under
attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated
data controlled by an attacker. For that reason the issue was assessed as
Low severity.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the BIO implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256834">SUSE bug 1256834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68179" ref_url="https://www.suse.com/security/cve/CVE-2025-68179" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP

As reported by Luiz Capitulino enabling HVO on s390 leads to reproducible
crashes. The problem is that kernel page tables are modified without
flushing corresponding TLB entries.

Even if it looks like the empty flush_tlb_all() implementation on s390 is
the problem, it is actually a different problem: on s390 it is not allowed
to replace an active/valid page table entry with another valid page table
entry without the detour over an invalid entry. A direct replacement may
lead to random crashes and/or data corruption.

In order to invalidate an entry special instructions have to be used
(e.g. ipte or idte). Alternatively there are also special instructions
available which allow to replace a valid entry with a different valid
entry (e.g. crdte or cspg).

Given that the HVO code currently does not provide the hooks to allow for
an implementation which is compliant with the s390 architecture
requirements, disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP again, which is
basically a revert of the original patch which enabled it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68179/">CVE-2025-68179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68179">CVE-2025-68179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255250">SUSE bug 1255250</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68285</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68285" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: fix potential use-after-free in have_mon_and_osd_map()

The wait loop in __ceph_open_session() can race with the client
receiving a new monmap or osdmap shortly after the initial map is
received.  Both ceph_monc_handle_map() and handle_one_map() install
a new map immediately after freeing the old one

    kfree(monc-&gt;monmap);
    monc-&gt;monmap = monmap;

    ceph_osdmap_destroy(osdc-&gt;osdmap);
    osdc-&gt;osdmap = newmap;

under client-&gt;monc.mutex and client-&gt;osdc.lock respectively, but
because neither is taken in have_mon_and_osd_map() it's possible for
client-&gt;monc.monmap-&gt;epoch and client-&gt;osdc.osdmap-&gt;epoch arms in

    client-&gt;monc.monmap &amp;&amp; client-&gt;monc.monmap-&gt;epoch &amp;&amp;
        client-&gt;osdc.osdmap &amp;&amp; client-&gt;osdc.osdmap-&gt;epoch;

condition to dereference an already freed map.  This happens to be
reproducible with generic/395 and generic/397 with KASAN enabled:

    BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70
    Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305
    CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266
    ...
    Call Trace:
    &lt;TASK&gt;
    have_mon_and_osd_map+0x56/0x70
    ceph_open_session+0x182/0x290
    ceph_get_tree+0x333/0x680
    vfs_get_tree+0x49/0x180
    do_new_mount+0x1a3/0x2d0
    path_mount+0x6dd/0x730
    do_mount+0x99/0xe0
    __do_sys_mount+0x141/0x180
    do_syscall_64+0x9f/0x100
    entry_SYSCALL_64_after_hwframe+0x76/0x7e
    &lt;/TASK&gt;

    Allocated by task 13305:
    ceph_osdmap_alloc+0x16/0x130
    ceph_osdc_init+0x27a/0x4c0
    ceph_create_client+0x153/0x190
    create_fs_client+0x50/0x2a0
    ceph_get_tree+0xff/0x680
    vfs_get_tree+0x49/0x180
    do_new_mount+0x1a3/0x2d0
    path_mount+0x6dd/0x730
    do_mount+0x99/0xe0
    __do_sys_mount+0x141/0x180
    do_syscall_64+0x9f/0x100
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

    Freed by task 9475:
    kfree+0x212/0x290
    handle_one_map+0x23c/0x3b0
    ceph_osdc_handle_map+0x3c9/0x590
    mon_dispatch+0x655/0x6f0
    ceph_con_process_message+0xc3/0xe0
    ceph_con_v1_try_read+0x614/0x760
    ceph_con_workfn+0x2de/0x650
    process_one_work+0x486/0x7c0
    process_scheduled_works+0x73/0x90
    worker_thread+0x1c8/0x2a0
    kthread+0x2ec/0x300
    ret_from_fork+0x24/0x40
    ret_from_fork_asm+0x1a/0x30

Rewrite the wait loop to check the above condition directly with
client-&gt;monc.mutex and client-&gt;osdc.lock taken as appropriate.  While
at it, improve the timeout handling (previously mount_timeout could be
exceeded in case wait_event_interruptible_timeout() slept more than
once) and access client-&gt;auth_err under client-&gt;monc.mutex to match
how it's set in finish_auth().

monmap_show() and osdmap_show() now take the respective lock before
accessing the map as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255401">SUSE bug 1255401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255402">SUSE bug 1255402</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054707" comment="kernel-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054708" comment="kernel-abi-stablelists-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054709" comment="kernel-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054710" comment="kernel-cross-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054711" comment="kernel-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054712" comment="kernel-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054713" comment="kernel-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054714" comment="kernel-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054715" comment="kernel-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054716" comment="kernel-debug-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054717" comment="kernel-doc-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054718" comment="kernel-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054719" comment="kernel-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054720" comment="kernel-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054721" comment="kernel-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054722" comment="kernel-rt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054723" comment="kernel-rt-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054724" comment="kernel-rt-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054725" comment="kernel-rt-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054726" comment="kernel-rt-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054727" comment="kernel-rt-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054728" comment="kernel-rt-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054729" comment="kernel-rt-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054730" comment="kernel-rt-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054731" comment="kernel-rt-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054732" comment="kernel-tools-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054733" comment="kernel-tools-libs-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054734" comment="kernel-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054735" comment="kernel-uki-virt-addons-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054736" comment="libperf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054737" comment="perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054738" comment="python3-perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054739" comment="rtla-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054740" comment="rv-5.14.0-611.24.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68287</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68287" ref_url="https://www.suse.com/security/cve/CVE-2025-68287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths

This patch addresses a race condition caused by unsynchronized
execution of multiple call paths invoking `dwc3_remove_requests()`,
leading to premature freeing of USB requests and subsequent crashes.

Three distinct execution paths interact with `dwc3_remove_requests()`:
Path 1:
Triggered via `dwc3_gadget_reset_interrupt()` during USB reset
handling. The call stack includes:
- `dwc3_ep0_reset_state()`
- `dwc3_ep0_stall_and_restart()`
- `dwc3_ep0_out_start()`
- `dwc3_remove_requests()`
- `dwc3_gadget_del_and_unmap_request()`

Path 2:
Also initiated from `dwc3_gadget_reset_interrupt()`, but through
`dwc3_stop_active_transfers()`. The call stack includes:
- `dwc3_stop_active_transfers()`
- `dwc3_remove_requests()`
- `dwc3_gadget_del_and_unmap_request()`

Path 3:
Occurs independently during `adb root` execution, which triggers
USB function unbind and bind operations. The sequence includes:
- `gserial_disconnect()`
- `usb_ep_disable()`
- `dwc3_gadget_ep_disable()`
- `dwc3_remove_requests()` with `-ESHUTDOWN` status

Path 3 operates asynchronously and lacks synchronization with Paths
1 and 2. When Path 3 completes, it disables endpoints and frees 'out'
requests. If Paths 1 or 2 are still processing these requests,
accessing freed memory leads to a crash due to use-after-free conditions.

To fix this added check for request completion and skip processing
if already completed and added the request status for ep0 while queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68287/">CVE-2025-68287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68287">CVE-2025-68287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255152">SUSE bug 1255152</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054707" comment="kernel-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054708" comment="kernel-abi-stablelists-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054709" comment="kernel-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054710" comment="kernel-cross-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054711" comment="kernel-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054712" comment="kernel-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054713" comment="kernel-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054714" comment="kernel-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054715" comment="kernel-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054716" comment="kernel-debug-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054717" comment="kernel-doc-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054718" comment="kernel-headers-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054719" comment="kernel-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054720" comment="kernel-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054721" comment="kernel-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054722" comment="kernel-rt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054723" comment="kernel-rt-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054724" comment="kernel-rt-debug-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054725" comment="kernel-rt-debug-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054726" comment="kernel-rt-debug-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054727" comment="kernel-rt-debug-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054728" comment="kernel-rt-debug-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054729" comment="kernel-rt-modules-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054730" comment="kernel-rt-modules-core-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054731" comment="kernel-rt-modules-extra-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054732" comment="kernel-tools-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054733" comment="kernel-tools-libs-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054734" comment="kernel-uki-virt-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054735" comment="kernel-uki-virt-addons-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054736" comment="libperf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054737" comment="perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054738" comment="python3-perf-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054739" comment="rtla-5.14.0-611.24.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054740" comment="rv-5.14.0-611.24.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68301</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68301" ref_url="https://www.suse.com/security/cve/CVE-2025-68301" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002404.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1703" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: fix fragment overflow handling in RX path

The atlantic driver can receive packets with more than MAX_SKB_FRAGS (17)
fragments when handling large multi-descriptor packets. This causes an
out-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic.

The issue occurs because the driver doesn't check the total number of
fragments before calling skb_add_rx_frag(). When a packet requires more
than MAX_SKB_FRAGS fragments, the fragment index exceeds the array bounds.

Fix by assuming there will be an extra frag if buff-&gt;len &gt; AQ_CFG_RX_HDR_SIZE,
then all fragments are accounted for. And reusing the existing check to
prevent the overflow earlier in the code path.

This crash occurred in production with an Aquantia AQC113 10G NIC.

Stack trace from production environment:
```
RIP: 0010:skb_add_rx_frag_netmem+0x29/0xd0
Code: 90 f3 0f 1e fa 0f 1f 44 00 00 48 89 f8 41 89
ca 48 89 d7 48 63 ce 8b 90 c0 00 00 00 48 c1 e1 04 48 01 ca 48 03 90
c8 00 00 00 &lt;48&gt; 89 7a 30 44 89 52 3c 44 89 42 38 40 f6 c7 01 75 74 48
89 fa 83
RSP: 0018:ffffa9bec02a8d50 EFLAGS: 00010287
RAX: ffff925b22e80a00 RBX: ffff925ad38d2700 RCX:
fffffffe0a0c8000
RDX: ffff9258ea95bac0 RSI: ffff925ae0a0c800 RDI:
0000000000037a40
RBP: 0000000000000024 R08: 0000000000000000 R09:
0000000000000021
R10: 0000000000000848 R11: 0000000000000000 R12:
ffffa9bec02a8e24
R13: ffff925ad8615570 R14: 0000000000000000 R15:
ffff925b22e80a00
FS: 0000000000000000(0000)
GS:ffff925e47880000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff9258ea95baf0 CR3: 0000000166022004 CR4:
0000000000f72ef0
PKRU: 55555554
Call Trace:
&lt;IRQ&gt;
aq_ring_rx_clean+0x175/0xe60 [atlantic]
? aq_ring_rx_clean+0x14d/0xe60 [atlantic]
? aq_ring_tx_clean+0xdf/0x190 [atlantic]
? kmem_cache_free+0x348/0x450
? aq_vec_poll+0x81/0x1d0 [atlantic]
? __napi_poll+0x28/0x1c0
? net_rx_action+0x337/0x420
```

Changes in v4:
- Add Fixes: tag to satisfy patch validation requirements.

Changes in v3:
- Fix by assuming there will be an extra frag if buff-&gt;len &gt; AQ_CFG_RX_HDR_SIZE,
  then all fragments are accounted for.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68301/">CVE-2025-68301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68301">CVE-2025-68301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255120">SUSE bug 1255120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68305</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68305" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68305" ref_url="https://www.suse.com/security/cve/CVE-2025-68305" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sock: Prevent race in socket write iter and sock bind

There is a potential race condition between sock bind and socket write
iter. bind may free the same cmd via mgmt_pending before write iter sends
the cmd, just as syzbot reported in UAF[1].

Here we use hci_dev_lock to synchronize the two, thereby avoiding the
UAF mentioned in [1].

[1]
syzbot reported:
BUG: KASAN: slab-use-after-free in mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316
Read of size 8 at addr ffff888077164818 by task syz.0.17/5989
Call Trace:
 mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316
 set_link_security+0x5c2/0x710 net/bluetooth/mgmt.c:1918
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:727 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:742
 sock_write_iter+0x279/0x360 net/socket.c:1195

Allocated by task 5989:
 mgmt_pending_add+0x35/0x140 net/bluetooth/mgmt_util.c:296
 set_link_security+0x557/0x710 net/bluetooth/mgmt.c:1910
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:727 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:742
 sock_write_iter+0x279/0x360 net/socket.c:1195

Freed by task 5991:
 mgmt_pending_free net/bluetooth/mgmt_util.c:311 [inline]
 mgmt_pending_foreach+0x30d/0x380 net/bluetooth/mgmt_util.c:257
 mgmt_index_removed+0x112/0x2f0 net/bluetooth/mgmt.c:9477
 hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68305/">CVE-2025-68305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68305">CVE-2025-68305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255169">SUSE bug 1255169</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054786" comment="kernel-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054787" comment="kernel-abi-stablelists-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054788" comment="kernel-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054789" comment="kernel-cross-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054790" comment="kernel-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054791" comment="kernel-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054792" comment="kernel-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054793" comment="kernel-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054794" comment="kernel-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054795" comment="kernel-debug-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054796" comment="kernel-doc-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054797" comment="kernel-headers-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054798" comment="kernel-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054799" comment="kernel-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054800" comment="kernel-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054801" comment="kernel-rt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054802" comment="kernel-rt-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054803" comment="kernel-rt-debug-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054804" comment="kernel-rt-debug-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054805" comment="kernel-rt-debug-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054806" comment="kernel-rt-debug-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054807" comment="kernel-rt-debug-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054808" comment="kernel-rt-modules-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054809" comment="kernel-rt-modules-core-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054810" comment="kernel-rt-modules-extra-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054811" comment="kernel-tools-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054812" comment="kernel-tools-libs-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054813" comment="kernel-uki-virt-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054814" comment="kernel-uki-virt-addons-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054815" comment="libperf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054816" comment="perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054817" comment="python3-perf-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054818" comment="rtla-5.14.0-611.26.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054819" comment="rv-5.14.0-611.26.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68349</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid

Fixes a crash when layout is null during this call stack:

write_inode
    -&gt; nfs4_write_inode
        -&gt; pnfs_layoutcommit_inode

pnfs_set_layoutcommit relies on the lseg refcount to keep the layout
around. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt
to reference a null layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255544">SUSE bug 1255544</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055132" comment="kernel-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055133" comment="kernel-abi-stablelists-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055134" comment="kernel-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055135" comment="kernel-cross-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055136" comment="kernel-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055137" comment="kernel-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055138" comment="kernel-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055139" comment="kernel-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055140" comment="kernel-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055141" comment="kernel-debug-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055142" comment="kernel-doc-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055143" comment="kernel-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055144" comment="kernel-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055145" comment="kernel-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055146" comment="kernel-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055147" comment="kernel-rt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055148" comment="kernel-rt-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055149" comment="kernel-rt-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055150" comment="kernel-rt-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055151" comment="kernel-rt-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055152" comment="kernel-rt-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055153" comment="kernel-rt-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055154" comment="kernel-rt-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055155" comment="kernel-rt-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055156" comment="kernel-rt-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055157" comment="kernel-tools-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055158" comment="kernel-tools-libs-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055159" comment="kernel-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055160" comment="kernel-uki-virt-addons-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055161" comment="libperf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055162" comment="perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055163" comment="python3-perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055164" comment="rtla-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055165" comment="rv-5.14.0-611.34.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68615</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68615" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68615" ref_url="https://www.suse.com/security/cve/CVE-2025-68615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0696" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003171.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002405.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0812" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0227-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025112.html" source="SUSE-SU"/>
    <description>
    net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68615/">CVE-2025-68615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68615">CVE-2025-68615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255491">SUSE bug 1255491</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054694" comment="net-snmp-5.9.1-17.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054695" comment="net-snmp-agent-libs-5.9.1-17.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054696" comment="net-snmp-devel-5.9.1-17.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054697" comment="net-snmp-libs-5.9.1-17.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054698" comment="net-snmp-perl-5.9.1-17.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054699" comment="net-snmp-utils-5.9.1-17.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054700" comment="python3-net-snmp-5.9.1-17.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68800</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68800" ref_url="https://www.suse.com/security/cve/CVE-2025-68800" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats

Cited commit added a dedicated mutex (instead of RTNL) to protect the
multicast route list, so that it will not change while the driver
periodically traverses it in order to update the kernel about multicast
route stats that were queried from the device.

One instance of list entry deletion (during route replace) was missed
and it can result in a use-after-free [1].

Fix by acquiring the mutex before deleting the entry from the list and
releasing it afterwards.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]
Read of size 8 at addr ffff8881523c2fa8 by task kworker/2:5/22043

CPU: 2 UID: 0 PID: 22043 Comm: kworker/2:5 Not tainted 6.18.0-rc1-custom-g1a3d6d7cd014 #1 PREEMPT(full)
Hardware name: Mellanox Technologies Ltd. MSN2010/SA002610, BIOS 5.6.5 08/24/2017
Workqueue: mlxsw_core mlxsw_sp_mr_stats_update [mlxsw_spectrum]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xba/0x110
 print_report+0x174/0x4f5
 kasan_report+0xdf/0x110
 mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 29933:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 mlxsw_sp_mr_route_add+0xd8/0x4770 [mlxsw_spectrum]
 mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30

Freed by task 29933:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_save_free_info+0x3b/0x70
 __kasan_slab_free+0x43/0x70
 kfree+0x14e/0x700
 mlxsw_sp_mr_route_add+0x2dea/0x4770 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:444 [mlxsw_spectrum]
 mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68800/">CVE-2025-68800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256646">SUSE bug 1256646</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055731" comment="kernel-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055732" comment="kernel-abi-stablelists-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055733" comment="kernel-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055734" comment="kernel-cross-headers-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055735" comment="kernel-debug-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055736" comment="kernel-debug-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055737" comment="kernel-debug-modules-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055738" comment="kernel-debug-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055739" comment="kernel-debug-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055740" comment="kernel-debug-uki-virt-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055741" comment="kernel-doc-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055742" comment="kernel-headers-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055743" comment="kernel-modules-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055744" comment="kernel-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055745" comment="kernel-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055746" comment="kernel-rt-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055747" comment="kernel-rt-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055748" comment="kernel-rt-debug-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055749" comment="kernel-rt-debug-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055750" comment="kernel-rt-debug-modules-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055751" comment="kernel-rt-debug-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055752" comment="kernel-rt-debug-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055753" comment="kernel-rt-modules-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055754" comment="kernel-rt-modules-core-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055755" comment="kernel-rt-modules-extra-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055756" comment="kernel-tools-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055757" comment="kernel-tools-libs-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055758" comment="kernel-uki-virt-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055759" comment="kernel-uki-virt-addons-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055760" comment="libperf-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055761" comment="perf-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055762" comment="python3-perf-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055763" comment="rtla-5.14.0-611.41.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055764" comment="rv-5.14.0-611.41.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68811</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68811" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68811" ref_url="https://www.suse.com/security/cve/CVE-2025-68811" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

svcrdma: use rc_pageoff for memcpy byte offset

svc_rdma_copy_inline_range added rc_curpage (page index) to the page
base instead of the byte offset rc_pageoff. Use rc_pageoff so copies
land within the current page.

Found by ZeroPath (https://zeropath.com)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68811/">CVE-2025-68811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68811">CVE-2025-68811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256677">SUSE bug 1256677</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055132" comment="kernel-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055133" comment="kernel-abi-stablelists-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055134" comment="kernel-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055135" comment="kernel-cross-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055136" comment="kernel-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055137" comment="kernel-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055138" comment="kernel-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055139" comment="kernel-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055140" comment="kernel-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055141" comment="kernel-debug-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055142" comment="kernel-doc-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055143" comment="kernel-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055144" comment="kernel-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055145" comment="kernel-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055146" comment="kernel-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055147" comment="kernel-rt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055148" comment="kernel-rt-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055149" comment="kernel-rt-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055150" comment="kernel-rt-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055151" comment="kernel-rt-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055152" comment="kernel-rt-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055153" comment="kernel-rt-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055154" comment="kernel-rt-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055155" comment="kernel-rt-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055156" comment="kernel-rt-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055157" comment="kernel-tools-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055158" comment="kernel-tools-libs-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055159" comment="kernel-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055160" comment="kernel-uki-virt-addons-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055161" comment="libperf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055162" comment="perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055163" comment="python3-perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055164" comment="rtla-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055165" comment="rv-5.14.0-611.34.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68973</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68973" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68973" ref_url="https://www.suse.com/security/cve/CVE-2025-68973" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002386.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1229" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024327.html" source="SUSE-SU"/>
    <description>
    In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-68973/">CVE-2025-68973 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68973">CVE-2025-68973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255715">SUSE bug 1255715</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054702" comment="gnupg2-2.3.3-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054703" comment="gnupg2-smime-2.3.3-5.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69418</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69418" ref_url="https://www.suse.com/security/cve/CVE-2025-69418" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: When using the low-level OCB API directly with AES-NI or&lt;br&gt;other hardware-accelerated code paths, inputs whose length is not a multiple&lt;br&gt;of 16 bytes can leave the final partial block unencrypted and unauthenticated.&lt;br&gt;&lt;br&gt;Impact summary: The trailing 1-15 bytes of a message may be exposed in&lt;br&gt;cleartext on encryption and are not covered by the authentication tag,&lt;br&gt;allowing an attacker to read or tamper with those bytes without detection.&lt;br&gt;&lt;br&gt;The low-level OCB encrypt and decrypt routines in the hardware-accelerated&lt;br&gt;stream path process full 16-byte blocks but do not advance the input/output&lt;br&gt;pointers. The subsequent tail-handling code then operates on the original&lt;br&gt;base pointers, effectively reprocessing the beginning of the buffer while&lt;br&gt;leaving the actual trailing bytes unprocessed. The authentication checksum&lt;br&gt;also excludes the true tail bytes.&lt;br&gt;&lt;br&gt;However, typical OpenSSL consumers using EVP are not affected because the&lt;br&gt;higher-level EVP and provider OCB implementations split inputs so that full&lt;br&gt;blocks and trailing partial blocks are processed in separate calls, avoiding&lt;br&gt;the problematic code path. Additionally, TLS does not use OCB ciphersuites.&lt;br&gt;The vulnerability only affects applications that call the low-level&lt;br&gt;CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with&lt;br&gt;non-block-aligned lengths in a single call on hardware-accelerated builds.&lt;br&gt;For these reasons the issue was assessed as Low severity.&lt;br&gt;&lt;br&gt;The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected&lt;br&gt;by this issue, as OCB mode is not a FIPS-approved algorithm.&lt;br&gt;&lt;br&gt;OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.&lt;br&gt;&lt;br&gt;OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69418/">CVE-2025-69418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256835">SUSE bug 1256835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69419</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1503" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002449.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3042" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002521.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4472" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003283.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously
crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing
non-ASCII BMP code point can trigger a one byte write before the allocated
buffer.

Impact summary: The out-of-bounds write can cause a memory corruption
which can have various consequences including a Denial of Service.

The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12
BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,
the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16
source byte count as the destination buffer capacity to UTF8_putc(). For BMP
code points above U+07FF, UTF-8 requires three bytes, but the forwarded
capacity can be just two bytes. UTF8_putc() then returns -1, and this negative
value is added to the output length without validation, causing the
length to become negative. The subsequent trailing NUL byte is then written
at a negative offset, causing write outside of heap allocated buffer.

The vulnerability is reachable via the public PKCS12_get_friendlyname() API
when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a
different code path that avoids this issue, PKCS12_get_friendlyname() directly
invokes the vulnerable function. Exploitation requires an attacker to provide
a malicious PKCS#12 file to be parsed by the application and the attacker
can just trigger a one zero byte write before the allocated buffer.
For that reason the issue was assessed as Low severity according to our
Security Policy.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256836">SUSE bug 1256836</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055730" comment="compat-openssl11-1.1.1k-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69420</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malformed TimeStamp Response file.

Impact summary: An application calling TS_RESP_verify_response() with a
malformed TimeStamp Response can be caused to dereference an invalid or
NULL pointer when reading, resulting in a Denial of Service.

The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()
access the signing cert attribute value without validating its type.
When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory
through the ASN1_TYPE union, causing a crash.

Exploiting this vulnerability requires an attacker to provide a malformed
TimeStamp Response to an application that verifies timestamp responses. The
TimeStamp protocol (RFC 3161) is not widely used and the impact of the
exploit is just a Denial of Service. For these reasons the issue was
assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the TimeStamp Response implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256837">SUSE bug 1256837</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69421</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer
dereference in the PKCS12_item_decrypt_d2i_ex() function.

Impact summary: A NULL pointer dereference can trigger a crash which leads to
Denial of Service for an application processing PKCS#12 files.

The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct
parameter is NULL before dereferencing it. When called from
PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can
be NULL, causing a crash. The vulnerability is limited to Denial of Service
and cannot be escalated to achieve code execution or memory disclosure.

Exploiting this issue requires an attacker to provide a malformed PKCS#12 file
to an application that processes it. For that reason the issue was assessed as
Low severity according to our Security Policy.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256838">SUSE bug 1256838</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6965" ref_url="https://www.suse.com/security/cve/CVE-2025-6965" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001851.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11803" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001848.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11992" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001854.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12010" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001847.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12349" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001873.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20936" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02744-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20674-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041627.html" source="SUSE-SU"/>
    <description>
    There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-6965/">CVE-2025-6965 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6965">CVE-2025-6965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246597">SUSE bug 1246597</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011255" comment="nodejs-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011256" comment="nodejs-devel-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011257" comment="nodejs-docs-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011258" comment="nodejs-full-i18n-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011259" comment="nodejs-libs-22.16.0-2.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011260" comment="nodejs-nodemon-3.0.1-1.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011261" comment="nodejs-packaging-2021.06-4.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011262" comment="nodejs-packaging-bundler-2021.06-4.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011263" comment="npm-10.9.2-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054082" comment="sqlite-3.34.1-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054083" comment="sqlite-devel-3.34.1-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054084" comment="sqlite-libs-3.34.1-9.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011264" comment="v8-12.4-devel-12.4.254.21-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()

There exists a kernel oops caused by a BUG_ON(nhead &lt; 0) at
net/core/skbuff.c:2232 in pskb_expand_head().
This bug is triggered as part of the calipso_skbuff_setattr()
routine when skb_cow() is passed headroom &gt; INT_MAX
(i.e. (int)(skb_headroom(skb) + len_delta) &lt; 0).

The root cause of the bug is due to an implicit integer cast in
__skb_cow(). The check (headroom &gt; skb_headroom(skb)) is meant to ensure
that delta = headroom - skb_headroom(skb) is never negative, otherwise
we will trigger a BUG_ON in pskb_expand_head(). However, if
headroom &gt; INT_MAX and delta &lt;= -NET_SKB_PAD, the check passes, delta
becomes negative, and pskb_expand_head() is passed a negative value for
nhead.

Fix the trigger condition in calipso_skbuff_setattr(). Avoid passing
"negative" headroom sizes to skb_cow() within calipso_skbuff_setattr()
by only using skb_cow() to grow headroom.

PoC:
	Using `netlabelctl` tool:

        netlabelctl map del default
        netlabelctl calipso add pass doi:7
        netlabelctl map add default address:0::1/128 protocol:calipso,7

        Then run the following PoC:

        int fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);

        // setup msghdr
        int cmsg_size = 2;
        int cmsg_len = 0x60;
        struct msghdr msg;
        struct sockaddr_in6 dest_addr;
        struct cmsghdr * cmsg = (struct cmsghdr *) calloc(1,
                        sizeof(struct cmsghdr) + cmsg_len);
        msg.msg_name = &amp;dest_addr;
        msg.msg_namelen = sizeof(dest_addr);
        msg.msg_iov = NULL;
        msg.msg_iovlen = 0;
        msg.msg_control = cmsg;
        msg.msg_controllen = cmsg_len;
        msg.msg_flags = 0;

        // setup sockaddr
        dest_addr.sin6_family = AF_INET6;
        dest_addr.sin6_port = htons(31337);
        dest_addr.sin6_flowinfo = htonl(31337);
        dest_addr.sin6_addr = in6addr_loopback;
        dest_addr.sin6_scope_id = 31337;

        // setup cmsghdr
        cmsg-&gt;cmsg_len = cmsg_len;
        cmsg-&gt;cmsg_level = IPPROTO_IPV6;
        cmsg-&gt;cmsg_type = IPV6_HOPOPTS;
        char * hop_hdr = (char *)cmsg + sizeof(struct cmsghdr);
        hop_hdr[1] = 0x9; //set hop size - (0x9 + 1) * 8 = 80

        sendmsg(fd, &amp;msg, 0);
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256623">SUSE bug 1256623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256624">SUSE bug 1256624</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055511" comment="kernel-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055512" comment="kernel-abi-stablelists-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055513" comment="kernel-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055514" comment="kernel-cross-headers-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055515" comment="kernel-debug-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055516" comment="kernel-debug-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055517" comment="kernel-debug-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055518" comment="kernel-debug-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055519" comment="kernel-debug-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055520" comment="kernel-debug-uki-virt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055521" comment="kernel-doc-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055522" comment="kernel-headers-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055523" comment="kernel-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055524" comment="kernel-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055525" comment="kernel-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055526" comment="kernel-rt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055527" comment="kernel-rt-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055528" comment="kernel-rt-debug-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055529" comment="kernel-rt-debug-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055530" comment="kernel-rt-debug-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055531" comment="kernel-rt-debug-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055532" comment="kernel-rt-debug-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055533" comment="kernel-rt-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055534" comment="kernel-rt-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055535" comment="kernel-rt-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055536" comment="kernel-tools-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055537" comment="kernel-tools-libs-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055538" comment="kernel-uki-virt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055539" comment="kernel-uki-virt-addons-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055540" comment="libperf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055541" comment="perf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055542" comment="python3-perf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055543" comment="rtla-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055544" comment="rv-5.14.0-611.36.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71151</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71151" ref_url="https://www.suse.com/security/cve/CVE-2025-71151" source="SUSE CVE"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix memory and information leak in smb3_reconfigure()

In smb3_reconfigure(), if smb3_sync_session_ctx_passwords() fails, the
function returns immediately without freeing and erasing the newly
allocated new_password and new_password2. This causes both a memory leak
and a potential information leak.

Fix this by calling kfree_sensitive() on both password buffers before
returning in this error case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71151/">CVE-2025-71151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71151">CVE-2025-71151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257160">SUSE bug 1257160</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009985522" comment="kernel-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985523" comment="kernel-abi-stablelists-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985524" comment="kernel-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985526" comment="kernel-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985527" comment="kernel-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985530" comment="kernel-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985531" comment="kernel-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985532" comment="kernel-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985533" comment="kernel-debug-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985536" comment="kernel-doc-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985537" comment="kernel-headers-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985538" comment="kernel-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985539" comment="kernel-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985540" comment="kernel-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985541" comment="kernel-rt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985542" comment="kernel-rt-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985543" comment="kernel-rt-debug-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985544" comment="kernel-rt-debug-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985546" comment="kernel-rt-debug-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985547" comment="kernel-rt-debug-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985548" comment="kernel-rt-debug-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985549" comment="kernel-rt-debug-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985551" comment="kernel-rt-kvm-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985552" comment="kernel-rt-modules-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985553" comment="kernel-rt-modules-core-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985554" comment="kernel-rt-modules-extra-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985555" comment="kernel-tools-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985556" comment="kernel-tools-libs-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985558" comment="kernel-uki-virt-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985559" comment="kernel-uki-virt-addons-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985561" comment="perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985562" comment="python3-perf-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985563" comment="rtla-5.14.0-570.12.1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009985564" comment="rv-5.14.0-570.12.1.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7345</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7345" ref_url="https://www.suse.com/security/cve/CVE-2025-7345" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001903.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02954-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023946.html" source="SUSE-SU"/>
    <description>
    A flaw exists in gdk-pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib's g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-12"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7345/">CVE-2025-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7345">CVE-2025-7345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246114">SUSE bug 1246114</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010013274" comment="gdk-pixbuf2-2.42.6-6.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013275" comment="gdk-pixbuf2-devel-2.42.6-6.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010013276" comment="gdk-pixbuf2-modules-2.42.6-6.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7425</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7425" ref_url="https://www.suse.com/security/cve/CVE-2025-7425" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001861.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12450" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02617-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02620-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02621-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02758-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-02"/>
	<updated date="2025-08-30"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-7425/">CVE-2025-7425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7425">CVE-2025-7425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246296">SUSE bug 1246296</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010011646" comment="libxml2-2.9.13-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011647" comment="libxml2-devel-2.9.13-11.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011648" comment="python3-libxml2-2.9.13-11.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7493</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7493" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7493" ref_url="https://www.suse.com/security/cve/CVE-2025-7493" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002053.html" source="SUSE-SU"/>
		<reference ref_id="ESSA-2025:3455" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002054.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17084" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002051.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003097.html" source="SUSE-SU"/>
    <description>
    A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrator's name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-02"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-7493/">CVE-2025-7493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7493">CVE-2025-7493 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054063" comment="ipa-client-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054064" comment="ipa-client-common-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054065" comment="ipa-client-encrypted-dns-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054066" comment="ipa-client-epn-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054067" comment="ipa-client-samba-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054068" comment="ipa-common-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054069" comment="ipa-selinux-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054070" comment="ipa-selinux-luna-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054071" comment="ipa-selinux-nfast-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054072" comment="ipa-server-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054073" comment="ipa-server-common-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054074" comment="ipa-server-dns-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054075" comment="ipa-server-encrypted-dns-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054076" comment="ipa-server-trust-ad-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054077" comment="python3-ipaclient-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054078" comment="python3-ipalib-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054079" comment="python3-ipaserver-4.12.2-22.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054080" comment="python3-ipatests-4.12.2-22.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8027</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8027" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8028</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8028" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8029</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8029" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8030</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8030" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8031</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8031" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8032</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8032" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8033</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8033" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8034</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8034" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8035</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8035" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-07-26"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010010154" comment="firefox-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010010155" comment="firefox-x11-128.13.0-1.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010011443" comment="thunderbird-128.13.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8058</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8058" ref_url="https://www.suse.com/security/cve/CVE-2025-8058" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001875.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12980" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02964-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
    <description>
    The regcomp function in the GNU C library version from 2.4 to 2.41 is 
subject to a double free if some previous allocation fails. It can be 
accomplished either by a malloc failure or by using an interposed malloc
 that injects random malloc failures. The double free can allow buffer 
manipulation depending of how the regex is constructed. This issue 
affects all architectures and ABIs supported by the GNU C library.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-06"/>
	<updated date="2026-03-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H" href="https://www.suse.com/security/cve/CVE-2025-8058/">CVE-2025-8058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8058">CVE-2025-8058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246965">SUSE bug 1246965</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010012469" comment="glibc-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012470" comment="glibc-all-langpacks-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012471" comment="glibc-benchtests-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012472" comment="glibc-common-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012473" comment="glibc-devel-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012474" comment="glibc-doc-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012475" comment="glibc-gconv-extra-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012476" comment="glibc-headers-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012477" comment="glibc-langpack-aa-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012478" comment="glibc-langpack-af-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012479" comment="glibc-langpack-agr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012480" comment="glibc-langpack-ak-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012481" comment="glibc-langpack-am-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012482" comment="glibc-langpack-an-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012483" comment="glibc-langpack-anp-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012484" comment="glibc-langpack-ar-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012485" comment="glibc-langpack-as-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012486" comment="glibc-langpack-ast-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012487" comment="glibc-langpack-ayc-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012488" comment="glibc-langpack-az-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012489" comment="glibc-langpack-be-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012490" comment="glibc-langpack-bem-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012491" comment="glibc-langpack-ber-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012492" comment="glibc-langpack-bg-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012493" comment="glibc-langpack-bhb-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012494" comment="glibc-langpack-bho-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012495" comment="glibc-langpack-bi-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012496" comment="glibc-langpack-bn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012497" comment="glibc-langpack-bo-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012498" comment="glibc-langpack-br-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012499" comment="glibc-langpack-brx-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012500" comment="glibc-langpack-bs-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012501" comment="glibc-langpack-byn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012502" comment="glibc-langpack-ca-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012503" comment="glibc-langpack-ce-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012504" comment="glibc-langpack-chr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012505" comment="glibc-langpack-ckb-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012506" comment="glibc-langpack-cmn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012507" comment="glibc-langpack-crh-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012508" comment="glibc-langpack-cs-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012509" comment="glibc-langpack-csb-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012510" comment="glibc-langpack-cv-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012511" comment="glibc-langpack-cy-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012512" comment="glibc-langpack-da-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012513" comment="glibc-langpack-de-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012514" comment="glibc-langpack-doi-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012515" comment="glibc-langpack-dsb-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012516" comment="glibc-langpack-dv-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012517" comment="glibc-langpack-dz-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012518" comment="glibc-langpack-el-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012519" comment="glibc-langpack-en-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012520" comment="glibc-langpack-eo-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012521" comment="glibc-langpack-es-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012522" comment="glibc-langpack-et-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012523" comment="glibc-langpack-eu-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012524" comment="glibc-langpack-fa-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012525" comment="glibc-langpack-ff-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012526" comment="glibc-langpack-fi-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012527" comment="glibc-langpack-fil-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012528" comment="glibc-langpack-fo-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012529" comment="glibc-langpack-fr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012530" comment="glibc-langpack-fur-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012531" comment="glibc-langpack-fy-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012532" comment="glibc-langpack-ga-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012533" comment="glibc-langpack-gd-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012534" comment="glibc-langpack-gez-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012535" comment="glibc-langpack-gl-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012536" comment="glibc-langpack-gu-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012537" comment="glibc-langpack-gv-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012538" comment="glibc-langpack-ha-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012539" comment="glibc-langpack-hak-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012540" comment="glibc-langpack-he-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012541" comment="glibc-langpack-hi-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012542" comment="glibc-langpack-hif-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012543" comment="glibc-langpack-hne-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012544" comment="glibc-langpack-hr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012545" comment="glibc-langpack-hsb-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012546" comment="glibc-langpack-ht-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012547" comment="glibc-langpack-hu-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012548" comment="glibc-langpack-hy-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012549" comment="glibc-langpack-ia-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012550" comment="glibc-langpack-id-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012551" comment="glibc-langpack-ig-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012552" comment="glibc-langpack-ik-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012553" comment="glibc-langpack-is-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012554" comment="glibc-langpack-it-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012555" comment="glibc-langpack-iu-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012556" comment="glibc-langpack-ja-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012557" comment="glibc-langpack-ka-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012558" comment="glibc-langpack-kab-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012559" comment="glibc-langpack-kk-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012560" comment="glibc-langpack-kl-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012561" comment="glibc-langpack-km-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012562" comment="glibc-langpack-kn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012563" comment="glibc-langpack-ko-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012564" comment="glibc-langpack-kok-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012565" comment="glibc-langpack-ks-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012566" comment="glibc-langpack-ku-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012567" comment="glibc-langpack-kw-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012568" comment="glibc-langpack-ky-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012569" comment="glibc-langpack-lb-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012570" comment="glibc-langpack-lg-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012571" comment="glibc-langpack-li-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012572" comment="glibc-langpack-lij-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012573" comment="glibc-langpack-ln-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012574" comment="glibc-langpack-lo-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012575" comment="glibc-langpack-lt-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012576" comment="glibc-langpack-lv-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012577" comment="glibc-langpack-lzh-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012578" comment="glibc-langpack-mag-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012579" comment="glibc-langpack-mai-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012580" comment="glibc-langpack-mfe-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012581" comment="glibc-langpack-mg-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012582" comment="glibc-langpack-mhr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012583" comment="glibc-langpack-mi-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012584" comment="glibc-langpack-miq-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012585" comment="glibc-langpack-mjw-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012586" comment="glibc-langpack-mk-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012587" comment="glibc-langpack-ml-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012588" comment="glibc-langpack-mn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012589" comment="glibc-langpack-mni-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012590" comment="glibc-langpack-mnw-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012591" comment="glibc-langpack-mr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012592" comment="glibc-langpack-ms-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012593" comment="glibc-langpack-mt-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012594" comment="glibc-langpack-my-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012595" comment="glibc-langpack-nan-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012596" comment="glibc-langpack-nb-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012597" comment="glibc-langpack-nds-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012598" comment="glibc-langpack-ne-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012599" comment="glibc-langpack-nhn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012600" comment="glibc-langpack-niu-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012601" comment="glibc-langpack-nl-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012602" comment="glibc-langpack-nn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012603" comment="glibc-langpack-nr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012604" comment="glibc-langpack-nso-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012605" comment="glibc-langpack-oc-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012606" comment="glibc-langpack-om-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012607" comment="glibc-langpack-or-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012608" comment="glibc-langpack-os-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012609" comment="glibc-langpack-pa-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012610" comment="glibc-langpack-pap-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012611" comment="glibc-langpack-pl-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012612" comment="glibc-langpack-ps-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012613" comment="glibc-langpack-pt-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012614" comment="glibc-langpack-quz-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012615" comment="glibc-langpack-raj-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012616" comment="glibc-langpack-ro-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012617" comment="glibc-langpack-ru-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012618" comment="glibc-langpack-rw-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012619" comment="glibc-langpack-sa-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012620" comment="glibc-langpack-sah-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012621" comment="glibc-langpack-sat-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012622" comment="glibc-langpack-sc-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012623" comment="glibc-langpack-sd-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012624" comment="glibc-langpack-se-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012625" comment="glibc-langpack-sgs-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012626" comment="glibc-langpack-shn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012627" comment="glibc-langpack-shs-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012628" comment="glibc-langpack-si-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012629" comment="glibc-langpack-sid-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012630" comment="glibc-langpack-sk-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012631" comment="glibc-langpack-sl-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012632" comment="glibc-langpack-sm-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012633" comment="glibc-langpack-so-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012634" comment="glibc-langpack-sq-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012635" comment="glibc-langpack-sr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012636" comment="glibc-langpack-ss-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012637" comment="glibc-langpack-st-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012638" comment="glibc-langpack-sv-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012639" comment="glibc-langpack-sw-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012640" comment="glibc-langpack-szl-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012641" comment="glibc-langpack-ta-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012642" comment="glibc-langpack-tcy-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012643" comment="glibc-langpack-te-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012644" comment="glibc-langpack-tg-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012645" comment="glibc-langpack-th-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012646" comment="glibc-langpack-the-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012647" comment="glibc-langpack-ti-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012648" comment="glibc-langpack-tig-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012649" comment="glibc-langpack-tk-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012650" comment="glibc-langpack-tl-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012651" comment="glibc-langpack-tn-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012652" comment="glibc-langpack-to-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012653" comment="glibc-langpack-tpi-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012654" comment="glibc-langpack-tr-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012655" comment="glibc-langpack-ts-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012656" comment="glibc-langpack-tt-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012657" comment="glibc-langpack-ug-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012658" comment="glibc-langpack-uk-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012659" comment="glibc-langpack-unm-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012660" comment="glibc-langpack-ur-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012661" comment="glibc-langpack-uz-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012662" comment="glibc-langpack-ve-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012663" comment="glibc-langpack-vi-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012664" comment="glibc-langpack-wa-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012665" comment="glibc-langpack-wae-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012666" comment="glibc-langpack-wal-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012667" comment="glibc-langpack-wo-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012668" comment="glibc-langpack-xh-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012669" comment="glibc-langpack-yi-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012670" comment="glibc-langpack-yo-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012671" comment="glibc-langpack-yue-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012672" comment="glibc-langpack-yuw-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012673" comment="glibc-langpack-zh-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012674" comment="glibc-langpack-zu-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012675" comment="glibc-locale-source-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012676" comment="glibc-minimal-langpack-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012677" comment="glibc-nss-devel-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012678" comment="glibc-static-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012679" comment="glibc-utils-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012680" comment="libnsl-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012681" comment="nscd-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012682" comment="nss_db-2.34-168.el9_6.23 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010012683" comment="nss_hesiod-2.34-168.el9_6.23 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8067</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8067" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8067" ref_url="https://www.suse.com/security/cve/CVE-2025-8067" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15017" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001975.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15018" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03016-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03017-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024073.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-02-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-8067/">CVE-2025-8067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248502">SUSE bug 1248502</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017017" comment="libudisks2-2.9.4-11.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017018" comment="libudisks2-devel-2.9.4-11.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017019" comment="udisks2-2.9.4-11.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017020" comment="udisks2-iscsi-2.9.4-11.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017021" comment="udisks2-lsm-2.9.4-11.el9_6.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017022" comment="udisks2-lvm2-2.9.4-11.el9_6.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8176</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20956" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247108">SUSE bug 1247108</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054127" comment="libtiff-4.4.0-15.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054128" comment="libtiff-devel-4.4.0-15.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054129" comment="libtiff-tools-4.4.0-15.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8194</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002047.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001955.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001949.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001954.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15007" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001968.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15010" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001970.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15019" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. 

This vulnerability can be mitigated by including the following patch after importing the “tarfile” module:   https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-05"/>
	<updated date="2026-03-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247249">SUSE bug 1247249</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010017023" comment="python-unversioned-command-3.9.21-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017024" comment="python3-3.9.21-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017025" comment="python3-debug-3.9.21-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017026" comment="python3-devel-3.9.21-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017027" comment="python3-idle-3.9.21-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017028" comment="python3-libs-3.9.21-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017029" comment="python3-test-3.9.21-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017030" comment="python3-tkinter-3.9.21-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017010" comment="python3.11-3.11.11-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017011" comment="python3.11-debug-3.11.11-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017012" comment="python3.11-devel-3.11.11-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017013" comment="python3.11-idle-3.11.11-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017014" comment="python3.11-libs-3.11.11-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017015" comment="python3.11-test-3.11.11-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017016" comment="python3.11-tkinter-3.11.11-2.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017003" comment="python3.12-3.12.9-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017004" comment="python3.12-debug-3.12.9-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017005" comment="python3.12-devel-3.12.9-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017006" comment="python3.12-idle-3.12.9-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017007" comment="python3.12-libs-3.12.9-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017008" comment="python3.12-test-3.12.9-1.el9_6.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010017009" comment="python3.12-tkinter-3.12.9-1.el9_6.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8291</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8291" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23323" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003148.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002346.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0355" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    The 'zipfile' module would not check the validity of the ZIP64 End of
Central Directory (EOCD) Locator record offset value would not be used to
locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be
assumed to be the previous record in the ZIP archive. This could be abused
to create ZIP archives that are handled differently by the 'zipfile' module
compared to other ZIP implementations.


Remediation maintains this behavior, but checks that the offset specified
in the ZIP64 EOCD Locator record matches the expected value.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251305">SUSE bug 1251305</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054505" comment="python-unversioned-command-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054506" comment="python3-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054507" comment="python3-debug-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054508" comment="python3-devel-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054509" comment="python3-idle-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054510" comment="python3-libs-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054511" comment="python3-test-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054512" comment="python3-tkinter-3.9.25-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054488" comment="python3.12-3.12.12-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054489" comment="python3.12-debug-3.12.12-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054490" comment="python3.12-devel-3.12.12-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054491" comment="python3.12-idle-3.12.12-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054492" comment="python3.12-libs-3.12.12-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054493" comment="python3.12-test-3.12.12-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054494" comment="python3.12-tkinter-3.12.12-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8677</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8677" ref_url="https://www.suse.com/security/cve/CVE-2025-8677" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html" source="SUSE-SU"/>
    <description>
    Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion.
This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8677/">CVE-2025-8677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8677">CVE-2025-8677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252378">SUSE bug 1252378</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054165" comment="bind9.18-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054166" comment="bind9.18-chroot-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054167" comment="bind9.18-devel-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054168" comment="bind9.18-dnssec-utils-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054169" comment="bind9.18-doc-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054170" comment="bind9.18-libs-9.18.29-5.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054171" comment="bind9.18-utils-9.18.29-5.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8713" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8713" ref_url="https://www.suse.com/security/cve/CVE-2025-8713" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03005-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03018-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03019-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041426.html" source="SUSE-SU"/>
    <description>
    PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access.  Separately, statistics allow a user to read sampled data that a row security policy intended to hide.  PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process.  Prior to this release, a user could craft a leaky operator that bypassed view access control lists (ACLs) and bypassed row security policies in partitioning or table inheritance hierarchies.  Reachable statistics data notably included histograms and most-common-values lists.  CVE-2017-7484 and CVE-2019-10130 intended to close this class of vulnerability, but this gap remained.  Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8713/">CVE-2025-8713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8713">CVE-2025-8713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248120">SUSE bug 1248120</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016337" comment="postgresql-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016338" comment="postgresql-contrib-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016339" comment="postgresql-docs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016340" comment="postgresql-plperl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016341" comment="postgresql-plpython3-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016342" comment="postgresql-pltcl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016343" comment="postgresql-private-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016344" comment="postgresql-private-libs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016345" comment="postgresql-server-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016346" comment="postgresql-server-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016347" comment="postgresql-static-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016348" comment="postgresql-test-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016349" comment="postgresql-test-rpm-macros-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016350" comment="postgresql-upgrade-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016351" comment="postgresql-upgrade-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8714" ref_url="https://www.suse.com/security/cve/CVE-2025-8714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14827" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001947.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003067.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14878" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001958.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14899" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001953.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15021" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002076.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15022" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002095.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16099" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03005-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03018-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03019-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041426.html" source="SUSE-SU"/>
    <description>
    Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands.  pg_dumpall is also affected.  pg_restore is affected when used to generate a plain-format dump.  This is similar to MySQL CVE-2024-21096.  Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8714/">CVE-2025-8714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8714">CVE-2025-8714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248122">SUSE bug 1248122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016337" comment="postgresql-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016338" comment="postgresql-contrib-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016339" comment="postgresql-docs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016340" comment="postgresql-plperl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016341" comment="postgresql-plpython3-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016342" comment="postgresql-pltcl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016343" comment="postgresql-private-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016344" comment="postgresql-private-libs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016345" comment="postgresql-server-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016346" comment="postgresql-server-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016347" comment="postgresql-static-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016348" comment="postgresql-test-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016349" comment="postgresql-test-rpm-macros-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016350" comment="postgresql-upgrade-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016351" comment="postgresql-upgrade-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8715" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8715" ref_url="https://www.suse.com/security/cve/CVE-2025-8715" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14827" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001947.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14862" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003067.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14878" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001958.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14899" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001953.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15021" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002076.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15022" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03005-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03018-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03019-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03019-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03030-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03031-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041426.html" source="SUSE-SU"/>
    <description>
    Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name.  The same attacks can achieve SQL injection as a superuser of the restore target server.  pg_dumpall, pg_restore, and pg_upgrade are also affected.  Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.  Versions before 11.20 are unaffected.  CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-30"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8715/">CVE-2025-8715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8715">CVE-2025-8715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248119">SUSE bug 1248119</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016337" comment="postgresql-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016338" comment="postgresql-contrib-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016339" comment="postgresql-docs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016340" comment="postgresql-plperl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016341" comment="postgresql-plpython3-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016342" comment="postgresql-pltcl-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016343" comment="postgresql-private-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016344" comment="postgresql-private-libs-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016345" comment="postgresql-server-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016346" comment="postgresql-server-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016347" comment="postgresql-static-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016348" comment="postgresql-test-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016349" comment="postgresql-test-rpm-macros-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016350" comment="postgresql-upgrade-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016351" comment="postgresql-upgrade-devel-16.10-1.module+el9.6.0+23420+848a4539 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8941</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8941" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8941" ref_url="https://www.suse.com/security/cve/CVE-2025-8941" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15099" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001966.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15106" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001982.html" source="SUSE-SU"/>
    <description>
    A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a "complete" fix for CVE-2025-6020.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-04"/>
	<updated date="2025-09-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8941/">CVE-2025-8941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8941">CVE-2025-8941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248073">SUSE bug 1248073</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016906" comment="pam-1.5.1-26.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016907" comment="pam-devel-1.5.1-26.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016908" comment="pam-docs-1.5.1-26.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9086</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002290.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23383" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002323.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023512.html" source="SUSE-SU"/>
    <description>
    1. A cookie is set using the `secure` keyword for `https://target` 
 2. curl is redirected to or otherwise made to speak with `http://target` (same 
   hostname, but using clear text HTTP) using the same cookie set 
 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`).
   Since this site is not secure, the cookie *should* just be ignored.
4. A bug in the path comparison logic makes curl read outside a heap buffer
   boundary

The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249191">SUSE bug 1249191</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054875" comment="curl-7.76.1-35.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054876" comment="curl-minimal-7.76.1-35.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054877" comment="libcurl-7.76.1-35.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054878" comment="libcurl-devel-7.76.1-35.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054879" comment="libcurl-minimal-7.76.1-35.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9179</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    An attacker was able to perform memory corruption in the GMP process which processes encrypted media. This process is also heavily sandboxed, but represents slightly different privileges from the content process. This vulnerability was fixed in Firefox 142, Firefox ESR 115.27, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016333" comment="firefox-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016334" comment="firefox-x11-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016097" comment="thunderbird-128.14.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9180</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 142, Firefox ESR 115.27, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016333" comment="firefox-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016334" comment="firefox-x11-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016097" comment="thunderbird-128.14.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9181</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Uninitialized memory in the JavaScript Engine component. This vulnerability was fixed in Firefox 142, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016333" comment="firefox-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016334" comment="firefox-x11-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016097" comment="thunderbird-128.14.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9182</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9182" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9182" ref_url="https://www.suse.com/security/cve/CVE-2025-9182" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
    <description>
    Denial-of-service due to out-of-memory in the Graphics: WebRender component. This vulnerability was fixed in Firefox 142, Firefox ESR 140.2, Thunderbird 142, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9182/">CVE-2025-9182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9182">CVE-2025-9182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016333" comment="firefox-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016334" comment="firefox-x11-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016097" comment="thunderbird-128.14.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9185</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 142, Firefox ESR 115.27, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-08-29"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016333" comment="firefox-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016334" comment="firefox-x11-128.14.0-2.el9_6 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016097" comment="thunderbird-128.14.0-3.el9_6 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9230</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21174" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002260.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21255" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002463.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2776" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03630-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250232">SUSE bug 1250232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250410">SUSE bug 1250410</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055166" comment="edk2-ovmf-20241117-4.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055167" comment="edk2-tools-20241117-4.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055168" comment="edk2-tools-doc-20241117-4.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054173" comment="openssl-3.5.1-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054174" comment="openssl-devel-3.5.1-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054175" comment="openssl-libs-3.5.1-4.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054176" comment="openssl-perl-3.5.1-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9566</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9566" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15904" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002024.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.

Binary-Affected: podman
Upstream-version-introduced: v4.0.0
Upstream-version-fixed: v5.6.1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-09-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249154">SUSE bug 1249154</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054051" comment="podman-5.6.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054052" comment="podman-docker-5.6.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054053" comment="podman-plugins-5.6.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054054" comment="podman-remote-5.6.0-6.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054055" comment="podman-tests-5.6.0-6.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9714" ref_url="https://www.suse.com/security/cve/CVE-2025-9714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22376" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003133.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023291.html" source="SUSE-SU"/>
    <description>
    Uncontrolled recursion in  XPath evaluation  in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions `xmlXPathRunEval`, `xmlXPathCtxtCompile`, and `xmlXPathEvalExpr` were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-10"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9714/">CVE-2025-9714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9714">CVE-2025-9714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249076">SUSE bug 1249076</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054278" comment="libxml2-2.9.13-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054279" comment="libxml2-devel-2.9.13-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054280" comment="python3-libxml2-2.9.13-14.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9820</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9820" ref_url="https://www.suse.com/security/cve/CVE-2025-9820" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003274.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5585" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045347.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9820/">CVE-2025-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9820">CVE-2025-9820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254132">SUSE bug 1254132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055666" comment="gnutls-3.8.3-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055667" comment="gnutls-c++-3.8.3-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055668" comment="gnutls-dane-3.8.3-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055669" comment="gnutls-devel-3.8.3-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055670" comment="gnutls-utils-3.8.3-10.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9900</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9900" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17675" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19276" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002139.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20956" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023168.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.

By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250404">SUSE bug 1250404</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054127" comment="libtiff-4.4.0-15.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054128" comment="libtiff-devel-4.4.0-15.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054129" comment="libtiff-tools-4.4.0-15.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0719</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0719" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002479.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2214" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002486.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2215" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002487.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256399">SUSE bug 1256399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055111" comment="libsoup-2.72.0-12.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055112" comment="libsoup-devel-2.72.0-12.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0797</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0797" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0797" ref_url="https://www.suse.com/security/cve/CVE-2026-0797" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4173" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003246.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002603.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024106.html" source="SUSE-SU"/>
    <description>
    GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ICO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28599.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0797/">CVE-2026-0797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0797">CVE-2026-0797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257549">SUSE bug 1257549</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055664" comment="gimp-3.0.4-1.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055665" comment="gimp-libs-3.0.4-1.el9_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0861</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0861" ref_url="https://www.suse.com/security/cve/CVE-2026-0861" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024608.html" source="SUSE-SU"/>
    <description>
    Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.

Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1&lt;&lt;62+ 1, 1&lt;&lt;63] and exactly 1&lt;&lt;63 for posix_memalign and aligned_alloc.

Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0861/">CVE-2026-0861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0861">CVE-2026-0861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256766">SUSE bug 1256766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256913">SUSE bug 1256913</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055197" comment="glibc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055198" comment="glibc-all-langpacks-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055199" comment="glibc-benchtests-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055200" comment="glibc-common-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055201" comment="glibc-devel-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055202" comment="glibc-doc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055203" comment="glibc-gconv-extra-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055204" comment="glibc-headers-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055205" comment="glibc-langpack-aa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055206" comment="glibc-langpack-af-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055207" comment="glibc-langpack-agr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055208" comment="glibc-langpack-ak-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055209" comment="glibc-langpack-am-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055210" comment="glibc-langpack-an-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055211" comment="glibc-langpack-anp-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055212" comment="glibc-langpack-ar-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055213" comment="glibc-langpack-as-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055214" comment="glibc-langpack-ast-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055215" comment="glibc-langpack-ayc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055216" comment="glibc-langpack-az-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055217" comment="glibc-langpack-be-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055218" comment="glibc-langpack-bem-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055219" comment="glibc-langpack-ber-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055220" comment="glibc-langpack-bg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055221" comment="glibc-langpack-bhb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055222" comment="glibc-langpack-bho-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055223" comment="glibc-langpack-bi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055224" comment="glibc-langpack-bn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055225" comment="glibc-langpack-bo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055226" comment="glibc-langpack-br-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055227" comment="glibc-langpack-brx-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055228" comment="glibc-langpack-bs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055229" comment="glibc-langpack-byn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055230" comment="glibc-langpack-ca-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055231" comment="glibc-langpack-ce-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055232" comment="glibc-langpack-chr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055233" comment="glibc-langpack-ckb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055234" comment="glibc-langpack-cmn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055235" comment="glibc-langpack-crh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055236" comment="glibc-langpack-cs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055237" comment="glibc-langpack-csb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055238" comment="glibc-langpack-cv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055239" comment="glibc-langpack-cy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055240" comment="glibc-langpack-da-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055241" comment="glibc-langpack-de-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055242" comment="glibc-langpack-doi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055243" comment="glibc-langpack-dsb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055244" comment="glibc-langpack-dv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055245" comment="glibc-langpack-dz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055246" comment="glibc-langpack-el-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055247" comment="glibc-langpack-en-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055248" comment="glibc-langpack-eo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055249" comment="glibc-langpack-es-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055250" comment="glibc-langpack-et-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055251" comment="glibc-langpack-eu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055252" comment="glibc-langpack-fa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055253" comment="glibc-langpack-ff-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055254" comment="glibc-langpack-fi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055255" comment="glibc-langpack-fil-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055256" comment="glibc-langpack-fo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055257" comment="glibc-langpack-fr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055258" comment="glibc-langpack-fur-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055259" comment="glibc-langpack-fy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055260" comment="glibc-langpack-ga-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055261" comment="glibc-langpack-gd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055262" comment="glibc-langpack-gez-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055263" comment="glibc-langpack-gl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055264" comment="glibc-langpack-gu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055265" comment="glibc-langpack-gv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055266" comment="glibc-langpack-ha-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055267" comment="glibc-langpack-hak-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055268" comment="glibc-langpack-he-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055269" comment="glibc-langpack-hi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055270" comment="glibc-langpack-hif-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055271" comment="glibc-langpack-hne-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055272" comment="glibc-langpack-hr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055273" comment="glibc-langpack-hsb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055274" comment="glibc-langpack-ht-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055275" comment="glibc-langpack-hu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055276" comment="glibc-langpack-hy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055277" comment="glibc-langpack-ia-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055278" comment="glibc-langpack-id-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055279" comment="glibc-langpack-ig-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055280" comment="glibc-langpack-ik-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055281" comment="glibc-langpack-is-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055282" comment="glibc-langpack-it-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055283" comment="glibc-langpack-iu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055284" comment="glibc-langpack-ja-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055285" comment="glibc-langpack-ka-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055286" comment="glibc-langpack-kab-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055287" comment="glibc-langpack-kk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055288" comment="glibc-langpack-kl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055289" comment="glibc-langpack-km-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055290" comment="glibc-langpack-kn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055291" comment="glibc-langpack-ko-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055292" comment="glibc-langpack-kok-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055293" comment="glibc-langpack-ks-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055294" comment="glibc-langpack-ku-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055295" comment="glibc-langpack-kw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055296" comment="glibc-langpack-ky-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055297" comment="glibc-langpack-lb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055298" comment="glibc-langpack-lg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055299" comment="glibc-langpack-li-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055300" comment="glibc-langpack-lij-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055301" comment="glibc-langpack-ln-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055302" comment="glibc-langpack-lo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055303" comment="glibc-langpack-lt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055304" comment="glibc-langpack-lv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055305" comment="glibc-langpack-lzh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055306" comment="glibc-langpack-mag-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055307" comment="glibc-langpack-mai-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055308" comment="glibc-langpack-mfe-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055309" comment="glibc-langpack-mg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055310" comment="glibc-langpack-mhr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055311" comment="glibc-langpack-mi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055312" comment="glibc-langpack-miq-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055313" comment="glibc-langpack-mjw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055314" comment="glibc-langpack-mk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055315" comment="glibc-langpack-ml-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055316" comment="glibc-langpack-mn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055317" comment="glibc-langpack-mni-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055318" comment="glibc-langpack-mnw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055319" comment="glibc-langpack-mr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055320" comment="glibc-langpack-ms-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055321" comment="glibc-langpack-mt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055322" comment="glibc-langpack-my-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055323" comment="glibc-langpack-nan-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055324" comment="glibc-langpack-nb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055325" comment="glibc-langpack-nds-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055326" comment="glibc-langpack-ne-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055327" comment="glibc-langpack-nhn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055328" comment="glibc-langpack-niu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055329" comment="glibc-langpack-nl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055330" comment="glibc-langpack-nn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055331" comment="glibc-langpack-nr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055332" comment="glibc-langpack-nso-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055333" comment="glibc-langpack-oc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055334" comment="glibc-langpack-om-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055335" comment="glibc-langpack-or-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055336" comment="glibc-langpack-os-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055337" comment="glibc-langpack-pa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055338" comment="glibc-langpack-pap-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055339" comment="glibc-langpack-pl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055340" comment="glibc-langpack-ps-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055341" comment="glibc-langpack-pt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055342" comment="glibc-langpack-quz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055343" comment="glibc-langpack-raj-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055344" comment="glibc-langpack-ro-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055345" comment="glibc-langpack-ru-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055346" comment="glibc-langpack-rw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055347" comment="glibc-langpack-sa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055348" comment="glibc-langpack-sah-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055349" comment="glibc-langpack-sat-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055350" comment="glibc-langpack-sc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055351" comment="glibc-langpack-sd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055352" comment="glibc-langpack-se-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055353" comment="glibc-langpack-sgs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055354" comment="glibc-langpack-shn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055355" comment="glibc-langpack-shs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055356" comment="glibc-langpack-si-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055357" comment="glibc-langpack-sid-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055358" comment="glibc-langpack-sk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055359" comment="glibc-langpack-sl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055360" comment="glibc-langpack-sm-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055361" comment="glibc-langpack-so-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055362" comment="glibc-langpack-sq-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055363" comment="glibc-langpack-sr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055364" comment="glibc-langpack-ss-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055365" comment="glibc-langpack-st-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055366" comment="glibc-langpack-sv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055367" comment="glibc-langpack-sw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055368" comment="glibc-langpack-szl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055369" comment="glibc-langpack-ta-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055370" comment="glibc-langpack-tcy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055371" comment="glibc-langpack-te-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055372" comment="glibc-langpack-tg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055373" comment="glibc-langpack-th-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055374" comment="glibc-langpack-the-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055375" comment="glibc-langpack-ti-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055376" comment="glibc-langpack-tig-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055377" comment="glibc-langpack-tk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055378" comment="glibc-langpack-tl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055379" comment="glibc-langpack-tn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055380" comment="glibc-langpack-to-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055381" comment="glibc-langpack-tpi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055382" comment="glibc-langpack-tr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055383" comment="glibc-langpack-ts-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055384" comment="glibc-langpack-tt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055385" comment="glibc-langpack-ug-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055386" comment="glibc-langpack-uk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055387" comment="glibc-langpack-unm-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055388" comment="glibc-langpack-ur-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055389" comment="glibc-langpack-uz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055390" comment="glibc-langpack-ve-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055391" comment="glibc-langpack-vi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055392" comment="glibc-langpack-wa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055393" comment="glibc-langpack-wae-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055394" comment="glibc-langpack-wal-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055395" comment="glibc-langpack-wo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055396" comment="glibc-langpack-xh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055397" comment="glibc-langpack-yi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055398" comment="glibc-langpack-yo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055399" comment="glibc-langpack-yue-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055400" comment="glibc-langpack-yuw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055401" comment="glibc-langpack-zh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055402" comment="glibc-langpack-zu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055403" comment="glibc-locale-source-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055404" comment="glibc-minimal-langpack-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055405" comment="glibc-nss-devel-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055406" comment="glibc-static-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055407" comment="glibc-utils-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055408" comment="libnsl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055409" comment="nscd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055410" comment="nss_db-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055411" comment="nss_hesiod-2.34-231.el9_7.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0865</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0865" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    User-controlled header names and values containing newlines can allow injecting HTTP headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257042">SUSE bug 1257042</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055656" comment="python-unversioned-command-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055657" comment="python3-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055658" comment="python3-debug-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055659" comment="python3-devel-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055660" comment="python3-idle-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055661" comment="python3-libs-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055662" comment="python3-test-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055663" comment="python3-tkinter-3.9.25-3.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0877</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0878</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0879</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0880</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to integer overflow in the Graphics component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0882</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the IPC component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Information disclosure in the Networking component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0885</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0886</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0887</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0890</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Spoofing issue in the DOM: Copy &amp; Paste and Drag &amp; Drop component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0891</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-30"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054692" comment="firefox-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054693" comment="firefox-x11-140.7.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054751" comment="thunderbird-140.7.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0915</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0915" ref_url="https://www.suse.com/security/cve/CVE-2026-0915" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4772" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0915/">CVE-2026-0915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0915">CVE-2026-0915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256822">SUSE bug 1256822</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055197" comment="glibc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055198" comment="glibc-all-langpacks-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055199" comment="glibc-benchtests-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055200" comment="glibc-common-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055201" comment="glibc-devel-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055202" comment="glibc-doc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055203" comment="glibc-gconv-extra-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055204" comment="glibc-headers-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055205" comment="glibc-langpack-aa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055206" comment="glibc-langpack-af-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055207" comment="glibc-langpack-agr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055208" comment="glibc-langpack-ak-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055209" comment="glibc-langpack-am-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055210" comment="glibc-langpack-an-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055211" comment="glibc-langpack-anp-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055212" comment="glibc-langpack-ar-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055213" comment="glibc-langpack-as-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055214" comment="glibc-langpack-ast-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055215" comment="glibc-langpack-ayc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055216" comment="glibc-langpack-az-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055217" comment="glibc-langpack-be-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055218" comment="glibc-langpack-bem-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055219" comment="glibc-langpack-ber-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055220" comment="glibc-langpack-bg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055221" comment="glibc-langpack-bhb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055222" comment="glibc-langpack-bho-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055223" comment="glibc-langpack-bi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055224" comment="glibc-langpack-bn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055225" comment="glibc-langpack-bo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055226" comment="glibc-langpack-br-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055227" comment="glibc-langpack-brx-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055228" comment="glibc-langpack-bs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055229" comment="glibc-langpack-byn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055230" comment="glibc-langpack-ca-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055231" comment="glibc-langpack-ce-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055232" comment="glibc-langpack-chr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055233" comment="glibc-langpack-ckb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055234" comment="glibc-langpack-cmn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055235" comment="glibc-langpack-crh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055236" comment="glibc-langpack-cs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055237" comment="glibc-langpack-csb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055238" comment="glibc-langpack-cv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055239" comment="glibc-langpack-cy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055240" comment="glibc-langpack-da-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055241" comment="glibc-langpack-de-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055242" comment="glibc-langpack-doi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055243" comment="glibc-langpack-dsb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055244" comment="glibc-langpack-dv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055245" comment="glibc-langpack-dz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055246" comment="glibc-langpack-el-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055247" comment="glibc-langpack-en-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055248" comment="glibc-langpack-eo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055249" comment="glibc-langpack-es-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055250" comment="glibc-langpack-et-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055251" comment="glibc-langpack-eu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055252" comment="glibc-langpack-fa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055253" comment="glibc-langpack-ff-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055254" comment="glibc-langpack-fi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055255" comment="glibc-langpack-fil-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055256" comment="glibc-langpack-fo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055257" comment="glibc-langpack-fr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055258" comment="glibc-langpack-fur-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055259" comment="glibc-langpack-fy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055260" comment="glibc-langpack-ga-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055261" comment="glibc-langpack-gd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055262" comment="glibc-langpack-gez-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055263" comment="glibc-langpack-gl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055264" comment="glibc-langpack-gu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055265" comment="glibc-langpack-gv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055266" comment="glibc-langpack-ha-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055267" comment="glibc-langpack-hak-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055268" comment="glibc-langpack-he-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055269" comment="glibc-langpack-hi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055270" comment="glibc-langpack-hif-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055271" comment="glibc-langpack-hne-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055272" comment="glibc-langpack-hr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055273" comment="glibc-langpack-hsb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055274" comment="glibc-langpack-ht-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055275" comment="glibc-langpack-hu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055276" comment="glibc-langpack-hy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055277" comment="glibc-langpack-ia-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055278" comment="glibc-langpack-id-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055279" comment="glibc-langpack-ig-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055280" comment="glibc-langpack-ik-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055281" comment="glibc-langpack-is-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055282" comment="glibc-langpack-it-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055283" comment="glibc-langpack-iu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055284" comment="glibc-langpack-ja-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055285" comment="glibc-langpack-ka-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055286" comment="glibc-langpack-kab-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055287" comment="glibc-langpack-kk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055288" comment="glibc-langpack-kl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055289" comment="glibc-langpack-km-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055290" comment="glibc-langpack-kn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055291" comment="glibc-langpack-ko-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055292" comment="glibc-langpack-kok-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055293" comment="glibc-langpack-ks-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055294" comment="glibc-langpack-ku-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055295" comment="glibc-langpack-kw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055296" comment="glibc-langpack-ky-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055297" comment="glibc-langpack-lb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055298" comment="glibc-langpack-lg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055299" comment="glibc-langpack-li-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055300" comment="glibc-langpack-lij-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055301" comment="glibc-langpack-ln-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055302" comment="glibc-langpack-lo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055303" comment="glibc-langpack-lt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055304" comment="glibc-langpack-lv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055305" comment="glibc-langpack-lzh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055306" comment="glibc-langpack-mag-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055307" comment="glibc-langpack-mai-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055308" comment="glibc-langpack-mfe-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055309" comment="glibc-langpack-mg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055310" comment="glibc-langpack-mhr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055311" comment="glibc-langpack-mi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055312" comment="glibc-langpack-miq-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055313" comment="glibc-langpack-mjw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055314" comment="glibc-langpack-mk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055315" comment="glibc-langpack-ml-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055316" comment="glibc-langpack-mn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055317" comment="glibc-langpack-mni-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055318" comment="glibc-langpack-mnw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055319" comment="glibc-langpack-mr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055320" comment="glibc-langpack-ms-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055321" comment="glibc-langpack-mt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055322" comment="glibc-langpack-my-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055323" comment="glibc-langpack-nan-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055324" comment="glibc-langpack-nb-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055325" comment="glibc-langpack-nds-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055326" comment="glibc-langpack-ne-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055327" comment="glibc-langpack-nhn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055328" comment="glibc-langpack-niu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055329" comment="glibc-langpack-nl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055330" comment="glibc-langpack-nn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055331" comment="glibc-langpack-nr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055332" comment="glibc-langpack-nso-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055333" comment="glibc-langpack-oc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055334" comment="glibc-langpack-om-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055335" comment="glibc-langpack-or-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055336" comment="glibc-langpack-os-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055337" comment="glibc-langpack-pa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055338" comment="glibc-langpack-pap-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055339" comment="glibc-langpack-pl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055340" comment="glibc-langpack-ps-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055341" comment="glibc-langpack-pt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055342" comment="glibc-langpack-quz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055343" comment="glibc-langpack-raj-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055344" comment="glibc-langpack-ro-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055345" comment="glibc-langpack-ru-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055346" comment="glibc-langpack-rw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055347" comment="glibc-langpack-sa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055348" comment="glibc-langpack-sah-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055349" comment="glibc-langpack-sat-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055350" comment="glibc-langpack-sc-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055351" comment="glibc-langpack-sd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055352" comment="glibc-langpack-se-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055353" comment="glibc-langpack-sgs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055354" comment="glibc-langpack-shn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055355" comment="glibc-langpack-shs-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055356" comment="glibc-langpack-si-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055357" comment="glibc-langpack-sid-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055358" comment="glibc-langpack-sk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055359" comment="glibc-langpack-sl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055360" comment="glibc-langpack-sm-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055361" comment="glibc-langpack-so-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055362" comment="glibc-langpack-sq-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055363" comment="glibc-langpack-sr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055364" comment="glibc-langpack-ss-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055365" comment="glibc-langpack-st-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055366" comment="glibc-langpack-sv-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055367" comment="glibc-langpack-sw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055368" comment="glibc-langpack-szl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055369" comment="glibc-langpack-ta-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055370" comment="glibc-langpack-tcy-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055371" comment="glibc-langpack-te-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055372" comment="glibc-langpack-tg-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055373" comment="glibc-langpack-th-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055374" comment="glibc-langpack-the-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055375" comment="glibc-langpack-ti-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055376" comment="glibc-langpack-tig-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055377" comment="glibc-langpack-tk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055378" comment="glibc-langpack-tl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055379" comment="glibc-langpack-tn-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055380" comment="glibc-langpack-to-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055381" comment="glibc-langpack-tpi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055382" comment="glibc-langpack-tr-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055383" comment="glibc-langpack-ts-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055384" comment="glibc-langpack-tt-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055385" comment="glibc-langpack-ug-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055386" comment="glibc-langpack-uk-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055387" comment="glibc-langpack-unm-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055388" comment="glibc-langpack-ur-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055389" comment="glibc-langpack-uz-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055390" comment="glibc-langpack-ve-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055391" comment="glibc-langpack-vi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055392" comment="glibc-langpack-wa-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055393" comment="glibc-langpack-wae-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055394" comment="glibc-langpack-wal-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055395" comment="glibc-langpack-wo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055396" comment="glibc-langpack-xh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055397" comment="glibc-langpack-yi-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055398" comment="glibc-langpack-yo-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055399" comment="glibc-langpack-yue-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055400" comment="glibc-langpack-yuw-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055401" comment="glibc-langpack-zh-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055402" comment="glibc-langpack-zu-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055403" comment="glibc-locale-source-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055404" comment="glibc-minimal-langpack-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055405" comment="glibc-nss-devel-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055406" comment="glibc-static-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055407" comment="glibc-utils-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055408" comment="libnsl-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055409" comment="nscd-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055410" comment="nss_db-2.34-231.el9_7.10 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055411" comment="nss_hesiod-2.34-231.el9_7.10 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0994</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0994" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0994" ref_url="https://www.suse.com/security/cve/CVE-2026-0994" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3095" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003209.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3219" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025106.html" source="SUSE-SU"/>
    <description>
    A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.

Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python's recursion stack and causing a RecursionError.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-26"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0994/">CVE-2026-0994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0994">CVE-2026-0994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257173">SUSE bug 1257173</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055483" comment="protobuf-3.14.0-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055484" comment="protobuf-compiler-3.14.0-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055485" comment="protobuf-devel-3.14.0-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055486" comment="protobuf-lite-3.14.0-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055487" comment="protobuf-lite-devel-3.14.0-17.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055488" comment="python3-protobuf-3.14.0-17.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1299</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003253.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003265.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002594.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045283.html" source="SUSE-SU"/>
    <description>
    The 
email module, specifically the "BytesGenerator" class, didn't properly quote newlines for email headers when 
serializing an email message allowing for header injection when an email
 is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257181">SUSE bug 1257181</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055656" comment="python-unversioned-command-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055657" comment="python3-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055658" comment="python3-debug-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055659" comment="python3-devel-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055660" comment="python3-idle-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055661" comment="python3-libs-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055662" comment="python3-test-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055663" comment="python3-tkinter-3.9.25-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055671" comment="python3.11-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055672" comment="python3.11-debug-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055673" comment="python3.11-devel-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055674" comment="python3.11-idle-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055675" comment="python3.11-libs-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055676" comment="python3.11-test-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055677" comment="python3.11-tkinter-3.11.13-5.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055649" comment="python3.12-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055650" comment="python3.12-debug-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055651" comment="python3.12-devel-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055652" comment="python3.12-idle-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055653" comment="python3.12-libs-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055654" comment="python3.12-test-3.12.12-4.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055655" comment="python3.12-tkinter-3.12.12-4.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1525</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1525" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1525" ref_url="https://www.suse.com/security/cve/CVE-2026-1525" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
    <description>
    Undici allows duplicate HTTP  Content-Length  headers when they are provided in an array with case-variant names (e.g.,  Content-Length  and  content-length). This produces malformed HTTP/1.1 requests with multiple conflicting  Content-Length  values on the wire.

Who is impacted:

  *  Applications using  undici.request(),  undici.Client, or similar low-level APIs with headers passed as flat arrays
  *  Applications that accept user-controlled header names without case-normalization


Potential consequences:

  *  Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate  Content-Length  headers (400 Bad Request)
  *  HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1525/">CVE-2026-1525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1525">CVE-2026-1525 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1526" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1526" ref_url="https://www.suse.com/security/cve/CVE-2026-1526" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
    <description>
    The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a "decompression bomb") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive.

The vulnerability exists in the  PerMessageDeflate.decompress()  method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1526/">CVE-2026-1526 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1526">CVE-2026-1526 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1527</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1527" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1527" ref_url="https://www.suse.com/security/cve/CVE-2026-1527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
    <description>
    ImpactWhen an application passes user-controlled input to the  upgrade  option of  client.request(), an attacker can inject CRLF sequences (\r\n) to:

  *  Inject arbitrary HTTP headers
  *  Terminate the HTTP request prematurely and smuggle raw data to non-HTTP services (Redis, Memcached, Elasticsearch)
The vulnerability exists because undici writes the  upgrade  value directly to the socket without validating for invalid header characters:

// lib/dispatcher/client-h1.js:1121
if (upgrade) {
  header += `connection: upgrade\r\nupgrade: ${upgrade}\r\n`
}
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1527/">CVE-2026-1527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1527">CVE-2026-1527 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1528</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1528" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1528" ref_url="https://www.suse.com/security/cve/CVE-2026-1528" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
    <description>
    ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.

Patches

Patched in the undici version v7.24.0 and v6.24.0. Users should upgrade to this version or later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1528/">CVE-2026-1528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1528">CVE-2026-1528 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1642</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1642" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1642" ref_url="https://www.suse.com/security/cve/CVE-2026-1642" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3638" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003217.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4235" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003281.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002616.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5599" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003266.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002636.html" source="SUSE-SU"/>
    <description>
    A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side-along with conditions beyond the attacker's control-may be able to inject plain text data into the response from an upstream proxied server.    Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-02"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1642/">CVE-2026-1642 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1642">CVE-2026-1642 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257675">SUSE bug 1257675</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055678" comment="nginx-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055679" comment="nginx-all-modules-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055680" comment="nginx-core-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055681" comment="nginx-filesystem-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055682" comment="nginx-mod-devel-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055683" comment="nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055684" comment="nginx-mod-http-perl-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055685" comment="nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055686" comment="nginx-mod-mail-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055687" comment="nginx-mod-stream-1.26.3-2.module+el9.7.0+24008+f3da7534 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1709" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1709" ref_url="https://www.suse.com/security/cve/CVE-2026-1709" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2224" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025103.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1709/">CVE-2026-1709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1709">CVE-2026-1709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257895">SUSE bug 1257895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055113" comment="keylime-7.12.1-11.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055114" comment="keylime-base-7.12.1-11.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055115" comment="keylime-registrar-7.12.1-11.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055116" comment="keylime-selinux-7.12.1-11.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055117" comment="keylime-tenant-7.12.1-11.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055118" comment="keylime-verifier-7.12.1-11.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055119" comment="python3-keylime-7.12.1-11.el9_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1761" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002479.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2214" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002486.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2215" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002487.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257598">SUSE bug 1257598</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055111" comment="libsoup-2.72.0-12.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055112" comment="libsoup-devel-2.72.0-12.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2003</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3730" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003231.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3896" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002581.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4547" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
    <description>
    Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory.  We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely.  Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258008">SUSE bug 1258008</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054671" comment="postgis-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054672" comment="postgis-client-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054673" comment="postgis-docs-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054674" comment="postgis-upgrade-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054675" comment="postgis-utils-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055634" comment="postgresql-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055635" comment="postgresql-contrib-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055636" comment="postgresql-docs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055637" comment="postgresql-plperl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055638" comment="postgresql-plpython3-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055639" comment="postgresql-pltcl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055640" comment="postgresql-private-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055641" comment="postgresql-private-libs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055642" comment="postgresql-server-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055643" comment="postgresql-server-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055644" comment="postgresql-static-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055645" comment="postgresql-test-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055646" comment="postgresql-test-rpm-macros-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055647" comment="postgresql-upgrade-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055648" comment="postgresql-upgrade-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2004</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3730" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003231.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3896" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002561.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002565.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002560.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4064" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002566.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4528" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002576.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002581.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4547" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
    <description>
    Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.  Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258009">SUSE bug 1258009</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054671" comment="postgis-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054672" comment="postgis-client-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054673" comment="postgis-docs-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054674" comment="postgis-upgrade-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054675" comment="postgis-utils-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055634" comment="postgresql-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055635" comment="postgresql-contrib-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055636" comment="postgresql-docs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055637" comment="postgresql-plperl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055638" comment="postgresql-plpython3-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055639" comment="postgresql-pltcl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055640" comment="postgresql-private-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055641" comment="postgresql-private-libs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055642" comment="postgresql-server-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055643" comment="postgresql-server-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055644" comment="postgresql-static-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055645" comment="postgresql-test-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055646" comment="postgresql-test-rpm-macros-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055647" comment="postgresql-upgrade-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055648" comment="postgresql-upgrade-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2005</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3730" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003231.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3896" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002561.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002565.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002560.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4064" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002566.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4528" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002576.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002581.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4547" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.  Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258010">SUSE bug 1258010</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054671" comment="postgis-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054672" comment="postgis-client-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054673" comment="postgis-docs-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054674" comment="postgis-upgrade-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054675" comment="postgis-utils-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055634" comment="postgresql-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055635" comment="postgresql-contrib-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055636" comment="postgresql-docs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055637" comment="postgresql-plperl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055638" comment="postgresql-plpython3-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055639" comment="postgresql-pltcl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055640" comment="postgresql-private-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055641" comment="postgresql-private-libs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055642" comment="postgresql-server-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055643" comment="postgresql-server-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055644" comment="postgresql-static-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055645" comment="postgresql-test-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055646" comment="postgresql-test-rpm-macros-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055647" comment="postgresql-upgrade-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055648" comment="postgresql-upgrade-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2006</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3730" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003231.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3896" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002561.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002565.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002560.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4064" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002566.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4528" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002576.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002581.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4547" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
    <description>
    Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun.  That suffices to execute arbitrary code as the operating system user running the database.  Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258011">SUSE bug 1258011</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010016335" comment="pg_repack-1.5.1-1.module+el9.6.0+22880+6b241eec is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881473" comment="pgaudit-16.0-1.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010016336" comment="pgvector-0.6.2-2.module+el9.6.0+22979+c3d78d52 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054671" comment="postgis-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054672" comment="postgis-client-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054673" comment="postgis-docs-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054674" comment="postgis-upgrade-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054675" comment="postgis-utils-3.5.3-3.module+el9.7.0+23421+025f8139 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009881474" comment="postgres-decoderbufs-2.4.0-1.Final.module+el9.4.0+20427+07482b8c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055634" comment="postgresql-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055635" comment="postgresql-contrib-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055636" comment="postgresql-docs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055637" comment="postgresql-plperl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055638" comment="postgresql-plpython3-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055639" comment="postgresql-pltcl-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055640" comment="postgresql-private-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055641" comment="postgresql-private-libs-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055642" comment="postgresql-server-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055643" comment="postgresql-server-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055644" comment="postgresql-static-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055645" comment="postgresql-test-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055646" comment="postgresql-test-rpm-macros-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055647" comment="postgresql-upgrade-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055648" comment="postgresql-upgrade-devel-16.13-1.module+el9.7.0+24031+188c384c is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2044</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2044" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2044" ref_url="https://www.suse.com/security/cve/CVE-2026-2044" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4173" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003246.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002603.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024492.html" source="SUSE-SU"/>
    <description>
    GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PGM files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28158.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2044/">CVE-2026-2044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2044">CVE-2026-2044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258532">SUSE bug 1258532</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055664" comment="gimp-3.0.4-1.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055665" comment="gimp-libs-3.0.4-1.el9_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2045</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2045" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2045" ref_url="https://www.suse.com/security/cve/CVE-2026-2045" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4173" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003246.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002603.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024492.html" source="SUSE-SU"/>
    <description>
    GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28265.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2045/">CVE-2026-2045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2045">CVE-2026-2045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258533">SUSE bug 1258533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055664" comment="gimp-3.0.4-1.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055665" comment="gimp-libs-3.0.4-1.el9_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2047</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2047" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2047" ref_url="https://www.suse.com/security/cve/CVE-2026-2047" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4173" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003246.html" source="SUSE-SU"/>
    <description>
    GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ICNS files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28530.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2047/">CVE-2026-2047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2047">CVE-2026-2047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258534">SUSE bug 1258534</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055664" comment="gimp-3.0.4-1.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055665" comment="gimp-libs-3.0.4-1.el9_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2048</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2048" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2048" ref_url="https://www.suse.com/security/cve/CVE-2026-2048" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4173" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003246.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002603.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024492.html" source="SUSE-SU"/>
    <description>
    GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28591.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2048/">CVE-2026-2048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2048">CVE-2026-2048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258535">SUSE bug 1258535</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055664" comment="gimp-3.0.4-1.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055665" comment="gimp-libs-3.0.4-1.el9_7.4 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21441</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21441" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1706" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002464.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256331">SUSE bug 1256331</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054820" comment="fence-agents-aliyun-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054821" comment="fence-agents-all-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054822" comment="fence-agents-amt-ws-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054823" comment="fence-agents-apc-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054824" comment="fence-agents-apc-snmp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054825" comment="fence-agents-aws-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054826" comment="fence-agents-azure-arm-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054827" comment="fence-agents-bladecenter-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054828" comment="fence-agents-brocade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054829" comment="fence-agents-cisco-mds-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054830" comment="fence-agents-cisco-ucs-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054831" comment="fence-agents-common-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054832" comment="fence-agents-compute-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054833" comment="fence-agents-drac5-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054834" comment="fence-agents-eaton-snmp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054835" comment="fence-agents-emerson-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054836" comment="fence-agents-eps-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054837" comment="fence-agents-gce-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054838" comment="fence-agents-heuristics-ping-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054839" comment="fence-agents-hpblade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054840" comment="fence-agents-ibm-powervs-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054841" comment="fence-agents-ibm-vpc-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054842" comment="fence-agents-ibmblade-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054843" comment="fence-agents-ifmib-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054844" comment="fence-agents-ilo-moonshot-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054845" comment="fence-agents-ilo-mp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054846" comment="fence-agents-ilo-ssh-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054847" comment="fence-agents-ilo2-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054848" comment="fence-agents-intelmodular-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054849" comment="fence-agents-ipdu-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054850" comment="fence-agents-ipmilan-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054851" comment="fence-agents-kdump-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054852" comment="fence-agents-kubevirt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054853" comment="fence-agents-lpar-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054854" comment="fence-agents-mpath-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054855" comment="fence-agents-nutanix-ahv-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054856" comment="fence-agents-openstack-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054857" comment="fence-agents-redfish-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054858" comment="fence-agents-rhevm-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054859" comment="fence-agents-rsa-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054860" comment="fence-agents-rsb-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054861" comment="fence-agents-sbd-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054862" comment="fence-agents-scsi-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054863" comment="fence-agents-virsh-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054864" comment="fence-agents-vmware-rest-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054865" comment="fence-agents-vmware-soap-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054866" comment="fence-agents-wti-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054867" comment="fence-virt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054868" comment="fence-virtd-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054869" comment="fence-virtd-cpg-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054870" comment="fence-virtd-libvirt-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054871" comment="fence-virtd-multicast-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054872" comment="fence-virtd-serial-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054873" comment="fence-virtd-tcp-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054874" comment="ha-cloud-support-4.10.0-98.el9_7.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054783" comment="python3-urllib3-1.26.5-6.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054785" comment="python3.11-urllib3-1.26.12-5.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054784" comment="python3.12-urllib3-1.26.19-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21637</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256576">SUSE bug 1256576</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055188" comment="v8-12.4-devel-12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21710" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21710" ref_url="https://www.suse.com/security/cve/CVE-2026-21710" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.

When this occurs, `dest["__proto__"]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot be intercepted by `error` event listeners, meaning it cannot be handled without wrapping every `req.headersDistinct` access in a `try/catch`.

* This vulnerability affects all Node.js HTTP servers on **20.x, 22.x, 24.x, and v25.x**
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21710/">CVE-2026-21710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21710">CVE-2026-21710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260455">SUSE bug 1260455</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21711" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21711" ref_url="https://www.suse.com/security/cve/CVE-2026-21711" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js Permission Model network enforcement leaves Unix Domain Socket (UDS) server operations without the required permission checks, while all comparable network paths correctly enforce them.

As a result, code running under `--permission` without `--allow-net` can create and expose local IPC endpoints, allowing communication with other processes on the same host outside of the intended network restriction boundary.

This vulnerability affects Node.js **25.x** processes using the Permission Model where `--allow-net` is intentionally omitted to restrict network access. Note that `--allow-net` is currently an experimental feature.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21711/">CVE-2026-21711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21711">CVE-2026-21711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260458">SUSE bug 1260458</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21712" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21712" ref_url="https://www.suse.com/security/cve/CVE-2026-21712" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js URL processing causes an assertion failure in native code when `url.format()` is called with a malformed internationalized domain name (IDN) containing invalid characters, crashing the Node.js process.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21712/">CVE-2026-21712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21712">CVE-2026-21712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260460">SUSE bug 1260460</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21713" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21713" ref_url="https://www.suse.com/security/cve/CVE-2026-21713" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js HMAC verification uses a non-constant-time comparison when validating user-provided signatures, potentially leaking timing information proportional to the number of matching bytes. Under certain threat models where high-resolution timing measurements are possible, this behavior could be exploited as a timing oracle to infer HMAC values.

Node.js already provides timing-safe comparison primitives used elsewhere in the codebase, indicating this is an oversight rather than an intentional design decision.

This vulnerability affects **20.x, 22.x, 24.x, and 25.x**.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21713/">CVE-2026-21713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21713">CVE-2026-21713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260463">SUSE bug 1260463</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21714" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21714" ref_url="https://www.suse.com/security/cve/CVE-2026-21714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
    <description>
    A memory leak occurs in Node.js HTTP/2 servers when a client sends WINDOW_UPDATE frames on stream 0 (connection-level) that cause the flow control window to exceed the maximum value of 2??-1. The server correctly sends a GOAWAY frame, but the Http2Session object is never cleaned up.

This vulnerability affects HTTP2 users on Node.js 20, 22, 24 and 25.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21714/">CVE-2026-21714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21714">CVE-2026-21714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260480">SUSE bug 1260480</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21715" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21715" ref_url="https://www.suse.com/security/cve/CVE-2026-21715" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js Permission Model filesystem enforcement leaves `fs.realpathSync.native()` without the required read permission checks, while all comparable filesystem functions correctly enforce them.

As a result, code running under `--permission` with restricted `--allow-fs-read` can still use `fs.realpathSync.native()` to check file existence, resolve symlink targets, and enumerate filesystem paths outside of permitted directories.

This vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-read` is intentionally restricted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21715/">CVE-2026-21715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21715">CVE-2026-21715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260482">SUSE bug 1260482</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21716</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21716" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21716" ref_url="https://www.suse.com/security/cve/CVE-2026-21716" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
    <description>
    An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched.

As a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permissions and ownership on already-open file descriptors, bypassing the intended write restrictions.

This vulnerability affects **20.x, 22.x, 24.x, and 25.x** processes using the Permission Model where `--allow-fs-write` is intentionally restricted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21716/">CVE-2026-21716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21716">CVE-2026-21716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260462">SUSE bug 1260462</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21717" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21717" ref_url="https://www.suse.com/security/cve/CVE-2026-21717" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
    <description>
    A flaw in V8's string hashing mechanism causes integer-like strings to be hashed to their numeric value, making hash collisions trivially predictable. By crafting a request that causes many such collisions in V8's internal string table, an attacker can significantly degrade performance of the Node.js process.

The most common trigger is any endpoint that calls `JSON.parse()` on attacker-controlled input, as JSON parsing automatically internalizes short strings into the affected hash table.

This vulnerability affects **20.x, 22.x, 24.x, and 25.x**.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21717/">CVE-2026-21717 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21717">CVE-2026-21717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260494">SUSE bug 1260494</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21721" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21721" ref_url="https://www.suse.com/security/cve/CVE-2026-21721" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3529" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024905.html" source="SUSE-SU"/>
    <description>
    The dashboard permissions API does not verify the target dashboard scope and only checks the dashboards.permissions:* action. As a result, a user who has permission management rights on one dashboard can read and modify permissions on other dashboards. This is an organization-internal privilege escalation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21721/">CVE-2026-21721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21721">CVE-2026-21721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257337">SUSE bug 1257337</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055437" comment="grafana-10.2.6-18.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055438" comment="grafana-selinux-10.2.6-18.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21863</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21863" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21863" ref_url="https://www.suse.com/security/cve/CVE-2026-21863" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3507" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024650.html" source="SUSE-SU"/>
    <description>
    Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21863/">CVE-2026-21863 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21863">CVE-2026-21863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258788">SUSE bug 1258788</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055545" comment="valkey-8.0.7-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055546" comment="valkey-devel-8.0.7-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21925</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257034">SUSE bug 1257034</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040212" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040213" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040214" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040215" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040216" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040217" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040218" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040219" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040220" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040221" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040222" comment="java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040223" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040224" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040225" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040226" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040227" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040228" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053475" comment="java-11-openjdk-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053476" comment="java-11-openjdk-demo-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053477" comment="java-11-openjdk-demo-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053478" comment="java-11-openjdk-demo-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053479" comment="java-11-openjdk-devel-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053480" comment="java-11-openjdk-devel-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053481" comment="java-11-openjdk-devel-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053482" comment="java-11-openjdk-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053483" comment="java-11-openjdk-headless-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053484" comment="java-11-openjdk-headless-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053485" comment="java-11-openjdk-headless-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053486" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053487" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053488" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053489" comment="java-11-openjdk-jmods-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053490" comment="java-11-openjdk-jmods-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053491" comment="java-11-openjdk-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053492" comment="java-11-openjdk-src-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053493" comment="java-11-openjdk-src-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053494" comment="java-11-openjdk-src-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053495" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053496" comment="java-11-openjdk-static-libs-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053497" comment="java-11-openjdk-static-libs-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039028" comment="java-17-openjdk-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039029" comment="java-17-openjdk-demo-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039030" comment="java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039031" comment="java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039032" comment="java-17-openjdk-devel-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039033" comment="java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039034" comment="java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039035" comment="java-17-openjdk-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039036" comment="java-17-openjdk-headless-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039037" comment="java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039038" comment="java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039039" comment="java-17-openjdk-javadoc-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039040" comment="java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039041" comment="java-17-openjdk-jmods-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039042" comment="java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039043" comment="java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039044" comment="java-17-openjdk-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039045" comment="java-17-openjdk-src-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039046" comment="java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039047" comment="java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039048" comment="java-17-openjdk-static-libs-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039049" comment="java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039050" comment="java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039592" comment="java-21-openjdk-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039593" comment="java-21-openjdk-demo-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039594" comment="java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039595" comment="java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039596" comment="java-21-openjdk-devel-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039597" comment="java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039598" comment="java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039599" comment="java-21-openjdk-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039600" comment="java-21-openjdk-headless-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039601" comment="java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039602" comment="java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039603" comment="java-21-openjdk-javadoc-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039604" comment="java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039605" comment="java-21-openjdk-jmods-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039606" comment="java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039607" comment="java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039608" comment="java-21-openjdk-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039609" comment="java-21-openjdk-src-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039610" comment="java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039611" comment="java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039612" comment="java-21-openjdk-static-libs-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039613" comment="java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039614" comment="java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054752" comment="java-25-openjdk-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054753" comment="java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054754" comment="java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054755" comment="java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054756" comment="java-25-openjdk-demo-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054757" comment="java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054758" comment="java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054759" comment="java-25-openjdk-devel-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054760" comment="java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054761" comment="java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054762" comment="java-25-openjdk-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054763" comment="java-25-openjdk-headless-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054764" comment="java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054765" comment="java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054766" comment="java-25-openjdk-javadoc-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054767" comment="java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054768" comment="java-25-openjdk-jmods-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054769" comment="java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054770" comment="java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054771" comment="java-25-openjdk-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054772" comment="java-25-openjdk-src-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054773" comment="java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054774" comment="java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054775" comment="java-25-openjdk-static-libs-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054776" comment="java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054777" comment="java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21933</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257037">SUSE bug 1257037</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040212" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040213" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040214" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040215" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040216" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040217" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040218" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040219" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040220" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040221" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040222" comment="java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040223" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040224" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040225" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040226" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040227" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040228" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053475" comment="java-11-openjdk-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053476" comment="java-11-openjdk-demo-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053477" comment="java-11-openjdk-demo-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053478" comment="java-11-openjdk-demo-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053479" comment="java-11-openjdk-devel-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053480" comment="java-11-openjdk-devel-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053481" comment="java-11-openjdk-devel-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053482" comment="java-11-openjdk-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053483" comment="java-11-openjdk-headless-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053484" comment="java-11-openjdk-headless-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053485" comment="java-11-openjdk-headless-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053486" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053487" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053488" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053489" comment="java-11-openjdk-jmods-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053490" comment="java-11-openjdk-jmods-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053491" comment="java-11-openjdk-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053492" comment="java-11-openjdk-src-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053493" comment="java-11-openjdk-src-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053494" comment="java-11-openjdk-src-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053495" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053496" comment="java-11-openjdk-static-libs-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053497" comment="java-11-openjdk-static-libs-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039028" comment="java-17-openjdk-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039029" comment="java-17-openjdk-demo-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039030" comment="java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039031" comment="java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039032" comment="java-17-openjdk-devel-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039033" comment="java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039034" comment="java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039035" comment="java-17-openjdk-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039036" comment="java-17-openjdk-headless-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039037" comment="java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039038" comment="java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039039" comment="java-17-openjdk-javadoc-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039040" comment="java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039041" comment="java-17-openjdk-jmods-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039042" comment="java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039043" comment="java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039044" comment="java-17-openjdk-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039045" comment="java-17-openjdk-src-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039046" comment="java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039047" comment="java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039048" comment="java-17-openjdk-static-libs-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039049" comment="java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039050" comment="java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039592" comment="java-21-openjdk-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039593" comment="java-21-openjdk-demo-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039594" comment="java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039595" comment="java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039596" comment="java-21-openjdk-devel-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039597" comment="java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039598" comment="java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039599" comment="java-21-openjdk-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039600" comment="java-21-openjdk-headless-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039601" comment="java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039602" comment="java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039603" comment="java-21-openjdk-javadoc-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039604" comment="java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039605" comment="java-21-openjdk-jmods-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039606" comment="java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039607" comment="java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039608" comment="java-21-openjdk-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039609" comment="java-21-openjdk-src-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039610" comment="java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039611" comment="java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039612" comment="java-21-openjdk-static-libs-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039613" comment="java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039614" comment="java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054752" comment="java-25-openjdk-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054753" comment="java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054754" comment="java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054755" comment="java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054756" comment="java-25-openjdk-demo-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054757" comment="java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054758" comment="java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054759" comment="java-25-openjdk-devel-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054760" comment="java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054761" comment="java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054762" comment="java-25-openjdk-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054763" comment="java-25-openjdk-headless-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054764" comment="java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054765" comment="java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054766" comment="java-25-openjdk-javadoc-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054767" comment="java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054768" comment="java-25-openjdk-jmods-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054769" comment="java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054770" comment="java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054771" comment="java-25-openjdk-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054772" comment="java-25-openjdk-src-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054773" comment="java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054774" comment="java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054775" comment="java-25-openjdk-static-libs-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054776" comment="java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054777" comment="java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21936</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21936" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21936" ref_url="https://www.suse.com/security/cve/CVE-2026-21936" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003223.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5580" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002622.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003259.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002641.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21936/">CVE-2026-21936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21936">CVE-2026-21936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258057">SUSE bug 1258057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055810" comment="mecab-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055811" comment="mecab-devel-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055812" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055813" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055814" comment="mysql-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055815" comment="mysql-common-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055816" comment="mysql-devel-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055817" comment="mysql-errmsg-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055818" comment="mysql-libs-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055819" comment="mysql-server-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055820" comment="mysql-test-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055821" comment="mysql-test-data-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055822" comment="rapidjson-devel-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055823" comment="rapidjson-doc-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21937</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21937" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21937" ref_url="https://www.suse.com/security/cve/CVE-2026-21937" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003223.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5580" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002622.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003259.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002641.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21937/">CVE-2026-21937 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21937">CVE-2026-21937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258059">SUSE bug 1258059</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055810" comment="mecab-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055811" comment="mecab-devel-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055812" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055813" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055814" comment="mysql-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055815" comment="mysql-common-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055816" comment="mysql-devel-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055817" comment="mysql-errmsg-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055818" comment="mysql-libs-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055819" comment="mysql-server-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055820" comment="mysql-test-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055821" comment="mysql-test-data-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055822" comment="rapidjson-devel-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055823" comment="rapidjson-doc-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21941</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21941" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21941" ref_url="https://www.suse.com/security/cve/CVE-2026-21941" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003223.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5580" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002622.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003259.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002641.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21941/">CVE-2026-21941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21941">CVE-2026-21941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258060">SUSE bug 1258060</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055810" comment="mecab-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055811" comment="mecab-devel-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055812" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055813" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055814" comment="mysql-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055815" comment="mysql-common-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055816" comment="mysql-devel-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055817" comment="mysql-errmsg-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055818" comment="mysql-libs-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055819" comment="mysql-server-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055820" comment="mysql-test-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055821" comment="mysql-test-data-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055822" comment="rapidjson-devel-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055823" comment="rapidjson-doc-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21945</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257038">SUSE bug 1257038</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010040212" comment="java-1.8.0-openjdk-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040213" comment="java-1.8.0-openjdk-accessibility-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040214" comment="java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040215" comment="java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040216" comment="java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040217" comment="java-1.8.0-openjdk-demo-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040218" comment="java-1.8.0-openjdk-demo-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040219" comment="java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040220" comment="java-1.8.0-openjdk-devel-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040221" comment="java-1.8.0-openjdk-devel-slowdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040222" comment="java-1.8.0-openjdk-fastdebug-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040223" comment="java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040224" comment="java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040225" comment="java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040226" comment="java-1.8.0-openjdk-src-1.8.0.482.b08-1.el8 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040227" comment="java-1.8.0-openjdk-src-fastdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010040228" comment="java-1.8.0-openjdk-src-slowdebug-1.8.0.482.b08-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053475" comment="java-11-openjdk-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043334" comment="java-11-openjdk-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053476" comment="java-11-openjdk-demo-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043336" comment="java-11-openjdk-demo-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053477" comment="java-11-openjdk-demo-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053478" comment="java-11-openjdk-demo-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053479" comment="java-11-openjdk-devel-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043340" comment="java-11-openjdk-devel-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053480" comment="java-11-openjdk-devel-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053481" comment="java-11-openjdk-devel-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053482" comment="java-11-openjdk-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053483" comment="java-11-openjdk-headless-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043345" comment="java-11-openjdk-headless-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053484" comment="java-11-openjdk-headless-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053485" comment="java-11-openjdk-headless-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053486" comment="java-11-openjdk-javadoc-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043349" comment="java-11-openjdk-javadoc-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053487" comment="java-11-openjdk-javadoc-zip-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043351" comment="java-11-openjdk-javadoc-zip-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053488" comment="java-11-openjdk-jmods-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043353" comment="java-11-openjdk-jmods-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053489" comment="java-11-openjdk-jmods-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053490" comment="java-11-openjdk-jmods-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053491" comment="java-11-openjdk-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053492" comment="java-11-openjdk-src-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043358" comment="java-11-openjdk-src-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053493" comment="java-11-openjdk-src-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053494" comment="java-11-openjdk-src-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053495" comment="java-11-openjdk-static-libs-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010043362" comment="java-11-openjdk-static-libs-debug-11.0.30.0.7-1.el7_9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053496" comment="java-11-openjdk-static-libs-fastdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010053497" comment="java-11-openjdk-static-libs-slowdebug-11.0.30.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039028" comment="java-17-openjdk-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039029" comment="java-17-openjdk-demo-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039030" comment="java-17-openjdk-demo-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039031" comment="java-17-openjdk-demo-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039032" comment="java-17-openjdk-devel-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039033" comment="java-17-openjdk-devel-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039034" comment="java-17-openjdk-devel-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039035" comment="java-17-openjdk-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039036" comment="java-17-openjdk-headless-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039037" comment="java-17-openjdk-headless-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039038" comment="java-17-openjdk-headless-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039039" comment="java-17-openjdk-javadoc-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039040" comment="java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039041" comment="java-17-openjdk-jmods-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039042" comment="java-17-openjdk-jmods-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039043" comment="java-17-openjdk-jmods-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039044" comment="java-17-openjdk-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039045" comment="java-17-openjdk-src-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039046" comment="java-17-openjdk-src-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039047" comment="java-17-openjdk-src-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039048" comment="java-17-openjdk-static-libs-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039049" comment="java-17-openjdk-static-libs-fastdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039050" comment="java-17-openjdk-static-libs-slowdebug-17.0.18.0.8-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039592" comment="java-21-openjdk-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039593" comment="java-21-openjdk-demo-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039594" comment="java-21-openjdk-demo-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039595" comment="java-21-openjdk-demo-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039596" comment="java-21-openjdk-devel-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039597" comment="java-21-openjdk-devel-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039598" comment="java-21-openjdk-devel-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039599" comment="java-21-openjdk-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039600" comment="java-21-openjdk-headless-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039601" comment="java-21-openjdk-headless-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039602" comment="java-21-openjdk-headless-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039603" comment="java-21-openjdk-javadoc-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039604" comment="java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039605" comment="java-21-openjdk-jmods-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039606" comment="java-21-openjdk-jmods-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039607" comment="java-21-openjdk-jmods-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039608" comment="java-21-openjdk-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039609" comment="java-21-openjdk-src-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039610" comment="java-21-openjdk-src-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039611" comment="java-21-openjdk-src-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039612" comment="java-21-openjdk-static-libs-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039613" comment="java-21-openjdk-static-libs-fastdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010039614" comment="java-21-openjdk-static-libs-slowdebug-21.0.10.0.7-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054752" comment="java-25-openjdk-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054753" comment="java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054754" comment="java-25-openjdk-crypto-adapter-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054755" comment="java-25-openjdk-crypto-adapter-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054756" comment="java-25-openjdk-demo-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054757" comment="java-25-openjdk-demo-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054758" comment="java-25-openjdk-demo-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054759" comment="java-25-openjdk-devel-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054760" comment="java-25-openjdk-devel-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054761" comment="java-25-openjdk-devel-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054762" comment="java-25-openjdk-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054763" comment="java-25-openjdk-headless-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054764" comment="java-25-openjdk-headless-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054765" comment="java-25-openjdk-headless-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054766" comment="java-25-openjdk-javadoc-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054767" comment="java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054768" comment="java-25-openjdk-jmods-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054769" comment="java-25-openjdk-jmods-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054770" comment="java-25-openjdk-jmods-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054771" comment="java-25-openjdk-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054772" comment="java-25-openjdk-src-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054773" comment="java-25-openjdk-src-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054774" comment="java-25-openjdk-src-slowdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054775" comment="java-25-openjdk-static-libs-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054776" comment="java-25-openjdk-static-libs-fastdebug-25.0.2.0.10-1.el9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054777" comment="java-25-openjdk-static-libs-slowdebug-25.0.2.0.10-1.el9 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21948" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21948" ref_url="https://www.suse.com/security/cve/CVE-2026-21948" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003223.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5580" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002622.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003259.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002641.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21948/">CVE-2026-21948 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21948">CVE-2026-21948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258061">SUSE bug 1258061</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055810" comment="mecab-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055811" comment="mecab-devel-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055812" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055813" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055814" comment="mysql-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055815" comment="mysql-common-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055816" comment="mysql-devel-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055817" comment="mysql-errmsg-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055818" comment="mysql-libs-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055819" comment="mysql-server-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055820" comment="mysql-test-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055821" comment="mysql-test-data-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055822" comment="rapidjson-devel-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055823" comment="rapidjson-doc-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21964</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21964" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21964" ref_url="https://www.suse.com/security/cve/CVE-2026-21964" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003223.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5580" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002622.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003259.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002641.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21964/">CVE-2026-21964 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21964">CVE-2026-21964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258058">SUSE bug 1258058</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055810" comment="mecab-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055811" comment="mecab-devel-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055812" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055813" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055814" comment="mysql-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055815" comment="mysql-common-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055816" comment="mysql-devel-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055817" comment="mysql-errmsg-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055818" comment="mysql-libs-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055819" comment="mysql-server-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055820" comment="mysql-test-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055821" comment="mysql-test-data-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055822" comment="rapidjson-devel-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055823" comment="rapidjson-doc-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21968</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21968" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21968" ref_url="https://www.suse.com/security/cve/CVE-2026-21968" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003223.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5580" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002622.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003259.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002641.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6435" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002655.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21968/">CVE-2026-21968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21968">CVE-2026-21968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257736">SUSE bug 1257736</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009962391" comment="galera-26.4.20-1.module+el9.5.0+22578+dc54e53f is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054574" comment="mariadb-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054575" comment="mariadb-backup-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054576" comment="mariadb-common-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054577" comment="mariadb-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054578" comment="mariadb-embedded-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054579" comment="mariadb-embedded-devel-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054580" comment="mariadb-errmsg-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054581" comment="mariadb-gssapi-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054582" comment="mariadb-oqgraph-engine-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054583" comment="mariadb-pam-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054584" comment="mariadb-server-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054585" comment="mariadb-server-galera-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054586" comment="mariadb-server-utils-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054587" comment="mariadb-test-10.11.15-1.module+el9.7.0+23768+0a6844e9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055810" comment="mecab-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055811" comment="mecab-devel-0.996-3.module+el9.7.0+24088+36dcab8d.4 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055812" comment="mecab-ipadic-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055813" comment="mecab-ipadic-EUCJP-2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055814" comment="mysql-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055815" comment="mysql-common-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055816" comment="mysql-devel-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055817" comment="mysql-errmsg-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055818" comment="mysql-libs-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055819" comment="mysql-server-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055820" comment="mysql-test-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055821" comment="mysql-test-data-8.4.8-1.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055822" comment="rapidjson-devel-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055823" comment="rapidjson-doc-1.1.0-19.module+el9.7.0+24088+36dcab8d is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2229</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2229" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2229" ref_url="https://www.suse.com/security/cve/CVE-2026-2229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
    <description>
    ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the  server_max_window_bits  parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range  server_max_window_bits  value (outside zlib's valid range of 8-15). When the server subsequently sends a compressed frame, the client attempts to create a zlib InflateRaw instance with the invalid windowBits value, causing a synchronous RangeError exception that is not caught, resulting in immediate process termination.

The vulnerability exists because:

  *  The  isValidClientWindowBits()  function only validates that the value contains ASCII digits, not that it falls within the valid range 8-15
  *  The  createInflateRaw()  call is not wrapped in a try-catch block
  *  The resulting exception propagates up through the call stack and crashes the Node.js process
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2229/">CVE-2026-2229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2229">CVE-2026-2229 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256525">SUSE bug 1256525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055509" comment="libpng-1.6.37-12.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055510" comment="libpng-devel-1.6.37-12.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22795</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22795" ref_url="https://www.suse.com/security/cve/CVE-2026-22795" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: An invalid or NULL pointer dereference can happen in
an application processing a malformed PKCS#12 file.

Impact summary: An application processing a malformed PKCS#12 file can be
caused to dereference an invalid or NULL pointer on memory read, resulting
in a Denial of Service.

A type confusion vulnerability exists in PKCS#12 parsing code where
an ASN1_TYPE union member is accessed without first validating the type,
causing an invalid pointer read.

The location is constrained to a 1-byte address space, meaning any
attempted pointer manipulation can only target addresses between 0x00 and 0xFF.
This range corresponds to the zero page, which is unmapped on most modern
operating systems and will reliably result in a crash, leading only to a
Denial of Service. Exploiting this issue also requires a user or application
to process a maliciously crafted PKCS#12 file. It is uncommon to accept
untrusted PKCS#12 files in applications as they are usually used to store
private keys which are trusted by definition. For these reasons, the issue
was assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22795/">CVE-2026-22795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256839">SUSE bug 1256839</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22796</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22796" ref_url="https://www.suse.com/security/cve/CVE-2026-22796" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A type confusion vulnerability exists in the signature
verification of signed PKCS#7 data where an ASN1_TYPE union member is
accessed without first validating the type, causing an invalid or NULL
pointer dereference when processing malformed PKCS#7 data.

Impact summary: An application performing signature verification of PKCS#7
data or calling directly the PKCS7_digest_from_attributes() function can be
caused to dereference an invalid or NULL pointer when reading, resulting in
a Denial of Service.

The function PKCS7_digest_from_attributes() accesses the message digest attribute
value without validating its type. When the type is not V_ASN1_OCTET_STRING,
this results in accessing invalid memory through the ASN1_TYPE union, causing
a crash.

Exploiting this vulnerability requires an attacker to provide a malformed
signed PKCS#7 to an application that verifies it. The impact of the
exploit is just a Denial of Service, the PKCS7 API is legacy and applications
should be using the CMS API instead. For these reasons the issue was
assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22796/">CVE-2026-22796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256840">SUSE bug 1256840</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054948" comment="openssl-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054949" comment="openssl-devel-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054950" comment="openssl-libs-3.5.1-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054951" comment="openssl-perl-3.5.1-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22801</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256526">SUSE bug 1256526</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055509" comment="libpng-1.6.37-12.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055510" comment="libpng-devel-1.6.37-12.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22852</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22852" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22852" ref_url="https://www.suse.com/security/cve/CVE-2026-22852" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback-&gt;formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22852/">CVE-2026-22852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22852">CVE-2026-22852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256718">SUSE bug 1256718</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22854</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22854" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22854" ref_url="https://www.suse.com/security/cve/CVE-2026-22854" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22854/">CVE-2026-22854 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22854">CVE-2026-22854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256720">SUSE bug 1256720</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22855</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22855" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22855" ref_url="https://www.suse.com/security/cve/CVE-2026-22855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002530.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap out-of-bounds read occurs in the smartcard SetAttrib path when cbAttrLen does not match the actual NDR buffer length. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22855/">CVE-2026-22855 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22855">CVE-2026-22855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256721">SUSE bug 1256721</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055478" comment="freerdp-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055479" comment="freerdp-devel-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055480" comment="freerdp-libs-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055481" comment="libwinpr-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055482" comment="libwinpr-devel-2.11.7-1.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22856</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22856" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22856" ref_url="https://www.suse.com/security/cve/CVE-2026-22856" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use-after-free when one thread removes an entry from serial-&gt;IrpThreads while another reads it. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22856/">CVE-2026-22856 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22856">CVE-2026-22856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256722">SUSE bug 1256722</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22858</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22858" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22858" ref_url="https://www.suse.com/security/cve/CVE-2026-22858" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002530.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c &lt;= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22858/">CVE-2026-22858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22858">CVE-2026-22858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256724">SUSE bug 1256724</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055478" comment="freerdp-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055479" comment="freerdp-devel-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055480" comment="freerdp-libs-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055481" comment="libwinpr-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055482" comment="libwinpr-devel-2.11.7-1.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22859</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22859" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22859" ref_url="https://www.suse.com/security/cve/CVE-2026-22859" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002530.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, the URBDRC client does not perform bounds checking on server-supplied MSUSB_INTERFACE_DESCRIPTOR values and uses them as indices in libusb_udev_complete_msconfig_setup, causing an out-of-bounds read. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22859/">CVE-2026-22859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22859">CVE-2026-22859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256725">SUSE bug 1256725</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055478" comment="freerdp-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055479" comment="freerdp-devel-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055480" comment="freerdp-libs-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055481" comment="libwinpr-2.11.7-1.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055482" comment="libwinpr-devel-2.11.7-1.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22998</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22998" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22998" ref_url="https://www.suse.com/security/cve/CVE-2026-22998" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec

Commit efa56305908b ("nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length")
added ttag bounds checking and data_offset
validation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate
whether the command's data structures (cmd-&gt;req.sg and cmd-&gt;iov) have
been properly initialized before processing H2C_DATA PDUs.

The nvmet_tcp_build_pdu_iovec() function dereferences these pointers
without NULL checks. This can be triggered by sending H2C_DATA PDU
immediately after the ICREQ/ICRESP handshake, before
sending a CONNECT command or NVMe write command.

Attack vectors that trigger NULL pointer dereferences:
1. H2C_DATA PDU sent before CONNECT -&gt; both pointers NULL
2. H2C_DATA PDU for READ command -&gt; cmd-&gt;req.sg allocated, cmd-&gt;iov NULL
3. H2C_DATA PDU for uninitialized command slot -&gt; both pointers NULL

The fix validates both cmd-&gt;req.sg and cmd-&gt;iov before calling
nvmet_tcp_build_pdu_iovec(). Both checks are required because:
- Uninitialized commands: both NULL
- READ commands: cmd-&gt;req.sg allocated, cmd-&gt;iov NULL
- WRITE commands: both allocated
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22998/">CVE-2026-22998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257209">SUSE bug 1257209</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055132" comment="kernel-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055133" comment="kernel-abi-stablelists-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055134" comment="kernel-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055135" comment="kernel-cross-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055136" comment="kernel-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055137" comment="kernel-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055138" comment="kernel-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055139" comment="kernel-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055140" comment="kernel-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055141" comment="kernel-debug-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055142" comment="kernel-doc-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055143" comment="kernel-headers-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055144" comment="kernel-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055145" comment="kernel-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055146" comment="kernel-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055147" comment="kernel-rt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055148" comment="kernel-rt-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055149" comment="kernel-rt-debug-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055150" comment="kernel-rt-debug-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055151" comment="kernel-rt-debug-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055152" comment="kernel-rt-debug-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055153" comment="kernel-rt-debug-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055154" comment="kernel-rt-modules-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055155" comment="kernel-rt-modules-core-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055156" comment="kernel-rt-modules-extra-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055157" comment="kernel-tools-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055158" comment="kernel-tools-libs-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055159" comment="kernel-uki-virt-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055160" comment="kernel-uki-virt-addons-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055161" comment="libperf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055162" comment="perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055163" comment="python3-perf-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055164" comment="rtla-5.14.0-611.34.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055165" comment="rv-5.14.0-611.34.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23001</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23001" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002557.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macvlan: fix possible UAF in macvlan_forward_source()

Add RCU protection on (struct macvlan_source_entry)-&gt;vlan.

Whenever macvlan_hash_del_source() is called, we must clear
entry-&gt;vlan pointer before RCU grace period starts.

This allows macvlan_forward_source() to skip over
entries queued for freeing.

Note that macvlan_dev are already RCU protected, as they
are embedded in a standard netdev (netdev_priv(ndev)).

https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257232">SUSE bug 1257232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257233">SUSE bug 1257233</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055600" comment="kernel-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055601" comment="kernel-abi-stablelists-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055602" comment="kernel-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055603" comment="kernel-cross-headers-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055604" comment="kernel-debug-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055605" comment="kernel-debug-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055606" comment="kernel-debug-modules-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055607" comment="kernel-debug-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055608" comment="kernel-debug-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055609" comment="kernel-debug-uki-virt-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055610" comment="kernel-doc-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055611" comment="kernel-headers-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055612" comment="kernel-modules-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055613" comment="kernel-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055614" comment="kernel-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055615" comment="kernel-rt-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055616" comment="kernel-rt-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055617" comment="kernel-rt-debug-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055618" comment="kernel-rt-debug-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055619" comment="kernel-rt-debug-modules-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055620" comment="kernel-rt-debug-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055621" comment="kernel-rt-debug-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055622" comment="kernel-rt-modules-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055623" comment="kernel-rt-modules-core-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055624" comment="kernel-rt-modules-extra-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055625" comment="kernel-tools-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055626" comment="kernel-tools-libs-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055627" comment="kernel-uki-virt-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055628" comment="kernel-uki-virt-addons-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055629" comment="libperf-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055630" comment="perf-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055631" comment="python3-perf-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055632" comment="rtla-5.14.0-611.38.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055633" comment="rv-5.14.0-611.38.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23097</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23097" ref_url="https://www.suse.com/security/cve/CVE-2026-23097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002536.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

migrate: correct lock ordering for hugetlb file folios

Syzbot has found a deadlock (analyzed by Lance Yang):

1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).
2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire
folio_lock.

migrate_pages()
  -&gt; migrate_hugetlbs()
    -&gt; unmap_and_move_huge_page()     &lt;- Takes folio_lock!
      -&gt; remove_migration_ptes()
        -&gt; __rmap_walk_file()
          -&gt; i_mmap_lock_read()       &lt;- Waits for i_mmap_rwsem(read lock)!

hugetlbfs_fallocate()
  -&gt; hugetlbfs_punch_hole()           &lt;- Takes i_mmap_rwsem(write lock)!
    -&gt; hugetlbfs_zero_partial_page()
     -&gt; filemap_lock_hugetlb_folio()
      -&gt; filemap_lock_folio()
        -&gt; __filemap_get_folio        &lt;- Waits for folio_lock!

The migration path is the one taking locks in the wrong order according to
the documentation at the top of mm/rmap.c.  So expand the scope of the
existing i_mmap_lock to cover the calls to remove_migration_ptes() too.

This is (mostly) how it used to be after commit c0d0381ade79.  That was
removed by 336bf30eb765 for both file &amp; anon hugetlb pages when it should
only have been removed for anon hugetlb pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23097/">CVE-2026-23097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257815">SUSE bug 1257815</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055511" comment="kernel-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055512" comment="kernel-abi-stablelists-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055513" comment="kernel-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055514" comment="kernel-cross-headers-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055515" comment="kernel-debug-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055516" comment="kernel-debug-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055517" comment="kernel-debug-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055518" comment="kernel-debug-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055519" comment="kernel-debug-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055520" comment="kernel-debug-uki-virt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055521" comment="kernel-doc-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055522" comment="kernel-headers-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055523" comment="kernel-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055524" comment="kernel-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055525" comment="kernel-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055526" comment="kernel-rt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055527" comment="kernel-rt-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055528" comment="kernel-rt-debug-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055529" comment="kernel-rt-debug-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055530" comment="kernel-rt-debug-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055531" comment="kernel-rt-debug-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055532" comment="kernel-rt-debug-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055533" comment="kernel-rt-modules-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055534" comment="kernel-rt-modules-core-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055535" comment="kernel-rt-modules-extra-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055536" comment="kernel-tools-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055537" comment="kernel-tools-libs-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055538" comment="kernel-uki-virt-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055539" comment="kernel-uki-virt-addons-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055540" comment="libperf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055541" comment="perf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055542" comment="python3-perf-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055543" comment="rtla-5.14.0-611.36.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055544" comment="rv-5.14.0-611.36.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23111" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23111" ref_url="https://www.suse.com/security/cve/CVE-2026-23111" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()

nft_map_catchall_activate() has an inverted element activity check
compared to its non-catchall counterpart nft_mapelem_activate() and
compared to what is logically required.

nft_map_catchall_activate() is called from the abort path to re-activate
catchall map elements that were deactivated during a failed transaction.
It should skip elements that are already active (they don't need
re-activation) and process elements that are inactive (they need to be
restored). Instead, the current code does the opposite: it skips inactive
elements and processes active ones.

Compare the non-catchall activate callback, which is correct:

  nft_mapelem_activate():
    if (nft_set_elem_active(ext, iter-&gt;genmask))
        return 0;   /* skip active, process inactive */

With the buggy catchall version:

  nft_map_catchall_activate():
    if (!nft_set_elem_active(ext, genmask))
        continue;   /* skip inactive, process active */

The consequence is that when a DELSET operation is aborted,
nft_setelem_data_activate() is never called for the catchall element.
For NFT_GOTO verdict elements, this means nft_data_hold() is never
called to restore the chain-&gt;use reference count. Each abort cycle
permanently decrements chain-&gt;use. Once chain-&gt;use reaches zero,
DELCHAIN succeeds and frees the chain while catchall verdict elements
still reference it, resulting in a use-after-free.

This is exploitable for local privilege escalation from an unprivileged
user via user namespaces + nftables on distributions that enable
CONFIG_USER_NS and CONFIG_NF_TABLES.

Fix by removing the negation so the check matches nft_mapelem_activate():
skip active elements, process inactive ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23111/">CVE-2026-23111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23111">CVE-2026-23111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258181">SUSE bug 1258181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258183">SUSE bug 1258183</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055917" comment="kernel-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055918" comment="kernel-abi-stablelists-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055919" comment="kernel-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055920" comment="kernel-cross-headers-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055921" comment="kernel-debug-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055922" comment="kernel-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055923" comment="kernel-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055924" comment="kernel-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055925" comment="kernel-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055926" comment="kernel-debug-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055927" comment="kernel-doc-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055928" comment="kernel-headers-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055929" comment="kernel-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055930" comment="kernel-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055931" comment="kernel-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055932" comment="kernel-rt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055933" comment="kernel-rt-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055934" comment="kernel-rt-debug-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055935" comment="kernel-rt-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055936" comment="kernel-rt-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055937" comment="kernel-rt-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055938" comment="kernel-rt-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055939" comment="kernel-rt-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055940" comment="kernel-rt-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055941" comment="kernel-rt-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055942" comment="kernel-tools-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055943" comment="kernel-tools-libs-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055944" comment="kernel-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055945" comment="kernel-uki-virt-addons-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055946" comment="libperf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055947" comment="perf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055948" comment="python3-perf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055949" comment="rtla-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055950" comment="rv-5.14.0-611.47.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23144</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23144" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23144" ref_url="https://www.suse.com/security/cve/CVE-2026-23144" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure

When a context DAMON sysfs directory setup is failed after setup of attrs/
directory, subdirectories of attrs/ directory are not cleaned up.  As a
result, DAMON sysfs interface is nearly broken until the system reboots,
and the memory for the unremoved directory is leaked.

Cleanup the directories under such failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23144/">CVE-2026-23144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23144">CVE-2026-23144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258290">SUSE bug 1258290</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23171</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23171" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23171" ref_url="https://www.suse.com/security/cve/CVE-2026-23171" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix use-after-free due to enslave fail after slave array update

Fix a use-after-free which happens due to enslave failure after the new
slave has been added to the array. Since the new slave can be used for Tx
immediately, we can use it after it has been freed by the enslave error
cleanup path which frees the allocated slave memory. Slave update array is
supposed to be called last when further enslave failures are not expected.
Move it after xdp setup to avoid any problems.

It is very easy to reproduce the problem with a simple xdp_pass prog:
 ip l add bond1 type bond mode balance-xor
 ip l set bond1 up
 ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass
 ip l add dumdum type dummy

Then run in parallel:
 while :; do ip l set dumdum master bond1 1&gt;/dev/null 2&gt;&amp;1; done;
 mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp "dp=1-1023, flags=syn"

The crash happens almost immediately:
 [  605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI
 [  605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf]
 [  605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G    B               6.19.0-rc6+ #21 PREEMPT(voluntary)
 [  605.602979] Tainted: [B]=BAD_PAGE
 [  605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 [  605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210
 [  605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89
 [  605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213
 [  605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000
 [  605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be
 [  605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c
 [  605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000
 [  605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84
 [  605.603286] FS:  00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000
 [  605.603319] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 [  605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0
 [  605.603373] Call Trace:
 [  605.603392]  &lt;TASK&gt;
 [  605.603410]  __dev_queue_xmit+0x448/0x32a0
 [  605.603434]  ? __pfx_vprintk_emit+0x10/0x10
 [  605.603461]  ? __pfx_vprintk_emit+0x10/0x10
 [  605.603484]  ? __pfx___dev_queue_xmit+0x10/0x10
 [  605.603507]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603546]  ? _printk+0xcb/0x100
 [  605.603566]  ? __pfx__printk+0x10/0x10
 [  605.603589]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603627]  ? add_taint+0x5e/0x70
 [  605.603648]  ? add_taint+0x2a/0x70
 [  605.603670]  ? end_report.cold+0x51/0x75
 [  605.603693]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603731]  bond_start_xmit+0x623/0xc20 [bonding]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23171/">CVE-2026-23171 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23171">CVE-2026-23171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258349">SUSE bug 1258349</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23191</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23191" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: aloop: Fix racy access at PCM trigger

The PCM trigger callback of aloop driver tries to check the PCM state
and stop the stream of the tied substream in the corresponding cable.
Since both check and stop operations are performed outside the cable
lock, this may result in UAF when a program attempts to trigger
frequently while opening/closing the tied stream, as spotted by
fuzzers.

For addressing the UAF, this patch changes two things:
- It covers the most of code in loopback_check_format() with
  cable-&gt;lock spinlock, and add the proper NULL checks.  This avoids
  already some racy accesses.
- In addition, now we try to check the state of the capture PCM stream
  that may be stopped in this function, which was the major pain point
  leading to UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258395">SUSE bug 1258395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258396">SUSE bug 1258396</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23193</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23193" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23193" ref_url="https://www.suse.com/security/cve/CVE-2026-23193" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6571" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002650.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()

In iscsit_dec_session_usage_count(), the function calls complete() while
holding the sess-&gt;session_usage_lock. Similar to the connection usage count
logic, the waiter signaled by complete() (e.g., in the session release
path) may wake up and free the iscsit_session structure immediately.

This creates a race condition where the current thread may attempt to
execute spin_unlock_bh() on a session structure that has already been
deallocated, resulting in a KASAN slab-use-after-free.

To resolve this, release the session_usage_lock before calling complete()
to ensure all dereferences of the sess pointer are finished before the
waiter is allowed to proceed with deallocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23193/">CVE-2026-23193 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23193">CVE-2026-23193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258414">SUSE bug 1258414</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23204</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23204" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23204" ref_url="https://www.suse.com/security/cve/CVE-2026-23204" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002632.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_u32: use skb_header_pointer_careful()

skb_header_pointer() does not fully validate negative @offset values.

Use skb_header_pointer_careful() instead.

GangMin Kim provided a report and a repro fooling u32_classify():

BUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0
net/sched/cls_u32.c:221
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23204/">CVE-2026-23204 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23204">CVE-2026-23204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258340">SUSE bug 1258340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259126">SUSE bug 1259126</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23209</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23209" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002632.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macvlan: fix error recovery in macvlan_common_newlink()

valis provided a nice repro to crash the kernel:

ip link add p1 type veth peer p2
ip link set address 00:00:00:00:00:20 dev p1
ip link set up dev p1
ip link set up dev p2

ip link add mv0 link p2 type macvlan mode source
ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20

ping -c1 -I p1 1.2.3.4

He also gave a very detailed analysis:

&lt;quote valis&gt;

The issue is triggered when a new macvlan link is created  with
MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or
MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan
port and register_netdevice() called from macvlan_common_newlink()
fails (e.g. because of the invalid link name).

In this case macvlan_hash_add_source is called from
macvlan_change_sources() / macvlan_common_newlink():

This adds a reference to vlan to the port's vlan_source_hash using
macvlan_source_entry.

vlan is a pointer to the priv data of the link that is being created.

When register_netdevice() fails, the error is returned from
macvlan_newlink() to rtnl_newlink_create():

        if (ops-&gt;newlink)
                err = ops-&gt;newlink(dev, &amp;params, extack);
        else
                err = register_netdevice(dev);
        if (err &lt; 0) {
                free_netdev(dev);
                goto out;
        }

and free_netdev() is called, causing a kvfree() on the struct
net_device that is still referenced in the source entry attached to
the lower device's macvlan port.

Now all packets sent on the macvlan port with a matching source mac
address will trigger a use-after-free in macvlan_forward_source().

&lt;/quote valis&gt;

With all that, my fix is to make sure we call macvlan_flush_sources()
regardless of @create value whenever "goto destroy_macvlan_port;"
path is taken.

Many thanks to valis for following up on this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258518">SUSE bug 1258518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258784">SUSE bug 1258784</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055839" comment="kernel-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055840" comment="kernel-abi-stablelists-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055841" comment="kernel-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055842" comment="kernel-cross-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055843" comment="kernel-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055844" comment="kernel-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055845" comment="kernel-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055846" comment="kernel-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055847" comment="kernel-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055848" comment="kernel-debug-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055849" comment="kernel-doc-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055850" comment="kernel-headers-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055851" comment="kernel-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055852" comment="kernel-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055853" comment="kernel-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055854" comment="kernel-rt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055855" comment="kernel-rt-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055856" comment="kernel-rt-debug-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055857" comment="kernel-rt-debug-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055858" comment="kernel-rt-debug-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055859" comment="kernel-rt-debug-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055860" comment="kernel-rt-debug-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055861" comment="kernel-rt-modules-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055862" comment="kernel-rt-modules-core-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055863" comment="kernel-rt-modules-extra-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055864" comment="kernel-tools-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055865" comment="kernel-tools-libs-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055866" comment="kernel-uki-virt-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055867" comment="kernel-uki-virt-addons-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055868" comment="libperf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055869" comment="perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055870" comment="python3-perf-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055871" comment="rtla-5.14.0-611.45.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055872" comment="rv-5.14.0-611.45.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23210</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23210" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23210" ref_url="https://www.suse.com/security/cve/CVE-2026-23210" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix PTP NULL pointer dereference during VSI rebuild

Fix race condition where PTP periodic work runs while VSI is being
rebuilt, accessing NULL vsi-&gt;rx_rings.

The sequence was:
1. ice_ptp_prepare_for_reset() cancels PTP work
2. ice_ptp_rebuild() immediately queues PTP work
3. VSI rebuild happens AFTER ice_ptp_rebuild()
4. PTP work runs and accesses NULL vsi-&gt;rx_rings

Fix: Keep PTP work cancelled during rebuild, only queue it after
VSI rebuild completes in ice_rebuild().

Added ice_ptp_queue_work() helper function to encapsulate the logic
for queuing PTP work, ensuring it's only queued when PTP is supported
and the state is ICE_PTP_READY.

Error log:
[  121.392544] ice 0000:60:00.1: PTP reset successful
[  121.392692] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  121.392712] #PF: supervisor read access in kernel mode
[  121.392720] #PF: error_code(0x0000) - not-present page
[  121.392727] PGD 0
[  121.392734] Oops: Oops: 0000 [#1] SMP NOPTI
[  121.392746] CPU: 8 UID: 0 PID: 1005 Comm: ice-ptp-0000:60 Tainted: G S                  6.19.0-rc6+ #4 PREEMPT(voluntary)
[  121.392761] Tainted: [S]=CPU_OUT_OF_SPEC
[  121.392773] RIP: 0010:ice_ptp_update_cached_phctime+0xbf/0x150 [ice]
[  121.393042] Call Trace:
[  121.393047]  &lt;TASK&gt;
[  121.393055]  ice_ptp_periodic_work+0x69/0x180 [ice]
[  121.393202]  kthread_worker_fn+0xa2/0x260
[  121.393216]  ? __pfx_ice_ptp_periodic_work+0x10/0x10 [ice]
[  121.393359]  ? __pfx_kthread_worker_fn+0x10/0x10
[  121.393371]  kthread+0x10d/0x230
[  121.393382]  ? __pfx_kthread+0x10/0x10
[  121.393393]  ret_from_fork+0x273/0x2b0
[  121.393407]  ? __pfx_kthread+0x10/0x10
[  121.393417]  ret_from_fork_asm+0x1a/0x30
[  121.393432]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23210/">CVE-2026-23210 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23210">CVE-2026-23210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258517">SUSE bug 1258517</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055917" comment="kernel-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055918" comment="kernel-abi-stablelists-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055919" comment="kernel-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055920" comment="kernel-cross-headers-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055921" comment="kernel-debug-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055922" comment="kernel-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055923" comment="kernel-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055924" comment="kernel-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055925" comment="kernel-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055926" comment="kernel-debug-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055927" comment="kernel-doc-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055928" comment="kernel-headers-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055929" comment="kernel-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055930" comment="kernel-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055931" comment="kernel-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055932" comment="kernel-rt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055933" comment="kernel-rt-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055934" comment="kernel-rt-debug-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055935" comment="kernel-rt-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055936" comment="kernel-rt-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055937" comment="kernel-rt-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055938" comment="kernel-rt-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055939" comment="kernel-rt-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055940" comment="kernel-rt-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055941" comment="kernel-rt-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055942" comment="kernel-tools-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055943" comment="kernel-tools-libs-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055944" comment="kernel-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055945" comment="kernel-uki-virt-addons-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055946" comment="libperf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055947" comment="perf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055948" comment="python3-perf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055949" comment="rtla-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055950" comment="rv-5.14.0-611.47.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23231</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23231" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23231" ref_url="https://www.suse.com/security/cve/CVE-2026-23231" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6571" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002650.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix use-after-free in nf_tables_addchain()

nf_tables_addchain() publishes the chain to table-&gt;chains via
list_add_tail_rcu() (in nft_chain_add()) before registering hooks.
If nf_tables_register_hook() then fails, the error path calls
nft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy()
with no RCU grace period in between.

This creates two use-after-free conditions:

 1) Control-plane: nf_tables_dump_chains() traverses table-&gt;chains
    under rcu_read_lock(). A concurrent dump can still be walking
    the chain when the error path frees it.

 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly
    installs the IPv4 hook before IPv6 registration fails.  Packets
    entering nft_do_chain() via the transient IPv4 hook can still be
    dereferencing chain-&gt;blob_gen_X when the error path frees the
    chain.

Add synchronize_rcu() between nft_chain_del() and the chain destroy
so that all RCU readers -- both dump threads and in-flight packet
evaluation -- have finished before the chain is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23231/">CVE-2026-23231 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23231">CVE-2026-23231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259188">SUSE bug 1259188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259189">SUSE bug 1259189</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055917" comment="kernel-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055918" comment="kernel-abi-stablelists-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055919" comment="kernel-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055920" comment="kernel-cross-headers-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055921" comment="kernel-debug-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055922" comment="kernel-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055923" comment="kernel-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055924" comment="kernel-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055925" comment="kernel-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055926" comment="kernel-debug-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055927" comment="kernel-doc-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055928" comment="kernel-headers-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055929" comment="kernel-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055930" comment="kernel-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055931" comment="kernel-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055932" comment="kernel-rt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055933" comment="kernel-rt-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055934" comment="kernel-rt-debug-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055935" comment="kernel-rt-debug-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055936" comment="kernel-rt-debug-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055937" comment="kernel-rt-debug-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055938" comment="kernel-rt-debug-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055939" comment="kernel-rt-modules-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055940" comment="kernel-rt-modules-core-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055941" comment="kernel-rt-modules-extra-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055942" comment="kernel-tools-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055943" comment="kernel-tools-libs-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055944" comment="kernel-uki-virt-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055945" comment="kernel-uki-virt-addons-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055946" comment="libperf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055947" comment="perf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055948" comment="python3-perf-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055949" comment="rtla-5.14.0-611.47.1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055950" comment="rv-5.14.0-611.47.1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23490</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1903" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003192.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1904" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002484.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1906" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002485.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003255.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4141" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002592.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4146" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002558.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024488.html" source="SUSE-SU"/>
    <description>
    pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-19"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256902">SUSE bug 1256902</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010054995" comment="fence-agents-aliyun-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054996" comment="fence-agents-all-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054997" comment="fence-agents-amt-ws-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054998" comment="fence-agents-apc-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010054999" comment="fence-agents-apc-snmp-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055000" comment="fence-agents-aws-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055001" comment="fence-agents-azure-arm-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055002" comment="fence-agents-bladecenter-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055003" comment="fence-agents-brocade-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055004" comment="fence-agents-cisco-mds-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055005" comment="fence-agents-cisco-ucs-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055006" comment="fence-agents-common-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055007" comment="fence-agents-compute-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055008" comment="fence-agents-drac5-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055009" comment="fence-agents-eaton-snmp-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055010" comment="fence-agents-emerson-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055011" comment="fence-agents-eps-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055012" comment="fence-agents-gce-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055013" comment="fence-agents-heuristics-ping-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055014" comment="fence-agents-hpblade-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055015" comment="fence-agents-ibm-powervs-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055016" comment="fence-agents-ibm-vpc-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055017" comment="fence-agents-ibmblade-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055018" comment="fence-agents-ifmib-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055019" comment="fence-agents-ilo-moonshot-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055020" comment="fence-agents-ilo-mp-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055021" comment="fence-agents-ilo-ssh-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055022" comment="fence-agents-ilo2-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055023" comment="fence-agents-intelmodular-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055024" comment="fence-agents-ipdu-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055025" comment="fence-agents-ipmilan-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055026" comment="fence-agents-kdump-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055027" comment="fence-agents-kubevirt-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055028" comment="fence-agents-lpar-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055029" comment="fence-agents-mpath-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055030" comment="fence-agents-nutanix-ahv-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055031" comment="fence-agents-openstack-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055032" comment="fence-agents-redfish-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055033" comment="fence-agents-rhevm-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055034" comment="fence-agents-rsa-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055035" comment="fence-agents-rsb-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055036" comment="fence-agents-sbd-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055037" comment="fence-agents-scsi-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055038" comment="fence-agents-virsh-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055039" comment="fence-agents-vmware-rest-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055040" comment="fence-agents-vmware-soap-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055041" comment="fence-agents-wti-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055042" comment="fence-virt-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055043" comment="fence-virtd-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055044" comment="fence-virtd-cpg-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055045" comment="fence-virtd-libvirt-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055046" comment="fence-virtd-multicast-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055047" comment="fence-virtd-serial-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055048" comment="fence-virtd-tcp-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055049" comment="ha-cloud-support-4.10.0-98.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055507" comment="python3-pyasn1-0.4.8-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055508" comment="python3-pyasn1-modules-0.4.8-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23530</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23530" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23530" ref_url="https://www.suse.com/security/cve/CVE-2026-23530" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0,`freerdp_bitmap_decompress_planar` does not validate `nSrcWidth`/`nSrcHeight` against `planar-&gt;maxWidth`/`maxHeight` before RLE decode. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23530/">CVE-2026-23530 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23530">CVE-2026-23530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256940">SUSE bug 1256940</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055072" comment="freerdp-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055073" comment="freerdp-devel-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055074" comment="freerdp-libs-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055075" comment="libwinpr-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055076" comment="libwinpr-devel-2.11.7-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23531</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23531" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23531" ref_url="https://www.suse.com/security/cve/CVE-2026-23531" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, in ClearCodec, when `glyphData` is present, `clear_decompress` calls `freerdp_image_copy_no_overlap` without validating the destination rectangle, allowing an out-of-bounds read/write via crafted RDPGFX surface updates. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23531/">CVE-2026-23531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23531">CVE-2026-23531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256941">SUSE bug 1256941</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055072" comment="freerdp-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055073" comment="freerdp-devel-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055074" comment="freerdp-libs-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055075" comment="libwinpr-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055076" comment="libwinpr-devel-2.11.7-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23532</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23532" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23532" ref_url="https://www.suse.com/security/cve/CVE-2026-23532" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the  FreeRDP client's `gdi_SurfaceToSurface` path due to a mismatch between destination rectangle clamping and the actual copy size. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23532/">CVE-2026-23532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23532">CVE-2026-23532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256942">SUSE bug 1256942</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055072" comment="freerdp-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055073" comment="freerdp-devel-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055074" comment="freerdp-libs-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055075" comment="libwinpr-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055076" comment="libwinpr-devel-2.11.7-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23533</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23533" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23533" ref_url="https://www.suse.com/security/cve/CVE-2026-23533" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the RDPGFX ClearCodec decode path when maliciously crafted residual data causes out-of-bounds writes during color output. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23533/">CVE-2026-23533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23533">CVE-2026-23533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256943">SUSE bug 1256943</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055072" comment="freerdp-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055073" comment="freerdp-devel-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055074" comment="freerdp-libs-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055075" comment="libwinpr-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055076" comment="libwinpr-devel-2.11.7-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23534</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23534" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23534" ref_url="https://www.suse.com/security/cve/CVE-2026-23534" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the ClearCodec bands decode path when crafted band coordinates allow writes past the end of the destination surface buffer. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23534/">CVE-2026-23534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23534">CVE-2026-23534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256944">SUSE bug 1256944</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055072" comment="freerdp-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055073" comment="freerdp-devel-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055074" comment="freerdp-libs-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055075" comment="libwinpr-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055076" comment="libwinpr-devel-2.11.7-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23732" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23732" ref_url="https://www.suse.com/security/cve/CVE-2026-23732" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client-side global buffer overflow, causing a crash (DoS). Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23732/">CVE-2026-23732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23732">CVE-2026-23732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256945">SUSE bug 1256945</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23883</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23883" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23883" ref_url="https://www.suse.com/security/cve/CVE-2026-23883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, `xf_Pointer_New` frees `cursorPixels` on failure, then `pointer_free` calls `xf_Pointer_Free` and frees it again, triggering ASan UAF. A malicious server can trigger a client-side use after free, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23883/">CVE-2026-23883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23883">CVE-2026-23883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256946">SUSE bug 1256946</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055072" comment="freerdp-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055073" comment="freerdp-devel-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055074" comment="freerdp-libs-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055075" comment="libwinpr-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055076" comment="libwinpr-devel-2.11.7-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23884</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23884" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23884" ref_url="https://www.suse.com/security/cve/CVE-2026-23884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, offscreen bitmap deletion leaves `gdi-&gt;drawing` pointing to freed memory, causing UAF when related update packets arrive. A malicious server can trigger a client-side use after free, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23884/">CVE-2026-23884 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23884">CVE-2026-23884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256947">SUSE bug 1256947</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055072" comment="freerdp-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055073" comment="freerdp-devel-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055074" comment="freerdp-libs-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055075" comment="libwinpr-2.11.7-1.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055076" comment="libwinpr-devel-2.11.7-1.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23893</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23893" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23893" ref_url="https://www.suse.com/security/cve/CVE-2026-23893" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5587" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002618.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5603" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003273.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024341.html" source="SUSE-SU"/>
    <description>
    openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. Versions 2.3.2 and above are vulnerable to symlink-following when running in privileged contexts. A token-group user can redirect file operations to arbitrary filesystem targets by planting symlinks in group-writable token directories, resulting in privilege escalation or data exposure. Token and lock directories are 0770 (group-writable for token users), so any token-group member can plant files and symlinks inside them. When run as root, the base code handling token directory file access, as well as several openCryptoki tools used for administrative purposes, may reset ownership or permissions on existing files inside the token directories. An attacker with token-group membership can exploit the system when an administrator runs a PKCS#11 application or administrative tool that performs chown on files inside the token directory during normal maintenance. This issue is fixed in commit 5e6e4b4, but has not been included in a released version at the time of publication.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-23893/">CVE-2026-23893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23893">CVE-2026-23893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257116">SUSE bug 1257116</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055804" comment="opencryptoki-3.25.0-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055805" comment="opencryptoki-ccatok-3.25.0-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055806" comment="opencryptoki-devel-3.25.0-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055807" comment="opencryptoki-icsftok-3.25.0-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055808" comment="opencryptoki-libs-3.25.0-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055809" comment="opencryptoki-swtok-3.25.0-4.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23948</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23948" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23948" ref_url="https://www.suse.com/security/cve/CVE-2026-23948" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, a NULL pointer dereference vulnerability in rdp_write_logon_info_v2() allows a malicious RDP server to crash FreeRDP proxy by sending a specially crafted LogonInfoV2 PDU with cbDomain=0 or cbUserName=0. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23948/">CVE-2026-23948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23948">CVE-2026-23948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258001">SUSE bug 1258001</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24049</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24049" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24049" ref_url="https://www.suse.com/security/cve/CVE-2026-24049" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003219.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2090" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002476.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2710" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024070.html" source="SUSE-SU"/>
    <description>
    wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-24049/">CVE-2026-24049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24049">CVE-2026-24049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257100">SUSE bug 1257100</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055065" comment="python3.12-wheel-0.41.2-3.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055066" comment="python3.12-wheel-wheel-0.41.2-3.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2447</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2447" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3967" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002556.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024621.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in libvpx. This vulnerability was fixed in Firefox 147.0.4, Firefox ESR 140.7.1, Firefox ESR 115.32.1, Thunderbird 140.7.2, and Thunderbird 147.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258388">SUSE bug 1258388</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055702" comment="libvpx-1.9.0-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055703" comment="libvpx-devel-1.9.0-10.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24491</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24491" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24491" ref_url="https://www.suse.com/security/cve/CVE-2026-24491" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024812.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, video_timer can send client notifications after the control channel is closed, dereferencing a freed callback and triggering a use after free. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24491/">CVE-2026-24491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24491">CVE-2026-24491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257981">SUSE bug 1257981</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24675</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24675" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24675" ref_url="https://www.suse.com/security/cve/CVE-2026-24675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, urb_select_interface can free the device's MS config on error but later code still dereferences it, leading to a use after free in libusb_udev_select_interface. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24675/">CVE-2026-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24675">CVE-2026-24675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257982">SUSE bug 1257982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24676</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24676" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24676" ref_url="https://www.suse.com/security/cve/CVE-2026-24676" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, AUDIN format renegotiation frees the active format list while the capture thread continues using audin-&gt;format, leading to a use after free in audio_format_compatible. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24676/">CVE-2026-24676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24676">CVE-2026-24676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257983">SUSE bug 1257983</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24679" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24679" ref_url="https://www.suse.com/security/cve/CVE-2026-24679" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, The URBDRC client uses server-supplied interface numbers as array indices without bounds checks, causing an out-of-bounds read in libusb_udev_select_interface. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24679/">CVE-2026-24679 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24679">CVE-2026-24679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257986">SUSE bug 1257986</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24681</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24681" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24681" ref_url="https://www.suse.com/security/cve/CVE-2026-24681" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24681/">CVE-2026-24681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24681">CVE-2026-24681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257988">SUSE bug 1257988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24683</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24683" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24683" ref_url="https://www.suse.com/security/cve/CVE-2026-24683" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. ainput_send_input_event caches channel_callback in a local variable and later uses it without synchronization; a concurrent channel close can free or reinitialize the callback, leading to a use after free. Prior to 3.22.0, This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24683/">CVE-2026-24683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24683">CVE-2026-24683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257990">SUSE bug 1257990</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24684</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24684" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24684" ref_url="https://www.suse.com/security/cve/CVE-2026-24684" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045325.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24684/">CVE-2026-24684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24684">CVE-2026-24684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257991">SUSE bug 1257991</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25506</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25506" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25506" ref_url="https://www.suse.com/security/cve/CVE-2026-25506" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002519.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3032" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002522.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024147.html" source="SUSE-SU"/>
    <description>
    MUNGE is an authentication service for creating and validating user credentials. From 0.5 to 0.5.17, local attacker can exploit a buffer overflow vulnerability in munged (the MUNGE authentication daemon) to leak cryptographic key material from process memory. With the leaked key material, the attacker could forge arbitrary MUNGE credentials to impersonate any user (including root) to services that rely on MUNGE for authentication. The vulnerability allows a buffer overflow by sending a crafted message with an oversized address length field, corrupting munged's internal state and enabling extraction of the MAC subkey used for credential verification. This vulnerability is fixed in 0.5.18.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-25506/">CVE-2026-25506 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25506">CVE-2026-25506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257651">SUSE bug 1257651</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055440" comment="munge-0.5.13-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055441" comment="munge-devel-0.5.13-14.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055442" comment="munge-libs-0.5.13-14.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25547</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1250-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045382.html" source="SUSE-SU"/>
    <description>
    @isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257834">SUSE bug 1257834</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25646</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3031" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003232.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002585.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6439" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002643.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024834.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-17"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258020">SUSE bug 1258020</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055509" comment="libpng-1.6.37-12.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055510" comment="libpng-devel-1.6.37-12.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055439" comment="libpng15-1.5.30-14.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25679</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25679" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5942" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5944" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002629.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003285.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6383" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003287.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7009" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002664.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003284.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7259" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024927.html" source="SUSE-SU"/>
    <description>
    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259264">SUSE bug 1259264</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055981" comment="git-lfs-3.6.1-8.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055826" comment="go-toolset-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055827" comment="golang-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055828" comment="golang-bin-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055829" comment="golang-docs-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055830" comment="golang-misc-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055831" comment="golang-race-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055832" comment="golang-src-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055833" comment="golang-tests-1.25.8-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055905" comment="grafana-10.2.6-19.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055907" comment="grafana-pcp-5.1.1-13.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055906" comment="grafana-selinux-10.2.6-19.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25749</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25749" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25749" ref_url="https://www.suse.com/security/cve/CVE-2026-25749" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002567.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5602" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003250.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6539" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002658.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" cvss4="5.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25749/">CVE-2026-25749 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25749">CVE-2026-25749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257889">SUSE bug 1257889</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055799" comment="vim-X11-8.2.2637-23.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055800" comment="vim-common-8.2.2637-23.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055801" comment="vim-enhanced-8.2.2637-23.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055802" comment="vim-filesystem-8.2.2637-23.el9_7.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055803" comment="vim-minimal-8.2.2637-23.el9_7.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2581</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2581" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2581" ref_url="https://www.suse.com/security/cve/CVE-2026-2581" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
    <description>
    This is an uncontrolled resource consumption vulnerability (CWE-400) that can lead to Denial of Service (DoS).

In vulnerable Undici versions, when  interceptors.deduplicate()  is enabled, response data for deduplicated requests could be accumulated in memory for downstream handlers. An attacker-controlled or untrusted upstream endpoint can exploit this with large/chunked responses and concurrent identical requests, causing high memory usage and potential OOM process termination.

Impacted users are applications that use Undici's deduplication interceptor against endpoints that may produce large or long-lived response bodies.

PatchesThe issue has been patched by changing deduplication behavior to stream response chunks to downstream handlers as they arrive (instead of full-body accumulation), and by preventing late deduplication when body streaming has already started.

Users should upgrade to the first official Undici (and Node.js, where applicable) releases that include this patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2581/">CVE-2026-2581 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2581">CVE-2026-2581 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26127</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26127" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26127" ref_url="https://www.suse.com/security/cve/CVE-2026-26127" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002574.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003271.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4456" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003237.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002583.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26127/">CVE-2026-26127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26127">CVE-2026-26127 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055688" comment="aspnetcore-runtime-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055716" comment="aspnetcore-runtime-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055689" comment="aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055717" comment="aspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055690" comment="aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055718" comment="aspnetcore-targeting-pack-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055691" comment="dotnet-apphost-pack-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055719" comment="dotnet-apphost-pack-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055692" comment="dotnet-host-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055693" comment="dotnet-hostfxr-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055720" comment="dotnet-hostfxr-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055694" comment="dotnet-runtime-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055721" comment="dotnet-runtime-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055695" comment="dotnet-runtime-dbg-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055722" comment="dotnet-runtime-dbg-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055696" comment="dotnet-sdk-10.0-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055697" comment="dotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055723" comment="dotnet-sdk-9.0-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055724" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055698" comment="dotnet-sdk-aot-10.0-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055725" comment="dotnet-sdk-aot-9.0-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055699" comment="dotnet-sdk-dbg-10.0-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055726" comment="dotnet-sdk-dbg-9.0-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055700" comment="dotnet-targeting-pack-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055727" comment="dotnet-targeting-pack-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055701" comment="dotnet-templates-10.0-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055728" comment="dotnet-templates-9.0-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055729" comment="netstandard-targeting-pack-2.1-9.0.115-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26130</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26130" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26130" ref_url="https://www.suse.com/security/cve/CVE-2026-26130" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4443" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002574.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003271.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003242.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4455" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002572.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4456" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003237.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002583.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-26130/">CVE-2026-26130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26130">CVE-2026-26130 at NVD</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055688" comment="aspnetcore-runtime-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055704" comment="aspnetcore-runtime-8.0-8.0.25-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055716" comment="aspnetcore-runtime-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055689" comment="aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055705" comment="aspnetcore-runtime-dbg-8.0-8.0.25-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055717" comment="aspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055690" comment="aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055706" comment="aspnetcore-targeting-pack-8.0-8.0.25-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055718" comment="aspnetcore-targeting-pack-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055691" comment="dotnet-apphost-pack-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055707" comment="dotnet-apphost-pack-8.0-8.0.25-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055719" comment="dotnet-apphost-pack-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055692" comment="dotnet-host-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055693" comment="dotnet-hostfxr-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055708" comment="dotnet-hostfxr-8.0-8.0.25-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055720" comment="dotnet-hostfxr-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055694" comment="dotnet-runtime-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055709" comment="dotnet-runtime-8.0-8.0.25-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055721" comment="dotnet-runtime-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055695" comment="dotnet-runtime-dbg-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055710" comment="dotnet-runtime-dbg-8.0-8.0.25-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055722" comment="dotnet-runtime-dbg-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055696" comment="dotnet-sdk-10.0-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055697" comment="dotnet-sdk-10.0-source-built-artifacts-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055711" comment="dotnet-sdk-8.0-8.0.125-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055712" comment="dotnet-sdk-8.0-source-built-artifacts-8.0.125-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055723" comment="dotnet-sdk-9.0-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055724" comment="dotnet-sdk-9.0-source-built-artifacts-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055698" comment="dotnet-sdk-aot-10.0-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055725" comment="dotnet-sdk-aot-9.0-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055699" comment="dotnet-sdk-dbg-10.0-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055713" comment="dotnet-sdk-dbg-8.0-8.0.125-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055726" comment="dotnet-sdk-dbg-9.0-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055700" comment="dotnet-targeting-pack-10.0-10.0.4-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055714" comment="dotnet-targeting-pack-8.0-8.0.25-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055727" comment="dotnet-targeting-pack-9.0-9.0.14-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055701" comment="dotnet-templates-10.0-10.0.104-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055715" comment="dotnet-templates-8.0-8.0.125-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055728" comment="dotnet-templates-9.0-9.0.115-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055729" comment="netstandard-targeting-pack-2.1-9.0.115-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26955</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26955" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26955" ref_url="https://www.suse.com/security/cve/CVE-2026-26955" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6004" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6005" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002637.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6385" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045256.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, a malicious RDP server can trigger a heap buffer overflow in FreeRDP clients using the GDI surface pipeline (e.g., `xfreerdp`) by sending an RDPGFX ClearCodec surface command with an out-of-bounds destination rectangle. The `gdi_SurfaceCommand_ClearCodec()` handler does not call `is_within_surface()` to validate the command rectangle against the destination surface dimensions, allowing attacker-controlled `cmd-&gt;left`/`cmd-&gt;top` (and subcodec rectangle offsets) to reach image copy routines that write into `surface-&gt;data` without bounds enforcement. The OOB write corrupts an adjacent `gdiGfxSurface` struct's `codecs*` pointer with attacker-controlled pixel data, and corruption of `codecs*` is sufficient to reach an indirect function pointer call (`NSC_CONTEXT.decode` at `nsc.c:500`) on a subsequent codec command - full instruction pointer (RIP) control demonstrated in exploitability harness. Users should upgrade to version 3.23.0 to receive a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26955/">CVE-2026-26955 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26955">CVE-2026-26955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258982">SUSE bug 1258982</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055834" comment="freerdp-2.11.7-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055835" comment="freerdp-devel-2.11.7-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055836" comment="freerdp-libs-2.11.7-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055837" comment="libwinpr-2.11.7-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055838" comment="libwinpr-devel-2.11.7-1.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26965</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26965" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26965" ref_url="https://www.suse.com/security/cve/CVE-2026-26965" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6004" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6005" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002637.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6385" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045256.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, in the RLE planar decode path, `planar_decompress_plane_rle()` writes into `pDstData` at `((nYDst+y) * nDstStep) + (4*nXDst) + nChannel` without verifying that `(nYDst+nSrcHeight)` fits in the destination height or that `(nXDst+nSrcWidth)` fits in the destination stride. When `TempFormat != DstFormat`, `pDstData` becomes `planar-&gt;pTempData` (sized for the desktop), while `nYDst` is only validated against the **surface** by `is_within_surface()`. A malicious RDP server can exploit this to perform a heap out-of-bounds write with attacker-controlled offset and pixel data on any connecting FreeRDP client. The OOB write reaches up to 132,096 bytes past the temp buffer end, and  on the brk heap (desktop ≤ 128x128), an adjacent `NSC_CONTEXT` struct's `decode` function pointer is overwritten with attacker-controlled pixel data - control-flow-relevant corruption (function pointer overwritten) demonstrated under deterministic heap layout (`nsc-&gt;decode = 0xFF414141FF414141`). Version 3.23.0 fixes the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26965/">CVE-2026-26965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26965">CVE-2026-26965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258985">SUSE bug 1258985</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055834" comment="freerdp-2.11.7-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055835" comment="freerdp-devel-2.11.7-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055836" comment="freerdp-libs-2.11.7-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055837" comment="libwinpr-2.11.7-1.el9_7.3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055838" comment="libwinpr-devel-2.11.7-1.el9_7.3 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26996</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26996" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1250-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20967-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045382.html" source="SUSE-SU"/>
    <description>
    minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258621">SUSE bug 1258621</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27135</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27135" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1247-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20925-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045289.html" source="SUSE-SU"/>
    <description>
    nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259835">SUSE bug 1259835</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056002" comment="nodejs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056003" comment="nodejs-devel-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056004" comment="nodejs-docs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056005" comment="nodejs-full-i18n-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056006" comment="nodejs-libs-24.14.1-2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056007" comment="nodejs-nodemon-3.0.3-3.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056008" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056009" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056010" comment="npm-11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056011" comment="v8-13.6-devel-13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2757</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2757" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2758</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2758" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2759</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2759" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2760</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2760" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2761</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2761" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape in the Graphics: WebRender component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2762</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2762" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the JavaScript: Standard Library component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2763</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2763" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2764</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2764" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2765</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2765" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27651</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27651" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27651" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27651" ref_url="https://www.suse.com/security/cve/CVE-2026-27651" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6907" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002661.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6923" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003264.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7002" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003286.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7343" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003292.html" source="SUSE-SU"/>
    <description>
    When the ngx_mail_auth_http_module  module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27651/">CVE-2026-27651 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27651">CVE-2026-27651 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260415">SUSE bug 1260415</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055992" comment="nginx-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055993" comment="nginx-all-modules-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055994" comment="nginx-core-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055995" comment="nginx-filesystem-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055996" comment="nginx-mod-devel-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055997" comment="nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055998" comment="nginx-mod-http-perl-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055999" comment="nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056000" comment="nginx-mod-mail-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056001" comment="nginx-mod-stream-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27654</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27654" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27654" ref_url="https://www.suse.com/security/cve/CVE-2026-27654" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6907" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002661.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6923" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003264.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7002" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003286.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7343" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003292.html" source="SUSE-SU"/>
    <description>
    NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27654/">CVE-2026-27654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27654">CVE-2026-27654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260416">SUSE bug 1260416</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055992" comment="nginx-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055993" comment="nginx-all-modules-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055994" comment="nginx-core-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055995" comment="nginx-filesystem-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055996" comment="nginx-mod-devel-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055997" comment="nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055998" comment="nginx-mod-http-perl-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055999" comment="nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056000" comment="nginx-mod-mail-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056001" comment="nginx-mod-stream-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2766</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2767</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2768</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2768" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2769</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2769" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2770</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2770" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2771</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Undefined behavior in the DOM: Core &amp; HTML component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2772</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2772" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2773</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2773" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Web Audio component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2774</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2774" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Audio/Video component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2775</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2775" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: HTML Parser component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2776</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2776" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2777</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2777" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Messaging System component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2778</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2778" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the DOM: Core &amp; HTML component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27784" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27784" ref_url="https://www.suse.com/security/cve/CVE-2026-27784" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6907" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002661.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6923" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003264.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7002" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003286.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7343" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003292.html" source="SUSE-SU"/>
    <description>
    The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. 


Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27784/">CVE-2026-27784 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27784">CVE-2026-27784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260417">SUSE bug 1260417</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055992" comment="nginx-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055993" comment="nginx-all-modules-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055994" comment="nginx-core-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055995" comment="nginx-filesystem-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055996" comment="nginx-mod-devel-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055997" comment="nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055998" comment="nginx-mod-http-perl-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055999" comment="nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056000" comment="nginx-mod-mail-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056001" comment="nginx-mod-stream-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2779</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2779" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Networking: JAR component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2780</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2780" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2781</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Libraries component in NSS. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2782</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2782" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2783</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2783" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2784</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2784" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2785</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2785" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Invalid pointer in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2786</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2787</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2787" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the DOM: Window and Location component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2788</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2788" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2789</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2789" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Graphics: ImageLib component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2790</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the Networking: JAR component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27904</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27904" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27904" ref_url="https://www.suse.com/security/cve/CVE-2026-27904" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
    <description>
    minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Prior to version 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4, nested `*()` extglobs produce regexps with nested unbounded quantifiers (e.g. `(?:(?:a|b)*)*`), which exhibit catastrophic backtracking in V8. With a 12-byte pattern `*(*(*(a|b)))` and an 18-byte non-matching input, `minimatch()` stalls for over 7 seconds. Adding a single nesting level or a few input characters pushes this to minutes. This is the most severe finding: it is triggered by the default `minimatch()` API with no special options, and the minimum viable pattern is only 12 bytes. The same issue affects `+()` extglobs equally. Versions 10.2.3, 9.0.7, 8.0.6, 7.4.8, 6.2.2, 5.1.8, 4.2.5, and 3.1.4 fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27904/">CVE-2026-27904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27904">CVE-2026-27904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258994">SUSE bug 1258994</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055982" comment="nodejs-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055983" comment="nodejs-devel-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055984" comment="nodejs-docs-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055985" comment="nodejs-full-i18n-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055986" comment="nodejs-libs-22.22.2-1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055987" comment="nodejs-nodemon-3.0.1-1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055988" comment="nodejs-packaging-2021.06-6.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055989" comment="nodejs-packaging-bundler-2021.06-6.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055990" comment="npm-10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055991" comment="v8-12.4-devel-12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2791</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2791" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the Networking: Cache component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2792</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2792" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2793</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2793" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055502" comment="firefox-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055503" comment="firefox-x11-140.8.0-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055547" comment="thunderbird-140.8.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2920</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2920" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2920" ref_url="https://www.suse.com/security/cve/CVE-2026-2920" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025101.html" source="SUSE-SU"/>
    <description>
    GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the processing of stream headers within ASF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28843.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2920/">CVE-2026-2920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2920">CVE-2026-2920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259367">SUSE bug 1259367</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055890" comment="gstreamer1-plugins-bad-free-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055891" comment="gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055892" comment="gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055893" comment="gstreamer1-plugins-base-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055894" comment="gstreamer1-plugins-base-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055895" comment="gstreamer1-plugins-base-tools-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055896" comment="gstreamer1-plugins-good-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055897" comment="gstreamer1-plugins-good-gtk-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055898" comment="gstreamer1-plugins-ugly-free-1.22.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2921</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2921" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2921" ref_url="https://www.suse.com/security/cve/CVE-2026-2921" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002652.html" source="SUSE-SU"/>
    <description>
    GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the handling of palette data in AVI files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28854.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2921/">CVE-2026-2921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2921">CVE-2026-2921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259369">SUSE bug 1259369</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055890" comment="gstreamer1-plugins-bad-free-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055891" comment="gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055892" comment="gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055893" comment="gstreamer1-plugins-base-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055894" comment="gstreamer1-plugins-base-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055895" comment="gstreamer1-plugins-base-tools-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055896" comment="gstreamer1-plugins-good-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055897" comment="gstreamer1-plugins-good-gtk-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055898" comment="gstreamer1-plugins-ugly-free-1.22.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2922</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2922" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2922" ref_url="https://www.suse.com/security/cve/CVE-2026-2922" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025101.html" source="SUSE-SU"/>
    <description>
    GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the processing of video packets. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28845.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2922/">CVE-2026-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2922">CVE-2026-2922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259370">SUSE bug 1259370</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055890" comment="gstreamer1-plugins-bad-free-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055891" comment="gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055892" comment="gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055893" comment="gstreamer1-plugins-base-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055894" comment="gstreamer1-plugins-base-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055895" comment="gstreamer1-plugins-base-tools-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055896" comment="gstreamer1-plugins-good-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055897" comment="gstreamer1-plugins-good-gtk-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055898" comment="gstreamer1-plugins-ugly-free-1.22.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2923</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2923" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2923" ref_url="https://www.suse.com/security/cve/CVE-2026-2923" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002652.html" source="SUSE-SU"/>
    <description>
    GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the handling of coordinates. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28838.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2923/">CVE-2026-2923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2923">CVE-2026-2923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259375">SUSE bug 1259375</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055890" comment="gstreamer1-plugins-bad-free-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055891" comment="gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055892" comment="gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055893" comment="gstreamer1-plugins-base-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055894" comment="gstreamer1-plugins-base-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055895" comment="gstreamer1-plugins-base-tools-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055896" comment="gstreamer1-plugins-good-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055897" comment="gstreamer1-plugins-good-gtk-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055898" comment="gstreamer1-plugins-ugly-free-1.22.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3082</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3082" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3082" ref_url="https://www.suse.com/security/cve/CVE-2026-3082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002652.html" source="SUSE-SU"/>
    <description>
    GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the processing of Huffman tables. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28840.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3082/">CVE-2026-3082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3082">CVE-2026-3082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259399">SUSE bug 1259399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055890" comment="gstreamer1-plugins-bad-free-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055891" comment="gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055892" comment="gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055893" comment="gstreamer1-plugins-base-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055894" comment="gstreamer1-plugins-base-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055895" comment="gstreamer1-plugins-base-tools-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055896" comment="gstreamer1-plugins-good-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055897" comment="gstreamer1-plugins-good-gtk-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055898" comment="gstreamer1-plugins-ugly-free-1.22.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3083</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3083" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3083" ref_url="https://www.suse.com/security/cve/CVE-2026-3083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002652.html" source="SUSE-SU"/>
    <description>
    GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the processing of X-QDM RTP payload elements. When parsing the packetid element, the process does not properly validate user-supplied data, which can result in a write past the end of an allocated array. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28850.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3083/">CVE-2026-3083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3083">CVE-2026-3083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259405">SUSE bug 1259405</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055890" comment="gstreamer1-plugins-bad-free-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055891" comment="gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055892" comment="gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055893" comment="gstreamer1-plugins-base-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055894" comment="gstreamer1-plugins-base-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055895" comment="gstreamer1-plugins-base-tools-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055896" comment="gstreamer1-plugins-good-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055897" comment="gstreamer1-plugins-good-gtk-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055898" comment="gstreamer1-plugins-ugly-free-1.22.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3085</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3085" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3085" ref_url="https://www.suse.com/security/cve/CVE-2026-3085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002652.html" source="SUSE-SU"/>
    <description>
    GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the processing of X-QDM RTP payloads. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28851.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-3085/">CVE-2026-3085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3085">CVE-2026-3085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259406">SUSE bug 1259406</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055890" comment="gstreamer1-plugins-bad-free-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055891" comment="gstreamer1-plugins-bad-free-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055892" comment="gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055893" comment="gstreamer1-plugins-base-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055894" comment="gstreamer1-plugins-base-devel-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055895" comment="gstreamer1-plugins-base-tools-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055896" comment="gstreamer1-plugins-good-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055897" comment="gstreamer1-plugins-good-gtk-1.22.12-5.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055898" comment="gstreamer1-plugins-ugly-free-1.22.12-4.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30892</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30892" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30892" ref_url="https://www.suse.com/security/cve/CVE-2026-30892" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6621" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003275.html" source="SUSE-SU"/>
    <description>
    crun is an open source OCI Container Runtime fully written in C. In versions 1.19 through 1.26, the  `crun exec` option `-u` (`--user`) is incorrectly parsed. The value `1` is interpreted as UID 0 and GID 0 when it should have been UID 1 and  GID 0. The process thus runs with higher privileges than expected. Version 1.27 patches the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-30892/">CVE-2026-30892 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30892">CVE-2026-30892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260608">SUSE bug 1260608</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055951" comment="crun-1.27-1.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31806</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31806" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31806" ref_url="https://www.suse.com/security/cve/CVE-2026-31806" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1160-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045256.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0,  the gdi_surface_bits() function processes SURFACE_BITS_COMMAND messages sent by the RDP server. When the command is handled using NSCodec, the bmp.width and bmp.height values provided by the server are not properly validated against the actual desktop dimensions. A malicious RDP server can supply crafted bmp.width and bmp.height values that exceed the expected surface size. Because these values are used during bitmap decoding and memory operations without proper bounds checking, this can lead to a heap buffer overflow. Since the attacker can also control the associated pixel data transmitted by the server, the overflow may be exploitable to overwrite adjacent heap memory. This vulnerability is fixed in 3.24.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-08"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31806/">CVE-2026-31806 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31806">CVE-2026-31806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259653">SUSE bug 1259653</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055900" comment="freerdp-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055901" comment="freerdp-devel-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055902" comment="freerdp-libs-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055903" comment="libwinpr-2.11.7-1.el9_7.5 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055904" comment="libwinpr-devel-2.11.7-1.el9_7.5 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32647</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32647" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32647" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32647" ref_url="https://www.suse.com/security/cve/CVE-2026-32647" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6907" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002661.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6923" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003264.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7002" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003286.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7343" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003292.html" source="SUSE-SU"/>
    <description>
    NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. 


Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32647/">CVE-2026-32647 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32647">CVE-2026-32647 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260420">SUSE bug 1260420</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055992" comment="nginx-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055993" comment="nginx-all-modules-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055994" comment="nginx-core-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055995" comment="nginx-filesystem-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055996" comment="nginx-mod-devel-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055997" comment="nginx-mod-http-image-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055998" comment="nginx-mod-http-perl-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055999" comment="nginx-mod-http-xslt-filter-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056000" comment="nginx-mod-mail-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056001" comment="nginx-mod-stream-1.26.3-2.module+el9.7.0+24173+4204b761.1 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32748</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32748" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32748" ref_url="https://www.suse.com/security/cve/CVE-2026-32748" source="SUSE CVE"/>
		<reference ref_id="GHSA-f9p7-3jqg-hhvq" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-f9p7-3jqg-hhvq" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6301" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003278.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. This bug is fixed in Squid version 7.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32748/">CVE-2026-32748 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32748">CVE-2026-32748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260453">SUSE bug 1260453</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055899" comment="squid-5.5-22.el9_7.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33416</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33416" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33416" ref_url="https://www.suse.com/security/cve/CVE-2026-33416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:21000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21067-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045457.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng 1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS` sets `png_ptr-&gt;trans_alpha = info_ptr-&gt;trans_alpha` (256-byte buffer) and `png_set_PLTE` sets `info_ptr-&gt;palette = png_ptr-&gt;palette` (768-byte buffer). In both cases, calling `png_free_data` (with `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr` pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33416/">CVE-2026-33416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33416">CVE-2026-33416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260754">SUSE bug 1260754</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056376" comment="firefox-140.9.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056377" comment="firefox-x11-140.9.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33526</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33526" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33526" ref_url="https://www.suse.com/security/cve/CVE-2026-33526" source="SUSE CVE"/>
		<reference ref_id="GHSA-hpfx-h48q-gvwg" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-hpfx-h48q-gvwg" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6301" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003278.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non-zero `icp_port`). This problem _cannot_ be mitigated by denying ICP queries using `icp_access` rules. Version 7.5 contains a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33526/">CVE-2026-33526 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33526">CVE-2026-33526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260452">SUSE bug 1260452</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055899" comment="squid-5.5-22.el9_7.4 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33636</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33636" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33636" ref_url="https://www.suse.com/security/cve/CVE-2026-33636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:21000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21067-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045457.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels remain. Because the implementation works backward from the end of the row, the final iteration dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG input if Neon is enabled. Version 1.6.56 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33636/">CVE-2026-33636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33636">CVE-2026-33636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260755">SUSE bug 1260755</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056376" comment="firefox-140.9.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056377" comment="firefox-x11-140.9.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3497</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3497" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3497" ref_url="https://www.suse.com/security/cve/CVE-2026-3497" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6461" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002651.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003288.html" source="SUSE-SU"/>
    <description>
    Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3497/">CVE-2026-3497 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3497">CVE-2026-3497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259642">SUSE bug 1259642</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055911" comment="openssh-8.7p1-48.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055912" comment="openssh-askpass-8.7p1-48.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055913" comment="openssh-clients-8.7p1-48.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055914" comment="openssh-keycat-8.7p1-48.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055915" comment="openssh-server-8.7p1-48.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055916" comment="pam_ssh_agent_auth-0.10.4-5.48.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3889</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3889" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3889" ref_url="https://www.suse.com/security/cve/CVE-2026-3889" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
    <description>
    Spoofing issue in Thunderbird. This vulnerability was fixed in Thunderbird 149 and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-3889/">CVE-2026-3889 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3889">CVE-2026-3889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4111</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4111" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4111" ref_url="https://www.suse.com/security/cve/CVE-2026-4111" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5080" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003225.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002663.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. When a specially crafted RAR5 archive is processed, the decompression routine may enter a state where internal logic prevents forward progress. This condition results in an infinite loop that continuously consumes CPU resources. Because the archive passes checksum validation and appears structurally valid, affected applications cannot detect the issue before processing. This can allow attackers to cause persistent denial-of-service conditions in services that automatically process archives.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4111/">CVE-2026-4111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4111">CVE-2026-4111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259634">SUSE bug 1259634</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055786" comment="bsdtar-3.5.3-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055787" comment="libarchive-3.5.3-7.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055788" comment="libarchive-devel-3.5.3-7.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4371</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4371" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4371" ref_url="https://www.suse.com/security/cve/CVE-2026-4371" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
    <description>
    A malicious mail server could send malformed strings with negative lengths, causing the parser to read memory outside the buffer. If a mail server or connection to a mail server were compromised, an attacker could cause the parser to malfunction, potentially crashing Thunderbird or leaking sensitive data. This vulnerability was fixed in Thunderbird 149 and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4371/">CVE-2026-4371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4371">CVE-2026-4371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4519</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4519" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4519" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4519" ref_url="https://www.suse.com/security/cve/CVE-2026-4519" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002634.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6283" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002638.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003258.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6286" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003236.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002646.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6766" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1206-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1296-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045432.html" source="SUSE-SU"/>
    <description>
    The webbrowser.open() API would accept leading dashes in the URL which 
could be handled as command line options for certain web browsers. New 
behavior rejects leading dashes. Users are recommended to sanitize URLs 
prior to passing to webbrowser.open().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:L/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4519/">CVE-2026-4519 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4519">CVE-2026-4519 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260026">SUSE bug 1260026</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055953" comment="python-unversioned-command-3.9.25-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055954" comment="python3-3.9.25-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055955" comment="python3-debug-3.9.25-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055956" comment="python3-devel-3.9.25-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055957" comment="python3-idle-3.9.25-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055958" comment="python3-libs-3.9.25-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055959" comment="python3-test-3.9.25-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055960" comment="python3-tkinter-3.9.25-3.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055883" comment="python3.11-3.11.13-5.2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055884" comment="python3.11-debug-3.11.13-5.2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055885" comment="python3.11-devel-3.11.13-5.2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055886" comment="python3.11-idle-3.11.13-5.2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055887" comment="python3.11-libs-3.11.13-5.2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055888" comment="python3.11-test-3.11.13-5.2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055889" comment="python3.11-tkinter-3.11.13-5.2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055876" comment="python3.12-3.12.12-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055877" comment="python3.12-debug-3.12.12-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055878" comment="python3.12-devel-3.12.12-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055879" comment="python3.12-idle-3.12.12-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055880" comment="python3.12-libs-3.12.12-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055881" comment="python3.12-test-3.12.12-4.el9_7.2 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055882" comment="python3.12-tkinter-3.12.12-4.el9_7.2 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4631</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4631" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4631" ref_url="https://www.suse.com/security/cve/CVE-2026-4631" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7384" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003294.html" source="SUSE-SU"/>
    <description>
    Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-12"/>
	<updated date="2026-04-12"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4631/">CVE-2026-4631 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4631">CVE-2026-4631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261829">SUSE bug 1261829</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056205" comment="cockpit-344-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056206" comment="cockpit-bridge-344-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056207" comment="cockpit-doc-344-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056208" comment="cockpit-packagekit-344-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056209" comment="cockpit-storaged-344-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056210" comment="cockpit-system-344-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056211" comment="cockpit-ws-344-2.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056212" comment="cockpit-ws-selinux-344-2.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4684</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4684" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Race condition, use-after-free in the Graphics: WebRender component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4685</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4685" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4686</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4686" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4687</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4687" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4688</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4688" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4689</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4689" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4690</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4690" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4691</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4691" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the CSS Parsing and Computation component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4692</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape in the Responsive Design Mode component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4693</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4693" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4694</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4694" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions, integer overflow in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4695</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4695" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4696</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4696" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Layout: Text and Fonts component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4697</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4697" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4698</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4698" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4699</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4699" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Layout: Text and Fonts component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4700</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4700" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the Networking: HTTP component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4701</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4701" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4702</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4702" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4704</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4704" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Denial-of-service in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4705</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4705" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Undefined behavior in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4706</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4706" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4707</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4707" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4708</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4708" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4709</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4709" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4710</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4710" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4711</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4711" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Widget: Cocoa component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4712</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4712" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Information disclosure in the Widget: Cocoa component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4713</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4713" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4714</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4714" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4715</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4715" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Uninitialized memory in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4716</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4716" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4717</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4717" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4718</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4718" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Undefined behavior in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4719</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4719" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Text component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4720</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4720" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4721</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4721" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010055824" comment="firefox-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055825" comment="firefox-x11-140.9.0-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010055873" comment="thunderbird-140.9.0-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5731</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5731" ref_url="https://www.suse.com/security/cve/CVE-2026-5731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045420.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.34.0, Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149.0.2, Firefox ESR 115.34.1, Firefox ESR 140.9.1, Thunderbird 149.0.2, and Thunderbird 140.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5731/">CVE-2026-5731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5731">CVE-2026-5731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261663">SUSE bug 1261663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056376" comment="firefox-140.9.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056377" comment="firefox-x11-140.9.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5732</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5732" ref_url="https://www.suse.com/security/cve/CVE-2026-5732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045420.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions, integer overflow in the Graphics: Text component. This vulnerability was fixed in Firefox 149.0.2, Firefox ESR 140.9.1, Thunderbird 149.0.2, and Thunderbird 140.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5732/">CVE-2026-5732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5732">CVE-2026-5732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261663">SUSE bug 1261663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056376" comment="firefox-140.9.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056377" comment="firefox-x11-140.9.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5734</title>
    <affected family="unix">
            <platform>SUSE Liberty Linux 9</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5734" ref_url="https://www.suse.com/security/cve/CVE-2026-5734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045420.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149.0.2, Firefox ESR 140.9.1, Thunderbird 149.0.2, and Thunderbird 140.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-14"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-5734/">CVE-2026-5734 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5734">CVE-2026-5734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261663">SUSE bug 1261663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sll:9</cpe>
	</affected_cpe_list>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009804133" comment="SUSE Liberty Linux 9 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2010056376" comment="firefox-140.9.1-1.el9_7 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2010056377" comment="firefox-x11-140.9.1-1.el9_7 is installed"/>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805399" version="1" comment="httpd is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805400" version="1" comment="httpd-core is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805401" version="1" comment="httpd-devel is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805402" version="1" comment="httpd-filesystem is &lt;2.4.53-7.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805403" version="1" comment="httpd-manual is &lt;2.4.53-7.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805404" version="1" comment="httpd-tools is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805405" version="1" comment="mod_ldap is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805406" version="1" comment="mod_lua is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805407" version="1" comment="mod_proxy_html is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805408" version="1" comment="mod_session is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805409" version="1" comment="mod_ssl is &lt;2.4.53-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804133" version="1" comment="sll-release is &gt;=9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810810" version="1" comment="python-unversioned-command is &lt;3.9.18-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810811" version="1" comment="python3 is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810812" version="1" comment="python3-debug is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810813" version="1" comment="python3-devel is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810814" version="1" comment="python3-idle is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810815" version="1" comment="python3-libs is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811180" version="1" comment="python3-pip is &lt;21.2.3-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811181" version="1" comment="python3-pip-wheel is &lt;21.2.3-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810816" version="1" comment="python3-test is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810817" version="1" comment="python3-tkinter is &lt;3.9.18-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811083" version="1" comment="python3.11 is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811084" version="1" comment="python3.11-debug is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811085" version="1" comment="python3.11-devel is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811086" version="1" comment="python3.11-idle is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811087" version="1" comment="python3.11-libs is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810780" version="1" comment="python3.11-pip is &lt;22.3.1-4.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810781" version="1" comment="python3.11-pip-wheel is &lt;22.3.1-4.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811088" version="1" comment="python3.11-test is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811089" version="1" comment="python3.11-tkinter is &lt;3.11.5-1.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997705" version="1" comment="perl-File-Find-Rule is &lt;0.34-19.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053630" version="1" comment="expat is &lt;2.4.9-1.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053631" version="1" comment="expat-devel is &lt;2.4.9-1.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711319" version="1" comment="kernel-default is ==3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711320" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711323" version="1" comment="kernel-default is ==3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711324" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711326" version="1" comment="kernel-default is ==3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711327" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711329" version="1" comment="kernel-default is ==3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711330" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711332" version="1" comment="kernel-default is ==3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711333" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711335" version="1" comment="kernel-default is ==3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711336" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714891" version="1" comment="kernel-default is ==3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711338" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711340" version="1" comment="kernel-default is ==3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711341" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711343" version="1" comment="kernel-default is ==3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711344" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711346" version="1" comment="kernel-default is ==3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711347" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711349" version="1" comment="kernel-default is ==3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711350" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711352" version="1" comment="kernel-default is ==3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711353" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711355" version="1" comment="kernel-default is ==3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711356" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711358" version="1" comment="kernel-default is ==3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711359" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711361" version="1" comment="kernel-default is ==3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711362" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711364" version="1" comment="kernel-default is ==3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711365" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866426" version="1" comment="webkit2gtk3 is &lt;2.42.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866427" version="1" comment="webkit2gtk3-devel is &lt;2.42.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866428" version="1" comment="webkit2gtk3-jsc is &lt;2.42.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866429" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.42.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711368" version="1" comment="kernel-default is ==3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711369" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711371" version="1" comment="kernel-default is ==3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711372" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711374" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=2-7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711376" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=2-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711378" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711380" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711382" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=2-6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805019" version="1" comment="python-unversioned-command is &lt;3.9.14-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805020" version="1" comment="python3 is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805021" version="1" comment="python3-debug is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805022" version="1" comment="python3-devel is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805023" version="1" comment="python3-idle is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805024" version="1" comment="python3-libs is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805025" version="1" comment="python3-test is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805026" version="1" comment="python3-tkinter is &lt;3.9.14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711384" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711386" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711388" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711390" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711392" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711394" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711396" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711398" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711400" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711402" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711404" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711406" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711408" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711410" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711412" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711414" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711416" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711418" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711420" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711422" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711424" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711426" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711428" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711430" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711432" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711434" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711436" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711438" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711440" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711442" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711444" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711446" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711448" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711450" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711452" version="1" comment="kernel-default is ==4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711453" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711454" version="1" comment="kernel-default is ==4.4.21-81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711455" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711456" version="1" comment="kernel-default is ==4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711457" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711458" version="1" comment="kernel-default is ==4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711459" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711460" version="1" comment="kernel-default is ==4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711461" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711462" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711464" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711466" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711468" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711470" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711472" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711474" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=7-20.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711476" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711478" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711480" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711482" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711484" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711486" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711488" version="1" comment="kernel-default is ==3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711489" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=3-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711491" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711493" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=2-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711495" version="1" comment="kernel-default is ==3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711496" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711498" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=8-23.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711500" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711502" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711504" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711506" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711508" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711510" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711512" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711514" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711516" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711518" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711520" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711522" version="1" comment="kernel-default is ==3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711523" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715596" version="1" comment="kernel-default is &lt;4.4.21-81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711525" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711527" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711529" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711531" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711533" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711535" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711536" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711537" version="1" comment="kernel-default is ==3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711538" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711540" version="1" comment="kernel-default is ==4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711541" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711542" version="1" comment="kernel-default is ==4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711543" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711544" version="1" comment="kernel-default is ==4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711545" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711546" version="1" comment="kernel-default is ==4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711547" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711548" version="1" comment="kernel-default is ==4.4.82-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711549" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711550" version="1" comment="kernel-default is ==4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711551" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711552" version="1" comment="kernel-default is ==4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711553" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711554" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=9-18.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711555" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711556" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711557" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711558" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711559" version="1" comment="kernel-default is ==4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711560" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711561" version="1" comment="kernel-default is ==4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711562" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711563" version="1" comment="kernel-default is ==4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711564" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711565" version="1" comment="kernel-default is ==4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711566" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711567" version="1" comment="kernel-default is ==4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711568" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711569" version="1" comment="kernel-default is ==4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711570" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711571" version="1" comment="kernel-default is ==4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711572" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711573" version="1" comment="kernel-default is ==4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711574" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711575" version="1" comment="kernel-default is ==4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711576" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711577" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=10-18.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711578" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711579" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711580" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711581" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711582" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711583" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=6-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711584" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711585" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711586" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711587" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711588" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711589" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711590" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711591" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=7-21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711592" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711593" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711594" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711595" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711596" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711597" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711598" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711599" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711600" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711601" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711602" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711603" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711604" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711605" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711606" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711607" version="1" comment="kernel-default is ==4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711608" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711609" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711611" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711612" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711613" version="1" comment="kernel-default is ==4.12.14-95.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711614" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711615" version="1" comment="kernel-default is &lt;4.12.14-95.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711616" version="1" comment="kernel-default is ==4.12.14-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711617" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=8-21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711618" version="1" comment="kernel-default is ==4.12.14-122.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711619" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711620" version="1" comment="kernel-default is &lt;4.12.14-122.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711621" version="1" comment="kernel-default is ==4.12.14-150.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711622" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711623" version="1" comment="kernel-default is &lt;4.12.14-150.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711624" version="1" comment="kernel-default is ==4.12.14-197.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711625" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711626" version="1" comment="kernel-default is &lt;4.12.14-197.26.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711627" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711628" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711629" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711630" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711631" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711632" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711633" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711634" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711635" version="1" comment="kernel-default is &lt;4.4.82-6.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711636" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711637" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711638" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711639" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711640" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711641" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711642" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711643" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711644" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711645" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711646" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711647" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711648" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711649" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711650" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711651" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711652" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711653" version="1" comment="kernel-default is ==4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711654" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711655" version="1" comment="kernel-default is ==4.4.114-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711656" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711657" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711658" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711659" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711660" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711661" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711662" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711663" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711664" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711665" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711666" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711667" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711668" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711669" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711670" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711671" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711672" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711673" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711674" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711675" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811129" version="1" comment="libtiff is &lt;4.4.0-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811130" version="1" comment="libtiff-devel is &lt;4.4.0-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811131" version="1" comment="libtiff-tools is &lt;4.4.0-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711676" version="1" comment="kernel-default is ==4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711677" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711678" version="1" comment="kernel-default is ==4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711679" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711680" version="1" comment="kernel-default is ==4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711681" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711683" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711684" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711685" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711686" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711687" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711688" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711689" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711690" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711691" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711692" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711693" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711694" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711695" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711696" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711697" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711698" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711699" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711700" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711701" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711702" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711703" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711704" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711705" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711706" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711707" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711708" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711709" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711710" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714892" version="1" comment="kernel-default is ==4.12.14-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711711" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711712" version="1" comment="kernel-default is ==4.12.14-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711713" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714893" version="1" comment="kernel-default is &lt;4.12.14-25.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711714" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=8-18.7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711715" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711716" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711717" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711718" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711719" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711720" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711722" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711724" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711726" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711728" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711730" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711732" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711734" version="1" comment="kernel-default is ==3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711735" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711737" version="1" comment="kernel-default is ==3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711738" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711740" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=4-11.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711741" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711742" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711743" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711744" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711745" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711747" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711749" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711751" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711753" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711755" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711757" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711759" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711761" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711763" version="1" comment="kernel-default is ==3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711764" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711766" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711767" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711768" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711769" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711770" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711771" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711772" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711774" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711776" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711778" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711780" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711782" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711784" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711786" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711788" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711790" version="1" comment="kernel-default is ==3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711791" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711793" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711794" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711795" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711796" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711797" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711798" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711799" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711800" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711801" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711802" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711803" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711804" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711805" version="1" comment="kernel-default is ==4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711806" version="1" comment="kgraft-patch-4_4_73-5-default is &gt;=2-2.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711807" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711808" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711809" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711810" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711811" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711812" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711813" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711814" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711815" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711816" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711817" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711818" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711819" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711820" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711821" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711822" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711823" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711824" version="1" comment="kernel-default is ==4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711825" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711826" version="1" comment="kernel-default is ==4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711827" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711828" version="1" comment="kernel-default is ==4.12.14-95.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711829" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711830" version="1" comment="kernel-default is ==4.12.14-95.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711831" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711832" version="1" comment="kernel-default is ==4.12.14-95.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711833" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711834" version="1" comment="kernel-default is ==4.12.14-95.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711835" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711836" version="1" comment="kernel-default is ==4.12.14-95.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711837" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711838" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711839" version="1" comment="kernel-default is ==4.12.14-95.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711840" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711841" version="1" comment="kernel-default is ==4.12.14-95.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711842" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711843" version="1" comment="kernel-default is ==4.12.14-95.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711844" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711845" version="1" comment="kernel-default is &lt;4.12.14-95.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711846" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=5-12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711847" version="1" comment="kernel-default is ==4.12.14-122.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711848" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711849" version="1" comment="kernel-default is ==4.12.14-122.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711850" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711851" version="1" comment="kernel-default is ==4.12.14-122.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711852" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711853" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711854" version="1" comment="kernel-default is ==4.12.14-150.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711855" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711856" version="1" comment="kernel-default is ==4.12.14-150.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711857" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711858" version="1" comment="kernel-default is ==4.12.14-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711859" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711860" version="1" comment="kernel-default is ==4.12.14-150.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711861" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711862" version="1" comment="kernel-default is ==4.12.14-150.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711863" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711864" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711865" version="1" comment="kernel-default is ==4.12.14-150.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711866" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711867" version="1" comment="kernel-default is &lt;4.12.14-150.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714895" version="1" comment="kernel-default is ==4.12.14-195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711868" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=12-34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711869" version="1" comment="kernel-default is ==4.12.14-197.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711870" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711871" version="1" comment="kernel-default is ==4.12.14-197.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711872" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711873" version="1" comment="kernel-default is ==4.12.14-197.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711874" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711875" version="1" comment="kernel-default is ==4.12.14-197.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711876" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711877" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711878" version="1" comment="kernel-default is ==4.12.14-197.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711879" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711880" version="1" comment="kernel-default is ==4.12.14-197.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711881" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711882" version="1" comment="kernel-default is ==4.12.14-197.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711883" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711884" version="1" comment="kernel-default is ==4.12.14-197.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711885" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711886" version="1" comment="kernel-default is ==4.12.14-197.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711887" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711888" version="1" comment="kernel-default is ==4.12.14-197.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711889" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712211" version="1" comment="kernel-default is &lt;4.12.14-197.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711890" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711891" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711892" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711893" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711894" version="1" comment="kernel-default is ==4.4.131-94.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711895" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711896" version="1" comment="kernel-default is ==4.4.132-94.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711897" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711898" version="1" comment="kernel-default is ==4.12.14-25.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711899" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711900" version="1" comment="kernel-default is ==4.12.14-25.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711901" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712098" version="1" comment="kernel-default is &lt;4.12.14-25.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711902" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711903" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711904" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711905" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711906" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711907" version="1" comment="kernel-default is ==4.4.138-94.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711908" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711909" version="1" comment="kernel-default is ==4.4.140-94.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711910" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711911" version="1" comment="kernel-default is ==4.4.143-94.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711912" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711913" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=4-10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711914" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711915" version="1" comment="kernel-default is ==4.12.14-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711916" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711917" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711918" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711919" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480339" version="1" comment="kernel-default is &lt;4.12.14-23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711920" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711921" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711922" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711923" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711924" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711925" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711926" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711927" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711928" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711929" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711930" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711931" version="1" comment="kernel-default is ==4.4.155-94.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711932" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711933" version="1" comment="kernel-default is ==4.4.156-94.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711934" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711935" version="1" comment="kernel-default is ==4.4.156-94.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711936" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711937" version="1" comment="kernel-default is ==4.4.156-94.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711939" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711940" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711941" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711942" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711943" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711944" version="1" comment="kernel-default is ==4.12.14-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711945" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711946" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711947" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711949" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711950" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711951" version="1" comment="kernel-default is &lt;4.4.140-94.42.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711952" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=10-28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711953" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711954" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=3-7.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711955" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711956" version="1" comment="kernel-default is ==4.12.14-94.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711957" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=9-2.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711958" version="1" comment="kernel-default is ==4.12.14-95.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711959" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711960" version="1" comment="kernel-default is ==4.12.14-95.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711961" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711962" version="1" comment="kernel-default is &lt;4.12.14-95.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711963" version="1" comment="kernel-default is ==4.12.14-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711964" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711965" version="1" comment="kernel-default is &lt;4.12.14-25.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711967" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711968" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711969" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711970" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711971" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711972" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711973" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711974" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711975" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711976" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711977" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711978" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711979" version="1" comment="kernel-default is ==4.4.162-94.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711980" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711981" version="1" comment="kernel-default is ==4.4.162-94.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711982" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711983" version="1" comment="kernel-default is &lt;4.4.162-94.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711984" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=3-2.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711985" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711986" version="1" comment="kernel-default is &lt;4.12.14-95.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711987" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711988" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711989" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711990" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711991" version="1" comment="kernel-default is ==4.12.14-25.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711992" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711993" version="1" comment="kernel-default is ==4.12.14-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711994" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711995" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711996" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025666" version="1" comment="zziplib is &lt;0.13.71-12.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025667" version="1" comment="zziplib-devel is &lt;0.13.71-12.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025668" version="1" comment="zziplib-utils is &lt;0.13.71-12.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711997" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711998" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711999" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712000" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=6-16.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712001" version="1" comment="kernel-default is ==4.12.14-95.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712002" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712003" version="1" comment="kernel-default is ==4.12.14-95.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712004" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698690" version="1" comment="kernel-default is ==4.12.14-95.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712005" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698692" version="1" comment="kernel-default is ==4.12.14-95.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712006" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698694" version="1" comment="kernel-default is ==4.12.14-95.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712007" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698696" version="1" comment="kernel-default is ==4.12.14-95.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712008" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698698" version="1" comment="kernel-default is &lt;4.12.14-95.83.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712009" version="1" comment="kernel-default is ==4.12.14-150.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712010" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712011" version="1" comment="kernel-default is ==4.12.14-150.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712012" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698720" version="1" comment="kernel-default is ==4.12.14-150.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712013" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698722" version="1" comment="kernel-default is ==4.12.14-150.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712014" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698724" version="1" comment="kernel-default is ==4.12.14-150.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712015" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698726" version="1" comment="kernel-default is &lt;4.12.14-150.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805055" version="1" comment="mingw32-zlib is &lt;1.2.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805056" version="1" comment="mingw32-zlib-static is &lt;1.2.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805057" version="1" comment="mingw64-zlib is &lt;1.2.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805058" version="1" comment="mingw64-zlib-static is &lt;1.2.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804224" version="1" comment="rsync is &lt;3.2.3-9.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804225" version="1" comment="rsync-daemon is &lt;3.2.3-9.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804198" version="1" comment="zlib is &lt;1.2.11-31.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804199" version="1" comment="zlib-devel is &lt;1.2.11-31.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804200" version="1" comment="zlib-static is &lt;1.2.11-31.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712016" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712017" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712018" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712019" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712020" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712021" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712022" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712023" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712024" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712025" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=10-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712026" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712027" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712028" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712029" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712030" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712031" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712032" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712033" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712034" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712035" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712036" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712037" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712038" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712039" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712040" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712041" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712042" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712043" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712044" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712045" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712046" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712047" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712048" version="1" comment="kernel-default is &lt;4.4.132-94.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712049" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=7-19.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712050" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712051" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712052" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712053" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=6-15.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512974" version="1" comment="kernel-default is &lt;4.12.14-120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712054" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712055" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712056" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712057" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712058" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712059" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712060" version="1" comment="kernel-default is ==4.12.14-95.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712061" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712062" version="1" comment="kernel-default is ==4.12.14-95.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712063" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712064" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712065" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712066" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712067" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712068" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712069" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712070" version="1" comment="kernel-default is ==4.12.14-150.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712071" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712072" version="1" comment="kernel-default is ==4.12.14-150.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712073" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712074" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712075" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712076" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712077" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712078" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712079" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712080" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712081" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712082" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712083" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712084" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712085" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712086" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712087" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=5-2.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712088" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712089" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712090" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712091" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712092" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712093" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712094" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712095" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712096" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712097" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712099" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712100" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712101" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712102" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712103" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712104" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712105" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712106" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712107" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712108" version="1" comment="kernel-default is ==4.4.175-94.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712109" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712110" version="1" comment="kernel-default is ==4.4.176-94.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712111" version="1" comment="kgraft-patch-4_4_176-94_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712112" version="1" comment="kernel-default is ==4.4.178-94.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712113" version="1" comment="kgraft-patch-4_4_178-94_91-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712114" version="1" comment="kernel-default is &lt;4.4.178-94.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712115" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=6-2.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712116" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712117" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712118" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712119" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712120" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712121" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712122" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712123" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712124" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712125" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712126" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712127" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712128" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712129" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712130" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=4-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481199" version="1" comment="kernel-default is &lt;4.12.14-195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712131" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712132" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712133" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712134" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712135" version="1" comment="kernel-default is ==4.4.180-94.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712136" version="1" comment="kgraft-patch-4_4_180-94_97-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712137" version="1" comment="kernel-default is &lt;4.4.180-94.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712138" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712139" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712140" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712141" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712142" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712143" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=3-7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712144" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714896" version="1" comment="kernel-default is &lt;4.12.14-197.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962429" version="1" comment="bzip2 is &lt;1.0.8-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962430" version="1" comment="bzip2-devel is &lt;1.0.8-10.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962431" version="1" comment="bzip2-libs is &lt;1.0.8-10.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712145" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712146" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712147" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811013" version="1" comment="edk2-ovmf is &lt;20230524-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811014" version="1" comment="edk2-tools is &lt;20230524-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811015" version="1" comment="edk2-tools-doc is &lt;20230524-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712148" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=7-2.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712149" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712150" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712151" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712152" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712153" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712154" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712155" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712156" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712157" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712158" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712159" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712160" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712161" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712162" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712163" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712164" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712165" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=6-16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712166" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712167" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712168" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712169" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712170" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712171" version="1" comment="kernel-default is &lt;4.12.14-95.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712172" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712173" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712174" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712175" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712176" version="1" comment="kernel-default is &lt;4.12.14-197.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712177" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712178" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712179" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712180" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712181" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712182" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712183" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712184" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712185" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712186" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712187" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712188" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712189" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712190" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712191" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712192" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712193" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712194" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712195" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712196" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712197" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712198" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712199" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712200" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712201" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712202" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712203" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712204" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712205" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712206" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712207" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712208" version="1" comment="kernel-default is &lt;4.12.14-197.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712209" version="1" comment="kernel-default is &lt;4.12.14-95.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712210" version="1" comment="kernel-default is &lt;4.12.14-150.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712212" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712213" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712214" version="1" comment="kernel-default is ==4.12.14-95.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712215" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712216" version="1" comment="kernel-default is &lt;4.12.14-95.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712217" version="1" comment="kernel-default is ==4.12.14-150.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712218" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712219" version="1" comment="kernel-default is &lt;4.12.14-150.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712220" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=8-2.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712221" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712222" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712223" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712224" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712225" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712226" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712227" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712228" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712229" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712230" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712231" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712232" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712233" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712234" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712235" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712236" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712237" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=7-19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712238" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712239" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712240" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712241" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712242" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805197" version="1" comment="usbguard is &lt;1.0.0-10.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805198" version="1" comment="usbguard-dbus is &lt;1.0.0-10.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805199" version="1" comment="usbguard-notifier is &lt;1.0.0-10.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805200" version="1" comment="usbguard-selinux is &lt;1.0.0-10.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805201" version="1" comment="usbguard-tools is &lt;1.0.0-10.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712243" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712244" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712245" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712246" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712247" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712248" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712249" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712250" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712251" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=3-6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712252" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712253" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712254" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712255" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712256" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712257" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712258" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712259" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712260" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712261" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712262" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712263" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=10-28.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712264" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712265" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712266" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712267" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712268" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712269" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712270" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712271" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712272" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712273" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712274" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712275" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712278" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712279" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712280" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712281" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712282" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712283" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712284" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712285" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=4-2.10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712286" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712287" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712288" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712289" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712290" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712291" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712292" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712293" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712294" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712295" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712296" version="1" comment="kernel-default is &lt;4.4.175-94.79.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712297" version="1" comment="kernel-default is &lt;4.12.14-95.48.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712298" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712299" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712300" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712301" version="1" comment="kernel-default is &lt;4.12.14-197.37.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712302" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712303" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712304" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712305" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712306" version="1" comment="kernel-default is ==4.12.14-95.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712307" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712308" version="1" comment="kernel-default is ==4.12.14-95.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712309" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712310" version="1" comment="kernel-default is &lt;4.12.14-95.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712311" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712312" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712313" version="1" comment="kernel-default is ==4.12.14-150.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712314" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712315" version="1" comment="kernel-default is ==4.12.14-150.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712316" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712317" version="1" comment="kernel-default is &lt;4.12.14-150.58.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712318" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712319" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712320" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712321" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712322" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712323" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=7-18.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712324" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712325" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712326" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712327" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712328" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712329" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712330" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712331" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712332" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712333" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712334" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712335" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712336" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712337" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712338" version="1" comment="kernel-default is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712339" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712340" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712341" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712342" version="1" comment="kernel-default is ==4.12.14-150.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712343" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712344" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712345" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712346" version="1" comment="kernel-default is &lt;4.12.14-150.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712347" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712348" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712349" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712350" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712351" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712352" version="1" comment="kernel-default is ==4.12.14-95.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712353" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712354" version="1" comment="kernel-default is &lt;4.12.14-95.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712355" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712356" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712357" version="1" comment="kernel-default is ==4.12.14-122.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712358" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712359" version="1" comment="kernel-default is ==4.12.14-122.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712360" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712361" version="1" comment="kernel-default is ==4.12.14-122.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712362" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712363" version="1" comment="kernel-default is ==4.12.14-122.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712364" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712365" version="1" comment="kernel-default is ==4.12.14-122.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712366" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712367" version="1" comment="kernel-default is ==4.12.14-122.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712368" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712369" version="1" comment="kernel-default is ==4.12.14-122.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712370" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712371" version="1" comment="kernel-default is ==4.12.14-122.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712372" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712373" version="1" comment="kernel-default is ==4.12.14-122.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712374" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712375" version="1" comment="kernel-default is &lt;4.12.14-122.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712376" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712377" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712378" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712379" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712380" version="1" comment="kernel-default is &lt;4.12.14-150.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712381" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712382" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712383" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712384" version="1" comment="kernel-default is ==4.12.14-197.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712385" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712386" version="1" comment="kernel-default is ==4.12.14-197.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712387" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712388" version="1" comment="kernel-default is ==4.12.14-197.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712389" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712390" version="1" comment="kernel-default is ==4.12.14-197.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712391" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712392" version="1" comment="kernel-default is ==4.12.14-197.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712393" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712394" version="1" comment="kernel-default is ==4.12.14-197.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712395" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712396" version="1" comment="kernel-default is ==4.12.14-197.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712397" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712398" version="1" comment="kernel-default is ==4.12.14-197.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712399" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712400" version="1" comment="kernel-default is ==4.12.14-197.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712401" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712402" version="1" comment="kernel-default is &lt;4.12.14-197.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714897" version="1" comment="kernel-default is ==5.3.18-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712403" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=7-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712404" version="1" comment="kernel-default is ==5.3.18-24.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712406" version="1" comment="kernel-default is ==5.3.18-24.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712407" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712408" version="1" comment="kernel-default is ==5.3.18-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712409" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714898" version="1" comment="kernel-default is &lt;5.3.18-24.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712410" version="1" comment="kernel-default is ==5.3.18-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712411" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712412" version="1" comment="kernel-default is ==5.3.18-24.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712413" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712414" version="1" comment="kernel-default is ==5.3.18-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712415" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712416" version="1" comment="kernel-default is ==5.3.18-24.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712417" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712418" version="1" comment="kernel-default is ==5.3.18-24.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712419" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804727" version="1" comment="python-unversioned-command is &lt;3.9.10-3.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804728" version="1" comment="python3 is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804729" version="1" comment="python3-debug is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804730" version="1" comment="python3-devel is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804731" version="1" comment="python3-idle is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804732" version="1" comment="python3-libs is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804733" version="1" comment="python3-test is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804734" version="1" comment="python3-tkinter is &lt;3.9.10-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712420" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712421" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712422" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712423" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712424" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712425" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712426" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712427" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712428" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712429" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712430" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712431" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712432" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712433" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712434" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712435" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712436" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712437" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712438" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712439" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712440" version="1" comment="kernel-default is &lt;4.12.14-197.61.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712441" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712442" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712443" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712444" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712445" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712446" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712447" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712448" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712449" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712450" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712451" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712452" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712453" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712454" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712455" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712456" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=4-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712457" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712458" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712459" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712460" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712461" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712462" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712463" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712464" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712465" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712466" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712467" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712468" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712469" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=11-31.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712470" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712471" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712472" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712473" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712474" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712475" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712476" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712477" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712478" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712479" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712480" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810791" version="1" comment="libfastjson is &lt;0.99.9-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810792" version="1" comment="libfastjson-devel is &lt;0.99.9-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712481" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712482" version="1" comment="kernel-default is &lt;4.12.14-95.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712483" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712484" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712485" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712486" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712487" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712488" version="1" comment="kernel-default is &lt;4.12.14-150.55.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712489" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712490" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712491" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712492" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712493" version="1" comment="kernel-default is &lt;4.12.14-197.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712494" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=2-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712495" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712496" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712497" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712498" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712499" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712500" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712501" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712502" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712503" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712504" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712505" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712506" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712507" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712508" version="1" comment="kernel-default is &lt;4.12.14-197.56.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712509" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712510" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712511" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712512" version="1" comment="kernel-default is &lt;4.12.14-197.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805948" version="1" comment="krb5-devel is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805949" version="1" comment="krb5-libs is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805950" version="1" comment="krb5-pkinit is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805951" version="1" comment="krb5-server is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805952" version="1" comment="krb5-server-ldap is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805953" version="1" comment="krb5-workstation is &lt;1.20.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805954" version="1" comment="libkadm5 is &lt;1.20.1-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712513" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712514" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712515" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712516" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866717" version="1" comment="zziplib is &lt;0.13.71-11.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866718" version="1" comment="zziplib-devel is &lt;0.13.71-11.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866719" version="1" comment="zziplib-utils is &lt;0.13.71-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806812" version="1" comment="flac is &lt;1.3.3-10.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806813" version="1" comment="flac-devel is &lt;1.3.3-10.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806814" version="1" comment="flac-libs is &lt;1.3.3-10.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804811" version="1" comment="speex is &lt;1.2.0-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804812" version="1" comment="speex-devel is &lt;1.2.0-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712517" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712518" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712519" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712520" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712521" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712522" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712523" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712524" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712525" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=9-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712526" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712527" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712528" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712529" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712530" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712531" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712532" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712533" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712534" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712535" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712536" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712537" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712538" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712539" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712540" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712541" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712542" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712543" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712544" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712545" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712546" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712547" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712548" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712549" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712550" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712551" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712552" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712553" version="1" comment="kernel-default is &lt;4.12.14-197.67.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712554" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=5-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712555" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712556" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712557" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712558" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712559" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712560" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712561" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712562" version="1" comment="kernel-default is &lt;4.12.14-95.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712563" version="1" comment="kernel-default is ==4.12.14-122.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712564" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712565" version="1" comment="kernel-default is ==4.12.14-122.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712566" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712567" version="1" comment="kernel-default is &lt;4.12.14-122.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712568" version="1" comment="kernel-default is ==4.12.14-197.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712569" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712570" version="1" comment="kernel-default is ==4.12.14-197.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712571" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712572" version="1" comment="kernel-default is &lt;4.12.14-197.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712573" version="1" comment="kernel-default is ==5.3.18-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712574" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712575" version="1" comment="kernel-default is ==5.3.18-24.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712576" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712577" version="1" comment="kernel-default is &lt;5.3.18-24.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698763" version="1" comment="kernel-default is ==5.3.18-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712578" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=10-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870054" version="1" comment="bpftool is &lt;7.3.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870055" version="1" comment="kernel is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870056" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.13.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870057" version="1" comment="kernel-core is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870058" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870059" version="1" comment="kernel-debug is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870060" version="1" comment="kernel-debug-core is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870063" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870064" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870065" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870066" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870069" version="1" comment="kernel-doc is &lt;5.14.0-427.13.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870070" version="1" comment="kernel-headers is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870071" version="1" comment="kernel-modules is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870072" version="1" comment="kernel-modules-core is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870073" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870074" version="1" comment="kernel-tools is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870075" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870077" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870078" version="1" comment="libperf is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870079" version="1" comment="perf is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870080" version="1" comment="python3-perf is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870081" version="1" comment="rtla is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870082" version="1" comment="rv is &lt;5.14.0-427.13.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712579" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712580" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712581" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712582" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712583" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712584" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712585" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712586" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712587" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712588" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712589" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712590" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712591" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712592" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712593" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712594" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712595" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712596" version="1" comment="kernel-default is ==4.12.14-122.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712597" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712598" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712599" version="1" comment="kernel-default is &lt;4.12.14-122.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712600" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712601" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712602" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712603" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712604" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712605" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712606" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712607" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712608" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712609" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712610" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712611" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712612" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712613" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712614" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712615" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712616" version="1" comment="kernel-default is ==4.12.14-197.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712617" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712618" version="1" comment="kernel-default is &lt;4.12.14-197.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953640" version="1" comment="lldpd is &lt;1.0.18-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953641" version="1" comment="lldpd-devel is &lt;1.0.18-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712619" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=8-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712620" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712621" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712622" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712623" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712624" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712625" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712626" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712627" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804553" version="1" comment="nodejs is &lt;16.16.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804554" version="1" comment="nodejs-docs is &lt;16.16.0-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804555" version="1" comment="nodejs-full-i18n is &lt;16.16.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804556" version="1" comment="nodejs-libs is &lt;16.16.0-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804557" version="1" comment="nodejs-nodemon is &lt;2.0.19-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804558" version="1" comment="npm is &lt;8.11.0-1.16.16.0.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804749" version="1" comment="podman is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804750" version="1" comment="podman-docker is &lt;4.2.0-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804751" version="1" comment="podman-gvproxy is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804752" version="1" comment="podman-plugins is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804753" version="1" comment="podman-remote is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804754" version="1" comment="podman-tests is &lt;4.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712628" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712629" version="1" comment="kernel-default is &lt;4.12.14-95.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712630" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712631" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712632" version="1" comment="kernel-default is &lt;4.12.14-150.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712633" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712634" version="1" comment="kernel-default is &lt;4.12.14-197.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712635" version="1" comment="kernel-default is ==5.3.18-24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712636" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712637" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712638" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=6-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712639" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712640" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712641" version="1" comment="kernel-default is &lt;4.12.14-122.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712642" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712643" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712644" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712645" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712646" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712647" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712648" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712649" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712650" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712651" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712652" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712653" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712654" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712655" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712656" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712657" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712658" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712659" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712660" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712661" version="1" comment="kernel-default is ==4.12.14-122.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712662" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712663" version="1" comment="kernel-default is &lt;4.12.14-122.66.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712664" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712665" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712666" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712667" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712668" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712669" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712670" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712671" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712672" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712673" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712674" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712675" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712676" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=11-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712677" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712678" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712679" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712680" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712681" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712682" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712683" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712684" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712685" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712686" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698736" version="1" comment="kernel-default is ==5.3.18-24.53.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712687" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712688" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712689" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712690" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712691" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712692" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712693" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712694" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712695" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712696" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712697" version="1" comment="kernel-default is &lt;4.12.14-95.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712698" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712699" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712700" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712701" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712702" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712703" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712704" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712705" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712706" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712707" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712708" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698703" version="1" comment="kernel-default is ==4.12.14-122.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712709" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698705" version="1" comment="kernel-default is ==4.12.14-122.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712710" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698707" version="1" comment="kernel-default is ==4.12.14-122.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712711" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712712" version="1" comment="kernel-default is &lt;4.12.14-122.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712713" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712714" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712715" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712716" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712717" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712718" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712719" version="1" comment="kernel-default is &lt;4.12.14-150.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712720" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712721" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712722" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712723" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712724" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712725" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712726" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712727" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712728" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712729" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712730" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698729" version="1" comment="kernel-default is ==4.12.14-197.89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712731" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698731" version="1" comment="kernel-default is ==4.12.14-197.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712733" version="1" comment="kernel-default is &lt;4.12.14-197.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712734" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=14-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698791" version="1" comment="kernel-default is ==5.3.18-24.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698738" version="1" comment="kernel-default is ==5.3.18-24.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698740" version="1" comment="kernel-default is ==5.3.18-24.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712747" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712748" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712749" version="1" comment="kernel-default is ==4.12.14-95.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712750" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712751" version="1" comment="kernel-default is ==4.12.14-95.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712752" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712753" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701405" version="1" comment="kernel-default is ==4.12.14-95.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712754" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701143" version="1" comment="kernel-default is ==4.12.14-95.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712755" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701407" version="1" comment="kernel-default is ==4.12.14-95.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712756" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701145" version="1" comment="kernel-default is ==4.12.14-95.99.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712757" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701147" version="1" comment="kernel-default is &lt;4.12.14-95.99.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698699" version="1" comment="kernel-default is ==4.12.14-122.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712758" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698701" version="1" comment="kernel-default is ==4.12.14-122.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712759" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701411" version="1" comment="kernel-default is ==4.12.14-122.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712760" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701413" version="1" comment="kernel-default is ==4.12.14-122.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712761" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701148" version="1" comment="kernel-default is ==4.12.14-122.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712762" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701415" version="1" comment="kernel-default is ==4.12.14-122.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712763" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701150" version="1" comment="kernel-default is ==4.12.14-122.124.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712764" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712765" version="1" comment="kernel-default is ==4.12.14-122.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712766" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712767" version="1" comment="kernel-default is ==4.12.14-122.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712768" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698713" version="1" comment="kernel-default is ==4.12.14-122.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712769" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698715" version="1" comment="kernel-default is ==4.12.14-122.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712770" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698717" version="1" comment="kernel-default is ==4.12.14-122.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712771" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698719" version="1" comment="kernel-default is &lt;4.12.14-122.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701421" version="1" comment="kernel-default is ==4.12.14-150000.150.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712772" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701260" version="1" comment="kernel-default is ==4.12.14-150000.150.92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712773" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712774" version="1" comment="kernel-default is ==4.12.14-150000.150.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712775" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712776" version="1" comment="kernel-default is ==4.12.14-150000.150.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712777" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712778" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=13-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701262" version="1" comment="kernel-default is ==4.12.14-150.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712779" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701425" version="1" comment="kernel-default is ==4.12.14-150.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712780" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701427" version="1" comment="kernel-default is &lt;4.12.14-150.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701265" version="1" comment="kernel-default is ==4.12.14-150100.197.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712781" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701154" version="1" comment="kernel-default is ==4.12.14-150100.197.114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712782" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712783" version="1" comment="kernel-default is ==4.12.14-150100.197.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712784" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712785" version="1" comment="kernel-default is ==4.12.14-150100.197.120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712786" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698727" version="1" comment="kernel-default is ==4.12.14-197.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712787" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701428" version="1" comment="kernel-default is ==4.12.14-197.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712788" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701268" version="1" comment="kernel-default is ==4.12.14-197.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712789" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701270" version="1" comment="kernel-default is &lt;4.12.14-197.108.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698822" version="1" comment="kernel-default is ==5.3.18-150200.24.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712790" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698824" version="1" comment="kernel-default is ==5.3.18-150200.24.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712791" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709908" version="1" comment="kernel-default is ==5.3.18-150200.24.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709909" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698786" version="1" comment="kernel-default is ==5.3.18-24.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712792" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698788" version="1" comment="kernel-default is ==5.3.18-24.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712793" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698748" version="1" comment="kernel-default is ==5.3.18-24.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712794" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698750" version="1" comment="kernel-default is ==5.3.18-24.86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712795" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698752" version="1" comment="kernel-default is ==5.3.18-24.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712796" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698754" version="1" comment="kernel-default is ==5.3.18-24.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712797" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698756" version="1" comment="kernel-default is ==5.3.18-24.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712798" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698758" version="1" comment="kernel-default is &lt;5.3.18-24.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698759" version="1" comment="kernel-default is ==5.3.18-150300.59.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712799" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698761" version="1" comment="kernel-default is ==5.3.18-150300.59.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712800" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698805" version="1" comment="kernel-default is ==5.3.18-150300.59.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712801" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698807" version="1" comment="kernel-default is ==5.3.18-150300.59.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712802" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698809" version="1" comment="kernel-default is ==5.3.18-150300.59.60.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712803" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698842" version="1" comment="kernel-default is ==5.3.18-150300.59.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712804" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698844" version="1" comment="kernel-default is ==5.3.18-150300.59.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712805" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698846" version="1" comment="kernel-default is ==5.3.18-150300.59.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712806" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701403" version="1" comment="kernel-default is ==5.3.18-150300.59.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712807" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706111" version="1" comment="kernel-default is ==5.3.18-150300.59.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712808" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698773" version="1" comment="kernel-default is ==5.3.18-59.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712809" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698775" version="1" comment="kernel-default is ==5.3.18-59.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712810" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698777" version="1" comment="kernel-default is ==5.3.18-59.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712811" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698779" version="1" comment="kernel-default is ==5.3.18-59.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712812" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698781" version="1" comment="kernel-default is ==5.3.18-59.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712813" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701452" version="1" comment="kernel-default is &lt;5.3.18-59.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698874" version="1" comment="kernel-default is ==5.14.21-150400.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712814" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=5-150400.4.12.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712815" version="1" comment="kernel-default is ==5.14.21-150400.24.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712816" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712817" version="1" comment="kernel-default is ==5.14.21-150400.24.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712818" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712819" version="1" comment="kernel-default is &lt;5.14.21-150400.24.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804960" version="1" comment="bpftool is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804961" version="1" comment="kernel is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804962" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.6.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804963" version="1" comment="kernel-core is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804964" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804965" version="1" comment="kernel-debug is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804966" version="1" comment="kernel-debug-core is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804969" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804970" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804973" version="1" comment="kernel-doc is &lt;5.14.0-162.6.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804974" version="1" comment="kernel-headers is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804975" version="1" comment="kernel-modules is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804976" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804977" version="1" comment="kernel-tools is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804978" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804980" version="1" comment="perf is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804981" version="1" comment="python3-perf is &lt;5.14.0-162.6.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805788" version="1" comment="pki-jackson-annotations is &lt;2.14.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805789" version="1" comment="pki-jackson-core is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805790" version="1" comment="pki-jackson-databind is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805791" version="1" comment="pki-jackson-jaxrs-json-provider is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805792" version="1" comment="pki-jackson-jaxrs-providers is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805793" version="1" comment="pki-jackson-module-jaxb-annotations is &lt;2.14.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725853" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725854" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725497" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725855" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725856" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725857" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712820" version="1" comment="kernel-default is &lt;4.12.14-95.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712821" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712822" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712823" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712824" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698709" version="1" comment="kernel-default is ==4.12.14-122.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712825" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698711" version="1" comment="kernel-default is ==4.12.14-122.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712826" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712827" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712828" version="1" comment="kernel-default is &lt;4.12.14-122.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712829" version="1" comment="kernel-default is &lt;4.12.14-150.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712830" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712831" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698733" version="1" comment="kernel-default is ==4.12.14-197.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712832" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698735" version="1" comment="kernel-default is &lt;4.12.14-197.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712833" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712834" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712835" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712836" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698742" version="1" comment="kernel-default is ==5.3.18-24.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712837" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698744" version="1" comment="kernel-default is ==5.3.18-24.75.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712838" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698746" version="1" comment="kernel-default is ==5.3.18-24.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712839" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712840" version="1" comment="kernel-default is &lt;5.3.18-24.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698765" version="1" comment="kernel-default is ==5.3.18-59.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712841" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698767" version="1" comment="kernel-default is ==5.3.18-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712842" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698769" version="1" comment="kernel-default is ==5.3.18-59.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712843" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698771" version="1" comment="kernel-default is ==5.3.18-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712844" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698783" version="1" comment="kernel-default is ==5.3.18-59.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712845" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698785" version="1" comment="kernel-default is &lt;5.3.18-59.5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712846" version="1" comment="kernel-default is &lt;4.12.14-197.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712847" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712848" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712849" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712850" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712851" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712852" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712853" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712854" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712855" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712856" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712857" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712858" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712859" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712860" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712861" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712862" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712863" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712864" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712865" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712866" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712867" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712868" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712869" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712870" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712871" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712872" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712873" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712874" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712875" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712876" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712877" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712878" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712879" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712880" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712881" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712882" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712883" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=13-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712884" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712885" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712886" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712887" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712888" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712889" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712890" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712891" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712892" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712893" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804878" version="1" comment="flac is &lt;1.3.3-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804879" version="1" comment="flac-devel is &lt;1.3.3-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804880" version="1" comment="flac-libs is &lt;1.3.3-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712894" version="1" comment="kernel-default is &lt;4.12.14-122.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712895" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712896" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712897" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712898" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712899" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712900" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712901" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712902" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712903" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712904" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712905" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712906" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712907" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712908" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712909" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712910" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712911" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712912" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712913" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712914" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712915" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712916" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712917" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712918" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712919" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712920" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712921" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712922" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712923" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712924" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712925" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712926" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712927" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712928" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712929" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712930" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712931" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712932" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712933" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712934" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712935" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712936" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712937" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712938" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712939" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=12-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712940" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712941" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712942" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712943" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712944" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712945" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712946" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712947" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712948" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712949" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712950" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712951" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712952" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712953" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712954" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712955" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712956" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712957" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712958" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712959" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712960" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712961" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712962" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712963" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712964" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712965" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712966" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712967" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712968" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712969" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712970" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712971" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712972" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712973" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712974" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712975" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712976" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712977" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712978" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712979" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712980" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712981" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712982" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712983" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712984" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712985" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712986" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712987" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712988" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712989" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712990" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712991" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712992" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712993" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712994" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712995" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712996" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712997" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712998" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712999" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713000" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713001" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713002" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713003" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713004" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713005" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713006" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713007" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713008" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713009" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713010" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713011" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713012" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713013" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713014" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713015" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713016" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713017" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713018" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713019" version="1" comment="kernel-default is &lt;5.3.18-24.53.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713020" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=9-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804838" version="1" comment="buildah is &lt;1.27.0-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804839" version="1" comment="buildah-tests is &lt;1.27.0-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804755" version="1" comment="skopeo is &lt;1.9.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804756" version="1" comment="skopeo-tests is &lt;1.9.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713021" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713022" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713023" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713024" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713025" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713026" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713027" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713028" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713029" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713030" version="1" comment="kernel-default is &lt;5.3.18-24.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713031" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713032" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713033" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713034" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713035" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713036" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713037" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713038" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804909" version="1" comment="php is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804910" version="1" comment="php-bcmath is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804911" version="1" comment="php-cli is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804912" version="1" comment="php-common is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804913" version="1" comment="php-dba is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804914" version="1" comment="php-dbg is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804915" version="1" comment="php-devel is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804916" version="1" comment="php-embedded is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804917" version="1" comment="php-enchant is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804918" version="1" comment="php-ffi is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804919" version="1" comment="php-fpm is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804920" version="1" comment="php-gd is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804921" version="1" comment="php-gmp is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804922" version="1" comment="php-intl is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804923" version="1" comment="php-ldap is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804924" version="1" comment="php-mbstring is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804925" version="1" comment="php-mysqlnd is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804926" version="1" comment="php-odbc is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804927" version="1" comment="php-opcache is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804928" version="1" comment="php-pdo is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804929" version="1" comment="php-pgsql is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804930" version="1" comment="php-process is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804931" version="1" comment="php-snmp is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804932" version="1" comment="php-soap is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804933" version="1" comment="php-xml is &lt;8.0.20-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713041" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713042" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713043" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713044" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713045" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713046" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713047" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713048" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713049" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713050" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713051" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713052" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713053" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713054" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713055" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713056" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713057" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713058" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713059" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713060" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713061" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713062" version="1" comment="kernel-default is &lt;4.12.14-122.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713063" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713064" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713065" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713066" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713067" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713068" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713069" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713070" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713071" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713072" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713073" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713074" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713075" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713076" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713077" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713078" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713079" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713080" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713081" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713082" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713083" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713084" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713085" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713086" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713087" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713088" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713089" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713090" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713091" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713092" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713093" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713094" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713095" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713096" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713097" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713098" version="1" comment="kernel-default is &lt;5.3.18-24.75.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713099" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=5-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713100" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713101" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713102" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713103" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713104" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713105" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713106" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713107" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713108" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804803" version="1" comment="protobuf is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804804" version="1" comment="protobuf-compiler is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804805" version="1" comment="protobuf-devel is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804806" version="1" comment="protobuf-lite is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804807" version="1" comment="protobuf-lite-devel is &lt;3.14.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804808" version="1" comment="python3-protobuf is &lt;3.14.0-13.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713109" version="1" comment="kernel-default is &lt;4.12.14-95.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713110" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713111" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713112" version="1" comment="kernel-default is &lt;4.12.14-122.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713113" version="1" comment="kernel-default is &lt;4.12.14-197.89.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713114" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713115" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713116" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713117" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713118" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713119" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713120" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713121" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713122" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713123" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713124" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713125" version="1" comment="kernel-default is &lt;5.3.18-24.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804850" version="1" comment="grafana is &lt;7.5.15-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804866" version="1" comment="bind is &lt;9.16.23-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804867" version="1" comment="bind-chroot is &lt;9.16.23-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804868" version="1" comment="bind-devel is &lt;9.16.23-5.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804869" version="1" comment="bind-dnssec-doc is &lt;9.16.23-5.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804870" version="1" comment="bind-dnssec-utils is &lt;9.16.23-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804871" version="1" comment="bind-doc is &lt;9.16.23-5.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804872" version="1" comment="bind-libs is &lt;9.16.23-5.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804873" version="1" comment="bind-license is &lt;9.16.23-5.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804874" version="1" comment="bind-utils is &lt;9.16.23-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805036" version="1" comment="dhcp-client is &lt;4.4.2-17.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805037" version="1" comment="dhcp-common is &lt;4.4.2-17.b1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805038" version="1" comment="dhcp-relay is &lt;4.4.2-17.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805039" version="1" comment="dhcp-server is &lt;4.4.2-17.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804875" version="1" comment="python3-bind is &lt;9.16.23-5.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805871" version="1" comment="bpftool is &lt;7.0.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805872" version="1" comment="kernel is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805873" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-284.11.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805874" version="1" comment="kernel-core is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805875" version="1" comment="kernel-cross-headers is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805876" version="1" comment="kernel-debug is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805877" version="1" comment="kernel-debug-core is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805880" version="1" comment="kernel-debug-modules is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805881" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805882" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805883" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805886" version="1" comment="kernel-doc is &lt;5.14.0-284.11.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805887" version="1" comment="kernel-headers is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805888" version="1" comment="kernel-modules is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805889" version="1" comment="kernel-modules-core is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805890" version="1" comment="kernel-modules-extra is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805891" version="1" comment="kernel-tools is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805892" version="1" comment="kernel-tools-libs is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805894" version="1" comment="kernel-uki-virt is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805895" version="1" comment="perf is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805896" version="1" comment="python3-perf is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805897" version="1" comment="rtla is &lt;5.14.0-284.11.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713126" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713127" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713128" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713129" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713130" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713131" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713132" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713133" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713134" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713135" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713136" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713137" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713138" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713139" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713140" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713141" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713142" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713143" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713144" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713145" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713146" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713147" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713148" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713149" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713150" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713151" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713152" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713153" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713154" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713155" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713156" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713157" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713158" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713159" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713160" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713161" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713162" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=10-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713163" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713164" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713165" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713166" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713167" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713168" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713169" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713170" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713171" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713172" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713173" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713174" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713175" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713176" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713177" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713178" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713179" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713180" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713181" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713182" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713183" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713184" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713185" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713186" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713187" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713188" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713189" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713190" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713191" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713192" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713193" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713194" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713195" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713196" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713197" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713198" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713199" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713200" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713201" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713202" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713203" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713204" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713205" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713206" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713207" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713208" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713209" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713210" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713211" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713212" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=9-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713213" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713214" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713215" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713216" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713217" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713218" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713219" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713220" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713221" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713222" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713223" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805051" version="1" comment="mingw32-glib2 is &lt;2.70.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805052" version="1" comment="mingw32-glib2-static is &lt;2.70.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805053" version="1" comment="mingw64-glib2 is &lt;2.70.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805054" version="1" comment="mingw64-glib2-static is &lt;2.70.1-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713224" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713225" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713226" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713227" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866664" version="1" comment="libjpeg-turbo is &lt;2.0.90-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866665" version="1" comment="libjpeg-turbo-devel is &lt;2.0.90-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866666" version="1" comment="libjpeg-turbo-utils is &lt;2.0.90-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866667" version="1" comment="turbojpeg is &lt;2.0.90-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866668" version="1" comment="turbojpeg-devel is &lt;2.0.90-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713228" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810783" version="1" comment="LibRaw is &lt;0.20.2-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810784" version="1" comment="LibRaw-devel is &lt;0.20.2-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713229" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713230" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713231" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713232" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713233" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713234" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713235" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713236" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713237" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713238" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713239" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713240" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713241" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713242" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713243" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713244" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713245" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713246" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713247" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713248" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713249" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713250" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713251" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713252" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713253" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713254" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713255" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713256" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713257" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713258" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713259" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713260" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713261" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713262" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=12-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713263" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713264" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713265" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713266" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713267" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713268" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713269" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713270" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713271" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713272" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713273" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872248" version="1" comment="ruby is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872249" version="1" comment="ruby-bundled-gems is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872250" version="1" comment="ruby-default-gems is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872251" version="1" comment="ruby-devel is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872252" version="1" comment="ruby-doc is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872253" version="1" comment="ruby-libs is &lt;3.1.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872254" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872255" version="1" comment="rubygem-bundler is &lt;2.3.26-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872256" version="1" comment="rubygem-io-console is &lt;0.5.11-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872257" version="1" comment="rubygem-irb is &lt;1.4.1-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872258" version="1" comment="rubygem-json is &lt;2.6.1-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872259" version="1" comment="rubygem-minitest is &lt;5.15.0-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872260" version="1" comment="rubygem-mysql2 is &lt;0.5.4-1.module+el9.1.0+15737+76195479 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872261" version="1" comment="rubygem-mysql2-doc is &lt;0.5.4-1.module+el9.1.0+15737+76195479 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872262" version="1" comment="rubygem-pg is &lt;1.3.5-1.module+el9.1.0+15737+76195479 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872263" version="1" comment="rubygem-pg-doc is &lt;1.3.5-1.module+el9.1.0+15737+76195479 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872264" version="1" comment="rubygem-power_assert is &lt;2.0.1-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872265" version="1" comment="rubygem-psych is &lt;4.0.4-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872266" version="1" comment="rubygem-rake is &lt;13.0.6-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872267" version="1" comment="rubygem-rbs is &lt;2.7.0-143.module+el9.3.0+21558+96b51efd for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872268" version="1" comment="rubygem-rdoc is &lt;6.4.0-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872585" version="1" comment="rubygem-rexml is &lt;3.2.5-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872586" version="1" comment="rubygem-rss is &lt;0.2.9-162.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872271" version="1" comment="rubygem-test-unit is &lt;3.5.3-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872272" version="1" comment="rubygem-typeprof is &lt;0.21.3-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872273" version="1" comment="rubygems is &lt;3.3.26-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872274" version="1" comment="rubygems-devel is &lt;3.3.26-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725499" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725858" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725859" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725860" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725861" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725862" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725863" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725864" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725865" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725866" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725867" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725868" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725869" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725501" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725870" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725871" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725872" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725503" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725873" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725874" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725875" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725876" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725877" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725878" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725879" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725880" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725881" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725882" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725883" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725884" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725885" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725886" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725887" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725888" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725889" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725890" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725891" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725505" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725892" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725893" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725894" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725895" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=8-150400.4.21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725506" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713798" version="1" comment="kernel-default is &lt;5.14.21-150400.24.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811185" version="1" comment="avahi is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811186" version="1" comment="avahi-compat-howl is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811187" version="1" comment="avahi-compat-howl-devel is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811188" version="1" comment="avahi-compat-libdns_sd is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811189" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811190" version="1" comment="avahi-devel is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811191" version="1" comment="avahi-glib is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811192" version="1" comment="avahi-glib-devel is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811193" version="1" comment="avahi-libs is &lt;0.8-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811194" version="1" comment="avahi-tools is &lt;0.8-15.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713274" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=8-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713275" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713276" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713277" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713278" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713279" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713280" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805988" version="1" comment="nodejs is &lt;18.14.2-2.module+el9.2.0.z+18497+a402347c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805989" version="1" comment="nodejs-devel is &lt;18.14.2-2.module+el9.2.0.z+18497+a402347c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805990" version="1" comment="nodejs-docs is &lt;18.14.2-2.module+el9.2.0.z+18497+a402347c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805991" version="1" comment="nodejs-full-i18n is &lt;18.14.2-2.module+el9.2.0.z+18497+a402347c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805997" version="1" comment="nodejs-libs is &lt;16.19.1-1.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805998" version="1" comment="nodejs-nodemon is &lt;2.0.20-3.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805113" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.1.0+15718+e52ec601 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805114" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.1.0+15718+e52ec601 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805993" version="1" comment="npm is &lt;9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804778" version="1" comment="qemu-guest-agent is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804779" version="1" comment="qemu-img is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804780" version="1" comment="qemu-kvm is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804781" version="1" comment="qemu-kvm-audio-pa is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804782" version="1" comment="qemu-kvm-block-curl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804783" version="1" comment="qemu-kvm-block-rbd is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804784" version="1" comment="qemu-kvm-common is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804785" version="1" comment="qemu-kvm-core is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804786" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804787" version="1" comment="qemu-kvm-device-display-virtio-gpu-gl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804788" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804789" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci-gl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804790" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804791" version="1" comment="qemu-kvm-device-display-virtio-vga-gl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804792" version="1" comment="qemu-kvm-device-usb-host is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804793" version="1" comment="qemu-kvm-device-usb-redirect is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804794" version="1" comment="qemu-kvm-docs is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804795" version="1" comment="qemu-kvm-tools is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804796" version="1" comment="qemu-kvm-ui-egl-headless is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804797" version="1" comment="qemu-kvm-ui-opengl is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804798" version="1" comment="qemu-pr-helper is &lt;7.0.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713281" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713282" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713283" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713284" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713285" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713286" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713287" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713288" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713289" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713290" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713291" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713292" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713293" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713294" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713295" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713296" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713297" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713298" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713299" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713300" version="1" comment="kernel-default is &lt;4.12.14-122.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713301" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713302" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713303" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713304" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713305" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713306" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713307" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713308" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713309" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713310" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713311" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713312" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713313" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713314" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713315" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713316" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713317" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713318" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713319" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713320" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713321" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713322" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713323" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713324" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713325" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713326" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713327" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713328" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713329" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713330" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713331" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713332" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713333" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713334" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713335" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713336" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844503" version="1" comment="python3-rpm is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844504" version="1" comment="rpm is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844505" version="1" comment="rpm-apidocs is &lt;4.16.1.3-27.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844506" version="1" comment="rpm-build is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844507" version="1" comment="rpm-build-libs is &lt;4.16.1.3-27.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844508" version="1" comment="rpm-cron is &lt;4.16.1.3-27.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844509" version="1" comment="rpm-devel is &lt;4.16.1.3-27.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844510" version="1" comment="rpm-libs is &lt;4.16.1.3-27.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844511" version="1" comment="rpm-plugin-audit is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844512" version="1" comment="rpm-plugin-fapolicyd is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844513" version="1" comment="rpm-plugin-ima is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844514" version="1" comment="rpm-plugin-selinux is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844515" version="1" comment="rpm-plugin-syslog is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844516" version="1" comment="rpm-plugin-systemd-inhibit is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844517" version="1" comment="rpm-sign is &lt;4.16.1.3-27.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844518" version="1" comment="rpm-sign-libs is &lt;4.16.1.3-27.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713337" version="1" comment="kernel-default is &lt;5.3.18-24.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713338" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713339" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713340" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713341" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713342" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713343" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713344" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713345" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713346" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713347" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713348" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713349" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713350" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713351" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713352" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713353" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713354" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713355" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713356" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713357" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713358" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713359" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713360" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713361" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713362" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713363" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713364" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713365" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713366" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713367" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713368" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713369" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713370" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713371" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713372" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713373" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713374" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713375" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713376" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713377" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713378" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713379" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713380" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713381" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713382" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713383" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713384" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713385" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713386" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713387" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713388" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713389" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713390" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713391" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713392" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713393" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=6-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713394" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713395" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713396" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713397" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713398" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713399" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713400" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713401" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713402" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713403" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713404" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713405" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713406" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810785" version="1" comment="gdb is &lt;10.2-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810786" version="1" comment="gdb-doc is &lt;10.2-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810787" version="1" comment="gdb-gdbserver is &lt;10.2-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810788" version="1" comment="gdb-headless is &lt;10.2-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810789" version="1" comment="gdb-minimal is &lt;10.2-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804956" version="1" comment="dpdk is &lt;21.11.2-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804957" version="1" comment="dpdk-devel is &lt;21.11.2-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804958" version="1" comment="dpdk-doc is &lt;21.11.2-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804959" version="1" comment="dpdk-tools is &lt;21.11.2-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805695" version="1" comment="edk2-ovmf is &lt;20221207gitfff6d81270b5-9.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805696" version="1" comment="edk2-tools is &lt;20221207gitfff6d81270b5-9.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805697" version="1" comment="edk2-tools-doc is &lt;20221207gitfff6d81270b5-9.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953751" version="1" comment="vim-X11 is &lt;8.2.2637-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953752" version="1" comment="vim-common is &lt;8.2.2637-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953753" version="1" comment="vim-enhanced is &lt;8.2.2637-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953754" version="1" comment="vim-filesystem is &lt;8.2.2637-21.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953755" version="1" comment="vim-minimal is &lt;8.2.2637-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713407" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698825" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=2-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716156" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718697" version="1" comment="kernel-default is ==5.3.18-150200.24.129.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718698" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725507" version="1" comment="kernel-default is ==5.3.18-150200.24.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725508" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713408" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713409" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713410" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713411" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713412" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713413" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713414" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713415" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713416" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713417" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713418" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713419" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713420" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713421" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713422" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713423" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713424" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713425" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713426" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713427" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713428" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701443" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701404" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706112" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709695" version="1" comment="kernel-default is ==5.3.18-150300.59.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715597" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715598" version="1" comment="kernel-default is ==5.3.18-150300.59.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715599" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725509" version="1" comment="kernel-default is ==5.3.18-150300.59.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725510" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713429" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=14-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713430" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713431" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713432" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713433" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713434" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713435" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713436" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713437" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713438" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713439" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698875" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=2-150400.4.3.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715600" version="1" comment="kernel-default is ==5.14.21-150400.24.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715601" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725511" version="1" comment="kernel-default is ==5.14.21-150400.24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725512" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729488" version="1" comment="kernel-default is ==5.14.21-150400.24.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729489" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729490" version="1" comment="kernel-default is &lt;5.14.21-150400.24.33.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713440" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713441" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713442" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713443" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713444" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713445" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713446" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713447" version="1" comment="kernel-default is &lt;4.12.14-95.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713448" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713449" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=15-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713450" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=12-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713451" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713452" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713453" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713454" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=13-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713455" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713456" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713457" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713458" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713459" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713460" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713461" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713462" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713463" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866722" version="1" comment="squashfs-tools is &lt;4.4-10.git1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713464" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713465" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713466" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713467" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713468" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713469" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713470" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713471" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713472" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713473" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713474" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713475" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713476" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713477" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713478" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713479" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713480" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713481" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713482" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713483" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713484" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713485" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713486" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713487" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713488" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713489" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713490" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713491" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713492" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713493" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713494" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713495" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713496" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713497" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713498" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713499" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713500" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713501" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713502" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713503" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713504" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713505" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713506" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713507" version="1" comment="kernel-default is &lt;5.3.18-24.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713508" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=11-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713509" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713510" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713511" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713512" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713513" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713514" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713515" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713516" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713517" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713518" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866521" version="1" comment="tcpdump is &lt;4.99.0-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713519" version="1" comment="kernel-default is &lt;4.12.14-122.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713520" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713521" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713522" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713523" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713524" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713525" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713526" version="1" comment="kernel-default is &lt;5.3.18-24.86.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713527" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053625" version="1" comment="pki-servlet-4.0-api is &lt;9.0.50-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053626" version="1" comment="pki-servlet-engine is &lt;9.0.50-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713528" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713529" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713530" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805365" version="1" comment="lua is &lt;5.4.4-2.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805366" version="1" comment="lua-devel is &lt;5.4.4-2.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805367" version="1" comment="lua-libs is &lt;5.4.4-2.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811172" version="1" comment="gmp is &lt;6.2.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811173" version="1" comment="gmp-c++ is &lt;6.2.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811174" version="1" comment="gmp-devel is &lt;6.2.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810790" version="1" comment="runc is &lt;1.1.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804892" version="1" comment="wavpack is &lt;5.4.0-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804893" version="1" comment="wavpack-devel is &lt;5.4.0-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805717" version="1" comment="gdk-pixbuf2 is &lt;2.42.6-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805718" version="1" comment="gdk-pixbuf2-devel is &lt;2.42.6-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805719" version="1" comment="gdk-pixbuf2-modules is &lt;2.42.6-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805203" version="1" comment="nodejs is &lt;16.18.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805204" version="1" comment="nodejs-docs is &lt;16.18.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805205" version="1" comment="nodejs-full-i18n is &lt;16.18.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805206" version="1" comment="nodejs-libs is &lt;16.18.1-3.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805207" version="1" comment="nodejs-nodemon is &lt;2.0.20-2.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805208" version="1" comment="npm is &lt;8.19.2-1.16.18.1.3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805043" version="1" comment="mingw32-cpp is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805044" version="1" comment="mingw32-gcc is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805045" version="1" comment="mingw32-gcc-c++ is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805046" version="1" comment="mingw32-libgcc is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805047" version="1" comment="mingw64-cpp is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805048" version="1" comment="mingw64-gcc is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805049" version="1" comment="mingw64-gcc-c++ is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805050" version="1" comment="mingw64-libgcc is &lt;12.0.1-11.2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804440" version="1" comment="galera is &lt;26.4.11-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804441" version="1" comment="mariadb is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804442" version="1" comment="mariadb-backup is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804443" version="1" comment="mariadb-common is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804444" version="1" comment="mariadb-devel is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804445" version="1" comment="mariadb-embedded is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804446" version="1" comment="mariadb-embedded-devel is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804447" version="1" comment="mariadb-errmsg is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804448" version="1" comment="mariadb-gssapi-server is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804449" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804450" version="1" comment="mariadb-pam is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804451" version="1" comment="mariadb-server is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804452" version="1" comment="mariadb-server-galera is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804453" version="1" comment="mariadb-server-utils is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804454" version="1" comment="mariadb-test is &lt;10.5.16-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804455" version="1" comment="mysql-selinux is &lt;1.0.5-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804335" version="1" comment="squid is &lt;5.2-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805713" version="1" comment="libguestfs-winsupport is &lt;9.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805413" version="1" comment="libjpeg-turbo is &lt;2.0.90-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805414" version="1" comment="libjpeg-turbo-devel is &lt;2.0.90-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805415" version="1" comment="libjpeg-turbo-utils is &lt;2.0.90-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805416" version="1" comment="turbojpeg is &lt;2.0.90-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805417" version="1" comment="turbojpeg-devel is &lt;2.0.90-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805041" version="1" comment="libtirpc is &lt;1.3.3-0.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805042" version="1" comment="libtirpc-devel is &lt;1.3.3-0.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805271" version="1" comment="libtasn1 is &lt;4.16.0-8.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805272" version="1" comment="libtasn1-devel is &lt;4.16.0-8.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805273" version="1" comment="libtasn1-tools is &lt;4.16.0-8.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776021" version="1" comment="kernel-default is ==4.12.14-122.162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868478" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794744" version="1" comment="kernel-default is ==4.12.14-122.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868479" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798684" version="1" comment="kernel-default is ==4.12.14-122.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868480" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807350" version="1" comment="kernel-default is ==4.12.14-122.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868481" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807695" version="1" comment="kernel-default is ==4.12.14-122.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868482" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816437" version="1" comment="kernel-default is ==4.12.14-122.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868483" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845680" version="1" comment="kernel-default is ==4.12.14-122.186.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868926" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845682" version="1" comment="kernel-default is ==4.12.14-122.189.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868484" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849119" version="1" comment="kernel-default is ==4.12.14-122.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868485" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854320" version="1" comment="kernel-default is ==4.12.14-122.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960101" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=11-8.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868487" version="1" comment="kernel-default is ==4.12.14-122.216.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960102" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=9-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868489" version="1" comment="kernel-default is &lt;4.12.14-122.216.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776028" version="1" comment="kernel-default is ==5.3.18-150200.24.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868490" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795754" version="1" comment="kernel-default is ==5.3.18-150200.24.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868491" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799561" version="1" comment="kernel-default is ==5.3.18-150200.24.160.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868492" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804085" version="1" comment="kernel-default is ==5.3.18-150200.24.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868493" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804087" version="1" comment="kernel-default is ==5.3.18-150200.24.166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868494" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816090" version="1" comment="kernel-default is ==5.3.18-150200.24.169.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868495" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845690" version="1" comment="kernel-default is ==5.3.18-150200.24.172.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868496" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845859" version="1" comment="kernel-default is ==5.3.18-150200.24.175.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868497" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849454" version="1" comment="kernel-default is ==5.3.18-150200.24.178.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868498" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854323" version="1" comment="kernel-default is ==5.3.18-150200.24.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956848" version="1" comment="kernel-livepatch-5_3_18-150200_24_183-default is &gt;=10-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861753" version="1" comment="kernel-default is ==5.3.18-150200.24.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957141" version="1" comment="kernel-livepatch-5_3_18-150200_24_188-default is &gt;=9-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861755" version="1" comment="kernel-default is &lt;5.3.18-150200.24.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775813" version="1" comment="kernel-default is ==5.3.18-150300.59.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868501" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796008" version="1" comment="kernel-default is ==5.3.18-150300.59.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868502" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799638" version="1" comment="kernel-default is ==5.3.18-150300.59.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868503" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804090" version="1" comment="kernel-default is ==5.3.18-150300.59.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868504" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804092" version="1" comment="kernel-default is ==5.3.18-150300.59.138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868505" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816440" version="1" comment="kernel-default is ==5.3.18-150300.59.141.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868506" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845693" version="1" comment="kernel-default is ==5.3.18-150300.59.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868507" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845695" version="1" comment="kernel-default is ==5.3.18-150300.59.147.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868508" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849457" version="1" comment="kernel-default is ==5.3.18-150300.59.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868509" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854326" version="1" comment="kernel-default is ==5.3.18-150300.59.153.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961304" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=12-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861761" version="1" comment="kernel-default is ==5.3.18-150300.59.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961280" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=11-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861763" version="1" comment="kernel-default is &lt;5.3.18-150300.59.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968248" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968249" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968250" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868517" version="1" comment="kernel-default is ==5.3.18-150300.59.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968251" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871852" version="1" comment="kernel-default is &lt;5.3.18-150300.59.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947485" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947486" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947487" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947488" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947489" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947408" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868514" version="1" comment="kernel-default is ==5.3.18-150200.24.191.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956850" version="1" comment="kernel-livepatch-5_3_18-150200_24_191-default is &gt;=8-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878063" version="1" comment="kernel-default is ==5.3.18-150200.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956851" version="1" comment="kernel-livepatch-5_3_18-150200_24_194-default is &gt;=5-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947492" version="1" comment="kernel-default is ==5.3.18-150200.24.197.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956852" version="1" comment="kernel-livepatch-5_3_18-150200_24_197-default is &gt;=4-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947494" version="1" comment="kernel-default is &lt;5.3.18-150200.24.197.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947495" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947496" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947497" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947498" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947499" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947500" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961281" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=10-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878066" version="1" comment="kernel-default is ==5.3.18-150300.59.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961282" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=7-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947503" version="1" comment="kernel-default is ==5.3.18-150300.59.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961305" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=6-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947505" version="1" comment="kernel-default is &lt;5.3.18-150300.59.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881211" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881212" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881075" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881213" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881214" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881215" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881216" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881217" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881218" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881219" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881220" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881221" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881222" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881223" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868516" version="1" comment="kernel-default is &lt;5.3.18-150200.24.191.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881225" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881226" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881227" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881228" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881229" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881230" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881231" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874159" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874160" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874161" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874162" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874163" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874164" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874165" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874166" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874167" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871835" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871836" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871837" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871838" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871839" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871840" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871841" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871842" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871843" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871845" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871846" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871847" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872165" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871848" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871849" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872415" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871850" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872166" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950334" version="1" comment="bpftool is &lt;7.3.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950335" version="1" comment="kernel is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950336" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.42.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950337" version="1" comment="kernel-core is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950338" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950339" version="1" comment="kernel-debug is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950340" version="1" comment="kernel-debug-core is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950343" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950344" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950345" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950346" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950349" version="1" comment="kernel-doc is &lt;5.14.0-427.42.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950350" version="1" comment="kernel-headers is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950351" version="1" comment="kernel-modules is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950352" version="1" comment="kernel-modules-core is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950353" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950354" version="1" comment="kernel-tools is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950355" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950357" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950358" version="1" comment="libperf is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950359" version="1" comment="perf is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950360" version="1" comment="python3-perf is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950361" version="1" comment="rtla is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950362" version="1" comment="rv is &lt;5.14.0-427.42.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947775" version="1" comment="bpftool is &lt;7.3.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947776" version="1" comment="kernel is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947777" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.40.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947778" version="1" comment="kernel-core is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947779" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947780" version="1" comment="kernel-debug is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947781" version="1" comment="kernel-debug-core is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947784" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947785" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947786" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947787" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947790" version="1" comment="kernel-doc is &lt;5.14.0-427.40.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947791" version="1" comment="kernel-headers is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947792" version="1" comment="kernel-modules is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947793" version="1" comment="kernel-modules-core is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947794" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947795" version="1" comment="kernel-tools is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947796" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947798" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947799" version="1" comment="libperf is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947800" version="1" comment="perf is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947801" version="1" comment="python3-perf is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947802" version="1" comment="rtla is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947803" version="1" comment="rv is &lt;5.14.0-427.40.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872944" version="1" comment="bpftool is &lt;7.3.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872945" version="1" comment="kernel is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872946" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.24.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872947" version="1" comment="kernel-core is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872948" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872949" version="1" comment="kernel-debug is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872950" version="1" comment="kernel-debug-core is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872953" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872954" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872955" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872956" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872959" version="1" comment="kernel-doc is &lt;5.14.0-427.24.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872960" version="1" comment="kernel-headers is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872961" version="1" comment="kernel-modules is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872962" version="1" comment="kernel-modules-core is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872963" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872964" version="1" comment="kernel-tools is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872965" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872967" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872968" version="1" comment="libperf is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872969" version="1" comment="perf is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872970" version="1" comment="python3-perf is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872971" version="1" comment="rtla is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872972" version="1" comment="rv is &lt;5.14.0-427.24.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877811" version="1" comment="bpftool is &lt;7.3.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877812" version="1" comment="kernel is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877813" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.28.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877814" version="1" comment="kernel-core is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877815" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877816" version="1" comment="kernel-debug is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877817" version="1" comment="kernel-debug-core is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877820" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877821" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877822" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877823" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877826" version="1" comment="kernel-doc is &lt;5.14.0-427.28.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877827" version="1" comment="kernel-headers is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877828" version="1" comment="kernel-modules is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877829" version="1" comment="kernel-modules-core is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877830" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877831" version="1" comment="kernel-tools is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877832" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877834" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877835" version="1" comment="libperf is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877836" version="1" comment="perf is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877837" version="1" comment="python3-perf is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877838" version="1" comment="rtla is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877839" version="1" comment="rv is &lt;5.14.0-427.28.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968252" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968253" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966031" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965285" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965820" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813705" version="1" comment="bpftool is &lt;7.2.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813706" version="1" comment="kernel is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813707" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-362.8.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813708" version="1" comment="kernel-core is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813709" version="1" comment="kernel-cross-headers is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813710" version="1" comment="kernel-debug is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813711" version="1" comment="kernel-debug-core is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813714" version="1" comment="kernel-debug-modules is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813715" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813716" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813717" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813720" version="1" comment="kernel-doc is &lt;5.14.0-362.8.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813721" version="1" comment="kernel-headers is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813722" version="1" comment="kernel-modules is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813723" version="1" comment="kernel-modules-core is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813724" version="1" comment="kernel-modules-extra is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813725" version="1" comment="kernel-tools is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813726" version="1" comment="kernel-tools-libs is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813728" version="1" comment="kernel-uki-virt is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813729" version="1" comment="libperf is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813730" version="1" comment="perf is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813731" version="1" comment="python3-perf is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813732" version="1" comment="rtla is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813733" version="1" comment="rv is &lt;5.14.0-362.8.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845879" version="1" comment="kernel-default is ==5.14.21-150500.55.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956546" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845884" version="1" comment="kernel-default is ==5.14.21-150500.55.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956854" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849163" version="1" comment="kernel-default is ==5.14.21-150500.55.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956547" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854334" version="1" comment="kernel-default is ==5.14.21-150500.55.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961306" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=13-150500.11.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861773" version="1" comment="kernel-default is ==5.14.21-150500.55.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961307" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=11-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861864" version="1" comment="kernel-default is ==5.14.21-150500.55.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961308" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=11-150500.11.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872677" version="1" comment="kernel-default is ==5.14.21-150500.55.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961309" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873488" version="1" comment="kernel-default is ==5.14.21-150500.55.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961310" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878545" version="1" comment="kernel-default is ==5.14.21-150500.55.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961311" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=8-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956857" version="1" comment="kernel-default is ==5.14.21-150500.55.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960514" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=3-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956859" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876186" version="1" comment="bpftool is &lt;7.3.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876187" version="1" comment="kernel is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876188" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.26.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876189" version="1" comment="kernel-core is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876190" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876191" version="1" comment="kernel-debug is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876192" version="1" comment="kernel-debug-core is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876195" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876196" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876197" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876198" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876201" version="1" comment="kernel-doc is &lt;5.14.0-427.26.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876202" version="1" comment="kernel-headers is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876203" version="1" comment="kernel-modules is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876204" version="1" comment="kernel-modules-core is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876205" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876206" version="1" comment="kernel-tools is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876207" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876209" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876210" version="1" comment="libperf is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876211" version="1" comment="perf is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876212" version="1" comment="python3-perf is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876213" version="1" comment="rtla is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876214" version="1" comment="rv is &lt;5.14.0-427.26.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948640" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948641" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948642" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948620" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950329" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948643" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948644" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948645" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950330" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948646" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846011" version="1" comment="kernel-default is ==5.14.21-150400.24.100.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948621" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849156" version="1" comment="kernel-default is ==5.14.21-150400.24.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948647" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854329" version="1" comment="kernel-default is ==5.14.21-150400.24.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961312" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=13-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861848" version="1" comment="kernel-default is ==5.14.21-150400.24.111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961313" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=11-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861850" version="1" comment="kernel-default is ==5.14.21-150400.24.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961314" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=11-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868526" version="1" comment="kernel-default is ==5.14.21-150400.24.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961315" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=10-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878543" version="1" comment="kernel-default is ==5.14.21-150400.24.122.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961316" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=8-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947538" version="1" comment="kernel-default is ==5.14.21-150400.24.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960109" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=5-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807720" version="1" comment="kernel-default is ==5.14.21-150400.24.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948652" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816464" version="1" comment="kernel-default is ==5.14.21-150400.24.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948653" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846009" version="1" comment="kernel-default is ==5.14.21-150400.24.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948654" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849160" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807722" version="1" comment="kernel-default is ==5.14.21-150500.55.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948655" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816469" version="1" comment="kernel-default is ==5.14.21-150500.55.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948656" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950373" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950374" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950292" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943401" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879629" version="1" comment="bpftool is &lt;7.3.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879630" version="1" comment="kernel is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879631" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.31.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879632" version="1" comment="kernel-core is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879633" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879634" version="1" comment="kernel-debug is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879635" version="1" comment="kernel-debug-core is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879638" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879639" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879640" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879641" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879644" version="1" comment="kernel-doc is &lt;5.14.0-427.31.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879645" version="1" comment="kernel-headers is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879646" version="1" comment="kernel-modules is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879647" version="1" comment="kernel-modules-core is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879648" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879649" version="1" comment="kernel-tools is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879650" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879652" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879653" version="1" comment="libperf is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879654" version="1" comment="perf is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879655" version="1" comment="python3-perf is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879656" version="1" comment="rtla is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879657" version="1" comment="rv is &lt;5.14.0-427.31.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053632" version="1" comment="microcode_ctl is &lt;20220809-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713531" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713532" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713533" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713534" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713535" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698691" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698693" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698695" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698697" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698700" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698702" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698704" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698706" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698708" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698710" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698712" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698714" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698716" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698718" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698721" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=16-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698723" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698725" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=8-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698728" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698730" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=16-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698734" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698737" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698739" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698741" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698743" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698745" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698747" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698749" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698751" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698753" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698755" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698757" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698760" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698762" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698764" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=16-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698766" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698768" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698770" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698772" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698774" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698776" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698778" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698780" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698782" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698784" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713536" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713537" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713538" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713539" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713540" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713541" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713542" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713543" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713544" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713545" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713546" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713547" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713548" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713549" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713550" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713551" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713552" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713553" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713554" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713555" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=10-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713556" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713557" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713558" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713559" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713560" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=10-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713561" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713562" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713563" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713564" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713565" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713566" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713567" version="1" comment="kernel-default is &lt;4.12.14-95.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713568" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713569" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701264" version="1" comment="kernel-default is &lt;4.12.14-150.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713570" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713571" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713572" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713573" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713574" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713575" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713576" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713577" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713578" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713579" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713580" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713581" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713582" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804456" version="1" comment="bpftool is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804457" version="1" comment="kernel is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804458" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-70.22.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804459" version="1" comment="kernel-core is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804460" version="1" comment="kernel-cross-headers is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804461" version="1" comment="kernel-debug is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804462" version="1" comment="kernel-debug-core is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804465" version="1" comment="kernel-debug-modules is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804466" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804469" version="1" comment="kernel-doc is &lt;5.14.0-70.22.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804470" version="1" comment="kernel-headers is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804471" version="1" comment="kernel-modules is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804472" version="1" comment="kernel-modules-extra is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804473" version="1" comment="kernel-tools is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804474" version="1" comment="kernel-tools-libs is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804476" version="1" comment="perf is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804477" version="1" comment="python3-perf is &lt;5.14.0-70.22.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804285" version="1" comment="vim-X11 is &lt;8.2.2637-16.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804286" version="1" comment="vim-common is &lt;8.2.2637-16.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804287" version="1" comment="vim-enhanced is &lt;8.2.2637-16.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804288" version="1" comment="vim-filesystem is &lt;8.2.2637-16.el9_0.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804289" version="1" comment="vim-minimal is &lt;8.2.2637-16.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804906" version="1" comment="libtiff is &lt;4.4.0-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804907" version="1" comment="libtiff-devel is &lt;4.4.0-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804908" version="1" comment="libtiff-tools is &lt;4.4.0-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804262" version="1" comment="compat-openssl11 is &lt;1.1.1k-4.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804813" version="1" comment="libvirt is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804814" version="1" comment="libvirt-client is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804815" version="1" comment="libvirt-daemon is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804816" version="1" comment="libvirt-daemon-config-network is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804817" version="1" comment="libvirt-daemon-config-nwfilter is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804818" version="1" comment="libvirt-daemon-driver-interface is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804819" version="1" comment="libvirt-daemon-driver-network is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804820" version="1" comment="libvirt-daemon-driver-nodedev is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804821" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804822" version="1" comment="libvirt-daemon-driver-qemu is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804823" version="1" comment="libvirt-daemon-driver-secret is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804824" version="1" comment="libvirt-daemon-driver-storage is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804825" version="1" comment="libvirt-daemon-driver-storage-core is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804826" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804827" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804828" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804829" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804830" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804831" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804832" version="1" comment="libvirt-daemon-kvm is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804833" version="1" comment="libvirt-devel is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804834" version="1" comment="libvirt-docs is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804835" version="1" comment="libvirt-libs is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804836" version="1" comment="libvirt-lock-sanlock is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804837" version="1" comment="libvirt-nss is &lt;8.5.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804903" version="1" comment="389-ds-base is &lt;2.1.3-4.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804904" version="1" comment="389-ds-base-libs is &lt;2.1.3-4.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804905" version="1" comment="python3-lib389 is &lt;2.1.3-4.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804876" version="1" comment="dnsmasq is &lt;2.85-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804877" version="1" comment="dnsmasq-utils is &lt;2.85-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713583" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713584" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713585" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713586" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713587" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713588" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713589" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713590" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713591" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713592" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713593" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713594" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713595" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713596" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713597" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713598" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713599" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713600" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713601" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713602" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713603" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698787" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698789" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698790" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698792" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698793" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698794" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698795" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698796" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698797" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698798" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698799" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698800" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698801" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698802" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698803" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698804" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698806" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698808" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698810" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698811" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=15-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698812" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698813" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698814" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698815" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698816" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698817" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698818" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698819" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698820" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698821" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804297" version="1" comment="bpftool is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804298" version="1" comment="kernel is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804299" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-70.17.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804300" version="1" comment="kernel-core is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804301" version="1" comment="kernel-cross-headers is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804302" version="1" comment="kernel-debug is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804303" version="1" comment="kernel-debug-core is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804306" version="1" comment="kernel-debug-modules is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804307" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804310" version="1" comment="kernel-doc is &lt;5.14.0-70.17.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804311" version="1" comment="kernel-headers is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804312" version="1" comment="kernel-modules is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804313" version="1" comment="kernel-modules-extra is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804314" version="1" comment="kernel-tools is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804315" version="1" comment="kernel-tools-libs is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804317" version="1" comment="perf is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804318" version="1" comment="python3-perf is &lt;5.14.0-70.17.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713604" version="1" comment="kernel-default is &lt;4.12.14-95.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685665" version="1" comment="kernel-default is &lt;5.14.21-150400.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713605" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713606" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713607" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713608" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713609" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713610" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713611" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713612" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713613" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713614" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713615" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713616" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713617" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713618" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713619" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713620" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713621" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713622" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713623" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713624" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713625" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713626" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713627" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713628" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713629" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713630" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713631" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713632" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713633" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713634" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713635" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713636" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713637" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713638" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713639" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713640" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713641" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713642" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713643" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713644" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713645" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713646" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713647" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=18-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713648" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713649" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713650" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713651" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713652" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713653" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713654" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713655" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713656" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713657" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804747" version="1" comment="pcs is &lt;0.11.3-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804748" version="1" comment="pcs-snmp is &lt;0.11.3-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698823" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698826" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698827" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698828" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698829" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698830" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698831" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698832" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698833" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698834" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698835" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698836" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698837" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698838" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698839" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698840" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698841" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698843" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698845" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698847" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698848" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=19-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698849" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698850" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698851" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698852" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698853" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698854" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698855" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698856" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698857" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698858" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804934" version="1" comment="openjpeg2 is &lt;2.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804935" version="1" comment="openjpeg2-devel is &lt;2.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804936" version="1" comment="openjpeg2-tools is &lt;2.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713658" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713659" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713660" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713661" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713662" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804330" version="1" comment="libinput is &lt;1.19.3-2.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804331" version="1" comment="libinput-devel is &lt;1.19.3-2.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804332" version="1" comment="libinput-utils is &lt;1.19.3-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804197" version="1" comment="gzip is &lt;1.10-9.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804263" version="1" comment="xz is &lt;5.2.5-8.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804264" version="1" comment="xz-devel is &lt;5.2.5-8.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804265" version="1" comment="xz-libs is &lt;5.2.5-8.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804266" version="1" comment="xz-lzma-compat is &lt;5.2.5-8.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713663" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713664" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713665" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713666" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713667" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713668" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713669" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713670" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713671" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713672" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713673" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713674" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713675" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713676" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713677" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713678" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713679" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713680" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713681" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713682" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713683" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713684" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713685" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713686" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713687" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713688" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713689" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713690" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713691" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=17-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713692" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713693" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713694" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713695" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713696" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713697" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713698" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713699" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713700" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713701" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804498" version="1" comment="openssl is &lt;3.0.1-41.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804499" version="1" comment="openssl-devel is &lt;3.0.1-41.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804500" version="1" comment="openssl-libs is &lt;3.0.1-41.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804501" version="1" comment="openssl-perl is &lt;3.0.1-41.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805027" version="1" comment="e2fsprogs is &lt;1.46.5-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805028" version="1" comment="e2fsprogs-devel is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805029" version="1" comment="e2fsprogs-libs is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805030" version="1" comment="libcom_err is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805031" version="1" comment="libcom_err-devel is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805032" version="1" comment="libss is &lt;1.46.5-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804942" version="1" comment="mutt is &lt;2.2.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805040" version="1" comment="logrotate is &lt;3.18.0-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713702" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713703" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713704" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713705" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713706" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713707" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713708" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713709" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713710" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713711" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713712" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713713" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713714" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713715" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713716" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713717" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713718" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713719" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713720" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713721" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713722" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804214" version="1" comment="thunderbird is &lt;91.9.0-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804226" version="1" comment="firefox is &lt;91.9.1-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804238" version="1" comment="thunderbird is &lt;91.9.1-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804227" version="1" comment="postgresql is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804228" version="1" comment="postgresql-contrib is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804229" version="1" comment="postgresql-plperl is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804230" version="1" comment="postgresql-plpython3 is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804231" version="1" comment="postgresql-pltcl is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804232" version="1" comment="postgresql-private-devel is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804233" version="1" comment="postgresql-private-libs is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804234" version="1" comment="postgresql-server is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804235" version="1" comment="postgresql-server-devel is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804236" version="1" comment="postgresql-test is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804237" version="1" comment="postgresql-upgrade is &lt;13.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804322" version="1" comment="pcre2 is &lt;10.37-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804323" version="1" comment="pcre2-devel is &lt;10.37-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804324" version="1" comment="pcre2-syntax is &lt;10.37-5.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804325" version="1" comment="pcre2-utf16 is &lt;10.37-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804326" version="1" comment="pcre2-utf32 is &lt;10.37-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981840" version="1" comment="ctdb is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805914" version="1" comment="evolution-mapi is &lt;3.40.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805915" version="1" comment="evolution-mapi-langpacks is &lt;3.40.1-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805916" version="1" comment="libnetapi is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981841" version="1" comment="libnetapi-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805917" version="1" comment="libsmbclient is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981842" version="1" comment="libsmbclient-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805918" version="1" comment="libwbclient is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981843" version="1" comment="libwbclient-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805919" version="1" comment="openchange is &lt;2.3-40.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805920" version="1" comment="python3-samba is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805921" version="1" comment="python3-samba-dc is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981844" version="1" comment="python3-samba-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981845" version="1" comment="python3-samba-test is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805922" version="1" comment="samba is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805923" version="1" comment="samba-client is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805924" version="1" comment="samba-client-libs is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805925" version="1" comment="samba-common is &lt;4.17.5-102.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805926" version="1" comment="samba-common-libs is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805927" version="1" comment="samba-common-tools is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805928" version="1" comment="samba-dc-libs is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805929" version="1" comment="samba-dcerpc is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981846" version="1" comment="samba-devel is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805930" version="1" comment="samba-krb5-printing is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805931" version="1" comment="samba-ldb-ldap-modules is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805932" version="1" comment="samba-libs is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981847" version="1" comment="samba-pidl is &lt;4.17.5-102.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981848" version="1" comment="samba-test is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981849" version="1" comment="samba-test-libs is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805933" version="1" comment="samba-tools is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805934" version="1" comment="samba-usershares is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805935" version="1" comment="samba-vfs-iouring is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805936" version="1" comment="samba-winbind is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805937" version="1" comment="samba-winbind-clients is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805938" version="1" comment="samba-winbind-krb5-locator is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805939" version="1" comment="samba-winbind-modules is &lt;4.17.5-102.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805940" version="1" comment="samba-winexe is &lt;4.17.5-102.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053614" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053615" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053616" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053617" version="1" comment="dotnet-host is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053618" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053619" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053620" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.107-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053622" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053623" version="1" comment="dotnet-templates-6.0 is &lt;6.0.107-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053624" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.107-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714500" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714501" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714502" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715338" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715339" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715340" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715603" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714503" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715341" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714504" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715342" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714505" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714506" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715811" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715604" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715605" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714507" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714508" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715606" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714509" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715607" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716236" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716237" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715812" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715813" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715814" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716238" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716239" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716240" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716157" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715815" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714900" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716158" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715608" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715609" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716159" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715610" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715611" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715612" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715816" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715817" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714902" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=6-150400.4.15.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713723" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713724" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713725" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713726" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713727" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713728" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713729" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713730" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713731" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713732" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713733" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713734" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713735" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713736" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713737" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713738" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713739" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713740" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713741" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713742" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713743" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713744" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713745" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713746" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713747" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713748" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713749" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713750" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713751" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713752" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713753" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=4-150400.4.9.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805817" version="1" comment="git-lfs is &lt;3.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804402" version="1" comment="go-toolset is &lt;1.17.12-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804403" version="1" comment="golang is &lt;1.17.12-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804404" version="1" comment="golang-bin is &lt;1.17.12-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804405" version="1" comment="golang-docs is &lt;1.17.12-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804406" version="1" comment="golang-misc is &lt;1.17.12-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804407" version="1" comment="golang-race is &lt;1.17.12-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804408" version="1" comment="golang-src is &lt;1.17.12-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804409" version="1" comment="golang-tests is &lt;1.17.12-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804953" version="1" comment="grafana-pcp is &lt;3.2.0-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804885" version="1" comment="toolbox is &lt;0.0.99.3-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804886" version="1" comment="toolbox-tests is &lt;0.0.99.3-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804891" version="1" comment="ignition is &lt;2.14.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701141" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701142" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701406" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701144" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701408" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701146" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701409" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701410" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701412" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701414" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701149" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701416" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701417" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=18-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701418" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=17-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701419" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701420" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701152" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701153" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701422" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=5-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701423" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=16-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701424" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=11-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701263" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=7-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701426" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=6-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701266" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701267" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=11-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701429" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=7-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701269" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=6-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701430" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=16-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701271" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701431" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701272" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701432" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=18-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701273" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=17-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701433" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=16-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701274" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701434" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701435" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701275" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701276" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701436" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701437" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701438" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701439" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701440" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=8-150300.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701441" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701442" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701444" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=18-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701445" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701446" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=16-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701447" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701448" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701449" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701450" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701451" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701453" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=3-150400.4.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713754" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713755" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713756" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713757" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713758" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713759" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713760" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713761" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713762" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713763" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713764" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713765" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713766" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713767" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713768" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713769" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713770" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713771" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713772" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713773" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713774" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713775" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713776" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713777" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713778" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713779" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713780" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804435" version="1" comment="vim-X11 is &lt;8.2.2637-16.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804436" version="1" comment="vim-common is &lt;8.2.2637-16.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804437" version="1" comment="vim-enhanced is &lt;8.2.2637-16.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804438" version="1" comment="vim-filesystem is &lt;8.2.2637-16.el9_0.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804439" version="1" comment="vim-minimal is &lt;8.2.2637-16.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804261" version="1" comment="thunderbird is &lt;91.10.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725514" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805756" version="1" comment="gstreamer1-plugins-good is &lt;1.18.4-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805757" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.18.4-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985331" version="1" comment="protobuf is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985332" version="1" comment="protobuf-compiler is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985333" version="1" comment="protobuf-devel is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985334" version="1" comment="protobuf-lite is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985335" version="1" comment="protobuf-lite-devel is &lt;3.14.0-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985336" version="1" comment="python3-protobuf is &lt;3.14.0-16.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701151" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701261" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701155" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701157" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805194" version="1" comment="libtiff is &lt;4.4.0-5.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805195" version="1" comment="libtiff-devel is &lt;4.4.0-5.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805196" version="1" comment="libtiff-tools is &lt;4.4.0-5.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804562" version="1" comment="bpftool is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804563" version="1" comment="kernel is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804564" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-70.26.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804565" version="1" comment="kernel-core is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804566" version="1" comment="kernel-cross-headers is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804567" version="1" comment="kernel-debug is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804568" version="1" comment="kernel-debug-core is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804571" version="1" comment="kernel-debug-modules is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804572" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804575" version="1" comment="kernel-doc is &lt;5.14.0-70.26.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804576" version="1" comment="kernel-headers is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804577" version="1" comment="kernel-modules is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804578" version="1" comment="kernel-modules-extra is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804579" version="1" comment="kernel-tools is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804580" version="1" comment="kernel-tools-libs is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804582" version="1" comment="perf is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804583" version="1" comment="python3-perf is &lt;5.14.0-70.26.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053964" version="1" comment="microcode_ctl is &lt;20230808-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813379" version="1" comment="ctdb is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813302" version="1" comment="evolution-mapi is &lt;3.40.1-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813303" version="1" comment="evolution-mapi-langpacks is &lt;3.40.1-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813304" version="1" comment="libnetapi is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813380" version="1" comment="libnetapi-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813305" version="1" comment="libsmbclient is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813381" version="1" comment="libsmbclient-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813306" version="1" comment="libwbclient is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813382" version="1" comment="libwbclient-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813307" version="1" comment="openchange is &lt;2.3-41.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813308" version="1" comment="python3-samba is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813309" version="1" comment="python3-samba-dc is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813383" version="1" comment="python3-samba-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813384" version="1" comment="python3-samba-test is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813310" version="1" comment="samba is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813311" version="1" comment="samba-client is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813312" version="1" comment="samba-client-libs is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813313" version="1" comment="samba-common is &lt;4.18.6-100.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813314" version="1" comment="samba-common-libs is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813315" version="1" comment="samba-common-tools is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813316" version="1" comment="samba-dc-libs is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813317" version="1" comment="samba-dcerpc is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813385" version="1" comment="samba-devel is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813318" version="1" comment="samba-krb5-printing is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813319" version="1" comment="samba-ldb-ldap-modules is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813320" version="1" comment="samba-libs is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813386" version="1" comment="samba-pidl is &lt;4.18.6-100.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813387" version="1" comment="samba-test is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813388" version="1" comment="samba-test-libs is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813321" version="1" comment="samba-tools is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813322" version="1" comment="samba-usershares is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813323" version="1" comment="samba-vfs-iouring is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813324" version="1" comment="samba-winbind is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813325" version="1" comment="samba-winbind-clients is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813326" version="1" comment="samba-winbind-krb5-locator is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813327" version="1" comment="samba-winbind-modules is &lt;4.18.6-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813328" version="1" comment="samba-winexe is &lt;4.18.6-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804546" version="1" comment="mysql is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804547" version="1" comment="mysql-common is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804548" version="1" comment="mysql-devel is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804549" version="1" comment="mysql-errmsg is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804550" version="1" comment="mysql-libs is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804551" version="1" comment="mysql-server is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804552" version="1" comment="mysql-test is &lt;8.0.30-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804180" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804181" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804182" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804183" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804184" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804185" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804186" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804187" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804188" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804189" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804190" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804191" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.332.b09-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804192" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.332.b09-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804193" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804194" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804195" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804196" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.332.b09-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804134" version="1" comment="java-11-openjdk is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804135" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804136" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804137" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804138" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804139" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804140" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804141" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804142" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804143" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804144" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804145" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804146" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804147" version="1" comment="java-11-openjdk-jmods is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804148" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804149" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804150" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804151" version="1" comment="java-11-openjdk-src is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804152" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804153" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804154" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804155" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804156" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.15.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804157" version="1" comment="java-17-openjdk is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804158" version="1" comment="java-17-openjdk-demo is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804159" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804160" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804161" version="1" comment="java-17-openjdk-devel is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804162" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804163" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804164" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804165" version="1" comment="java-17-openjdk-headless is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804166" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804167" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804168" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804169" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804170" version="1" comment="java-17-openjdk-jmods is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804171" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804172" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804173" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804174" version="1" comment="java-17-openjdk-src is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804175" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804176" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804177" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804178" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804179" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.3.0.7-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804359" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804360" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804361" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804362" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804363" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804364" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804365" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804366" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804367" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804368" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804369" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804370" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.342.b07-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804371" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.342.b07-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804372" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804373" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804374" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804375" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.342.b07-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804336" version="1" comment="java-11-openjdk is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804337" version="1" comment="java-11-openjdk-demo is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804338" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804339" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804340" version="1" comment="java-11-openjdk-devel is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804341" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804342" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804343" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804344" version="1" comment="java-11-openjdk-headless is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804345" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804346" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804347" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804348" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804349" version="1" comment="java-11-openjdk-jmods is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804350" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804351" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804352" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804353" version="1" comment="java-11-openjdk-src is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804354" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804355" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804356" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804357" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804358" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.16.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804377" version="1" comment="java-17-openjdk is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804378" version="1" comment="java-17-openjdk-demo is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804379" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804380" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804381" version="1" comment="java-17-openjdk-devel is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804382" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804383" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804384" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804385" version="1" comment="java-17-openjdk-headless is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804386" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804387" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804388" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804389" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804390" version="1" comment="java-17-openjdk-jmods is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804391" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804392" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804393" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804394" version="1" comment="java-17-openjdk-src is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804395" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804396" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804397" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804398" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804399" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.4.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805958" version="1" comment="mysql is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805959" version="1" comment="mysql-common is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805960" version="1" comment="mysql-devel is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805961" version="1" comment="mysql-errmsg is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805962" version="1" comment="mysql-libs is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805963" version="1" comment="mysql-server is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805964" version="1" comment="mysql-test is &lt;8.0.32-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804665" version="1" comment="java-11-openjdk is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804666" version="1" comment="java-11-openjdk-demo is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804667" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804668" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804669" version="1" comment="java-11-openjdk-devel is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804670" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804671" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804672" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804673" version="1" comment="java-11-openjdk-headless is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804674" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804675" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804676" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804677" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804678" version="1" comment="java-11-openjdk-jmods is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804679" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804680" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804681" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804682" version="1" comment="java-11-openjdk-src is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804683" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804684" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804685" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804686" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804687" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.17.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804625" version="1" comment="java-17-openjdk is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804626" version="1" comment="java-17-openjdk-demo is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804627" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804628" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804629" version="1" comment="java-17-openjdk-devel is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804630" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804631" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804632" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804633" version="1" comment="java-17-openjdk-headless is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804634" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804635" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804636" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804637" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804638" version="1" comment="java-17-openjdk-jmods is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804639" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804640" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804641" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804642" version="1" comment="java-17-openjdk-src is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804643" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804644" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804645" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804646" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804647" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.5.0.8-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804648" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804649" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804650" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804651" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804652" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804653" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804654" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804655" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804656" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804657" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804658" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804659" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.352.b08-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804660" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.352.b08-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804661" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804662" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804663" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804664" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.352.b08-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804333" version="1" comment="firefox is &lt;91.11.0-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804334" version="1" comment="thunderbird is &lt;91.11.0-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804776" version="1" comment="guestfs-tools is &lt;1.48.2-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804757" version="1" comment="libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804758" version="1" comment="libguestfs-appliance is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804759" version="1" comment="libguestfs-bash-completion is &lt;1.48.4-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804760" version="1" comment="libguestfs-devel is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804761" version="1" comment="libguestfs-gobject is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804762" version="1" comment="libguestfs-gobject-devel is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804763" version="1" comment="libguestfs-inspect-icons is &lt;1.48.4-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804764" version="1" comment="libguestfs-man-pages-ja is &lt;1.48.4-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804765" version="1" comment="libguestfs-man-pages-uk is &lt;1.48.4-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804766" version="1" comment="libguestfs-rescue is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804767" version="1" comment="libguestfs-rsync is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804768" version="1" comment="libguestfs-xfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804769" version="1" comment="lua-guestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804770" version="1" comment="ocaml-libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804771" version="1" comment="ocaml-libguestfs-devel is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804772" version="1" comment="perl-Sys-Guestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804773" version="1" comment="php-libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804774" version="1" comment="python3-libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804775" version="1" comment="ruby-libguestfs is &lt;1.48.4-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804799" version="1" comment="virt-v2v is &lt;2.0.7-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804800" version="1" comment="virt-v2v-bash-completion is &lt;2.0.7-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804801" version="1" comment="virt-v2v-man-pages-ja is &lt;2.0.7-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804802" version="1" comment="virt-v2v-man-pages-uk is &lt;2.0.7-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804777" version="1" comment="virt-win-reg is &lt;1.48.2-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804292" version="1" comment="curl is &lt;7.76.1-14.el9_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804293" version="1" comment="curl-minimal is &lt;7.76.1-14.el9_0.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804294" version="1" comment="libcurl is &lt;7.76.1-14.el9_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804295" version="1" comment="libcurl-devel is &lt;7.76.1-14.el9_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804296" version="1" comment="libcurl-minimal is &lt;7.76.1-14.el9_0.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804846" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804847" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804848" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804849" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804855" version="1" comment="httpd is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804856" version="1" comment="httpd-core is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804857" version="1" comment="httpd-devel is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804858" version="1" comment="httpd-filesystem is &lt;2.4.53-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804859" version="1" comment="httpd-manual is &lt;2.4.53-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804860" version="1" comment="httpd-tools is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804861" version="1" comment="mod_ldap is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804862" version="1" comment="mod_lua is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804863" version="1" comment="mod_proxy_html is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804864" version="1" comment="mod_session is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804865" version="1" comment="mod_ssl is &lt;2.4.53-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713781" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713782" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713783" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713784" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713785" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713786" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713787" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713788" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713789" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713790" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713791" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713792" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713793" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713794" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713795" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713796" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713797" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=11-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804952" version="1" comment="python3-lxml is &lt;4.6.5-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804943" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804944" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804945" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804946" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804947" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804951" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804948" version="1" comment="xorg-x11-server-common is &lt;1.20.11-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804949" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804950" version="1" comment="xorg-x11-server-source is &lt;1.20.11-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804203" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804204" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804205" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804206" version="1" comment="dotnet-host is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804207" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804208" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804209" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.105-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804210" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.105-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804211" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.5-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804212" version="1" comment="dotnet-templates-6.0 is &lt;6.0.105-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804213" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.105-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805278" version="1" comment="git is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805279" version="1" comment="git-all is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805280" version="1" comment="git-core is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805281" version="1" comment="git-core-doc is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805282" version="1" comment="git-credential-libsecret is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805283" version="1" comment="git-daemon is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805284" version="1" comment="git-email is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805285" version="1" comment="git-gui is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805286" version="1" comment="git-instaweb is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805287" version="1" comment="git-subtree is &lt;2.31.1-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805288" version="1" comment="git-svn is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805289" version="1" comment="gitk is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805290" version="1" comment="gitweb is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805291" version="1" comment="perl-Git is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805292" version="1" comment="perl-Git-SVN is &lt;2.31.1-3.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811026" version="1" comment="mod_auth_openidc is &lt;2.4.9.4-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813704" version="1" comment="grafana is &lt;9.2.10-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804887" version="1" comment="swtpm is &lt;0.7.0-3.20211109gitb79fd91.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804888" version="1" comment="swtpm-libs is &lt;0.7.0-3.20211109gitb79fd91.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804889" version="1" comment="swtpm-tools is &lt;0.7.0-3.20211109gitb79fd91.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805776" version="1" comment="idm-jss is &lt;5.3.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805777" version="1" comment="idm-ldapjdk is &lt;5.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805778" version="1" comment="idm-pki-acme is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805779" version="1" comment="idm-pki-base is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805780" version="1" comment="idm-pki-ca is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805781" version="1" comment="idm-pki-est is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805782" version="1" comment="idm-pki-java is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805783" version="1" comment="idm-pki-kra is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805784" version="1" comment="idm-pki-server is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805785" version="1" comment="idm-pki-tools is &lt;11.3.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805786" version="1" comment="idm-tomcatjss is &lt;8.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805787" version="1" comment="python3-idm-pki is &lt;11.3.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804216" version="1" comment="mod_dav_svn is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804217" version="1" comment="python3-subversion is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804218" version="1" comment="subversion is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804219" version="1" comment="subversion-devel is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804220" version="1" comment="subversion-gnome is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804221" version="1" comment="subversion-libs is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804222" version="1" comment="subversion-perl is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804223" version="1" comment="subversion-tools is &lt;1.14.1-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015585" version="1" comment="xterm is &lt;366-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015586" version="1" comment="xterm-resize is &lt;366-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804735" version="1" comment="pki-acme is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804736" version="1" comment="pki-base is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804737" version="1" comment="pki-base-java is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804738" version="1" comment="pki-ca is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804739" version="1" comment="pki-kra is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804740" version="1" comment="pki-server is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804741" version="1" comment="pki-symkey is &lt;11.0.6-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804742" version="1" comment="pki-tools is &lt;11.0.6-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804743" version="1" comment="python3-pki is &lt;11.0.6-2.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804882" version="1" comment="redis is &lt;6.2.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804883" version="1" comment="redis-devel is &lt;6.2.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804884" version="1" comment="redis-doc is &lt;6.2.7-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805794" version="1" comment="git is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805795" version="1" comment="git-all is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805796" version="1" comment="git-core is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805797" version="1" comment="git-core-doc is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805798" version="1" comment="git-credential-libsecret is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805799" version="1" comment="git-daemon is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805800" version="1" comment="git-email is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805801" version="1" comment="git-gui is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805802" version="1" comment="git-instaweb is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805803" version="1" comment="git-subtree is &lt;2.39.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805804" version="1" comment="git-svn is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805805" version="1" comment="gitk is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805806" version="1" comment="gitweb is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805807" version="1" comment="perl-Git is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805808" version="1" comment="perl-Git-SVN is &lt;2.39.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804954" version="1" comment="yajl is &lt;2.1.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804955" version="1" comment="yajl-devel is &lt;2.1.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945003" version="1" comment="net-snmp is &lt;5.9.1-13.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945004" version="1" comment="net-snmp-agent-libs is &lt;5.9.1-13.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945005" version="1" comment="net-snmp-devel is &lt;5.9.1-13.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945006" version="1" comment="net-snmp-libs is &lt;5.9.1-13.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945007" version="1" comment="net-snmp-perl is &lt;5.9.1-13.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945008" version="1" comment="net-snmp-utils is &lt;5.9.1-13.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945009" version="1" comment="python3-net-snmp is &lt;5.9.1-13.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961486" version="1" comment="redis is &lt;6.2.17-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961487" version="1" comment="redis-devel is &lt;6.2.17-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961488" version="1" comment="redis-doc is &lt;6.2.17-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804239" version="1" comment="rsyslog is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804240" version="1" comment="rsyslog-crypto is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804241" version="1" comment="rsyslog-doc is &lt;8.2102.0-101.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804242" version="1" comment="rsyslog-elasticsearch is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804243" version="1" comment="rsyslog-gnutls is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804244" version="1" comment="rsyslog-gssapi is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804245" version="1" comment="rsyslog-kafka is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804246" version="1" comment="rsyslog-logrotate is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804247" version="1" comment="rsyslog-mmaudit is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804248" version="1" comment="rsyslog-mmfields is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804249" version="1" comment="rsyslog-mmjsonparse is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804250" version="1" comment="rsyslog-mmkubernetes is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804251" version="1" comment="rsyslog-mmnormalize is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804252" version="1" comment="rsyslog-mmsnmptrapd is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804253" version="1" comment="rsyslog-mysql is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804254" version="1" comment="rsyslog-omamqp1 is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804255" version="1" comment="rsyslog-openssl is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804256" version="1" comment="rsyslog-pgsql is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804257" version="1" comment="rsyslog-relp is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804258" version="1" comment="rsyslog-snmp is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804259" version="1" comment="rsyslog-udpspoof is &lt;8.2102.0-101.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816706" version="1" comment="apr is &lt;1.7.0-12.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816707" version="1" comment="apr-devel is &lt;1.7.0-12.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804400" version="1" comment="firefox is &lt;91.12.0-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804401" version="1" comment="thunderbird is &lt;91.12.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804602" version="1" comment="gnutls is &lt;3.7.6-12.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804603" version="1" comment="gnutls-c++ is &lt;3.7.6-12.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804604" version="1" comment="gnutls-dane is &lt;3.7.6-12.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804605" version="1" comment="gnutls-devel is &lt;3.7.6-12.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804606" version="1" comment="gnutls-utils is &lt;3.7.6-12.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804607" version="1" comment="nettle is &lt;3.8-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804608" version="1" comment="nettle-devel is &lt;3.8-3.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806002" version="1" comment="apr-util is &lt;1.6.1-20.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806003" version="1" comment="apr-util-bdb is &lt;1.6.1-20.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806004" version="1" comment="apr-util-devel is &lt;1.6.1-20.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806005" version="1" comment="apr-util-ldap is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806006" version="1" comment="apr-util-mysql is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806007" version="1" comment="apr-util-odbc is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806008" version="1" comment="apr-util-openssl is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806009" version="1" comment="apr-util-pgsql is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806010" version="1" comment="apr-util-sqlite is &lt;1.6.1-20.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804842" version="1" comment="qt5 is &lt;5.15.3-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804843" version="1" comment="qt5-devel is &lt;5.15.3-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804844" version="1" comment="qt5-rpm-macros is &lt;5.15.3-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804845" version="1" comment="qt5-srpm-macros is &lt;5.15.3-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804840" version="1" comment="fribidi is &lt;1.0.10-6.el9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804841" version="1" comment="fribidi-devel is &lt;1.0.10-6.el9.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804290" version="1" comment="expat is &lt;2.2.10-12.el9_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804291" version="1" comment="expat-devel is &lt;2.2.10-12.el9_0.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804519" version="1" comment="booth is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804520" version="1" comment="booth-arbitrator is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804521" version="1" comment="booth-core is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804522" version="1" comment="booth-site is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804523" version="1" comment="booth-test is &lt;1.0-251.3.bfb2f92.git.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804705" version="1" comment="bpftool is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804706" version="1" comment="kernel is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804707" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-70.30.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804708" version="1" comment="kernel-core is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804709" version="1" comment="kernel-cross-headers is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804710" version="1" comment="kernel-debug is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804711" version="1" comment="kernel-debug-core is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804714" version="1" comment="kernel-debug-modules is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804715" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804718" version="1" comment="kernel-doc is &lt;5.14.0-70.30.1.el9_0 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804719" version="1" comment="kernel-headers is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804720" version="1" comment="kernel-modules is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804721" version="1" comment="kernel-modules-extra is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804722" version="1" comment="kernel-tools is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804723" version="1" comment="kernel-tools-libs is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804725" version="1" comment="perf is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804726" version="1" comment="python3-perf is &lt;5.14.0-70.30.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725516" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725518" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725520" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725522" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725524" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725526" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806906" version="1" comment="nodejs is &lt;18.17.1-1.module+el9.2.0.z+19753+58118bc0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806907" version="1" comment="nodejs-devel is &lt;18.17.1-1.module+el9.2.0.z+19753+58118bc0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806908" version="1" comment="nodejs-docs is &lt;18.17.1-1.module+el9.2.0.z+19753+58118bc0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806909" version="1" comment="nodejs-full-i18n is &lt;18.17.1-1.module+el9.2.0.z+19753+58118bc0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806910" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.2.0.z+19753+58118bc0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806911" version="1" comment="npm is &lt;9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805302" version="1" comment="grub2-common is &lt;2.06-46.el9_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805303" version="1" comment="grub2-efi-x64 is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805304" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805305" version="1" comment="grub2-efi-x64-modules is &lt;2.06-46.el9_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805306" version="1" comment="grub2-pc is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805307" version="1" comment="grub2-pc-modules is &lt;2.06-46.el9_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805308" version="1" comment="grub2-tools is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805309" version="1" comment="grub2-tools-efi is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805310" version="1" comment="grub2-tools-extra is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805311" version="1" comment="grub2-tools-minimal is &lt;2.06-46.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737234" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737179" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737180" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737181" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737182" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737235" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737236" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737318" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729590" version="1" comment="kernel-default is ==5.3.18-150300.59.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738271" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737319" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737320" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737321" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737610" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737611" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737612" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737322" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737323" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737324" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737364" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737238" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737239" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737365" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729113" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737366" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=10-150400.4.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737613" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737367" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738272" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737368" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737614" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804890" version="1" comment="frr is &lt;8.2.2-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805481" version="1" comment="postgresql is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805482" version="1" comment="postgresql-contrib is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805483" version="1" comment="postgresql-docs is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805484" version="1" comment="postgresql-plperl is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805485" version="1" comment="postgresql-plpython3 is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805486" version="1" comment="postgresql-pltcl is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805487" version="1" comment="postgresql-private-devel is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805488" version="1" comment="postgresql-private-libs is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805489" version="1" comment="postgresql-server is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805490" version="1" comment="postgresql-server-devel is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805491" version="1" comment="postgresql-static is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805492" version="1" comment="postgresql-test is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805493" version="1" comment="postgresql-upgrade is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805494" version="1" comment="postgresql-upgrade-devel is &lt;13.10-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804327" version="1" comment="bsdtar is &lt;3.5.3-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804328" version="1" comment="libarchive is &lt;3.5.3-2.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804329" version="1" comment="libarchive-devel is &lt;3.5.3-2.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982264" version="1" comment="qemu-guest-agent is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982265" version="1" comment="qemu-img is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982266" version="1" comment="qemu-kvm is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982267" version="1" comment="qemu-kvm-audio-pa is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982268" version="1" comment="qemu-kvm-block-curl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982269" version="1" comment="qemu-kvm-block-rbd is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982270" version="1" comment="qemu-kvm-common is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982271" version="1" comment="qemu-kvm-core is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982272" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982273" version="1" comment="qemu-kvm-device-display-virtio-gpu-gl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982274" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982275" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci-gl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982276" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982277" version="1" comment="qemu-kvm-device-display-virtio-vga-gl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982278" version="1" comment="qemu-kvm-device-usb-host is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982279" version="1" comment="qemu-kvm-device-usb-redirect is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982280" version="1" comment="qemu-kvm-docs is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982281" version="1" comment="qemu-kvm-tools is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982282" version="1" comment="qemu-kvm-ui-egl-headless is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982283" version="1" comment="qemu-kvm-ui-opengl is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982284" version="1" comment="qemu-pr-helper is &lt;6.2.0-11.el9_0.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804267" version="1" comment="cups is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804268" version="1" comment="cups-client is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804269" version="1" comment="cups-devel is &lt;2.3.3op2-13.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804270" version="1" comment="cups-filesystem is &lt;2.3.3op2-13.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804271" version="1" comment="cups-ipptool is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804272" version="1" comment="cups-libs is &lt;2.3.3op2-13.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804273" version="1" comment="cups-lpd is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804274" version="1" comment="cups-printerapp is &lt;2.3.3op2-13.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804894" version="1" comment="poppler is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804895" version="1" comment="poppler-cpp is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804896" version="1" comment="poppler-cpp-devel is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804897" version="1" comment="poppler-devel is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804898" version="1" comment="poppler-glib is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804899" version="1" comment="poppler-glib-devel is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804900" version="1" comment="poppler-qt5 is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804901" version="1" comment="poppler-qt5-devel is &lt;21.01.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804902" version="1" comment="poppler-utils is &lt;21.01.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804502" version="1" comment="pcs is &lt;0.11.1-10.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804503" version="1" comment="pcs-snmp is &lt;0.11.1-10.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805017" version="1" comment="freetype is &lt;2.10.4-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805018" version="1" comment="freetype-devel is &lt;2.10.4-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811138" version="1" comment="iwl100-firmware is &lt;39.31.5.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811139" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811140" version="1" comment="iwl105-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811141" version="1" comment="iwl135-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811142" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811143" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811144" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811145" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811146" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811147" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811148" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811149" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811150" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811151" version="1" comment="libertas-sd8787-firmware is &lt;20230814-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811152" version="1" comment="linux-firmware is &lt;20230814-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811153" version="1" comment="linux-firmware-whence is &lt;20230814-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811154" version="1" comment="netronome-firmware is &lt;20230814-140.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805714" version="1" comment="butane is &lt;0.16.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805209" version="1" comment="go-toolset is &lt;1.18.9-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805210" version="1" comment="golang is &lt;1.18.9-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805211" version="1" comment="golang-bin is &lt;1.18.9-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805212" version="1" comment="golang-docs is &lt;1.18.9-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805213" version="1" comment="golang-misc is &lt;1.18.9-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805214" version="1" comment="golang-race is &lt;1.18.9-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805215" version="1" comment="golang-src is &lt;1.18.9-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805216" version="1" comment="golang-tests is &lt;1.18.9-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805711" version="1" comment="grafana is &lt;9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805712" version="1" comment="grafana-pcp is &lt;5.1.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805722" version="1" comment="toolbox is &lt;0.0.99.3-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805723" version="1" comment="toolbox-tests is &lt;0.0.99.3-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713799" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713800" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713801" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713802" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713803" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713804" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713805" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713806" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713807" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=14-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713808" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=11-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713809" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713810" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713811" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804984" version="1" comment="curl is &lt;7.76.1-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804985" version="1" comment="curl-minimal is &lt;7.76.1-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804986" version="1" comment="libcurl is &lt;7.76.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804987" version="1" comment="libcurl-devel is &lt;7.76.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804988" version="1" comment="libcurl-minimal is &lt;7.76.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805758" version="1" comment="bind is &lt;9.16.23-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805759" version="1" comment="bind-chroot is &lt;9.16.23-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805760" version="1" comment="bind-devel is &lt;9.16.23-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805761" version="1" comment="bind-dnssec-doc is &lt;9.16.23-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805762" version="1" comment="bind-dnssec-utils is &lt;9.16.23-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805763" version="1" comment="bind-doc is &lt;9.16.23-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805764" version="1" comment="bind-libs is &lt;9.16.23-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805765" version="1" comment="bind-license is &lt;9.16.23-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805766" version="1" comment="bind-utils is &lt;9.16.23-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805767" version="1" comment="python3-bind is &lt;9.16.23-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805323" version="1" comment="bpftool is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805324" version="1" comment="kernel is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805325" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.18.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805326" version="1" comment="kernel-core is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805327" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805328" version="1" comment="kernel-debug is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805329" version="1" comment="kernel-debug-core is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805332" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805333" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805336" version="1" comment="kernel-doc is &lt;5.14.0-162.18.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805337" version="1" comment="kernel-headers is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805338" version="1" comment="kernel-modules is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805339" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805340" version="1" comment="kernel-tools is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805341" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805343" version="1" comment="perf is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805344" version="1" comment="python3-perf is &lt;5.14.0-162.18.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804524" version="1" comment="ruby is &lt;3.0.4-160.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804525" version="1" comment="ruby-default-gems is &lt;3.0.4-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804526" version="1" comment="ruby-devel is &lt;3.0.4-160.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804527" version="1" comment="ruby-doc is &lt;3.0.4-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804528" version="1" comment="ruby-libs is &lt;3.0.4-160.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804529" version="1" comment="rubygem-bigdecimal is &lt;3.0.0-160.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804530" version="1" comment="rubygem-bundler is &lt;2.2.33-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804531" version="1" comment="rubygem-io-console is &lt;0.5.7-160.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804532" version="1" comment="rubygem-irb is &lt;1.3.5-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804533" version="1" comment="rubygem-json is &lt;2.5.1-160.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804534" version="1" comment="rubygem-minitest is &lt;5.14.2-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804535" version="1" comment="rubygem-power_assert is &lt;1.2.0-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804536" version="1" comment="rubygem-psych is &lt;3.3.2-160.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804537" version="1" comment="rubygem-rake is &lt;13.0.3-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804538" version="1" comment="rubygem-rbs is &lt;1.4.0-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804539" version="1" comment="rubygem-rdoc is &lt;6.3.3-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804540" version="1" comment="rubygem-rexml is &lt;3.2.5-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804541" version="1" comment="rubygem-rss is &lt;0.2.9-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804542" version="1" comment="rubygem-test-unit is &lt;3.3.7-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804543" version="1" comment="rubygem-typeprof is &lt;0.15.2-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804544" version="1" comment="rubygems is &lt;3.2.33-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804545" version="1" comment="rubygems-devel is &lt;3.2.33-160.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805955" version="1" comment="lua is &lt;5.4.4-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805956" version="1" comment="lua-devel is &lt;5.4.4-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805957" version="1" comment="lua-libs is &lt;5.4.4-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804496" version="1" comment="rsync is &lt;3.2.3-9.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804497" version="1" comment="rsync-daemon is &lt;3.2.3-9.el9_0.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804881" version="1" comment="runc is &lt;1.1.4-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805910" version="1" comment="dhcp-client is &lt;4.4.2-18.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805911" version="1" comment="dhcp-common is &lt;4.4.2-18.b1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805912" version="1" comment="dhcp-relay is &lt;4.4.2-18.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805913" version="1" comment="dhcp-server is &lt;4.4.2-18.b1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013280" version="1" comment="ncurses is &lt;6.2-10.20210508.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013281" version="1" comment="ncurses-base is &lt;6.2-10.20210508.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013282" version="1" comment="ncurses-c++-libs is &lt;6.2-10.20210508.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013283" version="1" comment="ncurses-devel is &lt;6.2-10.20210508.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013284" version="1" comment="ncurses-libs is &lt;6.2-10.20210508.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013285" version="1" comment="ncurses-term is &lt;6.2-10.20210508.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715614" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715615" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715343" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714903" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714904" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714905" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716160" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715818" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714906" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715344" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805222" version="1" comment="bpftool is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805223" version="1" comment="kernel is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805224" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.12.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805225" version="1" comment="kernel-core is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805226" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805227" version="1" comment="kernel-debug is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805228" version="1" comment="kernel-debug-core is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805231" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805232" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805235" version="1" comment="kernel-doc is &lt;5.14.0-162.12.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805236" version="1" comment="kernel-headers is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805237" version="1" comment="kernel-modules is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805238" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805239" version="1" comment="kernel-tools is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805240" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805242" version="1" comment="perf is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805243" version="1" comment="python3-perf is &lt;5.14.0-162.12.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729566" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729567" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729771" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729491" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729492" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729493" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729494" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729568" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729569" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=16-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729570" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729571" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729496" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729497" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729498" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729772" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729773" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729774" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729572" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729573" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729499" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729574" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729500" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729575" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729576" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729577" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804319" version="1" comment="libxml2 is &lt;2.9.13-1.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804320" version="1" comment="libxml2-devel is &lt;2.9.13-1.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804321" version="1" comment="python3-libxml2 is &lt;2.9.13-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805059" version="1" comment="podman is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805060" version="1" comment="podman-catatonit is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805061" version="1" comment="podman-docker is &lt;4.2.0-7.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805062" version="1" comment="podman-gvproxy is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805063" version="1" comment="podman-plugins is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805064" version="1" comment="podman-remote is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805065" version="1" comment="podman-tests is &lt;4.2.0-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804215" version="1" comment="firefox is &lt;91.9.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755119" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755215" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755384" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755120" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755216" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755121" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725519" version="1" comment="kernel-default is &lt;4.12.14-122.130.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755218" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755219" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755220" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725523" version="1" comment="kernel-default is &lt;4.12.14-150100.197.120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755221" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755222" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725525" version="1" comment="kernel-default is &lt;5.3.18-150200.24.126.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804201" version="1" comment="pcs is &lt;0.11.1-10.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804202" version="1" comment="pcs-snmp is &lt;0.11.1-10.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804809" version="1" comment="gimp is &lt;2.99.8-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804810" version="1" comment="gimp-libs is &lt;2.99.8-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804275" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804276" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804277" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804278" version="1" comment="dotnet-host is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804279" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804280" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804281" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.106-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804282" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.6-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804283" version="1" comment="dotnet-templates-6.0 is &lt;6.0.106-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804284" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.106-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804589" version="1" comment="thunderbird is &lt;102.3.0-3.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804937" version="1" comment="dovecot is &lt;2.3.16-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804938" version="1" comment="dovecot-devel is &lt;2.3.16-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804939" version="1" comment="dovecot-mysql is &lt;2.3.16-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804940" version="1" comment="dovecot-pgsql is &lt;2.3.16-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804941" version="1" comment="dovecot-pigeonhole is &lt;2.3.16-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713812" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713813" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713814" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713815" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713816" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713817" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805733" version="1" comment="buildah is &lt;1.29.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805734" version="1" comment="buildah-tests is &lt;1.29.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805823" version="1" comment="containernetworking-plugins is &lt;1.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805768" version="1" comment="podman is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805769" version="1" comment="podman-docker is &lt;4.4.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805770" version="1" comment="podman-gvproxy is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805771" version="1" comment="podman-plugins is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805772" version="1" comment="podman-remote is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805773" version="1" comment="podman-tests is &lt;4.4.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805774" version="1" comment="skopeo is &lt;1.11.2-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805775" version="1" comment="skopeo-tests is &lt;1.11.2-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871419" version="1" comment="runc is &lt;1.1.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804851" version="1" comment="python3-unbound is &lt;1.16.2-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804852" version="1" comment="unbound is &lt;1.16.2-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804853" version="1" comment="unbound-devel is &lt;1.16.2-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804854" version="1" comment="unbound-libs is &lt;1.16.2-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804590" version="1" comment="bind is &lt;9.16.23-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804591" version="1" comment="bind-chroot is &lt;9.16.23-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804592" version="1" comment="bind-devel is &lt;9.16.23-1.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804593" version="1" comment="bind-dnssec-doc is &lt;9.16.23-1.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804594" version="1" comment="bind-dnssec-utils is &lt;9.16.23-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804595" version="1" comment="bind-libs is &lt;9.16.23-1.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804596" version="1" comment="bind-license is &lt;9.16.23-1.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804597" version="1" comment="bind-utils is &lt;9.16.23-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804598" version="1" comment="python3-bind is &lt;9.16.23-1.el9_0.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804376" version="1" comment="grafana is &lt;7.5.11-5.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805202" version="1" comment="postgresql-jdbc is &lt;42.2.18-6.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804561" version="1" comment="dbus-broker is &lt;28-5.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804410" version="1" comment="php is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804411" version="1" comment="php-bcmath is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804412" version="1" comment="php-cli is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804413" version="1" comment="php-common is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804414" version="1" comment="php-dba is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804415" version="1" comment="php-dbg is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804416" version="1" comment="php-devel is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804417" version="1" comment="php-embedded is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804418" version="1" comment="php-enchant is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804419" version="1" comment="php-ffi is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804420" version="1" comment="php-fpm is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804421" version="1" comment="php-gd is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804422" version="1" comment="php-gmp is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804423" version="1" comment="php-intl is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804424" version="1" comment="php-ldap is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804425" version="1" comment="php-mbstring is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804426" version="1" comment="php-mysqlnd is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804427" version="1" comment="php-odbc is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804428" version="1" comment="php-opcache is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804429" version="1" comment="php-pdo is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804430" version="1" comment="php-pgsql is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804431" version="1" comment="php-process is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804432" version="1" comment="php-snmp is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804433" version="1" comment="php-soap is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804434" version="1" comment="php-xml is &lt;8.0.13-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805832" version="1" comment="apcu-panel is &lt;5.1.21-1.module+el9.1.0.z+15477+cb86791d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805833" version="1" comment="php is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805834" version="1" comment="php-bcmath is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805835" version="1" comment="php-cli is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805836" version="1" comment="php-common is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805837" version="1" comment="php-dba is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805838" version="1" comment="php-dbg is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805839" version="1" comment="php-devel is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805840" version="1" comment="php-embedded is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805841" version="1" comment="php-enchant is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805842" version="1" comment="php-ffi is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805843" version="1" comment="php-fpm is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805844" version="1" comment="php-gd is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805845" version="1" comment="php-gmp is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805846" version="1" comment="php-intl is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805847" version="1" comment="php-ldap is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805848" version="1" comment="php-mbstring is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805849" version="1" comment="php-mysqlnd is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805850" version="1" comment="php-odbc is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805851" version="1" comment="php-opcache is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805852" version="1" comment="php-pdo is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805853" version="1" comment="php-pecl-apcu is &lt;5.1.21-1.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805854" version="1" comment="php-pecl-apcu-devel is &lt;5.1.21-1.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805855" version="1" comment="php-pecl-rrd is &lt;2.0.3-4.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805856" version="1" comment="php-pecl-xdebug3 is &lt;3.1.4-1.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805857" version="1" comment="php-pecl-zip is &lt;1.20.1-1.module+el9.1.0.z+15477+cb86791d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805858" version="1" comment="php-pgsql is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805859" version="1" comment="php-process is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805860" version="1" comment="php-snmp is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805861" version="1" comment="php-soap is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805862" version="1" comment="php-xml is &lt;8.1.14-1.module+el9.2.0+17911+b059dfc2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805677" version="1" comment="qemu-guest-agent is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805678" version="1" comment="qemu-img is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805679" version="1" comment="qemu-kvm is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805680" version="1" comment="qemu-kvm-audio-pa is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805681" version="1" comment="qemu-kvm-block-curl is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805682" version="1" comment="qemu-kvm-block-rbd is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805683" version="1" comment="qemu-kvm-common is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805684" version="1" comment="qemu-kvm-core is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805685" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805686" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805687" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805688" version="1" comment="qemu-kvm-device-usb-host is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805689" version="1" comment="qemu-kvm-device-usb-redirect is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805690" version="1" comment="qemu-kvm-docs is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805691" version="1" comment="qemu-kvm-tools is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805692" version="1" comment="qemu-kvm-ui-egl-headless is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805693" version="1" comment="qemu-kvm-ui-opengl is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805694" version="1" comment="qemu-pr-helper is &lt;7.2.0-14.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804504" version="1" comment="open-vm-tools is &lt;11.3.5-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804505" version="1" comment="open-vm-tools-desktop is &lt;11.3.5-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804506" version="1" comment="open-vm-tools-sdmp is &lt;11.3.5-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804507" version="1" comment="open-vm-tools-test is &lt;11.3.5-1.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804260" version="1" comment="firefox is &lt;91.10.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805828" version="1" comment="wireshark is &lt;3.4.10-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805829" version="1" comment="wireshark-cli is &lt;3.4.10-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805830" version="1" comment="wireshark-devel is &lt;3.4.10-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805824" version="1" comment="python3-unbound is &lt;1.16.2-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805825" version="1" comment="unbound is &lt;1.16.2-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805826" version="1" comment="unbound-devel is &lt;1.16.2-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805827" version="1" comment="unbound-libs is &lt;1.16.2-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807680" version="1" comment="galera is &lt;26.4.14-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807681" version="1" comment="mariadb is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807682" version="1" comment="mariadb-backup is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807683" version="1" comment="mariadb-common is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807684" version="1" comment="mariadb-devel is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807685" version="1" comment="mariadb-embedded is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807686" version="1" comment="mariadb-embedded-devel is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807687" version="1" comment="mariadb-errmsg is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807688" version="1" comment="mariadb-gssapi-server is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807689" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807690" version="1" comment="mariadb-pam is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807691" version="1" comment="mariadb-server is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807692" version="1" comment="mariadb-server-galera is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807693" version="1" comment="mariadb-server-utils is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807694" version="1" comment="mariadb-test is &lt;10.5.22-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804489" version="1" comment="curl is &lt;7.76.1-14.el9_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804490" version="1" comment="curl-minimal is &lt;7.76.1-14.el9_0.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804491" version="1" comment="libcurl is &lt;7.76.1-14.el9_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804492" version="1" comment="libcurl-devel is &lt;7.76.1-14.el9_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804493" version="1" comment="libcurl-minimal is &lt;7.76.1-14.el9_0.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805217" version="1" comment="curl is &lt;7.76.1-19.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805218" version="1" comment="curl-minimal is &lt;7.76.1-19.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805219" version="1" comment="libcurl is &lt;7.76.1-19.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805220" version="1" comment="libcurl-devel is &lt;7.76.1-19.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805221" version="1" comment="libcurl-minimal is &lt;7.76.1-19.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811010" version="1" comment="autotrace is &lt;0.31.1-65.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804588" version="1" comment="firefox is &lt;102.3.0-6.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804989" version="1" comment="ctdb is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804990" version="1" comment="libsmbclient is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804991" version="1" comment="libsmbclient-devel is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804992" version="1" comment="libwbclient is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804993" version="1" comment="libwbclient-devel is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804994" version="1" comment="python3-samba is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804995" version="1" comment="samba is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804996" version="1" comment="samba-client is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804997" version="1" comment="samba-client-libs is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804998" version="1" comment="samba-common is &lt;4.16.4-101.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804999" version="1" comment="samba-common-libs is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805000" version="1" comment="samba-common-tools is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805001" version="1" comment="samba-devel is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805002" version="1" comment="samba-krb5-printing is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805003" version="1" comment="samba-libs is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805004" version="1" comment="samba-pidl is &lt;4.16.4-101.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805005" version="1" comment="samba-test is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805006" version="1" comment="samba-test-libs is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805007" version="1" comment="samba-vfs-iouring is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805008" version="1" comment="samba-winbind is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805009" version="1" comment="samba-winbind-clients is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805010" version="1" comment="samba-winbind-krb5-locator is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805011" version="1" comment="samba-winbind-modules is &lt;4.16.4-101.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805012" version="1" comment="samba-winexe is &lt;4.16.4-101.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805013" version="1" comment="ldb-tools is &lt;2.5.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805014" version="1" comment="libldb is &lt;2.5.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805015" version="1" comment="libldb-devel is &lt;2.5.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805016" version="1" comment="python3-ldb is &lt;2.5.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805907" version="1" comment="fwupd is &lt;1.8.10-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805908" version="1" comment="fwupd-devel is &lt;1.8.10-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805909" version="1" comment="fwupd-plugin-flashrom is &lt;1.8.10-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811103" version="1" comment="webkit2gtk3 is &lt;2.40.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811104" version="1" comment="webkit2gtk3-devel is &lt;2.40.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811105" version="1" comment="webkit2gtk3-jsc is &lt;2.40.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811106" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.40.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805735" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805736" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805737" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805738" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804584" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804585" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804586" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804587" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866501" version="1" comment="libsndfile is &lt;1.0.31-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866502" version="1" comment="libsndfile-devel is &lt;1.0.31-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866503" version="1" comment="libsndfile-utils is &lt;1.0.31-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805033" version="1" comment="harfbuzz is &lt;2.7.4-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805034" version="1" comment="harfbuzz-devel is &lt;2.7.4-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805035" version="1" comment="harfbuzz-icu is &lt;2.7.4-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804744" version="1" comment="lua is &lt;5.4.2-4.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804745" version="1" comment="lua-devel is &lt;5.4.2-4.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804746" version="1" comment="lua-libs is &lt;5.4.2-4.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805941" version="1" comment="openssl is &lt;3.0.7-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805942" version="1" comment="openssl-devel is &lt;3.0.7-6.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805943" version="1" comment="openssl-libs is &lt;3.0.7-6.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805944" version="1" comment="openssl-perl is &lt;3.0.7-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737240" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737009" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714512" version="1" comment="kernel-default is ==4.12.14-95.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737241" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729505" version="1" comment="kernel-default is ==4.12.14-95.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737242" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737325" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737326" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737369" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737327" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737328" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737329" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737370" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737330" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737331" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737371" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737332" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715347" version="1" comment="kernel-default is ==4.12.14-122.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737372" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729511" version="1" comment="kernel-default is ==4.12.14-122.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737333" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729513" version="1" comment="kernel-default is &lt;4.12.14-122.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737244" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737183" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737184" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737185" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729104" version="1" comment="kernel-default is ==4.12.14-150100.197.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737010" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729519" version="1" comment="kernel-default is ==4.12.14-150100.197.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737186" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737187" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737188" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725513" version="1" comment="kernel-default is &lt;5.14.21-150400.24.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985978" version="1" comment="kernel is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985979" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.19.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985980" version="1" comment="kernel-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985981" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985982" version="1" comment="kernel-debug is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985983" version="1" comment="kernel-debug-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985986" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985987" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985988" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985989" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985992" version="1" comment="kernel-doc is &lt;5.14.0-570.19.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985993" version="1" comment="kernel-headers is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985994" version="1" comment="kernel-modules is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985995" version="1" comment="kernel-modules-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985996" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985997" version="1" comment="kernel-rt is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985998" version="1" comment="kernel-rt-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985999" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986000" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986002" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986003" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986004" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986005" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986007" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986008" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986009" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986010" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986011" version="1" comment="kernel-tools is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986012" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986014" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986015" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986016" version="1" comment="libperf is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986017" version="1" comment="perf is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986018" version="1" comment="python3-perf is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986019" version="1" comment="rtla is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986020" version="1" comment="rv is &lt;5.14.0-570.19.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804478" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804479" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804480" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804481" version="1" comment="dotnet-host is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804482" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804483" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804484" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.108-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804485" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.108-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804486" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.8-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804487" version="1" comment="dotnet-templates-6.0 is &lt;6.0.108-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804488" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.108-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804559" version="1" comment="gnupg2 is &lt;2.3.3-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804560" version="1" comment="gnupg2-smime is &lt;2.3.3-2.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805077" version="1" comment="keylime is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805078" version="1" comment="keylime-base is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805079" version="1" comment="keylime-registrar is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805080" version="1" comment="keylime-selinux is &lt;6.5.1-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805081" version="1" comment="keylime-tenant is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805082" version="1" comment="keylime-verifier is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805083" version="1" comment="python3-keylime is &lt;6.5.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804691" version="1" comment="libksba is &lt;1.5.1-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804692" version="1" comment="libksba-devel is &lt;1.5.1-5.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805108" version="1" comment="nodejs is &lt;18.12.1-1.module+el9.1.0.z+17326+318294bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805109" version="1" comment="nodejs-devel is &lt;18.12.1-1.module+el9.1.0.z+17326+318294bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805110" version="1" comment="nodejs-docs is &lt;18.12.1-1.module+el9.1.0.z+17326+318294bb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805111" version="1" comment="nodejs-full-i18n is &lt;18.12.1-1.module+el9.1.0.z+17326+318294bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805115" version="1" comment="npm is &lt;8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805902" version="1" comment="curl is &lt;7.76.1-23.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805903" version="1" comment="curl-minimal is &lt;7.76.1-23.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805904" version="1" comment="libcurl is &lt;7.76.1-23.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805905" version="1" comment="libcurl-devel is &lt;7.76.1-23.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805906" version="1" comment="libcurl-minimal is &lt;7.76.1-23.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804620" version="1" comment="nodejs is &lt;16.17.1-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804621" version="1" comment="nodejs-docs is &lt;16.17.1-1.el9_0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804622" version="1" comment="nodejs-full-i18n is &lt;16.17.1-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804623" version="1" comment="nodejs-libs is &lt;16.17.1-1.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804624" version="1" comment="npm is &lt;8.15.0-1.16.17.1.1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729502" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729503" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729504" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729506" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729578" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729097" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729579" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729507" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729508" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729509" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729098" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729510" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729512" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729099" version="1" comment="kernel-default is ==4.12.14-150000.150.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729100" version="1" comment="kernel-livepatch-4_12_14-150000_150_101-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729514" version="1" comment="kernel-default is ==4.12.14-150000.150.104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729515" version="1" comment="kernel-livepatch-4_12_14-150000_150_104-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729580" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729581" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729582" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729583" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729517" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729102" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729103" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729518" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729105" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729520" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729775" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729107" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729108" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729521" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729109" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729584" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729585" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729522" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729586" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729523" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729524" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729111" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729112" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729587" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=9-150400.4.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729114" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729115" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729588" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729589" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845886" version="1" comment="bpftool is &lt;7.2.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845887" version="1" comment="kernel is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845888" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-362.18.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845889" version="1" comment="kernel-core is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846368" version="1" comment="kernel-cross-headers is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845890" version="1" comment="kernel-debug is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845891" version="1" comment="kernel-debug-core is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845894" version="1" comment="kernel-debug-modules is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845895" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845896" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845897" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845900" version="1" comment="kernel-doc is &lt;5.14.0-362.18.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845901" version="1" comment="kernel-headers is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845902" version="1" comment="kernel-modules is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845903" version="1" comment="kernel-modules-core is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845904" version="1" comment="kernel-modules-extra is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845905" version="1" comment="kernel-tools is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845906" version="1" comment="kernel-tools-libs is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845907" version="1" comment="kernel-uki-virt is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846370" version="1" comment="libperf is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845908" version="1" comment="perf is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845909" version="1" comment="python3-perf is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845910" version="1" comment="rtla is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845911" version="1" comment="rv is &lt;5.14.0-362.18.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805724" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805725" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805726" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805727" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805728" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805732" version="1" comment="xorg-x11-server-Xwayland is &lt;21.1.3-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805729" version="1" comment="xorg-x11-server-common is &lt;1.20.11-17.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805730" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-17.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805731" version="1" comment="xorg-x11-server-source is &lt;1.20.11-17.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805412" version="1" comment="pesign is &lt;115-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742686" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742526" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742527" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742528" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742251" version="1" comment="kernel-default is ==4.12.14-95.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742252" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742529" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742687" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742530" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742531" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742688" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742689" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742532" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742533" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742534" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742690" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742535" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729116" version="1" comment="kernel-default is ==4.12.14-122.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742254" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742255" version="1" comment="kernel-default is ==4.12.14-122.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742256" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742257" version="1" comment="kernel-default is &lt;4.12.14-122.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742536" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742537" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742538" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742539" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742540" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742541" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742258" version="1" comment="kernel-default is ==4.12.14-150100.197.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742259" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742542" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742691" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742543" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742544" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742545" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742546" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742261" version="1" comment="kernel-default is ==5.3.18-150200.24.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742262" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742547" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737237" version="1" comment="kernel-default is &lt;5.3.18-24.107.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742264" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742548" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742549" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742692" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742693" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742550" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742694" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742695" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742697" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742698" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743615" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=11-150400.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743617" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743618" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743619" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805814" version="1" comment="libtiff is &lt;4.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805815" version="1" comment="libtiff-devel is &lt;4.4.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805816" version="1" comment="libtiff-tools is &lt;4.4.0-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805266" version="1" comment="sqlite is &lt;3.34.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805267" version="1" comment="sqlite-devel is &lt;3.34.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805268" version="1" comment="sqlite-libs is &lt;3.34.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804698" version="1" comment="openssl is &lt;3.0.1-43.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804699" version="1" comment="openssl-devel is &lt;3.0.1-43.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804700" version="1" comment="openssl-libs is &lt;3.0.1-43.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804701" version="1" comment="openssl-perl is &lt;3.0.1-43.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805624" version="1" comment="fence-agents-aliyun is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805625" version="1" comment="fence-agents-all is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805626" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805627" version="1" comment="fence-agents-apc is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805628" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805629" version="1" comment="fence-agents-aws is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805630" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805631" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805632" version="1" comment="fence-agents-brocade is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805633" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805634" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805635" version="1" comment="fence-agents-common is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805636" version="1" comment="fence-agents-compute is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805637" version="1" comment="fence-agents-drac5 is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805638" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805639" version="1" comment="fence-agents-emerson is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805640" version="1" comment="fence-agents-eps is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805641" version="1" comment="fence-agents-gce is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805642" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805643" version="1" comment="fence-agents-hpblade is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805644" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805645" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805646" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805647" version="1" comment="fence-agents-ifmib is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805648" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805649" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805650" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805651" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805652" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805653" version="1" comment="fence-agents-ipdu is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805654" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805655" version="1" comment="fence-agents-kdump is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805656" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805657" version="1" comment="fence-agents-mpath is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805658" version="1" comment="fence-agents-openstack is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805659" version="1" comment="fence-agents-redfish is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805660" version="1" comment="fence-agents-rhevm is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805661" version="1" comment="fence-agents-rsa is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805662" version="1" comment="fence-agents-rsb is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805663" version="1" comment="fence-agents-sbd is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805664" version="1" comment="fence-agents-scsi is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805665" version="1" comment="fence-agents-virsh is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805666" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805667" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805668" version="1" comment="fence-agents-wti is &lt;4.10.0-43.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805669" version="1" comment="fence-virt is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805670" version="1" comment="fence-virtd is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805671" version="1" comment="fence-virtd-cpg is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805672" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805673" version="1" comment="fence-virtd-multicast is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805674" version="1" comment="fence-virtd-serial is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805675" version="1" comment="fence-virtd-tcp is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805676" version="1" comment="ha-cloud-support is &lt;4.10.0-43.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805945" version="1" comment="bsdtar is &lt;3.5.3-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805946" version="1" comment="libarchive is &lt;3.5.3-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805947" version="1" comment="libarchive-devel is &lt;3.5.3-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053627" version="1" comment="qatzip is &lt;1.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053629" version="1" comment="qatzip-libs is &lt;1.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811075" version="1" comment="frr is &lt;8.3.1-11.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811076" version="1" comment="frr-selinux is &lt;8.3.1-11.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866626" version="1" comment="edk2-ovmf is &lt;20231122-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866627" version="1" comment="edk2-tools is &lt;20231122-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866628" version="1" comment="edk2-tools-doc is &lt;20231122-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877070" version="1" comment="edk2-ovmf is &lt;20231122-6.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877071" version="1" comment="edk2-tools is &lt;20231122-6.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877072" version="1" comment="edk2-tools-doc is &lt;20231122-6.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805715" version="1" comment="frr is &lt;8.3.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805716" version="1" comment="frr-selinux is &lt;8.3.1-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805269" version="1" comment="bash is &lt;5.1.8-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805270" version="1" comment="bash-devel is &lt;5.1.8-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804982" version="1" comment="rsync is &lt;3.2.3-18.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804983" version="1" comment="rsync-daemon is &lt;3.2.3-18.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804702" version="1" comment="zlib is &lt;1.2.11-32.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804703" version="1" comment="zlib-devel is &lt;1.2.11-32.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804704" version="1" comment="zlib-static is &lt;1.2.11-32.el9_0 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805084" version="1" comment="device-mapper-multipath is &lt;0.8.7-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805085" version="1" comment="device-mapper-multipath-devel is &lt;0.8.7-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805086" version="1" comment="device-mapper-multipath-libs is &lt;0.8.7-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805087" version="1" comment="kpartx is &lt;0.8.7-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804508" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804509" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804510" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804511" version="1" comment="dotnet-host is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804512" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804513" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804514" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.109-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804515" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.109-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804516" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.9-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804517" version="1" comment="dotnet-templates-6.0 is &lt;6.0.109-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804518" version="1" comment="netstandard-targeting-pack-2.1 is &lt;6.0.109-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805600" version="1" comment="ctdb is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805601" version="1" comment="libsmbclient is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805602" version="1" comment="libsmbclient-devel is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805603" version="1" comment="libwbclient is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805604" version="1" comment="libwbclient-devel is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805605" version="1" comment="python3-samba is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805606" version="1" comment="samba is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805607" version="1" comment="samba-client is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805608" version="1" comment="samba-client-libs is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805609" version="1" comment="samba-common is &lt;4.16.4-103.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805610" version="1" comment="samba-common-libs is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805611" version="1" comment="samba-common-tools is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805612" version="1" comment="samba-devel is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805613" version="1" comment="samba-krb5-printing is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805614" version="1" comment="samba-libs is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805615" version="1" comment="samba-pidl is &lt;4.16.4-103.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805616" version="1" comment="samba-test is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805617" version="1" comment="samba-test-libs is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805618" version="1" comment="samba-vfs-iouring is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805619" version="1" comment="samba-winbind is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805620" version="1" comment="samba-winbind-clients is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805621" version="1" comment="samba-winbind-krb5-locator is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805622" version="1" comment="samba-winbind-modules is &lt;4.16.4-103.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805623" version="1" comment="samba-winexe is &lt;4.16.4-103.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805251" version="1" comment="systemd is &lt;250-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805252" version="1" comment="systemd-container is &lt;250-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805253" version="1" comment="systemd-devel is &lt;250-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805254" version="1" comment="systemd-journal-remote is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805255" version="1" comment="systemd-libs is &lt;250-12.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805256" version="1" comment="systemd-oomd is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805257" version="1" comment="systemd-pam is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805258" version="1" comment="systemd-resolved is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805259" version="1" comment="systemd-rpm-macros is &lt;250-12.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805260" version="1" comment="systemd-udev is &lt;250-12.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804495" version="1" comment="firefox is &lt;91.13.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804494" version="1" comment="thunderbird is &lt;91.13.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805747" version="1" comment="poppler is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805748" version="1" comment="poppler-cpp is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805749" version="1" comment="poppler-cpp-devel is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805750" version="1" comment="poppler-devel is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805751" version="1" comment="poppler-glib is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805752" version="1" comment="poppler-glib-devel is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805753" version="1" comment="poppler-qt5 is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805754" version="1" comment="poppler-qt5-devel is &lt;21.01.0-14.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805755" version="1" comment="poppler-utils is &lt;21.01.0-14.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813701" version="1" comment="pcs is &lt;0.11.6-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813702" version="1" comment="pcs-snmp is &lt;0.11.6-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715346" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714511" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714513" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714514" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715348" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714515" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715618" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714516" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715619" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718699" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718700" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718701" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718702" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718703" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718704" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718705" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718706" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718707" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718708" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718709" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718710" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718860" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718711" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718712" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718713" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718714" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718715" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718716" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718717" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718368" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718718" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718719" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718720" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718721" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718722" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=7-150400.4.18.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718723" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718370" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718371" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715602" version="1" comment="kernel-default is &lt;5.14.21-150400.24.21.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804693" version="1" comment="thunderbird is &lt;102.4.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805809" version="1" comment="freerdp is &lt;2.4.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805810" version="1" comment="freerdp-devel is &lt;2.4.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805811" version="1" comment="freerdp-libs is &lt;2.4.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805812" version="1" comment="libwinpr is &lt;2.4.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805813" version="1" comment="libwinpr-devel is &lt;2.4.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805721" version="1" comment="sysstat is &lt;12.5.4-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805746" version="1" comment="python3-mako is &lt;1.1.4-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866653" version="1" comment="libtiff is &lt;4.4.0-12.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866654" version="1" comment="libtiff-devel is &lt;4.4.0-12.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866655" version="1" comment="libtiff-tools is &lt;4.4.0-12.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811012" version="1" comment="libguestfs-winsupport is &lt;9.2-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805263" version="1" comment="libxml2 is &lt;2.9.13-3.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805264" version="1" comment="libxml2-devel is &lt;2.9.13-3.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805265" version="1" comment="python3-libxml2 is &lt;2.9.13-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807189" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807190" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807191" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807192" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807193" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807194" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807195" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807196" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807197" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807198" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807199" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807200" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.392.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807201" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.392.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807202" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807203" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807204" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807205" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.392.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985467" version="1" comment="xdg-utils is &lt;1.1.3-13.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804599" version="1" comment="expat is &lt;2.2.10-12.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804600" version="1" comment="expat-devel is &lt;2.2.10-12.el9_0.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804688" version="1" comment="firefox is &lt;102.3.0-7.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804689" version="1" comment="thunderbird is &lt;102.3.0-4.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805345" version="1" comment="python3-setuptools is &lt;53.0.0-10.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805346" version="1" comment="python3-setuptools-wheel is &lt;53.0.0-10.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810833" version="1" comment="python3-wheel is &lt;0.36.2-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810834" version="1" comment="python3-wheel-wheel is &lt;0.36.2-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804609" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805066" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804610" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805067" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804611" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805068" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805069" version="1" comment="dotnet-host is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804613" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805070" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804614" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805071" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804615" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.110-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804616" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.110-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805072" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.100-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805073" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.100-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804617" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.10-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805074" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.0-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804618" version="1" comment="dotnet-templates-6.0 is &lt;6.0.110-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805075" version="1" comment="dotnet-templates-7.0 is &lt;7.0.100-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805076" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.100-0.5.rc2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953544" version="1" comment="podman is &lt;5.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953545" version="1" comment="podman-docker is &lt;5.2.2-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953546" version="1" comment="podman-plugins is &lt;5.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953547" version="1" comment="podman-remote is &lt;5.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953548" version="1" comment="podman-tests is &lt;5.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804601" version="1" comment="squid is &lt;5.2-1.el9_0.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729591" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811011" version="1" comment="golang-github-cpuguy83-md2man is &lt;2.0.2-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805720" version="1" comment="conmon is &lt;2.1.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811080" version="1" comment="buildah is &lt;1.31.3-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811081" version="1" comment="buildah-tests is &lt;1.31.3-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811029" version="1" comment="containernetworking-plugins is &lt;1.3.0-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053633" version="1" comment="delve is &lt;1.9.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053634" version="1" comment="go-toolset is &lt;1.19.6-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053635" version="1" comment="golang is &lt;1.19.6-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053636" version="1" comment="golang-bin is &lt;1.19.6-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053637" version="1" comment="golang-docs is &lt;1.19.6-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053638" version="1" comment="golang-misc is &lt;1.19.6-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053639" version="1" comment="golang-race is &lt;1.19.6-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053640" version="1" comment="golang-src is &lt;1.19.6-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053641" version="1" comment="golang-tests is &lt;1.19.6-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810793" version="1" comment="podman is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810794" version="1" comment="podman-docker is &lt;4.6.1-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810795" version="1" comment="podman-gvproxy is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810796" version="1" comment="podman-plugins is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810797" version="1" comment="podman-remote is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810798" version="1" comment="podman-tests is &lt;4.6.1-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811024" version="1" comment="skopeo is &lt;1.13.3-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811025" version="1" comment="skopeo-tests is &lt;1.13.3-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983934" version="1" comment="nginx is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983935" version="1" comment="nginx-all-modules is &lt;1.20.1-22.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983936" version="1" comment="nginx-core is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983937" version="1" comment="nginx-filesystem is &lt;1.20.1-22.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983938" version="1" comment="nginx-mod-devel is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983939" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983940" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983941" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983942" version="1" comment="nginx-mod-mail is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983943" version="1" comment="nginx-mod-stream is &lt;1.20.1-22.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805698" version="1" comment="freeradius is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805699" version="1" comment="freeradius-devel is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805700" version="1" comment="freeradius-doc is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805701" version="1" comment="freeradius-krb5 is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805702" version="1" comment="freeradius-ldap is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805703" version="1" comment="freeradius-mysql is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805704" version="1" comment="freeradius-perl is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805705" version="1" comment="freeradius-postgresql is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805706" version="1" comment="freeradius-rest is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805707" version="1" comment="freeradius-sqlite is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805708" version="1" comment="freeradius-unixODBC is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805709" version="1" comment="freeradius-utils is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805710" version="1" comment="python3-freeradius is &lt;3.0.21-37.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811073" version="1" comment="libpq is &lt;13.11-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811074" version="1" comment="libpq-devel is &lt;13.11-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805831" version="1" comment="postgresql-jdbc is &lt;42.2.27-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805898" version="1" comment="device-mapper-multipath is &lt;0.8.7-20.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805899" version="1" comment="device-mapper-multipath-devel is &lt;0.8.7-20.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805900" version="1" comment="device-mapper-multipath-libs is &lt;0.8.7-20.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805901" version="1" comment="kpartx is &lt;0.8.7-20.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804694" version="1" comment="device-mapper-multipath is &lt;0.8.7-7.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804695" version="1" comment="device-mapper-multipath-devel is &lt;0.8.7-7.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804696" version="1" comment="device-mapper-multipath-libs is &lt;0.8.7-7.el9_0.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804697" version="1" comment="kpartx is &lt;0.8.7-7.el9_0.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805244" version="1" comment="dbus is &lt;1.12.20-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805245" version="1" comment="dbus-common is &lt;1.12.20-7.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805246" version="1" comment="dbus-daemon is &lt;1.12.20-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805247" version="1" comment="dbus-devel is &lt;1.12.20-7.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805248" version="1" comment="dbus-libs is &lt;1.12.20-7.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805249" version="1" comment="dbus-tools is &lt;1.12.20-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805250" version="1" comment="dbus-x11 is &lt;1.12.20-7.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805319" version="1" comment="openssl is &lt;3.0.1-47.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805320" version="1" comment="openssl-devel is &lt;3.0.1-47.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805321" version="1" comment="openssl-libs is &lt;3.0.1-47.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805322" version="1" comment="openssl-perl is &lt;3.0.1-47.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805438" version="1" comment="bpftool is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805439" version="1" comment="kernel is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805440" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.22.2.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805441" version="1" comment="kernel-core is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805442" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805443" version="1" comment="kernel-debug is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805444" version="1" comment="kernel-debug-core is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805447" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805448" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805451" version="1" comment="kernel-doc is &lt;5.14.0-162.22.2.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805452" version="1" comment="kernel-headers is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805453" version="1" comment="kernel-modules is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805454" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805455" version="1" comment="kernel-tools is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805456" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805458" version="1" comment="perf is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805459" version="1" comment="python3-perf is &lt;5.14.0-162.22.2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725528" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725256" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805739" version="1" comment="tigervnc is &lt;1.12.0-13.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805740" version="1" comment="tigervnc-icons is &lt;1.12.0-13.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805741" version="1" comment="tigervnc-license is &lt;1.12.0-13.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805742" version="1" comment="tigervnc-selinux is &lt;1.12.0-13.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805743" version="1" comment="tigervnc-server is &lt;1.12.0-13.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805744" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-13.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805745" version="1" comment="tigervnc-server-module is &lt;1.12.0-13.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811135" version="1" comment="binutils is &lt;2.35.2-42.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811136" version="1" comment="binutils-devel is &lt;2.35.2-42.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811137" version="1" comment="binutils-gold is &lt;2.35.2-42.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805098" version="1" comment="krb5-devel is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805099" version="1" comment="krb5-libs is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805100" version="1" comment="krb5-pkinit is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805101" version="1" comment="krb5-server is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805102" version="1" comment="krb5-server-ldap is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805103" version="1" comment="krb5-workstation is &lt;1.19.1-24.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805104" version="1" comment="libkadm5 is &lt;1.19.1-24.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805088" version="1" comment="python-unversioned-command is &lt;3.9.14-1.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805089" version="1" comment="python3 is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805090" version="1" comment="python3-debug is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805091" version="1" comment="python3-devel is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805092" version="1" comment="python3-idle is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805093" version="1" comment="python3-libs is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805094" version="1" comment="python3-test is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805095" version="1" comment="python3-tkinter is &lt;3.9.14-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805118" version="1" comment="bcel is &lt;6.4.1-9.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804690" version="1" comment="firefox is &lt;102.4.0-1.el9_0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805261" version="1" comment="expat is &lt;2.4.9-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805262" version="1" comment="expat-devel is &lt;2.4.9-1.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729117" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737373" version="1" comment="kernel-default is ==5.14.21-150400.24.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737374" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737375" version="1" comment="kernel-default is &lt;5.14.21-150400.24.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805355" version="1" comment="systemd is &lt;250-12.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805356" version="1" comment="systemd-container is &lt;250-12.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805357" version="1" comment="systemd-devel is &lt;250-12.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805358" version="1" comment="systemd-journal-remote is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805359" version="1" comment="systemd-libs is &lt;250-12.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805360" version="1" comment="systemd-oomd is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805361" version="1" comment="systemd-pam is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805362" version="1" comment="systemd-resolved is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805363" version="1" comment="systemd-rpm-macros is &lt;250-12.el9_1.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805364" version="1" comment="systemd-udev is &lt;250-12.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805274" version="1" comment="libXpm is &lt;3.5.13-8.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805275" version="1" comment="libXpm-devel is &lt;3.5.13-8.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866753" version="1" comment="mingw32-pixman is &lt;0.42.2-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866754" version="1" comment="mingw64-pixman is &lt;0.42.2-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816423" version="1" comment="pixman is &lt;0.40.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816424" version="1" comment="pixman-devel is &lt;0.40.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805863" version="1" comment="net-snmp is &lt;5.9.1-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805864" version="1" comment="net-snmp-agent-libs is &lt;5.9.1-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805865" version="1" comment="net-snmp-devel is &lt;5.9.1-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805866" version="1" comment="net-snmp-libs is &lt;5.9.1-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805867" version="1" comment="net-snmp-perl is &lt;5.9.1-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805868" version="1" comment="net-snmp-utils is &lt;5.9.1-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805869" version="1" comment="python3-net-snmp is &lt;5.9.1-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805105" version="1" comment="varnish is &lt;6.6.2-2.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805106" version="1" comment="varnish-devel is &lt;6.6.2-2.el9_1.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805107" version="1" comment="varnish-docs is &lt;6.6.2-2.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805347" version="1" comment="python-unversioned-command is &lt;3.9.14-1.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805348" version="1" comment="python3 is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805349" version="1" comment="python3-debug is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805350" version="1" comment="python3-devel is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805351" version="1" comment="python3-idle is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805352" version="1" comment="python3-libs is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805353" version="1" comment="python3-test is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805354" version="1" comment="python3-tkinter is &lt;3.9.14-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983972" version="1" comment="xterm is &lt;366-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983973" version="1" comment="xterm-resize is &lt;366-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805097" version="1" comment="firefox is &lt;102.5.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805096" version="1" comment="thunderbird is &lt;102.5.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805117" version="1" comment="thunderbird is &lt;102.6.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805410" version="1" comment="pcs is &lt;0.11.3-4.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805411" version="1" comment="pcs-snmp is &lt;0.11.3-4.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806723" version="1" comment="bpftool is &lt;7.0.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806724" version="1" comment="kernel is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806725" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-284.25.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806726" version="1" comment="kernel-core is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806727" version="1" comment="kernel-cross-headers is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806728" version="1" comment="kernel-debug is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806729" version="1" comment="kernel-debug-core is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806732" version="1" comment="kernel-debug-modules is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806733" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806734" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806735" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806738" version="1" comment="kernel-doc is &lt;5.14.0-284.25.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806739" version="1" comment="kernel-headers is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806740" version="1" comment="kernel-modules is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806741" version="1" comment="kernel-modules-core is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806742" version="1" comment="kernel-modules-extra is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806743" version="1" comment="kernel-tools is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806744" version="1" comment="kernel-tools-libs is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806746" version="1" comment="kernel-uki-virt is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806747" version="1" comment="perf is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806748" version="1" comment="python3-perf is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806749" version="1" comment="rtla is &lt;5.14.0-284.25.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805818" version="1" comment="emacs is &lt;27.2-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805819" version="1" comment="emacs-common is &lt;27.2-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805820" version="1" comment="emacs-filesystem is &lt;27.2-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805821" version="1" comment="emacs-lucid is &lt;27.2-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805822" version="1" comment="emacs-nox is &lt;27.2-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806544" version="1" comment="less is &lt;590-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805193" version="1" comment="firefox is &lt;102.7.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805276" version="1" comment="thunderbird is &lt;102.7.1-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805116" version="1" comment="firefox is &lt;102.6.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805368" version="1" comment="vim-X11 is &lt;8.2.2637-20.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805369" version="1" comment="vim-common is &lt;8.2.2637-20.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805370" version="1" comment="vim-enhanced is &lt;8.2.2637-20.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805371" version="1" comment="vim-filesystem is &lt;8.2.2637-20.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805372" version="1" comment="vim-minimal is &lt;8.2.2637-20.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769980" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769981" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769982" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770206" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751206" version="1" comment="kernel-default is ==5.3.18-150200.24.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769983" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=5-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751208" version="1" comment="kernel-default is ==5.3.18-150200.24.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769984" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751210" version="1" comment="kernel-default is &lt;5.3.18-150200.24.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770207" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742266" version="1" comment="kernel-default is ==5.3.18-150300.59.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770208" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742711" version="1" comment="kernel-default is ==5.3.18-150300.59.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770209" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751212" version="1" comment="kernel-default is ==5.3.18-150300.59.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770210" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751214" version="1" comment="kernel-default is ==5.3.18-150300.59.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769985" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770211" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770251" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770212" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770213" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770214" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770252" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770215" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805300" version="1" comment="libksba is &lt;1.5.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805301" version="1" comment="libksba-devel is &lt;1.5.1-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806470" version="1" comment="libtiff is &lt;4.4.0-8.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806471" version="1" comment="libtiff-devel is &lt;4.4.0-8.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806472" version="1" comment="libtiff-tools is &lt;4.4.0-8.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805373" version="1" comment="tar is &lt;1.34-6.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805965" version="1" comment="emacs is &lt;27.2-8.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805966" version="1" comment="emacs-common is &lt;27.2-8.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805967" version="1" comment="emacs-filesystem is &lt;27.2-8.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805968" version="1" comment="emacs-lucid is &lt;27.2-8.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805969" version="1" comment="emacs-nox is &lt;27.2-8.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811164" version="1" comment="protobuf-c is &lt;1.3.3-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811165" version="1" comment="protobuf-c-compiler is &lt;1.3.3-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811166" version="1" comment="protobuf-c-devel is &lt;1.3.3-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866748" version="1" comment="file is &lt;5.39-16.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866749" version="1" comment="file-devel is &lt;5.39-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866750" version="1" comment="file-libs is &lt;5.39-16.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866751" version="1" comment="python3-file-magic is &lt;5.39-16.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871322" version="1" comment="gdk-pixbuf2 is &lt;2.42.6-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871323" version="1" comment="gdk-pixbuf2-devel is &lt;2.42.6-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871324" version="1" comment="gdk-pixbuf2-modules is &lt;2.42.6-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853728" version="1" comment="less is &lt;590-3.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770229" version="1" comment="kernel-default is ==4.12.14-122.159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861619" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861620" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861621" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861741" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861622" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861623" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861624" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861625" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861626" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861742" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854322" version="1" comment="kernel-default is &lt;4.12.14-122.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764737" version="1" comment="kernel-default is ==5.3.18-150200.24.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861743" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861744" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861745" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861746" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861747" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861844" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861748" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861749" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861750" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861751" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764740" version="1" comment="kernel-default is ==5.3.18-150300.59.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861756" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861757" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861758" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861759" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861760" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861628" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861629" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861845" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861846" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861630" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861764" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861765" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764673" version="1" comment="kernel-default is ==5.14.21-150400.24.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861766" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764743" version="1" comment="kernel-default is ==5.14.21-150400.24.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861852" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776036" version="1" comment="kernel-default is ==5.14.21-150400.24.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861853" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796010" version="1" comment="kernel-default is ==5.14.21-150400.24.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861767" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796012" version="1" comment="kernel-default is ==5.14.21-150400.24.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861854" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799692" version="1" comment="kernel-default is ==5.14.21-150400.24.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861855" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861768" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861856" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861769" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877783" version="1" comment="kernel-rt is ==5.14.21-150500.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861770" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=13-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776034" version="1" comment="kernel-default is ==5.14.21-150500.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861857" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=12-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796015" version="1" comment="kernel-default is ==5.14.21-150500.55.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861858" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799694" version="1" comment="kernel-default is ==5.14.21-150500.55.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861859" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861860" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861861" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861862" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861634" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861863" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796017" version="1" comment="kernel-default is ==5.14.21-150500.55.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861775" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796019" version="1" comment="kernel-default is &lt;5.14.21-150500.55.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944105" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944106" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944081" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944429" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944082" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944107" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944108" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=14-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944109" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=13-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944110" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=12-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944111" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944112" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944113" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943397" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960110" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960111" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960112" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868197" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=14-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868931" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=13-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765681" version="1" comment="kernel-default is &lt;5.14.21-150500.53.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970722" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970723" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878540" version="1" comment="kernel-default is ==4.12.14-122.219.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970724" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947540" version="1" comment="kernel-default is ==4.12.14-122.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970725" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956559" version="1" comment="kernel-default is ==4.12.14-122.225.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970726" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960515" version="1" comment="kernel-default is ==4.12.14-122.228.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970727" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968261" version="1" comment="kernel-default is &lt;4.12.14-122.228.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974048" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974049" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974166" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974167" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974050" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956871" version="1" comment="kernel-default is ==5.3.18-150300.59.170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974168" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956873" version="1" comment="kernel-default is &lt;5.3.18-150300.59.170.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968254" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968255" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968256" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947542" version="1" comment="kernel-default is &lt;4.12.14-122.222.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968257" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968258" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054004" version="1" comment="kernel is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054005" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.5.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054006" version="1" comment="kernel-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054007" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054008" version="1" comment="kernel-debug is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054009" version="1" comment="kernel-debug-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054010" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054011" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054012" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054013" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054014" version="1" comment="kernel-doc is &lt;5.14.0-611.5.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054015" version="1" comment="kernel-headers is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054016" version="1" comment="kernel-modules is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054017" version="1" comment="kernel-modules-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054018" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054019" version="1" comment="kernel-rt is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054020" version="1" comment="kernel-rt-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054021" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054022" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054023" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054024" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054025" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054026" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054027" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054028" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054029" version="1" comment="kernel-tools is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054030" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054031" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054032" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054033" version="1" comment="libperf is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054034" version="1" comment="perf is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054035" version="1" comment="python3-perf is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054036" version="1" comment="rtla is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054037" version="1" comment="rv is &lt;5.14.0-611.5.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968259" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968260" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968262" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960520" version="1" comment="kernel-default is ==5.3.18-150300.59.174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968263" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961325" version="1" comment="kernel-default is &lt;5.3.18-150300.59.174.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968264" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968265" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968266" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968267" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968268" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968269" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957147" version="1" comment="kernel-default is ==5.14.21-150400.24.128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968270" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960526" version="1" comment="kernel-default is ==5.14.21-150400.24.133.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968271" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963660" version="1" comment="kernel-default is &lt;5.14.21-150400.24.133.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968272" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968273" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968274" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968275" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968276" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968277" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968278" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960532" version="1" comment="kernel-default is ==5.14.21-150500.55.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968279" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968280" version="1" comment="kernel-default is &lt;5.14.21-150500.55.80.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963652" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963347" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963348" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963349" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963350" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963653" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963351" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963352" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963353" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963354" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963355" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963356" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963357" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963654" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963655" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963358" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957149" version="1" comment="kernel-default is &lt;5.14.21-150400.24.128.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963656" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963657" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963359" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963360" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963361" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963362" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963363" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963658" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963659" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947529" version="1" comment="kernel-default is &lt;5.14.21-150500.55.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960113" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=6-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960114" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=4-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960115" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=3-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960516" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960517" version="1" comment="kernel-default is ==4.12.14-122.231.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029759" version="1" comment="kgraft-patch-4_12_14-122_231-default is &gt;=18-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960519" version="1" comment="kernel-default is &lt;4.12.14-122.231.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960408" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960116" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960117" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961317" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=4-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961318" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=3-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960522" version="1" comment="kernel-default is ==5.3.18-150300.59.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960523" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960524" version="1" comment="kernel-default is &lt;5.3.18-150300.59.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960339" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960118" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960525" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=3-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960527" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960528" version="1" comment="kernel-default is ==5.14.21-150400.24.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960529" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960530" version="1" comment="kernel-default is &lt;5.14.21-150400.24.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960531" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960120" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960533" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960534" version="1" comment="kernel-default is ==5.14.21-150500.55.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960535" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960536" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985522" version="1" comment="kernel is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985523" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.12.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985524" version="1" comment="kernel-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985525" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985526" version="1" comment="kernel-debug is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985527" version="1" comment="kernel-debug-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985530" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985531" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985532" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985533" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985536" version="1" comment="kernel-doc is &lt;5.14.0-570.12.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985537" version="1" comment="kernel-headers is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985538" version="1" comment="kernel-modules is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985539" version="1" comment="kernel-modules-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985540" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985541" version="1" comment="kernel-rt is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985542" version="1" comment="kernel-rt-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985543" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985544" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985546" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985547" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985548" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985549" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985551" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985552" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985553" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985554" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985555" version="1" comment="kernel-tools is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985556" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985558" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985559" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985560" version="1" comment="libperf is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985561" version="1" comment="perf is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985562" version="1" comment="python3-perf is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985563" version="1" comment="rtla is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985564" version="1" comment="rv is &lt;5.14.0-570.12.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858487" version="1" comment="mysql is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858488" version="1" comment="mysql-common is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858489" version="1" comment="mysql-devel is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858490" version="1" comment="mysql-errmsg is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858491" version="1" comment="mysql-libs is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858492" version="1" comment="mysql-server is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858493" version="1" comment="mysql-test is &lt;8.0.36-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975029" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975043" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975044" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975030" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975045" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975046" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975047" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975048" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975049" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975401" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975050" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975051" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975052" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975053" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974051" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974052" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811170" version="1" comment="c-ares is &lt;1.19.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811171" version="1" comment="c-ares-devel is &lt;1.19.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963771" version="1" comment="libxml2 is &lt;2.9.13-6.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963772" version="1" comment="libxml2-devel is &lt;2.9.13-6.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963773" version="1" comment="python3-libxml2 is &lt;2.9.13-6.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017397" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017398" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960541" version="1" comment="kernel-default is ==4.12.14-122.234.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017400" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975403" version="1" comment="kernel-default is ==4.12.14-122.237.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017401" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975405" version="1" comment="kernel-default is ==4.12.14-122.244.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017402" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986269" version="1" comment="kernel-default is ==4.12.14-122.247.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017403" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986280" version="1" comment="kernel-default is ==4.12.14-122.250.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017404" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986282" version="1" comment="kernel-default is &lt;4.12.14-122.250.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017405" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017406" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017329" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960544" version="1" comment="kernel-default is ==5.3.18-150300.59.182.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017407" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966288" version="1" comment="kernel-default is ==5.3.18-150300.59.185.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017330" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966290" version="1" comment="kernel-default is ==5.3.18-150300.59.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017331" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986726" version="1" comment="kernel-default is ==5.3.18-150300.59.195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017408" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986730" version="1" comment="kernel-default is ==5.3.18-150300.59.198.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017409" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986732" version="1" comment="kernel-default is &lt;5.3.18-150300.59.198.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017667" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017410" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017668" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960752" version="1" comment="kernel-default is ==5.14.21-150400.24.141.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017669" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966293" version="1" comment="kernel-default is ==5.14.21-150400.24.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017670" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966295" version="1" comment="kernel-default is ==5.14.21-150400.24.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017671" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986625" version="1" comment="kernel-default is ==5.14.21-150400.24.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017672" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986633" version="1" comment="kernel-default is ==5.14.21-150400.24.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017673" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008960" version="1" comment="kernel-default is ==5.14.21-150400.24.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017411" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008962" version="1" comment="kernel-default is &lt;5.14.21-150400.24.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017859" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017674" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017860" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968297" version="1" comment="kernel-default is ==5.14.21-150500.55.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017675" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968299" version="1" comment="kernel-default is ==5.14.21-150500.55.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017861" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986277" version="1" comment="kernel-default is ==5.14.21-150500.55.94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017862" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986283" version="1" comment="kernel-default is ==5.14.21-150500.55.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017863" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986285" version="1" comment="kernel-default is &lt;5.14.21-150500.55.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986262" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986105" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986263" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986264" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986106" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986266" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986267" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986268" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986270" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986271" version="1" comment="kernel-default is &lt;4.12.14-122.247.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986272" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986273" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986614" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986615" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986616" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986148" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986274" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986275" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986276" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986727" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986728" version="1" comment="kernel-default is &lt;5.3.18-150300.59.195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986617" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=18-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986618" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986619" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986729" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986620" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986621" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986622" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986623" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986624" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986626" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986627" version="1" comment="kernel-default is &lt;5.14.21-150400.24.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986149" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=17-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986150" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=17-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986151" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986152" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986153" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=9-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986154" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=9-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986155" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=5-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986156" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=5-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986278" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=2-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986279" version="1" comment="kernel-default is &lt;5.14.21-150500.55.94.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987582" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=18-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987583" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996805" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987584" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987585" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987643" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996806" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987586" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987587" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996807" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996808" version="1" comment="kernel-default is ==4.12.14-122.255.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996809" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996810" version="1" comment="kernel-default is &lt;4.12.14-122.255.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008768" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008700" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008701" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010059" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008770" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008771" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008772" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008702" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008773" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008774" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008775" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008776" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008777" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008778" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008779" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008780" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008781" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008782" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008783" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008784" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008785" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008786" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008787" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008788" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008789" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008790" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008791" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008792" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008793" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008794" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008961" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996811" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996812" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996813" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996814" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996815" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996816" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996817" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997085" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996818" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997086" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987644" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975402" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975404" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975406" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986281" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975408" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975409" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975410" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986731" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012426" version="1" comment="kernel is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012427" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.32.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012428" version="1" comment="kernel-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012429" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012430" version="1" comment="kernel-debug is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012431" version="1" comment="kernel-debug-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012434" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012435" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012436" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012437" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012440" version="1" comment="kernel-doc is &lt;5.14.0-570.32.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012441" version="1" comment="kernel-headers is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012442" version="1" comment="kernel-modules is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012443" version="1" comment="kernel-modules-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012444" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012445" version="1" comment="kernel-rt is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012446" version="1" comment="kernel-rt-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012447" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012448" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012450" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012451" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012452" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012453" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012455" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012456" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012457" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012458" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012459" version="1" comment="kernel-tools is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012460" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012462" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012463" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012464" version="1" comment="libperf is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012465" version="1" comment="perf is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012466" version="1" comment="python3-perf is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012467" version="1" comment="rtla is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012468" version="1" comment="rv is &lt;5.14.0-570.32.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999183" version="1" comment="kernel is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999184" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.25.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999185" version="1" comment="kernel-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999186" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999187" version="1" comment="kernel-debug is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999188" version="1" comment="kernel-debug-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999191" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999192" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999193" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999194" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999197" version="1" comment="kernel-doc is &lt;5.14.0-570.25.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999198" version="1" comment="kernel-headers is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999199" version="1" comment="kernel-modules is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999200" version="1" comment="kernel-modules-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999201" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999202" version="1" comment="kernel-rt is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999203" version="1" comment="kernel-rt-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999204" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999205" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999207" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999208" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999209" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999210" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999212" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999213" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999214" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999215" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999216" version="1" comment="kernel-tools is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999217" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999219" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999220" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999221" version="1" comment="libperf is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999222" version="1" comment="perf is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999223" version="1" comment="python3-perf is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999224" version="1" comment="rtla is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999225" version="1" comment="rv is &lt;5.14.0-570.25.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023062" version="1" comment="kernel is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023063" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.55.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023064" version="1" comment="kernel-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023065" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023066" version="1" comment="kernel-debug is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023067" version="1" comment="kernel-debug-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023070" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023071" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023072" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023073" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023076" version="1" comment="kernel-doc is &lt;5.14.0-570.55.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023077" version="1" comment="kernel-headers is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023078" version="1" comment="kernel-modules is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023079" version="1" comment="kernel-modules-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023080" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023081" version="1" comment="kernel-rt is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023082" version="1" comment="kernel-rt-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023083" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023084" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023086" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023087" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023088" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023089" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023091" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023092" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023093" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023094" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023095" version="1" comment="kernel-tools is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023096" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023098" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023099" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023100" version="1" comment="libperf is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023101" version="1" comment="perf is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023102" version="1" comment="python3-perf is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023103" version="1" comment="rtla is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023104" version="1" comment="rv is &lt;5.14.0-570.55.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037981" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037982" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037983" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037984" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037985" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011973" version="1" comment="kernel-default is ==4.12.14-122.258.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037986" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014519" version="1" comment="kernel-default is ==4.12.14-122.261.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037987" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014521" version="1" comment="kernel-default is ==4.12.14-122.266.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037988" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019465" version="1" comment="kernel-default is ==4.12.14-122.269.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037989" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022330" version="1" comment="kernel-default is ==4.12.14-122.272.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037990" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022332" version="1" comment="kernel-default is &lt;4.12.14-122.272.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037991" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037992" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037993" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037994" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037995" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008967" version="1" comment="kernel-default is ==5.14.21-150400.24.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037996" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008969" version="1" comment="kernel-default is ==5.14.21-150400.24.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037997" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012372" version="1" comment="kernel-default is ==5.14.21-150400.24.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037998" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014752" version="1" comment="kernel-default is ==5.14.21-150400.24.170.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037999" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019721" version="1" comment="kernel-default is ==5.14.21-150400.24.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038211" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023345" version="1" comment="kernel-default is ==5.14.21-150400.24.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038000" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023347" version="1" comment="kernel-default is &lt;5.14.21-150400.24.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025285" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=19-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025286" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=17-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025287" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=15-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025288" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025289" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=11-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025290" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008807" version="1" comment="kernel-default is ==5.3.18-150300.59.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025291" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=9-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008964" version="1" comment="kernel-default is ==5.3.18-150300.59.204.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025292" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=9-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012375" version="1" comment="kernel-default is ==5.3.18-150300.59.207.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025293" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=8-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012379" version="1" comment="kernel-default is ==5.3.18-150300.59.211.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025294" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=8-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019755" version="1" comment="kernel-default is ==5.3.18-150300.59.215.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025525" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025254" version="1" comment="kernel-default is ==5.3.18-150300.59.218.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025255" version="1" comment="kernel-livepatch-5_3_18-150300_59_218-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025256" version="1" comment="kernel-default is &lt;5.3.18-150300.59.218.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025295" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=18-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025296" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=14-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025297" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=13-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025298" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=11-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025299" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025300" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025301" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025302" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025303" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025526" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024667" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025304" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=18-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025305" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=17-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025306" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=16-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025307" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=15-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025527" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=10-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025308" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=10-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025309" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025310" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025311" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025312" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=8-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025313" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=7-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025314" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025257" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=3-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011979" version="1" comment="kernel-default is ==5.14.21-150500.55.100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025528" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=9-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011981" version="1" comment="kernel-default is ==5.14.21-150500.55.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025529" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=9-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011983" version="1" comment="kernel-default is ==5.14.21-150500.55.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025315" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=8-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011988" version="1" comment="kernel-default is ==5.14.21-150500.55.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025530" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=8-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014542" version="1" comment="kernel-default is ==5.14.21-150500.55.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025531" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=6-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023037" version="1" comment="kernel-default is ==5.14.21-150500.55.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025258" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=3-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025532" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=18-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025533" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=14-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025534" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=14-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025535" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=10-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025536" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=10-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038212" version="1" comment="kernel-default is ==4.12.14-122.275.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038213" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038214" version="1" comment="kernel-default is &lt;4.12.14-122.275.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031207" version="1" comment="kernel-default is ==5.14.21-150400.24.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038215" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031209" version="1" comment="kernel-default is &lt;5.14.21-150400.24.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038216" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038001" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038217" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038218" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038219" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038220" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037072" version="1" comment="kernel-default is ==5.14.21-150500.55.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038221" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038002" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038509" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038222" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038223" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024764" version="1" comment="kernel is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024765" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.60.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024766" version="1" comment="kernel-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024767" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024768" version="1" comment="kernel-debug is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024769" version="1" comment="kernel-debug-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024772" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024773" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024774" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024775" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024778" version="1" comment="kernel-doc is &lt;5.14.0-570.60.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024779" version="1" comment="kernel-headers is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024780" version="1" comment="kernel-modules is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024781" version="1" comment="kernel-modules-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024782" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024783" version="1" comment="kernel-rt is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024784" version="1" comment="kernel-rt-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024785" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024786" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024788" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024789" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024790" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024791" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024793" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024794" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024795" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024796" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024797" version="1" comment="kernel-tools is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024798" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024800" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024801" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024802" version="1" comment="libperf is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024803" version="1" comment="perf is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024804" version="1" comment="python3-perf is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024805" version="1" comment="rtla is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024806" version="1" comment="rv is &lt;5.14.0-570.60.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022248" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=18-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022275" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022276" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022277" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022278" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022279" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022280" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022281" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022282" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022283" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022611" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022331" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030679" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030649" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030680" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030681" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030682" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030683" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030684" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030685" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030686" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030650" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030687" version="1" comment="kernel-livepatch-5_3_18-150300_59_218-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031652" version="1" comment="kernel-default is ==5.3.18-150300.59.221.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031653" version="1" comment="kernel-livepatch-5_3_18-150300_59_221-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031654" version="1" comment="kernel-default is &lt;5.3.18-150300.59.221.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049711" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049712" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050984" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049713" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049764" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050306" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049765" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049766" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049767" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881443" version="1" comment="bpftool is &lt;7.3.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881444" version="1" comment="kernel is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881445" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.33.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881446" version="1" comment="kernel-core is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881447" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881448" version="1" comment="kernel-debug is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881449" version="1" comment="kernel-debug-core is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881452" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881453" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881454" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881455" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881458" version="1" comment="kernel-doc is &lt;5.14.0-427.33.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881459" version="1" comment="kernel-headers is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881460" version="1" comment="kernel-modules is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881461" version="1" comment="kernel-modules-core is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881462" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881463" version="1" comment="kernel-tools is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881464" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881466" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881467" version="1" comment="libperf is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881468" version="1" comment="perf is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881469" version="1" comment="python3-perf is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881470" version="1" comment="rtla is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881471" version="1" comment="rv is &lt;5.14.0-427.33.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806816" version="1" comment="bpftool is &lt;7.0.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806817" version="1" comment="kernel is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806818" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-284.30.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806819" version="1" comment="kernel-core is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806820" version="1" comment="kernel-cross-headers is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806821" version="1" comment="kernel-debug is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806822" version="1" comment="kernel-debug-core is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806825" version="1" comment="kernel-debug-modules is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806826" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806827" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806828" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806831" version="1" comment="kernel-doc is &lt;5.14.0-284.30.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806832" version="1" comment="kernel-headers is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806833" version="1" comment="kernel-modules is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806834" version="1" comment="kernel-modules-core is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806835" version="1" comment="kernel-modules-extra is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806836" version="1" comment="kernel-tools is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806837" version="1" comment="kernel-tools-libs is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806839" version="1" comment="kernel-uki-virt is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806840" version="1" comment="perf is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806841" version="1" comment="python3-perf is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806842" version="1" comment="rtla is &lt;5.14.0-284.30.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046222" version="1" comment="kernel-default is ==4.12.14-122.280.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049768" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046224" version="1" comment="kernel-default is ==4.12.14-122.283.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049769" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046236" version="1" comment="kernel-default is ==4.12.14-122.290.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049770" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046238" version="1" comment="kernel-default is &lt;4.12.14-122.290.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050307" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049771" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049772" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049773" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050070" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050071" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050072" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050073" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050074" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050075" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046274" version="1" comment="kernel-default is ==5.14.21-150400.24.184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050308" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046276" version="1" comment="kernel-default is ==5.14.21-150400.24.187.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050309" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046278" version="1" comment="kernel-default is &lt;5.14.21-150400.24.187.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050310" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=15-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050311" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050312" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050313" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050314" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050985" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050986" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046286" version="1" comment="kernel-default is ==5.14.21-150500.55.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050987" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046288" version="1" comment="kernel-default is ==5.14.21-150500.55.130.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050988" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046292" version="1" comment="kernel-default is ==5.14.21-150500.55.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050989" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050315" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050316" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045279" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045280" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046215" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046216" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046217" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046218" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046219" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046220" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046221" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046223" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046225" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046226" version="1" comment="kernel-default is &lt;4.12.14-122.283.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046227" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046228" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046229" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046230" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046231" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046232" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046233" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046234" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046235" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046273" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046275" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046277" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046279" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046280" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046281" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046282" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046283" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046284" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046285" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046287" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046289" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046290" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046291" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046237" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805495" version="1" comment="haproxy is &lt;2.4.17-3.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742267" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742712" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743622" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743623" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743624" version="1" comment="kernel-default is ==5.14.21-150400.24.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743625" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877718" version="1" comment="kernel-default is &lt;5.14.21-150400.24.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751177" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751178" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751179" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751180" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751181" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751182" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751183" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751184" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751185" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751186" version="1" comment="kernel-default is ==4.12.14-122.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751187" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751188" version="1" comment="kernel-default is &lt;4.12.14-122.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750757" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750758" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750759" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750760" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751189" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751190" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742263" version="1" comment="kernel-default is &lt;5.3.18-150200.24.139.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750762" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750763" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751191" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751192" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751193" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751194" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751195" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751196" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751197" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750764" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751198" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751199" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=12-150400.10.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751200" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751201" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751202" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751203" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751204" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751205" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752332" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984055" version="1" comment="compat-openssl11 is &lt;1.1.1k-5.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805418" version="1" comment="gnutls is &lt;3.7.6-18.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805419" version="1" comment="gnutls-c++ is &lt;3.7.6-18.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805420" version="1" comment="gnutls-dane is &lt;3.7.6-18.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805421" version="1" comment="gnutls-devel is &lt;3.7.6-18.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805422" version="1" comment="gnutls-utils is &lt;3.7.6-18.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877784" version="1" comment="kernel-rt is ==5.14.21-150400.15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764659" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765065" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=14-150400.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764664" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764665" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764666" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764667" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764668" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764669" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764670" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751216" version="1" comment="kernel-default is ==5.14.21-150400.24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764671" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755396" version="1" comment="kernel-default is ==5.14.21-150400.24.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764672" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764674" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796020" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805501" version="1" comment="bpftool is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805502" version="1" comment="kernel is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805503" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-162.23.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805504" version="1" comment="kernel-core is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805505" version="1" comment="kernel-cross-headers is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805506" version="1" comment="kernel-debug is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805507" version="1" comment="kernel-debug-core is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805510" version="1" comment="kernel-debug-modules is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805511" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805514" version="1" comment="kernel-doc is &lt;5.14.0-162.23.1.el9_1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805515" version="1" comment="kernel-headers is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805516" version="1" comment="kernel-modules is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805517" version="1" comment="kernel-modules-extra is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805518" version="1" comment="kernel-tools is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805519" version="1" comment="kernel-tools-libs is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805521" version="1" comment="perf is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805522" version="1" comment="python3-perf is &lt;5.14.0-162.23.1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805277" version="1" comment="thunderbird is &lt;102.7.1-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764675" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764676" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764677" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764678" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764679" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764680" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764681" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764682" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764683" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764684" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764685" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764686" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764687" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764688" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764689" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764690" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764691" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764692" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761482" version="1" comment="kernel-default is &lt;5.14.21-150400.24.46.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852715" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852366" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806513" version="1" comment="openssl is &lt;3.0.7-16.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806514" version="1" comment="openssl-devel is &lt;3.0.7-16.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806515" version="1" comment="openssl-libs is &lt;3.0.7-16.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806516" version="1" comment="openssl-perl is &lt;3.0.7-16.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805293" version="1" comment="tigervnc is &lt;1.12.0-5.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805294" version="1" comment="tigervnc-icons is &lt;1.12.0-5.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805295" version="1" comment="tigervnc-license is &lt;1.12.0-5.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805296" version="1" comment="tigervnc-selinux is &lt;1.12.0-5.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805297" version="1" comment="tigervnc-server is &lt;1.12.0-5.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805298" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-5.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805299" version="1" comment="tigervnc-server-module is &lt;1.12.0-5.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805525" version="1" comment="thunderbird is &lt;102.10.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844596" version="1" comment="php is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844597" version="1" comment="php-bcmath is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844598" version="1" comment="php-cli is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844599" version="1" comment="php-common is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844600" version="1" comment="php-dba is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844601" version="1" comment="php-dbg is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844602" version="1" comment="php-devel is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844603" version="1" comment="php-embedded is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844604" version="1" comment="php-enchant is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844605" version="1" comment="php-ffi is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844606" version="1" comment="php-fpm is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844607" version="1" comment="php-gd is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844608" version="1" comment="php-gmp is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844609" version="1" comment="php-intl is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844610" version="1" comment="php-ldap is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844611" version="1" comment="php-mbstring is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844612" version="1" comment="php-mysqlnd is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844613" version="1" comment="php-odbc is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844614" version="1" comment="php-opcache is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844615" version="1" comment="php-pdo is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844616" version="1" comment="php-pgsql is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844617" version="1" comment="php-process is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844618" version="1" comment="php-snmp is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844619" version="1" comment="php-soap is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844620" version="1" comment="php-xml is &lt;8.1.27-1.module+el9.3.0.z+21063+f4ccb976 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755385" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755386" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755223" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751223" version="1" comment="kernel-default is ==4.12.14-95.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755387" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755224" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755225" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755226" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755227" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755228" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755229" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755230" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755231" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751233" version="1" comment="kernel-default is ==4.12.14-150100.197.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755232" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751235" version="1" comment="kernel-default is &lt;4.12.14-150100.197.134.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755233" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755234" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755235" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755236" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751236" version="1" comment="kernel-default is &lt;5.3.18-150200.24.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755237" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755238" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755388" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755389" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755239" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755240" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755241" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755242" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755243" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755244" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755245" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755390" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=13-150400.13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755391" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755392" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755248" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755393" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755394" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755249" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755395" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805314" version="1" comment="thunderbird is &lt;102.8.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811077" version="1" comment="wireshark is &lt;3.4.10-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811078" version="1" comment="wireshark-cli is &lt;3.4.10-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811079" version="1" comment="wireshark-devel is &lt;3.4.10-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805425" version="1" comment="nspr is &lt;4.34.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805426" version="1" comment="nspr-devel is &lt;4.34.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805427" version="1" comment="nss is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805428" version="1" comment="nss-devel is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805429" version="1" comment="nss-softokn is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805430" version="1" comment="nss-softokn-devel is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805431" version="1" comment="nss-softokn-freebl is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805432" version="1" comment="nss-softokn-freebl-devel is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805433" version="1" comment="nss-sysinit is &lt;3.79.0-17.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805434" version="1" comment="nss-tools is &lt;3.79.0-17.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805435" version="1" comment="nss-util is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805436" version="1" comment="nss-util-devel is &lt;3.79.0-17.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811090" version="1" comment="haproxy is &lt;2.4.22-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805870" version="1" comment="libtpms is &lt;0.9.1-3.20211126git1ff6fe1f43.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786219" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786220" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794740" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795130" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795131" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795992" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751227" version="1" comment="kernel-default is ==4.12.14-122.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764702" version="1" comment="kernel-default is ==4.12.14-122.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786222" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764728" version="1" comment="kernel-default is ==4.12.14-122.156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786223" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795132" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786224" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776023" version="1" comment="kernel-default is &lt;4.12.14-122.162.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795133" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782315" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782316" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794741" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795134" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764712" version="1" comment="kernel-default is ==4.12.14-150100.197.137.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782317" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764731" version="1" comment="kernel-default is ==4.12.14-150100.197.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782318" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764734" version="1" comment="kernel-default is ==4.12.14-150100.197.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782319" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764736" version="1" comment="kernel-default is &lt;4.12.14-150100.197.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795742" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795743" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795744" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795745" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795746" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795747" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764715" version="1" comment="kernel-default is ==5.3.18-150200.24.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795748" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795749" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795750" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776030" version="1" comment="kernel-default is &lt;5.3.18-150200.24.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795751" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794742" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795752" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795753" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795824" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764718" version="1" comment="kernel-default is ==5.3.18-150300.59.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795993" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795825" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795994" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795135" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794743" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795136" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796654" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795995" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795996" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795997" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795998" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795999" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796000" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796001" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796002" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796003" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796004" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796005" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796006" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796660" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796007" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751207" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751209" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751211" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751213" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751215" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750644" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751217" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755122" version="1" comment="kernel-default is ==4.12.14-95.120.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755123" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755250" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751229" version="1" comment="kernel-default is &lt;4.12.14-122.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755251" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755642" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816058" version="1" comment="bpftool is &lt;7.2.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816059" version="1" comment="kernel is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816060" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-362.13.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816061" version="1" comment="kernel-core is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816062" version="1" comment="kernel-cross-headers is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816063" version="1" comment="kernel-debug is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816064" version="1" comment="kernel-debug-core is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816067" version="1" comment="kernel-debug-modules is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816068" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816069" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816070" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816073" version="1" comment="kernel-doc is &lt;5.14.0-362.13.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816074" version="1" comment="kernel-headers is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816075" version="1" comment="kernel-modules is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816076" version="1" comment="kernel-modules-core is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816077" version="1" comment="kernel-modules-extra is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816078" version="1" comment="kernel-tools is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816079" version="1" comment="kernel-tools-libs is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816081" version="1" comment="kernel-uki-virt is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816082" version="1" comment="libperf is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816083" version="1" comment="perf is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816084" version="1" comment="python3-perf is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816085" version="1" comment="rtla is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816086" version="1" comment="rv is &lt;5.14.0-362.13.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764693" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764694" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764695" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764696" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764697" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764698" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764699" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764700" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764701" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764703" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807351" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807696" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807697" version="1" comment="kernel-default is &lt;4.12.14-122.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764705" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764706" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764707" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764708" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764709" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764710" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764711" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764713" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807353" version="1" comment="kernel-default is ==4.12.14-150100.197.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807354" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807355" version="1" comment="kernel-default is &lt;4.12.14-150100.197.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877719" version="1" comment="kernel-default is &lt;5.14.21-150400.24.55.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769736" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769737" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769987" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770216" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769988" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769989" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769738" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755124" version="1" comment="kernel-default is &lt;4.12.14-95.120.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770218" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770219" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769990" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769991" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769992" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770220" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769993" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764704" version="1" comment="kernel-default is &lt;4.12.14-122.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770222" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769994" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770223" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769995" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769996" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769997" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769998" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764714" version="1" comment="kernel-default is &lt;4.12.14-150100.197.137.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805462" version="1" comment="tigervnc is &lt;1.12.0-5.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805463" version="1" comment="tigervnc-icons is &lt;1.12.0-5.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805464" version="1" comment="tigervnc-license is &lt;1.12.0-5.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805465" version="1" comment="tigervnc-selinux is &lt;1.12.0-5.el9_1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805466" version="1" comment="tigervnc-server is &lt;1.12.0-5.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805467" version="1" comment="tigervnc-server-minimal is &lt;1.12.0-5.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805468" version="1" comment="tigervnc-server-module is &lt;1.12.0-5.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811016" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811017" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811018" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811019" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811020" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810782" version="1" comment="xorg-x11-server-Xwayland is &lt;22.1.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811021" version="1" comment="xorg-x11-server-common is &lt;1.20.11-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811022" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811023" version="1" comment="xorg-x11-server-source is &lt;1.20.11-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866683" version="1" comment="mingw-binutils-generic is &lt;2.41-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866684" version="1" comment="mingw-filesystem-base is &lt;148-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866685" version="1" comment="mingw-w64-tools is &lt;11.0.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866686" version="1" comment="mingw32-binutils is &lt;2.41-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866687" version="1" comment="mingw32-cpp is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866688" version="1" comment="mingw32-crt is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866689" version="1" comment="mingw32-filesystem is &lt;148-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866690" version="1" comment="mingw32-gcc is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866691" version="1" comment="mingw32-gcc-c++ is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866692" version="1" comment="mingw32-headers is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866693" version="1" comment="mingw32-libffi is &lt;3.4.4-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866694" version="1" comment="mingw32-libgcc is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866695" version="1" comment="mingw32-libstdc++ is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866696" version="1" comment="mingw32-winpthreads is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866697" version="1" comment="mingw32-winpthreads-static is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866698" version="1" comment="mingw32-zlib is &lt;1.3.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866699" version="1" comment="mingw32-zlib-static is &lt;1.3.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866700" version="1" comment="mingw64-binutils is &lt;2.41-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866701" version="1" comment="mingw64-cpp is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866702" version="1" comment="mingw64-crt is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866703" version="1" comment="mingw64-filesystem is &lt;148-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866704" version="1" comment="mingw64-gcc is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866705" version="1" comment="mingw64-gcc-c++ is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866706" version="1" comment="mingw64-headers is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866707" version="1" comment="mingw64-libffi is &lt;3.4.4-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866708" version="1" comment="mingw64-libgcc is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866709" version="1" comment="mingw64-libstdc++ is &lt;13.2.1-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866710" version="1" comment="mingw64-winpthreads is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866711" version="1" comment="mingw64-winpthreads-static is &lt;11.0.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866712" version="1" comment="mingw64-zlib is &lt;1.3.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866713" version="1" comment="mingw64-zlib-static is &lt;1.3.1-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755397" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810807" version="1" comment="libssh is &lt;0.10.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810808" version="1" comment="libssh-config is &lt;0.10.4-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810809" version="1" comment="libssh-devel is &lt;0.10.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811082" version="1" comment="tang is &lt;14-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866483" version="1" comment="LibRaw is &lt;0.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866484" version="1" comment="LibRaw-devel is &lt;0.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813703" version="1" comment="cloud-init is &lt;23.1.1-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798679" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798650" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798651" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798680" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798681" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798652" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798653" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798682" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798654" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798655" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798683" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798685" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816438" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845681" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845683" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849120" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798903" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798687" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798904" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798905" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798906" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798907" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799060" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775802" version="1" comment="kernel-default is ==4.12.14-150100.197.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799061" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782321" version="1" comment="kernel-default is ==4.12.14-150100.197.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799062" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799063" version="1" comment="kernel-default is ==4.12.14-150100.197.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799064" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816087" version="1" comment="kernel-default is ==4.12.14-150100.197.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816088" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845685" version="1" comment="kernel-default is ==4.12.14-150100.197.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845686" version="1" comment="kernel-livepatch-4_12_14-150100_197_165-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845687" version="1" comment="kernel-default is ==4.12.14-150100.197.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845688" version="1" comment="kernel-livepatch-4_12_14-150100_197_168-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845689" version="1" comment="kernel-default is &lt;4.12.14-150100.197.168.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799066" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798908" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799558" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799067" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799068" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799069" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799070" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799559" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799560" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799562" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804086" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804088" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816091" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845691" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845860" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849455" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799630" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799690" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799631" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799632" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799633" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799634" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799635" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799636" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799637" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799639" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804091" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804093" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816441" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845694" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845696" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849458" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799564" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799640" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799641" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798909" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799642" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799643" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799644" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799645" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799646" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799647" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799648" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799649" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799650" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799651" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798916" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799652" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764716" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764717" version="1" comment="kernel-default is &lt;5.3.18-150200.24.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764719" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805523" version="1" comment="firefox is &lt;102.10.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805524" version="1" comment="firefox-x11 is &lt;102.10.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764720" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764721" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764722" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764723" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764724" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764725" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764726" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764727" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764729" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764730" version="1" comment="kernel-default is &lt;4.12.14-122.156.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764733" version="1" comment="kernel-default is &lt;4.12.14-150100.197.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805598" version="1" comment="libwebp is &lt;1.2.0-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805599" version="1" comment="libwebp-devel is &lt;1.2.0-6.el9_1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776019" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775786" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775787" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775788" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775789" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775790" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775791" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775792" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775793" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776020" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776022" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775794" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775795" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775796" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775797" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775798" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775799" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775800" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775801" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775803" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775804" version="1" comment="kernel-default is &lt;4.12.14-150100.197.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775805" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776024" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775806" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776025" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775807" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776026" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776027" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775808" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776029" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776031" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776032" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775809" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776033" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775810" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775811" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775812" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775814" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775815" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775816" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775817" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775818" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775823" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775824" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775825" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775826" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775827" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775828" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775829" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775830" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775831" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776228" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776035" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806517" version="1" comment="bpftool is &lt;7.0.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806518" version="1" comment="kernel is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806519" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-284.18.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806520" version="1" comment="kernel-core is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806521" version="1" comment="kernel-cross-headers is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806522" version="1" comment="kernel-debug is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806523" version="1" comment="kernel-debug-core is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806526" version="1" comment="kernel-debug-modules is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806527" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806528" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806529" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806532" version="1" comment="kernel-doc is &lt;5.14.0-284.18.1.el9_2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806533" version="1" comment="kernel-headers is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806534" version="1" comment="kernel-modules is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806535" version="1" comment="kernel-modules-core is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806536" version="1" comment="kernel-modules-extra is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806537" version="1" comment="kernel-tools is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806538" version="1" comment="kernel-tools-libs is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806540" version="1" comment="kernel-uki-virt is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806541" version="1" comment="perf is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806542" version="1" comment="python3-perf is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806543" version="1" comment="rtla is &lt;5.14.0-284.18.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945415" version="1" comment="iwl100-firmware is &lt;39.31.5.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945416" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945417" version="1" comment="iwl105-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945418" version="1" comment="iwl135-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945419" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945420" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945421" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945422" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945423" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945424" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945425" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945426" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945427" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945428" version="1" comment="libertas-sd8787-firmware is &lt;20240905-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945429" version="1" comment="linux-firmware is &lt;20240905-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945430" version="1" comment="linux-firmware-whence is &lt;20240905-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945431" version="1" comment="netronome-firmware is &lt;20240905-143.3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804127" version="1" comment="open-vm-tools is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804128" version="1" comment="open-vm-tools-desktop is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804129" version="1" comment="open-vm-tools-devel is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804130" version="1" comment="open-vm-tools-salt-minion is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804131" version="1" comment="open-vm-tools-sdmp is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804132" version="1" comment="open-vm-tools-test is &lt;12.1.5-1.el9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806901" version="1" comment="open-vm-tools is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806902" version="1" comment="open-vm-tools-desktop is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806903" version="1" comment="open-vm-tools-salt-minion is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806904" version="1" comment="open-vm-tools-sdmp is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806905" version="1" comment="open-vm-tools-test is &lt;12.1.5-1.el9_2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805119" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805120" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805121" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805122" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805123" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805124" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.113-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805125" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.113-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805126" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.13-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805127" version="1" comment="dotnet-templates-6.0 is &lt;6.0.113-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796009" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796011" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796013" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796014" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796016" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796018" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816442" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816443" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816444" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816093" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816094" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816445" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816095" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816096" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816097" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816446" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804089" version="1" comment="kernel-default is &lt;5.3.18-150200.24.166.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816447" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816448" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816449" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816450" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816451" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816098" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816099" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816100" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816101" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816102" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816452" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816453" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816454" version="1" comment="kernel-default is &lt;5.3.18-150300.59.138.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816104" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816456" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816457" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816458" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816114" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816459" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816460" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816115" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816116" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816461" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816462" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816117" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816463" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816118" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816465" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852611" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816119" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816124" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816466" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816467" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816468" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816470" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816125" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770231" version="1" comment="kernel-default is &lt;4.12.14-122.159.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805174" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805175" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805176" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805177" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805178" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805179" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805180" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805181" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805182" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805183" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805184" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805185" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.362.b09-2.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805186" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.362.b09-2.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805187" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805188" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805189" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805190" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.362.b09-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805151" version="1" comment="java-11-openjdk is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805152" version="1" comment="java-11-openjdk-demo is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805153" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805154" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805155" version="1" comment="java-11-openjdk-devel is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805156" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805157" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805158" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805159" version="1" comment="java-11-openjdk-headless is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805160" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805161" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805162" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805163" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805164" version="1" comment="java-11-openjdk-jmods is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805165" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805166" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805167" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805168" version="1" comment="java-11-openjdk-src is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805169" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805170" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805171" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805172" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805173" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.18.0.10-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805128" version="1" comment="java-17-openjdk is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805129" version="1" comment="java-17-openjdk-demo is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805130" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805131" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805132" version="1" comment="java-17-openjdk-devel is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805133" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805134" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805135" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805136" version="1" comment="java-17-openjdk-headless is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805137" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805138" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805139" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805140" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805141" version="1" comment="java-17-openjdk-jmods is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805142" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805143" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805144" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805145" version="1" comment="java-17-openjdk-src is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805146" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805147" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805148" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805149" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805150" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.6.0.10-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805572" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805573" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805574" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805575" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805576" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805577" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805578" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805579" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805580" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805581" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805582" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805583" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.372.b07-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805584" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.372.b07-1.el9_1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805585" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805586" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805587" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805588" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.372.b07-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805549" version="1" comment="java-11-openjdk is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805550" version="1" comment="java-11-openjdk-demo is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805551" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805552" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805553" version="1" comment="java-11-openjdk-devel is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805554" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805555" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805556" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805557" version="1" comment="java-11-openjdk-headless is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805558" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805559" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805560" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805561" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805562" version="1" comment="java-11-openjdk-jmods is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805563" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805564" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805565" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805566" version="1" comment="java-11-openjdk-src is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805567" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805568" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805569" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805570" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805571" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.19.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805526" version="1" comment="java-17-openjdk is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805527" version="1" comment="java-17-openjdk-demo is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805528" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805529" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805530" version="1" comment="java-17-openjdk-devel is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805531" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805532" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805533" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805534" version="1" comment="java-17-openjdk-headless is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805535" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805536" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805537" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805538" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805539" version="1" comment="java-17-openjdk-jmods is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805540" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805541" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805542" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805543" version="1" comment="java-17-openjdk-src is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805544" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805545" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805546" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805547" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805548" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.7.0.7-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806587" version="1" comment="java-11-openjdk is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806588" version="1" comment="java-11-openjdk-demo is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806589" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806590" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806591" version="1" comment="java-11-openjdk-devel is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806592" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806593" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806594" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806595" version="1" comment="java-11-openjdk-headless is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806596" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806597" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806598" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806599" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806600" version="1" comment="java-11-openjdk-jmods is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806601" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806602" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806603" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806604" version="1" comment="java-11-openjdk-src is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806605" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806606" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806607" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806608" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806609" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.20.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806610" version="1" comment="java-17-openjdk is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806611" version="1" comment="java-17-openjdk-demo is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806612" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806613" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806614" version="1" comment="java-17-openjdk-devel is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806615" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806616" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806617" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806618" version="1" comment="java-17-openjdk-headless is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806619" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806620" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806621" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806622" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806623" version="1" comment="java-17-openjdk-jmods is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806624" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806625" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806626" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806627" version="1" comment="java-17-openjdk-src is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806628" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806629" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806630" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806631" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806632" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.8.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807248" version="1" comment="java-17-openjdk is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807249" version="1" comment="java-17-openjdk-demo is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807250" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807251" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807252" version="1" comment="java-17-openjdk-devel is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807253" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807254" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807255" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807256" version="1" comment="java-17-openjdk-headless is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807257" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807258" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807259" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807260" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807261" version="1" comment="java-17-openjdk-jmods is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807262" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807263" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807264" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807265" version="1" comment="java-17-openjdk-src is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807266" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807267" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807268" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807269" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807270" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.9.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813734" version="1" comment="java-21-openjdk is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813735" version="1" comment="java-21-openjdk-demo is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813736" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813737" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813738" version="1" comment="java-21-openjdk-devel is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813739" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813740" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813741" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813742" version="1" comment="java-21-openjdk-headless is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813743" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813744" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813745" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813746" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813747" version="1" comment="java-21-openjdk-jmods is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813748" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813749" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813750" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813751" version="1" comment="java-21-openjdk-src is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813752" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813753" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813754" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813755" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813756" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.1.0.12-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805984" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805985" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805986" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805987" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806633" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806634" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806635" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806636" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806637" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806638" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806639" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806640" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806641" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806642" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806643" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806644" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.382.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806645" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.382.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806646" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806647" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806648" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806649" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.382.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807214" version="1" comment="java-11-openjdk is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807215" version="1" comment="java-11-openjdk-demo is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807216" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807217" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807218" version="1" comment="java-11-openjdk-devel is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807219" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807220" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807221" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807222" version="1" comment="java-11-openjdk-headless is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807223" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807224" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807225" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807226" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807227" version="1" comment="java-11-openjdk-jmods is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807228" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807229" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807230" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807231" version="1" comment="java-11-openjdk-src is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807232" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807233" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807234" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807235" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807236" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.21.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962406" version="1" comment="galera is &lt;26.4.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962407" version="1" comment="mariadb is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962408" version="1" comment="mariadb-backup is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962409" version="1" comment="mariadb-common is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962410" version="1" comment="mariadb-devel is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962411" version="1" comment="mariadb-embedded is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962412" version="1" comment="mariadb-embedded-devel is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962413" version="1" comment="mariadb-errmsg is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962414" version="1" comment="mariadb-gssapi-server is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962415" version="1" comment="mariadb-oqgraph-engine is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962416" version="1" comment="mariadb-pam is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962417" version="1" comment="mariadb-server is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962418" version="1" comment="mariadb-server-galera is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962419" version="1" comment="mariadb-server-utils is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962420" version="1" comment="mariadb-test is &lt;10.5.27-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806013" version="1" comment="git is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806014" version="1" comment="git-all is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806015" version="1" comment="git-core is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806016" version="1" comment="git-core-doc is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806017" version="1" comment="git-credential-libsecret is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806018" version="1" comment="git-daemon is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806019" version="1" comment="git-email is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806020" version="1" comment="git-gui is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806021" version="1" comment="git-instaweb is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806022" version="1" comment="git-subtree is &lt;2.39.3-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806023" version="1" comment="git-svn is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806024" version="1" comment="gitk is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806025" version="1" comment="gitweb is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806026" version="1" comment="perl-Git is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806027" version="1" comment="perl-Git-SVN is &lt;2.39.3-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806711" version="1" comment="libeconf is &lt;0.4.1-3.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954004" version="1" comment="microcode_ctl is &lt;20240910-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810818" version="1" comment="tpm2-tss is &lt;3.2.2-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810819" version="1" comment="tpm2-tss-devel is &lt;3.2.2-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805191" version="1" comment="sudo is &lt;1.9.5p2-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805192" version="1" comment="sudo-python-plugin is &lt;1.9.5p2-7.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806011" version="1" comment="libreswan is &lt;4.9-4.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805970" version="1" comment="libreswan is &lt;4.9-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805982" version="1" comment="pcs is &lt;0.11.4-7.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805983" version="1" comment="pcs-snmp is &lt;0.11.4-7.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764735" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764738" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764739" version="1" comment="kernel-default is &lt;5.3.18-150200.24.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764741" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764744" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796021" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742253" version="1" comment="kernel-default is &lt;4.12.14-95.114.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742260" version="1" comment="kernel-default is &lt;4.12.14-150100.197.131.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770224" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770225" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770226" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770253" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770227" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805315" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805316" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805317" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805318" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805496" version="1" comment="curl is &lt;7.76.1-19.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805497" version="1" comment="curl-minimal is &lt;7.76.1-19.el9_1.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805498" version="1" comment="libcurl is &lt;7.76.1-19.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805499" version="1" comment="libcurl-devel is &lt;7.76.1-19.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805500" version="1" comment="libcurl-minimal is &lt;7.76.1-19.el9_1.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805992" version="1" comment="nodejs-nodemon is &lt;2.0.20-2.module+el9.2.0.z+18497+a402347c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811163" version="1" comment="python3-cryptography is &lt;36.0.1-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806085" version="1" comment="python-unversioned-command is &lt;3.9.16-1.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806086" version="1" comment="python3 is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806087" version="1" comment="python3-debug is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806088" version="1" comment="python3-devel is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806089" version="1" comment="python3-idle is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806090" version="1" comment="python3-libs is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806091" version="1" comment="python3-test is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806092" version="1" comment="python3-tkinter is &lt;3.9.16-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806059" version="1" comment="python3.11 is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806060" version="1" comment="python3.11-debug is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806061" version="1" comment="python3.11-devel is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806062" version="1" comment="python3.11-idle is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806063" version="1" comment="python3.11-libs is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806064" version="1" comment="python3.11-test is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806065" version="1" comment="python3.11-tkinter is &lt;3.11.2-2.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806028" version="1" comment="go-toolset is &lt;1.19.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806029" version="1" comment="golang is &lt;1.19.9-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806030" version="1" comment="golang-bin is &lt;1.19.9-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806031" version="1" comment="golang-docs is &lt;1.19.9-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806032" version="1" comment="golang-misc is &lt;1.19.9-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806033" version="1" comment="golang-race is &lt;1.19.9-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806034" version="1" comment="golang-src is &lt;1.19.9-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806035" version="1" comment="golang-tests is &lt;1.19.9-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806688" version="1" comment="pg_repack is &lt;1.4.8-1.module+el9.2.0+17405+aeb9ec60 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806689" version="1" comment="pgaudit is &lt;1.7.0-1.module+el9.2.0+17405+aeb9ec60 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806690" version="1" comment="postgres-decoderbufs is &lt;1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806691" version="1" comment="postgresql is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806692" version="1" comment="postgresql-contrib is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806693" version="1" comment="postgresql-docs is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806694" version="1" comment="postgresql-plperl is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806695" version="1" comment="postgresql-plpython3 is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806696" version="1" comment="postgresql-pltcl is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806697" version="1" comment="postgresql-private-devel is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806698" version="1" comment="postgresql-private-libs is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806699" version="1" comment="postgresql-server is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806700" version="1" comment="postgresql-server-devel is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806701" version="1" comment="postgresql-static is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806702" version="1" comment="postgresql-test is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806703" version="1" comment="postgresql-test-rpm-macros is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806704" version="1" comment="postgresql-upgrade is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806705" version="1" comment="postgresql-upgrade-devel is &lt;15.3-1.module+el9.2.0.z+19113+6f5d9d63 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806036" version="1" comment="cups-filters is &lt;1.28.7-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806037" version="1" comment="cups-filters-devel is &lt;1.28.7-11.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806038" version="1" comment="cups-filters-libs is &lt;1.28.7-11.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806050" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806074" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806051" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806075" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806052" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806076" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806077" version="1" comment="dotnet-host is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806053" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806078" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806054" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806079" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806055" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.118-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806056" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.118-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806080" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.107-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806081" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.107-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806057" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.18-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806082" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.7-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806058" version="1" comment="dotnet-templates-6.0 is &lt;6.0.118-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806083" version="1" comment="dotnet-templates-7.0 is &lt;7.0.107-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806084" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.107-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811121" version="1" comment="tomcat is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811122" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811123" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811124" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811125" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811126" version="1" comment="tomcat-lib is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811127" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811128" version="1" comment="tomcat-webapps is &lt;9.0.62-37.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805971" version="1" comment="openssh is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805972" version="1" comment="openssh-askpass is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805973" version="1" comment="openssh-clients is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805974" version="1" comment="openssh-keycat is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805975" version="1" comment="openssh-server is &lt;8.7p1-29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805976" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.29.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866723" version="1" comment="harfbuzz is &lt;2.7.4-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866724" version="1" comment="harfbuzz-devel is &lt;2.7.4-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866725" version="1" comment="harfbuzz-icu is &lt;2.7.4-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805469" version="1" comment="httpd is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805470" version="1" comment="httpd-core is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805471" version="1" comment="httpd-devel is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805472" version="1" comment="httpd-filesystem is &lt;2.4.53-7.el9_1.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805473" version="1" comment="httpd-manual is &lt;2.4.53-7.el9_1.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805474" version="1" comment="httpd-tools is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805475" version="1" comment="mod_http2 is &lt;1.15.19-3.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805476" version="1" comment="mod_ldap is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805477" version="1" comment="mod_lua is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805478" version="1" comment="mod_proxy_html is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805479" version="1" comment="mod_session is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805480" version="1" comment="mod_ssl is &lt;2.4.53-7.el9_1.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805312" version="1" comment="firefox is &lt;102.8.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805313" version="1" comment="firefox-x11 is &lt;102.8.0-2.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805423" version="1" comment="firefox is &lt;102.9.0-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805424" version="1" comment="firefox-x11 is &lt;102.9.0-3.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805437" version="1" comment="thunderbird is &lt;102.9.0-1.el9_1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806843" version="1" comment="libcap is &lt;2.48-9.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806844" version="1" comment="libcap-devel is &lt;2.48-9.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751218" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751219" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751220" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751221" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751222" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751224" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751225" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751226" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751228" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750765" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=13-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750766" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751230" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750767" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750768" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751231" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751232" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=3-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751234" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=2-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811027" version="1" comment="liblouis is &lt;3.16.1-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811028" version="1" comment="python3-louis is &lt;3.16.1-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806487" version="1" comment="libvirt is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806488" version="1" comment="libvirt-client is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806489" version="1" comment="libvirt-client-qemu is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806490" version="1" comment="libvirt-daemon is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806491" version="1" comment="libvirt-daemon-config-network is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806492" version="1" comment="libvirt-daemon-config-nwfilter is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806493" version="1" comment="libvirt-daemon-driver-interface is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806494" version="1" comment="libvirt-daemon-driver-network is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806495" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806496" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806497" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806498" version="1" comment="libvirt-daemon-driver-secret is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806499" version="1" comment="libvirt-daemon-driver-storage is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806500" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806501" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806502" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806503" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806504" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806505" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806506" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806507" version="1" comment="libvirt-daemon-kvm is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806508" version="1" comment="libvirt-devel is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806509" version="1" comment="libvirt-docs is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806510" version="1" comment="libvirt-libs is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806511" version="1" comment="libvirt-lock-sanlock is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806512" version="1" comment="libvirt-nss is &lt;9.0.0-10.2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845160" version="1" comment="python-unversioned-command is &lt;3.9.18-1.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845161" version="1" comment="python3 is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845162" version="1" comment="python3-debug is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845163" version="1" comment="python3-devel is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845164" version="1" comment="python3-idle is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845165" version="1" comment="python3-libs is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845166" version="1" comment="python3-test is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845167" version="1" comment="python3-tkinter is &lt;3.9.18-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866657" version="1" comment="python3.11 is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866658" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866659" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866660" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866661" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866662" version="1" comment="python3.11-test is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866663" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953756" version="1" comment="bluez is &lt;5.72-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953757" version="1" comment="bluez-cups is &lt;5.72-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953758" version="1" comment="bluez-libs is &lt;5.72-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953759" version="1" comment="bluez-libs-devel is &lt;5.72-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953760" version="1" comment="bluez-obexd is &lt;5.72-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813977" version="1" comment="libmicrohttpd is &lt;0.9.72-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813978" version="1" comment="libmicrohttpd-devel is &lt;0.9.72-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813979" version="1" comment="libmicrohttpd-doc is &lt;0.9.72-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811030" version="1" comment="httpd is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811031" version="1" comment="httpd-core is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811032" version="1" comment="httpd-devel is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811033" version="1" comment="httpd-filesystem is &lt;2.4.57-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811034" version="1" comment="httpd-manual is &lt;2.4.57-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811035" version="1" comment="httpd-tools is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811036" version="1" comment="mod_http2 is &lt;1.15.19-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811037" version="1" comment="mod_ldap is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811038" version="1" comment="mod_lua is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811039" version="1" comment="mod_proxy_html is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811040" version="1" comment="mod_session is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811041" version="1" comment="mod_ssl is &lt;2.4.57-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811175" version="1" comment="curl is &lt;7.76.1-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811176" version="1" comment="curl-minimal is &lt;7.76.1-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811177" version="1" comment="libcurl is &lt;7.76.1-26.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811178" version="1" comment="libcurl-devel is &lt;7.76.1-26.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811179" version="1" comment="libcurl-minimal is &lt;7.76.1-26.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805977" version="1" comment="curl is &lt;7.76.1-23.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805978" version="1" comment="curl-minimal is &lt;7.76.1-23.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805979" version="1" comment="libcurl is &lt;7.76.1-23.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805980" version="1" comment="libcurl-devel is &lt;7.76.1-23.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805981" version="1" comment="libcurl-minimal is &lt;7.76.1-23.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811095" version="1" comment="flatpak is &lt;1.12.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811096" version="1" comment="flatpak-devel is &lt;1.12.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811097" version="1" comment="flatpak-libs is &lt;1.12.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811098" version="1" comment="flatpak-selinux is &lt;1.12.8-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811099" version="1" comment="flatpak-session-helper is &lt;1.12.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805460" version="1" comment="pcs is &lt;0.11.3-4.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805461" version="1" comment="pcs-snmp is &lt;0.11.3-4.el9_1.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806039" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806040" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806041" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806042" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805589" version="1" comment="webkit2gtk3 is &lt;2.36.7-1.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805590" version="1" comment="webkit2gtk3-devel is &lt;2.36.7-1.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805591" version="1" comment="webkit2gtk3-jsc is &lt;2.36.7-1.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805592" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.36.7-1.el9_1.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806577" version="1" comment="bind is &lt;9.16.23-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806578" version="1" comment="bind-chroot is &lt;9.16.23-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806579" version="1" comment="bind-devel is &lt;9.16.23-11.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806580" version="1" comment="bind-dnssec-doc is &lt;9.16.23-11.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806581" version="1" comment="bind-dnssec-utils is &lt;9.16.23-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806582" version="1" comment="bind-doc is &lt;9.16.23-11.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806583" version="1" comment="bind-libs is &lt;9.16.23-11.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806584" version="1" comment="bind-license is &lt;9.16.23-11.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806585" version="1" comment="bind-utils is &lt;9.16.23-11.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806586" version="1" comment="python3-bind is &lt;9.16.23-11.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806718" version="1" comment="curl is &lt;7.76.1-23.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806719" version="1" comment="curl-minimal is &lt;7.76.1-23.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806720" version="1" comment="libcurl is &lt;7.76.1-23.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806721" version="1" comment="libcurl-devel is &lt;7.76.1-23.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806722" version="1" comment="libcurl-minimal is &lt;7.76.1-23.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811100" version="1" comment="python3-tornado is &lt;6.1.0-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811101" version="1" comment="dnsmasq is &lt;2.85-14.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811102" version="1" comment="dnsmasq-utils is &lt;2.85-14.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770228" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770230" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770001" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770002" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770003" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770232" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770233" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806712" version="1" comment="libxml2 is &lt;2.9.13-3.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806713" version="1" comment="libxml2-devel is &lt;2.9.13-3.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806714" version="1" comment="python3-libxml2 is &lt;2.9.13-3.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848258" version="1" comment="sudo is &lt;1.9.5p2-10.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848259" version="1" comment="sudo-python-plugin is &lt;1.9.5p2-10.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805593" version="1" comment="emacs is &lt;27.2-6.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805594" version="1" comment="emacs-common is &lt;27.2-6.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805595" version="1" comment="emacs-filesystem is &lt;27.2-6.el9_1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805596" version="1" comment="emacs-lucid is &lt;27.2-6.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009805597" version="1" comment="emacs-nox is &lt;27.2-6.el9_1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811109" version="1" comment="ghostscript is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811110" version="1" comment="ghostscript-doc is &lt;9.54.0-13.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811111" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811112" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811113" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811114" version="1" comment="ghostscript-x11 is &lt;9.54.0-13.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811115" version="1" comment="libgs is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811116" version="1" comment="libgs-devel is &lt;9.54.0-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806545" version="1" comment="go-toolset is &lt;1.19.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806546" version="1" comment="golang is &lt;1.19.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806547" version="1" comment="golang-bin is &lt;1.19.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806548" version="1" comment="golang-docs is &lt;1.19.10-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806549" version="1" comment="golang-misc is &lt;1.19.10-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806550" version="1" comment="golang-race is &lt;1.19.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806551" version="1" comment="golang-src is &lt;1.19.10-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806552" version="1" comment="golang-tests is &lt;1.19.10-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053659" version="1" comment="git-lfs is &lt;3.4.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807206" version="1" comment="go-toolset is &lt;1.19.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807207" version="1" comment="golang is &lt;1.19.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807208" version="1" comment="golang-bin is &lt;1.19.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807209" version="1" comment="golang-docs is &lt;1.19.13-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807210" version="1" comment="golang-misc is &lt;1.19.13-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807211" version="1" comment="golang-race is &lt;1.19.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807212" version="1" comment="golang-src is &lt;1.19.13-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807213" version="1" comment="golang-tests is &lt;1.19.13-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816428" version="1" comment="buildah is &lt;1.31.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816429" version="1" comment="buildah-tests is &lt;1.31.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816436" version="1" comment="containernetworking-plugins is &lt;1.3.0-6.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816430" version="1" comment="podman is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816431" version="1" comment="podman-docker is &lt;4.6.1-7.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816432" version="1" comment="podman-gvproxy is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816433" version="1" comment="podman-plugins is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816434" version="1" comment="podman-remote is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816435" version="1" comment="podman-tests is &lt;4.6.1-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816427" version="1" comment="runc is &lt;1.1.9-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816425" version="1" comment="skopeo is &lt;1.13.3-3.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816426" version="1" comment="skopeo-tests is &lt;1.13.3-3.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953761" version="1" comment="python3-dns is &lt;2.6.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810820" version="1" comment="ncurses is &lt;6.2-10.20210508.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810821" version="1" comment="ncurses-base is &lt;6.2-10.20210508.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810822" version="1" comment="ncurses-c++-libs is &lt;6.2-10.20210508.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810823" version="1" comment="ncurses-devel is &lt;6.2-10.20210508.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810824" version="1" comment="ncurses-libs is &lt;6.2-10.20210508.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810825" version="1" comment="ncurses-term is &lt;6.2-10.20210508.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810802" version="1" comment="glib2 is &lt;2.68.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810803" version="1" comment="glib2-devel is &lt;2.68.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810804" version="1" comment="glib2-doc is &lt;2.68.4-11.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810805" version="1" comment="glib2-static is &lt;2.68.4-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810806" version="1" comment="glib2-tests is &lt;2.68.4-11.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868750" version="1" comment="mingw32-glib2 is &lt;2.78.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868751" version="1" comment="mingw32-glib2-static is &lt;2.78.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868752" version="1" comment="mingw64-glib2 is &lt;2.78.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868753" version="1" comment="mingw64-glib2-static is &lt;2.78.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867976" version="1" comment="openssl is &lt;3.0.7-27.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867977" version="1" comment="openssl-devel is &lt;3.0.7-27.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867978" version="1" comment="openssl-fips-provider is &lt;3.0.7-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867979" version="1" comment="openssl-libs is &lt;3.0.7-27.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867980" version="1" comment="openssl-perl is &lt;3.0.7-27.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811134" version="1" comment="opensc is &lt;0.23.0-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872275" version="1" comment="qemu-guest-agent is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872276" version="1" comment="qemu-img is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872277" version="1" comment="qemu-kvm is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872278" version="1" comment="qemu-kvm-audio-pa is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872279" version="1" comment="qemu-kvm-block-blkio is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872280" version="1" comment="qemu-kvm-block-curl is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872281" version="1" comment="qemu-kvm-block-rbd is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872282" version="1" comment="qemu-kvm-common is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872283" version="1" comment="qemu-kvm-core is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872284" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872285" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872286" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872287" version="1" comment="qemu-kvm-device-usb-host is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872288" version="1" comment="qemu-kvm-device-usb-redirect is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872289" version="1" comment="qemu-kvm-docs is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872290" version="1" comment="qemu-kvm-tools is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872291" version="1" comment="qemu-kvm-ui-egl-headless is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872292" version="1" comment="qemu-kvm-ui-opengl is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872293" version="1" comment="qemu-pr-helper is &lt;8.2.0-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806706" version="1" comment="nodejs is &lt;16.20.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806707" version="1" comment="nodejs-docs is &lt;16.20.1-1.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806708" version="1" comment="nodejs-full-i18n is &lt;16.20.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806709" version="1" comment="nodejs-libs is &lt;16.20.1-1.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806710" version="1" comment="npm is &lt;8.19.4-1.16.20.1.1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806815" version="1" comment="dmidecode is &lt;3.3-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782320" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866640" version="1" comment="httpd is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866641" version="1" comment="httpd-core is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866642" version="1" comment="httpd-devel is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866643" version="1" comment="httpd-filesystem is &lt;2.4.57-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866644" version="1" comment="httpd-manual is &lt;2.4.57-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866645" version="1" comment="httpd-tools is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866646" version="1" comment="mod_ldap is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866647" version="1" comment="mod_lua is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866648" version="1" comment="mod_proxy_html is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866649" version="1" comment="mod_session is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866650" version="1" comment="mod_ssl is &lt;2.4.57-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806045" version="1" comment="nodejs is &lt;18.14.2-3.module+el9.2.0.z+18964+42696395 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806046" version="1" comment="nodejs-devel is &lt;18.14.2-3.module+el9.2.0.z+18964+42696395 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806047" version="1" comment="nodejs-docs is &lt;18.14.2-3.module+el9.2.0.z+18964+42696395 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806048" version="1" comment="nodejs-full-i18n is &lt;18.14.2-3.module+el9.2.0.z+18964+42696395 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806069" version="1" comment="nodejs-libs is &lt;16.19.1-2.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806049" version="1" comment="npm is &lt;9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799653" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796022" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799654" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806553" version="1" comment="grafana is &lt;9.0.9-3.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877115" version="1" comment="iwl100-firmware is &lt;39.31.5.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877116" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877117" version="1" comment="iwl105-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877118" version="1" comment="iwl135-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877119" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877120" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877121" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877122" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877123" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877124" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877125" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877126" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877127" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877128" version="1" comment="libertas-sd8787-firmware is &lt;20240603-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877129" version="1" comment="linux-firmware is &lt;20240603-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877130" version="1" comment="linux-firmware-whence is &lt;20240603-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877131" version="1" comment="netronome-firmware is &lt;20240603-143.1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811091" version="1" comment="libX11 is &lt;1.7.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811092" version="1" comment="libX11-common is &lt;1.7.0-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811093" version="1" comment="libX11-devel is &lt;1.7.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811094" version="1" comment="libX11-xcb is &lt;1.7.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770234" version="1" comment="kernel-default is ==4.12.14-95.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770235" version="1" comment="kgraft-patch-4_12_14-95_125-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770236" version="1" comment="kernel-default is &lt;4.12.14-95.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770005" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770237" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770238" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770239" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770240" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770241" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811107" version="1" comment="perl-CPAN is &lt;2.29-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811108" version="1" comment="perl-HTTP-Tiny is &lt;0.076-461.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867211" version="1" comment="frr is &lt;8.5.3-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867212" version="1" comment="frr-selinux is &lt;8.5.3-4.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807156" version="1" comment="nodejs-libs is &lt;16.20.2-1.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806043" version="1" comment="c-ares is &lt;1.17.1-5.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806044" version="1" comment="c-ares-devel is &lt;1.17.1-5.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806000" version="1" comment="firefox is &lt;102.11.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806001" version="1" comment="firefox-x11 is &lt;102.11.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806012" version="1" comment="thunderbird is &lt;102.11.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811155" version="1" comment="cups is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811156" version="1" comment="cups-client is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811157" version="1" comment="cups-devel is &lt;2.3.3op2-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811158" version="1" comment="cups-filesystem is &lt;2.3.3op2-21.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811159" version="1" comment="cups-ipptool is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811160" version="1" comment="cups-libs is &lt;2.3.3op2-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811161" version="1" comment="cups-lpd is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811162" version="1" comment="cups-printerapp is &lt;2.3.3op2-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806801" version="1" comment="cups is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806802" version="1" comment="cups-client is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806803" version="1" comment="cups-devel is &lt;2.3.3op2-16.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806804" version="1" comment="cups-filesystem is &lt;2.3.3op2-16.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806805" version="1" comment="cups-ipptool is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806806" version="1" comment="cups-libs is &lt;2.3.3op2-16.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806807" version="1" comment="cups-lpd is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806808" version="1" comment="cups-printerapp is &lt;2.3.3op2-16.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806650" version="1" comment="webkit2gtk3 is &lt;2.38.5-1.el9_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806651" version="1" comment="webkit2gtk3-devel is &lt;2.38.5-1.el9_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806652" version="1" comment="webkit2gtk3-jsc is &lt;2.38.5-1.el9_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806653" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.38.5-1.el9_2.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813867" version="1" comment="adwaita-qt5 is &lt;1.4.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813868" version="1" comment="libadwaita-qt5 is &lt;1.4.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813869" version="1" comment="python-qt5-rpm-macros is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813870" version="1" comment="python3-pyqt5-sip is &lt;12.11.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813871" version="1" comment="python3-qt5 is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813872" version="1" comment="python3-qt5-base is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813873" version="1" comment="python3-qt5-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813874" version="1" comment="qgnomeplatform is &lt;0.9.0-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813875" version="1" comment="qt5 is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813876" version="1" comment="qt5-assistant is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813877" version="1" comment="qt5-designer is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813878" version="1" comment="qt5-devel is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813879" version="1" comment="qt5-doctools is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813880" version="1" comment="qt5-linguist is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813881" version="1" comment="qt5-qdbusviewer is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813882" version="1" comment="qt5-qt3d is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813883" version="1" comment="qt5-qt3d-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813884" version="1" comment="qt5-qt3d-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813885" version="1" comment="qt5-qt3d-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813886" version="1" comment="qt5-qtbase is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813887" version="1" comment="qt5-qtbase-common is &lt;5.15.9-7.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813888" version="1" comment="qt5-qtbase-devel is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813889" version="1" comment="qt5-qtbase-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813890" version="1" comment="qt5-qtbase-examples is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813891" version="1" comment="qt5-qtbase-gui is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813892" version="1" comment="qt5-qtbase-mysql is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813893" version="1" comment="qt5-qtbase-odbc is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813894" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813895" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813896" version="1" comment="qt5-qtbase-static is &lt;5.15.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813897" version="1" comment="qt5-qtconnectivity is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813898" version="1" comment="qt5-qtconnectivity-devel is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813899" version="1" comment="qt5-qtconnectivity-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813900" version="1" comment="qt5-qtconnectivity-examples is &lt;5.15.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813901" version="1" comment="qt5-qtdeclarative is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813902" version="1" comment="qt5-qtdeclarative-devel is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813903" version="1" comment="qt5-qtdeclarative-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813904" version="1" comment="qt5-qtdeclarative-examples is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813905" version="1" comment="qt5-qtdeclarative-static is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813906" version="1" comment="qt5-qtdoc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813907" version="1" comment="qt5-qtgraphicaleffects is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813908" version="1" comment="qt5-qtgraphicaleffects-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813909" version="1" comment="qt5-qtimageformats is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813910" version="1" comment="qt5-qtimageformats-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813911" version="1" comment="qt5-qtlocation is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813912" version="1" comment="qt5-qtlocation-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813913" version="1" comment="qt5-qtlocation-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813914" version="1" comment="qt5-qtlocation-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813915" version="1" comment="qt5-qtmultimedia is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813916" version="1" comment="qt5-qtmultimedia-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813917" version="1" comment="qt5-qtmultimedia-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813918" version="1" comment="qt5-qtmultimedia-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813919" version="1" comment="qt5-qtquickcontrols is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813920" version="1" comment="qt5-qtquickcontrols-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813921" version="1" comment="qt5-qtquickcontrols-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813922" version="1" comment="qt5-qtquickcontrols2 is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813923" version="1" comment="qt5-qtquickcontrols2-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813924" version="1" comment="qt5-qtquickcontrols2-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813925" version="1" comment="qt5-qtquickcontrols2-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813926" version="1" comment="qt5-qtscript is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813927" version="1" comment="qt5-qtscript-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813928" version="1" comment="qt5-qtscript-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813929" version="1" comment="qt5-qtscript-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813930" version="1" comment="qt5-qtsensors is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813931" version="1" comment="qt5-qtsensors-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813932" version="1" comment="qt5-qtsensors-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813933" version="1" comment="qt5-qtsensors-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813934" version="1" comment="qt5-qtserialbus is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813935" version="1" comment="qt5-qtserialbus-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813936" version="1" comment="qt5-qtserialbus-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813937" version="1" comment="qt5-qtserialbus-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813938" version="1" comment="qt5-qtserialport is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813939" version="1" comment="qt5-qtserialport-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813940" version="1" comment="qt5-qtserialport-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813941" version="1" comment="qt5-qtserialport-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813942" version="1" comment="qt5-qtsvg is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813943" version="1" comment="qt5-qtsvg-devel is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813944" version="1" comment="qt5-qtsvg-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813945" version="1" comment="qt5-qtsvg-examples is &lt;5.15.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813946" version="1" comment="qt5-qttools is &lt;5.15.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813947" version="1" comment="qt5-qttools-common is &lt;5.15.9-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813948" version="1" comment="qt5-qttools-devel is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813949" version="1" comment="qt5-qttools-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813950" version="1" comment="qt5-qttools-examples is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813951" version="1" comment="qt5-qttools-libs-designer is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813952" version="1" comment="qt5-qttools-libs-designercomponents is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813953" version="1" comment="qt5-qttools-libs-help is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813954" version="1" comment="qt5-qttools-static is &lt;5.15.9-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813955" version="1" comment="qt5-qttranslations is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813956" version="1" comment="qt5-qtwayland is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813957" version="1" comment="qt5-qtwayland-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813958" version="1" comment="qt5-qtwayland-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813959" version="1" comment="qt5-qtwayland-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813960" version="1" comment="qt5-qtwebchannel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813961" version="1" comment="qt5-qtwebchannel-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813962" version="1" comment="qt5-qtwebchannel-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813963" version="1" comment="qt5-qtwebchannel-examples is &lt;5.15.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813964" version="1" comment="qt5-qtwebsockets is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813965" version="1" comment="qt5-qtwebsockets-devel is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813966" version="1" comment="qt5-qtwebsockets-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813967" version="1" comment="qt5-qtwebsockets-examples is &lt;5.15.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813968" version="1" comment="qt5-qtx11extras is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813969" version="1" comment="qt5-qtx11extras-devel is &lt;5.15.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813970" version="1" comment="qt5-qtx11extras-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813971" version="1" comment="qt5-qtxmlpatterns is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813972" version="1" comment="qt5-qtxmlpatterns-devel is &lt;5.15.9-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813973" version="1" comment="qt5-qtxmlpatterns-doc is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813974" version="1" comment="qt5-qtxmlpatterns-examples is &lt;5.15.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813975" version="1" comment="qt5-rpm-macros is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813976" version="1" comment="qt5-srpm-macros is &lt;5.15.9-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806715" version="1" comment="python3-requests is &lt;2.25.1-7.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806716" version="1" comment="python3-requests+security is &lt;2.25.1-7.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806717" version="1" comment="python3-requests+socks is &lt;2.25.1-7.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806093" version="1" comment="texlive is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806094" version="1" comment="texlive-adjustbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806095" version="1" comment="texlive-ae is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806096" version="1" comment="texlive-algorithms is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806097" version="1" comment="texlive-alphalph is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806098" version="1" comment="texlive-amscls is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806099" version="1" comment="texlive-amsfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806100" version="1" comment="texlive-amsmath is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806101" version="1" comment="texlive-anyfontsize is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806102" version="1" comment="texlive-anysize is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806103" version="1" comment="texlive-appendix is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806104" version="1" comment="texlive-arabxetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806105" version="1" comment="texlive-arphic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806106" version="1" comment="texlive-atbegshi is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806107" version="1" comment="texlive-attachfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806108" version="1" comment="texlive-attachfile2 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806109" version="1" comment="texlive-atveryend is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806110" version="1" comment="texlive-auxhook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806111" version="1" comment="texlive-avantgar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806112" version="1" comment="texlive-awesomebox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806113" version="1" comment="texlive-babel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806114" version="1" comment="texlive-babel-english is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806115" version="1" comment="texlive-babelbib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806116" version="1" comment="texlive-base is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806117" version="1" comment="texlive-beamer is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806118" version="1" comment="texlive-bera is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806119" version="1" comment="texlive-beton is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806120" version="1" comment="texlive-bibtex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806121" version="1" comment="texlive-bibtopic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806122" version="1" comment="texlive-bidi is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806123" version="1" comment="texlive-bigfoot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806124" version="1" comment="texlive-bigintcalc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806125" version="1" comment="texlive-bitset is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806126" version="1" comment="texlive-bookman is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806127" version="1" comment="texlive-bookmark is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806128" version="1" comment="texlive-booktabs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806129" version="1" comment="texlive-breakurl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806130" version="1" comment="texlive-breqn is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806131" version="1" comment="texlive-capt-of is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806132" version="1" comment="texlive-caption is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806133" version="1" comment="texlive-carlisle is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806134" version="1" comment="texlive-catchfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806135" version="1" comment="texlive-changebar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806136" version="1" comment="texlive-changepage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806137" version="1" comment="texlive-charter is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806138" version="1" comment="texlive-chngcntr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806139" version="1" comment="texlive-cite is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806140" version="1" comment="texlive-cjk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806141" version="1" comment="texlive-classpack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806142" version="1" comment="texlive-cm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806143" version="1" comment="texlive-cm-lgc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806144" version="1" comment="texlive-cm-super is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806145" version="1" comment="texlive-cmap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806146" version="1" comment="texlive-cmextra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806147" version="1" comment="texlive-cns is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806148" version="1" comment="texlive-collectbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806149" version="1" comment="texlive-collection-basic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806150" version="1" comment="texlive-collection-fontsrecommended is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806151" version="1" comment="texlive-collection-htmlxml is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806152" version="1" comment="texlive-collection-latex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806153" version="1" comment="texlive-collection-latexrecommended is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806154" version="1" comment="texlive-collection-xetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806155" version="1" comment="texlive-colorprofiles is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009054953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806156" version="1" comment="texlive-colortbl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806157" version="1" comment="texlive-context is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806158" version="1" comment="texlive-courier is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806159" version="1" comment="texlive-crop is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806160" version="1" comment="texlive-csquotes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806161" version="1" comment="texlive-ctable is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806162" version="1" comment="texlive-ctablestack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806163" version="1" comment="texlive-currfile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806164" version="1" comment="texlive-datetime is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806165" version="1" comment="texlive-dehyph is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806166" version="1" comment="texlive-dvipdfmx is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806167" version="1" comment="texlive-dvipng is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806168" version="1" comment="texlive-dvips is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806169" version="1" comment="texlive-dvisvgm is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806170" version="1" comment="texlive-ec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806171" version="1" comment="texlive-eepic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806172" version="1" comment="texlive-enctex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806173" version="1" comment="texlive-enumitem is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806174" version="1" comment="texlive-environ is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806175" version="1" comment="texlive-epsf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806176" version="1" comment="texlive-epstopdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806177" version="1" comment="texlive-epstopdf-pkg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806178" version="1" comment="texlive-eqparbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806179" version="1" comment="texlive-eso-pic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806180" version="1" comment="texlive-etex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806181" version="1" comment="texlive-etex-pkg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806182" version="1" comment="texlive-etexcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806183" version="1" comment="texlive-etoc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806184" version="1" comment="texlive-etoolbox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806185" version="1" comment="texlive-euenc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806186" version="1" comment="texlive-euler is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806187" version="1" comment="texlive-euro is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806188" version="1" comment="texlive-eurosym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806189" version="1" comment="texlive-extsizes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806190" version="1" comment="texlive-fancybox is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806191" version="1" comment="texlive-fancyhdr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806192" version="1" comment="texlive-fancyref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806193" version="1" comment="texlive-fancyvrb is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806194" version="1" comment="texlive-filecontents is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806195" version="1" comment="texlive-filehook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806196" version="1" comment="texlive-finstrut is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806197" version="1" comment="texlive-fix2col is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806198" version="1" comment="texlive-fixlatvian is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806199" version="1" comment="texlive-float is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806200" version="1" comment="texlive-fmtcount is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806201" version="1" comment="texlive-fncychap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806202" version="1" comment="texlive-fontawesome is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806203" version="1" comment="texlive-fontbook is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806204" version="1" comment="texlive-fonts-tlwg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806205" version="1" comment="texlive-fontspec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806206" version="1" comment="texlive-fontware is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806207" version="1" comment="texlive-fontwrap is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806208" version="1" comment="texlive-footmisc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806209" version="1" comment="texlive-footnotehyper is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806210" version="1" comment="texlive-fp is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806211" version="1" comment="texlive-fpl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806212" version="1" comment="texlive-framed is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806213" version="1" comment="texlive-garuda-c90 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806214" version="1" comment="texlive-geometry is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806215" version="1" comment="texlive-gettitlestring is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806216" version="1" comment="texlive-glyphlist is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806217" version="1" comment="texlive-gnu-freefont is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806218" version="1" comment="texlive-graphics is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806219" version="1" comment="texlive-graphics-cfg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806220" version="1" comment="texlive-graphics-def is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806221" version="1" comment="texlive-grfext is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806222" version="1" comment="texlive-grffile is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806223" version="1" comment="texlive-gsftopk is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806224" version="1" comment="texlive-hanging is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806225" version="1" comment="texlive-helvetic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806226" version="1" comment="texlive-hobsub is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806227" version="1" comment="texlive-hologo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009055982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806228" version="1" comment="texlive-hycolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806229" version="1" comment="texlive-hyperref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806230" version="1" comment="texlive-hyph-utf8 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806231" version="1" comment="texlive-hyphen-base is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806232" version="1" comment="texlive-hyphenat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806233" version="1" comment="texlive-hyphenex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806234" version="1" comment="texlive-ifetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806235" version="1" comment="texlive-ifluatex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806236" version="1" comment="texlive-ifmtarg is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806237" version="1" comment="texlive-ifoddpage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806238" version="1" comment="texlive-ifplatform is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806239" version="1" comment="texlive-iftex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806240" version="1" comment="texlive-ifxetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806241" version="1" comment="texlive-import is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806242" version="1" comment="texlive-index is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806243" version="1" comment="texlive-infwarerr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806244" version="1" comment="texlive-intcalc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806245" version="1" comment="texlive-jadetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806246" version="1" comment="texlive-jknapltx is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806247" version="1" comment="texlive-kastrup is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806248" version="1" comment="texlive-kerkis is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806249" version="1" comment="texlive-knuth-lib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806250" version="1" comment="texlive-knuth-local is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806251" version="1" comment="texlive-koma-script is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806252" version="1" comment="texlive-kpathsea is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806253" version="1" comment="texlive-kvdefinekeys is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806254" version="1" comment="texlive-kvoptions is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806255" version="1" comment="texlive-kvsetkeys is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806256" version="1" comment="texlive-l3backend is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806257" version="1" comment="texlive-l3experimental is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806258" version="1" comment="texlive-l3kernel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806259" version="1" comment="texlive-l3packages is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806260" version="1" comment="texlive-lastpage is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806261" version="1" comment="texlive-latex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806262" version="1" comment="texlive-latex-fonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806263" version="1" comment="texlive-latex2man is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806264" version="1" comment="texlive-latexbug is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806265" version="1" comment="texlive-latexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806266" version="1" comment="texlive-letltxmacro is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806267" version="1" comment="texlive-lettrine is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806268" version="1" comment="texlive-lib is &lt;20200406-26.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806269" version="1" comment="texlive-lib-devel is &lt;20200406-26.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806270" version="1" comment="texlive-linegoal is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806271" version="1" comment="texlive-lineno is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806272" version="1" comment="texlive-listings is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806273" version="1" comment="texlive-listofitems is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806274" version="1" comment="texlive-lm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806275" version="1" comment="texlive-lm-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806276" version="1" comment="texlive-ltabptch is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806277" version="1" comment="texlive-ltxcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806278" version="1" comment="texlive-ltxmisc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806279" version="1" comment="texlive-lua-alt-getopt is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806280" version="1" comment="texlive-luahbtex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806281" version="1" comment="texlive-lualatex-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806282" version="1" comment="texlive-lualibs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806283" version="1" comment="texlive-luaotfload is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806284" version="1" comment="texlive-luatex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806285" version="1" comment="texlive-luatex85 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806286" version="1" comment="texlive-luatexbase is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806287" version="1" comment="texlive-lwarp is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806288" version="1" comment="texlive-makecmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806289" version="1" comment="texlive-makeindex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806290" version="1" comment="texlive-manfnt-font is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806291" version="1" comment="texlive-marginnote is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806292" version="1" comment="texlive-marvosym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806293" version="1" comment="texlive-mathpazo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806294" version="1" comment="texlive-mathspec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806295" version="1" comment="texlive-mathtools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806296" version="1" comment="texlive-mdwtools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806297" version="1" comment="texlive-memoir is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806298" version="1" comment="texlive-metafont is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806299" version="1" comment="texlive-metalogo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806300" version="1" comment="texlive-metapost is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806301" version="1" comment="texlive-mflogo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806302" version="1" comment="texlive-mflogo-font is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806303" version="1" comment="texlive-mfnfss is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806304" version="1" comment="texlive-mfware is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806305" version="1" comment="texlive-microtype is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806306" version="1" comment="texlive-minitoc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806307" version="1" comment="texlive-mnsymbol is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806308" version="1" comment="texlive-modes is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806309" version="1" comment="texlive-mparhack is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806310" version="1" comment="texlive-mptopdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806311" version="1" comment="texlive-ms is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806312" version="1" comment="texlive-multido is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806313" version="1" comment="texlive-multirow is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806314" version="1" comment="texlive-natbib is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806315" version="1" comment="texlive-ncctools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806316" version="1" comment="texlive-ncntrsbk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806317" version="1" comment="texlive-needspace is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806318" version="1" comment="texlive-newfloat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806319" version="1" comment="texlive-newunicodechar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806320" version="1" comment="texlive-norasi-c90 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806321" version="1" comment="texlive-notoccite is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806322" version="1" comment="texlive-ntgclass is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806323" version="1" comment="texlive-oberdiek is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806324" version="1" comment="texlive-obsolete is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806325" version="1" comment="texlive-overpic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806326" version="1" comment="texlive-palatino is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806327" version="1" comment="texlive-paralist is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806328" version="1" comment="texlive-parallel is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806329" version="1" comment="texlive-parskip is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806330" version="1" comment="texlive-passivetex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806331" version="1" comment="texlive-pdfcolmk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009056995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806332" version="1" comment="texlive-pdfescape is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806333" version="1" comment="texlive-pdflscape is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806334" version="1" comment="texlive-pdfpages is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806335" version="1" comment="texlive-pdftex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806336" version="1" comment="texlive-pdftexcmds is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806337" version="1" comment="texlive-pgf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806338" version="1" comment="texlive-philokalia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806339" version="1" comment="texlive-placeins is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806340" version="1" comment="texlive-plain is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806341" version="1" comment="texlive-polyglossia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806342" version="1" comment="texlive-powerdot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806343" version="1" comment="texlive-preprint is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806344" version="1" comment="texlive-psfrag is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806345" version="1" comment="texlive-pslatex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806346" version="1" comment="texlive-psnfss is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806347" version="1" comment="texlive-pspicture is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806348" version="1" comment="texlive-pst-3d is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806349" version="1" comment="texlive-pst-arrow is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806350" version="1" comment="texlive-pst-blur is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806351" version="1" comment="texlive-pst-coil is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806352" version="1" comment="texlive-pst-eps is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806353" version="1" comment="texlive-pst-fill is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806354" version="1" comment="texlive-pst-grad is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806355" version="1" comment="texlive-pst-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806356" version="1" comment="texlive-pst-node is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806357" version="1" comment="texlive-pst-plot is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806358" version="1" comment="texlive-pst-slpe is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806359" version="1" comment="texlive-pst-text is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806360" version="1" comment="texlive-pst-tools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806361" version="1" comment="texlive-pst-tree is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806362" version="1" comment="texlive-pstricks is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806363" version="1" comment="texlive-pstricks-add is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806364" version="1" comment="texlive-ptext is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806365" version="1" comment="texlive-pxfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806366" version="1" comment="texlive-qstest is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806367" version="1" comment="texlive-ragged2e is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806368" version="1" comment="texlive-rcs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806369" version="1" comment="texlive-realscripts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806370" version="1" comment="texlive-refcount is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806371" version="1" comment="texlive-rerunfilecheck is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806372" version="1" comment="texlive-rsfs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806373" version="1" comment="texlive-sansmath is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806374" version="1" comment="texlive-sansmathaccent is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806375" version="1" comment="texlive-sauerj is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806376" version="1" comment="texlive-scheme-basic is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806377" version="1" comment="texlive-section is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806378" version="1" comment="texlive-sectsty is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806379" version="1" comment="texlive-seminar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806380" version="1" comment="texlive-sepnum is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806381" version="1" comment="texlive-setspace is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806382" version="1" comment="texlive-showexpl is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806383" version="1" comment="texlive-soul is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806384" version="1" comment="texlive-stackengine is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806385" version="1" comment="texlive-stmaryrd is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806386" version="1" comment="texlive-stringenc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009057917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806387" version="1" comment="texlive-subfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806388" version="1" comment="texlive-subfigure is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806389" version="1" comment="texlive-svn-prov is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806390" version="1" comment="texlive-symbol is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806391" version="1" comment="texlive-t2 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806392" version="1" comment="texlive-tabu is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806393" version="1" comment="texlive-tabulary is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806394" version="1" comment="texlive-tetex is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806395" version="1" comment="texlive-tex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806396" version="1" comment="texlive-tex-gyre is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806397" version="1" comment="texlive-tex-gyre-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806398" version="1" comment="texlive-tex-ini-files is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806399" version="1" comment="texlive-tex4ht is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806400" version="1" comment="texlive-texconfig is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806401" version="1" comment="texlive-texlive-common-doc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806402" version="1" comment="texlive-texlive-docindex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806403" version="1" comment="texlive-texlive-en is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806404" version="1" comment="texlive-texlive-msg-translations is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806405" version="1" comment="texlive-texlive-scripts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806406" version="1" comment="texlive-texlive-scripts-extra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806407" version="1" comment="texlive-texlive.infra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806408" version="1" comment="texlive-textcase is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806409" version="1" comment="texlive-textpos is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806410" version="1" comment="texlive-threeparttable is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806411" version="1" comment="texlive-thumbpdf is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806412" version="1" comment="texlive-times is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806413" version="1" comment="texlive-tipa is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806414" version="1" comment="texlive-titlesec is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806415" version="1" comment="texlive-titling is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806416" version="1" comment="texlive-tocloft is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806417" version="1" comment="texlive-tools is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806418" version="1" comment="texlive-translator is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806419" version="1" comment="texlive-trimspaces is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806420" version="1" comment="texlive-txfonts is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806421" version="1" comment="texlive-type1cm is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806422" version="1" comment="texlive-typehtml is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806423" version="1" comment="texlive-ucharcat is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806424" version="1" comment="texlive-ucharclasses is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806425" version="1" comment="texlive-ucs is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806426" version="1" comment="texlive-uhc is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806427" version="1" comment="texlive-ulem is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806428" version="1" comment="texlive-underscore is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806429" version="1" comment="texlive-unicode-data is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806430" version="1" comment="texlive-unicode-math is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806431" version="1" comment="texlive-uniquecounter is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806432" version="1" comment="texlive-unisugar is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806433" version="1" comment="texlive-updmap-map is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806434" version="1" comment="texlive-upquote is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806435" version="1" comment="texlive-url is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806436" version="1" comment="texlive-utopia is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806437" version="1" comment="texlive-varwidth is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806438" version="1" comment="texlive-wadalab is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806439" version="1" comment="texlive-was is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806440" version="1" comment="texlive-wasy is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806441" version="1" comment="texlive-wasy-type1 is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806442" version="1" comment="texlive-wasy2-ps is &lt;20180414-29.el8_8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806443" version="1" comment="texlive-wasysym is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806444" version="1" comment="texlive-wrapfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806445" version="1" comment="texlive-xcolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806446" version="1" comment="texlive-xdvi is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806447" version="1" comment="texlive-xecjk is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806448" version="1" comment="texlive-xecolor is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806449" version="1" comment="texlive-xecyr is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806450" version="1" comment="texlive-xeindex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806451" version="1" comment="texlive-xepersian is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806452" version="1" comment="texlive-xesearch is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806453" version="1" comment="texlive-xetex is &lt;20200406-26.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806454" version="1" comment="texlive-xetex-itrans is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806455" version="1" comment="texlive-xetex-pstricks is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806456" version="1" comment="texlive-xetex-tibetan is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806457" version="1" comment="texlive-xetexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806458" version="1" comment="texlive-xetexfontinfo is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806459" version="1" comment="texlive-xifthen is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806460" version="1" comment="texlive-xkeyval is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806461" version="1" comment="texlive-xltxtra is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806462" version="1" comment="texlive-xmltex is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806463" version="1" comment="texlive-xmltexconfig is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806464" version="1" comment="texlive-xstring is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806465" version="1" comment="texlive-xtab is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806466" version="1" comment="texlive-xunicode is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806467" version="1" comment="texlive-zapfchan is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806468" version="1" comment="texlive-zapfding is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806469" version="1" comment="texlive-zref is &lt;20200406-26.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806565" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806554" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806566" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806555" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806567" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806556" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806557" version="1" comment="dotnet-host is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806568" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806558" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806569" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806559" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806570" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.120-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806571" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.120-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806560" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.109-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806561" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.109-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806572" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.20-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806562" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.9-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806573" version="1" comment="dotnet-templates-6.0 is &lt;6.0.120-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806563" version="1" comment="dotnet-templates-7.0 is &lt;7.0.109-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806564" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.109-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811120" version="1" comment="sysstat is &lt;12.5.4-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807160" version="1" comment="bind is &lt;9.16.23-11.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807161" version="1" comment="bind-chroot is &lt;9.16.23-11.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807162" version="1" comment="bind-devel is &lt;9.16.23-11.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807163" version="1" comment="bind-dnssec-doc is &lt;9.16.23-11.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807164" version="1" comment="bind-dnssec-utils is &lt;9.16.23-11.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807165" version="1" comment="bind-doc is &lt;9.16.23-11.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807166" version="1" comment="bind-libs is &lt;9.16.23-11.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807167" version="1" comment="bind-license is &lt;9.16.23-11.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807168" version="1" comment="bind-utils is &lt;9.16.23-11.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807169" version="1" comment="python3-bind is &lt;9.16.23-11.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811118" version="1" comment="yajl is &lt;2.1.0-22.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811119" version="1" comment="yajl-devel is &lt;2.1.0-22.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806654" version="1" comment="ctdb is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806655" version="1" comment="libnetapi is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806656" version="1" comment="libnetapi-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806657" version="1" comment="libsmbclient is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806658" version="1" comment="libsmbclient-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806659" version="1" comment="libwbclient is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806660" version="1" comment="libwbclient-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806661" version="1" comment="python3-samba is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806662" version="1" comment="python3-samba-dc is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806663" version="1" comment="python3-samba-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806664" version="1" comment="python3-samba-test is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806665" version="1" comment="samba is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806666" version="1" comment="samba-client is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806667" version="1" comment="samba-client-libs is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806668" version="1" comment="samba-common is &lt;4.17.5-103.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806669" version="1" comment="samba-common-libs is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806670" version="1" comment="samba-common-tools is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806671" version="1" comment="samba-dc-libs is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806672" version="1" comment="samba-dcerpc is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806673" version="1" comment="samba-devel is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806674" version="1" comment="samba-krb5-printing is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806675" version="1" comment="samba-ldb-ldap-modules is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806676" version="1" comment="samba-libs is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806677" version="1" comment="samba-pidl is &lt;4.17.5-103.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806678" version="1" comment="samba-test is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806679" version="1" comment="samba-test-libs is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806680" version="1" comment="samba-tools is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806681" version="1" comment="samba-usershares is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806682" version="1" comment="samba-vfs-iouring is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806683" version="1" comment="samba-winbind is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806684" version="1" comment="samba-winbind-clients is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806685" version="1" comment="samba-winbind-krb5-locator is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806686" version="1" comment="samba-winbind-modules is &lt;4.17.5-103.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806687" version="1" comment="samba-winexe is &lt;4.17.5-103.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806855" version="1" comment="qemu-guest-agent is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806856" version="1" comment="qemu-img is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806857" version="1" comment="qemu-kvm is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806858" version="1" comment="qemu-kvm-audio-pa is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806859" version="1" comment="qemu-kvm-block-curl is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806860" version="1" comment="qemu-kvm-block-rbd is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806861" version="1" comment="qemu-kvm-common is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806862" version="1" comment="qemu-kvm-core is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806863" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806864" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806865" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806866" version="1" comment="qemu-kvm-device-usb-host is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806867" version="1" comment="qemu-kvm-device-usb-redirect is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806868" version="1" comment="qemu-kvm-docs is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806869" version="1" comment="qemu-kvm-tools is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806870" version="1" comment="qemu-kvm-ui-egl-headless is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806871" version="1" comment="qemu-kvm-ui-opengl is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806872" version="1" comment="qemu-pr-helper is &lt;7.2.0-14.el9_2.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804094" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804095" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804096" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804097" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807356" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804098" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804099" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804100" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804101" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795756" version="1" comment="kernel-default is &lt;5.3.18-150200.24.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804102" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=12-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804103" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804104" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804105" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=9-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804106" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804107" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807357" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803408" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804108" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804109" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803252" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807336" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=13-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807698" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807358" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807359" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807699" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807700" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807360" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807701" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807702" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807703" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803099" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807704" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807705" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811287" version="1" comment="open-vm-tools is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811288" version="1" comment="open-vm-tools-desktop is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811289" version="1" comment="open-vm-tools-salt-minion is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811290" version="1" comment="open-vm-tools-sdmp is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811291" version="1" comment="open-vm-tools-test is &lt;12.2.5-3.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806757" version="1" comment="thunderbird is &lt;102.14.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806072" version="1" comment="firefox is &lt;102.12.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806073" version="1" comment="firefox-x11 is &lt;102.12.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806071" version="1" comment="thunderbird is &lt;102.12.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053952" version="1" comment="microcode_ctl is &lt;20240910-1.20250211.1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806758" version="1" comment="dbus is &lt;1.12.20-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806759" version="1" comment="dbus-common is &lt;1.12.20-7.el9_2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806760" version="1" comment="dbus-daemon is &lt;1.12.20-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806761" version="1" comment="dbus-devel is &lt;1.12.20-7.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806762" version="1" comment="dbus-libs is &lt;1.12.20-7.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806763" version="1" comment="dbus-tools is &lt;1.12.20-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806764" version="1" comment="dbus-x11 is &lt;1.12.20-7.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794745" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794746" version="1" comment="kernel-default is &lt;4.12.14-122.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782322" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782323" version="1" comment="kernel-default is &lt;4.12.14-150100.197.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795755" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806792" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806781" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806793" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806782" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806794" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806783" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806784" version="1" comment="dotnet-host is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806795" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806785" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806796" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806786" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806797" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.121-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806798" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.121-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806787" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.110-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806788" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.110-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806799" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.21-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806789" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.10-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806800" version="1" comment="dotnet-templates-6.0 is &lt;6.0.121-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806790" version="1" comment="dotnet-templates-7.0 is &lt;7.0.110-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806791" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.110-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775833" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776037" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810799" version="1" comment="librabbitmq is &lt;0.11.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810800" version="1" comment="librabbitmq-devel is &lt;0.11.0-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810801" version="1" comment="librabbitmq-tools is &lt;0.11.0-7.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806912" version="1" comment="firefox is &lt;115.3.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806913" version="1" comment="firefox-x11 is &lt;115.3.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806914" version="1" comment="thunderbird is &lt;115.3.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811278" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811269" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814533" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811279" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811270" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814534" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811280" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811271" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814535" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814536" version="1" comment="dotnet-host is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811281" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811272" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814537" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811282" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811273" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814538" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811283" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.125-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811284" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.125-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811274" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.114-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811275" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.114-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814539" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.100-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814540" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.100-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811285" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.25-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811276" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.14-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814541" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.0-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811286" version="1" comment="dotnet-templates-6.0 is &lt;6.0.125-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811277" version="1" comment="dotnet-templates-7.0 is &lt;7.0.114-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814542" version="1" comment="dotnet-templates-8.0 is &lt;8.0.100-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814543" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.100-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810826" version="1" comment="krb5-devel is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810827" version="1" comment="krb5-libs is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810828" version="1" comment="krb5-pkinit is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810829" version="1" comment="krb5-server is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810830" version="1" comment="krb5-server-ldap is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810831" version="1" comment="krb5-workstation is &lt;1.21.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009810832" version="1" comment="libkadm5 is &lt;1.21.1-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799655" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799691" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849473" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872269" version="1" comment="rubygem-rexml is &lt;3.2.5-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872270" version="1" comment="rubygem-rss is &lt;0.2.9-143.module+el9.3.0+21558+96b51efd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807137" version="1" comment="ghostscript is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807138" version="1" comment="ghostscript-doc is &lt;9.54.0-10.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807139" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-10.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807140" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807141" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807142" version="1" comment="ghostscript-x11 is &lt;9.54.0-10.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807143" version="1" comment="libgs is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807144" version="1" comment="libgs-devel is &lt;9.54.0-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850282" version="1" comment="keylime is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850283" version="1" comment="keylime-base is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850284" version="1" comment="keylime-registrar is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850285" version="1" comment="keylime-selinux is &lt;7.3.0-13.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850286" version="1" comment="keylime-tenant is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850287" version="1" comment="keylime-verifier is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850288" version="1" comment="python3-keylime is &lt;7.3.0-13.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808828" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808837" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808829" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808838" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808830" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808839" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808840" version="1" comment="dotnet-host is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808831" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808841" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808832" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808842" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808833" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.124-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808834" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.124-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808843" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.113-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808844" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.113-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808835" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.24-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808845" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.13-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808836" version="1" comment="dotnet-templates-6.0 is &lt;6.0.124-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808846" version="1" comment="dotnet-templates-7.0 is &lt;7.0.113-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808847" version="1" comment="netstandard-targeting-pack-2.1 is &lt;7.0.113-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806575" version="1" comment="firefox is &lt;102.13.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806576" version="1" comment="firefox-x11 is &lt;102.13.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806574" version="1" comment="thunderbird is &lt;102.13.0-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866679" version="1" comment="gstreamer1-plugins-good is &lt;1.22.1-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866680" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.22.1-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866676" version="1" comment="gstreamer1-plugins-base is &lt;1.22.1-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866677" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.22.1-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866678" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.22.1-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806750" version="1" comment="cjose is &lt;0.6.1-13.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811042" version="1" comment="libvirt is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811043" version="1" comment="libvirt-client is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811044" version="1" comment="libvirt-client-qemu is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811045" version="1" comment="libvirt-daemon is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811046" version="1" comment="libvirt-daemon-common is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811047" version="1" comment="libvirt-daemon-config-network is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811048" version="1" comment="libvirt-daemon-config-nwfilter is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811049" version="1" comment="libvirt-daemon-driver-interface is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811050" version="1" comment="libvirt-daemon-driver-network is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811051" version="1" comment="libvirt-daemon-driver-nodedev is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811052" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811053" version="1" comment="libvirt-daemon-driver-qemu is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811054" version="1" comment="libvirt-daemon-driver-secret is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811055" version="1" comment="libvirt-daemon-driver-storage is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811056" version="1" comment="libvirt-daemon-driver-storage-core is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811057" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811058" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811059" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811060" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811061" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811062" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811063" version="1" comment="libvirt-daemon-kvm is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811064" version="1" comment="libvirt-daemon-lock is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811065" version="1" comment="libvirt-daemon-log is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811066" version="1" comment="libvirt-daemon-plugin-lockd is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811067" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811068" version="1" comment="libvirt-daemon-proxy is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811069" version="1" comment="libvirt-devel is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811070" version="1" comment="libvirt-docs is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811071" version="1" comment="libvirt-libs is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811072" version="1" comment="libvirt-nss is &lt;9.5.0-7.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868954" version="1" comment="libipa_hbac is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868955" version="1" comment="libsss_autofs is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868956" version="1" comment="libsss_certmap is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868957" version="1" comment="libsss_idmap is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868958" version="1" comment="libsss_nss_idmap is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868959" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868960" version="1" comment="libsss_simpleifp is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868961" version="1" comment="libsss_sudo is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868962" version="1" comment="python3-libipa_hbac is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868963" version="1" comment="python3-libsss_nss_idmap is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868964" version="1" comment="python3-sss is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868965" version="1" comment="python3-sss-murmur is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868966" version="1" comment="python3-sssdconfig is &lt;2.9.4-6.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868967" version="1" comment="sssd is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868968" version="1" comment="sssd-ad is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868969" version="1" comment="sssd-client is &lt;2.9.4-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868970" version="1" comment="sssd-common is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868971" version="1" comment="sssd-common-pac is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868972" version="1" comment="sssd-dbus is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868973" version="1" comment="sssd-idp is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868974" version="1" comment="sssd-ipa is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868975" version="1" comment="sssd-kcm is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868976" version="1" comment="sssd-krb5 is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868977" version="1" comment="sssd-krb5-common is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868978" version="1" comment="sssd-ldap is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868979" version="1" comment="sssd-nfs-idmap is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868980" version="1" comment="sssd-passkey is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868981" version="1" comment="sssd-polkit-rules is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868982" version="1" comment="sssd-proxy is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868983" version="1" comment="sssd-tools is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868984" version="1" comment="sssd-winbind-idmap is &lt;2.9.4-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053884" version="1" comment="ca-certificates is &lt;2024.2.69_v8.0.303-91.4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846265" version="1" comment="fence-agents-aliyun is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846266" version="1" comment="fence-agents-all is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846267" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846268" version="1" comment="fence-agents-apc is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846269" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846270" version="1" comment="fence-agents-aws is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846271" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846272" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846273" version="1" comment="fence-agents-brocade is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846274" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846275" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846276" version="1" comment="fence-agents-common is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846277" version="1" comment="fence-agents-compute is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846278" version="1" comment="fence-agents-drac5 is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846279" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846280" version="1" comment="fence-agents-emerson is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846281" version="1" comment="fence-agents-eps is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846282" version="1" comment="fence-agents-gce is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846283" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846284" version="1" comment="fence-agents-hpblade is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846285" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846286" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846287" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846288" version="1" comment="fence-agents-ifmib is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846289" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846290" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846291" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846292" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846293" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846294" version="1" comment="fence-agents-ipdu is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846295" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846296" version="1" comment="fence-agents-kdump is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846297" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846298" version="1" comment="fence-agents-mpath is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846299" version="1" comment="fence-agents-openstack is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846300" version="1" comment="fence-agents-redfish is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846301" version="1" comment="fence-agents-rhevm is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846302" version="1" comment="fence-agents-rsa is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846303" version="1" comment="fence-agents-rsb is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846304" version="1" comment="fence-agents-sbd is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846305" version="1" comment="fence-agents-scsi is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846306" version="1" comment="fence-agents-virsh is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846307" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846308" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846309" version="1" comment="fence-agents-wti is &lt;4.10.0-55.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846310" version="1" comment="fence-virt is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846311" version="1" comment="fence-virtd is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846312" version="1" comment="fence-virtd-cpg is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846313" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846314" version="1" comment="fence-virtd-multicast is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846315" version="1" comment="fence-virtd-serial is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846316" version="1" comment="fence-virtd-tcp is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846317" version="1" comment="ha-cloud-support is &lt;4.10.0-55.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798686" version="1" comment="kernel-default is &lt;4.12.14-122.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799065" version="1" comment="kernel-default is &lt;4.12.14-150100.197.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806845" version="1" comment="keylime is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806846" version="1" comment="keylime-base is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806847" version="1" comment="keylime-registrar is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806848" version="1" comment="keylime-selinux is &lt;6.5.2-6.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806849" version="1" comment="keylime-tenant is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806850" version="1" comment="keylime-verifier is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806851" version="1" comment="python3-keylime is &lt;6.5.2-6.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806765" version="1" comment="iperf3 is &lt;3.9-10.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872198" version="1" comment="frr is &lt;8.3.1-11.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872199" version="1" comment="frr-selinux is &lt;8.3.1-11.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806751" version="1" comment="openssh is &lt;8.7p1-30.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806752" version="1" comment="openssh-clients is &lt;8.7p1-30.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806753" version="1" comment="openssh-keycat is &lt;8.7p1-30.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806754" version="1" comment="openssh-server is &lt;8.7p1-30.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866726" version="1" comment="avahi-glib is &lt;0.8-20.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866727" version="1" comment="avahi-tools is &lt;0.8-20.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806766" version="1" comment="cargo is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806767" version="1" comment="clippy is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806768" version="1" comment="rust is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806769" version="1" comment="rust-analysis is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806770" version="1" comment="rust-analyzer is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806771" version="1" comment="rust-debugger-common is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806772" version="1" comment="rust-doc is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806773" version="1" comment="rust-gdb is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806774" version="1" comment="rust-lldb is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806775" version="1" comment="rust-src is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806776" version="1" comment="rust-std-static is &lt;1.66.1-2.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806777" version="1" comment="rust-std-static-wasm32-unknown-unknown is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806778" version="1" comment="rust-std-static-wasm32-wasi is &lt;1.66.1-2.el9_2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806779" version="1" comment="rust-toolset is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806780" version="1" comment="rustfmt is &lt;1.66.1-2.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811237" version="1" comment="curl is &lt;7.76.1-26.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811238" version="1" comment="curl-minimal is &lt;7.76.1-26.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811239" version="1" comment="libcurl is &lt;7.76.1-26.el9_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811240" version="1" comment="libcurl-devel is &lt;7.76.1-26.el9_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811241" version="1" comment="libcurl-minimal is &lt;7.76.1-26.el9_3.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807284" version="1" comment="nodejs is &lt;18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807285" version="1" comment="nodejs-devel is &lt;18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807286" version="1" comment="nodejs-docs is &lt;18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807287" version="1" comment="nodejs-full-i18n is &lt;18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807288" version="1" comment="npm is &lt;9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806852" version="1" comment="librsvg2 is &lt;2.50.7-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806853" version="1" comment="librsvg2-devel is &lt;2.50.7-1.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806854" version="1" comment="librsvg2-tools is &lt;2.50.7-1.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953701" version="1" comment="httpd is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953702" version="1" comment="httpd-core is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953703" version="1" comment="httpd-devel is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953704" version="1" comment="httpd-filesystem is &lt;2.4.62-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953705" version="1" comment="httpd-manual is &lt;2.4.62-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953706" version="1" comment="httpd-tools is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953707" version="1" comment="mod_ldap is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953708" version="1" comment="mod_lua is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953709" version="1" comment="mod_proxy_html is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953710" version="1" comment="mod_session is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953711" version="1" comment="mod_ssl is &lt;2.4.62-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811117" version="1" comment="libreswan is &lt;4.12-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806893" version="1" comment="frr is &lt;8.3.1-5.el9_2.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806894" version="1" comment="frr-selinux is &lt;8.3.1-5.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852098" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852367" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=7-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852368" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=6-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852369" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=5-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852099" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849459" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849122" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849123" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849124" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849125" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849126" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849127" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849128" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849129" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849130" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849131" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816439" version="1" comment="kernel-default is &lt;4.12.14-122.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849132" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849133" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849134" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849135" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849136" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849137" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849138" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849139" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849140" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849141" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816092" version="1" comment="kernel-default is &lt;5.3.18-150200.24.169.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849460" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849461" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849462" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849463" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849464" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849465" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849466" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849467" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849468" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849469" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849470" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845718" version="1" comment="kernel-default is &lt;5.3.18-150300.59.141.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849142" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849143" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849144" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849145" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849146" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849147" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849471" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849148" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849472" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849149" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849474" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849475" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849476" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849477" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053642" version="1" comment="delve is &lt;1.20.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053643" version="1" comment="go-toolset is &lt;1.20.10-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053644" version="1" comment="golang is &lt;1.20.10-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053645" version="1" comment="golang-bin is &lt;1.20.10-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053646" version="1" comment="golang-docs is &lt;1.20.10-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053647" version="1" comment="golang-misc is &lt;1.20.10-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053648" version="1" comment="golang-src is &lt;1.20.10-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053649" version="1" comment="golang-tests is &lt;1.20.10-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983915" version="1" comment="git-lfs is &lt;3.6.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807289" version="1" comment="grafana is &lt;9.0.9-4.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866624" version="1" comment="buildah is &lt;1.33.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866625" version="1" comment="buildah-tests is &lt;1.33.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866629" version="1" comment="containernetworking-plugins is &lt;1.4.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849886" version="1" comment="go-toolset is &lt;1.20.12-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849887" version="1" comment="golang is &lt;1.20.12-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849888" version="1" comment="golang-bin is &lt;1.20.12-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849889" version="1" comment="golang-docs is &lt;1.20.12-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849890" version="1" comment="golang-misc is &lt;1.20.12-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849891" version="1" comment="golang-src is &lt;1.20.12-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849892" version="1" comment="golang-tests is &lt;1.20.12-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867213" version="1" comment="podman is &lt;4.9.4-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867214" version="1" comment="podman-docker is &lt;4.9.4-0.1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867215" version="1" comment="podman-plugins is &lt;4.9.4-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867216" version="1" comment="podman-remote is &lt;4.9.4-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867217" version="1" comment="podman-tests is &lt;4.9.4-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850291" version="1" comment="skopeo is &lt;1.13.3-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850292" version="1" comment="skopeo-tests is &lt;1.13.3-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866516" version="1" comment="freerdp is &lt;2.11.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866517" version="1" comment="freerdp-devel is &lt;2.11.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866518" version="1" comment="freerdp-libs is &lt;2.11.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866519" version="1" comment="libwinpr is &lt;2.11.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866520" version="1" comment="libwinpr-devel is &lt;2.11.2-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816725" version="1" comment="postgresql is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816726" version="1" comment="postgresql-contrib is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816727" version="1" comment="postgresql-docs is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816728" version="1" comment="postgresql-plperl is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816729" version="1" comment="postgresql-plpython3 is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816730" version="1" comment="postgresql-pltcl is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816731" version="1" comment="postgresql-private-devel is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816732" version="1" comment="postgresql-private-libs is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816733" version="1" comment="postgresql-server is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816734" version="1" comment="postgresql-server-devel is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816735" version="1" comment="postgresql-static is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816736" version="1" comment="postgresql-test is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816737" version="1" comment="postgresql-test-rpm-macros is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816738" version="1" comment="postgresql-upgrade is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816739" version="1" comment="postgresql-upgrade-devel is &lt;15.5-1.module+el9.2.0.z+20667+a2d2a8a9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811203" version="1" comment="ctdb is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811204" version="1" comment="libnetapi is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811205" version="1" comment="libnetapi-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811206" version="1" comment="libsmbclient is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811207" version="1" comment="libsmbclient-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811208" version="1" comment="libwbclient is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811209" version="1" comment="libwbclient-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811210" version="1" comment="python3-samba is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811211" version="1" comment="python3-samba-dc is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811212" version="1" comment="python3-samba-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811213" version="1" comment="python3-samba-test is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811214" version="1" comment="samba is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811215" version="1" comment="samba-client is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811216" version="1" comment="samba-client-libs is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811217" version="1" comment="samba-common is &lt;4.18.6-101.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811218" version="1" comment="samba-common-libs is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811219" version="1" comment="samba-common-tools is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811220" version="1" comment="samba-dc-libs is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811221" version="1" comment="samba-dcerpc is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811222" version="1" comment="samba-devel is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811223" version="1" comment="samba-krb5-printing is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811224" version="1" comment="samba-ldb-ldap-modules is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811225" version="1" comment="samba-libs is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811226" version="1" comment="samba-pidl is &lt;4.18.6-101.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811227" version="1" comment="samba-test is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811228" version="1" comment="samba-test-libs is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811229" version="1" comment="samba-tools is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811230" version="1" comment="samba-usershares is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811231" version="1" comment="samba-vfs-iouring is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811232" version="1" comment="samba-winbind is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811233" version="1" comment="samba-winbind-clients is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811234" version="1" comment="samba-winbind-krb5-locator is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811235" version="1" comment="samba-winbind-modules is &lt;4.18.6-101.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811236" version="1" comment="samba-winexe is &lt;4.18.6-101.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816708" version="1" comment="libxml2 is &lt;2.9.13-5.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816709" version="1" comment="libxml2-devel is &lt;2.9.13-5.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816710" version="1" comment="python3-libxml2 is &lt;2.9.13-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811132" version="1" comment="libqb is &lt;2.0.6-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811133" version="1" comment="libqb-devel is &lt;2.0.6-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845912" version="1" comment="grub2-common is &lt;2.06-70.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845913" version="1" comment="grub2-efi-x64 is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845914" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845915" version="1" comment="grub2-efi-x64-modules is &lt;2.06-70.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845916" version="1" comment="grub2-pc is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845917" version="1" comment="grub2-pc-modules is &lt;2.06-70.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845918" version="1" comment="grub2-tools is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845919" version="1" comment="grub2-tools-efi is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845920" version="1" comment="grub2-tools-extra is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845921" version="1" comment="grub2-tools-minimal is &lt;2.06-70.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804110" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807706" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807707" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811182" version="1" comment="procps-ng is &lt;3.3.17-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811183" version="1" comment="procps-ng-devel is &lt;3.3.17-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811184" version="1" comment="procps-ng-i18n is &lt;3.3.17-13.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807145" version="1" comment="python-unversioned-command is &lt;3.9.16-1.el9_2.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807146" version="1" comment="python3 is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807147" version="1" comment="python3-debug is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807148" version="1" comment="python3-devel is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807149" version="1" comment="python3-idle is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807150" version="1" comment="python3-libs is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807151" version="1" comment="python3-test is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807152" version="1" comment="python3-tkinter is &lt;3.9.16-1.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807130" version="1" comment="python3.11 is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807131" version="1" comment="python3.11-debug is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807132" version="1" comment="python3.11-devel is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807133" version="1" comment="python3.11-idle is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807134" version="1" comment="python3.11-libs is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807135" version="1" comment="python3.11-test is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807136" version="1" comment="python3.11-tkinter is &lt;3.11.2-2.el9_2.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850289" version="1" comment="haproxy is &lt;2.4.22-3.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055874" version="1" comment="libxslt is &lt;1.1.34-14.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055875" version="1" comment="libxslt-devel is &lt;1.1.34-14.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806755" version="1" comment="firefox is &lt;102.14.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806756" version="1" comment="firefox-x11 is &lt;102.14.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866651" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.1-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866652" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.1-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806810" version="1" comment="firefox is &lt;102.15.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806811" version="1" comment="firefox-x11 is &lt;102.15.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806809" version="1" comment="thunderbird is &lt;102.15.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818054" version="1" comment="opensc is &lt;0.23.0-3.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956891" version="1" comment="redis is &lt;7.2.6-1.module+el9.5.0+22422+63e067d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956892" version="1" comment="redis-devel is &lt;7.2.6-1.module+el9.5.0+22422+63e067d8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956893" version="1" comment="redis-doc is &lt;7.2.6-1.module+el9.5.0+22422+63e067d8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053976" version="1" comment="redis is &lt;7.0.12-2.module+el9.3.0+21263+4e58afe8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053977" version="1" comment="redis-devel is &lt;7.0.12-2.module+el9.3.0+21263+4e58afe8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053978" version="1" comment="redis-doc is &lt;7.0.12-2.module+el9.3.0+21263+4e58afe8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849878" version="1" comment="tomcat is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849879" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849880" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849881" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849882" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849883" version="1" comment="tomcat-lib is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849884" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849885" version="1" comment="tomcat-webapps is &lt;9.0.62-37.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866720" version="1" comment="mod_jk is &lt;1.2.49-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866721" version="1" comment="mod_proxy_cluster is &lt;1.3.20-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807708" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807709" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866504" version="1" comment="pmix is &lt;3.2.3-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866505" version="1" comment="pmix-devel is &lt;3.2.3-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866506" version="1" comment="pmix-pmi is &lt;3.2.3-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866507" version="1" comment="pmix-pmi-devel is &lt;3.2.3-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866508" version="1" comment="pmix-tools is &lt;3.2.3-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851394" version="1" comment="bpftool is &lt;7.2.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851395" version="1" comment="kernel is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851396" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-362.24.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851397" version="1" comment="kernel-core is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851398" version="1" comment="kernel-cross-headers is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851399" version="1" comment="kernel-debug is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851400" version="1" comment="kernel-debug-core is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851403" version="1" comment="kernel-debug-modules is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851404" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851405" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851406" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851409" version="1" comment="kernel-doc is &lt;5.14.0-362.24.1.el9_3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851410" version="1" comment="kernel-headers is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851411" version="1" comment="kernel-modules is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851412" version="1" comment="kernel-modules-core is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851413" version="1" comment="kernel-modules-extra is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851414" version="1" comment="kernel-tools is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851415" version="1" comment="kernel-tools-libs is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851417" version="1" comment="kernel-uki-virt is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851418" version="1" comment="libperf is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851419" version="1" comment="perf is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851420" version="1" comment="python3-perf is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851421" version="1" comment="rtla is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851422" version="1" comment="rv is &lt;5.14.0-362.24.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799563" version="1" comment="kernel-default is &lt;5.3.18-150200.24.160.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799693" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799695" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854051" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854052" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854053" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854054" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854055" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854056" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854328" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804116" version="1" comment="kernel-default is &lt;5.3.18-150200.24.163.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854057" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854058" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854059" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854060" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854061" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854062" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854063" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816477" version="1" comment="kernel-default is &lt;5.3.18-150300.59.133.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854707" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854708" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854836" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854709" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854710" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854711" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854712" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854837" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849151" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853704" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=10-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854064" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=10-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854065" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854066" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854067" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854068" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953635" version="1" comment="webkit2gtk3 is &lt;2.44.3-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953636" version="1" comment="webkit2gtk3-devel is &lt;2.44.3-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953637" version="1" comment="webkit2gtk3-jsc is &lt;2.44.3-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953638" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.44.3-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948274" version="1" comment="webkit2gtk3 is &lt;2.46.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948275" version="1" comment="webkit2gtk3-devel is &lt;2.46.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948276" version="1" comment="webkit2gtk3-jsc is &lt;2.46.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948277" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811195" version="1" comment="ghostscript is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811196" version="1" comment="ghostscript-doc is &lt;9.54.0-14.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811197" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-14.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811198" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811199" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811200" version="1" comment="ghostscript-x11 is &lt;9.54.0-14.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811201" version="1" comment="libgs is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811202" version="1" comment="libgs-devel is &lt;9.54.0-14.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866716" version="1" comment="mod_http2 is &lt;2.0.26-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866485" version="1" comment="libX11 is &lt;1.7.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866486" version="1" comment="libX11-common is &lt;1.7.0-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866487" version="1" comment="libX11-devel is &lt;1.7.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866488" version="1" comment="libX11-xcb is &lt;1.7.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866489" version="1" comment="libXpm is &lt;3.5.13-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866490" version="1" comment="libXpm-devel is &lt;3.5.13-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866522" version="1" comment="motif is &lt;2.3.4-28.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866523" version="1" comment="motif-devel is &lt;2.3.4-28.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845159" version="1" comment="python3-urllib3 is &lt;1.26.5-3.el9_3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866491" version="1" comment="python3.11-urllib3 is &lt;1.26.12-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867223" version="1" comment="bind is &lt;9.16.23-18.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867224" version="1" comment="bind-chroot is &lt;9.16.23-18.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867225" version="1" comment="bind-devel is &lt;9.16.23-18.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867226" version="1" comment="bind-dnssec-doc is &lt;9.16.23-18.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867227" version="1" comment="bind-dnssec-utils is &lt;9.16.23-18.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867228" version="1" comment="bind-doc is &lt;9.16.23-18.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867229" version="1" comment="bind-dyndb-ldap is &lt;11.9-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867230" version="1" comment="bind-libs is &lt;9.16.23-18.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867231" version="1" comment="bind-license is &lt;9.16.23-18.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867232" version="1" comment="bind-utils is &lt;9.16.23-18.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867233" version="1" comment="python3-bind is &lt;9.16.23-18.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816825" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.1-2.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816826" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.1-2.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983961" version="1" comment="gimp is &lt;2.99.8-4.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983962" version="1" comment="gimp-libs is &lt;2.99.8-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807170" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807237" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053965" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807171" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807238" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053966" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807172" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807239" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053967" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053968" version="1" comment="dotnet-host is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807173" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807241" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053969" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807174" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807242" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053970" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807175" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.123-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807176" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.123-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807243" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.112-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807244" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.112-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053971" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.100~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053972" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.100~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807177" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.23-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807245" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.12-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053973" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.0~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807178" version="1" comment="dotnet-templates-6.0 is &lt;6.0.123-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807246" version="1" comment="dotnet-templates-7.0 is &lt;7.0.112-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053974" version="1" comment="dotnet-templates-8.0 is &lt;8.0.100~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811242" version="1" comment="libnghttp2 is &lt;1.43.0-5.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811243" version="1" comment="libnghttp2-devel is &lt;1.43.0-5.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053975" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.100~rc.2-0.1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811244" version="1" comment="nghttp2 is &lt;1.43.0-5.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053954" version="1" comment="nginx is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053955" version="1" comment="nginx-all-modules is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053956" version="1" comment="nginx-core is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053957" version="1" comment="nginx-filesystem is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053958" version="1" comment="nginx-mod-devel is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053959" version="1" comment="nginx-mod-http-image-filter is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053960" version="1" comment="nginx-mod-http-perl is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053961" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053962" version="1" comment="nginx-mod-mail is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053963" version="1" comment="nginx-mod-stream is &lt;1.22.1-5.module+el9.3.0.z+20438+032561a0 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807279" version="1" comment="nodejs-libs is &lt;16.20.2-3.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807318" version="1" comment="tomcat is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807319" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807320" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807321" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807322" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807323" version="1" comment="tomcat-lib is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807324" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807325" version="1" comment="tomcat-webapps is &lt;9.0.62-11.el9_2.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807290" version="1" comment="varnish is &lt;6.6.2-3.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807291" version="1" comment="varnish-devel is &lt;6.6.2-3.el9_2.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807292" version="1" comment="varnish-docs is &lt;6.6.2-3.el9_2.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808826" version="1" comment="firefox is &lt;115.4.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009808827" version="1" comment="firefox-x11 is &lt;115.4.0-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807158" version="1" comment="libvpx is &lt;1.9.0-7.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807159" version="1" comment="libvpx-devel is &lt;1.9.0-7.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009809033" version="1" comment="thunderbird is &lt;115.4.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851378" version="1" comment="edk2-ovmf is &lt;20230524-4.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851379" version="1" comment="edk2-tools is &lt;20230524-4.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851380" version="1" comment="edk2-tools-doc is &lt;20230524-4.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806915" version="1" comment="glibc is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806916" version="1" comment="glibc-all-langpacks is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806917" version="1" comment="glibc-benchtests is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806918" version="1" comment="glibc-common is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806919" version="1" comment="glibc-devel is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806920" version="1" comment="glibc-doc is &lt;2.34-60.el9_2.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806921" version="1" comment="glibc-gconv-extra is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806922" version="1" comment="glibc-headers is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806923" version="1" comment="glibc-langpack-aa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806924" version="1" comment="glibc-langpack-af is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806925" version="1" comment="glibc-langpack-agr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806926" version="1" comment="glibc-langpack-ak is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806927" version="1" comment="glibc-langpack-am is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806928" version="1" comment="glibc-langpack-an is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806929" version="1" comment="glibc-langpack-anp is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806930" version="1" comment="glibc-langpack-ar is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806931" version="1" comment="glibc-langpack-as is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806932" version="1" comment="glibc-langpack-ast is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806933" version="1" comment="glibc-langpack-ayc is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806934" version="1" comment="glibc-langpack-az is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806935" version="1" comment="glibc-langpack-be is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806936" version="1" comment="glibc-langpack-bem is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806937" version="1" comment="glibc-langpack-ber is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806938" version="1" comment="glibc-langpack-bg is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806939" version="1" comment="glibc-langpack-bhb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806940" version="1" comment="glibc-langpack-bho is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806941" version="1" comment="glibc-langpack-bi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806942" version="1" comment="glibc-langpack-bn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806943" version="1" comment="glibc-langpack-bo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806944" version="1" comment="glibc-langpack-br is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806945" version="1" comment="glibc-langpack-brx is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806946" version="1" comment="glibc-langpack-bs is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806947" version="1" comment="glibc-langpack-byn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806948" version="1" comment="glibc-langpack-ca is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806949" version="1" comment="glibc-langpack-ce is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806950" version="1" comment="glibc-langpack-chr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806951" version="1" comment="glibc-langpack-ckb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806952" version="1" comment="glibc-langpack-cmn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806953" version="1" comment="glibc-langpack-crh is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806954" version="1" comment="glibc-langpack-cs is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806955" version="1" comment="glibc-langpack-csb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806956" version="1" comment="glibc-langpack-cv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806957" version="1" comment="glibc-langpack-cy is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806958" version="1" comment="glibc-langpack-da is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806959" version="1" comment="glibc-langpack-de is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806960" version="1" comment="glibc-langpack-doi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806961" version="1" comment="glibc-langpack-dsb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806962" version="1" comment="glibc-langpack-dv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806963" version="1" comment="glibc-langpack-dz is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806964" version="1" comment="glibc-langpack-el is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806965" version="1" comment="glibc-langpack-en is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806966" version="1" comment="glibc-langpack-eo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806967" version="1" comment="glibc-langpack-es is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806968" version="1" comment="glibc-langpack-et is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806969" version="1" comment="glibc-langpack-eu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806970" version="1" comment="glibc-langpack-fa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806971" version="1" comment="glibc-langpack-ff is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806972" version="1" comment="glibc-langpack-fi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806973" version="1" comment="glibc-langpack-fil is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806974" version="1" comment="glibc-langpack-fo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806975" version="1" comment="glibc-langpack-fr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806976" version="1" comment="glibc-langpack-fur is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806977" version="1" comment="glibc-langpack-fy is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806978" version="1" comment="glibc-langpack-ga is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806979" version="1" comment="glibc-langpack-gd is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806980" version="1" comment="glibc-langpack-gez is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806981" version="1" comment="glibc-langpack-gl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806982" version="1" comment="glibc-langpack-gu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806983" version="1" comment="glibc-langpack-gv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806984" version="1" comment="glibc-langpack-ha is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806985" version="1" comment="glibc-langpack-hak is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806986" version="1" comment="glibc-langpack-he is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806987" version="1" comment="glibc-langpack-hi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806988" version="1" comment="glibc-langpack-hif is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806989" version="1" comment="glibc-langpack-hne is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806990" version="1" comment="glibc-langpack-hr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806991" version="1" comment="glibc-langpack-hsb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806992" version="1" comment="glibc-langpack-ht is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806993" version="1" comment="glibc-langpack-hu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806994" version="1" comment="glibc-langpack-hy is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806995" version="1" comment="glibc-langpack-ia is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806996" version="1" comment="glibc-langpack-id is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806997" version="1" comment="glibc-langpack-ig is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806998" version="1" comment="glibc-langpack-ik is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806999" version="1" comment="glibc-langpack-is is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807000" version="1" comment="glibc-langpack-it is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807001" version="1" comment="glibc-langpack-iu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807002" version="1" comment="glibc-langpack-ja is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807003" version="1" comment="glibc-langpack-ka is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807004" version="1" comment="glibc-langpack-kab is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807005" version="1" comment="glibc-langpack-kk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807006" version="1" comment="glibc-langpack-kl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807007" version="1" comment="glibc-langpack-km is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807008" version="1" comment="glibc-langpack-kn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807009" version="1" comment="glibc-langpack-ko is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807010" version="1" comment="glibc-langpack-kok is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807011" version="1" comment="glibc-langpack-ks is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807012" version="1" comment="glibc-langpack-ku is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807013" version="1" comment="glibc-langpack-kw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807014" version="1" comment="glibc-langpack-ky is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807015" version="1" comment="glibc-langpack-lb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807016" version="1" comment="glibc-langpack-lg is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807017" version="1" comment="glibc-langpack-li is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807018" version="1" comment="glibc-langpack-lij is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807019" version="1" comment="glibc-langpack-ln is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807020" version="1" comment="glibc-langpack-lo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807021" version="1" comment="glibc-langpack-lt is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807022" version="1" comment="glibc-langpack-lv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807023" version="1" comment="glibc-langpack-lzh is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807024" version="1" comment="glibc-langpack-mag is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807025" version="1" comment="glibc-langpack-mai is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807026" version="1" comment="glibc-langpack-mfe is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807027" version="1" comment="glibc-langpack-mg is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807028" version="1" comment="glibc-langpack-mhr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807029" version="1" comment="glibc-langpack-mi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807030" version="1" comment="glibc-langpack-miq is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807031" version="1" comment="glibc-langpack-mjw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807032" version="1" comment="glibc-langpack-mk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807033" version="1" comment="glibc-langpack-ml is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807034" version="1" comment="glibc-langpack-mn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807035" version="1" comment="glibc-langpack-mni is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807036" version="1" comment="glibc-langpack-mnw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807037" version="1" comment="glibc-langpack-mr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807038" version="1" comment="glibc-langpack-ms is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807039" version="1" comment="glibc-langpack-mt is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807040" version="1" comment="glibc-langpack-my is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807041" version="1" comment="glibc-langpack-nan is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807042" version="1" comment="glibc-langpack-nb is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807043" version="1" comment="glibc-langpack-nds is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807044" version="1" comment="glibc-langpack-ne is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807045" version="1" comment="glibc-langpack-nhn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807046" version="1" comment="glibc-langpack-niu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807047" version="1" comment="glibc-langpack-nl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807048" version="1" comment="glibc-langpack-nn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807049" version="1" comment="glibc-langpack-nr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807050" version="1" comment="glibc-langpack-nso is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807051" version="1" comment="glibc-langpack-oc is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807052" version="1" comment="glibc-langpack-om is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807053" version="1" comment="glibc-langpack-or is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807054" version="1" comment="glibc-langpack-os is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807055" version="1" comment="glibc-langpack-pa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807056" version="1" comment="glibc-langpack-pap is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807057" version="1" comment="glibc-langpack-pl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807058" version="1" comment="glibc-langpack-ps is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807059" version="1" comment="glibc-langpack-pt is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807060" version="1" comment="glibc-langpack-quz is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807061" version="1" comment="glibc-langpack-raj is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807062" version="1" comment="glibc-langpack-ro is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807063" version="1" comment="glibc-langpack-ru is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807064" version="1" comment="glibc-langpack-rw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807065" version="1" comment="glibc-langpack-sa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807066" version="1" comment="glibc-langpack-sah is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807067" version="1" comment="glibc-langpack-sat is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807068" version="1" comment="glibc-langpack-sc is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807069" version="1" comment="glibc-langpack-sd is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807070" version="1" comment="glibc-langpack-se is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807071" version="1" comment="glibc-langpack-sgs is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807072" version="1" comment="glibc-langpack-shn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807073" version="1" comment="glibc-langpack-shs is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807074" version="1" comment="glibc-langpack-si is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807075" version="1" comment="glibc-langpack-sid is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807076" version="1" comment="glibc-langpack-sk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807077" version="1" comment="glibc-langpack-sl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807078" version="1" comment="glibc-langpack-sm is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807079" version="1" comment="glibc-langpack-so is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807080" version="1" comment="glibc-langpack-sq is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807081" version="1" comment="glibc-langpack-sr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807082" version="1" comment="glibc-langpack-ss is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807083" version="1" comment="glibc-langpack-st is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807084" version="1" comment="glibc-langpack-sv is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807085" version="1" comment="glibc-langpack-sw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807086" version="1" comment="glibc-langpack-szl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807087" version="1" comment="glibc-langpack-ta is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807088" version="1" comment="glibc-langpack-tcy is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807089" version="1" comment="glibc-langpack-te is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807090" version="1" comment="glibc-langpack-tg is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807091" version="1" comment="glibc-langpack-th is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807092" version="1" comment="glibc-langpack-the is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807093" version="1" comment="glibc-langpack-ti is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807094" version="1" comment="glibc-langpack-tig is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807095" version="1" comment="glibc-langpack-tk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807096" version="1" comment="glibc-langpack-tl is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807097" version="1" comment="glibc-langpack-tn is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807098" version="1" comment="glibc-langpack-to is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807099" version="1" comment="glibc-langpack-tpi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807100" version="1" comment="glibc-langpack-tr is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807101" version="1" comment="glibc-langpack-ts is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807102" version="1" comment="glibc-langpack-tt is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807103" version="1" comment="glibc-langpack-ug is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807104" version="1" comment="glibc-langpack-uk is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807105" version="1" comment="glibc-langpack-unm is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807106" version="1" comment="glibc-langpack-ur is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807107" version="1" comment="glibc-langpack-uz is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807108" version="1" comment="glibc-langpack-ve is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807109" version="1" comment="glibc-langpack-vi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807110" version="1" comment="glibc-langpack-wa is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807111" version="1" comment="glibc-langpack-wae is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807112" version="1" comment="glibc-langpack-wal is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807113" version="1" comment="glibc-langpack-wo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807114" version="1" comment="glibc-langpack-xh is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807115" version="1" comment="glibc-langpack-yi is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807116" version="1" comment="glibc-langpack-yo is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807117" version="1" comment="glibc-langpack-yue is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807118" version="1" comment="glibc-langpack-yuw is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807119" version="1" comment="glibc-langpack-zh is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807120" version="1" comment="glibc-langpack-zu is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807121" version="1" comment="glibc-locale-source is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807122" version="1" comment="glibc-minimal-langpack is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807123" version="1" comment="glibc-nss-devel is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807124" version="1" comment="glibc-static is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807125" version="1" comment="glibc-utils is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807126" version="1" comment="libnsl is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807127" version="1" comment="nscd is &lt;2.34-60.el9_2.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807128" version="1" comment="nss_db is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807129" version="1" comment="nss_hesiod is &lt;2.34-60.el9_2.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868530" version="1" comment="skopeo is &lt;1.14.3-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868531" version="1" comment="skopeo-tests is &lt;1.14.3-0.1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866780" version="1" comment="git-lfs is &lt;3.4.1-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866758" version="1" comment="go-toolset is &lt;1.21.9-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866759" version="1" comment="golang is &lt;1.21.9-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866760" version="1" comment="golang-bin is &lt;1.21.9-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866761" version="1" comment="golang-docs is &lt;1.21.9-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866762" version="1" comment="golang-misc is &lt;1.21.9-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866763" version="1" comment="golang-src is &lt;1.21.9-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866764" version="1" comment="golang-tests is &lt;1.21.9-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867063" version="1" comment="buildah is &lt;1.33.7-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867064" version="1" comment="buildah-tests is &lt;1.33.7-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872568" version="1" comment="containernetworking-plugins is &lt;1.4.0-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869921" version="1" comment="gvisor-tap-vsock is &lt;0.7.3-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867234" version="1" comment="podman is &lt;4.9.4-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867235" version="1" comment="podman-docker is &lt;4.9.4-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867236" version="1" comment="podman-plugins is &lt;4.9.4-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867237" version="1" comment="podman-remote is &lt;4.9.4-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867238" version="1" comment="podman-tests is &lt;4.9.4-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866430" version="1" comment="fence-agents-aliyun is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866431" version="1" comment="fence-agents-all is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866432" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866433" version="1" comment="fence-agents-apc is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866434" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866435" version="1" comment="fence-agents-aws is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866436" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866437" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866438" version="1" comment="fence-agents-brocade is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866439" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866440" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866441" version="1" comment="fence-agents-common is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866442" version="1" comment="fence-agents-compute is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866443" version="1" comment="fence-agents-drac5 is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866444" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866445" version="1" comment="fence-agents-emerson is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866446" version="1" comment="fence-agents-eps is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866447" version="1" comment="fence-agents-gce is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866448" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866449" version="1" comment="fence-agents-hpblade is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866450" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866451" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866452" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866453" version="1" comment="fence-agents-ifmib is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866454" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866455" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866456" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866457" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866458" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866459" version="1" comment="fence-agents-ipdu is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866460" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866461" version="1" comment="fence-agents-kdump is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866462" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866463" version="1" comment="fence-agents-mpath is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866464" version="1" comment="fence-agents-openstack is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866465" version="1" comment="fence-agents-redfish is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866466" version="1" comment="fence-agents-rhevm is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866467" version="1" comment="fence-agents-rsa is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866468" version="1" comment="fence-agents-rsb is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866469" version="1" comment="fence-agents-sbd is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866470" version="1" comment="fence-agents-scsi is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866471" version="1" comment="fence-agents-virsh is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866472" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866473" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866474" version="1" comment="fence-agents-wti is &lt;4.10.0-62.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866475" version="1" comment="fence-virt is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866476" version="1" comment="fence-virtd is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866477" version="1" comment="fence-virtd-cpg is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866478" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866479" version="1" comment="fence-virtd-multicast is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866480" version="1" comment="fence-virtd-serial is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866481" version="1" comment="fence-virtd-tcp is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866482" version="1" comment="ha-cloud-support is &lt;4.10.0-62.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958547" version="1" comment="python3.11-urllib3 is &lt;1.26.12-2.el9_5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866728" version="1" comment="exfatprogs is &lt;1.2.2-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849945" version="1" comment="curl is &lt;7.76.1-26.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849946" version="1" comment="curl-minimal is &lt;7.76.1-26.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849947" version="1" comment="libcurl is &lt;7.76.1-26.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849948" version="1" comment="libcurl-devel is &lt;7.76.1-26.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849949" version="1" comment="libcurl-minimal is &lt;7.76.1-26.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816127" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816128" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816471" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816472" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816473" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816129" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816130" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816474" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816131" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816132" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816133" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807352" version="1" comment="kernel-default is &lt;4.12.14-122.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816475" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816476" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816134" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816135" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816136" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816137" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816138" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816139" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816140" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803255" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807710" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807711" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807712" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807713" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807714" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807715" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807716" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803410" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807717" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804111" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807361" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804112" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807718" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807362" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=9-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804113" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807363" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807364" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807365" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807719" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804114" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804115" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807721" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807723" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819673" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872202" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819674" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872203" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819675" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872204" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819676" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872205" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819677" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872206" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819678" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.126-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819679" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.126-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872207" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.116-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872208" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.116-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819680" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.26-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872209" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.16-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819681" version="1" comment="dotnet-templates-6.0 is &lt;6.0.126-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872210" version="1" comment="dotnet-templates-7.0 is &lt;7.0.116-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866744" version="1" comment="traceroute is &lt;2.1.0-18.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811167" version="1" comment="shadow-utils is &lt;4.9-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811168" version="1" comment="shadow-utils-subid is &lt;4.9-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811169" version="1" comment="shadow-utils-subid-devel is &lt;4.9-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851381" version="1" comment="tomcat is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851382" version="1" comment="tomcat-admin-webapps is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851383" version="1" comment="tomcat-docs-webapp is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851384" version="1" comment="tomcat-el-3.0-api is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851385" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851386" version="1" comment="tomcat-lib is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851387" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851388" version="1" comment="tomcat-webapps is &lt;9.0.62-37.el9_3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819046" version="1" comment="squid is &lt;5.5-6.el9_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983964" version="1" comment="ghostscript is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983965" version="1" comment="ghostscript-doc is &lt;9.54.0-18.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983966" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983967" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983968" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983969" version="1" comment="ghostscript-x11 is &lt;9.54.0-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983970" version="1" comment="libgs is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983971" version="1" comment="libgs-devel is &lt;9.54.0-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853717" version="1" comment="nodejs is &lt;20.11.1-1.module+el9.3.0+21385+bac43d5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853718" version="1" comment="nodejs-devel is &lt;20.11.1-1.module+el9.3.0+21385+bac43d5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853719" version="1" comment="nodejs-docs is &lt;20.11.1-1.module+el9.3.0+21385+bac43d5a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853720" version="1" comment="nodejs-full-i18n is &lt;20.11.1-1.module+el9.3.0+21385+bac43d5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853721" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.3.0.z+20478+84a9f781 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853722" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.3.0+19518+63aad52d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853723" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.3.0+19518+63aad52d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853724" version="1" comment="npm is &lt;10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852602" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852603" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852604" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852605" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852606" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852607" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852608" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852609" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852610" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811245" version="1" comment="squid is &lt;5.5-6.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872294" version="1" comment="grub2-common is &lt;2.06-77.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872295" version="1" comment="grub2-efi-x64 is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872296" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872297" version="1" comment="grub2-efi-x64-modules is &lt;2.06-77.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872298" version="1" comment="grub2-pc is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872299" version="1" comment="grub2-pc-modules is &lt;2.06-77.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872300" version="1" comment="grub2-tools is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872301" version="1" comment="grub2-tools-efi is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872302" version="1" comment="grub2-tools-extra is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872303" version="1" comment="grub2-tools-minimal is &lt;2.06-77.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866524" version="1" comment="perl is &lt;5.32.1-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866525" version="1" comment="perl-Attribute-Handlers is &lt;1.01-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866526" version="1" comment="perl-AutoLoader is &lt;5.74-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866527" version="1" comment="perl-AutoSplit is &lt;5.74-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866528" version="1" comment="perl-B is &lt;1.80-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866529" version="1" comment="perl-Benchmark is &lt;1.23-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866530" version="1" comment="perl-Class-Struct is &lt;0.66-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866531" version="1" comment="perl-Config-Extensions is &lt;0.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866532" version="1" comment="perl-DBM_Filter is &lt;0.06-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866533" version="1" comment="perl-Devel-Peek is &lt;1.28-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866534" version="1" comment="perl-Devel-SelfStubber is &lt;1.06-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866535" version="1" comment="perl-DirHandle is &lt;1.05-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866536" version="1" comment="perl-Dumpvalue is &lt;2.27-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866537" version="1" comment="perl-DynaLoader is &lt;1.47-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866538" version="1" comment="perl-English is &lt;1.11-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866539" version="1" comment="perl-Errno is &lt;1.30-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866540" version="1" comment="perl-ExtUtils-Constant is &lt;0.25-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866541" version="1" comment="perl-ExtUtils-Embed is &lt;1.35-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866542" version="1" comment="perl-ExtUtils-Miniperl is &lt;1.09-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866543" version="1" comment="perl-Fcntl is &lt;1.13-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866544" version="1" comment="perl-File-Basename is &lt;2.85-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866545" version="1" comment="perl-File-Compare is &lt;1.100.600-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866546" version="1" comment="perl-File-Copy is &lt;2.34-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866547" version="1" comment="perl-File-DosGlob is &lt;1.12-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866548" version="1" comment="perl-File-Find is &lt;1.37-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866549" version="1" comment="perl-File-stat is &lt;1.09-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866550" version="1" comment="perl-FileCache is &lt;1.10-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866551" version="1" comment="perl-FileHandle is &lt;2.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866552" version="1" comment="perl-FindBin is &lt;1.51-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866553" version="1" comment="perl-GDBM_File is &lt;1.18-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866554" version="1" comment="perl-Getopt-Std is &lt;1.12-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866555" version="1" comment="perl-Hash-Util is &lt;0.23-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866556" version="1" comment="perl-Hash-Util-FieldHash is &lt;1.20-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866557" version="1" comment="perl-I18N-Collate is &lt;1.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866558" version="1" comment="perl-I18N-LangTags is &lt;0.44-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866559" version="1" comment="perl-I18N-Langinfo is &lt;0.19-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866560" version="1" comment="perl-IO is &lt;1.43-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866561" version="1" comment="perl-IPC-Open3 is &lt;1.21-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866562" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866563" version="1" comment="perl-Math-Complex is &lt;1.59-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866564" version="1" comment="perl-Memoize is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866565" version="1" comment="perl-Module-Loaded is &lt;0.08-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866566" version="1" comment="perl-NDBM_File is &lt;1.15-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866567" version="1" comment="perl-NEXT is &lt;0.67-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866568" version="1" comment="perl-Net is &lt;1.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866569" version="1" comment="perl-ODBM_File is &lt;1.16-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866570" version="1" comment="perl-Opcode is &lt;1.48-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866571" version="1" comment="perl-POSIX is &lt;1.94-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866572" version="1" comment="perl-Pod-Functions is &lt;1.13-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866573" version="1" comment="perl-Pod-Html is &lt;1.25-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866574" version="1" comment="perl-Safe is &lt;2.41-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866575" version="1" comment="perl-Search-Dict is &lt;1.07-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866576" version="1" comment="perl-SelectSaver is &lt;1.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866577" version="1" comment="perl-SelfLoader is &lt;1.26-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866578" version="1" comment="perl-Symbol is &lt;1.08-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866579" version="1" comment="perl-Sys-Hostname is &lt;1.23-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866580" version="1" comment="perl-Term-Complete is &lt;1.403-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866581" version="1" comment="perl-Term-ReadLine is &lt;1.17-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866582" version="1" comment="perl-Test is &lt;1.31-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866583" version="1" comment="perl-Text-Abbrev is &lt;1.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866584" version="1" comment="perl-Thread is &lt;3.05-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866585" version="1" comment="perl-Thread-Semaphore is &lt;2.13-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866586" version="1" comment="perl-Tie is &lt;4.6-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866587" version="1" comment="perl-Tie-File is &lt;1.06-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866588" version="1" comment="perl-Tie-Memoize is &lt;1.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866589" version="1" comment="perl-Time is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866590" version="1" comment="perl-Time-Piece is &lt;1.3401-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866591" version="1" comment="perl-Unicode-UCD is &lt;0.75-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866592" version="1" comment="perl-User-pwent is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866593" version="1" comment="perl-autouse is &lt;1.11-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866594" version="1" comment="perl-base is &lt;2.27-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866595" version="1" comment="perl-blib is &lt;1.07-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866596" version="1" comment="perl-debugger is &lt;1.56-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866597" version="1" comment="perl-deprecate is &lt;0.04-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866598" version="1" comment="perl-devel is &lt;5.32.1-481.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866599" version="1" comment="perl-diagnostics is &lt;1.37-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866600" version="1" comment="perl-doc is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866601" version="1" comment="perl-encoding-warnings is &lt;0.13-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866602" version="1" comment="perl-fields is &lt;2.27-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866603" version="1" comment="perl-filetest is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866604" version="1" comment="perl-if is &lt;0.60.800-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866605" version="1" comment="perl-interpreter is &lt;5.32.1-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866606" version="1" comment="perl-less is &lt;0.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866607" version="1" comment="perl-lib is &lt;0.65-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866608" version="1" comment="perl-libnetcfg is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866609" version="1" comment="perl-libs is &lt;5.32.1-481.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866610" version="1" comment="perl-locale is &lt;1.09-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866611" version="1" comment="perl-macros is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866612" version="1" comment="perl-meta-notation is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866613" version="1" comment="perl-mro is &lt;1.23-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866614" version="1" comment="perl-open is &lt;1.12-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866615" version="1" comment="perl-overload is &lt;1.31-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866616" version="1" comment="perl-overloading is &lt;0.02-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866617" version="1" comment="perl-ph is &lt;5.32.1-481.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866618" version="1" comment="perl-sigtrap is &lt;1.09-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866619" version="1" comment="perl-sort is &lt;2.04-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866620" version="1" comment="perl-subs is &lt;1.03-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866621" version="1" comment="perl-utils is &lt;5.32.1-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866622" version="1" comment="perl-vars is &lt;1.05-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866623" version="1" comment="perl-vmsish is &lt;1.04-481.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870170" version="1" comment="idm-pki-acme is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870171" version="1" comment="idm-pki-base is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870172" version="1" comment="idm-pki-ca is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870173" version="1" comment="idm-pki-est is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870174" version="1" comment="idm-pki-java is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870175" version="1" comment="idm-pki-kra is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870176" version="1" comment="idm-pki-server is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870177" version="1" comment="idm-pki-tools is &lt;11.5.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870178" version="1" comment="python3-idm-pki is &lt;11.5.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984036" version="1" comment="vim-X11 is &lt;8.2.2637-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984037" version="1" comment="vim-common is &lt;8.2.2637-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984038" version="1" comment="vim-enhanced is &lt;8.2.2637-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984039" version="1" comment="vim-filesystem is &lt;8.2.2637-22.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984040" version="1" comment="vim-minimal is &lt;8.2.2637-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053660" version="1" comment="glibc is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053661" version="1" comment="glibc-all-langpacks is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053662" version="1" comment="glibc-benchtests is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053663" version="1" comment="glibc-common is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053664" version="1" comment="glibc-devel is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053665" version="1" comment="glibc-doc is &lt;2.34-100.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053666" version="1" comment="glibc-gconv-extra is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053667" version="1" comment="glibc-headers is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053668" version="1" comment="glibc-langpack-aa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053669" version="1" comment="glibc-langpack-af is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053670" version="1" comment="glibc-langpack-agr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053671" version="1" comment="glibc-langpack-ak is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053672" version="1" comment="glibc-langpack-am is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053673" version="1" comment="glibc-langpack-an is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053674" version="1" comment="glibc-langpack-anp is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053675" version="1" comment="glibc-langpack-ar is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053676" version="1" comment="glibc-langpack-as is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053677" version="1" comment="glibc-langpack-ast is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053678" version="1" comment="glibc-langpack-ayc is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053679" version="1" comment="glibc-langpack-az is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053680" version="1" comment="glibc-langpack-be is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053681" version="1" comment="glibc-langpack-bem is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053682" version="1" comment="glibc-langpack-ber is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053683" version="1" comment="glibc-langpack-bg is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053684" version="1" comment="glibc-langpack-bhb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053685" version="1" comment="glibc-langpack-bho is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053686" version="1" comment="glibc-langpack-bi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053687" version="1" comment="glibc-langpack-bn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053688" version="1" comment="glibc-langpack-bo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053689" version="1" comment="glibc-langpack-br is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053690" version="1" comment="glibc-langpack-brx is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053691" version="1" comment="glibc-langpack-bs is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053692" version="1" comment="glibc-langpack-byn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053693" version="1" comment="glibc-langpack-ca is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053694" version="1" comment="glibc-langpack-ce is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053695" version="1" comment="glibc-langpack-chr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053696" version="1" comment="glibc-langpack-ckb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053697" version="1" comment="glibc-langpack-cmn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053698" version="1" comment="glibc-langpack-crh is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053699" version="1" comment="glibc-langpack-cs is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053700" version="1" comment="glibc-langpack-csb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053701" version="1" comment="glibc-langpack-cv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053702" version="1" comment="glibc-langpack-cy is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053703" version="1" comment="glibc-langpack-da is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053704" version="1" comment="glibc-langpack-de is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053705" version="1" comment="glibc-langpack-doi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053706" version="1" comment="glibc-langpack-dsb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053707" version="1" comment="glibc-langpack-dv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053708" version="1" comment="glibc-langpack-dz is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053709" version="1" comment="glibc-langpack-el is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053710" version="1" comment="glibc-langpack-en is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053711" version="1" comment="glibc-langpack-eo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053712" version="1" comment="glibc-langpack-es is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053713" version="1" comment="glibc-langpack-et is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053714" version="1" comment="glibc-langpack-eu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053715" version="1" comment="glibc-langpack-fa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053716" version="1" comment="glibc-langpack-ff is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053717" version="1" comment="glibc-langpack-fi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053718" version="1" comment="glibc-langpack-fil is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053719" version="1" comment="glibc-langpack-fo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053720" version="1" comment="glibc-langpack-fr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053721" version="1" comment="glibc-langpack-fur is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053722" version="1" comment="glibc-langpack-fy is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053723" version="1" comment="glibc-langpack-ga is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053724" version="1" comment="glibc-langpack-gd is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053725" version="1" comment="glibc-langpack-gez is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053726" version="1" comment="glibc-langpack-gl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053727" version="1" comment="glibc-langpack-gu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053728" version="1" comment="glibc-langpack-gv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053729" version="1" comment="glibc-langpack-ha is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053730" version="1" comment="glibc-langpack-hak is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053731" version="1" comment="glibc-langpack-he is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053732" version="1" comment="glibc-langpack-hi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053733" version="1" comment="glibc-langpack-hif is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053734" version="1" comment="glibc-langpack-hne is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053735" version="1" comment="glibc-langpack-hr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053736" version="1" comment="glibc-langpack-hsb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053737" version="1" comment="glibc-langpack-ht is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053738" version="1" comment="glibc-langpack-hu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053739" version="1" comment="glibc-langpack-hy is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053740" version="1" comment="glibc-langpack-ia is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053741" version="1" comment="glibc-langpack-id is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053742" version="1" comment="glibc-langpack-ig is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053743" version="1" comment="glibc-langpack-ik is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053744" version="1" comment="glibc-langpack-is is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053745" version="1" comment="glibc-langpack-it is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053746" version="1" comment="glibc-langpack-iu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053747" version="1" comment="glibc-langpack-ja is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053748" version="1" comment="glibc-langpack-ka is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053749" version="1" comment="glibc-langpack-kab is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053750" version="1" comment="glibc-langpack-kk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053751" version="1" comment="glibc-langpack-kl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053752" version="1" comment="glibc-langpack-km is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053753" version="1" comment="glibc-langpack-kn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053754" version="1" comment="glibc-langpack-ko is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053755" version="1" comment="glibc-langpack-kok is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053756" version="1" comment="glibc-langpack-ks is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053757" version="1" comment="glibc-langpack-ku is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053758" version="1" comment="glibc-langpack-kw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053759" version="1" comment="glibc-langpack-ky is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053760" version="1" comment="glibc-langpack-lb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053761" version="1" comment="glibc-langpack-lg is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053762" version="1" comment="glibc-langpack-li is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053763" version="1" comment="glibc-langpack-lij is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053764" version="1" comment="glibc-langpack-ln is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053765" version="1" comment="glibc-langpack-lo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053766" version="1" comment="glibc-langpack-lt is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053767" version="1" comment="glibc-langpack-lv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053768" version="1" comment="glibc-langpack-lzh is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053769" version="1" comment="glibc-langpack-mag is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053770" version="1" comment="glibc-langpack-mai is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053771" version="1" comment="glibc-langpack-mfe is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053772" version="1" comment="glibc-langpack-mg is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053773" version="1" comment="glibc-langpack-mhr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053774" version="1" comment="glibc-langpack-mi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053775" version="1" comment="glibc-langpack-miq is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053776" version="1" comment="glibc-langpack-mjw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053777" version="1" comment="glibc-langpack-mk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053778" version="1" comment="glibc-langpack-ml is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053779" version="1" comment="glibc-langpack-mn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053780" version="1" comment="glibc-langpack-mni is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053781" version="1" comment="glibc-langpack-mnw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053782" version="1" comment="glibc-langpack-mr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053783" version="1" comment="glibc-langpack-ms is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053784" version="1" comment="glibc-langpack-mt is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053785" version="1" comment="glibc-langpack-my is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053786" version="1" comment="glibc-langpack-nan is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053787" version="1" comment="glibc-langpack-nb is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053788" version="1" comment="glibc-langpack-nds is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053789" version="1" comment="glibc-langpack-ne is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053790" version="1" comment="glibc-langpack-nhn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053791" version="1" comment="glibc-langpack-niu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053792" version="1" comment="glibc-langpack-nl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053793" version="1" comment="glibc-langpack-nn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053794" version="1" comment="glibc-langpack-nr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053795" version="1" comment="glibc-langpack-nso is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053796" version="1" comment="glibc-langpack-oc is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053797" version="1" comment="glibc-langpack-om is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053798" version="1" comment="glibc-langpack-or is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053799" version="1" comment="glibc-langpack-os is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053800" version="1" comment="glibc-langpack-pa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053801" version="1" comment="glibc-langpack-pap is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053802" version="1" comment="glibc-langpack-pl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053803" version="1" comment="glibc-langpack-ps is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053804" version="1" comment="glibc-langpack-pt is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053805" version="1" comment="glibc-langpack-quz is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053806" version="1" comment="glibc-langpack-raj is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053807" version="1" comment="glibc-langpack-ro is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053808" version="1" comment="glibc-langpack-ru is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053809" version="1" comment="glibc-langpack-rw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053810" version="1" comment="glibc-langpack-sa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053811" version="1" comment="glibc-langpack-sah is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053812" version="1" comment="glibc-langpack-sat is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053813" version="1" comment="glibc-langpack-sc is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053814" version="1" comment="glibc-langpack-sd is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053815" version="1" comment="glibc-langpack-se is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053816" version="1" comment="glibc-langpack-sgs is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053817" version="1" comment="glibc-langpack-shn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053818" version="1" comment="glibc-langpack-shs is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053819" version="1" comment="glibc-langpack-si is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053820" version="1" comment="glibc-langpack-sid is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053821" version="1" comment="glibc-langpack-sk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053822" version="1" comment="glibc-langpack-sl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053823" version="1" comment="glibc-langpack-sm is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053824" version="1" comment="glibc-langpack-so is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053825" version="1" comment="glibc-langpack-sq is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053826" version="1" comment="glibc-langpack-sr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053827" version="1" comment="glibc-langpack-ss is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053828" version="1" comment="glibc-langpack-st is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053829" version="1" comment="glibc-langpack-sv is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053830" version="1" comment="glibc-langpack-sw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053831" version="1" comment="glibc-langpack-szl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053832" version="1" comment="glibc-langpack-ta is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053833" version="1" comment="glibc-langpack-tcy is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053834" version="1" comment="glibc-langpack-te is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053835" version="1" comment="glibc-langpack-tg is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053836" version="1" comment="glibc-langpack-th is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053837" version="1" comment="glibc-langpack-the is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053838" version="1" comment="glibc-langpack-ti is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053839" version="1" comment="glibc-langpack-tig is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053840" version="1" comment="glibc-langpack-tk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053841" version="1" comment="glibc-langpack-tl is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053842" version="1" comment="glibc-langpack-tn is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053843" version="1" comment="glibc-langpack-to is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053844" version="1" comment="glibc-langpack-tpi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053845" version="1" comment="glibc-langpack-tr is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053846" version="1" comment="glibc-langpack-ts is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053847" version="1" comment="glibc-langpack-tt is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053848" version="1" comment="glibc-langpack-ug is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053849" version="1" comment="glibc-langpack-uk is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053850" version="1" comment="glibc-langpack-unm is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053851" version="1" comment="glibc-langpack-ur is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053852" version="1" comment="glibc-langpack-uz is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053853" version="1" comment="glibc-langpack-ve is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053854" version="1" comment="glibc-langpack-vi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053855" version="1" comment="glibc-langpack-wa is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053856" version="1" comment="glibc-langpack-wae is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053857" version="1" comment="glibc-langpack-wal is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053858" version="1" comment="glibc-langpack-wo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053859" version="1" comment="glibc-langpack-xh is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053860" version="1" comment="glibc-langpack-yi is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053861" version="1" comment="glibc-langpack-yo is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053862" version="1" comment="glibc-langpack-yue is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053863" version="1" comment="glibc-langpack-yuw is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053864" version="1" comment="glibc-langpack-zh is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053865" version="1" comment="glibc-langpack-zu is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053866" version="1" comment="glibc-locale-source is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053867" version="1" comment="glibc-minimal-langpack is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053868" version="1" comment="glibc-nss-devel is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053869" version="1" comment="glibc-static is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053870" version="1" comment="glibc-utils is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053871" version="1" comment="libnsl is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053872" version="1" comment="nscd is &lt;2.34-100.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053873" version="1" comment="nss_db is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053874" version="1" comment="nss_hesiod is &lt;2.34-100.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947853" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947854" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947855" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947856" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.432.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947857" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947858" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947859" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947860" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947861" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947862" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947863" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947864" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947865" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947866" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947867" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.432.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947868" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.432.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947869" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947870" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947871" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947872" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.432.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947743" version="1" comment="java-11-openjdk is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947744" version="1" comment="java-11-openjdk-demo is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947745" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947746" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947747" version="1" comment="java-11-openjdk-devel is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947748" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947749" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947750" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947751" version="1" comment="java-11-openjdk-headless is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947752" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947753" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947754" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947755" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947756" version="1" comment="java-11-openjdk-jmods is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947757" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947758" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947759" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947760" version="1" comment="java-11-openjdk-src is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947761" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947762" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947763" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947764" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947765" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.25.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947873" version="1" comment="java-17-openjdk is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947874" version="1" comment="java-17-openjdk-demo is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947875" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947876" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947877" version="1" comment="java-17-openjdk-devel is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947878" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947879" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947880" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947881" version="1" comment="java-17-openjdk-headless is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947882" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947883" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947884" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947885" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947886" version="1" comment="java-17-openjdk-jmods is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947887" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947888" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947889" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947890" version="1" comment="java-17-openjdk-src is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947891" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947892" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947893" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947894" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947895" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.13.0.11-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948242" version="1" comment="java-21-openjdk is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948243" version="1" comment="java-21-openjdk-demo is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948244" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948245" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948246" version="1" comment="java-21-openjdk-devel is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948247" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948248" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948249" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948250" version="1" comment="java-21-openjdk-headless is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948251" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948252" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948253" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948254" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948255" version="1" comment="java-21-openjdk-jmods is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948256" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948257" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948258" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948259" version="1" comment="java-21-openjdk-src is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948260" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948261" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948262" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948263" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948264" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.5.0.10-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806895" version="1" comment="firefox is &lt;102.15.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806896" version="1" comment="firefox-x11 is &lt;102.15.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806897" version="1" comment="libwebp is &lt;1.2.0-7.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806898" version="1" comment="libwebp-devel is &lt;1.2.0-7.el9_2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806899" version="1" comment="libwebp-tools is &lt;1.2.0-7.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009806900" version="1" comment="thunderbird is &lt;102.15.1-1.el9_2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866656" version="1" comment="mutt is &lt;2.2.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850293" version="1" comment="buildah is &lt;1.31.4-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850294" version="1" comment="buildah-tests is &lt;1.31.4-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053650" version="1" comment="libssh is &lt;0.10.4-12.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053651" version="1" comment="libssh-config is &lt;0.10.4-12.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053652" version="1" comment="libssh-devel is &lt;0.10.4-12.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850276" version="1" comment="openssh is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850277" version="1" comment="openssh-askpass is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850278" version="1" comment="openssh-clients is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850279" version="1" comment="openssh-keycat is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850280" version="1" comment="openssh-server is &lt;8.7p1-34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850281" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.34.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053653" version="1" comment="podman is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053654" version="1" comment="podman-docker is &lt;4.6.1-8.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053655" version="1" comment="podman-gvproxy is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053656" version="1" comment="podman-plugins is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053657" version="1" comment="podman-remote is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053658" version="1" comment="podman-tests is &lt;4.6.1-8.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018283" version="1" comment="python3-cryptography is &lt;36.0.1-5.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866681" version="1" comment="python3.11-cryptography is &lt;37.0.2-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849150" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849478" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813389" version="1" comment="squid is &lt;5.5-6.el9_3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851786" version="1" comment="squid is &lt;5.5-6.el9_3.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851423" version="1" comment="dnsmasq is &lt;2.85-14.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851424" version="1" comment="dnsmasq-utils is &lt;2.85-14.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849202" version="1" comment="python3-unbound is &lt;1.16.2-3.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849203" version="1" comment="unbound is &lt;1.16.2-3.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849204" version="1" comment="unbound-devel is &lt;1.16.2-3.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849205" version="1" comment="unbound-libs is &lt;1.16.2-3.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818847" version="1" comment="thunderbird is &lt;115.6.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870083" version="1" comment="bpftool is &lt;7.3.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870084" version="1" comment="kernel is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870085" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.16.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870086" version="1" comment="kernel-core is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870087" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870088" version="1" comment="kernel-debug is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870089" version="1" comment="kernel-debug-core is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870092" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870093" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870094" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870095" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870098" version="1" comment="kernel-doc is &lt;5.14.0-427.16.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870099" version="1" comment="kernel-headers is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870100" version="1" comment="kernel-modules is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870101" version="1" comment="kernel-modules-core is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870102" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870103" version="1" comment="kernel-tools is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870104" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870106" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870107" version="1" comment="libperf is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870108" version="1" comment="perf is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870109" version="1" comment="python3-perf is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870110" version="1" comment="rtla is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870111" version="1" comment="rv is &lt;5.14.0-427.16.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953653" version="1" comment="jose is &lt;14-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953654" version="1" comment="libjose is &lt;14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953655" version="1" comment="libjose-devel is &lt;14-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866630" version="1" comment="qt5-qtbase is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866631" version="1" comment="qt5-qtbase-common is &lt;5.15.9-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866632" version="1" comment="qt5-qtbase-devel is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866633" version="1" comment="qt5-qtbase-examples is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866634" version="1" comment="qt5-qtbase-gui is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866635" version="1" comment="qt5-qtbase-mysql is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866636" version="1" comment="qt5-qtbase-odbc is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866637" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866638" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866639" version="1" comment="qt5-qtbase-static is &lt;5.15.9-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953685" version="1" comment="postfix is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953686" version="1" comment="postfix-cdb is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953687" version="1" comment="postfix-ldap is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953688" version="1" comment="postfix-lmdb is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953689" version="1" comment="postfix-mysql is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953690" version="1" comment="postfix-pcre is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953691" version="1" comment="postfix-perl-scripts is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953692" version="1" comment="postfix-pgsql is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953693" version="1" comment="postfix-sqlite is &lt;3.5.25-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853304" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852100" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852101" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852370" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852371" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852372" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852102" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852373" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852374" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852103" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852375" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845730" version="1" comment="kernel-default is &lt;4.12.14-122.186.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852376" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852377" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852378" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852379" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852380" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852104" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=7-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852105" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852381" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852106" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852382" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845692" version="1" comment="kernel-default is &lt;5.3.18-150200.24.172.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852107" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852383" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852384" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852108" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852385" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852386" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852387" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852388" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852109" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852389" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845739" version="1" comment="kernel-default is &lt;5.3.18-150300.59.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852612" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852613" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852390" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852391" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845575" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845862" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845863" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845864" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845697" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845698" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845865" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845699" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845700" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845866" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845867" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845701" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845585" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845868" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845869" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845702" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845703" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845870" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845871" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849152" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849153" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845684" version="1" comment="kernel-default is &lt;4.12.14-122.189.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849154" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849479" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845861" version="1" comment="kernel-default is &lt;5.3.18-150200.24.175.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849480" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849481" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849482" version="1" comment="kernel-default is &lt;5.3.18-150300.59.147.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849155" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849157" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849158" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849159" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849483" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849162" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849484" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849164" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866509" version="1" comment="libnbd is &lt;1.18.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866510" version="1" comment="libnbd-bash-completion is &lt;1.18.1-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866511" version="1" comment="libnbd-devel is &lt;1.18.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866512" version="1" comment="nbdfuse is &lt;1.18.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866513" version="1" comment="ocaml-libnbd is &lt;1.18.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866514" version="1" comment="ocaml-libnbd-devel is &lt;1.18.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866515" version="1" comment="python3-libnbd is &lt;1.18.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866752" version="1" comment="wpa_supplicant is &lt;2.10-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854069" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854070" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854071" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854072" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854073" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854074" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854075" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854076" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854077" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854078" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854079" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854080" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854081" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849121" version="1" comment="kernel-default is &lt;4.12.14-122.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854082" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854083" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854084" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854085" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854086" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849456" version="1" comment="kernel-default is &lt;5.3.18-150200.24.178.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854087" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854088" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854089" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854090" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854091" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852396" version="1" comment="kernel-default is &lt;5.3.18-150300.59.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854713" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854714" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854715" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854838" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854333" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854092" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854093" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854094" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851989" version="1" comment="expat is &lt;2.5.0-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851990" version="1" comment="expat-devel is &lt;2.5.0-1.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944684" version="1" comment="bpftool is &lt;7.3.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944685" version="1" comment="kernel is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944686" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.37.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944687" version="1" comment="kernel-core is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944688" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944689" version="1" comment="kernel-debug is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944690" version="1" comment="kernel-debug-core is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944693" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944694" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944695" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944696" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944699" version="1" comment="kernel-doc is &lt;5.14.0-427.37.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944700" version="1" comment="kernel-headers is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944701" version="1" comment="kernel-modules is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944702" version="1" comment="kernel-modules-core is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944703" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944704" version="1" comment="kernel-tools is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944705" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944707" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944708" version="1" comment="libperf is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944709" version="1" comment="perf is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944710" version="1" comment="python3-perf is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944711" version="1" comment="rtla is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944712" version="1" comment="rv is &lt;5.14.0-427.37.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942257" version="1" comment="bpftool is &lt;7.3.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942258" version="1" comment="kernel is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942259" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.35.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942260" version="1" comment="kernel-core is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942261" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942262" version="1" comment="kernel-debug is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942263" version="1" comment="kernel-debug-core is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942266" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942267" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942268" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942269" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942272" version="1" comment="kernel-doc is &lt;5.14.0-427.35.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942273" version="1" comment="kernel-headers is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942274" version="1" comment="kernel-modules is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942275" version="1" comment="kernel-modules-core is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942276" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942277" version="1" comment="kernel-tools is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942278" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942280" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942281" version="1" comment="libperf is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942282" version="1" comment="perf is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942283" version="1" comment="python3-perf is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942284" version="1" comment="rtla is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942285" version="1" comment="rv is &lt;5.14.0-427.35.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965064" version="1" comment="bpftool is &lt;7.4.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965065" version="1" comment="kernel is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965066" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.26.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965067" version="1" comment="kernel-core is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965068" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965069" version="1" comment="kernel-debug is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965070" version="1" comment="kernel-debug-core is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965073" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965074" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965075" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965076" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965079" version="1" comment="kernel-doc is &lt;5.14.0-503.26.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965080" version="1" comment="kernel-headers is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965081" version="1" comment="kernel-modules is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965082" version="1" comment="kernel-modules-core is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965083" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965084" version="1" comment="kernel-tools is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965085" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965087" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965088" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965089" version="1" comment="libperf is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965090" version="1" comment="perf is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965091" version="1" comment="python3-perf is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965092" version="1" comment="rtla is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965093" version="1" comment="rv is &lt;5.14.0-503.26.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968351" version="1" comment="bpftool is &lt;7.4.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968352" version="1" comment="kernel is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968353" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.31.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968354" version="1" comment="kernel-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968355" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968356" version="1" comment="kernel-debug is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968357" version="1" comment="kernel-debug-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968360" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968361" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968362" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968363" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968366" version="1" comment="kernel-doc is &lt;5.14.0-503.31.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968367" version="1" comment="kernel-headers is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968368" version="1" comment="kernel-modules is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968369" version="1" comment="kernel-modules-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968370" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968371" version="1" comment="kernel-rt is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968372" version="1" comment="kernel-rt-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968373" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968374" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968376" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968377" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968378" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968379" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968381" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968382" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968383" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968384" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968385" version="1" comment="kernel-tools is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968386" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968388" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968389" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968390" version="1" comment="libperf is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968391" version="1" comment="perf is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968392" version="1" comment="python3-perf is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968393" version="1" comment="rtla is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968394" version="1" comment="rv is &lt;5.14.0-503.31.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868519" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868520" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868521" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868522" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868523" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868932" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868933" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868934" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868935" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948658" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948659" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948660" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948661" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948662" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878542" version="1" comment="kernel-default is &lt;4.12.14-122.219.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878065" version="1" comment="kernel-default is &lt;5.3.18-150200.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878068" version="1" comment="kernel-default is &lt;5.3.18-150300.59.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878777" version="1" comment="kernel-default is ==6.4.0-150600.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950845" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=6-150600.4.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944115" version="1" comment="kernel-default is ==6.4.0-150600.23.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961319" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944117" version="1" comment="kernel-default is ==6.4.0-150600.23.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961320" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950848" version="1" comment="kernel-default is ==6.4.0-150600.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960539" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=3-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944934" version="1" comment="kernel-default is ==6.4.0-150600.23.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961321" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881324" version="1" comment="kernel-rt is ==6.4.0-150600.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948664" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=5-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881326" version="1" comment="kernel-default is &lt;6.4.0-150600.8.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944114" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=4-150600.1.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881325" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=2-150600.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944935" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944936" version="1" comment="kernel-default is &lt;6.4.0-150600.23.7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977138" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976832" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977128" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976885" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997925" version="1" comment="kernel is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997926" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.24.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997927" version="1" comment="kernel-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997928" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997929" version="1" comment="kernel-debug is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997930" version="1" comment="kernel-debug-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997933" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997934" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997935" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997936" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997939" version="1" comment="kernel-doc is &lt;5.14.0-570.24.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997940" version="1" comment="kernel-headers is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997941" version="1" comment="kernel-modules is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997942" version="1" comment="kernel-modules-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997943" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997944" version="1" comment="kernel-rt is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997945" version="1" comment="kernel-rt-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997946" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997947" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997949" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997950" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997951" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997952" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997954" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997955" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997956" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997957" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997958" version="1" comment="kernel-tools is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997959" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997961" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997962" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997963" version="1" comment="libperf is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997964" version="1" comment="perf is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997965" version="1" comment="python3-perf is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997966" version="1" comment="rtla is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997967" version="1" comment="rv is &lt;5.14.0-570.24.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024824" version="1" comment="galera is &lt;26.4.22-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054574" version="1" comment="mariadb is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054575" version="1" comment="mariadb-backup is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054576" version="1" comment="mariadb-common is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054577" version="1" comment="mariadb-devel is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054578" version="1" comment="mariadb-embedded is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054579" version="1" comment="mariadb-embedded-devel is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054580" version="1" comment="mariadb-errmsg is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054581" version="1" comment="mariadb-gssapi-server is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054582" version="1" comment="mariadb-oqgraph-engine is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054583" version="1" comment="mariadb-pam is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054584" version="1" comment="mariadb-server is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054585" version="1" comment="mariadb-server-galera is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054586" version="1" comment="mariadb-server-utils is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054587" version="1" comment="mariadb-test is &lt;10.11.15-1.module+el9.7.0+23768+0a6844e9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962391" version="1" comment="galera is &lt;26.4.20-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055132" version="1" comment="kernel is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055133" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.34.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055134" version="1" comment="kernel-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055135" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055136" version="1" comment="kernel-debug is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055137" version="1" comment="kernel-debug-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055138" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055139" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055140" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055141" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055142" version="1" comment="kernel-doc is &lt;5.14.0-611.34.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055143" version="1" comment="kernel-headers is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055144" version="1" comment="kernel-modules is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055145" version="1" comment="kernel-modules-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055146" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055147" version="1" comment="kernel-rt is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055148" version="1" comment="kernel-rt-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055149" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055150" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055151" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055152" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055153" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055154" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055155" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055156" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055157" version="1" comment="kernel-tools is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055158" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055159" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055160" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055161" version="1" comment="libperf is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055162" version="1" comment="perf is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055163" version="1" comment="python3-perf is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055164" version="1" comment="rtla is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055165" version="1" comment="rv is &lt;5.14.0-611.34.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019488" version="1" comment="kernel is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019489" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.46.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019490" version="1" comment="kernel-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019491" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019492" version="1" comment="kernel-debug is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019493" version="1" comment="kernel-debug-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019496" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019497" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019498" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019499" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019502" version="1" comment="kernel-doc is &lt;5.14.0-570.46.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019503" version="1" comment="kernel-headers is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019504" version="1" comment="kernel-modules is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019505" version="1" comment="kernel-modules-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019506" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019507" version="1" comment="kernel-rt is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019508" version="1" comment="kernel-rt-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019509" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019510" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019512" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019513" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019514" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019515" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019517" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019518" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019519" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019520" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019521" version="1" comment="kernel-tools is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019522" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019524" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019525" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019526" version="1" comment="libperf is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019527" version="1" comment="perf is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019528" version="1" comment="python3-perf is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019529" version="1" comment="rtla is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019530" version="1" comment="rv is &lt;5.14.0-570.46.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043856" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043647" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043648" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043857" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043858" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043859" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043860" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043861" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043862" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043863" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044016" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043864" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043865" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043866" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043867" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043868" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043869" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044017" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044134" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043978" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043979" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043980" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043981" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043982" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043983" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043984" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043985" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043986" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024258" version="1" comment="kernel is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024259" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.58.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024260" version="1" comment="kernel-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024261" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024262" version="1" comment="kernel-debug is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024263" version="1" comment="kernel-debug-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024266" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024267" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024268" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024269" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024272" version="1" comment="kernel-doc is &lt;5.14.0-570.58.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024273" version="1" comment="kernel-headers is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024274" version="1" comment="kernel-modules is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024275" version="1" comment="kernel-modules-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024276" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024277" version="1" comment="kernel-rt is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024278" version="1" comment="kernel-rt-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024279" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024280" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024282" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024283" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024284" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024285" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024287" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024288" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024289" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024290" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024291" version="1" comment="kernel-tools is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024292" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024294" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024295" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024296" version="1" comment="libperf is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024297" version="1" comment="perf is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024298" version="1" comment="python3-perf is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024299" version="1" comment="rtla is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024300" version="1" comment="rv is &lt;5.14.0-570.58.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021393" version="1" comment="kernel is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021394" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.52.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021395" version="1" comment="kernel-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021396" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021397" version="1" comment="kernel-debug is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021398" version="1" comment="kernel-debug-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021401" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021402" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021403" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021404" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021407" version="1" comment="kernel-doc is &lt;5.14.0-570.52.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021408" version="1" comment="kernel-headers is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021409" version="1" comment="kernel-modules is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021410" version="1" comment="kernel-modules-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021411" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021412" version="1" comment="kernel-rt is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021413" version="1" comment="kernel-rt-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021414" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021415" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021417" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021418" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021419" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021420" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021422" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021423" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021424" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021425" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021426" version="1" comment="kernel-tools is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021427" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021429" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021430" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021431" version="1" comment="libperf is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021432" version="1" comment="perf is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021433" version="1" comment="python3-perf is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021434" version="1" comment="rtla is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021435" version="1" comment="rv is &lt;5.14.0-570.52.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037053" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037054" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037055" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037056" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037057" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037058" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037059" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037060" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037061" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037062" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037063" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037064" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037065" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037066" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037067" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037068" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037069" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037070" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037071" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037073" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037074" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037075" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037076" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037077" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844796" version="1" comment="openssl is &lt;3.0.7-25.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844797" version="1" comment="openssl-devel is &lt;3.0.7-25.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844798" version="1" comment="openssl-libs is &lt;3.0.7-25.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844799" version="1" comment="openssl-perl is &lt;3.0.7-25.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818848" version="1" comment="tigervnc is &lt;1.13.1-3.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818849" version="1" comment="tigervnc-icons is &lt;1.13.1-3.el9_3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818850" version="1" comment="tigervnc-license is &lt;1.13.1-3.el9_3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818851" version="1" comment="tigervnc-selinux is &lt;1.13.1-3.el9_3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818852" version="1" comment="tigervnc-server is &lt;1.13.1-3.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818853" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-3.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818854" version="1" comment="tigervnc-server-module is &lt;1.13.1-3.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866492" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866493" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866494" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866495" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866496" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866500" version="1" comment="xorg-x11-server-Xwayland is &lt;22.1.9-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866497" version="1" comment="xorg-x11-server-common is &lt;1.20.11-24.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866498" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-24.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866499" version="1" comment="xorg-x11-server-source is &lt;1.20.11-24.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030688" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030689" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030690" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030740" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031201" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030741" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031202" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031203" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031204" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031205" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031655" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031206" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031208" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968302" version="1" comment="kernel-default is ==6.4.0-150600.23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039018" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968304" version="1" comment="kernel-default is ==6.4.0-150600.23.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039019" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986736" version="1" comment="kernel-default is ==6.4.0-150600.23.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038510" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986738" version="1" comment="kernel-default is ==6.4.0-150600.23.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039020" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010060" version="1" comment="kernel-default is ==6.4.0-150600.23.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039021" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012361" version="1" comment="kernel-default is ==6.4.0-150600.23.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039022" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012363" version="1" comment="kernel-default is ==6.4.0-150600.23.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039023" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014544" version="1" comment="kernel-default is ==6.4.0-150600.23.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039024" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023342" version="1" comment="kernel-default is ==6.4.0-150600.23.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038224" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023348" version="1" comment="kernel-default is ==6.4.0-150600.23.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038225" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038226" version="1" comment="kernel-default is ==6.4.0-150600.23.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038227" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038228" version="1" comment="kernel-default is &lt;6.4.0-150600.23.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014264" version="1" comment="kernel-rt is ==6.4.0-150700.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037826" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=9-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014746" version="1" comment="kernel-default is ==6.4.0-150700.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039025" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=9-150700.3.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023034" version="1" comment="kernel-default is ==6.4.0-150700.53.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038229" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023039" version="1" comment="kernel-default is ==6.4.0-150700.53.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038230" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038511" version="1" comment="kernel-default is ==6.4.0-150700.53.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038512" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014749" version="1" comment="kernel-default is ==6.4.0-150700.53.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039026" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=9-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014757" version="1" comment="kernel-default is ==6.4.0-150700.53.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039027" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=9-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014759" version="1" comment="kernel-default is &lt;6.4.0-150700.53.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056353" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053077" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056286" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056287" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056288" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056354" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056355" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056356" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056357" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056358" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056359" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050317" version="1" comment="kernel-default is ==4.12.14-122.293.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056360" version="1" comment="kgraft-patch-4_12_14-122_293-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050319" version="1" comment="kernel-default is &lt;4.12.14-122.293.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866669" version="1" comment="tigervnc is &lt;1.13.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866670" version="1" comment="tigervnc-icons is &lt;1.13.1-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866671" version="1" comment="tigervnc-license is &lt;1.13.1-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866672" version="1" comment="tigervnc-selinux is &lt;1.13.1-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866673" version="1" comment="tigervnc-server is &lt;1.13.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866674" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866675" version="1" comment="tigervnc-server-module is &lt;1.13.1-8.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851986" version="1" comment="firefox is &lt;115.9.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851987" version="1" comment="firefox-x11 is &lt;115.9.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844491" version="1" comment="nspr is &lt;4.35.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844492" version="1" comment="nspr-devel is &lt;4.35.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844493" version="1" comment="nss is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844494" version="1" comment="nss-devel is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844495" version="1" comment="nss-softokn is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844496" version="1" comment="nss-softokn-devel is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844497" version="1" comment="nss-softokn-freebl is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844498" version="1" comment="nss-softokn-freebl-devel is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844499" version="1" comment="nss-sysinit is &lt;3.90.0-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844500" version="1" comment="nss-tools is &lt;3.90.0-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844501" version="1" comment="nss-util is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844502" version="1" comment="nss-util-devel is &lt;3.90.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851988" version="1" comment="thunderbird is &lt;115.9.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046293" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819534" version="1" comment="ipa-client is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819535" version="1" comment="ipa-client-common is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819536" version="1" comment="ipa-client-epn is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819537" version="1" comment="ipa-client-samba is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819538" version="1" comment="ipa-common is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819539" version="1" comment="ipa-selinux is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819540" version="1" comment="ipa-server is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819541" version="1" comment="ipa-server-common is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819542" version="1" comment="ipa-server-dns is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819543" version="1" comment="ipa-server-trust-ad is &lt;4.10.2-5.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819544" version="1" comment="python3-ipaclient is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819545" version="1" comment="python3-ipalib is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819546" version="1" comment="python3-ipaserver is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819547" version="1" comment="python3-ipatests is &lt;4.10.2-5.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816418" version="1" comment="tracker-miners is &lt;3.1.2-4.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858925" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858926" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858856" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858857" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855859" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855684" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855685" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855686" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859175" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859176" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859177" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859178" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859626" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859179" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858927" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858867" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859627" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859957" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859374" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859375" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859376" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859377" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859958" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859959" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859628" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859629" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859960" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859630" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859631" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855860" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855687" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855861" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856129" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855688" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855569" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=11-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859961" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=11-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855689" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855862" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855690" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855863" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855691" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855692" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953931" version="1" comment="openexr is &lt;3.1.1-2.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953932" version="1" comment="openexr-devel is &lt;3.1.1-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953933" version="1" comment="openexr-libs is &lt;3.1.1-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844803" version="1" comment="gnutls is &lt;3.7.6-23.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844804" version="1" comment="gnutls-c++ is &lt;3.7.6-23.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844805" version="1" comment="gnutls-dane is &lt;3.7.6-23.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844806" version="1" comment="gnutls-devel is &lt;3.7.6-23.el9_3.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844807" version="1" comment="gnutls-utils is &lt;3.7.6-23.el9_3.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849490" version="1" comment="opensc is &lt;0.23.0-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866745" version="1" comment="libssh is &lt;0.10.4-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866746" version="1" comment="libssh-config is &lt;0.10.4-13.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866747" version="1" comment="libssh-devel is &lt;0.10.4-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953529" version="1" comment="edk2-ovmf is &lt;20240524-6.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953530" version="1" comment="edk2-tools is &lt;20240524-6.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953531" version="1" comment="edk2-tools-doc is &lt;20240524-6.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848261" version="1" comment="nspr is &lt;4.35.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848262" version="1" comment="nspr-devel is &lt;4.35.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848263" version="1" comment="nss is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848264" version="1" comment="nss-devel is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848265" version="1" comment="nss-softokn is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848266" version="1" comment="nss-softokn-devel is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848267" version="1" comment="nss-softokn-freebl is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848268" version="1" comment="nss-softokn-freebl-devel is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848269" version="1" comment="nss-sysinit is &lt;3.90.0-6.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848270" version="1" comment="nss-tools is &lt;3.90.0-6.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848271" version="1" comment="nss-util is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848272" version="1" comment="nss-util-devel is &lt;3.90.0-6.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845872" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845704" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845705" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845706" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845707" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845708" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845709" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845710" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845711" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845873" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845874" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845875" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845876" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845712" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845713" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845714" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845877" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845878" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845715" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845716" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845717" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846010" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845880" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814544" version="1" comment="firefox is &lt;115.5.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814545" version="1" comment="firefox-x11 is &lt;115.5.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814342" version="1" comment="thunderbird is &lt;115.5.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009191734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852392" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852393" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854325" version="1" comment="kernel-default is &lt;5.3.18-150200.24.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852394" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852395" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854336" version="1" comment="kernel-default is &lt;5.3.18-150300.59.153.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869946" version="1" comment="python-unversioned-command is &lt;3.9.18-3.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869947" version="1" comment="python3 is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869948" version="1" comment="python3-debug is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869949" version="1" comment="python3-devel is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869950" version="1" comment="python3-idle is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869951" version="1" comment="python3-libs is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869952" version="1" comment="python3-test is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869953" version="1" comment="python3-tkinter is &lt;3.9.18-3.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869939" version="1" comment="python3.11 is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869940" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869941" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869942" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869943" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869944" version="1" comment="python3.11-test is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869945" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953695" version="1" comment="python3-jwcrypto is &lt;1.5.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981936" version="1" comment="qemu-guest-agent is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981937" version="1" comment="qemu-img is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981938" version="1" comment="qemu-kvm is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981939" version="1" comment="qemu-kvm-audio-pa is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981940" version="1" comment="qemu-kvm-block-blkio is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981941" version="1" comment="qemu-kvm-block-curl is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981942" version="1" comment="qemu-kvm-block-rbd is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981943" version="1" comment="qemu-kvm-common is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981944" version="1" comment="qemu-kvm-core is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981945" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981946" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981947" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981948" version="1" comment="qemu-kvm-device-usb-host is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981949" version="1" comment="qemu-kvm-device-usb-redirect is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981950" version="1" comment="qemu-kvm-docs is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981951" version="1" comment="qemu-kvm-tools is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981952" version="1" comment="qemu-kvm-ui-egl-headless is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981953" version="1" comment="qemu-kvm-ui-opengl is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009981954" version="1" comment="qemu-pr-helper is &lt;9.0.0-10.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846318" version="1" comment="tigervnc is &lt;1.13.1-3.el9_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846319" version="1" comment="tigervnc-icons is &lt;1.13.1-3.el9_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846320" version="1" comment="tigervnc-license is &lt;1.13.1-3.el9_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846321" version="1" comment="tigervnc-selinux is &lt;1.13.1-3.el9_3.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846322" version="1" comment="tigervnc-server is &lt;1.13.1-3.el9_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846323" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-3.el9_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846324" version="1" comment="tigervnc-server-module is &lt;1.13.1-3.el9_3.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818855" version="1" comment="firefox is &lt;115.6.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009818856" version="1" comment="firefox-x11 is &lt;115.6.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872738" version="1" comment="pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872739" version="1" comment="pcp-conf is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872740" version="1" comment="pcp-devel is &lt;6.2.0-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872741" version="1" comment="pcp-doc is &lt;6.2.0-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872742" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872743" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872744" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872745" version="1" comment="pcp-export-pcp2json is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872746" version="1" comment="pcp-export-pcp2spark is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872747" version="1" comment="pcp-export-pcp2xml is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872748" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872749" version="1" comment="pcp-export-zabbix-agent is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872750" version="1" comment="pcp-geolocate is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872751" version="1" comment="pcp-gui is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872752" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872753" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872754" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872755" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872756" version="1" comment="pcp-import-sar2pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872757" version="1" comment="pcp-libs is &lt;6.2.0-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872758" version="1" comment="pcp-libs-devel is &lt;6.2.0-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872759" version="1" comment="pcp-pmda-activemq is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872760" version="1" comment="pcp-pmda-apache is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872761" version="1" comment="pcp-pmda-bash is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872762" version="1" comment="pcp-pmda-bcc is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872763" version="1" comment="pcp-pmda-bind2 is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872764" version="1" comment="pcp-pmda-bonding is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872765" version="1" comment="pcp-pmda-bpf is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872766" version="1" comment="pcp-pmda-bpftrace is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872767" version="1" comment="pcp-pmda-cifs is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872768" version="1" comment="pcp-pmda-cisco is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872769" version="1" comment="pcp-pmda-dbping is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872770" version="1" comment="pcp-pmda-denki is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872771" version="1" comment="pcp-pmda-dm is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872772" version="1" comment="pcp-pmda-docker is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872773" version="1" comment="pcp-pmda-ds389 is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872774" version="1" comment="pcp-pmda-ds389log is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872775" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872776" version="1" comment="pcp-pmda-farm is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872777" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872778" version="1" comment="pcp-pmda-gluster is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872779" version="1" comment="pcp-pmda-gpfs is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872780" version="1" comment="pcp-pmda-gpsd is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872781" version="1" comment="pcp-pmda-hacluster is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872782" version="1" comment="pcp-pmda-haproxy is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872783" version="1" comment="pcp-pmda-infiniband is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872784" version="1" comment="pcp-pmda-json is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872785" version="1" comment="pcp-pmda-libvirt is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872786" version="1" comment="pcp-pmda-lio is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872787" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872788" version="1" comment="pcp-pmda-logger is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872789" version="1" comment="pcp-pmda-lustre is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872790" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872791" version="1" comment="pcp-pmda-mailq is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872792" version="1" comment="pcp-pmda-memcache is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872793" version="1" comment="pcp-pmda-mic is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872794" version="1" comment="pcp-pmda-mongodb is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872795" version="1" comment="pcp-pmda-mounts is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872796" version="1" comment="pcp-pmda-mssql is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872797" version="1" comment="pcp-pmda-mysql is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872798" version="1" comment="pcp-pmda-named is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872799" version="1" comment="pcp-pmda-netcheck is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872800" version="1" comment="pcp-pmda-netfilter is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872801" version="1" comment="pcp-pmda-news is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872802" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872803" version="1" comment="pcp-pmda-nginx is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872804" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872805" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872806" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872807" version="1" comment="pcp-pmda-oracle is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872808" version="1" comment="pcp-pmda-pdns is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872809" version="1" comment="pcp-pmda-perfevent is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872810" version="1" comment="pcp-pmda-podman is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872811" version="1" comment="pcp-pmda-postfix is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872812" version="1" comment="pcp-pmda-postgresql is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872813" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872814" version="1" comment="pcp-pmda-redis is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872815" version="1" comment="pcp-pmda-resctrl is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872816" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872817" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872818" version="1" comment="pcp-pmda-samba is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872819" version="1" comment="pcp-pmda-sendmail is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872820" version="1" comment="pcp-pmda-shping is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872821" version="1" comment="pcp-pmda-slurm is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872822" version="1" comment="pcp-pmda-smart is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872823" version="1" comment="pcp-pmda-snmp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872824" version="1" comment="pcp-pmda-sockets is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872825" version="1" comment="pcp-pmda-statsd is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872826" version="1" comment="pcp-pmda-summary is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872827" version="1" comment="pcp-pmda-systemd is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872828" version="1" comment="pcp-pmda-trace is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872829" version="1" comment="pcp-pmda-unbound is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872830" version="1" comment="pcp-pmda-weblog is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872831" version="1" comment="pcp-pmda-zimbra is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872832" version="1" comment="pcp-pmda-zswap is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872833" version="1" comment="pcp-selinux is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872834" version="1" comment="pcp-system-tools is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872835" version="1" comment="pcp-zeroconf is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872836" version="1" comment="perl-PCP-LogImport is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872837" version="1" comment="perl-PCP-LogSummary is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872838" version="1" comment="perl-PCP-MMV is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872839" version="1" comment="perl-PCP-PMDA is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872840" version="1" comment="python3-pcp is &lt;6.2.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868524" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868936" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845720" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845881" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845721" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845722" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845723" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845724" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845725" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845726" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845727" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845728" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845729" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845882" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845731" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845733" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845734" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845735" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845736" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845737" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845883" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845738" version="1" comment="kernel-default is &lt;4.12.14-150100.197.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846012" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845885" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866732" version="1" comment="rhel-net-naming-sysattrs is &lt;252-32.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866733" version="1" comment="systemd is &lt;252-32.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866734" version="1" comment="systemd-boot-unsigned is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866735" version="1" comment="systemd-container is &lt;252-32.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866736" version="1" comment="systemd-devel is &lt;252-32.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866737" version="1" comment="systemd-journal-remote is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866738" version="1" comment="systemd-libs is &lt;252-32.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866739" version="1" comment="systemd-oomd is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866740" version="1" comment="systemd-pam is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866741" version="1" comment="systemd-resolved is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866742" version="1" comment="systemd-rpm-macros is &lt;252-32.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866743" version="1" comment="systemd-udev is &lt;252-32.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844800" version="1" comment="sqlite is &lt;3.34.1-7.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844801" version="1" comment="sqlite-devel is &lt;3.34.1-7.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844802" version="1" comment="sqlite-libs is &lt;3.34.1-7.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953661" version="1" comment="iperf3 is &lt;3.9-13.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872189" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819548" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872190" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819549" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872191" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819550" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819551" version="1" comment="dotnet-host is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872192" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819552" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872193" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819553" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872194" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.115-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872195" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.115-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819554" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.101-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819555" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.101-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872196" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.15-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819556" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.1-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872197" version="1" comment="dotnet-templates-7.0 is &lt;7.0.115-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819557" version="1" comment="dotnet-templates-8.0 is &lt;8.0.101-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819558" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.101-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957530" version="1" comment="python-unversioned-command is &lt;3.9.21-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957531" version="1" comment="python3 is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957532" version="1" comment="python3-debug is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957533" version="1" comment="python3-devel is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957534" version="1" comment="python3-idle is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957535" version="1" comment="python3-libs is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957536" version="1" comment="python3-test is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957537" version="1" comment="python3-tkinter is &lt;3.9.21-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951961" version="1" comment="python3.11 is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951962" version="1" comment="python3.11-debug is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951963" version="1" comment="python3.11-devel is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951964" version="1" comment="python3.11-idle is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951965" version="1" comment="python3.11-libs is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951966" version="1" comment="python3.11-test is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951967" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953669" version="1" comment="python3.12 is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953670" version="1" comment="python3.12-debug is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953671" version="1" comment="python3.12-devel is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953672" version="1" comment="python3.12-idle is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953673" version="1" comment="python3.12-libs is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953674" version="1" comment="python3.12-test is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953675" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985811" version="1" comment="gstreamer1 is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985812" version="1" comment="gstreamer1-devel is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985813" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985814" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985815" version="1" comment="gstreamer1-plugins-bad-free-libs is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985816" version="1" comment="gstreamer1-plugins-ugly-free is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985817" version="1" comment="gstreamer1-rtsp-server is &lt;1.22.12-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876437" version="1" comment="ansible-core is &lt;2.14.14-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876438" version="1" comment="ansible-test is &lt;2.14.14-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845168" version="1" comment="firefox is &lt;115.7.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845169" version="1" comment="firefox-x11 is &lt;115.7.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845293" version="1" comment="thunderbird is &lt;115.7.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859180" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858928" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859632" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859378" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858858" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851389" version="1" comment="opencryptoki is &lt;3.21.0-9.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851390" version="1" comment="opencryptoki-devel is &lt;3.21.0-9.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851391" version="1" comment="opencryptoki-icsftok is &lt;3.21.0-9.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851392" version="1" comment="opencryptoki-libs is &lt;3.21.0-9.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851393" version="1" comment="opencryptoki-swtok is &lt;3.21.0-9.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848886" version="1" comment="postgresql is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848887" version="1" comment="postgresql-contrib is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848888" version="1" comment="postgresql-docs is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848889" version="1" comment="postgresql-plperl is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848890" version="1" comment="postgresql-plpython3 is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848891" version="1" comment="postgresql-pltcl is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848892" version="1" comment="postgresql-private-devel is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848893" version="1" comment="postgresql-private-libs is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848894" version="1" comment="postgresql-server is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848895" version="1" comment="postgresql-server-devel is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848896" version="1" comment="postgresql-static is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848897" version="1" comment="postgresql-test is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848898" version="1" comment="postgresql-test-rpm-macros is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848899" version="1" comment="postgresql-upgrade is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009848900" version="1" comment="postgresql-upgrade-devel is &lt;15.6-1.module+el9.3.0+21283+b0ea34b6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996936" version="1" comment="mod_proxy_cluster is &lt;1.3.22-1.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953939" version="1" comment="firefox is &lt;128.4.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953940" version="1" comment="firefox-x11 is &lt;128.4.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953934" version="1" comment="thunderbird is &lt;128.4.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958880" version="1" comment="mpg123 is &lt;1.32.9-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958881" version="1" comment="mpg123-devel is &lt;1.32.9-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958882" version="1" comment="mpg123-libs is &lt;1.32.9-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958883" version="1" comment="mpg123-plugins-pulseaudio is &lt;1.32.9-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855693" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855864" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855694" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855695" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855865" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855696" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955016" version="1" comment="pam is &lt;1.5.1-22.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955017" version="1" comment="pam-devel is &lt;1.5.1-22.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955018" version="1" comment="pam-docs is &lt;1.5.1-22.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958991" version="1" comment="postgresql is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958992" version="1" comment="postgresql-contrib is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958993" version="1" comment="postgresql-docs is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958994" version="1" comment="postgresql-plperl is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958995" version="1" comment="postgresql-plpython3 is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958996" version="1" comment="postgresql-pltcl is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958997" version="1" comment="postgresql-private-devel is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958998" version="1" comment="postgresql-private-libs is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958999" version="1" comment="postgresql-server is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959000" version="1" comment="postgresql-server-devel is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959001" version="1" comment="postgresql-static is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959002" version="1" comment="postgresql-test is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959003" version="1" comment="postgresql-test-rpm-macros is &lt;13.18-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959004" version="1" comment="postgresql-upgrade is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959005" version="1" comment="postgresql-upgrade-devel is &lt;13.18-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961436" version="1" comment="ipa-client is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961437" version="1" comment="ipa-client-common is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961438" version="1" comment="ipa-client-epn is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961439" version="1" comment="ipa-client-samba is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961440" version="1" comment="ipa-common is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961441" version="1" comment="ipa-selinux is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961442" version="1" comment="ipa-selinux-luna is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961443" version="1" comment="ipa-selinux-nfast is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961444" version="1" comment="ipa-server is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961445" version="1" comment="ipa-server-common is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961446" version="1" comment="ipa-server-dns is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961447" version="1" comment="ipa-server-trust-ad is &lt;4.12.2-1.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961448" version="1" comment="python3-ipaclient is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961449" version="1" comment="python3-ipalib is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961450" version="1" comment="python3-ipaserver is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960791" version="1" comment="python3-ipatests is &lt;4.12.2-1.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965094" version="1" comment="mysql is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965095" version="1" comment="mysql-common is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965096" version="1" comment="mysql-devel is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965097" version="1" comment="mysql-errmsg is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965098" version="1" comment="mysql-libs is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965099" version="1" comment="mysql-server is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965100" version="1" comment="mysql-test is &lt;8.0.41-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955691" version="1" comment="thunderbird is &lt;128.5.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965101" version="1" comment="bind is &lt;9.16.23-24.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965102" version="1" comment="bind-chroot is &lt;9.16.23-24.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965103" version="1" comment="bind-devel is &lt;9.16.23-24.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965104" version="1" comment="bind-dnssec-doc is &lt;9.16.23-24.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965105" version="1" comment="bind-dnssec-utils is &lt;9.16.23-24.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965106" version="1" comment="bind-doc is &lt;9.16.23-24.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965107" version="1" comment="bind-libs is &lt;9.16.23-24.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965108" version="1" comment="bind-license is &lt;9.16.23-24.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965109" version="1" comment="bind-utils is &lt;9.16.23-24.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965110" version="1" comment="python3-bind is &lt;9.16.23-24.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962427" version="1" comment="buildah is &lt;1.37.6-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962428" version="1" comment="buildah-tests is &lt;1.37.6-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962422" version="1" comment="podman is &lt;5.2.2-13.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962423" version="1" comment="podman-docker is &lt;5.2.2-13.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962424" version="1" comment="podman-plugins is &lt;5.2.2-13.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962425" version="1" comment="podman-remote is &lt;5.2.2-13.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962426" version="1" comment="podman-tests is &lt;5.2.2-13.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957467" version="1" comment="apcu-panel is &lt;5.1.23-1.module+el9.4.0+20748+b46899d2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985419" version="1" comment="php is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985420" version="1" comment="php-bcmath is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985421" version="1" comment="php-cli is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985422" version="1" comment="php-common is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985423" version="1" comment="php-dba is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985424" version="1" comment="php-dbg is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985425" version="1" comment="php-devel is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985426" version="1" comment="php-embedded is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985427" version="1" comment="php-enchant is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985428" version="1" comment="php-ffi is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985429" version="1" comment="php-fpm is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985430" version="1" comment="php-gd is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985431" version="1" comment="php-gmp is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985432" version="1" comment="php-intl is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985433" version="1" comment="php-ldap is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985434" version="1" comment="php-mbstring is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985435" version="1" comment="php-mysqlnd is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985436" version="1" comment="php-odbc is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985437" version="1" comment="php-opcache is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985438" version="1" comment="php-pdo is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957488" version="1" comment="php-pecl-apcu is &lt;5.1.23-1.module+el9.4.0+20748+b46899d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957489" version="1" comment="php-pecl-apcu-devel is &lt;5.1.23-1.module+el9.4.0+20748+b46899d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957490" version="1" comment="php-pecl-rrd is &lt;2.0.3-4.module+el9.4.0+20748+b46899d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957491" version="1" comment="php-pecl-xdebug3 is &lt;3.2.2-2.module+el9.4.0+20796+bd4564df for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957492" version="1" comment="php-pecl-zip is &lt;1.22.3-1.module+el9.4.0+20748+b46899d2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985439" version="1" comment="php-pgsql is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985440" version="1" comment="php-process is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985441" version="1" comment="php-snmp is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985442" version="1" comment="php-soap is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985443" version="1" comment="php-xml is &lt;8.2.28-1.module+el9.6.0+23063+43495379 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985382" version="1" comment="apcu-panel is &lt;5.1.23-1.module+el9.6.0+22647+1741ae35 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985383" version="1" comment="php is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985384" version="1" comment="php-bcmath is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985385" version="1" comment="php-cli is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985386" version="1" comment="php-common is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985387" version="1" comment="php-dba is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985388" version="1" comment="php-dbg is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985389" version="1" comment="php-devel is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985390" version="1" comment="php-embedded is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985391" version="1" comment="php-enchant is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985392" version="1" comment="php-ffi is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985393" version="1" comment="php-fpm is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985394" version="1" comment="php-gd is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985395" version="1" comment="php-gmp is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985396" version="1" comment="php-intl is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985397" version="1" comment="php-ldap is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985398" version="1" comment="php-mbstring is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985399" version="1" comment="php-mysqlnd is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985400" version="1" comment="php-odbc is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985401" version="1" comment="php-opcache is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985402" version="1" comment="php-pdo is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985403" version="1" comment="php-pecl-apcu is &lt;5.1.23-1.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985404" version="1" comment="php-pecl-apcu-devel is &lt;5.1.23-1.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985405" version="1" comment="php-pecl-redis6 is &lt;6.1.0-2.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985406" version="1" comment="php-pecl-rrd is &lt;2.0.3-4.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985407" version="1" comment="php-pecl-xdebug3 is &lt;3.3.1-1.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985408" version="1" comment="php-pecl-zip is &lt;1.22.3-1.module+el9.6.0+22647+1741ae35 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985409" version="1" comment="php-pgsql is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985410" version="1" comment="php-process is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985411" version="1" comment="php-snmp is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985412" version="1" comment="php-soap is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985413" version="1" comment="php-xml is &lt;8.3.19-1.module+el9.6.0+23015+da8065b7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959725" version="1" comment="dpdk is &lt;23.11-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959726" version="1" comment="dpdk-devel is &lt;23.11-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959727" version="1" comment="dpdk-doc is &lt;23.11-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959728" version="1" comment="dpdk-tools is &lt;23.11-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957245" version="1" comment="firefox is &lt;128.5.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957246" version="1" comment="firefox-x11 is &lt;128.5.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053885" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053886" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053887" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053888" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053889" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053890" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053891" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053892" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.112-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053893" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.112-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053894" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.112-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053895" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.12-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053896" version="1" comment="dotnet-templates-8.0 is &lt;8.0.112-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960346" version="1" comment="rsync is &lt;3.2.3-20.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960347" version="1" comment="rsync-daemon is &lt;3.2.3-20.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983873" version="1" comment="rsync is &lt;3.2.5-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983874" version="1" comment="rsync-daemon is &lt;3.2.5-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983875" version="1" comment="rsync-rrsync is &lt;3.2.5-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985328" version="1" comment="libtasn1 is &lt;4.16.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985329" version="1" comment="libtasn1-devel is &lt;4.16.0-9.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985330" version="1" comment="libtasn1-tools is &lt;4.16.0-9.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985323" version="1" comment="gnutls is &lt;3.8.3-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985324" version="1" comment="gnutls-c++ is &lt;3.8.3-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985325" version="1" comment="gnutls-dane is &lt;3.8.3-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985326" version="1" comment="gnutls-devel is &lt;3.8.3-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985327" version="1" comment="gnutls-utils is &lt;3.8.3-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957523" version="1" comment="python3.12 is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957524" version="1" comment="python3.12-debug is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957525" version="1" comment="python3.12-devel is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957526" version="1" comment="python3.12-idle is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957527" version="1" comment="python3.12-libs is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957528" version="1" comment="python3.12-test is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957529" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998057" version="1" comment="python-unversioned-command is &lt;3.9.21-2.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998058" version="1" comment="python3 is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998059" version="1" comment="python3-debug is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998060" version="1" comment="python3-devel is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998061" version="1" comment="python3-idle is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998062" version="1" comment="python3-libs is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998063" version="1" comment="python3-test is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998064" version="1" comment="python3-tkinter is &lt;3.9.21-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998168" version="1" comment="python3.11 is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998169" version="1" comment="python3.11-debug is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998170" version="1" comment="python3.11-devel is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998171" version="1" comment="python3.11-idle is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998172" version="1" comment="python3.11-libs is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998173" version="1" comment="python3.11-test is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998174" version="1" comment="python3.11-tkinter is &lt;3.11.11-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998065" version="1" comment="python3.12 is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998066" version="1" comment="python3.12-debug is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998067" version="1" comment="python3.12-devel is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998068" version="1" comment="python3.12-idle is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998069" version="1" comment="python3.12-libs is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998070" version="1" comment="python3.12-test is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998071" version="1" comment="python3.12-tkinter is &lt;3.12.9-1.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963384" version="1" comment="openssl is &lt;3.2.2-6.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963385" version="1" comment="openssl-devel is &lt;3.2.2-6.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963386" version="1" comment="openssl-libs is &lt;3.2.2-6.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963387" version="1" comment="openssl-perl is &lt;3.2.2-6.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866767" version="1" comment="grafana is &lt;9.2.10-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866768" version="1" comment="grafana-selinux is &lt;9.2.10-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874026" version="1" comment="buildah is &lt;1.33.7-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874027" version="1" comment="buildah-tests is &lt;1.33.7-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877106" version="1" comment="containernetworking-plugins is &lt;1.4.0-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866769" version="1" comment="grafana-pcp is &lt;5.1.1-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874033" version="1" comment="gvisor-tap-vsock is &lt;0.7.3-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874028" version="1" comment="podman is &lt;4.9.4-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874029" version="1" comment="podman-docker is &lt;4.9.4-5.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874030" version="1" comment="podman-plugins is &lt;4.9.4-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874031" version="1" comment="podman-remote is &lt;4.9.4-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874032" version="1" comment="podman-tests is &lt;4.9.4-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877107" version="1" comment="runc is &lt;1.1.12-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872993" version="1" comment="skopeo is &lt;1.14.3-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872994" version="1" comment="skopeo-tests is &lt;1.14.3-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868756" version="1" comment="libvirt is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868757" version="1" comment="libvirt-client is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868758" version="1" comment="libvirt-client-qemu is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868759" version="1" comment="libvirt-daemon is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868760" version="1" comment="libvirt-daemon-common is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868761" version="1" comment="libvirt-daemon-config-network is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868762" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868763" version="1" comment="libvirt-daemon-driver-interface is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868764" version="1" comment="libvirt-daemon-driver-network is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868765" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868766" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868767" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868768" version="1" comment="libvirt-daemon-driver-secret is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868769" version="1" comment="libvirt-daemon-driver-storage is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868770" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868771" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868772" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868773" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868774" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868775" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868776" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868777" version="1" comment="libvirt-daemon-kvm is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868778" version="1" comment="libvirt-daemon-lock is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868779" version="1" comment="libvirt-daemon-log is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868780" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868781" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868782" version="1" comment="libvirt-daemon-proxy is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868783" version="1" comment="libvirt-devel is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868784" version="1" comment="libvirt-docs is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868785" version="1" comment="libvirt-libs is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868786" version="1" comment="libvirt-nss is &lt;10.0.0-6.2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868940" version="1" comment="ipa-client is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868941" version="1" comment="ipa-client-common is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868942" version="1" comment="ipa-client-epn is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868943" version="1" comment="ipa-client-samba is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868944" version="1" comment="ipa-common is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868945" version="1" comment="ipa-selinux is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868946" version="1" comment="ipa-server is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868947" version="1" comment="ipa-server-common is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868948" version="1" comment="ipa-server-dns is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868949" version="1" comment="ipa-server-trust-ad is &lt;4.11.0-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868950" version="1" comment="python3-ipaclient is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868951" version="1" comment="python3-ipalib is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868952" version="1" comment="python3-ipaserver is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868953" version="1" comment="python3-ipatests is &lt;4.11.0-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854107" version="1" comment="python3-unbound is &lt;1.16.2-3.el9_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854108" version="1" comment="unbound is &lt;1.16.2-3.el9_3.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854109" version="1" comment="unbound-devel is &lt;1.16.2-3.el9_3.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854110" version="1" comment="unbound-libs is &lt;1.16.2-3.el9_3.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849200" version="1" comment="firefox is &lt;115.8.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849201" version="1" comment="firefox-x11 is &lt;115.8.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849711" version="1" comment="thunderbird is &lt;115.8.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851819" version="1" comment="postgresql-jdbc is &lt;42.2.28-1.el9_3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879121" version="1" comment="bind is &lt;9.16.23-18.el9_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879122" version="1" comment="bind-chroot is &lt;9.16.23-18.el9_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879123" version="1" comment="bind-devel is &lt;9.16.23-18.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879124" version="1" comment="bind-dnssec-doc is &lt;9.16.23-18.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879125" version="1" comment="bind-dnssec-utils is &lt;9.16.23-18.el9_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879126" version="1" comment="bind-doc is &lt;9.16.23-18.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879127" version="1" comment="bind-dyndb-ldap is &lt;11.9-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879128" version="1" comment="bind-libs is &lt;9.16.23-18.el9_4.6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879129" version="1" comment="bind-license is &lt;9.16.23-18.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879130" version="1" comment="bind-utils is &lt;9.16.23-18.el9_4.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879131" version="1" comment="python3-bind is &lt;9.16.23-18.el9_4.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858073" version="1" comment="buildah is &lt;1.31.5-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858074" version="1" comment="buildah-tests is &lt;1.31.5-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867218" version="1" comment="podman is &lt;4.9.4-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867219" version="1" comment="podman-docker is &lt;4.9.4-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867220" version="1" comment="podman-plugins is &lt;4.9.4-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867221" version="1" comment="podman-remote is &lt;4.9.4-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867222" version="1" comment="podman-tests is &lt;4.9.4-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844464" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844465" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844466" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844467" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.402.b06-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844468" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844469" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844470" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844471" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844472" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844473" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844474" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844475" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844476" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844477" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844478" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.402.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844479" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.402.b06-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844480" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844481" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844482" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844483" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.402.b06-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845119" version="1" comment="java-11-openjdk is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845120" version="1" comment="java-11-openjdk-demo is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845121" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845122" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845123" version="1" comment="java-11-openjdk-devel is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845124" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845125" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845126" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845127" version="1" comment="java-11-openjdk-headless is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845128" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845129" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845130" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845131" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845132" version="1" comment="java-11-openjdk-jmods is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845133" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845134" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845135" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845136" version="1" comment="java-11-openjdk-src is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845137" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845138" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845139" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845140" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845141" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.22.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849165" version="1" comment="java-17-openjdk is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849166" version="1" comment="java-17-openjdk-demo is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849167" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849168" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849169" version="1" comment="java-17-openjdk-devel is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849170" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849171" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849172" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849173" version="1" comment="java-17-openjdk-headless is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849174" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849175" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849176" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849177" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849178" version="1" comment="java-17-openjdk-jmods is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849179" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849180" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849181" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849182" version="1" comment="java-17-openjdk-src is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849183" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849184" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849185" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849186" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849187" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.10.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819996" version="1" comment="java-21-openjdk is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819997" version="1" comment="java-21-openjdk-demo is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819998" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009819999" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820000" version="1" comment="java-21-openjdk-devel is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820001" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820002" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820003" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820004" version="1" comment="java-21-openjdk-headless is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820005" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820006" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820007" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820008" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820009" version="1" comment="java-21-openjdk-jmods is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820010" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820011" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820012" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820013" version="1" comment="java-21-openjdk-src is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820014" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820015" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820016" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820017" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009820018" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.2.0.13-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858428" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858429" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859962" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859963" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.412.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858430" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858431" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858432" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858433" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858434" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858435" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858436" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858437" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858438" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858439" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858440" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.412.b08-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858441" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.412.b08-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858442" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858443" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858444" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858445" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.412.b08-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856130" version="1" comment="java-11-openjdk is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856131" version="1" comment="java-11-openjdk-demo is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856132" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856133" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856134" version="1" comment="java-11-openjdk-devel is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856135" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856136" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856137" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856138" version="1" comment="java-11-openjdk-headless is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856139" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856140" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856141" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856142" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856143" version="1" comment="java-11-openjdk-jmods is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856144" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856145" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856146" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856147" version="1" comment="java-11-openjdk-src is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856148" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856149" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856150" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.23.0.9-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856151" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856152" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.23.0.9-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855576" version="1" comment="java-17-openjdk is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855577" version="1" comment="java-17-openjdk-demo is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855578" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855579" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855580" version="1" comment="java-17-openjdk-devel is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855581" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855582" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855583" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855584" version="1" comment="java-17-openjdk-headless is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855585" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855586" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855587" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855588" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855589" version="1" comment="java-17-openjdk-jmods is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855590" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855591" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855592" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855593" version="1" comment="java-17-openjdk-src is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855594" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855595" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855596" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855597" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855598" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.11.0.9-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855697" version="1" comment="java-21-openjdk is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855698" version="1" comment="java-21-openjdk-demo is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855699" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855700" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855701" version="1" comment="java-21-openjdk-devel is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855702" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855703" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855704" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855705" version="1" comment="java-21-openjdk-headless is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855706" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855707" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855708" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855709" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855710" version="1" comment="java-21-openjdk-jmods is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855711" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855712" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855713" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855714" version="1" comment="java-21-openjdk-src is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855715" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855716" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855717" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855718" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855719" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.3.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962392" version="1" comment="mariadb is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962393" version="1" comment="mariadb-backup is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962394" version="1" comment="mariadb-common is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962395" version="1" comment="mariadb-devel is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962396" version="1" comment="mariadb-embedded is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962397" version="1" comment="mariadb-embedded-devel is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962398" version="1" comment="mariadb-errmsg is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962399" version="1" comment="mariadb-gssapi-server is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962400" version="1" comment="mariadb-oqgraph-engine is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962401" version="1" comment="mariadb-pam is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962402" version="1" comment="mariadb-server is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962403" version="1" comment="mariadb-server-galera is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962404" version="1" comment="mariadb-server-utils is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962405" version="1" comment="mariadb-test is &lt;10.11.10-1.module+el9.5.0+22578+dc54e53f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876076" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876077" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876078" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876079" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.422.b05-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876080" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876081" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876082" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876083" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876084" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876085" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876086" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876087" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876088" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876089" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876090" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.422.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876091" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.422.b05-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876092" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876093" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876094" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876095" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.422.b05-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876330" version="1" comment="java-11-openjdk is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876331" version="1" comment="java-11-openjdk-demo is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876355" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876356" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876334" version="1" comment="java-11-openjdk-devel is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876358" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876359" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876360" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876338" version="1" comment="java-11-openjdk-headless is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876362" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876363" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876341" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876342" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876343" version="1" comment="java-11-openjdk-jmods is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876367" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876368" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876369" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876347" version="1" comment="java-11-openjdk-src is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876371" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876372" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876350" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.24.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876374" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876375" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.24.0.8-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876096" version="1" comment="java-17-openjdk is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876097" version="1" comment="java-17-openjdk-demo is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876098" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876099" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876100" version="1" comment="java-17-openjdk-devel is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876101" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876102" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876103" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876104" version="1" comment="java-17-openjdk-headless is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876105" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876106" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876107" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876108" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876109" version="1" comment="java-17-openjdk-jmods is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876110" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876111" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876112" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876113" version="1" comment="java-17-openjdk-src is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876114" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876115" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876116" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876117" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876118" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.12.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874669" version="1" comment="java-21-openjdk is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874670" version="1" comment="java-21-openjdk-demo is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874671" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874672" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874673" version="1" comment="java-21-openjdk-devel is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874674" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874675" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874676" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874677" version="1" comment="java-21-openjdk-headless is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874678" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874679" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874680" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874681" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874682" version="1" comment="java-21-openjdk-jmods is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874683" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874684" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874685" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874686" version="1" comment="java-21-openjdk-src is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874687" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874688" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874689" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874690" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874691" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.4.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846371" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053980" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872211" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872212" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846372" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053981" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872213" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846373" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053982" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872214" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872215" version="1" comment="dotnet-host is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846374" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053983" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872216" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846375" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053984" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872217" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872218" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846376" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.127-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846377" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.127-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053985" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.119-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872318" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.119-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872219" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872220" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872221" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846378" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.27-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053986" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.19-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872222" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.2-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846379" version="1" comment="dotnet-templates-6.0 is &lt;6.0.127-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053987" version="1" comment="dotnet-templates-7.0 is &lt;7.0.119-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872223" version="1" comment="dotnet-templates-8.0 is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872224" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.102-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872225" version="1" comment="aspnetcore-runtime-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872234" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872235" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872226" version="1" comment="aspnetcore-targeting-pack-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872236" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872227" version="1" comment="dotnet-apphost-pack-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872237" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872238" version="1" comment="dotnet-host is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872228" version="1" comment="dotnet-hostfxr-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872239" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872229" version="1" comment="dotnet-runtime-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872240" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872241" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872230" version="1" comment="dotnet-sdk-7.0 is &lt;7.0.117-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872231" version="1" comment="dotnet-sdk-7.0-source-built-artifacts is &lt;7.0.117-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872242" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872243" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872244" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872232" version="1" comment="dotnet-targeting-pack-7.0 is &lt;7.0.17-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872245" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.3-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872233" version="1" comment="dotnet-templates-7.0 is &lt;7.0.117-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872246" version="1" comment="dotnet-templates-8.0 is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872247" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.103-2.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845594" version="1" comment="runc is &lt;1.1.12-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867065" version="1" comment="389-ds-base is &lt;2.4.5-8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867066" version="1" comment="389-ds-base-libs is &lt;2.4.5-8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867067" version="1" comment="python3-lib389 is &lt;2.4.5-8.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881076" version="1" comment="nodejs is &lt;20.16.0-1.module+el9.4.0+22197+9e60f127 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881077" version="1" comment="nodejs-devel is &lt;20.16.0-1.module+el9.4.0+22197+9e60f127 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881078" version="1" comment="nodejs-docs is &lt;20.16.0-1.module+el9.4.0+22197+9e60f127 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881079" version="1" comment="nodejs-full-i18n is &lt;20.16.0-1.module+el9.4.0+22197+9e60f127 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881080" version="1" comment="npm is &lt;10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851941" version="1" comment="nodejs-libs is &lt;16.20.2-4.el9_3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868797" version="1" comment="nodejs is &lt;20.12.2-2.module+el9.4.0+21731+46b5b8a7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868798" version="1" comment="nodejs-devel is &lt;20.12.2-2.module+el9.4.0+21731+46b5b8a7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868799" version="1" comment="nodejs-docs is &lt;20.12.2-2.module+el9.4.0+21731+46b5b8a7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868800" version="1" comment="nodejs-full-i18n is &lt;20.12.2-2.module+el9.4.0+21731+46b5b8a7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866784" version="1" comment="nodejs-libs is &lt;16.20.2-8.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868801" version="1" comment="npm is &lt;10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866682" version="1" comment="python3-jinja2 is &lt;2.11.3-5.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953533" version="1" comment="freerdp is &lt;2.11.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953534" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953535" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953536" version="1" comment="libwinpr is &lt;2.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953537" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953749" version="1" comment="libgcrypt is &lt;1.10.0-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953750" version="1" comment="libgcrypt-devel is &lt;1.10.0-11.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866729" version="1" comment="pam is &lt;1.5.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866730" version="1" comment="pam-devel is &lt;1.5.1-19.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866731" version="1" comment="pam-docs is &lt;1.5.1-19.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953668" version="1" comment="bpftrace is &lt;0.21.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953662" version="1" comment="bcc is &lt;0.30.0-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953663" version="1" comment="bcc-devel is &lt;0.30.0-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953664" version="1" comment="bcc-doc is &lt;0.30.0-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953665" version="1" comment="bcc-tools is &lt;0.30.0-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953666" version="1" comment="libbpf-tools is &lt;0.30.0-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953667" version="1" comment="python3-bcc is &lt;0.30.0-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942252" version="1" comment="dovecot is &lt;2.3.16-11.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942253" version="1" comment="dovecot-devel is &lt;2.3.16-11.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942254" version="1" comment="dovecot-mysql is &lt;2.3.16-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942255" version="1" comment="dovecot-pgsql is &lt;2.3.16-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942256" version="1" comment="dovecot-pigeonhole is &lt;2.3.16-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009850290" version="1" comment="rear is &lt;2.6-21.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872665" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872666" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872667" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872668" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872669" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872670" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872671" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872672" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872673" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871638" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=15-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873482" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=14-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873483" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873484" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873485" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873922" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872674" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872675" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873486" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873487" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999228" version="1" comment="jq is &lt;1.6-17.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999229" version="1" comment="jq-devel is &lt;1.6-17.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866766" version="1" comment="libreswan is &lt;4.12-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876376" version="1" comment="squid is &lt;5.5-13.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866786" version="1" comment="tomcat is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866787" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866788" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866789" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866790" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866791" version="1" comment="tomcat-lib is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866792" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866793" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880234" version="1" comment="curl is &lt;7.76.1-29.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880235" version="1" comment="curl-minimal is &lt;7.76.1-29.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880236" version="1" comment="libcurl is &lt;7.76.1-29.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880237" version="1" comment="libcurl-devel is &lt;7.76.1-29.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880238" version="1" comment="libcurl-minimal is &lt;7.76.1-29.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866714" version="1" comment="freeglut is &lt;3.2.1-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866715" version="1" comment="freeglut-devel is &lt;3.2.1-10.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941967" version="1" comment="buildah is &lt;1.33.7-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941968" version="1" comment="buildah-tests is &lt;1.33.7-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941964" version="1" comment="containernetworking-plugins is &lt;1.4.0-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941965" version="1" comment="gvisor-tap-vsock is &lt;0.7.3-5.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941970" version="1" comment="podman is &lt;4.9.4-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941971" version="1" comment="podman-docker is &lt;4.9.4-10.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941972" version="1" comment="podman-plugins is &lt;4.9.4-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941973" version="1" comment="podman-remote is &lt;4.9.4-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941974" version="1" comment="podman-tests is &lt;4.9.4-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941966" version="1" comment="runc is &lt;1.1.12-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941975" version="1" comment="skopeo is &lt;1.14.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941976" version="1" comment="skopeo-tests is &lt;1.14.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866755" version="1" comment="buildah is &lt;1.33.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866756" version="1" comment="buildah-tests is &lt;1.33.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868754" version="1" comment="skopeo is &lt;1.14.3-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868755" version="1" comment="skopeo-tests is &lt;1.14.3-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953532" version="1" comment="containernetworking-plugins is &lt;1.5.1-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053877" version="1" comment="go-toolset is &lt;1.21.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053878" version="1" comment="golang is &lt;1.21.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053879" version="1" comment="golang-bin is &lt;1.21.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053880" version="1" comment="golang-docs is &lt;1.21.10-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053881" version="1" comment="golang-misc is &lt;1.21.10-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053882" version="1" comment="golang-src is &lt;1.21.10-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053883" version="1" comment="golang-tests is &lt;1.21.10-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953574" version="1" comment="grafana is &lt;10.2.6-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953575" version="1" comment="grafana-selinux is &lt;10.2.6-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953694" version="1" comment="oci-seccomp-bpf-hook is &lt;1.2.10-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953684" version="1" comment="runc is &lt;1.1.13-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953542" version="1" comment="skopeo is &lt;1.16.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953543" version="1" comment="skopeo-tests is &lt;1.16.1-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871865" version="1" comment="go-toolset is &lt;1.21.11-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871866" version="1" comment="golang is &lt;1.21.11-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871867" version="1" comment="golang-bin is &lt;1.21.11-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871868" version="1" comment="golang-docs is &lt;1.21.11-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871869" version="1" comment="golang-misc is &lt;1.21.11-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871870" version="1" comment="golang-src is &lt;1.21.11-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871871" version="1" comment="golang-tests is &lt;1.21.11-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953540" version="1" comment="buildah is &lt;1.37.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953541" version="1" comment="buildah-tests is &lt;1.37.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944120" version="1" comment="go-toolset is &lt;1.21.13-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944121" version="1" comment="golang is &lt;1.21.13-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944122" version="1" comment="golang-bin is &lt;1.21.13-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944123" version="1" comment="golang-docs is &lt;1.21.13-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944124" version="1" comment="golang-misc is &lt;1.21.13-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944125" version="1" comment="golang-src is &lt;1.21.13-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944126" version="1" comment="golang-tests is &lt;1.21.13-3.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877073" version="1" comment="libuv is &lt;1.42.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877074" version="1" comment="libuv-devel is &lt;1.42.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953652" version="1" comment="mod_auth_openidc is &lt;2.4.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868719" version="1" comment="libvirt is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868720" version="1" comment="libvirt-client is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868721" version="1" comment="libvirt-client-qemu is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868722" version="1" comment="libvirt-daemon is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868723" version="1" comment="libvirt-daemon-common is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868724" version="1" comment="libvirt-daemon-config-network is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868725" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868726" version="1" comment="libvirt-daemon-driver-interface is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868727" version="1" comment="libvirt-daemon-driver-network is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868728" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868729" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868730" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868731" version="1" comment="libvirt-daemon-driver-secret is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868732" version="1" comment="libvirt-daemon-driver-storage is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868733" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868734" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868735" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868736" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868737" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868738" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868739" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868740" version="1" comment="libvirt-daemon-kvm is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868741" version="1" comment="libvirt-daemon-lock is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868742" version="1" comment="libvirt-daemon-log is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868743" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868744" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868745" version="1" comment="libvirt-daemon-proxy is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868746" version="1" comment="libvirt-devel is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868747" version="1" comment="libvirt-docs is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868748" version="1" comment="libvirt-libs is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868749" version="1" comment="libvirt-nss is &lt;10.0.0-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866777" version="1" comment="libxml2 is &lt;2.9.13-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866778" version="1" comment="libxml2-devel is &lt;2.9.13-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866779" version="1" comment="python3-libxml2 is &lt;2.9.13-6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953764" version="1" comment="fontforge is &lt;20201107-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953743" version="1" comment="openssl is &lt;3.2.2-6.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953744" version="1" comment="openssl-devel is &lt;3.2.2-6.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953745" version="1" comment="openssl-fips-provider is &lt;3.0.7-6.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953746" version="1" comment="openssl-fips-provider-so is &lt;3.0.7-6.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953747" version="1" comment="openssl-libs is &lt;3.2.2-6.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953748" version="1" comment="openssl-perl is &lt;3.2.2-6.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866424" version="1" comment="pcs is &lt;0.11.7-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866425" version="1" comment="pcs-snmp is &lt;0.11.7-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870286" version="1" comment="c-ares is &lt;1.19.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870287" version="1" comment="c-ares-devel is &lt;1.19.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856159" version="1" comment="firefox is &lt;115.10.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856160" version="1" comment="firefox-x11 is &lt;115.10.0-1.el9_3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017700" version="1" comment="python3.12-cryptography is &lt;41.0.7-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953616" version="1" comment="qemu-guest-agent is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953617" version="1" comment="qemu-img is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953618" version="1" comment="qemu-kvm is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953619" version="1" comment="qemu-kvm-audio-pa is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953620" version="1" comment="qemu-kvm-block-blkio is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953621" version="1" comment="qemu-kvm-block-curl is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953622" version="1" comment="qemu-kvm-block-rbd is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953623" version="1" comment="qemu-kvm-common is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953624" version="1" comment="qemu-kvm-core is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953625" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953626" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953627" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953628" version="1" comment="qemu-kvm-device-usb-host is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953629" version="1" comment="qemu-kvm-device-usb-redirect is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953630" version="1" comment="qemu-kvm-docs is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953631" version="1" comment="qemu-kvm-tools is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953632" version="1" comment="qemu-kvm-ui-egl-headless is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953633" version="1" comment="qemu-kvm-ui-opengl is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953634" version="1" comment="qemu-pr-helper is &lt;9.0.0-10.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953736" version="1" comment="krb5-devel is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953737" version="1" comment="krb5-libs is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953738" version="1" comment="krb5-pkinit is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953739" version="1" comment="krb5-server is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953740" version="1" comment="krb5-server-ldap is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953741" version="1" comment="krb5-workstation is &lt;1.21.1-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953742" version="1" comment="libkadm5 is &lt;1.21.1-3.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957437" version="1" comment="bpftool is &lt;7.4.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957438" version="1" comment="kernel is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957439" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.16.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957440" version="1" comment="kernel-core is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957441" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957442" version="1" comment="kernel-debug is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957443" version="1" comment="kernel-debug-core is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957446" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957447" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957448" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957449" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957452" version="1" comment="kernel-doc is &lt;5.14.0-503.16.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957453" version="1" comment="kernel-headers is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957454" version="1" comment="kernel-modules is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957455" version="1" comment="kernel-modules-core is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957456" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957457" version="1" comment="kernel-tools is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957458" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957460" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957461" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957462" version="1" comment="libperf is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957463" version="1" comment="perf is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957464" version="1" comment="python3-perf is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957465" version="1" comment="rtla is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957466" version="1" comment="rv is &lt;5.14.0-503.16.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855866" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870112" version="1" comment="bpftool is &lt;7.3.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870113" version="1" comment="kernel is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870114" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.18.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870115" version="1" comment="kernel-core is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870116" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870117" version="1" comment="kernel-debug is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870118" version="1" comment="kernel-debug-core is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870121" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870122" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870123" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870124" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870127" version="1" comment="kernel-doc is &lt;5.14.0-427.18.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870128" version="1" comment="kernel-headers is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870129" version="1" comment="kernel-modules is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870130" version="1" comment="kernel-modules-core is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870131" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870132" version="1" comment="kernel-tools is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870133" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870135" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870136" version="1" comment="libperf is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870137" version="1" comment="perf is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870138" version="1" comment="python3-perf is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870139" version="1" comment="rtla is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870140" version="1" comment="rv is &lt;5.14.0-427.18.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030742" version="1" comment="bpftool is &lt;7.3.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030743" version="1" comment="kernel is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030744" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.22.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030745" version="1" comment="kernel-core is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030746" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030747" version="1" comment="kernel-debug is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030748" version="1" comment="kernel-debug-core is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030751" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030752" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030753" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030754" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030757" version="1" comment="kernel-doc is &lt;5.14.0-427.22.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030758" version="1" comment="kernel-headers is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030759" version="1" comment="kernel-modules is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030760" version="1" comment="kernel-modules-core is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030761" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030762" version="1" comment="kernel-tools is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030763" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030765" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030766" version="1" comment="libperf is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030767" version="1" comment="perf is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030768" version="1" comment="python3-perf is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030769" version="1" comment="rtla is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030770" version="1" comment="rv is &lt;5.14.0-427.22.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870141" version="1" comment="bpftool is &lt;7.3.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870142" version="1" comment="kernel is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870143" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-427.20.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870144" version="1" comment="kernel-core is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870145" version="1" comment="kernel-cross-headers is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870146" version="1" comment="kernel-debug is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870147" version="1" comment="kernel-debug-core is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870150" version="1" comment="kernel-debug-modules is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870151" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870152" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870153" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870156" version="1" comment="kernel-doc is &lt;5.14.0-427.20.1.el9_4 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870157" version="1" comment="kernel-headers is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870158" version="1" comment="kernel-modules is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870159" version="1" comment="kernel-modules-core is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870160" version="1" comment="kernel-modules-extra is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870161" version="1" comment="kernel-tools is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870162" version="1" comment="kernel-tools-libs is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870164" version="1" comment="kernel-uki-virt is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870165" version="1" comment="libperf is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870166" version="1" comment="perf is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870167" version="1" comment="python3-perf is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870168" version="1" comment="rtla is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009870169" version="1" comment="rv is &lt;5.14.0-427.20.1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019451" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019452" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019453" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019454" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019702" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019455" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019456" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019457" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019458" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019703" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019459" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012374" version="1" comment="kernel-default is &lt;5.14.21-150400.24.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012356" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011944" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011824" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=19-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868525" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868528" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868529" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868937" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868938" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868939" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878779" version="1" comment="kernel-default is &lt;6.4.0-150600.21.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871308" version="1" comment="ipa-client is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871309" version="1" comment="ipa-client-common is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871310" version="1" comment="ipa-client-epn is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871311" version="1" comment="ipa-client-samba is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871312" version="1" comment="ipa-common is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871313" version="1" comment="ipa-selinux is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871314" version="1" comment="ipa-server is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871315" version="1" comment="ipa-server-common is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871316" version="1" comment="ipa-server-dns is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871317" version="1" comment="ipa-server-trust-ad is &lt;4.11.0-15.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871318" version="1" comment="python3-ipaclient is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871319" version="1" comment="python3-ipalib is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871320" version="1" comment="python3-ipaserver is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871321" version="1" comment="python3-ipatests is &lt;4.11.0-15.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961322" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=9-150600.4.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874712" version="1" comment="ruby is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874713" version="1" comment="ruby-bundled-gems is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874714" version="1" comment="ruby-default-gems is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874715" version="1" comment="ruby-devel is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874716" version="1" comment="ruby-doc is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874717" version="1" comment="ruby-libs is &lt;3.3.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874718" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874719" version="1" comment="rubygem-bundler is &lt;2.5.9-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874720" version="1" comment="rubygem-io-console is &lt;0.7.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874721" version="1" comment="rubygem-irb is &lt;1.11.0-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874722" version="1" comment="rubygem-json is &lt;2.7.1-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874723" version="1" comment="rubygem-minitest is &lt;5.20.0-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874724" version="1" comment="rubygem-mysql2 is &lt;0.5.5-1.module+el9.4.0+21222+faeeed2f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874725" version="1" comment="rubygem-mysql2-doc is &lt;0.5.5-1.module+el9.4.0+21222+faeeed2f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874726" version="1" comment="rubygem-pg is &lt;1.5.4-1.module+el9.4.0+21222+faeeed2f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874727" version="1" comment="rubygem-pg-doc is &lt;1.5.4-1.module+el9.4.0+21222+faeeed2f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874728" version="1" comment="rubygem-power_assert is &lt;2.0.3-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874729" version="1" comment="rubygem-psych is &lt;5.1.2-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874730" version="1" comment="rubygem-racc is &lt;1.7.3-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874731" version="1" comment="rubygem-rake is &lt;13.1.0-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874732" version="1" comment="rubygem-rbs is &lt;3.4.0-2.module+el9.4.0+21859+16f07581 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874733" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874734" version="1" comment="rubygem-rexml is &lt;3.2.6-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874735" version="1" comment="rubygem-rss is &lt;0.3.0-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874736" version="1" comment="rubygem-test-unit is &lt;3.6.1-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874737" version="1" comment="rubygem-typeprof is &lt;0.21.9-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874738" version="1" comment="rubygems is &lt;3.5.9-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874739" version="1" comment="rubygems-devel is &lt;3.5.9-2.module+el9.4.0+21859+16f07581 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866765" version="1" comment="mod_http2 is &lt;2.0.26-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878547" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878548" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878549" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878550" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878551" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878552" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878553" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878554" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877990" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878069" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877991" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877992" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877993" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877994" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877995" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878070" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878071" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878072" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878073" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878074" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878075" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878076" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878077" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878212" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878555" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878556" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878557" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878558" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878559" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878560" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878561" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878562" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878563" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878564" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878565" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878566" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878567" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878568" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878569" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878570" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957468" version="1" comment="php is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957469" version="1" comment="php-bcmath is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957470" version="1" comment="php-cli is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957471" version="1" comment="php-common is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957472" version="1" comment="php-dba is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957473" version="1" comment="php-dbg is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957474" version="1" comment="php-devel is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957475" version="1" comment="php-embedded is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957476" version="1" comment="php-enchant is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957477" version="1" comment="php-ffi is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957478" version="1" comment="php-fpm is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957479" version="1" comment="php-gd is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957480" version="1" comment="php-gmp is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957481" version="1" comment="php-intl is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957482" version="1" comment="php-ldap is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957483" version="1" comment="php-mbstring is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957484" version="1" comment="php-mysqlnd is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957485" version="1" comment="php-odbc is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957486" version="1" comment="php-opcache is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957487" version="1" comment="php-pdo is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957493" version="1" comment="php-pgsql is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957494" version="1" comment="php-process is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957495" version="1" comment="php-snmp is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957496" version="1" comment="php-soap is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957497" version="1" comment="php-xml is &lt;8.2.25-1.module+el9.5.0+22477+5fdac06d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953935" version="1" comment="webkit2gtk3 is &lt;2.46.3-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953936" version="1" comment="webkit2gtk3-devel is &lt;2.46.3-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953937" version="1" comment="webkit2gtk3-jsc is &lt;2.46.3-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953938" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.3-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984837" version="1" comment="microcode_ctl is &lt;20250211-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866757" version="1" comment="python3-jwcrypto is &lt;0.8-5.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872319" version="1" comment="libnghttp2 is &lt;1.43.0-5.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872320" version="1" comment="libnghttp2-devel is &lt;1.43.0-5.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872321" version="1" comment="nghttp2 is &lt;1.43.0-5.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053875" version="1" comment="expat is &lt;2.5.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053876" version="1" comment="expat-devel is &lt;2.5.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868787" version="1" comment="gnutls is &lt;3.8.3-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868788" version="1" comment="gnutls-c++ is &lt;3.8.3-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868789" version="1" comment="gnutls-dane is &lt;3.8.3-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868790" version="1" comment="gnutls-devel is &lt;3.8.3-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868791" version="1" comment="gnutls-utils is &lt;3.8.3-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940517" version="1" comment="nodejs is &lt;18.20.4-1.module+el9.4.0+22195+c221878e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940518" version="1" comment="nodejs-devel is &lt;18.20.4-1.module+el9.4.0+22195+c221878e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940519" version="1" comment="nodejs-docs is &lt;18.20.4-1.module+el9.4.0+22195+c221878e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940520" version="1" comment="nodejs-full-i18n is &lt;18.20.4-1.module+el9.4.0+22195+c221878e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009851983" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.3.0+19762+d716bf3b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940521" version="1" comment="npm is &lt;10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015542" version="1" comment="kernel is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015543" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.35.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015544" version="1" comment="kernel-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015545" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015546" version="1" comment="kernel-debug is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015547" version="1" comment="kernel-debug-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015550" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015551" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015552" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015553" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015556" version="1" comment="kernel-doc is &lt;5.14.0-570.35.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015557" version="1" comment="kernel-headers is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015558" version="1" comment="kernel-modules is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015559" version="1" comment="kernel-modules-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015560" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015561" version="1" comment="kernel-rt is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015562" version="1" comment="kernel-rt-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015563" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015564" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015566" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015567" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015568" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015569" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015571" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015572" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015573" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015574" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015575" version="1" comment="kernel-tools is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015576" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015578" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015579" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015580" version="1" comment="libperf is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053953" version="1" comment="microcode_ctl is &lt;20250211-1.20250512.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015581" version="1" comment="perf is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015582" version="1" comment="python3-perf is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015583" version="1" comment="rtla is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015584" version="1" comment="rv is &lt;5.14.0-570.35.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953762" version="1" comment="tpm2-tools is &lt;5.2-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871325" version="1" comment="cockpit is &lt;311.2-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871326" version="1" comment="cockpit-bridge is &lt;311.2-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871327" version="1" comment="cockpit-doc is &lt;311.2-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871328" version="1" comment="cockpit-packagekit is &lt;311.2-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871329" version="1" comment="cockpit-pcp is &lt;311.2-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871330" version="1" comment="cockpit-storaged is &lt;311.2-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871331" version="1" comment="cockpit-system is &lt;311.2-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871332" version="1" comment="cockpit-ws is &lt;311.2-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942234" version="1" comment="ghostscript is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942235" version="1" comment="ghostscript-doc is &lt;9.54.0-17.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942236" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-17.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942237" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942238" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942239" version="1" comment="ghostscript-x11 is &lt;9.54.0-17.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942240" version="1" comment="libgs is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942241" version="1" comment="libgs-devel is &lt;9.54.0-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866794" version="1" comment="glibc is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866795" version="1" comment="glibc-all-langpacks is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866796" version="1" comment="glibc-benchtests is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866797" version="1" comment="glibc-common is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866798" version="1" comment="glibc-devel is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866799" version="1" comment="glibc-doc is &lt;2.34-100.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866800" version="1" comment="glibc-gconv-extra is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866801" version="1" comment="glibc-headers is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866802" version="1" comment="glibc-langpack-aa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866803" version="1" comment="glibc-langpack-af is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866804" version="1" comment="glibc-langpack-agr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866805" version="1" comment="glibc-langpack-ak is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866806" version="1" comment="glibc-langpack-am is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866807" version="1" comment="glibc-langpack-an is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866808" version="1" comment="glibc-langpack-anp is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866809" version="1" comment="glibc-langpack-ar is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866810" version="1" comment="glibc-langpack-as is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866811" version="1" comment="glibc-langpack-ast is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866812" version="1" comment="glibc-langpack-ayc is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866813" version="1" comment="glibc-langpack-az is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866814" version="1" comment="glibc-langpack-be is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866815" version="1" comment="glibc-langpack-bem is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866816" version="1" comment="glibc-langpack-ber is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866817" version="1" comment="glibc-langpack-bg is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866818" version="1" comment="glibc-langpack-bhb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866819" version="1" comment="glibc-langpack-bho is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866820" version="1" comment="glibc-langpack-bi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866821" version="1" comment="glibc-langpack-bn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866822" version="1" comment="glibc-langpack-bo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866823" version="1" comment="glibc-langpack-br is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866824" version="1" comment="glibc-langpack-brx is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866825" version="1" comment="glibc-langpack-bs is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866826" version="1" comment="glibc-langpack-byn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866827" version="1" comment="glibc-langpack-ca is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866828" version="1" comment="glibc-langpack-ce is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866829" version="1" comment="glibc-langpack-chr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866830" version="1" comment="glibc-langpack-ckb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866831" version="1" comment="glibc-langpack-cmn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866832" version="1" comment="glibc-langpack-crh is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866833" version="1" comment="glibc-langpack-cs is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866834" version="1" comment="glibc-langpack-csb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866835" version="1" comment="glibc-langpack-cv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866836" version="1" comment="glibc-langpack-cy is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866837" version="1" comment="glibc-langpack-da is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866838" version="1" comment="glibc-langpack-de is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866839" version="1" comment="glibc-langpack-doi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866840" version="1" comment="glibc-langpack-dsb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866841" version="1" comment="glibc-langpack-dv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866842" version="1" comment="glibc-langpack-dz is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866843" version="1" comment="glibc-langpack-el is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866844" version="1" comment="glibc-langpack-en is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866845" version="1" comment="glibc-langpack-eo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866846" version="1" comment="glibc-langpack-es is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866847" version="1" comment="glibc-langpack-et is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866848" version="1" comment="glibc-langpack-eu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866849" version="1" comment="glibc-langpack-fa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866850" version="1" comment="glibc-langpack-ff is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866851" version="1" comment="glibc-langpack-fi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866852" version="1" comment="glibc-langpack-fil is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866853" version="1" comment="glibc-langpack-fo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866854" version="1" comment="glibc-langpack-fr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866855" version="1" comment="glibc-langpack-fur is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866856" version="1" comment="glibc-langpack-fy is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866857" version="1" comment="glibc-langpack-ga is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866858" version="1" comment="glibc-langpack-gd is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866859" version="1" comment="glibc-langpack-gez is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866860" version="1" comment="glibc-langpack-gl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866861" version="1" comment="glibc-langpack-gu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866862" version="1" comment="glibc-langpack-gv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866863" version="1" comment="glibc-langpack-ha is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866864" version="1" comment="glibc-langpack-hak is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866865" version="1" comment="glibc-langpack-he is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866866" version="1" comment="glibc-langpack-hi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866867" version="1" comment="glibc-langpack-hif is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866868" version="1" comment="glibc-langpack-hne is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866869" version="1" comment="glibc-langpack-hr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866870" version="1" comment="glibc-langpack-hsb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866871" version="1" comment="glibc-langpack-ht is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866872" version="1" comment="glibc-langpack-hu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866873" version="1" comment="glibc-langpack-hy is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866874" version="1" comment="glibc-langpack-ia is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866875" version="1" comment="glibc-langpack-id is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866876" version="1" comment="glibc-langpack-ig is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866877" version="1" comment="glibc-langpack-ik is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866878" version="1" comment="glibc-langpack-is is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866879" version="1" comment="glibc-langpack-it is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866880" version="1" comment="glibc-langpack-iu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866881" version="1" comment="glibc-langpack-ja is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866882" version="1" comment="glibc-langpack-ka is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866883" version="1" comment="glibc-langpack-kab is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866884" version="1" comment="glibc-langpack-kk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866885" version="1" comment="glibc-langpack-kl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866886" version="1" comment="glibc-langpack-km is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866887" version="1" comment="glibc-langpack-kn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866888" version="1" comment="glibc-langpack-ko is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866889" version="1" comment="glibc-langpack-kok is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866890" version="1" comment="glibc-langpack-ks is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866891" version="1" comment="glibc-langpack-ku is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866892" version="1" comment="glibc-langpack-kw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866893" version="1" comment="glibc-langpack-ky is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866894" version="1" comment="glibc-langpack-lb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866895" version="1" comment="glibc-langpack-lg is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866896" version="1" comment="glibc-langpack-li is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866897" version="1" comment="glibc-langpack-lij is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866898" version="1" comment="glibc-langpack-ln is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866899" version="1" comment="glibc-langpack-lo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866900" version="1" comment="glibc-langpack-lt is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866901" version="1" comment="glibc-langpack-lv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866902" version="1" comment="glibc-langpack-lzh is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866903" version="1" comment="glibc-langpack-mag is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866904" version="1" comment="glibc-langpack-mai is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866905" version="1" comment="glibc-langpack-mfe is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866906" version="1" comment="glibc-langpack-mg is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866907" version="1" comment="glibc-langpack-mhr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866908" version="1" comment="glibc-langpack-mi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866909" version="1" comment="glibc-langpack-miq is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866910" version="1" comment="glibc-langpack-mjw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866911" version="1" comment="glibc-langpack-mk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866912" version="1" comment="glibc-langpack-ml is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866913" version="1" comment="glibc-langpack-mn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866914" version="1" comment="glibc-langpack-mni is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866915" version="1" comment="glibc-langpack-mnw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866916" version="1" comment="glibc-langpack-mr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866917" version="1" comment="glibc-langpack-ms is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866918" version="1" comment="glibc-langpack-mt is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866919" version="1" comment="glibc-langpack-my is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866920" version="1" comment="glibc-langpack-nan is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866921" version="1" comment="glibc-langpack-nb is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866922" version="1" comment="glibc-langpack-nds is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866923" version="1" comment="glibc-langpack-ne is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866924" version="1" comment="glibc-langpack-nhn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866925" version="1" comment="glibc-langpack-niu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866926" version="1" comment="glibc-langpack-nl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866927" version="1" comment="glibc-langpack-nn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866928" version="1" comment="glibc-langpack-nr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866929" version="1" comment="glibc-langpack-nso is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866930" version="1" comment="glibc-langpack-oc is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866931" version="1" comment="glibc-langpack-om is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866932" version="1" comment="glibc-langpack-or is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866933" version="1" comment="glibc-langpack-os is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866934" version="1" comment="glibc-langpack-pa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866935" version="1" comment="glibc-langpack-pap is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866936" version="1" comment="glibc-langpack-pl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866937" version="1" comment="glibc-langpack-ps is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866938" version="1" comment="glibc-langpack-pt is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866939" version="1" comment="glibc-langpack-quz is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866940" version="1" comment="glibc-langpack-raj is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866941" version="1" comment="glibc-langpack-ro is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866942" version="1" comment="glibc-langpack-ru is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866943" version="1" comment="glibc-langpack-rw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866944" version="1" comment="glibc-langpack-sa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866945" version="1" comment="glibc-langpack-sah is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866946" version="1" comment="glibc-langpack-sat is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866947" version="1" comment="glibc-langpack-sc is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866948" version="1" comment="glibc-langpack-sd is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866949" version="1" comment="glibc-langpack-se is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866950" version="1" comment="glibc-langpack-sgs is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866951" version="1" comment="glibc-langpack-shn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866952" version="1" comment="glibc-langpack-shs is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866953" version="1" comment="glibc-langpack-si is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866954" version="1" comment="glibc-langpack-sid is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866955" version="1" comment="glibc-langpack-sk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866956" version="1" comment="glibc-langpack-sl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866957" version="1" comment="glibc-langpack-sm is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866958" version="1" comment="glibc-langpack-so is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866959" version="1" comment="glibc-langpack-sq is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866960" version="1" comment="glibc-langpack-sr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866961" version="1" comment="glibc-langpack-ss is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866962" version="1" comment="glibc-langpack-st is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866963" version="1" comment="glibc-langpack-sv is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866964" version="1" comment="glibc-langpack-sw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866965" version="1" comment="glibc-langpack-szl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866966" version="1" comment="glibc-langpack-ta is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866967" version="1" comment="glibc-langpack-tcy is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866968" version="1" comment="glibc-langpack-te is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866969" version="1" comment="glibc-langpack-tg is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866970" version="1" comment="glibc-langpack-th is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866971" version="1" comment="glibc-langpack-the is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866972" version="1" comment="glibc-langpack-ti is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866973" version="1" comment="glibc-langpack-tig is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866974" version="1" comment="glibc-langpack-tk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866975" version="1" comment="glibc-langpack-tl is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866976" version="1" comment="glibc-langpack-tn is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866977" version="1" comment="glibc-langpack-to is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866978" version="1" comment="glibc-langpack-tpi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866979" version="1" comment="glibc-langpack-tr is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866980" version="1" comment="glibc-langpack-ts is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866981" version="1" comment="glibc-langpack-tt is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866982" version="1" comment="glibc-langpack-ug is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866983" version="1" comment="glibc-langpack-uk is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866984" version="1" comment="glibc-langpack-unm is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866985" version="1" comment="glibc-langpack-ur is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866986" version="1" comment="glibc-langpack-uz is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866987" version="1" comment="glibc-langpack-ve is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866988" version="1" comment="glibc-langpack-vi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866989" version="1" comment="glibc-langpack-wa is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866990" version="1" comment="glibc-langpack-wae is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866991" version="1" comment="glibc-langpack-wal is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866992" version="1" comment="glibc-langpack-wo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866993" version="1" comment="glibc-langpack-xh is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866994" version="1" comment="glibc-langpack-yi is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866995" version="1" comment="glibc-langpack-yo is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866996" version="1" comment="glibc-langpack-yue is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866997" version="1" comment="glibc-langpack-yuw is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866998" version="1" comment="glibc-langpack-zh is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866999" version="1" comment="glibc-langpack-zu is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867000" version="1" comment="glibc-locale-source is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867001" version="1" comment="glibc-minimal-langpack is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867002" version="1" comment="glibc-nss-devel is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867003" version="1" comment="glibc-static is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867004" version="1" comment="glibc-utils is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867005" version="1" comment="libnsl is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867006" version="1" comment="nscd is &lt;2.34-100.el9_4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867007" version="1" comment="nss_db is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867008" version="1" comment="nss_hesiod is &lt;2.34-100.el9_4.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872304" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872305" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872306" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872307" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872308" version="1" comment="dotnet-host is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872309" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872310" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872311" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872312" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872313" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872314" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872315" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872316" version="1" comment="dotnet-templates-8.0 is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872317" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.105-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872973" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872974" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872975" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872976" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872977" version="1" comment="dotnet-host is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872978" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872979" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872980" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872981" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872982" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872983" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872984" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.7-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872985" version="1" comment="dotnet-templates-8.0 is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872986" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.107-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853725" version="1" comment="varnish is &lt;6.6.2-4.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853726" version="1" comment="varnish-devel is &lt;6.6.2-4.el9_3.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853727" version="1" comment="varnish-docs is &lt;6.6.2-4.el9_3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872841" version="1" comment="pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872842" version="1" comment="pcp-conf is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872843" version="1" comment="pcp-devel is &lt;6.2.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872844" version="1" comment="pcp-doc is &lt;6.2.0-2.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872845" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872846" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872847" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872848" version="1" comment="pcp-export-pcp2json is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872849" version="1" comment="pcp-export-pcp2spark is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872850" version="1" comment="pcp-export-pcp2xml is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872851" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872852" version="1" comment="pcp-export-zabbix-agent is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872853" version="1" comment="pcp-geolocate is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872854" version="1" comment="pcp-gui is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872855" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872856" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872857" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872858" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872859" version="1" comment="pcp-import-sar2pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872860" version="1" comment="pcp-libs is &lt;6.2.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872861" version="1" comment="pcp-libs-devel is &lt;6.2.0-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872862" version="1" comment="pcp-pmda-activemq is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872863" version="1" comment="pcp-pmda-apache is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872864" version="1" comment="pcp-pmda-bash is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872865" version="1" comment="pcp-pmda-bcc is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872866" version="1" comment="pcp-pmda-bind2 is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872867" version="1" comment="pcp-pmda-bonding is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872868" version="1" comment="pcp-pmda-bpf is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872869" version="1" comment="pcp-pmda-bpftrace is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872870" version="1" comment="pcp-pmda-cifs is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872871" version="1" comment="pcp-pmda-cisco is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872872" version="1" comment="pcp-pmda-dbping is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872873" version="1" comment="pcp-pmda-denki is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872874" version="1" comment="pcp-pmda-dm is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872875" version="1" comment="pcp-pmda-docker is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872876" version="1" comment="pcp-pmda-ds389 is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872877" version="1" comment="pcp-pmda-ds389log is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872878" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872879" version="1" comment="pcp-pmda-farm is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872880" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872881" version="1" comment="pcp-pmda-gluster is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872882" version="1" comment="pcp-pmda-gpfs is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872883" version="1" comment="pcp-pmda-gpsd is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872884" version="1" comment="pcp-pmda-hacluster is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872885" version="1" comment="pcp-pmda-haproxy is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872886" version="1" comment="pcp-pmda-infiniband is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872887" version="1" comment="pcp-pmda-json is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872888" version="1" comment="pcp-pmda-libvirt is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872889" version="1" comment="pcp-pmda-lio is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872890" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872891" version="1" comment="pcp-pmda-logger is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872892" version="1" comment="pcp-pmda-lustre is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872893" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872894" version="1" comment="pcp-pmda-mailq is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872895" version="1" comment="pcp-pmda-memcache is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872896" version="1" comment="pcp-pmda-mic is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872897" version="1" comment="pcp-pmda-mongodb is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872898" version="1" comment="pcp-pmda-mounts is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872899" version="1" comment="pcp-pmda-mssql is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872900" version="1" comment="pcp-pmda-mysql is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872901" version="1" comment="pcp-pmda-named is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872902" version="1" comment="pcp-pmda-netcheck is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872903" version="1" comment="pcp-pmda-netfilter is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872904" version="1" comment="pcp-pmda-news is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872905" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872906" version="1" comment="pcp-pmda-nginx is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872907" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872908" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872909" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872910" version="1" comment="pcp-pmda-oracle is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872911" version="1" comment="pcp-pmda-pdns is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872912" version="1" comment="pcp-pmda-perfevent is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872913" version="1" comment="pcp-pmda-podman is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872914" version="1" comment="pcp-pmda-postfix is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872915" version="1" comment="pcp-pmda-postgresql is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872916" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872917" version="1" comment="pcp-pmda-redis is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872918" version="1" comment="pcp-pmda-resctrl is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872919" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872920" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872921" version="1" comment="pcp-pmda-samba is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872922" version="1" comment="pcp-pmda-sendmail is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872923" version="1" comment="pcp-pmda-shping is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872924" version="1" comment="pcp-pmda-slurm is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872925" version="1" comment="pcp-pmda-smart is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872926" version="1" comment="pcp-pmda-snmp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872927" version="1" comment="pcp-pmda-sockets is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872928" version="1" comment="pcp-pmda-statsd is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872929" version="1" comment="pcp-pmda-summary is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872930" version="1" comment="pcp-pmda-systemd is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872931" version="1" comment="pcp-pmda-trace is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872932" version="1" comment="pcp-pmda-unbound is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872933" version="1" comment="pcp-pmda-weblog is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872934" version="1" comment="pcp-pmda-zimbra is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872935" version="1" comment="pcp-pmda-zswap is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872936" version="1" comment="pcp-selinux is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872937" version="1" comment="pcp-system-tools is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872938" version="1" comment="pcp-zeroconf is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872939" version="1" comment="perl-PCP-LogImport is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872940" version="1" comment="perl-PCP-LogSummary is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872941" version="1" comment="perl-PCP-MMV is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872942" version="1" comment="perl-PCP-PMDA is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872943" version="1" comment="python3-pcp is &lt;6.2.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953696" version="1" comment="emacs is &lt;27.2-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953697" version="1" comment="emacs-common is &lt;27.2-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953698" version="1" comment="emacs-filesystem is &lt;27.2-10.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953699" version="1" comment="emacs-lucid is &lt;27.2-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953700" version="1" comment="emacs-nox is &lt;27.2-10.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866770" version="1" comment="tigervnc is &lt;1.13.1-8.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866771" version="1" comment="tigervnc-icons is &lt;1.13.1-8.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866772" version="1" comment="tigervnc-license is &lt;1.13.1-8.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866773" version="1" comment="tigervnc-selinux is &lt;1.13.1-8.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866774" version="1" comment="tigervnc-server is &lt;1.13.1-8.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866775" version="1" comment="tigervnc-server-minimal is &lt;1.13.1-8.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009866776" version="1" comment="tigervnc-server-module is &lt;1.13.1-8.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953576" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953577" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953578" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953579" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953580" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953538" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953539" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953581" version="1" comment="xorg-x11-server-common is &lt;1.20.11-26.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953582" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-26.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953583" version="1" comment="xorg-x11-server-source is &lt;1.20.11-26.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869954" version="1" comment="git is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869955" version="1" comment="git-all is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869956" version="1" comment="git-core is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869957" version="1" comment="git-core-doc is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869958" version="1" comment="git-credential-libsecret is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869959" version="1" comment="git-daemon is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869960" version="1" comment="git-email is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869961" version="1" comment="git-gui is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869962" version="1" comment="git-instaweb is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869963" version="1" comment="git-subtree is &lt;2.43.5-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869964" version="1" comment="git-svn is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869965" version="1" comment="gitk is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869966" version="1" comment="gitweb is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869967" version="1" comment="perl-Git is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869968" version="1" comment="perl-Git-SVN is &lt;2.43.5-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869924" version="1" comment="flatpak is &lt;1.12.9-1.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869925" version="1" comment="flatpak-devel is &lt;1.12.9-1.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869926" version="1" comment="flatpak-libs is &lt;1.12.9-1.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869927" version="1" comment="flatpak-selinux is &lt;1.12.9-1.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869928" version="1" comment="flatpak-session-helper is &lt;1.12.9-1.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867009" version="1" comment="less is &lt;590-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869929" version="1" comment="ghostscript is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869930" version="1" comment="ghostscript-doc is &lt;9.54.0-16.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869931" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869932" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869933" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869934" version="1" comment="ghostscript-x11 is &lt;9.54.0-16.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869935" version="1" comment="libgs is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869936" version="1" comment="libgs-devel is &lt;9.54.0-16.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953680" version="1" comment="cyrus-imapd is &lt;3.4.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953681" version="1" comment="cyrus-imapd-libs is &lt;3.4.8-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953682" version="1" comment="cyrus-imapd-utils is &lt;3.4.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953683" version="1" comment="perl-Cyrus is &lt;3.4.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867010" version="1" comment="fence-agents-aliyun is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867011" version="1" comment="fence-agents-all is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867012" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867013" version="1" comment="fence-agents-apc is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867014" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867015" version="1" comment="fence-agents-aws is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867016" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867017" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867018" version="1" comment="fence-agents-brocade is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867019" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867020" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867021" version="1" comment="fence-agents-common is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867022" version="1" comment="fence-agents-compute is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867023" version="1" comment="fence-agents-drac5 is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867024" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867025" version="1" comment="fence-agents-emerson is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867026" version="1" comment="fence-agents-eps is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867027" version="1" comment="fence-agents-gce is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867028" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867029" version="1" comment="fence-agents-hpblade is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867030" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867031" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867032" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867033" version="1" comment="fence-agents-ifmib is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867034" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867035" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867036" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867037" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867038" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867039" version="1" comment="fence-agents-ipdu is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867040" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867041" version="1" comment="fence-agents-kdump is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867042" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867043" version="1" comment="fence-agents-mpath is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867044" version="1" comment="fence-agents-openstack is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867045" version="1" comment="fence-agents-redfish is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867046" version="1" comment="fence-agents-rhevm is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867047" version="1" comment="fence-agents-rsa is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867048" version="1" comment="fence-agents-rsb is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867049" version="1" comment="fence-agents-sbd is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867050" version="1" comment="fence-agents-scsi is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867051" version="1" comment="fence-agents-virsh is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867052" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867053" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867054" version="1" comment="fence-agents-wti is &lt;4.10.0-62.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867055" version="1" comment="fence-virt is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867056" version="1" comment="fence-virtd is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867057" version="1" comment="fence-virtd-cpg is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867058" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867059" version="1" comment="fence-virtd-multicast is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867060" version="1" comment="fence-virtd-serial is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867061" version="1" comment="fence-virtd-tcp is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867062" version="1" comment="ha-cloud-support is &lt;4.10.0-62.el9_4.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953639" version="1" comment="python3-jinja2 is &lt;2.11.3-6.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953901" version="1" comment="buildah is &lt;1.37.5-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953902" version="1" comment="buildah-tests is &lt;1.37.5-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953894" version="1" comment="podman is &lt;5.2.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953895" version="1" comment="podman-docker is &lt;5.2.2-9.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953896" version="1" comment="podman-plugins is &lt;5.2.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953897" version="1" comment="podman-remote is &lt;5.2.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953898" version="1" comment="podman-tests is &lt;5.2.2-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958544" version="1" comment="containernetworking-plugins is &lt;1.5.1-3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974982" version="1" comment="delve is &lt;1.24.1-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944793" version="1" comment="git-lfs is &lt;3.4.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974983" version="1" comment="go-toolset is &lt;1.23.6-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974984" version="1" comment="golang is &lt;1.23.6-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974985" version="1" comment="golang-bin is &lt;1.23.6-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974986" version="1" comment="golang-docs is &lt;1.23.6-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974987" version="1" comment="golang-misc is &lt;1.23.6-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974988" version="1" comment="golang-race is &lt;1.23.6-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974989" version="1" comment="golang-src is &lt;1.23.6-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974990" version="1" comment="golang-tests is &lt;1.23.6-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953920" version="1" comment="grafana is &lt;10.2.6-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953919" version="1" comment="grafana-pcp is &lt;5.1.1-9.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953921" version="1" comment="grafana-selinux is &lt;10.2.6-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958545" version="1" comment="skopeo is &lt;1.16.1-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958546" version="1" comment="skopeo-tests is &lt;1.16.1-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941597" version="1" comment="glib2 is &lt;2.68.4-14.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941598" version="1" comment="glib2-devel is &lt;2.68.4-14.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941599" version="1" comment="glib2-doc is &lt;2.68.4-14.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941600" version="1" comment="glib2-static is &lt;2.68.4-14.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941601" version="1" comment="glib2-tests is &lt;2.68.4-14.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953765" version="1" comment="mingw32-glib2 is &lt;2.78.6-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953766" version="1" comment="mingw32-glib2-static is &lt;2.78.6-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953767" version="1" comment="mingw64-glib2 is &lt;2.78.6-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953768" version="1" comment="mingw64-glib2-static is &lt;2.78.6-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880871" version="1" comment="tomcat is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880872" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880873" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880874" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880875" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880876" version="1" comment="tomcat-lib is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880877" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880878" version="1" comment="tomcat-webapps is &lt;9.0.87-1.el9_4.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983870" version="1" comment="python3-requests is &lt;2.25.1-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983871" version="1" comment="python3-requests+security is &lt;2.25.1-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983872" version="1" comment="python3-requests+socks is &lt;2.25.1-9.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877132" version="1" comment="cups is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877133" version="1" comment="cups-client is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877134" version="1" comment="cups-devel is &lt;2.3.3op2-27.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877135" version="1" comment="cups-filesystem is &lt;2.3.3op2-27.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877136" version="1" comment="cups-ipptool is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877137" version="1" comment="cups-libs is &lt;2.3.3op2-27.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877138" version="1" comment="cups-lpd is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877139" version="1" comment="cups-printerapp is &lt;2.3.3op2-27.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965821" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966032" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966033" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966284" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966285" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966286" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966034" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966035" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966036" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966037" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948623" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966038" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966039" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965822" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966040" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=11-150600.4.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965286" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=10-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943402" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943025" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=3-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947519" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947520" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947521" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947522" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947523" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947524" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947525" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947526" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947527" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947528" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947409" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=4-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948666" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957145" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956863" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956201" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956556" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956558" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=7-150600.4.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955679" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=6-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877798" version="1" comment="freeradius is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877799" version="1" comment="freeradius-devel is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877800" version="1" comment="freeradius-doc is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877801" version="1" comment="freeradius-krb5 is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877802" version="1" comment="freeradius-ldap is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877803" version="1" comment="freeradius-mysql is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877804" version="1" comment="freeradius-perl is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877805" version="1" comment="freeradius-postgresql is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877806" version="1" comment="freeradius-rest is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877807" version="1" comment="freeradius-sqlite is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877808" version="1" comment="freeradius-unixODBC is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877809" version="1" comment="freeradius-utils is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953922" version="1" comment="krb5-devel is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953923" version="1" comment="krb5-libs is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953924" version="1" comment="krb5-pkinit is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953925" version="1" comment="krb5-server is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953926" version="1" comment="krb5-server-ldap is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953927" version="1" comment="krb5-workstation is &lt;1.21.1-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953928" version="1" comment="libkadm5 is &lt;1.21.1-4.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877810" version="1" comment="python3-freeradius is &lt;3.0.21-40.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953678" version="1" comment="python3.11-PyMySQL is &lt;1.0.2-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953679" version="1" comment="python3.11-PyMySQL+rsa is &lt;1.0.2-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953676" version="1" comment="python3.12-PyMySQL is &lt;1.1.0-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953677" version="1" comment="python3.12-PyMySQL+rsa is &lt;1.1.0-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053912" version="1" comment="iwl100-firmware is &lt;39.31.5.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053913" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053914" version="1" comment="iwl105-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053915" version="1" comment="iwl135-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053916" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053917" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053918" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053919" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053920" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053921" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053922" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053923" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053924" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025630" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025635" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053925" version="1" comment="libertas-sd8787-firmware is &lt;20250716-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053926" version="1" comment="linux-firmware is &lt;20250716-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053927" version="1" comment="linux-firmware-whence is &lt;20250716-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053928" version="1" comment="netronome-firmware is &lt;20250716-151.3.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053929" version="1" comment="iwl100-firmware is &lt;39.31.5.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053930" version="1" comment="iwl1000-firmware is &lt;39.31.5.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053931" version="1" comment="iwl105-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053932" version="1" comment="iwl135-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053933" version="1" comment="iwl2000-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053934" version="1" comment="iwl2030-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053935" version="1" comment="iwl3160-firmware is &lt;25.30.13.0-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053936" version="1" comment="iwl5000-firmware is &lt;8.83.5.1_1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053937" version="1" comment="iwl5150-firmware is &lt;8.24.2.2-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053938" version="1" comment="iwl6000g2a-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053939" version="1" comment="iwl6000g2b-firmware is &lt;18.168.6.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053940" version="1" comment="iwl6050-firmware is &lt;41.28.5.1-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053941" version="1" comment="iwl7260-firmware is &lt;25.30.13.0-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053942" version="1" comment="libertas-sd8787-firmware is &lt;20250812-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053943" version="1" comment="linux-firmware is &lt;20250812-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053944" version="1" comment="linux-firmware-whence is &lt;20250812-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053945" version="1" comment="netronome-firmware is &lt;20250812-151.4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950377" version="1" comment="mod_http2 is &lt;2.0.26-2.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953549" version="1" comment="gnome-classic-session is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953550" version="1" comment="gnome-shell is &lt;40.10-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953551" version="1" comment="gnome-shell-extension-apps-menu is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953552" version="1" comment="gnome-shell-extension-auto-move-windows is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953553" version="1" comment="gnome-shell-extension-classification-banner is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953554" version="1" comment="gnome-shell-extension-common is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953555" version="1" comment="gnome-shell-extension-custom-menu is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953556" version="1" comment="gnome-shell-extension-dash-to-dock is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953557" version="1" comment="gnome-shell-extension-dash-to-panel is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953558" version="1" comment="gnome-shell-extension-desktop-icons is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953559" version="1" comment="gnome-shell-extension-drive-menu is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953560" version="1" comment="gnome-shell-extension-gesture-inhibitor is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953561" version="1" comment="gnome-shell-extension-heads-up-display is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953562" version="1" comment="gnome-shell-extension-launch-new-instance is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953563" version="1" comment="gnome-shell-extension-native-window-placement is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953564" version="1" comment="gnome-shell-extension-panel-favorites is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953565" version="1" comment="gnome-shell-extension-places-menu is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953566" version="1" comment="gnome-shell-extension-screenshot-window-sizer is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953567" version="1" comment="gnome-shell-extension-systemMonitor is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953568" version="1" comment="gnome-shell-extension-top-icons is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953569" version="1" comment="gnome-shell-extension-updates-dialog is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953570" version="1" comment="gnome-shell-extension-user-theme is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953571" version="1" comment="gnome-shell-extension-window-list is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953572" version="1" comment="gnome-shell-extension-windowsNavigator is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953573" version="1" comment="gnome-shell-extension-workspace-indicator is &lt;40.7-19.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009867068" version="1" comment="python3-idna is &lt;2.10-7.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869938" version="1" comment="libreswan is &lt;4.12-2.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960792" version="1" comment="NetworkManager is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960793" version="1" comment="NetworkManager-adsl is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960794" version="1" comment="NetworkManager-bluetooth is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960795" version="1" comment="NetworkManager-cloud-setup is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960796" version="1" comment="NetworkManager-config-connectivity-suse is &lt;1.48.10-5.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960797" version="1" comment="NetworkManager-config-server is &lt;1.48.10-5.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960798" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.48.10-5.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960799" version="1" comment="NetworkManager-initscripts-updown is &lt;1.48.10-5.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960800" version="1" comment="NetworkManager-libnm is &lt;1.48.10-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960801" version="1" comment="NetworkManager-libnm-devel is &lt;1.48.10-5.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960802" version="1" comment="NetworkManager-ovs is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960803" version="1" comment="NetworkManager-ppp is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960804" version="1" comment="NetworkManager-team is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960805" version="1" comment="NetworkManager-tui is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960806" version="1" comment="NetworkManager-wifi is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960807" version="1" comment="NetworkManager-wwan is &lt;1.48.10-5.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957241" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956864" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956865" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957242" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956202" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956203" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956866" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956867" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957146" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957243" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957244" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947531" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947532" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947410" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947533" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947534" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947535" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961323" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961324" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961326" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961302" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961528" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=8-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014214" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=20-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966041" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966042" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960119" version="1" comment="kernel-default is &lt;5.14.21-150400.24.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966043" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965823" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965824" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966044" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966045" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014742" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014507" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014671" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014743" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014744" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014745" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014260" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014672" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014508" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014261" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014254" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012377" version="1" comment="kernel-default is &lt;5.3.18-150300.59.207.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014509" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014255" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014262" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014510" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014511" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014263" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014512" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014513" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014514" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014256" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014515" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014516" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014517" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941954" version="1" comment="krb5-devel is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941955" version="1" comment="krb5-libs is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941956" version="1" comment="krb5-pkinit is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941957" version="1" comment="krb5-server is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941958" version="1" comment="krb5-server-ldap is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941959" version="1" comment="krb5-workstation is &lt;1.21.1-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941960" version="1" comment="libkadm5 is &lt;1.21.1-2.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942600" version="1" comment="fence-agents-aliyun is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942601" version="1" comment="fence-agents-all is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942602" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942603" version="1" comment="fence-agents-apc is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942604" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942605" version="1" comment="fence-agents-aws is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942606" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942607" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942608" version="1" comment="fence-agents-brocade is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942609" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942610" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875438" version="1" comment="fence-agents-common is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875439" version="1" comment="fence-agents-compute is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942611" version="1" comment="fence-agents-drac5 is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942612" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942613" version="1" comment="fence-agents-emerson is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942614" version="1" comment="fence-agents-eps is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942615" version="1" comment="fence-agents-gce is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942616" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942617" version="1" comment="fence-agents-hpblade is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875440" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875441" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942618" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942619" version="1" comment="fence-agents-ifmib is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942620" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942621" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942622" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942623" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942624" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942625" version="1" comment="fence-agents-ipdu is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942626" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942627" version="1" comment="fence-agents-kdump is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875442" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942628" version="1" comment="fence-agents-mpath is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942629" version="1" comment="fence-agents-openstack is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942630" version="1" comment="fence-agents-redfish is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942631" version="1" comment="fence-agents-rhevm is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942632" version="1" comment="fence-agents-rsa is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942633" version="1" comment="fence-agents-rsb is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942634" version="1" comment="fence-agents-sbd is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942635" version="1" comment="fence-agents-scsi is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875443" version="1" comment="fence-agents-virsh is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942636" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942637" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942638" version="1" comment="fence-agents-wti is &lt;4.10.0-62.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875444" version="1" comment="fence-virt is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875445" version="1" comment="fence-virtd is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875446" version="1" comment="fence-virtd-cpg is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875447" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875448" version="1" comment="fence-virtd-multicast is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875449" version="1" comment="fence-virtd-serial is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875450" version="1" comment="fence-virtd-tcp is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942639" version="1" comment="ha-cloud-support is &lt;4.10.0-62.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941953" version="1" comment="python3-urllib3 is &lt;1.26.5-5.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953900" version="1" comment="python3.11-urllib3 is &lt;1.26.12-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953899" version="1" comment="python3.12-urllib3 is &lt;1.26.18-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875451" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875452" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875453" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875454" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875455" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875456" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.132-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875457" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.132-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875458" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.32-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875459" version="1" comment="dotnet-templates-6.0 is &lt;6.0.132-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881370" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881371" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881372" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881373" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881374" version="1" comment="dotnet-host is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881375" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881376" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881377" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881378" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881379" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881380" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881381" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.8-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881382" version="1" comment="dotnet-templates-8.0 is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881383" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.108-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946458" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946459" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946460" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946461" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946462" version="1" comment="dotnet-host is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946463" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946464" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946465" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946466" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946467" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946468" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946469" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.10-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946470" version="1" comment="dotnet-templates-8.0 is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946471" version="1" comment="netstandard-targeting-pack-2.1 is &lt;8.0.110-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941969" version="1" comment="wget is &lt;1.21.1-8.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876215" version="1" comment="httpd is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876216" version="1" comment="httpd-core is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876217" version="1" comment="httpd-devel is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876218" version="1" comment="httpd-filesystem is &lt;2.4.57-11.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876219" version="1" comment="httpd-manual is &lt;2.4.57-11.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876220" version="1" comment="httpd-tools is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876221" version="1" comment="mod_ldap is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876222" version="1" comment="mod_lua is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876223" version="1" comment="mod_proxy_html is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876224" version="1" comment="mod_session is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009876225" version="1" comment="mod_ssl is &lt;2.4.57-11.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879110" version="1" comment="httpd is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879111" version="1" comment="httpd-core is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879112" version="1" comment="httpd-devel is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879113" version="1" comment="httpd-filesystem is &lt;2.4.57-11.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879114" version="1" comment="httpd-manual is &lt;2.4.57-11.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879115" version="1" comment="httpd-tools is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879116" version="1" comment="mod_ldap is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879117" version="1" comment="mod_lua is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879118" version="1" comment="mod_proxy_html is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879119" version="1" comment="mod_session is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879120" version="1" comment="mod_ssl is &lt;2.4.57-11.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959121" version="1" comment="edk2-tools is &lt;20240524-6.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959122" version="1" comment="edk2-tools-doc is &lt;20240524-6.el9_5.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942247" version="1" comment="emacs is &lt;27.2-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942248" version="1" comment="emacs-common is &lt;27.2-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942249" version="1" comment="emacs-filesystem is &lt;27.2-10.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942250" version="1" comment="emacs-lucid is &lt;27.2-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942251" version="1" comment="emacs-nox is &lt;27.2-10.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943818" version="1" comment="ruby is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943819" version="1" comment="ruby-bundled-gems is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943820" version="1" comment="ruby-default-gems is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943821" version="1" comment="ruby-devel is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943822" version="1" comment="ruby-doc is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943823" version="1" comment="ruby-libs is &lt;3.3.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943824" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943825" version="1" comment="rubygem-bundler is &lt;2.5.16-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943826" version="1" comment="rubygem-io-console is &lt;0.7.1-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943827" version="1" comment="rubygem-irb is &lt;1.13.1-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943828" version="1" comment="rubygem-json is &lt;2.7.1-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943829" version="1" comment="rubygem-minitest is &lt;5.20.0-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943830" version="1" comment="rubygem-power_assert is &lt;2.0.3-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943831" version="1" comment="rubygem-psych is &lt;5.1.2-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943832" version="1" comment="rubygem-racc is &lt;1.7.3-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943833" version="1" comment="rubygem-rake is &lt;13.1.0-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943834" version="1" comment="rubygem-rbs is &lt;3.4.0-3.module+el9.4.0+22273+463af10f for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943835" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977574" version="1" comment="rubygem-rexml is &lt;3.3.9-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977575" version="1" comment="rubygem-rss is &lt;0.3.1-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943838" version="1" comment="rubygem-test-unit is &lt;3.6.1-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943839" version="1" comment="rubygem-typeprof is &lt;0.21.9-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943840" version="1" comment="rubygems is &lt;3.5.16-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943841" version="1" comment="rubygems-devel is &lt;3.5.16-3.module+el9.4.0+22273+463af10f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874740" version="1" comment="qt5-qtbase is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874741" version="1" comment="qt5-qtbase-common is &lt;5.15.9-10.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874742" version="1" comment="qt5-qtbase-devel is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874743" version="1" comment="qt5-qtbase-examples is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874744" version="1" comment="qt5-qtbase-gui is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874745" version="1" comment="qt5-qtbase-mysql is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874746" version="1" comment="qt5-qtbase-odbc is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874747" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874748" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874749" version="1" comment="qt5-qtbase-static is &lt;5.15.9-10.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877140" version="1" comment="python-unversioned-command is &lt;3.9.18-3.el9_4.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877141" version="1" comment="python3 is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877142" version="1" comment="python3-debug is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877143" version="1" comment="python3-devel is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877144" version="1" comment="python3-idle is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877145" version="1" comment="python3-libs is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877146" version="1" comment="python3-test is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877147" version="1" comment="python3-tkinter is &lt;3.9.18-3.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877108" version="1" comment="python3.11 is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877109" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877110" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877111" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877112" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877113" version="1" comment="python3.11-test is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877114" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941961" version="1" comment="orc is &lt;0.4.31-7.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941962" version="1" comment="orc-compiler is &lt;0.4.31-7.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941963" version="1" comment="orc-devel is &lt;0.4.31-7.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996819" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=19-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996820" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996821" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987645" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997087" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987646" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=17-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987906" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=18-150600.4.46.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996822" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987676" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987573" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=17-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955019" version="1" comment="bpftool is &lt;7.4.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955020" version="1" comment="kernel is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955021" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.15.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955022" version="1" comment="kernel-core is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955023" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955024" version="1" comment="kernel-debug is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955025" version="1" comment="kernel-debug-core is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955028" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955029" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955030" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955031" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955034" version="1" comment="kernel-doc is &lt;5.14.0-503.15.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955035" version="1" comment="kernel-headers is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955036" version="1" comment="kernel-modules is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955037" version="1" comment="kernel-modules-core is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955038" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955039" version="1" comment="kernel-tools is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955040" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955042" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955043" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955044" version="1" comment="libperf is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955045" version="1" comment="perf is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955046" version="1" comment="python3-perf is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955047" version="1" comment="rtla is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955048" version="1" comment="rv is &lt;5.14.0-503.15.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956561" version="1" comment="kernel-default is &lt;4.12.14-122.225.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974053" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974054" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974055" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974056" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974057" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974058" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974059" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974060" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974061" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974062" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974063" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974064" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970646" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=13-150600.4.31.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970647" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970648" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970649" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970351" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=12-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011945" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011946" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975054" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975055" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975056" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975031" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975057" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975058" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975059" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975060" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975061" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975062" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975063" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=14-150600.4.34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975064" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975065" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975032" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=13-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962421" version="1" comment="keepalived is &lt;2.2.8-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968281" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=12-150600.4.28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968282" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968283" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968284" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968285" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=11-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008795" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008796" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=19-150600.4.49.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008797" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008798" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008703" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=18-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953945" version="1" comment="bpftool is &lt;7.4.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953946" version="1" comment="kernel is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953947" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.14.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953948" version="1" comment="kernel-core is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953949" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953950" version="1" comment="kernel-debug is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953951" version="1" comment="kernel-debug-core is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953954" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953955" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953956" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953957" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953960" version="1" comment="kernel-doc is &lt;5.14.0-503.14.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953961" version="1" comment="kernel-headers is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953962" version="1" comment="kernel-modules is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953963" version="1" comment="kernel-modules-core is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953964" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953965" version="1" comment="kernel-tools is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953966" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953968" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953969" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953970" version="1" comment="libperf is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953971" version="1" comment="perf is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953972" version="1" comment="python3-perf is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953973" version="1" comment="rtla is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953974" version="1" comment="rv is &lt;5.14.0-503.14.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977299" version="1" comment="bpftool is &lt;7.4.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977300" version="1" comment="kernel is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977301" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.40.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977302" version="1" comment="kernel-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977303" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977304" version="1" comment="kernel-debug is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977305" version="1" comment="kernel-debug-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977308" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977309" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977310" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977311" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977314" version="1" comment="kernel-doc is &lt;5.14.0-503.40.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977315" version="1" comment="kernel-headers is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977316" version="1" comment="kernel-modules is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977317" version="1" comment="kernel-modules-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977318" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977319" version="1" comment="kernel-rt is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977320" version="1" comment="kernel-rt-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977321" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977322" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977324" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977325" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977326" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977327" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977329" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977330" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977331" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977332" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977333" version="1" comment="kernel-tools is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977334" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977336" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977337" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977338" version="1" comment="libperf is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977339" version="1" comment="perf is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977340" version="1" comment="python3-perf is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977341" version="1" comment="rtla is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977342" version="1" comment="rv is &lt;5.14.0-503.40.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953769" version="1" comment="bubblewrap is &lt;0.4.1-8.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953770" version="1" comment="flatpak is &lt;1.12.9-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953771" version="1" comment="flatpak-devel is &lt;1.12.9-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953772" version="1" comment="flatpak-libs is &lt;1.12.9-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953773" version="1" comment="flatpak-selinux is &lt;1.12.9-3.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953774" version="1" comment="flatpak-session-helper is &lt;1.12.9-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947336" version="1" comment="OpenIPMI is &lt;2.0.32-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947337" version="1" comment="OpenIPMI-devel is &lt;2.0.32-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947338" version="1" comment="OpenIPMI-lanserv is &lt;2.0.32-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947339" version="1" comment="OpenIPMI-libs is &lt;2.0.32-5.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881472" version="1" comment="pg_repack is &lt;1.4.8-1.module+el9.4.0+20427+07482b8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881473" version="1" comment="pgaudit is &lt;16.0-1.module+el9.4.0+20427+07482b8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881474" version="1" comment="postgres-decoderbufs is &lt;2.4.0-1.Final.module+el9.4.0+20427+07482b8c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881475" version="1" comment="postgresql is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881476" version="1" comment="postgresql-contrib is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881477" version="1" comment="postgresql-docs is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881478" version="1" comment="postgresql-plperl is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881479" version="1" comment="postgresql-plpython3 is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881480" version="1" comment="postgresql-pltcl is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881481" version="1" comment="postgresql-private-devel is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881482" version="1" comment="postgresql-private-libs is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881483" version="1" comment="postgresql-server is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881484" version="1" comment="postgresql-server-devel is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881485" version="1" comment="postgresql-static is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881486" version="1" comment="postgresql-test is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881487" version="1" comment="postgresql-test-rpm-macros is &lt;16.4-1.module+el9.4.0+22207+8466e31f for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881488" version="1" comment="postgresql-upgrade is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881489" version="1" comment="postgresql-upgrade-devel is &lt;16.4-1.module+el9.4.0+22207+8466e31f for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946449" version="1" comment="aspnetcore-runtime-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946450" version="1" comment="aspnetcore-targeting-pack-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946451" version="1" comment="dotnet-apphost-pack-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946452" version="1" comment="dotnet-hostfxr-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946453" version="1" comment="dotnet-runtime-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946454" version="1" comment="dotnet-sdk-6.0 is &lt;6.0.135-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946455" version="1" comment="dotnet-sdk-6.0-source-built-artifacts is &lt;6.0.135-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946456" version="1" comment="dotnet-targeting-pack-6.0 is &lt;6.0.35-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009946457" version="1" comment="dotnet-templates-6.0 is &lt;6.0.135-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954005" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954006" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954007" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954008" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954009" version="1" comment="dotnet-host is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954010" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954011" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954012" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954013" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954014" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954015" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954016" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954017" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954018" version="1" comment="dotnet-templates-9.0 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954019" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.100-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875027" version="1" comment="firefox is &lt;115.11.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875028" version="1" comment="firefox-x11 is &lt;115.11.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875029" version="1" comment="thunderbird is &lt;115.11.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974395" version="1" comment="bpftool is &lt;7.4.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974396" version="1" comment="kernel is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974397" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.35.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974398" version="1" comment="kernel-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974399" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974400" version="1" comment="kernel-debug is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974401" version="1" comment="kernel-debug-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974404" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974405" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974406" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974407" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974410" version="1" comment="kernel-doc is &lt;5.14.0-503.35.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974411" version="1" comment="kernel-headers is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974412" version="1" comment="kernel-modules is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974413" version="1" comment="kernel-modules-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974414" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974415" version="1" comment="kernel-rt is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974416" version="1" comment="kernel-rt-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974417" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974418" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974420" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974421" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974422" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974423" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974425" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974426" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974427" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974428" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974429" version="1" comment="kernel-tools is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974430" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974432" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974433" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974434" version="1" comment="libperf is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974435" version="1" comment="perf is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974436" version="1" comment="python3-perf is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974437" version="1" comment="rtla is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974438" version="1" comment="rv is &lt;5.14.0-503.35.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956868" version="1" comment="kernel-default is ==5.3.18-150200.24.200.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956869" version="1" comment="kernel-livepatch-5_3_18-150200_24_200-default is &gt;=2-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956870" version="1" comment="kernel-default is &lt;5.3.18-150200.24.200.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982353" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982354" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982355" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982627" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982927" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983055" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982628" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982629" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982928" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982929" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=18-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983056" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=17-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983057" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982930" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982931" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982932" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=18-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982933" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982934" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982935" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=15-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983058" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982936" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=16-150600.4.40.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982937" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982938" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982939" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982451" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=15-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877075" version="1" comment="libvirt is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877076" version="1" comment="libvirt-client is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877077" version="1" comment="libvirt-client-qemu is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877078" version="1" comment="libvirt-daemon is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877079" version="1" comment="libvirt-daemon-common is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877080" version="1" comment="libvirt-daemon-config-network is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877081" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877082" version="1" comment="libvirt-daemon-driver-interface is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877083" version="1" comment="libvirt-daemon-driver-network is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877084" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877085" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877086" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877087" version="1" comment="libvirt-daemon-driver-secret is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877088" version="1" comment="libvirt-daemon-driver-storage is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877089" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877090" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877091" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877092" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877093" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877094" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877095" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877096" version="1" comment="libvirt-daemon-kvm is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877097" version="1" comment="libvirt-daemon-lock is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877098" version="1" comment="libvirt-daemon-log is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877099" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877100" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877101" version="1" comment="libvirt-daemon-proxy is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877102" version="1" comment="libvirt-devel is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877103" version="1" comment="libvirt-docs is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877104" version="1" comment="libvirt-libs is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877105" version="1" comment="libvirt-nss is &lt;10.0.0-6.6.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983920" version="1" comment="webkit2gtk3 is &lt;2.48.1-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983921" version="1" comment="webkit2gtk3-devel is &lt;2.48.1-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983922" version="1" comment="webkit2gtk3-jsc is &lt;2.48.1-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983923" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.1-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955240" version="1" comment="webkit2gtk3 is &lt;2.46.3-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955241" version="1" comment="webkit2gtk3-devel is &lt;2.46.3-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955242" version="1" comment="webkit2gtk3-jsc is &lt;2.46.3-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955243" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.3-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874007" version="1" comment="qemu-guest-agent is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874008" version="1" comment="qemu-img is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874009" version="1" comment="qemu-kvm is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874010" version="1" comment="qemu-kvm-audio-pa is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874011" version="1" comment="qemu-kvm-block-blkio is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874012" version="1" comment="qemu-kvm-block-curl is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874013" version="1" comment="qemu-kvm-block-rbd is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874014" version="1" comment="qemu-kvm-common is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874015" version="1" comment="qemu-kvm-core is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874016" version="1" comment="qemu-kvm-device-display-virtio-gpu is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874017" version="1" comment="qemu-kvm-device-display-virtio-gpu-pci is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874018" version="1" comment="qemu-kvm-device-display-virtio-vga is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874019" version="1" comment="qemu-kvm-device-usb-host is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874020" version="1" comment="qemu-kvm-device-usb-redirect is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874021" version="1" comment="qemu-kvm-docs is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874022" version="1" comment="qemu-kvm-tools is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874023" version="1" comment="qemu-kvm-ui-egl-headless is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874024" version="1" comment="qemu-kvm-ui-opengl is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874025" version="1" comment="qemu-pr-helper is &lt;8.2.0-11.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963364" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963365" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963366" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963367" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963368" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963369" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963370" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963371" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963297" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960543" version="1" comment="kernel-default is &lt;4.12.14-122.234.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963661" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963373" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963374" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963662" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963663" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963375" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=10-150600.4.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963376" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963377" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963378" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960548" version="1" comment="kernel-default is ==6.4.0-150600.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963379" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963380" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963163" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=9-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955015" version="1" comment="perl-App-cpanminus is &lt;1.7044-14.1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943430" version="1" comment="expat is &lt;2.5.0-2.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943431" version="1" comment="expat-devel is &lt;2.5.0-2.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953789" version="1" comment="pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953790" version="1" comment="pcp-conf is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953791" version="1" comment="pcp-devel is &lt;6.2.2-7.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953792" version="1" comment="pcp-doc is &lt;6.2.2-7.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953793" version="1" comment="pcp-export-pcp2elasticsearch is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953794" version="1" comment="pcp-export-pcp2graphite is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953795" version="1" comment="pcp-export-pcp2influxdb is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953796" version="1" comment="pcp-export-pcp2json is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953797" version="1" comment="pcp-export-pcp2openmetrics is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953798" version="1" comment="pcp-export-pcp2spark is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953799" version="1" comment="pcp-export-pcp2xml is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953800" version="1" comment="pcp-export-pcp2zabbix is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953801" version="1" comment="pcp-export-zabbix-agent is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953802" version="1" comment="pcp-geolocate is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953803" version="1" comment="pcp-gui is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953804" version="1" comment="pcp-import-collectl2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953805" version="1" comment="pcp-import-ganglia2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953806" version="1" comment="pcp-import-iostat2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953807" version="1" comment="pcp-import-mrtg2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953808" version="1" comment="pcp-import-sar2pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953809" version="1" comment="pcp-libs is &lt;6.2.2-7.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953810" version="1" comment="pcp-libs-devel is &lt;6.2.2-7.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953811" version="1" comment="pcp-pmda-activemq is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953812" version="1" comment="pcp-pmda-apache is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953813" version="1" comment="pcp-pmda-bash is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953814" version="1" comment="pcp-pmda-bcc is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953815" version="1" comment="pcp-pmda-bind2 is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953816" version="1" comment="pcp-pmda-bonding is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953817" version="1" comment="pcp-pmda-bpf is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953818" version="1" comment="pcp-pmda-bpftrace is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953819" version="1" comment="pcp-pmda-cifs is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953820" version="1" comment="pcp-pmda-cisco is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953821" version="1" comment="pcp-pmda-dbping is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953822" version="1" comment="pcp-pmda-denki is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953823" version="1" comment="pcp-pmda-dm is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953824" version="1" comment="pcp-pmda-docker is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953825" version="1" comment="pcp-pmda-ds389 is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953826" version="1" comment="pcp-pmda-ds389log is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953827" version="1" comment="pcp-pmda-elasticsearch is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953828" version="1" comment="pcp-pmda-farm is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953829" version="1" comment="pcp-pmda-gfs2 is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953830" version="1" comment="pcp-pmda-gluster is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953831" version="1" comment="pcp-pmda-gpfs is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953832" version="1" comment="pcp-pmda-gpsd is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953833" version="1" comment="pcp-pmda-hacluster is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953834" version="1" comment="pcp-pmda-haproxy is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953835" version="1" comment="pcp-pmda-infiniband is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953836" version="1" comment="pcp-pmda-json is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953837" version="1" comment="pcp-pmda-libvirt is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953838" version="1" comment="pcp-pmda-lio is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953839" version="1" comment="pcp-pmda-lmsensors is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953840" version="1" comment="pcp-pmda-logger is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953841" version="1" comment="pcp-pmda-lustre is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953842" version="1" comment="pcp-pmda-lustrecomm is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953843" version="1" comment="pcp-pmda-mailq is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953844" version="1" comment="pcp-pmda-memcache is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953845" version="1" comment="pcp-pmda-mic is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953846" version="1" comment="pcp-pmda-mongodb is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953847" version="1" comment="pcp-pmda-mounts is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953848" version="1" comment="pcp-pmda-mssql is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953849" version="1" comment="pcp-pmda-mysql is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953850" version="1" comment="pcp-pmda-named is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953851" version="1" comment="pcp-pmda-netcheck is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953852" version="1" comment="pcp-pmda-netfilter is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953853" version="1" comment="pcp-pmda-news is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953854" version="1" comment="pcp-pmda-nfsclient is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953855" version="1" comment="pcp-pmda-nginx is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953856" version="1" comment="pcp-pmda-nvidia-gpu is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953857" version="1" comment="pcp-pmda-openmetrics is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953858" version="1" comment="pcp-pmda-openvswitch is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953859" version="1" comment="pcp-pmda-oracle is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953860" version="1" comment="pcp-pmda-pdns is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953861" version="1" comment="pcp-pmda-perfevent is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953862" version="1" comment="pcp-pmda-podman is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953863" version="1" comment="pcp-pmda-postfix is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953864" version="1" comment="pcp-pmda-postgresql is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953865" version="1" comment="pcp-pmda-rabbitmq is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953866" version="1" comment="pcp-pmda-redis is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953867" version="1" comment="pcp-pmda-resctrl is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953868" version="1" comment="pcp-pmda-roomtemp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953869" version="1" comment="pcp-pmda-rsyslog is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953870" version="1" comment="pcp-pmda-samba is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953871" version="1" comment="pcp-pmda-sendmail is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953872" version="1" comment="pcp-pmda-shping is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953873" version="1" comment="pcp-pmda-slurm is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953874" version="1" comment="pcp-pmda-smart is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953875" version="1" comment="pcp-pmda-snmp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953876" version="1" comment="pcp-pmda-sockets is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953877" version="1" comment="pcp-pmda-statsd is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953878" version="1" comment="pcp-pmda-summary is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953879" version="1" comment="pcp-pmda-systemd is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953880" version="1" comment="pcp-pmda-trace is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953881" version="1" comment="pcp-pmda-unbound is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953882" version="1" comment="pcp-pmda-uwsgi is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953883" version="1" comment="pcp-pmda-weblog is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953884" version="1" comment="pcp-pmda-zimbra is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953885" version="1" comment="pcp-pmda-zswap is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953886" version="1" comment="pcp-selinux is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953887" version="1" comment="pcp-system-tools is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953888" version="1" comment="pcp-zeroconf is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953889" version="1" comment="perl-PCP-LogImport is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953890" version="1" comment="perl-PCP-LogSummary is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953891" version="1" comment="perl-PCP-MMV is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953892" version="1" comment="perl-PCP-PMDA is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953893" version="1" comment="python3-pcp is &lt;6.2.2-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984827" version="1" comment="grub2-common is &lt;2.06-104.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984828" version="1" comment="grub2-efi-x64 is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984829" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984830" version="1" comment="grub2-efi-x64-modules is &lt;2.06-104.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984831" version="1" comment="grub2-pc is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984832" version="1" comment="grub2-pc-modules is &lt;2.06-104.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984833" version="1" comment="grub2-tools is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984834" version="1" comment="grub2-tools-efi is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984835" version="1" comment="grub2-tools-extra is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984836" version="1" comment="grub2-tools-minimal is &lt;2.06-104.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054038" version="1" comment="grub2-common is &lt;2.06-114.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054039" version="1" comment="grub2-efi-x64 is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054040" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054041" version="1" comment="grub2-efi-x64-modules is &lt;2.06-114.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054042" version="1" comment="grub2-pc is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054043" version="1" comment="grub2-pc-modules is &lt;2.06-114.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054044" version="1" comment="grub2-tools is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054045" version="1" comment="grub2-tools-efi is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054046" version="1" comment="grub2-tools-extra is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054047" version="1" comment="grub2-tools-minimal is &lt;2.06-114.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953975" version="1" comment="squid is &lt;5.5-14.el9_5.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959322" version="1" comment="bpftool is &lt;7.4.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959323" version="1" comment="kernel is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959324" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.21.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959325" version="1" comment="kernel-core is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959326" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959327" version="1" comment="kernel-debug is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959328" version="1" comment="kernel-debug-core is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959331" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959332" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959333" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959334" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959337" version="1" comment="kernel-doc is &lt;5.14.0-503.21.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959338" version="1" comment="kernel-headers is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959339" version="1" comment="kernel-modules is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959340" version="1" comment="kernel-modules-core is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959341" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959342" version="1" comment="kernel-tools is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959343" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959345" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959346" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959347" version="1" comment="libperf is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959348" version="1" comment="perf is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959349" version="1" comment="python3-perf is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959350" version="1" comment="rtla is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959351" version="1" comment="rv is &lt;5.14.0-503.21.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968286" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968287" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968289" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961483" version="1" comment="redis is &lt;7.2.7-1.module+el9.5.0+22705+3d861c1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961484" version="1" comment="redis-devel is &lt;7.2.7-1.module+el9.5.0+22705+3d861c1c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961485" version="1" comment="redis-doc is &lt;7.2.7-1.module+el9.5.0+22705+3d861c1c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945283" version="1" comment="cups-filters is &lt;1.28.7-17.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945284" version="1" comment="cups-filters-devel is &lt;1.28.7-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945285" version="1" comment="cups-filters-libs is &lt;1.28.7-17.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011990" version="1" comment="python3-requests is &lt;2.25.1-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011991" version="1" comment="python3-requests+security is &lt;2.25.1-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011992" version="1" comment="python3-requests+socks is &lt;2.25.1-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953911" version="1" comment="cups is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953912" version="1" comment="cups-client is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953913" version="1" comment="cups-devel is &lt;2.3.3op2-31.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953914" version="1" comment="cups-filesystem is &lt;2.3.3op2-31.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953915" version="1" comment="cups-ipptool is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953916" version="1" comment="cups-libs is &lt;2.3.3op2-31.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953917" version="1" comment="cups-lpd is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953918" version="1" comment="cups-printerapp is &lt;2.3.3op2-31.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017031" version="1" comment="httpd is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017032" version="1" comment="httpd-core is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017033" version="1" comment="httpd-devel is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017034" version="1" comment="httpd-filesystem is &lt;2.4.62-4.el9_6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017035" version="1" comment="httpd-manual is &lt;2.4.62-4.el9_6.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017036" version="1" comment="httpd-tools is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017037" version="1" comment="mod_ldap is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017038" version="1" comment="mod_lua is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017039" version="1" comment="mod_proxy_html is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017040" version="1" comment="mod_session is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017041" version="1" comment="mod_ssl is &lt;2.4.62-4.el9_6.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958275" version="1" comment="gstreamer1-plugins-good is &lt;1.22.1-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958276" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.22.1-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958277" version="1" comment="gstreamer1-plugins-base is &lt;1.22.1-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958278" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.22.1-3.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958279" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.22.1-3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983912" version="1" comment="gstreamer1-plugins-base is &lt;1.22.12-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983913" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.22.12-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983914" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.22.12-4.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985863" version="1" comment="gstreamer1-plugins-good is &lt;1.22.12-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985864" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.22.12-4.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018025" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=20-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017977" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018026" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017332" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=21-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957114" version="1" comment="ruby is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957115" version="1" comment="ruby-bundled-gems is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957116" version="1" comment="ruby-default-gems is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957117" version="1" comment="ruby-devel is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957118" version="1" comment="ruby-doc is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957119" version="1" comment="ruby-libs is &lt;3.1.5-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957120" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957121" version="1" comment="rubygem-bundler is &lt;2.3.27-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957122" version="1" comment="rubygem-io-console is &lt;0.5.11-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957123" version="1" comment="rubygem-irb is &lt;1.4.1-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957124" version="1" comment="rubygem-json is &lt;2.6.1-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957125" version="1" comment="rubygem-minitest is &lt;5.15.0-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957126" version="1" comment="rubygem-power_assert is &lt;2.0.1-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957127" version="1" comment="rubygem-psych is &lt;4.0.4-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957128" version="1" comment="rubygem-rake is &lt;13.0.6-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957129" version="1" comment="rubygem-rbs is &lt;2.7.0-145.module+el9.5.0+22579+d0aa0a16 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957130" version="1" comment="rubygem-rdoc is &lt;6.4.1.1-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957108" version="1" comment="rubygem-rexml is &lt;3.2.5-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957109" version="1" comment="rubygem-rss is &lt;0.2.9-163.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957133" version="1" comment="rubygem-test-unit is &lt;3.5.3-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957134" version="1" comment="rubygem-typeprof is &lt;0.21.3-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957135" version="1" comment="rubygems is &lt;3.3.27-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957136" version="1" comment="rubygems-devel is &lt;3.3.27-145.module+el9.5.0+22579+d0aa0a16 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986628" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=17-150600.4.43.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986733" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986629" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986630" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=11-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986631" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=10-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986632" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986107" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=16-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019242" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019406" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019407" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019704" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019705" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987908" version="1" comment="kernel-default is &lt;6.4.0-150600.23.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022284" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=19-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022309" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022333" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022612" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022801" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022802" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023023" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023024" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996825" version="1" comment="kernel-default is &lt;6.4.0-150600.23.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982356" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982358" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982940" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982941" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982942" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960546" version="1" comment="kernel-default is &lt;5.3.18-150300.59.182.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982943" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982944" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982945" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.141.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982946" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=8-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982947" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=8-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982948" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=10-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982949" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=9-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987647" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997139" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=10-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987648" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=10-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997088" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=16-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987907" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996823" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987649" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996824" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987650" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997089" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020202" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020204" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020375" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020741" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020376" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020673" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020674" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020507" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020675" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020676" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020702" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020703" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961451" version="1" comment="bpftool is &lt;7.4.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961452" version="1" comment="kernel is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961453" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.22.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961454" version="1" comment="kernel-core is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961455" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961456" version="1" comment="kernel-debug is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961457" version="1" comment="kernel-debug-core is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961460" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961461" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961462" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961463" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961466" version="1" comment="kernel-doc is &lt;5.14.0-503.22.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961467" version="1" comment="kernel-headers is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961468" version="1" comment="kernel-modules is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961469" version="1" comment="kernel-modules-core is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961470" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961471" version="1" comment="kernel-tools is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961472" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961474" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961475" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961476" version="1" comment="libperf is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961477" version="1" comment="perf is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961478" version="1" comment="python3-perf is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961479" version="1" comment="rtla is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961480" version="1" comment="rv is &lt;5.14.0-503.22.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977139" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977140" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977280" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976833" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976886" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977129" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977141" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977122" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976887" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976888" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976889" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977130" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977281" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977282" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977283" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977284" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977285" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977286" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977287" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008963" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008799" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008800" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008801" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008802" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008803" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960542" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960545" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960753" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=2-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960547" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=8-150600.4.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960549" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=2-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960122" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=7-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020388" version="1" comment="kernel is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020389" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.51.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020390" version="1" comment="kernel-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020391" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020392" version="1" comment="kernel-debug is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020393" version="1" comment="kernel-debug-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020396" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020397" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020398" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020399" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020402" version="1" comment="kernel-doc is &lt;5.14.0-570.51.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020403" version="1" comment="kernel-headers is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020404" version="1" comment="kernel-modules is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020405" version="1" comment="kernel-modules-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020406" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020407" version="1" comment="kernel-rt is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020408" version="1" comment="kernel-rt-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020409" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020410" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020412" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020413" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020414" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020415" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020417" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020418" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020419" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020420" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020421" version="1" comment="kernel-tools is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020422" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020424" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020425" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020426" version="1" comment="libperf is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020427" version="1" comment="perf is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020428" version="1" comment="python3-perf is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020429" version="1" comment="rtla is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020430" version="1" comment="rv is &lt;5.14.0-570.51.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968290" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968291" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968292" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968293" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968294" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009051" version="1" comment="git is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009052" version="1" comment="git-all is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009053" version="1" comment="git-core is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009054" version="1" comment="git-core-doc is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009055" version="1" comment="git-credential-libsecret is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009056" version="1" comment="git-daemon is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009057" version="1" comment="git-email is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009058" version="1" comment="git-gui is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009059" version="1" comment="git-instaweb is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009060" version="1" comment="git-subtree is &lt;2.47.3-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009061" version="1" comment="git-svn is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009062" version="1" comment="gitk is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009063" version="1" comment="gitweb is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009064" version="1" comment="perl-Git is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009065" version="1" comment="perl-Git-SVN is &lt;2.47.3-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974613" version="1" comment="tomcat is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974614" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974615" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974616" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974617" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974618" version="1" comment="tomcat-lib is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974619" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974620" version="1" comment="tomcat-webapps is &lt;9.0.87-2.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953929" version="1" comment="expat is &lt;2.5.0-3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953930" version="1" comment="expat-devel is &lt;2.5.0-3.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959007" version="1" comment="libsndfile is &lt;1.0.31-8.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959008" version="1" comment="libsndfile-devel is &lt;1.0.31-8.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959009" version="1" comment="libsndfile-utils is &lt;1.0.31-8.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953976" version="1" comment="libvpx is &lt;1.9.0-8.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953977" version="1" comment="libvpx-devel is &lt;1.9.0-8.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983944" version="1" comment="git is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983945" version="1" comment="git-all is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983946" version="1" comment="git-core is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983947" version="1" comment="git-core-doc is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983948" version="1" comment="git-credential-libsecret is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983949" version="1" comment="git-daemon is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983950" version="1" comment="git-email is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983951" version="1" comment="git-gui is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983952" version="1" comment="git-instaweb is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983953" version="1" comment="git-subtree is &lt;2.47.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983954" version="1" comment="git-svn is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983955" version="1" comment="gitk is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983956" version="1" comment="gitweb is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983957" version="1" comment="perl-Git is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983958" version="1" comment="perl-Git-SVN is &lt;2.47.1-2.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955680" version="1" comment="tuned is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955681" version="1" comment="tuned-gtk is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955682" version="1" comment="tuned-ppd is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955683" version="1" comment="tuned-profiles-atomic is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955684" version="1" comment="tuned-profiles-cpu-partitioning is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955685" version="1" comment="tuned-profiles-mssql is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955686" version="1" comment="tuned-profiles-oracle is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955687" version="1" comment="tuned-profiles-postgresql is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955688" version="1" comment="tuned-profiles-spectrumscale is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955689" version="1" comment="tuned-utils is &lt;2.24.0-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953943" version="1" comment="libsoup is &lt;2.72.0-8.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953944" version="1" comment="libsoup-devel is &lt;2.72.0-8.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962061" version="1" comment="libsoup is &lt;2.72.0-8.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962062" version="1" comment="libsoup-devel is &lt;2.72.0-8.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007811" version="1" comment="glib2 is &lt;2.68.4-16.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007812" version="1" comment="glib2-devel is &lt;2.68.4-16.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007813" version="1" comment="glib2-doc is &lt;2.68.4-16.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007814" version="1" comment="glib2-static is &lt;2.68.4-16.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007815" version="1" comment="glib2-tests is &lt;2.68.4-16.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962432" version="1" comment="mingw32-glib2 is &lt;2.78.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962433" version="1" comment="mingw32-glib2-static is &lt;2.78.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962434" version="1" comment="mingw64-glib2 is &lt;2.78.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009962435" version="1" comment="mingw64-glib2-static is &lt;2.78.6-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008992" version="1" comment="avahi is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008993" version="1" comment="avahi-autoipd is &lt;0.8-22.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008994" version="1" comment="avahi-compat-howl is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008995" version="1" comment="avahi-compat-howl-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008996" version="1" comment="avahi-compat-libdns_sd is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008997" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008998" version="1" comment="avahi-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008999" version="1" comment="avahi-glib is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009000" version="1" comment="avahi-glib-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009001" version="1" comment="avahi-gobject is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009002" version="1" comment="avahi-gobject-devel is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009003" version="1" comment="avahi-libs is &lt;0.8-22.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009004" version="1" comment="avahi-tools is &lt;0.8-22.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984020" version="1" comment="avahi is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984021" version="1" comment="avahi-autoipd is &lt;0.8-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984022" version="1" comment="avahi-compat-howl is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984023" version="1" comment="avahi-compat-howl-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984024" version="1" comment="avahi-compat-libdns_sd is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984025" version="1" comment="avahi-compat-libdns_sd-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984026" version="1" comment="avahi-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984027" version="1" comment="avahi-glib is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984028" version="1" comment="avahi-glib-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984029" version="1" comment="avahi-gobject is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984030" version="1" comment="avahi-gobject-devel is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984031" version="1" comment="avahi-libs is &lt;0.8-22.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984032" version="1" comment="avahi-tools is &lt;0.8-22.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968349" version="1" comment="pcs is &lt;0.11.8-1.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968350" version="1" comment="pcs-snmp is &lt;0.11.8-1.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955690" version="1" comment="python3-tornado is &lt;6.4.2-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984838" version="1" comment="iptraf-ng is &lt;1.2.2-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977288" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=15-150600.4.37.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977289" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977290" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977291" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977292" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977293" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976432" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=14-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965287" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965288" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965289" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965290" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966046" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966047" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966287" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965825" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966048" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966289" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966291" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966292" version="1" comment="kernel-default is &lt;5.3.18-150300.59.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966049" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966050" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966051" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966052" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966294" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966296" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966297" version="1" comment="kernel-default is &lt;5.14.21-150400.24.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965826" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966053" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966054" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966055" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966056" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966057" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963302" version="1" comment="bpftool is &lt;7.4.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963303" version="1" comment="kernel is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963304" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.23.2.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963305" version="1" comment="kernel-core is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963306" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963307" version="1" comment="kernel-debug is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963308" version="1" comment="kernel-debug-core is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963311" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963312" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963313" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963314" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963317" version="1" comment="kernel-doc is &lt;5.14.0-503.23.2.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963318" version="1" comment="kernel-headers is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963319" version="1" comment="kernel-modules is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963320" version="1" comment="kernel-modules-core is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963321" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963322" version="1" comment="kernel-tools is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963323" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963325" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963326" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963327" version="1" comment="libperf is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963328" version="1" comment="perf is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963329" version="1" comment="python3-perf is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963330" version="1" comment="rtla is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963331" version="1" comment="rv is &lt;5.14.0-503.23.2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011947" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011948" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011949" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011950" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011889" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011951" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011952" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011953" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011890" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011954" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011955" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012373" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011956" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011957" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011958" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012357" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987653" version="1" comment="kernel-default is &lt;5.14.21-150500.55.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011959" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011960" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012358" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030691" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=19-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030651" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976561" version="1" comment="kernel-default is &lt;4.12.14-122.237.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031210" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031656" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031468" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031657" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031469" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031470" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031471" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031472" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020709" version="1" comment="kernel-default is &lt;6.4.0-150600.23.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982951" version="1" comment="kernel-default is &lt;5.3.18-150300.59.185.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977143" version="1" comment="kernel-default is &lt;5.14.21-150400.24.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008804" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008805" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975729" version="1" comment="bpftool is &lt;7.4.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975730" version="1" comment="kernel is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975731" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.38.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975732" version="1" comment="kernel-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975733" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975734" version="1" comment="kernel-debug is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975735" version="1" comment="kernel-debug-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975738" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975739" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975740" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975741" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975744" version="1" comment="kernel-doc is &lt;5.14.0-503.38.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975745" version="1" comment="kernel-headers is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975746" version="1" comment="kernel-modules is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975747" version="1" comment="kernel-modules-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975748" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975749" version="1" comment="kernel-rt is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975750" version="1" comment="kernel-rt-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975751" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975752" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975754" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975755" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975756" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975757" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975759" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975760" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975761" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975762" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975763" version="1" comment="kernel-tools is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975764" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975766" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975767" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975768" version="1" comment="libperf is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975769" version="1" comment="perf is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975770" version="1" comment="python3-perf is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975771" version="1" comment="rtla is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975772" version="1" comment="rv is &lt;5.14.0-503.38.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982452" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982950" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982630" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012381" version="1" comment="kernel-default is &lt;5.3.18-150300.59.211.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.170.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025110" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024668" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=15-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024669" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019716" version="1" comment="kernel-default is &lt;6.4.0-150600.23.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008806" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968301" version="1" comment="kernel-default is &lt;5.14.21-150500.55.91.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020205" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020704" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020308" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020309" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020206" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020310" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011975" version="1" comment="kernel-default is &lt;4.12.14-122.258.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020377" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020508" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020509" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020510" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020511" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020378" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008966" version="1" comment="kernel-default is &lt;5.3.18-150300.59.204.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020512" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020513" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020514" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020515" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020705" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020742" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020677" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008971" version="1" comment="kernel-default is &lt;5.14.21-150400.24.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020706" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020707" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020678" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020679" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020680" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020681" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020708" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961482" version="1" comment="git-lfs is &lt;3.4.1-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959724" version="1" comment="iperf3 is &lt;3.9-13.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996937" version="1" comment="emacs is &lt;27.2-14.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996938" version="1" comment="emacs-common is &lt;27.2-14.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996939" version="1" comment="emacs-filesystem is &lt;27.2-14.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996940" version="1" comment="emacs-lucid is &lt;27.2-14.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996941" version="1" comment="emacs-nox is &lt;27.2-14.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959720" version="1" comment="webkit2gtk3 is &lt;2.46.5-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959721" version="1" comment="webkit2gtk3-devel is &lt;2.46.5-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959722" version="1" comment="webkit2gtk3-jsc is &lt;2.46.5-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959723" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.5-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967159" version="1" comment="webkit2gtk3 is &lt;2.46.6-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967160" version="1" comment="webkit2gtk3-devel is &lt;2.46.6-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967161" version="1" comment="webkit2gtk3-jsc is &lt;2.46.6-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967162" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.6-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999182" version="1" comment="socat is &lt;1.7.4.1-6.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983959" version="1" comment="libxslt is &lt;1.1.34-13.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983960" version="1" comment="libxslt-devel is &lt;1.1.34-13.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874750" version="1" comment="libndp is &lt;1.8-6.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968422" version="1" comment="libxml2 is &lt;2.9.13-6.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968423" version="1" comment="libxml2-devel is &lt;2.9.13-6.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968424" version="1" comment="python3-libxml2 is &lt;2.9.13-6.el9_5.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960124" version="1" comment="fence-agents-aliyun is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960125" version="1" comment="fence-agents-all is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960126" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960127" version="1" comment="fence-agents-apc is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960128" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960129" version="1" comment="fence-agents-aws is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960130" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960131" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960132" version="1" comment="fence-agents-brocade is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960133" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960134" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960135" version="1" comment="fence-agents-common is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960136" version="1" comment="fence-agents-compute is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960137" version="1" comment="fence-agents-drac5 is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960138" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960139" version="1" comment="fence-agents-emerson is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960140" version="1" comment="fence-agents-eps is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960141" version="1" comment="fence-agents-gce is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960142" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960143" version="1" comment="fence-agents-hpblade is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960144" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960145" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960146" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960147" version="1" comment="fence-agents-ifmib is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960148" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960149" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960150" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960151" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960152" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960153" version="1" comment="fence-agents-ipdu is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960154" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960155" version="1" comment="fence-agents-kdump is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960156" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960157" version="1" comment="fence-agents-mpath is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960158" version="1" comment="fence-agents-openstack is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960159" version="1" comment="fence-agents-redfish is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960160" version="1" comment="fence-agents-rhevm is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960161" version="1" comment="fence-agents-rsa is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960162" version="1" comment="fence-agents-rsb is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960163" version="1" comment="fence-agents-sbd is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960164" version="1" comment="fence-agents-scsi is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960165" version="1" comment="fence-agents-virsh is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960166" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960167" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960168" version="1" comment="fence-agents-wti is &lt;4.10.0-76.el9_5.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960169" version="1" comment="fence-virt is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960170" version="1" comment="fence-virtd is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960171" version="1" comment="fence-virtd-cpg is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960172" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960173" version="1" comment="fence-virtd-multicast is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960174" version="1" comment="fence-virtd-serial is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960175" version="1" comment="fence-virtd-tcp is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960176" version="1" comment="ha-cloud-support is &lt;4.10.0-76.el9_5.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961481" version="1" comment="python3-jinja2 is &lt;2.11.3-7.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008048" version="1" comment="tomcat is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008049" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008050" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008051" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008052" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008053" version="1" comment="tomcat-lib is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008054" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008055" version="1" comment="tomcat-webapps is &lt;9.0.87-3.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054505" version="1" comment="python-unversioned-command is &lt;3.9.25-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054506" version="1" comment="python3 is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054507" version="1" comment="python3-debug is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054508" version="1" comment="python3-devel is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054509" version="1" comment="python3-idle is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054510" version="1" comment="python3-libs is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054511" version="1" comment="python3-test is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054512" version="1" comment="python3-tkinter is &lt;3.9.25-2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054048" version="1" comment="shadow-utils is &lt;4.9-15.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054049" version="1" comment="shadow-utils-subid is &lt;4.9-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054050" version="1" comment="shadow-utils-subid-devel is &lt;4.9-15.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008808" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008965" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008968" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008970" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997090" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=7-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975407" version="1" comment="kernel-default is &lt;4.12.14-122.244.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975033" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975411" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975412" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975413" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975414" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975415" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975066" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975416" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975417" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975418" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975419" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975067" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975068" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975069" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975070" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975071" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987651" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997091" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987652" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997092" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=6-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996826" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968295" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968296" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968298" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968300" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968303" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968305" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976552" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976553" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976554" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976555" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976556" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976558" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976559" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976560" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977294" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976834" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977142" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977131" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977295" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977296" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977297" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977298" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011961" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011962" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011963" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011826" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011964" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011965" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011827" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011966" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012359" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011891" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011967" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011968" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011969" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983916" version="1" comment="openjpeg2 is &lt;2.4.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983917" version="1" comment="openjpeg2-devel is &lt;2.4.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983918" version="1" comment="openjpeg2-tools is &lt;2.4.0-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869922" version="1" comment="firefox is &lt;115.12.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869923" version="1" comment="firefox-x11 is &lt;115.12.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009869937" version="1" comment="thunderbird is &lt;115.12.1-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953763" version="1" comment="nano is &lt;5.6.1-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008810" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960344" version="1" comment="raptor2 is &lt;2.0.15-32.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960345" version="1" comment="raptor2-devel is &lt;2.0.15-32.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970650" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970651" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970652" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970653" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011365" version="1" comment="kernel is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011366" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.30.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011367" version="1" comment="kernel-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011368" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011369" version="1" comment="kernel-debug is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011370" version="1" comment="kernel-debug-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011373" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011374" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011375" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011376" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011379" version="1" comment="kernel-doc is &lt;5.14.0-570.30.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011380" version="1" comment="kernel-headers is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011381" version="1" comment="kernel-modules is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011382" version="1" comment="kernel-modules-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011383" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011384" version="1" comment="kernel-rt is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011385" version="1" comment="kernel-rt-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011386" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011387" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011389" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011390" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011391" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011392" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011394" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011395" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011396" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011397" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011398" version="1" comment="kernel-tools is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011399" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011401" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011402" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011403" version="1" comment="libperf is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011404" version="1" comment="perf is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011405" version="1" comment="python3-perf is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011406" version="1" comment="rtla is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011407" version="1" comment="rv is &lt;5.14.0-570.30.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986634" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986635" version="1" comment="kernel-default is &lt;5.14.21-150400.24.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986284" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=2-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986734" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=6-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986735" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=6-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986737" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=2-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986739" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=2-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009005" version="1" comment="kernel is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009006" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.28.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009007" version="1" comment="kernel-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009008" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009009" version="1" comment="kernel-debug is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009010" version="1" comment="kernel-debug-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009013" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009014" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009015" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009016" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009019" version="1" comment="kernel-doc is &lt;5.14.0-570.28.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009020" version="1" comment="kernel-headers is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009021" version="1" comment="kernel-modules is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009022" version="1" comment="kernel-modules-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009023" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009024" version="1" comment="kernel-rt is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009025" version="1" comment="kernel-rt-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009026" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009027" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009029" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009030" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009031" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009032" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009034" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009035" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009036" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009037" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009038" version="1" comment="kernel-tools is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009039" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009041" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009042" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009043" version="1" comment="libperf is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009044" version="1" comment="perf is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009045" version="1" comment="python3-perf is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009046" version="1" comment="rtla is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009047" version="1" comment="rv is &lt;5.14.0-570.28.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985567" version="1" comment="kernel is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985568" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.16.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985569" version="1" comment="kernel-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985570" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985571" version="1" comment="kernel-debug is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985572" version="1" comment="kernel-debug-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985575" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985576" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985577" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985578" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985581" version="1" comment="kernel-doc is &lt;5.14.0-570.16.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985582" version="1" comment="kernel-headers is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985583" version="1" comment="kernel-modules is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985584" version="1" comment="kernel-modules-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985585" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985586" version="1" comment="kernel-rt is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985587" version="1" comment="kernel-rt-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985588" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985589" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985591" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985592" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985593" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985594" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985596" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985597" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985598" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985599" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985600" version="1" comment="kernel-tools is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985601" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985603" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985604" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985605" version="1" comment="libperf is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985606" version="1" comment="perf is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985607" version="1" comment="python3-perf is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985608" version="1" comment="rtla is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985609" version="1" comment="rv is &lt;5.14.0-570.16.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019723" version="1" comment="kernel-default is &lt;5.14.21-150400.24.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879623" version="1" comment="389-ds-base is &lt;2.4.5-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879624" version="1" comment="389-ds-base-devel is &lt;2.4.5-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879625" version="1" comment="389-ds-base-libs is &lt;2.4.5-9.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879626" version="1" comment="python3-lib389 is &lt;2.4.5-9.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951344" version="1" comment="edk2-ovmf is &lt;20231122-6.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951345" version="1" comment="edk2-tools is &lt;20231122-6.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951346" version="1" comment="edk2-tools-doc is &lt;20231122-6.el9_4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943439" version="1" comment="openssl is &lt;3.0.7-28.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943440" version="1" comment="openssl-devel is &lt;3.0.7-28.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943441" version="1" comment="openssl-libs is &lt;3.0.7-28.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943442" version="1" comment="openssl-perl is &lt;3.0.7-28.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953728" version="1" comment="cockpit is &lt;323.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953729" version="1" comment="cockpit-bridge is &lt;323.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953730" version="1" comment="cockpit-doc is &lt;323.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953731" version="1" comment="cockpit-packagekit is &lt;323.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953732" version="1" comment="cockpit-pcp is &lt;323.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953733" version="1" comment="cockpit-storaged is &lt;323.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953734" version="1" comment="cockpit-system is &lt;323.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953735" version="1" comment="cockpit-ws is &lt;323.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006152" version="1" comment="cloud-init is &lt;24.4-4.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953903" version="1" comment="python-unversioned-command is &lt;3.9.19-8.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953904" version="1" comment="python3 is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953905" version="1" comment="python3-debug is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953906" version="1" comment="python3-devel is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953907" version="1" comment="python3-idle is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953908" version="1" comment="python3-libs is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953909" version="1" comment="python3-test is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953910" version="1" comment="python3-tkinter is &lt;3.9.19-8.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953775" version="1" comment="python3.11 is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953776" version="1" comment="python3.11-debug is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953777" version="1" comment="python3.11-devel is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953778" version="1" comment="python3.11-idle is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953779" version="1" comment="python3.11-libs is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953780" version="1" comment="python3.11-test is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953781" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953782" version="1" comment="python3.12 is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953783" version="1" comment="python3.12-debug is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953784" version="1" comment="python3.12-devel is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953785" version="1" comment="python3.12-idle is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953786" version="1" comment="python3.12-libs is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953787" version="1" comment="python3.12-test is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953788" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953642" version="1" comment="poppler is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953643" version="1" comment="poppler-cpp is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953644" version="1" comment="poppler-cpp-devel is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953645" version="1" comment="poppler-devel is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953646" version="1" comment="poppler-glib is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953647" version="1" comment="poppler-glib-devel is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953648" version="1" comment="poppler-glib-doc is &lt;21.01.0-21.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953649" version="1" comment="poppler-qt5 is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953650" version="1" comment="poppler-qt5-devel is &lt;21.01.0-21.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953651" version="1" comment="poppler-utils is &lt;21.01.0-21.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943028" version="1" comment="fence-agents-aliyun is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943029" version="1" comment="fence-agents-all is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943030" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943031" version="1" comment="fence-agents-apc is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943032" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943033" version="1" comment="fence-agents-aws is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943034" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943035" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943036" version="1" comment="fence-agents-brocade is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943037" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943038" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943039" version="1" comment="fence-agents-common is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943040" version="1" comment="fence-agents-compute is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943041" version="1" comment="fence-agents-drac5 is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943042" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943043" version="1" comment="fence-agents-emerson is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943044" version="1" comment="fence-agents-eps is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943045" version="1" comment="fence-agents-gce is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943046" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943047" version="1" comment="fence-agents-hpblade is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943048" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943049" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943050" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943051" version="1" comment="fence-agents-ifmib is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943052" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943053" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943054" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943055" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943056" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943057" version="1" comment="fence-agents-ipdu is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943058" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943059" version="1" comment="fence-agents-kdump is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943060" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943061" version="1" comment="fence-agents-mpath is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943062" version="1" comment="fence-agents-openstack is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943063" version="1" comment="fence-agents-redfish is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943064" version="1" comment="fence-agents-rhevm is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943065" version="1" comment="fence-agents-rsa is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943066" version="1" comment="fence-agents-rsb is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943067" version="1" comment="fence-agents-sbd is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943068" version="1" comment="fence-agents-scsi is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943069" version="1" comment="fence-agents-virsh is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943070" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943071" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943072" version="1" comment="fence-agents-wti is &lt;4.10.0-62.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943073" version="1" comment="fence-virt is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943074" version="1" comment="fence-virtd is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943075" version="1" comment="fence-virtd-cpg is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943076" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943077" version="1" comment="fence-virtd-multicast is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943078" version="1" comment="fence-virtd-serial is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943079" version="1" comment="fence-virtd-tcp is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943080" version="1" comment="ha-cloud-support is &lt;4.10.0-62.el9_4.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880241" version="1" comment="python3-setuptools is &lt;53.0.0-12.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880242" version="1" comment="python3-setuptools-wheel is &lt;53.0.0-12.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879627" version="1" comment="python3.11-setuptools is &lt;65.5.1-2.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009879628" version="1" comment="python3.11-setuptools-wheel is &lt;65.5.1-2.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880239" version="1" comment="python3.12-setuptools is &lt;68.2.2-3.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009880240" version="1" comment="python3.12-setuptools-wheel is &lt;68.2.2-3.el9_4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871872" version="1" comment="openssh is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871873" version="1" comment="openssh-askpass is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871874" version="1" comment="openssh-clients is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871875" version="1" comment="openssh-keycat is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871876" version="1" comment="openssh-server is &lt;8.7p1-38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871877" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.38.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872987" version="1" comment="openssh is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872988" version="1" comment="openssh-askpass is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872989" version="1" comment="openssh-clients is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872990" version="1" comment="openssh-keycat is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872991" version="1" comment="openssh-server is &lt;8.7p1-38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872992" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.38.el9_4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953712" version="1" comment="NetworkManager is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953713" version="1" comment="NetworkManager-adsl is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953714" version="1" comment="NetworkManager-bluetooth is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953715" version="1" comment="NetworkManager-cloud-setup is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953716" version="1" comment="NetworkManager-config-connectivity-suse is &lt;1.48.10-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953717" version="1" comment="NetworkManager-config-server is &lt;1.48.10-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953718" version="1" comment="NetworkManager-dispatcher-routing-rules is &lt;1.48.10-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953719" version="1" comment="NetworkManager-initscripts-updown is &lt;1.48.10-2.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953720" version="1" comment="NetworkManager-libnm is &lt;1.48.10-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953721" version="1" comment="NetworkManager-libnm-devel is &lt;1.48.10-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953722" version="1" comment="NetworkManager-ovs is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953723" version="1" comment="NetworkManager-ppp is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953724" version="1" comment="NetworkManager-team is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953725" version="1" comment="NetworkManager-tui is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953726" version="1" comment="NetworkManager-wifi is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953727" version="1" comment="NetworkManager-wwan is &lt;1.48.10-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875460" version="1" comment="firefox is &lt;115.13.0-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875461" version="1" comment="firefox-x11 is &lt;115.13.0-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877069" version="1" comment="thunderbird is &lt;115.13.0-3.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953656" version="1" comment="gtk-update-icon-cache is &lt;3.24.31-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953657" version="1" comment="gtk3 is &lt;3.24.31-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953658" version="1" comment="gtk3-devel is &lt;3.24.31-5.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953659" version="1" comment="gtk3-devel-docs is &lt;3.24.31-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953660" version="1" comment="gtk3-immodule-xim is &lt;3.24.31-5.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942219" version="1" comment="python-unversioned-command is &lt;3.9.18-3.el9_4.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942220" version="1" comment="python3 is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942221" version="1" comment="python3-debug is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942222" version="1" comment="python3-devel is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942223" version="1" comment="python3-idle is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942224" version="1" comment="python3-libs is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942225" version="1" comment="python3-test is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942226" version="1" comment="python3-tkinter is &lt;3.9.18-3.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942227" version="1" comment="python3.11 is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942228" version="1" comment="python3.11-debug is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942229" version="1" comment="python3.11-devel is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942230" version="1" comment="python3.11-idle is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942231" version="1" comment="python3.11-libs is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942232" version="1" comment="python3.11-test is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009942233" version="1" comment="python3.11-tkinter is &lt;3.11.7-1.el9_4.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940510" version="1" comment="python3.12 is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940511" version="1" comment="python3.12-debug is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940512" version="1" comment="python3.12-devel is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940513" version="1" comment="python3.12-idle is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940514" version="1" comment="python3.12-libs is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940515" version="1" comment="python3.12-test is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940516" version="1" comment="python3.12-tkinter is &lt;3.12.1-4.el9_4.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951341" version="1" comment="libtiff is &lt;4.4.0-12.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951342" version="1" comment="libtiff-devel is &lt;4.4.0-12.el9_4.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951343" version="1" comment="libtiff-tools is &lt;4.4.0-12.el9_4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974172" version="1" comment="nginx is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974173" version="1" comment="nginx-all-modules is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974174" version="1" comment="nginx-core is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974175" version="1" comment="nginx-filesystem is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974176" version="1" comment="nginx-mod-devel is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974177" version="1" comment="nginx-mod-http-image-filter is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974178" version="1" comment="nginx-mod-http-perl is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974179" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974180" version="1" comment="nginx-mod-mail is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974181" version="1" comment="nginx-mod-stream is &lt;1.24.0-4.module+el9.5.0+22954+e2d70a1c.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943432" version="1" comment="libnbd is &lt;1.18.1-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943433" version="1" comment="libnbd-bash-completion is &lt;1.18.1-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943434" version="1" comment="libnbd-devel is &lt;1.18.1-4.el9_4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943435" version="1" comment="nbdfuse is &lt;1.18.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943436" version="1" comment="ocaml-libnbd is &lt;1.18.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943437" version="1" comment="ocaml-libnbd-devel is &lt;1.18.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943438" version="1" comment="python3-libnbd is &lt;1.18.1-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941420" version="1" comment="firefox is &lt;115.14.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009941421" version="1" comment="firefox-x11 is &lt;115.14.0-2.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881384" version="1" comment="thunderbird is &lt;115.14.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974606" version="1" comment="python3.11 is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974607" version="1" comment="python3.11-debug is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974608" version="1" comment="python3.11-devel is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974609" version="1" comment="python3.11-idle is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974610" version="1" comment="python3.11-libs is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974611" version="1" comment="python3.11-test is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974612" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974499" version="1" comment="python3.12 is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974500" version="1" comment="python3.12-debug is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974501" version="1" comment="python3.12-devel is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974502" version="1" comment="python3.12-idle is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974503" version="1" comment="python3.12-libs is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974504" version="1" comment="python3.12-test is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974505" version="1" comment="python3.12-tkinter is &lt;3.12.5-2.el9_5.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945000" version="1" comment="firefox is &lt;128.2.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945001" version="1" comment="firefox-x11 is &lt;128.2.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945002" version="1" comment="thunderbird is &lt;128.2.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951968" version="1" comment="python-unversioned-command is &lt;3.9.19-8.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951969" version="1" comment="python3 is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951970" version="1" comment="python3-debug is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951971" version="1" comment="python3-devel is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951972" version="1" comment="python3-idle is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951973" version="1" comment="python3-libs is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951974" version="1" comment="python3-test is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009951975" version="1" comment="python3-tkinter is &lt;3.9.19-8.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984041" version="1" comment="expat is &lt;2.5.0-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984042" version="1" comment="expat-devel is &lt;2.5.0-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953584" version="1" comment="libvirt is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953585" version="1" comment="libvirt-client is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953586" version="1" comment="libvirt-client-qemu is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953587" version="1" comment="libvirt-daemon is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953588" version="1" comment="libvirt-daemon-common is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953589" version="1" comment="libvirt-daemon-config-network is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953590" version="1" comment="libvirt-daemon-config-nwfilter is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953591" version="1" comment="libvirt-daemon-driver-interface is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953592" version="1" comment="libvirt-daemon-driver-network is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953593" version="1" comment="libvirt-daemon-driver-nodedev is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953594" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953595" version="1" comment="libvirt-daemon-driver-qemu is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953596" version="1" comment="libvirt-daemon-driver-secret is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953597" version="1" comment="libvirt-daemon-driver-storage is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953598" version="1" comment="libvirt-daemon-driver-storage-core is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953599" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953600" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953601" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953602" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953603" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953604" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953605" version="1" comment="libvirt-daemon-kvm is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953606" version="1" comment="libvirt-daemon-lock is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953607" version="1" comment="libvirt-daemon-log is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953608" version="1" comment="libvirt-daemon-plugin-lockd is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953609" version="1" comment="libvirt-daemon-plugin-sanlock is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953610" version="1" comment="libvirt-daemon-proxy is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953611" version="1" comment="libvirt-devel is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953612" version="1" comment="libvirt-docs is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953613" version="1" comment="libvirt-libs is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953614" version="1" comment="libvirt-nss is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953615" version="1" comment="libvirt-ssh-proxy is &lt;10.5.0-7.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983883" version="1" comment="aardvark-dns is &lt;1.14.0-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985480" version="1" comment="python3-unbound is &lt;1.16.2-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985481" version="1" comment="unbound is &lt;1.16.2-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985482" version="1" comment="unbound-devel is &lt;1.16.2-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985483" version="1" comment="unbound-dracut is &lt;1.16.2-18.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985484" version="1" comment="unbound-libs is &lt;1.16.2-18.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953941" version="1" comment="NetworkManager-libreswan is &lt;1.2.22-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953942" version="1" comment="NetworkManager-libreswan-gnome is &lt;1.2.22-4.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958268" version="1" comment="python3.11 is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958269" version="1" comment="python3.11-debug is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958270" version="1" comment="python3.11-devel is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958271" version="1" comment="python3.11-idle is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958272" version="1" comment="python3.11-libs is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958273" version="1" comment="python3.11-test is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009958274" version="1" comment="python3.11-tkinter is &lt;3.11.9-7.el9_5.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945478" version="1" comment="go-toolset is &lt;1.21.13-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945479" version="1" comment="golang is &lt;1.21.13-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945480" version="1" comment="golang-bin is &lt;1.21.13-4.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945481" version="1" comment="golang-docs is &lt;1.21.13-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945482" version="1" comment="golang-misc is &lt;1.21.13-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945483" version="1" comment="golang-src is &lt;1.21.13-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945484" version="1" comment="golang-tests is &lt;1.21.13-4.el9_4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950363" version="1" comment="grafana is &lt;9.2.10-19.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950364" version="1" comment="grafana-selinux is &lt;9.2.10-19.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945529" version="1" comment="firefox is &lt;128.3.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945530" version="1" comment="firefox-x11 is &lt;128.3.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945531" version="1" comment="thunderbird is &lt;128.3.0-1.el9_4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953522" version="1" comment="tigervnc is &lt;1.14.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953523" version="1" comment="tigervnc-icons is &lt;1.14.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953524" version="1" comment="tigervnc-license is &lt;1.14.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953525" version="1" comment="tigervnc-selinux is &lt;1.14.1-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953526" version="1" comment="tigervnc-server is &lt;1.14.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953527" version="1" comment="tigervnc-server-minimal is &lt;1.14.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009953528" version="1" comment="tigervnc-server-module is &lt;1.14.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983902" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983903" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983904" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983905" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983906" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983910" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-3.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983911" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-3.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983907" version="1" comment="xorg-x11-server-common is &lt;1.20.11-28.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983908" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-28.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983909" version="1" comment="xorg-x11-server-source is &lt;1.20.11-28.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960005" version="1" comment="firefox is &lt;128.6.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960006" version="1" comment="firefox-x11 is &lt;128.6.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960007" version="1" comment="thunderbird is &lt;128.6.0-3.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976563" version="1" comment="glibc is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976564" version="1" comment="glibc-all-langpacks is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976565" version="1" comment="glibc-benchtests is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976566" version="1" comment="glibc-common is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976567" version="1" comment="glibc-devel is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976568" version="1" comment="glibc-doc is &lt;2.34-125.el9_5.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976569" version="1" comment="glibc-gconv-extra is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976570" version="1" comment="glibc-headers is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976571" version="1" comment="glibc-langpack-aa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976572" version="1" comment="glibc-langpack-af is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976573" version="1" comment="glibc-langpack-agr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976574" version="1" comment="glibc-langpack-ak is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976575" version="1" comment="glibc-langpack-am is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976576" version="1" comment="glibc-langpack-an is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976577" version="1" comment="glibc-langpack-anp is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976578" version="1" comment="glibc-langpack-ar is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976579" version="1" comment="glibc-langpack-as is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976580" version="1" comment="glibc-langpack-ast is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976581" version="1" comment="glibc-langpack-ayc is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976582" version="1" comment="glibc-langpack-az is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976583" version="1" comment="glibc-langpack-be is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976584" version="1" comment="glibc-langpack-bem is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976585" version="1" comment="glibc-langpack-ber is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976586" version="1" comment="glibc-langpack-bg is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976587" version="1" comment="glibc-langpack-bhb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976588" version="1" comment="glibc-langpack-bho is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976589" version="1" comment="glibc-langpack-bi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976590" version="1" comment="glibc-langpack-bn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976591" version="1" comment="glibc-langpack-bo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976592" version="1" comment="glibc-langpack-br is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976593" version="1" comment="glibc-langpack-brx is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976594" version="1" comment="glibc-langpack-bs is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976595" version="1" comment="glibc-langpack-byn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976596" version="1" comment="glibc-langpack-ca is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976597" version="1" comment="glibc-langpack-ce is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976598" version="1" comment="glibc-langpack-chr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976599" version="1" comment="glibc-langpack-ckb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976600" version="1" comment="glibc-langpack-cmn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976601" version="1" comment="glibc-langpack-crh is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976602" version="1" comment="glibc-langpack-cs is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976603" version="1" comment="glibc-langpack-csb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976604" version="1" comment="glibc-langpack-cv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976605" version="1" comment="glibc-langpack-cy is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976606" version="1" comment="glibc-langpack-da is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976607" version="1" comment="glibc-langpack-de is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976608" version="1" comment="glibc-langpack-doi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976609" version="1" comment="glibc-langpack-dsb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976610" version="1" comment="glibc-langpack-dv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976611" version="1" comment="glibc-langpack-dz is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976612" version="1" comment="glibc-langpack-el is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976613" version="1" comment="glibc-langpack-en is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976614" version="1" comment="glibc-langpack-eo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976615" version="1" comment="glibc-langpack-es is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976616" version="1" comment="glibc-langpack-et is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976617" version="1" comment="glibc-langpack-eu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976618" version="1" comment="glibc-langpack-fa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976619" version="1" comment="glibc-langpack-ff is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976620" version="1" comment="glibc-langpack-fi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976621" version="1" comment="glibc-langpack-fil is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976622" version="1" comment="glibc-langpack-fo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976623" version="1" comment="glibc-langpack-fr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976624" version="1" comment="glibc-langpack-fur is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976625" version="1" comment="glibc-langpack-fy is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976626" version="1" comment="glibc-langpack-ga is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976627" version="1" comment="glibc-langpack-gd is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976628" version="1" comment="glibc-langpack-gez is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976629" version="1" comment="glibc-langpack-gl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976630" version="1" comment="glibc-langpack-gu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976631" version="1" comment="glibc-langpack-gv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976632" version="1" comment="glibc-langpack-ha is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976633" version="1" comment="glibc-langpack-hak is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976634" version="1" comment="glibc-langpack-he is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976635" version="1" comment="glibc-langpack-hi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976636" version="1" comment="glibc-langpack-hif is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976637" version="1" comment="glibc-langpack-hne is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976638" version="1" comment="glibc-langpack-hr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976639" version="1" comment="glibc-langpack-hsb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976640" version="1" comment="glibc-langpack-ht is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976641" version="1" comment="glibc-langpack-hu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976642" version="1" comment="glibc-langpack-hy is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976643" version="1" comment="glibc-langpack-ia is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976644" version="1" comment="glibc-langpack-id is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976645" version="1" comment="glibc-langpack-ig is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976646" version="1" comment="glibc-langpack-ik is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976647" version="1" comment="glibc-langpack-is is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976648" version="1" comment="glibc-langpack-it is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976649" version="1" comment="glibc-langpack-iu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976650" version="1" comment="glibc-langpack-ja is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976651" version="1" comment="glibc-langpack-ka is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976652" version="1" comment="glibc-langpack-kab is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976653" version="1" comment="glibc-langpack-kk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976654" version="1" comment="glibc-langpack-kl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976655" version="1" comment="glibc-langpack-km is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976656" version="1" comment="glibc-langpack-kn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976657" version="1" comment="glibc-langpack-ko is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976658" version="1" comment="glibc-langpack-kok is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976659" version="1" comment="glibc-langpack-ks is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976660" version="1" comment="glibc-langpack-ku is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976661" version="1" comment="glibc-langpack-kw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976662" version="1" comment="glibc-langpack-ky is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976663" version="1" comment="glibc-langpack-lb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976664" version="1" comment="glibc-langpack-lg is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976665" version="1" comment="glibc-langpack-li is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976666" version="1" comment="glibc-langpack-lij is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976667" version="1" comment="glibc-langpack-ln is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976668" version="1" comment="glibc-langpack-lo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976669" version="1" comment="glibc-langpack-lt is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976670" version="1" comment="glibc-langpack-lv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976671" version="1" comment="glibc-langpack-lzh is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976672" version="1" comment="glibc-langpack-mag is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976673" version="1" comment="glibc-langpack-mai is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976674" version="1" comment="glibc-langpack-mfe is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976675" version="1" comment="glibc-langpack-mg is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976676" version="1" comment="glibc-langpack-mhr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976677" version="1" comment="glibc-langpack-mi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976678" version="1" comment="glibc-langpack-miq is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976679" version="1" comment="glibc-langpack-mjw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976680" version="1" comment="glibc-langpack-mk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976681" version="1" comment="glibc-langpack-ml is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976682" version="1" comment="glibc-langpack-mn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976683" version="1" comment="glibc-langpack-mni is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976684" version="1" comment="glibc-langpack-mnw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976685" version="1" comment="glibc-langpack-mr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976686" version="1" comment="glibc-langpack-ms is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976687" version="1" comment="glibc-langpack-mt is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976688" version="1" comment="glibc-langpack-my is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976689" version="1" comment="glibc-langpack-nan is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976690" version="1" comment="glibc-langpack-nb is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976691" version="1" comment="glibc-langpack-nds is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976692" version="1" comment="glibc-langpack-ne is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976693" version="1" comment="glibc-langpack-nhn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976694" version="1" comment="glibc-langpack-niu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976695" version="1" comment="glibc-langpack-nl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976696" version="1" comment="glibc-langpack-nn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976697" version="1" comment="glibc-langpack-nr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976698" version="1" comment="glibc-langpack-nso is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976699" version="1" comment="glibc-langpack-oc is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976700" version="1" comment="glibc-langpack-om is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976701" version="1" comment="glibc-langpack-or is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976702" version="1" comment="glibc-langpack-os is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976703" version="1" comment="glibc-langpack-pa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976704" version="1" comment="glibc-langpack-pap is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976705" version="1" comment="glibc-langpack-pl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976706" version="1" comment="glibc-langpack-ps is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976707" version="1" comment="glibc-langpack-pt is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976708" version="1" comment="glibc-langpack-quz is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976709" version="1" comment="glibc-langpack-raj is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976710" version="1" comment="glibc-langpack-ro is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976711" version="1" comment="glibc-langpack-ru is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976712" version="1" comment="glibc-langpack-rw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976713" version="1" comment="glibc-langpack-sa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976714" version="1" comment="glibc-langpack-sah is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976715" version="1" comment="glibc-langpack-sat is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976716" version="1" comment="glibc-langpack-sc is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976717" version="1" comment="glibc-langpack-sd is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976718" version="1" comment="glibc-langpack-se is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976719" version="1" comment="glibc-langpack-sgs is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976720" version="1" comment="glibc-langpack-shn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976721" version="1" comment="glibc-langpack-shs is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976722" version="1" comment="glibc-langpack-si is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976723" version="1" comment="glibc-langpack-sid is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976724" version="1" comment="glibc-langpack-sk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976725" version="1" comment="glibc-langpack-sl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976726" version="1" comment="glibc-langpack-sm is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976727" version="1" comment="glibc-langpack-so is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976728" version="1" comment="glibc-langpack-sq is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976729" version="1" comment="glibc-langpack-sr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976730" version="1" comment="glibc-langpack-ss is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976731" version="1" comment="glibc-langpack-st is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976732" version="1" comment="glibc-langpack-sv is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976733" version="1" comment="glibc-langpack-sw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976734" version="1" comment="glibc-langpack-szl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976735" version="1" comment="glibc-langpack-ta is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976736" version="1" comment="glibc-langpack-tcy is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976737" version="1" comment="glibc-langpack-te is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976738" version="1" comment="glibc-langpack-tg is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976739" version="1" comment="glibc-langpack-th is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976740" version="1" comment="glibc-langpack-the is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976741" version="1" comment="glibc-langpack-ti is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976742" version="1" comment="glibc-langpack-tig is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976743" version="1" comment="glibc-langpack-tk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976744" version="1" comment="glibc-langpack-tl is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976745" version="1" comment="glibc-langpack-tn is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976746" version="1" comment="glibc-langpack-to is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976747" version="1" comment="glibc-langpack-tpi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976748" version="1" comment="glibc-langpack-tr is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976749" version="1" comment="glibc-langpack-ts is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976750" version="1" comment="glibc-langpack-tt is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976751" version="1" comment="glibc-langpack-ug is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976752" version="1" comment="glibc-langpack-uk is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976753" version="1" comment="glibc-langpack-unm is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976754" version="1" comment="glibc-langpack-ur is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976755" version="1" comment="glibc-langpack-uz is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976756" version="1" comment="glibc-langpack-ve is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976757" version="1" comment="glibc-langpack-vi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976758" version="1" comment="glibc-langpack-wa is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976759" version="1" comment="glibc-langpack-wae is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976760" version="1" comment="glibc-langpack-wal is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976761" version="1" comment="glibc-langpack-wo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976762" version="1" comment="glibc-langpack-xh is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976763" version="1" comment="glibc-langpack-yi is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976764" version="1" comment="glibc-langpack-yo is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976765" version="1" comment="glibc-langpack-yue is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976766" version="1" comment="glibc-langpack-yuw is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976767" version="1" comment="glibc-langpack-zh is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976768" version="1" comment="glibc-langpack-zu is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976769" version="1" comment="glibc-locale-source is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976770" version="1" comment="glibc-minimal-langpack is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976771" version="1" comment="glibc-nss-devel is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976772" version="1" comment="glibc-static is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976773" version="1" comment="glibc-utils is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976774" version="1" comment="libnsl is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976775" version="1" comment="nscd is &lt;2.34-125.el9_5.8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976776" version="1" comment="nss_db is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976777" version="1" comment="nss_hesiod is &lt;2.34-125.el9_5.8 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963166" version="1" comment="thunderbird is &lt;128.7.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968429" version="1" comment="grub2-common is &lt;2.06-94.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968430" version="1" comment="grub2-efi-x64 is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968431" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968432" version="1" comment="grub2-efi-x64-modules is &lt;2.06-94.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968433" version="1" comment="grub2-pc is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968434" version="1" comment="grub2-pc-modules is &lt;2.06-94.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968435" version="1" comment="grub2-tools is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968436" version="1" comment="grub2-tools-efi is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968437" version="1" comment="grub2-tools-extra is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968438" version="1" comment="grub2-tools-minimal is &lt;2.06-94.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983856" version="1" comment="python-unversioned-command is &lt;3.9.21-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983857" version="1" comment="python3 is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983858" version="1" comment="python3-debug is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983859" version="1" comment="python3-devel is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983860" version="1" comment="python3-idle is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983861" version="1" comment="python3-libs is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983862" version="1" comment="python3-test is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983863" version="1" comment="python3-tkinter is &lt;3.9.21-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983891" version="1" comment="python3.11 is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983892" version="1" comment="python3.11-debug is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983893" version="1" comment="python3.11-devel is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983894" version="1" comment="python3.11-idle is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983895" version="1" comment="python3.11-libs is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983896" version="1" comment="python3.11-test is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983897" version="1" comment="python3.11-tkinter is &lt;3.11.11-2.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983884" version="1" comment="python3.12 is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983885" version="1" comment="python3.12-debug is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983886" version="1" comment="python3.12-devel is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983887" version="1" comment="python3.12-idle is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983888" version="1" comment="python3.12-libs is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983889" version="1" comment="python3.12-test is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983890" version="1" comment="python3.12-tkinter is &lt;3.12.9-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963164" version="1" comment="firefox is &lt;128.7.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963165" version="1" comment="firefox-x11 is &lt;128.7.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055908" version="1" comment="rsync is &lt;3.2.5-3.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055909" version="1" comment="rsync-daemon is &lt;3.2.5-3.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055910" version="1" comment="rsync-rrsync is &lt;3.2.5-3.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018753" version="1" comment="firefox is &lt;140.3.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018754" version="1" comment="firefox-x11 is &lt;140.3.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018755" version="1" comment="thunderbird is &lt;140.3.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054268" version="1" comment="gimp is &lt;3.0.4-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054269" version="1" comment="gimp-libs is &lt;3.0.4-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965294" version="1" comment="libpq is &lt;13.20-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965295" version="1" comment="libpq-devel is &lt;13.20-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965296" version="1" comment="postgresql is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965297" version="1" comment="postgresql-contrib is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965298" version="1" comment="postgresql-docs is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965299" version="1" comment="postgresql-plperl is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965300" version="1" comment="postgresql-plpython3 is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965301" version="1" comment="postgresql-pltcl is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965302" version="1" comment="postgresql-private-devel is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965303" version="1" comment="postgresql-private-libs is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965304" version="1" comment="postgresql-server is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965305" version="1" comment="postgresql-server-devel is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965306" version="1" comment="postgresql-static is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965307" version="1" comment="postgresql-test is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965308" version="1" comment="postgresql-test-rpm-macros is &lt;13.20-1.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965309" version="1" comment="postgresql-upgrade is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965310" version="1" comment="postgresql-upgrade-devel is &lt;13.20-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054138" version="1" comment="libsoup is &lt;2.72.0-12.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054139" version="1" comment="libsoup-devel is &lt;2.72.0-12.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054513" version="1" comment="binutils is &lt;2.35.2-67.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054514" version="1" comment="binutils-devel is &lt;2.35.2-67.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054515" version="1" comment="binutils-gold is &lt;2.35.2-67.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054502" version="1" comment="gcc-toolset-13-binutils is &lt;2.40-21.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054503" version="1" comment="gcc-toolset-13-binutils-devel is &lt;2.40-21.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054504" version="1" comment="gcc-toolset-13-binutils-gold is &lt;2.40-21.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054543" version="1" comment="gcc-toolset-14-binutils is &lt;2.41-5.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054544" version="1" comment="gcc-toolset-14-binutils-devel is &lt;2.41-5.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054545" version="1" comment="gcc-toolset-14-binutils-gold is &lt;2.41-5.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054546" version="1" comment="gcc-toolset-14-binutils-gprofng is &lt;2.41-5.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054880" version="1" comment="gcc-toolset-15-binutils is &lt;2.44-3.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054881" version="1" comment="gcc-toolset-15-binutils-devel is &lt;2.44-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054882" version="1" comment="gcc-toolset-15-binutils-gold is &lt;2.44-3.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054883" version="1" comment="gcc-toolset-15-binutils-gprofng is &lt;2.44-3.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054948" version="1" comment="openssl is &lt;3.5.1-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054949" version="1" comment="openssl-devel is &lt;3.5.1-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054950" version="1" comment="openssl-libs is &lt;3.5.1-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054951" version="1" comment="openssl-perl is &lt;3.5.1-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054216" version="1" comment="haproxy is &lt;2.8.14-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054152" version="1" comment="qt5-qt3d is &lt;5.15.9-2.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054153" version="1" comment="qt5-qt3d-devel is &lt;5.15.9-2.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054154" version="1" comment="qt5-qt3d-examples is &lt;5.15.9-2.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054093" version="1" comment="libipa_hbac is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054094" version="1" comment="libsss_autofs is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054095" version="1" comment="libsss_certmap is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054096" version="1" comment="libsss_idmap is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054097" version="1" comment="libsss_nss_idmap is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054098" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054099" version="1" comment="libsss_simpleifp is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054100" version="1" comment="libsss_sudo is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054101" version="1" comment="python3-libipa_hbac is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054102" version="1" comment="python3-libsss_nss_idmap is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054103" version="1" comment="python3-sss is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054104" version="1" comment="python3-sss-murmur is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054105" version="1" comment="python3-sssdconfig is &lt;2.9.7-4.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054106" version="1" comment="sssd is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054107" version="1" comment="sssd-ad is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054108" version="1" comment="sssd-client is &lt;2.9.7-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054109" version="1" comment="sssd-common is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054110" version="1" comment="sssd-common-pac is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054111" version="1" comment="sssd-dbus is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054112" version="1" comment="sssd-idp is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054113" version="1" comment="sssd-ipa is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054114" version="1" comment="sssd-kcm is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054115" version="1" comment="sssd-krb5 is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054116" version="1" comment="sssd-krb5-common is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054117" version="1" comment="sssd-ldap is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054118" version="1" comment="sssd-nfs-idmap is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054119" version="1" comment="sssd-passkey is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054120" version="1" comment="sssd-polkit-rules is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054121" version="1" comment="sssd-proxy is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054122" version="1" comment="sssd-tools is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054123" version="1" comment="sssd-winbind-idmap is &lt;2.9.7-4.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021830" version="1" comment="firefox is &lt;140.4.0-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021831" version="1" comment="firefox-x11 is &lt;140.4.0-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022848" version="1" comment="thunderbird is &lt;140.4.0-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054952" version="1" comment="python-unversioned-command is &lt;3.9.25-3.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054953" version="1" comment="python3 is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054954" version="1" comment="python3-debug is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054955" version="1" comment="python3-devel is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054956" version="1" comment="python3-idle is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054957" version="1" comment="python3-libs is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054958" version="1" comment="python3-test is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054959" version="1" comment="python3-tkinter is &lt;3.9.25-3.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054916" version="1" comment="python3.11 is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054917" version="1" comment="python3.11-debug is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054918" version="1" comment="python3.11-devel is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054919" version="1" comment="python3.11-idle is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054920" version="1" comment="python3.11-libs is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054921" version="1" comment="python3.11-test is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054922" version="1" comment="python3.11-tkinter is &lt;3.11.13-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054884" version="1" comment="python3.12 is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054885" version="1" comment="python3.12-debug is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054886" version="1" comment="python3.12-devel is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054887" version="1" comment="python3.12-idle is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054888" version="1" comment="python3.12-libs is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054889" version="1" comment="python3.12-test is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054890" version="1" comment="python3.12-tkinter is &lt;3.12.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054463" version="1" comment="php is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054464" version="1" comment="php-bcmath is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054465" version="1" comment="php-cli is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054466" version="1" comment="php-common is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054467" version="1" comment="php-dba is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054468" version="1" comment="php-dbg is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054469" version="1" comment="php-devel is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054470" version="1" comment="php-embedded is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054471" version="1" comment="php-enchant is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054472" version="1" comment="php-ffi is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054473" version="1" comment="php-fpm is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054474" version="1" comment="php-gd is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054475" version="1" comment="php-gmp is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054476" version="1" comment="php-intl is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054477" version="1" comment="php-ldap is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054478" version="1" comment="php-mbstring is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054479" version="1" comment="php-mysqlnd is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054480" version="1" comment="php-odbc is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054481" version="1" comment="php-opcache is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054482" version="1" comment="php-pdo is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054483" version="1" comment="php-pgsql is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054484" version="1" comment="php-process is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054485" version="1" comment="php-snmp is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054486" version="1" comment="php-soap is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054487" version="1" comment="php-xml is &lt;8.3.26-1.module+el9.7.0+23549+c13c2ce3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967154" version="1" comment="emacs is &lt;27.2-11.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967155" version="1" comment="emacs-common is &lt;27.2-11.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967156" version="1" comment="emacs-filesystem is &lt;27.2-11.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967157" version="1" comment="emacs-lucid is &lt;27.2-11.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967158" version="1" comment="emacs-nox is &lt;27.2-11.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055595" version="1" comment="libnfsidmap is &lt;2.5.4-38.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055596" version="1" comment="libnfsidmap-devel is &lt;2.5.4-38.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055597" version="1" comment="nfs-utils is &lt;2.5.4-38.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055598" version="1" comment="nfs-utils-coreos is &lt;2.5.4-38.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055599" version="1" comment="nfsv4-client-utils is &lt;2.5.4-38.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016335" version="1" comment="pg_repack is &lt;1.5.1-1.module+el9.6.0+22880+6b241eec for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016336" version="1" comment="pgvector is &lt;0.6.2-2.module+el9.6.0+22979+c3d78d52 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054671" version="1" comment="postgis is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054672" version="1" comment="postgis-client is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054673" version="1" comment="postgis-docs is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054674" version="1" comment="postgis-upgrade is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054675" version="1" comment="postgis-utils is &lt;3.5.3-3.module+el9.7.0+23421+025f8139 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054676" version="1" comment="postgresql is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054677" version="1" comment="postgresql-contrib is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054678" version="1" comment="postgresql-docs is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054679" version="1" comment="postgresql-plperl is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054680" version="1" comment="postgresql-plpython3 is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054681" version="1" comment="postgresql-pltcl is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054682" version="1" comment="postgresql-private-devel is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054683" version="1" comment="postgresql-private-libs is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054684" version="1" comment="postgresql-server is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054685" version="1" comment="postgresql-server-devel is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054686" version="1" comment="postgresql-static is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054687" version="1" comment="postgresql-test is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054688" version="1" comment="postgresql-test-rpm-macros is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054689" version="1" comment="postgresql-upgrade is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054690" version="1" comment="postgresql-upgrade-devel is &lt;16.11-1.module+el9.7.0+23784+0c5a3b34 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054634" version="1" comment="libpq is &lt;13.23-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054635" version="1" comment="libpq-devel is &lt;13.23-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054177" version="1" comment="firefox is &lt;140.5.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054178" version="1" comment="firefox-x11 is &lt;140.5.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054231" version="1" comment="thunderbird is &lt;140.5.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055120" version="1" comment="pcs is &lt;0.11.10-1.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055121" version="1" comment="pcs-snmp is &lt;0.11.10-1.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054419" version="1" comment="wireshark is &lt;3.4.10-8.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054420" version="1" comment="wireshark-cli is &lt;3.4.10-8.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054421" version="1" comment="wireshark-devel is &lt;3.4.10-8.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054328" version="1" comment="webkit2gtk3 is &lt;2.50.3-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054329" version="1" comment="webkit2gtk3-devel is &lt;2.50.3-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054330" version="1" comment="webkit2gtk3-jsc is &lt;2.50.3-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054331" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.3-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054778" version="1" comment="glib2 is &lt;2.68.4-18.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054779" version="1" comment="glib2-devel is &lt;2.68.4-18.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054780" version="1" comment="glib2-doc is &lt;2.68.4-18.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054781" version="1" comment="glib2-static is &lt;2.68.4-18.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054782" version="1" comment="glib2-tests is &lt;2.68.4-18.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054422" version="1" comment="keylime is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054423" version="1" comment="keylime-base is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054424" version="1" comment="keylime-registrar is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054425" version="1" comment="keylime-selinux is &lt;7.12.1-11.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054426" version="1" comment="keylime-tenant is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054427" version="1" comment="keylime-verifier is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054428" version="1" comment="python3-keylime is &lt;7.12.1-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055050" version="1" comment="libblkid is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055051" version="1" comment="libblkid-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055052" version="1" comment="libfdisk is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055053" version="1" comment="libfdisk-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055054" version="1" comment="libmount is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055055" version="1" comment="libmount-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055056" version="1" comment="libsmartcols is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055057" version="1" comment="libsmartcols-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055058" version="1" comment="libuuid is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055059" version="1" comment="libuuid-devel is &lt;2.37.4-21.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055060" version="1" comment="python3-libmount is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055061" version="1" comment="util-linux is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055062" version="1" comment="util-linux-core is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055063" version="1" comment="util-linux-user is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055064" version="1" comment="uuidd is &lt;2.37.4-21.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054525" version="1" comment="webkit2gtk3 is &lt;2.50.4-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054526" version="1" comment="webkit2gtk3-devel is &lt;2.50.4-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054527" version="1" comment="webkit2gtk3-jsc is &lt;2.50.4-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054528" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.4-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054923" version="1" comment="php is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054924" version="1" comment="php-bcmath is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054925" version="1" comment="php-cli is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054926" version="1" comment="php-common is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054927" version="1" comment="php-dba is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054928" version="1" comment="php-dbg is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054929" version="1" comment="php-devel is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054930" version="1" comment="php-embedded is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054931" version="1" comment="php-enchant is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054932" version="1" comment="php-ffi is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054933" version="1" comment="php-fpm is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054934" version="1" comment="php-gd is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054935" version="1" comment="php-gmp is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054936" version="1" comment="php-intl is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054937" version="1" comment="php-ldap is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054938" version="1" comment="php-mbstring is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054939" version="1" comment="php-mysqlnd is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054940" version="1" comment="php-odbc is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054941" version="1" comment="php-opcache is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054942" version="1" comment="php-pdo is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054943" version="1" comment="php-pgsql is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054944" version="1" comment="php-process is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054945" version="1" comment="php-snmp is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054946" version="1" comment="php-soap is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054947" version="1" comment="php-xml is &lt;8.3.29-1.module+el9.7.0+23852+76de6b03 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054691" version="1" comment="vsftpd is &lt;3.0.5-6.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054366" version="1" comment="firefox is &lt;140.6.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054367" version="1" comment="firefox-x11 is &lt;140.6.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054531" version="1" comment="thunderbird is &lt;140.6.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054692" version="1" comment="firefox is &lt;140.7.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054693" version="1" comment="firefox-x11 is &lt;140.7.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054751" version="1" comment="thunderbird is &lt;140.7.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054741" version="1" comment="gimp is &lt;3.0.4-1.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054742" version="1" comment="gimp-libs is &lt;3.0.4-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054596" version="1" comment="libsoup is &lt;2.72.0-12.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054597" version="1" comment="libsoup-devel is &lt;2.72.0-12.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055666" version="1" comment="gnutls is &lt;3.8.3-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055667" version="1" comment="gnutls-c++ is &lt;3.8.3-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055668" version="1" comment="gnutls-dane is &lt;3.8.3-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055669" version="1" comment="gnutls-devel is &lt;3.8.3-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055670" version="1" comment="gnutls-utils is &lt;3.8.3-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055489" version="1" comment="389-ds-base is &lt;2.7.0-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055490" version="1" comment="389-ds-base-devel is &lt;2.7.0-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055491" version="1" comment="389-ds-base-libs is &lt;2.7.0-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055492" version="1" comment="389-ds-base-snmp is &lt;2.7.0-10.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055493" version="1" comment="python3-lib389 is &lt;2.7.0-10.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055122" version="1" comment="gimp is &lt;3.0.4-1.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055123" version="1" comment="gimp-libs is &lt;3.0.4-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055067" version="1" comment="fontforge is &lt;20201107-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055952" version="1" comment="fontforge is &lt;20201107-8.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055197" version="1" comment="glibc is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055198" version="1" comment="glibc-all-langpacks is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055199" version="1" comment="glibc-benchtests is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055200" version="1" comment="glibc-common is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055201" version="1" comment="glibc-devel is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055202" version="1" comment="glibc-doc is &lt;2.34-231.el9_7.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055203" version="1" comment="glibc-gconv-extra is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055204" version="1" comment="glibc-headers is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055205" version="1" comment="glibc-langpack-aa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055206" version="1" comment="glibc-langpack-af is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055207" version="1" comment="glibc-langpack-agr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055208" version="1" comment="glibc-langpack-ak is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055209" version="1" comment="glibc-langpack-am is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055210" version="1" comment="glibc-langpack-an is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055211" version="1" comment="glibc-langpack-anp is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055212" version="1" comment="glibc-langpack-ar is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055213" version="1" comment="glibc-langpack-as is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055214" version="1" comment="glibc-langpack-ast is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055215" version="1" comment="glibc-langpack-ayc is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055216" version="1" comment="glibc-langpack-az is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055217" version="1" comment="glibc-langpack-be is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055218" version="1" comment="glibc-langpack-bem is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055219" version="1" comment="glibc-langpack-ber is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055220" version="1" comment="glibc-langpack-bg is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055221" version="1" comment="glibc-langpack-bhb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055222" version="1" comment="glibc-langpack-bho is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055223" version="1" comment="glibc-langpack-bi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055224" version="1" comment="glibc-langpack-bn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055225" version="1" comment="glibc-langpack-bo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055226" version="1" comment="glibc-langpack-br is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055227" version="1" comment="glibc-langpack-brx is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055228" version="1" comment="glibc-langpack-bs is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055229" version="1" comment="glibc-langpack-byn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055230" version="1" comment="glibc-langpack-ca is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055231" version="1" comment="glibc-langpack-ce is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055232" version="1" comment="glibc-langpack-chr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055233" version="1" comment="glibc-langpack-ckb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055234" version="1" comment="glibc-langpack-cmn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055235" version="1" comment="glibc-langpack-crh is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055236" version="1" comment="glibc-langpack-cs is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055237" version="1" comment="glibc-langpack-csb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055238" version="1" comment="glibc-langpack-cv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055239" version="1" comment="glibc-langpack-cy is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055240" version="1" comment="glibc-langpack-da is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055241" version="1" comment="glibc-langpack-de is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055242" version="1" comment="glibc-langpack-doi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055243" version="1" comment="glibc-langpack-dsb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055244" version="1" comment="glibc-langpack-dv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055245" version="1" comment="glibc-langpack-dz is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055246" version="1" comment="glibc-langpack-el is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055247" version="1" comment="glibc-langpack-en is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055248" version="1" comment="glibc-langpack-eo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055249" version="1" comment="glibc-langpack-es is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055250" version="1" comment="glibc-langpack-et is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055251" version="1" comment="glibc-langpack-eu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055252" version="1" comment="glibc-langpack-fa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055253" version="1" comment="glibc-langpack-ff is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055254" version="1" comment="glibc-langpack-fi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055255" version="1" comment="glibc-langpack-fil is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055256" version="1" comment="glibc-langpack-fo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055257" version="1" comment="glibc-langpack-fr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055258" version="1" comment="glibc-langpack-fur is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055259" version="1" comment="glibc-langpack-fy is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055260" version="1" comment="glibc-langpack-ga is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055261" version="1" comment="glibc-langpack-gd is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055262" version="1" comment="glibc-langpack-gez is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055263" version="1" comment="glibc-langpack-gl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055264" version="1" comment="glibc-langpack-gu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055265" version="1" comment="glibc-langpack-gv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055266" version="1" comment="glibc-langpack-ha is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055267" version="1" comment="glibc-langpack-hak is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055268" version="1" comment="glibc-langpack-he is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055269" version="1" comment="glibc-langpack-hi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055270" version="1" comment="glibc-langpack-hif is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055271" version="1" comment="glibc-langpack-hne is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055272" version="1" comment="glibc-langpack-hr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055273" version="1" comment="glibc-langpack-hsb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055274" version="1" comment="glibc-langpack-ht is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055275" version="1" comment="glibc-langpack-hu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055276" version="1" comment="glibc-langpack-hy is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055277" version="1" comment="glibc-langpack-ia is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055278" version="1" comment="glibc-langpack-id is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055279" version="1" comment="glibc-langpack-ig is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055280" version="1" comment="glibc-langpack-ik is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055281" version="1" comment="glibc-langpack-is is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055282" version="1" comment="glibc-langpack-it is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055283" version="1" comment="glibc-langpack-iu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055284" version="1" comment="glibc-langpack-ja is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055285" version="1" comment="glibc-langpack-ka is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055286" version="1" comment="glibc-langpack-kab is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055287" version="1" comment="glibc-langpack-kk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055288" version="1" comment="glibc-langpack-kl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055289" version="1" comment="glibc-langpack-km is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055290" version="1" comment="glibc-langpack-kn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055291" version="1" comment="glibc-langpack-ko is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055292" version="1" comment="glibc-langpack-kok is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055293" version="1" comment="glibc-langpack-ks is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055294" version="1" comment="glibc-langpack-ku is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055295" version="1" comment="glibc-langpack-kw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055296" version="1" comment="glibc-langpack-ky is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055297" version="1" comment="glibc-langpack-lb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055298" version="1" comment="glibc-langpack-lg is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055299" version="1" comment="glibc-langpack-li is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055300" version="1" comment="glibc-langpack-lij is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055301" version="1" comment="glibc-langpack-ln is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055302" version="1" comment="glibc-langpack-lo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055303" version="1" comment="glibc-langpack-lt is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055304" version="1" comment="glibc-langpack-lv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055305" version="1" comment="glibc-langpack-lzh is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055306" version="1" comment="glibc-langpack-mag is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055307" version="1" comment="glibc-langpack-mai is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055308" version="1" comment="glibc-langpack-mfe is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055309" version="1" comment="glibc-langpack-mg is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055310" version="1" comment="glibc-langpack-mhr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055311" version="1" comment="glibc-langpack-mi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055312" version="1" comment="glibc-langpack-miq is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055313" version="1" comment="glibc-langpack-mjw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055314" version="1" comment="glibc-langpack-mk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055315" version="1" comment="glibc-langpack-ml is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055316" version="1" comment="glibc-langpack-mn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055317" version="1" comment="glibc-langpack-mni is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055318" version="1" comment="glibc-langpack-mnw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055319" version="1" comment="glibc-langpack-mr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055320" version="1" comment="glibc-langpack-ms is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055321" version="1" comment="glibc-langpack-mt is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055322" version="1" comment="glibc-langpack-my is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055323" version="1" comment="glibc-langpack-nan is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055324" version="1" comment="glibc-langpack-nb is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055325" version="1" comment="glibc-langpack-nds is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055326" version="1" comment="glibc-langpack-ne is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055327" version="1" comment="glibc-langpack-nhn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055328" version="1" comment="glibc-langpack-niu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055329" version="1" comment="glibc-langpack-nl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055330" version="1" comment="glibc-langpack-nn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055331" version="1" comment="glibc-langpack-nr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055332" version="1" comment="glibc-langpack-nso is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055333" version="1" comment="glibc-langpack-oc is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055334" version="1" comment="glibc-langpack-om is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055335" version="1" comment="glibc-langpack-or is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055336" version="1" comment="glibc-langpack-os is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055337" version="1" comment="glibc-langpack-pa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055338" version="1" comment="glibc-langpack-pap is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055339" version="1" comment="glibc-langpack-pl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055340" version="1" comment="glibc-langpack-ps is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055341" version="1" comment="glibc-langpack-pt is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055342" version="1" comment="glibc-langpack-quz is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055343" version="1" comment="glibc-langpack-raj is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055344" version="1" comment="glibc-langpack-ro is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055345" version="1" comment="glibc-langpack-ru is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055346" version="1" comment="glibc-langpack-rw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055347" version="1" comment="glibc-langpack-sa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055348" version="1" comment="glibc-langpack-sah is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055349" version="1" comment="glibc-langpack-sat is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055350" version="1" comment="glibc-langpack-sc is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055351" version="1" comment="glibc-langpack-sd is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055352" version="1" comment="glibc-langpack-se is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055353" version="1" comment="glibc-langpack-sgs is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055354" version="1" comment="glibc-langpack-shn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055355" version="1" comment="glibc-langpack-shs is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055356" version="1" comment="glibc-langpack-si is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055357" version="1" comment="glibc-langpack-sid is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055358" version="1" comment="glibc-langpack-sk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055359" version="1" comment="glibc-langpack-sl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055360" version="1" comment="glibc-langpack-sm is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055361" version="1" comment="glibc-langpack-so is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055362" version="1" comment="glibc-langpack-sq is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055363" version="1" comment="glibc-langpack-sr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055364" version="1" comment="glibc-langpack-ss is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055365" version="1" comment="glibc-langpack-st is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055366" version="1" comment="glibc-langpack-sv is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055367" version="1" comment="glibc-langpack-sw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055368" version="1" comment="glibc-langpack-szl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055369" version="1" comment="glibc-langpack-ta is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055370" version="1" comment="glibc-langpack-tcy is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055371" version="1" comment="glibc-langpack-te is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055372" version="1" comment="glibc-langpack-tg is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055373" version="1" comment="glibc-langpack-th is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055374" version="1" comment="glibc-langpack-the is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055375" version="1" comment="glibc-langpack-ti is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055376" version="1" comment="glibc-langpack-tig is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055377" version="1" comment="glibc-langpack-tk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055378" version="1" comment="glibc-langpack-tl is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055379" version="1" comment="glibc-langpack-tn is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055380" version="1" comment="glibc-langpack-to is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055381" version="1" comment="glibc-langpack-tpi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055382" version="1" comment="glibc-langpack-tr is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055383" version="1" comment="glibc-langpack-ts is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055384" version="1" comment="glibc-langpack-tt is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055385" version="1" comment="glibc-langpack-ug is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055386" version="1" comment="glibc-langpack-uk is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055387" version="1" comment="glibc-langpack-unm is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055388" version="1" comment="glibc-langpack-ur is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055389" version="1" comment="glibc-langpack-uz is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055390" version="1" comment="glibc-langpack-ve is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055391" version="1" comment="glibc-langpack-vi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055392" version="1" comment="glibc-langpack-wa is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055393" version="1" comment="glibc-langpack-wae is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055394" version="1" comment="glibc-langpack-wal is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055395" version="1" comment="glibc-langpack-wo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055396" version="1" comment="glibc-langpack-xh is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055397" version="1" comment="glibc-langpack-yi is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055398" version="1" comment="glibc-langpack-yo is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055399" version="1" comment="glibc-langpack-yue is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055400" version="1" comment="glibc-langpack-yuw is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055401" version="1" comment="glibc-langpack-zh is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055402" version="1" comment="glibc-langpack-zu is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055403" version="1" comment="glibc-locale-source is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055404" version="1" comment="glibc-minimal-langpack is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055405" version="1" comment="glibc-nss-devel is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055406" version="1" comment="glibc-static is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055407" version="1" comment="glibc-utils is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055408" version="1" comment="libnsl is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055409" version="1" comment="nscd is &lt;2.34-231.el9_7.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055410" version="1" comment="nss_db is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055411" version="1" comment="nss_hesiod is &lt;2.34-231.el9_7.10 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055656" version="1" comment="python-unversioned-command is &lt;3.9.25-3.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055657" version="1" comment="python3 is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055658" version="1" comment="python3-debug is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055659" version="1" comment="python3-devel is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055660" version="1" comment="python3-idle is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055661" version="1" comment="python3-libs is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055662" version="1" comment="python3-test is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055663" version="1" comment="python3-tkinter is &lt;3.9.25-3.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055671" version="1" comment="python3.11 is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055672" version="1" comment="python3.11-debug is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055673" version="1" comment="python3.11-devel is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055674" version="1" comment="python3.11-idle is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055675" version="1" comment="python3.11-libs is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055676" version="1" comment="python3.11-test is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055677" version="1" comment="python3.11-tkinter is &lt;3.11.13-5.1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055649" version="1" comment="python3.12 is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055650" version="1" comment="python3.12-debug is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055651" version="1" comment="python3.12-devel is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055652" version="1" comment="python3.12-idle is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055653" version="1" comment="python3.12-libs is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055654" version="1" comment="python3.12-test is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055655" version="1" comment="python3.12-tkinter is &lt;3.12.12-4.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967866" version="1" comment="firefox is &lt;128.8.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967867" version="1" comment="firefox-x11 is &lt;128.8.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968439" version="1" comment="thunderbird is &lt;128.8.0-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053897" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053898" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053899" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053900" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053901" version="1" comment="dotnet-host is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053902" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053903" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053904" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053905" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053906" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053907" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053908" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053909" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.1-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053910" version="1" comment="dotnet-templates-9.0 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053911" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.102-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961355" version="1" comment="java-17-openjdk is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961356" version="1" comment="java-17-openjdk-demo is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961406" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961407" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961359" version="1" comment="java-17-openjdk-devel is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961409" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961410" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961411" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961363" version="1" comment="java-17-openjdk-headless is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961413" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961414" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961366" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961367" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961368" version="1" comment="java-17-openjdk-jmods is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961418" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961419" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961420" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961372" version="1" comment="java-17-openjdk-src is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961422" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961423" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961375" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.14.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961425" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961426" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.14.0.7-3.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961378" version="1" comment="java-21-openjdk is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961379" version="1" comment="java-21-openjdk-demo is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961380" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961381" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961382" version="1" comment="java-21-openjdk-devel is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961383" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961384" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961385" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961386" version="1" comment="java-21-openjdk-headless is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961387" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961388" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961389" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961390" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961391" version="1" comment="java-21-openjdk-jmods is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961392" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961393" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961394" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961395" version="1" comment="java-21-openjdk-src is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961396" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961397" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961398" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961399" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961400" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.6.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018739" version="1" comment="mecab is &lt;0.996-3.module+el9.6.0+22713+cbf15e23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018740" version="1" comment="mecab-devel is &lt;0.996-3.module+el9.6.0+22713+cbf15e23.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018741" version="1" comment="mecab-ipadic is &lt;2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018742" version="1" comment="mecab-ipadic-EUCJP is &lt;2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018743" version="1" comment="mysql is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018744" version="1" comment="mysql-common is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018745" version="1" comment="mysql-devel is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018746" version="1" comment="mysql-errmsg is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018747" version="1" comment="mysql-libs is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018748" version="1" comment="mysql-server is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018749" version="1" comment="mysql-test is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018750" version="1" comment="mysql-test-data is &lt;8.4.6-1.module+el9.6.0+23497+d0c5dcca for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018751" version="1" comment="rapidjson-devel is &lt;1.1.0-19.module+el9.6.0+22713+cbf15e23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018752" version="1" comment="rapidjson-doc is &lt;1.1.0-19.module+el9.6.0+22713+cbf15e23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976014" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976015" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976016" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976017" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.452.b09-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976018" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976019" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976020" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976021" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976022" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976023" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976024" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976025" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976026" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976027" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976028" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.452.b09-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976029" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.452.b09-2.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976030" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976031" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976032" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976033" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.452.b09-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999610" version="1" comment="java-11-openjdk is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999549" version="1" comment="java-11-openjdk-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999611" version="1" comment="java-11-openjdk-demo is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999551" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999552" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999553" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999612" version="1" comment="java-11-openjdk-devel is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999555" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999556" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999557" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999558" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999613" version="1" comment="java-11-openjdk-headless is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999560" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999561" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999562" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999614" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999564" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999615" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999566" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999616" version="1" comment="java-11-openjdk-jmods is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999568" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999569" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999570" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999571" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999617" version="1" comment="java-11-openjdk-src is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999573" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999574" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999575" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999618" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999577" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.27.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999578" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999579" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.27.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976149" version="1" comment="java-17-openjdk is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976150" version="1" comment="java-17-openjdk-demo is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976151" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976152" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976153" version="1" comment="java-17-openjdk-devel is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976154" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976155" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976156" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976157" version="1" comment="java-17-openjdk-headless is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976158" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976159" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976160" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976161" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976162" version="1" comment="java-17-openjdk-jmods is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976163" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976164" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976165" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976166" version="1" comment="java-17-openjdk-src is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976167" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976168" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976169" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976170" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976171" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.15.0.6-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976253" version="1" comment="java-21-openjdk is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976254" version="1" comment="java-21-openjdk-demo is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976255" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976256" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976257" version="1" comment="java-21-openjdk-devel is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976258" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976259" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976260" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976261" version="1" comment="java-21-openjdk-headless is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976262" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976263" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976264" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976265" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976266" version="1" comment="java-21-openjdk-jmods is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976267" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976268" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976269" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976270" version="1" comment="java-21-openjdk-src is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976271" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976272" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976273" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976274" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976275" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.7.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983976" version="1" comment="redis is &lt;7.2.8-1.module+el9.6.0+23049+8374f320 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983977" version="1" comment="redis-devel is &lt;7.2.8-1.module+el9.6.0+23049+8374f320 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983978" version="1" comment="redis-doc is &lt;7.2.8-1.module+el9.6.0+23049+8374f320 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018027" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017978" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017979" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018028" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018016" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=3-150700.3.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014748" version="1" comment="kernel-default is &lt;6.4.0-150700.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020710" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020711" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020712" version="1" comment="kernel-default is &lt;6.4.0-150600.23.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017864" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017865" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017866" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017867" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019706" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011970" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011971" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011828" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011972" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011974" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011976" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011977" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011978" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011829" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012376" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011980" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011982" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011984" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011985" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011986" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011987" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012360" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012378" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012362" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014265" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=2-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014747" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=2-150700.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050318" version="1" comment="kgraft-patch-4_12_14-122_293-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050990" version="1" comment="kernel-default is ==5.14.21-150500.55.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050991" version="1" comment="kernel-livepatch-5_14_21-150500_55_136-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019707" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019708" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019709" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019710" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019711" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019712" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019713" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019714" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019744" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019745" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019715" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985610" version="1" comment="kernel is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985611" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.17.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985612" version="1" comment="kernel-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985613" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985614" version="1" comment="kernel-debug is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985615" version="1" comment="kernel-debug-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985618" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985619" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985620" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985621" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985624" version="1" comment="kernel-doc is &lt;5.14.0-570.17.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985625" version="1" comment="kernel-headers is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985626" version="1" comment="kernel-modules is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985627" version="1" comment="kernel-modules-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985628" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985629" version="1" comment="kernel-rt is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985630" version="1" comment="kernel-rt-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985631" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985632" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985634" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985635" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985636" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985637" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985639" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985640" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985641" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985642" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985643" version="1" comment="kernel-tools is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985644" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985646" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985647" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985648" version="1" comment="libperf is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985649" version="1" comment="perf is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985650" version="1" comment="python3-perf is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985651" version="1" comment="rtla is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985652" version="1" comment="rv is &lt;5.14.0-570.17.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008704" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008811" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008812" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008813" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970459" version="1" comment="bpftool is &lt;7.4.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970460" version="1" comment="kernel is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970461" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-503.34.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970462" version="1" comment="kernel-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970463" version="1" comment="kernel-cross-headers is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970464" version="1" comment="kernel-debug is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970465" version="1" comment="kernel-debug-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970468" version="1" comment="kernel-debug-modules is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970469" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970470" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970471" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970474" version="1" comment="kernel-doc is &lt;5.14.0-503.34.1.el9_5 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970475" version="1" comment="kernel-headers is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970476" version="1" comment="kernel-modules is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970477" version="1" comment="kernel-modules-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970478" version="1" comment="kernel-modules-extra is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970479" version="1" comment="kernel-rt is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970480" version="1" comment="kernel-rt-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970481" version="1" comment="kernel-rt-debug is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970482" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970484" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970485" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970486" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970487" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970489" version="1" comment="kernel-rt-kvm is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970490" version="1" comment="kernel-rt-modules is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970491" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970492" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970493" version="1" comment="kernel-tools is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970494" version="1" comment="kernel-tools-libs is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970496" version="1" comment="kernel-uki-virt is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970497" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970498" version="1" comment="libperf is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970499" version="1" comment="perf is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970500" version="1" comment="python3-perf is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970501" version="1" comment="rtla is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970502" version="1" comment="rv is &lt;5.14.0-503.34.1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008809" version="1" comment="kernel-default is &lt;5.3.18-150300.59.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020743" version="1" comment="kernel-default is &lt;5.14.21-150400.24.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020713" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020714" version="1" comment="kernel-default is &lt;6.4.0-150600.23.42.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996844" version="1" comment="kernel is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996845" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.23.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996846" version="1" comment="kernel-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996847" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996848" version="1" comment="kernel-debug is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996849" version="1" comment="kernel-debug-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996852" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996853" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996854" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996855" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996858" version="1" comment="kernel-doc is &lt;5.14.0-570.23.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996859" version="1" comment="kernel-headers is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996860" version="1" comment="kernel-modules is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996861" version="1" comment="kernel-modules-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996862" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996863" version="1" comment="kernel-rt is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996864" version="1" comment="kernel-rt-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996865" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996866" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996868" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996869" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996870" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996871" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996873" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996874" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996875" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996876" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996877" version="1" comment="kernel-tools is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996878" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996880" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996881" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996882" version="1" comment="libperf is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996883" version="1" comment="perf is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996884" version="1" comment="python3-perf is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996885" version="1" comment="rtla is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996886" version="1" comment="rv is &lt;5.14.0-570.23.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986194" version="1" comment="kernel is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986195" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.21.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986196" version="1" comment="kernel-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986197" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986198" version="1" comment="kernel-debug is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986199" version="1" comment="kernel-debug-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986202" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986203" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986204" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986205" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986208" version="1" comment="kernel-doc is &lt;5.14.0-570.21.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986209" version="1" comment="kernel-headers is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986210" version="1" comment="kernel-modules is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986211" version="1" comment="kernel-modules-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986212" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986213" version="1" comment="kernel-rt is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986214" version="1" comment="kernel-rt-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986215" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986216" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986218" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986219" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986220" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986221" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986223" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986224" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986225" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986226" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986227" version="1" comment="kernel-tools is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986228" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986230" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986231" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986232" version="1" comment="libperf is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986233" version="1" comment="perf is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986234" version="1" comment="python3-perf is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986235" version="1" comment="rtla is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986236" version="1" comment="rv is &lt;5.14.0-570.21.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986972" version="1" comment="kernel is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986973" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.22.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986974" version="1" comment="kernel-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986975" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986976" version="1" comment="kernel-debug is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986977" version="1" comment="kernel-debug-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986980" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986981" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986982" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986983" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986986" version="1" comment="kernel-doc is &lt;5.14.0-570.22.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986987" version="1" comment="kernel-headers is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986988" version="1" comment="kernel-modules is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986989" version="1" comment="kernel-modules-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986990" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986991" version="1" comment="kernel-rt is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986992" version="1" comment="kernel-rt-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986993" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986994" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986996" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986997" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986998" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986999" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987001" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987002" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987003" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987004" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987005" version="1" comment="kernel-tools is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987006" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987008" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987009" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987010" version="1" comment="libperf is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987011" version="1" comment="perf is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987012" version="1" comment="python3-perf is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987013" version="1" comment="rtla is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987014" version="1" comment="rv is &lt;5.14.0-570.22.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985653" version="1" comment="kernel is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985654" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.18.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985655" version="1" comment="kernel-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985656" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985657" version="1" comment="kernel-debug is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985658" version="1" comment="kernel-debug-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985661" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985662" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985663" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985664" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985667" version="1" comment="kernel-doc is &lt;5.14.0-570.18.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985668" version="1" comment="kernel-headers is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985669" version="1" comment="kernel-modules is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985670" version="1" comment="kernel-modules-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985671" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985672" version="1" comment="kernel-rt is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985673" version="1" comment="kernel-rt-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985674" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985675" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985677" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985678" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985679" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985680" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985682" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985683" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985684" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985685" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985686" version="1" comment="kernel-tools is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985687" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985689" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985690" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985691" version="1" comment="libperf is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985692" version="1" comment="perf is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985693" version="1" comment="python3-perf is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985694" version="1" comment="rtla is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985695" version="1" comment="rv is &lt;5.14.0-570.18.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014541" version="1" comment="kernel-default is &lt;4.12.14-122.261.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022285" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022334" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022310" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022311" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022286" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022287" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022288" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022289" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022312" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022290" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019757" version="1" comment="kernel-default is &lt;5.3.18-150300.59.215.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022613" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022335" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022614" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022803" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022336" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022804" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022805" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022615" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022806" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022616" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022807" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022808" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022809" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022810" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023025" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022811" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022812" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022813" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022814" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023026" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023027" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023028" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023339" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023029" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=6-150700.3.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006289" version="1" comment="kernel is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006290" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.26.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006291" version="1" comment="kernel-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006292" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006293" version="1" comment="kernel-debug is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006294" version="1" comment="kernel-debug-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006297" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006298" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006299" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006300" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006303" version="1" comment="kernel-doc is &lt;5.14.0-570.26.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006304" version="1" comment="kernel-headers is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006305" version="1" comment="kernel-modules is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006306" version="1" comment="kernel-modules-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006307" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006308" version="1" comment="kernel-rt is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006309" version="1" comment="kernel-rt-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006310" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006311" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006313" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006314" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006315" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006316" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006318" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006319" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006320" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006321" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006322" version="1" comment="kernel-tools is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006323" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006325" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006326" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006327" version="1" comment="libperf is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006328" version="1" comment="perf is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006329" version="1" comment="python3-perf is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006330" version="1" comment="rtla is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010006331" version="1" comment="rv is &lt;5.14.0-570.26.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009239802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017412" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017413" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017676" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017677" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017980" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020715" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=5-150700.3.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015654" version="1" comment="kernel is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015655" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.37.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015656" version="1" comment="kernel-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015657" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015658" version="1" comment="kernel-debug is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015659" version="1" comment="kernel-debug-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015662" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015663" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015664" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015665" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015668" version="1" comment="kernel-doc is &lt;5.14.0-570.37.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015669" version="1" comment="kernel-headers is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015670" version="1" comment="kernel-modules is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015671" version="1" comment="kernel-modules-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015672" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015673" version="1" comment="kernel-rt is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015674" version="1" comment="kernel-rt-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015675" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015676" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015678" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015679" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015680" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015681" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015683" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015684" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015685" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015686" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015687" version="1" comment="kernel-tools is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015688" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015690" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015691" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015692" version="1" comment="libperf is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015693" version="1" comment="perf is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015694" version="1" comment="python3-perf is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015695" version="1" comment="rtla is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015696" version="1" comment="rv is &lt;5.14.0-570.37.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010061" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964799" version="1" comment="nodejs is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964800" version="1" comment="nodejs-devel is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964801" version="1" comment="nodejs-docs is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964802" version="1" comment="nodejs-full-i18n is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964803" version="1" comment="nodejs-libs is &lt;22.13.1-1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963855" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.5.0+22773+9a359385 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963856" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.5.0+22773+9a359385 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963857" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.5.0+22773+9a359385 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964807" version="1" comment="npm is &lt;10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964808" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.13.1.1.module+el9.5.0+22763+17233acb for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053946" version="1" comment="open-vm-tools is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053947" version="1" comment="open-vm-tools-desktop is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053948" version="1" comment="open-vm-tools-salt-minion is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053949" version="1" comment="open-vm-tools-sdmp is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053950" version="1" comment="open-vm-tools-test is &lt;13.0.0-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985380" version="1" comment="gvisor-tap-vsock is &lt;0.8.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985381" version="1" comment="gvisor-tap-vsock-gvforwarder is &lt;0.8.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983924" version="1" comment="podman is &lt;5.4.0-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983925" version="1" comment="podman-docker is &lt;5.4.0-9.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983926" version="1" comment="podman-plugins is &lt;5.4.0-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983927" version="1" comment="podman-remote is &lt;5.4.0-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983928" version="1" comment="podman-tests is &lt;5.4.0-9.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986876" version="1" comment="buildah is &lt;1.39.4-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986877" version="1" comment="buildah-tests is &lt;1.39.4-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986868" version="1" comment="containernetworking-plugins is &lt;1.6.2-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987015" version="1" comment="git-lfs is &lt;3.6.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986021" version="1" comment="go-toolset is &lt;1.23.9-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986022" version="1" comment="golang is &lt;1.23.9-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986023" version="1" comment="golang-bin is &lt;1.23.9-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986024" version="1" comment="golang-docs is &lt;1.23.9-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986025" version="1" comment="golang-misc is &lt;1.23.9-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986026" version="1" comment="golang-race is &lt;1.23.9-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986027" version="1" comment="golang-src is &lt;1.23.9-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986028" version="1" comment="golang-tests is &lt;1.23.9-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986652" version="1" comment="grafana is &lt;10.2.6-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986971" version="1" comment="grafana-pcp is &lt;5.1.1-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986653" version="1" comment="grafana-selinux is &lt;10.2.6-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986878" version="1" comment="gvisor-tap-vsock is &lt;0.8.5-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986879" version="1" comment="gvisor-tap-vsock-gvforwarder is &lt;0.8.5-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986869" version="1" comment="podman is &lt;5.4.0-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986870" version="1" comment="podman-docker is &lt;5.4.0-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986871" version="1" comment="podman-plugins is &lt;5.4.0-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986872" version="1" comment="podman-remote is &lt;5.4.0-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986873" version="1" comment="podman-tests is &lt;5.4.0-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986874" version="1" comment="skopeo is &lt;1.18.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986875" version="1" comment="skopeo-tests is &lt;1.18.1-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997709" version="1" comment="weldr-client is &lt;35.12-4.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999424" version="1" comment="go-toolset is &lt;1.24.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999425" version="1" comment="golang is &lt;1.24.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999426" version="1" comment="golang-bin is &lt;1.24.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999427" version="1" comment="golang-docs is &lt;1.24.4-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999428" version="1" comment="golang-misc is &lt;1.24.4-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999429" version="1" comment="golang-race is &lt;1.24.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999430" version="1" comment="golang-src is &lt;1.24.4-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999431" version="1" comment="golang-tests is &lt;1.24.4-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964804" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.5.0+22763+17233acb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964805" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.5.0+22763+17233acb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964806" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.5.0+22763+17233acb for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031473" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031474" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031475" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031476" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019719" version="1" comment="kernel-default is &lt;6.4.0-150600.23.47.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030638" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=8-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031906" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=8-150700.3.21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986177" version="1" comment="nodejs is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986178" version="1" comment="nodejs-devel is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986179" version="1" comment="nodejs-docs is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986180" version="1" comment="nodejs-full-i18n is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986181" version="1" comment="nodejs-libs is &lt;22.16.0-1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986188" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.6.0+23146+be9976bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986189" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.6.0+23146+be9976bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986190" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.6.0+23146+be9976bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986182" version="1" comment="npm is &lt;10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986183" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.16.0.1.module+el9.6.0+23151+b1496e9d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986184" version="1" comment="nodejs is &lt;20.19.2-1.module+el9.6.0+23146+be9976bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986185" version="1" comment="nodejs-devel is &lt;20.19.2-1.module+el9.6.0+23146+be9976bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986186" version="1" comment="nodejs-docs is &lt;20.19.2-1.module+el9.6.0+23146+be9976bd for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986187" version="1" comment="nodejs-full-i18n is &lt;20.19.2-1.module+el9.6.0+23146+be9976bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986191" version="1" comment="npm is &lt;10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985368" version="1" comment="nginx is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985369" version="1" comment="nginx-all-modules is &lt;1.20.1-22.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985370" version="1" comment="nginx-core is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985371" version="1" comment="nginx-filesystem is &lt;1.20.1-22.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985372" version="1" comment="nginx-mod-devel is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985373" version="1" comment="nginx-mod-http-image-filter is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985374" version="1" comment="nginx-mod-http-perl is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985375" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985376" version="1" comment="nginx-mod-mail is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985377" version="1" comment="nginx-mod-stream is &lt;1.20.1-22.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968410" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968395" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968411" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968396" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968412" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968397" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968413" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968398" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968399" version="1" comment="dotnet-host is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968414" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968400" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968415" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968401" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968416" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968402" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968417" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.114-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968418" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.114-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968403" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968404" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968405" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968419" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.114-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968406" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968420" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.14-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968407" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.3-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968421" version="1" comment="dotnet-templates-8.0 is &lt;8.0.114-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968408" version="1" comment="dotnet-templates-9.0 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968409" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.104-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974759" version="1" comment="webkit2gtk3 is &lt;2.48.1-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974760" version="1" comment="webkit2gtk3-devel is &lt;2.48.1-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974761" version="1" comment="webkit2gtk3-jsc is &lt;2.48.1-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974762" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.1-1.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968425" version="1" comment="webkit2gtk3 is &lt;2.46.6-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968426" version="1" comment="webkit2gtk3-devel is &lt;2.46.6-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968427" version="1" comment="webkit2gtk3-jsc is &lt;2.46.6-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968428" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.46.6-2.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054376" version="1" comment="ruby is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054377" version="1" comment="ruby-bundled-gems is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054378" version="1" comment="ruby-default-gems is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054379" version="1" comment="ruby-devel is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054380" version="1" comment="ruby-doc is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054381" version="1" comment="ruby-libs is &lt;3.3.10-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054382" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054383" version="1" comment="rubygem-bundler is &lt;2.5.22-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054384" version="1" comment="rubygem-io-console is &lt;0.7.1-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054385" version="1" comment="rubygem-irb is &lt;1.13.1-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054386" version="1" comment="rubygem-json is &lt;2.7.2-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054387" version="1" comment="rubygem-minitest is &lt;5.20.0-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054388" version="1" comment="rubygem-mysql2 is &lt;0.5.5-3.module+el9.7.0+23362+7018fe7e for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054389" version="1" comment="rubygem-mysql2-doc is &lt;0.5.5-3.module+el9.7.0+23362+7018fe7e for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054390" version="1" comment="rubygem-power_assert is &lt;2.0.3-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054391" version="1" comment="rubygem-psych is &lt;5.1.2-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054392" version="1" comment="rubygem-racc is &lt;1.7.3-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054393" version="1" comment="rubygem-rake is &lt;13.1.0-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054394" version="1" comment="rubygem-rbs is &lt;3.4.0-5.module+el9.7.0+23651+15dc1615 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054395" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054396" version="1" comment="rubygem-rexml is &lt;3.4.4-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054397" version="1" comment="rubygem-rss is &lt;0.3.1-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054398" version="1" comment="rubygem-test-unit is &lt;3.6.1-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054399" version="1" comment="rubygem-typeprof is &lt;0.21.9-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054400" version="1" comment="rubygems is &lt;3.5.22-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054401" version="1" comment="rubygems-devel is &lt;3.5.22-5.module+el9.7.0+23651+15dc1615 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983876" version="1" comment="krb5-devel is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983877" version="1" comment="krb5-libs is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983878" version="1" comment="krb5-pkinit is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983879" version="1" comment="krb5-server is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983880" version="1" comment="krb5-server-ldap is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983881" version="1" comment="krb5-workstation is &lt;1.21.1-6.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983882" version="1" comment="libkadm5 is &lt;1.21.1-6.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969562" version="1" comment="libxslt is &lt;1.1.34-9.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969563" version="1" comment="libxslt-devel is &lt;1.1.34-9.el9_5.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983929" version="1" comment="389-ds-base is &lt;2.6.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983930" version="1" comment="389-ds-base-devel is &lt;2.6.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983931" version="1" comment="389-ds-base-libs is &lt;2.6.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983932" version="1" comment="389-ds-base-snmp is &lt;2.6.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983933" version="1" comment="python3-lib389 is &lt;2.6.1-8.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983900" version="1" comment="bootc is &lt;1.1.6-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985341" version="1" comment="bootupd is &lt;0.2.27-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983919" version="1" comment="keylime-agent-rust is &lt;0.2.2-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985367" version="1" comment="python3.12-cryptography is &lt;41.0.7-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983898" version="1" comment="rpm-ostree is &lt;2025.5-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983899" version="1" comment="rpm-ostree-libs is &lt;2025.5-1.el9 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983901" version="1" comment="system-reinstall-bootc is &lt;1.1.6-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985952" version="1" comment="ruby is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985953" version="1" comment="ruby-bundled-gems is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985954" version="1" comment="ruby-default-gems is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985955" version="1" comment="ruby-devel is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985956" version="1" comment="ruby-doc is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985957" version="1" comment="ruby-libs is &lt;3.3.8-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985958" version="1" comment="rubygem-bigdecimal is &lt;3.1.5-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985959" version="1" comment="rubygem-bundler is &lt;2.5.22-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985960" version="1" comment="rubygem-io-console is &lt;0.7.1-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985961" version="1" comment="rubygem-irb is &lt;1.13.1-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985962" version="1" comment="rubygem-json is &lt;2.7.2-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985963" version="1" comment="rubygem-minitest is &lt;5.20.0-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985964" version="1" comment="rubygem-power_assert is &lt;2.0.3-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985965" version="1" comment="rubygem-psych is &lt;5.1.2-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985966" version="1" comment="rubygem-racc is &lt;1.7.3-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985967" version="1" comment="rubygem-rake is &lt;13.1.0-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985968" version="1" comment="rubygem-rbs is &lt;3.4.0-4.module+el9.5.0+23030+26c9b8e1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985969" version="1" comment="rubygem-rdoc is &lt;6.6.3.1-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985970" version="1" comment="rubygem-rexml is &lt;3.3.9-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985971" version="1" comment="rubygem-rss is &lt;0.3.1-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985972" version="1" comment="rubygem-test-unit is &lt;3.6.1-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985973" version="1" comment="rubygem-typeprof is &lt;0.21.9-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985974" version="1" comment="rubygems is &lt;3.5.22-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985975" version="1" comment="rubygems-devel is &lt;3.5.22-4.module+el9.5.0+23030+26c9b8e1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996931" version="1" comment="bsdtar is &lt;3.5.3-5.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996932" version="1" comment="libarchive is &lt;3.5.3-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996933" version="1" comment="libarchive-devel is &lt;3.5.3-5.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983864" version="1" comment="openssh is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983865" version="1" comment="openssh-askpass is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983866" version="1" comment="openssh-clients is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983867" version="1" comment="openssh-keycat is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983868" version="1" comment="openssh-server is &lt;8.7p1-45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983869" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.45.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967979" version="1" comment="tigervnc is &lt;1.14.1-1.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967980" version="1" comment="tigervnc-icons is &lt;1.14.1-1.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967981" version="1" comment="tigervnc-license is &lt;1.14.1-1.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967982" version="1" comment="tigervnc-selinux is &lt;1.14.1-1.el9_5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967983" version="1" comment="tigervnc-server is &lt;1.14.1-1.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967984" version="1" comment="tigervnc-server-minimal is &lt;1.14.1-1.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967985" version="1" comment="tigervnc-server-module is &lt;1.14.1-1.el9_5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054530" version="1" comment="git-lfs is &lt;3.6.1-4.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984043" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985452" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984044" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985453" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984045" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985454" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984046" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985455" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985456" version="1" comment="dotnet-host is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984047" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985457" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984048" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985458" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984049" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985459" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984050" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.116-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984051" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.116-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985460" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985461" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985462" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984052" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.116-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985463" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984053" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.16-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985464" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.5-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984054" version="1" comment="dotnet-templates-8.0 is &lt;8.0.116-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985465" version="1" comment="dotnet-templates-9.0 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985466" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.106-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985565" version="1" comment="buildah is &lt;1.39.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985566" version="1" comment="buildah-tests is &lt;1.39.4-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985976" version="1" comment="skopeo is &lt;1.18.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985977" version="1" comment="skopeo-tests is &lt;1.18.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011411" version="1" comment="redis is &lt;7.2.10-1.module+el9.6.0+23332+115a3b01 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011412" version="1" comment="redis-devel is &lt;7.2.10-1.module+el9.6.0+23332+115a3b01 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011413" version="1" comment="redis-doc is &lt;7.2.10-1.module+el9.6.0+23332+115a3b01 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977557" version="1" comment="ruby is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977558" version="1" comment="ruby-bundled-gems is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977559" version="1" comment="ruby-default-gems is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977560" version="1" comment="ruby-devel is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977561" version="1" comment="ruby-doc is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977562" version="1" comment="ruby-libs is &lt;3.1.7-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977563" version="1" comment="rubygem-bigdecimal is &lt;3.1.1-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977564" version="1" comment="rubygem-bundler is &lt;2.3.27-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977565" version="1" comment="rubygem-io-console is &lt;0.5.11-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977566" version="1" comment="rubygem-irb is &lt;1.4.1-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977567" version="1" comment="rubygem-json is &lt;2.6.1-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977568" version="1" comment="rubygem-minitest is &lt;5.15.0-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977569" version="1" comment="rubygem-power_assert is &lt;2.0.1-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977570" version="1" comment="rubygem-psych is &lt;4.0.4-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977571" version="1" comment="rubygem-rake is &lt;13.0.6-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977572" version="1" comment="rubygem-rbs is &lt;2.7.0-146.module+el9.5.0+23003+a4c328ce for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977573" version="1" comment="rubygem-rdoc is &lt;6.4.1.1-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977576" version="1" comment="rubygem-test-unit is &lt;3.5.3-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977577" version="1" comment="rubygem-typeprof is &lt;0.21.3-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977578" version="1" comment="rubygems is &lt;3.3.27-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977579" version="1" comment="rubygems-devel is &lt;3.3.27-146.module+el9.5.0+23003+a4c328ce for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974188" version="1" comment="freetype is &lt;2.10.4-10.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974189" version="1" comment="freetype-devel is &lt;2.10.4-10.el9_5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970406" version="1" comment="fence-agents-aliyun is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970407" version="1" comment="fence-agents-all is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970408" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970409" version="1" comment="fence-agents-apc is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970410" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970411" version="1" comment="fence-agents-aws is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970412" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970413" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970414" version="1" comment="fence-agents-brocade is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970415" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970416" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970417" version="1" comment="fence-agents-common is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970418" version="1" comment="fence-agents-compute is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970419" version="1" comment="fence-agents-drac5 is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970420" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970421" version="1" comment="fence-agents-emerson is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970422" version="1" comment="fence-agents-eps is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970423" version="1" comment="fence-agents-gce is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970424" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970425" version="1" comment="fence-agents-hpblade is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970426" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970427" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970428" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970429" version="1" comment="fence-agents-ifmib is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970430" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970431" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970432" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970433" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970434" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970435" version="1" comment="fence-agents-ipdu is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970436" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970437" version="1" comment="fence-agents-kdump is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970438" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970439" version="1" comment="fence-agents-mpath is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970440" version="1" comment="fence-agents-openstack is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970441" version="1" comment="fence-agents-redfish is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970442" version="1" comment="fence-agents-rhevm is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970443" version="1" comment="fence-agents-rsa is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970444" version="1" comment="fence-agents-rsb is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970445" version="1" comment="fence-agents-sbd is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970446" version="1" comment="fence-agents-scsi is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970447" version="1" comment="fence-agents-virsh is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970448" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970449" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970450" version="1" comment="fence-agents-wti is &lt;4.10.0-76.el9_5.6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970451" version="1" comment="fence-virt is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970452" version="1" comment="fence-virtd is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970453" version="1" comment="fence-virtd-cpg is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970454" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970455" version="1" comment="fence-virtd-multicast is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970456" version="1" comment="fence-virtd-serial is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970457" version="1" comment="fence-virtd-tcp is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970458" version="1" comment="ha-cloud-support is &lt;4.10.0-76.el9_5.6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974187" version="1" comment="python3-jinja2 is &lt;2.11.3-8.el9_5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985444" version="1" comment="ghostscript is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985445" version="1" comment="ghostscript-doc is &lt;9.54.0-19.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985446" version="1" comment="ghostscript-tools-dvipdf is &lt;9.54.0-19.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985447" version="1" comment="ghostscript-tools-fonts is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985448" version="1" comment="ghostscript-tools-printing is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985449" version="1" comment="ghostscript-x11 is &lt;9.54.0-19.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985450" version="1" comment="libgs is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985451" version="1" comment="libgs-devel is &lt;9.54.0-19.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984056" version="1" comment="libsoup is &lt;2.72.0-10.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984057" version="1" comment="libsoup-devel is &lt;2.72.0-10.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983974" version="1" comment="firefox is &lt;128.10.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983975" version="1" comment="firefox-x11 is &lt;128.10.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977556" version="1" comment="thunderbird is &lt;128.10.0-1.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984017" version="1" comment="thunderbird is &lt;128.10.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985378" version="1" comment="grafana is &lt;10.2.6-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985379" version="1" comment="grafana-selinux is &lt;10.2.6-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974192" version="1" comment="firefox is &lt;128.9.0-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974193" version="1" comment="firefox-x11 is &lt;128.9.0-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976400" version="1" comment="thunderbird is &lt;128.9.0-2.el9_5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986654" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986666" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986655" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986667" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986656" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986668" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986657" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986669" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986670" version="1" comment="dotnet-host is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986658" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986671" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986659" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986672" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986660" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986673" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986661" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.117-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986662" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.117-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986674" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986675" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986676" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986663" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.117-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986677" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986664" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.17-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986678" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986665" version="1" comment="dotnet-templates-8.0 is &lt;8.0.117-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986679" version="1" comment="dotnet-templates-9.0 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986680" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.107-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985337" version="1" comment="corosync is &lt;3.1.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985338" version="1" comment="corosync-vqsim is &lt;3.1.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985339" version="1" comment="corosynclib is &lt;3.1.9-2.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985340" version="1" comment="corosynclib-devel is &lt;3.1.9-2.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008294" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008295" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008296" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008297" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.462.b08-2.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008298" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008299" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008300" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008301" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008302" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008303" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008304" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008305" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008306" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008307" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008308" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.462.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008309" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.462.b08-3.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008310" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008311" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008312" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008313" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.462.b08-3.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011414" version="1" comment="java-11-openjdk is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011166" version="1" comment="java-11-openjdk-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011415" version="1" comment="java-11-openjdk-demo is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011168" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011169" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011170" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011416" version="1" comment="java-11-openjdk-devel is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011172" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011173" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011174" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011175" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011417" version="1" comment="java-11-openjdk-headless is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011177" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011178" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011179" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011418" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011181" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011419" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011183" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011420" version="1" comment="java-11-openjdk-jmods is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011185" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011186" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011187" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011188" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011421" version="1" comment="java-11-openjdk-src is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011190" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011191" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011192" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011422" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011194" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.28.0.6-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011195" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011196" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.28.0.6-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007998" version="1" comment="java-17-openjdk is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007999" version="1" comment="java-17-openjdk-demo is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008000" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008001" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008002" version="1" comment="java-17-openjdk-devel is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008003" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008004" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008005" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008006" version="1" comment="java-17-openjdk-headless is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008007" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008008" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008009" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008010" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008011" version="1" comment="java-17-openjdk-jmods is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008012" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008013" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008014" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008015" version="1" comment="java-17-openjdk-src is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008016" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008017" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008018" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008019" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008020" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.16.0.8-2.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022816" version="1" comment="java-21-openjdk is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022817" version="1" comment="java-21-openjdk-demo is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022818" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022819" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022820" version="1" comment="java-21-openjdk-devel is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022821" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022822" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022823" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022824" version="1" comment="java-21-openjdk-headless is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022825" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022826" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022827" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022828" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022829" version="1" comment="java-21-openjdk-jmods is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022830" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022831" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022832" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022833" version="1" comment="java-21-openjdk-src is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022834" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022835" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022836" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022837" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022838" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.8.0.9-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054130" version="1" comment="runc is &lt;1.3.0-4.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985470" version="1" comment="webkit2gtk3 is &lt;2.48.2-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985471" version="1" comment="webkit2gtk3-devel is &lt;2.48.2-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985472" version="1" comment="webkit2gtk3-jsc is &lt;2.48.2-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985473" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.2-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022618" version="1" comment="webkit2gtk3 is &lt;2.50.1-0.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022619" version="1" comment="webkit2gtk3-devel is &lt;2.50.1-0.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022620" version="1" comment="webkit2gtk3-jsc is &lt;2.50.1-0.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022621" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.1-0.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013938" version="1" comment="webkit2gtk3 is &lt;2.48.5-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013939" version="1" comment="webkit2gtk3-devel is &lt;2.48.5-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013940" version="1" comment="webkit2gtk3-jsc is &lt;2.48.5-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013941" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.48.5-1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983963" version="1" comment="mod_auth_openidc is &lt;2.4.10-1.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984007" version="1" comment="nodejs is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984008" version="1" comment="nodejs-devel is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984009" version="1" comment="nodejs-docs is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984010" version="1" comment="nodejs-full-i18n is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984011" version="1" comment="nodejs-libs is &lt;22.15.0-1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984012" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.6.0+23062+9e7801b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984013" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.6.0+23062+9e7801b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984014" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.6.0+23062+9e7801b9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984015" version="1" comment="npm is &lt;10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984016" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.15.0.1.module+el9.6.0+23062+9e7801b9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983979" version="1" comment="yelp is &lt;40.3-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983980" version="1" comment="yelp-devel is &lt;40.3-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983981" version="1" comment="yelp-libs is &lt;40.3-2.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013277" version="1" comment="qt5-qt3d is &lt;5.15.9-2.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013278" version="1" comment="qt5-qt3d-devel is &lt;5.15.9-2.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013279" version="1" comment="qt5-qt3d-examples is &lt;5.15.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054368" version="1" comment="tomcat is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054369" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054370" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054371" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054372" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054373" version="1" comment="tomcat-lib is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054374" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054375" version="1" comment="tomcat-webapps is &lt;9.0.87-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984018" version="1" comment="libsoup is &lt;2.72.0-10.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009984019" version="1" comment="libsoup-devel is &lt;2.72.0-10.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054548" version="1" comment="poppler is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054549" version="1" comment="poppler-cpp is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054550" version="1" comment="poppler-cpp-devel is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054551" version="1" comment="poppler-devel is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054552" version="1" comment="poppler-glib is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054553" version="1" comment="poppler-glib-devel is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054554" version="1" comment="poppler-glib-doc is &lt;21.01.0-23.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054555" version="1" comment="poppler-qt5 is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054556" version="1" comment="poppler-qt5-devel is &lt;21.01.0-23.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054557" version="1" comment="poppler-utils is &lt;21.01.0-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013159" version="1" comment="libxml2 is &lt;2.9.13-12.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013160" version="1" comment="libxml2-devel is &lt;2.9.13-12.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013161" version="1" comment="python3-libxml2 is &lt;2.9.13-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997968" version="1" comment="sudo is &lt;1.9.5p2-10.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997969" version="1" comment="sudo-python-plugin is &lt;1.9.5p2-10.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018662" version="1" comment="gnutls is &lt;3.8.3-6.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018663" version="1" comment="gnutls-c++ is &lt;3.8.3-6.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018664" version="1" comment="gnutls-dane is &lt;3.8.3-6.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018665" version="1" comment="gnutls-devel is &lt;3.8.3-6.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018666" version="1" comment="gnutls-utils is &lt;3.8.3-6.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996924" version="1" comment="krb5-devel is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996925" version="1" comment="krb5-libs is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996926" version="1" comment="krb5-pkinit is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996927" version="1" comment="krb5-server is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996928" version="1" comment="krb5-server-ldap is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996929" version="1" comment="krb5-workstation is &lt;1.21.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996930" version="1" comment="libkadm5 is &lt;1.21.1-8.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012364" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014750" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014751" version="1" comment="kernel-default is &lt;6.4.0-150700.53.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055077" version="1" comment="kernel is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055078" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.30.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055079" version="1" comment="kernel-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055080" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055081" version="1" comment="kernel-debug is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055082" version="1" comment="kernel-debug-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055083" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055084" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055085" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055086" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055087" version="1" comment="kernel-doc is &lt;5.14.0-611.30.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055088" version="1" comment="kernel-headers is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055089" version="1" comment="kernel-modules is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055090" version="1" comment="kernel-modules-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055091" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055092" version="1" comment="kernel-rt is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055093" version="1" comment="kernel-rt-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055094" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055095" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055096" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055097" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055098" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055099" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055100" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055101" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055102" version="1" comment="kernel-tools is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055103" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055104" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055105" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055106" version="1" comment="libperf is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055107" version="1" comment="perf is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055108" version="1" comment="python3-perf is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055109" version="1" comment="rtla is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055110" version="1" comment="rv is &lt;5.14.0-611.30.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012380" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011989" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017422" version="1" comment="kernel is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017423" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.41.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017424" version="1" comment="kernel-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017425" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017426" version="1" comment="kernel-debug is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017427" version="1" comment="kernel-debug-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017430" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017431" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017432" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017433" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017436" version="1" comment="kernel-doc is &lt;5.14.0-570.41.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017437" version="1" comment="kernel-headers is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017438" version="1" comment="kernel-modules is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017439" version="1" comment="kernel-modules-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017440" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017441" version="1" comment="kernel-rt is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017442" version="1" comment="kernel-rt-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017443" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017444" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017446" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017447" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017448" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017449" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017451" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017452" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017453" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017454" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017455" version="1" comment="kernel-tools is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017456" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017458" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017459" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017460" version="1" comment="libperf is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017461" version="1" comment="perf is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017462" version="1" comment="python3-perf is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017463" version="1" comment="rtla is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017464" version="1" comment="rv is &lt;5.14.0-570.41.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017120" version="1" comment="kernel is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017121" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.39.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017122" version="1" comment="kernel-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017123" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017124" version="1" comment="kernel-debug is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017125" version="1" comment="kernel-debug-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017128" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017129" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017130" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017131" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017134" version="1" comment="kernel-doc is &lt;5.14.0-570.39.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017135" version="1" comment="kernel-headers is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017136" version="1" comment="kernel-modules is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017137" version="1" comment="kernel-modules-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017138" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017139" version="1" comment="kernel-rt is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017140" version="1" comment="kernel-rt-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017141" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017142" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017144" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017145" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017146" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017147" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017149" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017150" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017151" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017152" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017153" version="1" comment="kernel-tools is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017154" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017156" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017157" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017158" version="1" comment="libperf is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017159" version="1" comment="perf is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017160" version="1" comment="python3-perf is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017161" version="1" comment="rtla is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017162" version="1" comment="rv is &lt;5.14.0-570.39.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017414" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017678" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017233" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=3-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017415" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017416" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017417" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018029" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017981" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018030" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014215" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014267" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014518" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014268" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014269" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014217" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014218" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014219" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014220" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014221" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014520" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014522" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014523" version="1" comment="kernel-default is &lt;4.12.14-122.266.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014673" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014753" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014524" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014525" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014526" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014527" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014528" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014529" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014530" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014531" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014532" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014533" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014534" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014535" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014536" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014537" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014538" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014755" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014539" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014540" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014674" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014675" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014676" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013382" version="1" comment="kernel is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013383" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.33.2.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013384" version="1" comment="kernel-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013385" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013386" version="1" comment="kernel-debug is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013387" version="1" comment="kernel-debug-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013390" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013391" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013392" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013393" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013396" version="1" comment="kernel-doc is &lt;5.14.0-570.33.2.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013397" version="1" comment="kernel-headers is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013398" version="1" comment="kernel-modules is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013399" version="1" comment="kernel-modules-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013400" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013401" version="1" comment="kernel-rt is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013402" version="1" comment="kernel-rt-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013403" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013404" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013406" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013407" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013408" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013409" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013411" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013412" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013413" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013414" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013415" version="1" comment="kernel-tools is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013416" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013418" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013419" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013420" version="1" comment="libperf is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013421" version="1" comment="perf is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013422" version="1" comment="python3-perf is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013423" version="1" comment="rtla is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013424" version="1" comment="rv is &lt;5.14.0-570.33.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014756" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020716" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020717" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020718" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019749" version="1" comment="kernel-default is &lt;6.4.0-150600.23.53.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020207" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=5-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020719" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055600" version="1" comment="kernel is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055601" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.38.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055602" version="1" comment="kernel-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055603" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055604" version="1" comment="kernel-debug is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055605" version="1" comment="kernel-debug-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055606" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055607" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055608" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055609" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055610" version="1" comment="kernel-doc is &lt;5.14.0-611.38.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055611" version="1" comment="kernel-headers is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055612" version="1" comment="kernel-modules is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055613" version="1" comment="kernel-modules-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055614" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055615" version="1" comment="kernel-rt is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055616" version="1" comment="kernel-rt-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055617" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055618" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055619" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055620" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055621" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055622" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055623" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055624" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055625" version="1" comment="kernel-tools is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055626" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055627" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055628" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055629" version="1" comment="libperf is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055630" version="1" comment="perf is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055631" version="1" comment="python3-perf is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055632" version="1" comment="rtla is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055633" version="1" comment="rv is &lt;5.14.0-611.38.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019746" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019717" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019718" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019747" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019748" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018809" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=4-150700.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019750" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=4-150700.3.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019751" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055917" version="1" comment="kernel is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055918" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.47.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055919" version="1" comment="kernel-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055920" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055921" version="1" comment="kernel-debug is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055922" version="1" comment="kernel-debug-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055923" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055924" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055925" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055926" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055927" version="1" comment="kernel-doc is &lt;5.14.0-611.47.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055928" version="1" comment="kernel-headers is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055929" version="1" comment="kernel-modules is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055930" version="1" comment="kernel-modules-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055931" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055932" version="1" comment="kernel-rt is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055933" version="1" comment="kernel-rt-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055934" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055935" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055936" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055937" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055938" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055939" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055940" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055941" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055942" version="1" comment="kernel-tools is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055943" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055944" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055945" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055946" version="1" comment="libperf is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055947" version="1" comment="perf is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055948" version="1" comment="python3-perf is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055949" version="1" comment="rtla is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055950" version="1" comment="rv is &lt;5.14.0-611.47.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023030" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023031" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023032" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022250" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=6-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023340" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043987" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044018" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043988" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044019" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043989" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044020" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043649" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=10-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044021" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=10-150700.3.27.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044022" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=10-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046340" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046341" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046294" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046342" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046343" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045281" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=11-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046344" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=11-150700.3.30.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046345" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=11-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055444" version="1" comment="kernel is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055445" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.35.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055446" version="1" comment="kernel-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055447" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055448" version="1" comment="kernel-debug is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055449" version="1" comment="kernel-debug-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055450" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055451" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055452" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055453" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055454" version="1" comment="kernel-doc is &lt;5.14.0-611.35.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055455" version="1" comment="kernel-headers is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055456" version="1" comment="kernel-modules is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055457" version="1" comment="kernel-modules-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055458" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055459" version="1" comment="kernel-rt is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055460" version="1" comment="kernel-rt-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055461" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055462" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055463" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055464" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055465" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055466" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055467" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055468" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055469" version="1" comment="kernel-tools is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055470" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055471" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055472" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055473" version="1" comment="libperf is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055474" version="1" comment="perf is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055475" version="1" comment="python3-perf is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055476" version="1" comment="rtla is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055477" version="1" comment="rv is &lt;5.14.0-611.35.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054786" version="1" comment="kernel is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054787" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.26.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054788" version="1" comment="kernel-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054789" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054790" version="1" comment="kernel-debug is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054791" version="1" comment="kernel-debug-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054792" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054793" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054794" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054795" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054796" version="1" comment="kernel-doc is &lt;5.14.0-611.26.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054797" version="1" comment="kernel-headers is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054798" version="1" comment="kernel-modules is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054799" version="1" comment="kernel-modules-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054800" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054801" version="1" comment="kernel-rt is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054802" version="1" comment="kernel-rt-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054803" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054804" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054805" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054806" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054807" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054808" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054809" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054810" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054811" version="1" comment="kernel-tools is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054812" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054813" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054814" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054815" version="1" comment="libperf is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054816" version="1" comment="perf is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054817" version="1" comment="python3-perf is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054818" version="1" comment="rtla is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054819" version="1" comment="rv is &lt;5.14.0-611.26.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050992" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=15-150600.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050993" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050994" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051499" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049627" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=12-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051500" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=12-150700.3.33.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050995" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=12-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019244" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019245" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019246" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019247" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019248" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019249" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019250" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019408" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019409" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019460" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019410" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019752" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019753" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019461" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019462" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019754" version="1" comment="kernel-default is &lt;6.4.0-150600.23.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055839" version="1" comment="kernel is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055840" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.45.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055841" version="1" comment="kernel-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055842" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055843" version="1" comment="kernel-debug is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055844" version="1" comment="kernel-debug-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055845" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055846" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055847" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055848" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055849" version="1" comment="kernel-doc is &lt;5.14.0-611.45.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055850" version="1" comment="kernel-headers is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055851" version="1" comment="kernel-modules is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055852" version="1" comment="kernel-modules-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055853" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055854" version="1" comment="kernel-rt is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055855" version="1" comment="kernel-rt-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055856" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055857" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055858" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055859" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055860" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055861" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055862" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055863" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055864" version="1" comment="kernel-tools is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055865" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055866" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055867" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055868" version="1" comment="libperf is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055869" version="1" comment="perf is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055870" version="1" comment="python3-perf is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055871" version="1" comment="rtla is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055872" version="1" comment="rv is &lt;5.14.0-611.45.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019251" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019411" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019463" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019464" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019720" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023033" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019759" version="1" comment="kernel-default is &lt;6.4.0-150600.23.60.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023341" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017418" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017419" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017679" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017982" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018031" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017875" version="1" comment="kernel is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017876" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.42.2.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017877" version="1" comment="kernel-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017878" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017879" version="1" comment="kernel-debug is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017880" version="1" comment="kernel-debug-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017883" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017884" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017885" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017886" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017889" version="1" comment="kernel-doc is &lt;5.14.0-570.42.2.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017890" version="1" comment="kernel-headers is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017891" version="1" comment="kernel-modules is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017892" version="1" comment="kernel-modules-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017893" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017894" version="1" comment="kernel-rt is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017895" version="1" comment="kernel-rt-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017896" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017897" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017899" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017900" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017901" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017902" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017904" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017905" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017906" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017907" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017908" version="1" comment="kernel-tools is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017909" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017911" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017912" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017913" version="1" comment="libperf is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017914" version="1" comment="perf is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017915" version="1" comment="python3-perf is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017916" version="1" comment="rtla is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017917" version="1" comment="rv is &lt;5.14.0-570.42.2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054182" version="1" comment="kernel is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054183" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.8.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054184" version="1" comment="kernel-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054185" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054186" version="1" comment="kernel-debug is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054187" version="1" comment="kernel-debug-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054188" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054189" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054190" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054191" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054192" version="1" comment="kernel-doc is &lt;5.14.0-611.8.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054193" version="1" comment="kernel-headers is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054194" version="1" comment="kernel-modules is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054195" version="1" comment="kernel-modules-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054196" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054197" version="1" comment="kernel-rt is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054198" version="1" comment="kernel-rt-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054199" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054200" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054201" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054202" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054203" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054204" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054205" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054206" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054207" version="1" comment="kernel-tools is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054208" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054209" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054210" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054211" version="1" comment="libperf is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054212" version="1" comment="perf is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054213" version="1" comment="python3-perf is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054214" version="1" comment="rtla is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054215" version="1" comment="rv is &lt;5.14.0-611.8.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019467" version="1" comment="kernel-default is &lt;4.12.14-122.269.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043990" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044023" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=10-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024448" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=7-150700.5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025537" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=7-150700.3.18.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025167" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025111" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=7-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019798" version="1" comment="kernel is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019799" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.49.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019800" version="1" comment="kernel-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019801" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019802" version="1" comment="kernel-debug is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019803" version="1" comment="kernel-debug-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019806" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019807" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019808" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019809" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019812" version="1" comment="kernel-doc is &lt;5.14.0-570.49.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019813" version="1" comment="kernel-headers is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019814" version="1" comment="kernel-modules is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019815" version="1" comment="kernel-modules-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019816" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019817" version="1" comment="kernel-rt is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019818" version="1" comment="kernel-rt-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019819" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019820" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019822" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019823" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019824" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019825" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019827" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019828" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019829" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019830" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019831" version="1" comment="kernel-tools is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019832" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019834" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019835" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019836" version="1" comment="libperf is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019837" version="1" comment="perf is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019838" version="1" comment="python3-perf is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019839" version="1" comment="rtla is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019840" version="1" comment="rv is &lt;5.14.0-570.49.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020311" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020208" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020744" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020745" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020746" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020682" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020683" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020720" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020684" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020685" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020721" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020722" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050996" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050997" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050998" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023350" version="1" comment="kernel-default is &lt;6.4.0-150600.23.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051501" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051502" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051503" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=11-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014543" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014545" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014758" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019466" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019756" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019722" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019758" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019760" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022815" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023343" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023344" version="1" comment="kernel-default is &lt;6.4.0-150600.23.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023035" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054429" version="1" comment="kernel is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054430" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.16.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054431" version="1" comment="kernel-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054432" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054433" version="1" comment="kernel-debug is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054434" version="1" comment="kernel-debug-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054435" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054436" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054437" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054438" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054439" version="1" comment="kernel-doc is &lt;5.14.0-611.16.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054440" version="1" comment="kernel-headers is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054441" version="1" comment="kernel-modules is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054442" version="1" comment="kernel-modules-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054443" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054444" version="1" comment="kernel-rt is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054445" version="1" comment="kernel-rt-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054446" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054447" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054448" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054449" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054450" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054451" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054452" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054453" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054454" version="1" comment="kernel-tools is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054455" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054456" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054457" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054458" version="1" comment="libperf is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054459" version="1" comment="perf is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054460" version="1" comment="python3-perf is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054461" version="1" comment="rtla is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054462" version="1" comment="rv is &lt;5.14.0-611.16.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031658" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031477" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031478" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031479" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031907" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031908" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031909" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018240" version="1" comment="kernel is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018241" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.44.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018242" version="1" comment="kernel-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018243" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018244" version="1" comment="kernel-debug is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018245" version="1" comment="kernel-debug-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018248" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018249" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018250" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018251" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018254" version="1" comment="kernel-doc is &lt;5.14.0-570.44.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018255" version="1" comment="kernel-headers is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018256" version="1" comment="kernel-modules is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018257" version="1" comment="kernel-modules-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018258" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018259" version="1" comment="kernel-rt is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018260" version="1" comment="kernel-rt-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018261" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018262" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018264" version="1" comment="kernel-rt-debug-kvm is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018265" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018266" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018267" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018269" version="1" comment="kernel-rt-kvm is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018270" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018271" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018272" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018273" version="1" comment="kernel-tools is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018274" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018276" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018277" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018278" version="1" comment="libperf is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018279" version="1" comment="perf is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018280" version="1" comment="python3-perf is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018281" version="1" comment="rtla is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018282" version="1" comment="rv is &lt;5.14.0-570.44.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054961" version="1" comment="kernel is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054962" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.27.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054963" version="1" comment="kernel-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054964" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054965" version="1" comment="kernel-debug is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054966" version="1" comment="kernel-debug-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054967" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054968" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054969" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054970" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054971" version="1" comment="kernel-doc is &lt;5.14.0-611.27.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054972" version="1" comment="kernel-headers is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054973" version="1" comment="kernel-modules is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054974" version="1" comment="kernel-modules-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054975" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054976" version="1" comment="kernel-rt is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054977" version="1" comment="kernel-rt-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054978" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054979" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054980" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054981" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054982" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054983" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054984" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054985" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054986" version="1" comment="kernel-tools is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054987" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054988" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054989" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054990" version="1" comment="libperf is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054991" version="1" comment="perf is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054992" version="1" comment="python3-perf is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054993" version="1" comment="rtla is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054994" version="1" comment="rv is &lt;5.14.0-611.27.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031659" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031910" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024670" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=10-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024671" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024672" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=9-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024673" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024674" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=8-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024675" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=7-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025538" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=3-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025112" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=3-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024676" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025113" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=3-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023346" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023038" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023349" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023040" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054707" version="1" comment="kernel is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054708" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.24.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054709" version="1" comment="kernel-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054710" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054711" version="1" comment="kernel-debug is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054712" version="1" comment="kernel-debug-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054713" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054714" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054715" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054716" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054717" version="1" comment="kernel-doc is &lt;5.14.0-611.24.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054718" version="1" comment="kernel-headers is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054719" version="1" comment="kernel-modules is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054720" version="1" comment="kernel-modules-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054721" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054722" version="1" comment="kernel-rt is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054723" version="1" comment="kernel-rt-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054724" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054725" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054726" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054727" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054728" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054729" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054730" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054731" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054732" version="1" comment="kernel-tools is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054733" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054734" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054735" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054736" version="1" comment="libperf is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054737" version="1" comment="perf is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054738" version="1" comment="python3-perf is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054739" version="1" comment="rtla is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054740" version="1" comment="rv is &lt;5.14.0-611.24.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054281" version="1" comment="kernel is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054282" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.11.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054283" version="1" comment="kernel-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054284" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054285" version="1" comment="kernel-debug is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054286" version="1" comment="kernel-debug-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054287" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054288" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054289" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054290" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054291" version="1" comment="kernel-doc is &lt;5.14.0-611.11.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054292" version="1" comment="kernel-headers is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054293" version="1" comment="kernel-modules is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054294" version="1" comment="kernel-modules-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054295" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054296" version="1" comment="kernel-rt is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054297" version="1" comment="kernel-rt-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054298" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054299" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054300" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054301" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054302" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054303" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054304" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054305" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054306" version="1" comment="kernel-tools is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054307" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054308" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054309" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054310" version="1" comment="libperf is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054311" version="1" comment="perf is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054312" version="1" comment="python3-perf is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054313" version="1" comment="rtla is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054314" version="1" comment="rv is &lt;5.14.0-611.11.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985485" version="1" comment="thunderbird is &lt;128.10.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985477" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.12-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985478" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.12-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985479" version="1" comment="gstreamer1-plugins-bad-free-libs is &lt;1.22.12-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996923" version="1" comment="mod_auth_openidc is &lt;2.4.10-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043991" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043992" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044024" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044025" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054600" version="1" comment="kernel is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054601" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.20.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054602" version="1" comment="kernel-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054603" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054604" version="1" comment="kernel-debug is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054605" version="1" comment="kernel-debug-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054606" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054607" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054608" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054609" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054610" version="1" comment="kernel-doc is &lt;5.14.0-611.20.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054611" version="1" comment="kernel-headers is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054612" version="1" comment="kernel-modules is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054613" version="1" comment="kernel-modules-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054614" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054615" version="1" comment="kernel-rt is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054616" version="1" comment="kernel-rt-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054617" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054618" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054619" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054620" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054621" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054622" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054623" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054624" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054625" version="1" comment="kernel-tools is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054626" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054627" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054628" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054629" version="1" comment="libperf is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054630" version="1" comment="perf is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054631" version="1" comment="python3-perf is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054632" version="1" comment="rtla is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054633" version="1" comment="rv is &lt;5.14.0-611.20.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055731" version="1" comment="kernel is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055732" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.41.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055733" version="1" comment="kernel-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055734" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055735" version="1" comment="kernel-debug is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055736" version="1" comment="kernel-debug-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055737" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055738" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055739" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055740" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055741" version="1" comment="kernel-doc is &lt;5.14.0-611.41.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055742" version="1" comment="kernel-headers is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055743" version="1" comment="kernel-modules is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055744" version="1" comment="kernel-modules-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055745" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055746" version="1" comment="kernel-rt is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055747" version="1" comment="kernel-rt-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055748" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055749" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055750" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055751" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055752" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055753" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055754" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055755" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055756" version="1" comment="kernel-tools is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055757" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055758" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055759" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055760" version="1" comment="libperf is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055761" version="1" comment="perf is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055762" version="1" comment="python3-perf is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055763" version="1" comment="rtla is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055764" version="1" comment="rv is &lt;5.14.0-611.41.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054234" version="1" comment="kernel is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054235" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.9.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054236" version="1" comment="kernel-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054237" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054238" version="1" comment="kernel-debug is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054239" version="1" comment="kernel-debug-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054240" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054241" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054242" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054243" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054244" version="1" comment="kernel-doc is &lt;5.14.0-611.9.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054245" version="1" comment="kernel-headers is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054246" version="1" comment="kernel-modules is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054247" version="1" comment="kernel-modules-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054248" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054249" version="1" comment="kernel-rt is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054250" version="1" comment="kernel-rt-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054251" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054252" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054253" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054254" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054255" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054256" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054257" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054258" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054259" version="1" comment="kernel-tools is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054260" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054261" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054262" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054263" version="1" comment="libperf is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054264" version="1" comment="perf is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054265" version="1" comment="python3-perf is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054266" version="1" comment="rtla is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054267" version="1" comment="rv is &lt;5.14.0-611.9.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054332" version="1" comment="kernel is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054333" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.13.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054334" version="1" comment="kernel-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054335" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054336" version="1" comment="kernel-debug is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054337" version="1" comment="kernel-debug-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054338" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054339" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054340" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054341" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054342" version="1" comment="kernel-doc is &lt;5.14.0-611.13.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054343" version="1" comment="kernel-headers is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054344" version="1" comment="kernel-modules is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054345" version="1" comment="kernel-modules-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054346" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054347" version="1" comment="kernel-rt is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054348" version="1" comment="kernel-rt-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054349" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054350" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054351" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054352" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054353" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054354" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054355" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054356" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054357" version="1" comment="kernel-tools is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054358" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054359" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054360" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054361" version="1" comment="libperf is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054362" version="1" comment="perf is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054363" version="1" comment="python3-perf is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054364" version="1" comment="rtla is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054365" version="1" comment="rv is &lt;5.14.0-611.13.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056187" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056188" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056189" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053078" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056190" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056289" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053244" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053079" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053245" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056191" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053498" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053499" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053500" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053501" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053080" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053081" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053246" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053502" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053247" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053248" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053249" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056290" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056192" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053083" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053084" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052765" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=13-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056291" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=13-150700.3.36.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056193" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053503" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056194" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056195" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=13-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056196" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=12-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044026" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044027" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044028" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044029" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051000" version="1" comment="kernel-default is ==6.4.0-150600.23.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053504" version="1" comment="kernel-livepatch-6_4_0-150600_23_78-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051005" version="1" comment="kernel-default is &lt;6.4.0-150600.23.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051505" version="1" comment="kernel-default is ==6.4.0-150700.53.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053505" version="1" comment="kernel-livepatch-6_4_0-150700_53_22-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055511" version="1" comment="kernel is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055512" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-611.36.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055513" version="1" comment="kernel-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055514" version="1" comment="kernel-cross-headers is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055515" version="1" comment="kernel-debug is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055516" version="1" comment="kernel-debug-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055517" version="1" comment="kernel-debug-modules is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055518" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055519" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055520" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055521" version="1" comment="kernel-doc is &lt;5.14.0-611.36.1.el9_7 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055522" version="1" comment="kernel-headers is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055523" version="1" comment="kernel-modules is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055524" version="1" comment="kernel-modules-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055525" version="1" comment="kernel-modules-extra is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055526" version="1" comment="kernel-rt is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055527" version="1" comment="kernel-rt-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055528" version="1" comment="kernel-rt-debug is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055529" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055530" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055531" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055532" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055533" version="1" comment="kernel-rt-modules is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055534" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055535" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055536" version="1" comment="kernel-tools is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055537" version="1" comment="kernel-tools-libs is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055538" version="1" comment="kernel-uki-virt is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055539" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055540" version="1" comment="libperf is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055541" version="1" comment="perf is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055542" version="1" comment="python3-perf is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055543" version="1" comment="rtla is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055544" version="1" comment="rv is &lt;5.14.0-611.36.1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043870" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050999" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051001" version="1" comment="kernel-livepatch-6_4_0-150600_23_78-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051002" version="1" comment="kernel-default is ==6.4.0-150600.23.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051003" version="1" comment="kernel-livepatch-6_4_0-150600_23_81-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051004" version="1" comment="kernel-default is &lt;6.4.0-150600.23.81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051504" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051506" version="1" comment="kernel-livepatch-6_4_0-150700_53_22-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051507" version="1" comment="kernel-default is ==6.4.0-150700.53.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051508" version="1" comment="kernel-livepatch-6_4_0-150700_53_25-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025606" version="1" comment="kernel is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025607" version="1" comment="kernel-abi-stablelists is &lt;5.14.0-570.62.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025608" version="1" comment="kernel-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025609" version="1" comment="kernel-cross-headers is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025610" version="1" comment="kernel-debug is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025611" version="1" comment="kernel-debug-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025614" version="1" comment="kernel-debug-modules is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025615" version="1" comment="kernel-debug-modules-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025616" version="1" comment="kernel-debug-modules-extra is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025617" version="1" comment="kernel-debug-uki-virt is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025620" version="1" comment="kernel-doc is &lt;5.14.0-570.62.1.el9_6 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025621" version="1" comment="kernel-headers is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025622" version="1" comment="kernel-modules is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025623" version="1" comment="kernel-modules-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025624" version="1" comment="kernel-modules-extra is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025625" version="1" comment="kernel-rt is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025626" version="1" comment="kernel-rt-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025627" version="1" comment="kernel-rt-debug is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025628" version="1" comment="kernel-rt-debug-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025631" version="1" comment="kernel-rt-debug-modules is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025632" version="1" comment="kernel-rt-debug-modules-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025633" version="1" comment="kernel-rt-debug-modules-extra is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025636" version="1" comment="kernel-rt-modules is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025637" version="1" comment="kernel-rt-modules-core is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025638" version="1" comment="kernel-rt-modules-extra is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025639" version="1" comment="kernel-tools is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025640" version="1" comment="kernel-tools-libs is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025642" version="1" comment="kernel-uki-virt is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025643" version="1" comment="kernel-uki-virt-addons is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025644" version="1" comment="libperf is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025645" version="1" comment="perf is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025646" version="1" comment="python3-perf is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025647" version="1" comment="rtla is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025648" version="1" comment="rv is &lt;5.14.0-570.62.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054155" version="1" comment="bind is &lt;9.16.23-34.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054156" version="1" comment="bind-chroot is &lt;9.16.23-34.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054157" version="1" comment="bind-devel is &lt;9.16.23-34.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054158" version="1" comment="bind-dnssec-doc is &lt;9.16.23-34.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054159" version="1" comment="bind-dnssec-utils is &lt;9.16.23-34.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054160" version="1" comment="bind-doc is &lt;9.16.23-34.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054161" version="1" comment="bind-libs is &lt;9.16.23-34.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054162" version="1" comment="bind-license is &lt;9.16.23-34.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054163" version="1" comment="bind-utils is &lt;9.16.23-34.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054165" version="1" comment="bind9.18 is &lt;9.18.29-5.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054166" version="1" comment="bind9.18-chroot is &lt;9.18.29-5.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054167" version="1" comment="bind9.18-devel is &lt;9.18.29-5.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054168" version="1" comment="bind9.18-dnssec-utils is &lt;9.18.29-5.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054169" version="1" comment="bind9.18-doc is &lt;9.18.29-5.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054170" version="1" comment="bind9.18-libs is &lt;9.18.29-5.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054171" version="1" comment="bind9.18-utils is &lt;9.18.29-5.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054164" version="1" comment="python3-bind is &lt;9.16.23-34.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986193" version="1" comment="perl-FCGI is &lt;0.79-8.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996922" version="1" comment="perl-YAML-LibYAML is &lt;0.82-6.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011265" version="1" comment="perl is &lt;5.32.1-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011266" version="1" comment="perl-Attribute-Handlers is &lt;1.01-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011267" version="1" comment="perl-AutoLoader is &lt;5.74-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011268" version="1" comment="perl-AutoSplit is &lt;5.74-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011269" version="1" comment="perl-B is &lt;1.80-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011270" version="1" comment="perl-Benchmark is &lt;1.23-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011271" version="1" comment="perl-Class-Struct is &lt;0.66-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011272" version="1" comment="perl-Config-Extensions is &lt;0.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011273" version="1" comment="perl-DBM_Filter is &lt;0.06-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011274" version="1" comment="perl-Devel-Peek is &lt;1.28-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011275" version="1" comment="perl-Devel-SelfStubber is &lt;1.06-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011276" version="1" comment="perl-DirHandle is &lt;1.05-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011277" version="1" comment="perl-Dumpvalue is &lt;2.27-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011278" version="1" comment="perl-DynaLoader is &lt;1.47-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011279" version="1" comment="perl-English is &lt;1.11-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011280" version="1" comment="perl-Errno is &lt;1.30-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011281" version="1" comment="perl-ExtUtils-Constant is &lt;0.25-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011282" version="1" comment="perl-ExtUtils-Embed is &lt;1.35-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011283" version="1" comment="perl-ExtUtils-Miniperl is &lt;1.09-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011284" version="1" comment="perl-Fcntl is &lt;1.13-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011285" version="1" comment="perl-File-Basename is &lt;2.85-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011286" version="1" comment="perl-File-Compare is &lt;1.100.600-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011287" version="1" comment="perl-File-Copy is &lt;2.34-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011288" version="1" comment="perl-File-DosGlob is &lt;1.12-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011289" version="1" comment="perl-File-Find is &lt;1.37-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011290" version="1" comment="perl-File-stat is &lt;1.09-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011291" version="1" comment="perl-FileCache is &lt;1.10-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011292" version="1" comment="perl-FileHandle is &lt;2.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011293" version="1" comment="perl-FindBin is &lt;1.51-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011294" version="1" comment="perl-GDBM_File is &lt;1.18-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011295" version="1" comment="perl-Getopt-Std is &lt;1.12-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011296" version="1" comment="perl-Hash-Util is &lt;0.23-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011297" version="1" comment="perl-Hash-Util-FieldHash is &lt;1.20-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011298" version="1" comment="perl-I18N-Collate is &lt;1.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011299" version="1" comment="perl-I18N-LangTags is &lt;0.44-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011300" version="1" comment="perl-I18N-Langinfo is &lt;0.19-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011301" version="1" comment="perl-IO is &lt;1.43-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011302" version="1" comment="perl-IPC-Open3 is &lt;1.21-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011303" version="1" comment="perl-Locale-Maketext-Simple is &lt;0.21-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011304" version="1" comment="perl-Math-Complex is &lt;1.59-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011305" version="1" comment="perl-Memoize is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011306" version="1" comment="perl-Module-Loaded is &lt;0.08-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011307" version="1" comment="perl-NDBM_File is &lt;1.15-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011308" version="1" comment="perl-NEXT is &lt;0.67-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011309" version="1" comment="perl-Net is &lt;1.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011310" version="1" comment="perl-ODBM_File is &lt;1.16-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011311" version="1" comment="perl-Opcode is &lt;1.48-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011312" version="1" comment="perl-POSIX is &lt;1.94-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011313" version="1" comment="perl-Pod-Functions is &lt;1.13-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011314" version="1" comment="perl-Pod-Html is &lt;1.25-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011315" version="1" comment="perl-Safe is &lt;2.41-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011316" version="1" comment="perl-Search-Dict is &lt;1.07-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011317" version="1" comment="perl-SelectSaver is &lt;1.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011318" version="1" comment="perl-SelfLoader is &lt;1.26-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011319" version="1" comment="perl-Symbol is &lt;1.08-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011320" version="1" comment="perl-Sys-Hostname is &lt;1.23-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011321" version="1" comment="perl-Term-Complete is &lt;1.403-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011322" version="1" comment="perl-Term-ReadLine is &lt;1.17-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011323" version="1" comment="perl-Test is &lt;1.31-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011324" version="1" comment="perl-Text-Abbrev is &lt;1.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011325" version="1" comment="perl-Thread is &lt;3.05-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011326" version="1" comment="perl-Thread-Semaphore is &lt;2.13-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011327" version="1" comment="perl-Tie is &lt;4.6-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011328" version="1" comment="perl-Tie-File is &lt;1.06-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011329" version="1" comment="perl-Tie-Memoize is &lt;1.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011330" version="1" comment="perl-Time is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011331" version="1" comment="perl-Time-Piece is &lt;1.3401-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011332" version="1" comment="perl-Unicode-UCD is &lt;0.75-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011333" version="1" comment="perl-User-pwent is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011334" version="1" comment="perl-autouse is &lt;1.11-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011335" version="1" comment="perl-base is &lt;2.27-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011336" version="1" comment="perl-blib is &lt;1.07-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011337" version="1" comment="perl-debugger is &lt;1.56-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011338" version="1" comment="perl-deprecate is &lt;0.04-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011339" version="1" comment="perl-devel is &lt;5.32.1-481.1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011340" version="1" comment="perl-diagnostics is &lt;1.37-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011341" version="1" comment="perl-doc is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011342" version="1" comment="perl-encoding-warnings is &lt;0.13-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011343" version="1" comment="perl-fields is &lt;2.27-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011344" version="1" comment="perl-filetest is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011345" version="1" comment="perl-if is &lt;0.60.800-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011346" version="1" comment="perl-interpreter is &lt;5.32.1-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011347" version="1" comment="perl-less is &lt;0.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011348" version="1" comment="perl-lib is &lt;0.65-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011349" version="1" comment="perl-libnetcfg is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011350" version="1" comment="perl-libs is &lt;5.32.1-481.1.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011351" version="1" comment="perl-locale is &lt;1.09-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011352" version="1" comment="perl-macros is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011353" version="1" comment="perl-meta-notation is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011354" version="1" comment="perl-mro is &lt;1.23-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011355" version="1" comment="perl-open is &lt;1.12-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011356" version="1" comment="perl-overload is &lt;1.31-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011357" version="1" comment="perl-overloading is &lt;0.02-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011358" version="1" comment="perl-ph is &lt;5.32.1-481.1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011359" version="1" comment="perl-sigtrap is &lt;1.09-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011360" version="1" comment="perl-sort is &lt;2.04-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011361" version="1" comment="perl-subs is &lt;1.03-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011362" version="1" comment="perl-utils is &lt;5.32.1-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011363" version="1" comment="perl-vars is &lt;1.05-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011364" version="1" comment="perl-vmsish is &lt;1.04-481.1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021392" version="1" comment="perl-JSON-XS is &lt;4.04-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985468" version="1" comment="grafana is &lt;10.2.6-13.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985469" version="1" comment="grafana-selinux is &lt;10.2.6-13.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020560" version="1" comment="open-vm-tools is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020561" version="1" comment="open-vm-tools-desktop is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020562" version="1" comment="open-vm-tools-salt-minion is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020563" version="1" comment="open-vm-tools-sdmp is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020564" version="1" comment="open-vm-tools-test is &lt;12.5.0-1.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016337" version="1" comment="postgresql is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016338" version="1" comment="postgresql-contrib is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016339" version="1" comment="postgresql-docs is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016340" version="1" comment="postgresql-plperl is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016341" version="1" comment="postgresql-plpython3 is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016342" version="1" comment="postgresql-pltcl is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016343" version="1" comment="postgresql-private-devel is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016344" version="1" comment="postgresql-private-libs is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016345" version="1" comment="postgresql-server is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016346" version="1" comment="postgresql-server-devel is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016347" version="1" comment="postgresql-static is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016348" version="1" comment="postgresql-test is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016349" version="1" comment="postgresql-test-rpm-macros is &lt;16.10-1.module+el9.6.0+23420+848a4539 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016350" version="1" comment="postgresql-upgrade is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016351" version="1" comment="postgresql-upgrade-devel is &lt;16.10-1.module+el9.6.0+23420+848a4539 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054056" version="1" comment="webkit2gtk3 is &lt;2.50.1-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054057" version="1" comment="webkit2gtk3-devel is &lt;2.50.1-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054058" version="1" comment="webkit2gtk3-jsc is &lt;2.50.1-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054059" version="1" comment="webkit2gtk3-jsc-devel is &lt;2.50.1-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987307" version="1" comment="ipa-client is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987308" version="1" comment="ipa-client-common is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987309" version="1" comment="ipa-client-encrypted-dns is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987310" version="1" comment="ipa-client-epn is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987311" version="1" comment="ipa-client-samba is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987312" version="1" comment="ipa-common is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987313" version="1" comment="ipa-selinux is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987314" version="1" comment="ipa-selinux-luna is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987315" version="1" comment="ipa-selinux-nfast is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987316" version="1" comment="ipa-server is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987317" version="1" comment="ipa-server-common is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987318" version="1" comment="ipa-server-dns is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987319" version="1" comment="ipa-server-encrypted-dns is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987320" version="1" comment="ipa-server-trust-ad is &lt;4.12.2-14.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987321" version="1" comment="python3-ipaclient is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987322" version="1" comment="python3-ipalib is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987323" version="1" comment="python3-ipaserver is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987324" version="1" comment="python3-ipatests is &lt;4.12.2-14.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054547" version="1" comment="tar is &lt;1.34-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054315" version="1" comment="rhel-net-naming-sysattrs is &lt;252-55.el9_7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054316" version="1" comment="systemd is &lt;252-55.el9_7.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054317" version="1" comment="systemd-boot-unsigned is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054318" version="1" comment="systemd-container is &lt;252-55.el9_7.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054319" version="1" comment="systemd-devel is &lt;252-55.el9_7.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054320" version="1" comment="systemd-journal-remote is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054321" version="1" comment="systemd-libs is &lt;252-55.el9_7.7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054322" version="1" comment="systemd-oomd is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054323" version="1" comment="systemd-pam is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054324" version="1" comment="systemd-resolved is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054325" version="1" comment="systemd-rpm-macros is &lt;252-55.el9_7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054326" version="1" comment="systemd-udev is &lt;252-55.el9_7.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054327" version="1" comment="systemd-ukify is &lt;252-55.el9_7.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054701" version="1" comment="transfig is &lt;3.2.7b-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985809" version="1" comment="pcs is &lt;0.11.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985810" version="1" comment="pcs-snmp is &lt;0.11.9-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015534" version="1" comment="go-toolset is &lt;1.24.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015535" version="1" comment="golang is &lt;1.24.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015536" version="1" comment="golang-bin is &lt;1.24.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015537" version="1" comment="golang-docs is &lt;1.24.6-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015538" version="1" comment="golang-misc is &lt;1.24.6-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015539" version="1" comment="golang-race is &lt;1.24.6-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015540" version="1" comment="golang-src is &lt;1.24.6-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015541" version="1" comment="golang-tests is &lt;1.24.6-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054124" version="1" comment="redis is &lt;7.2.11-1.module+el9.7.0+23559+d075163a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054125" version="1" comment="redis-devel is &lt;7.2.11-1.module+el9.7.0+23559+d075163a for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054126" version="1" comment="redis-doc is &lt;7.2.11-1.module+el9.7.0+23559+d075163a for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054232" version="1" comment="valkey is &lt;8.0.6-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054233" version="1" comment="valkey-devel is &lt;8.0.6-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054179" version="1" comment="lasso is &lt;2.7.0-11.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054180" version="1" comment="lasso-devel is &lt;2.7.0-11.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054181" version="1" comment="python3-lasso is &lt;2.7.0-11.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996934" version="1" comment="iputils is &lt;20210202-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996935" version="1" comment="iputils-ninfod is &lt;20210202-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009469" version="1" comment="fence-agents-aliyun is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009470" version="1" comment="fence-agents-all is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009471" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009472" version="1" comment="fence-agents-apc is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009473" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009474" version="1" comment="fence-agents-aws is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009475" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009476" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009477" version="1" comment="fence-agents-brocade is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009478" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009479" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009480" version="1" comment="fence-agents-common is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009481" version="1" comment="fence-agents-compute is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009482" version="1" comment="fence-agents-drac5 is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009483" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009484" version="1" comment="fence-agents-emerson is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009485" version="1" comment="fence-agents-eps is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009486" version="1" comment="fence-agents-gce is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009487" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009488" version="1" comment="fence-agents-hpblade is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009489" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009490" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009491" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009492" version="1" comment="fence-agents-ifmib is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009493" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009494" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009495" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009496" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009497" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009498" version="1" comment="fence-agents-ipdu is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009499" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009500" version="1" comment="fence-agents-kdump is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009501" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009502" version="1" comment="fence-agents-lpar is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009503" version="1" comment="fence-agents-mpath is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009504" version="1" comment="fence-agents-openstack is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009505" version="1" comment="fence-agents-redfish is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009506" version="1" comment="fence-agents-rhevm is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009507" version="1" comment="fence-agents-rsa is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009508" version="1" comment="fence-agents-rsb is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009509" version="1" comment="fence-agents-sbd is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009510" version="1" comment="fence-agents-scsi is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009511" version="1" comment="fence-agents-virsh is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009512" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009513" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009514" version="1" comment="fence-agents-wti is &lt;4.10.0-86.el9_6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009515" version="1" comment="fence-virt is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009516" version="1" comment="fence-virtd is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009517" version="1" comment="fence-virtd-cpg is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009518" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009519" version="1" comment="fence-virtd-multicast is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009520" version="1" comment="fence-virtd-serial is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009521" version="1" comment="fence-virtd-tcp is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010009522" version="1" comment="ha-cloud-support is &lt;4.10.0-86.el9_6.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999226" version="1" comment="python3-setuptools is &lt;53.0.0-13.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999227" version="1" comment="python3-setuptools-wheel is &lt;53.0.0-13.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013286" version="1" comment="python3.11-setuptools is &lt;65.5.1-4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013287" version="1" comment="python3.11-setuptools-wheel is &lt;65.5.1-4.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012684" version="1" comment="python3.12-setuptools is &lt;68.2.2-5.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012685" version="1" comment="python3.12-setuptools-wheel is &lt;68.2.2-5.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985476" version="1" comment="python3-tornado is &lt;6.4.2-2.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985818" version="1" comment="varnish is &lt;6.6.2-6.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985819" version="1" comment="varnish-devel is &lt;6.6.2-6.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985820" version="1" comment="varnish-docs is &lt;6.6.2-6.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054270" version="1" comment="go-filesystem is &lt;3.6.0-12.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054271" version="1" comment="go-rpm-macros is &lt;3.6.0-12.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054272" version="1" comment="go-rpm-templates is &lt;3.6.0-12.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054273" version="1" comment="go-srpm-macros is &lt;3.6.0-12.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054051" version="1" comment="podman is &lt;5.6.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054052" version="1" comment="podman-docker is &lt;5.6.0-6.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054053" version="1" comment="podman-plugins is &lt;5.6.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054054" version="1" comment="podman-remote is &lt;5.6.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054055" version="1" comment="podman-tests is &lt;5.6.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054598" version="1" comment="buildah is &lt;1.41.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054599" version="1" comment="buildah-tests is &lt;1.41.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054636" version="1" comment="podman is &lt;5.6.0-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054637" version="1" comment="podman-docker is &lt;5.6.0-11.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054638" version="1" comment="podman-plugins is &lt;5.6.0-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054639" version="1" comment="podman-remote is &lt;5.6.0-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054640" version="1" comment="podman-tests is &lt;5.6.0-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986681" version="1" comment="mod_security is &lt;2.9.6-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986682" version="1" comment="mod_security-mlogc is &lt;2.9.6-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986311" version="1" comment="glibc is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986312" version="1" comment="glibc-all-langpacks is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986313" version="1" comment="glibc-benchtests is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986314" version="1" comment="glibc-common is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986315" version="1" comment="glibc-devel is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986316" version="1" comment="glibc-doc is &lt;2.34-168.el9_6.19 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986317" version="1" comment="glibc-gconv-extra is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986318" version="1" comment="glibc-headers is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986319" version="1" comment="glibc-langpack-aa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986320" version="1" comment="glibc-langpack-af is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986321" version="1" comment="glibc-langpack-agr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986322" version="1" comment="glibc-langpack-ak is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986323" version="1" comment="glibc-langpack-am is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986324" version="1" comment="glibc-langpack-an is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986325" version="1" comment="glibc-langpack-anp is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986326" version="1" comment="glibc-langpack-ar is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986327" version="1" comment="glibc-langpack-as is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986328" version="1" comment="glibc-langpack-ast is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986329" version="1" comment="glibc-langpack-ayc is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986330" version="1" comment="glibc-langpack-az is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986331" version="1" comment="glibc-langpack-be is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986332" version="1" comment="glibc-langpack-bem is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986333" version="1" comment="glibc-langpack-ber is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986334" version="1" comment="glibc-langpack-bg is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986335" version="1" comment="glibc-langpack-bhb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986336" version="1" comment="glibc-langpack-bho is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986337" version="1" comment="glibc-langpack-bi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986338" version="1" comment="glibc-langpack-bn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986339" version="1" comment="glibc-langpack-bo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986340" version="1" comment="glibc-langpack-br is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986341" version="1" comment="glibc-langpack-brx is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986342" version="1" comment="glibc-langpack-bs is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986343" version="1" comment="glibc-langpack-byn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986344" version="1" comment="glibc-langpack-ca is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986345" version="1" comment="glibc-langpack-ce is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986346" version="1" comment="glibc-langpack-chr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986347" version="1" comment="glibc-langpack-ckb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986348" version="1" comment="glibc-langpack-cmn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986349" version="1" comment="glibc-langpack-crh is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986350" version="1" comment="glibc-langpack-cs is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986351" version="1" comment="glibc-langpack-csb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986352" version="1" comment="glibc-langpack-cv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986353" version="1" comment="glibc-langpack-cy is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986354" version="1" comment="glibc-langpack-da is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986355" version="1" comment="glibc-langpack-de is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986356" version="1" comment="glibc-langpack-doi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986357" version="1" comment="glibc-langpack-dsb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986358" version="1" comment="glibc-langpack-dv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986359" version="1" comment="glibc-langpack-dz is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986360" version="1" comment="glibc-langpack-el is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986361" version="1" comment="glibc-langpack-en is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986362" version="1" comment="glibc-langpack-eo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986363" version="1" comment="glibc-langpack-es is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986364" version="1" comment="glibc-langpack-et is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986365" version="1" comment="glibc-langpack-eu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986366" version="1" comment="glibc-langpack-fa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986367" version="1" comment="glibc-langpack-ff is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986368" version="1" comment="glibc-langpack-fi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986369" version="1" comment="glibc-langpack-fil is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986370" version="1" comment="glibc-langpack-fo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986371" version="1" comment="glibc-langpack-fr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986372" version="1" comment="glibc-langpack-fur is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986373" version="1" comment="glibc-langpack-fy is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986374" version="1" comment="glibc-langpack-ga is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986375" version="1" comment="glibc-langpack-gd is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986376" version="1" comment="glibc-langpack-gez is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986377" version="1" comment="glibc-langpack-gl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986378" version="1" comment="glibc-langpack-gu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986379" version="1" comment="glibc-langpack-gv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986380" version="1" comment="glibc-langpack-ha is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986381" version="1" comment="glibc-langpack-hak is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986382" version="1" comment="glibc-langpack-he is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986383" version="1" comment="glibc-langpack-hi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986384" version="1" comment="glibc-langpack-hif is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986385" version="1" comment="glibc-langpack-hne is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986386" version="1" comment="glibc-langpack-hr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986387" version="1" comment="glibc-langpack-hsb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986388" version="1" comment="glibc-langpack-ht is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986389" version="1" comment="glibc-langpack-hu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986390" version="1" comment="glibc-langpack-hy is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986391" version="1" comment="glibc-langpack-ia is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986392" version="1" comment="glibc-langpack-id is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986393" version="1" comment="glibc-langpack-ig is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986394" version="1" comment="glibc-langpack-ik is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986395" version="1" comment="glibc-langpack-is is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986396" version="1" comment="glibc-langpack-it is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986397" version="1" comment="glibc-langpack-iu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986398" version="1" comment="glibc-langpack-ja is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986399" version="1" comment="glibc-langpack-ka is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986400" version="1" comment="glibc-langpack-kab is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986401" version="1" comment="glibc-langpack-kk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986402" version="1" comment="glibc-langpack-kl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986403" version="1" comment="glibc-langpack-km is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986404" version="1" comment="glibc-langpack-kn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986405" version="1" comment="glibc-langpack-ko is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986406" version="1" comment="glibc-langpack-kok is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986407" version="1" comment="glibc-langpack-ks is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986408" version="1" comment="glibc-langpack-ku is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986409" version="1" comment="glibc-langpack-kw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986410" version="1" comment="glibc-langpack-ky is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986411" version="1" comment="glibc-langpack-lb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986412" version="1" comment="glibc-langpack-lg is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986413" version="1" comment="glibc-langpack-li is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986414" version="1" comment="glibc-langpack-lij is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986415" version="1" comment="glibc-langpack-ln is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986416" version="1" comment="glibc-langpack-lo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986417" version="1" comment="glibc-langpack-lt is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986418" version="1" comment="glibc-langpack-lv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986419" version="1" comment="glibc-langpack-lzh is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986420" version="1" comment="glibc-langpack-mag is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986421" version="1" comment="glibc-langpack-mai is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986422" version="1" comment="glibc-langpack-mfe is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986423" version="1" comment="glibc-langpack-mg is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986424" version="1" comment="glibc-langpack-mhr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986425" version="1" comment="glibc-langpack-mi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986426" version="1" comment="glibc-langpack-miq is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986427" version="1" comment="glibc-langpack-mjw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986428" version="1" comment="glibc-langpack-mk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986429" version="1" comment="glibc-langpack-ml is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986430" version="1" comment="glibc-langpack-mn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986431" version="1" comment="glibc-langpack-mni is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986432" version="1" comment="glibc-langpack-mnw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986433" version="1" comment="glibc-langpack-mr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986434" version="1" comment="glibc-langpack-ms is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986435" version="1" comment="glibc-langpack-mt is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986436" version="1" comment="glibc-langpack-my is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986437" version="1" comment="glibc-langpack-nan is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986438" version="1" comment="glibc-langpack-nb is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986439" version="1" comment="glibc-langpack-nds is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986440" version="1" comment="glibc-langpack-ne is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986441" version="1" comment="glibc-langpack-nhn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986442" version="1" comment="glibc-langpack-niu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986443" version="1" comment="glibc-langpack-nl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986444" version="1" comment="glibc-langpack-nn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986445" version="1" comment="glibc-langpack-nr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986446" version="1" comment="glibc-langpack-nso is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986447" version="1" comment="glibc-langpack-oc is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986448" version="1" comment="glibc-langpack-om is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986449" version="1" comment="glibc-langpack-or is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986450" version="1" comment="glibc-langpack-os is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986451" version="1" comment="glibc-langpack-pa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986452" version="1" comment="glibc-langpack-pap is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986453" version="1" comment="glibc-langpack-pl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986454" version="1" comment="glibc-langpack-ps is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986455" version="1" comment="glibc-langpack-pt is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986456" version="1" comment="glibc-langpack-quz is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986457" version="1" comment="glibc-langpack-raj is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986458" version="1" comment="glibc-langpack-ro is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986459" version="1" comment="glibc-langpack-ru is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986460" version="1" comment="glibc-langpack-rw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986461" version="1" comment="glibc-langpack-sa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986462" version="1" comment="glibc-langpack-sah is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986463" version="1" comment="glibc-langpack-sat is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986464" version="1" comment="glibc-langpack-sc is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986465" version="1" comment="glibc-langpack-sd is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986466" version="1" comment="glibc-langpack-se is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986467" version="1" comment="glibc-langpack-sgs is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986468" version="1" comment="glibc-langpack-shn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986469" version="1" comment="glibc-langpack-shs is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986470" version="1" comment="glibc-langpack-si is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986471" version="1" comment="glibc-langpack-sid is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986472" version="1" comment="glibc-langpack-sk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986473" version="1" comment="glibc-langpack-sl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986474" version="1" comment="glibc-langpack-sm is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986475" version="1" comment="glibc-langpack-so is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986476" version="1" comment="glibc-langpack-sq is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986477" version="1" comment="glibc-langpack-sr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986478" version="1" comment="glibc-langpack-ss is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986479" version="1" comment="glibc-langpack-st is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986480" version="1" comment="glibc-langpack-sv is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986481" version="1" comment="glibc-langpack-sw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986482" version="1" comment="glibc-langpack-szl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986483" version="1" comment="glibc-langpack-ta is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986484" version="1" comment="glibc-langpack-tcy is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986485" version="1" comment="glibc-langpack-te is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986486" version="1" comment="glibc-langpack-tg is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986487" version="1" comment="glibc-langpack-th is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986488" version="1" comment="glibc-langpack-the is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986489" version="1" comment="glibc-langpack-ti is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986490" version="1" comment="glibc-langpack-tig is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986491" version="1" comment="glibc-langpack-tk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986492" version="1" comment="glibc-langpack-tl is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986493" version="1" comment="glibc-langpack-tn is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986494" version="1" comment="glibc-langpack-to is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986495" version="1" comment="glibc-langpack-tpi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986496" version="1" comment="glibc-langpack-tr is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986497" version="1" comment="glibc-langpack-ts is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986498" version="1" comment="glibc-langpack-tt is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986499" version="1" comment="glibc-langpack-ug is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986500" version="1" comment="glibc-langpack-uk is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986501" version="1" comment="glibc-langpack-unm is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986502" version="1" comment="glibc-langpack-ur is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986503" version="1" comment="glibc-langpack-uz is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986504" version="1" comment="glibc-langpack-ve is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986505" version="1" comment="glibc-langpack-vi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986506" version="1" comment="glibc-langpack-wa is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986507" version="1" comment="glibc-langpack-wae is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986508" version="1" comment="glibc-langpack-wal is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986509" version="1" comment="glibc-langpack-wo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986510" version="1" comment="glibc-langpack-xh is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986511" version="1" comment="glibc-langpack-yi is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986512" version="1" comment="glibc-langpack-yo is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986513" version="1" comment="glibc-langpack-yue is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986514" version="1" comment="glibc-langpack-yuw is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986515" version="1" comment="glibc-langpack-zh is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986516" version="1" comment="glibc-langpack-zu is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986517" version="1" comment="glibc-locale-source is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986518" version="1" comment="glibc-minimal-langpack is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986519" version="1" comment="glibc-nss-devel is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986520" version="1" comment="glibc-static is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986521" version="1" comment="glibc-utils is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986522" version="1" comment="libnsl is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986523" version="1" comment="nscd is &lt;2.34-168.el9_6.19 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986524" version="1" comment="nss_db is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986525" version="1" comment="nss_hesiod is &lt;2.34-168.el9_6.19 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987016" version="1" comment="apache-commons-beanutils is &lt;1.9.4-10.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987305" version="1" comment="gimp is &lt;2.99.8-4.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987306" version="1" comment="gimp-libs is &lt;2.99.8-4.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013272" version="1" comment="mod_security is &lt;2.9.6-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013273" version="1" comment="mod_security-mlogc is &lt;2.9.6-2.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020431" version="1" comment="iputils is &lt;20210202-11.el9_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020432" version="1" comment="iputils-ninfod is &lt;20210202-11.el9_6.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016325" version="1" comment="tomcat is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016326" version="1" comment="tomcat-admin-webapps is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016327" version="1" comment="tomcat-docs-webapp is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016328" version="1" comment="tomcat-el-3.0-api is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016329" version="1" comment="tomcat-jsp-2.3-api is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016330" version="1" comment="tomcat-lib is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016331" version="1" comment="tomcat-servlet-4.0-api is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016332" version="1" comment="tomcat-webapps is &lt;9.0.87-3.el9_6.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011442" version="1" comment="libtpms is &lt;0.9.1-5.20211126git1ff6fe1f43.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996897" version="1" comment="tigervnc is &lt;1.14.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996898" version="1" comment="tigervnc-icons is &lt;1.14.1-8.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996899" version="1" comment="tigervnc-license is &lt;1.14.1-8.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996900" version="1" comment="tigervnc-selinux is &lt;1.14.1-8.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996901" version="1" comment="tigervnc-server is &lt;1.14.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996902" version="1" comment="tigervnc-server-minimal is &lt;1.14.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996903" version="1" comment="tigervnc-server-module is &lt;1.14.1-8.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996887" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996888" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996889" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996890" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996891" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996892" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996893" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-4.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996894" version="1" comment="xorg-x11-server-common is &lt;1.20.11-31.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996895" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-31.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996896" version="1" comment="xorg-x11-server-source is &lt;1.20.11-31.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985474" version="1" comment="firefox is &lt;128.10.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985475" version="1" comment="firefox-x11 is &lt;128.10.1-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986192" version="1" comment="thunderbird is &lt;128.11.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016866" version="1" comment="mod_http2 is &lt;2.0.26-4.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999607" version="1" comment="libxml2 is &lt;2.9.13-10.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999608" version="1" comment="libxml2-devel is &lt;2.9.13-10.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999609" version="1" comment="python3-libxml2 is &lt;2.9.13-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999423" version="1" comment="gnome-remote-desktop is &lt;40.0-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011439" version="1" comment="icu is &lt;67.1-10.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011440" version="1" comment="libicu is &lt;67.1-10.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011441" version="1" comment="libicu-devel is &lt;67.1-10.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985486" version="1" comment="firefox is &lt;128.11.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009985487" version="1" comment="firefox-x11 is &lt;128.11.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987017" version="1" comment="libvpx is &lt;1.9.0-9.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987018" version="1" comment="libvpx-devel is &lt;1.9.0-9.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054274" version="1" comment="buildah is &lt;1.41.6-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054275" version="1" comment="buildah-tests is &lt;1.41.6-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054217" version="1" comment="podman is &lt;5.6.0-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054218" version="1" comment="podman-docker is &lt;5.6.0-7.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054219" version="1" comment="podman-plugins is &lt;5.6.0-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054220" version="1" comment="podman-remote is &lt;5.6.0-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054221" version="1" comment="podman-tests is &lt;5.6.0-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011535" version="1" comment="pki-jackson-annotations is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011536" version="1" comment="pki-jackson-core is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011537" version="1" comment="pki-jackson-databind is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011538" version="1" comment="pki-jackson-jaxrs-json-provider is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011539" version="1" comment="pki-jackson-jaxrs-providers is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011540" version="1" comment="pki-jackson-module-jaxb-annotations is &lt;2.19.1-1.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018655" version="1" comment="mysql is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018656" version="1" comment="mysql-common is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018657" version="1" comment="mysql-devel is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018658" version="1" comment="mysql-errmsg is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018659" version="1" comment="mysql-libs is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018660" version="1" comment="mysql-server is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018661" version="1" comment="mysql-test is &lt;8.0.43-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054411" version="1" comment="mysql is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054412" version="1" comment="mysql-common is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054413" version="1" comment="mysql-devel is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054414" version="1" comment="mysql-errmsg is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054415" version="1" comment="mysql-libs is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054416" version="1" comment="mysql-server is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054417" version="1" comment="mysql-test is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054418" version="1" comment="mysql-test-data is &lt;8.4.7-1.module+el9.7.0+23698+51fa9c99 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023351" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023352" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023353" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023354" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.472.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023355" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023356" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023357" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023358" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023359" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023360" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023361" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023362" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023363" version="1" comment="java-1.8.0-openjdk-headless-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023364" version="1" comment="java-1.8.0-openjdk-headless-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023365" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.472.b08-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023366" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.472.b08-1.el9 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023367" version="1" comment="java-1.8.0-openjdk-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023368" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023369" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023370" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.472.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025669" version="1" comment="java-11-openjdk is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025494" version="1" comment="java-11-openjdk-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025670" version="1" comment="java-11-openjdk-demo is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025496" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025497" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025498" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025671" version="1" comment="java-11-openjdk-devel is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025500" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025501" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025502" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025503" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025672" version="1" comment="java-11-openjdk-headless is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025505" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025506" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025507" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025673" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025509" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025674" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025511" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025675" version="1" comment="java-11-openjdk-jmods is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025513" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025514" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025515" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025516" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025676" version="1" comment="java-11-openjdk-src is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025518" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025519" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025520" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025677" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025522" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.29.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025523" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025524" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.29.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023371" version="1" comment="java-17-openjdk is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023372" version="1" comment="java-17-openjdk-demo is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023373" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023374" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023375" version="1" comment="java-17-openjdk-devel is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023376" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023377" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023378" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023379" version="1" comment="java-17-openjdk-headless is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023380" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023381" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023382" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023383" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023384" version="1" comment="java-17-openjdk-jmods is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023385" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023386" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023387" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023388" version="1" comment="java-17-openjdk-src is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023389" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023390" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023391" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023392" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023393" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.17.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023394" version="1" comment="java-21-openjdk is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023395" version="1" comment="java-21-openjdk-demo is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023396" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023397" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023398" version="1" comment="java-21-openjdk-devel is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023399" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023400" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023401" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023402" version="1" comment="java-21-openjdk-headless is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023403" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023404" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023405" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023406" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023407" version="1" comment="java-21-openjdk-jmods is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023408" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023409" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023410" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023411" version="1" comment="java-21-openjdk-src is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023412" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023413" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023414" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023415" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023416" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.9.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054085" version="1" comment="libssh is &lt;0.10.4-15.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054086" version="1" comment="libssh-config is &lt;0.10.4-15.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054087" version="1" comment="libssh-devel is &lt;0.10.4-15.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054088" version="1" comment="vim-X11 is &lt;8.2.2637-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054089" version="1" comment="vim-common is &lt;8.2.2637-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054090" version="1" comment="vim-enhanced is &lt;8.2.2637-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054091" version="1" comment="vim-filesystem is &lt;8.2.2637-23.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054092" version="1" comment="vim-minimal is &lt;8.2.2637-23.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054960" version="1" comment="iperf3 is &lt;3.9-14.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015590" version="1" comment="aide is &lt;0.16-103.el9_6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996942" version="1" comment="qt5-qtbase is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996943" version="1" comment="qt5-qtbase-common is &lt;5.15.9-11.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996944" version="1" comment="qt5-qtbase-devel is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996945" version="1" comment="qt5-qtbase-examples is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996946" version="1" comment="qt5-qtbase-gui is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996947" version="1" comment="qt5-qtbase-mysql is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996948" version="1" comment="qt5-qtbase-odbc is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996949" version="1" comment="qt5-qtbase-postgresql is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996950" version="1" comment="qt5-qtbase-private-devel is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996951" version="1" comment="qt5-qtbase-static is &lt;5.15.9-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055169" version="1" comment="nodejs is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055170" version="1" comment="nodejs-devel is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055171" version="1" comment="nodejs-docs is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055172" version="1" comment="nodejs-full-i18n is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055173" version="1" comment="nodejs-libs is &lt;24.13.0-1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055174" version="1" comment="nodejs-nodemon is &lt;3.0.3-3.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055175" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055176" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055177" version="1" comment="npm is &lt;11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055188" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055178" version="1" comment="v8-13.6-devel is &lt;13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021803" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021815" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021804" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021816" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021805" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021817" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021806" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021818" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021819" version="1" comment="dotnet-host is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021807" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021820" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021808" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021821" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021809" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021822" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021810" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.121-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021811" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.121-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021823" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021824" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021825" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021812" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.121-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021826" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021813" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.21-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021827" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.10-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021814" version="1" comment="dotnet-templates-8.0 is &lt;8.0.121-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021828" version="1" comment="dotnet-templates-9.0 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021829" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.111-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054529" version="1" comment="mod_md is &lt;2.4.26-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997710" version="1" comment="glibc is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997711" version="1" comment="glibc-all-langpacks is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997712" version="1" comment="glibc-benchtests is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997713" version="1" comment="glibc-common is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997714" version="1" comment="glibc-devel is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997715" version="1" comment="glibc-doc is &lt;2.34-168.el9_6.20 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997716" version="1" comment="glibc-gconv-extra is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997717" version="1" comment="glibc-headers is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997718" version="1" comment="glibc-langpack-aa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997719" version="1" comment="glibc-langpack-af is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997720" version="1" comment="glibc-langpack-agr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997721" version="1" comment="glibc-langpack-ak is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997722" version="1" comment="glibc-langpack-am is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997723" version="1" comment="glibc-langpack-an is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997724" version="1" comment="glibc-langpack-anp is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997725" version="1" comment="glibc-langpack-ar is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997726" version="1" comment="glibc-langpack-as is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997727" version="1" comment="glibc-langpack-ast is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997728" version="1" comment="glibc-langpack-ayc is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997729" version="1" comment="glibc-langpack-az is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997730" version="1" comment="glibc-langpack-be is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997731" version="1" comment="glibc-langpack-bem is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997732" version="1" comment="glibc-langpack-ber is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997733" version="1" comment="glibc-langpack-bg is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997734" version="1" comment="glibc-langpack-bhb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997735" version="1" comment="glibc-langpack-bho is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997736" version="1" comment="glibc-langpack-bi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997737" version="1" comment="glibc-langpack-bn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997738" version="1" comment="glibc-langpack-bo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997739" version="1" comment="glibc-langpack-br is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997740" version="1" comment="glibc-langpack-brx is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997741" version="1" comment="glibc-langpack-bs is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997742" version="1" comment="glibc-langpack-byn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997743" version="1" comment="glibc-langpack-ca is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997744" version="1" comment="glibc-langpack-ce is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997745" version="1" comment="glibc-langpack-chr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997746" version="1" comment="glibc-langpack-ckb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997747" version="1" comment="glibc-langpack-cmn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997748" version="1" comment="glibc-langpack-crh is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997749" version="1" comment="glibc-langpack-cs is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997750" version="1" comment="glibc-langpack-csb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997751" version="1" comment="glibc-langpack-cv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997752" version="1" comment="glibc-langpack-cy is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997753" version="1" comment="glibc-langpack-da is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997754" version="1" comment="glibc-langpack-de is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997755" version="1" comment="glibc-langpack-doi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997756" version="1" comment="glibc-langpack-dsb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997757" version="1" comment="glibc-langpack-dv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997758" version="1" comment="glibc-langpack-dz is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997759" version="1" comment="glibc-langpack-el is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997760" version="1" comment="glibc-langpack-en is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997761" version="1" comment="glibc-langpack-eo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997762" version="1" comment="glibc-langpack-es is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997763" version="1" comment="glibc-langpack-et is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997764" version="1" comment="glibc-langpack-eu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997765" version="1" comment="glibc-langpack-fa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997766" version="1" comment="glibc-langpack-ff is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997767" version="1" comment="glibc-langpack-fi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997768" version="1" comment="glibc-langpack-fil is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997769" version="1" comment="glibc-langpack-fo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997770" version="1" comment="glibc-langpack-fr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997771" version="1" comment="glibc-langpack-fur is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997772" version="1" comment="glibc-langpack-fy is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997773" version="1" comment="glibc-langpack-ga is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997774" version="1" comment="glibc-langpack-gd is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997775" version="1" comment="glibc-langpack-gez is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997776" version="1" comment="glibc-langpack-gl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997777" version="1" comment="glibc-langpack-gu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997778" version="1" comment="glibc-langpack-gv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997779" version="1" comment="glibc-langpack-ha is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997780" version="1" comment="glibc-langpack-hak is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997781" version="1" comment="glibc-langpack-he is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997782" version="1" comment="glibc-langpack-hi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997783" version="1" comment="glibc-langpack-hif is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997784" version="1" comment="glibc-langpack-hne is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997785" version="1" comment="glibc-langpack-hr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997786" version="1" comment="glibc-langpack-hsb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997787" version="1" comment="glibc-langpack-ht is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997788" version="1" comment="glibc-langpack-hu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997789" version="1" comment="glibc-langpack-hy is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997790" version="1" comment="glibc-langpack-ia is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997791" version="1" comment="glibc-langpack-id is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997792" version="1" comment="glibc-langpack-ig is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997793" version="1" comment="glibc-langpack-ik is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997794" version="1" comment="glibc-langpack-is is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997795" version="1" comment="glibc-langpack-it is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997796" version="1" comment="glibc-langpack-iu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997797" version="1" comment="glibc-langpack-ja is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997798" version="1" comment="glibc-langpack-ka is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997799" version="1" comment="glibc-langpack-kab is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997800" version="1" comment="glibc-langpack-kk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997801" version="1" comment="glibc-langpack-kl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997802" version="1" comment="glibc-langpack-km is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997803" version="1" comment="glibc-langpack-kn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997804" version="1" comment="glibc-langpack-ko is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997805" version="1" comment="glibc-langpack-kok is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997806" version="1" comment="glibc-langpack-ks is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997807" version="1" comment="glibc-langpack-ku is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997808" version="1" comment="glibc-langpack-kw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997809" version="1" comment="glibc-langpack-ky is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997810" version="1" comment="glibc-langpack-lb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997811" version="1" comment="glibc-langpack-lg is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997812" version="1" comment="glibc-langpack-li is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997813" version="1" comment="glibc-langpack-lij is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997814" version="1" comment="glibc-langpack-ln is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997815" version="1" comment="glibc-langpack-lo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997816" version="1" comment="glibc-langpack-lt is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997817" version="1" comment="glibc-langpack-lv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997818" version="1" comment="glibc-langpack-lzh is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997819" version="1" comment="glibc-langpack-mag is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997820" version="1" comment="glibc-langpack-mai is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997821" version="1" comment="glibc-langpack-mfe is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997822" version="1" comment="glibc-langpack-mg is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997823" version="1" comment="glibc-langpack-mhr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997824" version="1" comment="glibc-langpack-mi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997825" version="1" comment="glibc-langpack-miq is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997826" version="1" comment="glibc-langpack-mjw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997827" version="1" comment="glibc-langpack-mk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997828" version="1" comment="glibc-langpack-ml is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997829" version="1" comment="glibc-langpack-mn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997830" version="1" comment="glibc-langpack-mni is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997831" version="1" comment="glibc-langpack-mnw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997832" version="1" comment="glibc-langpack-mr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997833" version="1" comment="glibc-langpack-ms is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997834" version="1" comment="glibc-langpack-mt is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997835" version="1" comment="glibc-langpack-my is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997836" version="1" comment="glibc-langpack-nan is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997837" version="1" comment="glibc-langpack-nb is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997838" version="1" comment="glibc-langpack-nds is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997839" version="1" comment="glibc-langpack-ne is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997840" version="1" comment="glibc-langpack-nhn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997841" version="1" comment="glibc-langpack-niu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997842" version="1" comment="glibc-langpack-nl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997843" version="1" comment="glibc-langpack-nn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997844" version="1" comment="glibc-langpack-nr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997845" version="1" comment="glibc-langpack-nso is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997846" version="1" comment="glibc-langpack-oc is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997847" version="1" comment="glibc-langpack-om is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997848" version="1" comment="glibc-langpack-or is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997849" version="1" comment="glibc-langpack-os is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997850" version="1" comment="glibc-langpack-pa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997851" version="1" comment="glibc-langpack-pap is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997852" version="1" comment="glibc-langpack-pl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997853" version="1" comment="glibc-langpack-ps is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997854" version="1" comment="glibc-langpack-pt is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997855" version="1" comment="glibc-langpack-quz is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997856" version="1" comment="glibc-langpack-raj is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997857" version="1" comment="glibc-langpack-ro is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997858" version="1" comment="glibc-langpack-ru is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997859" version="1" comment="glibc-langpack-rw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997860" version="1" comment="glibc-langpack-sa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997861" version="1" comment="glibc-langpack-sah is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997862" version="1" comment="glibc-langpack-sat is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997863" version="1" comment="glibc-langpack-sc is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997864" version="1" comment="glibc-langpack-sd is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997865" version="1" comment="glibc-langpack-se is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997866" version="1" comment="glibc-langpack-sgs is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997867" version="1" comment="glibc-langpack-shn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997868" version="1" comment="glibc-langpack-shs is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997869" version="1" comment="glibc-langpack-si is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997870" version="1" comment="glibc-langpack-sid is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997871" version="1" comment="glibc-langpack-sk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997872" version="1" comment="glibc-langpack-sl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997873" version="1" comment="glibc-langpack-sm is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997874" version="1" comment="glibc-langpack-so is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997875" version="1" comment="glibc-langpack-sq is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997876" version="1" comment="glibc-langpack-sr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997877" version="1" comment="glibc-langpack-ss is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997878" version="1" comment="glibc-langpack-st is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997879" version="1" comment="glibc-langpack-sv is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997880" version="1" comment="glibc-langpack-sw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997881" version="1" comment="glibc-langpack-szl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997882" version="1" comment="glibc-langpack-ta is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997883" version="1" comment="glibc-langpack-tcy is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997884" version="1" comment="glibc-langpack-te is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997885" version="1" comment="glibc-langpack-tg is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997886" version="1" comment="glibc-langpack-th is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997887" version="1" comment="glibc-langpack-the is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997888" version="1" comment="glibc-langpack-ti is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997889" version="1" comment="glibc-langpack-tig is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997890" version="1" comment="glibc-langpack-tk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997891" version="1" comment="glibc-langpack-tl is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997892" version="1" comment="glibc-langpack-tn is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997893" version="1" comment="glibc-langpack-to is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997894" version="1" comment="glibc-langpack-tpi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997895" version="1" comment="glibc-langpack-tr is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997896" version="1" comment="glibc-langpack-ts is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997897" version="1" comment="glibc-langpack-tt is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997898" version="1" comment="glibc-langpack-ug is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997899" version="1" comment="glibc-langpack-uk is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997900" version="1" comment="glibc-langpack-unm is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997901" version="1" comment="glibc-langpack-ur is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997902" version="1" comment="glibc-langpack-uz is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997903" version="1" comment="glibc-langpack-ve is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997904" version="1" comment="glibc-langpack-vi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997905" version="1" comment="glibc-langpack-wa is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997906" version="1" comment="glibc-langpack-wae is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997907" version="1" comment="glibc-langpack-wal is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997908" version="1" comment="glibc-langpack-wo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997909" version="1" comment="glibc-langpack-xh is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997910" version="1" comment="glibc-langpack-yi is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997911" version="1" comment="glibc-langpack-yo is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997912" version="1" comment="glibc-langpack-yue is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997913" version="1" comment="glibc-langpack-yuw is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997914" version="1" comment="glibc-langpack-zh is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997915" version="1" comment="glibc-langpack-zu is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997916" version="1" comment="glibc-locale-source is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997917" version="1" comment="glibc-minimal-langpack is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997918" version="1" comment="glibc-nss-devel is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997919" version="1" comment="glibc-static is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997920" version="1" comment="glibc-utils is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997921" version="1" comment="libnsl is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997922" version="1" comment="nscd is &lt;2.34-168.el9_6.20 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997923" version="1" comment="nss_db is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997924" version="1" comment="nss_hesiod is &lt;2.34-168.el9_6.20 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018057" version="1" comment="cups is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018058" version="1" comment="cups-client is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018059" version="1" comment="cups-devel is &lt;2.3.3op2-33.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018060" version="1" comment="cups-filesystem is &lt;2.3.3op2-33.el9_6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018061" version="1" comment="cups-ipptool is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018062" version="1" comment="cups-libs is &lt;2.3.3op2-33.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018063" version="1" comment="cups-lpd is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018064" version="1" comment="cups-printerapp is &lt;2.3.3op2-33.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054532" version="1" comment="httpd is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054533" version="1" comment="httpd-core is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054534" version="1" comment="httpd-devel is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054535" version="1" comment="httpd-filesystem is &lt;2.4.62-7.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054536" version="1" comment="httpd-manual is &lt;2.4.62-7.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054537" version="1" comment="httpd-tools is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054538" version="1" comment="mod_ldap is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054539" version="1" comment="mod_lua is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054540" version="1" comment="mod_proxy_html is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054541" version="1" comment="mod_session is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054542" version="1" comment="mod_ssl is &lt;2.4.62-7.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054222" version="1" comment="delve is &lt;1.25.2-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054223" version="1" comment="go-toolset is &lt;1.25.3-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054224" version="1" comment="golang is &lt;1.25.3-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054225" version="1" comment="golang-bin is &lt;1.25.3-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054226" version="1" comment="golang-docs is &lt;1.25.3-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054227" version="1" comment="golang-misc is &lt;1.25.3-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054228" version="1" comment="golang-race is &lt;1.25.3-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054229" version="1" comment="golang-src is &lt;1.25.3-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054230" version="1" comment="golang-tests is &lt;1.25.3-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054402" version="1" comment="grafana is &lt;10.2.6-17.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054403" version="1" comment="grafana-selinux is &lt;10.2.6-17.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054495" version="1" comment="podman is &lt;5.6.0-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054496" version="1" comment="podman-docker is &lt;5.6.0-9.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054497" version="1" comment="podman-plugins is &lt;5.6.0-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054498" version="1" comment="podman-remote is &lt;5.6.0-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054499" version="1" comment="podman-tests is &lt;5.6.0-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054500" version="1" comment="skopeo is &lt;1.20.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054501" version="1" comment="skopeo-tests is &lt;1.20.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054588" version="1" comment="cups is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054589" version="1" comment="cups-client is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054590" version="1" comment="cups-devel is &lt;2.3.3op2-34.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054591" version="1" comment="cups-filesystem is &lt;2.3.3op2-34.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054592" version="1" comment="cups-ipptool is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054593" version="1" comment="cups-libs is &lt;2.3.3op2-34.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054594" version="1" comment="cups-lpd is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054595" version="1" comment="cups-printerapp is &lt;2.3.3op2-34.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054172" version="1" comment="python3-kdcproxy is &lt;1.0.0-9.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015587" version="1" comment="bsdtar is &lt;3.5.3-6.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015588" version="1" comment="libarchive is &lt;3.5.3-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015589" version="1" comment="libarchive-devel is &lt;3.5.3-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054276" version="1" comment="expat is &lt;2.5.0-5.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054277" version="1" comment="expat-devel is &lt;2.5.0-5.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054150" version="1" comment="pcs is &lt;0.11.10-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054151" version="1" comment="pcs-snmp is &lt;0.11.10-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998072" version="1" comment="thunderbird is &lt;128.12.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054522" version="1" comment="libssh is &lt;0.10.4-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054523" version="1" comment="libssh-config is &lt;0.10.4-17.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054524" version="1" comment="libssh-devel is &lt;0.10.4-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010539" version="1" comment="python3-unbound is &lt;1.16.2-19.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010540" version="1" comment="unbound is &lt;1.16.2-19.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010541" version="1" comment="unbound-devel is &lt;1.16.2-19.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010542" version="1" comment="unbound-dracut is &lt;1.16.2-19.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010543" version="1" comment="unbound-libs is &lt;1.16.2-19.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996904" version="1" comment="libblockdev is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996905" version="1" comment="libblockdev-crypto is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996906" version="1" comment="libblockdev-dm is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996907" version="1" comment="libblockdev-fs is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996908" version="1" comment="libblockdev-kbd is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996909" version="1" comment="libblockdev-loop is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996910" version="1" comment="libblockdev-lvm is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996911" version="1" comment="libblockdev-lvm-dbus is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996912" version="1" comment="libblockdev-mdraid is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996913" version="1" comment="libblockdev-mpath is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996914" version="1" comment="libblockdev-nvdimm is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996915" version="1" comment="libblockdev-nvme is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996916" version="1" comment="libblockdev-part is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996917" version="1" comment="libblockdev-plugins-all is &lt;2.28-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996918" version="1" comment="libblockdev-swap is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996919" version="1" comment="libblockdev-tools is &lt;2.28-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996920" version="1" comment="libblockdev-utils is &lt;2.28-14.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996921" version="1" comment="python3-blockdev is &lt;2.28-14.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016906" version="1" comment="pam is &lt;1.5.1-26.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016907" version="1" comment="pam-devel is &lt;1.5.1-26.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016908" version="1" comment="pam-docs is &lt;1.5.1-26.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999418" version="1" comment="podman is &lt;5.4.0-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999419" version="1" comment="podman-docker is &lt;5.4.0-12.el9_6 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999420" version="1" comment="podman-plugins is &lt;5.4.0-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999421" version="1" comment="podman-remote is &lt;5.4.0-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999422" version="1" comment="podman-tests is &lt;5.4.0-12.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009238207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055765" version="1" comment="grub2-common is &lt;2.06-114.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055766" version="1" comment="grub2-efi-x64 is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055767" version="1" comment="grub2-efi-x64-cdboot is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055768" version="1" comment="grub2-efi-x64-modules is &lt;2.06-114.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055769" version="1" comment="grub2-pc is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055770" version="1" comment="grub2-pc-modules is &lt;2.06-114.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055771" version="1" comment="grub2-tools is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055772" version="1" comment="grub2-tools-efi is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055773" version="1" comment="grub2-tools-extra is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055774" version="1" comment="grub2-tools-minimal is &lt;2.06-114.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055495" version="1" comment="buildah is &lt;1.41.8-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055496" version="1" comment="buildah-tests is &lt;1.41.8-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055506" version="1" comment="containernetworking-plugins is &lt;1.7.1-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055594" version="1" comment="git-lfs is &lt;3.6.1-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055558" version="1" comment="go-filesystem is &lt;3.6.0-13.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055559" version="1" comment="go-rpm-macros is &lt;3.6.0-13.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055560" version="1" comment="go-rpm-templates is &lt;3.6.0-13.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055561" version="1" comment="go-srpm-macros is &lt;3.6.0-13.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055124" version="1" comment="go-toolset is &lt;1.25.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055125" version="1" comment="golang is &lt;1.25.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055126" version="1" comment="golang-bin is &lt;1.25.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055127" version="1" comment="golang-docs is &lt;1.25.7-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055128" version="1" comment="golang-misc is &lt;1.25.7-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055129" version="1" comment="golang-race is &lt;1.25.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055130" version="1" comment="golang-src is &lt;1.25.7-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055131" version="1" comment="golang-tests is &lt;1.25.7-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055437" version="1" comment="grafana is &lt;10.2.6-18.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055443" version="1" comment="grafana-pcp is &lt;5.1.1-12.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055438" version="1" comment="grafana-selinux is &lt;10.2.6-18.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055577" version="1" comment="image-builder is &lt;31-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055497" version="1" comment="podman is &lt;5.6.0-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055498" version="1" comment="podman-docker is &lt;5.6.0-14.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055499" version="1" comment="podman-plugins is &lt;5.6.0-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055500" version="1" comment="podman-remote is &lt;5.6.0-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055501" version="1" comment="podman-tests is &lt;5.6.0-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055494" version="1" comment="runc is &lt;1.4.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055504" version="1" comment="skopeo is &lt;1.20.0-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055505" version="1" comment="skopeo-tests is &lt;1.20.0-3.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054743" version="1" comment="go-toolset is &lt;1.25.5-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054744" version="1" comment="golang is &lt;1.25.5-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054745" version="1" comment="golang-bin is &lt;1.25.5-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054746" version="1" comment="golang-docs is &lt;1.25.5-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054747" version="1" comment="golang-misc is &lt;1.25.5-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054748" version="1" comment="golang-race is &lt;1.25.5-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054749" version="1" comment="golang-src is &lt;1.25.5-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054750" version="1" comment="golang-tests is &lt;1.25.5-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055826" version="1" comment="go-toolset is &lt;1.25.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055827" version="1" comment="golang is &lt;1.25.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055828" version="1" comment="golang-bin is &lt;1.25.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055829" version="1" comment="golang-docs is &lt;1.25.8-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055830" version="1" comment="golang-misc is &lt;1.25.8-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055831" version="1" comment="golang-race is &lt;1.25.8-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055832" version="1" comment="golang-src is &lt;1.25.8-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055833" version="1" comment="golang-tests is &lt;1.25.8-1.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055068" version="1" comment="brotli is &lt;1.0.9-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055069" version="1" comment="brotli-devel is &lt;1.0.9-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055070" version="1" comment="libbrotli is &lt;1.0.9-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055071" version="1" comment="python3-brotli is &lt;1.0.9-9.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054516" version="1" comment="openssh is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054517" version="1" comment="openssh-askpass is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054518" version="1" comment="openssh-clients is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054519" version="1" comment="openssh-keycat is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054520" version="1" comment="openssh-server is &lt;8.7p1-47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054521" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.47.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054081" version="1" comment="squid is &lt;5.5-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054131" version="1" comment="tigervnc is &lt;1.15.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054132" version="1" comment="tigervnc-icons is &lt;1.15.0-6.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054133" version="1" comment="tigervnc-license is &lt;1.15.0-6.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054134" version="1" comment="tigervnc-selinux is &lt;1.15.0-6.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054135" version="1" comment="tigervnc-server is &lt;1.15.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054136" version="1" comment="tigervnc-server-minimal is &lt;1.15.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054137" version="1" comment="tigervnc-server-module is &lt;1.15.0-6.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054142" version="1" comment="xorg-x11-server-Xdmx is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054143" version="1" comment="xorg-x11-server-Xephyr is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054144" version="1" comment="xorg-x11-server-Xnest is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054145" version="1" comment="xorg-x11-server-Xorg is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054146" version="1" comment="xorg-x11-server-Xvfb is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054140" version="1" comment="xorg-x11-server-Xwayland is &lt;23.2.7-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054141" version="1" comment="xorg-x11-server-Xwayland-devel is &lt;23.2.7-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054147" version="1" comment="xorg-x11-server-common is &lt;1.20.11-32.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054148" version="1" comment="xorg-x11-server-devel is &lt;1.20.11-32.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054149" version="1" comment="xorg-x11-server-source is &lt;1.20.11-32.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998055" version="1" comment="firefox is &lt;128.12.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009998056" version="1" comment="firefox-x11 is &lt;128.12.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040212" version="1" comment="java-1.8.0-openjdk is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040213" version="1" comment="java-1.8.0-openjdk-accessibility is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040214" version="1" comment="java-1.8.0-openjdk-accessibility-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040215" version="1" comment="java-1.8.0-openjdk-accessibility-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040216" version="1" comment="java-1.8.0-openjdk-demo is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040217" version="1" comment="java-1.8.0-openjdk-demo-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040218" version="1" comment="java-1.8.0-openjdk-demo-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040219" version="1" comment="java-1.8.0-openjdk-devel is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040220" version="1" comment="java-1.8.0-openjdk-devel-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040221" version="1" comment="java-1.8.0-openjdk-devel-slowdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040222" version="1" comment="java-1.8.0-openjdk-fastdebug is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040223" version="1" comment="java-1.8.0-openjdk-headless is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040224" version="1" comment="java-1.8.0-openjdk-javadoc is &lt;1.8.0.482.b08-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040225" version="1" comment="java-1.8.0-openjdk-javadoc-zip is &lt;1.8.0.482.b08-1.el8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040226" version="1" comment="java-1.8.0-openjdk-src is &lt;1.8.0.482.b08-1.el8 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040227" version="1" comment="java-1.8.0-openjdk-src-fastdebug is &lt;1.8.0.482.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040228" version="1" comment="java-1.8.0-openjdk-src-slowdebug is &lt;1.8.0.482.b08-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053475" version="1" comment="java-11-openjdk is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043334" version="1" comment="java-11-openjdk-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053476" version="1" comment="java-11-openjdk-demo is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043336" version="1" comment="java-11-openjdk-demo-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053477" version="1" comment="java-11-openjdk-demo-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053478" version="1" comment="java-11-openjdk-demo-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053479" version="1" comment="java-11-openjdk-devel is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043340" version="1" comment="java-11-openjdk-devel-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053480" version="1" comment="java-11-openjdk-devel-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053481" version="1" comment="java-11-openjdk-devel-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053482" version="1" comment="java-11-openjdk-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053483" version="1" comment="java-11-openjdk-headless is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043345" version="1" comment="java-11-openjdk-headless-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053484" version="1" comment="java-11-openjdk-headless-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053485" version="1" comment="java-11-openjdk-headless-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053486" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043349" version="1" comment="java-11-openjdk-javadoc-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053487" version="1" comment="java-11-openjdk-javadoc-zip is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043351" version="1" comment="java-11-openjdk-javadoc-zip-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053488" version="1" comment="java-11-openjdk-jmods is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043353" version="1" comment="java-11-openjdk-jmods-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053489" version="1" comment="java-11-openjdk-jmods-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053490" version="1" comment="java-11-openjdk-jmods-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053491" version="1" comment="java-11-openjdk-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053492" version="1" comment="java-11-openjdk-src is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043358" version="1" comment="java-11-openjdk-src-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053493" version="1" comment="java-11-openjdk-src-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053494" version="1" comment="java-11-openjdk-src-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053495" version="1" comment="java-11-openjdk-static-libs is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043362" version="1" comment="java-11-openjdk-static-libs-debug is &lt;11.0.30.0.7-1.el7_9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053496" version="1" comment="java-11-openjdk-static-libs-fastdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053497" version="1" comment="java-11-openjdk-static-libs-slowdebug is &lt;11.0.30.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039028" version="1" comment="java-17-openjdk is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039029" version="1" comment="java-17-openjdk-demo is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039030" version="1" comment="java-17-openjdk-demo-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039031" version="1" comment="java-17-openjdk-demo-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039032" version="1" comment="java-17-openjdk-devel is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039033" version="1" comment="java-17-openjdk-devel-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039034" version="1" comment="java-17-openjdk-devel-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039035" version="1" comment="java-17-openjdk-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039036" version="1" comment="java-17-openjdk-headless is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039037" version="1" comment="java-17-openjdk-headless-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039038" version="1" comment="java-17-openjdk-headless-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039039" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039040" version="1" comment="java-17-openjdk-javadoc-zip is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039041" version="1" comment="java-17-openjdk-jmods is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039042" version="1" comment="java-17-openjdk-jmods-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039043" version="1" comment="java-17-openjdk-jmods-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039044" version="1" comment="java-17-openjdk-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039045" version="1" comment="java-17-openjdk-src is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039046" version="1" comment="java-17-openjdk-src-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039047" version="1" comment="java-17-openjdk-src-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039048" version="1" comment="java-17-openjdk-static-libs is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039049" version="1" comment="java-17-openjdk-static-libs-fastdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039050" version="1" comment="java-17-openjdk-static-libs-slowdebug is &lt;17.0.18.0.8-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039592" version="1" comment="java-21-openjdk is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039593" version="1" comment="java-21-openjdk-demo is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039594" version="1" comment="java-21-openjdk-demo-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039595" version="1" comment="java-21-openjdk-demo-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039596" version="1" comment="java-21-openjdk-devel is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039597" version="1" comment="java-21-openjdk-devel-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039598" version="1" comment="java-21-openjdk-devel-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039599" version="1" comment="java-21-openjdk-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039600" version="1" comment="java-21-openjdk-headless is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039601" version="1" comment="java-21-openjdk-headless-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039602" version="1" comment="java-21-openjdk-headless-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039603" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039604" version="1" comment="java-21-openjdk-javadoc-zip is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039605" version="1" comment="java-21-openjdk-jmods is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039606" version="1" comment="java-21-openjdk-jmods-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039607" version="1" comment="java-21-openjdk-jmods-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039608" version="1" comment="java-21-openjdk-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039609" version="1" comment="java-21-openjdk-src is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039610" version="1" comment="java-21-openjdk-src-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039611" version="1" comment="java-21-openjdk-src-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039612" version="1" comment="java-21-openjdk-static-libs is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039613" version="1" comment="java-21-openjdk-static-libs-fastdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039614" version="1" comment="java-21-openjdk-static-libs-slowdebug is &lt;21.0.10.0.7-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054752" version="1" comment="java-25-openjdk is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054753" version="1" comment="java-25-openjdk-crypto-adapter is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054754" version="1" comment="java-25-openjdk-crypto-adapter-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054755" version="1" comment="java-25-openjdk-crypto-adapter-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054756" version="1" comment="java-25-openjdk-demo is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054757" version="1" comment="java-25-openjdk-demo-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054758" version="1" comment="java-25-openjdk-demo-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054759" version="1" comment="java-25-openjdk-devel is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054760" version="1" comment="java-25-openjdk-devel-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054761" version="1" comment="java-25-openjdk-devel-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054762" version="1" comment="java-25-openjdk-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054763" version="1" comment="java-25-openjdk-headless is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054764" version="1" comment="java-25-openjdk-headless-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054765" version="1" comment="java-25-openjdk-headless-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054766" version="1" comment="java-25-openjdk-javadoc is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054767" version="1" comment="java-25-openjdk-javadoc-zip is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054768" version="1" comment="java-25-openjdk-jmods is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054769" version="1" comment="java-25-openjdk-jmods-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054770" version="1" comment="java-25-openjdk-jmods-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054771" version="1" comment="java-25-openjdk-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054772" version="1" comment="java-25-openjdk-src is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054773" version="1" comment="java-25-openjdk-src-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054774" version="1" comment="java-25-openjdk-src-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054775" version="1" comment="java-25-openjdk-static-libs is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054776" version="1" comment="java-25-openjdk-static-libs-fastdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054777" version="1" comment="java-25-openjdk-static-libs-slowdebug is &lt;25.0.2.0.10-1.el9 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054572" version="1" comment="libpng is &lt;1.6.37-12.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054573" version="1" comment="libpng-devel is &lt;1.6.37-12.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054820" version="1" comment="fence-agents-aliyun is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054821" version="1" comment="fence-agents-all is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054822" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054823" version="1" comment="fence-agents-apc is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054824" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054825" version="1" comment="fence-agents-aws is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054826" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054827" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054828" version="1" comment="fence-agents-brocade is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054829" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054830" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054831" version="1" comment="fence-agents-common is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054832" version="1" comment="fence-agents-compute is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054833" version="1" comment="fence-agents-drac5 is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054834" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054835" version="1" comment="fence-agents-emerson is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054836" version="1" comment="fence-agents-eps is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054837" version="1" comment="fence-agents-gce is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054838" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054839" version="1" comment="fence-agents-hpblade is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054840" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054841" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054842" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054843" version="1" comment="fence-agents-ifmib is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054844" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054845" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054846" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054847" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054848" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054849" version="1" comment="fence-agents-ipdu is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054850" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054851" version="1" comment="fence-agents-kdump is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054852" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054853" version="1" comment="fence-agents-lpar is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054854" version="1" comment="fence-agents-mpath is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054855" version="1" comment="fence-agents-nutanix-ahv is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054856" version="1" comment="fence-agents-openstack is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054857" version="1" comment="fence-agents-redfish is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054858" version="1" comment="fence-agents-rhevm is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054859" version="1" comment="fence-agents-rsa is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054860" version="1" comment="fence-agents-rsb is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054861" version="1" comment="fence-agents-sbd is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054862" version="1" comment="fence-agents-scsi is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054863" version="1" comment="fence-agents-virsh is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054864" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054865" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054866" version="1" comment="fence-agents-wti is &lt;4.10.0-98.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054867" version="1" comment="fence-virt is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054868" version="1" comment="fence-virtd is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054869" version="1" comment="fence-virtd-cpg is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054870" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054871" version="1" comment="fence-virtd-multicast is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054872" version="1" comment="fence-virtd-serial is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054873" version="1" comment="fence-virtd-tcp is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054874" version="1" comment="ha-cloud-support is &lt;4.10.0-98.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054783" version="1" comment="python3-urllib3 is &lt;1.26.5-6.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054785" version="1" comment="python3.11-urllib3 is &lt;1.26.12-5.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054784" version="1" comment="python3.12-urllib3 is &lt;1.26.19-1.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054704" version="1" comment="jmc is &lt;8.2.0-18.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054705" version="1" comment="gpsd-minimal is &lt;3.26.1-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054706" version="1" comment="gpsd-minimal-clients is &lt;3.26.1-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055545" version="1" comment="valkey is &lt;8.0.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055546" version="1" comment="valkey-devel is &lt;8.0.7-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055782" version="1" comment="capstone is &lt;4.0.2-11.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055783" version="1" comment="capstone-devel is &lt;4.0.2-11.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055784" version="1" comment="capstone-java is &lt;4.0.2-11.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055785" version="1" comment="python3-capstone is &lt;4.0.2-11.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055578" version="1" comment="delve is &lt;1.25.2-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051006" version="1" comment="kernel-default is ==6.4.0-150600.23.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051007" version="1" comment="kernel-livepatch-6_4_0-150600_23_84-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051008" version="1" comment="kernel-default is &lt;6.4.0-150600.23.84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051509" version="1" comment="kernel-default is ==6.4.0-150700.53.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051510" version="1" comment="kernel-livepatch-6_4_0-150700_53_28-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054694" version="1" comment="net-snmp is &lt;5.9.1-17.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054695" version="1" comment="net-snmp-agent-libs is &lt;5.9.1-17.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054696" version="1" comment="net-snmp-devel is &lt;5.9.1-17.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054697" version="1" comment="net-snmp-libs is &lt;5.9.1-17.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054698" version="1" comment="net-snmp-perl is &lt;5.9.1-17.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054699" version="1" comment="net-snmp-utils is &lt;5.9.1-17.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054700" version="1" comment="python3-net-snmp is &lt;5.9.1-17.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054702" version="1" comment="gnupg2 is &lt;2.3.3-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054703" version="1" comment="gnupg2-smime is &lt;2.3.3-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055730" version="1" comment="compat-openssl11 is &lt;1.1.1k-5.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011255" version="1" comment="nodejs is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011256" version="1" comment="nodejs-devel is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011257" version="1" comment="nodejs-docs is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011258" version="1" comment="nodejs-full-i18n is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011259" version="1" comment="nodejs-libs is &lt;22.16.0-2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011260" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.6.0+23339+d3c8acfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011261" version="1" comment="nodejs-packaging is &lt;2021.06-4.module+el9.6.0+23339+d3c8acfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011262" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-4.module+el9.6.0+23339+d3c8acfa for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011263" version="1" comment="npm is &lt;10.9.2-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054082" version="1" comment="sqlite is &lt;3.34.1-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054083" version="1" comment="sqlite-devel is &lt;3.34.1-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054084" version="1" comment="sqlite-libs is &lt;3.34.1-9.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011264" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056197" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053250" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053507" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056198" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053508" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056199" version="1" comment="kernel-livepatch-6_4_0-150600_23_81-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056200" version="1" comment="kernel-livepatch-6_4_0-150600_23_84-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056292" version="1" comment="kernel-livepatch-6_4_0-150700_53_25-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056201" version="1" comment="kernel-livepatch-6_4_0-150700_53_28-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013274" version="1" comment="gdk-pixbuf2 is &lt;2.42.6-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013275" version="1" comment="gdk-pixbuf2-devel is &lt;2.42.6-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010013276" version="1" comment="gdk-pixbuf2-modules is &lt;2.42.6-6.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011646" version="1" comment="libxml2 is &lt;2.9.13-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011647" version="1" comment="libxml2-devel is &lt;2.9.13-11.el9_6 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011648" version="1" comment="python3-libxml2 is &lt;2.9.13-11.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054063" version="1" comment="ipa-client is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054064" version="1" comment="ipa-client-common is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054065" version="1" comment="ipa-client-encrypted-dns is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054066" version="1" comment="ipa-client-epn is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054067" version="1" comment="ipa-client-samba is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054068" version="1" comment="ipa-common is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054069" version="1" comment="ipa-selinux is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054070" version="1" comment="ipa-selinux-luna is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054071" version="1" comment="ipa-selinux-nfast is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054072" version="1" comment="ipa-server is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054073" version="1" comment="ipa-server-common is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054074" version="1" comment="ipa-server-dns is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054075" version="1" comment="ipa-server-encrypted-dns is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054076" version="1" comment="ipa-server-trust-ad is &lt;4.12.2-22.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054077" version="1" comment="python3-ipaclient is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054078" version="1" comment="python3-ipalib is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054079" version="1" comment="python3-ipaserver is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054080" version="1" comment="python3-ipatests is &lt;4.12.2-22.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010154" version="1" comment="firefox is &lt;128.13.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010155" version="1" comment="firefox-x11 is &lt;128.13.0-1.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011443" version="1" comment="thunderbird is &lt;128.13.0-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012469" version="1" comment="glibc is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012470" version="1" comment="glibc-all-langpacks is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012471" version="1" comment="glibc-benchtests is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012472" version="1" comment="glibc-common is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012473" version="1" comment="glibc-devel is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012474" version="1" comment="glibc-doc is &lt;2.34-168.el9_6.23 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012475" version="1" comment="glibc-gconv-extra is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012476" version="1" comment="glibc-headers is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012477" version="1" comment="glibc-langpack-aa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012478" version="1" comment="glibc-langpack-af is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012479" version="1" comment="glibc-langpack-agr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012480" version="1" comment="glibc-langpack-ak is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012481" version="1" comment="glibc-langpack-am is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012482" version="1" comment="glibc-langpack-an is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012483" version="1" comment="glibc-langpack-anp is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012484" version="1" comment="glibc-langpack-ar is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012485" version="1" comment="glibc-langpack-as is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012486" version="1" comment="glibc-langpack-ast is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012487" version="1" comment="glibc-langpack-ayc is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012488" version="1" comment="glibc-langpack-az is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012489" version="1" comment="glibc-langpack-be is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012490" version="1" comment="glibc-langpack-bem is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012491" version="1" comment="glibc-langpack-ber is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012492" version="1" comment="glibc-langpack-bg is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012493" version="1" comment="glibc-langpack-bhb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012494" version="1" comment="glibc-langpack-bho is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012495" version="1" comment="glibc-langpack-bi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012496" version="1" comment="glibc-langpack-bn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012497" version="1" comment="glibc-langpack-bo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012498" version="1" comment="glibc-langpack-br is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012499" version="1" comment="glibc-langpack-brx is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012500" version="1" comment="glibc-langpack-bs is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012501" version="1" comment="glibc-langpack-byn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012502" version="1" comment="glibc-langpack-ca is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012503" version="1" comment="glibc-langpack-ce is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012504" version="1" comment="glibc-langpack-chr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012505" version="1" comment="glibc-langpack-ckb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012506" version="1" comment="glibc-langpack-cmn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012507" version="1" comment="glibc-langpack-crh is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012508" version="1" comment="glibc-langpack-cs is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012509" version="1" comment="glibc-langpack-csb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012510" version="1" comment="glibc-langpack-cv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012511" version="1" comment="glibc-langpack-cy is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012512" version="1" comment="glibc-langpack-da is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012513" version="1" comment="glibc-langpack-de is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012514" version="1" comment="glibc-langpack-doi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012515" version="1" comment="glibc-langpack-dsb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012516" version="1" comment="glibc-langpack-dv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012517" version="1" comment="glibc-langpack-dz is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012518" version="1" comment="glibc-langpack-el is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012519" version="1" comment="glibc-langpack-en is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012520" version="1" comment="glibc-langpack-eo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012521" version="1" comment="glibc-langpack-es is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012522" version="1" comment="glibc-langpack-et is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012523" version="1" comment="glibc-langpack-eu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012524" version="1" comment="glibc-langpack-fa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012525" version="1" comment="glibc-langpack-ff is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012526" version="1" comment="glibc-langpack-fi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012527" version="1" comment="glibc-langpack-fil is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012528" version="1" comment="glibc-langpack-fo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012529" version="1" comment="glibc-langpack-fr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012530" version="1" comment="glibc-langpack-fur is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012531" version="1" comment="glibc-langpack-fy is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012532" version="1" comment="glibc-langpack-ga is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012533" version="1" comment="glibc-langpack-gd is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012534" version="1" comment="glibc-langpack-gez is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012535" version="1" comment="glibc-langpack-gl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012536" version="1" comment="glibc-langpack-gu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012537" version="1" comment="glibc-langpack-gv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012538" version="1" comment="glibc-langpack-ha is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012539" version="1" comment="glibc-langpack-hak is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012540" version="1" comment="glibc-langpack-he is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012541" version="1" comment="glibc-langpack-hi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012542" version="1" comment="glibc-langpack-hif is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012543" version="1" comment="glibc-langpack-hne is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012544" version="1" comment="glibc-langpack-hr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012545" version="1" comment="glibc-langpack-hsb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012546" version="1" comment="glibc-langpack-ht is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012547" version="1" comment="glibc-langpack-hu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012548" version="1" comment="glibc-langpack-hy is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012549" version="1" comment="glibc-langpack-ia is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012550" version="1" comment="glibc-langpack-id is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012551" version="1" comment="glibc-langpack-ig is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012552" version="1" comment="glibc-langpack-ik is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012553" version="1" comment="glibc-langpack-is is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012554" version="1" comment="glibc-langpack-it is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012555" version="1" comment="glibc-langpack-iu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012556" version="1" comment="glibc-langpack-ja is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012557" version="1" comment="glibc-langpack-ka is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012558" version="1" comment="glibc-langpack-kab is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012559" version="1" comment="glibc-langpack-kk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012560" version="1" comment="glibc-langpack-kl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012561" version="1" comment="glibc-langpack-km is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012562" version="1" comment="glibc-langpack-kn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012563" version="1" comment="glibc-langpack-ko is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012564" version="1" comment="glibc-langpack-kok is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012565" version="1" comment="glibc-langpack-ks is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012566" version="1" comment="glibc-langpack-ku is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012567" version="1" comment="glibc-langpack-kw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012568" version="1" comment="glibc-langpack-ky is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012569" version="1" comment="glibc-langpack-lb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012570" version="1" comment="glibc-langpack-lg is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012571" version="1" comment="glibc-langpack-li is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012572" version="1" comment="glibc-langpack-lij is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012573" version="1" comment="glibc-langpack-ln is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012574" version="1" comment="glibc-langpack-lo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012575" version="1" comment="glibc-langpack-lt is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012576" version="1" comment="glibc-langpack-lv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012577" version="1" comment="glibc-langpack-lzh is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012578" version="1" comment="glibc-langpack-mag is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012579" version="1" comment="glibc-langpack-mai is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012580" version="1" comment="glibc-langpack-mfe is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012581" version="1" comment="glibc-langpack-mg is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012582" version="1" comment="glibc-langpack-mhr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012583" version="1" comment="glibc-langpack-mi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012584" version="1" comment="glibc-langpack-miq is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012585" version="1" comment="glibc-langpack-mjw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012586" version="1" comment="glibc-langpack-mk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012587" version="1" comment="glibc-langpack-ml is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012588" version="1" comment="glibc-langpack-mn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012589" version="1" comment="glibc-langpack-mni is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012590" version="1" comment="glibc-langpack-mnw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012591" version="1" comment="glibc-langpack-mr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012592" version="1" comment="glibc-langpack-ms is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012593" version="1" comment="glibc-langpack-mt is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012594" version="1" comment="glibc-langpack-my is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012595" version="1" comment="glibc-langpack-nan is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012596" version="1" comment="glibc-langpack-nb is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012597" version="1" comment="glibc-langpack-nds is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012598" version="1" comment="glibc-langpack-ne is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012599" version="1" comment="glibc-langpack-nhn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012600" version="1" comment="glibc-langpack-niu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012601" version="1" comment="glibc-langpack-nl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012602" version="1" comment="glibc-langpack-nn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012603" version="1" comment="glibc-langpack-nr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012604" version="1" comment="glibc-langpack-nso is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012605" version="1" comment="glibc-langpack-oc is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012606" version="1" comment="glibc-langpack-om is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012607" version="1" comment="glibc-langpack-or is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012608" version="1" comment="glibc-langpack-os is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012609" version="1" comment="glibc-langpack-pa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012610" version="1" comment="glibc-langpack-pap is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012611" version="1" comment="glibc-langpack-pl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012612" version="1" comment="glibc-langpack-ps is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012613" version="1" comment="glibc-langpack-pt is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012614" version="1" comment="glibc-langpack-quz is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012615" version="1" comment="glibc-langpack-raj is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012616" version="1" comment="glibc-langpack-ro is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012617" version="1" comment="glibc-langpack-ru is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012618" version="1" comment="glibc-langpack-rw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012619" version="1" comment="glibc-langpack-sa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012620" version="1" comment="glibc-langpack-sah is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012621" version="1" comment="glibc-langpack-sat is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012622" version="1" comment="glibc-langpack-sc is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012623" version="1" comment="glibc-langpack-sd is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012624" version="1" comment="glibc-langpack-se is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012625" version="1" comment="glibc-langpack-sgs is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012626" version="1" comment="glibc-langpack-shn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012627" version="1" comment="glibc-langpack-shs is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012628" version="1" comment="glibc-langpack-si is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012629" version="1" comment="glibc-langpack-sid is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012630" version="1" comment="glibc-langpack-sk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012631" version="1" comment="glibc-langpack-sl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012632" version="1" comment="glibc-langpack-sm is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012633" version="1" comment="glibc-langpack-so is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012634" version="1" comment="glibc-langpack-sq is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012635" version="1" comment="glibc-langpack-sr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012636" version="1" comment="glibc-langpack-ss is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012637" version="1" comment="glibc-langpack-st is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012638" version="1" comment="glibc-langpack-sv is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012639" version="1" comment="glibc-langpack-sw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012640" version="1" comment="glibc-langpack-szl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012641" version="1" comment="glibc-langpack-ta is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012642" version="1" comment="glibc-langpack-tcy is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012643" version="1" comment="glibc-langpack-te is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012644" version="1" comment="glibc-langpack-tg is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012645" version="1" comment="glibc-langpack-th is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012646" version="1" comment="glibc-langpack-the is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012647" version="1" comment="glibc-langpack-ti is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012648" version="1" comment="glibc-langpack-tig is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012649" version="1" comment="glibc-langpack-tk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012650" version="1" comment="glibc-langpack-tl is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012651" version="1" comment="glibc-langpack-tn is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012652" version="1" comment="glibc-langpack-to is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012653" version="1" comment="glibc-langpack-tpi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012654" version="1" comment="glibc-langpack-tr is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012655" version="1" comment="glibc-langpack-ts is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012656" version="1" comment="glibc-langpack-tt is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012657" version="1" comment="glibc-langpack-ug is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012658" version="1" comment="glibc-langpack-uk is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012659" version="1" comment="glibc-langpack-unm is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012660" version="1" comment="glibc-langpack-ur is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012661" version="1" comment="glibc-langpack-uz is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012662" version="1" comment="glibc-langpack-ve is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012663" version="1" comment="glibc-langpack-vi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012664" version="1" comment="glibc-langpack-wa is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012665" version="1" comment="glibc-langpack-wae is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012666" version="1" comment="glibc-langpack-wal is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012667" version="1" comment="glibc-langpack-wo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012668" version="1" comment="glibc-langpack-xh is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012669" version="1" comment="glibc-langpack-yi is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012670" version="1" comment="glibc-langpack-yo is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012671" version="1" comment="glibc-langpack-yue is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012672" version="1" comment="glibc-langpack-yuw is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012673" version="1" comment="glibc-langpack-zh is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012674" version="1" comment="glibc-langpack-zu is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012675" version="1" comment="glibc-locale-source is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012676" version="1" comment="glibc-minimal-langpack is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012677" version="1" comment="glibc-nss-devel is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012678" version="1" comment="glibc-static is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012679" version="1" comment="glibc-utils is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012680" version="1" comment="libnsl is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012681" version="1" comment="nscd is &lt;2.34-168.el9_6.23 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012682" version="1" comment="nss_db is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012683" version="1" comment="nss_hesiod is &lt;2.34-168.el9_6.23 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017017" version="1" comment="libudisks2 is &lt;2.9.4-11.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017018" version="1" comment="libudisks2-devel is &lt;2.9.4-11.el9_6.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017019" version="1" comment="udisks2 is &lt;2.9.4-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017020" version="1" comment="udisks2-iscsi is &lt;2.9.4-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017021" version="1" comment="udisks2-lsm is &lt;2.9.4-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017022" version="1" comment="udisks2-lvm2 is &lt;2.9.4-11.el9_6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054127" version="1" comment="libtiff is &lt;4.4.0-15.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054128" version="1" comment="libtiff-devel is &lt;4.4.0-15.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054129" version="1" comment="libtiff-tools is &lt;4.4.0-15.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017023" version="1" comment="python-unversioned-command is &lt;3.9.21-2.el9_6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017024" version="1" comment="python3 is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017025" version="1" comment="python3-debug is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017026" version="1" comment="python3-devel is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017027" version="1" comment="python3-idle is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017028" version="1" comment="python3-libs is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017029" version="1" comment="python3-test is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017030" version="1" comment="python3-tkinter is &lt;3.9.21-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017010" version="1" comment="python3.11 is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017011" version="1" comment="python3.11-debug is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017012" version="1" comment="python3.11-devel is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017013" version="1" comment="python3.11-idle is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017014" version="1" comment="python3.11-libs is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017015" version="1" comment="python3.11-test is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017016" version="1" comment="python3.11-tkinter is &lt;3.11.11-2.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017003" version="1" comment="python3.12 is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017004" version="1" comment="python3.12-debug is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017005" version="1" comment="python3.12-devel is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017006" version="1" comment="python3.12-idle is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017007" version="1" comment="python3.12-libs is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017008" version="1" comment="python3.12-test is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017009" version="1" comment="python3.12-tkinter is &lt;3.12.9-1.el9_6.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054488" version="1" comment="python3.12 is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054489" version="1" comment="python3.12-debug is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054490" version="1" comment="python3.12-devel is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054491" version="1" comment="python3.12-idle is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054492" version="1" comment="python3.12-libs is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054493" version="1" comment="python3.12-test is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054494" version="1" comment="python3.12-tkinter is &lt;3.12.12-1.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054875" version="1" comment="curl is &lt;7.76.1-35.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054876" version="1" comment="curl-minimal is &lt;7.76.1-35.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054877" version="1" comment="libcurl is &lt;7.76.1-35.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054878" version="1" comment="libcurl-devel is &lt;7.76.1-35.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054879" version="1" comment="libcurl-minimal is &lt;7.76.1-35.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016333" version="1" comment="firefox is &lt;128.14.0-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016334" version="1" comment="firefox-x11 is &lt;128.14.0-2.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010016097" version="1" comment="thunderbird is &lt;128.14.0-3.el9_6 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055166" version="1" comment="edk2-ovmf is &lt;20241117-4.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055167" version="1" comment="edk2-tools is &lt;20241117-4.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055168" version="1" comment="edk2-tools-doc is &lt;20241117-4.el9_7.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054173" version="1" comment="openssl is &lt;3.5.1-4.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054174" version="1" comment="openssl-devel is &lt;3.5.1-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054175" version="1" comment="openssl-libs is &lt;3.5.1-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054176" version="1" comment="openssl-perl is &lt;3.5.1-4.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054278" version="1" comment="libxml2 is &lt;2.9.13-14.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054279" version="1" comment="libxml2-devel is &lt;2.9.13-14.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054280" version="1" comment="python3-libxml2 is &lt;2.9.13-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055111" version="1" comment="libsoup is &lt;2.72.0-12.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055112" version="1" comment="libsoup-devel is &lt;2.72.0-12.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055664" version="1" comment="gimp is &lt;3.0.4-1.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055665" version="1" comment="gimp-libs is &lt;3.0.4-1.el9_7.4 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055483" version="1" comment="protobuf is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055484" version="1" comment="protobuf-compiler is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055485" version="1" comment="protobuf-devel is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055486" version="1" comment="protobuf-lite is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055487" version="1" comment="protobuf-lite-devel is &lt;3.14.0-17.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055488" version="1" comment="python3-protobuf is &lt;3.14.0-17.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056002" version="1" comment="nodejs is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056003" version="1" comment="nodejs-devel is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056004" version="1" comment="nodejs-docs is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056005" version="1" comment="nodejs-full-i18n is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056006" version="1" comment="nodejs-libs is &lt;24.14.1-2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056007" version="1" comment="nodejs-nodemon is &lt;3.0.3-3.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056008" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056009" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056010" version="1" comment="npm is &lt;11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055991" version="1" comment="v8-12.4-devel is &lt;12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056011" version="1" comment="v8-13.6-devel is &lt;13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055678" version="1" comment="nginx is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055679" version="1" comment="nginx-all-modules is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055680" version="1" comment="nginx-core is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055681" version="1" comment="nginx-filesystem is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055682" version="1" comment="nginx-mod-devel is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055683" version="1" comment="nginx-mod-http-image-filter is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055684" version="1" comment="nginx-mod-http-perl is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055685" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055686" version="1" comment="nginx-mod-mail is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055687" version="1" comment="nginx-mod-stream is &lt;1.26.3-2.module+el9.7.0+24008+f3da7534 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055113" version="1" comment="keylime is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055114" version="1" comment="keylime-base is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055115" version="1" comment="keylime-registrar is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055116" version="1" comment="keylime-selinux is &lt;7.12.1-11.el9_7.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055117" version="1" comment="keylime-tenant is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055118" version="1" comment="keylime-verifier is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055119" version="1" comment="python3-keylime is &lt;7.12.1-11.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055634" version="1" comment="postgresql is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055635" version="1" comment="postgresql-contrib is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055636" version="1" comment="postgresql-docs is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055637" version="1" comment="postgresql-plperl is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055638" version="1" comment="postgresql-plpython3 is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055639" version="1" comment="postgresql-pltcl is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055640" version="1" comment="postgresql-private-devel is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055641" version="1" comment="postgresql-private-libs is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055642" version="1" comment="postgresql-server is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055643" version="1" comment="postgresql-server-devel is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055644" version="1" comment="postgresql-static is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055645" version="1" comment="postgresql-test is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055646" version="1" comment="postgresql-test-rpm-macros is &lt;16.13-1.module+el9.7.0+24031+188c384c for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055647" version="1" comment="postgresql-upgrade is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055648" version="1" comment="postgresql-upgrade-devel is &lt;16.13-1.module+el9.7.0+24031+188c384c for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055810" version="1" comment="mecab is &lt;0.996-3.module+el9.7.0+24088+36dcab8d.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055811" version="1" comment="mecab-devel is &lt;0.996-3.module+el9.7.0+24088+36dcab8d.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055812" version="1" comment="mecab-ipadic is &lt;2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055813" version="1" comment="mecab-ipadic-EUCJP is &lt;2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055814" version="1" comment="mysql is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055815" version="1" comment="mysql-common is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055816" version="1" comment="mysql-devel is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055817" version="1" comment="mysql-errmsg is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055818" version="1" comment="mysql-libs is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055819" version="1" comment="mysql-server is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055820" version="1" comment="mysql-test is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055821" version="1" comment="mysql-test-data is &lt;8.4.8-1.module+el9.7.0+24088+36dcab8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055822" version="1" comment="rapidjson-devel is &lt;1.1.0-19.module+el9.7.0+24088+36dcab8d for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055823" version="1" comment="rapidjson-doc is &lt;1.1.0-19.module+el9.7.0+24088+36dcab8d for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055509" version="1" comment="libpng is &lt;1.6.37-12.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055510" version="1" comment="libpng-devel is &lt;1.6.37-12.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055900" version="1" comment="freerdp is &lt;2.11.7-1.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055901" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055902" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055903" version="1" comment="libwinpr is &lt;2.11.7-1.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055904" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9_7.5 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055478" version="1" comment="freerdp is &lt;2.11.7-1.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055479" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055480" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055481" version="1" comment="libwinpr is &lt;2.11.7-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055482" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053509" version="1" comment="kernel-livepatch-5_14_21-150500_55_136-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056202" version="1" comment="kernel-default is ==6.4.0-150600.23.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056203" version="1" comment="kernel-livepatch-6_4_0-150600_23_87-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056204" version="1" comment="kernel-default is &lt;6.4.0-150600.23.87.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053510" version="1" comment="kernel-default is ==6.4.0-150700.53.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053511" version="1" comment="kernel-livepatch-6_4_0-150700_53_31-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053251" version="1" comment="kernel-default is ==5.14.21-150400.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053252" version="1" comment="kernel-livepatch-5_14_21-150400_24_194-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053253" version="1" comment="kernel-default is &lt;5.14.21-150400.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054995" version="1" comment="fence-agents-aliyun is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054996" version="1" comment="fence-agents-all is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054997" version="1" comment="fence-agents-amt-ws is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054998" version="1" comment="fence-agents-apc is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010054999" version="1" comment="fence-agents-apc-snmp is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055000" version="1" comment="fence-agents-aws is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055001" version="1" comment="fence-agents-azure-arm is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055002" version="1" comment="fence-agents-bladecenter is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055003" version="1" comment="fence-agents-brocade is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055004" version="1" comment="fence-agents-cisco-mds is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055005" version="1" comment="fence-agents-cisco-ucs is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055006" version="1" comment="fence-agents-common is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055007" version="1" comment="fence-agents-compute is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055008" version="1" comment="fence-agents-drac5 is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055009" version="1" comment="fence-agents-eaton-snmp is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055010" version="1" comment="fence-agents-emerson is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055011" version="1" comment="fence-agents-eps is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055012" version="1" comment="fence-agents-gce is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055013" version="1" comment="fence-agents-heuristics-ping is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055014" version="1" comment="fence-agents-hpblade is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055015" version="1" comment="fence-agents-ibm-powervs is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055016" version="1" comment="fence-agents-ibm-vpc is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055017" version="1" comment="fence-agents-ibmblade is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055018" version="1" comment="fence-agents-ifmib is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055019" version="1" comment="fence-agents-ilo-moonshot is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055020" version="1" comment="fence-agents-ilo-mp is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055021" version="1" comment="fence-agents-ilo-ssh is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055022" version="1" comment="fence-agents-ilo2 is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055023" version="1" comment="fence-agents-intelmodular is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055024" version="1" comment="fence-agents-ipdu is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055025" version="1" comment="fence-agents-ipmilan is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055026" version="1" comment="fence-agents-kdump is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055027" version="1" comment="fence-agents-kubevirt is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055028" version="1" comment="fence-agents-lpar is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055029" version="1" comment="fence-agents-mpath is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055030" version="1" comment="fence-agents-nutanix-ahv is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055031" version="1" comment="fence-agents-openstack is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055032" version="1" comment="fence-agents-redfish is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055033" version="1" comment="fence-agents-rhevm is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055034" version="1" comment="fence-agents-rsa is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055035" version="1" comment="fence-agents-rsb is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055036" version="1" comment="fence-agents-sbd is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055037" version="1" comment="fence-agents-scsi is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055038" version="1" comment="fence-agents-virsh is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055039" version="1" comment="fence-agents-vmware-rest is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055040" version="1" comment="fence-agents-vmware-soap is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055041" version="1" comment="fence-agents-wti is &lt;4.10.0-98.el9_7.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055042" version="1" comment="fence-virt is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055043" version="1" comment="fence-virtd is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055044" version="1" comment="fence-virtd-cpg is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055045" version="1" comment="fence-virtd-libvirt is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055046" version="1" comment="fence-virtd-multicast is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055047" version="1" comment="fence-virtd-serial is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055048" version="1" comment="fence-virtd-tcp is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055049" version="1" comment="ha-cloud-support is &lt;4.10.0-98.el9_7.5 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055507" version="1" comment="python3-pyasn1 is &lt;0.4.8-7.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055508" version="1" comment="python3-pyasn1-modules is &lt;0.4.8-7.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055072" version="1" comment="freerdp is &lt;2.11.7-1.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055073" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055074" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055075" version="1" comment="libwinpr is &lt;2.11.7-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055076" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055804" version="1" comment="opencryptoki is &lt;3.25.0-4.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055805" version="1" comment="opencryptoki-ccatok is &lt;3.25.0-4.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055806" version="1" comment="opencryptoki-devel is &lt;3.25.0-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055807" version="1" comment="opencryptoki-icsftok is &lt;3.25.0-4.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055808" version="1" comment="opencryptoki-libs is &lt;3.25.0-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055809" version="1" comment="opencryptoki-swtok is &lt;3.25.0-4.el9_7.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055065" version="1" comment="python3.12-wheel is &lt;0.41.2-3.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055066" version="1" comment="python3.12-wheel-wheel is &lt;0.41.2-3.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055502" version="1" comment="firefox is &lt;140.8.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055503" version="1" comment="firefox-x11 is &lt;140.8.0-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055702" version="1" comment="libvpx is &lt;1.9.0-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055703" version="1" comment="libvpx-devel is &lt;1.9.0-10.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055547" version="1" comment="thunderbird is &lt;140.8.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055440" version="1" comment="munge is &lt;0.5.13-14.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055441" version="1" comment="munge-devel is &lt;0.5.13-14.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055442" version="1" comment="munge-libs is &lt;0.5.13-14.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055439" version="1" comment="libpng15 is &lt;1.5.30-14.el9_7.1 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055981" version="1" comment="git-lfs is &lt;3.6.1-8.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055905" version="1" comment="grafana is &lt;10.2.6-19.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055907" version="1" comment="grafana-pcp is &lt;5.1.1-13.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055906" version="1" comment="grafana-selinux is &lt;10.2.6-19.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055799" version="1" comment="vim-X11 is &lt;8.2.2637-23.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055800" version="1" comment="vim-common is &lt;8.2.2637-23.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055801" version="1" comment="vim-enhanced is &lt;8.2.2637-23.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055802" version="1" comment="vim-filesystem is &lt;8.2.2637-23.el9_7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055803" version="1" comment="vim-minimal is &lt;8.2.2637-23.el9_7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055688" version="1" comment="aspnetcore-runtime-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055716" version="1" comment="aspnetcore-runtime-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055689" version="1" comment="aspnetcore-runtime-dbg-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055717" version="1" comment="aspnetcore-runtime-dbg-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055690" version="1" comment="aspnetcore-targeting-pack-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055718" version="1" comment="aspnetcore-targeting-pack-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055691" version="1" comment="dotnet-apphost-pack-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055719" version="1" comment="dotnet-apphost-pack-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055692" version="1" comment="dotnet-host is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055693" version="1" comment="dotnet-hostfxr-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055720" version="1" comment="dotnet-hostfxr-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055694" version="1" comment="dotnet-runtime-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055721" version="1" comment="dotnet-runtime-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055695" version="1" comment="dotnet-runtime-dbg-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055722" version="1" comment="dotnet-runtime-dbg-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055696" version="1" comment="dotnet-sdk-10.0 is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055697" version="1" comment="dotnet-sdk-10.0-source-built-artifacts is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055723" version="1" comment="dotnet-sdk-9.0 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055724" version="1" comment="dotnet-sdk-9.0-source-built-artifacts is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055698" version="1" comment="dotnet-sdk-aot-10.0 is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055725" version="1" comment="dotnet-sdk-aot-9.0 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055699" version="1" comment="dotnet-sdk-dbg-10.0 is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055726" version="1" comment="dotnet-sdk-dbg-9.0 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055700" version="1" comment="dotnet-targeting-pack-10.0 is &lt;10.0.4-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055727" version="1" comment="dotnet-targeting-pack-9.0 is &lt;9.0.14-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055701" version="1" comment="dotnet-templates-10.0 is &lt;10.0.104-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055728" version="1" comment="dotnet-templates-9.0 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055729" version="1" comment="netstandard-targeting-pack-2.1 is &lt;9.0.115-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055704" version="1" comment="aspnetcore-runtime-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055705" version="1" comment="aspnetcore-runtime-dbg-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055706" version="1" comment="aspnetcore-targeting-pack-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055707" version="1" comment="dotnet-apphost-pack-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055708" version="1" comment="dotnet-hostfxr-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055709" version="1" comment="dotnet-runtime-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055710" version="1" comment="dotnet-runtime-dbg-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055711" version="1" comment="dotnet-sdk-8.0 is &lt;8.0.125-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055712" version="1" comment="dotnet-sdk-8.0-source-built-artifacts is &lt;8.0.125-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055713" version="1" comment="dotnet-sdk-dbg-8.0 is &lt;8.0.125-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055714" version="1" comment="dotnet-targeting-pack-8.0 is &lt;8.0.25-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055715" version="1" comment="dotnet-templates-8.0 is &lt;8.0.125-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055834" version="1" comment="freerdp is &lt;2.11.7-1.el9_7.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055835" version="1" comment="freerdp-devel is &lt;2.11.7-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055836" version="1" comment="freerdp-libs is &lt;2.11.7-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055837" version="1" comment="libwinpr is &lt;2.11.7-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055838" version="1" comment="libwinpr-devel is &lt;2.11.7-1.el9_7.3 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055992" version="1" comment="nginx is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055993" version="1" comment="nginx-all-modules is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055994" version="1" comment="nginx-core is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055995" version="1" comment="nginx-filesystem is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055996" version="1" comment="nginx-mod-devel is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055997" version="1" comment="nginx-mod-http-image-filter is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055998" version="1" comment="nginx-mod-http-perl is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055999" version="1" comment="nginx-mod-http-xslt-filter is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056000" version="1" comment="nginx-mod-mail is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056001" version="1" comment="nginx-mod-stream is &lt;1.26.3-2.module+el9.7.0+24173+4204b761.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055982" version="1" comment="nodejs is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055983" version="1" comment="nodejs-devel is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055984" version="1" comment="nodejs-docs is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055985" version="1" comment="nodejs-full-i18n is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055986" version="1" comment="nodejs-libs is &lt;22.22.2-1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055987" version="1" comment="nodejs-nodemon is &lt;3.0.1-1.module+el9.7.0+24157+8ddb2461 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055988" version="1" comment="nodejs-packaging is &lt;2021.06-6.module+el9.7.0+24157+8ddb2461 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055989" version="1" comment="nodejs-packaging-bundler is &lt;2021.06-6.module+el9.7.0+24157+8ddb2461 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055990" version="1" comment="npm is &lt;10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055890" version="1" comment="gstreamer1-plugins-bad-free is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055891" version="1" comment="gstreamer1-plugins-bad-free-devel is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055892" version="1" comment="gstreamer1-plugins-bad-free-libs is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055893" version="1" comment="gstreamer1-plugins-base is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055894" version="1" comment="gstreamer1-plugins-base-devel is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055895" version="1" comment="gstreamer1-plugins-base-tools is &lt;1.22.12-5.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055896" version="1" comment="gstreamer1-plugins-good is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055897" version="1" comment="gstreamer1-plugins-good-gtk is &lt;1.22.12-5.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055898" version="1" comment="gstreamer1-plugins-ugly-free is &lt;1.22.12-4.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009065799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055951" version="1" comment="crun is &lt;1.27-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055899" version="1" comment="squid is &lt;5.5-22.el9_7.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056376" version="1" comment="firefox is &lt;140.9.1-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056377" version="1" comment="firefox-x11 is &lt;140.9.1-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055911" version="1" comment="openssh is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055912" version="1" comment="openssh-askpass is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055913" version="1" comment="openssh-clients is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055914" version="1" comment="openssh-keycat is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055915" version="1" comment="openssh-server is &lt;8.7p1-48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055916" version="1" comment="pam_ssh_agent_auth is &lt;0.10.4-5.48.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055873" version="1" comment="thunderbird is &lt;140.9.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055786" version="1" comment="bsdtar is &lt;3.5.3-7.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055787" version="1" comment="libarchive is &lt;3.5.3-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055788" version="1" comment="libarchive-devel is &lt;3.5.3-7.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055953" version="1" comment="python-unversioned-command is &lt;3.9.25-3.el9_7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055954" version="1" comment="python3 is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055955" version="1" comment="python3-debug is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055956" version="1" comment="python3-devel is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055957" version="1" comment="python3-idle is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055958" version="1" comment="python3-libs is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055959" version="1" comment="python3-test is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055960" version="1" comment="python3-tkinter is &lt;3.9.25-3.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055883" version="1" comment="python3.11 is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055884" version="1" comment="python3.11-debug is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055885" version="1" comment="python3.11-devel is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055886" version="1" comment="python3.11-idle is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055887" version="1" comment="python3.11-libs is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055888" version="1" comment="python3.11-test is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055889" version="1" comment="python3.11-tkinter is &lt;3.11.13-5.2.el9_7 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055876" version="1" comment="python3.12 is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055877" version="1" comment="python3.12-debug is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055878" version="1" comment="python3.12-devel is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055879" version="1" comment="python3.12-idle is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055880" version="1" comment="python3.12-libs is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055881" version="1" comment="python3.12-test is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055882" version="1" comment="python3.12-tkinter is &lt;3.12.12-4.el9_7.2 for i686,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056205" version="1" comment="cockpit is &lt;344-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056206" version="1" comment="cockpit-bridge is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056207" version="1" comment="cockpit-doc is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056208" version="1" comment="cockpit-packagekit is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056209" version="1" comment="cockpit-storaged is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056210" version="1" comment="cockpit-system is &lt;344-2.el9_7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056211" version="1" comment="cockpit-ws is &lt;344-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056212" version="1" comment="cockpit-ws-selinux is &lt;344-2.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055824" version="1" comment="firefox is &lt;140.9.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010055825" version="1" comment="firefox-x11 is &lt;140.9.0-1.el9_7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250204"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>httpd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_proxy_html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sll-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-unversioned-command</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find-Rule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-jsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-jsc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>edk2-ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>edk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>edk2-tools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbguard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_58-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfastjson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-workstation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkadm5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-abi-stablelists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-cross-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-uki-virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-tools-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-uki-virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-perf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lldpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-full-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-nodemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-gvproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_76-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-databind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-jaxrs-json-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-jaxrs-providers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-jackson-module-jaxb-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-dbg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-ffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mysqlnd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-process</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dnssec-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dnssec-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>turbojpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibRaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-bundled-gems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-default-gems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bigdecimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-io-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-irb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-minitest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mysql2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mysql2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-pg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-power_assert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-psych</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rexml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-test-unit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-typeprof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygems-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-libdns_sd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-packaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-packaging-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-gpu-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-gpu-pci-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-display-virtio-vga-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-usb-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-device-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-ui-egl-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-pr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-apidocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-fapolicyd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-ima</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-syslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-plugin-systemd-inhibit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-sign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-sign-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-X11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-enhanced</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-servlet-4.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-servlet-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf2-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-libgcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-gcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-gcc-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-libgcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-embedded-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-gssapi-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-oqgraph-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-winsupport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_162-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_186-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_189-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_216-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_163-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_166-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_169-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_172-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_175-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_178-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_191-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_197-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_36-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_59-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcs-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lzma-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-private-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-upgrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-syntax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-utf16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-utf32</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-mapi-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openchange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-common-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dcerpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb5-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ldb-ldap-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-usershares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vfs-iouring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-krb5-locator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winexe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netstandard-targeting-pack-2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-lfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-toolset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>toolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>toolbox-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ignition</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-errmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-appliance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-inspect-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rescue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-xfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v-man-pages-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-win-reg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xdmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xephyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xnest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xorg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-6.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-libsecret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-instaweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-subtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Git-SVN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>swtpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-jss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-ldapjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-acme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-est</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-kra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-pki-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>idm-tomcatjss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idm-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_dav_svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-resize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-acme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-base-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-kra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-symkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pki-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yajl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-agent-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-kafka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmfields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmjsonparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmkubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmnormalize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mmsnmptrapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-omamqp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-dane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-bdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-srpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-arbitrator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-site</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>booth-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-cdboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-efi-x64-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-pc-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-tools-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-upgrade-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ipptool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-lpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-printerapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl100-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl1000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl105-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl135-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl2030-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl3160-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5000-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl5150-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2a-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6000g2b-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl6050-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iwl7260-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libertas-sd8787-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-firmware-whence</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netronome-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>butane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-c++-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-term</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-catatonit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot-pigeonhole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containernetworking-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-broker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apcu-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-apcu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-apcu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-rrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-xdebug3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-sdmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autotrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-plugin-flashrom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_123-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-debug-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-modules-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-uki-virt-addons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnupg2-smime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-registrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tenant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-verifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_131-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aliyun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-amt-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-apc-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-aws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-azure-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-bladecenter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-brocade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-mds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-cisco-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-drac5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eaton-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-emerson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-gce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-heuristics-ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-hpblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibm-powervs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibm-vpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ibmblade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ifmib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-moonshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-mp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ilo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-intelmodular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipdu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-ipmilan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-kubevirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-openstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-redfish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rhevm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-rsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-sbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-virsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-vmware-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-wti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-cpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-multicast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-serial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-virtd-tcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ha-cloud-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qatzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qatzip-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>frr-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-multipath-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kpartx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-oomd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-resolved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-mako</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-7.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-7.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-cpuguy83-md2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>delve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-all-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-image-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-http-xslt-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-mod-stream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-rest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-server-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pixman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-lucid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_159-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_219-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_222-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_225-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_228-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_174-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_128-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_231-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_234-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_237-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_244-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_247-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_250-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_182-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_185-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_198-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_94-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_255-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_258-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_261-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_266-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_269-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_272-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_204-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_207-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_211-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_215-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_218-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_275-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_221-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_280-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_283-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_290-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_184-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_187-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-softokn-freebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtpms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_137-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw-binutils-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw-filesystem-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw-w64-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-crt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-libffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-libstdc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-winpthreads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw32-winpthreads-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-crt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-libffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-libstdc++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-winpthreads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mingw64-winpthreads-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_168-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libeconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-python-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pg_repack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgres-decoderbufs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2.3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4.0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-keycat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh_agent_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_http2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-obexd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-session-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-dvipdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-tools-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-fips-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm-block-blkio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dmidecode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-CPAN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTTP-Tiny</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>adwaita-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadwaita-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-qt5-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyqt5-sip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qgnomeplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-assistant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-doctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qdbusviewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qt3d-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtbase-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtconnectivity-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdeclarative-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtgraphicaleffects-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtimageformats-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtlocation-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtmultimedia-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtquickcontrols2-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtscript-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsensors-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialbus-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtserialport-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtsvg-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-designercomponents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-libs-help</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttools-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qttranslations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwayland-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebchannel-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtwebsockets-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtx11extras-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt5-qtxmlpatterns-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests+security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests+socks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alphalph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anyfontsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atbegshi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-atveryend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auxhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-awesomebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigintcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-capt-of</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-htmlxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009054953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorprofiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctablestack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dehyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-environ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqparbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etexcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finstrut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotehyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garuda-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gettitlestring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glyphlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grffile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobsub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009055982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hologo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hycolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-infwarerr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvdefinekeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvoptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kvsetkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-letltxmacro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linegoal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lineno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltabptch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahbtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex85</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minitoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-needspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newunicodechar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-norasi-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notoccite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-passivetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009056995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcolmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfescape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftexcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-arrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ragged2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rerunfilecheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathaccent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009057917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ini-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-common-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-docindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-msg-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-scripts-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trimspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uniquecounter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-updmap-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upquote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy2-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librabbitmq-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-8.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-base-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cjose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-lockd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libsss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssdconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-common-pac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-idp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-nfs-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-passkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-polkit-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ca-certificates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clippy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-debugger-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-lldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static-wasm32-unknown-unknown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static-wasm32-wasi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-toolset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustfmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-ng-i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_proxy_cluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-pmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-pmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pmix-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>motif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-dyndb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-all-langpacks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-benchtests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-gconv-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-headers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-agr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-an</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-anp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ayc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-az</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-be</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bhb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bho</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-brx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-byn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-chr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ckb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cmn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-crh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-csb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-doi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-fy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-hy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-iu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-kw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-li</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-lzh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mfe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mhr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-miq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mjw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mnw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-my</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nhn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-niu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-oc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-os</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-quz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-raj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-se</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-shn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-shs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-so</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-sw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-szl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tcy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-the</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-to</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-tt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-unm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-uz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-wo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-yuw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-zh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-langpack-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-minimal-langpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_hesiod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvisor-tap-vsock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exfatprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>traceroute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils-subid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow-utils-subid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Attribute-Handlers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-AutoLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-AutoSplit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-B</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Benchmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Class-Struct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-Extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBM_Filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Devel-Peek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Devel-SelfStubber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DirHandle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Dumpvalue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DynaLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-English</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Errno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Constant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-Miniperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Fcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Basename</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Compare</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Copy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-DosGlob</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Find</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-stat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FileCache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FileHandle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FindBin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GDBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Getopt-Std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Hash-Util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Hash-Util-FieldHash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-Collate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-LangTags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-I18N-Langinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IPC-Open3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Locale-Maketext-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Math-Complex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Memoize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Loaded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-NDBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-NEXT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ODBM_File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Opcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-POSIX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Functions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Pod-Html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Safe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Search-Dict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SelectSaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SelfLoader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-Complete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Term-ReadLine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Text-Abbrev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Thread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Thread-Semaphore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie-File</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tie-Memoize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Time-Piece</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Unicode-UCD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-User-pwent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-autouse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-blib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-deprecate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-diagnostics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-encoding-warnings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-fields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-filetest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-if</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-interpreter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libnetcfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-meta-notation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-mro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-open</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-overload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-overloading</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-sigtrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-sort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-subs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-vars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-vmsish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1.8.0-openjdk-accessibility-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjose-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-cdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-lmdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-perl-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbdfuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libnbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libnbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_5-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_293-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-epn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-trust-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipalib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipaserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipatests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tracker-miners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jwcrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2graphite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2influxdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2spark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2zabbix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-zabbix-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-geolocate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-collectl2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-ganglia2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-activemq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bind2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bpf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cifs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dbping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-denki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-ds389log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-elasticsearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-farm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-gpsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-hacluster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-infiniband</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lmsensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-lustrecomm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mailq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-memcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mongodb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-named</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-netfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nfsclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-nvidia-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rabbitmq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-resctrl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-roomtemp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-shping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-statsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-summary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-weblog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zimbra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-zswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhel-net-naming-sysattrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-boot-unsigned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-tkinter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-bad-free-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-plugins-ugly-free</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer1-rtsp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-icsftok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-swtok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-plugins-pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-selinux-luna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-selinux-nfast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-pecl-redis6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-8.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync-rrsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grafana-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbpf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeglut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oci-seccomp-bpf-hook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-fips-provider-so</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-racc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-packagekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-storaged</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-PyMySQL+rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-PyMySQL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-PyMySQL+rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-classic-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-apps-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-auto-move-windows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-classification-banner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-custom-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-dash-to-dock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-dash-to-panel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-drive-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-gesture-inhibitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-heads-up-display</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-launch-new-instance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-native-window-placement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-panel-favorites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-places-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-screenshot-window-sizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-systemMonitor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-top-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-updates-dialog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-user-theme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-window-list</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-windowsNavigator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-extension-workspace-indicator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-adsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-cloud-setup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-connectivity-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-config-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-dispatcher-routing-rules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-initscripts-updown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libnm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-team</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wifi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-wwan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-compiler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keepalived</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-lanserv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-9.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-aot-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-9.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_200-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-App-cpanminus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-export-pcp2openmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-uwsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-ppd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-atomic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-cpu-partitioning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-profiles-spectrumscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tuned-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iptraf-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.11-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-setuptools-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-update-icon-cache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk3-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-ssh-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aardvark-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-libreswan-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-13-binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-14-binutils-gprofng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-15-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-15-binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-15-binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc-toolset-15-binutils-gprofng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils-coreos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfsv4-client-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis-upgrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgis-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-base-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-ipadic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mecab-ipadic-EUCJP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-test-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rapidjson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rapidjson-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc-zip-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-src-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-static-libs-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-12.4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvisor-tap-vsock-gvforwarder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>weldr-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bootc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bootupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-agent-rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ostree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ostree-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-reinstall-bootc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosync-vqsim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosynclib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corosynclib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yelp-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-chroot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-dnssec-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind9.18-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-JSON-XS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-client-encrypted-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipa-server-encrypted-dns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-ukify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils-ninfod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-lpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-rpm-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-srpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_security-mlogc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-remote-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v8-13.6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mod_md</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-kdcproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-fs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-loop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-lvm-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mdraid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvdimm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-nvme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-part</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-plugins-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-swap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblockdev-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-blockdev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>image-builder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brotli-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-crypto-adapter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-crypto-adapter-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-crypto-adapter-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-javadoc-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-static-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-static-libs-fastdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-static-libs-slowdebug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fence-agents-nutanix-ahv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jmc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpsd-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpsd-minimal-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capstone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capstone-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>capstone-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-capstone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009065353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencryptoki-ccatok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3.12-wheel-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-runtime-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspnetcore-targeting-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-apphost-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-hostfxr-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-runtime-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-10.0-source-built-artifacts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-aot-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-sdk-dbg-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-targeting-pack-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dotnet-templates-10.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws-selinux</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.2.3-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.5-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.3.1-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.34-19.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-14.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-17.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-20.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-23.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-18.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-18.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-18.7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-25.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-22.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.71-12.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.71-12.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.12-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-31.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-15.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.8-10.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230524-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230524-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-10.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-10.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-10.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-18.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.10-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.10-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-31.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.9-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.9-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.71-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.71-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.13.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.13.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.13.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.16.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.19-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.11.0-1.16.16.0.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.124.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.4.12.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.6.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.6.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27.0-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.20-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.15-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-17.b1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-17.b1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-284.11.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.11.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.11.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.70.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.90-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.90-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.20.2-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.26-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.4-1.module+el9.1.0+15737+76195479</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.4-1.module+el9.1.0+15737+76195479</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-1.module+el9.1.0+15737+76195479</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-1.module+el9.1.0+15737+76195479</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.0-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-162.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.26-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-15.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-15.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-2.module+el9.2.0.z+18497+a402347c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-2.module+el9.2.0.z+18497+a402347c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.1.0+15718+e52ec601</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1.3-27.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1.3-27.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.1.3-27.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.11.2-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.11.2-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20221207gitfff6d81270b5-9.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20221207gitfff6d81270b5-9.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.4.3.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4-10.git1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.99.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.50-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.4-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.6-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.18.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.2-1.16.18.1.3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.0.1-11.2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.11-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.16-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.90-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.90-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-0.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-8.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-8.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-8.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.42.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.42.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.42.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.40.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.40.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.40.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.24.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.24.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.24.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.28.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.28.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.28.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-362.8.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.8.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.8.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.11.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.26.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.26.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.26.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.31.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.31.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.31.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20220809-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.22.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.22.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-16.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-16.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-4.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.0-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-4.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-4.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.17.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.17.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-9.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.5-8.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.5-8.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-41.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-41.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.46.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.46.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.1-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.7-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.37-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.37-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-102.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-102.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-40.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-102.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.7-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.107-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.4.15.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.4.9.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.12-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.12-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-16.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-16.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.10.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.4-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-5.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.26.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.26.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230808-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.40.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3-41.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.30-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.332.b09-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0.10-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.3.0.7-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.342.b07-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.16.0.8-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.4.0.8-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.32-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.17.0.8-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.5.0.8-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.352.b08-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.11.0-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.2-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.4-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.4-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.7-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.2-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-14.el9_0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-14.el9_0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.5-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.105-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.31.1-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9.4-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0-3.20211109gitb79fd91.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:366-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.6-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-13.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-13.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.17-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.17-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.17-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2102.0-101.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2102.0-101.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-12.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.12.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-12.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-12.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-20.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-20.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.3-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.10-6.el9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-12.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-251.3.bfb2f92.git.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-251.3.bfb2f92.git.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.30.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-70.30.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.17.1-1.module+el9.2.0.z+19753+58118bc0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.17.1-1.module+el9.2.0.z+19753+58118bc0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.2.0.z+19753+58118bc0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-46.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-46.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.10-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-11.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-13.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-13.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-13.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-10.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230814-140.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.9-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.99.3-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.18.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.18.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.33-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.7-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.5-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.1-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.2-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.3-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.3-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.7-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.2-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.33-160.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.4-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-18.b1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-18.b1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.12.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.12.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.9.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.1-10.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.6-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.106-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-3.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.2-0.1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.11-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.18-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28-5.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.13-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.21-1.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.14-1.module+el9.2.0+17911+b059dfc2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.21-1.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-1.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-1.module+el9.1.0.z+15477+cb86791d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-14.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.5-1.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.14-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.22-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-14.el9_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-14.el9_0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.31.1-65.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-6.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-101.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-101.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-101.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.10-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-4.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.19.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.19.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.8-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.108-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-2.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.1-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.1-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-5.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.1-1.module+el9.1.0.z+17326+318294bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.12.1-1.module+el9.1.0.z+17326+318294bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.2-1.18.12.1.1.module+el9.1.0.z+17326+318294bb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.17.1-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.15.0-1.16.17.1.1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-362.18.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.18.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.18.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.3-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-17.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-43.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-43.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-43.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-43.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-11.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-11.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.8-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-18.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-18.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-32.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.9-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.109-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-103.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-103.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.4-103.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.13.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-14.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-14.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.6-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.18.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.4.0-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5.4-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.4-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-12.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-12.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.392.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.3-13.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.10-12.el9_0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-7.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.3.0-4.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:53.0.0-10.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.36.2-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.10-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-0.5.rc2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.110-1.el9_0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.100-0.5.rc2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-1.el9_0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.2-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.7-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.3-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.6-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.6-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-22.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-22.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.21-37.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.11-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.27-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-20.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-20.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-7.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.7-7.el9_0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-47.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-47.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.22.2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.22.2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-13.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-13.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.2-42.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.2-42.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-24.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-24.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1-9.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.9-1.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:250-12.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.13-8.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.42.2-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-2.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-2.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.14-1.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:366-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.5.0-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.3-4.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-284.25.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.25.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.25.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.6.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-20.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-20.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-8.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-8.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-8.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-8.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.39-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.39-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.39-16.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.6-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-3.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.5.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.5.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.12.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.12.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.36-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.237.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.244.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.247.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.250.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.250.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.247.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.255.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.255.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.32.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.32.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.25.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.25.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.55.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.55.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.258.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.261.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.269.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.272.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.272.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.211.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.215.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.275.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.275.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.60.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.60.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.221.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.221.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.33.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.33.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.33.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-284.30.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.30.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.30.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.280.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.283.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.290.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.290.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.130.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.283.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.17-3.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.10.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-5.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-18.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-18.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.23.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-162.23.1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.7.1-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-16.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-16.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.27-1.module+el9.3.0.z+21063+f4ccb976</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.8.0-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.34.0-17.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-17.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.79.0-17.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.20211126git1ff6fe1f43.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-362.13.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.13.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.13.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-5.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:148-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2.1-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.1.1-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.10.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-6.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.0-284.18.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.18.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-284.18.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240905-143.3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.5-1.el9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1.5-1.el9_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.13-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.113-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b09-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.362.b09-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18.0.10-2.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.6.0.10-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.372.b07-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.19.0.7-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.7.0.7-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.20.0.8-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.8.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.9.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.1.0.12-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.382.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.21.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.20-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.27-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.3-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.39.3-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240910-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-7.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-4.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.4-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-19.el9_1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-2.module+el9.2.0.z+18497+a402347c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:36.0.1-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-2.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-1.module+el9.2.0+17405+aeb9ec60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.module+el9.2.0+17405+aeb9ec60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.7-1.Final.module+el9.2.0+17405+aeb9ec60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.3-1.module+el9.2.0.z+19113+6f5d9d63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.3-1.module+el9.2.0.z+19113+6f5d9d63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.7-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.7-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.18-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.118-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.107-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-37.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-29.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.29.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.4-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.53-7.el9_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.19-3.el9_1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-3.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.9.0-1.el9_1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48-9.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.16.1-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-10.2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-1.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.72-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.72-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.72-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.72-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.19-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.3-4.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.7-1.el9_1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-23.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-14.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-3.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-3.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-10.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-6.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-6.el9_1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.10-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.10-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.13-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.13-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.3-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.9-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-3.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2-10.20210508.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-27.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-27.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.0-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.19.4-1.16.20.1.1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-7.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-3.module+el9.2.0.z+18964+42696395</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.14.2-3.module+el9.2.0.z+18964+42696395</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.19.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.9-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240603-143.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.29-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.076-461.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.5.3-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1-5.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.11.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-16.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-16.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-16.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.38.5-1.el9_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.11.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180414-29.el8_8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20200406-26.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.20-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.9-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.120-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.109-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5.4-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-11.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-22.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-103.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-103.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17.5-103.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-14.el9_2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.2.5-3.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.14.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.12.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240910-1.20250211.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.20-7.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.21-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.10-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.121-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.110-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.0-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.3.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.25-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.14-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.125-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.114-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.100-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-143.module+el9.3.0+21558+96b51efd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-10.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-10.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-10.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-13.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-13.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.24-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.13-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.124-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.113-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.13.0-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-13.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.5.0-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2024.2.69_v8.0.303-91.4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-55.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-55.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-6.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-6.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-10.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-11.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-11.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-30.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-20.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-20.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.66.1-2.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.18.2-2.module+el9.2.0.z+20408+7cb5fda5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.7-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.7-1.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.1-5.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.10-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.9-4.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.12-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.3-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-1.module+el9.2.0.z+20667+a2d2a8a9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.5-1.module+el9.2.0.z+20667+a2d2a8a9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-101.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-101.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.18.6-101.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-5.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-5.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-70.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-70.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.17-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.17-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.16-1.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.2-2.el9_2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.22-3.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-14.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-3.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.6-1.module+el9.5.0+22422+63e067d8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.6-1.module+el9.5.0+22422+63e067d8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-2.module+el9.3.0+21263+4e58afe8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-2.module+el9.3.0+21263+4e58afe8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-37.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.49-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.20-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.0-362.24.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.24.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-362.24.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44.3-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-14.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-14.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-14.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.13-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.4-28.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.5-3.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.23-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.12-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.0~rc.2-0.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.123-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.112-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.100~rc.2-0.1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-5.module+el9.3.0.z+20438+032561a0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-5.module+el9.3.0.z+20438+032561a0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-3.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-11.el9_2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-3.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-3.el9_2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.0-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.4.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20230524-4.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20230524-4.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-60.el9_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-60.el9_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-60.el9_2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-0.1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.9-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.9-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-2.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-26.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.26-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.16-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.126-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.116-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.0-18.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.62-37.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-6.el9_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-1.module+el9.3.0+21385+bac43d5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.1-1.module+el9.3.0+21385+bac43d5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.3.0.z+20478+84a9f781</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.3.0+19518+63aad52d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-6.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-77.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-77.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.01-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.74-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.80-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.03-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.06-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.06-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.05-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.47-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.09-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.100.600-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.02-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.67-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.07-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.08-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.403-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.05-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3401-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.75-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.04-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.800-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.65-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-481.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.5.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-22.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-22.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.432.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.25.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.13.0.11-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.5.0.10-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:102.15.1-1.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.el9_2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.4-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-12.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-12.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-34.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.34.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-8.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.1-8.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:36.0.1-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:37.0.2-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-6.el9_3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-6.el9_3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-14.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.6.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.16.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.16.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.16.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.25-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-1.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.37.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.37.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.37.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.35.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.35.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.35.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.26.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.26.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.26.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.31.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.31.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.31.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.4.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.1.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.24.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.24.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.22-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.15-1.module+el9.7.0+23768+0a6844e9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:26.4.20-1.module+el9.5.0+22578+dc54e53f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.34.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.34.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.46.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.46.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.58.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.58.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.52.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.52.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-25.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-25.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-24.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.1.9-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-24.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-24.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.3.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.293.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.293.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.1-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.35.0-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.9.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-5.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.2-5.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.2-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-23.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.7.6-23.el9_3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.0-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240524-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240524-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.35.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.90.0-6.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009191734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.5.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-10.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.el9_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.el9_3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:252-32.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252-32.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252-32.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-7.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-13.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.15-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.115-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.101-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.14-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.7.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-9.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.21.0-9.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-1.module+el9.3.0+21283+b0ea34b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.6-1.module+el9.3.0+21283+b0ea34b6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.22-1.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.4.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.9-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.9-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-22.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-22.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.18-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.18-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-1.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-1.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.41-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-24.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-24.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-24.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.6-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-13.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-13.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el9.4.0+20748+b46899d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.28-1.module+el9.6.0+23063+43495379</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el9.4.0+20748+b46899d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el9.4.0+20748+b46899d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-2.module+el9.4.0+20796+bd4564df</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-1.module+el9.4.0+20748+b46899d2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.19-1.module+el9.6.0+23015+da8065b7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.23-1.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.0-2.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-1.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.3-1.module+el9.6.0+22647+1741ae35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:23.11-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.5.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.12-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.112-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-20.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.3-20.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.16.0-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.9-1.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.0-6.2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-3.el9_3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.8.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:42.2.28-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-18.el9_4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.9-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31.5-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.402.b06-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.22.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.10.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.2.0.13-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.412.b08-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0.9-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.23.0.9-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.11.0.9-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.3.0.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.11.10-1.module+el9.5.0+22578+dc54e53f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.422.b05-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0.8-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.24.0.8-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.12.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.4.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.27-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.19-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.2-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.127-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.119-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.102-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.17-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.3-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.117-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.103-2.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.16.0-1.module+el9.4.0+22197+9e60f127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.16.0-1.module+el9.4.0+22197+9e60f127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.1-1.20.16.0.1.module+el9.4.0+22197+9e60f127</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-4.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.2-2.module+el9.4.0+21731+46b5b8a7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.12.2-2.module+el9.4.0+21731+46b5b8a7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.20.2-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.0-11.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.0-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.30.0-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-11.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.16-11.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-21.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6-17.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-13.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-29.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-29.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.1-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.3-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.4-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.12-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.5-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.33.7-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.3-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.10-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.10-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.10-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.11-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.11-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.42.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.0-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201107-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-6.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.7-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.10.0-1.el9_3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.7-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-10.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.16.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.16.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.16.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.18.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.18.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.18.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.22.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.22.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.22.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.3.0-427.20.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.20.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-427.20.1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-15.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.0-15.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-1.module+el9.4.0+21222+faeeed2f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-1.module+el9.4.0+21222+faeeed2f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.module+el9.4.0+21222+faeeed2f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.module+el9.4.0+21222+faeeed2f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.0-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.9-2.module+el9.4.0+21859+16f07581</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.25-1.module+el9.5.0+22477+5fdac06d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20250211-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.0-5.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.4-1.module+el9.4.0+22195+c221878e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.20.4-1.module+el9.4.0+22195+c221878e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.3.0+19762+d716bf3b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.7.0-1.18.20.4.1.module+el9.4.0+22195+c221878e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.35.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.35.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20250211-1.20250512.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:311.2-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:311.2-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-100.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.5-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.105-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.7-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.107-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-4.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-4.el9_3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-10.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-8.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-26.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.5-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.43.5-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:590-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-16.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.5-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.1-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.6-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.6-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-9.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-14.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-14.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-14.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-1.el9_4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-9.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-27.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-27.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-27.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.4.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.21-40.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.62.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20250716-151.3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:39.31.5.1-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.168.6.1-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.30.13.0-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.83.5.1_1-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.24.2.2-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:41.28.5.1-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20250812-151.4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.7-19.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.10-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-7.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-5.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-5.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-5.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.5-5.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.18-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.32-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.132-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.8-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.108-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.10-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.110-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-8.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-11.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-11.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.57-11.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20240524-6.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20240524-6.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.5-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.16-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.16-3.module+el9.4.0+22273+463af10f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-10.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.31-7.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.31-7.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.4.46.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.15.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.15.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.15.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.4.31.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.4.34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.8-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.4.28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.4.49.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.14.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.14.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.14.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.40.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.40.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.40.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.1-8.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.9-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.32-5.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.8-1.module+el9.4.0+20427+07482b8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.0-1.module+el9.4.0+20427+07482b8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-1.Final.module+el9.4.0+20427+07482b8c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-1.module+el9.4.0+22207+8466e31f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.4-1.module+el9.4.0+22207+8466e31f</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.35-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.135-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.100-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.11.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.35.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.35.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.35.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.4.40.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.0-6.6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.1-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.3-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.0-11.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.4.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7044-14.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.2-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.2-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.2.2-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-104.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-104.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-114.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-114.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-14.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.21.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.21.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.21.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.7-1.module+el9.5.0+22705+3d861c1c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.7-1.module+el9.5.0+22705+3d861c1c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.7-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28.7-17.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.25.1-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-31.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-31.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-31.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-4.el9_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-4.el9_6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-4.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:21-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.27-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1.1-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.9-163.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-145.module+el9.5.0+22579+d0aa0a16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.4.43.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.22.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.22.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.22.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.51.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.51.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.47.3-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.47.3-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-3.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-8.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-8.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-8.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.47.1-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.47.1-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.24.0-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-8.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-8.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-16.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-16.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-16.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-22.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-22.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-22.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-22.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.8-1.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.4.37.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.23.2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.23.2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.23.2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.237.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.38.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.38.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.38.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.211.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.258.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-13.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-14.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-14.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.5-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.6-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.4.1-6.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-13.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-6.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-6.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-76.el9_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-76.el9_5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-3.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-15.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9-15.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.244.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.12.1-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-32.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.30.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.30.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.28.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.28.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.16.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.16.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.5-9.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20231122-6.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-28.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.7-28.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:323.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:323.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.4-4.el9_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-21.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-62.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:53.0.0-12.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.5.1-2.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.2-3.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-38.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.38.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-38.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.38.el9_4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48.10-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.13.0-3.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.31-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.24.31-5.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.18-3.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.7-1.el9_4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.1-4.el9_4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-12.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-12.el9_4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-4.module+el9.5.0+22954+e2d70a1c.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-4.module+el9.5.0+22954+e2d70a1c.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.14.0-2.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:115.14.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.5-2.el9_5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.2.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.19-8.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.5.0-7.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-18.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.22-4.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.9-7.el9_5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.13-4.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.10-19.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.3.0-1.el9_4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-28.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-28.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-28.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.6.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.6.0-3.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-125.el9_5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-125.el9_5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-125.el9_5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.7.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-94.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-94.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.3.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.20-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.20-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.20-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-12.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.2-67.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35.2-67.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-21.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-21.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.44-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.14-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-4.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-4.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-4.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.26-1.module+el9.7.0+23549+c13c2ce3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-11.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:27.2-11.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4-38.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.4-38.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.module+el9.6.0+22880+6b241eec</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.2-2.module+el9.6.0+22979+c3d78d52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-3.module+el9.7.0+23421+025f8139</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-1.module+el9.7.0+23784+0c5a3b34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-1.module+el9.7.0+23784+0c5a3b34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.10-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-8.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-8.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.3-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-18.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-18.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.68.4-18.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-11.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-11.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-21.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37.4-21.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.4-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.3.29-1.module+el9.7.0+23852+76de6b03</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-6.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-12.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201107-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201107-8.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-231.el9_7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-231.el9_7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-231.el9_7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-5.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.8.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.8.0-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.102-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.14.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.14.0.7-3.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.6.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-3.module+el9.6.0+22713+cbf15e23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0.20070801-24.module+el9.6.0+22713+cbf15e23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.6-1.module+el9.6.0+23497+d0c5dcca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.6-1.module+el9.6.0+23497+d0c5dcca</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.module+el9.6.0+22713+cbf15e23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.module+el9.6.0+22713+cbf15e23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.452.b09-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.27.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.15.0.6-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.7.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.8-1.module+el9.6.0+23049+8374f320</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.8-1.module+el9.6.0+23049+8374f320</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.3.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.17.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.17.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.0-503.34.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.34.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-503.34.1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.23.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.23.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.21.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.21.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.22.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.22.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.18.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.18.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.261.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.215.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.3.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.26.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009239803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.26.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.3.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.37.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.37.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.13.1-1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.13.1-1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.5.0+22773+9a359385</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.5.0+22773+9a359385</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.13.1.1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.13.1.1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.0-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-9.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-9.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.4-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.9-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23.9-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-14.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.5-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:35.12-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.4-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.4-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.5.0+22763+17233acb</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.3.21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-1.module+el9.6.0+23151+b1496e9d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-1.module+el9.6.0+23151+b1496e9d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.16.0.1.module+el9.6.0+23151+b1496e9d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.16.0.1.module+el9.6.0+23151+b1496e9d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.2-1.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.19.2-1.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.8.2-1.20.19.2.1.module+el9.6.0+23146+be9976bd</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-22.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.1-22.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.14-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.3-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.114-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.104-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.1-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.6-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.10-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.22-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-3.module+el9.7.0+23362+7018fe7e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.5-3.module+el9.7.0+23362+7018fe7e</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.22-5.module+el9.7.0+23651+15dc1615</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-6.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.34-9.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.6-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.27-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.2-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:41.0.7-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2025.5-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.8-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.5-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.22-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.2-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.20.0-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.3-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.2-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.3-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1.0-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.0-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.3.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.9-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.9-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.22-4.module+el9.5.0+23030+26c9b8e1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-45.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.45.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-1.el9_5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.16-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.5-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.116-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.106-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.4-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.1-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.10-1.module+el9.6.0+23332+115a3b01</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.10-1.module+el9.6.0+23332+115a3b01</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.7-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.27-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.0-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.4-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.6-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.1.1-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21.3-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.27-146.module+el9.5.0+23003+a4c328ce</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.4-10.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-76.el9_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-76.el9_5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.3-8.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-19.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-19.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.54.0-19.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-10.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.0-1.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.9.0-2.el9_5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.17-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.6-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.117-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.107-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-2.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.462.b08-3.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.28.0.6-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.16.0.8-2.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.8.0.9-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.2-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.1-0.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.48.5-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-1.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.15.0-1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.15.0-1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.15.0.1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.15.0.1.module+el9.6.0+23062+9e7801b9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.3-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.3-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-6.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-10.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.01.0-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.5p2-10.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-6.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-6.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.30.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.30.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.41.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.41.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.39.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.39.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.33.2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.33.2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.38.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.38.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.3.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.47.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.47.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.3.27.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.3.30.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.35.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.35.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.26.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.26.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.3.33.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.45.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.45.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.42.2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.42.2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.8.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.8.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.269.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.3.18.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.49.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.49.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.16.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.16.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.44.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.44.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.27.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.27.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.24.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.24.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.11.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.11.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.10.1-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.10-1.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.20.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.20.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.41.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.41.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.9.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.9.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.13.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.13.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.3.36.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.36.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-611.36.1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.14.0-570.62.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-34.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-34.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.23-34.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.18.29-5.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.79-8.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.82-6.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.01-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.74-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.80-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.03-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.06-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.06-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.05-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.27-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.47-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.09-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.85-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.100.600-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.03-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.51-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.02-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.21-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.03-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.08-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.67-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.48-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.41-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.07-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.08-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.23-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.403-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.31-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.05-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3401-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.75-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.56-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.04-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.32.1-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.800-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.65-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.02-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.04-481.1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.04-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-13.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5.0-1.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.10-1.module+el9.6.0+23420+848a4539</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.10-1.module+el9.6.0+23420+848a4539</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.1-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-14.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-14.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:252-55.el9_7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252-55.el9_7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:252-55.el9_7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7b-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.9-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.6-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.11-1.module+el9.7.0+23559+d075163a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.2.11-1.module+el9.7.0+23559+d075163a</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.6-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-11.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0-11.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210202-11.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-86.el9_6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-86.el9_6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:53.0.0-13.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.5.1-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:68.2.2-5.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.2-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-6.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.6.2-6.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-12.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-12.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-6.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-6.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.8-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.4-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.99.8-4.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.6-2.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210202-11.el9_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.87-3.el9_6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.1-5.20211126git1ff6fe1f43.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.1-8.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-31.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-4.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-31.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-31.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.11.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.26-4.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:40.0-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:67.1-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:67.1-10.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-9.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.6-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.19.1-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.43-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.7-1.module+el9.7.0+23698+51fa9c99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.7-1.module+el9.7.0+23698+51fa9c99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.472.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.29.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.17.0.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9.0.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-15.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-15.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-23.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9-14.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-103.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.15.9-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-1.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.13.0-1.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.6.2-1.24.13.0.1.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.22.0.1.module+el9.7.0+23896+b5802de9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.6.233.17-1.24.13.0.1.module+el9.7.0+23894+c8377628</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.21-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.10-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.121-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.111-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.26-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-33.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-33.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-33.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-7.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.62-7.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.3-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.3-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-34.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-34.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3op2-34.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-6.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-6.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.10-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.12.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-19.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-19.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-14.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28-14.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-26.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-26.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009238208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-12.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-114.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.06-114.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.41.8-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-13.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.0-13.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-18.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-12.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:31-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.0-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.0-3.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.8-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.8-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.9-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-47.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.47.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-22.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-6.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-6.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:23.2.7-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.11-32.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.482.b08-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.30.0.7-1.el7_9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.18.0.8-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.10.0.7-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.2.0.10-1.el9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.37-12.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-98.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-98.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.5-6.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.12-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.19-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.0-18.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.1-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.7-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.2-11.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.2-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-17.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.1-17.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.3-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1k-5.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-2.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.16.0-2.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-4.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.2-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-9.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.16.0.2.module+el9.6.0+23339+d3c8acfa</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.6-6.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-11.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-22.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12.2-22.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.13.0-1.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.13.0-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34-168.el9_6.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-11.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.4-11.el9_6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-15.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.0-15.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.21-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.11-2.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.9-1.el9_6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-35.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.76.1-35.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-2.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-3.el9_6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20241117-4.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20241117-4.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.1-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.13-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.72.0-12.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.4-1.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.14.0-17.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.14.1-2.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.14.1-2.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.11.0-1.24.14.1.2.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4.254.21-1.22.22.2.1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.6.233.17-1.24.14.1.2.module+el9.7.0+24166+51c9666b</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-2.module+el9.7.0+24008+f3da7534</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-2.module+el9.7.0+24008+f3da7534</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-11.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.12.1-11.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-1.module+el9.7.0+24031+188c384c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-1.module+el9.7.0+24031+188c384c</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.996-3.module+el9.7.0+24088+36dcab8d.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0.20070801-24.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.8-1.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.8-1.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.module+el9.7.0+24088+36dcab8d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.37-12.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-98.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.10.0-98.el9_7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.8-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25.0-4.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.25.0-4.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.41.2-3.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-10.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.13-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.13-14.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.30-14.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-8.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.6-19.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.1-13.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-23.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.2637-23.el9_7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.4-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.14-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.104-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.115-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.25-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.125-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-1.el9_7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-2.module+el9.7.0+24173+4204b761.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.3-2.module+el9.7.0+24173+4204b761.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.2-1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.2-1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.06-6.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.9.7-1.22.22.2.1.module+el9.7.0+24157+8ddb2461</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-5.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.12-4.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.27-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.5-22.el9_7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.1-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.7p1-48.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.4-5.48.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.0-1.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.3-7.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.25-3.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.13-5.2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(i686|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.12.12-4.el9_7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:344-2.el9_7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:344-2.el9_7</evr>
  </rpminfo_state>
</states>
</oval_definitions>
